American Megatrends StorTrends 2200 User Manual
American Megatrends StorTrends 2200 User Manual

American Megatrends StorTrends 2200 User Manual

Web interface for the stortrends 2200
Hide thumbs Also See for StorTrends 2200:
Table of Contents

Advertisement

Quick Links

StorTrends®/
ManageTrends®
(Version 2.7)

Web Interface

User's Guide
for the
StorTrends 2200
MAN-MT-2200-27
05/12/08

Advertisement

Table of Contents
loading

Summary of Contents for American Megatrends StorTrends 2200

  • Page 1: Web Interface

    StorTrends®/ ManageTrends® (Version 2.7) Web Interface User’s Guide for the StorTrends 2200 MAN-MT-2200-27 05/12/08...
  • Page 2: Revision History

    American Megatrends, Inc. All trademarks and trade names used in this document refer to either the entities claiming the marks and names or their products. American Megatrends, Inc. disclaims any proprietary interest in trademarks and trade names other than its own.
  • Page 3: Table Of Contents

    Step One: Power your system on ....................2   Step Two: Get the IP address ...................... 2   Step Three: Connecting to the StorTrends storage appliance from another system ....3   Step Four: Logging on to the StorTrends storage appliance ............4  ...
  • Page 4 Control Panel : Network Settings : TCP/IP Settings Page ............. 46   Control Panel : Network Settings : TCP/IP Settings Page : DHCP or Static IP Address ..47   Control Panel : Network Settings : TCP/IP Settings Page : Create Teaming ......50  ...
  • Page 5 Step 4 : Assign a SAN Target ....................94   Step 5 : Enable the Port of the Target on the StorTrends storage appliance ......94   Step 6 : Enable iSNS on the StorTrends storage appliance (optional) ........94  ...
  • Page 6 Storage : Continuous Data Protection (CDP) : CDP Window to access the Retrospect window ..........................114   Storage : Continuous Data Protection (CDP) : Retrospect Window ........115   Storage : Continuous Data Protection (CDP) : Scrolling Snapshots ........115  ...
  • Page 7 Attach a Keyboard, Monitor and External USB CD-ROM Drive ........... 179   Fully Boot into ManageTrends ..................... 179   Insert the StorTrends iTX Installation CD (with the build you want to upgrade to) ....180   Upgrade Procedure (using the Command Line Interface) ........... 180  ...
  • Page 8 Create Journal Assisted Replication (JAR) ................227       Appendix F Setting up DHCP from the Console Interface ..........235 Logging on from the Console Interface ..................235   viii StorTrends/ManageTrends (version 2.7) Web Interface User’s Guide for the StorTrends 2200 Storage Appliance...
  • Page 9   Figure 3: Effect of Latency and Losses in TCP ..............258   Figure 4: Effect of Latency and Losses in StorTrends Transfer Protocol ......258   WDS in StorTrends iTX: Compression and Data Deduplication for WAN Asynchronous Replication ..........................259  ...
  • Page 10 Target ......................... 275   IS-NIC ........................... 275   iSNS ............................. 275   ISP ............................275   Journaling ..........................275   LAN ............................275   Mail Server ........................... 276   StorTrends/ManageTrends (version 2.7) Web Interface User’s Guide for the StorTrends 2200 Storage Appliance...
  • Page 11   Notification ..........................277   NTP ............................277   Open ............................. 277   OSI ............................278   OSI Layer 3 .......................... 278   Packet ........................... 278   Parameters ........................... 278   Protocol ..........................278   Proxy Server ......................... 278  ...
  • Page 12 WAN ............................. 287   WDS ............................. 287   WINS ............................ 287   WWN ............................ 287   XFS ............................287     Index ............................288 StorTrends/ManageTrends (version 2.7) Web Interface User’s Guide for the StorTrends 2200 Storage Appliance...
  • Page 13: Limited Warranty

    Limited Warranty The buyer agrees that if this product proves to be defective, American Megatrends is only obligated to repair or replace this product at American Megatrends’ discretion according to the terms and conditions of the warranty registration card that accompanies this product.
  • Page 14: Disclaimer

    (even if American Megatrends has been advised of the possibility of such damages).
  • Page 15: Chapter 1 Stortrends Storage Appliance Configuration

    Chapter 1 StorTrends Storage Appliance Configuration Conceptual Illustration Chapter One : Storage Appliance Configuration...
  • Page 16: Connect To The Stortrends Storage Appliance

    Once the StorTrends storage appliance is fully operational, you will see the following screen. Write down the IP Address listed in the “Ip Address” field. If you have both NICs connected to your network, there will be two IP Addresses.
  • Page 17: Step Three: Connecting To The Stortrends Storage Appliance From Another System

    Step Three: Connecting to the StorTrends storage appliance from another system Type the IP Address of the StorTrends storage appliance that you just wrote down into your Internet Browser. Chapter One : Storage Appliance Configuration...
  • Page 18: Step Four: Logging On To The Stortrends Storage Appliance

    Both the user name and password are case sensitive. StorTrends iTX has a built in feature that logs you out in the event that it detects no activity for 20 minutes and will display a message that states, “Your session has expired.”...
  • Page 19: Using The Quick And Easy Setup Wizard

    StorTrends storage appliance to send emails through it. If you click Cancel, you will be prompted with a warning dialog box that states, “You have opted to cancel the E-Mail alert configuration. E-Mail alert configuration has to be enabled to receive notifications on disk failures, volume events, System and Hardware events.
  • Page 20 Critical/Fatal Check this box to trigger an email notification to be sent whenever a critical or fatal event is recorded. A Critical or Fatal event can be an event such as a hard disk drive failure. Apply button To save changes, left click the Apply button.
  • Page 21: Step One: Quick Start Setup Wizard

    Use the following instructions as a basis. Note: The Quick and Easy Setup Wizard will select all the physical hard disk drives present in the StorTrends iTX StorTrends storage appliance to create the RAID array. SAN and NAS volume names are automatically generated. A default NAS Share is also automatically created.
  • Page 22: Step Two: Raid Level

    RAID 1 • RAID 5 This step will create a Logical disk and a storage pool from all the physical hard disk drives available in the system/controller with the RAID type you specify. Note: Once you select Next, you cannot come back to this step.
  • Page 23: Step Three: San Or Nas Or Both

    Step Three: SAN or NAS or Both Once an array has been created in the box, you can select how you want to use your StorTrends storage appliance. You are provided with the following options: • Only SAN • Only NAS •...
  • Page 24: Step Four: Allocating Space

    Note: You can use the slider bar to adjust the size of each Volume type. If you have selected Only NAS or Only SAN, then you will only be able to adjust the slider for that type of Volume. StorTrends/ManageTrends (version 2.7) Web Interface User’s Guide for the StorTrends 2200 Storage Appliance...
  • Page 25: Step Five: Summary View

    Note: You can change the default names for volumes and containers at this point. Also note that uppercase characters are not allowed in target names. Additionally, if you are planning to use the snap-assisted replication feature, uppercase characters should be avoided in both the container and volume names.
  • Page 26 Do not close the window or click anywhere else until the operation completes. StorTrends/ManageTrends (version 2.7) Web Interface User’s Guide for the StorTrends 2200 Storage Appliance...
  • Page 27: Step Six: All Done No Errors

    Step Six: All Done No Errors STOP! YOU SHOULD NOW BE UP AND RUNNING. ALL THE OTHER SECTIONS CAN BE SKIPPED. Chapter One : Storage Appliance Configuration...
  • Page 28: Using The Advanced Setup Wizard

    Step One: Advanced Wizard If the storage has not been configured on your StorTrends storage appliance, you will be prompted to run the Wizard. Click the Advanced option and then click Next. StorTrends/ManageTrends (version 2.7) Web Interface User’s Guide for the StorTrends 2200 Storage Appliance...
  • Page 29: Step Two: Create A New Storage Pool

    Step Two: Create a New Storage Pool Select Create new storage pool and then click Next. Note: Your StorTrends storage appliance may or may not have the exact same hardware RAID controller card as the one in the screen capture. Chapter One : Storage Appliance Configuration...
  • Page 30: Step Three: Select Pool

    Step Three: Select Pool Select the Disks Select the Disks that you want to use in your Storage Pool. StorTrends/ManageTrends (version 2.7) Web Interface User’s Guide for the StorTrends 2200 Storage Appliance...
  • Page 31: Set The Raid Levels

    Click the Next button to continue. You will be prompted to wait while it configures the box. Do not close the window or click anywhere else. Chapter One : Storage Appliance Configuration...
  • Page 32: Step Four: Configure San Volume

    Step Four: Configure SAN Volume STOP! This section allows you to configure a SAN Volume and a SAN Target on to the StorTrends storage appliance. If you have configured this StorTrends storage appliance as a NAS Only unit, SKIP THIS STEP and go to Step Five: Configure NAS Volume.
  • Page 33: Enter Volume Name

    Name must be alphanumeric, not have any spaces and be between one and 63 characters in length. Enter Volume Size In the Enter Volume Size field, enter the size that you want to use for your SAN Volume. The field is measured in Gigabytes GB. Chapter One : Storage Appliance Configuration...
  • Page 34: Select Thin Or Exact Provisioning

    For example, if the storage device has an actual physical size of 500 GB, the user can assign a size of up to 256 TB per box. Based on the consumption of the storage device’s physical capacity, more physical drive capacity can be added later as desired.
  • Page 35: Select San As The Dialect Type

    Select SAN as the Dialect Type. Create Target and Target Name Place a check next to the Create New Target field. Enter a name for your Target. The Target Name must be alphanumeric, not have any spaces and be between one and 63 characters in length.
  • Page 36: Step Five: Configure Nas Volume

    Step Five: Configure NAS Volume STOP! This section allows you to configure a NAS Volume and a NAS Share on to the StorTrends storage appliance. If you only want to configure this StorTrends storage appliance as a SAN Only unit, SKIP THIS STEP by clicking the Finish button and go to Step Six: Summary View and Status.
  • Page 37: Enter Volume Name

    For example, if the storage device has an actual physical size of 500 GB, the user can assign a size of up to 256 TB per box. Based on the consumption of the storage device’s physical capacity, more physical drive capacity can be added later as desired.
  • Page 38: Select Nas As The Dialect Type

    Create Share and Share Name Place a check next to Create New Share if you wish to create a NAS Share at this time, otherwise click the Add button and continue on to the next step. If you want to create a NAS Share now, in the Share Name field, enter a unique name for your NAS Share.
  • Page 39: Step Six: Summary View And Status

    When you are finished adding your Volumes, click the Finish button. A summary will appear. Your StorTrends storage appliance will be automatically configured based on the values that you have entered. Do not close the window or click anywhere else until the operation completes. Chapter One : Storage Appliance Configuration...
  • Page 40: Step Seven: All Done No Errors

    Step Seven: All Done No Errors STOP! YOU SHOULD NOW BE UP AND RUNNING. StorTrends/ManageTrends (version 2.7) Web Interface User’s Guide for the StorTrends 2200 Storage Appliance...
  • Page 41: Chapter 2 Managing The Stortrends Storage Appliance

    Connecting to the StorTrends storage appliance from another system Type the IP Address of the StorTrends storage appliance into your Internet Browser. (Microsoft Internet Explorer 6.0 Service Pack 1 and Mozilla Firefox 1.5.04 or later are supported) Chapter Two : Managing the StorTrends Storage Appliance...
  • Page 42: Logging On To The Stortrends Storage Appliance

    Logging on to the StorTrends storage appliance You will be prompted to provide a username and password before you can gain access to it. Enter your username and password. Default user name: itxadmin Default password: password Note: When you login using the default itxadmin password, you have full administrative powers.
  • Page 43: Managetrends Hardware Health Information

    ManageTrends Hardware Health Information On the top bar there is a health icon. Click on the Hardware Heath icon to view the Hardware Health Information screen. This page displays all information relevant to the hardware health of your StorTrends storage appliance. Here you can view the current status of the system’s fans, temperatures and motherboard voltages.
  • Page 44: Managetrends Management Tree

    ManageTrends provides you with capacity growth trends. This allows you to plan for additional storage purchases ahead of time. At the heart of StorTrends stack is a very powerful SRM module that takes care of Trending, Analysis and Reporting.
  • Page 45: Event Log (Box Level)

    XML aware application. For example, Microsoft Office Excel program. Save as Text button This button allows you to export the event log as a plain text file so that you can view it in a standard word processor application.
  • Page 46: Control Panel

    Control Panel StorTrends/ManageTrends (version 2.7) Web Interface User’s Guide for the StorTrends 2200 Storage Appliance...
  • Page 47: Control Panel : System Settings

    Status of the StorTrends storage appliance and of many of its individual components. Date and Time The Date and Time Settings page displays the Time Zone, Server Date, Server Time, NTP Configuration, and NTP server information. This page also has a Synchronize With Local System button.
  • Page 48: Control Panel : System : Information Icon : System Information Page

    The System Information page also displays the System Name, Version Number, Build Date, Manufacturer, System Uptime, System Date and System Time information. This page also lists the IP and MAC Addresses (always 2 minimum) of the StorTrends storage appliance.
  • Page 49: Control Panel : System : Information Icon : Date/Time Settings Page

    Type your network’s NTP server’s FQDN or IP address into this field. Synchronize with Use this button to set the StorTrends storage appliance’s time to be the same as that of the Local System button system being used to access the StorTrends storage appliance.
  • Page 50: Control Panel : System : Information Icon : Update Stortrends Itx Software Page

    Control Panel : System : Information Icon : Update StorTrends iTX software Page The Update StorTrends software page allows you to upgrade the StorTrends software. This page displays input boxes for the FTP Address, Path, Username and Password. Field/Item Description FTP Address Type your FTP server name or IP address into this field.
  • Page 51: Control Panel : System : Information Icon : System Control Page

    Control Panel : System : Information Icon : System Control Page This page allows you to shutdown or reboot your StorTrends storage appliance. Select the appropriate button. You also have the option to allow the StorTrends storage appliance to shutdown automatically on critically high temperatures.
  • Page 52: Control Panel : System : Information Icon : Ups Configuration Page

    This field displays the remaining minutes of power. Mode This field allows you to select the mode for the system that you are connecting to the UPS. For example, the Master system is the system that is connected directly to the UPS via serial cable or USB cable.
  • Page 53: Control Panel : Themes

    Control Panel : Themes Allows you to use different color configurations for the GUI. Control Panel : Themes : Red Control Panel : Themes : Olive Green Chapter Two : Managing the StorTrends Storage Appliance...
  • Page 54: Control Panel : Themes : Blue

    Control Panel : Themes : Blue Note: You must clear the cache on your Internet browser in order to see the new theme. StorTrends/ManageTrends (version 2.7) Web Interface User’s Guide for the StorTrends 2200 Storage Appliance...
  • Page 55: Control Panel : Network Settings

    Community Name. Default community name is public. Firewall The Firewall Settings: Allowed/Blocked Sites page allows you to Add, Delete and Modify allowed or blocked sites. This page allows you to input the Start IP, Start Port, Protocol, Subnet Mask and End Port. File Protocols The File Protocols page allows you to pick from Windows, Unix, Apple or HTTP/FTP protocols.
  • Page 56: Control Panel : Network Settings : Network Statistics Page

    MTU by comparing MTUs and selecting the smaller of the two. Interface Link Status This field allows you to see the link status of the network adapters. The link can be either UP or DOWN. StorTrends/ManageTrends (version 2.7) Web Interface User’s Guide for the StorTrends 2200 Storage Appliance...
  • Page 57: Control Panel : Network Settings : Network Statistics Page : Receiving Details

    Bad Packets Received This field reports the number of bad packets received. In other words, a bad frame that was marked as an error by PHY. Control Panel : Network Settings : Network Statistics Page : Transmission Details...
  • Page 58: Control Panel : Network Settings : Network Statistics Page : Receiving Errors

    (Receiver ring buff overflows errors) CRC Errors CRC stands for Cyclic Redundancy Check. A CRC can be used in the same way as a checksum to detect accidental alteration of data during transmission or storage. CRCs are...
  • Page 59: Control Panel : Network Settings : Network Statistics Page : Transmission Errors

    Failure to do so may indicate that the link has failed or that the PHY has an incorrect link configuration. This register only increments if transmits are enabled. This register is not valid in internal SerDes1 mode (TBI mode for the 82544GC/EI) and is only valid when the Ethernet controller is operating at full duplex.
  • Page 60: Control Panel : Network Settings : Tcp/Ip Settings Page

    Control Panel : Network Settings : TCP/IP Settings Page Use this page to view or update the TCP/IP settings for the network interfaces on the StorTrends storage appliance. Simply select the network interface from the dropdown menu that you want to configure or view.
  • Page 61: Control Panel : Network Settings : Tcp/Ip Settings Page : Dhcp Or Static Ip Address

    Control Panel : Network Settings : TCP/IP Settings Page : DHCP or Static IP Address DHCP or Static Description Obtain IP and DNS By default the TCP/IP setting is set to obtain an IP Address and DNS server address from Server Addresses a DHCP server. Automatically...
  • Page 62 This dropdown menu allows you to select the NIC to configure (if applicable). Interface dropdown menu Obtain IP and DNS By default the TCP/IP setting is set to obtain an IP Address and DNS server address from Server Addresses a DHCP server. Automatically...
  • Page 63 Press the <ENTER> key to continue. This field must have an entry and cannot be left blank. If you do not have a primary DNS installed on your network, enter 0.0.0.0 for the value of this field.
  • Page 64: Control Panel : Network Settings : Tcp/Ip Settings Page : Create Teaming

    Balance TLB (Transmit Load Balance) Note: Whether you choose NIC-1 or NIC-2 as the primary NIC, the IP address of the network team will be that previously assigned to NIC-1. Control Panel : Network Settings : TCP/IP Settings Page : Create Teaming : Balance Round Robin This option transmits packets in sequential order from the first available slave-NIC in the team through the last.
  • Page 65: Control Panel : Network Settings : Snmp Protocol Settings Page

    Community Name Enter the community name that your network uses. A community name is a secret identity based on plain-text that is used to authenticate queries to agents of managed network devices. A read-only community name allows systems to gather statistics from your SNMP device. The most commonly used community name is public.
  • Page 66: Control Panel : Network Settings : Firewall Settings Page

    IP addresses to block or allow. You can also specify which ports and protocol to block or allow. By default the Blocked Sites page is displayed. If it is not, left click the Blocked Sites link to enter a range of IP addresses that you want to block.
  • Page 67 Left click the Trusted Sites link to enter a range of IP addresses that you want to always allow. Field/Item Description Start IP Address This field allows you to enter the start address of the subnet you want to either block or always allow.
  • Page 68: Control Panel : Network Settings : Firewall Settings Page : Modifying

    Control Panel : Network Settings : Firewall Settings Page : Modifying You can edit any of the IP address ranges by selecting the IP address range from the main Firewall window. You can enter your adjustments and left clicking on the Modify button for the changes to take effect.
  • Page 69: Control Panel : Network Settings : File Protocols Settings Page : Set Windows File Protocol Page

    Microsoft CIFS is a proposed standard protocol that allows programs to make requests for files and services on remote systems running Microsoft Windows operating systems on the Internet. Note: If you navigate away from the Set Windows File Protocol page or it did not appear first, click the Windows link. Field/Item Description WINS Address Type the WINS server’s IP address into this field.
  • Page 70: Disable Windows File Server Protocol (Cifs)

    Disable Windows File Server Protocol (CIFS) If you want to change the settings, you must disable CIFS first. To disable the Windows File Server Protocol (CIFS), left click the Disable button. Enable Windows File Server Protocol (CIFS) Complete all the fields and then, to enable the Windows File Server Protocol (CIFS), left click the Enable button.
  • Page 71: Control Panel : Network Settings : File Protocols Settings Page : Set Network File System (Nfs) Protocol Page

    Control Panel : Network Settings : File Protocols Settings Page : Set Network File System (NFS) Protocol Page To access the Set Network File System (NFS) Protocol page, click the NFS link. Field/Item Description Enable Set Network File Left click this box to enable NFS.
  • Page 72: Control Panel : Network Settings : File Protocols Settings Page : Set Apple File Protocol Page

    Control Panel : Network Settings : File Protocols Settings Page : Set Apple File Protocol Page To access the Set Apple File Protocol page, click the Apple link. Field/Item Description Enable Apple File Left click this box to enable AFP.
  • Page 73: Control Panel : Network Settings : File Protocols Settings Page : Set Http/Ftp File Protocol Page

    Control Panel : Network Settings : File Protocols Settings Page : Set HTTP/FTP File Protocol Page To access the Set HTTP/FTP File Protocol page, click the HTTP/FTP link. Field/Item Description Enable HTTP Sharing Left click this box to enable HTTP sharing.
  • Page 74: Control Panel : Users And Groups Settings

    Secondary Server Name/IP, Organizational Unit, Admin Name and Admin Password. The NIS Settings page allows you to Enable NIS and to Add or Remove to or from the IP Address List. This page displays the Domain Name, IP Address List.
  • Page 75: Control Panel : Users And Groups Settings : Users List Page

    This button allows you to remove a user. Properties button This button allows you to view and edit the properties of a user. For example, you can change the password and/or change the Full Name of the user. You will not be able to change the User Name (Login Name).
  • Page 76: Create New User

    Full permissions to local access. If you do not have a specific group or do not want to add this user to a group, simply skip that step. Type in a password for the user and then confirm it by typing it in again in the Confirm Password field.
  • Page 77: Removing A User

    Removing a User To delete a user, highlight their name and click the Remove button. After you confirm that you really want to remove the user, the list will refresh and a message will appear stating that the “User successfully deleted.”...
  • Page 78: Control Panel : Users And Groups Settings : Groups List Page

    Control Panel : Users and Groups Settings : Groups List Page The Groups List page displays the Total Number of Groups, the Group Name, Group ID and the Type. This page allows you to Create New groups and Remove groups. This page also allows you to change Group Properties.
  • Page 79: Create New Group

    To create a new group, simply click the Create New button. The Create New Group page opens. It is very intuitive and easy to use. Simply, type in a Group Name (one word). Select the user(s) you want to be a part of the Group.
  • Page 80: Removing A Group

    Removing a Group To delete a Group, highlight the Group Name and click the Remove button. After you confirm that you really want to remove the Group, the list will refresh and a message will appear stating that the “Group successfully deleted.”...
  • Page 81: Control Panel : Users And Groups Settings : Ads Settings Page

    Control Panel : Users and Groups Settings : ADS Settings Page The ADS Settings page allows you to Enable ADS. This page has fields for the Workgroup/Domain Name, Pre-Windows 2000 Domain Name, Primary Server Name/IP, Secondary Server Name/IP, Organizational Unit, Admin Name and Admin Password.
  • Page 82 Description Server Name/IP Type the Host Name or IP Address of the Active Directory Services server into this field. Select if the Host Name or IP Address is that of an Active Directory, Microsoft Windows NT 4.0 Domain or Workgroup.
  • Page 83: Control Panel : Users And Groups Settings : Nis Settings Page

    Below become editable when this option is selected. IP Address Type the IP address for the NIS server in the system and left click the Add to the List button. IP Address List The IP address for each NIS server in the system that you have entered is listed in this field.
  • Page 84: Control Panel : Iscsi

    Icon Description ISNS The ISNS Setting page allows you to enable/disable the ISNS service and set an alias name. This page also allows you to configure support for Multiple ISNS servers. Portals The iSCSI- Portal Settings page allows you to Enable iSCSI Service and the Portal(s).
  • Page 85: Control Panel : Iscsi Settings : Isns Setting Page

    This field displays the Alias name. This is configurable. ISNS Server IP field This field allows you to enter the IP address of an ISNS server that you want to add to the ISNS server IP list, thereby registering the StorTrends iTX server appliance with that server.
  • Page 86: Control Panel : Iscsi Portal Settings Page

    This is a list of the system’s ports with their accompanying Port, Target IP Address, section Portal Tag and Status information. You can click on a port to enable or disable it. You can also modify the Portal Tag value (you must disable the portal before changing its tag).
  • Page 87: Control Panel : Iscsi Portal Settings Page : Advanced Page

    This field allows you to set the immediate data value option. The default value for this field is Yes. Initial R2T field This field allows you to set the initial R2T value option. The default value for this field is Apply button Use this button to save changes and make the changes active.
  • Page 88: Control Panel : Iscsi : Statistics Page

    The Target Statistics page displays the Device Statistics and the Error Statistics. Field/Item Description Device Statistics This list contains sent and received statistical information for SCSI payload, iSCSI PDUs, and iSCSI PDU bytes. Error Statistics This list contains count statistical information for failed login attempts, failed sessions, failed header digest sessions, and failed format error sessions.
  • Page 89: Control Panel : Iscsi : Iscsi Session Management Page

    The iSCSI Session Management page displays the Session List. Field/Item Description Session List This list allows you to view active sessions. It also allows you to terminate any of the listed sessions. Terminate button Use this button to terminate a selected session.
  • Page 90: Control Panel : Iscsi : Bi-Directional Authentication Page

    The Bi-directional Authentication page displays the Initiators List gathered from those iSNS servers that this box has registered with or you can enter the name of an iSCSI initiator or username and password, manually if you are not using iSNS.
  • Page 91: Control Panel : Alerts Settings

    SNMP Traps The SNMP Alert Settings page allows you to Enable SNMP Alert Notifications. This page also allows you to input the Community Name, Target IP. This page allows you to select the alert types which are to trigger SNMP notifications.
  • Page 92: Control Panel : Alerts : Snmp Alert Settings Page

    Critical/Fatal box Check this box to trigger an SNMP alert notification to be sent whenever a critical or fatal event is recorded. A Critical or Fatal event can be an event such as a hard disk drive failure. Apply button To save changes, left click the Apply button.
  • Page 93: Control Panel : Alerts: Email Alert Settings Page

    Critical/Fatal Check this box to trigger an email notification to be sent whenever a critical or fatal event is recorded. A Critical or Fatal event can be an event such as a hard disk drive failure. Apply button To save changes, left click the Apply button.
  • Page 94: Control Panel : License Settings

    Control Panel : License Settings Icon Description Update License The License Information page allows you to view/update the license for the StorTrends storage appliance. StorTrends/ManageTrends (version 2.7) Web Interface User’s Guide for the StorTrends 2200 Storage Appliance...
  • Page 95: Control Panel : License Settings : License Information Page

    After your changes have been processed by an AMI Support Representative, you’ll receive a new license key in the form of a text document. After you save the new key to a location on your hard drive, use the Browse button to navigate to the location of that file, and then simply select the Update License button to complete the process.
  • Page 96: Raid Management

    RAID Management Allows you to configure RAID arrays using Software RAID or supported H/W RAID controllers. Physical Disks Management The Physical Disks Management page displays all physical disks attached to the RAID controller. Note: Click the Rescan button to refresh the information on this screen.
  • Page 97: Global Spare

    This field displays whether or not the physical disk is being used as a Global Spare. In Use This field displays if the physical disk is available or is being used as part of a Volume. Status This field displays the status of the physical disk. The physical disk status can be in any of...
  • Page 98: Disk Properties

    Slot Index This field displays the slot index number of the physical disk. Disk Type This field displays the type of physical disk is being used, such as SCSI, IDE, SATA and so on. Spare Type This field displays the type of spare that the physical disk is being used as (global, distributed or dedicated).
  • Page 99: Logical Disk Management

    RAID Level This field displays the type of RAID array of the Logical Disk. Status This field displays the status of the physical disk. The physical disk status can be in any of the following states: Initializing The Logical Disk is being initialized.
  • Page 100: Logical Disk Properties

    RAID Level This field displays the type of RAID array of the Logical Disk. Logical Device Status This field displays the status of the physical disk. The physical disk status can be in any of the following states: Initializing The Logical Disk is being initialized.
  • Page 101 Physical Disks This field displays all the physical disks involved in this Logical Disk. The physical Port Involved location of the physical disk on the Controller and on which Controller it is attached to is displayed. Blink Disk button Clicking on this button will cause the physical disks involved in this LD to blink.
  • Page 102: Deleting A Logical Disk

    Select this option to transform the Logical Disk from one raid level to another. Name This field displays the name of the Logical Device name. Status This field displays the status of the logical disk. The disk can be in any of the following states: Initializing The Logical Disk is being initialized.
  • Page 103 Field Description RAID Level This field displays the type of RAID array of the Logical Disk. If you are transforming the Logical Disk, you can modify the RAID Level. Organized as This field displays how the Logical Disk is organized.
  • Page 104: Storage

    The iSCSI protocol increases the capabilities and performance of storage data transmissions. Because of the wide use of IP networks, iSCSI can be used to transmit data over LANs, WANs, or the Internet and can enable location-independent data storage and retrieval.
  • Page 105: Initiator

    Zoning allows the administrator to limit access to storage nodes to certain initiators only. This is to help minimize risk of file system corruption. Initiators will only be able to see the iSCSI targets and the LUNs/Targets on StorTrends storage appliances registered to this iSNS server that belongs to the same DD (also known as Zone).
  • Page 106: Step 1 : Create A Logical Disk

    Select the type of Cache you want to use for the RAID array in the Cache Option drop down menu. Use the drop down menu in this step to select the cache level (such as Read, Read/Write, Write Back, or No Cache).
  • Page 107: Step 2 : Create A Storage Pool

    1 or more Logical Disks. Click on the Create Storage Pool link. In the Enter Storage Pool Name field, select a LD from the list, and then enter a name for your Storage Pool. The Storage Pool Name must be alphanumeric, not have any spaces and be between one and 63 characters in length.
  • Page 108: Step 4 : Assign A San Target

    SAN Target. Click on the iSCSI icon located under the Control Panel node. Select the Portals icon. Select the IP Address of the port that you want to Enable, enter a new portal tag if desired, click on the Enable Portal checkbox, and left click the Apply button.
  • Page 109: Step 7 : Log Onto The Target From The Server

    Description From the application server, open the Microsoft Initiator application. Left click the Available Targets or Targets tab and left click the Refresh button. The Target appears in the Select a Target field. Chapter Two : Managing the StorTrends Storage Appliance...
  • Page 110 Step Description Select the Target that you want to log on to. Notice that the Status of the Target is Inactive. Left click the Log On button. Note: If the Target does not appear in the list, try the following: •...
  • Page 111 If you are using a different initiator (list of supported initiators is available from AMI), then the procedure will differ according to that particular software/hardware’s specifications. The procedure to log on will also differ if you are using selective access to the LUN, for example, CHAP or persistent targets option.
  • Page 112: Step 8 : Verify The Target Using Disk Management On The Server

    Open Disk Management from the Computer Management utility in your Microsoft Windows operating system hosting your initiator software. The Target is listed as one of the local disks and can be initialized and formatted as if it were a local hard disk drive.
  • Page 113: Step 9 : Create Nas Volume

    For example, if the storage device has an actual physical size of 500 GB, the user can assign a virtual size of up to 256 TB. Based on the consumption of the storage device’s physical capacity, more physical drive capacity can then be added later.
  • Page 114: Step 10 : Create A Nas Share

    63 characters in length. Type a description of the NAS Share in the Description field. This step is optional. In the Folder Path field, type in the path you want to share. You can also Browse to the desired Volume or Folder.
  • Page 115: Step 11 : Schedule Snapshots

    This is typically accomplished by splitting a mirrored set of disks or creating a copy of a disk block when it is written, preserving the original. At restore time, the original is made available immediately, resulting in almost instantaneous restores.
  • Page 116: Storage : Storage Pool Management

    Physical Capacity This field displays the physical size of the Storage Pool in GB. Add Logical Disk Click on this button if you wish to expand your container by adding one or more existing Logical Disks to it. Logical Disks Name This field displays the name of the Storage Pool.
  • Page 117: Storage : San Volume Management

    Storage : SAN Volume Management This page appears if you click on any existing Pool and then on an existing SAN Volume. This page displays SAN Volume information and Target information. It also allows you to Delete or Expand Volumes, schedule snapshots and disable/enable advanced caching.
  • Page 118: Storage : Snapshot Recovery

    The Snapshot Timescape window will appear. Here you can cycle through the available Snapshot. Click the Review link to display the Target Information of the Snapshot so that you can configure your initiator and review its contents. Once you click the Review link, the Snapshot Target Information will display in the lower left corner of the window.
  • Page 119: Storage : San Snapshot Management

    Storage : SAN Snapshot Management This page appears if you click on any existing Pool and then on an existing SAN Volume and Snapshot Node. This page displays a list of all the snapshots of the selected Volume. Field/Button Description Snapshot Name This field displays the name of the Snapshot.
  • Page 120: Storage : Continuous Data Protection (Cdp)

    Time Addressable Storage (TAS) as well as Event Addressable Storage (EAS). So all volumes / volume groups that have been enabled for Journaling will be available for CDP. Besides, the CDP UI provides a way to consistently review and recover volumes of a Consistency group.
  • Page 121: Storage : Continuous Data Protection (Cdp) : Cdp Control Window

    Note: The list of CGs / Volumes pertains only to the currently selected container. If you want to perform a CDP on a different CG / Volume, you need to go back and select the corresponding container. Chapter Two : Managing the StorTrends Storage Appliance 107...
  • Page 122: Storage : Continuous Data Protection (Cdp) : Example Of A Selected Cdp Window

    For example, if the user chooses a journal file and data is not available in the selected time zone but snapshots are present, then it will take the user to Retrospect.
  • Page 123: Storage : Continuous Data Protection (Cdp) : Cdp Flashback Window - Log View

    & rollback process. The user can choose a point or event in time, review the data and rollback if satisfied. It also allows the user to control the review at the IO level. Apart from time, the Flashback interface also has an alternate view called the Event View.
  • Page 124: Storage : Continuous Data Protection (Cdp) : Main Control Panel

    The Main Control Panel displays the snapshot (1), event (2) and time (3) controls. The Time control increments the time by a default value of 1 sec. This time step can be changed from the Time Step Control Panel. The number of IO’s to be performed can also be specified in this panel.
  • Page 125: Storage : Continuous Data Protection (Cdp) : Snapshot Based Sliding

    Storage : Continuous Data Protection (CDP) : Snapshot based sliding This screen shows an example of using the Snapshot Control. Pressing the left and right button moves the slider from one snapshot to another. Storage : Continuous Data Protection (CDP) : Time based sliding This screen shows sliding using Time Control.
  • Page 126: Storage : Continuous Data Protection (Cdp) : Event Based Sliding

    Another view for this window is the Event View, which is revealed by clicking on Event View on the left corner of the Flashback window. The CDP utility makes a note of three different types of events taking place in the system: (a) Snapshots (b) Application events and (c) Windows events.
  • Page 127: Storage : Continuous Data Protection (Cdp) : Event Description

    Storage : Continuous Data Protection (CDP) : Event Description This view enables the user to choose an event to review and rollback. We can switch between the Log and Event Views by clicking on the appropriate button on the left-hand corner of the window.
  • Page 128: Storage : Continuous Data Protection (Cdp) : Completion Of Review

    Storage : Continuous Data Protection (CDP) : Completion of Review When a review is successfully completed, a writeable image of the volume at the given time instant is provided for review. If a CG is being reviewed, a single target with all consistent volumes as LUN is created.
  • Page 129: Storage : Continuous Data Protection (Cdp) : Retrospect Window

    Each flying window represents a consistent snap group taken across all the volumes of the CG. For a SAN CG, this is achieved using the VSS Scheduler and for a NAS CG, the NAS scheduler does the job. The scroll buttons can be used to access any snapshot.
  • Page 130: Storage : Continuous Data Protection (Cdp) : Reviewing Snapshots

    Storage : Continuous Data Protection (CDP) : Reviewing Snapshots Once the review process is completed, a writeable image of the volume is created and appears on the bottom left corner of the window and the status changes to ‘Ready for Review’.
  • Page 131: Storage : Nas Volume Management

    Note: You can also set default storage allocations for all new users by placing a check in the box next to “Set default quota for new users” and entering the size of the storage quota in MBs. Chapter Two : Managing the StorTrends Storage Appliance 117...
  • Page 132: Storage : Nas Share Management

    This section allows you to modify the share access for the different types of clients. Folder/Volume Simply place a check next to the clients that you want this folder to be shared for. Click on Apply Storage : NAS Share Management : Security Settings This page allows you to control the permissions for individual users accessing the share.
  • Page 133: Storage : Shares

    Storage : Target Management To view a list of all targets for this iTX device, click on the Targets header in the navigation tree, under Storage. This page displays a list of targets that are available on this StorTrends storage appliance, along with their connection and status information.
  • Page 134: Replication

    The term, replication, is used in this document to describe the process of maintaining a redundant storage area network (SAN) volume. Replication Feature Table This is a table that lists the options and limitations of each of the available Replication Types. Replication Type...
  • Page 135: Synchronous Local San Volume Replication

    Synchronous Local SAN Volume Replication This illustration shows replication taking place on the same box. Chapter Two : Managing the StorTrends Storage Appliance 121...
  • Page 136: Synchronous San Volume Replication Using A Remote Box

    Synchronous SAN Volume Replication using a Remote Box This illustration shows volume replication using two separate boxes. StorTrends/ManageTrends (version 2.7) Web Interface User’s Guide for the StorTrends 2200 Storage Appliance...
  • Page 137: Creating A New Synchronous Replication Pair

    Navigate to the Replication link in the tree menu. The Create Replication Wizard opens. Select the IP Address of the Primary box. The Primary box is the system where the Volume that you want to replicate is located. Chapter Two : Managing the StorTrends Storage Appliance 123...
  • Page 138 If you have selected the Remote Replication option, you must enter the access information for the remote box. You can type the IP Address into the Enter Remote Server Address field or select it from the drop down menu next to the ‘or select remote server’ option.
  • Page 139: Managing Your Synchronous Replication Pair From The Replication Management Page

    Remote Host (such as the case when using DHCP), you can update the new IP Address by typing it into this field. In the case of a local replication pair (involving two volumes in the same local box, this column will show “local”.
  • Page 140 Button Description Join Joining allows you to join a split replication pair. Meaning that if you split a replication pair, this allows you to reestablish the connection between the local and remote StorTrends storage appliances. Split Splitting allows you to temporarily disconnect a replication pair. Splitting basically means that you are breaking the connection between the remote and local StorTrends storage appliances.
  • Page 141: Creating A New Snap Assisted Replication Pair

    This section describes how to create a new Snap Assisted Replication (SAR) Pair using the Create Replication Wizard. Note: You must have Snapshots scheduled for the Volumes that are involved in the SAR pair before Snap Assisted Replication can function properly. Step Action Navigate to the Replication link in the tree menu.
  • Page 142 Select the Secondary Volume location from the drop down menu associated with the Volume that you have selected. If no Volume is configured on the Secondary box, you will have the option to have the wizard create a new Volume automatically. The wizard requires a couple of extra steps to create a new Volume.
  • Page 143 Skip this step if you are not configuring a SAN Volume replication onto a new Volume. This step is the same for configuring both a SAN Volume and NAS Volume, except that no Target Name is required for NAS Volumes and is therefore not displayed as an option.
  • Page 144: Managing Your Snap Assisted Pairs From The Replication Management Page

    Local Volume, Remote Volume, Remote Host, Role, Link Status and Pairs Table Synchronization Percent. Consistency Group This is the name of the group containing the 1 or more volumes that are part of replication name pairs that replicate at the same time. Local/Remote Pool This field displays the pair’s Local and Remote Storage Pools respectively.
  • Page 145 Button Description Join Joining allows you to join a split replication pair. Meaning that if you split a replication pair, this allows you to reestablish the connection between the local and remote StorTrends storage appliances. Split Splitting allows you to temporarily disconnect a replication pair. Splitting basically means that you are breaking the connection between the remote and local StorTrends storage appliances.
  • Page 146: High Availability

    In the event of Node failure, the Failover action is automatic and seamless. When the Failed node comes up, it is detected by the stack and is synchronized quickly to bring back redundancy to the setup. Synchronization is very efficient and ensures that only out-of-sync data is resynced.
  • Page 147 Navigate to the Replication link in the tree menu. The Create Replication Wizard opens. Select the IP Address of the Primary box. The Primary box is the where the Volume that you want to replicate is located. Chapter Two : Managing the StorTrends Storage Appliance 133...
  • Page 148: Managing Your High Availability Pair From The High Availability Management Page

    High Availability the remote server must be a separate box and must have the exact same specifications of the primary box. You must type the IP Address into the Enter Remote Server Address field or select it from the drop down menu next to the ‘or select remote server’ option.
  • Page 149 Button Description Join Joining allows you to join a split replication pair. Meaning that if you split a replication pair, this allows you to reestablish the connection between the local and remote StorTrends storage appliances. Split Splitting allows you to temporarily disconnect a replication pair. Splitting basically means that you are breaking the connection between the remote and local StorTrends storage appliances.
  • Page 150: Replication Management

    Remote Host (such as the case when using DHCP), you can update the new IP Address by typing it into this field. In the case of a local replication pair (involving two volumes in the same local box, this column will show “local”.
  • Page 151: Replication Management : Create New Replication

    Enter credentials for the remote StorTrends storage appliance and click on Next. Once logged in, all suitable SAN Volumes on the remote StorTrends storage appliance will be shown if available. If none, you have the option to create a new volume in an existing or new storage pool.
  • Page 152: Reports

    This makes it very easy to extend SRM to cover a bigger and wider range of attributes without having to redesign it from scratch. The key kernel component is the data collection agent that interfaces with other modules to collect instantaneous data about all monitored resources.
  • Page 153: Storage Provisioning And Capacity Management

    StorTrends iTX, with its Thin-provisioning architecture, takes this headache out. Once the initial hurdle is crossed, the next big and persistent problem a storage administrator faces is to take an inventory of what is present today and predicting how much of growth is anticipated over the next few months, year or even beyond.
  • Page 154: Performance Trending

    In-depth analysis of the instantaneous read and writes performance values. It gives the user information about the contributions of different I/O sizes towards the total I/O activity going on at the moment. The I/O sizes chosen are 512 byte, 4K, 8K and 64K reads or writes.
  • Page 155: Cpu Utilization And Memory Utilization

    StorTrends, with Tiered Storage and three-level space mapping, ensures that snapshots are maintained in the most capacity-optimized manner. The next is to ensure that the so- called Recovery Images are indeed consistent and good.
  • Page 156: Information Lifecycle Management (Ilm) And Container Space Management (Csm)

    According to research conducted by the TheInfoPro Group (TIP), the interest in ILM over the last 18 months has heated up. The TIP heat index for ILM, which was four (in order of priority) in Spring 2005, has moved to one by Spring of 2006.
  • Page 157: Basic Concepts

    A group of logical drives belonging to the same container but have the same costs. The cost is calculated based on the RAID level, type of drives and so on. A container may contain multiple tiers, and a tier may contain multiple LDs. The following diagram gives a pictorial description about the relationship between a Logical Drive, a Container and a Tier.
  • Page 158 Information Retention Regulations) to retain emails for an extended period will result in messages and data to be scattered all over the space with various degrees of importance. The relevance of emails and corresponding references to them sharply tapers off with the passage of time.
  • Page 159: Information Retention Regulations

    Texas Public Information Act How StorTrends Tiered Storage and ILM Works At the core of StorTrends iTX stack is a data collection and trending module that collects and categorizes both instantaneous and historical access patterns that can span years. Storage blocks are also cataloged with respect to their RAID levels, class of disk drives (SAS, SATA and so on) and rotational speed (15K RPM, 10K RPM, 7200 RPM and so on).
  • Page 160 Having chosen the right block to move out and the appropriate time to do so, the StorTrends iTX stack utilizes a very efficient algorithm to perform the migration. The Data Mover technology (that works by advertisement of blocks) ensures that data blocks are migrated without corruption in the fastest possible time.
  • Page 161: Stortrends Tiered Storage And Csm (Scaling Within Tiers)

    This will result in multiple Logical Drives (LDs) in the same tier and data has to be striped across them. There can also be restrictions given by the RAID card in the number of disk that can be added to one LD (maximum expansion support per LD). Some RAID cards may have restrictions on creating arrays across enclosures.
  • Page 162: How Stortrends Tiered Storage And Csm Works

    When should the data When the I/O load on the system is low. The reason for this is to not affect the bandwidth be re-striped? of the applications running above it. The method of predicting the I/O load on the system at given point in time is done by the workflow analysis.
  • Page 163: Space Utilization

    SAN volume so the bottom line lies on the x-axis). The user can use the sliding window in the top chart to get a more detailed view in the bottom chart of how the space was consumed over a period of time. The size of the sliding window is also adjustable by the user.
  • Page 164: Volume Performance

    The green colored line in the chart indicates the read performance and the blue colored line in the chart indicated the write performance. This chart has a sliding window that can be dragged and adjusted for viewing detailed information for a particular period of time.
  • Page 165: Io Performance

    The IO Performance chart displays the IO performance of the volume selected. In the chart above, the volume is undergoing more 64 K read and writes compared to other segments. For instantaneous performance readings, the values are polled in five-second interval.
  • Page 166: Disk Performance

    I/Os indicate a potentially failing drive. There is a tool tip at the end of the line defining the LD and when the last sampling of data occurred. In the event that two or more drives have the same values, their tool tips will overlap.
  • Page 167: System Performance

    System Performance System performance is tracked in the form of instantaneous CPU and Memory Utilization. These values are also polled on a 5-second interval. Above is the graph showing the CPU and Memory Utilization as a percentage Chapter Two : Managing the StorTrends Storage Appliance 153...
  • Page 168: Information Lifecycle Management

    Information Lifecycle Management The chart above show the access patterns of the data and how they are spread across the tiers. The chart above shows the Random Access patterns of data. The ideal situation would be for the most frequently accessed data (red) be present in the high cost tier (yellow background) and least accessed data (blue) present in the low cost tier (white background).
  • Page 169: Container Space Management

    Container Space Management The above charts show how a container was before expansion and below, how it is after expansion and re-striping. The x-axis represents the Logical Drives and the y-axis represents the Storage space used in each logical drive.
  • Page 171: Appendix Araid

    I/O is expedited because several hard disk drives can be accessed simultaneously. RAID systems improve data storage reliability and fault tolerance compared to single hard disk drive systems. Data loss due to a hard disk drive failure can be prevented by regenerating missing data from the remaining data and parity information stored on other hard disk drives in the volume.
  • Page 172: Raid Overview

    8 KB to 512 KB. For example, in a four hard disk drive system using only disk striping (as in RAID level 0), segment one is written to hard disk drive one, segment two is written to hard disk drive two, and so on.
  • Page 173: Disk Mirroring

    Both hard disk drives contain the same data at all times. Either hard disk drive can act as the operational hard disk drive.
  • Page 174: Selecting A Raid Level

    Not all RAID levels mentioned in this document are supported by your StorTrends 2200. See the Intel (made by LSI Logic) RAID Software User’s Guide that shipped with your StorTrends 2200 for more information on what hardware RAID levels are supported.
  • Page 175: Raid 0

    RAID level. RAID 0 breaks up data into smaller blocks and then writes a block to each hard disk drive in the volume. The size of each block is determined by the stripe size parameter, set during the creation of the RAID set.
  • Page 176: Raid 5

    Use RAID 6 for data that requires a high-level of protection from loss. In the case of a failure of one drive or two drives in a virtual disk, the RAID controller uses the parity blocks to recreate the missing information. If two drives in a RAID 6 virtual disk fail, two drive rebuilds are required, one for each drive.
  • Page 177: Raid 10

    10 breaks up data into smaller blocks, and then stripes the blocks of data to each RAID 1 raid set. Each RAID 1 raid set then duplicates its data to its other drive. The size of each block is determined by the stripe size parameter, which is set during the creation of the RAID set.
  • Page 178: Raid 50

    The size of each block is determined by the stripe size parameter, which is set during the creation of the RAID set.
  • Page 179: Raid 60

    Use RAID 60 for data that requires a very high-level of protection from loss. In the case of a failure of one drive or two drives in a RAID set in a virtual disk, the RAID controller uses the parity blocks to recreate all the missing information. If two drives in a RAID 6 set in a RAID 60 virtual disk fail, two drive rebuilds are required, one for each drive.
  • Page 180 StorTrends/ManageTrends (version 2.7) Web Interface User’s Guide for the StorTrends 2200 Storage Appliance...
  • Page 181: Appendix Bchap And Mutual Chap

    Configure at least one local user (make sure password is 12 characters long min.) and a Volume with iSCSI support. Create a LUN and assign to a Target. Enable that Target. In Security page for the iSCSI LUN, give that User permission to the Share by selecting that User and clicking on Apply.
  • Page 182: Mutual Chap Authentication

    Configure at least one local user (minimum of 12 characters in password) and a Volume with iSCSI support. Create a LUN and assign to a target. Enable that. Register your iSCSI Initiator with the iSNS server. To do so, enter the IP address of the server into the iSNS Servers tab of the MS Initiator applet.
  • Page 183: Appendix C Installation Procedure

    THIS GUIDE DOES NOT DESCRIBE HOW TO INSTALL CPU, MEMORY, HARD DISK DRIVES OR OTHER HARDWARE COMPONENTS. SEE THE STORTRENDS® 2200 USER’S GUIDE FOR MORE INFORMATION. YOU MUST HAVE AT LEAST ONE NOTEBOOK HARD DISK DRIVE INSTALLED IN YOUR STORTRENDS® 2200. STORTRENDS ITX WILL ATTEMPT TO INSTALL ITSELF ONTO THE INTERNAL NOTEBOOK HARD DISK DRIVE(S) IN YOUR STORTRENDS®...
  • Page 184: Installation Procedure

    APPLIANCE WILL BE ERASED. THIS INCLUDES ALL USER RIGHTS, TARGET INFORMATION, NAS SHARES AND SO ON. Use the steps outlined in this manual to re-install the StorTrends iTX 2.7 software into your StorTrends storage appliance. This process is fast and should take less than 30 minutes.
  • Page 185: Remove Any Pci Nic Add-On Cards

    Attach a keyboard, monitor and external USB CD-ROM drive to your StorTrends 2200 (See the StorTrends 2200 Set Up Guide folded sheet for more information). Power on your StorTrends 2200 and insert the StorTrends iTX Installation CD into the external USB CD-ROM drive.
  • Page 186: Installation Procedure

    Once you have attached a keyboard, monitor and external USB CD-ROM Drive, power on your StorTrends 2200. You need to enter the Aptio Setup Utility (AMIBIOS) to boot off the StorTrends iTX Installation CD. Your StorTrends 2200 takes approximately one and a half minutes to get to the screen that prompts you to enter SETUP.
  • Page 187 Step Description If performed successfully, you should see the Aptio Setup Utility screen. If not, you have to reset the power on your StorTrends 2200 and start over. Aptio Setup Utility - Copyright (C) 2005-2007 American Megatrends, Inc. Main Advanced...
  • Page 188 Step Description If performed successfully, you should see the Welcome to AMI StorTrends ITX screen. If not, you have to reset the power on your StorTrends 2200 and start over. Press the <ENTER> to continue. American Megatrends Inc ---------------------------------- Welcome to AMI Stortrends ITX.
  • Page 189 The StorTrends iTX installation begins, but before it proceeds, it will prompt you with a message depending on how many notebook hard disk drives you have installed. Your StorTrends 2200 has a dedicated bay for up to two notebook hard disk drives used to hold the operating system.
  • Page 190 The StorTrends iTX installation takes approximately 30 minutes. You will see various screens throughout the installation. At times there will be a long period where you will see a blank screen. However, do not try to do anything. Leave the system alone until the StorTrends iTX Installation CD ejects and you see the screen where it tells you that the installation is complete.
  • Page 191: Appendix D Upgrade Procedure

    Appendix D Upgrade Procedure STOP! Currently, Upgrading from all versions of StorTrends other than StorTrends 2.7.XXXX is not supported. StorTrends iTX X.X Upgrade Current StorTrends ITX Version is X.X.XXXX. No need to upgrade. Enter OK to exit. < OK >...
  • Page 192: Ftp Upgrade Procedure

    Logout of all your iSCSI connections and disconnect all NAS shares. The upgrade process reboots your system. Copy the upgrade file(s) that you have received into an FTP folder. If you do not have an FTP server handy, please refer to the section, Using StorTrends as an FTP Server. If the upgrade file is compressed, you must uncompress it first.
  • Page 193: Upgrade Procedure Using The Command Line Interface

    CD, follow the instructions outlined in this section. The following instructions are provided as an example to such an installation procedure. It also requires that you be in front of the actual StorTrends storage appliance that you are attempting to upgrade.
  • Page 194: Insert The Stortrends Itx Installation Cd (With The Build You Want To Upgrade To)

    Insert the StorTrends iTX Installation CD (with the build you want to upgrade to) Insert the StorTrends iTX Installation CD into the CD-ROM drive when you see the AMI StorTrends Console Interface. AMI StorTrends Console Interface System Info : Host Name...
  • Page 195 Kernel X.X.X-X.XXXXXX on an XXXX XXXXXXXXXXXXXXX login: _ Log in as root. Type root as your user name and press the <ENTER> key. Next, type in your password and press the <ENTER> key. The default password is password. If you changed your admin password, use the admin password.
  • Page 196 At the prompt type the following command followed by the <ENTER> key: mkdir /mnt/source AMI XXX (StorTrends) Kernel X.X.X-X.XXXXXX on an XXXX XXXXXXXXXXXXXXX login: root Password: [root@ITXXXXXXXXXXXXX ~]# mkdir /mnt/source [root@ITXXXXXXXXXXXXX ~]# _ StorTrends/ManageTrends (version 2.7) Web Interface User’s Guide for the StorTrends 2200 Storage Appliance...
  • Page 197 Step Description Type the following command followed by the <ENTER> key: mount /dev/scd0 /mnt/source AMI XXX (StorTrends) Kernel X.X.X-X.XXXXXX on an XXXX XXXXXXXXXXXXXXX login: root Password: [root@ITXXXXXXXXXXXXX ~]# mkdir /mnt/source [root@ITXXXXXXXXXXXXX ~]# mount /dev/scd0 /mnt/source mount: block device /dev/scd0 is write-protected, mounting read-only...
  • Page 198 [root@ITXXXXXXXXXXXXX ~]# sh /mnt/source/upgrade/upgrade.sh Note: In this example, the path on the CD is UPGRADE. The file name is UPGRADE.SH, which is located in the UPGRADE directory. The StorTrends Upgrade console interface will appear. Press the <ENTER> key to proceed.
  • Page 199 Step Description A warning message will appear stating that you should back up before proceeding. Press the <ENTER> key to proceed or escape out to backup first. StorTrends iTX X.X Upgrade As a precautionary measure, please backup the data before upgrade.
  • Page 200 Step Description Once it is finished, press the <ENTER> key. The CD will eject automatically. If it does not, eject the CD. StorTrends iTX X.X Upgrade Upgrade Complete Upgrade to X.X is successful. Reboot the machine. < OK> At the prompt type the following commands followed by the <ENTER> key:...
  • Page 201: Using Stortrends As An Ftp Server

    Check whether you have space to create a 5GB NAS volume. If you already have a NAS volume, you can use that instead. If you do not have enough space or do not have a pre- existing NAS volume, you need to use an external FTP server.
  • Page 202 StorTrends/ManageTrends (version 2.7) Web Interface User’s Guide for the StorTrends 2200 Storage Appliance...
  • Page 203: Appendix E Replication Overview

    The Solution: Remote Replication High Availability with Synchronous Replication Various factors have to be considered while architecting a DR solution. Service Level Agreements (SLA) along with tolerable Recovery Point Objective (RPO) and Recovery Time Objective (RTO) are the key factors influencing the planning.
  • Page 204: Remote Replication Essentially Comes In Two Flavors

    Remote Replication essentially comes in two flavors. Synchronous Replication Here the recovery site moves lockstep with the production site and offers best RPO. But it is very costly to implement. Distance is a challenge for Synchronous Replication. Beyond tens of miles, the delays and latencies incurred renders the solution impractical.
  • Page 205: Synchronous Replication

    StorTrends offers the ultimate in flexibility and performance when it comes to disaster recovery and business continuance. Remote Synchronous Replication is implemented on the target stack. This imposes no burden on the application servers and is transparent to the SAN initiators. Setting up a complete mirror-recovery site requires just a few clicks of the mouse and in seconds the entire production server storage configuration is duplicated on the recovery site storage server.
  • Page 206: Stortrends Asynchronous Replication

    StorTrends servers offer a very innovative and feature-rich periodic replication suite called Snap-Assisted-Replication (SAR). This form of replication is used where Service Level Agreement (SLA) permits the administrator to have a relaxation in Recovery Point Objective (RPO) and Business economics does not permit synchronous replication.
  • Page 207: Delta Snaps

    The snapshots in the secondary are essential to provide recovery points. In the event of a failover, the active volume in the secondary cannot be used as it may have some snapshot data that is NOT fully consistent. On a failover to secondary system, the StorTrends iTX will automatically rollback to the latest available snapshot in the secondary.
  • Page 208: Snap Assisted Replication Of Nas Volumes

    This temporary share configuration will be merged with the original configuration during a Failover. The User database is handled in a different way. If ADS / NIS users are used in the primary system, then administrator is requested to configure the secondary system also with the same ADS / NIS configurations.
  • Page 209: An Overview Of Journal Assisted Replication (Jar)

    An Overview of Journal Assisted Replication (JAR) JAR uses Journaling method by staging the data in a rolling log and is thereby is more tolerant to link speed disparities or communication outages. Every I/O has to be replicated out in the same sequence it arrives at the Production site in order to ensure application consistency.
  • Page 210: Journal And Journal Files

    Once JAR is enabled and is in action, it faithfully replicates every incoming I/O to the recovery site allowing a continuous spectrum of recovery points. However, if there is a big disparity between the incoming and outgoing rates, then the Journal size increases and eventually a situation may arrive when the journal will overflow and the replication cannot proceed.
  • Page 211: Synchronous Replication & High Availability

    Step Action The first step involves logging in to the primary node’s ManageTrends and going to the replication tab. It is assumed here that the primary volume and targets have already been created; also the primary portal must have been activated. Select “Remote Replication” as the replication type Specify the secondary nodes IP address, user name and the password in this screen and click next.
  • Page 212 (or) a new volume can be created as shown below. In order to proceed to the next step based on the options selected, click next.
  • Page 213 Step Action If a new volume creation option has been selected, the new container and new volume have to be configured. Creation of Remote Container Creation of Remote Volume and Target Appendix E : Replication Overview 199...
  • Page 214: Cli Command For Creating A Synchronous Replication Pair

    Finally the summary screen is shown. Upon clicking the finish button the replication pairs are created one by one. Please allow a few seconds for the replication pairs to be created and the screen to refresh itself with the replication pairs.
  • Page 215: Synchronous Replication And High Availability Pair Details

    Synchronous Replication and High Availability Pair Details Synchronous Replication Details High Availability Pair Details Appendix E : Replication Overview 201...
  • Page 216: Synchronous Replication And High Availability Pair Deletion

    Synchronous Replication and High Availability pair deletion The deletion of replication pair is done by clicking on the delete button in the primary node. This button is disabled by default in the secondary node. In case the replication pair has become disconnected and there is a need to delete the replication, CLI delete command must be used with the force flag enabled.
  • Page 217: Cli Command For Deleting A Synchronous Replication Pair

    ManageTrends on CLI command. The following screenshot shows the result of a split operation. The connection mode “Manual” refers to a split replication pair. It can also be seen that the capacity out-of-sync is non-zero now, as compared to the previous screenshot.
  • Page 218: Cli Command For Displaying Split Replication And Status

    Replication mode : Synchronous Remote host name/IP : 172.16.70.77 Remote target name : iqn.1991-10.com.ami:itx0030488422eedaa8:mtarget Remote initiator name : iqn.1997-05.com.cisco.01.30488422ee Success. [root@ITX0030488657ee ~]# cli split -l StoragePool1_SANVolume1 syncreplica Success. StorTrends/ManageTrends (version 2.7) Web Interface User’s Guide for the StorTrends 2200 Storage Appliance...
  • Page 219: Join Operation And Resync Progress

    Join Operation and Resync Progress Join operation is clicking on the join button in the primary node of a split replication pair. Once this is done the replication resumes and the out-of-sync percentage starts going down till it becomes fully in-sync and out-of-sync percentage becomes zero.
  • Page 220: Failover Operation

    Failover Operation Failover operation is done by clicking on the failover button in the original secondary node. Once the failover completes the replication role in the original secondary becomes primary. Synchronous Replication Failover – Before Failover in Original Secondary Synchronous Replication Failover – After Failover in Original Secondary...
  • Page 221: Cli Command For Failover Operations Of Synchronous Replication Pairs

    Success. Failback Operation Failback operation is done by clicking on the failback button in the original primary node. Once the failback completes the replication role in the original primary node becomes primary from secondary. Synchronous Replication Failback – Before Failback in Original Primary...
  • Page 222: Synchronous Replication Failback - After Failback In Original Primary

    Synchronous Replication Failback – After Failback in Original Primary CLI Command for Failback Operations of Synchronous Replication Pairs A sample CLI command for failback operation of Synchronous replication pair is shown below: [root@ITX0030488657ee ~]# cli perform -t failback -l Storage1_SecReplSANVolume1 syncreplica Success.
  • Page 223: Snap-Assisted Replication

    Snap-Assisted Replication Navigating with ManageTrends Appendix E : Replication Overview 209...
  • Page 224: Snap Assisted Replication Using The Replication Wizard

    The first step involves logging in to the ManageTrends of the primary node and going to the replication tab in the tree view. It is assumed here that the primary volume and targets have already been created, and the primary portal has been activated. Now specify the secondary node IP address, user name and the password in this screen and click next.
  • Page 225 Step Action The next step gives the user an option to either select the existing Storage Pool or creates a new Storage Pool for the replication. Click next to proceed further. The next step involves creation of the volumes and volume targets on the secondary side. The user also has the option to specify the provision type i.e.
  • Page 226 Enable encryption or compression based on user requirement. For compression, select the compression level (1- 9). This page shows the summary of the replication pairs and its parameters for the user to confirm before actual creation of the replication pair. Click finish to create the replication pair.
  • Page 227: Replication

    Replication SAR view – Primary Box SAR view – Secondary Box Appendix E : Replication Overview 213...
  • Page 228: Sar - Configuring The Schedule

    Action To configure the schedule for replication, click on the “Edit” button shown in the following figure. Continue to set the schedule either for a specific time and day. The default schedule is [All the time – Everyday]. After selecting the required parameters, Click on “Add Schedule” to persist it.
  • Page 229: Sar - Deleting The Schedule

    SAR – Deleting the Schedule Step Action To remove an existing schedule, select the schedule from the schedule information box. Click on “Remove Schedule”. Appendix E : Replication Overview 215...
  • Page 230: Failover Operation

    Failover Operation Go to the SAR page in the secondary box and click on the “Failover” button. After this, the Role in the Secondary changes to Primary. Note: Failover should be always done only in the original secondary box. Before Failover Operation in Secondary Box...
  • Page 231: After Failover Operation In Secondary Box

    After Failover Operation in Secondary Box Appendix E : Replication Overview 217...
  • Page 232: Failback Join Operation

    Failback Join Operation Go to the SAR page in the acting primary (original secondary) box and click on the “Failback Join” button. After this the Role in the original Primary box changes to secondary. Note: Failback Join operation can be done only in the acting primary (original secondary) box.
  • Page 233: After Failback Join Operation In Primary (Original Secondary) Box

    After Failback Join Operation in Primary (Original Secondary) Box. After Failback Join Operation in Secondary (Original Primary) Box. After Failback Join operation both the boxes again becomes ready for replication. Now the replication happens from the original secondary to the original primary.
  • Page 234: Failback Operation

    Failback Operation Go to the SAR page in the secondary (Original Primary) box and click on the “Failback” button. Note: Failback should be always done only in the original primary box. Before Failback Operation in Secondary (Original Primary) Box. StorTrends/ManageTrends (version 2.7) Web Interface User’s Guide for the StorTrends 2200 Storage Appliance...
  • Page 235: After Failback Operation In Secondary (Original Primary) Box

    After Failback Operation in Secondary (Original Primary) Box. Appendix E : Replication Overview 221...
  • Page 236: After Failback Operation In Primary (Original Secondary) Box

    After Failback Operation in Primary (Original Secondary) Box. Deleting the SAR pair The user can delete the SAR pair by clicking the “Delete” button. Deletion of SAR pair StorTrends/ManageTrends (version 2.7) Web Interface User’s Guide for the StorTrends 2200 Storage Appliance...
  • Page 237: Journal Management & Journal Assisted Replication

    CLI: A Journal can be created using ITX 2.7 CLI interface. For example: cli create -t journal -j journal0 -l /dev/sdc journal Where –j option is the Journal name and –l option is for LD name. –l option can be repeated for as many LDs for a Journal.
  • Page 238 In Create Journal Page, one or more LDs have to be selected. Enter a name for Journal and proceed to creation. Once a Journal is created, a separate node will be created under ‘Storage/Journal’. Select this node to manage this Journal. Used space and Available space can be seen here.
  • Page 239: Creating A Journal File

    Creating a Journal File Journal File is always associated with a Consistency Group. It means, Journal File is associated with one or more volumes for which Journaling will be perform on this Journal File. Appendix E : Replication Overview 225...
  • Page 240 For example: cli create -t journal –f journalfile0 –c StoragePool1 –v privol0 –v privol1 –z 10 -j journal0 journal Where, –f option is for Journal File name, -c option is for container name, -v option is for volume name and –j option is for Journal name. –v option can be repeated for as many volumes for a Journal File.
  • Page 241: Journal Assisted Replication

    Primary volume by a time last snapshot is created in Primary Volume. In JAR, since replication happened by the same order at which IOs happened to Primary volume, even the last IO replicated to Secondary is valid. JAR does not need a closing snapshot in secondary in order to access Secondary volume.
  • Page 242 In next page, A) select replication type as ‘Journal Assisted’. B) Select Journal File from the list C) Select all volumes associated with the Journal File. Note that JAR does not replicate NAS volume. It can replicate only a SAN volume.
  • Page 243 Remote Storage Pool and volume can be either already existing or can be created now freshly. Note the Journal File in remote is not required. Edit default parameters for remote volume as shown below and continue. Appendix E : Replication Overview 229...
  • Page 244 ‘Maximum Snapshot per volume’. Give a name for this JAR in ‘Consistency group name’ field. Review the desired configuration in the last page and select ‘Finish’ to proceed to JAR creation as shown below. StorTrends/ManageTrends (version 2.7) Web Interface User’s Guide for the StorTrends 2200 Storage Appliance...
  • Page 245 Once the affected region is replicated through DVM snapshot, it will try to fallback on Journal File. When a CG rollback happens, all IOs in journal may be invalidated. In such cases, it will rely on snapshot.
  • Page 246 When JAR is in ‘Snapshot mode’, it will check journal file upon completion of each snapshot based replication to see whether it can fall back to Journal based replication. Journal based replication can be done only when a snapshot event is exists (in Journal File) for a completed snapshot.
  • Page 247 Appendix E : Replication Overview 233...
  • Page 249: Appendix F Setting Up Dhcp From The Console Interface

    Make sure it is plugged into the back of the chassis. Also make sure that it is a good cable. Check to make sure that your switch is properly configured (if it is a manageable switch).
  • Page 250: Console Interface

    Console Interface The main menu is the first screen that you see when you log into the Console Interface of your StorTrends iTX StorTrends storage appliance. Navigate to the section you want to view or configure. Keyboard Key Function <ARROW UP>...
  • Page 251: Set Ip Address

    NIC-1 NetworkInterface-1 NIC-2 NetworkInterface-2 < Cancel > < OK > This screen allows you to configure TCP/IP automatically via DHCP server or by specifying the addresses statically for the following: • IP address (Server) • Subnet Mask • Default Gateway •...
  • Page 252: Set To Dhcp

    Configure NIC-x: DHCP ( X ) STATIC < Cancel > < OK > Highlight the DHCP option by navigating to it and press the <SPACE> bar to select it. TCP/IP Configuration Port NIC-x Configuration Mode STATIC IP Address 192.168.0.3 Subnet Mask 255.255.255.0...
  • Page 253: Appendix G Updating An Expired License

    “The license is unavailable/expired for both the SAN and NAS features. You need to upgrade to a valid license for at least one of the features in order to continue managing this server.”...
  • Page 254: Overview

    After your changes have been processed by an AMI Support Representative, you’ll receive a new license key in the form of a text document. After you save the new key to a location on your hard drive, use the Browse button to navigate to the location of that file, and then simply select the Update License button to complete the process.
  • Page 255 After your license has been processed by an AMI Support Representative, you will receive a License key in the form of a text document. After you save the new key to a location on your hard drive, use the Browse button to navigate to the location of that file, and then simply select the Update License button to complete the process.
  • Page 256 StorTrends/ManageTrends (version 2.7) Web Interface User’s Guide for the StorTrends 2200 Storage Appliance...
  • Page 257: Appendix Hups Configuration

    The data in the write-back cache being not persistent, any power failure in the storage system will result in the loss of valuable data. In order to circumvent this problem the administrator must use a UPS to protect the system from abrupt power failures.
  • Page 258: Configuring Using Managetrends

    StorTrends box can be run on UPS. If either one of the condition is met the StorTrends boxes will execute a graceful shutdown, thereby preventing any potential data loss for the applications.
  • Page 259: Configuring Slave Boxes

    Configuring Slave Boxes The status of the UPS can also be monitored using the CLI. The following examples show how to use the CLI to find the type of UPS connected and monitor the status of it. Monitoring UPS through CLI...
  • Page 260: Action On Power Failure

    Whenever the A/C power fails, the UPS takes over and the StorTrends boxes start running on the UPS. Depending on the type of the UPS and the load on it, it will start discharging and the amount of time and charge left in the UPS can be monitored using the ManageTrends.
  • Page 261: Cache Mode Change From Stortrends Logs

    The ManageTrends event log is also updated with this information the A/C power was turned off. The status of the UPS, whether it is running on A/C or battery and the amount of charge and time remaining in the UPS can be monitored using the ManageTrends or the CLI, as mentioned before.
  • Page 262: Messages From Stortrends Log - Auto Shutdown

    2 04:16:57 2007): Executing automatic power-fail shutdown Broadcast message from root (Wed May 2 04:17:02 2007): The system is going down for system halt NOW! ManageTrends Event Log StorTrends/ManageTrends (version 2.7) Web Interface User’s Guide for the StorTrends 2200 Storage Appliance...
  • Page 263: Appendix I Continuous Data Technology

    Statistics show that data growth is almost doubling every year, yet the Recovery Time Objective (RTO) has remained the same, if not tighter. From the anatomy of data re-usage, it is clear that in overwhelming situations most recent data is recalled.
  • Page 264: Stortrends Itx Installation Cdt - A True Event Addressable Storage

    Today there are various implementations of CDP. A vast majority of vendors implement it on the Host that is serving as the File or Application Server. In Host based CDP, there is a filter driver or “Data-Tap” residing in the Host Operating Systems that replicates every I/O on the Production Server to the CDP Server.
  • Page 265 In a typical environment where an average of 10GB production data is changed or generated per hour, a journal file of 1TB can hold four days worth of continuous chronological data. In addition, with eight levels of scheduled snapshots and up to 2000 snapshots per volume StorTrends can deliver any historic data across a very wide time spectrum.
  • Page 266: Contemporary Cdp Appliance Vs Stortrends Itx Installation Cdp

    In contemporary CDP appliances, the write I/Os are replicated outside the appliance using some sort of data-tapping agents. This mirrored I/O is then (1) staged in a buffer in the appliance. The old data is (2) read from the recovery volume, time-stamped and (3) journaled out into a “undo”...
  • Page 267: Under The Hood: Stortrends Itx Installation Cdt

    I/O latency. During a Review or Rollback operation, initially a rollback to a previous writable snapshot is done and then the redo Journal is played on top of it to the selected point in time. Under the hood: StorTrends iTX Installation CDT The Advanced Caching Module of iTX stack serves as the central repository of in-flight data.
  • Page 268: Stortrends Continuous Data Protection Architecture

    StorTrends Continuous Data Protection architecture StorTrends/ManageTrends (version 2.7) Web Interface User’s Guide for the StorTrends 2200 Storage Appliance...
  • Page 269: Appendix J : Wds And Deduplication In Stortrends Itx 255

    (RTT) it incurs plays a very dominant role. A second major factor that adds additional challenges is the issue of packet loss. At such significant transport distances, packets can be dropped due to congestion or bit errors.
  • Page 270: Figure 1: Effect Of Tcp Protocol On Transfer Bandwidth

    For example, using a single T1 connection, the maximum achievable rate is 1.55 mbps; for T3 it is 45 mbps; with OC3 it increases to 155 mbps, and with Gigabit Ethernet (GigE) links this maximum reaches the impressive order of Gigabits per second.
  • Page 271: Figure 2: Stortrends Transfer Profile Vs. Tcp Transfer Profile

    Figure 2: StorTrends Transfer Profile vs. TCP Transfer Profile Based on the data above, it is clear that for short distances, where latencies are in the sub- ms range (for example, in LAN environments), the throughput is dictated entirely by the link bandwidth.
  • Page 272: The Stortrends Itx Wds Implementation And Transfer Acceleration

    As noted earlier, although the performance of the TCP stack can be tweaked, it is a fairly accurate generalization that TCP is more suitable for the LAN environment than it is in long-haul networks.
  • Page 273: Wds In Stortrends Itx: Compression And Data Deduplication For Wan Asynchronous Replication

    StorTrends iTX for WAN replication. Like many of its competitors, StorTrends employs delta-snapshot technology to transfer only the data that has changed between passes in order to reduce the amount of data transported. In addition to this, StorTrends also employs an intelligent data-dedupe algorithm to filter out some of the previously transmitted data from earlier passes.
  • Page 274: Figure 6: Deduplication And Wan Transfer Acceleration Management In Stortrends Itx

    I/Os make up the majority. For example, SQL servers generate random I/Os of 8K blocks, and Exchange servers generate random I/Os of 4K blocks, making it easy to see that even when chunk sized I/Os are replicated, they may carry multiple packets of duplicated data.
  • Page 275: Additional Wan Assists In Asynchronous Replication With Stortrends

    Additional WAN Assists in Asynchronous Replication with StorTrends In addition to the optimizations described above, StorTrends supports the compression and encryption of data before it is released on the WAN, which reduces the net size of data transferred over these more expensive links. StorTrends supports various compression depths, including an adaptive compression mode where the depth of compression is determined by an analysis of the current and statistical load on the system.
  • Page 276 I/Os and for synchronous replication operations, to greatly improve and increase data transfer speed, approaching the theoretical maximum of the connection speed. StorTrends/ManageTrends (version 2.7) Web Interface User’s Guide for the StorTrends 2200 Storage Appliance...
  • Page 277: Glossary

    Access Control List. An ACL is a table that tells the system’s operating system the access rights each user has to a directory or file. The directory or file has a security attribute that identifies its access control list. The list has an entry for each system user with access privileges, such as read and write.
  • Page 278: Archive

    Archive The StorTrends iTX software uses this word to describe the process of backing up data stored on it to a safe place. Asynchronous Replication Asynchronous replication can minimize the performance impact and bandwidth requirements of synchronous replication by forgoing the need to write to the primary and secondary simultaneously.
  • Page 279: Cdp

    No snapshot taken at a later time T1 will be replicated, until the prior snapshot taken at time T0 on all volumes are replicated and snapshots for time T0 on all volumes are replicated in the secondary. Similarly, on a failover to secondary, all volumes in the consistency group are rolled back to the same snap group there by maintaining application consistency across all the volumes.
  • Page 280 • If no matching snap groups present that is safe (out of disaster), then there is no way the replication can continue with given parameters. In such scenarios, the PASSIVE volume data will be wiped out and replication will start from the beginning.
  • Page 281: Cow

    Copy-On Write. In a Copy-On-Write (COW) implementation, snapshots protect the old data by copying it to a separate snapshot space when there is a new write that needs to overwrite it. After the old data has been copied to the new location, the data in the old location is overwritten with the new data.
  • Page 282: Delta Snaps

    In the event of a failover, the active volume in the secondary cannot be used as it may have some snapshot data that is not fully consistent. On a failover to secondary system, the StorTrends iTX will automatically rollback to the latest available snapshot in the secondary.
  • Page 283: Domain Name

    (LAN). Ethernet 802.2 Packet format that defines the standard for the data link layer. It is made up of two smaller layers called the logical link control (LLC) layer and the media access control (MAC) layer.
  • Page 284: Ethernet Snap

    > < 38-1492 > Failover Failover is a process by which a PASSIVE system (B) is made as ACTIVE in the event of a irrecoverable failure of the ACTIVE system (A). During a Failover operation, the PASSIVE system (B) will rollback to the latest available snapshot – snap group across all volumes.
  • Page 285: Fc San

    Fibre Channel over TCP/IP. FCIP is a TCP/IP-based tunneling protocol for connecting geographically distributed Fibre Channel SANs transparently to both Fibre Channel and Firewall A set of related programs, located at a network gateway server that protects the resources of a private network from users from other networks. Frame A frame is a single data packet that is transmitted across a network.
  • Page 286: Group

    Group A group is a number of users that are bunched together. Having a group makes it easier to assign a set of rules that are common to a set of users. Common groups can be Accounting, Sales, Marketing, and so on.
  • Page 287: Ilm

    An administrator may want to move old data to cheaper, lower-performance media, and move frequently used new data to faster media.
  • Page 288: Ips

    The iSCSI protocol increases the capabilities and performance of storage data transmissions. Because of the wide use of IP networks, iSCSI can be used to transmit data over LANs, WANs, or the Internet and can enable location-independent data storage and retrieval.
  • Page 289: Iscsi Initiator

    (initiates) the transfer of information to and from an iSCSI target. iSCSI Name An iSCSI Name is used by the Initiator and Target for locating storage resource and storage resource allocation. The iSCSI Name also is used to identify which initiator has access to which target resource.
  • Page 290: Mail Server

    2.1 version release. Mirroring the StorTrends iTX OS is the ability to install the StorTrends iTX software on two hard disk drives. Basically, if one of the two boot hard disk drives fails, you still maintain the ability to boot to the StorTrends iTX operating system from the alternate hard disk drive.
  • Page 291: Nic

    Using NIS, each host, client or server in the system has knowledge about the entire system. A user at any host can get access to files or applications on any host in the network with a single user identification and password. It is intended for use on local area networks.
  • Page 292: Osi

    If the quota is set to zero, it means the user has unlimited storage access. If the quota is set to a particular size it means the user has only that much amount of storage at his/her access in that volume.
  • Page 293: Raid 0

    RAID level. RAID 0 breaks up data into smaller blocks and then writes a block to each hard disk drive in the volume. The size of each block is determined by the stripe size parameter, set during the creation of the RAID set.
  • Page 294: Raid 6

    A 6-drive array provides two striped three drive RAID 5 sets. Generally, RAID 50 is useful in very large arrays, arrays with 10 or more disks. Like the RAID 1n and RAID 10n array types, RAID 50 can handle multiple disk failures.
  • Page 295: Raid 60

    RAID 60 uses distributed parity, with two independent parity blocks per stripe in each RAID set, and disk striping. A RAID 60 virtual disk can survive the loss of two disks in each of the RAID 6 sets without losing data. It works best with data that requires high reliability, high request rates, high data transfers, and medium-to-large capacity.
  • Page 296: Row

    As with Copy-on-Write snapshots, systems that implement Redirect-On-Write snapshots also need to maintain tables that contain a map of where old data and new data are stored. However, this mapping needs to be updated and referred to for volume reads in Redirect- on-Write, as opposed to merely for snapshot reads in Copy-on-Write.
  • Page 297: Sar

    Snap Assisted Replication is built on top of the advanced snapshot mechanism provided by the StorTrends iTX 2.1 / 2.5 stacks. In a Snap Assisted Replication environment a primary volume snapshot will be replicated to a volume in a secondary system. Since the snapshot is a frozen image and the snapshot data is sequentially replicated to the remote volume, the remote volume will not be consistent until the entire image is replicated.
  • Page 298: Smb

    SMB can be used over the Internet on top of its TCP/IP protocol or on top of other network protocols such as Internet Packet Exchange (IPX) and NetBEUI.
  • Page 299: Srm

    A part of the host address is reserved to identify the particular subnet. Switch A network device that selects a path or circuit for sending a unit of data to its next destination. Glossary 285...
  • Page 300: Synchronous Replication

    In short, when an I/O is recorded, it is written simultaneously to both the primary and the secondary to ensure parity. The writing of the I/O to the primary is in essence blocked until the secondary is updated. In this way, volumes are protected from failure at the granularity of an I/O, since the primary and secondary sites are always perfectly synchronized with each other, as the name suggests.
  • Page 301: Volume

    It all depends on how you set up your Volumes. The controller treats one or more hard disk drives or unused space on a hard disk drive as a single array. A Volume provides the ability to concatenate storage from various hard disk drives regardless of the size of the space on those hard disk drives.
  • Page 302: Index

    Control Panel, 30, 32, 33, 34, 35, 36, 37, 38, 39, Basic Concepts, 143 40, 41, 42, 43, 44, 45, 46, 47, 50, 51, 52, 54, 55, 57, Before Failback join Operation in 58, 59, 60, 61, 64, 67, 69, 70, 71, 72, 73, 74, 75, 76, Primary (Original Secondary) Box.,...
  • Page 303 TCP/IP Settings Page, 47 Control Panel Control Panel Themes Network Settings Olive Green, 39 TCP/IP Settings Page Control Panel DHCP or Static IP Address, 47 Themes, 40 Control Panel Control Panel Network Settings, 50 Themes Control Panel Blue, 40 Network Settings...
  • Page 304 Session Management Page, 75 Control Panel Control Panel Network Settings iSCSI, 76 File Protocols Settings Page Control Panel Set Apple File Protocol Page, 58 iSCSI Control Panel StorTrends/ManageTrends (version 2.7) Web Interface User’s Guide for the StorTrends 2200 Storage Appliance...
  • Page 305 Delta snaps, 193 Figure 6 Delta Snaps, 268 Deduplication and WAN Transfer Acceleration Management in DHCP, 47, 48, 49, 125, 130, 134, 136, 235, 237, 238, StorTrends iTX, 260 Figure 7 Disable Windows File Server Protocol ManageTrends Replication (CIFS), 56...
  • Page 306 30, 61, 70, 72, 73, 74, 75, 76, 90, 91, 94, 95, G  119, 134, 136, 167, 168, 178, 255, 256, 258, 270, 274, 275, 284, 286 Gateway, 41, 47, 48, 49, 237, 271 iSCSI Adapter, 274 Gigabyte, 271...
  • Page 307 N  RAID Overview, 158 Remote Replication essentially comes NAS, 7, 9, 10, 18, 22, 23, 24, 30, 57, 60, 90, 91, 99, in two flavors, 190 100, 101, 115, 117, 118, 119, 120, 124, 128, 129, Remove any PCI NIC addon cards, 171...
  • Page 308 Step Five Server, 6, 33, 35, 41, 47, 48, 49, 56, 60, 67, 68, 69, 71, 79, 90, 94, 101, 124, 128, 134, 168, 178, 193, Configure NAS Volume, 18, 22 237, 250, 272, 283, 284 Summary View, 11 Set IP Address, 237...
  • Page 309 CDP Flashback Window - Event Continuous Data Protection (CDP), View, 112 Storage Storage Continuous Data Protection (CDP) Continuous Data Protection (CDP), Example of a selected CDP window, Storage Storage Continuous Data Protection (CDP) Event Description, 113 Continuous Data Protection (CDP), Storage...
  • Page 310 Target Management, 119 T  Storage Target Management, 119 Target, 18, 21, 70, 71, 72, 74, 75, 77, 78, 91, 94, 95, Storage 96, 97, 98, 101, 103, 104, 105, 119, 125, 129, 167, Target Management 168, 199, 275, 286 Security, 119...
  • Page 311 WDS in StorTrends iTX X  Compression and Data Deduplication for WAN Asynchronous Replication, XFS, 287 What is iSCSI?, 90 Z  WINS, 55, 287 Workflow Management, 141 Zoning, 91, 96 WWN, 287 Index 297...

This manual is also suitable for:

Stortrends 2.7Managetrends 2.7

Table of Contents