HP StorageWorks 2000 Series Reference Manual
HP StorageWorks 2000 Series Reference Manual

HP StorageWorks 2000 Series Reference Manual

Storageworks 2000 family modular smart array
Hide thumbs Also See for StorageWorks 2000 Series:

Advertisement

Advertisement

Table of Contents
loading

Summary of Contents for HP StorageWorks 2000 Series

  • Page 3: Table Of Contents

    HP Technical Support ........
  • Page 4 Configuring Your System for the First Time ......29 Configuring Preferences ..........29 Configuring User Access .
  • Page 5 Configuring Network Management Services ......52 Configuring Event Notification ........53 Enabling or Disabling Event Notification .
  • Page 6 Managing Global Spares ......... . 83 Managing Volumes .
  • Page 7 Using Volume-Copy Services ........121 Copying a Volume .
  • Page 8 Monitoring System Status ......... . 149 Displaying Status Information .
  • Page 9 Displaying Notification Events ........178 Additional Status Information .
  • Page 10 Reviewing Disk Drive Error Statistics ......200 Reviewing the Event Logs .
  • Page 11 Configuring the Debug Log ......... . 224 Correcting Enclosure IDs .
  • Page 12 Comparing RAID Levels ..........252 Mixing Disk Drive Models .
  • Page 13: Prerequisites

    This guide is intended for use by system administrators who are experienced with the following: Direct attach storage (DAS) or storage area network (SAN) management Network administration Storage system configuration Prerequisites for installing and configuring this product include familiarity with: Servers and computer networks Fibre Channel, iSCSI, Serial Attached SCSI (SAS), and Ethernet protocols AaBbCc123...
  • Page 14 HP customer self repair (CSR) programs allow you to repair your HP StorageWorks product. If a CSR part needs replacing, HP ships the part directly to you so that you can install it at your convenience. Some parts do not qualify for CSR. Your HP- authorized service provider will determine whether a repair can be accomplished by CSR.
  • Page 15: Hp Websites

    HP strongly recommends that customers sign up online using the Subscriber's choice website: Subscribing to this service provides you with e-mail updates on the latest product enhancements, newest versions of drivers, and firmware documentation updates as well as instant access to numerous other product resources.
  • Page 17: What Is Smu

    This chapter introduces HP StorageWorks MSA2000 Family Storage Management Utility (SMU), the web-browser interface for MSA2000 Family storage systems. It also describes how to configure this interface by setting system preferences, configuring users, and managing licenses. This chapter contains the following sections: “What is SMU?”...
  • Page 18 SMU also includes monitoring and diagnostic features that enhance the reliability, availability, and serviceability (RAS) of your storage system. You can configure the transmission of event notifications (alerts), which can be sent to the screen or to email addresses, and Simple Network Management Protocol (SNMP) traps, which can be sent to an SNMP application.
  • Page 19 SMU distinguishes users by the IP addresses from which they log in. If you log in to SMU using multiple browser instances on the same management host, SMU considers all instances as a single user. Actions you take in one SMU instance are reflected in the other SMU instances on the same host.
  • Page 20 3. Click Log In. The Status Summary page displays the overall status and health of the system. If you cannot navigate past the Log In page, check the browser settings described on page 18. To log out of SMU: 1. Click Log Off at the bottom of the menu. The Log Off page is displayed.
  • Page 21: Interface Elements

    The topics in this section describe elements of SMU pages and provide help for navigating pages: “Interface Elements” on page 21 “Navigating SMU” on page 23 “Help Bar Icons” on page 24 “Virtual Disk Icons” on page 24 “System Panel” on page 26 “Help Menu”...
  • Page 22 The following table describes the key elements of SMU pages. Menu area This area on each page includes monitoring functions in the Monitor menu, management functions in the Manage menu, and a Log Off function. An arrow icon marks the menu item for the currently displayed page. The type of user that is logged in is displayed beneath the Log Off button.
  • Page 23 The following table describes how to navigate SMU pages. Select a menu item Click the menu item in the menu on the left side of each page. When you click some menu items, the menu changes to display different submenus. This book uses the following convention to indicate the steps in navigating to a function: Select Menu >...
  • Page 24 The Help Bar at the top of each page can include event notification, page refresh, and page help icons. – An event occurred that is configured to display a visual alert. Click this icon to view the most recent events monitored by Event Notification. To control how you receive information about events, see “Configuring Event Notification”...
  • Page 25 RAID-6 virtual disk is online in a degraded state. The virtual disk can perform I/O functions for data hosts and is fault tolerant, but has degraded performance due to one missing drive. This might indicate that a disk drive has failed in the virtual disk or that the virtual disk is reconstructing.
  • Page 26 The System Panel at the bottom of each page includes system information, the overall status of system components, controller information, and the Event Log icon. The following information is shown: System information – The system’s name and location. Overall status – The Virtual Disk category shows the status of virtual disks in the system.
  • Page 27 The Help submenu in the Monitor menu provides the following options for getting online help: Getting Started – Shows information about configuring your browser to use SMU and shows tips for using SMU. Subject Index – Provides an alphabetically ordered list of actions you can perform in SMU.
  • Page 29 This chapter describes how to use SMU to configure your system for the first time. It contains the following sections: “Configuring Preferences” on page 29 “Configuring User Access” on page 31 “Managing Licenses” on page 35 “Setting System Information” on page 37 “Setting Date and Time”...
  • Page 30 2. Set the following options: Page Refresh Rate Select how often you want pages to refresh based on the speed of your computer and Ethernet connection. • Fast – Use for fast computers with a fast Ethernet connection. For example, Pentium III 500 MHz or higher with a T1 connection.
  • Page 31 By default, the system provides three users that can access the system. In addition to these users, which you can modify, you can add 10 other users (13 maximum). The user configuration function enables you to define user roles by setting specific access privileges.
  • Page 32 User access privileges are based on the following user types: Standard – Enables access to most functions. Advanced – In addition to enabling Standard functions, enables access to infrequently used administrative functions. Diagnostic – In addition to enabling Standard and Advanced functions, enables access to troubleshooting functions.
  • Page 33 For security reasons, create different usernames unique to your site. If you keep the default ones, change their default passwords. 4. Change the user’s password. The password is case sensitive and can include 19 characters. Allowed characters include letters, numbers, hyphens, underscores, and spaces. 5.
  • Page 34 SMU allows a maximum of 13 users, including the three default users shown in Table 2-1. To add a user: 1. Select Manage > General Config > User Configuration > Add Users. The Add System User panel displays the current list of configured users. 2.
  • Page 35 You can delete any user from the system, including the default users. The deletion of a system user cannot be undone. To delete a user: 1. Select Manage > General Config > User Configuration > Delete Users. The System User List panel displays the current list of configured users. 2.
  • Page 36 To view installed licenses: Select Manage > General Config > License Management > Installed Licenses. The Licensed Features Installed panel shows whether a license certificate file is installed and the status of licensed features. For a licensed feature that has a quantity limit, the panel shows the maximum quantity available with the license and the baseline maximum quantity available without a license.
  • Page 37 You can specify information about the system to enable you to identify it. The system name and location are displayed in the System Panel. To set system information: 1. Select Manage > General Config > System Information. The System Information panel is displayed. 2.
  • Page 38 If no NTP server is present, the date and time are maintained as if NTP had not been enabled. To manually set the system date and time: 1. Select Manage > General Config > Set Date/Time. 2. In the Set System Date panel, select the current month, day, and year. 3.
  • Page 39 This section describes how to configure host ports on Fibre Channel (FC) or iSCSI controller modules. No host-port configuration is needed for SAS controller modules. On the Host Port Configuration page you can view the location, link speed, and topology of each FC host port in each controller module. This page shows the following information: Port number and location –...
  • Page 40 A host port’s link speed must match the speed of the host (HBA or switch) to which the port is connected. In a dual-controller system, setting the speed of host port 0 on one controller also sets the speed of host port 1 on the other controller. A speed mismatch with the host prevents the host from accessing the storage system.
  • Page 41 0–125 – Select a specific number if you want the loop ID to stay the same after you power down and power up. SMU cannot determine which loop IDs are available. If the controller cannot get the specified loop ID during the loop initialization process, it tries to get a soft address.
  • Page 42 To change the host port interconnect setting: 1. Select Manage > General Config > Host Port Configuration. 2. In the Advanced Options panel, click Change FC Port Interconnect Settings. The Host Port Configuration panel displays the current interconnect setting. 3. Set Internal Host Port Interconnect to Interconnected (enabled) or Straight-through (disabled).
  • Page 43 If host port interconnects are enabled, the paired ports are connected in a loop and must be set to use loop topology. Changing the topology setting for one host port automatically changes the setting for the paired port on the partner controller. If host port interconnects are disabled, you can change the topology setting for each host port individually.
  • Page 44 You can configure the following settings for the iSCSI ports on each MSA2012i controller module. Settings that are common to all iSCSI ports are: Authentication – Enables or disables use of Challenge-Handshake Authentication Protocol (CHAP). Disabled by default. To set CHAP names and shared secrets, see “Configuring iSCSI Login Authentication”...
  • Page 45 iSNS Address – Specifies the IP address of an iSNS server. The default address is all zeroes. Alternate iSNS Address – Optional. Specifies the IP address of an alternate iSNS server, which can be on a different subnet. The default address is all zeroes. Settings that can differ for each port are: IP Address –...
  • Page 46 On the Manage CHAP page you can create, view, modify, and delete entries. Panels on this page have these icons: – Click to show the panel’s content. Expand panel icon – Click to hide the panel’s content. Collapse panel icon –...
  • Page 47 To view a CHAP entry: 1. Select Manage > General Config > Manage CHAP. The CHAP Entries panel lists entries by node name. 2. Click the entry to view. The entry’s names and secrets are displayed in the CHAP Entry Details panel. To modify a CHAP entry’s secret or mutual-CHAP values: 1.
  • Page 48 You can configure addressing parameters for each controller’s Ethernet management port and the timeout value for Telnet sessions. You can also view and configure the SNMP event filter and the web page caching mode. If you accessed SMU for the first time using the default IP address, you should set the IP address for each controller.
  • Page 49 To set IP values for Ethernet management ports: 1. Select Manage > General Config > LAN Configuration. 2. In the IP Address Assignment panel, set Source For IP Address to Manual. 3. In the IP Configuration panel for each controller, set appropriate values for your network.
  • Page 50 Your storage system supports a Simple Network Management Protocol (SNMP) management information base (MIB) that includes a table of events that have occurred on the system. You can filter the criticality of events that are included in this table. The filter is applied as events are put into the table. Changing the filter does not affect events already recorded in the table;...
  • Page 51 The web page caching mode controls how SMU handles web page names. The names interact with your browser’s caching operations to determine which pages and image files are retrieved. To set the web page caching mode: 1. Select Manage > General Config > LAN Configuration. 2.
  • Page 52 You can configure network management services and in-band management services to limit the ways in which users and host-based management applications can access the system. If a service is disabled, it continues to run but cannot be accessed. For information about permitting users to use enabled WBI, CLI, or FTP services, see “Configuring User Access”...
  • Page 53 You can configure how and under what conditions the system alerts you when specific events occur. The system generates events having three severity levels: Critical – Something related to the system or to a virtual disk has failed and requires immediate attention. Warning –...
  • Page 54 You can enable or disable the following notification methods for selected event categories or individual events: Visual Alerts – SMU shows a visual alert indicator that a notification event has occurred. To see this, SMU must be operating on a management host. Email Alerts –...
  • Page 55 To select event categories for notification: 1. On the Event Notification Summary page, for each category you want to be notified of, select a notification method. For example, to receive email for all critical events, in the All Critical Events row select only the Email Alerts check box.
  • Page 56 3. Select a value for Maximum Events to Display at One Time. SMU can display a maximum of 100 events at a time; the default is 10. For example, if 10 events can display at a time and 15 are pending then the pop-up window shows the first 10 events and clicking the Acknowledge button will show the remaining events and new events that might have occurred.
  • Page 57 2. Type values in the following fields: Email Address 1–4 – Email addresses that the system should send notifications to. Email addresses must use the format Email Comment – Text to send with email messages. For example, you might want to identify the location, name, or use of the system. Mail Server –...
  • Page 58 You can configure the following options for SNMP notification of events: Read and write community strings IP addresses of hosts that are configured to receive SNMP traps To configure SNMP traps: 1. Select Manage > Event Notification > SNMP Configuration. 2.
  • Page 59 The disadvantage of ICPM is that if a controller fails, the other controller cannot fail over (that is, take over I/O processing for the failed controller). If a controller fails, the host loses access to the volumes owned by that controller. If a controller experienced a complete hardware failure, and needed to be replaced, then user data in its write-back cache is lost.
  • Page 60 As an Advanced Manage user, you can save the storage system’s configuration settings to a file. This enables you to make a backup of your settings in case a subsequent configuration change causes a problem, or if you want to apply one system’s settings to another system.
  • Page 61 You can restart or shut down controllers when a controller is not working properly or when the system will be serviced or moved. You can restart one or both controllers when: SMU informs you that you have changed a configuration setting that requires restarting A controller does not seem to be working properly When you restart a controller, its Management Controller and Storage Controller...
  • Page 62 Shut down a controller module before you remove it from an enclosure, or before you power off its enclosure for maintenance, repair, or a move. Shutting down a controller module halts I/O to that module, ensures that any data in the write cache is written to disk, and initiates failover to the partner controller, if it is active.
  • Page 63 This chapter describes how to use SMU to configure and manage virtual disks, spare disks, volumes, volume-to-host mappings, and to use volume snapshot features. It contains the following sections: “Creating Virtual Disks and Volumes” on page 63 “Managing Virtual Disks” on page 71 “Managing Spares”...
  • Page 64 The following table specifies the minimum and maximum numbers of disk drives supported for each RAID level. For more information about RAID levels, see Appendix B. Non-RAID To create a mirror with more than two drives, use RAID 10. RAID 10 must have the same, even number of drives in each sub-vdisk.
  • Page 65 You can create a virtual disk automatically or manually: Automatic Virtual Disk Creation (Policy-based) creates a virtual disk based on minimal information. See “Creating a Virtual Disk Automatically” on page 65. Manual Virtual Disk Creation (Detail-based) creates a virtual disk based on parameters you select, which provides greater control over the configuration than Automatic Virtual Disk Creation.
  • Page 66 5. Set Minimum Size Of Virtual disk to the amount of available space to use for all volumes on the new virtual disk. This value is rounded to the nearest Gbyte and is shown to the right of this field as Targeted Virtual Disk Size.
  • Page 67 To create a virtual disk manually: 1. Select Manage > Virtual Disk Config > Create A Vdisk. 2. Select Manual Virtual Disk Creation. 3. Type a name for the virtual disk. The name is case sensitive and can include 17 characters, but not comma, quotation mark ("), or backslash.
  • Page 68 7. Select the drives to use in the virtual disk. Only available drives are selectable. Available drives are neither in a virtual disk nor assigned as a spare. The minimum and maximum number of drives that you can select when creating a virtual disk are shown in Table 3-1.
  • Page 69 d. Click Continue. The Configure Volumes For Virtual Disk page is displayed and summarizes your selections. 10. (Optional) Set How Many Volumes to the number of standard volumes you want in your virtual disk. You can create a virtual disk that has no volumes (the default), one volume, or multiple volumes (online initialization only).
  • Page 70 13. Click Create Virtual Disk. The system creates the virtual disk and shows the next page in the process. If you accepted the default volume options, the final page shows the progress of virtual disk initialization. Proceed to “Virtual Disk Initialization” on page 70. If you changed any of the volume options, an Add Volumes To Virtual Disk page is displayed showing information based on your selections from the previous page.
  • Page 71 SMU enables you to manage virtual disks in a variety of ways. You can: View the status of virtual disks and disk drives Expand virtual disk capacity Removing a virtual disk from quarantine Verify a virtual disk Change a virtual disk’s owner Change a virtual disk’s name Delete a virtual disk For information about reconstructing a failed virtual disk, see “Troubleshooting...
  • Page 72 Critical – Either the virtual disk is being initialized or reconstructed; or, one drive is down or missing in a RAID 1, 3, 5, 10, or 50 virtual disk; or, two drives are down in a RAID 6 virtual disk. Offline –...
  • Page 73 To view information about the drives in a virtual disk: 1. Select Manage > Virtual Disk Config > Vdisk Configuration > Disk Drive Status. For each virtual disk, the virtual disk panel shows a status icon; the name, RAID level, size, number of disk drives, and number of volumes; and utility status, if any. 2.
  • Page 74 You can expand the capacity of a virtual disk by adding drives to it. Because virtual disk expansion does not require I/O to be quiesced, the virtual disk can continue to be used while the Expand utility runs. Expanding a virtual disk adds free space after the space used by existing volumes.
  • Page 75 4. Click Expand Virtual Disk. Expansion begins and the percentage completed is shown. You can perform other functions during the expansion. You can view the status of the expansion on the Vdisk Utility Progress page or on any page that shows virtual disk icons. To check the status of any running virtual disk utilities: Select Manage >...
  • Page 76 The quarantined virtual disk’s drives are “write locked,” and the virtual disk is not available to hosts until the virtual disk is removed from quarantine. The system waits indefinitely for the missing drives. If the drives are found, the system automatically removes the virtual disk from quarantine.
  • Page 77 The verification process checks whether the redundancy data in the virtual disk is consistent with the user data in the virtual disk. The number of inconsistencies found is noted in the “Vdisk verification complete” event (event code 21) in the event log.
  • Page 78 Each virtual disk is owned by one of the controllers. SMU balances the number of virtual disks each controller owns. In a dual-controller system, when a controller fails, the partner controller assumes temporary ownership of the failed controller’s virtual disks and resources. If the system uses a fault-tolerant cabling configuration, both controllers’...
  • Page 79 To change the name of a virtual disk: 1. Select Manage > Virtual Disk Config > Vdisk Configuration > Change Vdisk Name. For each virtual disk, the virtual disk panel shows a status icon; the name, RAID level, size, number of disk drives, and number of volumes; and utility status, if any. 2.
  • Page 80 Controllers in your system automatically reconstruct redundant (fault-tolerant) virtual disks (RAID 1, 3, 5, 6, 10, and 50) if a virtual disk becomes critical and a properly sized spare disk is available. A virtual disk becomes critical when one or more of its disks fails.
  • Page 81 To configure dynamic spares: 1. Select Manage > General Config > System Configuration. 2. Set Dynamic Spare Configuration to Enabled. 3. Click Change System Configuration. When Dynamic Spare Configuration is enabled, the Dynamic Spare Rescan Rate option is displayed. Use the default rescan rate. 4.
  • Page 82 To add spares to a virtual disk: 1. Select Manage > Virtual Disk Config > Vdisk Configuration > Add Vdisk Spares. For each virtual disk, the virtual disk panel shows a status icon; the name, RAID level, size, number of disk drives, and number of volumes; and utility status, if any. 2.
  • Page 83 This section describes how to designate available drives as spares for use by any virtual disk. It also describes how to return spares to the pool of available drives. You can designate a maximum of eight global spares for the system. If a disk in any redundant virtual disk (RAID 1, 3, 5, 6, 10, and 50) fails, a global spare is automatically used to reconstruct the virtual disk.
  • Page 84 To display global spares: Select Manage > Virtual Disk Config > Global Spare Menu > Show Global Spares. Drives whose icons are gray with a “G” are global spares. SMU lets you manage volumes in a variety of ways. You can: Add a volume Expand a volume View volume status information...
  • Page 85 You can give each volume a name. Assign names that indicate how the volumes are to be used. For example, if the first volume will be used to store your customer database, give it a name such as: When you create a virtual disk, you can specify the number of volumes you want and their sizes.
  • Page 86 You must have free space in a virtual disk before you can add a volume. You can create free space by deleting a volume (see “Deleting a Volume” on page 93) or by expanding the virtual disk (see “Expanding Virtual Disk Capacity” on page 74). You can add volumes to a virtual disk until you use all of the free space.
  • Page 87 You can expand a standard volume or a snap pool if the virtual disk has free space and sufficient resources. Because volume expansion does not require I/O to be quiesced, the volume can continue to be used while it is expanded. To expand a volume: 1.
  • Page 88 On Volume Management pages, the Volume Menu panel shows a color-coded “map” of the space used by each volume in the selected virtual disk. The color codes are: Gray – Free space Green – Standard volume Blue – Snap pool Orange –...
  • Page 89 3. Select the volume to rename. 4. In the Change Volume Name field, type a new name. The name is case sensitive and can include 20 characters, but not comma, quotation mark ("), or backslash. 5. Click Change Volume Name. When processing is complete, the new name is displayed in the Volume Menu panel.
  • Page 90 3. Select the standard, snap-pool, or master volume whose cache settings you want to change. 4. Set Read Ahead Size to one of the following options: Default – Sets one chunk for the first access in a sequential read and one stripe for all subsequent accesses.
  • Page 91 As an Advanced Manage user, you can change a volume’s write-back cache setting. Write-back is a cache-writing strategy in which the controller receives the data to be written to disk, stores it in the memory buffer, and immediately sends the host operating system a signal that the write operation is complete, without waiting until the data is actually written to the disk drive.
  • Page 92 To change a volume’s write-back cache setting: 1. Select Manage > Volume Management > Volume Menu > Write Back Cache. For each virtual disk, the virtual disk panel shows a status icon; the name, RAID level, size, number of disk drives, and number of volumes; and utility status, if any. 2.
  • Page 93 Power Supply Failure Trigger – Changes to write-through if a power supply unit fails. The default is Disabled. Fan Failure Trigger – Changes to write-through if a cooling fan fails. The default is Disabled. Overtemp Failure Trigger – Forces a controller shutdown if a temperature is detected that exceeds system threshold limits.
  • Page 94 5. Click OK to confirm the operation or Cancel to stop it. If you clicked OK, a message indicates whether the operation succeeded. If it succeeded, the volume is removed from the Volume Menu panel. Each volume has default host-access settings that were set when the volume was created;...
  • Page 95 The following topics describe managing the host list on an FC, SAS, or iSCSI storage system. The global host list is a list of ports on a host HBA or FC switch that can be used for volume mapping. The list is automatically populated with port WWNs of hosts that have sent an command or a command to the system.
  • Page 96 2. Click Add New Port. If the WWN and nickname are not in the list, the port is added. If the WWN is in the list, the nickname is changed. If the nickname is in the list, you must specify a unique nickname.
  • Page 97 To add a port or change a port’s nickname: 1. In the Add Port To Global Host Port List panel, type the port WWN and a nickname. The name is case sensitive and can include 15 characters, but not comma, quotation mark ("), or backslash.
  • Page 98 To display the global host list: Select Manage > General Config > Manage Host List. The Global Host List panel shows the node name, any controller ID and port numbers through which the host has logged in, and the nickname (if any) for each host node.
  • Page 99 In the Map Hosts To Volume page you can add, change, or delete explicit mappings between volumes and hosts. Volume mapping changes take effect immediately. Make changes that limit access to volumes when the volumes are not in use. Be sure to unmount a mapped volume from a host system before changing the mapping’s LUN.
  • Page 100 b. To set read-write or read-only access on one or more ports, specify a LUN and select port access privileges. More than one host can use the same LUN to access the same volume. A mapping cannot include both read-write and read-only access.
  • Page 101 3. Select a volume. The Current Host-Volume Relationships panel shows which host nodes have access to the selected volume. For the selected volume you might see the following mappings: All Hosts – Shows the settings used by all host nodes to access the volume. This entry is displayed only if no host nodes are explicitly mapped.
  • Page 102 6. To remove an explicit mapping: a. In the Assign Host Access Privileges panel, select a host node. b. Click Unmap It. When processing is complete, the mapping is removed from the page. Volume mapping changes take effect immediately. Make changes that limit access to volumes when the volumes are not in use.
  • Page 103 b. To set read-write or read-only access on one or more ports, specify a LUN and select the access privilege and ports. More than one host can use the same LUN to access the same volume. If a port is not selected, its access is automatically set to none.
  • Page 104 Snapshot services provide data protection by enabling you to create and save snapshots of a volume, where each snapshot preserves the volume’s data state at the point in time when the snapshot was created. Snapshots can be taken of master volumes only. A master volume is a volume that has been enabled for snapshots.
  • Page 105 The snapshot service uses the single copy-on-write function to capture only data that has changed. That is, if a block is to be overwritten on the master volume, and a snapshot depends on the existing data in the block being overwritten, the data is copied from the master volume to the snap pool before the data is changed.
  • Page 106 How much modified (write) data will the snapshots have? Of the snapshots that will be mounted as read-write and actually written to, factor in the average amount of data that will be modified. Add 750 Mbyte of reserve space for internal use. Add a recommended 25% safety margin to the snap pool in case actual capacity use exceeds the estimate.
  • Page 107 The snapshot service has two features for reverting data back to original data: Deleting only modified data on a snapshot Rolling back the data in a master volume For snapshots that have been made accessible as read-write, you can delete just the modified (write) data that was written directly to a snapshot.
  • Page 109 Before you can convert a standard volume to a master volume or create a master volume for snapshots, a snap pool must exist. A snap pool and its associated master volumes can be in different virtual disks, but must be owned by the same controller. You can create a maximum of 16 snap pools.
  • Page 110 Each snap pool has three policy levels that notify you when the snap pool is reaching decreasing capacity. Each policy level has an associated policy that specifies system behavior when an associated threshold value is reached. The following table summarizes the default thresholds and policies. You can set the Warning and Error thresholds and the Error and Critical policies.
  • Page 111 To set a snap pool’s policies and thresholds: 1. Select Manage > Volume Management > Snapshot Services > Set Snap-Pool Policy. For each virtual disk, the virtual disk panel shows a status icon; the name, RAID level, size, number of disk drives, and number of volumes; and utility status, if any. 2.
  • Page 112 Halt Writes – Halts all writes to the master volume (each write returns an error). Snapshot data is preserved. Delete Oldest Snapshots – Deletes the oldest snapshots until the amount of data in the snap pool is below the threshold. 7.
  • Page 113 5. (Optional) Change the name for the new volume. The default name is . For example, MyVdisk_V1. The name is case sensitive and can include 20 characters, but not comma, quotation mark ("), or backslash. If the default name exceeds 20 characters it will be truncated. 6.
  • Page 114 5. Click Convert To Master Volume. When processing is complete, the volume type is updated in the Volume Menu panel. You can take a snapshot of the data state of a selected master volume. The snapshot data is stored in the snap pool associated with the master volume. To take a snapshot: 1.
  • Page 115 You can reset a snapshot to replace its content with the current data state of the associated master volume. The selected snapshot is replaced with a current snapshot having the same characteristics, such as name and LUN. The snapshot data is stored in the snap pool associated with the master volume.
  • Page 116 Before deleting modified data you must unmount the snapshot from data hosts to avoid data corruption. To delete the modified (write) data from a snapshot: 1. Unmount the snapshot from hosts. 2. Select Manage > Volume Management > Snapshot Services > Delete Modified Data. For each virtual disk, the virtual disk panel shows a status icon;...
  • Page 117 Only one rollback is allowed on the same master volume at one time. Multiple rollbacks on subsequent volumes on the same snap pool are performed sequentially; that is, additional rollbacks are queued until the current rollback is complete. However, after the rollback is requested, the master volume is available for use as if the rollback has already completed.
  • Page 118 You can delete snapshots at any time, including when: The associated snap pool is reaching capacity and you want to free some space The maximum number of snapshots is reached and you want to delete older snapshots You no longer need the data associated with the snapshot To delete a snapshot: 1.
  • Page 119 3. Select a volume. The Volume Information panel shows the following information, depending on the type of volume selected. (All) Volume Type One of the following volume types: (not shown for standard Master – A standard volume that is enabled for volumes) snapshots and is associated with a snap pool.
  • Page 120 Master Volume Status Indicates whether the snapshot is Available or Unavailable. Status Reason Shows the reason for Unavailable status: • MV Not Ready (master volume is not ready) • SP Not Ready (snap pool is not ready) • SP Not Found (snap pool is not found) •...
  • Page 121 Snap Data – The total amount of data associated with the specific snapshot (data copied from a master volume to a snapshot and data written directly to a snapshot). Unique Data – The amount of data that has been written to the snapshot since the last snapshot was taken.
  • Page 123 Some guidelines to keep in mind when performing a volume copy include: The virtual disk selected for the volume copy must be on the same controller. The virtual disk selected for the volume copy must have free space that is at least as large as the mount of space allocated to the original volume.
  • Page 124 You can copy a master volume or a snapshot to a new standard volume. The volume-copy operation takes a snapshot of all data in the source volume and creates a destination volume that you specify. The destination volume must be in a virtual disk owned by the same controller as the source volume.
  • Page 125 6. If the source volume is a snapshot, select whether the copy should include or exclude data modified in the snapshot since it was taken. The default is Exclude, which means that the copy will contain only the data that existed when the snapshot was taken.
  • Page 126 Volume is presented to all hosts not explicitly mapped – Specifies whether the volume is visible to all connected hosts. If the value is Yes, the LUN is also shown. Volume Serial Number – Serial number of the volume being created. Source Volume Name –...
  • Page 127 You can use the Scheduler feature to create tasks and define schedules at which the system will automatically perform those tasks. Actions you can perform on the Scheduler page are: Create tasks to take a snapshot, reset a snapshot, or copy a volume View task information Delete tasks Schedule tasks...
  • Page 128 3. Select Take Snapshot. 4. Select a master volume to take snapshots of. 5. Specify a prefix to identify snapshots created by this task. The prefix is case sensitive and can include 14 characters, but not comma, quotation mark ("), or backslash. Automatically created snapshots are named , where increments from 0001 to 9999 before rolling over.
  • Page 129 5. Specify a name for the task. The name is case sensitive and can include 32 characters. Allowed characters include letters, numbers, hyphens, underscores, and spaces. 6. Click Create Task. The Tasks panel is updated and task information is displayed in the Task Details panel.
  • Page 130 9. Click Create Task. The Tasks panel is updated and task information is displayed in the Task Details panel. To view information about existing tasks: 1. Select Manage > Scheduler > Manage Scheduler. The Tasks panel shows the name, type, and status of existing tasks. If a task fails, an error icon is displayed and the task type and status are shown in red.
  • Page 131 Include modified data Last copy created, if the task has run Error message, if any You can delete an unscheduled task. If the task is scheduled, you must delete the schedule first. To delete a task: 1. Select Manage > Scheduler > Manage Scheduler. 2.
  • Page 132 Only On – Specifies days when the task should run. You can select a combination of: any day or a day by number; a day by type or name; and all months or a month by name. For the day number, the Specific option uses a number you type in an adjacent field.
  • Page 133 To delete a schedule: 1. Select Manage > Scheduler > Manage Scheduler. 2. In the Schedules panel click a schedule name. 3. In the Schedule Details panel, click Delete Schedule. 4. Click OK to confirm the operation or Cancel to stop it.
  • Page 135 This chapter describes how to use SMU to manage a system’s disk drives and enclosures. Topics covered in this chapter are: “Managing Disk Drives” on page 135 “Managing Enclosures” on page 142 SMU provides a variety of functions related to disk drives. You can view two types of information about disk drives: A list of all disk drives connected to the system The status of all disk drives in a virtual disk...
  • Page 136 To view the status of the drives in a selected virtual disk: Select Manage > Virtual Disk Config > Vdisk Configuration > Disk Drive Status. For a description of the information contained on this page, see “Disk Drive Status” on page 73. If a disk drive has failed or malfunctioned, it might not be listed.
  • Page 137 As an Advanced Manage user, you can configure the ability to change the Self- Monitoring Analysis and Reporting Technology (SMART) settings for all disk drives in the storage system. When SMART is enabled, SMART events are recorded in the event log and are counted on the Disk Error Stats page. This information enables you to monitor your disk drives or analyze why a disk drive failed.
  • Page 138 To view a disk drive’s read-cache status: 1. Select Manage > Utilities > Disk Drive Utilities > Display Disk Cache. The page shows the enclosure view with a drive selected, and shows the drive’s read-cache status. The first drive in the enclosure is selected by default. 2.
  • Page 139 To view the firmware version (revision) and type of each disk drive in each enclosure connected to the system, do either of the following: Select Manage > Update Software > Disk Drive Firmware > Show Disk Drives. The page shows similar information to the Disk Drive List page; see “Disk Drive List”...
  • Page 140 3. Ensure that no other user is performing administrative functions on the storage system. 4. Verify that background scrub is disabled. “Enabling and Disabling Background Scrub for Disks” on page 189. 5. Back up the data for the virtual disk that the drive is part of. 6.
  • Page 141 6. Click Browse to select the firmware update file. 7. Click Load Device Firmware File. 8. To start the firmware update, click Start Firmware Update. To cancel the firmware update, click Cancel. The file is transferred to the controller where it is temporarily stored prior to download to the disk drives.
  • Page 142 Each controller module and expansion module contains an Expander Controller (EC). The storage system can query EC for information about enclosure environmental conditions such as temperature, power supply and fan status, and the presence or absence of disk drives. The system can also communicate information to the EC about RAID activities such as disk drive rebuilds and failed disk drives.
  • Page 143 To view enclosure details: 1. Select Manage > General Config > Enclosure Management. 2. Pause your cursor over an enclosure icon. A pop-up shows the enclosure status and other details. To enter the name, location, rack number, and rack position for an enclosure: 1.
  • Page 144 To illuminate an enclosure LED to help you visually locate the enclosure: 1. Select Manage > General Config > Enclosure Management. 2. If there is more than one enclosure, select the enclosure to locate. 3. Click Illuminate Locator LED. To stop illuminating an enclosure LED: 1.
  • Page 145 Rescan forces rediscovery of attached disk drives and enclosures. If both Storage Controllers are online, it also forces re-evaluation of the enclosure IDs of attached drive enclosures, so that IDs are assigned based on controller A’s enclosure cabling order. A manual rescan may be needed after system power-up to display enclosures in the proper order.
  • Page 146 Total Number of this Type – The number of expansion modules that have the same vendor, model, and firmware revision. For example, two identical expansion modules with different firmware revisions are considered to be different types. If firmware update is not supported for an expansion module type, the Select column shows “Not Supported”...
  • Page 147 8. Click Load Device Firmware File. 9. To start the firmware update, click Start Firmware Update. To cancel the firmware update, click Cancel. The file is transferred to the RAID controller where it is temporarily stored prior to download to the enclosure. Once the firmware update process has started, a page shows the update progress of each enclosure, including when the firmware update has completed successfully.
  • Page 149 This chapter describes how to use SMU to monitor your system to ensure that its components are working properly. Topics covered in this chapter are: “Displaying Status Information” on page 149 “Viewing the Event Log” on page 171 “Viewing Statistics” on page 171 “Displaying Notification Events”...
  • Page 150 To display the Status Summary page from another SMU page: Select Monitor > Status > Status Summary. You can view detailed information about a virtual disk’s status, including its disk drives and volumes. You can display virtual disk status information in two ways. To view virtual disk (vdisk) status from the menu: Select Monitor >...
  • Page 151 Number Of Spares – Number of spares assigned to the virtual disk. Number Of Volumes – Number of volumes in the virtual disk. Virtual Disk Name – Name assigned to the virtual disk. Virtual Disk Serial Number – Unique number assigned by the owning controller. Preferred Owner –...
  • Page 152 This section describes status information shown for host ports on Fibre Channel (FC), iSCSI, or SAS controller modules. The Host Port Status page shows a graphical representation of the host ports on each controller, including a color-coded status for each port. To display host port status information: 1.
  • Page 153 Topology – One of the following values: Point-to-Point Loop, if the loop is inactive Private Loop, if the port is directly attached to a host Public Loop, if the port is attached to a switch To change this setting, see “Setting FC Host Port Topology” on page 42. Speed –...
  • Page 154 Details in the lower part of the panel vary depending on the selected port's status. iSCSI Port Status Details – Selected controller and port number Link Status – Link is up or down Qualified Name – iSCSI qualified name (IQN) Link Speed –...
  • Page 155 Details in the lower part of the panel vary depending on the selected port’s status. Topology – Port connection type. Speed – Actual link speed in Gbit per second per PHY lane. Number of Active Lanes - The number of active PHY lanes and the number of lanes in the port.
  • Page 156 Belongs To Virtual Disk – Different information depending on the drive’s status: If used in a virtual disk, the virtual disk name. If used as a spare, the type of spare. If unused, Available. If contains leftover metadata, Leftover. A Manage user can return leftover drives to available status;...
  • Page 157 Model – Enclosure model number Version – Expander Controller software version WWN – Enclosure node World Wide Name For a drive the following information is displayed. Drive Status – Up if operational or Down if failed. Encl – Number of the enclosure containing the drive. Slot –...
  • Page 158 You can view Ethernet and IP information for each controller, and information about the system. To change the LAN settings, see “Configuring Ethernet Management Ports” on page 48. To change the system information, see “Setting System Information” on page 37. To view LAN information: Select Monitor >...
  • Page 159 You can view summary status information for each controller module and all enclosures in the storage system. More detail is available on other Monitor pages. To view module status: Select Monitor > Status > Module Status. The Rear Panel Chassis View shows the back of the controller enclosure and the current status of power-and-cooling modules and controller modules.
  • Page 160 The status is OK when there are no critical or warning conditions for the element type. If no enclosure polling data is available, a message is displayed stating this. For information about a critical or warning condition, view the event log; see “Viewing the Event Log”...
  • Page 161 You can view information about field-replaceable units (FRUs) other than drive modules in an enclosure. For information about installed drive modules, see “Disk Drive List” on page 155. To view FRU information: 1. Select Monitor > Status > Advanced Settings > FRU Information. The drive enclosure panel shows all enclosures in the system and the status of each enclosure.
  • Page 162 Location – Enclosure location, if set. Status – Specifies whether the enclosure is OK or has an error. Misc – Enclosure ID, which is 0 for a controller enclosure and increments from 1 for attached drive enclosures. World Wide Name – Enclosure node World Wide Name. Model –...
  • Page 163 As an Advanced user, you can view the current temperature status of each temperature sensor in each controller module. Each controller has six temperature sensors. To change the temperature display mode, see “Configuring Preferences” on page 29. To view temperature status: Select Monitor >...
  • Page 164 To view information about all volumes in the system: Select Monitor > Status > Advanced Settings > Volume Information. The Volume Information panel shows the following information. Pref Owner – Preferred owner; the controller that owns the virtual disk during normal operation (Shown in dual-controller mode) Curr Owner –...
  • Page 165 As an Advanced user, you can view the following categories of configuration settings: general, RAID controller, EMP, security access to services, user preferences, and Network Time Protocol (NTP). To view miscellaneous configuration settings: Select Monitor > Status > Advanced Settings > Misc Configuration. The information is displayed in five panels.
  • Page 166 SMART – Shows whether Self-Monitoring Analysis and Reporting Technology (SMART) settings for all drives in the system can be changed. The setting can be Enabled, Disabled, or Don't Modify. The default is Enabled. For more information, see“Enabling or Disabling SMART Changes” on page 137. The RAID Controller Status panel shows the following information for each controller: Hardware Status –...
  • Page 167 Auto-Logout Timeout – The number of idle minutes before SMU session times out and requires you to log back in, or “No timeout.” The default is 30 minutes. Temperature Display Mode – Fahrenheit or Celsius for all temperature status displays. The default is Celsius. The Network Time Protocol panel shows the following information.
  • Page 168 To view expander status information: 1. Select Monitor > Status > Advanced Settings > Expander Status. 2. Select an enclosure. The information is displayed in three panels. The Enclosure Details panel shows the following information about the selected enclosure: Name – Name assigned to the enclosure. Vendor –...
  • Page 169 Type – Specifies one of the following: Disk – Communicates between the expander and a disk drive. Inter-Exp – (Controller module only) Communicates between the expander and the partner’s expander. SC – (Controller module only) Communicates between the expander and the Egress –...
  • Page 170 Invalid Doubleword Count – Specifies the number of invalid doublewords that have been received by the PHY, not including those received during Link Reset sequences. Reset Error Count – Specifies the number of times the expander performed a reset. Phy Disabled – Specifies whether the PHY is enabled (True) or disabled (False).
  • Page 171 The system’s event log contains important information about the status of the system, virtual disks, and disk drives. Check it regularly to monitor the status of your system. For information about viewing the event log and about specific events and errors, see “Using Event Logs” on page 218. Viewing statistics can help you interpret performance based on configuration of an individual element of your storage solution, such as FC HBA, iSCSI Ethernet adapter, driver, SAN, or host operating system.
  • Page 172 You can view the following I/O statistics for all virtual disks: The total IOPS and bandwidth for all virtual disks The IOPS and bandwidth for each virtual disk To view overall rate statistics for virtual disks: Select Monitor > Statistics > Overall Rate Stats. Statistics shown are based on host-side activity in the interval since the page was last refreshed.
  • Page 173 You can view the following I/O statistics for a selected virtual disk: The total IOPS and bandwidth for all volumes in the virtual disk The IOPS and bandwidth for each volume in the virtual disk To view volume rate statistics. 1.
  • Page 174 3. Select the volume whose statistics you want to view. Statistics shown are based on host-side activity in the interval since the page was last refreshed. The page automatically refreshes at a 60-second interval. As an Advanced user, you can view the overall performance of volumes and related ports.
  • Page 175 I/O Timeout Count The number of times the drive accepted an I/O request but did not complete it in the required amount of time. Excessive timeouts can indicate potential device failure (media retries or soft, recoverable errors) No Response Count The number of times the drive failed to respond to an I/O request.
  • Page 176 As an Advanced user, you can view information about overall disk space usage for all disk drives in the storage system. The following information is displayed about virtual disk space, excluding spares. Volume Space Space for user data storage. Free Space Space allocated for a virtual disk but not used by volumes.
  • Page 177 The following information is displayed about spares and unused space. Virtual Disk Spare Space Space on spare disk drives that are designated for use by a specific virtual disk. Global Spare Space Space on spare disk drives that are designated for use by any virtual disk.
  • Page 178 To reset statistics: 1. Select Monitor > Statistics > Reset All Statistics. 2. Click the button for the statistics you want to reset. A message is displayed indicating whether the reset succeeded. The Show Notification Events panel shows events that have occurred that were selected for Visual Notification.
  • Page 179 The following additional status information will help you monitor the system: Using the debug log as explained in “Troubleshooting Using SMU” on page 195. LED status descriptions in the user guide.
  • Page 181 This chapter describes how to use SMU to run system utilities and perform advanced configuration tasks. Topics covered in this chapter are: “Updating Software” on page 181 “Changing Utility Priority” on page 183 “Scanning for Device Changes” on page 184 “Resetting a Host Channel on an FC or SAS System”...
  • Page 182 By default the storage system’s Partner Firmware Upgrade option is enabled, so when you upgrade one controller the system automatically upgrades the partner controller. If Partner Firmware Upgrade is disabled or if the Independent Cache Performance Mode option is enabled, after updating software on one controller you must manually upgrade the partner controller.
  • Page 183 If a service technician tells you to disable partner firmware upgrade: 1. Select Manage > General Config > System Configuration. 2. Set Partner Firmware Upgrade to Disabled. You can change the priority at which the Verify, Reconstruct, Expand, and Initialize utilities run when there are active I/O operations competing for the system’s controllers.
  • Page 184 Rescan forces rediscovery of attached disk drives and enclosures. If both storage controllers are online, it also forces re-evaluation of the enclosure IDs of attached drive enclosures, so that IDs are assigned based on controller A’s enclosure cabling order. A manual rescan may be needed after system power-up to display enclosures in the proper order.
  • Page 185 Making a configuration or cabling change on a host might cause the storage system to stop accepting I/O requests from that host. For example, this problem can occur after moving host cables from one HBA to another on the host. To fix such a problem you might need to reset controller host ports (channels).
  • Page 186 The controller cache contains data that cannot be written out to a virtual disk because that virtual disk is no longer accessible. The virtual disk might be offline or missing. Unwritable cache data can exist if I/O to the virtual disk does not complete because drives or enclosures fail or are removed before the data can be written.
  • Page 187 As an Advanced Manage user, if you have created a backup configuration file as explained in “Saving the Configuration to a File” on page 60, you can load (restore) the configuration data to either: The same system to revert its current configuration to the saved configuration A second system to “clone”...
  • Page 188 3. Click Continue. A new page is displayed whose content depends on the IP address option you selected. 4. If you selected the second option in Step 2: a. Enter network information in the fields. b. Click Continue Restore Process. 5.
  • Page 189 Restoring default settings replaces your current configuration changes with the original manufacturer configuration settings. Some of these settings take effect immediately while others take effect after you restart the RAID controllers. Restoring default settings cannot be undone. To restore all defaults: 1.
  • Page 190 You can prevent hosts from using SCSI commands to change the system’s write-back cache setting. Some operating systems disable write cache. If host control of write-back cache is disabled, the host cannot modify the cache setting. The default is Disabled. This option is useful in some environments where the host disables the system’s write-back cache, resulting in degraded performance.
  • Page 191 Some operating systems do not look beyond LUN 0 if they do not find a LUN 0 or cannot handle noncontiguous LUNs. Missing LUN Response handles these situations by enabling the host drivers to continue probing for LUNs until they reach the LUN to which they have access.
  • Page 192 You can manage the storage system in-band with custom applications written using the Configuration API (CAPI). If you are not using CAPI-based applications, you can disable in-band management. You can also monitor system status in-band based on SCSI Enclosure Services (SES) data. To configure in-band management services: 1.
  • Page 193 To save log information to a file: 1. Select Manage > Utilities > Debug Utilities > Save Logs To File. 2. In the Enter Your Contact Information panel, type contact information and comments to include in the log information file. Contact information provides the support representatives who are reviewing the file a means to identify who saved the log.
  • Page 195 This chapter describes how to use SMU to troubleshoot your storage system and its FRUs. It also describes solutions to problems you might experience when using SMU. Topics covered in this chapter include: “Problems Using SMU to Access a Storage System” on page 196 “Determining Storage System Status and Verifying Faults”...
  • Page 196 The following table lists problems you might encounter when using SMU to access a storage system. You cannot access SMU. • Verify that you entered the correct IP address. • Enter the IP address using the format • If the system has two controllers, enter the IP address of the partner controller.
  • Page 197 The System Summary page shows you the overall status of the storage system. To view storage system status: 1. Select Monitor > Status > Status Summary. 2. Check the status icon at the upper left corner of each panel. A green icon indicates that components associated with that panel are operating normally.
  • Page 198 6. Review the information displayed in the status page. If the fault relates to a controller module or power module, an image of the enclosure is displayed. The module is shaded red if it has a fault or is powered off. The module is overlaid with the words “NOT INSTALLED”...
  • Page 199 4. In the Host-Generated I/O & Bandwidth Totals for All Virtual Disks panel, verify that both indicators display 0 (no activity). A drive becomes a “leftover” when its metadata identifies the drive as being part of a nonexistent virtual disk, or when a controller forces the drive offline because it reported too many errors.
  • Page 200 When you have confirmed a drive fault, record the drive’s enclosure number and slot number. To identify the physical location of a faulty drive: 1. Select Manage > Utilities > Disk Drive Utilities > Locate Disk Drive. 2. Select the faulty drive. If the drive is absent or not fully inserted, it is represented with a white rectangle and is not selectable, as shown in the following example.
  • Page 201 4. Note any error counts displayed for these statistics. SMART Event Count The number of SMART (Self-Monitoring Analysis and Reporting Technology) events that the drive recorded. These events are often used by the vendor to determine the root cause of a drive failure. Some SMART events may indicate imminent electromechanical failure.
  • Page 202 To capture error trend data for one or more drives: 1. Perform the procedure in “Reviewing Disk Drive Error Statistics” on page 200. 2. Create a baseline by clearing the current error statistics. To clear the statistics for one drive, select the drive and click Clear Selected Disk Drive Error Statistics.
  • Page 203 If one or more drives fail in a redundant virtual disk (RAID 1, 3, 5, 6, 10, or 50) and properly sized spares are available, the storage system automatically uses the spares to reconstruct the virtual disk. Virtual disk reconstruction does not require I/O to be quiesced, so the virtual disk can continue to be used while the Reconstruct utility runs.
  • Page 204 Reconstruction can take hours or days to complete, depending on the virtual disk RAID level and size, drive speed, utility priority, and other processes running on the storage system. You can stop reconstruction only by deleting the virtual disk. When isolating data path faults, you must first isolate the fault to an internal data path or an external data path.
  • Page 205 PHYs are tested and verified before shipment as part of the manufacturing and qualification process. But subsequent problems can occur in a PHY because of installation problems such as: A bad cable between enclosures A controller connector that is damaged as a result of attaching a cable and then torquing the cable connector until solder joints connecting the controller connector become fatigued or break Problem PHYs can cause a host or controller to continually rescan drives, which...
  • Page 206 SMU provides an Expander Status page, which contains an Expander Controller Phy Detail panel. This panel shows information about each PHY in the internal data paths between the Storage Controller, Expander Controller, drives, and expansion ports. By reviewing this page you can quickly locate the internal data path that has a fault.
  • Page 207 If the fault isolation firmware disables a PHY, the event log shows a message like the following:. When a PHY has been disabled manually, the event log shows a similar message with a different reason: 1. Ensure that the cables are securely connected. If they are not, tighten the connectors. 2.
  • Page 208 To troubleshoot external data path faults, perform the following steps: 1. Select Monitor > Status > Advanced Settings > Host Port Status. This page provides a graphical representation of controller host port status and port details. 2. Review the graphical representation of host port status. Green –...
  • Page 209 To troubleshoot external data path faults, perform the following steps: 1. Select Monitor > Status > Advanced Settings > Host Port Status. This page provides a graphical representation of controller host port status and port details. 2. Review the graphical representation of host port status. Green –...
  • Page 210 To troubleshoot external data path faults, perform the following steps: 1. Select Monitor > Status > Advanced Settings > Host Port Status. This page provides a graphical representation of controller host port status and port details. 2. Review the graphical representation of host port status. Green –...
  • Page 211 Making a configuration or cabling change on a host might cause the storage system to stop accepting I/O requests from that host. For example, this problem can occur after moving host cables from one HBA to another on the host. To fix such a problem you might need to reset controller host ports (channels).
  • Page 212 To disable or enable a PHY: In the Expander Controller Phy Detail panel, click the PHY's Disable or Enable button. When you disable a PHY, its button changes to Enable and its Status value changes to DISABLED. When you enable a PHY, its button changes to Disable and its status value changes to OK or another status.
  • Page 213 This section describes recovering data from a virtual disk that is quarantined or offline (failed). The quarantine icon indicates that a previously fault-tolerant virtual disk is quarantined because not all of its drives were detected after a restart or rescan. For information about when and how you can recover data from a quarantined virtual disk, see“Removing a Virtual Disk From Quarantine”...
  • Page 214 To enable and use Trust Vdisk: 1. Select Manage > Utilities > Recovery Utilities > Enable Trust Vdisk. 2. Select Enabled. 3. Click Enable/Disable Trust Vdisk. The option remains enabled until you trust a virtual disk or restart the storage system.
  • Page 215 If your task does not run at the times you specified, check the schedule specifications. It is possible to create conflicting specifications. Start time is the first time the task will run. If you use the Between option, the starting date/time must be in the Between range.
  • Page 216 Resetting the storage system date or time might affect scheduled tasks. Because the schedule begins with the start time, no schedules will run until the date and time are set. If the system is configured to use Network Time Protocol (NTP), and if an NTP server is available, the system time and date is obtained from the NTP server.
  • Page 217 Individual event selections do not override the Notification Enabled or Event Categories settings. If the notification is disabled, the individual event selection is ignored. Similarly, Event Categories settings have higher precedence for enabling events than individual event selection. If the critical event category is selected, all critical events cause a notification regardless of the individual critical event selection.
  • Page 218 You can select or clear all individual events for any or all of the notification types. Selecting all individual events is useful if you want to select many events but not all; set all the events on this page, then go to pages for individual events and clear events you don't want.
  • Page 219 The storage system generates events having three severity levels: Informational – A problem occurred that the system corrected, or a system change has been made. These events are purely informational; no action required. Warning – Something related to the system or to a virtual disk has a problem. Correct the problem as soon as possible.
  • Page 220 To view the event log: 1. Do one of the following: In the System Panel, click the icon. In the menu, select Monitor > Status > View Event Log. The event log page is displayed. 2. Click one of the following buttons in the Select Event Table To View panel to see the corresponding events.
  • Page 221 For example: Severity Level Date/Time Event Code Event Serial Number Message Info 2008-08-06 A29856 Time/date has been 09:35:07 changed 2008-04 Uncorrectable ECC error Critical A29809 12:12:05 in buffer memory address 0x0 on bootup You can save event log data to a file on your network as described in “Saving Log Information to a File”...
  • Page 222 For example: Event SN Date/Time Code Severity Controller Description A29856 08-06 09:35:07 Time/date has been changed A29809 08-04 12:12:05 Uncorrectable ECC error in buffer memory address 0x0 on bootup When reviewing events, do the following: 1. Review the critical/warning events. Identify the primary events and any that might be the cause of the primary event.
  • Page 223 You can save the following types of log information to a file: Device status summary, which includes basic status and configuration information for the system. Event logs from both controllers when in active-active mode. Debug logs from both controllers when in active-active mode. Boot logs, which show the startup sequence for each controller.
  • Page 224 8. If prompted to specify the file location and name, do so using a extension. The default file name is . If you intend to capture multiple event logs, be sure to name the files appropriately so that they can be identified later. If you are using Firefox and have a download directory set, the file is automatically saved there.
  • Page 225 No Debug Tracing – Collects no debug data. Custom Debug Tracing – Shows that specific events are selected for inclusion in the log. This is the default. If no events are selected, this option is not displayed. 3. Click Change Debug Logging Setup. 4.
  • Page 227 This appendix describes the Simple Network Management Protocol (SNMP) capabilities that MSA2000 Family storage systems support. This includes standard MIB-II, the Fibre Alliance SNMP Management Information Base (MIB) version 2.2 objects, and enterprise traps. Topics covered in this appendix are: “Introduction”...
  • Page 228 Enterprise event severities are informational, minor, major, and critical. There is a different trap type for each of these severities. The trap format is represented by the HP enterprise traps MIB, . Information included is the event ID, the event code type, and a text description generated from the internal event.
  • Page 229 Specification (FA MIB2.2 Spec). For a full description of this MIB, go to: FA MIB 2.2 is a subset of FA MIB 4.0, which is included with HP System Insight Manager (SIM) and other products. The differences are described in “FA MIB 2.2 and 4.0 Differences”...
  • Page 230 The following table lists the MIB objects, their descriptions and the value set in an MSA2000 Family storage system. Unless specified otherwise, objects are not settable. Revision number for this MIB 0220 Number of connectivity units present Top-level URL of the device; for Default example, .
  • Page 231 Includes the following objects as specified by the FA MIB2.2 Spec Unique identification for this Total of 16 bytes connectivity unit comprised of 8 bytes of the node WWN or similar serial number-based identifier (for example, 1000005013b05211) with the trailing 8 bytes equal to zero Same as Same as...
  • Page 232 Number of sensors in the Same as Same as Same as Same as Number of revisions in the Not supported Not supported 16 bytes of 0s Settable: Display string containing Default: Uninitialized a name for this connectivity unit Name Settable: Display string containing Default: Uninitialized Info information about this connectivity unit...
  • Page 233 Includes the following objects as specified by the FA MIB2.2 Spec of the connectivity Same as unit that contains this revision table Unique value for each See “External Details for between connUnitRevsTable” on 1 and page 238 Vendor-specific string identifying String specifying the code a revision of a component of the version.
  • Page 234 Description the sensor status as a message followed by the appropriate sensor reading. Temperatures display in both Celsius and Fahrenheit; for example, CPU Temperature (Controller Module A): 48C 118F). Reports “Not installed” or “Offline” if data is not available. Type of component being See “External Details for monitored by this sensor connUnitSensorTable”...
  • Page 235 State of the port hardware unknown[1], online[2], offline[3], bypassed[4] Overall protocol status for the port unknown[1], unused[2], ok[3], warning[4], failure[5], notparticipating[6], initializing[7], bypass[8] Technology of the port transceiver unknown[1] for Fibre Channel ports Module type of the port connector unknown[1] Fibre Channel World Wide Name WWN octet for the port, or (WWN) of the port if applicable...
  • Page 236 String describing the addressed See “External Details for port connUnitPortTable” on page 240 Port number represented on the Port number represented on hardware the hardware Not supported 0 (No statistics available) Includes the following objects as specified by the FA MIB2.2 Spec of the connectivity Same as unit that contains this port...
  • Page 237 Not supported SNMP TRAPS The following SNMP traps are supported Maximum number of trap clients Number of trap clients currently 1 if traps enabled; 0 if traps enabled not enabled This trap is generated each time an event occurs that passes the Includes the following objects per the FA MIB2.2 Spec IP address of a client registered...
  • Page 238 Tables in this section specify values for certain objects described in Table A-1. The following table provides external details for the objects Firmware revision for Storage Controller (Controller Module A) Firmware revision for Storage Controller (Controller Module B) Firmware revision for Memory Controller (Controller Module A) Firmware revision for Memory Controller (Controller Module B) Firmware revision for Storage Controller loader (Controller Module A) Firmware revision for Storage Controller loader (Controller Module B)
  • Page 239 The following table provides external details for the objects , and CPU Temperature (Controller Module A) board [8] temperature[3] CPU Temperature (Controller Module B) board [8] temperature[3] FPGA Temperature (Controller Module A) board [8] temperature[3] FPGA Temperature (Controller Module B) board [8] temperature[3] Onboard Temperature 1 (Controller Module A)
  • Page 240 Capacitor Cell 4 Voltage (Controller Module B) board [8] power[9] Capacitor Charge Current (Controller Module A) board [8] currentValue[6] Capacitor Charge Current (Controller Module B) board [8] currentValue[6] Power Supply 1 Voltage, 12V power-supply[5] power[9] Power Supply 1 Voltage, 5V power-supply[5] power[9] Power Supply 1 Voltage, 3.3V...
  • Page 241 4. Configure and enable SNMP traps; see “Configuring SNMP Traps” on page 58. You can manage storage devices using SNMP with a network management system such as HP System Insight Manager (SIM) or HP Instant Support Enterprise Edition (ISEE). See their documentation for information about loading MIBs, configuring events, and viewing and setting group objects.
  • Page 242 The following pages show the source for the HP enterprise traps MIB, . This MIB defines the content of the SNMP traps that MSA2000 Family storage systems generate.
  • Page 245 FA MIB 2.2 is a subset of FA MIB 4.0. Therefore, SNMP elements implemented in MSA2000 Family storage systems can be accessed by a management application that uses FA MIB 4.0. The following tables are not implemented in 2.2: The following variables are not implemented in 2.2:...
  • Page 247 This appendix describes the different RAID levels that virtual disks in your system can use. Topics covered in this appendix are: “Introduction” on page 247 “RAID Level Descriptions” on page 249 “Comparing RAID Levels” on page 252 “Mixing Disk Drive Models” on page 253 The RAID controllers enable you to set up and manage virtual disks, whose storage may be spread across multiple disk drives.
  • Page 248 Testing multiple operating systems or software development (where non-RAID redundancy is not an issue) Fast temporary storage or scratch disks for graphics, page layout, and image rendering Workgroup servers 1 or 1+0 (10) Video editing and production Network operating system, databases, high availability applications, workgroup servers Very large databases, Web server, video on demand 5+0 (50)
  • Page 249 RAID levels are numbered from 0 through 6; a higher RAID level does not necessarily indicate a higher level of performance or fault tolerance. The RAID controllers support RAID levels that have proven to be the most useful for RAID applications: RAID 0, 1, 10, 3, 5, 50, and 6.
  • Page 250 A mirrored virtual disk is also highly reliable, because both disk drives in a pair must fail for the virtual disk to fail. In an virtual disk with five pairs of mirrored disk drives, for example, the virtual disk can maintain its integrity even if five disks fail—as long as each pair is left with one good disk.
  • Page 251 RAID 50 virtual disks are made up of two or more RAID 5 virtual disks, across which data is striped. RAID 50 virtual disks contain redundant information in the form of parity data, which is calculated block-by-block for all user data. As in a RAID 5 virtual disk, the parity information is distributed across the disk drives in the virtual disk and occupies the equivalent capacity of one disk drive per RAID 5.
  • Page 252 Table A-2 illustrates the differences between the different RAID levels. Data striping without Highest performance No data protection: if redundancy one drive fails all data is lost Disk mirroring Very high performance High redundancy cost and data protection; overhead: because all minimal penalty on write data is duplicated, twice performance...
  • Page 253 Combination of RAID 0 Better random read and Lower storage capacity (data striping) and RAID write performance and than RAID 5 5 with distributed parity data protection than RAID 5; supports more drives than RAID 5 Block-level data striping Best suited for large Higher redundancy cost with distributed parity sequential workloads;...
  • Page 255 A volume in a virtual disk can be mapped through all controller host ports (target ports) to all data hosts, or through specific controller host ports to specific data hosts. Each mapping between a volume and a data host includes a logical unit number (LUN) that identifies the mapping.
  • Page 256 This section describes the node and port identifiers presented by FC, iSCSI, and SAS storage systems. Each controller has a unique, permanent node WWN. Each controller host port has a unique port WWN that is based on the node WWN. The WWN format is: –...
  • Page 257 Each controller has a unique, permanent hardware address. Each controller host port has a unique, user-defined IP address. The following table shows example hardware addresses and port IP addresses. Both controllers have the same unique, permanent node WWN. Each controller host port has a unique port WWN that is based on the node WWN.
  • Page 258 When a data host is directly connected to controller host ports, loop topology must be used. The host should have one HBA port connected to each controller. When the host-port interconnects are enabled, the host has access to both controllers’ mapped volumes. If one controller fails in this configuration, the interconnects remain active so hosts can continue to access all mapped volumes without the intervention of host-based multipathing software.
  • Page 259 The following figure shows how port WWNs and mapped volumes are presented if controller B fails.
  • Page 260 The topology only affects how mapped volumes and port WWNs are presented if one controller fails. Whichever topology is used, each data host has dual-ported access to volumes through both controllers. Failover in a switch attach, loop configuration. If one controller fails in a switch attach configuration using loop topology, the host ports on the surviving controller present the port WWNs for both controllers.
  • Page 261 For a system using loop topology, the following figure shows how port WWNs and mapped volumes are presented if controller B fails.
  • Page 262 For a system using point-to-point topology, the following figure shows how port WWNs and mapped volumes are presented if controller B fails.
  • Page 263 The high-availability configuration requires two gigabit Ethernet (GbE) switches. During active-active operation, both controllers’ mapped volumes are visible to both data hosts. A dual-controller MSA2012i storage system uses port 0 of each controller as one failover pair and port 1 of each controller as a second failover pair. If one controller fails, all mapped volumes remain visible to all hosts.
  • Page 264 The following figure shows how port IP addresses and mapped volumes are presented if controller B fails.
  • Page 265 The SAS storage system uses Unified LUN Presentation (ULP). ULP is a controller software feature that enables hosts to access mapped volumes through both controllers’ host ports (target ports) without the need for internal or external switches. In a dual-controller SAS system, both controllers share a unique node WWN so they appear as a single device to hosts.
  • Page 266 If a controller fails, the hosts maintain access to all of the volumes through the host ports on the surviving controller, as shown below. In the following configuration, each host has a non-redundant connection to all mapped volumes. If a controller fails, the hosts connected to the surviving controller maintain access to all volumes owned by that controller.
  • Page 267 This appendix shows the SMU menu hierarchy. As described in “Introducing and Using SMU” on page 17, user configuration affects the SMU menu. “Standard and Advanced User Functions” on page 267 lists the SMU functions available to Standard and Advanced users. “Diagnostic User Functions”...
  • Page 268 – Advanced Settings • Controller Versions “Controller Versions” on page 160 • FRU Information “FRU Information” on page 161 • Disk Drive List “Disk Drive List” on page 155 • Host Port Status “Host Port Status” on page 152 • Volume Information “Volume Information”...
  • Page 269 – Virtual Disk Vdisk Configuration Config • Vdisk Status “Virtual Disk Status” on page 71 • Disk Drive Status “Viewing Virtual Disk and Disk Drive Status Information” on page 71 • Verify Virtual Disk “Starting Virtual Disk Verification” on page 77 •...
  • Page 270 – Volume Volume Menu Management • Volume Status “Viewing Volume Status Information” on page 87 • Add Volume “Adding a Volume” on page 86 • Delete Volume “Deleting a Volume” on page 93 • Expand Volume “Expanding a Volume” on page 87 •...
  • Page 271 – Volume Mapping • Map Hosts To Volume “Managing Volume Mappings” on page 99 • Manage Host List “Managing the Global Host List” on page 95 (FC only) Scheduler Manage Scheduler “Using the Scheduler” on page 127 General LAN Configuration “Configuring Ethernet Management Ports”...
  • Page 272 – System Configuration • “Changing the Cache Redundancy Mode” on page 58 • “Managing Dynamic Spares” on page 80 • “Changing Auto-Write-Through Triggers and Behaviors” on page 92 • “Changing Utility Priority” on page 183 • “Enabling and Disabling Background Scrub for Disks” on page 189 •...
  • Page 273 – Configuration Utilities • Show Changed Settings “Viewing Changed Settings” on page 188 • Save Config File “Saving the Configuration to a File” on page 60 • Restore Config File “Restoring a Saved Configuration File” on page 187 Debug Utilities •...
  • Page 274 The SMU menu options listed in the following table are available to Diagnostic Manage users for troubleshooting purposes. This guide does not include functions for use by service personnel. – Event Notification Select Individual Events “Selecting Individual Events for Notification” on page 216 and “Selecting or Clearing All Events for •...
  • Page 275 Information in this appendix is for reference by storage administrators and technical support personnel to aid troubleshooting. Event messages appear in the event log, which you can view using SMU or the CLI, and in debug logs. You may also receive notifications, depending on your SMU event notification settings.
  • Page 276 Informational Vdisk creation status. This event is or warning logged as informational if creation immediately failed, was canceled by the user, or succeeded. This event is logged as a warning if creation failed during initialization. Warning A drive in a vdisk failed and the •...
  • Page 277 Informational The assigned LUN for this volume has changed. Informational The statistics for the specified vdisk have been reset. Informational Cache parameters have been changed for the specified vdisk. Informational Controller parameters have been changed. This event is logged when general configuration changes are made;...
  • Page 278 Warning The sensors monitored a temperature • Check that the storage system’s or voltage in the warning range. fans are running. • Check that the ambient temperature is not too warm. The enclosure operating range is 41 F to 104 F (5 C to 40 C). •...
  • Page 279 Informational A communication failure has occurred between the controller and an EMP. Informational An error detected by the sensors has been cleared. Informational The vdisk name has been changed. Informational A lengthy SCSI maintenance command has completed. Informational Vdisk expansion has started. This operation can take days to complete.
  • Page 280 Informational A disk channel was reset from another initiator or target. Critical A serious error, which might indicate • If the controller recovers, no hardware failure, occurred while action is required. communicating on the specified disk • View other logged events to channel.
  • Page 281 Informational (Active-active environment) The two controllers are communicating with each other and cache redundancy is enabled. Informational The FC loop ID for the specified vdisk was changed to be consistent with the IDs of other vdisks. This can occur when drives containing a vdisk are inserted from an enclosure having a different FC loop ID.
  • Page 282 Informational The controller has modified mode parameters on one or more drives. Informational The current controller has unkilled the partner controller. The other controller will restart. Informational The partner controller is changing state (shutting down or restarting). Warning In an active-active configuration, the Save the log files and review them current controller has forced the for other errors.
  • Page 283 Informational The partner controller does not have a mirrored configuration image for the current controller, so the current controller’s local flash configuration is being used. This event is expected if the other controller is new or its configuration has been cleared. Critical Both controllers in an active-active A service technician must examine...
  • Page 284 Critical The controller experienced the A service technician can use the specified critical error. In a non- debug log to determine the redundant configuration the controller problem. will be restarted automatically. In an active-active configuration the surviving controller will kill the controller that experienced the critical error.
  • Page 285 Warning The controller has detected an invalid The single disk drive port should disk drive dual-port connection. This be connected to one controller only. connection does not have the benefit of fault tolerance. Failure of the disk drive port would cause loss of access to the drive.
  • Page 286 Informational New software has been loaded on the Management Controller. Informational New loader software has been loaded on the Management Controller. Informational The Management Controller has been restarted from the Storage Controller. Critical A failure occurred when trying to Replace the controller module. write to the Storage Controller flash chip.
  • Page 287 Warning The host FC World Wide Names Verify the WWN information for (node and port) previously presented the other controller module on all by an offline controller module in this hosts that access it. system are unknown. This event has two possible causes: •...
  • Page 288 Warning or The specified SES alert condition was Most voltage and temperature informational detected in the enclosure indicated. errors and warnings relate to the power-and-cooling module. See “Power-and-Cooling Module Faults and Recommended Actions” on page 302. Informational The specified SES alert condition has This event is generated when the been cleared in the enclosure problem that caused event 168 is...
  • Page 289 Informational The error statistics for the specified drive have been reset. Informational The cache data for a missing volume was purged. Informational A host has been added to the list of hosts that can access, or be denied access to, a LUN. An Add Host command was successful.
  • Page 290 Informational A disk channel that was previously degraded or failed is now healthy. 190–201 Informational Includes component-specific environmental indicator events generated by the auto-write-through feature when an environmental change occurs. If an auto-write- through-trigger condition has been met, write-back cache is disabled and event 188 is also logged.
  • Page 291 Informational Vdisk scrub has completed. The event message reports the number of: • Data parity mismatches for RAID 3, 5, 6, and 50 • Mirror verify errors for RAID 1 and 10 • Medium errors for other types Informational Drive scrub has started. Informational Drive scrub has completed.
  • Page 292 Informational A previously created batch of snapshots is now committed and ready for use. The number of snapshots is specified. Informational The deletion of a batch of snapshots is complete. Critical A super-capacitor failure has A service technician must replace occurred on the controller.
  • Page 293 Critical Background master write copy-on- A probable hardware failure has write operation has failed. prevented the software from operating successfully. Isolate and There was an internal I/O error. replace and failed hardware Could not complete the write components. Once the hardware operation to the disk.
  • Page 294 Warning The specified drive type is invalid One or more drives are not allowed and not allowed in the current for this platform. They have been configuration. removed from the configuration. (Some platforms are SAS- or SATA-only). Replace the disallowed drives with ones that are supported.
  • Page 295 241–242 Informational Compact flash status events generated by the auto-write-through feature whenever an environmental change occurs. If an auto-write-through- trigger condition has been met, write- back cache is disabled. Informational A new RAID enclosure has been detected. This happens when a controller FRU is moved from one enclosure to another and the enclosure detects that the midplane...
  • Page 296 Informational A valid license has been installed for the specified feature. This event is logged for each feature license installed. Warning A license could not be installed Check license parameters against (license is invalid). what is allowed for the platform and recreate the license using valid parameters, then reinstall.
  • Page 297 Informational Port bypass circuits currently use the Perform a system-level shutdown service port, which may limit the link and restart. Note that this will speed or interconnect mode support. cause all data to be unavailable for about 1 minute. Informational A copy operation for the specified master volume has been aborted.
  • Page 298 Warning The controller’s real-time clock Check the system date and time. If (RTC) settings might be invalid after either is incorrect, set them to the an unexpected power loss. correct date and time. Informational The controller’s real-time clock (RTC) settings were recovered after an unexpected power loss.
  • Page 299 Critical A temperature sensor on a controller • Check that the storage system’s FRU detected an over-temperature fans are running. condition that caused the controller to • Check that the ambient shut down. temperature is not too warm. The enclosure operating range is 41 F to 104 F (5 C to 40 C).
  • Page 300 Critical A FRU has failed or is not operating Examine the FRU specified in the correctly. This event follows some message to determine whether it other FRU specific event indicating a needs to be replaced. problem. As referred to in TABLE E-1, the following table lists disk-drive error conditions and recommended actions.
  • Page 301 If the status of the virtual disk that originally had All data in the virtual disk is lost. Use the SMU the failed drive status is FATAL FAIL, two or Trust Virtual Disk function to attempt to bring the more drive modules have failed. virtual disk back online.
  • Page 302 As referred to in TABLE E-1, the following table lists power-and-cooling module faults and recommended actions. Power supply fan warning • Check that all of the fans are working using SMU. or failure, or • Make sure that no slots are left open for more than 2 minutes. If you power supply warning or need to replace a module, leave the old module in place until you have failure.
  • Page 303 The glossary defines terms and acronyms used in MSA2000 Family storage system documentation. Definitions obtained from the Storage Networking Industry Association (SNIA) Dictionary are indicated with “(SNIA)” at the end. For the complete SNIA Dictionary, go to active-active Synonym for dual active components or controllers. A pair of components, such as the controllers in a failure tolerant storage subsystem that share a task or class of tasks when both are functioning normally.
  • Page 304 cache The location in which data is stored temporarily. There are a variety of cache types. Read cache holds data in anticipation that it will be requested. Write cache holds data written by a client until it can be stored on other (typically slower) storage media such as disk or tape. (SNIA) See also write-back cache, write-through cache.
  • Page 305 controller enclosure An enclosure that contains disk drives and one or two controller modules. See controller module. controller module A FRU that contains: a Storage Controller processor; a Management Controller processor; a SAS expander and Expander Controller processor; management interfaces; a LAN subsystem; cache protected by a capacitor pack and Compact Flash memory;...
  • Page 306 data mirroring Data written to one disk drive is simultaneously written to another disk drive. If one disk fails, the other disk can be used to run the virtual disk and reconstruct the failed disk. The primary advantage of disk mirroring is 100 percent data redundancy: since the disk is mirrored, it does not matter if one of the disks fails;...
  • Page 307 enclosure management processor (EMP) An Expander Controller subsystem that provides data about an enclosure’s environmental conditions such as temperature, power supply and fan status, and the presence or absence of disk drives. Ethernet adapter An adapter that connects an intelligent device to an Ethernet network. Usually called an Ethernet network interface card, or Ethernet NIC.
  • Page 308 fault-tolerant virtual disk A virtual disk that provides protection of data in the event of a single disk drive failure by employing RAID 1, 3, 5, 6, 10, or 50. RAID 6 also provides protection against the failure of two drives. See Fibre Channel (FC).
  • Page 309 host bus adapter (HBA) An adapter that connects a host I/O bus to a computer’s memory system. Host bus adapter is the preferred term in SCSI contexts. Adapter and NIC are the preferred terms in Fibre Channel contexts. The term NIC is used in networking contexts such as Ethernet and token ring.
  • Page 310 I/O module (IOM) See controller module and expansion module. Internet Protocol. ISCSI Qualified Name. iSCSI Internet Small Computer System Interface. iSNS Internet Storage Name Service. JBOD Just a Bunch of Disks. A drive enclosure that is directly attached to a host.
  • Page 311 management host A workstation with direct or network connections to a storage system’s management ports and that is used to manage the system. management information base (MIB) A database of managed objects accessed by network management protocols. An SNMP MIB is a set of parameters that an SNMP management station can query or set in the SNMP agent of a network device (for example, a router).
  • Page 312 out-of-band management Method of accessing and managing a system using the RS-232 or Ethernet connection. ownership In an active-active configuration, one controller has ownership of the following resources: virtual disks and vdisk spares. When a controller fails, the other controller assumes temporary ownership of its resources. Hardware component that converts between digital and analog in the signal path between the Storage Controller, Expander Controller, disk drives, and SAS ports.
  • Page 313 Reliability, availability, and serviceability. These headings refer to a variety of features and initiatives all designed to maximize equipment uptime and mean time between failures, minimize downtime and the length of time necessary to repair failures, and eliminate or decrease single points of failure in favor of redundancy.
  • Page 314 SCSI Enclosure Services (SES) An ANSI X3T10 standard for management of environmental factors such as temperature, power, voltage, etc. (SNIA) In MSA2000 Family storage systems, SES data is managed by the Expander Controller and EMP. secret For use with CHAP, a password that is shared between an initiator and a target to enable authentication.
  • Page 315 standard volume A volume that is not enabled for snapshots. standby See spare. state The current operational status of a disk drive, a virtual disk, or controller. A controller module stores the states of drives, virtual disks, and the controller in its nonvolatile memory. This information is retained across power interruptions.
  • Page 316 Unified LUN Provisioning. A MSA2012sa storage system feature that makes all volumes in the system accessible to hosts through all host ports on both controllers. ULP incorporates Asymmetric Logical Unit Access (ALUA) extensions. Universal Time. A modern time system related to the conventional Greenwich Mean Time (GMT) used for time zones.
  • Page 317 world wide name (WWN) A unique 64-bit number assigned by a recognized naming authority (often via block assignment to a manufacturer) that identifies a node process or node port. (SNIA) MSA2000 Family storage systems derive WWNs from the serial numbers of controller modules and expansion modules. world wide node name (WWNN) A globally unique 64-bit identifier assigned to each Fibre Channel node...
  • Page 319 setting triggering conditions access level available disk drives, displaying changing default user configuration definition setting background scrub access privileges displaying current configuration See also user type enabling and disabling changing backoff space, displaying definition bad block setting list size, displaying adding reassignments, displaying dedicated spares...
  • Page 320 capacity controller expanding snap pools changing virtual disk ownership expanding volumes displaying events displaying hardware versions CAPI displaying world wide name enabling or disabling for in-band management restarting Celsius shutting down configuring temperature status display status CHAP updating software configuring cookies, enabling browser cooling displaying current configuration...
  • Page 321 deleting reviewing error statistics dedicated spares capturing trend data global spares SMART, enabling and disabling mapping spin-up retires modified data on snapshots viewing by enclosure snapshots viewing firmware version users viewing graphical representation virtual disks unavailable volumes viewing status viewing type DHCP, using to obtain controller IP addresses disk drives, scan for changes diagnostic manage-level only functions...
  • Page 322 errors See also software displaying media errors controller displaying non-media errors partner, disabling automatic update updating reviewing disk drive statistics disk drives displaying version Ethernet link, displaying information for controllers stopping update event codes updating event log enclosures disabled PHY displaying version displaying updating...
  • Page 323 configuring installing interconnects managing topology requirements displaying status viewing currently installed link speed, configuring link speed, configuring host ports, resetting LIP, remotely issuing on host ports hosts, mapping to volumes log information, saving HTTP logging in displaying current configuration access level limits enabling logging out loop IDs...
  • Page 324 memory controller Network Time Protocol. See NTP updating menu configuring hierarchy settings and status, view options shown based on user configuration metadata clearing offline initialization online help differences between FA 2.2 and 4.0 online initialization MIB, enterprise trap optimization, cache Monitor user standard definition...
  • Page 325 creating for tasks deleting quarantined virtual disk viewing information about scheduling tasks SCSI Enclosure Services. See SES rack security specifying location configuring specifying number displaying current configuration RAID levels enabling local-intranet in browser comparison descriptions displaying firmware version read-ahead cache enabling or disabling for in-band management changing using...
  • Page 326 critical standard optimization default settings standard user type error changing setting values definition trigger behavior list of available functions warning setting reserve space standard volumes thresholds converting to master default settings creating setting values displaying current configuration snapshots statistics automating creation of disk space usage automating reset of real-time volumes...
  • Page 327 Storage Management Utility, See SMU thresholds storage web site snap pools storage website default settings Subscriber’s choice website setting values Subscriber’s choice, HP time, configuring super-sequential optimization timeout, auto-logout configuring sync cache mode displaying current configuration changing settings system...
  • Page 328 modifying preventing critical state setting access level redundant setting access to system interfaces reconstructing setting passwords status setting user type verifying stopping user name and role, viewing current visual alerts user type configuring advanced displaying changing default voltage sensors definition displaying critical or warning conditions diagnostic volume...
  • Page 329 See Storage Management Utility web page caching mode, configuring web pages caching web sites HP storage websites HP storage HP Subscriber’s choice world wide name, displaying controller disk drive write-back cache displaying configuration based on whether backup power is operating normally...

Table of Contents