Sign In
Upload
Download
Table of Contents
Contents
Add to my manuals
Delete from my manuals
Share
URL of this page:
HTML Link:
Bookmark this page
Add
Manual will be automatically added to "My Manuals"
×
Bookmark added
×
Added to my manuals
Manuals
Brands
Hitachi Manuals
Server
VSP F1500
User and reference manual
Table Of Contents - Hitachi VSP F1500 User And Reference Manual
Command control interface guide
Hide thumbs
Also See for VSP F1500
:
User manual
(326 pages)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
Table Of Contents
531
page
of
531
Go
/
531
Contents
Table of Contents
Troubleshooting
Bookmarks
Table of Contents
Advertisement
Table Of Contents
Intended Audience
12
Release Notes
12
Referenced Documents
13
Document Conventions
14
Getting Help
17
Overview
19
About Command Control Interface
20
Provisioning Functions
21
Command Execution Modes
22
Command Execution By The In-Band And Out-Of-Band Methods
23
User Authentication Mode
26
Resource Group Function
27
Data Protection
28
Cci Software Environment
29
Overview Of The Cci Software Environment
30
Command Device Guarding
31
Alternate Command Device Function
33
Remote Command Device
34
Cci And The Scsi Command Interface
35
Command Competition
36
Issuing Commands For Ldevs Within A Luse Device
37
Cci Instance Configurations
38
Host Machines That Can Be Paired
40
Configuration Definition File
41
Configuration Definition File Settings
44
Horcm_Mon
45
Horcm_Cmd (Out-Of-Band Method)
49
Horcm_Dev
51
Horcm_Inst
53
Horcm_Ldev
54
Horcm_Ldevg
55
Horcm_Instp
56
Correspondence Of Configuration File And Mirror Descriptors
57
Cascading Connection And Configuration Files
58
Shadowimage
59
Cascading Connections For Truecopy And Shadowimage
61
Cci Software Files
63
Cci Files Supplied With The Software
64
Cci Files For Windows-Based Systems
65
Cci Files For Openvms-Based Systems
67
Cci Log And Trace Files
68
Cci Trace Files
71
Logging Raidcom Command
74
User-Created Files
77
Cci Functions
79
System Configuration Using Cci
80
Method Using The Out-Of-Band Method
83
Hardware Requirements
84
Security Setting
84
User Authentication
86
Command Operation Authority And User Authentication
87
Controlling User Resources
88
Commands Executed Depending On Operation Authorities
91
Relation Between Resource Groups And Command Operations
99
Resource Lock Function
102
Context Check
104
How To Check
105
Configuration Check
111
Resource Location And Parameter
112
Ldev Grouping Function
113
Device Group Definition Methods
116
Define Device Group
117
Device Group Creation
118
Ldev Addition To Device Group
119
Device Group Deletion
120
Copy Group Function
121
Copy Group Creation
123
Ldev Deletion From Copy Group
124
Copy Group Deletion
125
Pair Operations With Mainframe Volumes
127
Pair Status And Access Permission For Mainframe Ldevs
128
Operational Differences For Multiplatform Volumes
130
Operational Differences For Replication Commands
131
Global Storage Virtualization Function
132
Using Cci With The Global Storage Virtualization Function
133
Machine By Horcm_Cmd
135
Specifying A Virtual Storage Machine To Horcm_Vcmd
137
Operation Target For Raidcom Commands When Specifying The Virtual Storage Machine In Horcm_Vcmd
139
Horcm_Cmd
146
Starting Up Cci
147
Starting Up On Unix Systems
148
Starting Up On Windows Systems
149
Starting Up On Openvms Systems
150
Starting Cci As A Service (Windows Systems)
152
Provisioning Operations With Cci
155
About Provisioning Operations
156
Synchronous Command Processing
157
Workflow For Executing Asynchronous Commands
158
Help On Configuration Setting Commands
160
Provisioning Operations That Can Be Performed On Device Groups
167
Operation Method
168
Workflow For Performing Provisioning Operations
169
Resource Group Operations
170
Allocating Resources To Other Resource Groups
171
Execution Example
172
Script Examples (Open Systems)
174
Creating Internal Volumes (Mainframe Volume)
176
Script Examples
177
Virtual Volume (Dynamic Provisioning) Operations
180
Raidcom Delete Ldev Command To Delete A Virtual Volume
185
Volume
186
Virtual Volume (Dynamic Provisioning For Mainframe) Operations
187
Virtual Volume (Dynamic Tiering) Operations
190
Creating Virtual Volumes (Dynamic Tiering)
192
Configuring Iscsi Virtual Ports
197
Setting An Iscsi Virtual Port
198
External Volume Operations
199
Creating External Volumes (Iscsi)
201
Virtual Partition Manager Operations
207
Displaying Clpr Information
208
Checking Result Of Clpr Transfer
209
Configuring Server Priority Manager By Specifying Ports And Wwns Of Hbas
210
Using And Managing Server Priority Manager
211
Setting Spm Names For Wwns And Registering Them To The Spm Group
212
Cautions About Using Server Priority Manager
217
Virtual Storage Machine Operations
222
Adding Ldevs To A Virtual Storage Machine
223
Removing The Virtual Storage Machine
224
Data Replication Operations With Cci
225
About Data Replication Operations
226
Using Cci With Shadowimage And Truecopy
227
Using Cci With Thin Image
228
Using Cci With Global-Active Device
229
Shadowimage Duplicated Mirroring
230
Shadowimage Cascading Pairs
231
Restrictions For Shadowimage Cascading Volumes
232
Restriction For Truecopy/Shadowimage Cascading Volumes
233
Truecopy Takeover Commands
234
Takeover-Switch Function
236
Swap-Takeover Function
237
Svol-Takeover Function
238
Pvol-Takeover Function
239
Truecopy Local Commands
241
Truecopy/Shadowimage/Universal Replicator Pair Status
242
Sidefile Cache For Truecopy Async
251
Truecopy Async/Universal Replicator Error State
253
Settings
254
Setting The Fence Level
256
Copy-On-Write Snapshot Operations
257
Pair Operations And Commands For Copy-On-Write Snapshot And Thin Image
258
Copy-On-Write Snapshot Pair Status
259
Pair Status Relationship To Copy-On-Write Snapshot Commands
260
Controlling Volume Migration
261
Commands To Control Volume Migration
263
Relations Between "Cc" Command Issues And Status
266
Restrictions For Volume Migration
267
Command Specifications
270
Pairsplit Command
271
Notice On System Operation
274
Configuration Examples
276
Duplication Of Cci Applications
278
Requirements For Duplication Of Cci
281
Note For Duplication Of Cci
282
Discovering A Remote Volume
283
Data Protection Operations With Cci
287
Data Protection Operations
288
Restrictions On Data Retention Utility Volumes
289
Restrictions On Database Validator
290
Protection Parameters And Operations
291
Data Protection Facility Specifications
293
Examples For Configuration And Protected Volumes
294
Operation Authority With Cmd Security Enabled
295
Permission Command
296
Raidscan -Find Verify [Mu#]
297
Pairdisplay -F[D]
298
Systems
299
Environment Variables
300
Horcmperm
301
Examples Of Using Cci Commands
303
Group Version Control For Mixed Storage System Configurations
304
Volume Discovery Function
305
Mountvol Attached To Windows 2012/2008/2003/2000 Systems
307
System Buffer Flushing Function
308
Special Facilities For Windows Systems
311
Gpt Disk For Windows
312
Directory Mount Facility For Windows Systems
314
Host Group Control
316
Commands And Options Including A Host Group
317
Using Cci Slpr Security
318
Specifying The Slpr Protection Facility
319
Slpr Configuration Examples
320
Troubleshooting
325
General Troubleshooting
326
Operational Notes And Restrictions For Cci Operations
327
Error Messages And Error Codes
330
Command Error Messages
332
Generic Error Codes (Horctakeover And Pair Commands)
342
Generic Error Codes (Raidscan, Raidqry, Raidar, Horcctl)
344
Specific Error Codes
345
Ssb Codes
346
Ssb Codes Returned By The Configuration Setting Command (Raidcom)
348
Other Ssb Codes Indicating Internal Errors
521
Calling Hitachi Data Systems Customer Support
523
Previous
Page
1
...
530
531
Show Quick Links
Quick Links:
Intended Audience
Overview
Hide quick links:
Permanently
Temporary
Cancel
Advertisement
Table of Contents
Troubleshooting
Troubleshooting
325
General troubleshooting
326
Related Manuals for Hitachi VSP F1500
Storage Hitachi VSP G1000 User Manual
Thin image virtual storage platform (326 pages)
Storage Hitachi VSP G200 System Administration Manual
Virtual storage platform gx00 and fx00 (414 pages)
Storage Hitachi VSP Gx00 series System Administrator Manual
(368 pages)
Storage Hitachi VSP G1000 User Manual
Cim/wbem (288 pages)
Storage Hitachi HUS VM Hardware User's Manual
(180 pages)
Storage Hitachi Universal Storage Platform V Configuration Manual
For sgi irix host attachment (70 pages)
Server Hitachi NVM Navigator v03-07 User Manual
Migration manual (317 pages)
Server Hitachi HVM Navigator V03-06 User Manual
Migration manual (313 pages)
Server Hitachi Advanced Server DS120 Hardware Manual
(26 pages)
Server Hitachi Compute Blade 500 Series System Overview Manual
(78 pages)
Server Hitachi Content Platform S Series Manual
Node refurbishment (146 pages)
Server Hitachi DS7000 Installation Manual
(75 pages)
Server Hitachi Compute Blade 2000 User Manual
(1927 pages)
Server Hitachi DS7000 Product Description Manual
(91 pages)
Server Hitachi DS240 Service Manual
(174 pages)
Server Hitachi Compute Rack CR 210H User Manual
(80 pages)
Related Content for Hitachi VSP F1500
HA820 G2 Server Box Contents
Hitachi HA820 G2
Advanced Server HA810 G2 Identifying The Contents Of The Server Shipping Carton
Hitachi Advanced Server HA810 G2
DS7000 Chapter 1. Checking The Delivery Contents
Hitachi DS7000
Advanced Server DS220 Package Contents
Hitachi Advanced Server DS220
DS220 G2 Package Contents
Hitachi DS220 G2
DS225 Package Contents
Hitachi DS225
DS240 Package Contents
Hitachi DS240
DS7000 Series Checking The Delivery Contents
Hitachi DS7000 Series
Advanced Server DS120 Package Contents
Hitachi Advanced Server DS120
CB 520H B1 Power Supply Module Troubleshooting Table
Hitachi CB 520H B1
Compute Blade 2000 Contents Of The Manuals
Hitachi Compute Blade 2000
This manual is also suitable for:
Vsp g1000
Vsp g1500
Vsp g200
Vsp g600
Vsp g800
Vsp f400
...
Show all
Vsp f800
Vsp f600
Hus vm
Usp v
Usp vm
Vsp
Tagmastore usp
Tagmastore nsc
Vsp g400
Table of Contents
Print
Rename the bookmark
Delete bookmark?
Delete from my manuals?
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL