background image

Scheduling defragmentation

Defragmentation is the process of analyzing local volumes and consolidating fragmented files and
folders so that each occupies a single, contiguous space on the volume. This improves file system
performance. Because defragmentation consolidates files and folders, it also consolidates the free
space on a volume. This reduces the likelihood that new files will be fragmented.

Defragmentation for a volume can be scheduled to occur automatically at convenient times.
Defragmentation can also be done once, or on a recurring basis.

NOTE:

Scheduling defragmentation to run no later than a specific time prevents the defragmentation process
from running later than that time. If the defragmentation process is running when the time is reached,
the process is stopped. This setting is useful to ensure that the defragmentation process ends before
the demand for server access is likely to increase.

If defragmenting volumes on which shadow copies are enabled, use a cluster (or allocation unit) size
of 16 KB or larger during the format. Otherwise defragmentation registers as a change by the Shadow
Copy process. This increase in the number of changes forces Shadow Copy to delete snapshots as
the limit for the cache file is reached.

CAUTION:

Allocation unit size cannot be altered without reformatting the drive. Data on a reformatted drive
cannot be recovered.
For more information about disk defragmentation, read the online help.

Disk quotas

Disk quotas track and control disk space use in volumes.

NOTE:

To limit the size of a folder or share, see “

Quota management

” on page 56 .

Configure the volumes on the server to perform the following tasks:

Prevent further disk space use and log an event when a user exceeds a specified disk space limit.

Log an event when a user exceeds a specified disk space warning level.

When enabling disk quotas, it is possible to set both the disk quota limit and the disk quota warning
level. The disk quota limit specifies the amount of disk space a user is allowed to use. The warning
level specifies the point at which a user is nearing his or her quota limit. For example, a user's disk
quota limit can be set to 50 megabytes (MB), and the disk quota warning level to 45 MB. In this case,
the user can store no more than 50 MB on the volume. If the user stores more than 45 MB on the
volume, the disk quota system logs a system event.

In addition, it is possible to specify that users can exceed their quota limit. Enabling quotas and not
limiting disk space use is useful to still allow users access to a volume, but track disk space use on a

X1800sb and X3800sb Network Storage Blade 

31

Содержание X3800sb

Страница 1: ...HP StorageWorks X1800sb and X3800sb Network Storage Blade user guide Part number 572092 001 First edition June 2009 ...

Страница 2: ...uld be construed as constituting an additional warranty HP shall not be liable for technical or editorial errors or omissions contained herein WARRANTY STATEMENT To obtain a copy of the warranty for this product see the warranty information website http www hp com go storagewarranty Intel Itanium Pentium Intel Inside and the Intel Inside logo are trademarks or registered trademarks of Intel Corpor...

Страница 3: ... 16 Single Instance Storage 17 Print Management 18 2 Storage management overview 19 Storage management elements 19 Storage management example 19 Physical storage elements 20 Arrays 21 Fault tolerance 22 Online spares 22 Logical storage elements 22 Logical drives LUNs 22 Partitions 23 Volumes 23 File system elements 24 File sharing elements 24 Volume Shadow Copy Service overview 24 Using storage el...

Страница 4: ...d drives 37 Managing shadow copies 37 The shadow copy cache file 38 Enabling and creating shadow copies 39 Viewing a list of shadow copies 40 Set schedules 40 Viewing shadow copy properties 40 Redirecting shadow copies to an alternate volume 41 Disabling shadow copies 41 Managing shadow copies from the storage system desktop 42 Shadow Copies for Shared Folders 42 SMB shadow copies 43 NFS shadow co...

Страница 5: ...equirements 67 Cluster installation 67 Setting up networks 68 Configuring the private network adapter 68 Configuring the public network adapter 68 Renaming the local area connection icons 68 Verifying connectivity and name resolution 68 Verifying domain membership 68 Setting up a cluster account 68 About the Quorum disk 68 Configuring shared disks 69 Verifying disk access and functionality 69 Conf...

Страница 6: ...nance and service 80 Maintenance updates 80 System updates 80 Firmware updates 80 Certificate of Authenticity 80 6 System recovery 81 The System Recovery DVD 81 To restore a factory image 81 The DON T ERASE partition 81 Managing disks after a restoration 81 A Regulatory compliance notices 83 Regulatory compliance identification numbers 83 Federal Communications Commission notice 83 FCC rating labe...

Страница 7: ...e 90 Estonian notice 91 Finnish notice 91 French notice 91 German notice 91 Greek notice 92 Hungarian notice 92 Italian notice 92 Latvian notice 92 Lithuanian notice 93 Polish notice 93 Portuguese notice 93 Romanian notice 93 Slovak notice 94 Spanish notice 94 Swedish notice 94 Turkish notice 94 Battery replacement notices 95 Dutch battery notice 95 French battery notice 96 German battery notice 9...

Страница 8: ...es stored on a separate volume 39 7 Accessing shadow copies from My Computer 42 8 Client GUI 44 9 Recovering a deleted file or folder 46 10 Properties dialog box Security tab 49 11 Advanced Security settings dialog box Permissions tab 50 12 User or group Permission Entry dialog box 51 13 Advanced Security Settings dialog box Auditing tab 52 14 Select User or Group dialog box 52 15 Auditing Entry d...

Страница 9: ... 11 1 Summary of RAID methods 22 2 Tasks and utilities needed for storage system configuration 28 3 Sharing protocol cluster support 65 4 Power sequencing for cluster installation 67 5 X1800sb and X3800sb Network Storage Blade 9 ...

Страница 10: ...10 ...

Страница 11: ...s intended for technical professionals with knowledge of Microsoft administrative procedures System and storage configurations Related documentation The following documents and websites provide related information HP StorageWorks X1800sb Network Storage Blade installation instructions HP StorageWorks X3800sb Network Storage Gateway Blade installation instructions HP StorageWorks X1000 Automated St...

Страница 12: ... text Code variables Command variables Monospace italic text Emphasized monospace text Monospace bold text WARNING Indicates that failure to follow directions could result in bodily harm or death CAUTION Indicates that failure to follow directions could result in damage to equipment or data IMPORTANT Provides clarifying information or specific instructions NOTE Provides additional information TIP ...

Страница 13: ... level Detailed questions Customer self repair HP customer self repair CSR programs allow you to repair your StorageWorks product If a CSR part needs replacing HP ships the part directly to you so that you can install it at your convenience Some parts do not qualify for CSR Your HP authorized service provider will determine whether a repair can be accomplished by CSR For more information about CSR...

Страница 14: ...m support manuals http www hp com support downloads Documentation feedback HP welcomes your feedback To make comments and suggestions about product documentation please send a message to storagedocsFeedback hp com All submissions become the property of HP About this guide 14 ...

Страница 15: ...torage for shared folders For more information about using the HP Automated Storage Manager see the HP ASM online help or the HP StorageWorks X1000 Automated Storage Manager user guide Go to http www hp com go nas select your product family select your product model click Support for your product and then click Manuals Microsoft Windows Storage Server 2008 administration tools Microsoft Windows St...

Страница 16: ...ge block SMB or NFS protocol Single Instance Storage SIS can be enabled or disabled for each volume that is displayed in Share and Storage Management SIS recovers disk space by reducing the amount of redundant data stored on a volume It identifies identical files storing only a single copy of the file in the SIS Common Store and replacing the files with pointers to the file in the SIS Common Store...

Страница 17: ...ance of a duplicate file into a central folder The duplicate is then replaced by a link a reparse point to the central copy The link file contains information about the original file such as its current location size and attributes The Single Instance Storage Filter runs in kernel mode The Single Instance Storage Filter service cannot be stopped If this service is disabled the linked files are not...

Страница 18: ...nagement filtering capability For example you can create a view that displays only printers in a particular error state You can also configure Print Management to send e mail notifications or run scripts when a printer or print server needs attention The filtering capability also allows you to bulk edit print jobs such as canceling all print jobs at once You can also delete multiple printers at th...

Страница 19: ...r major divisions Physical storage elements Logical storage elements File system elements File sharing elements Each of these elements is composed of the previous level s elements Storage management example Figure 1 depicts many of the storage elements that one would find on a storage device The following sections provide an overview of the storage elements X1800sb and X3800sb Network Storage Blad...

Страница 20: ...wing policies Analyze current corporate and departmental structure Analyze the current file server structure and environment Plan properly to ensure the best configuration and use of storage Determine the desired priority of fault tolerance performance and storage capacity Use the determined priority of system characteristics to determine the optimal striping policy and RAID level Storage manageme...

Страница 21: ...re simultaneously active the same amount of data is written to each drive during any given time interval Each unit of data is termed a block The blocks form a set of data stripes over all the hard drives in an array as shown in Figure 3 Figure 3 RAID 0 data striping S1 S4 of data blocks B1 B12 For data in the array to be readable the data block sequence within each stripe must be the same This seq...

Страница 22: ...ne spare or hot spare to any configuration except RAID 0 This hard drive contains no data and is contained within the same storage subsystem as the other drives in the array When a hard drive in the array fails the controller can then automatically rebuild information that was originally on the failed drive onto the online spare This quickly restores the system to full RAID level fault tolerance p...

Страница 23: ... points at this time The use of mount points in conjunction with NFS shares is not supported Volumes When planning dynamic disks and volumes there is a limit to the amount of growth a single volume can undergo Volumes are limited in size and can have no more than 32 separate LUNs with each LUN not exceeding 2 terabytes TB and volumes totaling no more than 64 TB of disk space The RAID level of the ...

Страница 24: ...ile sharing protocols including Distributed File System DFS Network File System NFS File Transfer Protocol FTP Hypertext Transfer Protocol HTTP and Microsoft Server Message Block SMB On each folder or logical storage element different file sharing protocols can be enabled using specific network names for access across a network to a variety of clients Permissions can then be granted to those share...

Страница 25: ...ources for the clustered file share resource can also be established for access across a network to a variety of clients Permissions can then be granted to those shares based on users or groups of users in each of the file sharing protocols Network adapter teaming Network adapter teaming is software based technology used to increase a server s network availability and performance Teaming enables t...

Страница 26: ...t Agents are installed with every SmartStart assisted installation or can be installed through the HP PSP The Systems Management homepage provides status and direct access to in depth subsystem information by accessing data reported through the Management Agents For additional information refer to the Management CD in the HP ProLiant Essentials Foundation Pack or the HP website http www hp com ser...

Страница 27: ...l the SIS links pointing to it are deleted SIS automatically determines that two or more files have the same content and links them together File Server Resource Manager File Server Resource Manager is a suite of tools that allows administrators to understand control and manage the quantity and type of data stored on their servers By using File Server Resource Manager administrators can place quot...

Страница 28: ...ce and enhanced performance and then segmented into logical disks of appropriate sizes for particular storage needs These logical disks then become the volumes that appear as drives on the storage system CAUTION The first two logical drives are configured for the storage system operating system and should not be altered in any manner If the first two logical drives are altered the system recovery ...

Страница 29: ...ility 2 If the Execution Mode for ACU is set to Remote Mode log on to the HP System Management Homepage The default user name is administrator and the default password is hpinvent To open the ACU in browser mode NOTE Confirm that the ACU Execution Mode is set to remote service 1 Open a browser and enter the server name or IP address of the destination server For example http servername 2301 or htt...

Страница 30: ...e altered in any manner If the first two logical drives are altered the system recovery process may not function properly when using the System Recovery DVD Do not tamper with the DON T ERASE or local C volume These are reserved volumes and must be maintained as they exist HP does not recommend spanning array controllers with dynamic volumes The use of software RAID based dynamic volumes is not re...

Страница 31: ... limit for the cache file is reached CAUTION Allocation unit size cannot be altered without reformatting the drive Data on a reformatted drive cannot be recovered For more information about disk defragmentation read the online help Disk quotas Disk quotas track and control disk space use in volumes NOTE To limit the size of a folder or share see Quota management on page 56 Configure the volumes on...

Страница 32: ...dding new storage space to an existing logical drive on the same array usually after the array has been expanded Storage growth may occur in three forms Extend unallocated space from the original logical disks or LUNs Alter LUNs to contain additional storage Add new LUNs to the system The additional space is then extended through a variety of means depending on which type of disk structure is in u...

Страница 33: ...delines for extending a dynamic volume Use the Disk Management utility You can extend a volume only if it does not have a file system or if it is formatted NTFS You cannot extend volumes formatted using FAT or FAT32 You cannot extend striped volumes mirrored volumes or RAID 5 volumes For more information see the Disk Management online help Expanding storage for EVA arrays using Command View EVA Pr...

Страница 34: ... original blocks the cache file is typically smaller than the original volume In the snapshot s original form it takes up no space because blocks are not moved until an update to the disk occurs By using shadow copies a storage system can maintain a set of previous versions of all files on the selected volumes End users access the file or folder by using a separate client add on program which enab...

Страница 35: ...sers want to access a previous version of a file that does not reside in a shared folder the administrator must first share the folder NOTE Shadow copies are available only on NTFS not FAT or FAT32 volumes Files or folders that are recorded by using Shadow Copy appear static even though the original data is changing Allocating disk space When determining the amount of space to allocate for storing...

Страница 36: ...hadow copies are stored the maximum size should be changed to No Limit to reflect the space available on the storage area volume instead of the source volume where the user files are stored Disk space for shadow copies can be allocated on either the same volume as the source files or a different volume There is a trade off between ease of use and maintenance versus performance and reliability that...

Страница 37: ...FS volume When enabling shadow copies on a volume that contains mounted drives the mounted drives are not included when shadow copies are taken In addition if a mounted drive is shared and shadow copies are enabled on it users cannot access the shadow copies if they traverse from the host volume where the mount point is stored to the mounted drive For example assume there is a folder F data users ...

Страница 38: ...dow copies on the same volume as the original volume See Figure 6 The cache file is located in a hidden protected directory titled System Volume Information off of the root of each volume for which shadow copy is enabled Figure 6 Shadow copies stored on a source volume The cache file location can be altered to reside on a dedicated volume separate from the volumes containing files shares See Figur...

Страница 39: ...eparate volume space limits can generally be set higher or set to No Limit See the online help for instructions on altering the cache file location CAUTION If the data on the separate volume L is lost the shadow copies cannot be recovered Enabling and creating shadow copies Enabling shadow copies on a volume automatically results in several actions Creates a shadow copy of the selected volume Sets...

Страница 40: ...e There are a number of factors that can help determine the most effective shadow copy schedule for an organization These include the work habits and locations of the users For example if users do not all live in the same time zone or they work on different schedules it is possible to adjust the daily shadow copy schedule to allow for these differences Do not schedule shadow copies more frequently...

Страница 41: ...ght click on it 3 Select Properties 4 Select the Shadow Copies tab 5 Select the volume that you want to redirect shadow copies from and ensure that shadow copies are disabled on that volume if enabled click Disable 6 Click Settings 7 In the Located on this volume field select an available alternate volume from the list NOTE To change the default shadow copy schedule settings click Schedule 8 Click...

Страница 42: ...y supported clients and protocols There are two sets of supported protocols SMB and NFS All other protocols are not supported this includes HTTP FTP AppleTalk and NetWare Shares For SMB support a client side application denoted as Shadow Copies for Shared Folders is required The client side application is currently only available for Windows XP and Windows 2000 SP3 No additional software is requir...

Страница 43: ...e share to open its Properties window clicking the Previous Versions tab and then selecting the desired shadow copy Users can view copy and restore all available shadow copies Shadow Copies for Shared Folders preserves the permissions set in the access control list ACL of the original folders and files Consequently users can only access shadow copies for shares to which they have access In other w...

Страница 44: ...S shares via the NFS client no additional software is required Server for NFS exposes each of a share s available shadow copies as a pseudo subdirectory of the share Each of these pseudo subdirectories is displayed in exactly the same way as a regular subdirectory is displayed The name of each pseudo subdirectory reflects the creation time of the shadow copy using the format GMT YYYY MM DD HH MM S...

Страница 45: ... common situation Accidental file replacement which may occur if a user selects Save instead of Save As File corruption It is possible to recover from all of these scenarios by accessing shadow copies There are separate steps for accessing a file compared to accessing a folder Recovering a deleted file or folder To recover a deleted file or folder within a folder 1 Access to the folder where the d...

Страница 46: ... click View To copy the old version to another location click Copy to replace the current version with the older version click Restore Recovering a folder To recover a folder 1 Position the cursor so that it is over a blank space in the folder to be recovered If the cursor hovers over a file that file is selected 2 Right click select Properties from the bottom of the menu and then click the Previo...

Страница 47: ...o tape processes is transport of shadow copies from the production server onto a backup server where they can then be backed up to tape Like the other two alternatives this option removes backup traffic from the production server While some backup applications might be designed with the hardware provider software that enables transport others are not The administrator should determine whether or n...

Страница 48: ...red in the unit and the level of security access allowed Folders can be managed using Server Manager Tasks include Accessing a specific volume or folder Creating a new folder Deleting a folder Modifying folder properties Creating a new share for a volume or folder Managing shares for a volume or folder Managing file level permissions Security at the file level is managed using Windows Explorer Fil...

Страница 49: ... click Add Follow the dialog box instructions To remove users and groups from the permissions list highlight the desired user or group and then click Remove The center section of the Security tab lists permission levels When new users or groups are added to the permissions list select the appropriate boxes to configure the common file access levels X1800sb and X3800sb Network Storage Blade 49 ...

Страница 50: ...Settings dialog box is illustrated in Figure 12 and includes Add a new user or group Click Add and then follow the dialog box instructions Remove a user or group Click Remove Replace permission entries on all child objects with entries shown here that apply to child objects This allows all child folders and files to inherit the current folder permissions by default Modify specific permissions assi...

Страница 51: ...dit screen and some of the permissions Figure 13 User or group Permission Entry dialog box Another area of the Advanced Security Settings is the Auditing tab Auditing allows you to set rules for the auditing of access or attempted access to files or folders Users or groups can be added deleted viewed or modified through the Advanced Security Settings Auditing tab X1800sb and X3800sb Network Storag...

Страница 52: ...tings dialog box Auditing tab 5 Click Add to display the Select User or Group dialog box Figure 15 Select User or Group dialog box NOTE Click Advanced to search for users or groups 6 Select the user or group File server management 52 ...

Страница 53: ...o configure this information Use the local Computer Policy Editor to configure the audit policy on the storage system The Owner tab allows taking ownership of files Typically administrators use this area to take ownership of files when the file ACL is incomplete or corrupt By taking ownership you gain access to the files and then manually apply the appropriate security configurations X1800sb and X...

Страница 54: ...ows Explorer a command line interface or Server Manger NOTE Select servers can be deployed in a clustered as well as a non clustered configuration This chapter discusses share setup for a non clustered deployment As previously mentioned the file sharing security model of the storage system is based on the NTFS file level security model Share security seamlessly integrates with file security In add...

Страница 55: ...nt In a multidomain environment user and group permissions from several domains can apply to files stored on the same device Users and groups local to the storage system can be given access permissions to shares managed by the device The domain name of the storage system supplies the context in which the user or group is understood Permission configuration depends on the network and domain infrast...

Страница 56: ...sers to exit that share and confirm that no one is using that share File Server Resource Manager File Server Resource Manager FSRM is a suite of tools that allows administrators to understand control and manage the quantity and type of data stored on their servers Some of the tasks you can perform are Quota management File screening management Storage reports Server Manager provides access to FSRM...

Страница 57: ...vailable to you look in the Help and Support Center under Support Tasks click Tools and then click Tools by Category NOTE The Windows Support Tools and Windows Resource Kit Tools including documentation for these tools are available in English only If you install them on a non English language operating system or on an operating system with a Multilingual User Interface Pack MUI you see English co...

Страница 58: ...ownload the utility see the StorageWorks L TT web site at http h18006 www1 hp com products storageworks ltt Antivirus The server should be secured by installing the appropriate antivirus software anything File server management 58 ...

Страница 59: ...state of each cluster node Each node sends out periodic messages to the other nodes these messages are called heartbeats If a node stops sending heartbeats the cluster service fails over any resources that the node owns to another node For example if the node that owns the Quorum disk is shut down for any reason its heartbeat stops The other nodes detect the lack of the heartbeat and another node ...

Страница 60: ... be brought online and taken offline They can be managed in a cluster They can be owned by only one node at a time Examples of cluster resources are IP addresses network names physical disk resources and file shares Resources represent individual system components These resources are organized into groups and managed as a group Some resources are created automatically by the system and other resou...

Страница 61: ... the cluster service performs certain procedures First all of the resources are taken offline in an order defined by the resource dependencies Secondly the cluster service attempts to transfer the group to the next node on the preferred owner s list If the transfer is successful the resources are brought online in accordance with the resource dependency structure The system failover policy defines...

Страница 62: ... to the file shares showing the relationship between both the cluster elements and the physical devices underlying them While the diagram only illustrates two nodes the same concepts apply for multi node deployments Figure 19 Cluster concepts diagram Sequence of events for cluster resources The sequence of events in the diagram includes 1 Physical disks are combined into RAID arrays and LUNs 2 LUN...

Страница 63: ... as Fileserver1 Eng1 with an IP address of 172 18 1 99 For cluster resources to function properly two very important requirements should be adhered to Dependencies between resources of a group must be established Dependencies determine the order of startup when a group comes online In the above case the following order should be maintained 1 File Share Dependent on Physical Disk Resource and Netwo...

Страница 64: ... the LUN only one node should be given access to the LUN at a time All shared disks must be configured as basic not dynamic All partitions on the disks must be formatted as NTFS Network planning Clusters require more sophisticated networking arrangements than a stand alone storage system A Windows NT domain or Active Directory domain must be in place to contain the cluster names virtual server nam...

Страница 65: ...can take advantage of clustering If a protocol does not support clustering it will not have a cluster resource and will not failover with any cluster group In the case of a failover a client cannot use the virtual name or virtual IP address to access the share since the protocol cannot failover with the cluster group The client must wait until the initial node is brought back online to access the ...

Страница 66: ...vailability Clusters can be configured with single path but if a failure in the path occurs all of the node resources will be failed to the non affected node Pathing software is required in configurations where multipathing to the storage is desired or required Multipathing software allows for datapath failure to occur without forcing a node failover Checklists for cluster server installation Thes...

Страница 67: ...protected by the cluster software Use Table 5 to determine which nodes and storage devices should be presented during each step Table 5 Power sequencing for cluster installation Comments Storage Additional Nodes Node 1 Step Verify that all storage devices on the shared bus are not presented Power on all nodes Not Presented On On Setting up net works Shut down all nodes Present the shared storage t...

Страница 68: ...the public network adapter use long lease periods to assure that the dynamically assigned lease address remains valid even if the DHCP service is temporarily lost Keep in mind that Cluster service recognizes only one network interface per subnet Renaming the local area connection icons HP recommends changing the names of the network connections for clarity The naming helps identify a network and c...

Страница 69: ...to verify functionality At this time shut down the first node power on the next node and repeat the Verifying Disk Access and Functionality step above for all cluster nodes When it has been verified that all nodes can read and write from the disks turn off the cluster nodes and power on the first and then continue with this guide Configuring cluster service software Cluster Administrator cluadmin ...

Страница 70: ...owing rules must be followed with geographically dispersed clusters A network connection with latency of 500 milliseconds or less ensures that cluster consistency can be maintained If the network latency is over 500 milliseconds the cluster consistency cannot be easily maintained All nodes must be on the same subnet Cluster groups and resources including file shares The Cluster Administrator tool ...

Страница 71: ...n the two nodes Each cluster group can be assigned to a cluster node with the preferred owner parameter For example if there are two cluster groups the cluster could be set up to have the first cluster group owned by Node A and the second cluster group owned by Node B This allows the network load to be handled by both devices simultaneously If only one cluster group exists it can only be owned by ...

Страница 72: ...ific issues For convenience all suggestions are listed below Back up user and group mappings To avoid loss of complex advanced mappings in the case of a system failure back up the mappings whenever the mappings have been edited or new mappings have been added Map consistently Groups that are mapped to each other should contain the same users and the members of the groups should be properly mapped ...

Страница 73: ...ils over to the opposing node Adding new storage to a cluster Present the new storage to one node in the cluster This can be accomplished through selective storage presentation or through SAN zoning The tasks described below are used to add storage to a cluster See the online help for clustering for additional details Creating physical disk resources A physical disk resource must reside within a c...

Страница 74: ...e help Using Shadow Copies of Shared Folders in a server cluster Enable Shadow Copies for shared folders in a cluster Extend a LUN in a cluster To extend a LUN on a storage array in a cluster review the requirements and procedures from the storage array hardware provider for expanding or extending storage For additional information associated with extending a LUN in a cluster see the following Mic...

Страница 75: ...r service on a clustered print server may be hosted on any of the nodes in the cluster As with all cluster resources clients should access the print server by its virtual network name or virtual IP address Creating a cluster printer spooler Printer spoolers should be created in a separate group dedicated to this purpose for ease of management For each printer spooler a physical resource is require...

Страница 76: ...ailed over to another node Processing continues but in a reduced manner because all operations must be processed on the remaining node s In clusters containing more than two nodes additional fail over rules can be applied For instance groups can be configured to fail over different nodes to balance the additional work load imposed by the failed node Nodes can be excluded from the possible owners l...

Страница 77: ...g that the other node s in the cluster are functioning normally Adequate warning should be given to users connected to resources of the node being shutdown Shutting down a cluster node causes all cluster resources served by that node to fail over to the other node s This causes any currently executing client read and write operations to fail until the cluster failover process completes The other n...

Страница 78: ...up the additional node s To power up the cluster nodes 1 After the storage subsystem is confirmed to be operating normally power up a single node Wait for the node to come completely up before powering up the subsequent node s If more than one node is powered up at the same time the first node that completes the sequence gains ownership of the cluster quorum and controls the cluster database Desig...

Страница 79: ...ubleshooting information for the server HP ProLiant Servers Troubleshooting Guide The guide provides common procedures and solutions for many levels of troubleshooting with a ProLiant server The guide is available at http h20000 www2 hp com bc docs support SupportManual c00300504 c00300504 pdf IMPORTANT Some troubleshooting procedures found in ProLiant server guides may not apply to the HP Storage...

Страница 80: ...or of the system when it is first switched on and for passing control of the server to the operating system When referring to the firmware on the system board of the server it is called the System ROM or the BIOS When referring to the firmware on another piece of hardware configured in the server it is called Option ROM Storage systems have hard drives Smart Array Controllers Remote Insight Lights...

Страница 81: ... or if your storage system does not have a DVD drive you can run the system recovery from a bootable USB flash drive The DON T ERASE partition The DON T ERASE logical disk supports the restoration process only and does not host a secondary operating system Be sure to back up your user data and then use the Recovery and Installation DVD to restore the server to the factory state Managing disks afte...

Страница 82: ...he appropriate drive letter then click OK 5 Click Yes to confirm the drive letter change 6 Click Yes to continue If the old drive letter needs to be re used reboot the server after clicking Yes System recovery 82 ...

Страница 83: ...overed by these rules These rules place computers and related peripheral devices into two classes A and B depending upon their intended installation Class A devices are those that may reasonably be expected to be installed in a business or commercial environment Class B devices are those that may reasonably be expected to be installed in a residential environment for example personal computers The...

Страница 84: ... the receiver is connected Consult the dealer or an experienced radio or television technician for help Declaration of Conformity for products marked with the FCC logo United States only This device complies with Part 15 of the FCC Rules Operation is subject to the following two conditions 1 this device may not cause harmful interference and 2 this device must accept any interference received incl...

Страница 85: ... EEC issued by the Commission of the European Community Compliance with these directives implies conformity to the following European Norms in parentheses are the equivalent international standards and regulations EN 55022 CISPR 22 Electromagnetic Interference EN55024 IEC61000 4 2 3 4 5 6 8 11 Electromagnetic Immunity EN61000 3 2 IEC61000 3 2 Power Line Harmonics EN61000 3 3 IEC61000 3 3 Power Lin...

Страница 86: ... A equipment Class B equipment Taiwanese notices BSMI Class A notice Taiwan battery recycle statement Recovery text Please recycle waste batteries Recovery mark Four in one recycling symbol Regulatory compliance notices 86 ...

Страница 87: ...sure to hazardous radiation Do not try to open the module enclosure There are no user serviceable components inside Do not operate controls make adjustments or perform procedures to the laser device other than those specified herein Allow only HP Authorized Service technicians to repair the unit The Center for Devices and Radiological Health CDRH of the U S Food and Drug Administration implemented...

Страница 88: ...French laser notice German laser notice Italian laser notice Regulatory compliance notices 88 ...

Страница 89: ...Japanese laser notice Spanish laser notice Recycling notices English notice X1800sb and X3800sb Network Storage Blade 89 ...

Страница 90: ...Bulgarian notice Czech notice Danish notice Dutch notice Regulatory compliance notices 90 ...

Страница 91: ...Estonian notice Finnish notice French notice German notice X1800sb and X3800sb Network Storage Blade 91 ...

Страница 92: ...Greek notice Hungarian notice Italian notice Latvian notice Regulatory compliance notices 92 ...

Страница 93: ...Lithuanian notice Polish notice Portuguese notice Romanian notice X1800sb and X3800sb Network Storage Blade 93 ...

Страница 94: ...Slovak notice Spanish notice Swedish notice Turkish notice Türkiye Cumhuriyeti EEE Yönetmeli ine Uygundur Regulatory compliance notices 94 ...

Страница 95: ...Battery replacement notices Dutch battery notice X1800sb and X3800sb Network Storage Blade 95 ...

Страница 96: ...French battery notice German battery notice Regulatory compliance notices 96 ...

Страница 97: ...Italian battery notice Japanese battery notice X1800sb and X3800sb Network Storage Blade 97 ...

Страница 98: ...Spanish battery notice Regulatory compliance notices 98 ...

Страница 99: ...7 installation checklist 66 load balancing 71 managing access rights 72 managing file share permissions 72 network requirements 66 nodes powering down 77 powering up 78 restarting 77 overview 59 59 preparing for installation 66 printer spooler 75 protocols non cluster aware 73 resources 70 resources defined 60 setting up user account 68 clustered server elements 25 Command View EVA expanding stora...

Страница 100: ...s managing 72 file share resource planning 71 file share resources 63 file system elements 24 file sharing protocols 24 files ownership 53 folder management 48 folder recovery 45 folders auditing access 51 managing 48 G group cluster 63 groups adding to permissions list 49 H help obtaining 13 HP Array Configuration Utility 29 Storage Manager 29 technical support 13 I installation cluster preparing...

Страница 101: ...ntation 11 resources cluster 60 S SAN environment 28 security auditing 51 file level permissions 48 ownership of files 53 Services for UNIX 25 Services for UNIX 23 shadow copies in a cluster 74 uses 34 shadow copies 24 backups 47 cache file 38 defragmentation 37 described 34 disabling 41 file or folder recovery 45 managing 37 mounted drives 37 on NFS shares 44 on SMB shares 43 planning 34 redirect...

Страница 102: ... domain membership 68 name resolution 68 virtual server defined 61 Volume Shadow Copy Service 34 volumes planning 23 vssadmin tool 37 W warning rack stability 12 WEBES Web Based Enterprise Services 79 websites customer self repair 13 HP 13 HP Subscriber s Choice for Business 13 product manuals 11 Index 102 ...

Отзывы: