![Hitachi HUS VM Скачать руководство пользователя страница 291](http://html.mh-extra.com/html/hitachi/hus-vm/hus-vm_user-and-reference-manual_145969291.webp)
¢
LVM bad block relocation is not allowed on PVs that are HARD-
enabled.
•
Oracle® and LVM (VxVM) on HA Cluster Server
¢
If HA Cluster software writes to LVM metadata at regular intervals to
confirm whether its disks are available or not, change the check area
which is set for the target LU (except management area) by using the
"-vs <bsize> SLBA ELBA" option.
Protection parameters and operations
The RAID storage systems have protection checking parameters for each LU,
and these parameters are set through CCI and its command device. CCI
supports the following commands to set and verify the parameters for
protection checking for each LU:
•
raidvchkset:
Sets the protection checking parameter for the specified
volumes.
•
raidvchkdsp:
Shows the protection checking parameter for the specified
volumes based on the CCI configuration definition file.
•
raidvchkscan:
This command has three different uses depending on the
options used with the command.
¢
Shows the port, target ID, LDEV, and validation checking parameters
for the specified volumes based on the
raidscan
command.
¢
Shows the journal volume list setting and information for the journal
volume.
¢
Shows the Copy-on-Write Snapshot pool setting and information for
the Copy-on-Write Snapshot pool.
Data Protection facility
The Data Protection Facility permits main operations to volumes that you can
see on the host, and prevents wrong operations. CCI controls protected
volumes at the result of recognition of protection. CCI recognizes only
volumes that the host shows. For that purpose LUN Security is provided for
the CCI environment.
The Data Protection Facility ON/OFF is controlled by the security setting for
the command device, as shown in the following table.
Table 7-1 Security setting for command device
Command device setting
Security to be set
Security
User
authentication
Group
information
acquisition
0
0
0
No security
Data protection operations with CCI
7-5
Command Control Interface User and Reference Guide
Содержание HUS VM
Страница 10: ...x Command Control Interface User and Reference Guide ...
Страница 18: ...xviii Preface Command Control Interface User and Reference Guide ...
Страница 78: ...2 50 CCI software environment Command Control Interface User and Reference Guide ...
Страница 154: ...4 8 Starting up CCI Command Control Interface User and Reference Guide ...
Страница 191: ...Provisioning operations with CCI 5 37 Command Control Interface User and Reference Guide ...
Страница 277: ... 1 UR 2x2 Data replication operations with CCI 6 53 Command Control Interface User and Reference Guide ...
Страница 280: ...6 56 Data replication operations with CCI Command Control Interface User and Reference Guide ...
Страница 286: ...6 62 Data replication operations with CCI Command Control Interface User and Reference Guide ...
Страница 302: ...7 16 Data protection operations with CCI Command Control Interface User and Reference Guide ...
Страница 324: ...8 22 Examples of using CCI commands Command Control Interface User and Reference Guide ...
Страница 524: ...9 200 Troubleshooting Command Control Interface User and Reference Guide ...
Страница 529: ...Command Control Interface User and Reference Guide ...