background image

Network Configuration

78

Titan SiliconServer

Specifying the Order in which to Use Name Services

If Titan has been configured to work with multiple name services, the order in which those 
services should be used must be specified.

Note: 

If only one name service is used, verify that the name service appears 

in the 

Name Services Order

 configuration page. 

Changing the Name Service Order

1.

From the 

Network Configuration

 page, click 

Name Services Ordering

.

The 

Name Services Ordering

 page displays a list of Available Name Services and the 

Selected Name Services in separate boxes.

Domain 
Search Order

Enter a Domain suffix to use as a search keyword.

Click add to append it to the list of suffixes displayed. The order of the suffixes 
in the list box can be changed by using the up and down arrows.

A suffix can be deleted by selecting it from the list and then, clicking the X 
button. The suffix (e.g. ourcompany.com), combined with a computer's host 
name, makes a fully qualified domain name.

When a search for a computer name is performed, the DNS server searches for 
it in the order in which the suffixes are listed. For example, if the box contains 
the entries uk.ourcompany.com and us.ourcompany.com, a request for the IP 
address of author generates a query for author.uk.ourcompany.com and then 
for author.us.ourcompany.com. However, the system does not search the 
parent Domain ourcompany.com.

WINS Servers

To setup a primary WINS server, type the IP address in the Primary field.

If there is a secondary WINS server, then type the address in the Secondary 
WINS server field.

Summary of Contents for Titan SiliconServer

Page 1: ...Titan SiliconServer System Administration Manual ...

Page 2: ...work Appliance Inc and Traakan Inc The product described in this guide may be protected by one or more U S patents foreign patents or pending applications The following are trademarks licensed to BlueArc Corporation registered in the USA and other countries BlueArc the BlueArc logo and the BlueArc Storage System Microsoft MS DOS Windows Windows NT and Windows 2000 2003 are either registered tradem...

Page 3: ...F format provides a full specification of the FC 16 Storage Enclosure and instructions on how to administer it SA 14 User Manual This document in PDF format provides a full specification of the SA 14 Storage Enclosure and instructions on how to administer it AT 14 User Manual This document in PDF format provides a full specification of the AT 14 Storage Enclosure and instructions on how to adminis...

Page 4: ...MESSAGE UNTIL THE REQUIREMENTS ARE FULLY UNDERSTOOD Support Any of the following browers can be used to run the BlueArc SiliconServer System Management Unit SMU Web based Graphical User Interface Microsoft Internet Explorer Version 6 0 or later Mozilla Firefox Version 1 0 4 or later The following Java Runtime Envitonment is required to enable some advanced functionality of the SiliconServer s Web ...

Page 5: ...ng the SMU Setup Wizard 18 Configuring Security Options 19 SMTP Relay Configuration 20 Selecting Managed Servers 21 User Management 24 Configuring the Management Network 36 Configuring the Management Network 38 Configuring Devices on the System Monitor 40 Configuring a System Power Unit 45 Configuring the Titan SiliconServer 47 Using the SiliconServer Setup Wizard 47 Configuring Server Identificat...

Page 6: ... and Concepts 91 Multi Tiered Storage 91 Fibre Channel Fabric and Arbitrated Loop 93 Load Balancing and Failure Recovery 94 Fibre Channel Statistics 95 FC 14 and SA 14 Storage Subsystems 95 Storage Characteristics 95 Discovering and Adding Racks 96 Creating System Drives 99 Managing FC 14 and SA 14 Storage 102 Reviewing Events Logged 108 Monitoring Physical Disks 109 FC 16 Storage Subsystem 111 St...

Page 7: ... Usage 165 Setting Usage Quotas 167 Understanding Quotas 167 Managing Usage Quotas 169 Using Virtual Volumes 174 Understanding Virtual Volumes 174 Managing Virtual Volumes 175 Managing Quotas on Virtual Volumes 179 Retrieving Quota Usage through rquotad 186 The Quota Command 186 Implementing rquota on Titan 186 BlueArc Data Migrator 189 Data Migration Paths 190 Data Migration Rules 193 Data Migrat...

Page 8: ...59 Controlling Access to Shares 263 Using Windows Server Management 265 Transferring files with FTP 270 The Titan SiliconServer and FTP 270 Configuring FTP Preferences 270 Setting up FTP Mount Points 272 Setting Up FTP Users 274 Setting Up FTP Audit Logging 277 Block Level Access through iSCSI 279 The Titan SiliconServer and iSCSI 280 Configuring iSCSI 281 Setting up iSCSI Logical Units 283 Settin...

Page 9: ...cation 333 Creating Replication Policies 334 Choosing the type of Destination SiliconServer 334 Replication Policies 335 Replication Rules 340 Replication Files to Exclude Syntax 346 Replication Schedules 346 Scheduling Incremental Replications 351 Replication Status Report 351 Troubleshooting Replication Failures 354 Virus Scanning 356 Virus Scanning Overview 357 Configuring Virus Scanning 357 Fo...

Page 10: ... Checking the Status of a Storage Unit 398 Checking the Status of the SMU 403 Monitoring Multiple Servers 405 Titan SiliconServer Statistics 406 Ethernet Statistics 406 TCP IP Statistics 410 Fibre Channel Statistics 414 File and Block Protocol Statistics 417 Data Access and Performance Statistics 426 Management Statistics 428 Event Logging and Notification 434 Using the Event Log 435 Setting up Ev...

Page 11: ...sting and Generating Certificates 467 Acquiring a SSL Certificate from a Certificate Authority CA 469 Installing and Managing Certificates 469 Accepting Self Signed Certificates 470 Shutting Down Restarting the System 472 Shutting Down Resetting the Titan SiliconServer 472 Shutting Down Restarting the SMU 474 Default Username and Password 475 ...

Page 12: ...Table of Contents xii Titan SiliconServer ...

Page 13: ...e customized to match the storage requirements of your applications In this way Titan provides a solution that can meet your performance and scaling goals The BlueArc Storage System consists of the following elements The Titan SiliconServer The SiliconServer technology is the core of the BlueArc Storage System Enterprise Virtual Servers EVS The EVS are the file serving entities of the Titan Silico...

Page 14: ...ld a Cluster Node fail its file services and server administration functions are transferred to the other server The Titan SiliconServer chassis is 4U 7 high 48 3 cm 19 rack mountable and a maximum of 63 5 cm 25 deep excluding the fascia It consists of a passive backplane that is not removable three hot swappable fan trays and two hot swappable redundant power supplies The front panel shows system...

Page 15: ...etween servers in a Server Farm based on performance and availability requirements The Storage Subsystem The storage subsystem consists of storage devices and the Fibre Channel FC infrastructure such as FC switches and cables used to connect these devices to Titan Titan supports BlueArc s Multi Tiered Storage MTS which can simultaneously connect multiple diverse storage subsystems behind a single ...

Page 16: ...tion for more detailed information The System Management Unit SMU Titan is managed from the System Management Unit SMU through its Web Manager interface The SMU also supports data replication and data migration and acts as the Quorum Device in a Titan cluster Although the SMU is an integral component of the BlueArc Storage System it is not involved in any data movement between the network client a...

Page 17: ...ce of the SMU the 10 100 Mbps Ethernet management interface on the server and all the Ethernet managed devices that comprise the Titan Storage Subsystem The private management network manages the storage subsystem including auxiliary devices Devices on this network are only accessible from the public data network through the SMU which provides NAT NTP and email relay services The SMU has two 10 10...

Page 18: ...d be unique as it will be used to identify this specific server An administrative IP address and subnet mask These are assigned to the 10 100 management port which is typically connected to the private management network Note The subnet mask should be the same as that used for the private management network on the SMU i e 255 255 255 0 and the IP address should correspond to that network i e 192 0...

Page 19: ...et Explorer 6 0 or later or Firefox 1 0 4 or later Web Manager can be configured to support multiple Titan SiliconServers As an alternative to the Web Manager use the Command Line Interface CLI which is documented in the Command Line Reference Guide Using Web Manager The Web Manager is used to set up operate and monitor Titan and its storage subsystem Web Manager can be configured to support multi...

Page 20: ...SMU For example https 10 1 6 104 3 Click ENTER 4 When the login page appears type the user name and password Note that user names and passwords are case sensitive and that there is a default user account with the user name admin and password bluearc Note BlueArc recommends that this password be changed as soon as possible Once the login procedure is completed the Web Manager home page is displayed...

Page 21: ...nServer System Administration Manual 9 Using the Server Status Console Summary Status information pertaining to the currently managed server can be viewed from the Web Manager s server console in Titan SiliconServer s home page ...

Page 22: ...ems Virtual Volumes Quotas System Drives Data Migration etc Data Protection Virus Scanning Replication Snapshots NDMP backup etc File Services NFS CIFS iSCSI FTP User Mapping Group Mapping etc Network Configuration IP Addresses Name Services NIS LDAP Configuration IP Routes Link Aggregation etc Additional categories SMU Administration used to manage the SMU itself currently managed server selectio...

Page 23: ...ver System Administration Manual 11 Clicking on any of the shortcuts such as Silicon File Systems and NFS Exports starts the desired function Clicking on the page categories loads a page such as the Data Protection page shown below ...

Page 24: ...The BlueArc Storage System 12 Titan SiliconServer Understanding Web Manager Tables Some of the pages in the Web Manager interface include tables such as the one shown below ...

Page 25: ...program such as Window s HyperTerminal to the following settings 115 200 b s 8 bits byte 1 stop bit No parity 3 Log into the SMU If the SMU is being accessed to perform initial setup log in as the user setup and perform the installation steps as directed Otherwise login as the user manager When prompted enter the password for the user manager 4 Once connected select which Titan s CLI to access or ...

Page 26: ...ly in the Titan SiliconServer Command Line Reference The Titan CLI can be accessed in the following ways Using Secure Shell SSH to connect into the Titan SiliconServer through the SMU Using SSH or Telnet to directly connect into the Titan SiliconServer Using the SiliconServer Control SSC utility available for Windows and Linux Using the Perl SiliconServer Control PSSC utility available for all oth...

Page 27: ...ing 1 Connect to the server s administrative name or IP address ssh supervisor titan_name_or_IP 2 When prompted enter the supervisor user s password To Telnet into the Titan run the following 1 Connect to the server s administrative name or IP address telnet titan_name_or_IP 2 When prompted enter the supervisor user s password To Connect using SiliconServer Control SSC can be used to connect to Ti...

Page 28: ...04 81 3 Click ENTER 4 When the login page appears type the user name and password Note that the user name and password are case sensitive A default user account exists with the user name supervisor and password supervisor Syntax Description Username The user account used to log into Titan typically supervisor Password The password for this user account If no user name or password is specified SSC ...

Page 29: ...nt part of the system configuration These include user name and password for system administrators and restrictions on which systems or hosts are allowed to access Titan Tip BlueArc recommends that security settings be defined on the system as soon as possible to prevent unauthorized access Configuring the System Management Unit SMU The System Management Unit SMU is an integral component of the Bl...

Page 30: ... Setup Wizard The following screen will be displayed For information on how to complete the wizard see below Item Field Description Passwords Set up passwords to prevent unauthorized access to the system management facilities DNS Server Setup Enter the IP addresses of the DNS servers and domain search orders that will be applied to the SMU SMTP Relay Enter the host name not the IP address of the e...

Page 31: ...to control which hosts have access to it as well as other auxiliary devices managed by the SMU To prevent the current managing workstation from being locked out it must be included in the list of allowed hosts From the SMU Administration page click Security Options Enter the IP address of each allowed host and click the Add button When the list is complete click the OK button Private management ne...

Page 32: ...Configuration 20 Titan SiliconServer SMTP Relay Configuration The SMU can be configured to forward emails from Titan SiliconServers and auxiliary devices on the private management network to the public network ...

Page 33: ...mail configuration can be viewed through the Email Alerts Setup link found on the Status Monitoring page Selecting Managed Servers The SMU can manage multiple Titan SiliconServers and their associated storage subsystems Information about each server should be added to the Managed Servers page The SMU needs to know the IP Address and username password of the server to be managed Only one server may...

Page 34: ... Single Node Active Active Cluster Status The current status of the SiliconServer Green indicates that the server is operating normally i e not showing an alert condition Amber is displaying a warning e g operating normally however action should be taken to maintain normal operation Red indicates a critical condition e g the server is no longer functioning Details A link to a page displaying detai...

Page 35: ... server click add The following screen will be displayed This screen requires the following When all the details have been entered click OK When the Titan is added to the SMU as a Managed SiliconServer the following actions will Set as Current Select the server as the currently managed server Item Field Description SiliconServer IP Address Enter the IP address of the server to be added For Titan t...

Page 36: ...Web Manager Available servers and administrative functions will be presented in the user interface based on the permissions granted by the role Only the links for menu pages for which the role permits will be visible in the Web Manager Administrative Roles Titan can be configured with multiple user accounts and each user account can be assigned one of the following roles Global Administrator in th...

Page 37: ...t Interface Server Administrator with Storage Server Administrator without Storage Storage Administrator Only Role Status and Monitoring Status Yes Yes No Event Notification Yes Yes Yes Server Load Graphics Yes Yes Yes Server Statistics Yes Yes Yes Files Services Statistics Yes Yes No Management Access Statistics Yes Yes No Diagnostics Logs Advanced Yes Yes Yes SiliconServer Admin Server SiliconSe...

Page 38: ...Keys Yes Yes No Management Access Yes Yes No Management Access Statistics Advanced Yes Yes No Storage Management Silicon File Server Management Silicon File Systems Yes Yes2 Yes Storage Pools Yes No Yes Virtual Volumes Quotas Yes Yes No Quotes by File System Yes Yes No File System Relocation Yes Yes Yes MTS Yes No Yes Policy Based Data Migration Data Migration Yes Yes No Data Migration Rules Yes Y...

Page 39: ... to advanced configuration pages are invisible To view these Data Protection Data Protection Virus Scanning Yes Yes No Virus Statistics Yes Yes No Replication Yes3 Yes3 No Snapshots Yes Yes No Snapshot Rules Yes Yes No NDMP Configuration Yes Yes No File Services Yes Yes No Network Configuration Yes Yes No SMU Administration SMU No No No Managed Servers Managed SiliconServers Yes4 Yes4 Yes4 Managem...

Page 40: ...Users From this page the administrator can setup additional user roles for any Titan server on the network The fields on this screen are described in the table below Item Field Description User Name Administrator s user name User Level Displays the user level or type of administrative role Can Manage Storage Displays if the user Can Manage Storage systems Advanced Displays if Advanced functions ar...

Page 41: ...dit a SMU User s Information From the Home page click SMU Administration Then click SMU Users Next click details next to the desired SMU user From the SMU User Details Screen 1 Click change 2 Change the SMU user s password or role 3 Click OK to return to main SMU User Details page ...

Page 42: ...trator follow these steps 1 Click the Add button The following page is displayed 2 Enter a User Name for this SMU User 3 Enter a Password for this SMU User and confirm the password 4 Click the Global Administrator option 5 Click next to continue The following screen is displayed ...

Page 43: ...lick the Advanced Mode checkbox if this SMU user needs to have access to the advanced functions Click next to continue The following confirmation screen is displayed Verify that the New SMU User s profile is correct and click finish to apply your changes The SMU Users screen is displayed listing the newly created SMU User ...

Page 44: ...d an SMU User Storage Administrator follow these steps 1 Click the Add button The following page is displayed 2 Enter a User Name for this SMU User 3 Enter a Password for this SMU User and confirm the password 4 Click the Storage Administrator option ...

Page 45: ... continue The following screen is displayed 6 Highlight the servers that this SMU User has rights and privileges to manage from the Available Servers list and move them to the Selected Servers list 7 Click next to continue The following page is displayed 8 Click finish to apply your changes ...

Page 46: ...trator follow these steps 1 Click the Add button The following page is displayed 2 Enter a User Name for this SMU User 3 Enter a Password for this SMU User and confirm the password 4 Click the Server Administrator option 5 Click next to continue The following screen is displayed ...

Page 47: ...le Servers list and move them to the Selected Servers list 7 Click the Can Manage Storage checkbox for users who have the necessary right and privileges to manage storage devices on the network 8 Click the Advance Mode checkbox to allow the user to access to advanced functions 9 Click next to continue The following page is displayed 10 Click finish to apply the changes ...

Page 48: ...f auxiliary devices such as RAID storage subsystems Fibre Channel switches and power management units Most of these devices are managed through Ethernet In order to minimize the impact on an enterprise network the Titan SiliconServer s physical management structure is divided into two distinct components 1 A private sideband management network This is a small network used to connect Titan and auxi...

Page 49: ... need to be issued permanent IP addresses within the network It is possible to have a mixed system in which some of the auxiliary devices are isolated on the private management network while others remain on the enterprise network Network Address Translation NAT Port Range In order to isolate the private management network from the enterprise network completely the SMU uses Network Address Transla...

Page 50: ...ng the first three octets of the SMU s private eth1 IP address For example if the SMU s private IP address is 192 0 2 1 then the devices on the private management network must have addresses in the range of 192 0 2 2 192 0 2 254 in order to work on the private management network Configuring the Management Network From the SMU Administration page click Management Network ...

Page 51: ... SMU s public address i e the address on eth0 This private IP address is also required to end with 1 so that the management relationship the SMU has with secondary devices can be maintained more easily Once the IP address has been defined click apply Note Remember the settings defined for this network so that they may be referenced when configuring Titan s Administration Services IP address and su...

Page 52: ...following basic components Component Description Action when clicking the component Action when clicking the details button Titan SiliconServer This component provides multiple Gigabit Ethernet interfaces to the network and multiple Fibre Channel interfaces to the main enclosure In high availability configurations there are two servers Loads the Server Status page ...

Page 53: ... page System Power Unit This component is also known as an uninterruptible power supply UPS Loads the UPS Status page Loads the UPS Configuration page NDMP Backup Devices Titan monitors its FC links every 60 seconds and automatically detects the presence of backup devices and adds them to the system monitor Since Titan could be connected into a FC network shared with other servers it does not auto...

Page 54: ...an SiliconServer If a device is no longer responding to network pings the device s color will change to red and an alert will be issued Adding a device to the public data network From the Status Monitor page click Add Public Net Device link The following screen will be displayed The table below describes the fields on this screen Item Field Description Device Name A descriptive name to be displaye...

Page 55: ...an Email alert may be generated depending on how event logging and notification is configured for the Titan SiliconServer Note The SMU can also be configured to listen for SNMP Traps from supported storage devices For more details refer to Receiving SNMP Traps in SMU Use Protocol and Port Specify a protocol e g HTTP and port number e g 80 to be used for accessing the device s management UI If the ...

Page 56: ...ddress If the vendor is recognized then a Device Type is recommended i e pre selected Generic is used if the SMU does not recognize the MAC address Failure to recognize a Vendor or MAC address does not affect any functionality Device Type Select a device type that best describes the device This is used purely to help distinguish components in the System Monitor and does not affect any functionalit...

Page 57: ... server s Event Log by setting a Titan Administrative IP address as the receiving target for SNMP Traps Traps registered from Nexsan or APC devices will be properly decoded Traps from any other device will be registered in unencoded form Configuring a System Power Unit A system power unit also known as an Uninterruptible Power Supply UPS isolates Titan from loss of power by providing power from a ...

Page 58: ... then only one IP address the Administrative IP needs to be registered otherwise each server must be registered individually 1 From the UPS Configuration page click Add 2 Enter the IP address of the power unit 3 Enter a user name for the UPS e g apc 4 Enter the authentication phrase for the UPS 5 Confirm the authentication phrase 6 Check the Enable SNMP Traps box if the Titan SiliconServer is to r...

Page 59: ...utdown within a specified number of seconds before this occurs Do not take any action on power failure for a specified number of seconds This may be used to prevent unintended shutdowns due to UPS battery tests or maintenance 3 Click Apply Configuring the Titan SiliconServer The Titan SiliconServer is at the heart of the BlueArc Storage System Titan requires a number of configuration settings such...

Page 60: ...rver To clone settings from the SMU select SMU from the drop down menu and click next See Cloning from the SMU for more information about cloning settings from the SMU If the SMU is already managing other Titan SiliconServers and the selected server is being added to an existing server farm an expanded list of settings can be cloned to the new server Proceed to Cloning from another Titan SiliconSe...

Page 61: ...ual 49 Cloning from the SMU Check or uncheck the boxes next to configuration items to determine whether these settings will be cloned The following is a list of configuration items that can be cloned from the SMU Time NTP DNS Servers DNS Search order SMTP servers ...

Page 62: ...ngs will be cloned The following is a list of configuration items that can be cloned from another Titan Time NTP Time Zone DNS Servers DNS Search order WINS NIS NS Ordering NFS Users NFS Groups CIFS Domains FTP Configuration SMTP Profiles SMTP Servers SNMP Alerts Windows Popup Alerts Syslog Alerts HTTP Access HTTPS Access SNMP Access Routes NDMP Information ...

Page 63: ...ices are used to convert server or host names into IP addresses SMTP Configure primary and secondary SMTP servers to be used for sending Email Alerts During this stage of the Wizard a default profile that will alert BlueArc Support will be recommended It is strongly recommended that this profile be created so BlueArc can respond quickly should a failure occur Additional email profiles for administ...

Page 64: ...y Titan This information is used by protocols such as SNMP and SMTP email To configure the server identification From the SiliconServer Admin page click Server Identification Enter the details that will identify the server Server Name Description Company Name Department Location and Contacts 1 and 2 When all fields have been completed click apply ...

Page 65: ... a reliable time source is an important part of keeping the server operating properly The current time is used in Kerberos authentication which is required when operating with Active Directory Clock drifting may also cause file access and modification times to be misreported resulting in unexpected results in Data Migrations Using NTP is the best and most reliable method for keeping Titan s time a...

Page 66: ...ister If Set Time at Boot is enabled the time is synchronized with the configured NTP servers when the NTP service starts typically when the server is rebooted The NTP service can also be restarted through the CLI If this option is enabled when the NTP service starts then the time is set immediately not gradually and without regard for the current time offset NTP Server To synchronize the server t...

Page 67: ...sing NTP Titan checks that the specified servers are legitimate NTP servers and then over a period of a few hours gradually adjusts the clock to the NTP time This gradual adjustment is normal and is designed to minimize the effects on utilities that use file timestamps If there are more than 15 minutes difference between the time initially set on Titan and the time returned by the NTP servers Tita...

Page 68: ...spond to predefined authorized management hosts on the network based on the management access method Telnet SSC and SNMP and defined port number Setting the SiliconServer Password The SiliconServer password is used to authenticate direct management connections to the Titan This password is required when adding Titan to the SMU s list of managed servers or when accessing Titan directly through its ...

Page 69: ...n completed click apply Item Field Description Enabled checkbox To enable or disable the facility select or clear the Enabled checkbox Port number To change the default port number that the system uses for the facility type the new number in the field Maximum number of connections To specify the maximum number of users who can simultaneously access the facility type the new number in the field Res...

Page 70: ...iSCSI targets IBR Incremental Block Level Replication This enables the highly efficient block level transfer of files during replications WORM Write Once Read Many file systems These are used to store crucial company data in an unalterable state for a specific duration EVS Enables the migration of Enterprise Virtual Servers between servers in a Server Farm Data Migrator BlueArc Data Migrator This ...

Page 71: ... expire When two days are left severe events are logged When a trial license has expired the features that were enabled by the license will be disabled Using License Keys Keys for licensed services are managed from the License Keys page It shows the status of each key the features enabled by the keys and provides controls for adding and deleting keys At the top of the License Keys page is a scroll...

Page 72: ...then click Add Key If a file that contains the license key has been supplied use the Browse button to select the key file then click Import File After all the keys have been entered follow the instructions to reset the system To Delete a License Key 1 Move to the SMU Home page 2 Click on the SiliconServer Admin heading to view the SiliconServer Admin page 3 From the Maintenance Tasks heading click...

Page 73: ...rformance data access and support jumbo frames They can be configured individually or trunked together using IEEE 802 3ad link aggregation A 10 100 Ethernet management port which is typically used to connect Titan to the private management network The physical connection to be used is any one of the four externally accessible RJ 45 ports These four ports are internally wired to a 10 100 Ethernet s...

Page 74: ...ion of GE ports can be trunked together Link aggregation increases the bandwidth of a network interface and isolates the server from failures in the networking infrastructure For example if there is a network link failure the other links in the aggregation will assume all the traffic Link aggregation is based on the IEEE 802 3ad standard Note Titan supports Link Aggregation Control Protocol LACP L...

Page 75: ... clients access Titan s File Services through Titan s configured file service IP addresses File services are only accessible through the GE ports Multiple IP addresses can be assigned for file services The IP addresses assigned may be on the same or different networks but must be unique Administration Services These IP addresses are used when managing Titan through Web Administration Manager or us...

Page 76: ... Both per port and overall histograms are available Configuring the Gigabit Ethernet Interfaces Configuring the GE ports on Titan requires the following steps 1 Creating an aggregation with one or more GE ports assigned to it 2 Assigning IP addresses Add the IP addresses necessary to access file and block services provided by the server Link Aggregations IEEE 802 3ad The Titan SiliconServer suppor...

Page 77: ...ink aggregation settings defined on the Titan LACP the Link Aggregation Control Protocol LACP will be used to automatically negotiate the Aggregation between the Titan and its network switch For this to function appropriately the network switch in use must support LACP Furthermore the switch must be configured to use LACP on all of its ports that will be physically connected to the Titan GE interf...

Page 78: ...tomatically configure link aggregation settings defined for Titan on the switch to which it is connected To use LACP the switch to which the Titan GE interfaces are connected must also support LACP In addition the switch must be configured to use LACP on the ports linked to the Titan SiliconServer 5 Click Apply To View Modify Configured Aggregations 1 Select the aggregation from the list 2 Click M...

Page 79: ...rface The list of GE ports They will appear next to their configured aggregation server name Up The port on Titan is physically connected to the switch and is able to send and receive incoming data Attached LACP only The port on Titan is physically connected to the switch Traffic not passing across the link Ports in this mode are typically running as the standby ports in 3 3 or 5 1 groups Detached...

Page 80: ...o the same GE interface Server administration Typically the 10 100 management port is assigned an IP address on the private management network However in order to access Titan on the public network using telnet or SSC an Admin Services IP address must be assigned to one or more of the GE interfaces Clustering When Titan is configured in a cluster the 10 100 management port on each Cluster Node is ...

Page 81: ...bnet Mask The subnet mask of the services or Cluster Node EVS One of the following The label of the Enterprise Virtual Server on which the File Services IP is bound If the server name is displayed then the IP address is an administrative IP for the server Port The interface used by the IP address agX identifies one of the GE aggregations mgmnt1 identifies the 10 100 management port Type Type of se...

Page 82: ... IP address has been added to the server it is immediately available for use To ensure IP addresses are not in use when they are removed the EVS to which the IP is assigned must be disabled When the EVS is disabled the IP address assigned to the EVS may be deleted Once the IP address has been removed the EVS should be enabled Disable the EVS 1 From the SiliconServer Admin page click EVS Management...

Page 83: ...he IP Address to delete 3 Click delete Enable the EVS 1 From the SiliconServer Admin page click EVS Management 2 Select the EVS that needs to be reactivated 3 Click Enable EVS Advanced IP Network Setup To access additional configuration settings for the IP Network configuration turn the Advanced Mode ON Then on the Network Configuration page click Advanced IP Setup ...

Page 84: ...pply To delete the settings for a specific Aggregation select the particular Aggregation from the Ports field and then click Delete The settings applied to the aggregation and all of the interfaces GEs it uses will revert to the defaults as defined by the Global Settings The Restore default settings button may be used to restore the default settings in the Global Settings box After completing the ...

Page 85: ...scuss Static Routes Default Gateways and Dynamic Host Routes in more detail Static Routes Static routing provides a means to forward data in a network through a fixed path If a server is attached to a network and that network is connected to additional networks through a router communication between the server and the remote network can be enabled by specifying a static route to each network Stati...

Page 86: ... Host Routes Titan also supports ICMP redirects an industry standard which provides a means for routers to convey routing information back to the server When one router detects that another router offers a better route to a destination it sends a redirect that temporarily overrides the system s routing table Being router based dynamic redirects do not require any configuration but they can be view...

Page 87: ...ver s Route Table The routing table on the IP Routes page displays all the routes configured on the server Any additions or modifications to the routes can be made on this page To View Modify the Route Table From the Network Configuration page click IP Routes ...

Page 88: ... names This will allow computer names rather than IP addresses in dialog boxes for example the NFS Export Properties dialog box Item Field Description Host Network Gateway Select the route type Host Network or Gateway IP Address Netmask Gateway Enter the IP address for the static route For host based static routing enter the IP address of the destination device and the Gateway through which the ho...

Page 89: ...e names and IDs of UNIX users and groups if CIFS and NFS clients are accessing Titan Authenticating FTP users From the Network Configuration page click Name Services Item Field Description DNS Servers Enter the IP addresses of a maximum of three DNS servers If more than one DNS server is entered the search will be performed in the order listed ...

Page 90: ... of suffixes displayed The order of the suffixes in the list box can be changed by using the up and down arrows A suffix can be deleted by selecting it from the list and then clicking the X button The suffix e g ourcompany com combined with a computer s host name makes a fully qualified domain name When a search for a computer name is performed the DNS server searches for it in the order in which ...

Page 91: ...ervices that should be used 4 Change the order that the system will use for the Name Services by selecting a service in the Selected Name Services box and clicking the Up or Down buttons 5 If necessary repeat step 4 until the desired order has been achieved 6 Remove any services which are not required by selecting the service and then moving it from the Selected Name Services box using the left ar...

Page 92: ...owing Retrieve NFS user and group account information Name services for resolving host names to IP addresses FTP authentication Benefits of Using LDAP Many organizations are moving towards LDAP and replacing their existing NIS infrastructure with the more reliable scalable and secure system that LDAP provides Using LDAP instead of NIS to provide Network Information Services can provide the followi...

Page 93: ...ces After deciding which network information service to use enable the service using the following instructions From the Network Configuration page click NIS LDAP Configuration The following screen is displayed Enable NIS click this link to enable NIS Enable LDAP click this link to enable LDAP ...

Page 94: ...rom the NIS Configuration screen the following tasks may be performed switch between NIS and LDAP configurations add or delete servers view server details modify the NIS configuration disable NIS Item Field Description Domain The name of the NIS Domain for which the system is a client Rebind The frequency with which Titan attempts to connect to its configured NIS servers Enter a value from 1 to 15...

Page 95: ...0 milliseconds Broadcast For Servers This option allows Titan to discover available NIS servers on the network Servers must be in the same NIS domain and be present on the same network as Titan in order to be found IP Address Displays the IP address of the NIS servers to which the server is currently bound Priority The priority level for the server The lowest value is the highest priority level If...

Page 96: ...Name 2 Enter the Rebind time in minutes 3 Enter the Timeout in milliseconds 4 Check the broadcast checkbox if you want the server to be listed in NIS Configuration page 5 Click OK to continue Configuring NIS Servers A list of the servers to which the Titan may be bound can be specified This list can contain a maximum of 16 NIS servers To add server by IP Address 1 From the Home page click Network ...

Page 97: ... check 5 Click OK to add this NIS server Broadcast For Servers Once NIS settings have been configured Broadcast for Servers can be enabled If enabled Titan will search for NIS servers on the network that are in its configured NIS domain These servers are found by broadcast and therefore must be on the same logical network as the Titan NIS servers found by broadcast are regularly pooled for respons...

Page 98: ...erver 1 From the Home page click Network Configuration NIS Configuration 2 Click details button next to the server The following screen is displayed 3 Change the priority of a configured NIS server by selecting one of the available options listed in the drop down box 4 Click OK to continue ...

Page 99: ...om the Network Configuration page click NIS LDAP Configuration From this screen you can perform the following tasks switch between NIS and LDAP configurations add or delete servers view server details modify the LDAP configuration disable LDAP Item Field Description Domain The name of the LDAP Domain for which the system is a client For example bluearc com ...

Page 100: ... Administrators can use this screen to directly manage LDAP configuration for specific users Note This option supports both registered and anonymous login of users User Name The user name of the administrator who has rights and privileges for this LDAP server For example cn Directory Manager dc bluearc dc com TLS Use this option to enable disable the SSL connection IP Address Displays the IP addre...

Page 101: ...Configuring Name Services System Administration Manual 89 Change or modify the Domain Name Change or modify the User Name Enter the Password Specify if TLS is Enabled Disabled Click OK to continue ...

Page 102: ...ver Modifying the LDAP Server To modify the LDAP server select Network Configuration NIS Configuration Modify LDAP Server The following screen is displayed 1 Modify or change Port entry 2 Modify or change TLS Port entry 3 Click OK to continue ...

Page 103: ...ct these devices to Titan Each Titan provides four 4 Fibre Channel FC ports independently configurable for either 1 2 or 4 Gigabit operation Multi Tiered Storage MTS allows you to install various types of storage technologies behind a Titan Through MTS the storage that best meets the requirements for applications can be selected BlueArc supports four tiers of networked storage including NDMP Tape ...

Page 104: ...FC 16 storage enclosures used for Tier 1 and Tier 2 storage SA 14 storage enclosures used for Tier 3 storage AT 14 storage enclosures used for Tier 3 and Tier 4 storage AT 42 storage enclosures used for Tier 4 storage The five subsystems listed above have different capacity and performance characteristics If one or more of the storage subsystems are configured the server combines the storage resou...

Page 105: ...run man command at the CLI Storage Tier Supported Enclosures Storage Technology Disk RPM RAID Technology Performance Characteristics Tier 1 FC 14 FC 16 Dual ported FC disks 15 000 RAID 1 5 RAID 1 5 10 Very high performance Tier 2 FC 14 FC 16 Dual ported FC disks 10 000 RAID 1 5 RAID 1 5 10 High performance Tier 3 SA 14 AT 14 SATA disks PATA disk 7 200 RAID 5 Nearline performance Tier 4 AT 14 AT 42...

Page 106: ...ve RAID controllers Load balancing can also be configured by identifying a preferred FC path for each System Drive Should a failure occur in one of the two FC paths from the server to the RAID storage subsystem the server can recover automatically by moving all of the disk I O activity to the other FC link Should the FC link become active again the server will automatically redistribute the load L...

Page 107: ...g ESM modules in the storage expansion enclosure SEE A single SCE can support a maximum of seven FC 14Es or SA 14Es Storage Expansion Enclosure SEE The SEE consists of the FC 14E or SA 14E storage enclosures fitted with dual ESM modules Each ESM module has two interfaces on it that are used to Loop in and Loop Out of the SEE Wiring is diversely routed so that the SCE routes down one path to the fi...

Page 108: ...cally switches to the hot spare disk and rebuilds on it the data that was located in the failed disk The hot spare disk must have at least as much capacity as the other disks in the System Drive The hot spare disk is a global hot spare meaning that only one hot spare disk is required per RAID rack When the failed disk is replaced the RAID controller s CopyBack process will automatically move the r...

Page 109: ... and SA 14 Storage Subsystems System Administration Manual 97 To add a RAID Rack 1 From the Home page click Storage Management Then click RAID Racks 2 Click Discover Racks This may take some time to complete ...

Page 110: ...ID Rack Details page The RAID Racks Severe Events will be forwarded to the Managed Server to be included in its event log The RAID Racks Critical Events will be forwarded to each Managed Server that has discovered the Rack These events will be included in each server s event log This will trigger the server s Alert mechanism possibly resulting in emails traps etc The RAID Racks time will be synchr...

Page 111: ...BlueArc However additional System Drives can be configured A System Drive comprises a number of physical disks and has a unique identifying number ID Caution Before creating System Drives set aside at least one disk to be used as a hot spare To Create a System Drive 1 From the Home page select Storage Management Then click System Drives ...

Page 112: ...l disk fails and a hot spare disk is available the controller automatically inserts the spare and builds onto it the contents of the failed disk 5 up to 2 TB Independent data disks with distributed parity blocks Employs a combination of striping and parity checking The use of parity checking provides redundancy without the overhead of having to double the disk capacity If a physical disk fails and...

Page 113: ...o not change the value specified next to System Drive Capacity except under the direction of BlueArc Global Services 7 Enter a name for the new System Drive in the System Drive Label field 8 Click create A RAID 5 system drive will now have been created with background initialization in progress a stripe size of 32 K and Media Scan enabled The RAID controller performs an initialization of the Syste...

Page 114: ... the System Drives page the newly added System Drive should appear Under the Status Column the status of the System Drive displays if it is formatting or initializing Once the System Drive has been initialized a file system can be created For more information on how to set up a file system see To Create a Silicon File System Managing FC 14 and SA 14 Storage FC 14 and SA 14 RAID racks can be manage...

Page 115: ...racks Titan searches for FC 14 and SA 14 storage devices connected to both the public and private management networks Once a RAID rack has been found then it can be managed The System Drives link brings up the System Drives page in which a System Drive can be managed The View Physical Disks link shows the status of the physical disks associated with a RAID rack Item Field Description Name The name...

Page 116: ... SiliconServer The View Active Tasks link shows the status of operations such as media scans which are in progress for a RAID rack The details button brings up a RAID Rack Details page This page provides information on the RAID rack ...

Page 117: ...e is 16 KB Setting the cache block size to 4 KB may result in reduced performance with file systems configured with 32 KB block size Click the OK button to apply any changes to the RAID Rack Identification Controllers The information for each RAID Controller Status The Status of the RAID Controller Mode The mode will report the RAID controller as running in either Active or Passive mode By default...

Page 118: ...ected during a media scan will be reported to the Event Log Media scan runs at a lower priority on the RAID controller than normal storage access However performance can be maximized by increasing the time allowed for the media scan to complete To increase the duration of the media scan and as a result reduce the cycles used by the RAID controller the Media Scan Period can be increased to up to 30...

Page 119: ...resh every 60 seconds Item Field Description Task The Active Tasks on going activity on the RAID Rack Component The System Drive on which the Active Task is occurring Percentage Complete The percentage of completion for the Active Task Not all Active Tasks will have a percentage complete shown Time Remaining minutes The time remaining minutes for the Active Task to be completed Note Some tasks wil...

Page 120: ...itan SiliconServer s event log This will trigger alert notifications e g email or SNMP traps if Titan is configured to do so In addition if the SMU is unable to connect to the RAID racks a severe alert will be triggered on Titan To review events logged by the RAID Rack 1 From the Home page click Storage Management Then click RAID Racks 2 Click the details button corresponding to the RAID Rack on w...

Page 121: ...ately 2 MB about 4 000 of the most recent events are archived The clear all button will clear all the events in the RAID Rack Caution Using the clear log button will permanently delete all the events from the SMU and the RAID Rack itself Monitoring Physical Disks The status of the physical disks associated within a FC 14 or SA 14 RAID Rack can be determined by using Web Manager Also the status of ...

Page 122: ...iconServer 3 Click View Physical Disks The status of the physical disks are displayed Item Field Description Manufacturer The name of the disk manufacturer Slot The slot number in the storage enclosure in which the physical disk resides ...

Page 123: ... A single SCE can support up to three Storage Expansion Enclosures Storage Expansion Enclosure SEE The SEE consists of the FC 16 storage enclosure and two LRC modules Each LRC module has four interfaces on it that are used to Loop In and Loop Out of the SEE The 1st SEE connects directly to the SCE the rest connect indirectly through another SEE Note Different tiers of storage and drive capacities ...

Page 124: ...sks and their capacity The RAID controller supports RAID levels 1 5 and 10 a combination of striping and mirroring The Titan SiliconServer assigns each System Drive a unique identifying number ID Hot Spare Disk A hot spare disk is a physical disk that is configured for automatic use in the event that another physical disk fails Should this happen the system automatically switches to the hot spare ...

Page 125: ...k to which to view the initialization configuration By default the box is checked for background initialization BGI BGI sets up RAID parity non destructively so the new System Drive used as soon as it has been created When using BGI it is not necessary to wait for initialization to complete To use foreground initialization instead remove the checkmark from the Background Initialization check box a...

Page 126: ...Multi Tiered Storage 114 Titan SiliconServer To create a System Drive 1 On the Storage Management page click System Drives ...

Page 127: ...m the drop down list 5 Select Speed or Size for Optimization RAID Level System Drive size Notes 1 2 to 32 disks up to 2 TB Mirroring and duplexing Data written to one disk is duplicated to a second for maximum data protection but with 50 usable capacity If a physical disk fails and a hot spare disk is available the controller automatically inserts the spare and builds onto it the contents of the f...

Page 128: ...gement page Then click System Drives On the System Drives page the newly added System Drive should appear Under the Status Column the status of the System Drive displays if it is formatting or initializing Once the System Drive has been initialized a file system can be created For more information on how to set up a file system see To Create a Silicon File System 5 up to 2 TB Independent data disk...

Page 129: ...al disks On the Storage Management page click RAID Racks Note FC 16 storage enclosures will appear automatically in the list of RAID Racks They do not need to be discovered and cannot be forgotten unless they are first physically removed from the server Item Field Description Name RAID rack identifier Controller A B Status Status of each controller in the RAID rack Firmware Firmware level in the R...

Page 130: ... Drives can be managed Clicking the details button will bring up a RAID Rack Details page This page provides information about the selected RAID rack Item Field Description RAID Racks RAID Rack Details ID The identifying number of the RAID Rack Name The name of the RAID Rack Controller The status of the RAID Controller Online or Offline Firmware The firmware number Monitor Yes or No Show The drop ...

Page 131: ...page on the physical disk in the RAID Rack The Home Enclosure button will display a graphic of the RAID Rack Enclosure This page will automatically refresh every 60 seconds The status of the FAN Temperatures and the physical disks are shown The Battery Backup button will display the status of the RAID Rack Battery Backup The Active Task button will display the on going activity within the FC 16 RA...

Page 132: ... is performed by a file system check It is possible to start a consistency check at any time from Web Manager or using the command line interface CLI It is not necessary to take the SD offline to run a consistency check However on each RAID rack only one SD can be checked or rebuilt at a time The performance of the host RAID controllers diminishes until the process ends Other RAID racks are not af...

Page 133: ...bers each SD for which a BCC runs to completion Every time the command is run the next eligible SD in the rack is checked If a BCC is aborted for any reason or if it fails to complete the same SD will be checked next time Also if an SD is skipped for any reason an entry will be made in the event log describing why the SD has not been checked Because the aim of BCC is to detect unreliable disks thi...

Page 134: ...ks Monitoring Physical Disks Using the Web Manager it is possible to determine the status of the physical disks associated with a particular RAID Rack or System Drive It is also possible to change the status of the disks in cases where for example a disk needs to be removed or a new hot spare disk has been added Item Field Description Component The System Drive or RAID Rack on which the task is be...

Page 135: ...FC 16 Storage Subsystem System Administration Manual 123 To check and change the status of the physical disks 1 From the Status Monitoring page click System Monitor Then click the FC 16 main enclosure ...

Page 136: ...d disk drives 3 To change the status of one or more of the disks select the new status from the drop down list and then click Apply It is possible to view more information on physical disks associated with a particular RAID rack such as their physical position and the name of their manufacturer ...

Page 137: ...a rack from the drop down list on which to view information Enclosure The number of the storage enclosure that contains the physical disk Row The vertical position of the physical disk Rows are numbered 0 through 3 where 0 is the top most row Column The horizontal position of the physical disk Columns are numbered 0 through 3 where 0 is the left most column if looking at the front of the storage e...

Page 138: ... how to define IP parameters refer to the AT 14 User Manual or the AT 42 User Manual Storage Characteristics The AT 14 and AT 42 storage enclosures use PATA disk technology and hardware RAID controllers which provide complete RAID 5 functionality and tolerance of single disk failures System Drives System Drives are the basic storage element used by the Titan SiliconServer A System Drive comprises ...

Page 139: ... removed and a new disk inserted while the power is still on and the system is still operating Background Consistency Checking The AT 14 and AT 42 storage subsystems perform periodic consistency checks of all disks This detects the presence of bad blocks thus reducing the probability of a double failure which could result in loss of data Managing the Storage Enclosures AT 14 and AT 42 storage encl...

Page 140: ... configured as follows Configuring the AT 14 Storage Enclosure 1 From the System Monitor page click on the AT 14 enclosure that has to be configured 2 Click the Quick Start link on the left hand side of the page 3 Select the 2 Volume Config tab 4 On the next screen click the Check this checkbox to confirm box and click the Quickstart Configure for 2 Volumes button Disk Arrays Logical Volumes Hot S...

Page 141: ... link on the left hand side of the page 3 Select the Create 4 arrays option and configure 2 hot spares and click the Next button 4 On the next screen click the Check this checkbox to confirm box and click the Quick Start button 5 The next screen will show that the system is now initializing and will take several hours to complete typically 3 4 hours Configuring the Storage Enclosure In order to en...

Page 142: ... on the local network the gateway router IP address will need to be set in the network settings page Note If the SMU is configured to support email relay and the AT 14 or AT 42 resides on the private management network it is recommended to use the SMU s eth1 IP address as the configured mail server The SMU will relay the email message to its configured SMTP server The Recipient email address is th...

Page 143: ...n SiliconServer of failures or other unusual conditions These alerts when received are logged as events in Titan s event log To setup SNMP traps click on the SNMP tab IP address to send SNMP trap to This should be set to the IP address of the remote management station that will receive SNMP traps or the Administration Services IP address of Titan if Titan is to display the AT 14 or AT 42 SNMP trap...

Page 144: ...m Monitor When this is done the SNMP traps will be registered as events thus leveraging Titan s event logging and notification functions When all settings have been set click the Save SNMP Settings button Date and Time 1 To setup Date and Time select the Date Time tab 2 In the Time Server IP address field enter the IP address for the SMU s eth1 interface and ensure that the Use entered IP address ...

Page 145: ...System Drives page lists all of the System Drives SDs that are part of the Titan SiliconServer configuration This page is also used to set certain SD configuration parameters and to correlate file systems to System Drives Creating System Drives Storage subsystems use RAID technology typically RAID 5 to aggregate multiple disk storage devices into System Drives The procedure for creating System Dri...

Page 146: ...urrently in use Limit The amount of storage that is licensed on this Titan SiliconServer measured in Terabytes Filter Filter by Access Select a filter for viewing the System Drives list Show All Access Allowed Denied Access Not Present ID The System Drive identifier Capacity The capacity of the System Drive Manufacturer The manufacturer of the RAID rack hosting the System Drive as reported by the ...

Page 147: ...RAID racks are identified by their name or WWN Other RAID racks are identified using the Comment field If the label says Not known the System Drive is present on the Fibre Channel network but the RAID controller is not accessible through an Ethernet managment network It may be necessary to discover the RAID Rack Storage Pool If present the label of the Storage Pool of which this System Drive is a ...

Page 148: ...has been out of contact since Titan was last booted i e a Fibre Channel cable is loose etc or the RAID controller if in contact reports that the SD has been deleted Green OK The SD is present and operational Note If the SD is OK it can be performing other tasks i e initializing in the background rebuilding disks etc The event log may provide more information Amber Initializing The SD is undergoing...

Page 149: ...l 137 System Drive Details The System Drive Details page displays the details for a single System Drive SD From the Storage Management page click System Drives Then click details next to the System Drive on which to view the additional details ...

Page 150: ...e to the System Drive click apply Performance Settings Superflush Displays the Stripe Size and Width settings applied to the System Drive when it was created Super Flush parameters are automatically configured by Titan for optimal performance For more information refer to the section on Super Flush Cache FC 14 and SA 14 only Write Back Cache Enable or disable write back caching for the System Driv...

Page 151: ...s that can be written to in a single write request A typical system drive will contain n data disks and one parity disk This type of array is often referred to as n 1 In such an array a single write request can be made to n number of disks In other words the width will typically be set to the number of disks in the system drive minus one Super Flush parameters are automatically configured for opti...

Page 152: ...SiliconServer Storage subsystems use RAID technology to aggregate multiple disk storage devices into System Drives For more information refer to System Drives About Storage Pools A Storage Pool is the logical container for Silicon File Systems Storage Pools are created on a collection of one or more System Drives Storage Pools can be expanded as additional System Drives are created in the storage ...

Page 153: ...system can only contain 1024 chunks the chunk size may limit the future growth of file systems in a Storage Pool About Silicon File Systems The Silicon File System is the main storage component of the Titan Storage System All other features on the server either directly or indirectly support it The first generation Titan blades supported up to 60 mounted file systems The Titan 2000 Series supports...

Page 154: ...Systems are created They can also be used to define the auto expansion policy for all of the Silicon File Systems created in the Storage Pool Storage Pools can be created deleted expanded removed from service or renamed The following procedures describe how to perform those tasks To Create a Storage Pool As long as there are available System Drives a Storage Pool can be created at any time Creatin...

Page 155: ...he capacity of the Storage Pool that will be created based on the selected System Drives Ideally this and the Raw Capacity numbers should be equal ID Shows the System Drive number assigned by Titan Appears in the Event Log Capacity Shows the System Drive s size Manufacturer Shows the manufacturer of the System Drive Comment Rack Name Shows the Rack s name and any additional information RAID Level ...

Page 156: ...a chunk size of less than 5 GB is not recommended For more information on chunks see About Chunks or click What chunk size should I choose 6 In the Storage Pool Label text box type a name for the Storage Pool 7 From the bottom of the page click on Next to go to a Confirmation page 8 Click on the create button to create the Storage Pool After the Storage Pool has been created it can be filled with ...

Page 157: ...st of available System Drives 5 From the ID column select the drives that will be used to expand the pool 6 From the bottom of the page click next to view a confirmation page 7 From the bottom of the page click on expand to add the drive s to the pool To Reduce the Size of a Storage Pool The size of a Storage Pool cannot be reduced To Deny Access to a Storage Pool Denying access to a Storage Pool ...

Page 158: ...ss to a Storage Pool but it can also be used when a storage array that has been previously owned by another Titan SiliconServer has been physically relocated to be served by this server The process involves restoring access to one of the System Drives that belong to the pool and then restoring access to the pool itself 1 Move to the SMU Home page 2 From the Storage Management heading click on Syst...

Page 159: ...e 2 From the Storage Management heading click on Storage Pools to view a list of all pools 3 From the right hand column click on details to view the Storage Pool Details Page for the pool 4 From the FS Auto Expansion option box click the disable auto expansion button to open a confirmation dialog box 5 Click OK to stop file system expansion for the entire Storage Pool To Allow File System Expansio...

Page 160: ...and restricted Should a file system become full it can be extended To Create a Silicon File System Use this procedure to create a new Silicon File System in an existing Storage Pool If a Storage Pool will be used to contain more than one Silicon File System a Storage Pools license must be installed A Storage Pool is required before a file system can be created For instructions see To Create a Stor...

Page 161: ...hich the file system is being created Free Capacity The amount of available space available in the Storage Pool that can be used by file systems Guideline Chunk Size The approximate size of the chunks used in the selected Storage Pool Size Limit If Auto Expansion is enabled this will be the maximum size a file system will be allowed to expand automatically If Auto Expansion is disabled this specif...

Page 162: ...y compliance purposes select Not WORM To learn more see WORM File Systems 12 Select the desired file system block size For more information see Choosing a File System Block Size 13 Click OK to create the new Silicon File System and view its details To Delete a Silicon File System A Silicon File System can be deleted at any time unless it is a Strict WORM file system After a file system has been de...

Page 163: ...rocedure should rarely if ever be used This procedure describes the steps to format an existing Silicon File System Any existing data in the file system will be lost A user must be either a Global Admin or Storage Admin and must have Advanced Mode enabled to format a file system For more information see User Management 1 Move to the SMU Home Page 2 From the Storage Management heading click on Sili...

Page 164: ...ile Systems to view a list of all file systems 3 From the Label column select one or more Silicon File Systems that need to be mounted 4 From the list of Actions located on the bottom of the page click on mount to open a confirmation dialog box 5 Click the OK button to mount the file system s To Unmount a Silicon File System Unmount a Silicon File System when it needs to be removed from service Fr...

Page 165: ...y increased when needed An overall size limit can also be set to control the amount of space it takes in a pool The change can be applied without removing the file system from service 1 Move to the SMU Home page 2 From the Storage Management heading click on Silicon File Systems to view a list of all file systems 3 From the right hand column click on details to view the Silicon File System Details...

Page 166: ... initiated For more information on CNS see Cluster Name Space Caution Whether the file system resides in a CNS or not relocating a file system will disrupt CIFS communication with the server If Windows clients require access to the file system the file system relocation should be scheduled for a time when CIFS access can be interrupted File System Relocation will affect the way in which network cl...

Page 167: ...ration Path to be the target for more than one source file system If a data migration target is relocated all associated source file systems will be relocated as well The file system is a member of a Storage Pool with more than one file system and the Storage Pool is hosted by a storage array that is not FC 14 or SA 14 Only FC 14 and SA 14 storage arrays support Storage Pools with file systems ass...

Page 168: ...s of relatively small files a 4 KB File System will be much more efficient in terms of space utilization For instance with a 32 KB file system block size a 42 KB file would take up two 32 KB blocks 2 x 32 KB 64 KB This wastes 22 KB of space To avoid this scenario eleven 4 KB file system blocks i e 11 x 4 KB 44 KB can be used to accommodate the 42 KB file With a 4 KB file system block size only 2 K...

Page 169: ...e name of the File System This is assigned when the File System is created and used to identify the File System when performing certain operations like creating an export or taking a snapshot Total The size of the File System GB Used The amount of space used GB Free The amount of free space available GB Storage Pool The name of the Storage Pool of which the file system is a member ...

Page 170: ...o view the initialization status Checking The file system is being checked When checking an approximate percentage complete is displayed Fixing The file system is being repaired When fixing an approximate percentage complete is displayed Status Errored Failed The file system has failed and cannot be mounted The storage arrays may be offline Contact BlueArc support RequiresRecovery The file system ...

Page 171: ...expand a new File System Note Titan remembers which file systems were mounted when it shuts down and mounts them automatically during system startup Status Other Recovering The file system is in the process of rolling back to its last good checkpoint If the server was reset uncleanly the contents of NVRAM may be being replayed Failing Rarely seen the file system has failed but is being recovered o...

Page 172: ...m Item Field Description Label The name of the File System The label is automatically assigned when the File System is created and used to identify the File System when performed certain operations e g creating an export or taking a snapshot Status The current status of the file system showing the amount of total used space and if the File System is mounted or unmounted ...

Page 173: ...enabled a limit can be defined to constrain the growth allowed by Auto Expansion Usage Alerts Refer to Controlling File System Usage Current Displays the currently used capacity as a percentage of the total capacity Warning Specifies the warning threshold as a percentage of the total capacity When the file system utilization crosses this threshold Titan records an Information event in the event lo...

Page 174: ...em displays Requires Recovery in the status field Check Fix Status Since Reboot Displays whether the file system has been checked and displays its status since its last reboot File System fixed File System checked File System fix was aborted by the user File System check was aborted by the user Could not find the directory tree to fix Could not find the directory tree to check File System is being...

Page 175: ...M Caution Issuing a forced file system recovery will discard the contents of NVRAM data which may have already been acknowledged to the client Forced Recovery should only be done at the recommendation of BlueArc Global Services WORM File Systems Titan supports Write Once Read Many WORM file systems WORM file systems are widely used to store crucial company data in an unalterable state for a specif...

Page 176: ...ile as WORM designate its retention date To configure the retention date set the file s last access time to a specific time in the future The last access time can be set using the Unix command touch e g touch a MMDDhhmm YY filename Should the retention date be less than or equal to the current time the retention date will never expire After a file is marked as WORM file permissions cannot be alter...

Page 177: ...space taken up by user files is referred to as the live File System Snapshots which provide consistent File System images at specific points in time are growing in space Snapshots are not full copies of the live File System but rather track changes in the File System As a result they grow in size whenever files that existed when the snapshot was taken are modified or deleted Note Deleting files fr...

Page 178: ...shold has been exceeded the space bar used to indicate disk usage turns amber In the absence of auto expansion the growth of the live file system can be contained to prevent it from crossing the severe threshold This effectively reserves the remaining space for use by snapshots Note To track and control space the number of files in the live file system configure quotas for users and groups or crea...

Page 179: ...files When these reach specified thresholds emails are sent to alert the list of contacts associated with the File System and optionally Quota Threshold Exceeded events are logged Operations that would take the user or group beyond the configured limit can be disallowed by setting hard limits Note When both Usage and File Count limits are defined Titan will enforce whichever is the first quota to ...

Page 180: ...er the first time that user saves a file in the File System Group Quota Defaults are a set of thresholds used to create a quota for a group the first time a user in that group saves a file in the File System Initially these Quota Defaults are set to zero i e not set When activity occurs in the File System although it is tracked no quotas are created Quota Defaults are defined by setting at least o...

Page 181: ... can exist on a single File System it may be easier to find the quota information required by filtering the list This can be done by specifying certain parameters in the Filter section as follows and clicking filter Filter Types Select from All Types default Users or Groups where name matches Enter a name to be matched The wildcard character may be used and space used Select from more than or less...

Page 182: ...ardb or finance where richardb is an NFS user and finance is an NFS group File systems The File System on which the quota applies Quota Type The type of source of File System activity Possible values are User or Group Created By The way in which the quota was created Possible values are Automatically Created created using a Quota Default or User Defined in which the thresholds were set uniquely fo...

Page 183: ...of space specified in the Limit field may not be exceeded Warning Enter the percentage of the Limit at which a Warning alert will be sent Severe Enter the percentage of the Limit at which a Severe alert will be sent File Count Limit Enter a maximum number of files to enable for this quota Hard Limit If this box is ticked the number of files specified in the Limit field may not be exceeded Warning ...

Page 184: ...ically Created User Quotas into User Defined User Quotas To Set Group Defaults From the Quotas by File System page click Group Defaults The details of this screen are the same as those detailed in the previous table for users except for the checkbox labeled Automatically create quotas for Domain Users The purpose of this option is to allow the creation of default quotas for the group Domain Users ...

Page 185: ...File System activity Possible values are User or Group User Group Account A User Group Account name may consist of A CIFS domain and user or group name such as bb Smith or bb my_group where bb is a domain Smith is a user and my_group is a group An NFS user or group such as richardb or finance where richardb is an NFS user and finance is an NFS group Usage Limit The amount of space to enable in Byt...

Page 186: ... directory trees that are treated as self contained file systems and used to monitor and control File System usage Note When it comes to moving or hard linking files Virtual Volumes behave the same as real File System volumes Moving or linking files across different Virtual Volumes returns a cross volume link error For a move operation most CIFS or NFS clients will suppress this error and instead ...

Page 187: ...acts or otherwise modify the Virtual Volume click details Other actions available from this page are add view quotas delete and Download All Quotas These are described in the following sections Item Field Description Filter Filters can be defined to reduce the number of Virtual Volumes displayed on the page Filters can be configured based on the name or the path EVS File System The name of the sel...

Page 188: ...erent EVS File System click change and select the EVS File System required Virtual Volume Name The name may consist of up to 128 characters The following characters are not supported Create a CIFS Share or NFS Export with the same name as the Virtual Volume To access the Virtual Volume through CIFS or NFS it may be convenient to have a share or export with the same name as the Virtual Volume Ticki...

Page 189: ...t will be the root of the Virtual Volume Example company sales All sub directories of this path will be a part of this Virtual Volume Once created the path may not be changed Virtual Volumes cannot be created at the root of the file system They must be applied to the directories in the file system Virtual Volumes can only be created and assigned to empty directories To create a Virtual Volume on a...

Page 190: ...ck the X button to delete it Email recipients can be configured to receive email notification when usage thresholds have been reached Explicitly defined email recipients e g admin company com will receive email notification any time a defined threshold has been reached Titan can also send emails to all user accounts when their corresponding user quota has been reached This is done by adding an ema...

Page 191: ... set of thresholds used to create a quota for a user group the first time that user group saves a file in the file system Initially these Quota Defaults are set to zero i e not set When activity occurs in the Virtual Volume although it is tracked no quotas are created Quota Defaults are defined by setting at least one threshold to a non zero value Default Quotas will then be automatically created ...

Page 192: ...SiliconServer To View Modify Virtual Volume Quotas 1 From the Storage Management page click Virtual Volumes Quotas 2 From the Virtual Volumes page select the Virtual Volume for which the Quotas are to be viewed 3 Click View Quotas ...

Page 193: ...e wildcard character may be used and space used Select from more than or less than Enter an amount of space used zero will include all quotas Select units of space used MB GB or Column Description User Group Account also known as the target A quota name may consist of A CIFS domain and user or group name such as bb Smith or bb my_group where bb is a domain Smith is a user and my_group is a group A...

Page 194: ...sed by all the files owned by the target of the quota Space Used The Space Used as a percentage of the Usage Limit File Count Limit The overall limit set for the total number of files in the Virtual Volume owned by the target of the quota File Count The total number of files in the Virtual Volume owned by the target of the quota File Count The File Count as a percentage of File Count Limit Item Fi...

Page 195: ...ble for users except for the Automatically create quotas for Domain Users checkbox This option allows default quotas for the group Domain Users to be created By default every NT user belongs to the group Domain Users which includes every NT user in the quota unless each user s primary group has been explicitly set Virtual Volume Name The name of the Virtual Volume on which the User Quota is assign...

Page 196: ...ta Type The type of source of Virtual Volume activity Possible values are User Group or Virtual Volume User Group Account A User Group Account name may consist of A CIFS domain and user or group name such as bb Smith or bb my_group where bb is a domain Smith is a user and my_group is a group An NFS user or group such as richardb or finance where richardb is an NFS user and finance is an NFS group ...

Page 197: ... the owner of the Virtual Volume s root directory will automatically reappear in the quota list after they are deleted Usage Limit The amount of space to enable in Bytes KB MB GB or TB Hard Limit If this box is ticked the amount of space specified in the Limit field may not be exceeded Warning Enter the percentage of the Limit at which a Warning alert will be sent Severe Enter the percentage of th...

Page 198: ...ve information on the disk quota usage of the user or group based on their ID The retrieved report contains the block count file count quota limits on both and information based on other options chosen with the command Refer to the client s man pages for accurate command syntax since implementation varies with each client OS Implementing rquota on Titan The rquota protocol runs on Open Network Rem...

Page 199: ...the quota with the most constraints on the user or group Matching Configuration Using the Matching option rquotad follows a specific order to find a match for relevant quota information First if rquotad is returning quota information about a user it will return the user s individual quota within the Virtual Volume if it exists Otherwise it will move to the user s file system quota if that exists I...

Page 200: ...or example If the user quota allowed 10K of data and 100 files to be added and the Virtual Volume quota allowed 100K of data and 10 files to be added rquotad would return information stating that 10K of data and 10 files could be added Similarly if the user quota is 10K of data of which 5K is used and the Virtual Volume quota is 100K of data of which 99K is used rquotad would return information st...

Page 201: ...eria for migrating files Discreet Migration Migrations from primary to secondary storage are handled as automated background tasks with minimal impact on server performance While migrations are in progress all data can continue to be accessed as normal Client Transparency Files migrated off of primary storage are replaced by a link While using only 1 KB of space the link otherwise looks and functi...

Page 202: ...ary Storage The organizational structure of migrated data on Secondary Storage does not mirror that of Primary Storage Furthermore accessing files directly on Secondary Storage may alter access and modification times of the files resulting in unexpected results when performing backups Data Migration Paths are used to define the relationship between primary and secondary storage The primary and sec...

Page 203: ...lays the EVS and file system from which data will be migrated Primary Virtual Volume If a Virtual Volume has been selected as primary storage this will display the name of the Virtual Volume from which data will be migrated Secondary EVS File System Displays the EVS and file system on secondary storage to which the data will be migrated Status The status of the Data Migration Path The status shoul...

Page 204: ...VS and file system click change File Accessed Time Update Interval Displays the currently configured Accessed Time Update Interval This defines the maximum time that will elapse between when a file is accessed and when the last accessed time field on the file will be updated This value is important to note if migrations based on an aggressive file access policy will be defined Refer to the Titan C...

Page 205: ...unction with Data Migration Paths to set up Data Migration Policies To view the Data Migration Rules From the Home page click Storage Management Then click Data Migration Rules The fields on this screen are described in the table below Destination File System Select the destination file system from the drop down menu The file system selected should be on secondary storage Item Field Description Na...

Page 206: ... predefined templates to create simple rules The second is to create custom rules that will exactly define the criteria by which files will be migrated To add a Data Migration Rule by Template 1 From the Home page click Storage Management Then click Data Migration Rules 2 Click Add by Template The Data Migration Rule Templates page appears with the choice of a number of Rule Templates Description ...

Page 207: ...ctive for a certain period of time By Path and Last Access This template can be used to migrate all files under a certain directory that have remained inactive for a certain period of time Item Field Description Name Enter a name for the new rule Description Enter a description of what the rule does Include Criteria To specify the maximum number of days a file can be inactive before being migrated...

Page 208: ... option for selecting the opposite of the above scenario i e choose exclude to select all files that are not mp3 Refer to Rule Syntax for important information about rule criteria Item Field Description Name Enter a name for the new rule Description Enter a description of what the rule does Case sensitive pattern checks Select the checkbox if the rule checking must be case sensitive Include Criter...

Page 209: ...y file system do the following 1 Enter the file extension in the All files named field 2 Enter numerically the threshold number in the All files not accessed within____days field Refer to Rule Syntax for important information about rule criteria Item Field Description Name Enter a name for the new rule Description Enter a description of what the rule does Case sensitive pattern checks Select the c...

Page 210: ...tion Rules page Click cancel to discard the configuration and return to the Data Migration Rules page Item Field Description Name Enter a name for the new rule Description Enter a description of what the rule does Case sensitive pattern checks Select the checkbox if the rule checking must be case sensitive Rule Definition Insert the syntax for the Data Migration Rule Refer to Rule Syntax for impor...

Page 211: ...word defining the condition for data migration followed by a single value of a list of values e g FILENAME doc When using several INCLUDE or EXCLUDE statements they are evaluated using top down ordering For more information on ordering refer to the Statement Order section below Parentheses are used to group the criteria in INCLUDE and EXCLUDE statements e g INCLUDE PATH Temp When defining multiple...

Page 212: ...ths starting with If multiple paths are to be specified they should be separated by commas PATH values may end with a wildcard character to indicate all subdirectories under the specified path Usage When used in an INCLUDE statement PATH allows specific directories to be included for migration This is useful when migrating less critical directories such as temp or home directories When used in an ...

Page 213: ...ve not been accessed within a specific number of days A file s last access time is updated whenever the file is read or modified The value is appended to the keyword and is defined by the number of days of inactivity Usage Used primarily in INCLUDE statements to ensure that older less frequently used files are migrated For example INACTIVE_OVER 21 ACTIVE_WITHIN Identifies files that have been acce...

Page 214: ...uded for migration If OR was used instead of AND in the above example INCLUDE FILENAME mp3 OR FILE_SIZE_OVER 5GB UNCHANGED_OVER Identifies files that have not been modified within a specific number of days A file s modification time is updated whenever the file s contents have been changed The value is appended to the keyword and is defined by the number of days of inactivity Usage Used primarily ...

Page 215: ...ations If the syntax looks complicated break it down to cause and effect statements of IF and THEN to understand it Statement Order When defining statements within a rule the order in which the statements appear define the way in which the rule will be carried out Statements are evaluated top down starting with the first statement defined As a result it is usually best practice to specify EXCLUDE ...

Page 216: ... under 2 MB in size AND active less than 14 days THEN EXCLUDE IF path name includes Temp AND filename is mp3 THEN MIGRATE While Scenario A includes all mp3 files from the folder Temp in Scenario B only the mp3 files greater than 2 MB in size that have been inactive for over 14 days will be migrated Looking at the different migration results of scenarios A and B the importance in statement ordering...

Page 217: ...g created both Data Migration Paths and Rules Data Migration Policies can now be created Policies assign a rule or set of rules to a specific Data Migration Path They also define the conditions that initiate data migrations To view Data Migration Policies From the Home page click Storage Management Then click Data Migration The fields on this screen are described in the table below Item Field Desc...

Page 218: ...dd Data Migration Policy screen appears Server EVS Displays the primary EVS from which the migration originates Primary File System Displays the primary file system or Virtual Volume that will be migrated Secondary File System Displays the secondary file system to which all data will be migrated Rule Displays the rules which may be triggered in this migration policy Item Description Name Give the ...

Page 219: ...iles not accessed within the last sixty days Finally if the available free space is reduced to less than 15 then also migrate the contents of users home directories Primary EVS File System The EVS and file system name on primary storage the migration source Virtual Volume If a Virtual Volume has been selected as primary storage then the Virtual Volume name will be displayed Secondary File System T...

Page 220: ...ed When percentage thresholds are specified they are evaluated based on whole number percentages This means that if two rules are specified one that will take effect at 8 of free space and one at 9 of free space if the file system has 8 5 free space available then the rule with the 8 pre condition will apply Note If the Primary Storage defined in the Migration Path is a Virtual Volume free space w...

Page 221: ...t directory once the project is complete may be scheduled as a Once Only Schedule Other policies which migrate based on various Pre conditions which are triggered on available free space may be scheduled to run every week When planning Migration Schedules it is recommended to schedule them to run during off peak times such as in the evenings or over the weekends Once a data migration has begun add...

Page 222: ...abort the selected migration Only in progress migrations can be aborted Item Field Description Policy Name Schedule Id Displays the name given to the Data Migration Policy Server EVS Displays the primary server and EVS from where the migration is scheduled to originate Next Run Displays the month date year and time for the next scheduled data migration run for this policy Interval Displays the fre...

Page 223: ...e a new data migration The Add Data Migration Schedule page appears The data migration policy needs to be set up before it can be scheduled Item Description Migration Policy Select a migration policy from the drop down menu Time of Initial Run Enter the scheduled run time in a 24 hour setting i e 11 59 PM will be entered as 23 59 The current SMU date and time are provided below for reference Date ...

Page 224: ... applied at the same time of day as the Initial Run Selecting Once Only indicates that the policy is scheduled to run only once the initial run Report Options Select List Migrated Files to generate a report of all migrated files in the selected Data Migration Path Select Test Run to initiate a one time test run The files are not migrated under this option but reports can be generated on these none...

Page 225: ...d time for the selected schedule click re schedule and enter the new values in the appropriate fields 4 To change the schedule s interval configure the schedule to repeat either daily weekly or monthly or configure the schedule to run Once Only 5 To change the Schedule to run a report click List Migrated Files to list all migrated files in the selected Data Migration Path or Test Only to generate ...

Page 226: ... s access patterns file storage tendencies the efficiency of rules paths policies and schedules By gauging file and space usage statistics of Primary and Secondary Storage Data Migrator reports can be used to refine a rule or pre condition The more precise and aggressive the rule the better Data Migrator serves the storage system To view Completed Migrations From the Home page click Storage Manage...

Page 227: ...eport Click remove to delete one or more completed migrations listed on the page Completed Displays the month date year and time when the migration was completed Files Migrated Displays the number of files that were migrated Status Displays the status on whether the migration was successfully completed ...

Page 228: ... Titan SiliconServer To view Data Migration Reports 1 From the Home page click Storage Management Then Completed Migrations 2 Select the completed migration of interest and click details next to it The following page appears ...

Page 229: ...splays the number of files that were migrated If files have been migrated click this to view a list of the files that were migrated The list provides details on their path size and their start and end times Files Excluded Displays the number of files that should have been migrated but could not For example files in use at the time of the migration may not be migrated Primary File System Statistics...

Page 230: ...Migration Virtual Volume Space Used Details the Virtual Volume s size and the total space used after the migration Virtual Volume Reclaimed Displays the Virtual Volume space gained due to the migration Secondary File System Statistics Pre Migration File System Space Used Details the file system size space used by snapshots and the total space used before the migration Post Migration File System Sp...

Page 231: ...e Titan CLI Individual files or whole directory trees can be reverse migrated through the CLI The files which are included in the reverse migration can be identified by pattern or by last access time For detailed information on this process run man reverse migrate at the CLI Reverse Migration from a network client A file can be restored from a network client by performing the following sequence of...

Page 232: ...cally be restored to Secondary Storage leaving a cross file system link on the Primary Storage If the restore target is not part of a Data Migration Path the file will be restored in its entirety Backups and replications typically copy data from Snapshots that are created when the operation begins These Snapshots however are only taken on the Primary Storage As a result the backup or replication w...

Page 233: ...e BlueArc does not recommend migrating iSCSI Logical Units to secondary storage However if this is desired it can be accomplished by performing the following Disconnect any iSCSI Initiators with connections to Logical Unit Unmount the iSCSI Logical Unit This can be done through the iSCSI Logical Unit Properties page Run the Data Migration Policy to migrate the Logical Unit Re mount the iSCSI Logic...

Page 234: ...nabled or disabled Titan allows NFS CIFS and FTP users to access the same file space See Mixed Mode Operation for more information about how Titan resolves differences between these file access protocols However although iSCSI Logical Units reside on file systems it is not possible to access folders and files located on an iSCSI target through Titan s file services like CIFS or NFS Note These prot...

Page 235: ...ave been changed a reboot may be required If so then follow the on screen instructions to restart the server File System Security File system security is designed for concurrent access from multiple protocols The file system supports both UNIX like security user ID group ID and CIFS like security access control lists Item Field Description Services Select the Services checkbox es that are required...

Page 236: ...e with Windows security information the server checks the user information against the file s security information to determine whether or not an operation is permissible Mode Clients Notes Mixed CIFS The server authenticates CIFS sessions by communicating with a domain controller which returns user security information Accesses to files that have NT permissions are checked against this security i...

Page 237: ...ive Files CIFS users may access files which have UNIX security information and NFS users may access files which have Windows security information The server provides the following features to make this possible Using the Web Manager you set up mapping tables that associate the names of NFS users and groups with their Windows equivalents For example when a CIFS user tries to access a file that has ...

Page 238: ...gainst the file s security attributes UNIX Security Mode When Titan is configured in UNIX security mode it supports UNIX security for CIFS and NFS clients However all security settings applied are saved with Unix file attributes As a result NFS clients are always accessing files in native mode while CIFS clients are always accessing file non native mode see the Mixed Security Mode section for more...

Page 239: ...nfigure security modes on individual file systems check Show File Systems Click filter to display the list of EVS and file systems as specified Item Field Description EVS The list of all EVS defined by the filter File System If this column is blank the security mode displayed is associated with the EVS If this column displays a file system label then the security mode displayed is associated with ...

Page 240: ...tton next to the EVS on which the security mode is to be changed The Security Configuration page for the selected EVS displays the EVS name and a drop down menu in which to specify the security Mode 2 Select the desired security mode for the EVS from the drop down menu 3 Click OK Click cancel to return to the File System Security page ...

Page 241: ...ill inherit the Unix security mode To change the file system to use a different security mode do the following 1 From the File System Security page select the parent EVS of the desired file system from the EVS drop down menu 2 Select the Show File Systems checkbox 3 Click filter All the file systems associated with the EVS defined by the filter will appear in the list File systems can be identifie...

Page 242: ...m from the drop down menu 6 Click OK Click cancel to return to the File System Security page To change the security mode for a Virtual Volume By default the Virtual Volume inherits the parent file system s security mode In other words if the parent file system has a Unix security mode the Virtual Volume associated with that file system will inherit the Unix security mode To apply a different secur...

Page 243: ...he defined filter Item Field Description EVS The list of EVS defined by the filter File System The list of file systems defined by the filter Virtual Volume The names of all Virtual Volumes found on the file systems defined by the filter Mode The security mode defined on the EVS or file system On file systems without an explicit security mode configuration the mode will be inherited from the EVS ...

Page 244: ...onServer allows network clients to share a common pool of storage from both Windows and UNIX clients This is referred to as mixed mode operation Although the Titan SiliconServer does this as seamlessly as possible the protocols are considerably different so mixed mode operation presents some challenges File Name Representation The maximum length of a file name is 255 characters File names may cont...

Page 245: ... case in line with the behavior of Samba the server hides the existence of the symlink entirely from the CIFS FTP client By default the following symlinks are not followed by CIFS and FTP clients Symlink pointing out of the scope of the share it is in such as when the link points to a different file system Absolute symlinks Meaning symlinks starting with To enable support for absolute symlinks fro...

Page 246: ...aches while preserving data integrity Exclusive and Batch Oplocks An Exclusive or Batch oplock is an exclusive read write deny all file lock that a CIFS client may obtain at the time it opens a file The server grants the oplock only if no other application is currently accessing the file When a client owns an Exclusive or Batch oplock on a file it can cache part or all of the file locally Any chan...

Page 247: ...These two user accounts are made equivalent by setting up a user mapping By default the server assumes that equivalent user and group names are the same for both environments For example if no explicit mapping is found for user janed the server assumes that the UNIX user account named janed is the same as the Windows user account with the same name There are two steps to follow when setting up use...

Page 248: ... request to an NIS server to verify the mapping This mapping can remain cached in the server for a configurable time A cached ID to name binding for a User or Group will appear as Transient in the NFS Users or Groups list If Titan is configured to use the Network Information Service NIS no special configuration steps are needed Titan automatically retrieves the user group names and IDs from the NI...

Page 249: ...when setting up NFS users on the system First specify each NFS user s name and user ID and then map the NFS user names to Windows NT user names If the system has been setup to access the information on an NIS server it is only necessary to perform the second of these steps the system automatically retrieves the user names and IDs from the NIS server ...

Page 250: ...sponding Windows group and domain name Groups configured manually will appear as permanent in the NFS group list Item Field Description Filter NFS Names Enter the user name to use as a filter or enter the user IDs to narrow the search criteria Note that the display limit is 1000 users Configured NFS Users User Name Displays a list of all defined users and their associated IDs NFS User Properties D...

Page 251: ... on the system First specify each NFS group s name and group ID and then map the NFS group names to Windows NT group names If the system has been setup to access the information on an NIS server it is only necessary to perform the second of these steps the system automatically retrieves the group names and IDs from the NIS server The maximum number of groups that can be set up is 1000 ...

Page 252: ...ssible formats for this file as described below Choose one format and use it consistently throughout the file Item Field Description Filter NFS Names Enter the group name to use as a filter or enter the group IDs to narrow the search criteria Note that the display limit is 1000 groups Configured NFS Groups Group Name Displays a list of all defined groups and their associated IDs NFS Group Properti...

Page 253: ...e domain name is omitted the server domain is assumed If the empty domain name is required it must be specified like this users Everyone The Everyone user is the only common account with an empty domain name 3 Both NFS user group data and NFS to NT user mappings The entries in the file must be in this form UNIXuser UNIXid NT User NT Domain Where the same rules apply to the NFS and NT names as for ...

Page 254: ...system provides the normal file serving functions such as Export manipulation File manipulation read write link create etc Directory manipulation mkdir readdir lookup etc Byte range file locking File access control permissions File and directory attributes sizes access times etc Hard links and symbolic soft links Prerequisites To enable NFS access to the system Enter an NFS license key Enable the ...

Page 255: ...ds Configuring NFS Exports NFS exports can be configured on mounted file systems Titan can support more than 1000 NFS exports However the precise limit of any NFS export allocation depends on the overall size of the user s configuration NFS exports can be configured manually or by importing the details from a file HP UX 10 11 Irix 6 5 NFS versions 2 and 3 Port Mapper version 2 Mount versions 1 and...

Page 256: ...em from the drop down list on which to add the NFS export Name Enter the name of the export Path Type the path to the directory from which to export the files and subdirectories This path is case sensitive Click browse to find the correct path to the directory Create path if it does not exist Check the box Create path if it does not exist to create the path entered in the Path field Show snapshots...

Page 257: ...er name rather than its IP address The computer name is not case sensitive What to type Means Blank or All clients can access the export Specific address or name Examples 10 168 20 2 client dept company com Only clients with the specified names or addresses can access the export Partial address or name using wildcards Examples 10 168 company com Clients with matching names or addresses can access ...

Page 258: ...s ro 10 1 2 38 rw The first grants read only access to all clients whereas the second grants read write access to the specified client The second line is redundant however as the first line matches all clients These lines must be transposed to grant write access to 10 1 2 38 Notes on Specifying Clients by Name rather than IP Address Be sure to specify the fully qualified domain name of the client ...

Page 259: ... when the client unmounts the exports and then remounts them The order in which the system uses DNS WINS and NIS information to resolve IP addresses may affect the export options that it applies to a client s mount request If a client name can be resolved through all three services it is the first service in the name service search order that supplies the name and this is used in searching the con...

Page 260: ...y name and path Click filter to display the NFS Export table EVS File System The name of the EVS and the File System to which the NFS Export is assigned Name The name of the NFS Export File System The name of the File System to which the NFS Exports is assigned Path The path and directory to which the NFS Export is directed Download Exports Download a comma separated value csv file containing a li...

Page 261: ...ile System CIFS is the protocol used on Windows networks to allow file sharing between workstations and servers The Titan SiliconServer and CIFS The Titan SiliconServer emulates the file serving functions of a Windows NT 4 0 Windows 2000 or Windows 2003 server As far as clients are concerned the Titan is indistinguishable from a Windows file server It provides all of the normal file serving functi...

Page 262: ...ate users and get user information such as group membership Titan automatically discovers and connects to the fastest and most reliable domain controllers Since operating conditions may change over time Titan selects the best domain controller every 10 minutes Security Model Client Authentication Configuration Method NT Domain security NT 4 only Add server to NT domain Windows 2000 Active Director...

Page 263: ...h hostname registered with the DNS server has a Time To Live TTL property of 20 minutes which is the amount of time other DNS servers and applications are allowed to cache it In other words the DNS server uses a cache file to retain a copy of the DNS lookup details for 20 minutes The record s TTL dwindles with passing time and when the TTL finally reaches zero the record is removed from the cache ...

Page 264: ...s Titan through configured CIFS names Traditional Windows servers have a single host name In environments where multiple Windows servers are being consolidated Titan can be configured with multiple CIFS names In order to appear as a unique server on a Windows network Titan will do the following for each configured CIFS name Allows administration through the Microsoft Server Manager NT 4 or Compute...

Page 265: ...indows Access System Administration Manual 253 1 From the Home page click File Services Then click CIFS Setup 2 From the EVS drop down menu select the EVS on which to create the CIFS name 3 Click Add to add a CIFS name ...

Page 266: ... Address The IP address of a Domain Controller in the Active Directory in which the Titan will be configured DC Admin User A user account that is a member of the Domain Administrators group This privilege is necessary to create a computer account in the Active Directory Note When specifying a user account from a trusted domain the user account must be entered using the Kerberos format In other wor...

Page 267: ...erver Manager from a Domain Controller in the NT 4 Domain and create a new Windows NT Workstation or Server account using the desired host name After the computer account has been created the corresponding CIFS name must be created on Titan To do so the following steps must be performed 1 From the Home page select File Services then click CIFS Names 2 Click Add 3 Enter the CIFS Serving name This n...

Page 268: ...efault Titan is configured to use NetBIOS Disabling NetBIOS has a few advantages It simplifies the transport of SMB traffic It removes WINS and NetBIOS broadcast as a means of name resolution It standardizes name resolution on DNS for file and printer sharing Disabling NetBIOS Before choosing to disable NetBIOS verify that there is no need to use NetBIOS WINS or legacy NetBT type applications for ...

Page 269: ...users e g software on the network Apart from the user defined network group names e g software finance test etc Windows also supports a number of built in or local groups with each providing various privileges and levels of access to the server on which they have been configured These groups exist on every Windows computer whatever domain they are in throughout the world They are not network group...

Page 270: ...e ownership of any file in the file system Backup Operators If a user is a member of the local Backup Operators group the user will bypass all security checks in the file system This is required for accounts that run Backup Exec or perform virus scans Forced Groups If a user is a member of the local Forced Groups group on files created by that user the user s defined primary group will be overridd...

Page 271: ...er from a local group 1 Select the user in the box 2 Click Delete 3 To delete all users click Delete All Configuring CIFS Shares CIFS shares can be set up on mounted volumes Titan can support well in excess of 1000 shares However the exact limit of any share allocation depends on the overall size of the server s configuration To Setup a CIFS Share 1 On the Home page click File Services Then click ...

Page 272: ...tem The name of the EVS and the File System Name The name of the CIFS share Comment Additional information associated with the CIFS share File System The name of the File System on which the share is located Path The directory on which the CIFS share is located Share Access Authentication Select a share and click Share Access Authentication to view or configure user and group access permissions on...

Page 273: ...nistration Manual 261 2 Click Add Download Shares Download a comma separated value csv file containing a list of all configured CIFS shares on the selected EVS and file system To download a list of shares from another file system click change ...

Page 274: ...mbolic links The box is checked to enable symlink following for this share Force filename to be lowercase Select this box to force all filenames generated on this share to be lowercase It is useful for interoperability of UNIX applications Enable Virus Scanning By default Virus Scanning is enabled server wide To disable Virus Scanning for a specific share uncheck this box Cache Options Select the ...

Page 275: ...e second line is redundant as the first line matches all clients These lines must be transposed to ensure access is denied to 10 1 2 38 Controlling Access to Shares Access to shares is restricted through a combination of share level and file level permissions These permissions determine the extent to which users can view and modify the contents of the shared directory When users request access to ...

Page 276: ...n There are three different share caching modes the server supports all three modes of caching 1 No Caching No caching of files or folders occurs 2 Manual The Manual mode allows the user to specify individual files required for offline access This operation guarantees a user can obtain access to the specified files whether online or offline 3 Automatic The Automatic mode is applied to the entire s...

Page 277: ...cement enclosure is available add new shares on its System Drives Using Windows Server Management The Computer Management MMC tool available for Windows 2000 or later can be used to perform tasks for managing shares from any remote computer For older versions of Windows the equivalent of this tool is provided by Server Manager For example several tasks for managing shares include Viewing a list of...

Page 278: ...File Services 266 Titan SiliconServer To Use the Computer Management tool 1 Start Computer Management 2 Select Connect to another computer ...

Page 279: ...m Administration Manual 267 3 If necessary specify the domain in look in 4 Select a name or an IP address that is used for file services on Titan Note Do not specify a server administration name or IP address for this purpose 5 Click OK ...

Page 280: ...File Services 268 Titan SiliconServer 6 Do one or more of the following To view the server s event log click Event Viewer ...

Page 281: ...nnected to the system click Sessions Some or all of the users can be disconnected Creating or Managing Shares When adding a share enter the name of the folder to share in the text box provided The format for this text box is c volname pathname volname is the volume on the server and pathname is the path on that volume that is to be shared For example c volname c volname pathname Paths must exist b...

Page 282: ...ions of an FTP server Titan provides the file serving functions required for Mount point manipulation File manipulation Directory manipulation File access control i e permissions Pre requisites Prior to allowing FTP access to the system FTP service must be enabled No license key is required for this protocol FTP Statistics Statistics are available to monitor FTP activity since Titan was last start...

Page 283: ...roller or a UNIX user name and password which is authenticated through a NIS server The configured security mode determines what password authentication service methods can be used See the section File System Security for more information about security modes If operating in UNIX or Mixed security mode both NT and NIS password authentication is supported If both services are enabled the FTP user w...

Page 284: ...sers may access over FTP Once the mount points have been set up FTP users can be assigned to them To Set Up FTP Mount Points 1 From the Home page click File Services Then click FTP Mount Points Item Field Description EVS Select the EVS on which to view the configured Mount Points Existing FTP mount points Mount name The box will list any existing mount point names Current sessions The number of ac...

Page 285: ...y Mount Point Properties 1 From the Home page click Files Services Then click FTP Mount Point 2 Select the EVS from the drop down list on which to view the existing mount points 3 Select the mount point from the list File System Label The label for the file system to which the selected mount point is added File System Size The size of the file system to which the selected mount point is added Syst...

Page 286: ...tem Note The Number of FTP mount point users is also displayed on the FTP Mount Point Properties page It is recommended not to change the file system assigned to the mount point while FTP users are currently connected 7 Click Modify FTP Mount Point Setting Up FTP Users At least one FTP user for each mount point must be defined FTP users can be manually setup or their details can be imported from a...

Page 287: ... Existing FTP Users Up to 500 users shown User name The box will display a list of existing FTP users Mount name The mount name to which the selected FTP user is added Initial directory The path of the directory in which the selected FTP user starts when logged in over FTP File System Label The label for the file system that contains the mount point File System Size The size of the file system tha...

Page 288: ...tomatically when it does not exist check the box Ensure path exists 8 Click Add FTP User To Import A FTP User 1 From the Home page click Files Services Then click FTP Users 2 Under the Import FTP User heading enter the file name that contains the user details 3 Click Browse to search for the filename The entries in the filename must follow this pattern user_name mount_point initial_directory For e...

Page 289: ...asterisk next to the mount name is noted if the FTP mount point has been selected 5 To change the Initial directory for the FTP user enter the new path 6 To locate the path click Browse 7 Uncheck the box Ensure path exists if checked 8 Click Modify FTP User Setting Up FTP Audit Logging FTP generates an audit log to keep track of user activity The system will record the event when each time a user ...

Page 290: ... value of n the older the file To Configure FTP Audit Logging 1 From the Home page click Files Services Then click FTP Audit Logging Item Field Description EVS Select the EVS on which the FTP Audit log is located Enable Logging If the box is checked FTP audit logging is enabled File System Select a File System on which to keep the log files Logging Directory The directory on the specified file sys...

Page 291: ...te file systems on iSCSI targets and read and write data as if it was on a local disk Window server applications such as Microsoft Exchange and Microsoft SQL Server can operate using iSCSI Targets as data repositories Number of log files The maximum number of log files to keep Once it has reached this limit the server deletes the oldest log file each time it creates a new one The Titan SiliconServ...

Page 292: ...iles residing on a file system As a result iSCSI benefits from file system management functions provided by Titan such as NVRAM logging snapshots and quotas The contents of the iSCSI Logical Units are managed on the Windows server Where Titan views the Logical Units as files containing raw data Windows views each iSCSI Target as a logical disk and manages it as a file system volume typically using...

Page 293: ...version 1 06 or later Check with BlueArc Support for the latest list of supported offload engines Configuring iSCSI In order to configure iSCSI on Titan the following needs to be defined The iSCSI Domain iSNS Servers iSCSI Logical Units iSCSI Targets iSCSI Initiators if using mutual authentication Setting the iSCSI Domain The iSCSI Domain is the DNS domain used by iSCSI when creating unique qualif...

Page 294: ...Delete Configuring iSNS The Internet Storage Name Service iSNS is a network database of iSCSI Initiators and Targets If configured Titan can add its list of Targets to iSNS which allows Initiators to easily find them on the network The iSNS server list can be managed through the iSNS page Titan registers its iSCSI Targets with iSNS database when any of the following events occurs A first iSNS serv...

Page 295: ...elect the EVS from the drop down list Note To download the latest version of Microsoft iSNS Server visit http www microsoft com Setting up iSCSI Logical Units An iSCSI Logical Unit LU is a block of storage that can be accessed by iSCSI initiators as a locally attached hard disk A Logical Unit is stored as a file on the Titan file system Like any other data set on the file system iSCSI Logical Unit...

Page 296: ...an SiliconServer s iSCSI implementation allows multiple initiators to connect to a single Logical Unit This is necessary for applications and operating systems that support or rely upon concurrent file system access However concurrent access can be detrimental to a client machine when the client is oblivious to others accessing the file system For example imagine two independent Microsoft Windows ...

Page 297: ...onnecting the iSCSI initiators from the Logical Units undergoing snapshot is also recommended This guarantees that all pending writes are sent to the Logical Unit before the snapshot is taken Volume Full Conditions When a client uses a direct attached disk it can monitor the amount of free space that s available If there is no free space within a partition the client can return a Volume Full condi...

Page 298: ...f the Logical Unit Path The path where the Logical Unit resides Logical units appear as regular files in Titan File Systems Comment Additional information related to the Logical Unit Logical Unit Size The size of the Logical Unit Note The maximum size of a Logical Unit is 2 TB This limit is imposed by the SCSI protocol File System Label The name of the file system used to host the Logical Unit ...

Page 299: ...filename or to assist in creating the path All Logical Unit filenames will have the extension iscsi 6 Enter additional information about the Logical Unit in Comment 7 Enter the size of the Logical Unit 8 Select Bytes KB MB GB or TB from the drop down list 9 If the file exists check the box File Exists The Logical Unit will be created on an existing file to restore a back up or a snapshot of a Logi...

Page 300: ...nsistency of data on a Logical Unit it may be necessary to restore it from a snapshot or a backup To restore an iSCSI Logical Unit perform the following steps 1 Disconnect the iSCSI Initiator from the Target 2 Unmount the iSCSI Logical Unit by using the following CLI command iscsilu unmount name where name is the name of the Logical Unit 3 Restore the Logical Unit from a snapshot or backup 4 Mount...

Page 301: ...he EVS on which to create the Target Name Identifies the name of the Target Comment Additional information related to the Target Globally Unique Name The Target s name The name is generated automatically by the Titan SiliconServer and is unique across the globe Logical Units assigned to the selected Target Lists the Logical Units assigned to the Target ...

Page 302: ...Field Description Alias The name of the iSCSI Target Comment Additional information on the iSCSI Target Secret The password used to secure the Target from any unauthorized access The initiator will need to authenticate against this password when connecting to the Target The secret must be equal to or greater than 12 characters but less than 17 characters in length ...

Page 303: ...etails on how to define the Access Configuration List EVS Select the EVS on which to create the iSCSI Target Available Logical Units A list of Logical Units available to assign to the iSCSI Target Logical Unit Number The number assigned to the Logical Unit LUN Enter a Logical Unit Number Click Add LU Selected Logical Units Logical Unit The Logical Unit associated with the Target LUN The Logical Un...

Page 304: ...on Titan Titan must also authenticate against the Initiator To facilitate with the mutual authentication process Titan must maintain a list of the Initiators with which it can authenticate and the shared secret for each Initiator Configuring Titan for Mutual Authentication 1 On the SMU Home page click File Services Then click iSCSI Initiator Authentication 2 Use the drop down list to select the EV...

Page 305: ...t select the Initiator name and secret in the list Then click Delete Configuring the Microsoft iSCSI Initiator for Mutual Authentication Note For the latest version of Microsoft iSCSI Software Initiator visit http www microsoft com 1 Within the Microsoft s iSCSI Initiator click the Initiator Settings tab 2 Under the Initiator CHAP secret enter the secret which allows the Target to authenticate wit...

Page 306: ...n mount read only FAT and FAT32 file systems Microsoft Windows 2003 clients can mount read only FAT FAT32 and NTFS file systems If Microsoft Windows clients are required to access read only NTFS file systems over iSCSI Microsoft Windows 2003 must be used iSCSI MPIO iSCSI MPIO Multi path Input Output is a technology that uses redundant paths to create logical paths between the client and iSCSI stor...

Page 307: ...vailable Targets Using Target Portals to find iSCSI Targets If there are no iSNS servers on the network iSCSI Targets can be found through the use of Target Portals Add the Titan s file services IP to the Target Portals list to find Targets associated with that server or EVS 1 Click on the Target Portals tab 2 Click Add 3 Enter the file service IP address for the Titan SiliconServer ...

Page 308: ...File Services 296 Titan SiliconServer 4 Click OK To access available iSCSI Targets 1 Click on the Available Targets tab ...

Page 309: ...I sessions are allowed per Target 3 Clock Log On 4 If authentication is enabled on the Target click Advanced 5 Check the box for CHAP logon information 6 Enter the Target secret which is the password configured when the iSCSI Target was created 7 If Mutual Authentication has been configured check Perform mutual authentication 8 Click OK 9 On the Log On Dialog screen click OK ...

Page 310: ... click Log Off and the initiator will attempt to close the iSCSI session if there are no applications currently using the devices Using Computer Manager to set up your iSCSI storage The iSCSI local disk will need to be configured through Computer Management which can be found in Control Panel Administrative Tools 1 Click on Disk Management 2 If this is the first connection to the iSCSI storage the...

Page 311: ... Manual 299 3 Follow the prompts to add the Windows signature to your iSCSI local disk 4 Once the Write Signature Wizard has been finished a Completed screen should appear 5 Click Finish 6 Prepare the disk for use through the Windows disk management tools ...

Page 312: ...urned to the client once all resulting File System modifications have been buffered in NVRAM and also mirrored if in a cluster Titan provides statistics to monitor NVRAM activity The checkpoint process ensures that all file system metadata is always internally consistent even after a system failure In order to ensure File System consistency a File System checkpoint is written to the storage at reg...

Page 313: ...can roll back all its File Systems and replay the modifications stored in the NVRAM log Buffering in a Cluster Configuration When Titan is configured as a cluster in addition to buffering all the File System modifications each Cluster Node mirrors the NVRAM contents of the other Cluster Node which ensures data integrity in the event of a Cluster Node failure When a Cluster Node takes over for the ...

Page 314: ...used by the original File System Nevertheless the space occupied by a snapshot grows overtime as the live file system changes Accessing Snapshots Snapshots are easily accessible from NFS exports and CIFS shares so that users can restore older versions of files without requiring intervention The root directory in any NFS export contains a snapshot directory which in turn contains directory trees fo...

Page 315: ... Snapshot Restore Quick Snapshot Restore is a licensed feature for rolling back one or more files to a previous version of a snapshot The procedure is done at the command line so for instructions run man snapshot at the CLI or refer to the Titan CLI Reference Quick Snapshot Restore may report that the file cannot be restored if it has been moved renamed or hard linked since the snapshot was taken ...

Page 316: ...The name of the rule determines the names of the snapshots that are generated with it e g YYYY MM DD_HHMM timezone information rulename If more than one snapshot is generated per minute by a particular rule the names will be suffixed with a b c etc For example a rule with the name frequent generates snapshots called 2002 06 17_1430 0100 frequent 2002 06 17_1430 0100 frequent a 2002 06 17_1430 0100...

Page 317: ...f necessary and click the Apply button To delete a rule select it from the Existing Snapshot Rules list and click the Delete button To assign schedules to snapshot rules 1 Set the frequency with which the system takes snapshots by assigning one or more schedules to a snapshot rule In the Snapshot Rules dialog box select the rule to which to assign a schedule 2 Click Add Schedule The Add a Schedule...

Page 318: ...e oldest snapshot when the number of snapshots associated to a snapshot rule reaches the specified queue limit However any or all of the snapshots may be deleted at any time and new snapshots can be taken Managing Snapshots 1 From the Data Protection page click Snapshots 2 Select a specific File System by clicking the Change button When a File System is selected a list of the associated snapshots ...

Page 319: ... Name field type a name for the snapshot containing up to 30 characters Do not include spaces or special characters in the name 5 Click OK Note It is also possible to take a snapshot associated with a rule without waiting for the next scheduled time This can be done from the command line interface ...

Page 320: ... following diagram In the diagram the storage management application sends backup instructions to the system which makes a backup copy of data onto tapes in the tape library The data travels through the Fibre Channel FC network not the Ethernet network Details of the backup data are sent to the storage management application which is used to recover the data if necessary NDMP is used to transfer d...

Page 321: ... done over network protocols such as NFS or CIFS but only NDMP will preserve security settings in a mixed protocol environment including Virtual Volume and quota information When using NDMP Titan uses snapshots to backup data consistently and without being affected by on going file activity Snapshots also facilitate incremental backups However if so desired it is also possible to backup data witho...

Page 322: ...ge management application Specifying the NDMP User Name Password and Version A user name and password for the primary NDMP user must be defined Once they are set they are used to restrict access to NDMP facilities The storage management application must successfully authenticate against the configured NDMP user account information before it can start a backup or recovery The NDMP user name and pas...

Page 323: ... to keep the NDMP user name and password secure For NDMP backups and recoveries Titan uses the NDMP version 4 protocol by default If required Titan can be configured to use version 2 or 3 of the NDMP protocol Note Both Incremental Data Replication and ADC require NDMP version 3 or 4 to run Setting the protocol version to 2 will prevent these from running Set the version to 2 only if required by yo...

Page 324: ...cial configuration Titan monitors its Fibre Channel FC links periodically and automatically detects the presence of backup devices Since Titan could be connected into a Storage Area Network SAN shared with other servers it does not automatically make use of backup devices it detects on its FC links Backup devices are added to the configuration through the Backup SAN Management page Backup SAN Mana...

Page 325: ...Backup Devices display Note NDMP devices must be assigned to an EVS before access can be allowed to it A request to Deny Access will be rejected if an NDMP client has opened the device The backup application configuration should be changed to avoid use of the device before clicking Deny Access Status Current status of the selected device NDMP Device Name This is the name that needs to be entered o...

Page 326: ...y attempt to use it through a different EVS will prompt a notification that the device has not been found Verifying NDMP Device Names To configure a storage management application to work with NDMP enter the names of the autochangers and tape drives The device names can be verified through the Backup SAN Management page The Location field for each tape drive shows the name of the autochanger that ...

Page 327: ... it is possible to request a specific snapshot by explicitly including the snapshot name in the path to back up Where the path is based on a CIFS share name indicate the snapshot with snapshot snapshot_name for paths based on an NFS export name use snapshot snapshot_name instead It is also possible that the CIFS share or NFS export includes a snapshot name Backing up databases and iSCSI Logical Un...

Page 328: ...to capture all the changes in the File System e g if the modification time of a file is the determining factor in whether or not to back it up a backup program will not archive the contents of a directory that has been moved because the times dates of the files remain unchanged Snapshots provide a solution to this problem After taking the initial base backup using a snapshot image it can be used a...

Page 329: ...kup path already specifies a snapshot or the backup is using a snapshot rule then this option has no effect The choices are Automatically Create Snapshots This is the recommended choice A backup of a path referring to the live file system will cause a snapshot to be taken for use in the backup Do not automatically Create Snapshots Backups of live file system will use the live file system directly ...

Page 330: ...ended to use with differential backup schedules These backup schedules are new differential backups which can be based on the same base backup 5 In the Maximum Auto snapshot retention time box enter the number value between 1 and 40 of days to keep the snapshots before the system deletes them automatically Usually automatically created snapshots will be deleted according to the rule selected in St...

Page 331: ...l be kept Clearing the Backup History or Device Mappings To clear the records of old backups that have been made use the Web Manager During incremental backups Titan uses the records of old backups to determine the date and time after which it must back up modified files If a backup has been lost clear the records to force a full backup to occur instead of an incremental backup Also the mappings b...

Page 332: ... 3 and 4 The BlueArc implementation of NDMP can back up and restore Both Windows and UNIX files from a single storage management application The full attributes of each Windows and UNIX file including Windows ACLs can save and restore whole volumes and preserve all the file attributes Including recovery of a complete backup image Titan supports recovery of single files or subdirectories or of list...

Page 333: ...ace option or an assessment of the likely efficiency of using DAR However in some cases it may be necessary to explicitly add the DIRECT y variable Possible value Notes Comma separated list of files or directories Specifies files or directories to exclude from a backup By default none are excluded When specifying a file or directory type either A full path name relative to the top level directory ...

Page 334: ...ntifies a file can be reused during a backup thereby causing the backup to fail By default therefore only files created before the start of the backup are backed up To override this behavior set the FUTURE_FILES variable to y Possible value Notes y or n The default value y causes file history information to be sent to the storage management application This enables the display and recovery of the ...

Page 335: ...s when they are sent to the storage management application Consult the storage management application provider for advice on setting the NDMP_BLUEARC_FH_CHARSET variable UTF 8 is the most wide ranging option as it is a mapping of the full Unicode character set which covers the alphabets of most of the world s languages ISO8859 which can also be specified as ISO8859 1 refers to the 8 bit ISO Latin ...

Page 336: ...when backing up a CIFS share Possible value Notes ALWAYS or OLDER or NEVER Used on recovery to indicate if an existing file should be replaced by a file of the same name being recovered The default setting is ALWAYS meaning that the backup file will always replace the existing file OLDER means the existing file will be replaced if it is older than the recovered file This option does not affect the...

Page 337: ...sed when reading file systems with smaller files Where most of the files are very small 16 KB or less then it may be useful to use 10 processes In extreme cases where most of the deepest level directories have only one or two files and those files are very small it may be useful to increase the amount of second level readahead used with the CLI command ndmp option ext_readahead If this second leve...

Page 338: ...processing of the changed object list itself may take a long time Therefore its use is not recommended in situations where there are file changes in many directories Possible value Notes y or n Indicates if backups or replications will include files whose data has been migrated to secondary storage If set to y the backup or copy will not include files whose data has been migrated to another volume...

Page 339: ... level and with directory level replication and it may be desirable to override this action To make use of this replication interlock it is necessary to specify this rule option on both the replication that is intended to do the waiting as well as the replication that is waited upon Possible value Notes NONE BASE or UPDATE This setting controls the omission of unset or unchanged data when backing ...

Page 340: ...ytes respectively For instance 32M for 32 Megabytes Files smaller than the value specified will not be considered for sparse transfer The default value is 32 MB Possible value Notes dump or tar Use dump whenever possible The two backup types use exactly the same environment variables and produce the same backup data on tape The only difference is in the format of the information sent to the storag...

Page 341: ...Important Notes NDMP does not specify the format of the backup data on tape As a result it is not possible to use NDMP backups to exchange data with other types of servers An incremental or differential backup back up changes made since a previous base backup When asked to do an incremental or differential backup the NDMP code refers to the record of backups to check for such a base backup to comp...

Page 342: ...of data between a Si7500 Si8x00 series server Titan using the ADC utility or the SMU Replication function Recovering an NDMP tape backup image of a Si7500 Si8x00 series server to Titan or vice versa Titan uses a backup layout that reflects differences in the underlying file system However the Titan NDMP implementation understands the Si7500 Si8x00 series configuration and can Recover a Si7500 Si8x...

Page 343: ...es on a Si7500 Si8x00 server has multiple base directories then only the first of these will be included in the Titan Virtual Volumes In the Titan file system in mixed security mode files have security defined either by a CIFS Security Descriptor or by Unix Security Mode The system uses security mappings to decide what security settings are required in the other system The Si7500 Si8x00 server fil...

Page 344: ...to include various optional settings These optional settings are explained later in this section Incremental Data Replication The Titan SiliconServer provides support for Incremental Data Replication IDR IDR is performed under control of the System Management Unit SMU IDR uses the same data management engine as NDMP to copy the contents of an entire file system a Virtual Volume or an individual di...

Page 345: ...replication will be copied Depending on the use of files within the source volume this could substantially reduce the amount of data copied The Block Level Replication feature is automatically enabled by installing an IBR license Note Block Level Replication copies the entire file if the file has multiple hard links Note The Block Level Replication feature is automatically enabled if the Increment...

Page 346: ... can choose from one of the following policy destination types Managed Server For a server to be considered as managed server it needs to be entered in the SMU configuration Not a Managed Server A non managed server is one where the IP Address and username password of the server is not known by the SMU Administrators can still select a non managed server as the target by specifying the IP address ...

Page 347: ...will display the Add Policy page for type of destination server that was selected Replication Policies Adding a replication policy managed server From the Policy Destination Type page click Next to display the following page Item Field Description Identification The name of the replication must not contain spaces or any of the characters ...

Page 348: ...s the OK button Source SiliconServer The name of the SiliconServer where the replication will be created EVS File System The name of the EVS and File System to which the replication is mapped Click change to change the EVS File System Path select the Virtual Volume by using the drop down list Or select the directory and enter the path Destination The destination of the replication storage is confi...

Page 349: ...s are configured Note Administrators should be authorized to use a non managed server access and store replication data From the Policy Destination Type page click Next to display Policy Identification page When the Not Manage Server option is selected the following screen is displayed Item Field Description Identification The name of the replication must not contain spaces or any of the character...

Page 350: ...nd enter the path Destination The destination of the replication storage is configured to point to a not managed server File Serving IP Address Host Name The name of the SiliconServer where the replication will be created Click change to change the destination to a different server File System The name of the File System to which the replication is mapped Path select the Virtual Volume by using th...

Page 351: ...ata management engine issues a warning message and performs a full replication using an automatically created snapshot that is be deleted immediately after the copy If the snapshot taken during the previous replication has been deleted a full copy is to be done instead of an incremental Custom Replication Scripts Replication scripts are custom written to perform specific functions These scripts ca...

Page 352: ...hot shows the contents of the most recently created snapshot on the file system While a replication is in progress no changes currently being recorded will appear in the shared or exported snapshot Once the replication is complete a post replication script can take a new snapshot on the target file system This will result in an immediate update of the view of the shared or exported latest snapshot...

Page 353: ...o the Rule This is assigned when the Rule is created and is used to identify the Rule when creating or configuring policies In Use by Policies A check in the box indicates that the rule is being used by one or more policies Details Click the details button next to the rule to view the complete details regarding it Select a Rule and click remove to delete it ...

Page 354: ...le does Files to Exclude Specifies files or directories to exclude from a replication By default none are excluded When specifying a file or directory type either A full path name relative to the top level directory specified in the replication path The path name must start with a forward slash and an asterisk can be typed at the end as a wildcard character A terminal file or directory name which ...

Page 355: ... it will have to search the entire directory tree looking for changed files When using the changed object list the search only passes through those directories that contain changed files Note Using the change object list is likely to improve performance in some cases such as situations where there are sparse changes However it could also make performance worse in other cases where there are many c...

Page 356: ... that is waited upon Take a Snapshot Used to override the Automatic Snapshot Creation Backup configuration option Note Snapshots are used as an integral part of the algorithm for incremental replication The default option must be chosen in order to make incremental replication copies However when making a complete copy of a directory disable the snapshot generation option Different files will be c...

Page 357: ...ault setting is disable meaning that migrated files and their data will be replicated as normal files Migrated File Remigration This option controls the action at the destination when the source file had been migrated If set to enabled the file will be re migrated when written to the destination volume provided the volume or virtual volume has a Data Migrator path to indicate the target volume If ...

Page 358: ...e e g song mp blue doc file Parentheses spaces greater than and quotation marks are allowed around a filename or path list but they will be treated as literal characters Path and filename can be defined together but must be separated by a comma e g subdir path song doc newfile subdir2 The forward slash is used as a path separator As such it must not be used in a filename list Replication Schedules...

Page 359: ... year and time for the next scheduled replication run for this policy Interval Displays the frequency at which the replication has been scheduled to run Last Status Displays a light indicator for successful and failed replication jobs A green light represents a successful replication job has completed Failed replication jobs will display a red light and the reason for failure Note In case of a rep...

Page 360: ...dules click add schedule a new replication The following screen appears A replication policy must be set up before a replication job can be scheduled Actions Click Add to add a new schedule from the Add Replication Schedule page Click Remove to clear a selected schedule from the list Item Description Replication Policy Select a replication policy from the drop down menu ...

Page 361: ...et rule of daily monthly or weekly from the drop down menu Select the second option to specify replication jobs in number of hours or days Select the third option to have a new replication job start after the previous one has ended The new replication job can start immediately or after a specified number of hours This option also allows you to specify a pause between replications Selecting the fou...

Page 362: ...the scheduled date and time as well as the interval in which the schedule will run can be changed 1 From the Replication page select a schedule to modify 2 Click details 3 To start the selected Replication Policy immediately click run now 4 If the previous replication attempt failed click restart to restart the replication or if available rollback the target file system to the snapshot taken after...

Page 363: ...en replication runs could result in a full replication Deleting the schedule of policy and then rescheduling at a much later date the snapshots will have been purged when the schedule is deleted Scheduling a Date of Final Run then re using the schedule policy weeks after the final run finished the snapshots will have been purged after the final run The schedule section shows the age of the snapsho...

Page 364: ...for the completed replication Policy Displays the policy s name Completed Displays the month date year and time when the replication was completed Duration The amount of time it took for the replication schedule to run Bytes Transferred Displays the volume of data in Bytes that were replicated Status Displays the status on whether the replication was successfully completed ...

Page 365: ... completed replication of interest and click details next to it The following page is displayed Item Description Replication Policy Displays the completed replication policy s name Schedule ID Displays the replication schedule ID Status Indicates whether the replication was successfully completed Frequency Displays how often the Policy is scheduled to run ...

Page 366: ...booted while a replication job was in progress In this case the replication will abort but will restart the next scheduled replication job when comes back on line Note Without any further action upon a replication failure the replication will continue as expected on its next scheduled run However this will recopy any changes already copied during the failed replication attempt Clicking the Run Now...

Page 367: ...t the replication again To Rollback an Incomplete Replication When a replication between a source and target file system successfully completes a snapshot is taken of the target to preserve the state of the file system If a subsequent replication fails because the source file system is offline it may be desirable to restore the target to the state of the last successful replication Do the followin...

Page 368: ...Titan architecture reduces the effect of a virus because the file system is hardware based This prevents viruses from attaching themselves to or deleting system files that are required for server operation However viruses can still propagate and infect users data files that are stored by the server To reduce the effect that a virus may have on users data BlueArc recommends that anti virus is confi...

Page 369: ...figured to enhance performance and high availability of the server If a Virus Scan Engine fails during a virus scan Titan automatically redirects the scan to another Virus Scan Engine Caution When virus scanning is enabled Titan must receive notification from a Virus Scan Engine that a file is clean before allowing access to the file As a result if virus scanning is enabled and there are no Virus ...

Page 370: ...iguration page can be found on the bottom of the Virus Scanning page When installing a Virus Scan Engine select to use the RPC protocol when prompted When configuring McAfee VirusScan set the action to Clean infected files automatically then to Delete infected files automatically Sophos Antivirus reports repaired zip files as an infected file and not a clean scan as the other Scan Engines After in...

Page 371: ...Data Protection 359 Titan SiliconServer To Enable Virus Scanning on the Titan SiliconServer From the Data Protection page click Virus Scanning ...

Page 372: ...the Virus Scan Engine s IP address list However if a Virus Scan Engine fails it may not automatically deregister itself Therefore the Deregister Scanner button removes the failed Virus Scan Engine out of the Titan Registered Virus Servers list Note The Deregister Scanner button should only be used with failed Virus Scan Engines Controlling Which File Types Are Scanned Titan maintains a list of fil...

Page 373: ...MPT MRC MS MSG MSO MP NWS OBD OBT OBJ OBZ OCX OFT OLB OLE OTM OV PCI PDB PDF PDR PHP PIF PL PLG PM PNF PNP POT PP PPA PPS PPT PRC PWZ QLB QPW REG RTF SBF SCR SCT SH SHB SHS SHT SHTML SHW SIS SMM SWF SYS TD0 TLB TSK TSP TT6 VBA VBE VBS VBX VOM VS VSD VSS VST VWP VXD VXE WBT WBK WIZ WK WML WPC WPD WS WSC WSF WSH XL XML XTP 386 Forcing Files to be Rescanned With the appearance of a new virus and rele...

Page 374: ...e the administration of EVS is localized to the server or cluster hosting them A single Titan server or HA cluster can support up to eight EVS To increase availability of file services provided by EVS Titans can be configured as a High Availability HA cluster In an HA cluster EVS can be balanced across the Cluster Nodes based on the load and data access patterns of the individual Cluster Nodes If ...

Page 375: ...nse key s see To Add a License Key Server Farms A Server Farm is a collection of standalone Titan SiliconServers or HA clusters in which all storage resources are combined in a shared Storage Pool Each server or cluster in the Server Farm can host up to a maximum of 8 EVS EVS can be easily migrated between the servers and clusters in the Server Farm through the SMU There are three primary reasons ...

Page 376: ... Managed devices must be located in the same data center not distributed across a campus or MAN environment The following is a typical representation of a Server Farm containing two standalone servers and an HA cluster The following table distinguishes the properties of an HA cluster and a Server Farm Properties HA Cluster Server Farm Can belong to a Server Farm Yes No EVS migration under server f...

Page 377: ...g an EVS EVS must be created and configured before they can be used First EVS must be created and assigned an IP address Then in order for an EVS to provide file services it must be assigned to one or more file systems Maximum number of Titan servers 2 There are no restrictions on the number of servers except that an SMU can only manage 8 Quorum Devices so the Server Farm will have to be arranged ...

Page 378: ... an EVS 1 From the Home page click SiliconServer Admin Then click EVS Management 2 Click Add EVS The Add EVS page appears 3 Enter a Label for the EVS 4 Enter the IP Address of the EVS 5 Enter the Subnet Mask 6 Select the Port to which the EVS will be assigned 7 Click Apply ...

Page 379: ...e Systems 2 Click details next to the file system that will be assigned to the EVS 3 The File System Details screen will appear Next to Current EVS select the EVS to which the file system will be assigned 4 Click assign 5 The File System will now appear as having been assigned to the EVS on the Silicon File Systems page The File System is ready to be mounted 6 Check the box next to the File System...

Page 380: ...scription Type Type of service administration or file Label The EVS label The label is used to help identify the different configured EVS First IP Address EVS can have multiple IP addresses This displays the first IP address assigned to the EVS Status Service status Online Up and capable of providing services Offline Not running While offline EVS are inaccessible ...

Page 381: ...d EVS 3 Click Disable EVS 4 Click Delete EVS Note Deleting an EVS does not affect the file system owned by the EVS Once the EVS has been deleted assign the file system to another EVS to make it available for use Enabled Indicates whether the EVS is enabled If enabled then the EVS is online and will start automatically if the server is rebooted Click Disable EVS to disable the EVS If not enabled th...

Page 382: ...ver or EVS migration from one Cluster Node to another The Quorum Device QD A Quorum Device QD allows the cluster to survive a node to node cluster communication failure and preserves a copy of the registry which contains the cluster s configuration The QD resides and runs on the System Management Unit SMU The SMU can provide QD services for up to eight clusters in a Server Farm Refer to Managing t...

Page 383: ...n to disk to protect it from failures including power loss When the Titan SiliconServer is configured as a cluster each Cluster Node mirrors the NVRAM of the other node thus ensuring data consistency in the event of a hardware failure of a Cluster Node When a Cluster Node takes over for a failed node it uses the contents of the NVRAM mirror to complete all data write transactions that were not yet...

Page 384: ... amongst the Cluster Nodes Note In order to maximize the performance in the cluster the EVS should be distributed in such a way as to even the network client load between them Using the Cluster Wizard In Cluster Wizard a server can be configured as an Active Active Cluster Node and a server can also be configured to join an existing cluster Whether creating a new cluster or joining a node to an ex...

Page 385: ...Server To configure the first Cluster Node 1 From the Home page click SiliconServer Admin Then click Cluster Wizard 2 Click Promote to Active Active 3 Enter the Cluster Node IP Address and Subnet Mask The Port is automatically assigned to mgmnt1 ...

Page 386: ...ster when it is being configured for the first time Caution When joining a node to a cluster the cluster s configuration will overwrite the configuration information of the joining node causing any prior configuration changes to be lost including IP addresses and file system bindings The following details the steps necessary to join a node to a cluster using the Web Manager GUI 1 Connect to the bu...

Page 387: ... from the available list 5 Click Apply The server will automatically reboot Managing a Cluster The following sections explain how to manage the cluster including cluster services file services and server administration and the physical elements which form the cluster cluster nodes and the quorum device Prompt Description Is this node joining a cluster To join the cluster enter y Enter cluster node...

Page 388: ... health Robust Degraded Quorum Device Name Name of server hosting the QD i e the SMU on which the QD resides IP Address IP address of server hosting the QD i e the SMU on which the QD resides Status QD status Configured the QD is attached to the cluster but the QD s vote is not needed i e a cluster of 1 Owned the QD is attached to the cluster and owned by a specific node in the cluster Not up the ...

Page 389: ...tton Add Quorum or Remove Quorum If the QD is removed from the cluster the port will be released back to SMU s pool of QDs and ports Managing Cluster Nodes From the SiliconServer Admin page click Cluster Nodes This screen shows the following Item Description Name Name of Cluster Node IP Address IP address of Cluster Node ...

Page 390: ... pool of available QDs Each instance of the QD service can be viewed and configured by using the quorumdev command in the SMU s CLI interface Using the quorumdev command The Quorum Device QD is a process running on the SMU and is managed using the quorumdev CLI command Access to the SMU s CLI is available using SSH as follows 1 Connect to the SMU using SSH with the manager username and password 2 ...

Page 391: ...gle CIFS share or NFS export Like a file system at the top of the CNS tree is a root directory Subdirectories can then be created under the root directory The root directory and subdirectories in the CNS tree are virtual directories Access to these virtual directories is read only Only Titan s physical file systems support read write access Physical file systems can be made accessible under any di...

Page 392: ...their associated file systems This also means that if a file system containing FTP mount points or iSCSI Logical Units is relocated to a different EVS connectivity will need to be reestablished through the new EVS Tip For the best results FTP mount points and iSCSI Logical Units should be added to file systems that are not part of a Cluster Name Space Note CNS is a licensed feature To create a Clu...

Page 393: ... and or an NFS export must be created for it For instructions see To Setup a CIFS Share or To Add an NFS Export To Create a CNS Directory Directories are an optional configuration element for CNS They can be created under the root directory or under other subdirectories in the CNS tree Directories give structure to the CNS allowing granular control over the organization of physical file system res...

Page 394: ...e to search for one 8 From the bottom of the page click OK to create the File System Link Editing a Cluster Name Space After a CNS has been created any part of it can be changed except for renaming the root directory To Delete a Cluster Name Space Deleting a CNS will permanently erase it Deleting a CNS will not affect the physical file systems accessible through the CNS However once the CNS has be...

Page 395: ... click Apply to open a confirmation message box 7 Click OK to move the directory To Delete a CNS Directory Deleting a CNS directory will permanently remove it and all of its subdirectories and File System Links Deleting CNS directories will not affect physical file systems on the server 1 Move to the SMU Home page 2 From the File Services heading click on CNS to view the CNS page 3 From the CNS di...

Page 396: ...are of the following when using CNS A single name space is supported per server or cluster CNS does not support hard links or move operations across the individual file systems These operations are fully supported but only within a single physical file system i e the part of the CNS tree under a File System Link Relocating file systems under the CNS may interrupt CIFS access to the file system bei...

Page 397: ...rvers of the same HA cluster 1 From the SiliconServer Admin page click EVS Migrate Note This screen will only appear if the SMU is managing multiple Titan SiliconServers in a Server Farm Otherwise clicking EVS Migrate will immediately launch the EVS Migrate page shown in step 2 ...

Page 398: ...te all cluster services from Node ___ to Node ___ radio button 2 Using the drop down menu select the Cluster Node from which to migrate all EVS 3 Select the Cluster Node to which the EVS will be migrated 4 Click Migrate To migrate EVS to a Cluster Node 1 Select the Migrate EVS ____ to Node ___ radio button 2 Using the drop down menu select the EVS to migrate to a Cluster Node 3 Select the Cluster ...

Page 399: ...e Note After migrating EVS between servers in a Server Farm the assignment of tape drives and tape autochanger devices to EVS must be manually adjusted Any tape devices that were specifically assigned to the migrated EVS will have become unassigned Tape devices that had been assigned to any EVS on the source server will remain assigned to any EVS on the source server Tape devices must not be assig...

Page 400: ... down menu 4 Click next 5 Select the settings that should be migrated to the target server Caution Settings selected for cloning will overwrite the currently defined settings on the target server If the existing configuration needs to be preserved do not specify those settings to be cloned 6 Click OK to initiate the Server Cloning of the specified settings Once the server has been prepared through...

Page 401: ...ate an EVS within a Server Farm 1 From the SiliconServer Admin page click EVS Migrate Note This screen will only appear if the current managed server is an HA cluster Otherwise clicking EVS Migrate will immediately launch the EVS Migration page shown in step 2 ...

Page 402: ... source server by clicking Change 4 Using the drop down menu in the Destination Server field select the server to which the EVS should be migrated 5 To test the migration before committing the change click Test Only This will ensure that the EVS migration is possible 6 Click Migrate Note If the source server is offline or doesn t function migration will be performed using an existing backup The fo...

Page 403: ...dministrator as well as BlueArc Global Services as soon as a problem occurs Alerts are issued through email SNMP Syslog and Windows pop ups BlueArc Storage System Status Web Manager provides a flexible customizable and easy to use interface providing the status of each managed device in the BlueArc Storage System Ethernet connected auxiliary devices can be added as managed objects in the System Mo...

Page 404: ...ration Manual 392 Using the Server Status Console Summary status information pertaining to the Titan SiliconServer that is the currently managed server can be viewed from the Web Manager s server console in the home page of the Titan SiliconServer ...

Page 405: ...tus Monitoring page click the System Monitor item The following screen will be displayed This page represents graphically the main components that make up the system e g the server itself storage enclosures etc it shows their status and provides links to more information see table below Status information is cached by the SMU and refreshed every 60 seconds so it may take this long to see changes i...

Page 406: ...n clicking the component Action when clicking the details button Titan SiliconServer This component provides multiple Gigabit Ethernet interfaces to the network and multiple Fibre Channel interfaces to the main enclosure In high availability configurations there are two servers Loads the Server Status page Main Enclosure An FC 14 SA 14 or FC 16 main enclosure contains disk slots dual power supplie...

Page 407: ...s found on its FC links Backup devices are added to the configuration through the SAN Management for backup devices page Loads the NDMP Devices page Loads the Backup SAN Management page Other Components Any component can be added to the system monitor If the device supports a web based management interface the management interface can be launched directly from the server management interface Loads...

Page 408: ...k Secondary cluster interconnect The status of the second cluster interconnect link Quorum communications The status of the link connecting the Cluster Nodes to the Quorum Device Power supply status The status of the power to the server Power supply battery status The status of the power supply s battery Board temperature The status and temperature of the internal server boards If there is a probl...

Page 409: ...s of the Fibre Channel links The number of links that appear is based on the version of SiliconServer blades installed Aggregation ag1 The status of the Gigabit Ethernet interfaces or port aggregations System uptime The time that has elapsed since the server was last switched on or reset Server date and time The date and time configured on the server To change these click the Set date and time hyp...

Page 410: ... RAID controllers if enclosure is a SCE The LRC modules if enclosure is a SEE Batteries Power Supplies Temperature Sensors Fans The Disk drives To Check the Status of a FC 14 or SA 14 storage enclosure 1 From the Home page click Storage Management Then click RAID Racks 2 Check the box next to the name of the Storage Enclosure to view the status Status Indicates whether or not the unit is currently...

Page 411: ...Status Monitoring 399 Titan SiliconServer 3 Click details ...

Page 412: ... to the RAID Rack Identification Controllers The information for each RAID Controller Status The Status of the RAID Controller Mode The Mode of the RAID Controller Firmware The firmware of the RAID Controller Batteries The information for each Battery within the RAID Rack Status Green OK Amber Warning Red Severe Location The location of the batteries within the RAID Rack Age The number of days whi...

Page 413: ...Status of a FC 16 storage enclosure From the Home page click Status Monitoring Then click System Monitor On the System Monitor page click the FC 16 enclosure to view the status To display the concise information on a component hold the mouse pointer over it for a few seconds To view detailed information on a RAID controller or physical disk click the physical disk The upper half of the dialog box ...

Page 414: ...or Description Gray The disk is not present in the enclosure or it has not been configured Blue The disk is present and if there is no overlay functioning normally and part of a System Drive The Web Manager may qualify this status with the following overlays The words Hot Spare indicate that a disk is not part of a System Drive but is available to rebuild it in the event of disk failure An amber o...

Page 415: ...tatus Monitoring 403 Titan SiliconServer RAID Controllers Temperature Physical Disks Checking the Status of the SMU To view the current status of the SMU from the SMU Administration page click SMU Status ...

Page 416: ...x represents the status of the SMU s Operating System This is the actual output gathered from the Unix top command and indicates the current running status of the SMU s internal processes SMU Disk Usage df The information contained in the SMU Disk Usage df box represents output of the Unix command df This provides details of the space used in each of the partitions of the SMU s Hard Disk Services ...

Page 417: ... be the Administration Services IP address as used on the private management network e g 192 0 2 x Username The username used to access the Titan SiliconServer Model The model type e g Titan Cluster Type The cluster type e g Single Node Active Active Cluster Status The current status of the SiliconServer Green indicates that the server is operating normally i e not showing an alert condition Amber...

Page 418: ...e access protocols CIFS NFS and FTP Block access protocols iSCSI Management access Telnet SSC and SNMP Virus scanning Ethernet Statistics The Ethernet statistics display the activity since the last Titan reboot or since the Ethernet statistics were last reset Both per port and overall statistics are available The statistics are updated every ten seconds In addition a histogram which shows the numb...

Page 419: ...ich to view the Ethernet statistics Transmitted The total numbers of bytes and packets successfully transmitted Received The total numbers of bytes and packets successfully received Total The total number of bytes and packets successfully transmitted and received Throughput The receive and transmit rates for both current instantaneous and peak throughput Receive Errors The total number of errors r...

Page 420: ...iconServer Statistics System Administration Manual 408 To view Per Port Ethernet Statistics From the Status Monitoring page click Ethernet Statistics per port This will generate statistics for each defined port ...

Page 421: ...ich to view the Ethernet statistics Last Reset Time The timestamp when the Ethernet statistics were taken Link Status Status of the link Up or Down Bytes The total numbers of bytes and packets successfully transmitted Packets The total numbers of bytes and packets successfully received Receive Throughput Rate bytes second The receive rates for current instantaneous and peak throughput Transmit Thr...

Page 422: ...n seconds To view TCP IP statistics From the Status Monitoring page click TCP IP Statistics Item Field Description Cluster Node If configured as a cluster the Cluster Node to which the TCP IP Statistics correspond is displayed TCP Connections Currently Open the number of currently open connections Maximum Open the peak number of open connections Total Opened the number of connections opened since ...

Page 423: ...sums UDP Packets Transmitted the number of transmitted UDP packets Received the number of received UDP packets Unknown Port the number received on a port with no UDP listener Invalid the number received with invalid UDP checksums ICMP Packets Transmitted the number of transmitted ICMP packets Received the number of received ICMP packets IP Packets Transmitted the number of transmitted IP packets R...

Page 424: ... selected port to zero This screen will refresh every 10 seconds Item Field Description Cluster Node If configured as a cluster select the Cluster Node on which to display the TCP IP Statistics Last Reset Time The timestamp when the TCP IP Statistics was taken TCP Segments Transmitted the number of transmitted TCP segments Received the number of received TCP segments Retransmitted the number of re...

Page 425: ...number received on a port with no UDP listener Invalid the number received with invalid UDP checksums ICMP Packets Transmitted the number of transmitted ICMP packets Received the number of received ICMP packets IP Packets Transmitted the number of transmitted IP packets Received the number of received IP packets Unknown Protocol the number of unknown protocol packets Invalid the number of invalid ...

Page 426: ...ich to display detailed TCP IP Statistics IP Errors Invalid Header Field IP errors from an invalid header field Oversized Segment Fragmented TCP packets greater than the MTU size when re assembled The transmitting source made an error or the packet was corrupted in transit Invalid Source Address IP packets with an invalid source address This can be caused by DHCP broadcast requests using the sourc...

Page 427: ...luster select the Cluster Node on which to view the Fibre Channel Statistics Throughput The number of data bytes received and transmitted per second on the FC Instantaneous and Peak I O Requests The number of read and write requests that the attached storage devices have received and sent Total Requests and Total Responses Total Requests and Responses The total number of requests received and resp...

Page 428: ... From the Status Monitoring page click Fibre Channel Statistics per port Cache The number of hits requests that the cache has served and misses requests not served by the cache and passed to the storage subsystem I O Status Counters The numbers of failed and resubmitted input and output requests Total Errors The number of errors logged at the Fibre Channel interface ...

Page 429: ...s via the following network protocols Network File System NFS Common Internet File System CIFS File Transfer Protocol FTP Internet Small Computer System Interface iSCSI Item Field Description Cluster Nodes If configured as a cluster select the Cluster Node to view the Fibre Channel Statistics Receive and Transmit Throughput Rate bytes second The number of data bytes received and transmitted per se...

Page 430: ...nds From the Home page click Status Monitoring Then click NFS Statistics The number of current clients and the number of NFS calls that clients have sent to the server are shown in the NFS Statistics page Request Description Null Does nothing except to make sure the connection is up GetAttr Retrieves the attributes of a file or directory SetAttr Sets the attributes of a file or directory Lookup Lo...

Page 431: ...nk Creates a symbolic link MkDir Creates a directory RmDir Removes a directory ReadDir Reads from a directory StatFS Gets dynamic file system state information MkNod Creates a special device node device file or named pipe ReadDirPlus Performs an extended read from a directory FSStat Gets dynamic file system state information FSInfo Gets static file system state information PathConf Retrieves POSIX...

Page 432: ...onitoring Select CIFS Statistics In addition to showing the number of current clients this statistics page displays the number of CIFS calls that clients have sent to the server The CIFS calls are listed in the table below Call Description Chkpth Checks that the specified directory path exists Close Closes a file Create Creates a new file or opens an existing one Dskattr Retrieves file system attr...

Page 433: ...ating subfunctions NTtranss Multifunction command for operating subfunctions Open Creates a new file or opens an existing one OpenX Creates a new file or opens an existing one Read Reads data from a file ReadBraw Reads a block of data with no CIFS header ReadX Reads data from a file Rename Renames a file or directory Rmdir Removes a directory Search Lists the files in a directory SessSetupX Logs t...

Page 434: ...st started or when it was last reset The Web Manager updates the FTP statistics every ten seconds Unlink Deletes a file Write Writes data to a file WriteBraw Write a block of data with no CIFS header WriteClose Writes data to a file and then closes the file WriteX Writes data to a file Item Field Description Sessions Current Active Sessions FTP sessions that are currently active ...

Page 435: ...tive sessions Total Files Incoming Files that clients have transferred to the FTP server since you last started the server or reset the statistics File Outgoing for Active Sessions Files that the FTP server has transferred to clients in currently active sessions Total Files Outgoing Files that the FTP server has transferred to clients since you last started the server or reset the statistics Data ...

Page 436: ...Monitoring Then click iSCSI Statistics To view the iSCSI Statistics on specific Cluster Node use the drop down list to select it The screen will automatically refresh with the current iSCSI and SCSI statistics To reset all the statistics to zero click the Reset Statistics button Item Field Description Current Number of Session The number of iSCSI sessions currently hosted by Titan iSCSI Requests N...

Page 437: ...ses unlocks a Logical Unit reservation StartStopUnit Warm reboots the target Read 10 Reads data Verify 10 Verifies data ModeSelect 10 Configure SCSI behavior Release 10 Releases unlocks a Logical Unit reservation RequestSense Requests state information Inquiry Requests device information Reserve 6 Reserves locks a Logical Unit for exclusive access ModeSense 6 Requests SCSI configuration informatio...

Page 438: ...on of the number of ops sec it is performing can be viewed Ops sec can be viewed at two levels The total number of operations performed by a specific Titan SiliconServer The number of operations performed by individual file systems The total operations on a server will essentially be an aggregate of the individual ops performed by all Silicon File Systems hosted by that server Understanding the pe...

Page 439: ...le systems to view under Select 1 5 File Systems Hold down the Ctrl key while clicking to select more than one file system Statistics can be viewed based on a specified range Customize the date range by selecting an option under Choose a Date Range The statistics can be downloaded into csv format by clicking the Download Stats link FS NVRAM Statistics The FS NVRAM Statistics page will provide you ...

Page 440: ...e displayed since Titan was last started or when it was last reset The Web Manager updates the management statistics every ten seconds From the Home page select Status Monitoring then select one of the items in the Management Access Statistics section i e Telnet or SSC a screen similar to the following will Item Field Description NVRAM size Size of NVRAM buffer used to preserve data for disk modif...

Page 441: ...ber of sessions Rejected Sessions The number of failed attempts to establish a connection A connection may fail because the client does not have the required permissions or because the maximum number of concurrent sessions is in progress Frames Frames Transmitted The number of frames packages of information transmitted as single units that the system has sent to clients Frames Received The number ...

Page 442: ...Status Monitoring 430 Titan SiliconServer Bytes Transmitted The number of data bytes that the system has sent to clients Bytes Received The number of data bytes that clients have sent to the system ...

Page 443: ...itan was last started or when it was last reset The Web Manager updates the management statistics every ten seconds From the Status Monitoring page click SNMP Management Statistics Item Field Shows the number of Input Packets SNMP packets the agent has received Bad Community Names SNMP messages received using an unknown community name ...

Page 444: ... the SNMP community named in the message No Such Names PDUs received containing an error status field value of nosuchName Read Onlys PDUs received containing an error status field value of ReadOnly This value is used to detect incorrect SNMP implementations Total Request Varbinds MIB objects successfully retrieved because of valid SNMP Get Request and Get Next PDUs Get Requests Get Request PDUs re...

Page 445: ...uest PDUs sent Traps Trap PDUs sent Drops Silent Drops PDUs delivered but silently dropped because the size of a reply containing an alternate response PDU with an empty variable bindings field was greater than either a local constraint or the maximum message size associated with the originator of the requests Proxy Drops PDUs delivered but silently dropped because the transmission of the message ...

Page 446: ...stem will notify selected personnel when an event is generated according to the level of severity of the event With BlueArc s 24x7 Global Services the automated notifications allows BlueArc Global Services personnel to pro actively monitor the health of the system and address any issues that may occur on the system Item Description Number of virus scans Number of times files are scanned for viruse...

Page 447: ... log can be viewed filtered and saved as a permanent record The log can contain a maximum of 10 000 events Once the event log limit has been reached each new event replaces the oldest event in the log To view and filter the event log 1 From the Home page click Status Monitoring Then click Event Log In a cluster select the Cluster Node for which to display the log The default is the first Cluster N...

Page 448: ...ategory All System or Security 4 Check one or more of the boxes in Event log severity Information Warning Severe and Critical 5 The Refresh Log button will regenerate the log according to the criteria selected 6 The Page Forward and Page Back buttons allow the events to be viewed one page at a time Severity Status Color Information Green Warning Yellow Severe Orange Critical Red ...

Page 449: ...Event Logging and Notification 437 Titan SiliconServer 7 Click an event for more details A dialog box will be displayed with the cause and resolution To empty the log click Clear Event Log ...

Page 450: ...rk that contains the system The event notification may take four forms 1 An Email message which the system sends through an SMTP server See Configuring Email Alerts for more information 2 A WinPopup message for display on Windows NT 2000 2003 XP computers See Setting Up WinPopup Notification for more information 3 An SNMP trap to notify a central Network Management Station NMS of any events genera...

Page 451: ...l Alerts Titan can be configured to send emails to specified recipients to alert them on system events Setting up email alerts requires configuring SMTP Servers The servers on the network to which Titan should email alerts Email Profiles Email profiles allow distribution groups to be created so email recipients are properly notified based on alert threshold criteria To Configure Email Alerts From ...

Page 452: ...ical events and recipients in a third get summary emails on all events with extensive details In a large user group dividing them into separate profiles saves time and simplifies event notification To add an Email Profile 1 From the Home page click Status Monitoring 2 Click Email Alerts Setup Field Description SMTP Primary Server IP Name Type the host name or IP address of the primary mail server ...

Page 453: ...c information that may help recipients to identify the cause of the problem By uuencoding the message any virus scanning software at the recipient s site will be bypassed Send HTML Emails Select this checkbox to receive emails in HTML format HTML emails are easier to read compared to plain text mails and there is easy access to the web UI since the server name in the Email is clickable Send Empty ...

Page 454: ...ediate emails Select to prevent emails from being sent when events are generated by the NDMP backup system Max Email Length Limit the size of the email by designating the maximum number of bytes it can contain It must be stated numerically such as 32768 Send Emails for Critical Events Select the preferred option for the chosen recipient from the drop down menu Immediately Never Send Emails for Sev...

Page 455: ...e the selected recipient from the current profile Click add to add the specified recipient to the current profile Click cancel to discard the latest modifications When all the fields have been completed in the SMTP Email Profile screen click OK to return to the Email Alerts Setup screen Note The SMTP Primary Server IP Name should always point to SMU s Private IP address while the SMTP Secondary Se...

Page 456: ... The SiliconServer has unexpectedly reset When a high number of bad blocks have been identified on any FC 14 or SA 14 RAID Rack in the storage subsystem If enabled once per day at a specified time These diagnostic emails contain details on the servers and storage managed by the SMU As the details in these diagnostic mails can be useful to BlueArc Global Services should their assistance be required...

Page 457: ...st name or other identifier that uniquely identifies the SMU from which the email will be sent Email Subject Enter an easily recognizable subject line for the Daily Status email report HTML Format Select to have the status email sent in HTML format If this is not selected emails will be sent in plain text Send Emails To Enter the email addresses of all the recipients Monthly BlueArc Emails Check t...

Page 458: ...Monitoring 446 Titan SiliconServer Use the down arrow button to add more email addresses Use the X button to delete selected email addresses Use the apply button to register the additions changes on the screen ...

Page 459: ... Notification Frequency Select the notification frequency for each type of alert New Windows popup recipient In the New Windows popup recipient box add the required user names or computer names and click the Add Recipient button Do not enter the IP addresses of the selected computers Delete Recipient To delete a recipient select it from the Windows popup recipients list and click the Delete Recipi...

Page 460: ... series of numbers separated by dots known as the ASN 1 notation BlueArc s SNMP agent not only supports the MIB II specification as described in RFC1213 but also provides the BlueArc Enterprise MIB module making management facilities available beyond those in the MIB II specification Download BlueArc s Enterprise MIB module from the SMU or contact BlueArc Global Services for the latest BlueArc Ent...

Page 461: ... the top of the page select the version of the SNMP protocol with which hosts must comply when sending requests to the agent Alternatively choose to disable the SNMP agent altogether Send Authentication Trap Select this checkbox if the SNMP agent is to send a trap in the event of an authentication failure caused for example by the SNMP host using an incorrect community string when formulating a re...

Page 462: ...ackets In the bottom half of the dialog box choose whether to accept SNMP requests from any host or from authorized hosts only To permit requests from authorized hosts only type the IP address of a host in the Add Host field and then click Add If Titan is to work with a name server the name of the SNMP host can be given rather than its address Send traps To send traps to a specific port number ent...

Page 463: ... Home page click Status Monitoring Then click SNMP Traps Setup Trap name Indication AuthenticationFailure The SNMP agent received a request from an unauthorized manager Either the manager used an incorrect community name or the agent has been setup to deny access to the manager ColdStart The SNMP agent has started or been restarted LinkUp The status of the Ethernet link has changed from Down to Up...

Page 464: ...ommunity names are case sensitive and click the Add button Read and Write communities names must be defined In the Host field type the IP address of an SNMP host to associate with the selected community If the system has been setup to work with a name server type the name of the SNMP host rather than its address Delete Recipient To delete a recipient select it from the Community list and click the...

Page 465: ...rmation warning critical and then enter a test message in the empty box 3 Click Send Test Event Now Field Description Notification Frequency Select the notification frequency for each type of alert New Syslog Recipient Type the name of the recipient in the New Syslog recipient field and click the Add Recipient button Delete Recipient To delete a recipient select it from the Syslog recipients list ...

Page 466: ...asks for the Titan SiliconServer such as firmware upgrades system configuration backup and restore etc are explained in this section Checking Version Information When requesting technical support it is important to have version information about Titan firmware and hardware 10 Maintenance Tasks ...

Page 467: ...liconServer To display version information for a Titan SiliconServer From the SiliconServer Admin page click Version Information If configured as a cluster select the Cluster Node from the drop down list to view the current version information ...

Page 468: ...Maintenance Tasks 456 Titan SiliconServer To display version information for the SMU From the Web Manager home page click the About button at the top right corner of the screen ...

Page 469: ... Configuration files maintained on the SMU or archived on a different system can be restored to the Titan SiliconServer Caution Restored configurations may have different older passwords Update these settings on the Managed SiliconServers page if necessary after rebooting the server If it is not updated the SMU may fail to connect to Titan To Backup the SiliconServer Configuration 1 From the Silic...

Page 470: ...ore information run man span assign to cluster at the CLI Allow access to the Storage Pools For more information see To Allow Access to a Storage Pool Assign the file systems to an EVS If the file system is not currently associated with an EVS this assignment can be performed on the File System Details page See To View the Details of a File System Auto Saved Configurations The SMU automatically sa...

Page 471: ...functions and quorum services provided by the failed SMU Standby SMU An SMU is configured as a standby during the installation phase The setup procedure will prompt whether the SMU being configured should be made a standby SMU If so a custom IP address must be specified for the Standby to use on the private management network For more information on the SMU installation procedure refer to the SMU ...

Page 472: ...MU Administration Then click SMU Backup The configuration backups in the list are identified by the eth0 IP address of the SMU on which the backup was performed Additionally archives that have come in from a Primary SMU will indicate that they are Remote Backing up the SMU Configuration The best way to preserve a copy of the SMU s configuration is by installing a Standby SMU Short of that the SMU ...

Page 473: ...n be installed and the configuration restored from the old unit After the SMU s configuration has been restored the status of any in progress replications at the time the backup took place may be reflected on the main replication page This may result in seeing a replication as being in progress even if the schedule hasn t yet been run after the configuration restore In this case the status will be...

Page 474: ...System Management Unit SMU software and Titan SiliconServer firmware can be upgraded to a newer release Note SMU software and Titan Server firmware are upgraded at the same time It is necessary to verify that the server s flash has sufficient space for the new firmware file to uploaded If there is insufficient space erase one of the old image files before proceeding Upgrading SMU Software To upgra...

Page 475: ...g the new build Note After the SMU upgrade process the SMU may report Titan as out of contact or version mismatch error this is expected and is not a problem The Titan SiliconServer can be upgraded as soon as the SMU has rebooted However the Titan Server will not be managed by the SMU during the SMU upgrade process Upgrading Titan Server Firmware A Titan SiliconServer can store up to three firmwar...

Page 476: ... page click Upgrade Firmware 2 On the SiliconServer Upgrade Selection page use the radio button to select whether the server is or is not a managed server If the server is a Managed Server use the drop down list to select the correct server to upgrade the firmware package If the server is Not a managed server enter the IP Address Username and Password of the SiliconServer ...

Page 477: ...ed both Cluster Nodes will reboot 4 When all the fields have been completed click Apply Item Field Description Free Flash Space The amount of free flash space available If there is not sufficient space to upload the package delete older package files through the Manage Packages page Upgrade File Type the path to the upgrade file or click Browse to search for it Set As default Package Check the box...

Page 478: ... a problem with the uploading the new firmware package the package will not be enabled as the default package and the server will not reboot Managing Titan Firmware Packages Firmware packages can be viewed modified or deleted on the Manage Titan Packages page From the SiliconServer Admin page click Manage Titan Packages Note If configured as a cluster select the Cluster Node from the drop down lis...

Page 479: ... a Private Key The SMU already contains a default private key from which a CSR may be generated It uses default BlueArc values Common Name CN uses the SMU s hostname but other values are BlueArc specific e g OU O BlueArc L San Jose ST CA C US Valid for 3650 days 10 years Key length of 2048 bits To view these values by displaying the SMU s default certificate type the following at the SMU CLI cert ...

Page 480: ...liconServers For each server click details and then OK A backup of this private key and certificate i e the whole keystore may be made for safekeeping 1 Log onto the Web UI 2 Go to Home SMU Administration SMU Backup 3 Click backup and save the resulting zip file to safe and secure location The zip file contains a full backup of the SMU s configuration information The file smu keystore within the z...

Page 481: ...he CA s Trusted Certificate Chain as a file e g home manager veritas pem The SMU already includes popular CA Trust Chains so step 2 may typically be skipped To view these popular CA s see Sun s documentation http java sun com j2se 1 5 0 docs tooldocs solaris keytool html cacerts Note The content of the certificate and trust chain files should only start with BEGIN and end with END CERTIFICATE 1 Lo...

Page 482: ...ate the SMU s default certificate may be restored To Restore the Default Certificate At any time a custom SSL certificate with the default self signed certificate can be replaced 1 Log onto SMU through ssh or it is serial port as user manager and type sudo cert gendefault sh Enter the manager password when prompted 2 Restart the web server tomcat when prompted so that it may pick up the new SSL ce...

Page 483: ...ose to trust the certifying authority In Internet Explorer from the Security Alert dialog box click View Certificate to display the certificate Click Install Certificate and then follow the on screen instructions to install the certificate in the Trusted Root Certification Authorities store Mozilla based browsers will see an alert message similar to the following Selecting Accept the ...

Page 484: ... down the server before turning off the power The shutdown process flushes the data in the cache to disk as a safeguard against the risk of data loss Shutting Down Resetting the Titan SiliconServer To reset or shut down the server 1 From the Home page click SiliconServer Admin Then click Reboot Shutdown Server If configured as a cluster all Cluster Nodes will reset or shut down ...

Page 485: ...ower to the server These batteries should not be allowed to fully discharge as this increases the chances of failure of the battery pack Note Improper shutdown will result in the batteries supplying the NVRAM and if the server is left too long in this state then the batteries will end up fully discharged To shutdown Titan properly before it is shipped or before it is to be left un powered for any ...

Page 486: ...SMU this screen provides three options From the SMU Administration page click SMU Reset Shutdown The Restart button will restart the SMU application software but not the SMU server After the application has started up the application will return to the login page The Reboot button will restart the SMU application and the server It will close down all processes on the server and all connections fro...

Page 487: ...er Default Username and Password Username Password SMU Web Manager admin bluearc SMU CLI manager bluearc SMU Entering this specific username and password will provide unlimited access on the SMU root bluearc Titan SiliconServer CLI supervisor supervisor ...

Reviews: