HP LeftHand Storage User Manual Download Page 87

3.

Click

Filter

.

The list of alarms changes to display only those that contain the filter text.

4.

To display all alarms, click

Clear

to remove the filter.

Viewing and copying alarm details

1.

In the navigation window, log in to the management group.

2.

In the Alarms window, double-click an alarm.

3.

For assistance with resolving the alarm, click the link in either the Event field or the Resolution
field.

The link opens to a database that contains advisories and documents that may have additional
information about the event and how to resolve it. If no results are found, no advisories that
directly apply to that event have been published yet.

4.

Click

Previous Alarm

or

Next Alarm

to view the details of other alarms.

5.

To paste the event details into a document or email message, click

Copy

to copy the details

to the clipboard.

6.

Click

Close

to finish.

Viewing alarms in a separate window

View the alarms in a separate window that you can resize and move to a convenient location on
the screen. Filter alarms, view alarm details, and export alarms from this window.

1.

In the navigation window, log in to the management group.

2.

In the Alarms window, click

Alarm Tasks

, and select

Open Alarms in Window

.

3.

Click

Close

to close the window.

Exporting alarm data to a

.csv

file

1.

In the navigation window, log in to the management group.

2.

In the Alarms window, click

Alarm Tasks

, and select

Export Alarms

.

3.

In the Filename field, enter a path and file name.

If you enter just a file name, the file is stored in the directory in which the CMC is installed.

4.

Click

OK

to finish.

Configuring events

The Events window displays all events for the current management group, according to the dates
in the From and To fields in the toolbar. By default, the system displays about 1,000 events, divided
into pages of 100 events. Scroll through the current page of events and use the << and >> buttons
to display different pages. The title bar of the Filters panel lists the number and severity of the
events, shown in

Figure 40 (page 85)

.

For definitions of the event types and columns, see

“Alarms and events overview” (page 84)

.

Changing the event retention period

NOTE:

Because of space constraints, retention periods longer than one month are not guaranteed.

1.

In the navigation window, log in to the management group.

2.

Select

Events

in the tree.

3.

Click

Event Tasks

, and select

Edit Event Log Policy

.

4.

Change the event retention period. The default is one month.

5.

Click

OK

to finish.

Configuring events

87

Summary of Contents for LeftHand Storage

Page 1: ...uide Abstract This guide provides instructions for configuring individual storage systems as well as for creating storage clusters volumes snapshots and remote copies HP Part Number AX696 96202 Published November 2012 Edition 8 ...

Page 2: ...t under vendor s standard commercial license The information contained herein is subject to change without notice The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services Nothing herein should be construed as constituting an additional warranty HP shall not be liable for technical or editorial errors or omissions cont...

Page 3: ...booting the storage system 23 Powering on or off or rebooting storage systems with modular components 23 Rebooting the storage system 24 Powering off the storage system 24 Upgrading SAN iQ on storage systems 25 Registering advanced features for a storage system 25 Determining volume and snapshot availability 25 Checking status of dedicated boot devices 26 Checking boot device status 26 Getting the...

Page 4: ...n network interfaces 46 TCP status tab 46 Changing speed and duplex settings 47 Changing NIC frame size 48 Jumbo frames 48 Editing the NIC frame size 49 Changing NIC flow control 49 The TCP IP tab 50 Identifying the network interfaces 50 Pinging an IP address 50 To ping an IP address 50 Configuring the IP address manually 51 Using DHCP 51 Configuring network interface bonds 51 Bonding with 10 GbE ...

Page 5: ...group time 73 Using NTP 73 Editing NTP servers 74 Deleting an NTP server 74 Delete an NTP server 74 Changing the order of NTP servers 74 Editing the date and time 75 Editing the time zone only 75 6 Managing authentication 76 Managing administrative users 76 Adding an administrative user 76 Editing administrative users 76 Changing a user s description 76 Changing a user s password 76 Adding group m...

Page 6: ...recipients 91 Configuring SNMP 91 Enabling SNMP agents 92 Enabling the SNMP agent 92 Configuring access control for SNMP clients 92 Adding an SNMP client 92 Editing access control entries 93 Deleting access control entries 93 Disabling the SNMP agent 93 Disabling SNMP 93 Adding SNMP traps 93 Using the SNMP MIBs 95 Troubleshooting SNMP 96 Running diagnostic reports 96 Generating a hardware informat...

Page 7: ... system to log in to 112 Logging out of a management group 112 Adding a storage system to an existing management group 112 Starting and stopping managers 112 Starting additional managers 112 Stopping managers 113 Implications of stopping managers 113 Editing a management group 113 Setting or changing the local bandwidth priority 113 Saving the management group configuration information 114 Shuttin...

Page 8: ...ring cluster usage 133 Editing a cluster 133 Editing cluster properties 133 Editing iSNS servers 133 Editing cluster VIP addresses 134 Reconnecting volumes and applications after changing VIPs or iSNS servers 134 Maintaining storage systems in clusters 135 Adding a storage system to a cluster 135 Upgrading the storage systems in a cluster using cluster swap 135 Reordering storage systems in a clus...

Page 9: ... Using volumes 155 Volumes and server access 155 Prerequisites 155 Planning volumes 155 Characteristics of volumes 156 Creating a volume 157 Viewing the volume map 158 Editing a volume 158 To edit a volume 159 Deleting a volume 160 To delete the volume 161 13 Using snapshots 162 Types of snapshots 162 Uses and best practices for snapshots 162 Planning snapshots 163 Prerequisites for application ma...

Page 10: ...ess 181 Defining SmartClone volume characteristics 181 Naming SmartClone volumes 182 Shared versus individual characteristics 183 Clone point 185 Shared snapshot 187 Creating SmartClone volumes 189 To create a SmartClone volume 189 Viewing SmartClone volumes 190 Map view 190 Using views 191 Viewing clone points volumes and snapshots 192 Editing SmartClone volumes 193 To edit the SmartClone volumes...

Page 11: ...09 Prerequisites 209 Introduction to using performance information 209 What can I learn about my SAN 209 Current SAN activities example 210 Workload characterization example 210 Fault isolation example 210 What can I learn about my volumes 211 Most active volumes examples 211 Activity generated by a specific server example 212 Planning for SAN improvements 212 Network utilization to determine if N...

Page 12: ...ons 233 VIPs 233 iSNS server 233 iSCSI load balancing 233 Authentication CHAP 234 iSCSI and CHAP terminology 235 Example iSCSI configurations 235 Use the HP LeftHand DSM for Microsoft MPIO 237 Fibre Channel and HP LeftHand Storage 237 Creating Fibre Channel connectivity 238 Zoning 238 Using MPIO with Fibre Channel 238 Adding the MPIO Device Hardware ID 238 20 Using the Configuration Interface 239 ...

Page 13: ...led disk 248 Replacing the RAID controller 248 Verifying component failure 248 Removing the RAID controller 250 Installing the RAID controller 253 Verifying proper operation 254 22 SAN iQ TCP and UDP port usage 255 23 Third party licenses 258 24 Support and other resources 259 Contacting HP 259 Subscription service 259 Rack stability 259 Customer self repair 259 HP Insight Remote Support Software ...

Page 14: ...erver access to volumes page 16 5 Assign volumes to the iSCSI server See Planning server connections to management groups page 198 6 Discover targets in the iSCSI Initiator 7 Finish creating storage as necessary for example initialize and partition disks in Microsoft Windows Creating Fibre Channel storage 1 Install FC enabled storage systems on network and fibre channel fabric assign IPs and chang...

Page 15: ... the NIC interfaces and set the frame size NIC flow control and speed and duplex settings Read detailed network configuration instructions in Managing the network page 45 IMPORTANT The network settings must be the same for the switches clients and storage systems Set up the end to end network before creating storage volumes 1 From the navigation window select a storage system in the Available Syst...

Page 16: ...E Names of management groups clusters volumes and snapshots cannot be changed in the future without deleting the management group Enabling server access to volumes Create a server or server cluster to connect application servers to volumes To create a server or server cluster you must first have created a management group a cluster and at least one volume You should also plan the following The app...

Page 17: ... Table 1 Map View display tools Function Tool Icon Zoom In incrementally magnifies the Map View window Zoom Out incrementally reduces the Map View window Magnify creates magnification area like a magnifying glass that you can move over sections of the map view Note that the magnify tool toggles on and off You must click the icon to use it and you must click the icon to turn it off Zoom to Fit retu...

Page 18: ... Changing the locale in the CMC affects the language of the text that appears in the CMC and in the online help After changing the locale you must close and reopen the CMC to see the change Setting naming conventions Use the Preferences window opened from the Help menu to set naming conventions for elements you create when building the HP LeftHand Storage You can use the default values or create y...

Page 19: ...does not appear in the navigation window search again using the Find menu 2 If you have searched using Auto Discover by Broadcast try adding individual IP addresses and clicking Find 3 If you have searched by individual IP addresses try searching by Auto Discover by Broadcast instead 4 If searching again does not work try the following Check the physical connection of the storage system Wait a few...

Page 20: ...ding SNMP traps page 93 Set the SNMP trap recipient to IP address of the system where the remote support client is installed Your network administrator Open port 8959 used for the CLI Adding an administrative user page 76 Set the management group login and password for a read only View_Only_Administrator group user 20 Getting started ...

Page 21: ...ware Each HP LeftHand storage system is based on a specific HP platform For general information about the underlying hardware of your HP LeftHand Storage model such as LEDs component identification and replacing components see the platform specific documentation Table 4 page 21 identifies the HP platform used for each LeftHand model and a link to related information Table 4 HP platform identificat...

Page 22: ...ou are logged in to multiple storage systems you must log out of each storage system individually Changing the storage system hostname The storage system arrives configured with a default hostname Change the hostname as follows 1 In the navigation window log in to the storage system 2 On the Details tab click Storage System Tasks and select Edit Hostname 3 Enter the new name and click OK 4 Click O...

Page 23: ...ee Determining volume and snapshot availability page 25 You should also verify that you have the proper number of managers and possibly a Failover Manager to ensure that quorum is maintained See Managers and quorum page 119 Powering on or off or rebooting storage systems with modular components Some storage systems are comprised of modular components that may include Disk enclosure Server blades e...

Page 24: ...lue when rebooting you cannot cancel the action Any value greater than 0 allows you to cancel before the reboot actually takes place 4 Select Reboot to perform a software reboot without a power cycle 5 Click OK The storage system starts the reboot in the specified number of minutes The reboot takes several minutes 6 Search for the storage system to reconnect the CMC to the storage system once it h...

Page 25: ...tem Using the Feature Registration tab register individual storage systems for advanced features For more information about registering advanced features see Registering advanced features page 226 Determining volume and snapshot availability The Availability tab displays which volumes and snapshots availability depends on this storage system staying online Details include the data protection level...

Page 26: ...an be deactivated or activated using the buttons on this tab However you should only take action on these cards if instructed by HP Technical Support Checking boot device status View dedicated boot device status in the Boot Devices tab window in the Storage category in the storage system tree Getting there 1 Select a storage system in the navigation window and log in if necessary 2 Open the tree b...

Page 27: ...eady to be activated Unformatted The device is not recognized as a boot device Not Recognized The device cannot be used For example the compact flash card is the wrong size or type Unsupported NOTE When the status of a boot device changes an event is generated See Alarms and events overview page 84 Replacing a dedicated boot device If a boot hard drive fails you will see an event that the boot dev...

Page 28: ...ent links Configuring and managing RAID Managing the RAID settings of a storage system includes Choosing the right RAID configuration for your storage needs Setting or changing the RAID configuration if necessary Setting the rate for rebuilding RAID Monitoring the RAID status for the storage system Reconfiguring RAID when necessary RAID Levels The availability of certain RAID levels is determined ...

Page 29: ...ysical drives in the array and allows more simultaneous read operations and higher performance If a drive fails the controller uses the parity data and the data on the remaining drives to reconstruct data from the failed drive The system continues operating with a slightly reduced performance until you replace the failed drive RAID 5 can only withstand the loss of one drive without total array fai...

Page 30: ...ormance and usable capacity CAUTION Plan your RAID configuration carefully After you have configured RAID you cannot change the RAID configuration without deleting all data on the storage system Data protection Keeping multiple copies of your data ensures that data is safe and remains available in the case of disk failure HP recommends using both disk RAID and Network RAID to insure high availabil...

Page 31: ... if a single disk goes down the data on that storage system can be rebuilt using RAID instead of requiring a complete copy from another storage system in the cluster Rebuilding the disks within a single set is faster and creates less of a performance impact to applications accessing data than copying data from another storage system in the cluster RAID 6 provides similar space benefits to RAID 5 w...

Page 32: ... P4500 G2 configured with RAID 10 provides 6 TB of usable storage A single 12 TB HP P4500 G2 configured with RAID 5 provides 9 TB of usable storage However due to the restrictions of how the cluster uses capacity the 12 TB HP P4500 G2 configured with RAID 5 will be limited to 6 TB per storage system In general the best practice is to avoid mixing configurations of various numbers or capacities of ...

Page 33: ... the RAID Setup tab shows Normal the disks provide fully operational data redundancy and performance returns to normal Configuring RAID for a P4800 G2 with 2 TB drives RAID 6 is the default configuration for P4800 G2 storage blades with 2 TB capacity or greater HP recommends using the default configuration Configuring the disks to RAID 5 takes a few minutes in the CMC You must first remove the sto...

Page 34: ...ta would be at risk if another drive failed CAUTION In a degraded RAID 1 or RAID 10 configuration loss of a second disk within a pair results in data loss In a degraded RAID 5 configuration loss of a second disk results in data loss In a degraded RAID 6 configuration the loss of three drives results in data loss The RAID status is located at the top of the RAID Setup tab in Storage RAID status als...

Page 35: ...ails Storage systems with this specific capability Activate Drive ID LEDs Getting there 1 In the navigation window select a storage system 2 Select the Storage category in the tree below it 3 Click the Disk Setup tab Reading the disk report on the Disk Setup tab The Disk Setup tab provides a status report of the individual disks in a storage system Figure 10 page 35 shows the Disk Setup tab and Ta...

Page 36: ...lowing Wear Life Remaining P4900 G2 only Normal Green drive is good Aging Yellow drive is at 5 of remaining estimated life Degraded Yellow drive is at 2 of remaining estimated life Failing Red drive has estimated an 90 days of remaining life Worn out Red drive is at 0 of remaining estimated life Failed Red drive has failed and writes are not permitted The data storage capacity of the disk Capacity...

Page 37: ...aring to replace them NOTE For hardware specific disk LED or component information for your storage system see Identifying the storage system hardware page 21 for document titles and document links Viewing disk status for the VSA For the VSA the Disk Setup window shows 1 virtual disk Figure 1 1 Viewing the disk status of a VSA NOTE To change the size of the data disk in a VSA see the HP LeftHand S...

Page 38: ...in Figure 14 page 38 and correspond to the disk drives from top to bottom left to right Figure 15 page 39 when you are looking at the front of the HP P4300 G2 For the HP P4300 G2 the columns Health and Safe to Remove help you assess the health of a disk and tell you whether or not you can replace it without losing data Figure 14 Viewing the Disk Setup tab in a HP P4300 G2 38 Configuring RAID and M...

Page 39: ...gure 17 page 39 when you are looking at the front of the P4800 G2 Figure 16 Viewing the Disk Setup tab in a P4800 G2 Figure 17 Diagram of the drive bays in a P4800 G2 Viewing disk status for the HP P4900 G2 The disks are labeled 1 through 8 in the Disk Setup window Figure 18 page 40 and correspond to the disk drives from top to bottom left to right Figure 19 page 40 when you are looking at the fro...

Page 40: ... HP LeftHand 4130 The disks are labeled 1 through 4 in the Disk Setup window Figure 20 page 40 and correspond to the disk drives from top to bottom left to right Figure 21 page 41 when you are looking at the front of the HP LeftHand 4130 Figure 20 Viewing the Disk Setup tab in a HP LeftHand 4130 40 Configuring RAID and Managing Disks ...

Page 41: ...em depends upon a number of factors including the RAID configuration the data protection level of volumes and snapshots and the number of disks being replaced Replacing a disk in a storage system that is in a cluster requires rebuilding data on the replaced disk Replacing a disk in a storage system includes the following basic steps Planning for rebuilding data on either the disk or the entire sto...

Page 42: ...isks When replacing multiple disks on a storage system with RAID 5 or RAID 6 When multiple disks on the same mirror set need to be replaced on a storage system with RAID 10 Replacing disks in hot swap storage systems In hot swap storage systems configured with RAID 1 RAID 10 RAID 5 or RAID 6 a faulty or failed disk can be removed and replaced with a new one RAID will rebuild and the drive will ret...

Page 43: ...ent process identify the physical location of both the storage system in the rack and the disk in the storage system Know the name and physical location of the storage system that needs the disk replacement Know the physical position of the disk in the storage system See Verifying disk status page 37 for diagrams of disk layout in the various storage systems Have the replacement disk ready and con...

Page 44: ...ut physically replacing disk drives in the storage system For hardware specific document titles and document links see Identifying the storage system hardware page 21 RAID rebuilding After the disk is replaced RAID starts rebuilding on the replaced disk There may be a delay of up to a couple of minutes before you can see that RAID is rebuilding on the RAID Setup or Disk Setup tabs Figure 24 RAID r...

Page 45: ...d performance on the storage network along with a separate management interface Keep in mind the following requirements when considering the creation of a management network Configure a management network only if your storage systems have more than two NICs Two NICs are the minimum number required to create a bonded interface for the storage network to provide maximum redundancy and performance Us...

Page 46: ...ly unavailable while services restart Examples include unreplicated volumes or snapshots that are causing a restripe of the data After the changes are in place verify the iSCSI sessions or Fibre Channel active paths You may need to update these Managing settings on network interfaces Configure or change the settings of the network interfaces in the storage systems See for more information Requirem...

Page 47: ...e 47 Table 13 Setting storage system speed and duplex settings Switch setting speed duplex Storage system setting speed duplex Auto Auto Auto Auto 1000 Full 1000 Full 100 Full 100 Full 100 Half 100 Half 10 Full 10 Full 10 Half 10 Half NOTE The VSA does not support changing the speed and duplex settings Requirements These settings must be configured before creating NIC bonds If you change these set...

Page 48: ...ocessing time required to transfer data However increasing the frame size requires that routers switches and other devices on your network support that frame size NOTE Increasing the frame size can cause decreased performance and other network problems if routers switches or other devices on your network do not support frame sizes greater than 1500 bytes If you are unsure about whether your router...

Page 49: ...he TCP speed duplex and frame size page 241 Changing NIC flow control Flow control on the NICs prevents data transmission overruns that result in packets being dropped With flow control enabled network packets that would otherwise be dropped will not have to be retransmitted Auto negotiate is the default setting for NIC flow control You can change the setting to manually choose the transmit and re...

Page 50: ... the Configuration Interface which is accessed through the storage system s serial port as described in Using the Configuration Interface page 239 Table 14 Identifying the network interfaces on the storage system Ethernet interfaces Label Where labeled Name of the interface Entries vary depending on the storage system In the Network configuration category in the CMC TCP IP tab eth0 eth1 TCP Status...

Page 51: ...y addressed storage system Using DHCP A DHCP server becomes a single point of failure in your system configuration If the DHCP server goes offline then IP addresses may be lost CAUTION If you use DHCP be sure to reserve statically assigned IP addresses for all storage systems on the DHCP server This is required because management groups use unicast communication NOTE If you plan to bond the NICs y...

Page 52: ...switch This bonding method does not protect against switch failure Adaptive Load Balancing ALB The logical interface balances data transmissions through both NICs to enhance the functionality of the server and the network Adaptive Load Balancing automatically incorporates fault tolerance features as well Best practices HP recommends bonding network interfaces for performance and failover The best ...

Page 53: ...d eth2 Enabled Enabled Disabled Disabled eth3 Enabled Enabled Disabled Disabled Bond ALB Bond ALB Bond Disabled Disabled Bond 802 3ad bond 802 3ad bond Disabled Disabled Bond Bond Passive Bond Active Disabled Disabled Bond Bond Active Bond Passive Disabled Disabled Bond Disabled Bond Active Disabled Bond Passive Bond Bond Active Disabled Disabled Bond Passive Bond Disabled Bond Active Bond Passive...

Page 54: ...ace bond0 controls and monitors the two slave interfaces which are the physical interfaces Table 17 Bonded network interfaces Failover description Failover name Logical interface acting as master bond0 Physical interface acting as slave eth0 or Motherboard Port1 Physical interface acting as slave eth1 or Motherboard Port2 The logical master interface monitors each physical slave interface to deter...

Page 55: ...e bond0 is created The active preferred interface is Motherboard Port1 Bond0 is the master logical interface Motherboard Port1 is Active Motherboard Port2 is connected and is Passive Ready 2 Active interface fails Bond0 detects the failure and Motherboard Port2 takes over Motherboard Port1 status becomes Passive Failed Motherboard Port2 status changes to Active 3 The Motherboard Port1 link is rest...

Page 56: ...switch topology with server failover 1 Servers 2 HP LeftHand Storage systems 3 Storage cluster 4 GigE trunk 5 Active path 6 Passive path The two switch scenario in is a basic yet effective method for ensuring high availability If either switch fails or a cable or NIC on one of the storage systems fails the Active Passive bond causes the secondary connection to become active and take over 56 Managi...

Page 57: ...active status If the interface link to one NIC goes offline the other interface continues operating Using both NICs also increases network bandwidth Requirements for link aggregation dynamic mode To configure Link Aggregation Dynamic Mode Both NICs should be enabled NICs must be configured to the same subnet NICs must be connected to a single switch that is LACP capable and supports 802 3ad link a...

Page 58: ...ues operating Motherboard Port1 status becomes Passive Failed Motherboard Port2 status remains Active 3 Motherboard Port1 link failure is repaired Motherboard Port1 resumes Active status Motherboard Port2 remains Active Summary of NIC states during failover Table 22 page 58 shows the states of Motherboard Port1 and Motherboard Port2 when configured for Link Aggregation Dynamic Mode Table 22 NIC st...

Page 59: ...bnet NICs can be connected to separate switches which must be connected Which physical interface is preferred Because the logical interface uses both NICs for data transfer neither of the NICs in an Adaptive Load Balancing bond is designated as preferred Which physical interface is active When the Adaptive Load Balancing bond is created if both NICs are plugged in both interfaces are active If one...

Page 60: ...ailover Table 24 page 60 shows the states of Motherboard Port1 and Motherboard Port2 when configured for Adaptive Load Balancing Table 24 NIC status during failover with Adaptive Load Balancing Status of Motherboard Port2 Status of Motherboard Port1 Failover status Preferred No Preferred No Normal Operation Status Active Status Active Data Transfer Yes Data Transfer Yes Preferred No Preferred No M...

Page 61: ... page 46 Bond guidelines Create a bond on a storage system before you add the storage system to a management group Create bonds of two interfaces An interface can only be in one bond Record the configuration information of each interface before you create the bond Then if you delete the bond you can return to the original configuration if desired When you delete an Active Passive bond the preferre...

Page 62: ...ork Lose quorum in the management group for a while See for information about deleting NIC bonds using the Configuration Interface Creating the bond 1 Log in to the storage system 2 Select Network 3 On the TCP IP tab select both NICs to bond 4 Click TCP IP Tasks and select New Bond 5 Select a bond type from the drop down list 6 Enter an IP address for the bond or accept the default 7 Enter the Sub...

Page 63: ...ed logical network interface 2 Physical interfaces shown as slaves The bond interface shows as bond0 and has a static IP address The two physical NICs now show as slaves in the Mode column 13 Optional for Active Passive bonds only To change which interface is the preferred interface in an Active Passive bond on the TCP Status tab select one of the NICs in the bond right click and select Set Prefer...

Page 64: ...he Active Passive bond one of the NICs is the preferred NIC In both the Link Aggregation Dynamic Mode bond and the Adaptive Load Balancing bond neither physical interface is preferred Figure 33 page 64 shows the status of interfaces in an Active Passive bond shows the status of interfaces in a Link Aggregation Dynamic Mode bond Figure 33 Viewing the status of an Active Passive bond 1 Preferred int...

Page 65: ...erface assumes the IP address and configuration of the deleted logical interface The other NIC is disabled and its IP address is set to 0 0 0 0 When you delete either a Link Aggregation Dynamic Mode or an Adaptive Load Balancing bond one of the active interfaces in the bond retains the IP address of the deleted logical interface The other NIC is disabled and its IP address is set to 0 0 0 0 1 Log ...

Page 66: ...ry Again on the Network Search Failed message You can also use the Configuration Interface to delete a NIC bond See Deleting a NIC bond page 241 Verify NIC settings and communication settings after deleting a bond 1 Select a storage system and open the tree below it 2 Select Network 3 Check the interfaces on the TCP IP tab and reconfigure them if necessary After deleting a bond the interfaces may ...

Page 67: ...you must reconfigure at least one interface using the Configuration Interface to access the storage system See Configuring a network connection page 240 To disable a network interface 1 Log in to the storage system and open the tree 2 Select Network 3 On the TCP IP tab window select the interface to disable from the list 4 Click TCP IP Tasks and select Edit 5 Click Disable Interface 6 Click OK A c...

Page 68: ...e DNS tab You can remove these DNS servers but SAN iQ will not be able to resolve host names until you enter a new DNS server DNS and static IP addresses If you assigned a static IP address to the storage system and you want the storage system to recognize host names you must manually add a DNS server to the management group DNS tab NOTE If you initially set up the storage system to use DHCP and t...

Page 69: ...y on the TCP IP tab See Configuring the IP address manually page 51 Information for each route listed includes the device the network gateway mask and flags Adding routing information 1 In the navigation window select a storage system and log in 2 Open the tree and select Network 3 Click the Routing tab 4 Click Routing Tasks and select Edit Routing Information 5 Click Add 6 Select the port to use ...

Page 70: ... SAN iQ software The SAN iQ software uses one network interface for communication with other storage systems on the network In order for clustering to work correctly the SAN iQ software communication interface must be designated on each storage system The interface can be A single NIC that is not part of a bond A bonded interface consisting of two bonded NICs NOTE Only NICs that are in the Active ...

Page 71: ...ger running on this storage system is communicating correctly with all managers in the management group Requirements Each time you update the list of managers you must reconfigure application servers that use the management group to which this storage system belongs Only update the list mode if you have reason to believe that there is a problem with the communication between the other managers in ...

Page 72: ... you are using Fibre Channel enabled storage systems in a management group the Fibre Channel tab appears in the Network category for those individual storage systems Verifying Fibre Channel port status 1 In the navigation window select a Fibre Channel enabled storage system and log in 2 Open the tree and select Network 3 Click the Fibre Channel tab 4 Verify the status of the ports Disabling Fibre ...

Page 73: ...s if not using an NTP time service Management group time When you create a management group you set the time zone and the date and time while going through the Management Groups Clusters and Volumes wizard This ensures that all the storage systems in the management group have the same time setting Getting there 1 In the network window select a management group and log in 2 Click the Time tab Refre...

Page 74: ... order you add them and preferred servers are accessed before non preferred servers The first server you add if it is marked preferred has the highest order of precedence The second server you add takes over as a time server if the preferred server fails Editing NTP servers Change whether an NTP server is preferred or not 1 Select an NTP server in the list 2 Click Time Tasks and select Edit NTP Se...

Page 75: ...ate and time for that time zone In the Date group box set the year month and day In the Time group box highlight a portion of the time and increase or decrease it with the arrows You may also enter in the time directly Select a time zone for the Time Zone drop down list NOTE If you use an NTP server you have the option of setting the time zone only 5 Click OK A warning message informs you that the...

Page 76: ...ut of the management group or shut down the CMC for the change to take effect Changing a user s description 1 Log in to the management group and select the Administration category 2 Click Administration Tasks in the tab window and select Edit User 3 Change the user description as necessary 4 Click OK to finish Changing a user s password 1 Log in to the management group and select the Administratio...

Page 77: ... all functions Full_Administrator View only capability to all functions read only View_Only_Administrator Administrative groups can have Different levels of access to the storage system Permission levels are Read Only The default setting for a new group Users can view information only Read Modify Users can view and modify existing settings Full Users can perform all actions view modify add delete ...

Page 78: ...e Administration category 2 Click Administration Tasks in the tab window and select Edit Group 3 Select the permission level for each management function for the group you are creating See Management functions and tasks page 77 for more information 4 Click OK to finish Adding users to an existing group 1 Log in to the management group and select the Administration category 2 Click Administration T...

Page 79: ...Tree root trusts Shortcut trusts Inter forest trusts External trusts Forest trusts Realm trusts trust between Windows and non Windows domains All storage systems in the management group must be online to configure external authentication You must be logged in as a SAN iQ administrative user to set up Active Directory the first time Subsequently Active Directory users with the proper permissions ca...

Page 80: ...ry user permissions If you change permissions in the Active Directory group for an Active Directory user that user must log out of the management group or close the CMC for the change to take effect Configuring external authentication Use the Active Directory credentials to configure external authentication and then associate the external authentication group with a local SAN iQ group 1 Log in to ...

Page 81: ...ove the Active Directory credentials from the SAN 1 Select the Administration category of the management group 2 Click Administration Tasks and select Configure External Authentication 3 Click in each field and delete the data in the field 4 Click Save To remove the external group association from the SAN iQ group which saves the credentials for use with a different SAN iQ group 1 Select the Admin...

Page 82: ...ng SAN status After you have created at least one management group in the CMC the CMC searches for storage systems and then opens to the SAN Status Page Figure 39 page 82 Figure 39 SAN Status Page 1 Status Page toolbar 2 Content panes The SAN Status Page consolidates multiple categories of information in one location from which to monitor multiple features of the SAN at one time These categories o...

Page 83: ...rvers connected to volumes that are using VSS application managed snapshots Customizing the SAN Status Page You can customize the layout of the content panes as well as the information displayed in each content pane Customizing the Status Page content You can customize the content displayed in the following content panes Best Practice Summary View information by management group Select Show Detail...

Page 84: ...opens the page for the selected item or in a few cases the page for the most closely related category For example when you click the arrow next to any of the Best Practice Summary items the page for the management group containing those Best Practice items is displayed Hovering over the management groups listed in content panes displays a tool tip containing the management group name status number...

Page 85: ...r the management group where the alarm occurred IMPORTANT If a firewall is configured and blocks network ports that communicate alarms and events to the CMC notification of those alarms and events will be blocked See a list of ports used in HP LeftHand Storage in SAN iQ TCP and UDP port usage page 255 NOTE Be sure to set up notification of events for each management group See Configuring email not...

Page 86: ...nt or alarm such as system software or a user name Source Working with alarms The Alarms window is always visible at the bottom of the CMC and displays all warning and critical events for all management groups you are logged in to Use the column headings to sort the list of alarms Double click an alarm to see more details Review alarms regularly especially the critical ones and take the appropriat...

Page 87: ...larms window click Alarm Tasks and select Open Alarms in Window 3 Click Close to close the window Exporting alarm data to a csv file 1 In the navigation window log in to the management group 2 In the Alarms window click Alarm Tasks and select Export Alarms 3 In the Filename field enter a path and file name If you enter just a file name the file is stored in the directory in which the CMC is instal...

Page 88: ...sh Viewing events in a separate window View the events in a separate window Resize and move the window to a convenient location on your screen 1 In the navigation window log in to the management group 2 Select Events in the tree 3 Click Event Tasks and select Open Events in Window The events open in a separate window Use this window to filter view details and export events 4 Click Close to close t...

Page 89: ...ing the selected criteria To remove the filters and view all events click Reset Saving filter views Save filter views for later use Custom filters appear in the Filters list in the toolbar below the boldface list of generic filters Custom filters are available for use with any management group from this installation of the CMC 1 Click Events Tasks and select Save Current View as Filter 2 Give the ...

Page 90: ...guring email recipients page 91 IMPORTANT If a firewall is configured and blocks the network port used for sending email alerts emails will be blocked See a list of ports used in HP LeftHand Storage in SAN iQ TCP and UDP port usage page 255 NOTE Until email is fully configured you will not receive notifications Therefore some notifications may not be received while the management group is being co...

Page 91: ...ment group After setting up the email server add email recipients to receive notification based on event severity NOTE To temporarily disable email notification to a recipient possibly because you are doing something that would cause many event emails you can deselect all of the severities This generates an alarm that persists until you set at least one severity again for the recipient To set up e...

Page 92: ... reserved community strings 6 Optional Enter System Location information for the storage system For example this information may include the address building name room number and so on 7 Optional Enter System Contact information Normally this will be the SAN iQ administrator information such as email address or phone number for the person to contact about the storage system 8 Click OK 9 Continue w...

Page 93: ...lect Events SNMP 3 Click SNMP Tasks and select Edit SNMP General Settings 4 Select the Access Control entry from the list 5 Click Edit 6 Change the appropriate information 7 Click OK to close the Edit SNMP Client window 8 Click OK to finish Deleting access control entries 1 In the navigation window log in to the management group 2 In the tree select Events SNMP 3 Click SNMP Tasks and select Edit S...

Page 94: ...d click Edit 5 Change the information as needed Trap Version 1 is required for HP remote support 6 Click OK to close the Edit SNMP Traps window 7 Click OK to finish Removing trap recipients 1 In the navigation window log in to the management group 2 In the tree select Events SNMP 3 Click SNMP Tasks and select Edit SNMP Traps Settings 4 Select one of the Trap Recipients and click Remove 5 Click OK ...

Page 95: ...equire that you copy the MIBs to another location or you may need to copy them to the system where your SNMP client is installed On the system where your SNMP client is installed load the LeftHand Networks MIBs as outlined below using the SNMP client The complete set of standard SNMP MIBs must also be loaded Load the MIBs as follows 1 If you do not have the standard SNMP MIBs loaded load them 2 If...

Page 96: ...ests available The default setting is to run all tests Customize the set of tests to run by changing which tests are selected Clear the check box next to a test to stop that test from running Click Diagnostics Tasks and select Check All or Clear All to streamline the selection process NOTE Running all of the diagnostic tests will take several minutes To shorten the time required to run tests clear...

Page 97: ...ailed if one or more drives fails health test All drives pass health test S M A R T Self Monitoring Analysis and Reporting Disk SMART Health Test Technology is implemented in all modern disks The report was not generated The report was successfully generated Generates a drive health report Generate SMART logs for analysis contact Customer Support The report was not generated The report was success...

Page 98: ...g on the storage system Table 32 Selected details of the hardware report means this This term Hostname of the storage system Hostname Full version number for storage system software Also lists any patches that have been applied to the storage system storage system software IP address of the storage system IP address Support Key is used by a Technical Support representative to log in to the storage...

Page 99: ...number and capacity Drive info For each drive reports the status health and temperature Drive status Information about RAID This includes RAID Rebuild rate Unused devices Statistics Unit number Information about O S RAID RAID O S partitions Status information about the boot device status capacity in MB driver version media used for device and model Boot device statistics Information about the O S ...

Page 100: ...g server in a remote location The computer that receives the log files is called the Remote Log Target You must also configure the target computer to receive the log files 1 Select a storage system in the navigation window 2 Open the tree below the storage system and select Diagnostics 3 Select the Log Files tab 4 Click Log File Tasks and select Add Remote Log Destination 5 In the Log Type list se...

Page 101: ...upport bundle is saved as a zip file 1 Export the management group support bundle using one of the following methods Select a management group in the navigation window right click and select Export Management Group Support Bundle From the CMC menu bar select Tasks Management Group Export Management Group Support Bundle 2 Select the location to save the file NOTE You cannot change the name of the z...

Page 102: ...age system information Working with storage systems page 21 Management group information Working with management groups page 103 Network information Managing the network page 45 RAID information Configuring RAID and Managing Disks page 28 To export the summary 1 From the CMC menu bar select Tasks System Summary 2 Click Export 3 Select a location for the file and rename it if desired 4 Click Export...

Page 103: ... management group one or more of the storage systems acts as the managers that control data transfer and replication Monitoring of daily device logs and real time events by Insight Remote Support is performed at the management group level Planning management groups Before you create a management group you must plan for each component as described in Table 33 page 103 Table 33 Management group comp...

Page 104: ...oth Fibre Channel and iSCSI volumes a VIP is always required in the cluster Virtual IP addresses VIPs You will add the IP address and subnet mask See VIPs page 233 If you create a volume in the wizard you must designate the volume size and data protection level See Characteristics of volumes page 156 Optional Volume size and data protection WWNNs and WWPNs of Fibre Channel enabled storage systems ...

Page 105: ...management group time Recommended To use an NTP server enter the server DNS name or IP address NOTE If you enter a name DNS must be configured on the storage systems in the group To set the time manually select Edit to display the Date and Time Configuration window Check each field on this window to set the time for all storage systems in this management group 2 Click Next Set DNS server 1 Enter t...

Page 106: ...setting up the SAN use the Map View tab for viewing the relationships between servers sites clusters volumes snapshots and remote copies in the management group For more information on using the map view tools see Using the Map View page 17 Logging in to a management group You must manually log in to a management group After you have logged in to one management group the CMC attempts to use the cr...

Page 107: ...5 storage systems are divided among the clusters c c2 and c3 The length of the graph is relative to the recommended maximums in each category For example 3 storage systems in cluster c3 are closer to the cluster recommended maximum for storage systems than the 43 iSCSI sessions are to the maximum recommended iSCSI sessions for a management group Figure 43 Summary graph 1 The items in the managemen...

Page 108: ...p depend largely on the network environment the configuration of the SAN the applications accessing the volumes and how you are using snapshots However the Configuration Summary can provide some broad guidelines that help you manage the SAN to obtain the best and safest performance and scalability for your circumstances These guidelines are in line with HP tested limits for common SAN configuratio...

Page 109: ...ice summary overview The Best Practice summary provides a reference about best practices that can increase the reliability and or performance of your SAN configurations The Best Practice summary is available when you create a management group and is located on the Summary tab with the Configuration Summary If you have more than one management group on the SAN each group is listed in the summary NO...

Page 110: ... storage system in a cluster data protection is provided by configuring RAID 6 on that system In addition to redundancy during normal operation RAID 6 further protects the RAID array against data loss during degraded mode by tolerating one additional drive failure during this vulnerable stage Disk RAID Consistency The best results for availability reliability and performance are achieved by using ...

Page 111: ...ances Adaptive Load Balancing is the recommended bond See Best practices page 52 Network bond consistency To ensure consistent failover characteristics and traffic distribution use the same network bond type in all the storage systems in a cluster Inconsistent network bonds in storage systems in the same cluster may cause inconsistent traffic across NICs and unexpected failover behavior depending ...

Page 112: ... select the management group 2 Click Management Group Tasks on the Details tab and select Log Out of Management Group Adding a storage system to an existing management group Storage systems can be added to management groups at any time Add a storage system to a management group in preparation for adding it to a cluster 1 In the navigation window select an available storage system that you want to ...

Page 113: ...out setting the remote bandwidth Specialized editing tasks include Disassociating management groups See the HP LeftHand Storage Remote Copy User Guide in Chapter 2 Using Remote Copy the section about disassociating remote management groups Setting Group Mode to normal See Manually changing the management group to normal mode page 115 After making any changes to the management group be sure to save...

Page 114: ...hp com go lefthanddownloads Shutting down a management group also relates to powering off individual storage systems and maintaining access to volumes See the HP LeftHand Storage Command Line Interface User Guide for more information Prerequisites Disconnect any hosts or servers that are accessing volumes in the management group Wait for any restriping of volumes or snapshots to complete Stop mana...

Page 115: ...ent group remains in maintenance mode while the repaired or replaced storage system is resynchronizing with the rest of the management group After a management group is shut down a subset of storage systems is powered on The management group remains in maintenance mode until the remaining storage systems are powered on and rediscovered in the CMC For some reason a storage system comes up but it is...

Page 116: ...ou may have to change the data protection level of the volume before removing the storage system from the cluster Remove the storage system from the cluster See Removing a storage system from a cluster page 136 Allow any restripe operations to complete 1 Log in to the management group from which you want to remove a storage system 2 In the navigation window select the storage system to remove 3 Cl...

Page 117: ...w log in to the management group 2 Click Management Group Tasks on the Details tab and select Delete Management Group 3 In the Delete Management Window enter the management group name and click OK After the management group is deleted the storage systems return to the Available Systems pool Deleting a management group 1 17 ...

Page 118: ...us field displays the coordinating manager Best practice for managers in a management group When creating a management group the wizard creates an optimal manager configuration for the number of storage systems used to create the group See Table 38 page 119 for the default manager configurations After you have finished creating the management group be certain to reconfigure managers as necessary t...

Page 119: ...nd communicating with each other for the SAN iQ software to function An odd number of managers is recommended to ensure that a majority is easily maintained An even number of managers can get into a state where no majority exists half of the managers do not agree with the other half This state known as split brain may cause the management group to become unavailable For optimal fault tolerance in ...

Page 120: ...phere or Microsoft Hyper V Server environment and must be installed on network hardware other than the storage systems in the SAN The Failover Manager participates in the management group as a manager however it performs quorum operations only not data movement operations It is especially useful in a Multi Site SAN configuration to manage quorum for the multi site configuration without requiring a...

Page 121: ...P LeftHand Storage network Only one Failover Manager per management group The Failover Manager must not be inside a virtual Windows machine with VMware Server running Planning the virtual network configuration Before you install the Failover Manager on the network plan the virtual network configuration Design and configure the virtual switches and network adapters Identify the Windows server or vC...

Page 122: ...e DVD you created after downloading the DVD iso image from the web 2 Locate the applicable executable and double click it to begin 3 Click Agree to accept the terms of the License Agreement 4 Choose a location for the Failover Manager virtual machine and a location for the virtual hard disks and click Next 5 Enter a name for the Failover Manager select whether you want it powered on after it is in...

Page 123: ...N Appliance and Failover Manager DVD you received or the DVD you created after downloading the DVD iso image from the web 2 Locate the applicable executable and double click it to begin 3 Click Agree to accept the terms of the License Agreement 4 Click Install FOM for VMware vSphere to begin the wizard 5 In the Meta Launcher command line window that opens enter 1 to run the installer CLI or enter ...

Page 124: ...VMware application navigate to the location of the Failover Manager and start the virtual machine 2 Wait for the Failover Manager to boot 3 When the Failover Manager finishes booting enter Start and press Enter to log in to the Configuration Interface 4 On the main menu press Tab to navigate to Network TCP IP Settings and press Enter 5 On the Available Network Devices window press Tab to navigate ...

Page 125: ... to navigate to the method for setting the IP address If entering a static IP address note that Gateway is a required field If you do not have a gateway enter 0 0 0 0 8 Press Tab to navigate to OK and press Enter 9 Press Enter again to confirm the action 10 After the settings are configured press Enter to confirm the IP address change 1 1 On the Available Network Devices window press Tab to naviga...

Page 126: ...management group 2 Power off the Failover Manager virtual machine in the VI Client 3 Right click the powered off Failover Manager and select Delete from Disk Using a virtual manager A virtual manager is a manager that is added to a management group but is not started on a storage system until it is needed to regain quorum The virtual manager functions as an on demand manager in a disaster recovery...

Page 127: ...t group experiences a failure and a loss of quorum To regain quorum you start the virtual manager on a storage system that is operating and in the site that is operational or primary Table 41 Requirements for using a virtual manager Explanation Requirement Total number of managers including the virtual manager Number of regular managers running Disaster recovery scenario Use a virtual manager with...

Page 128: ...site and start the virtual manager on it That site then regains quorum and can continue to operate until the other site recovers When the other site recovers the managers in both sites re establish communication and ensure that the data in both sites is resynchronized When the data is resynchronized stop the virtual manager to return to the disaster tolerant configuration NOTE If the unavailable s...

Page 129: ...er added 1 Virtual manager added Starting a virtual manager to regain quorum Only start a virtual manager when it is needed to regain quorum in a management group Figure 51 page 128 illustrates the correct way to start a virtual manager when necessary to regain quorum When starting a virtual manager it should ideally be on a storage manager that is not already running a manager However if necessar...

Page 130: ...er status Verify whether a virtual manager has been started and if so which storage system it is started on Select the virtual manager in the navigation window The Details tab displays the location and status of the virtual manager Stopping a virtual manager When the situation requiring the virtual manager is resolved either the unavailable site recovers or the communication link is restored you m...

Page 131: ...which you want to remove the virtual manager 2 Click Management Group Tasks on the Details tab and select Delete Virtual Manager 3 Click OK to confirm the action NOTE The CMC does not allow you to delete a virtual manager if that deletion causes a loss of quorum Using a virtual manager 131 ...

Page 132: ...rage systems with different RAID levels in a cluster the capacity will be determined by the mix of RAID levels This capacity impact is particularly important to consider when planning to add storage systems to an existing cluster If you add a storage system with a smaller capacity the capacity of the entire cluster will be reduced For example If you have three storage systems two of which have a R...

Page 133: ...S server 6 Click OK 7 Click OK when finished Cluster Map View After creating clusters and volumes and finishing the setup of HP LeftHand Storage use the Map View tab for viewing the relationships between clusters sites volumes and systems For more information on using the map view tools see Using the display tools page 17 Monitoring cluster usage The Use Summary Volume Use and System Use tabs prov...

Page 134: ...ssions is available through the HP LeftHand Command Line Interface The command syntax is in the HP LeftHand Storage Command Line Interface User Guide which is installed with the CLI NOTE You can only remove a VIP if there is more than one VIP assigned to the cluster 1 Quiesce any applications that are accessing volumes in the cluster 2 Log off the active sessions in the iSCSI initiator for those v...

Page 135: ...ow 3 Click Cluster Tasks and select Edit Cluster Add Storage Systems If there are no storage systems in the management group available to add to the cluster the Add Storage Systems menu item is disabled 4 Select one or more storage systems from the list 5 Click OK 6 Click OK again in the Edit Clusters window A confirmation message opens describing the restripe that happens when a storage system is...

Page 136: ... repaired storage system to the cluster Exchanging a storage system is preferred to adding the repaired storage system to the cluster Exchanging the storage system requires only a resyncronization of the data in the cluster rather than a restripe which minimizes the time required to bring the cluster back to full operation See Repairing a storage system page 138 1 Select the cluster in the navigat...

Page 137: ...this state volume availability is maintained while the storage system is quarantined in the cluster While the storage system is quarantined it does not participate in I O which should relieve the performance degradation After the operations return to normal in 10 minutes the storage system is returned to active duty and resynced with the data that has changed since its quarantine Volumes that depe...

Page 138: ... that contains volumes configured for data protection levels other than Network RAID 0 and trigger only one resynchronization of the data rather than a complete restripe Resynchronizing the data is a shorter operation than a restripe Because of the data protection level removing and returning the storage system to the cluster would normally cause the remaining storage systems in the cluster to res...

Page 139: ... can verify disk status As with repairing a disk problem be sure to plan carefully for a disk replacement 4 Click OK The storage system leaves the management group and moves to the Available Systems pool A placeholder or ghost storage system remains in the cluster It is labeled with the IP address instead of the host name and a special icon 5 Replace the disk in the storage system and perform any ...

Page 140: ...dules to snapshot a volume page 170 4 Click Cluster Tasks and select Delete Cluster A confirmation message opens If the message says that the cluster is in use you must first delete the snapshots and volumes on the cluster The cluster is deleted and the storage systems return to the management group as available 140 Working with clusters ...

Page 141: ...ID configuration page 30 The second factor is the effect of the data protection of the volumes and snapshots See Planning data protection page 142 The third factor is the snapshot configuration including schedules and retention policies See Managing capacity using volume size and snapshots page 148 The fourth capacity factor is the impact of using Remote Copy as part of your backup and recovery st...

Page 142: ...ou expand a basic disk using Windows Logical Disk Manager and Diskpart For detailed instructions see Changing the volume size on the server page 153 Planning data protection Data protection results from creating data redundancy for volumes on the SAN Configure data protection levels called Network RAID when you create a volume Because data is stored redundantly on different storage systems all dat...

Page 143: ...torage systems including single parity Network RAID 5 Single Parity At least 5 One copy Network RAID 0 None Network RAID 10 Two copies Three copies Network RAID 10 1 3 Way Mirror Network RAID 10 2 4 Way Mirror Four copies Data striped on five storage systems including single parity Network RAID 5 Single Parity Network RAID 6 Dual Parity Data striped on five storage systems including dual parity At...

Page 144: ... page 118 CAUTION Any volume with Network RAID 0 is not protected from complete system failure or reboot Network RAID 10 2 Way Mirror Network RAID 10 data is striped and mirrored across two storage systems Network RAID 10 is the default data protection level assigned when creating a volume as long as there are two or more storage systems in the cluster Data in a volume configured with Network RAID...

Page 145: ... that must remain fully redundant in the case of an entire site failure Using Network RAID 10 2 ensures that data remains available after half of the SAN is unavailable and continues to remain available even with the loss of a single storage system in the remaining site Figure 58 page 145 illustrates the write patterns on a cluster with four storage systems configured for Network RAID 10 2 Figure ...

Page 146: ... using Network RAID 6 the Network RAID stripe spans five to seven nodes including dual parity Data in a volume configured with Network RAID 6 is available and preserved in the event that any two storage systems become unavailable Network RAID 6 volumes are configured as thin provisioned by default Best applications for using Network RAID 6 volumes include applications with mostly read sequential w...

Page 147: ...tem preservation before upgrading software Protection against data deletion File level restore without tape or backup software Snapshots versus backups Backups are typically stored on different physical devices such as tapes Snapshots are stored in the same cluster as the volume Therefore snapshots protect against data deletion but not device or storage media failure Use snapshots along with backu...

Page 148: ...rrence or frequency and the retention policy for the schedules affect the amount of space used in the cluster For example it is possible for a new snapshot and one snapshot scheduled for deletion to coexist in the cluster for some period of time If there is not sufficient room in the cluster for both snapshots the scheduled snapshot will not be created and the schedule will not continue until an e...

Page 149: ...unt of space in the cluster and its allocation as provisioned and available Storage space is broken down as shown in Table 44 page 149 Table 44 Information on the Use Summary tab Description Category Table information Storage Space Combined space available in the cluster for storage volumes and snapshots Total Amount of space allocated for storage including both volumes and snapshots This value in...

Page 150: ...can Provisionable grow to fill and this value can exceed the physical capacity of the SAN As an over provisioned cluster approaches the physical capacity of the SAN a series of warnings displays on the Use Summary window Volume use summary The Volume Use window presents detailed information about the volume characteristics that affect the utilization of the cluster Table 45 Information on the Volu...

Page 151: ... points below it the clone point and any snapshot below it comprise the Shared Space listed next to the consumed space To regain the Shared Space you must delete the clone point and any snapshots below it For instructions on deleting clone points see Deleting the clone point page 194 Deleting files or data from client applications does not decrease the used space For more information see Measuring...

Page 152: ...le systems are placed on block devices File systems are given authority over reads and writes to block devices iSCSI does not operate at the file system level of abstraction Instead it presents the iSCSI SAN volume to an OS such as Microsoft Windows as a block device Typically then a file system is created on top of this block device so that it can be used for storage In contrast an Oracle databas...

Page 153: ... size on the SAN you must next expand the Windows partition to use the full space available on the disk Windows Logical Disk Manager the default disk management program that is included in any Windows installation uses a tool called Diskpart exe to grow volumes from within Windows Diskpart exe is an interactive command line executable which allows administrators to select and manipulate disks and ...

Page 154: ...ng schedules to snapshot a volume taking snapshots less frequently requires less space Deleting volumes or moving them to a different cluster NOTE Deleting files on a file system does not free up space on the SAN volume For more information see Block systems and file systems page 152 For file level capacity management use application or file system level tools 154 Provisioning storage ...

Page 155: ...Creating a cluster page 132 Planning volumes Planning volumes takes into account multiple factors The number of volumes you need The type of volumes you are creating primary or remote The size for each volume Whether you plan to use snapshots The level of data protection required Whether you plan to grow the volume or leave it the same size NOTE Microsoft Windows 2008 supports dynamic disks If you...

Page 156: ...ystems operate as if storage space equal to the volume size Primary Size is available in the cluster This volume size may exceed the true allocated disk space on the cluster for data storage which facilitates adding more storage systems to the cluster later for seamless storage growth However if the volume size does exceed true allocated disk space the ability to make snapshots may be impacted See...

Page 157: ...twork RAID 10 1 3 Way Mirror Network RAID 10 2 4 Way Mirror The default value Thin for the following data protection levels Network RAID 5 Single Parity Network RAID 6 Dual Parity Thin provisioning is the best practice configuration for Network RAID 5 and Network RAID 6 volumes NOTE The SAN iQ operating system software allocates space as needed However thin provisioning carries the risk that if al...

Page 158: ... size and advanced characteristics such as the cluster data protection level type and provisioning NOTE Moving the volume to a different cluster requires restriping the data in both clusters Restriping can take hours or even days Table 49 Requirements for changing volume characteristics Requirements for Changing Item Must be from 1 to 127 characters Description Server must have already been create...

Page 159: ...e the size of the volume below the size needed for data currently stored on the volume CAUTION HP recommends that you do not decrease the volume size If you shrink the volume in the CMC before shrinking it from the server file system your data will be corrupted or lost To edit a volume 1 In the navigation window select the volume you want to edit 2 Click Volume Tasks and select Edit Volume Changin...

Page 160: ...ys To change the cluster migrate the volume 1 On the Edit Volume window click the Advanced tab 2 In the Cluster list select a different cluster 3 Click OK Changing the data protection level 1 In the Data Protection Level list select the level of Network RAID you want Changing a volume to either Network RAID 5 or Network RAID 6 requires that volume to have a snapshot schedule If the volume does not...

Page 161: ...og off all associated iSCSI sessions To delete the volume 1 In the navigation window select the volume you want to delete 2 Click Volume Tasks and select Delete Volume 3 Click Delete Volume on the confirmation message Delete multiple volumes 1 In the navigation window select Volumes and Snapshots 2 Select one or more snapshots and volumes to delete Figure 65 Deleting multiple volumes in one operat...

Page 162: ...on but not device or storage media failure Use snapshots along with backups to improve your overall data backup strategy Uses and best practices for snapshots You create snapshots from a volume on the cluster At any time you can roll a volume back to a specific snapshot create a SmartClone volume or use Remote Copy from a snapshot You can mount a snapshot to a different server and recover data fro...

Page 163: ...en creating a snapshot you define the following characteristics or options Table 51 Snapshot characteristics What it means Snapshot parameter This option quiesces applications on the server before the SAN iQ software creates the snapshot This option requires Application Managed Snapshot the use of the Application Aware Snapshot Manager For more information see Prerequisites for application managed...

Page 164: ...nd Application Aware Snapshot address of the vCenter Server as the Controlling Server IP address Manager latest update installed on the application server See the HP LeftHand Storage Application ESX Server software iSCSI initiator Aware Snapshot Manager Deployment Guide Management group authentication set up for the Application Aware Snapshot Manager see the HP LeftHand Storage Application Aware S...

Page 165: ... the management group that contains the volume for which you want to create a new snapshot 2 Right click the volume and select New Snapshot 3 Optional If you are using the Application Aware Snapshot Manager and want to quiesce the application before creating the snapshot select Application Managed Snapshot The system fills in the Description field and disables the Assign and Unassign Servers butto...

Page 166: ... up to five snapshots After creating the sixth snapshot the earliest snapshot is deleted thereby keeping the number of snapshots on the volume at five A schedule can also create a single snapshot and then delete it when it is no longer needed Snapshot schedules can also be paused and resumed Scripting snapshots either recurring or single snapshots can also take place on the server side Scripted sn...

Page 167: ...t a Volume window will be used with sequential numbering For example if the name is Backup the list of snapshots created by this schedule will be named Backup 1 Backup 2 Backup 3 Optional Must be from 0 to 127 characters Description The start date and time is usually set for the future However it can be set to occur in the past If set for a past Start at time and date a snapshot is created immedia...

Page 168: ...en you are finished setting the date and time 7 Select a recurrence schedule 8 If you want to to quiesce the application before creating the snapshot select Application Managed Snapshot This option requires the use of the Application Aware Snapshot Manager For more information see Prerequisites for application managed snapshots page 164 If the Application Aware Snapshot Manager is not installed th...

Page 169: ...e the current volume set information The information is automatically updated when you click OK 7 Click OK Pausing and resuming scheduled snapshots At times it may be convenient to prevent a scheduled snapshot from taking place When you pause a snapshot schedule the snapshot deletions for that schedule are paused as well When you resume the schedule both the snapshots and the snapshot deletions re...

Page 170: ...pting page 196 and the HP LeftHand Storage Command Line Interface User Guide for information about the SAN iQ software command line interface Mounting a snapshot A snapshot is a copy of a volume To access data in the snapshot you have two choices Create a SmartClone volume from the snapshot to use for data mining development and testing or creating multiple copies See Create a new SmartClone volum...

Page 171: ...art of a Microsoft cluster 1 Disconnect the iSCSI sessions 2 Do one of the following based on what you want to do with the application managed snapshot Convert temporary space Create a SmartClone Promote a remote volume to a primary volume using Failover Failback Volume Wizard and selecting the Failover the Primary Volume to the Selected Remote Volume Below option Edit Volume and changing a remote...

Page 172: ... the Primary Volume to the Selected Remote Volume Below option Edit Volume and changing a remote snapshot to a primary volume 3 Connect the iSCSI sessions to the new target volume 4 Launch Windows Logical Disk Manager 5 Bring the disk online 6 Open the system event log and find the IDs for the disks you are working with The disks will have new disk IDs The log will show errors for the disks along ...

Page 173: ... contains the original snapshot data plus any additional data written after the snapshot was mounted Prerequisites Stop any applications that are accessing the snapshot and log off all related iSCSI sessions To convert the temporary space 1 Right click the snapshot for which you want to save the additional data 2 Select Convert Temporary Space from the menu 3 Enter a name for the volume and an opt...

Page 174: ...lume and log off all related iSCSI sessions If a volume is part of a volume set typically you want to roll back each volume using its corresponding snapshot The system gives you the option to automatically roll back all associated volumes To see any associated snapshots select a snapshot click the Details tab and look at the Snapshot Set field For more information see Creating snapshots for volume...

Page 175: ...th standard roll back page 175 Click Cancel See Cancel the rollback operation page 177 NOTE This will only the roll back the volume of the selected snapshot Click OK This is not recommended Click Roll Back Volume See Continue with standard roll back page 175 NOTE This will leave some snapshot sets incomplete This is not recommended Click Cancel See Cancel the rollback operation page 177 Continue w...

Page 176: ...e SmartClone from an application managed snapshot use diskpart exe to change the resulting volume s attributes For more information see Making a Windows application managed snapshot available page 171 Roll back all associated volumes The recommended method for rolling back a snapshot that is part of a snapshot set is to roll back each volume to its corresponding snapshot For more information about...

Page 177: ...nding snapshot The system gives you the option to automatically delete or roll back all associated volumes CAUTION Network RAID 5 and Network RAID 6 volumes require snapshots in order to achieve space utilization benefits This means that deleting the last snapshot of a Network RAID 5 volume causes its space requirement to be the same as a Network RAID 10 2 Way Mirror volume Similarly deleting the ...

Page 178: ...ary tab in the Cluster tab window described in Cluster use summary page 149 Multiple SmartClone volumes can be individually managed just like other volumes SmartClone volumes can be used long term in production environments Examples of common uses for SmartClone volumes Deploy large quantities of virtual machine clones including virtual servers and virtual desktops Copy production data for use in ...

Page 179: ... prepare it for duplication Then you can create large quantities of SmartClone volumes from that master image without using additional storage capacity Each SmartClone volume you create from the master image is a full read write version of the operating system and has all the same management features as a regular volume Scenario Computer training lab You run a computer lab for a technical training...

Page 180: ...s for SmartClone volumes Space requirements SmartClone volumes inherit the size and data protection level of the source volume and snapshot When creating a SmartClone volume you first create a snapshot of the source volume and create the SmartClone volumes from that snapshot which is then called the clone point You can select the provisioning method when creating SmartClone volumes See Provisionin...

Page 181: ...page 197 Defining SmartClone volume characteristics When creating SmartClone volumes you define the following characteristics Table 56 Characteristics for new SmartClone volumes What it means SmartClone volume characteristic The number of SmartClone volumes you want to create You can create up to 25 as one operation in the CMC Quantity and then repeat the process to create the desired number of Sm...

Page 182: ...martClone volume you can designate the base name for the volume This base name is then used with numbers appended incrementing to the total number of SmartClone volumes you create For example Figure 70 page 182 shows a SmartClone volume with the base name of C and 10 clones The number in parentheses indicates how many snapshots are under that volume Figure 70 Example of using a base name with 10 S...

Page 183: ...me that change will apply to all related volumes and snapshots including the original volume and snapshot from which you created the SmartClone volumes Simply use Edit Volume on the selected volume and make the change to the volume A message opens stating that the change will apply to all of the related volumes which are noted in the message For example in Figure 72 page 184 in the cluster Program...

Page 184: ...ume and on the Advanced tab you change the cluster to SysAdm The confirmation message lists all the volumes and snapshots that will change clusters as a result of changing the edited volume Figure 73 Changing one SmartClone volume changes all related volumes and snapshots When you click OK on the message all the volumes and snapshots move to the cluster SysAdm 184 SmartClone volumes ...

Page 185: ...ta protection level Size Type Primary or Remote Provisioning Thin or Full Server NOTE Snapshot schedules and remote copy schedules are also individual to a single SmartClone volume Clone point The icon shown here represents the clone point in the navigation window The clone point is the snapshot from which the SmartClone volumes are created The clone point contains the snapshot data that is shared...

Page 186: ...rks clone point C First a volume C _SCsnap Next a snapshot C class_1 Next SmartClone from the snapshot Snapshot becomes a clone point Because the SmartClone volumes depend on the clone point from which they were created the clone point appears underneath each SmartClone volume in the navigation window While the clone point may appear many times it only exists as a single snapshot in the SAN Theref...

Page 187: ...y the same in each spot NOTE Remember that a clone point only takes up space on the SAN once Shared snapshot Shared snapshots occur when a clone point is created from a newer snapshot that has older snapshots below it in the tree They are designated in the navigation window with the icon shown here Shared snapshot 187 ...

Page 188: ...hots Table 59 How it works shared snapshots C First a volume C _snap1C _snap2C _SCsnap Next 3 snapshots C class_x Finally SmartClone volumes from the latest snapshot Latest snapshot becomes clone point Older two snapshots become shared between clone point and SmartClone volume The shared snapshots also appear under all the volumes which share them In Figure 77 page 188 they are displayed under the...

Page 189: ...g SmartClone volume characteristics page 181 1 Log in to the management group in which you want to create a SmartClone volume 2 Select the volume or snapshot from which to create a SmartClone volume From the main menu you can select Tasks Volume New SmartClone or Tasks Snapshot New SmartClone Select the desired volume or snapshot from the list that opens In the navigation window select the cluster...

Page 190: ...window under the volume folder Figure 79 New SmartClone volumes in Navigation window 1 Clone point 2 New SmartClone volumes Viewing SmartClone volumes As you create multiple SmartClone volumes you can view them and their related volumes and snapshots in both the navigation window and in the Map View tab shown in Figure 80 page 191 Because a SmartClone volume is the same as any other volume the ico...

Page 191: ...clones or shared snapshots You may also display the Map view in the organic layout The organic layout is more useful when you have a single clone point with many volumes such as large numbers in a virtual desktop implementation In such a case the tree quickly becomes difficult to view and it is much easier to distinguish the multiple volumes in the organic layout See Using the Map View page 17 for...

Page 192: ... snapshots includes highlighting that shows the relationship between related items For example in Figure 82 page 193 the clone point is selected in the tree The clone point supports the SmartClone volumes so it is displayed under those volumes The highlight shows the relationship of the clone point to the original volume plus the SmartClone volumes created from the original volume 192 SmartClone v...

Page 193: ...al Servers All related volumes and snapshots will move automatically to the target cluster The target cluster must Shared Cluster Reside in the same management group Have sufficient storage systems and unallocated space for the size and data protection level of the volume and all the other related volumes and snapshots being moved When moving volumes to a different cluster those volumes temporaril...

Page 194: ...ge If there are too many volumes to list a subset will be listed with a note indicating how many additional volumes will be affected Deleting SmartClone volumes Any volumes or snapshots that are part of a SmartClone network can be deleted just like any other volumes or snapshots The only exception is the clone point which cannot be deleted until it is no longer a clone point CAUTION Before deletin...

Page 195: ...to display the list of SmartClone volumes in the cluster Figure 84 List of SmartClone volumes in cluster 2 Use Shift Click to select the SmartClone volumes to delete 3 Right click and select Delete Volumes A confirmation message opens 4 When you are certain that you have stopped applications and logged off any iSCSI sessions check the box to confirm the deletion and click Delete It may take a few ...

Page 196: ...eftHand Management Software DVD or download the software from http www hp com go LeftHandDownloads Documentation You can also download sample scripts that illustrate common uses for the CLI The HP LeftHand Storage Command Line Interface User Guide is installed with the CLI and is also available from the HP LeftHand Storage manuals website http www hp com support LeftHandManuals 196 Working with sc...

Page 197: ...n initiator WWPN NOTE Before setting up a server connection make sure you are familiar with the Fibre Channel or iSCSI information in HP LeftHand Storage using iSCSI and Fibre Channel page 233 Setting up server connections to volumes requires the general tasks outlined in Table 61 page 197 Table 61 Overview of configuring server access to volumes For More Information Task For iSCSI connectivity if...

Page 198: ...over events Characteristics of iSCSI server connections For detailed information about using iSCSI with HP LeftHand Storage including load balancing and CHAP authentication see HP LeftHand Storage using iSCSI and Fibre Channel page 233 Table 62 Characteristics of iSCSI server connections Description and requirements Item Name of the server that is displayed in the CMC The server name is case sensi...

Page 199: ... OK 10 Optional To use CHAP edit the server connection you just configured and complete the fields necessary for the type of CHAP you intend to configure as shown in Table 63 page 199 Table 63 Entering CHAP information in a new server Complete these fields For this CHAP Mode 1 way CHAP CHAP name Target secret minimum of 12 characters 2 way CHAP CHAP name Target secret minimum of 12 characters Init...

Page 200: ...indow select the iSCSI server connection you want to delete 2 Click the Details tab 3 Click Server Tasks and select Delete Server 4 Click OK to delete the server Completing the iSCSI Initiator and disk setup After you have assigned a server connection to one or more volumes you must configure the appropriate iSCSI settings on the server For information about iSCSI see HP LeftHand Storage using iSC...

Page 201: ... Fibre Channel initiators that are assigned to a server Assigned Initiator WWPN Adding a Fibre Channel server connection 1 In the navigation window log in to the management group 2 Click Management Group Tasks and select New Server 3 If this server is only used for Fibre Channel connectivity clear Allow access via iSCSI NOTE If you want to leave iSCSI access allowed you must add the initiator node...

Page 202: ...en you are finished Editing a Fibre Channel server connection Edit the following items for a Fibre Channel server connection Description Controlling server IP address Initiator WWPN assignments 1 In the navigation window select the Fibre Channel server connection you want to edit 2 Click the Details tab 3 Click Server Tasks and select Edit Server 4 Change the appropriate information 5 Click OK whe...

Page 203: ...ailover cluster quorum is never at risk If any additional failures occur that require failover failback of the witness disk to maintain failover cluster quorum that failover happens properly See the Microsoft TechNet article http social technet microsoft com Forums en windowsserver2008r2highavailability thread a762606e 3f85 43a9 995b d4fee95b08c1 for more information Requirements for clustering se...

Page 204: ...icon Viewing the relationship between storage systems volumes and servers After you create a server cluster and connect volumes use the Map View tab for viewing the relationships between systems volumes and servers For more information on using the map view tools see Using the display tools page 17 Server cluster map views include the following Servers to volumes Servers to systems Editing a serve...

Page 205: ...our management group you can assign one or more volumes or snapshots to the server connection giving the server access to those volumes or snapshots CAUTION Without the use of shared storage access host clustering or clustered file system technology allowing more than one iSCSI application server to connect to a volume at the same time without cluster aware applications and or file systems in read...

Page 206: ...ion you want to assign 2 Select Assign and Unassign Volumes and Snapshots 3 Select the Assigned check box for each volume or snapshot you want to assign to the server connection 4 From the Permission list select the permission the server should have 5 Click OK You can now connect to the volume from the server s iSCSI initiator See Completing the iSCSI Initiator and disk setup page 200 Assigning vo...

Page 207: ...box for each volume or snapshot you want to assign to the server connection 4 Set the LUN number for each 5 From the Permission list select the permission each server connection should have to the volume or snapshot 6 Click OK You can now connect to the volume from the Fibre Channel host Assigning a boot volume to a Fibre Channel server Assign a boot volume to any Fibre Channel server connection 1...

Page 208: ...eded 4 Click OK Editing server assignments from a server connection You can edit the assignment of one or more volumes or snapshots to any server connection 1 In the navigation window right click the server connection you want to edit 2 Select Assign and Unassign Volumes and Snapshots 3 Change the settings as needed 4 Click OK 208 Controlling server access to volumes ...

Page 209: ...aving this data helps you better understand what performance you should expect in a given configuration Storage system performance data will allow you to easily isolate for example a specific storage system with higher latencies than the other storage systems in the cluster Prerequisites You must have a cluster with one or more storage systems and one or more volumes connected via iSCSI sessions A...

Page 210: ...w of cluster activity Workload characterization example This example lets you analyze the workload generated by a server ExchServer 1 including IOPS reads writes and total and the average IO size Figure 88 Example showing volume s type of workload Fault isolation example This example shows that the Denver 1 storage system dotted line pegged at the top of the graph has a much higher IO read latency...

Page 211: ...by a specific server Most active volumes examples This example shows two volumes DB1 and Log1 and compares their total IOPS You can see that Log1 averages about 2 times the IOPS of DB1 This might be helpful if you want to know which volume is busier Figure 90 Example showing IOPS of two volumes This example shows two volumes DB1 and Log1 and compares their total throughput You can see that Log1 av...

Page 212: ...ew storage systems Which volumes should I move to them to improve performance Which cluster should I add them to The Performance Monitor can let you see the following Network utilization to determine if NIC bonding on the storage systems could improve performance Load comparison of two clusters Load comparison of two volumes Network utilization to determine if NIC bonding could improve performance...

Page 213: ...g you compare the usage of those clusters You can also monitor one cluster in a separate window while doing other tasks in the CMC Figure 94 Example comparing two clusters Load comparison of two volumes example This example shows the total throughput for a cluster and the total throughput of each volume in that cluster You can see that the Log1 volume generates most of the cluster s throughput Pla...

Page 214: ...y default it displays the cluster total IOPS cluster total throughput and cluster total queue depth Figure 96 Performance Monitor window and its parts 2 Graph 1 Toolbar 4 Statistics table 3 Default statistics You can set up the Performance Monitor with the statistics you need The system continues to monitor those statistics until you pause monitoring or change the statistics The system maintains a...

Page 215: ... Unit of measure for the data update frequency either minutes or seconds 7 Sample Interval Units 8 Export status N A No export has been requested Sample interval and duration If you have exported data sample interval and duration display Paused You paused an export Stopped You stopped an export Warning System could not export data Click the Warning text for more information Error System stopped th...

Page 216: ...to GMT See Changing the sample interval and time zone page 220 This time zone setting is not related to the management group time zone For information about controlling the look of the graph see Changing the graph page 223 Performance monitor table The performance monitor table displays a row for each selected statistic Figure 99 Performance Monitor table The table shows information about the stat...

Page 217: ...ing the performance statistics You can select the performance statistics that you want to monitor For clusters volumes and snapshots the statistics being reported are based on client IO This is the iSCSI traffic and does not include other traffic such as replication remote snapshots and management functions For storage systems and devices the statistics report the total traffic including iSCSI tra...

Page 218: ...for the sample interval Average Read Size X X X Average write transfer size for the sample interval Average Write Size X X X Average read and write transfer size for the sample interval Average I O Size X X Number of outstanding read requests Queue Depth Reads X X Number of outstanding write requests Queue Depth Writes X X X Number of outstanding read and write requests Queue Depth Total X X X Ave...

Page 219: ...compare multiple clusters at the same time You can open one window per cluster and rearrange the windows to suit your needs 1 From the Performance Monitor window right click anywhere and select Open in Window The Performance Monitor window opens as a separate window Use the Performance Monitor Tasks menu to change the window settings 2 When you no longer need the separate window click Close Perfor...

Page 220: ... you can also change the time zone To change the sample interval from the toolbar 1 In the navigation window log in to the management group 2 Select the Performance Monitor node for the cluster you want 3 In the toolbar change the Sample Interval value 4 In the toolbar select the Sample Interval Units you want The Performance Monitor starts using the new interval immediately To change the sample i...

Page 221: ...ts Use the CTRL key to select multiple statistics from the list 6 Click OK when you have finished adding statistics Viewing statistic details In addition to what you see in a table row you can see all of the details for a specific statistic in the table including the statistic definition 1 In the navigation window log in to the management group 2 Select the Performance Monitor node for the cluster...

Page 222: ...he Performance Monitor window and select Clear Samples Clearing the display You can clear the display which removes all lines from the graph and deselects the Display option for each statistic in the table This leaves all of the statistics in the table along with their data which continue to update 1 In the navigation window log in to the management group 2 Select the Performance Monitor node for ...

Page 223: ... graph You can control which statistics display in the graph as needed 1 From the Performance Monitor window deselect the Display check box for the statistic in the table 2 To redisplay the line select the Display check box for the statistic If you want to display all of the statistics from the table right click anywhere in the Performance Monitor window and select Display All Changing the color o...

Page 224: ...o export They can be different from the statistics you are currently monitoring You also select the sample interval and the duration of the sampled data for export Typical durations are from 10 minutes to 24 hours The maximum duration is 999 hours which is about 41 days 1 From the Performance Monitor window click to start the export 2 In the Log File field enter the name of the file By default the...

Page 225: ...ing the graph to an image file You can save the graph and the currently visible portion of the statistics table to an image file This may be helpful if you are working with technical support or internal personnel to troubleshoot an issue 1 From the Performance Monitor window make sure the graph and table display the data you want 2 Right click anywhere in the Performance Monitor window and select ...

Page 226: ...odify any feature At the end of the evaluation period if you do not obtain a license key all volumes and snapshots related to the feature become unavailable to any clients The data is safe and you can continue to manage the volumes and snapshots in the CMC You can restore the entire configuration to availability by obtaining the license keys and applying them to the storage systems in the manageme...

Page 227: ...lete the remote snapshots Delete the remote volume Retaining the data on the remote target Make the remote volume into a primary volume Disassociate the primary and remote management groups if the remote copy was between management groups Scripting evaluation Application based scripting is available for volume and snapshot features You can create scripts to Create snapshots Create remote volumes a...

Page 228: ...vanced features When registering storage systems for advanced features you must have your license entitlement certificate and submit to the website the appropriate storage system feature key s to obtain the license key s You then receive the license key s and apply them to the storage system s Using license keys License keys are assigned to individual storage systems License keys can be added to s...

Page 229: ...ct the storage system from the Available Systems pool 2 Select the Feature Registration tab 3 Click Feature Registration Tasks and select Edit License Key from the menu 4 Copy and paste the Feature Key into the Edit License Key window NOTE When you paste the license key into the window be sure there are no leading or trailing spaces in the box Such spaces prevent the license key from being recogni...

Page 230: ...gement group for which you want to register advanced features 2 Click the Registration tab Figure 104 Registering advanced features for a management group 3 Click Registration Tasks and select Feature Registration from the menu The Feature Registration window lists all the storage systems in that management group Figure 105 Selecting the feature key 4 For each storage system listed in the window s...

Page 231: ...me as follows c Click OK The license key appears in the Feature Registration window xxxxxxxxxxxx_xxxxxxx_AA BB CC DD EE FF_x dat Be sure the AA BB CC DD EE FF part of each file name matches the feature key of a storage system If an error message appears the error text describes the problem d Click OK again to exit the Feature Registration window d Click Apply License Keys e Check the Import Summar...

Page 232: ... OK when you are finished Saving your customer information Be sure you have filled in the customer profile window correctly before saving this file In addition to the customer information the file you save contains registration and licence key information Save a customer information file for each management group in your storage system 1 In the navigation window select a management group 2 Click t...

Page 233: ... same subnet address range as the VIP The VIP must be routable regardless of which storage system it is assigned to iSCSI servers must be able to ping the VIP when it is enabled in a cluster The VIP address must be different than any storage system IPs on the network The VIP address must be a static IP address reserved for this purpose All iSCSI initiators must be configured to connect to the VIP ...

Page 234: ...authentication protocol The SAN iQ software supports the following configurations No CHAP Authorized initiators can log in to the volume without proving their identity The target does not challenge the server 1 way CHAP Initiators must log in with a target secret to access the volume This secret proves the identity of the initiator to the target 2 way CHAP Initiators must log in with a target secr...

Page 235: ... based on the operating system and iSCSI initiator you are using The table below lists the terms for two common iSCSI initiators Table 72 iSCSI terminology Linux VMWare Microsoft SAN iQ See the documentation for the iSCSI initiator you are iSCSI Name Initiator Node Name Initiator Node Name using Linux iSCSI initiators may use a command line interface or a configuration file CHAP Name Not used CHAP...

Page 236: ...s the configuration for a single host authentication with 1 way CHAP required Figure 108 Configuring iSCSI for a single host with CHAP Figure 109 page 237 illustrates the configuration for a single host authentication with 2 way CHAP required 236 HP LeftHand Storage using iSCSI and Fibre Channel ...

Page 237: ...labeled as DSM When accessing volumes from a server using DSM for MPIO consider the following The DSM for MPIO and the Microsoft MPIO must be installed on the server With these installed servers automatically use DSM for MPIO when you log on to volumes from the iSCSI initiator If you have dual storage NICs in your server you can select the Enable multi path option when logging in to the volume and...

Page 238: ... maintenance they retain the same WWNNs and WWPNs when they are returned to that management group NOTE The WWNNs and WWPNs are assigned to the management group If the management group is deleted and the Fibre Channel enabled storage systems are added to a different management group their WWNNs and WWPNs will change Using MPIO with Fibre Channel MPIO is required with HP LeftHand Storage Fibre Chann...

Page 239: ...on Interface with a terminal emulation program Establishing a terminal emulation session on a Windows system On the PC or laptop attached directly to the storage system with a null modem cable open a session with a terminal emulation program such as HyperTerminal or ProComm Plus Use the following settings 19200 8 N 1 When the session is established the Configuration Interface window opens Establis...

Page 240: ...trative users Use the Configuration Interface to add new administrative users or to change administrative passwords You can only change the password for the administrative user that you used to log in to the Configuration Interface 1 On the Configuration Interface main menu tab to General Settings and press Enter 2 To add an administrative user tab to Add Administrator and press Enter Then enter t...

Page 241: ...tion Deleting a NIC bond You can delete the following NIC bonds using the Configuration Interface Active Passive bond Link Aggregation Dynamic Mode bond Adaptive Load Balancing bond For more information about creating and configuring NIC bonds see Configuring network interface bonds page 51 When you delete an Active Passive bond the primary interface assumes the IP address and configuration of the...

Page 242: ... duplex and press Enter 3 To change the speed and duplex of an interface tab to a setting in the Speed Duplex list 4 To change the frame size select Set To in the Frame Size list Then tab to the field to the right of Set To and enter a frame size The frame size value must be between 1500 bytes and 9000 bytes 5 On the Network TCP Status window tab to OK and press Enter 6 On the Available Network De...

Page 243: ... data on the entire storage system needs to be rebuilt RAID 6 Stripe with dual parity If 3 or more disks need to be replaced they must be identified and replaced and the data on the entire storage system rebuilt Before you begin 1 Know the name and physical location of the storage system that needs the disk replacement 2 Know the physical position of the disk in the storage system 3 Have the repla...

Page 244: ...elect Stop Manager When the process completes successfully the manager is removed from the Status line in the Storage System box and Manager changes to No in the Management Group box 2 If you stop a manager the cluster will be left with an even number of managers To ensure that the cluster has an odd number of managers do one of these tasks Start a manager on another storage system Add a virtual m...

Page 245: ... To replace the disk For the DL320s NSM 2120 HP LeftHand P4300 HP LeftHand P4500 and HP P4900 G2 see Replacing a disk in a hot swap storage system page 43 Rebuilding data The following steps take you through the steps to first reconfigure RAID on the storage system and then to rebuild data on the storage system after it is added to the management group and cluster Reconfigure RAID 1 Select the Sto...

Page 246: ...window flashes for a few minutes as it initializes Restarting a manager NOTE Before proceeding verify that the storage system has finished initializing and is completely added to the management group If necessary ensure that after the repair you have the appropriate configuration of managers If there was a manager running on the storage system before you began the repair process you may start a ma...

Page 247: ...second failure during this period Table 75 Replacing the ghost storage system with the repaired storage system Storage Systems in Cluster Before rearranging Storage system A IP Address Storage system C After rearranging Storage system A Storage system B Storage system C Rebuilding volume data After the storage system is successfully added back to the cluster the adjacent storage systems start rebu...

Page 248: ...the disk in the storage system is successfully replaced the data is fully rebuilt on that storage system and the management group configuration number of managers quorum local bandwidth and so on are restored to the original settings Returning the failed disk 1 Contact HP Support for an RA number 2 Return the original disks for failure analysis using the prepaid packing slip in the replacement pac...

Page 249: ...and is turned on Steady amber The system has AC power but in standby mode Power LED switch You can also check the Hardware Information tab in the CMC select Diagnostics for the applicable storage system and then select the Hardware Information tab If a RAID controller is not working it will not be visible on the Hardware Information tab Because there are two RAID controllers in the P4900 G2 it is ...

Page 250: ...BBWC BBWC 1 connects to Card 1 and BBWC 2 connects to Card 2 Removing the RAID controller 1 Power off the storage system a Use the CMC to power off the system controller as described in Powering off the storage system page 24 b Manually power off the disk enclosure 2 Unplug all cables from the power outlets 3 Remove the storage system from the rack and place it on a flat surface 250 Replacing hard...

Page 251: ... from the chassis Lift the top cover away from the chassis Figure 1 15 Removing the cover 5 Locate and remove the PCI cage a Loosen the thumbscrews that secure the PCI cage to the system board and remove the screw that secures the PCI cage to the rear of the server 1 Figure 1 16 page 251 b Lift the PCI cage away from the system board 2 Figure 1 16 page 251 Figure 1 16 Removing the PCI cage Replaci...

Page 252: ...power and repeat this procedure If the LED is not lit continue with the next step of removing the RAID controller Figure 1 17 Battery pack LEDs 7 Disconnect the battery cable from the connector on the rear of the cache module Figure 1 18 page 252 Figure 1 18 Disconnect battery cable from the cache module 8 Open the ejector latches on each side of the RAID controller DIMM slot Figure 1 19 page 253 ...

Page 253: ...nt controller board and reconnect the cache module to the battery cable 1 Slide the RAID controller into the slot aligning the controller with its matching connector See Figure 120 page 253 if you are replacing Card 1 and Figure 121 page 254 if you are replacing Card 2 Firmly press the controller to seat it properly on the slot 2 Tighten the screws to secure the RAID controller to the PCI cage 3 F...

Page 254: ...ce the cover back on the unit 5 Tighten the cover screw and place the T 10 tool back in the holder on the rear of the unit 6 Place the unit back into the rack and connect all cables and power cords 7 Power on the storage system Verifying proper operation After replacing the RAID controller observe the following to ensure replacement was successful Observe the LEDs on the front of the unit Verify t...

Page 255: ...nt on the storage system Incoming from SNMP 161 162 UDP SNMP clients Outgoing from the storage systems for SNMP Traps Outgoing from the storage systems for remote logging Syslog 514 UDP Outgoing from the storage systems for iSNS services iSNS 3205 TCP UDP iSCSI initiators connect on this port iSCSI 3260 TCP Used for internal SAN iQ discovery SAN iQ Internal 8453 8454 8455 UDP Incoming to storage s...

Page 256: ...3893 NOTE Port 13893 is UDP only TCP UDP changes between management nodes Used for internal control communication SAN iQ Control 13888 13889 NOTE Port 13889 is UDP only TCP UDP Used as iSCSI targets where xx is the number of initiators SAN iQ Internal 14000 140xx UDP Communication to and from the Failover Manager when applicable Failover Manager 13887 13892 TCP Communication to and from the Failov...

Page 257: ...ncoming to SAN iQ Internal 13838 13845 13841 13843 TCP UDP storage systems Used for management and control Outgoing from management applications Incoming to SAN iQ Internal 13840 13850 13851 TCP storage systems Used for management and control Outgoing from management applications Incoming to Console Discovery 27491 TCP UDP storage systems Used by management applications for node discovery 257 ...

Page 258: ... Packard Development Company L P IBM Corp EMC Corporation Symantec Corporation and The Open Group In addition the software described in this manual includes open source software developed by Copyright c 2005 2008 Kirill Grouchnikov and contributors All rights reserved Redistribution and use in source and binary forms with or without modification are permitted provided that the following conditions...

Page 259: ...k In multiple rack installations fasten racks together securely Extend only one rack component at a time Racks can become unstable if more than one component is extended Customer self repair HP customer self repair CSR programs allow you to repair your HP product If a CSR part needs replacing HP ships the part directly to you so that you can install it at your convenience Some parts do not qualify...

Page 260: ...rage network and SAN environments plus selected non HP servers that have a support obligation with HP It is integrated with HP Systems Insight Manager A dedicated server is recommended to host both HP Systems Insight Manager and HP Insight Remote Support Advanced Details for both versions are available at http www hp com go insightremotesupport To download the software go to Software Depot http ww...

Page 261: ...cumentation that meets your needs To help us improve the documentation send any errors suggestions or comments to Documentation Feedback docsfeedback hp com Include the document title and part number version number or the URL when submitting your feedback 261 ...

Page 262: ... boots up Also known as disk on modules or DOMs CHAP Challenge Handshake Authentication Protocol CLI Command line interface An interface comprised of various commands which are used to control operating system responses clone point The snapshot that has two or more volumes related to it A clone point is created when a SmartClone volume is created from a snapshot or from snapshot temporary space cl...

Page 263: ...lays below the storage system icon in the network window It is also visible when the users browse the network HP StorageWorks P4000 Centralized Management Console Management interface for the SAN iQ software ID LED LED lights on the physical storage system so that you can find that system in a rack iSCSI Internet small computer system interface Like an ordinary SCSI interface iSCSI is standards ba...

Page 264: ...f the data preferred interface A preferred interface is the interface within an active backup bond that is used for data transfer during normal operation primary site A site designation assigned by the administrator in the HP P4000 Centralized Management Console A primary site is more important than a secondary site In this setup you would run a majority of managers in the primary site In a two si...

Page 265: ...8 5 replication priority allowed you to designate whether data availability or redundancy is more important in your configuration Release 8 5 forward defaults to availability This default can be changed using the Cliq Command Line Interface restripe Striped data is stored across all disks in the cluster You might change the configuration of a volume for example change data protection level add a s...

Page 266: ...ost recent snapshot from the primary volume to a new remote snapshot On failback synchronization is the process of copying the most recent remote snapshot back to the primary volume The CMC displays the progress of this synchronization Also you can manually synchronize if necessary to include data that is on the remote volume but not the primary target secret Target secret is used in both 1 way an...

Page 267: ...and one for logs Those two volumes make a volume set volume size The size of the virtual device communicated to the operating system and the applications VSS Provider HP P4000 VSS Provider is the hardware provider that supports the Volume Shadow Copy Service on the HP P4000 SAN Solution VSS Volume Shadow Copy Service writable space See temporary space 267 ...

Page 268: ...snapshots 165 SNMP clients 92 statistics 220 storage systems to existing cluster 135 storage systems to management group 1 12 storage to clusters 135 136 users to a group 78 virtual manager 128 volumes 157 administrative groups adding 78 adding users 78 associate with Active Directory group 80 changing 78 deleting 78 managing 77 permissions descriptions 78 remove Active Directory configuration 81 ...

Page 269: ...s checking status of dedicated 26 dedicated 26 status of dedicated 27 Boot Devices tab 26 boot volume 207 BOOTP 51 C capacity clusters 132 clusters and usable space in 151 disk capacity and volume size 152 monitoring on SAN Status Page 83 of the SAN 141 planning thin provisioning 142 planning volume size 141 planning full provisioning 142 storage systems 132 capacity management and deleting snapsh...

Page 270: ...ration in 242 resetting storage system to factory defaults in 242 Configuration Summary customizing on SAN Status Page 83 monitoring on SAN Status Page 83 reading for management group 107 configuring disabled network interface 68 frame size in Configuration Interface 241 IP address manually 51 iSCSI single host 235 network connection in Configuration Interface 240 network interface bonds 61 networ...

Page 271: ...d in Configuration Interface 241 NTP server 74 prerequisites for volumes 174 177 restrictions on for snapshots 177 restrictions on for volumes 161 routing information 70 server cluster 205 server cluster and change volume associations 205 servers 200 202 SmartClone volumes 194 snapshot schedules 169 170 snapshots 177 snapshots and capacity management 148 volumes 160 descriptions changing for clust...

Page 272: ...shots 166 volumes 158 email setting up for event notification 90 91 enabling NIC flow control 49 SNMP traps 93 establishing network interfaces 50 ESX Server see VMware Ethernet interfaces 50 evaluating backing out of Remote Copy 227 backing out of scripting 228 Remote Copy 226 scripting 227 event notification configuring access control for SNMP clients 92 enabling SNMP agents for 92 setting up ema...

Page 273: ...ssary for SAN iQ software and HP P4000 SAN 262 SmartClone volumes 178 group name editing 78 groups administrative 77 default administrative groups 77 deleting administrative 78 H hardware diagnostics 96 list of diagnostic tests 96 tab window 96 hardware information report 97 saving to a file 97 help obtaining 259 high availability manager configuration 1 19 highlighting lines 223 host names access...

Page 274: ... bandwidth setting 1 13 locale setting in preferences 18 locating a storage system in a rack 23 log files exporting management group support bundle 101 exporting storage system support bundle 101 saving for technical support 100 log in to a storage system 22 to management group 1 1 1 log out of a storage system 22 of management group 1 12 logging on to volumes in iSCSI 200 look up zone see DNS suf...

Page 275: ...241 determining if use would improve performance 212 link aggregation dynamic mode 57 physical and logical interface 54 requirements 52 requirements for Adaptive Load Balancing 59 setting flow control and 49 settings 53 status of 64 using 1 GbE and 10 GbE interfaces 53 verifying 63 with 10 GbE interfaces 52 network interfaces 57 attaching Ethernet cables 50 bonding 52 configuring 51 68 disabling o...

Page 276: ...ning SmartClone volumes 180 snapshots 147 163 volume size 141 volumes 141 155 planning capacity full provisioning method 142 thin provisioning method 142 point in time snapshots defined 162 pool of storage 103 port status Fibre Channel 72 positioning storage systems in cluster 136 powering off P4800 system controller and disk enclosure correct order 23 storage systems 24 powering on P4800 system c...

Page 277: ...guring target computer 100 removing old logs 101 remote support software 259 remote support setting up CMC for 20 remote volumes 156 see also HP LeftHand Remote Copy User Guide removing administrative users from a Group 78 DNS server 68 domain name from DNS suffixes list 69 ghost storage system after the data is rebuilt 248 old log files 101 prerequisites for storage systems from management groups...

Page 278: ...es 103 server access SmartClone volumes 181 server cluster 197 203 change volume associations after deleting 205 creating 203 deleting 205 server connections iSCSI 198 servers access to volumes 16 access to volumes and snapshots 197 adding DNS 68 adding Fibre Channel 201 adding iSCSI 199 adding iSNS 133 assigning to volumes and snapshots 205 clustering 197 203 deleting 200 202 editing 199 editing ...

Page 279: ... read write snapshots 173 understanding schedules for volume sets 167 using 162 versus backups 162 SNMP access control 92 clients adding 92 configuring access control for SNMP clients 92 disabling agents 93 disabling traps 94 enabling agents 92 enabling agents for event notification 92 enabling traps 93 overview 91 removing trap recipient 94 setting up for event notification 91 using MIB 95 using ...

Page 280: ...support HP 259 saving log files for 100 service locator website 260 temporary space deleting 173 for read write snapshots 173 making application managed snapshot available after converting 172 173 thresholds changing for a snapshot 166 requirements for changing in snapshots 167 time editing NTP server 74 NTP servers preferred not preferred 74 selecting NTP 73 setting with NTP 73 setting without NT...

Page 281: ...lling back 174 assign to servers 16 assigning to Fibre Channel servers 206 207 assigning to iSCSI servers 206 assigning to servers 205 boot volume assigning to server 207 changing clusters 159 changing data protection levels 160 changing descriptions 159 changing size 160 comparing the load of two 213 consumed space 150 controlling server access to 197 creating SmartClone 189 creating using the Ma...

Page 282: ...into same switch for Link Aggregation Dynamic Mode 52 return repaired system to same place 139 Wear life 36 websites customer self repair 259 HP 260 HP Subscriber s Choice for Business 259 product manuals 260 Windows 2008 dynamic disks 155 write failure warnings 142 282 Index ...

Reviews: