Information contained in this manual has been reviewed for accuracy. But it could include typographical errors or technical inaccuracies. Changes are made to the document periodically. These changes will be incorporated in new editions of the publication. QSAN may make improvements or changes in the products. All features, functionality, and product specifications are subject to change without prior notice or obligation.
Table of Contents Notices ..........................i Preface ........................xviii About This Manual ........................xviii Related Documents ........................xviii Technical Support ........................xviii Information, Tip and Caution ......................xix Conventions ........................... xix SANOS Overview ..................... 1 1.1. Introduction to SANOS ....................... 1 1.1.1.
Page 9
11.3.5. Add a Tier (Disk Group) in an Auto Tiering Pool ..........227 11.3.6. Hot Spares in an Auto Tiering Pool ..............228 11.4. Configure Volumes ......................228 11.4.1. Create a Volume in an Auto Tiering Pool ............228 11.4.2. List Volumes and Operations on Volumes ............. 232 11.5.
Page 13
Figure 8-7 Disk Health Check ......................122 Figure 8-8 Set Dedicated Spare ..................... 122 Figure 8-9 Update Disk Firmware ....................123 Figure 8-10 More Information of Disk Drive ................... 124 Figure 8-11 S.M.A.R.T. Attributes of Disk Drive ................125 Figure 8-12 Pools Function Submenu .....................
White Papers Application Notes Technical Support Do you have any questions or need help trouble-shooting a problem? Please contact QSAN Support, we will reply to you as soon as possible. Via the Web: https://qsan.com/support Via Telephone: +886-2-7720-2118 extension 136 ...
Information, Tip and Caution This manual uses the following symbols to draw attention to important safety and operational information. INFORMATION: INFORMATION provides useful knowledge, definition, or terminology for reference. TIP: TIP provides helpful suggestions for performing tasks more effectively. CAUTION: CAUTION indicates that failure to take a specified action could result in damage to the system.
SANOS Overview SANOS (SAN Operating System) is QSAN’s proprietary SAN operating system and allows you to manage, monitor, and analyze the configuration and performance of your XCubeSAN series SAN storage system. This chapter provides an overview of the SANOS functionality and includes a brief explanation of storage terminology for you to be more familiar with the storage technologies used by the XCubeSAN system.
1.1.2. SANOS Storage Pool Architecture QSAN storage pool supports a variety of 3.5”/2.5” SAS/NL-SAS HDD and 2.5” SAS/SATA SSD flash drives. Figure 1-3 shows the storage pool architecture. Several disk drives are combined together to form a “disk group”...
If the local disk drives are not enough, QSAN expansion enclosures including disk drives can be added to increase storage capacity. There are host spares for standby if any disk drives in pools fail. Base on snapshot technology, the data backup features such as local clone and remote replications are also provided.
Page 27
Update firmware of head unit or enclosure unit(s). Change operation mode of single or dual controller. Blink UID (Unique Identifier) LEDs for locating the storage arrays. System reset to default, configuration backup, and volume restoration for maintenance ...
Page 29
A LUN (Logical Unit Number) is a unique identifier for designating an individual or collection of physical or virtual storage devices that execute I/O commands with a host computer, as defined by the SCSI (Small Computer System Interface) standard. iSCSI iSCSI (Internet SCSI) is a protocol which encapsulates SCSI (Small Computer System Interface) commands and data in TCP/IP packets for linking storage devices with servers over common IP infrastructures.
Prepare for Installation Preparation for installation is an important task, it will help you to plan your system configuration and install your system smoothly. This chapter provides a description of the configuration planning steps and a configuration worksheet example for reference. 2.1.
Page 35
The maximum length of the volume name is 32 characters. Valid characters are [ A~Z | a~z | 0~9 | -_<> ]. Capacity: Required capacity of the volume. Volume Type: RAID Volume or Backup Volume 8. LUN Mapping Configuration Item Value Protocol: iSCSI or FCP.
characters. Valid characters are [ A~Z | a~z | 0~9 | ~!@#%^&*_-+=|(){}[]:;<>.?/ ]. Target CHAP Password: (optional) CHAP (Challenge-Handshake Authentication Protocol) password. The length of the password is between 12 to 16 characters. Valid characters are [ A~Z | a~z | 0~9 | ~!@#$%^&*_-+=`|\(){}[]:;”’<>,.?/ ].
(both controller 1 and controller 2), and then the MPIO should setup automatically. More advanced, all the connections among hosts (with clustering), switches, and the dual- controller are recommended as redundant as shown below. Figure 2-1 Dual-controller Topology If you are using onboard iSCSI LAN ports, please fill in part 4, onboard iSCSI port IP addresses of iSCSI port configuration.
2.1.6. Storage Configuration Planning This is the most important part to use the SAN storage system effectively. Depending on your application, estimated volume capacity, and disk failure risk, you should have a well- thought out storage plan. Complete all storage configuration planning jobs on part 6, pool configuration, part 7, volume configuration, part 8, LUN mapping configuration, and part 9, SSD cache configuration.
Select a source volume and check its capacity. Prepare a target volume and set it as backup volume. The capacity of target volume should be larger than the source one. Plan the schedule local clones, determine the cycle of executing clone tasks. It can be ...
Page 45
Item Value Maximum Volume Quantity in a Pool Maximum Volume Quantity Per System 4,096 (include Snapshot Volumes) Maximum Host Number Per Volume Maximum Volume Capacity in Thick Provisioning Pool 640TB Maximum Volume Capacity in Thin Provisioning/Auto 256TB Tiering Pool LUN Parameters Item Value Maximum Quantity of LUN...
Page 51
The maximum length of the snapshot name is 32 characters. Valid characters are [ A~Z | a~z | 0~9 | -_<> ]. Schedule Snapshots: (optional) Daily 00:00 Define the cycle of snapshots. 11. Local Clone Configuration Item Value Source Volume Name: V1-PL1 Select one of created volume for source.
The default setting for the management IP address is DHCP. For users who are going to install at the first time, we provide the QFinder Java utility to search for QSAN products on the network and aid quick access to the login page of the SANOS web interface.
TIP: QFinder utility works in the following network environments: Both the management port of the SAN storage system and the management computer are both on the same subnet domain of the LAN. The LAN works with or without DHCP server. ...
3. Change Admin Password, The maximum length of the password is 12 characters. Valid characters are [ A~Z | a~z | 0~9 | ~!@#$%^&*_-+=`|\(){}[]:;"'<>,.?/ ]. 4. Set the local Date and Time. Date and time can be set by manually or synchronized with a NTP (Network Time Protocol) server.
Page 59
10. Verify all items, and then click the Finish button to complete the initial configuration. You have to login with the new IP address of the management port and new admin password next time. Getting Started...
4.2. SANOS 4.0 Desktop Panel When the password has been verified, the home page is displayed. As shown in Figure 4-2, the SANOS 4.0 desktop panel has three main sections: Function Menus and Submenus Function Tabs Main Working Area Function Tabs Main Working Area Function...
Snapshots Snapshots Remote Replications Remote Replications VIRTUALIZATION VMware VMware Microsoft Hyper-V Citrix Citrix MONITORING Log Center Event Logs Enclosures Hardware Monitoring | SES Performance Disk | iSCSI | Fibre Channel The following describes a brief introduction of desktop function menus. 4.3.1.
Overview Select Overview function menu to view all host connectivity which includes status and settings of all host cards. For more information, please refer to the chapter 7.2, Host Connectivity Overview section in the Host Configuration chapter. iSCSI Ports Select iSCSI Ports function menu to setup iSCSI port settings, including iSCSI port IP address, link aggregation, VLAN ID, jumbo frame, iSNS server, iSCSI targets, CHAP accounts, and view iSCSI active sessions.
Microsoft Provide information of supported Microsoft Windows feature of storage, such as ODX (Offloaded Data Transfer). Citrix Provide information of Citrix XenServer platform and its compatible version. 4.3.7. Monitoring Menu The MONITORING menu provides access to function menus of Log Center, Enclosure, and Performance.
Page 69
Reset/Shutdown Reset or shutdown the system. View IP Setting Display current IP address, subnet mask, and gateway. Change IP Set IP address, subnet mask, and gateway. There are three options of Config DHCP, BOOTP, or static IP address. Enc. Show the enclosure data of disk drive temperature, fan status, and Management power supply status.
System Information The system information block displays the basic information of the system. In addition, clicking More… will pop up a window for more details. Figure 5-3 System Information Block in the Dashboard This table shows the column descriptions. Table 5-1 System Information Block Descriptions Column Name Description...
Storage View The storage view block displays the basic information of storage. In addition, clicking pool column will pop up a window for more details. Figure 5-5 System View Block in the Dashboard The top table displays sum of disks, pools, volumes, LUN mappings, snapshots, clones, and remote replications in system.
plugged out. Partially optimal: the volume has experienced recoverable read errors. After passing parity check, the health will become Optimal. Capacity Total capacity of the volume. Used Used capacity of the volume. Used % Used percentage of the volume. Snapshot space Used snapshot space / Total snapshot space.
TX: Green line is transmitting throughput performance, the unit of measure is MBps (Mega Byte per Second). RX: Amber line is receiving throughput performance data. The unit of measure is MBps (Mega Byte per Second). Event Logs The event log block displays the recent 5 event logs. In addition, clicking More…...
hand, if anyone is not good, it will display Failed. So you may click More… to see details on what component has a fault. Clicking More… of every enclosure will pop up a window of enclosure status in detail. Figure 5-11 Head Unit Popup Window Click the Close button to exit the window.
Figure 6-2 General Settings Options of System Settings The options available in this tab: System Name: Change the system name, highlight the old name and type in a new one. Maximum length of the system name is 32 characters. Valid characters are [ A~Z | a~z | 0~9 | -_ ].
Figure 6-4 Management Port settings Options of Management Port Settings The options available in this tab: Enable Dual Management Ports: This is for dual controller models. When the setting is enabled, both management ports of the controllers have their own IP addresses and MAC addresses, and both are active.
6.3. Power Settings The Power Settings function submenu provides Boot Management, Cache to Flash, and UPS function tabs to show information and configuration setup. Figure 6-5 Power Settings Function Submenu 6.3.1. Boot Management Settings Select the Boot Management function tab in the Power Settings function submenu to enable or disable options about boot.
XCubeSAN Hardware Owner’s Manual. CAUTION: Wake-on-SAS feature required genuine QSAN proprietary expansion cables connected between the head unit and expansion units. Please contact local sales for this accessory. When finished, click the Apply button to take effect. 6.3.2. Cache to Flash Status Select the Cache to Flash function tab in the Power function submenu to show information of power module and flash module for cache to flash protection.
Figure 6-8 UPS Status and Settings This table shows the column descriptions. Table 6-3 UPS Column Descriptions Column Name Description UPS Status The status of UPS: Line: The UPS is online. Battery: The UPS is on battery. Battery: The voltage of the battery is low.
INFORMATION: Authentication Protocol: MD5: The MD5 algorithm is a widely used hash function producing a 128-bit hash value. It can still be used as a checksum to verify data integrity, but only against unintentional corruption. SHA: SHA (Secure Hash Algorithm) is a cryptographic hash function ...
Figure 6-11 Alert Settings Options of Alert Settings The options available in this tab: Syslog Server Settings: Fill in the host address and the facility for syslog service. The default UDP port is 514. You can also check the alert levels here. Most LINUX/UNIX systems built in syslog daemon.
Page 97
Options of SNMP Server Settings The options are available on this tab: SNMP Version: Select SNMP supported versions: v1/ v2, or v3. If select SNMP v3, it needs more options for authentication. Please enter a username, select an authentication protocol and enter an authentication password, check to use privacy if necessary, select a privacy protocol, and enter a privacy password.
TIP: Before upgrading, we recommend you to export your system configurations first in the Configuration Backup function tab. Please refer to the Configuration Backup section for more details. Figure 6-15 Firmware Update Options of Firmware Update The options available in this tab: ...
TIP: After enabling the licenses, the functions cannot be disabled and these license options will be hidden. 6.5.3. Firmware Synchronization Select the Firmware Synchronization function tab in the Maintenance function submenu to be used on dual controller systems to synchronize the controller firmware versions when the firmware of the master controller and the slave controller are different.
Page 105
Reset to Defaults: Click the Reset button to progress reset to defaults and force a reboot. The default settings are: 。 Reset Management Port IP address to DHCP, and then fix IP address: 169.254.1.234/16. 。 Reset admin’s Password to 1234. 。...
6.5.7. Reboot and Shutdown Select the Reboot / Shutdown tab in the Maintenance function submenu to be used to reboot or shutdown the system. Before powering off the system, it is highly recommended to execute Shutdown function to flush all data from memory cache into the disk drives. The step is important for data protection.
The target is the storage device itself or an appliance which controls and serves volumes. The target is the device which performs SCSI command or bridge to an attached storage device. Each iSCSI node, that is, an initiator or target, has a unique IQN (iSCSI Qualified Name). The IQN is formed according to the rules that were adopted for Internet nodes.
Figure 7-2 Host Port Overview The columns display information of Location, Name, Status, and MAC address for iSCSI or WWPN (World Wide Port Name) for fibre channel. INFORMATION: Fibre Channel / iSCSI Host Card at Slot 1: HQ-16F4S2, 4 x 16Gb FC (SFP+) ports ...
Figure 7-4 List iSCSI Ports The columns display information of Location, Name, Status, LAG (Link Aggregation), VLAN ID (Virtual LAN ID), IP address, Gateway IP address, Jumbo Frame status, and MAC address. Set IP Address Click ▼ -> Set IP Address which can assign an iSCSI IP address of the iSCSI data port. There are two options: Use DHCP to acquire an IP address automatically or specify a Static IP Address to set the IP address manually.
INFORMATION: Trunking: Sometimes called “Port Trunking” configures multiple iSCSI ports to be grouped together into one in order to increase the connection speed beyond the limit of a single iSCSI port. LACP: The Link Aggregation Control Protocol is part of IEEE 802.3ad that allows bonding several physical ports together to form a single logical channel.
Ping Host Click ▼ -> Ping Host, it can verify the port connection from a target to the corresponding host data port. Input the host’s IP address and click Start button. The system will display the ping result. Click Stop button will stop ping activity. Figure 7-9 Ping Host Reset Port...
Figure 7-11 iSCSI Targets Change Authentication Mode Click ▼ -> Authentication Method to enable CHAP (Challenge Handshake Authentication Protocol) authentication method used in point-to-point for user login. It’s a type of authentication in which the authentication server sends the client a key to be used for encrypting the username and password.
Figure 7-14 Change Target Name Change Network Portal Click ▼ -> Change Network Portal, and then select the network ports that you would like to be available for this iSCSI target. Figure 7-15 Change Network Portal Change Alias Click ▼ -> Change Alias to add or change the alias name. To remove an alias, clear out the current name.
2. Enter Username of CHAP user. The maximum length of the username is 223 characters. Valid characters are [ A~Z | a~z | 0~9 | ~!@#%^&*_-+=|(){}[]:;<>.?/ ]. 3. Enter Password (CHAP secret) and Confirm Password. The length of the password is between 12 to 16 characters.
Table 7-3 Active Sessions Column Descriptions Column Name Description TSIH TSIH (Target Session Identifying Handle) is used for this active session. Initiator Name It displays the host computer name. Target Name It displays the controller name. InitialR2T InitialR2T (Initial Ready to Transfer) is used to turn off either the use of a unidirectional R2T command or the output part of a bidirectional command.
Figure 7-23 Change Link Speed Options of Change Link Speed The option available in this tab: Link Speed: Set the link speed of fibre channel. The options are Automatic (default), 4 Gb/s, 8 Gb/s, and 16 Gb/s. Recommend to set it as Automatic to detect the data rate automatically.
Figure 7-25 Target Configuration CAUTION: Point-to-Point connection mode does not support multi-target. 7.4.4. Clear Fibre Channel Counters Click Clear All Counters button to clear all counters of fibre channels. Click ▼ -> Clear Counters to clear the counters of the selected fibre channel. Host Configuration...
Page 131
the throughput of most read and write operations equal to the throughput of one disk multiplied by the quantity of disk drives. Increased throughput is the big benefit of RAID 0, at the cost of increased vulnerability of data due to drive failures. RAID 1 (Mirroring between two disks) RAID 1 consists of data mirroring, without parity or striping.
RAID 60 (RAID 6 on top of RAID 0) RAID 60 is the combination of RAID 6 and RAID 0, do RAID 6 first, further RAID 0. In other words, it accesses stripes for more than two groups of RAID 6. RAID 6 needs to have at least four disk drives, so the minimum requirement of RAID 60 is eight disk drives.
SANOS supports hot spare drives. When a member disk drive in array fails, the system automatically replaces the failed member with a hot spare drive and rebuilds the array to restore its redundancy. Candidate and spare drives can be manually exchanged with array members.
Figure 8-2 Volume in Storage Architecture Volume is a basic unit of data backup. Base on the volume, SANOS provides snapshot, local clone, and remote replication functions. For more information about data backup, please refer to the chapter 12, Data Backup chapter.
A SANOS system can contain up to 4,096 LUNs which includes the total of volume LUN mappings and snapshot volume LUN mappings. Table 8-5 LUN Parameters Item Value Maximum Quantity of LUN 4,096 For more information about LUN mapping operation, please refer to the chapter 8.6, Configure LUN Mappings section.
INFORMATION: For deployment of the SAN system and expansion enclosures, please refer to the chapter 4, Deployment Types and Cabling in the XCubeSAN Hardware Owner’s Manual. Table 8-6 Enclosure and Disk Parameters Item Value Maximum Enclosure Quantity in a System Maximum Disk Quantity in a System 8.3.1.
Error Alert: S.M.A.R.T. error alerts. Read Errors: The disk drive has unrecoverable read errors. Capacity The capacity of the disk drive. Disk Type The type of the disk drive: [ SAS HDD | NL-SAS HDD | SAS SSD | SATA SSD ] ...
2. Select the pool which the disk drive is set to its dedicated spare, and then click OK button. Disk Scrub and Clear Disk Read Error Click ▼ -> Disk Scrub to scrub the disk drive. It’s not available when the disk drive is in used. Click ▼...
S.M.A.R.T. measures many attributes of disk drives all the time and inspects the properties of disk drives which are close to being out of tolerance. The advanced notice of possible disk drive failure will allow users to back up the data of disk drive or replace the disk drive. This is much better than a disk drive crash when it is writing data or rebuilding a failed disk drive.
Figure 8-13 Create a Thick Provision Pool Step 1 2. Select the Pool Type as Thick Provisioning. 3. Enter a Pool Name for the pool. Maximum length of the pool name is 16 characters. Valid characters are [ A~Z | a~z | 0~9 | -_<> ]. 4.
Figure 8-15 Create a Thick Provision Pool Step 3 8. Select a RAID Level from the drop-down list which lists available RAID level only according to the disk selection. 9. Click the Next button to continue. Storage Management...
Figure 8-17 Create a Thick Provision Pool Step 5 12. After confirmation at summary page, click the Finish button to create a pool. Figure 8-18 A Thick Provisioning Pool is Created 13. A pool has been created. If necessary, click Create Pool button again to create others. 8.4.2.
(This option is only visible when dual controllers are installed.) Table 8-9 Disk Column Descriptions Column Name Description Enclosure ID The enclosure ID. Slot The position of the disk drive. Status The status of the disk drive: Online: The disk drive is online. ...
Figure 8-21 Add Disk Group CAUTION: The action of transferring from the thick provisioning pool to auto tiering is irreversible. Consider all possible consequences before making this change. Migrate a Thick Provisioning Pool Click ▼ -> Migrate Pool to change the RAID level of a pool or move the member disk drives of the pool to different disks.
Usually, the pool migrates to higher RAID level for better protection. To perform a migration, the total capacity of the pool must be larger than or equal to the original pool. If the RAID level doesn’t change, the migration can also move the member disk drives of the pool to totally different disk drives.
Figure 8-28 Migrate RAID Level Step 4 6. Migration starts. The status of the Disks, Pools and Volumes are changing. The complete percentage of migration is displayed in the Status. 7. It’s done when the complete percentage reaches 100%. TIP: Thin provisioning pool cannot execute migrate or move, it uses the Add Disk Group option to enlarge capacity.
Figure 8-30 Create a Volume in Thick Provisioning Pool Step 1 2. Enter a Volume Name for the pool. The maximum length of the volume name is 32 characters. Valid characters are [ A~Z | a~z | 0~9 | -_<> ]. 3.
disk and then preload this data into the disk's buffer. This feature will improve performance when the data being retrieved is sequential. 。 Enable Fast RAID Rebuild: This option is available when the pool is created in protection RAID level (e.g., RAID 1, 3, 5, 6, 0+1, 10, 30, 50, and 60). For more information, please refer to the chapter 8.5.5, Fast RAID Rebuild section.
Rebuilding: The volume is being rebuilt. Migrating: The volume is being migrated. Rollback: The volume is being rolled back. Parity Checking: The volume is being parity check. Relocating: The volume is being relocated. Health The health of the volume: Optimal: the volume is working well and there is no failed disk in ...
Figure 8-37 Unmap LUNs Snapshot Operations Click ▼ -> Set Snapshot Space to set snapshot space for preparing to take snapshots. For more information about snapshot, please refer to the chapter 12.1, Managing Snapshots section in the Data Backup chapter. Figure 8-38 Set Snapshot Space Click ▼...
Figure 8-40 Change Volume Properties Reclaim Space with Thin Provisioning Pool Click ▼ -> Space Reclamation to reclaim space from the pool when the volume is in a thin provisioning pool. For more information about space reclamation, please refer to the chapter 9.2.1, Space Reclamation section in the Thin Provisioning chapter.
TIP: The extension capacity must be larger than the current capacity. CAUTION: Extension cannot be executed during rebuilding or migration. 8.5.5. Fast RAID Rebuild When executing rebuild, the Fast RAID Rebuild feature skips any partition of the volume where no write changes have occurred, it will focus only on the parts that have changed. This mechanism may reduce the amount of time needed for the rebuild task.
8.6. Configure LUN Mappings Select the LUN Mappings function submenu to map, unmap or view the status of LUN (Logical Unit Number) for each volume. Figure 8-44 Pools Function Submenu 8.6.1. Map a LUN of iSCSI Connectivity Here’s an example of mapping a LUN of iSCSI connectivity. 1.
Figure 8-46 Map a LUN of FC Connectivity 2. Select the Protocol as FCP (Fibre Channel Protocol). 3. Select a Volume from the drop-down list. 4. Enter the Allowed Hosts with semicolons (;) or click the Add Host button to add one by one.
8.8. Disk Roaming Disks can be re-sequenced in the same system or move all member disks in the same pool from system-1 to system-2. This is called disk roaming. System can execute disk roaming online. Please follow these steps. 1. Select the Pools function submenu, selects a pool. And then click ▼ -> Deactivate. 2.
and provides better utilization over those assets. Here the virtualization mechanism behind thin provisioning is storage pool. The capacity of the storage pool is shared by all volumes. When write requests come in, the space will be drawn dynamically from this storage pool to meet the needs.
Disk groups which contain disk drives can be added to a thin provisioning pool at any time to increase the capacity of the pool. For simplifying usage and better performance, every disk group must have the same quantity of disk drives. A thin provisioning pool can have up to 32 disk groups with each disk group containing up to 8 disk drives.
Figure 9-6 Create a Thin Provisioning Pool Step 1 2. Select the Pool Type as Thin Provisioning. 3. Enter a Pool Name for the pool. The maximum length of the pool name is 16 characters. Valid characters are [ A~Z | a~z | 0~9 | -_<> ]. 4.
Figure 9-8 Create a Thin Provisioning Pool Step 3 8. Select a RAID Level from the drop-down list which lists available RAID level only according to the disk selection. 9. Click the Next button to continue. Thin Provisioning...
Figure 9-10 Create a Thin Provisioning Pool Step 5 12. After confirmation of info on the summary page, click the Finish button to create a pool. Figure 9-11 A Thin Provisioning Pool is Created 13. A pool has been created. If necessary, click the Create Pool button again to create others.
RAID The RAID level of the pool. Current The current running controller of the pool. Controller (This option is only visible when dual controllers are installed.) Table 9-3 Disk Group Column Descriptions Column Name Description The number of the disk group. Status The status of the disk group: ...
Figure 9-13 Change Thin Provisioning Policy Table 9-5 Thin Provisioning Policy Column Descriptions Column Name Description Threshold The threshold of the pool. Level Define the event log level when the usage of the pool reaches the threshold. The options are: ...
Figure 9-15 Move Disk Group 9.3.4. Add a Disk Group in a Thin Provisioning Pool Here is an example of adding a disk group in thin provisioning pool. 1. Select a pool, click ▼ -> Add Disk Group to add a disk group in a thin provisioning pool. Thin Provisioning...
Figure 9-17 List Pool after Adding a Disk Group 9.4. Configure Volumes This section will describe the operations of configuring volume in thin provisioning pool. 9.4.1. Create a Volume in a Thin Provisioning Pool Here is an example of creating a volume of thin provisioning pool. 1.
Figure 9-19 Create a Volume in Thin Provisioning Pool Step 2 7. Volume advanced settings can also be configured optionally in this step: 。 Block Size: The options are 512 Bytes to 4,096 Bytes. 。 Priority: The options are High, Medium, and Low. The priority compares to other volumes.
11. A volume has been created. If necessary, click the Create Volume button again to create others. TIP: SANOS supports instant RAID volume availability. The volume can be used immediately when it is initializing or rebuilding. 9.4.2. List Volumes and Operations on Volumes Most operations are described in the chapter 8.5, Configuring Volumes section.
SSD cache; the write data that is stored to the SSD cache temporary and then flush to HDDs in bulk. So the application receives an immediate performance boost. QSAN SSD cache enables applications to deliver consistent performance by absorbing bursts of read/write loads at SSD speeds.
10.2. Theory of Operation SSD cache allows an SSD to function as read cache or write buffer for a HDD volume. In SSD read cache, it is a secondary cache that improves performance by keeping frequently accessed data on SSDs where they are read far more quickly than from the HDD volume. When reads or writes are performed, the data from the HDDs are copied into the SSD cache.
TIP: Note that the capacity allocated to the SSD cache pool is not counted in the regular data storage. The volumes in pool can be selected to enable SSD cache function. The following is the relationship between SSD cache pool and storage pool. Figure 10-3 The Relationship between SSD Cache Pool and Storage Pool The volumes enabled SSD cache with hot data will consume the capacity of the SSD cache...
SSD read-write cache needs data protection, so it usually uses RAID 1 or RAID 10 level to create the SSD cache storage space. Our SSD read-write cache technology uses NRAID 1+ which is parallel NRAID with mirror. Figure 10-5 SSD Read-write Cache with NRAID 1+ RAID 10 creates a striped set from a series of mirrored drives.
3. The requested data is returned to the host. And the system will check whether the requested data is hot data. 4. If it is, the SSD cache is populated. INFORMATION: The actions that read data from the HDD and then write to the SSD are called populating the cache.
Figure 10-9 Write Data These steps are: 1. A host requests to write data. 2. Data is written to the SSD cache. 3. The status is returned to the host. 4. Data will be flushed to the HDD volume at the appropriate time. Flush Write Data to HDD Volume In SSD read-write cache, the write data will be flushed to the HDD volume in the following situations.
10.2.6. SSD Cache Tuning The SSD cache can be tuned to maximize its efficiency base on application usage. Cache block size, populate-on-read threshold and populate-on-write-threshold are the main parameters. Cache Block Size A large cache block suits applications where frequently accessed data is close to each other, known as a high locality of reference.
key, click the Choose File button to select it, and then click the Apply button to enable. When the license is enabled, please reboot the system. Each license key is unique and dedicated to a specific system. If you have already enabled, this option will be invisible. Figure 10-11 Enable SSD Cache License 10.3.2.
Figure 10-13 Create an SSD Cache Pool Step 2 7. Select a Pool Name from the drop-down list which lists available pools to be assigned to. 8. Within the pool, check Volumes to enable SSD cache, uncheck Volumes to disable. 9.
Figure 10-16 Another SSD Cache Pool is Created TIP: The Create SSD Cache Pool button will be gray out when meet the following conditions. There are no available SSDs which can be created an SSD cache pool. There are no available pools which can be assigned to the SSD cache ...
NRAID+: SSD read cache. NRAID 1+: SSD read-write cache. Pool Name Which pool the SSD cache pool assigns to. I/O Type The I/O type of the SSD cache pool: Database. File System. Web Service. Customization.
Figure 10-21 Add / Remove SSDs from the SSD Cache Pool For an SSD read-write cache, click ▼ -> Add SSDs to add SSDs into the SSD cache pool. Please select two SSDs at a time to add into the SSD cache pool. SSD Cache...
Figure 10-23 SSD Cache Function Submenu Select the SSD Cache Statistics function tab in the SSD Cache function submenu to monitor the SSD cache statistics. Here is an example of monitoring the volume of the SSD read-write cache pool. 1. Select an SSD Cache Pool Name and select an Enabled Volumes which you want to monitor.
10.5. SSD Cache Notices The following are some notices about SSD cache. To support SSD cache 2.0, the resources will be redistributed. So executing COLD REBOOT is necessary after upgrade from firmware 1.0.x to 1.1.0. The SSD cache is optional, the SSD cache license can be extended to SSD cache 2.0 ...
Figure 11-1 Auto Tiering Pool 11.1.1. SSD Cache vs. Auto Tiering A key difference between tiering and cache is that tiering moves data to SSD instead of simply caching it. Tiering can also move data both from slower storage to faster storage and vice versa.
11.2.1. Auto Tiering Architecture A newly created auto tiering pool is based on thin provisioning technology. Each tier works based on one or more disk group. Every disk group must have the same disk quantity when creating a tiering pool as a base unit of disk group. Maximum quantity of disk in a disk group is 8.
Ranking This analysis produces a rank ordering of each sub LUN within the pool. Note that the policies of volumes would affect how sub LUNs are ranked. After analysis, the system would generate following information for each tier: The amount of data to be moved up ...
Page 237
Start Highest then Auto Tiering This takes advantage of the both “Highest Available Tier” and “Auto Tiering” policies. “Start Highest then Auto Tiering” sets the preferred tier for initial data allocation to the highest performing disks with available space, and then it relocates the volume’s data based on the performance statistics and the auto-tiering algorithm.
1. Select the Pools function submenu, click the Create Pool button. It will scan available disks first. TIP: It may take 20 ~ 30 seconds to scan disks if your system has more than 200 disk drives. Please wait patiently. Figure 11-7 Create an Auto Tiering Pool Step 1 2.
Figure 11-9 Create an Auto Tiering Pool Step 3 8. Select a RAID Level from the drop-down list which lists available RAID level only according to the disk selection. 9. Click the Next button to continue. Auto Tiering...
Figure 11-11 Create an Auto Tiering Pool Wizard Step 5 12. By default, we set relocation schedule at 00:00 daily, relocation period set to 00:00 which means let relocation process run until it finishes, and relocation rate to fast. 13. After confirmation at summary page, click the Finish button to create a pool. Figure 11-12 An Auto Tiering Pool is Created 14.
could be missing or failed disks. Total Total capacity of the pool. Free Free capacity of the pool. Available Available capacity of the pool. Thin The status of Thin provisioning: Provisioning Disabled. Enabled. Auto Tiering The status of Auto Tiering: ...
Figure 11-14 Auto Tiering Pools and Status This table shows the column descriptions. Table 11-6 Pool Tiering Status Column Descriptions Column Name Description Tier Level Tier categories, there are SSD, SAS, Nearline SAS, and SATA. The system will hide the tiers without any disk groups. Tier Capacity Total capacity of the tier.
11.3.5. Add a Tier (Disk Group) in an Auto Tiering Pool Here is an example of adding a disk group in thin provisioning pool. 1. Select a pool, click ▼ -> Add Disk Group to add a disk group in the auto tiering pool. Figure 11-17 Add Disk Group 2.
Figure 11-19 Create a Volume of Auto Tiering Pool Step 1 2. Enter a Volume Name for the pool. The maximum length of the volume name is 32 characters. Valid characters are [ A~Z | a~z | 0~9 | -_<> ]. 3.
disk and then preload this data into the disk's buffer. This feature will improve performance when the data being retrieved is sequential. 。 Enable Space Reclamation: Check to enable the space reclamation function of the volume when the pool is auto tiering. 8.
Reclaim Space with Thin Provisioning Pool Click ▼ -> Space Reclamation to reclaim space from the volume when the volume is in a thin provisioning pool. For more information about space reclamation, please refer to the chapter 9.2.1, Space Reclamation section.
3. Use the same procedure to add SAS tier with 3 SAS disk drives. Figure 11-26 Transfer Thick Provisioning Pool to Auto Tiering Step 3 4. Auto Tiering status is Enabled. The thick provisioning pool has been transferred to auto tiering one.
Figure 11-28 Transfer Thin Provisioning Pool to Auto Tiering Step 2 3. Use the same procedure to add SAS tier with three SAS disk drives. Auto Tiering...
12. Data Backup This chapter describes an overview and operations of data backup options in SANOS. SANOS provides built-in data backup services for protecting data from most unpredictable accidents including: Volume snapshot which is described in the Managing Snapshots section.
Integration with Windows VSS (Volume Shadow Copy Services) Snapshot is fully compatible with Windows VSS (Volume Shadow Copy Services). VSS is a host memory flush mechanism for creating consistent point in time copies of data known as “shadow copies”. A Windows agent utility is provided to bridge and synchronize the information between the SAN system and Windows operating system.
2. Enter a Capacity which is reserved for the snapshot space, and then click the OK button. The minimum capacity is suggested to set 20% of the volume. Now there are two capacities in Snapshot Space column in the Volumes function tab. The first capacity is current used snapshot space, and the second capacity is reserved total snapshot space.
Expose Snapshot Here’s an example of exposing a snapshot. 1. Select the Snapshots function submenu, click ▼ -> Expose Snapshot to set writable snapshot capacity to expose the snapshot. Figure 12-8 Set Writable Snapshot Capacity to Expose Snapshot 2. Enter a Capacity which is reserved for the snapshot. If the size is 0, the exposed snapshot will be read only.
earlier than it will also be removed. But the rest snapshots will be kept after rollback. 12.1.4. Configure Schedule Snapshots The snapshots can be taken by schedule such as hourly or daily. Please follow the procedures. 1. There are two methods to set schedule snapshots. Select the Snapshots function submenu, click the Schedule Snapshots button.
It is a coordinator between backup software, application (SQL or Exchange…) and storage systems to make sure snapshots can occur without the problem of data-irregularities. For more information about the VSS, please refer to http://technet.microsoft.com/en-us/library/cc785914.aspx. QSAN storage systems fully support Microsoft VSS. Run Out of Snapshot Space Before using snapshot, a snapshot space is needed from pool capacity.
Figure 12-11 Local Clone Diagram 12.2.1. Theory of Operation At the beginning, copy all data from the source volume to target. It is also called full copy. Afterwards, take a snapshot on source volume and then copy delta data to perform the incremental copy.
Figure 12-13 Rollback Local Clone 12.2.2. Configure Local Clone Create a Local Clone Task Here’s an example of creating a local clone from source volume to target one. Assume that we define the name in the example. Source Volume Name: Source-Vol-1 Target Volume: Name: Target-Vol-2 ...
Figure 12-16 Create Local Clone TIP: The volume type of the target volume should be set as Backup Volume. Please refer to the chapter 8.5.1, Create a Volume in the Storage Management chapter. 4. At this time, if the source volume has no snapshot space, it will be allocated snapshot space for clone usage automatically.
Figure 12-18 Schedule Local Clone 2. Check the schedules which you want. They can be set by monthly, weekly, daily, or hourly. Click the OK button to apply. INFORMATION: Daily snapshots will be taken at 00:00 daily. Weekly snapshot will be taken every Sunday at 00:00. Monthly snapshot will be taken every first day of the month at 00:00.
12.2.5. Local Clone Notices While the clone is processing manually, the incremental data of the volume is over the snapshot space. The clone will complete the task, but the clone snapshot will fail. At the next time, when trying to start clone, it will get a warning message “There is not enough of snapshot space for the operation”.
Bi-Directional Figure 12-23 Bi-Directional Remote Replication Each system in a two system topology acts as a replication target for the other’s production data. A Source Volume (S1) in Site A is replicating to a Target Volume (T1) in Site B. And a Source Volume (S2) in Site B is replicating to a Target Volume (T2) in Site A.
TIP: Note that all supported topologies have a 1-to-1 configuration for each individual replication session in the topology. The maximum replication task quantity per system is 32. It means that 32 systems are the maximum quantity of any many-to-one or one-to-many replication configuration.
12.3.3. Configure Remote Replication Create a Remote Replication Task Here’s an example of creating a remote replication task from source volume to target one. Assume that we define the name and the IP addresses in the example. Figure 12-29 Example of Creating a Remote Replication Task Site A Source Unit Configuration: Controller 1, Onboard LAN 1 IP Address: 10.10.1.1 ...
Figure 12-34 Create a Remote Replication Task Step 3 7. Select an Authentication Method and input the CHAP Username and CHAP Password if needed. Select a Target Name, and then click the Next button. TIP: This CHAP account is the iSCSI authentication of the Site B target unit. For more information about CHAP, please refer to the chapter 7.3.4, Configure iSCSI CHAP Accounts section in the Host Configuration...
Start Remote Replication Task To start the remote replication task, please follow the procedures. Launch the SANOS web UI of Site A source unit: 1. Select the Remote Replications function submenu, select the task, and then click ▼ -> Start. 2.
Figure 12-38 Set Traffic Shaping 2. Select a Shaping Group from the drop down list. And then click the OK button. 3. The shaping group is applied to the remote replication task. 12.3.5. Configure Schedule Remote Replication Tasks The replication task can be set by schedule such as hourly or daily. Please follow the procedures.
Automatic Snapshot Space Allocation Ratio: This setting is the ratio of the source volume and snapshot space. If the ratio is set to 2, when there is no snapshot space assigned for the volume, the system will automatically reserve a free pool space to set as the snapshot space with twice capacity of the volume.
Figure 12-43 Remote Replication Target Controller Fail Diagram Add Multipath in Remote Replication Task Here’s an example of adding the second path in the remote replication. Assume that we define the IP addresses in the example. Site A Source Unit Configuration: ...
Figure 12-45 Add Multipath in Remote Replication Step 2 3. Select an Authentication Method and input the CHAP Username and CHAP Password if needed. Select a Target Name, and then click the Next button. TIP: This CHAP account is the iSCSI authentication of the Site B target unit. For more information about CHAP, please refer to the chapter 7.3.4, Configure iSCSI CHAP Accounts section in the Host Configuration...
5. The second path in remote replication task is added. Delete Multipath in Remote Replication Task To delete multi path of the replication task, please follow the procedures. Operate web UI of Site A source unit: 1. Select the Remote Replications function submenu, select the task path, and then click ▼...
3. The second connection in remote replication task path is added. If necessary, click ▼ -> Add Connection to add another. Delete Connections in Remote Replication Task Path To delete multi connections per session of the replication task path, please follow the procedures.
To do that volume disk local clone transfers to remote replication, please follow the procedures. Launch SANOS web UI of Site A source unit: 1. Select the Volumes function submenu, select a source volume, and click ▼ -> Create Local Clone to create a local clone task. For more information about local clone, please refer to the chapter 12.2.2, Configure Local Clone section.
Figure 12-54 Rebuild Clone Relationship Step 2 12. Select the Source Port and input the Target IP Address, and then click the Next button. TIP: Leave the setting of Source Port to Auto if you don’t want to assign a fixed one.
Figure 12-56 Rebuild Clone Relationship Step 4 14. Select a Target LUN in Site B target unit. Finally, click the Finish button. Figure 12-57 Remote Replication Task is Created 15. The replication task from local clone is created. Data Backup...
The event logs are displayed in reverse order which means the latest event log is on the first / top page. They are actually saved in the first four disk drives of the head unit, each disk drive has one copy of event log. For one system, there are four copies of event logs to make sure users can check event log any time when there are failed disks.
Enable SES Here’s an example of enabling SES. 1. Select SES function tab in Enclosure function submenu, click the Enable SES button. Figure 13-6 Enable SES 2. Select the Protocol as iSCSI. 3. Enter the Allowed Hosts with semicolons (;) or fill-in wildcard (*) for access by all hosts.
Figure 13-9 Disk Performance Monitoring 13.3.2. iSCSI Port Performance Monitoring Select the iSCSI function tab in the Performance function submenu to display TX (Transmission) and RX (Reception) of the iSCSI ports. Check the interfaces which you want to monitor. Monitoring...
14. Troubleshooting This chapter describes how to perform troubleshooting of software. Hardware troubleshooting is described in the chapter 6, Quick Maintenance in the XCubeSAN Hardware Owner’s Manual. 14.1. Fault Isolation Methodology This section presents the basic methodology used to quickly locate faults within the storage system.
3. In degraded mode, the health of the pool is Degraded. When rebuilding, the status of pool and volume disk will display Rebuilding, the column R% in volume will display the ratio in percentage. After complete rebuilding, the status will become Online. TIP: The dedicated spare cannot be set if there is no pool or the pool is set to RAID level 0.
Time The last action time of the volume. Event Logs The last event of the volume. TIP: When attempting data recovery, the same volume configurations as the original must be set and all member disks must be installed by the same sequence as original.
(End-User Registration). We recommend registering your product in QSAN partner website for firmware updates, document download, and latest news in eDM. To contact QSAN Support, please use the following information. Via the Web: https://qsan.com/support Via Telephone: +886-2-7720-2118 extension 136 ...
Please follow the procedures below to setup the online help environment for QSAN support team. The following procedure will help you to setup the serial console via the console cable that is enclosed in the shipping carton.
Page 329
2. You must use terminal software such as HyperTerminal or Putty to open the console after the connection is made. INFORMATION: For more information about terminal software, please refer to HyperTerminal: http://www.hilgraeve.com/hyperterminal/ PuTTY: http://www.putty.org/ 3. Here we first demonstrate HyperTerminal. The console settings are on the following. Baud rate: 115200, 8 data bit, no parity, 1 stop bit, and no flow control Terminal type: vt100 Support and Other Resources...
1. Please download the TeamViewer from following hyper link: https://www.teamviewer.com/en/download/ 2. Install TeamViewer. 3. Please provide the ID/password showed on the application to QSAN support team member to join the online support session. 15.3. Accessing Product Updates To download product updates, please visit QSAN website: https://qsan.com/download...
15.4. Documentation Feedback QSAN is committed to providing documentation that meets and exceeds your expectations. To help us improve the documentation, email any errors, suggestions, or comments to docsfeedback@qsan.com. When submitting your feedback, include the document title, part number, revision, and publication date located on the front cover of the document.
Page 335
RAID group. Others could not use these dedicated spare disks for any rebuilding purpose. Local Spare disks. The spare disks are only used by the RAID groups of the local enclosure. Other enclosure could not use these local spare disks for any rebuilding purpose. Global Spare disks.
EULA. Any right beyond this EULA will not be granted. Intellectual Property Right Intellectual property rights relative to the Product are the property of QSAN or its licensor(s). User will not acquire any intellectual property by this EULA.
WARRANTY OF ANY KIND. QSAN MAKES NO WARRANTY THAT THE PRODUCT WILL BE FREE OF BUGS, ERRORS, VIRUSES OR OTHER DEFECTS. IN NO EVENT WILL QSAN BE LIABLE FOR THE COST OF COVER OR FOR ANY DIRECT, INDIRECT, SPECIAL, PUNITIVE, INCIDENTAL, CONSEQUENTIAL OR SIMILAR DAMAGES OR...
Page 339
This EULA shall be governed by and constructed according to the laws of R.O.C. Any disputes arising from or in connection with this EULA, User agree to submit to the jurisdiction of Taiwan Shilin district court as first instance trial. Appendix...
Need help?
Do you have a question about the XS5224D and is the answer not in the manual?
Questions and answers