Sie sind auf Seite 1von 182

Lab Guide for

Hitachi Adaptable Modular


Storage 2000 Family
Installation, Configuration and
Support
TCI1835

Courseware version 1.0

Contents

Lab Guide

Notice: This document is for informational purposes only, and does not set forth any warranty, express or
implied, concerning any equipment or service offered or to be offered by Hitachi Data Systems. This
document describes some capabilities that are conditioned on a maintenance contract with Hitachi Data
Systems being in effect, and that may be configuration-dependent, and features that may not be currently
available. Contact your local Hitachi Data Systems sales office for information on feature and product
availability.
Hitachi Data Systems sells and licenses its products subject to certain terms and conditions, including limited
warranties. To see a copy of these terms and conditions prior to purchase or license, please call your local
sales representative to obtain a printed copy. If you purchase or license the product, you are deemed to have
accepted these terms and conditions.
THE INFORMATION CONTAINED IN THIS MANUAL IS DISTRIBUTED ON AN "AS IS" BASIS
WITHOUT WARRANTY OF ANY KIND, INCLUDING WITHOUT LIMITATION, ANY IMPLIED
WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR
NONINFRINGEMENT. IN NO EVENT WILL HDS BE LIABLE TO THE END USER OR ANY THIRD PARTY
FOR ANY LOSS OR DAMAGE, DIRECT OR INDIRECT, FROM THE USE OF THIS MANUAL, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS, BUSINESS INTERRUPTION, GOODWILL OR LOST DATA,
EVEN IF HDS EXPRESSLY ADVISED OF SUCH LOSS OR DAMAGE.
Hitachi Data Systems is registered with the U.S. Patent and Trademark Office as a trademark and service
mark of Hitachi, Ltd. The Hitachi Data Systems logotype is a trademark and service mark of Hitachi, Ltd.
The following terms are trademarks or service marks of Hitachi Data Systems Corporation in the United
States and/or other countries:
Hitachi Data Systems Registered Trademarks
Hitachi Storage Command Suite
Hi-Track
Hitachi Data Systems Trademarks
Essential NAS Platform HiCard
HiPass
Lightning 9900
Lightning 9980V
Lightning 9970V
NanoCopy
Resource Manager
SplitSecond
Thunder 9585V
Thunder 9580V
Thunder 9570V
Universal Star Network Universal Storage Platform

ShadowImage

TrueCopy

Hi-PER Architecture
Lightning 9960
Thunder 9200
Thunder 9530V

Hi-Star
Lightning 9910
Thunder 9500
Thunder 9520V

All other trademarks, trade names, and service marks used herein are the rightful property of their respective
owners.
NOTICE:
Notational conventions: 1KB stands for 1,024 bytes, 1MB for 1,024 kilobytes, 1GB for 1,024 megabytes, and
1TB for 1,024 gigabytes, as is consistent with IEC (International Electrotechnical Commission) standards for
prefixes for binary and metric multiples.
2009, Hitachi Data Systems Corporation. All Rights Reserved
HDS Academy 0128

Contact Hitachi Data Systems at www.hds.com.

Page ii

HDS Confidential: For distribution only to authorized parties.

Lab Guide

Contents

Product Names possibly mentioned in courseware:


Enterprise Storage Systems
Hitachi Universal Storage Platform V
Hitachi Universal Storage Platform VM
Hitachi Universal Storage Platform
Hitachi Network Storage Controller
Legacy Products:
Hitachi Lightning 9900 Series enterprise storage systems
Hitachi Lightning 9900 Series enterprise storage systems

Modular Storage Systems


Hitachi Adaptable Modular Storage
Hitachi Workgroup Modular Storage
Hitachi Simple Modular Storage
Hitachi Adaptable Modular Storage 2000 Family
Legacy Products:
Hitachi Thunder 9500 Series modular storage systems
Hitachi Thunder 9200V entry-level storage

Management Tools
Hitachi Basic Operating System
Hitachi Basic Operating System V
Hitachi Resource Manager utility package
Module Volume Migration Software
LUN Manager/LUN Expansion
Network Data Management Protocol (NDMP) agents
Logical Unit Size Expansion (LUSE)
Cache Partition Manager feature
Cache Residency Manager feature
Storage Navigator program
Storage Navigator Modular program
Storage Navigator Modular 2 program

Page iii

HDS Confidential: For distribution only to authorized parties.

Contents

Lab Guide

Replication Software
Remote Replication:
Hitachi Universal Replicator software
Hitachi TrueCopy Heterogeneous Remote Replication software bundle
Hitachi TrueCopy Remote Replication software bundle (for modular systems)
Hitachi TrueCopy Synchronous software
Hitachi TrueCopy Asynchronous software
Hitachi TrueCopy Extended Distance software
In-System Replication:
Hitachi ShadowImage Heterogeneous Replication software (for enterprise systems)
Hitachi ShadowImage Replication software (for modular systems)
Hitachi Copy-on-Write Snapshot software

Hitachi Storage Command Software Suite


Hitachi Chargeback software
Hitachi Device Manager software
Hitachi Dynamic Link Manager software
Hitachi Global Link Availability Manager software
Hitachi Global Reporter software
Hitachi Path Provisioning software
Hitachi Protection Manager software
Hitachi QoS for File Servers software
Hitachi QoS for Oracle software
Hitachi Replication Monitor software
Hitachi Storage Services Manager software
Hitachi Storage Services Manager software
Hitachi Tiered Storage Manager software
Hitachi Tuning Manager software
Hitachi Resource Manager utility package
Hitachi Data Retention Utility
Hitachi Performance Monitor feature
Hitachi Volume Shredder software

Page iv

HDS Confidential: For distribution only to authorized parties.

Lab Guide

Contents

Other Software
Hitachi Backup and Recovery software, powered by CommVault
Hitachi Backup Services Manager software, powered by APTARE
Hitachi Business Continuity Manager software
Hitachi Command Control Interface (CCI) Software
Hitachi Dynamic Provisioning software
Hitachi Storage Resource Management Solutions
Hitachi Volume Migration software
Hi-Track Monitor

Other Solutions and Terms


Hitachi Content Archive Platform
Hitachi Essential NAS Platform
Hitachi High-performance NAS Platform, powered by BlueArc
Hi-Star crossbar switch architecture
Hitachi Universal Star Network V

Page v

HDS Confidential: For distribution only to authorized parties.

Contents

Page vi

Lab Guide

HDS Confidential: For distribution only to authorized parties.

Lab Guide

Contents

Contents
INTRODUCTION

...........................................................................................................IX

LAB ACTIVITY 1

COMPONENT LOCATIONS AND POWERING UP THE SYSTEM .................. 1-1

LAB ACTIVITY 2

WEB ACCESS: NORMAL MODE AND COLLECT A TRACE ....................... 2-1

LAB ACTIVITY 3

STORAGE NAVIGATOR MODULAR 2: CONFIGURATION .......................... 3-1

LAB ACTIVITY 4

STORAGE NAVIGATOR MODULAR 2: BASIC OPERATIONS ..................... 4-1

LAB ACTIVITY 5

BASIC OPERATIONS: HOST GROUPS AND LUN MAPPING ..................... 5-1

LAB ACTIVITY 6

BASIC OPERATIONS: LU EXPANSION AND LU GROW/SHRINK .............. 6-1

LAB ACTIVITY 7

BASIC OPERATIONS: ONLINE RAID GROUP EXPANSION ...................... 7-1

LAB ACTIVITY 8

BASIC OPERATIONS: STORAGE NAVIGATOR MODULAR 2 CLI .............. 8-1

LAB ACTIVITY 9

BASIC OPERATIONS: CACHE PARTITION MANAGER FEATURE............... 9-1

LAB ACTIVITY 10

BASIC OPERATIONS: PERFORMANCE MONITOR FEATURE .................. 10-1

LAB ACTIVITY 11

REMOVE AND ADD AN EXPANSION TRAY ........................................... 11-1

LAB ACTIVITY 12

WEB TOOL OPERATIONS ................................................................ 12-1

LAB ACTIVITY 13

HITACHI STORAGE NAVIGATOR MODULAR 2 OPERATIONS ................. 13-1

LAB ACTIVITY 14

HARDWARE REPLACEMENT ............................................................. 14-1

LAB ACTIVITY 15

DISRUPTIVE MICROCODE LOAD: WEB TOOL...................................... 15-1

Page vii

HDS Confidential: For distribution only to authorized parties.

Contents

Page viii

Lab Guide

HDS Confidential: For distribution only to authorized parties.

Introduction
The lab projects of this course usually contain numbered steps that guide you
through specific functions of system features or software applications in support of a
corresponding lecture.
In some steps, the standard output created by executing the command or function will
be included as a screen shot to help you understand what should happen. The
screen shots in the lab project may be slightly different from the actual command
output due to microcode differences between the system that you are working on
and the system used to capture the screen shots.
Each lab project has one to three parts:
Part 1: Contains the instructional steps for performing the lab project.
Part 2: Contains answers to questions embedded throughout the lab project.
Part 3: Contains the lab project review questions.

Procedure
The students will be divided into lab groups and will perform the lab project on the
lab equipment assigned to them by their instructor.

Disclaimer
These lab projects are designed to be used in a training environment to transfer
concepts of using and configuring the functions and features of the Adaptable
Modular Storage 2000 system to the learner. They are not intended to replace any
published Hitachi users guide concerning the topics and procedures presented in
the lab project. When attempting to use or configure any function or feature of the
Adaptable Modular Storage system the user should always refer to the specific user
guide.

Introduction
Lab Group Configuration / Setup DiagramLab Guide

Lab Group Configuration / Setup Diagram


The illustration shows how the host PC systems and storage systems are connected.

Lab Host PC Systems to Storage Systems Cabling


The lab projects of this course expect that required lab devices are cabled
according to the diagram, but special classes or remote classes presented
offsite may have a slightly different configuration. If the cabling configuration
is different, the instructor will hand out a correction sheet illustrating the
differences.
This configuration is used in the education centers and it is not a
recommendation as to how to cable a customer environment.

Host to Storage Systems Cabling


This diagram shows the recommended connections of the assigned lab
equipment for each lab team and the configuration used at all of the HDS
Americas education centers.
Other HDS education centers or onsite customer classes may use a different
switch or have direct-connect loop connections.

Beginning Configuration
Before the start of class, an initial microcode load should have been
performed by your instructor to clear out any existing configuration and put
the storage system into a known state. The system should have no configured
RAID Groups or LUNs, no port Host Groups, and no License keys installed.

Page x

HDS Confidential: For distribution only to authorized parties.

Introduction
Reference Material

Windows Host

Sun Host

Port 0

Port 1

HBA PCI-1

HBA PCI-1

Port 1

Port 2

Brocade 48000

Slot (blade) 1

Slot (blade) 2

Note 1: The switch port numbers are not shown since they
could very from class to class and are controlled
vary
by a zone configuration.
1A

1B

0A

0B

Note 2: AMS2000 ports 0A and 1A are used for host


connections.
Note 3: AMS2000 ports 0B and 1B are used for TrueCopy
connections.

Ctrl 1

Ctrl 0

AMS2000

Reference Material
Several Hitachi reference manuals are available on the Microsoft Windows host
system and possibly via a shared resource system.
Hitachi Adaptable Modular Storage 2000 Family Quickstart Installation Guide
Hitachi DF800 Disk Array Subsystem Maintenance Manual
Hitachi Storage Navigator Modular 2 Online Help
Hitachi Storage Navigator Modular 2 Command Line Interface (CLI) Users
Guide
Hitachi Storage Navigator Modular 2 Graphical User Interface (GUI) Users
Guide.
Hitachi storage system users guide
The Help facility of the GUI.
The Help facility of the SNM2 GUI

Page xi

HDS Confidential: For distribution only to authorized parties.

Introduction
Reference MaterialLab Guide

Page xii

HDS Confidential: For distribution only to authorized parties.

Lab Activity 1
Component
Locations and
Powering Up the
System
Introduction
Objectives
Upon completion of the lab project, the learner should be able to:
Identify and locate hardware components
Identify management and maintenance LAN connections
Identify Fibre Channel connections
Verify the connections of the ENC cables from the base unit to the accompanying
expansion units
Apply power to the rack Power Distribution Units (PDUs)
Power up the storage system and verify its Ready status

HDS Confidential: For distribution only to authorized parties.

Page 1-1

Component Locations and Powering Up the System


Activity

Activity
1. Go to the front of your assigned storage system and identify each module that
comprises your assigned storage system, filling in the blanks below as you view
your assigned system from bottom to top.
What type of module is at the bottom (the first module) of your assigned storage
system? _______________________________
What type of modules are stacked above the bottom (or first module) module?
________________________________
List the names and IP address of the storage system:
Controller 0 LAN Port =

IP Address =

Controller 0 Maintenance Port =

IP Address =

Controller 1 LAN Port =

IP Address =

Controller 1 Maintenance Port =

IP Address =

2. Go to the rear of the storage system and look at the bottom module. How does it
differ from the second module up from the bottom? ________________________
_______________________________________________________________________
What is the bottom module connected to? __________________________________
3. Verify how the colored coded ENC cables are connected between the modules:
a. Verify PATH #0 (pink) of Control Unit #0 and ENC module #0 (IN). (The
first expansion unit).
b. Verify PATH #0 (pink) of Control Unit #1 and ENC module #1 (IN). (The
first expansion unit).
c. Verify PATH #1 (blue) of Control Unit #0 and ENC module #0 (IN). (The
second expansion unit).
d. Verify PATH #1 (blue) of Control Unit #1 and ENC module #1 (IN). (The
second expansion unit).
4. Locate the two circuit breakers of the lower PDU on each side of the rack and set
the two breakers to the ON position.
5. Set the power module breakers, of each base unit and the expansion unit to the
ON position (they may already be set the on position).
Note: If your rack has more than one Adaptable Modular Storage 2000 system
installed, wait for the other lab group to reach this step of the lab project.

Page 1-2

HDS Confidential: For distribution only to authorized parties.

Component Locations and Powering Up the System


Activity

6. Return to the front of the storage system and set the rocker power switch of each
base unit to ON and wait for the two storage systems to power up watching how
all the LEDs behave during the power-up process.

Is the base unit indicating the following?


Is the Power LED on solid? YES

NO

Is the Ready LED on solid? YES

NO

Is the Warning LED off?

YES

NO

Is the Alarm LED off?

YES

NO

If not all the conditions above are YES, consult your instructor.
7. Looking at the physical disk drives can you identify the SAS and/or SATA disk
drives? YES
NO
8. What are the disk activity LEDs doing? _______________________________

HDS Confidential: For distribution only to authorized parties.

Page 1-3

Component Locations and Powering Up the System


Activity

Lab 1 - End

Page 1-4

HDS Confidential: For distribution only to authorized parties.

Lab Activity 2
Web Access: Normal
Mode and Collect a
Trace
Objectives
Upon completion of the lab project, the learner should be able to:
Use a web browser such as Microsoft Internet Explorer or Netscape to connect to
the Adaptable Modular Storage in Normal Mode.
Display status of the individual components of the storage system.
Display Warning Information.
Use the Simple Trace function of the Web Browser, and dump trace information
of storage system controller to a file on the connected host system.

HDS Confidential: For distribution only to authorized parties.

Page 2-1

Web Access: Normal Mode and Collect a Trace


Activity

Activity
Preliminary Notes
This Lab assumes that your storage system is attached via an Ethernet link to the
browser Host PC. If not, you should arrange to make a suitable connection. Ping
the storage system to check the connection.
Microsoft Windows 2003 will require changing the browser security setting from
High to Medium.
If possible, set the PC to Disable DNS or else the connection will take a very long
time.
Set the Browser so that any Proxy Server is not used.

Connect to Your Storage System Using the Browser


1. Enter the IP address of the storage system into the browser Address line and
click Go.

Page 2-2

HDS Confidential: For distribution only to authorized parties.

Web Access: Normal Mode and Collect a Trace


Activity

HDS Confidential: For distribution only to authorized parties.

Page 2-3

Web Access: Normal Mode and Collect a Trace


Activity

2. In the System Status panel click on the disk icon (depending on the number of
expansion units you should see something like the following screen shot).

3. Click the Main link to return to the main screen and then click on one of the
other component icons. Repeat this process until you have inspected each
component.
Note: Answers to embedded questions like the following question can be found at
the rear of the lab project.
What does the I/F icon identify? _________________________

Cause a Warning Condition


IF you are performing this lab from a remote site, THEN skip this section and
jump forward to the Collect a Trace section.

OTHERWISE continue with this section.


1.

Walk to the rear of your assigned storage system and disconnect the power cable
for the right-side power module of the RK module.

2.

Refresh your browser, click on the icon of the Power Unit and then click on the
Warning Information link.

Page 2-4

HDS Confidential: For distribution only to authorized parties.

Web Access: Normal Mode and Collect a Trace


Activity

What color is the Subsystem LED? ___________


What color is the Power Unit icon? ______________
Can you determine what Power Unit failed? _________
Is the Warning LED on? _______________
3. Reconnect the power cable to the Power Unit.
4. Back out (about 1 inch) the third disk in the RK module.
5. Wait about 30 seconds for the drive to spin down and then re-install the drive and
watch the two drive LEDs until the following condition occurs: the red Failure LED
is off and the Access LED indicates that the On-Line Verify process is again running
(the LED will blink in unison with the other drive Access LEDs in the RK module).
Did the Drive Failure LED turn red? ____________
After the drive spun up what did the Drive Access LED do? ______________________
_____________________________________________________________________________
6. Click the Warning Information link (you should see messages similar to the
example below).

7. Back out (about 1 inch) any other drive except one of the first five drives.
8. Click the Disk Drive link.
Is the Warning LED on? _____________
Is the drive missing from the pool of installed drives? ________________

HDS Confidential: For distribution only to authorized parties.

Page 2-5

Web Access: Normal Mode and Collect a Trace


Activity

Step 9: Re-install the drive, wait for it to spin up and come online and then click the
Warning Information link (you should again see something similar to the
following).

Why is the system not in an alarmed state? ____________________________________


___________________________________________________________________________
Why was copy-back of this drive not performed like it was for the third drive?
____________________________________________________________________________

Collect a Trace
When in normal mode, the Adaptable Module Storage system allows the collection
of trace information two ways: Simple Trace and CTL Alarm Trace.
The information is stored in the cache during normal operation and before
performing either operation the user should be aware of the size of the binary dump
file that will be written to the hard disk of the connected host PC.
Simple Trace:

Requires a minimum of 30MB of free space.

CTL Alarm Trace:

Requires a minimum of 20MB of free space (40MB


if Copy-on-Write Snapshot software is used).

Simple Trace Dump


The Simple Trace function is performed using the Web Browser in either Normal or
Maintenance mode.
The information of both controllers can be collected from one controller. Therefore,
this function does not need to be performed from both controllers. A binary file is
generated for each controller and the default names are:
Controller 0 = smpl_trc0.dat
Controller 1 = smpl_trc1.dat
1. Turn off the browser popup blocker if enabled.

Page 2-6

HDS Confidential: For distribution only to authorized parties.

Web Access: Normal Mode and Collect a Trace


Activity

2. In the left-most panel, click the Simple Trace link.

3. Click OK.

When the information has been collected (takes several minutes), the following
prompt appears:

4. Click on Download. The File Download dialog appears.

5. Click Save.

HDS Confidential: For distribution only to authorized parties.

Page 2-7

Web Access: Normal Mode and Collect a Trace


Activity

Note: You could save the file to any folder you choose.
6. Click Save to save it to the Local Disk.
IF the file already exists, THEN the following prompt occurs. Click Yes.

7. Close the Simple Trace Download window.


8. Open the file (smpl.trc0.dat) using the Notepad editor. Exit the editor after you
view the file.
What happens when you open the file?
_______________________________________________________________________
What would you do with the trace file?
________________________________________________________________________

Page 2-8

HDS Confidential: For distribution only to authorized parties.

Web Access: Normal Mode and Collect a Trace


Activity

CTL Alarm Trace Dump


The CTL Alarm Trace function is performed using the Web Browser in either
Normal or Maintenance mode. It collects detailed information about a controller
that has entered the blockage state and outputs the information to the host system
using a binary file.
Since CTL Alarm trace information is taken over from a blocked controller by the
replaced controller, it can be collected after the replacement of a blocked controller.
The information can be collected from one controller at a time. A binary file is
generated for each controller and the default names are:
Controller 0 = ctla_trc0.dat
Controller 1 = ctla_trc1.dat
1. In the left-most panel, click the CTL Alarm Trace link.

HDS Confidential: For distribution only to authorized parties.

Page 2-9

Web Access: Normal Mode and Collect a Trace


Activity

Note: Since your subsystem has not experienced a controller blockage, trace
information has not been collected and you will not be able to select one of the
controllers and perform the dump. If blockage trace information was available, the
CTL Alarm Trace window would display additional information and you would be
able to select a controller and continue the process.
2. If you previously turned off the popup blocker, turn it back on.
3. Close your browser.
This ends the guided portion of the lab project.
If you want to go back and practice what you have learned, feel free to do so, but
keep in mind that you need to complete the review questions and have them ready
for review when the class reconvenes in the classroom.
Make sure you leave the system in the same state that it was in at the end of the
guided portion of the lab project this insures that the system will be in a state that
supports the following lab projects.
Note: As software products are enabled, the left hand menu of the web browser
screen will list the individual products. At the moment, your screen should not have
any enabled products listed. You should plan to return to the web browser to verify
that the products are listed as you enable them during the following lab projects.

Page 2-10

HDS Confidential: For distribution only to authorized parties.

Web Access: Normal Mode and Collect a Trace


Answers to Embedded Lab Questions

Answers to Embedded Lab Questions


Page 2-4
What does the I/F icon identify?

Identifies the front-end interface boards.

Page 2-5
What color is the Subsystem LED? Yellow
What color is the Power Unit icon? Red
Can you determine what Power Unit failed? Yes
Is the Warning LED on? Yes
Did the Drive Failure LED turn red? Yes and it remains on until the drive spins up.
After the drive spun up what did the Drive Access LED do?
The Access LED flashed on and off very quickly indicating the microcode from
drive #1 was restored to what the system thinks was a new disk (drive #3).
Is the Warning LED on? No
Is the drive missing from the pool of installed drives? Yes
Page 2-6
Why is the system not in an alarmed state?
This drive was a free drive and not part of a RAID Group. It was only dropped from
the inventory.
Why was copy-back of this drive not performed like it was for the third drive?
The drive was not one of the microcode disks and was not part of a RAID Group.
Page 2-8
What happens when you open the file?
Since it is a binary file you see what appears to be garbage.
What would you do with the trace file? E-mail it to HDS TRC.

HDS Confidential: For distribution only to authorized parties.

Page 2-11

Web Access: Normal Mode and Collect a Trace


Lab Project Review Questions

Lab Project Review Questions


Web Access
1. What happens if one of the first five disk drives is replaced and no RAID Group
exists on these drives?

2. How is the Warning LED extinguished?

3. If a drive other than one of the first five drives is removed from the system and it
was not part of a RAID Group, does the system enter the Warning state?

4. How many types of trace information can be collected on the DF800 when in normal
mode?

5. Where is the trace information stored?

6. What type of file is created and saved on the hard disk of the connected PC?

7. How much free space is required to perform a CTL Alarm Trace when Copy-onWrite Snapshot software is enabled?

8. What is the file name when the Simple Trace is collected from Control Unit 0 and
then Control Unit 1?

Lab 2 - End
Page 2-12

HDS Confidential: For distribution only to authorized parties.

Lab Activity 3
Storage Navigator
Modular 2:
Configuration
Objectives
Upon completion of the lab project, the learner should be able to:
Install the correct Java JRE on a management server
Configure the Java Runtime Parameter so Storage Navigator Modular 2 (SNM2)
clients can utilize the Advanced Settings function of SNM2
Install SNM2, creating the management server on a management server
Initialize and setup the storage system for first time use
Register your assigned storage system with SNM2
Install Program Products license keys
Create new User accounts and assign role permissions

HDS Confidential: For distribution only to authorized parties.

Page 3-1

Storage Navigator Modular 2: Configuration


Activity

Activity
Install Java 1.6
Note: The lab project assumes your management server has been loaded with an
image that contains images of all the software that is required to complete
the lab projects of this course.
An alternative method for obtaining the various software applications will
be from the education departments software share server. The address of
this server will be supplied to you by your instructor.
1. From your assigned classroom PC, use the Remote Desktop Connection Utility
and connect to your assigned management server in the lab.
2. Drill to the following directory of your management server:
C:\DF800 Class\Class Software
3. Double-click on the file jre-6u7-windows-i586-p-s.exe.

4. In case of a transforms error, click OK after the error message appears and then
drill to the following directory:

C:\Documents and Settings\Administrator\ApplicationData\Sun\Java\jre1.6.0_07


5. Double-click on the file jre1.6.0_07.msi (this file was created by

jre-6u7-windows-i586-p-s.exe).

Page 3-2

HDS Confidential: For distribution only to authorized parties.

Storage Navigator Modular 2: Configuration


Activity

6. Click Accept.

HDS Confidential: For distribution only to authorized parties.

Page 3-3

Storage Navigator Modular 2: Configuration


Activity

7. Click Finish and then close the C:\Documents and Settings window.

Install Storage Navigator Modular 2 (SNM2)


Next install SNM2 on your assigned management server making it the SNM2
Management Server for clients to run it in a browser.
Important Note:
If the customer is already running the Hitachi Storage Command Suite (formerly
HiCommand) and Device Manager software, you must execute the following
command to stop the high command services in order to install SNM2.
SNM2 and Storage Command Suite are compatible. They share the same data
base, but a second instance will be created for SNM2.
Restart the services after the SNM2 installation.
hcmdssrv.exe

/stop

The above mentioned command is located at


C:\program files\hicommand\base\bin
Since the image loaded on the management server assigned to you is not running
Storage Command Suite, you should not have to execute the above identified
command.
1. Drill to the following directory of your management server:
C:\DF800 Class\Class Software\HSNM2WIN_0431\Windows_GUI

Page 3-4

HDS Confidential: For distribution only to authorized parties.

Storage Navigator Modular 2: Configuration


Activity

2. Double-click on the file HSNM2-0431-W-GUI-P01.exe.


Note: When the lab project was written, the current version of SNM2 was 0431.
You instructor may ask you to obtain the most current version from the software
share site.

3.

Click Next.

4.

Click Next.

HDS Confidential: For distribution only to authorized parties.

Page 3-5

Storage Navigator Modular 2: Configuration


Activity

5.

Enter the IP address of your assigned management server and then click Next to
this screen and the following screen to start the copying of the files.
The load will take approximately 10 minutes.

6.

Click Finish at the completion screen.

7.

Close the C:\DF800 Class\Class Software window.

Start Storage Navigator Modular 2


Storage Navigator Modular 2 launches from a standard web browser. The slash at
the end of the URL is required.
The Add Array wizard automatically launches anytime there are no arrays
registered with the system.
1. Open the web browser and launch Storage Navigator Modular 2 using the http
address:
http://<IP address of Workstation>:23015/StorageNavigatorModular/
Note: Two screens open. The top screen is the Login screen and the screen
behind the Login screen would launch the Login screen again.

Page 3-6

HDS Confidential: For distribution only to authorized parties.

Storage Navigator Modular 2: Configuration


Activity

2.

When the application loads, enter the system and manager strings.
In a few moments, SMN2 will automatically launch the Add Array wizard.

3.

Click Next.

HDS Confidential: For distribution only to authorized parties.

Page 3-7

Storage Navigator Modular 2: Configuration


Activity

The wizard prompts you to enter the IP addresses of the LAN ports on the
AMS2000 controllers.
Note: If the user wanted to utilize the SSL protocol for secure LAN connections
and had SSL certificates, then Secure Port would be selected. In class you will
use Non-secure Port connections.
4.

Page 3-8

Enter the IP addresses for your assigned storage system and then click Next.

HDS Confidential: For distribution only to authorized parties.

Storage Navigator Modular 2: Configuration


Activity

5.

Click Finish and wait a few moments until the registered array is displayed on
the Registered Array screen.

6.

Move the slide bar to expose the IP Addresses and verify that your system is
the system that was registered.
Verify that the Status of your system is Normal and consult your instructor if
status other than normal is being indicated.

7.

Click on your Array Name entry to start your initial configuration.

HDS Confidential: For distribution only to authorized parties.

Page 3-9

Storage Navigator Modular 2: Configuration


Activity

Configure Java Runtime Parameter


Before continuing with the initial setup, you will be shown the error that occurs
when the Java Runtime Parameter was not been configured.
If the runtime parameter is incorrect, when a SNM2 client attempts to launch
the Advanced Settings application of SNM2, access to the application fails
because not enough memory as be assigned for the Java Plug-in.
When you launch a browser on the management server or from another remote
PC or server, that session is considered a client session.
1. From the Arrays panel, expand the Settings entry.

Page 3-10

HDS Confidential: For distribution only to authorized parties.

Storage Navigator Modular 2: Configuration


Activity

2.

Click on the Advanced Settings icon.

HDS Confidential: For distribution only to authorized parties.

Page 3-11

Storage Navigator Modular 2: Configuration


Activity

3.

Click on the Open Advanced Settings button.

4.

Click Close.

5.

Exit the SNM2 session by clicking the Logout button and then OK to the small
result prompt.

6.

Close the SNM2 Login window.

7.

From the Start menu, select Control Panel > Java.

8.

Click the Java tab and then the View button in the resulting screen.
See next page for resulting screen shot.

Page 3-12

HDS Confidential: For distribution only to authorized parties.

Storage Navigator Modular 2: Configuration


Activity

9.

Enter Xmx192m in the Java Runtime Parameter panel and click OK to reserve
192 MB of memory for Java.

10. Click OK at the Java Control Panel to complete the operation.


11. Open the web browser and launch Storage Navigator Modular 2 again.
12. Log in as system, giving the manager password.
13. Connect to your assigned array.
14. Expand Settings and then click the Advanced Settings function again.
15. Click the Open Advanced Settings button.
After a short delay with a Java icon displayed, the following window appears:

This indicates the problem is fixed.


16. Click the Close button (advanced settings will be explored later).
17. From the Arrays panel, click on the icon of your array (should be the top icon in
the list) to continue with the initial setup.

HDS Confidential: For distribution only to authorized parties.

Page 3-13

Storage Navigator Modular 2: Configuration


Activity

Initial Setup
1. From the Common Array Tasks panel, click Initial Setup. The wizard prompts
you to set up an e-mail alert, set management ports, and set up the iSCSI ports.

2. Click Next.

Page 3-14

HDS Confidential: For distribution only to authorized parties.

Storage Navigator Modular 2: Configuration


Activity

3. Since you will not be configuring this parameter in class, click Next.

4. If the customer wanted to change the IP addresses or use DHCP, this is where
the changes would be set. Since the displayed configuration is the configuration
that is required in class, click Next.

HDS Confidential: For distribution only to authorized parties.

Page 3-15

Storage Navigator Modular 2: Configuration


Activity

5. Since the Americas education host systems and storage systems are connected to
the Brocade 48000 switch, make the following changes to the Fibre Channel
settings for ports 0A, 0B, 1A, and 1B:
Transfer Rate: 4 Gbps
Topology:
Point-to-Point
Port Address: Leave as is since this parameter is not used when connected
to a switch and in Point-to-Point mode (fabric mode)
6. Click Next after configuring all four ports.

Page 3-16

HDS Confidential: For distribution only to authorized parties.

Storage Navigator Modular 2: Configuration


Activity

7. Depending on the number of expansion modules in your system, select the last
drive in the controller and extension modules (called trays) to be spare drives.
Place a check next to the desired drive. Notice how many pages of disk drives
exist (see upper right corner of screen) and select the last drive in each tray, then
click Next.

8. In class, set the time manually and click Next.


Note: If Set Automatically is selected, then the storage array will get its time
from the connected management server.

HDS Confidential: For distribution only to authorized parties.

Page 3-17

Storage Navigator Modular 2: Configuration


Activity

9. Click Next at this first confirmation screen and the next three confirmation
screens.
10. If the configuration is what you wanted, click Confirm at the last confirmation
screen and wait for the initial configuration to be applied.

11. Click Finish.


Notice that the Setup Array Wizard session was closed automatically and you
are back at the screen from which you connect to a desired array.

Install License Keys


1. Drill to the following folder of your assigned management server:
C:\DF800 Class\Class Software\Keys
Note: If you do not see a folder that matches your assigned storage system, then
you will have to access the share server to get the keys. Consult your instructor
for the IP address of the share server.
2. Enter the folder that matches the serial number of your assigned storage system.

Page 3-18

HDS Confidential: For distribution only to authorized parties.

Storage Navigator Modular 2: Configuration


Activity

3. Double-click (to open) on the .plk file to display the keys for your system. You
should see something similar t:

When installing Program Product (PP) keys, the key of an individual PP can be
copied to the SNM2 license window or you can point to the .plk file and load all
the keys at once. The key is the 48 character string identified in the above
example of a key file.
4. Close the Notepad editor for the key file.
5. Click on the Array Name of your system to again connect to your assigned array.
6. From the Common Array Tasks panel click Install License.

7. Since you will install all the keys at once, select Key File and click Browse.

HDS Confidential: For distribution only to authorized parties.

Page 3-19

Storage Navigator Modular 2: Configuration


Activity

8. Drill to the folder containing your key file, select the file and click Open.

The path to the key file should be displayed in the Key File panel of the Install
License window.
9. Click OK at the Install License window and then Confirm. After a brief delay,
the following message appears if any of the keys require a reboot of the array.
Program Products that affect the configuration of the AMS2000 cache and the
Account Authentication program product will require a reboot. Program
Products that affect the cache are: Cache Residency Manager and Copy-on-Write
SnapShot.
Note: If you attempt to install Copy-on-Write SnapShot and Cache Partition
Manager at the same time, only Copy-on-Write is installed.
Later in the class when the Cache Partition Manager is covered, you will be
instructed to install the key manually.

10. Click Close and notice that you are disconnected from your array.
Note: You were informed that a reboot is required. The reboot will be
performed in a few minutes after the investigation of Account Authentication.

Page 3-20

HDS Confidential: For distribution only to authorized parties.

Storage Navigator Modular 2: Configuration


Activity

11. Attempt to connect to your array again and see what happens.

Because the Account Authentication key was in the key file (look back at the
key file), the Account Authentication feature is active and you are being
prompted for a User ID and Password.
12. Try entering the system and manager strings to log in.

As you can see, the initial user ID and password are not accepted.
If you had commented out the Account Authentication key in the key file
before you loaded the keys, you would not be blocked from logging in using the
initial values.

HDS Confidential: For distribution only to authorized parties.

Page 3-21

Storage Navigator Modular 2: Configuration


Activity

13. Log in using the following strings (this is a built-in account and password):
User ID = root
Password = storage

Notice fewer functions are now available in the Common Array Tasks panel
and Status of the system is in question (?).
14. From the Arrays panel, expand Security and click on Account Authentication.

Page 3-22

HDS Confidential: For distribution only to authorized parties.

Storage Navigator Modular 2: Configuration


Activity

You can see that the root account is a built-in account. The root account could
be used to add new accounts (users) using the Add Account button.
In a few minutes you will create a new Administrator account and then disable
the Account Authentication and SNMP features.
To investigate why SNMP will be disabled:
15. Launch another browser window and connect to your array using the Web Tool.

Notice that the array is in a Warning state.


16. Click the Warning Information link.

HDS Confidential: For distribution only to authorized parties.

Page 3-23

Storage Navigator Modular 2: Configuration


Activity

This is the error that occurs when SNMP is installed. You have not configured
the SNMP parameters and SNM2 is complaining because it does not know
where the SNMP server is (this is discussed later in the course).
Note: Another way to view the warning is via the Event Log of SNM2. This is
displayed using the Alerts & Events function and then selecting the Event Log.
17. Close the Web Tool.

Page 3-24

HDS Confidential: For distribution only to authorized parties.

Storage Navigator Modular 2: Configuration


Activity

18. Click the Add Account button in the Account Information panel.

19. Enter the following and then click OK.


User ID = Administrator
Account: Select the Enable radio button
Password = TrainingAdmin1
Reenter the new password
Check the following View and Modify roles: Account Administrator, Audit
Log Administrator, and Storage Administrator
20. Click Close at the account is added successfully window.
21. Log out, closing all SNM2 windows and log back into SNM2.
Note: You will still be required to give the system and manager strings to login
into SMN2. The new strings are required when you attempt connection to your
array.

HDS Confidential: For distribution only to authorized parties.

Page 3-25

Storage Navigator Modular 2: Configuration


Activity

22. Select your array using its check box and then click the Reboot Array button.

23. Now enter the strings Administrator and TrainingAdmin1 to log in as the
Administrator.
Note: There is a time delay from the time you created the new account and
when the database is updated. If you get to this point before the database is
updated, your login will be rejected wait a few minutes and try again.

Page 3-26

HDS Confidential: For distribution only to authorized parties.

Storage Navigator Modular 2: Configuration


Activity

24. Check the Yes check box and then click Reboot Array and wait for the reboot to
complete.

25. Click Close.

HDS Confidential: For distribution only to authorized parties.

Page 3-27

Storage Navigator Modular 2: Configuration


Activity

26. Connect to your array unit and notice that you are not prompted for the
Administrator User ID and Password (you gave them before the reboot).

27. From the Array panel, expand Settings and click on Licenses.

Page 3-28

HDS Confidential: For distribution only to authorized parties.

Storage Navigator Modular 2: Configuration


Activity

28. Check the SNMP-Agent and Account program products and then click the
Change Status button.
Note: If you had not rebooted the array, the Install, De-install, and Change
Status buttons would not be present in the Licenses panel.

HDS Confidential: For distribution only to authorized parties.

Page 3-29

Storage Navigator Modular 2: Configuration


Activity

29. Remove the check from the Enable check box and then click OK.

30. Click Close.


31. Connect to your array and notice that you are not prompted for a User ID and
Password.
Also, notice that the Status is now reported as normal because you disabled
SNMP.
32. Log out of SNM2.
This ends the guided portion of the lab project.
If you want to go back and practice what you have learned, feel free to do so, but
keep in mind that you need to complete the review questions and have them ready
for review when the class reconvenes in the classroom.
Make sure you leave the system in the same state that it was in at the end of the
guided portion of the lab project this insures that the system will be in a state that
supports the following lab projects.

Page 3-30

HDS Confidential: For distribution only to authorized parties.

Storage Navigator Modular 2: Configuration


Lab Project Review Questions

Lab Project Review Questions


SNM2 Configuration
1. What Java JRE is required?
2. If the SNM2 management server is running Hitachi Storage Command Suite before
the installation of SNM2, what must be done before installing SNM2?

3. During the installation of SNM2, what port number was set?


4. When launching SNM2, what port number is used in the URL, and can the user
change this port number?
5. What are the initial login strings?
User ID =
Password =
6. What is the string that you need to set for the Java Runtime Parameter?

7. When installed, some Program Products will require a reboot of the array. What PPs
cause a reboot when installed?

8. What are the strings of the built-in user account that is activated when you install
the Account Authentication program product?
User ID =
Password =

HDS Confidential: For distribution only to authorized parties.

Page 3-31

Storage Navigator Modular 2: Configuration


Lab Project Review Questions

Lab 3 - End

Page 3-32

HDS Confidential: For distribution only to authorized parties.

Lab Activity 4
Storage Navigator
Modular 2: Basic
Operations
Objectives
Upon completion of the lab project, the learner should be able to:
Create several RAID Groups specifying different RAID levels and disk
combinations using both Automatic and Manual selection of the disk drives.
Delete a RAID Group.
Manually create several Logical Units of different sizes.
Delete a Logical Unit

HDS Confidential: For distribution only to authorized parties.

Page 4-1

Storage Navigator Modular 2: Basic Operations


Activity

Activity
Create RAID Groups
1. From your assigned classroom PC, use the Remote Desktop Connection Utility
and connect to your assigned management server in the lab.
2. Login to SNM2 and then connect to your assigned storage array.
3. From the Arrays panel, expand Groups and click on RAID Groups. From the
resulting screen, click on the Create RAID Group button.

4. Click OK to accept the default settings the drives will be selected


automatically.
See next page for resulting screen shot.
By default, if no RAID groups exist on the system the following RAID group is
created:
Page 4-2

HDS Confidential: For distribution only to authorized parties.

Storage Navigator Modular 2: Basic Operations


Activity

RAID Group number = 000


RAID Level = RAID5
Parity Group combination = 4D+1P
Number of Parity Groups = 1 (always leave this parameter equal to 1)
Drive Type = SAS
Drive Capacity = 300 GB (your system may not have this type of drive)
5. Click Close at the created successfully window.
Depending on the type, size, and number of disk drives in your array, you
should see something similar as shown below.

HDS Confidential: For distribution only to authorized parties.

Page 4-3

Storage Navigator Modular 2: Basic Operations


Activity

6. Click on the icon of RAID Group 000 and then click on the Assigned Drives in
the resulting window.

7. Create the following RAID Group using Automatic Selection:


RAID Group number = 001
RAID Level = RAID 1+0
Parity Group combination = 2D+2D
8. Create the following RAID Group using Manual Selection:
RAID Group number = 002
RAID Level = RAID5
Parity Group combination = 3D+1P
Check the following drives in the Assignable Drives panel:
Tray 00
Drives 09, 10, 11, and 12

Page 4-4

HDS Confidential: For distribution only to authorized parties.

Storage Navigator Modular 2: Basic Operations


Activity

After the above command you RAID Group configuration should look
something like the following:

9. Select the check box to the left of RG 001 and then click Delete RAID Group.

Create Logical Units


1. From the RAID Groups panel, click on the Logical Units tab and then click the
Create LU button in the resulting window.

HDS Confidential: For distribution only to authorized parties.

Page 4-5

Storage Navigator Modular 2: Basic Operations


Activity

2. Select the following parameters and then click OK.


By default, if no LUs exist on the system the following LU is created:
RAID Group number = 000
LUN = 0000
Capacity = 1 GB
Stripe Size = 256KB
Leave the check in the Format the Logical Unit box

This window allows you to map the new LU to a Port and Host Group.
3. Click Close At this time mapping will not be performed. Host Groups and
LUN mapping are covered later in the course.

Page 4-6

HDS Confidential: For distribution only to authorized parties.

Storage Navigator Modular 2: Basic Operations


Activity

4. Click on the Create LU button again and create five additional LUs per the
following parameters, and remember click Close at the window concerning Host
Group mapping:
RAID Group number = 000
LUN = 0001
Capacity = 1 GB
Stripe Size = 512KB
Leave the check in the Format the Logical Unit box
RAID Group number = 002
LUN = 0002
Capacity = 400,000 Blocks
Stripe Size = 64KB
Leave the check in the Format the Logical Unit box
RAID Group number = 002
LUNs = 0003, 0004, and 0005
Capacity = 1 GB
Stripe Size = 256KB
Leave the check in the Format the Logical Unit box
Your LU configuration should look something like the following:

HDS Confidential: For distribution only to authorized parties.

Page 4-7

Storage Navigator Modular 2: Basic Operations


Activity

5. Click on the icon for LUN 0000 to see its properties (you should see something
similar as shown below).

6. Click Close.
7. Select LUN 0002 and click the Delete LU button.

Page 4-8

HDS Confidential: For distribution only to authorized parties.

Storage Navigator Modular 2: Basic Operations


Activity

8. Check the Yes, I have read the above warning box and click Confirm to delete
the LU, followed by clicking Close at the deleted successfully screen.
Your LU configuration should look like the following:

9. Log out of SNM2.


This ends the guided portion of the lab project.
If you want to go back and practice what you have learned, feel free to do so, but
keep in mind that you need to complete the review questions and have them ready
for review when the class reconvenes in the classroom.
Make sure you leave the system in the same state that it was in at the end of the
guided portion of the lab project this insures that the system will be in a state that
supports the following lab projects.

HDS Confidential: For distribution only to authorized parties.

Page 4-9

Storage Navigator Modular 2: Basic Operations


Lab Project Review Questions

Lab Project Review Questions


SNM2 Basic Operations
1. What two methods are available for the creation of RAID Groups?
2. When using the Manual Selection method of creating a RAID Group, drives of
different speeds can be combined into the same RAID Group.
A. TRUE
B. FALSE
3. What is the maximum number of Parity Groups HDS recommends per RAID
Group?
4. LUNs can be created in what four sizes?
5. When you create a LUN manually, you have the option to map it to a Host Group.
A. TRUE
B. FALSE

Lab 4 - End

Page 4-10

HDS Confidential: For distribution only to authorized parties.

Lab Activity 5
Basic Operations:
Host Groups and
LUN Mapping
Objectives
Upon completion of the lab project, the learner should be able to:
Enable Host Group Security for ports 0A and 1A (also called LUN Security).
Create a Host Group for the Windows host server on ports 0A and 1A.
Set the port options parameter to support a Windows host connection.
Associate the WWPN of the Windows HBA port to the Windows Host Group.
Map two internal logical units (LUs) to the newly created Windows Host Groups.
Verify that the Windows host server discovers the LUNs.

HDS Confidential: For distribution only to authorized parties.

Page 5-1

Basic Operations: Host Groups and LUN Mapping


Activity

Activity
Identify WWPNs of HBA and Storage Array Ports
In order to configure host HBA Persistent Binding and storage array Host Group
Security, you must identify and list the WWPNs that will be used during the
configuration process.
1. From your assigned classroom PC, use the Remote Desktop Connection Utility
and connect to your assigned management server in the lab.
2. From the desktop of your management server, double-click on the HBAnyware
icon to launch the Emulex HBA GUI.
Assuming that the HBA and storage array have not been configured, you should
see something similar to the screen shot below:

3. Record the WWNs of the two HBA ports (your WWNs will be different from the
captured screen shot and should reflect the WWNs of your assigned host system).
First port =

__________________________________

Second port = __________________________________


4. Close the HBAnyware GUI.
5. Login to SNM2 and then connect to your assigned storage array.
6. From the Arrays panel, expand Settings and click on FC Settings.
See next page for resulting screen shot.

Page 5-2

HDS Confidential: For distribution only to authorized parties.

Basic Operations: Host Groups and LUN Mapping


Activity

7. Click on FC Port 0A and record the WWPN of the port and then repeat the
process for Port 1A.

Port 0A =

__________________________________

Port 1A =

__________________________________

Enable Host Group Security for Ports 0A and 1A


1. From the Arrays panel, expand Groups and click on Host Groups.
See next page for resulting screen shot.

HDS Confidential: For distribution only to authorized parties.

Page 5-3

Basic Operations: Host Groups and LUN Mapping


Activity

Notice that each port contains a default Host Group 000 (default name is
000:G000).
2. Click the Host Group Security tab.

Page 5-4

HDS Confidential: For distribution only to authorized parties.

Basic Operations: Host Groups and LUN Mapping


Activity

Notice that Host Group Security, by default, is disabled. Also, depending on the
model that you are connected to, the number of ports may be different.
3. Assuming that your Windows host system is connected to ports 0A and 1A, enable
the security for these two ports, or enable the ports that your host server is
connected to. Use the Change Host Group Security button to make the change on
the selected ports and when finished your settings should look like the following:

4. Return to the Groups window by clicking on the Host Groups tab.

Create Host Groups and Map LUNs


1. Check the box for Port 0A and then click the Create Host Group button. Modify
the following parameters:
Host Group No. = Leave as is (001)
Name =

Windows_Port_0A

Detected WWNs = Verify that the WWPN listed for Port 0A is one of the ports
of your assigned Windows host HBA (see page 5-2). If the
correct WWPN is listed, then check the box for Port 0A and
then click the Add button to assign the HBA WWPN to this
Host Group. If the WWPN is not correct, consult your
instructor maybe the switch zoning is not correct).
See next page for resulting screen shot.

HDS Confidential: For distribution only to authorized parties.

Page 5-5

Basic Operations: Host Groups and LUN Mapping


Activity

2. Click the Options tab.


3. In the resulting window, select Windows from the Platform drop-down list and
then click the Logical Units tab.
See next page for resulting screen shot.

Page 5-6

HDS Confidential: For distribution only to authorized parties.

Basic Operations: Host Groups and LUN Mapping


Activity

Note: If you have followed the steps of the previous lab project that instructed
you how to create RAID Groups and LUNs, then your configuration should look
like the screen shot above. The next few steps of this lab project will have you
map the two 1 GB LUNs from RAID Group 000 to this Host Group. If your
RAID Group/LUN configuration is different, then select two other LUNs and
make note as to what two LUNs you use.
You will create the following LUN mapping configuration:
Internal LUN 0000 mapped to H-LUN 0000
Internal LUN 0001 mapped to H-LUN 0001
4. In the Available Logical Units panel, check the box for LUN 0000 and LUN 0001.
5. Leave the radio button for H-LUN 0000 selected in the H-LUNs panel, click the
Add button to map the two internal LUNs to your Host Group.
6. Using the right-hand scroll bar, pull the screen down to the bottom and click the
OK button and then Close at the completion screen.
See following page for resulting screen shot.

HDS Confidential: For distribution only to authorized parties.

Page 5-7

Basic Operations: Host Groups and LUN Mapping


Activity

7. Repeat Steps 1 6 for the Create Host Groups and Map LUNs (see page 5-5)
portion of this lab project for Port 1A, naming the host group Windows_Port_1A.
You will map the same two internal LUNs to this Host Group. Also, set the Host
Group Number to 001 (same number used for the host group of Port 0A). When
selecting the WWN, you should see and then select the other WWN of your host
HBA. This time you will have to check the 1A box and un-check the 0A box for
the Create to parameter on the Create Host Group window. When finished, your
host group window should look like the following:

Page 5-8

HDS Confidential: For distribution only to authorized parties.

Basic Operations: Host Groups and LUN Mapping


Activity

Verify Fibre Channel Links and Logins


This section will have you verify that your host system HBA ports and your storage
array ports have logged into the Fibre Channel switch.
The Americas Education Centers use a Brocade 48000 switch to effect connections
between the host servers and the storage arrays.
This switch and other types of switches may be configured to disable a port when it
senses a change in the topology setting of devices connected to the switch.
When you registered your array earlier in the course, the default setting of the ports
was Loop and you specified Point-to-Point as the topology. Because of this, the
corresponding ports of the switch may be disabled and your storage array ports may
not be logged in correctly.
1. From the Arrays panel, expand Settings and then click on FC Settings.

IF the Links are down for Ports 0A and 1A, THEN your instructor will have to
connect to the switch and perform the following:
Portdisable and then portenable for the switch ports where your storage array
ports are connected.
After the switch ports are toggled, verify that the Link Status of the storage
arrays ports are now indicating LinkUP(F_Port Connected).

HDS Confidential: For distribution only to authorized parties.

Page 5-9

Basic Operations: Host Groups and LUN Mapping


Activity

Verify LUN Discovery at the Host


1. From the desktop of your management server, double-click on the HBAnyware
icon to launch the Emulex HBA GUI again.
2. Fully expand both ports to verify the discovery you should see the following:

Note:
You may have to click the
Local HBAs Only button to
see the discovered elements
of your assigned servers
HBA.

If the HBA does not indicate that both LUNs on both ports have been discovered,
then ask your instructor for help to determine the reason.
The problem could be your configuration on the array, the switch, or the HBA.
The lab project does not instruct you how to set up Persistent Binding even
though its use is strongly recommended when on a switch. The fixed
configuration of the education centers environment should work and the LUNs
should have been discovered the HBAs are set for Automatic LUN discovery.
If your array is configured correctly and the switch is indicating correct logins,
then your instructor may have to walk you through setting up Persistent Binding
to see if this corrects the problem.
3. Close the HBAnyware window.

Page 5-10

HDS Confidential: For distribution only to authorized parties.

Basic Operations: Host Groups and LUN Mapping


Activity

4. From the desktop, right-click on the My Computer icon and select Manage, then
click on the Disk Management link in the resulting window. Also, click Cancel if
the Initialize and Convert Disk Wizard window appears.

5. Select Rescan Disks from the Action drop-down menu.


See next page for resulting screen shot.

HDS Confidential: For distribution only to authorized parties.

Page 5-11

Basic Operations: Host Groups and LUN Mapping


Activity

6. Right-click on the little red circle and select Initialize Disk.

7. Click OK.

Page 5-12

HDS Confidential: For distribution only to authorized parties.

Basic Operations: Host Groups and LUN Mapping


Activity

8. Right-click in the Unallocated area of Disk 1 and select New Partition. Answer
the following prompts to setup the partition.
9. Repeat step 8 for Disk 1.
Note: Disks 3 and 4 are the same physical LUNs in the storage array because the
same two internal LUs were mapped to the same Host LUNs of both Host
Groups. Installation of HDLM would reconfigure the Windows drivers so only
two LUNs would be listed, but the host OS would be aware of the alternate paths.
10. Close all your windows.
This ends the guided portion of the lab project.
If you want to go back and practice what you have learned, feel free to do so, but
keep in mind that you need to complete the review questions and have them ready
for review when the class reconvenes in the classroom.
Make sure you leave the system in the same state that it was in at the end of the
guided portion of the lab project this insures that the system will be in a state that
supports the following lab projects.

HDS Confidential: For distribution only to authorized parties.

Page 5-13

Basic Operations: Host Groups and LUN Mapping


Lab Project Review Questions

Lab Project Review Questions


Host Groups and LUN Mapping
1. By default, each DF800 physical port contains a default Host Group.
A. TRUE
B. FALSE
2. Host Group Security can be set for each port.
A. TRUE
B. FALSE
3. By default, Host Group Security is Enabled for each port.
A. TRUE
B. FALSE
4. What is associated to a Host Group to insure that illegal access to LUNs is
prevented?

5. The same internal LU, once mapped to a Host Group, cannot be mapped to another
Host Group.
A. TRUE
B. FALSE
6. What is a Host Group?

Lab 5 - End
Page 5-14

HDS Confidential: For distribution only to authorized parties.

Lab Activity 6
Basic Operations:
LU Expansion and
LU Grow/Shrink
Objectives
Upon completion of the lab project, the learner should be able to:
Create an expanded LUN from three normal internal LUNs.
Separate an expanded LUN into its original internal LUNs.
Expand an existing LU
Shrink an existing LU

HDS Confidential: For distribution only to authorized parties.

Page 6-1

Basic Operations: LU Expansion and LU Grow/Shrink


Activity

Activity
Create an Expanded LUN
Note: If you have followed the steps of previous lab projects that instructed you
how to create RAID Groups and LUNs, then your configuration should look like the
following screen shot.
The next few steps of this lab project will have you create an Expanded LUN from
LUNs 0000, 0004, and 0005.
LUN 0000 is currently mapped to the Windows Host Groups on ports 0A and 1A
and will first have to be un-mapped.
If your RAID Group/LUN configuration is different, then create and/or use three
LUNs of your choosing.

1. From your assigned classroom PC, use the Remote Desktop Connection Utility
and connect to your assigned management server in the lab.
2. Login to SNM2 and then connect to your assigned storage array.
3. From the Arrays panel, expand Groups and then click on Host Groups.
4. Check the Windows_Port_0A Host Group and then click the Edit Host Group
button.
5. Click the Logical Unit tab in the Edit Host Groups window.
See next page for resulting screen shot.

Page 6-2

HDS Confidential: For distribution only to authorized parties.

Basic Operations: LU Expansion and LU Grow/Shrink


Activity

Note: In an actual production environment, any involved LUNs should be


backed up before beginning the expansion process.
6. In the Assigned Logical Units panel, check H-LUN 0000, click the Remove
button, then pull down the window, and click the OK button.
7. Click Close at the completion window.
8. Repeat Steps 4 7 for the other Windows Host Group on Port 1A.
9. From the Arrays panel, expand Groups and then click on Host Groups and
select the Logical Units tab. In the resulting window, select LUN 0000 and click
the Change LU Capacity button.
See next page for resulting screen shot.

HDS Confidential: For distribution only to authorized parties.

Page 6-3

Basic Operations: LU Expansion and LU Grow/Shrink


Activity

10. Select Add logical units as the Method of Capacity Setting, check LUNs 0004
and 0005 , and then click OK.

11. Check Yes and then the Confirm button, then Close at the completion window.
12. Click the Format LU button.

Page 6-4

HDS Confidential: For distribution only to authorized parties.

Basic Operations: LU Expansion and LU Grow/Shrink


Activity

13. Check Yes and then click Confirm and then Close at the completion window.
14. Map LUN 0000, the expanded LUN, to the two Windows Host Groups again
and then confirm that the Windows host detects the new LUN. Put a write
signature on the new LUN (initialize it) and then create a partition in the new
LUN.
Note: In an actual production environment, any backed data from the original
LUNs would be restored as a last step.

HDS Confidential: For distribution only to authorized parties.

Page 6-5

Basic Operations: LU Expansion and LU Grow/Shrink


Activity

Separate an Expanded LUN


1. Un-map LUN 0000 again from both of the Windows Host Groups.
2. Use the Change LU Capacity feature to separate all the LUNs of LUN 0000.
3. Format LUN 0000 and re-map it to both of the Windows Host Groups.
4. Using the Windows Disk Management utility, initialize the LUN and create a
partition in the LUN (the LUN is used later in the course).

Change the LU capacity using LU Grow/Shrink


The next few steps of this lab project will have you change the capacity of LUN 0000
LUN 0000 is currently mapped to the Windows Host Groups on ports 0A and 1A
and will first have to be un-mapped.
1. From your assigned classroom PC, use the Remote Desktop Connection Utility
and connect to your assigned management server in the lab.
2. Login to SNM2 and then connect to your assigned storage array.
3. From the Arrays panel, expand Groups and then click on Host Groups.
4. Check the Windows_Port_0A Host Group and then click the Edit Host Group
button.
5. Click the Logical Unit tab in the Edit Host Groups window.
Note: In an actual production environment, any involved LUNs should be
backed up before beginning the expansion process.
6. In the Assigned Logical Units panel, check H-LUN 0000, click the Remove
button and then pull down the window and click the OK button.
7. Click Close at the completion window.
8. Repeat Steps 4 7 for the other Windows Host Group on Port 1A.
9. From the Arrays panel, expand Groups and then click on Host Groups and
select the Logical Units tab. In the resulting window, select LUN 0000 and click
the Change LU Capacity button.
10. Select Input Capacity as the Method of Capacity Setting, specify 5 GB as the
new capacity , and then click OK.
11. Map LUN 0000, the expanded LUN, to the two Windows Host Groups again
and then confirm that the Windows host detects the new LUN. Put a write
signature on the new LUN (initialize it) and then create a partition in the new
LUN.
12. Un-map LUN 0000 again from both of the Windows Host Groups.

Page 6-6

HDS Confidential: For distribution only to authorized parties.

Basic Operations: LU Expansion and LU Grow/Shrink


Activity

13. Use the Change LU Capacity feature to set the capacity of LUN 0000 back to 1
GB.
14. Re-map LUN 0000 it to both of the Windows Host Groups.
15. Using the Windows Disk Management utility, initialize the LUN and create a
partition in the LUN (the LUN is used later in the course).
16.
Note: In an actual production environment, any backed data from the original
LUNs would be restored as a last step.

This ends the guided portion of the lab project.


If you want to go back and practice what you have learned, feel free to do so, but
keep in mind that you need to complete the review questions and have them ready
for review when the class reconvenes in the classroom.
Make sure you leave the system in the same state that it was in at the end of the
guided portion of the lab project this insures that the system will be in a state that
supports the following lab projects.

HDS Confidential: For distribution only to authorized parties.

Page 6-7

Basic Operations: LU Expansion and LU Grow/Shrink


Lab Project Review Questions

Lab Project Review Questions


LUN Expansion
1. How many LUNs can be unified into an Expanded LUN?

2. What is the maximum size of a unified LUN?

3. LUNs from different RAID groups can be unified.


A. TRUE
B. FALSE
4. LUNs to be expanded must come from RAID Groups that use the same type of disk
drives, but the RPMs can be different.
A. TRUE
B. FALSE
5. Of the LUNs used to create the unified LUN, what LUN is the LUN that should be
mapped to the host system?

6. When creating a unified LUN, what should be done first?

7. After creating the unified LUN, what should be done before mapping it to a host
system?

Lab 6 - End

Page 6-8

HDS Confidential: For distribution only to authorized parties.

Lab Activity 7
Basic Operations:
Online RAID Group
Expansion
Objectives
Upon completion of the lab project, the learner should be able to:
Create an expanded RAID Group from an existing RAID Group.

HDS Confidential: For distribution only to authorized parties.

Page 7-1

Basic Operations: Online RAID Group Expansion


Activity

Activity
Create an Expanded LUN
Note: If you have followed the steps of previous lab projects that instructed you
how to create RAID Groups and LUNs, then your configuration should look like the
following screen shot.
The next few steps of this lab project will have you create an Expanded RAID
Group from RAID Group 000

1. From your assigned classroom PC, use the Remote Desktop Connection Utility
and connect to your assigned management server in the lab.
2. Login to SNM2 and then connect to your assigned storage array.
3. From the Arrays panel, expand Groups and then click on RAID Groups.
4. In the RAID Group panel, check RAID Group 000 and click the Expand RG
button.

Page 7-2

HDS Confidential: For distribution only to authorized parties.

Basic Operations: Online RAID Group Expansion


Activity

5. Select the first drive in the Assignable Drive panel and click OK .
6. To confirm the warning message check Yes and click the Confirm button, then
close the completion window.
This ends the guided portion of the lab project.

HDS Confidential: For distribution only to authorized parties.

Page 7-3

Basic Operations: Online RAID Group Expansion


Lab Project Review Questions

Lab Project Review Questions


RAID Group Expansion
1. How many RAID Groups can be expanded simultaneously?

2. What is the maximum size of an expanded RAID Group?

3. Can the HDDs be of different size or different protocol?

Lab 7 - End

Page 7-4

HDS Confidential: For distribution only to authorized parties.

Lab Activity 8
Basic Operations:
Storage Navigator
Modular 2 CLI
Objectives
Upon completion of the lab project, the learner should be able to:
Install the Storage Navigator Command Line Interface on a host system.
Set CLI system variables.
Register an Adaptable Modular Storage system with the CLI.
Create a Management Mode password.
Collect status of existing RAID Groups and LUNs.
Create and delete a RAID Group.
Create a LUN.
Format a LUN.

HDS Confidential: For distribution only to authorized parties.

Page 8-1

Basic Operations: Storage Navigator Modular 2 CLI


Activity

Activity
Introduction to the CLI
Note: If you have followed the steps of previous lab projects that instructed you
how to create RAID Groups, LUNs, and Expanded LUNs, then your configuration
should look like the following screen shot.
Internal LUs 0000 and 0001 should be mapped to the two Windows Host Groups on
Ports 0A and 1A.
If your RAID Group/LUN configuration is different, then as you perform the
various steps of this lab project, modify any specified RAID Group and or LUNs to
meet your configuration.

1. From your assigned classroom PC, use the Remote Desktop Connection Utility
and connect to your assigned management server in the lab.
2. Login to SNM2 and then connect to your assigned storage array.
3. For the time being, minimize the SNM2 windows. Later in the lab project you
will open the SNM2 GUI to verify changes that you made using the CLI.
4. Drill to the following folder of your Windows host system:
C:\DF800 Class\Class Software\HSNM2WIN_0431\Windows_CLI
5. Double-click on HSNM2-0400-W-CLI.exe.
See next page for resulting screen shot.

Page 8-2

HDS Confidential: For distribution only to authorized parties.

Basic Operations: Storage Navigator Modular 2 CLI


Activity

6. Click Next to this prompt, and Next and Install to the following two prompts.
7. Click Finish at the completion prompt.
8. Drill to the following folder:
C:\Program Files\Storage Navigator Modular 2 CLI
9. Double-click on startsnmen.bat to launch the CLI.

10. Execute the set command to verify that the environment variable
STONAVM_HOME was set during the CLI installation process.
See next page for resulting screen shot.

HDS Confidential: For distribution only to authorized parties.

Page 8-3

Basic Operations: Storage Navigator Modular 2 CLI


Activity

11. Execute the aupasswd command and enter df800 as the password.
12. Execute the following command to register your storage array:
auunitadd unit array01 LAN ctl0 XXX.XX.X.XXX -ctl1 XXX.XX.X.XXX
where XXX.XX.X.XXX = the IP addresses of the controllers of your
assigned DF800.
13. Execute the following command to display any existing RAID Groups (you
should see something similar to the following screen shot):
aurgref unit array01 -g

Page 8-4

HDS Confidential: For distribution only to authorized parties.

Basic Operations: Storage Navigator Modular 2 CLI


Activity

Note: The next command will create a RAID 5, 2+1 RAID Group. Because of
the assumed beginning configuration of the array at the start of the lab project,
the command will specify disks 05, 06, and 07 of Tray 0. Since your system may
have a different disk configuration, you should restore the SNM2 GUI and
verify what disk drives are available and modify the following command to
reflect the drive numbers that you have to use.
14. Execute the following command to create the new RAID Group 3 and answer Y
to the confirmation prompt:
aurgadd unit array01 -rg 3 -RAID5 drive 0.5 0.6 0.7 -pnum 1
15. Using the SNM2 GUI, display the arrays configured RAID Groups and verify
that the CLI command added the new group (dont forget to refresh the GUI). If
you want, you could also execute the aurgref command to verify the addition.
16. Execute the following command to display the currently configured LUNs:
auluref unit array01 -g
17. Execute the following command to create a new LUN 6, remembering that your
LUN configuration may be different:
auluadd unit array01 lu 6 rg 0 size 1g stripesize 256 -noluformat
18. Execute the following command to again display configured LUNs:
auluref unit array01 -g

19. Execute the following command to format the new LUN:


auformat unit array01 lu 6
20. Close the CLI window and Logout of the SNM2 GUI.
By now you should have the idea that the CLI is not very user-friendly, but it works.

HDS Confidential: For distribution only to authorized parties.

Page 8-5

Basic Operations: Storage Navigator Modular 2 CLI


Activity

This ends the guided portion of the lab project.


If you want to go back and practice what you have learned, feel free to do so, but
keep in mind that you need to complete the review questions and have them ready
for review when the class reconvenes in the classroom.
Make sure you leave the system in the same state that it was in at the end of the
guided portion of the lab project this insures that the system will be in a state that
supports the following lab projects.

Page 8-6

HDS Confidential: For distribution only to authorized parties.

Basic Operations: Storage Navigator Modular 2 CLI


Activity

Lab Project Review Questions


Command Line Interface

1. Why is the CLI considered more powerful than the GUI?

2. What system variable must be set before you attempt to use the CLI on a Windows
system?

3. The CLI does not know about the GUI installed on the same host system or another
host system.
A. TRUE
B. FALSE
4. In order to execute CLI commands that change the system configuration, a
password must be created to allow change configuration commands.
A. TRUE
B. FALSE

HDS Confidential: For distribution only to authorized parties.

Page 8-7

Basic Operations: Storage Navigator Modular 2 CLI


Activity

Lab 8 - End

Page 8-8

HDS Confidential: For distribution only to authorized parties.

Lab Activity 9
Basic Operations:
Cache Partition
Manager Feature
Objectives
Upon completion of the lab project, the learner should be able to:
Release cache space from the two Master Partitions (0 and 1), releasing it to Free
Space for each controller.
Create two new partitions, one in each controller.
Assign a different cache segment size to each of the new partition.
Create two new LUNs, assigning each to one of the new partitions.

HDS Confidential: For distribution only to authorized parties.

Page 9-1

Basic Operations: Cache Partition Manager Feature


Activity

Activity
1. From your assigned classroom PC, use the Remote Desktop Connection Utility
and connect to your assigned management server in the lab.
2. Login to SNM2 and then connect to your assigned storage array.
3. From the Arrays panel, expand Settings and then click on Advanced Settings.
4. From the Advanced Settings panel, click the Open Advanced Settings button.

Notice that the Cache Partition Manager (CPM) feature is not listed. If you
remember, when the license keys were installed earlier in the class, CPM was not
installed because Copy-on-Write SnapShot (COW) was specified to install at the
same time. The two features cannot be installed at the same time, therefore CPM
was not installed.
5. Close the Advanced Settings window and install the individual key for CPM,
returning to the Advanced Settings window after the key is installed.
See next page for Advanced Settings after CPM is installed.

Page 9-2

HDS Confidential: For distribution only to authorized parties.

Basic Operations: Cache Partition Manager Feature


Activity

6. In the Array Unit panel, click on Cache Partition.

Notice that the only two partitions are available (00 and 01). Partition 00 is
owned by Controller 0 and Partition 01 is owned by Controller 1.
7. Click the Set button.
See next page for resulting screen shot.

HDS Confidential: For distribution only to authorized parties.

Page 9-3

Basic Operations: Cache Partition Manager Feature


Activity

Notice that all the cache space defined by the User Area is equal to 1000 MB.
Note: Depending on the model of Adaptable Modular Storage you are
connected to, the amount of cache memory may be different. If you see a
different size from that indicated by the lab screen shots, use pencil and paper to
make note of the differences and make adjustments as required as you progress
through the following steps.
For the example above, the 1000 MB is divided equally between the two
controllers and their corresponding partitions: they currently have 500 MB (the
1000 MB divided by 2).
Amount of space is identified by a factor of 10 MB chunks: 50 x 10 MB = 500 MB.
The amount of Free Space per controller is = 0 MB, therefore no sub-partitions
could be created.
8. Double-click in the Size(x10MB) panel for Partition 00, delete the 50, and then
key in 20 (this will release 30 chunks to free space, leaving the minimum of 20
chunks). Remember, the number of released chunks may be different for your
array; if so, make note of the number of chunks released for your array.
9. Repeat step 8 for Partition 01.
10. Click the OK button to release the space and see next page for resulting prompt.

Page 9-4

HDS Confidential: For distribution only to authorized parties.

Basic Operations: Cache Partition Manager Feature


Activity

11. Click OK.

12. Click OK.

13. Check the Restart now box and then click OK.

HDS Confidential: For distribution only to authorized parties.

Page 9-5

Basic Operations: Cache Partition Manager Feature


Activity

14. Check the OK to reboot box and then click OK to reboot the array.

15. Click OK and then Close to the Please close this browser prompt.
Note: You will be placed back at the Advanced Settings window.
16. Click the Open Advanced Settings button again.
17. Select Cache Partition and then click the Set button.

Notice that each controller now has 600 MB of cache. You release 30 chunks of
space from each master partition. Since each controller has a mirror area for the
other controller, the space that is released to Free Space is twice the released
number of chunks.
18. Click the Add button, and select a Segment Size of 64 KB.
Note: Sub-partition 02 will be owned by Controller 0.
19. Click the Add button again, and select a Segment Size of 256 KB and select
Controller 1 as the owner.
See next page for how the configuration should look.

Page 9-6

HDS Confidential: For distribution only to authorized parties.

Basic Operations: Cache Partition Manager Feature


Activity

20. Click OK and respond to the resulting prompts as you did when you released
space from the master partitions.

Map LUNs to the Sub-partitions


1. From the Arrays panel, expand Groups and click on RAID Groups, followed by
clicking the Logical Units tab of the RAID Groups panel.
2. Click on the Create LU button.
See next page for resulting screen shot.

HDS Confidential: For distribution only to authorized parties.

Page 9-7

Basic Operations: Cache Partition Manager Feature


Activity

Notice that this window now offers Cache Partition Settings. Look back to lab
project Page 4-8 to see the difference.
3. Crate a new LUN using the following settings, and when prompted to map the
new LUN to a Host Group, click Close.
RAID Group = 000
LUN number = 0008
Capacity = 1 GB
Stripe Size = 64 KB
Cache Partition = 02
Pair Cache Partition = Auto
4. Create another LUN using the following settings, and when prompted to map
the new LUN to a Host Group, click Close (see next page for result).
RAID Group = 000
LUN number = 0009
Capacity = 1 GB
Stripe Size = 256 KB
Cache Partition = 03
Pair Cache Partition = Auto

Page 9-8

HDS Confidential: For distribution only to authorized parties.

Basic Operations: Cache Partition Manager Feature


Activity

5. Logout of SNM2.

This ends the guided portion of the lab project.


If you want to go back and practice what you have learned, feel free to do so, but
keep in mind that you need to complete the review questions and have them ready
for review when the class reconvenes in the classroom.
Make sure you leave the system in the same state that it was in at the end of the
guided portion of the lab project this insures that the system will be in a state that
supports the following lab projects.

HDS Confidential: For distribution only to authorized parties.

Page 9-9

Basic Operations: Cache Partition Manager Feature


Lab Project Review Questions

Lab Project Review Questions


Cache Partition Manager
1. If the Copy-on-Write Snapshot feature is installed, the amount of cache available to
the user area is decreased.
A. TRUE
B. FALSE
2. Before you can create a new partition, what must exist?

3. Cache Partitions are defined in 20MB chunks.


A. TRUE
B. FALSE
4. When you re-configure the cache, adding or deleting a partition, a restart is not
required.
A. TRUE
B. FALSE
5. Cache Partitions can be different sizes and have different cache segment sizes.
A. TRUE
B. FALSE
6. If you create two partitions of different sizes with each partition on a different
controller, after the restart the Free Area of each controller will also be different.
A. TRUE
B. FALSE

Lab 9 - End

Page 9-10

HDS Confidential: For distribution only to authorized parties.

Lab Activity 10
Basic Operations:
Performance
Monitor Feature
Objectives
Upon completion of the lab project, the learner should be able to:
Install, launch, and configure the Hitachi Dynamic Link Manager GUI on the
Windows host system.
Using Dynamic Link Manager, display I/O activity and status of the managed
paths.
Launch and configure Iometer to generate Write and Read I/O for four
hypothetical workers (users) to specific LUNs.
Launch and configure the SNM2 Performance Monitor to collect all categories of
performance metrics.
Launch the SNM2 Performance Monitor Graph and display individual metrics as
I/O flows into the array.

HDS Confidential: For distribution only to authorized parties.

Page 10-1

Basic Operations: Performance Monitor Feature


Activity

Activity
Install Hitachi Dynamic Link Manager
Note: The lab project assumes your management server has been loaded with an
image that contains images of all the software that is required to complete
the lab projects of this course.
An alternative method for obtaining the various software applications will
be from the education departments software share server. The address of
this server will be supplied to you by your instructor.
1. From your assigned classroom PC, use the Remote Desktop Connection Utility
and connect to your assigned management server in the lab.
2. Right-click on the My Computer desktop icon and select Manage, followed by
clicking on Disk Management.

Page 10-2

HDS Confidential: For distribution only to authorized parties.

Basic Operations: Performance Monitor Feature


Activity

Note: This is the configuration that you should have created in earlier lab
projects. Array internal LUNs 0000 and 0001, created from RAID Group 0 and
1GB in size, should have been mapped to the two Windows Host Groups that
you created on Ports 0A and 1A.
Because the two LUNs are mapped to both Host Groups that your server has
access to, the server thinks it has access to four LUNs two LUNs on both paths.
The installation of Dynamic Link Manager modifies the servers I/O drivers so
that only one path is displayed for each LUN.
If your configuration does not match the expected configuration, then you will
have to interactively modify some of the following steps of this lab project.
3. Drill to the following directory of your management server:
C:\SOFTWARE\HDLM\Windows Version 6
4. Double-click on the setup.exe file to start the installation, clicking Next to the
following two screens.

5. Leave Enter the name of the license key file selected and click Next.
6. In the resulting prompt, click the Browse button and browse to the following
folder:
C:\SOFTWARE\HDLM\HDLM_Key
Note: Your instructor may have must supply a pointer to a share server from
which you can obtain the software and the key.
7. Select the file HDS HDLM 20051017 205738.plk and click Open.
See next page for resulting screen shot.

HDS Confidential: For distribution only to authorized parties.

Page 10-3

Basic Operations: Performance Monitor Feature


Activity

8. Click Next and then OK at the The permanent license was installed prompt.
9. Click Next.

10. Leave the Hitachi subsystem selected and click Next (the installation should
start).
11. When the Install Complete prompt appears, close any open windows and then
select the Yes, I want to restart my computer now radio button and click Finish.
12. After the reboot, reconnect to the management server and again launch the Disk
Management utility and verify that the Windows host server only displays two
disks of the storage array (see screen shot next page).

Page 10-4

HDS Confidential: For distribution only to authorized parties.

Basic Operations: Performance Monitor Feature


Activity

Change the Size of the Two Mapped LUNs


Now that the desired LUN mapping is configured and Dynamic Link Manager
software has been installed, you will delete LUNs 0000 and 0001. You will re-create
LUNs 0000 and 0001 assigning a larger size of 25GB to the LUNs.
This is done so you can start some I/O to the LUNs and not have to worry about
them filling up as you investigate the Performance Monitor feature.
1. Using SNM2, connect to your assigned storage array and go to RAID Groups
and then Logical Units. Select LUNs 0000 and 0001 and click the Delete LU
button.
2. After the deletion completes, create LUN 0000 and 0001 from RAID Group 0 and
assign a size of 25GB to each LUN. Remember, the two LUNs are already
mapped, so just click Close at the screen prompting you to map the LUNs.
Wait for the format of the two LUNs to complete takes about 4 minutes. Use
the Refresh function of SNM2 to monitor the format progress.
3. Use the Disk Management tool of your Windows hosts to Rescan Disks to again
discover the two LUNs. Initialize the two LUNs and then create a partition in
each LUN. The create partition process will take about six minutes.

HDS Confidential: For distribution only to authorized parties.

Page 10-5

Basic Operations: Performance Monitor Feature


Activity

Start HDLM
Note: Dynamic Link Manger software version 6.0.1-00 used at the time this lab
project was written did not totally support the Adaptable Modular Storage. When
Dynamic Link Manger is launched, the Path List screen is displayed and if the
Configuration screen tab is clicked, a message appears stating the Configuration
View function is not supported. This is okay, since the Path List screen gives
everything needed to complete the lab project.
1. From the Start popup menu, select the following to launch the software:
Start All Programs Dynamic Link Manager HDLM GUI

2. In the Host tree panel, expand the icon for your listed storage array and then pull
the slide bar to the right to expose the Owner and I/O count columns.

Page 10-6

HDS Confidential: For distribution only to authorized parties.

Basic Operations: Performance Monitor Feature


Activity

If you are familiar with using Dynamic Link Manager on the earlier Adaptable
Modular Storage systems, then you will notice that both paths are listed as
Owner paths instead of one path listed as the Owner and the other path as Nonowner.
The earlier HDS modular system operated in an Active-Passive mode on the
front-end host connections. The model 2000 family utilizes the Active-Active
host connections.
3. Click the Options button to view what parameters are currently set.

HDS Confidential: For distribution only to authorized parties.

Page 10-7

Basic Operations: Performance Monitor Feature


Activity

The following parameters are set by default:


Load balancing:
Algorithm
Path health checking:
Auto failback:
Intermittent Error Monitor:
Remove LU:

On
Extended least I/Os
On
On
Off
Off

4. Accept all the defaults, click Cancel.

Use Iometer to Generate I/O Activity


The Iometer utility will generate I/O using various patterns of Reads and Writes.
This portion of the lab projects assumes that you have two storage array LUNs (0000
and 0001) mapped to and discovered by your Windows host system, and the LUNs
have been initialized and you created partitions in each LUN.
1. From the desktop of you assigned Windows server, double-click the Iometer
icon to launch Iometer.

2. In the Topology panel, expand the icon for your Windows host system (WLABD
in the captured screen shot) and click on the Worker 1 icon
See next page for resulting screen shot.

Page 10-8

HDS Confidential: For distribution only to authorized parties.

Basic Operations: Performance Monitor Feature


Activity

The letter of the New Volumes listed (E:New Volume and F:New Volume)
should match the disk letter that was shown by the Disk Management utility
(see page 10-6).
The drive letters that you are seeing may be different from the letters illustrated
in the lab project because of a different number of disks discovered by the
Windows Disk Management utility.
3. Holding the shift key depressed, check the box to the left of the two Target Disks
(remember, your disk letters may be different). Also, if your target disks have a
small red line over the icon, ignore the red line and select the disk.
4. Enter 10 in the # of Outstanding I/Os box (sets Command Tag Queuing to 10).
5. Click the Access Specifications tab.
6. From the Global Access Specifications panel, select the default entry and then
click the Edit button.
See next page for resulting screen shot.

HDS Confidential: For distribution only to authorized parties.

Page 10-9

Basic Operations: Performance Monitor Feature


Activity

7. Create a new Access Specification by entering and/or modifying the default


settings as shown in the next screen shot, and then click OK.

Page 10-10

HDS Confidential: For distribution only to authorized parties.

Basic Operations: Performance Monitor Feature


Activity

This setting will cause 64KB records to be written Sequentially at a 75% Write,
25% Read duty cycle.
8. Click the Add button.
9. Click on Worker 2 and then click the Disk Targets tab.
10. Check the two New Volume boxes (remember to hold the shift key).
11. Enter 10 in the # of Outstanding I/Os box (sets Command Tag Queuing to 10).
12. Click the Access Specifications tab.
13. Select the specification that you created earlier and then the Add button.
14. Repeat Steps 9 13 for Worker 3 and Worker 4.
15. In the upper row of the Iometer window, click the icon of the green flag to start
Iometer.

The results of the operation will be saved in the results file (you could choose the
folder, by default it goes into My Documents).
Note: While running Iometer, you may see a small message at the bottom of you
Windows screen indicating Low Disk Space. Just ignore the message.
16. Click the Save button to start the I/O process.
17. Bring the Dynamic Link Manger GUI to the front and click the Refresh button,
and continue to click Refresh to see the I/O flowing to both LUNs and on both
paths.
See next page for a sample of what you should see.

HDS Confidential: For distribution only to authorized parties.

Page 10-11

Basic Operations: Performance Monitor Feature


Activity

Collect and Display Performance Metrics


1. Connect to your array using Storage Navigator Modular 2.
2. From the Arrays panel, select Advanced Settings and click the Open Advanced
Settings button.
3. Click on Performance Monitor and then click the Set button.

Page 10-12

HDS Confidential: For distribution only to authorized parties.

Basic Operations: Performance Monitor Feature


Activity

4. Click OK and then OK to the prompt warning of a performance hit you will
collect metrics for all the categories.
5. Click the Display Graph button.
6. In the subsystem panel, click on Logical Unit and then click the Start button and
OK to the Monitoring will be start prompt and wait: by default, the IO Rate of
LUN 0 will be displayed once a minute.
Also, you will not see anything in the graph area (a red dot) until the first
timeout at the end of 1 minute.
7. Wait and watch several cycles until you see some metrics for LUN 1 appear in
the small panel above the graph area. Select LUN 1 and click the Display Graph
button, and then select a lower Chart Y Axis Rate (say, 2000).
8. In the Subsystem panel, expand CTL 1 and select Logical Unit, followed by
clicking the Display Graph button.
The system is load balancing across the controllers.
9. Experiment by selecting other subsystem areas. What you are currently
displaying is also controlled by the drop-down list above the Display Graph
button. As you move from one metric to another, remember to click the Display
Graph button to refresh the graph, and you may have to again adjust the Y Axis
setting.
10. When you are satisfied, click the Stop button and Close the Monitor.
11. Optional Step if your instructor has access to the Brocade switch. Have the
instructor disable one of the switch ports where your array is connected. Keep
refreshing the Dynamic Link Manger window to see the failover. After the port
is again enabled, the system should fail back.
12. Exit Dynamic Link Manger.
13. Logout of Storage Navigator Manager 2.
14. Click the Red Stop sign of Iometer to stop the I/O and close the window.
This ends the guided portion of the lab project.
If you want to go back and practice what you have learned, feel free to do so, but
keep in mind that you need to complete the review questions and have them ready
for review when the class reconvenes in the classroom.
Make sure you leave the system in the same state that it was in at the end of the
guided portion of the lab project this insures that the system will be in a state that
supports the following lab projects.

HDS Confidential: For distribution only to authorized parties.

Page 10-13

Basic Operations: Performance Monitor Feature


Lab Project Review Questions

Lab Project Review Questions


Performance Monitor
1. Given two Adaptable Modular Storage LUNs, each mapped to two host groups that a
host was given access to, how many LUNs would the host discover if no multi-path
management software (like HDLM) were installed?
2. Assuming the configuration outlined in question 1, how many LUNs would the host
detect after the installation of Dynamic Link Manger?
3. Again, referring to the configuration of question 1, Dynamic Link Manger will display
all the configured (managed) paths.
A. TRUE
B. FALSE
4. By default, Dynamic Link Manger will attempt to Load Balance.
A. TRUE
B. FALSE
5. By default, Dynamic Link Manger is set for manual failback.
A. TRUE
B. FALSE
6. When using the Performance Monitor to collect performance metrics, front-end
performance is affected.
A. TRUE
B. FALSE
7. How many individual performance metrics can be displayed in the Performance Graph
at any point in time?
8. The Performance Graph has to be stopped and then again started each time you select
another metric to display.
A. TRUE
B. FALSE

Lab 10 - End

Page 10-14

HDS Confidential: For distribution only to authorized parties.

Lab Activity 11
Remove and Add an
Expansion Tray
Objectives
Upon completion of the lab project, the learner should be able to:
Correctly remove an Expansion Tray from an Adaptable Modular Storage system.
Correctly add an Expansion Tray to an operational storage system without
causing any error conditions.

HDS Confidential: For distribution only to authorized parties.

Page 11-1

Remove and Add an Expansion Tray


Activity

Activity
First remove one of the trays from your assigned storage system, then replace it.

Anti-static Setup
1. Ask your instructor for an anti-static mat and wrist strap.
2. When you begin the handle actual system components, attach the metal clip (of
the mat) to a part of the unit frame where metal is exposed.
3. Attach the wrist strap to your wrist securely.

Remove an Expansion Tray


Note: An Expansion Tray must be removed after the subsystem is powered down,
therefore, the last tray in the system will be removed.
Also, a very important step is skipped by the lab project: the backup of any
customer data.
1. From your assigned classroom PC, use the Remote Desktop Connection Utility
and connect to your assigned management server in the lab.
2. Login to SNM2 and then connect to your assigned storage array.
3. Go to Groups RAID Groups and delete all RAID Groups in your systems last
Expansion Tray.
4. Turn off the main power switch of the RK module (RKS or RKM) and wait for
the front panel Power LED to go off.
5. Remove the two power cables for the last Expansion Tray.
6. Remove the ENC cables from the two ENC modules of the last Expansion Tray.
7. Turn on the main power switch and wait for the Ready LED to come on.
8. Check the front panel Warning LED:

IF the Warning LED is ON,


THEN troubleshoot and identify the problem.
ELSE the Warning LED is OFF, continue to the next lab project section.

Page 11-2

HDS Confidential: For distribution only to authorized parties.

Remove and Add an Expansion Tray


Activity

Online Addition of an Expansion Tray


Note: An Expansion Tray can be added to a system that is powered on and in
use, but be aware, if you do not perform the addition correctly, both controllers
could be red-lighted and loss of data could occur!
1. From your assigned classroom PC, use the Remote Desktop Connection Utility
and connect to your assigned management server in the lab.
2. Login to SNM2 and then connect to your assigned storage array.
3. Go to Components Trays and click on the Install Tray button.

4. Follow the instructions and install the removed Expansion Tray.


This ends the guided portion of the lab project.

HDS Confidential: For distribution only to authorized parties.

Page 11-3

Remove and Add an Expansion Tray


Activity

Lab 11 - End

Page 11-4

HDS Confidential: For distribution only to authorized parties.

Lab Activity 12
WEB Tool Operations
Objectives
Upon completion of the lab project, the learner should be able to describe the
capabilities and usage of the WEB tool.

Summary of Activities
1. Review the status of the hardware components
2. Check the system for information, Alerts & Errors
3. Review the status of the Replication software
4. Recover the TrueCopy remote path
5. Collect a Simple Trace

HDS Confidential: For distribution only to authorized parties.

Page 12-1

WEB Tool Operations


Activity 1 Review the status of the hardware components

Activity 1 Review the status of the hardware components


1. Open the Internet Explorer on you PC and enter the IP address from one of the
controllers in your storage system
Example: http://{IP Address of your storage system}
2. In the left frame click on Disk Drive.
How many units are installed? ..
Which types of HDDs are installed?
..
3. Click on CTL/Battery/Cache/Interface Board.
How many batteries are installed?
..
How many cache modules are installed? ..
How many Host Connectors are available?
..
4. Click on AC/ENC.
What type of components you see?

...

Activity 1 - End

Page 12-2

HDS Confidential: For distribution only to authorized parties.

WEB Tool Operations


Activity 2 Check the system for information, alerts and errors

Activity 2 Check the system for information, alerts and errors


Click on Warning Information/Information Message in the left frame.
Which different types of information are provided?
..
..
..
..
..

Activity 2 - End

HDS Confidential: For distribution only to authorized parties.

Page 12-3

WEB Tool Operations


Activity 3 Review the status of the Replication features

Activity 3 Review the status of the Replication features


1. Open the Internet Explorer on you PC and enter the IP address from one of the
controllers in your storage system
Example: http://{IP Address of your storage system}
2. Click on Snapshot Information.
How many P-VOLs are listed? ..
How many different pools are used? ..
3. Click on ShadowImage Information.
How many Pairs are listed? ..
4. Click on TrueCopy Pair Information.
How many Pairs are listed? ..
What is the local Array ID? ..
5. Click on TrueCopy Path Information.
What is the status of Path-0? ..
What is the status of Path-1? ..
What is the remote Array ID? ..

Activity 3 End

Page 12-4

HDS Confidential: For distribution only to authorized parties.

WEB Tool Operations


Activity 4 Recover the TrueCopy remote path

Activity 4 Recover the TrueCopy remote path


1. Open the Internet Explorer on you PC and enter the IP address from one of the
controllers of your local Adaptable Modular Storage 2000 storage system
Example: http://{IP Address of your storage system}
2. Click on TrueCopy Path Information
What is the status of Path-0?
..
What is the status of Path-1?
..
3. Click on Recover on the failed (red) path to start the path recovery process.
4. Open the Internet Explorer on you PC and enter the IP address from one of the
controllers of your remote Adaptable Modular Storage 2000 storage system
5. Click on TrueCopy Path Information
What is the status of Path-0?
..
What is the status of Path-1?
..
6. Click on Recover on the failed (red) path to start the path recovery process.

Activity 4 - End

HDS Confidential: For distribution only to authorized parties.

Page 12-5

WEB Tool Operations


Activity 5 Collect a Simple Trace

Activity 5 Collect a Simple Trace


1. Open the Internet Explorer on you PC and enter the IP address from one of the
controllers of your storage system
Example: http://{IP Address of your storage system}
2. Click on Simple Trace.
3. Click OK to confirm Do you collect Simple Trace?
Note: Do not close the Explorer windows while executing the Simple Trace!
4. In the Simple Trace Download window click on Download to start the download of
the Simple Trace to your client PC
Note: Do not close the Explorer windows while downloading the Simple Trace!

Activity 5 - End
Lab 12 - End

Page 12-6

HDS Confidential: For distribution only to authorized parties.

Lab Activity 13
Hitachi Storage
Navigator Modular 2
Operations
Objectives
Upon completion of the lab project, the learner should be able to describe the usage
and capabilities of Storage Navigator Modular 2.

Summary of Activities
1. Export of configuration information (Constitute files)
2. Export of performance statistics
3. Microcode/Firmware Update
4. Collection of a Simple Trace

HDS Confidential: For distribution only to authorized parties.

Page 13-1

Hitachi Storage Navigator Modular 2 Operations


Activity 1 - Export of Configuration Information (Constitute files)

Activity 1 - Export of Configuration Information (Constitute


files)
Note: The Constitute files will be stored at the specified path on the Storage
Navigator Modular 2 (SNM2) server and the output directory must exist before
starting the output.
1. Log into SNM2 using Internet Explorer. An example of the SNM2 URL:
http://<IP address of your SNM2 server>:23015/StorageNavigatorModular/
user:
password:

system
manager

2. Go to:
Arrays >{your storage system} >Settings >Advanced Settings
3. Click on the Open Advanced settings button.
4. In the Advanced Settings Window select Configuration Settings and click on
the Set button.
5. In the Configuration Settings Window select the Constitute tab.

RAID Group/Logical Unit information output


1. Select Output as operation.
2. Select the configuration information RAID Group/Logical Unit.
3. Specify the complete path including the filename for the File.
Example: C:\temp\RG-LUinfo.txt
4. Click on Apply to start the output.

System Parameter information output


1. Select Output as operation
2. Select the configuration information System Parameter.
3. Specify the complete path including the filename for the File.
Example: C:\temp\System-parameter.txt
4. Click on Apply to start the output.

Port information output


1. Select Output as operation
2. Select the configuration information Port information.
Page 13-2

HDS Confidential: For distribution only to authorized parties.

Hitachi Storage Navigator Modular 2 Operations


Activity 1 - Export of Configuration Information (Constitute files)

3. Specify the complete path including the filename for the File.
Example: C:\temp\Port-information.txt
4. Click on Apply to start the output.
Note: The Constitute files will be stored at the specified path on the SNM2 server and
the output directory must exist before starting the output.

Activity 1 End

HDS Confidential: For distribution only to authorized parties.

Page 13-3

Hitachi Storage Navigator Modular 2 Operations


Activity 2 Export of Performance Statistics

Activity 2 Export of Performance Statistics


Note: The Performance statistic files will be stored at the specified path on the SNM2
server and the output directory must exist before starting the output.
1. Log into Hitachi Storage Navigator Modular 2 (SNM2) using Internet Explorer.
Example of how to enter the SNM2 URL:
http://{IP address of your SNM2 server}:23015/StorageNavigatorModular/
user: system
password: manager
2.

Go to:
Arrays >{your storage system} >Settings >Advanced Settings

3. Click on the Open Advanced settings button.


4. In the Advanced Settings Window select Performance and click on the
OutputTextFile button.

Manual Acquisition
1. Select Manual
2. Specify the Output Directory. Example: C:\temp\
3. Click on Start to start the output.

Automatic Acquisition
1. Select Auto.
2. Specify the Interval Time for the outputs (minutes or hours).
3. Specify the Get Count (how many outputs within the specified interval).
4. Specify the Output Directory. Example: C:\temp\
5. Click on Start to start the output.

Activity 2 End

Page 13-4

HDS Confidential: For distribution only to authorized parties.

Hitachi Storage Navigator Modular 2 Operations


Activity 3 Firmware/Microcode Update

Activity 3 Firmware/Microcode Update


1. Log into Hitachi Storage Navigator Modular 2 (SNM2) using Internet Explorer.
Example of how to enter the SNM2 URL:
http://<IP address of your SNM2 server>:23015/StorageNavigatorModular/
user:
system
password:
manager
2. Go to Arrays >{your AMS2000 system}.
3. Click on Update Firmware.
4. Select Transfer and update Firmware as Update operation.
5. Specify the path for the Update file by browsing to the compressed file of
provided firmware.
6. Click on OK to start the transfer and update process.
7. Click on OK to confirm the transfer and update process.

Activity 3 End

HDS Confidential: For distribution only to authorized parties.

Page 13-5

Hitachi Storage Navigator Modular 2 Operations


Activity 4 Collection of a Simple Trace in Storage Navigator Modular 2

Activity 4 Collection of a Simple Trace in Storage Navigator


Modular 2
1. Log into SNM2 using Internet Explorer.
Example how to enter the SNM2 URL:
http://<IP address of your SNM2 server>:23015/StorageNavigatorModular/
user:
system
password:
manager
2. Go to Arrays > {your AMS2000 system}.
3. Click on Check for errors.
4. Click the Collect Trace button.
Note: Do not close the Explorer windows while executing the Simple Trace!
5. In the Simple Trace Download window click on Download to start the
download of the Simple Trace to your client PC
Note: Do not close the Explorer windows while downloading the Simple Trace!

Activity 4 End
Lab 13 - End

Page 13-6

HDS Confidential: For distribution only to authorized parties.

Lab Activity 14
Hardware
Replacement
Objectives
Upon completion of the lab project, the learner should be able to describe and
perform the procedures to replace hardware components.

Summary of Activities
1. Replacement of a Control Unit on a Adaptable Modular Storage 2000
2. Replacement of a ENC Unit
3. Replacement of a Interface Board
4. Replacement of a SFP FC Host Connector
5. Replacement of a Hard Drive

HDS Confidential: For distribution only to authorized parties.

Page 14-1

Hardware Replacement
Activity 1 - Replacement of a Control Unit

Activity 1 - Replacement of a Control Unit


Notes:
Complete the replacement within ten minutes. Otherwise a powering OFF may
occur because of an abnormal temperature rise.
Touching heat sinks or ICs may cause getting burned. Be sure to handle with
care.
To prevent part failures caused by static electrical charge built up on your own
body, be sure to wear a wrist strap connected to the chassis before starting and
do not take it off until you finish.
Be sure to wear a wrist strap connected to the chassis whenever you unpack
parts from a case. Otherwise, the static electrical charge on your body may
damage the parts.
When you install is Control Unit, support its metal part with your hand that has
the wrist strap. You can discharge static electricity by touching the metal plate.

Page 14-2

HDS Confidential: For distribution only to authorized parties.

Hardware Replacement
Activity 1 - Replacement of a Control Unit

1. Use the WEB tool to collect a Simple Trace before performing any action.
2. Push the RST SW button to block the Control Unit you want to change.
3. Make sure that the orange RST LED is on.
4. Open the right and left levers toward you at the same time while pressing the
right and left blue buttons.
5. Remove all the cables connect to the Control Unit.
6. Remove the Control Unit by pulling it out toward you.
7. Make sure 20 seconds or longer has elapsed after the Control Unit was taken out.
8. Insert the new Control Unit in the set position in the status where the right and
left levers on the Control Unit are opened, and close the levers completely until
you hear the blue buttons click.
9. Make sure that the WARNIG LED on the front of the Chassis goes out.
10. Reconnect all the removed cables to the replaced Control Unit.
11. Check that the READY LED is on and check the information and error messages
on the WEB tool.
Note: If the new Control Unit is inserted without waiting for 20 seconds, it is possible
that the Control Unit is not recovered from the failure normally!

Activity 1 - End

HDS Confidential: For distribution only to authorized parties.

Page 14-3

Hardware Replacement
Activity 2 Replacement of a ENC Unit

Activity 2 Replacement of a ENC Unit


Notes:
To prevent part failures caused by static electrical charge built up on your own
body, be sure to wear a wrist strap connected to the chassis before starting and
do not take it off until you finish.
Be sure to wear a wrist strap connected to the chassis whenever you unpack
parts from a case. Otherwise, the static electrical charge on your body may
damage the parts.
When you install an ENC Unit, support its metal part with your hand that has
the wrist strap. You can discharge static electricity by touching the metal plate.

Page 14-4

HDS Confidential: For distribution only to authorized parties.

Hardware Replacement
Activity 2 Replacement of a ENC Unit

1. Use the WEB tool to collect a Simple Trace before performing any action.
2. Open the right and left levers toward you at the same time while pressing the
right and left blue buttons.
3. Remove the ENC cable connected to the ENC unit to be replaced.
4. Remove the ENC unit by pulling it out toward you.
5. After waiting for 20 seconds or more, insert a new ENC unit until its lever is
slightly opened. Do not insert the ENC unit completely!
6. Connect the ENC cable to the new ENC unit.
7. Close the lever completely until you hear the blue buttons click.
8. Make sure that the ALM LED on the ENC unit is off.
9. Check that the READY LED on front of the basic chassis is on and the ALARM
LED and the WARNING LED goes off.
10. Check the information and error messages on the WEB tool.
Note: If the new ENC unit is inserted without waiting for 20 seconds, it is possible
that the ENC unit is not recovered from the failure normally!

Activity 2 - End

HDS Confidential: For distribution only to authorized parties.

Page 14-5

Hardware Replacement
Activity 3 - Replacement of a Interface Board

Activity 3 - Replacement of a Interface Board


Notes:
Complete the replacement within ten minutes. Otherwise a powering OFF may
occur because of an abnormal temperature rise.
Touching heat sinks or ICs may cause getting burned. Be sure to handle with
care.
To prevent part failures caused by static electrical charge built up on your own
body, be sure to wear a wrist strap connected to the chassis before starting and
do not take it off until you finish.
Be sure to wear a wrist strap connected to the chassis whenever you unpack
parts from a case. Otherwise, the static electrical charge on your body may
damage the parts.
When you install is Control Unit, support its metal part with your hand that has
the wrist strap. You can discharge static electricity by touching the metal plate.

Page 14-6

HDS Confidential: For distribution only to authorized parties.

Hardware Replacement
Activity 3 - Replacement of a Interface Board

1. Collect a Simple Trace and Constitution Information (Port Information).


2. Open the right and left levers toward you at the same time while pressing the
right and left blue buttons of the Control Unit. When the levers are completely
opened, the Control Unit comes out forward.
3. Remove al the cables connect to the Control Unit mounting the Interface Board to
be replaced.
4. Remove the Control Unit by pulling it out toward you.
5. Remove the FC Host Connectors.
6. Loosen two cover fixing screws on the top of the cover, and open the cover to the
arrow () direction.
7. Remove the Interface Board mounted on the Control Unit. Loosen the fixing
screws (four places) of the Interface Board (or the dummy Interface Board)
installed in the Control Unit, operate the latch lever slowly to the arrow ()
direction, remove the connector while lifting up the Interface Board and remove
it from the Control Unit.
8. Place the new Interface Board according to the positioning pin of the Control
Unit, press the label PUSH HERE part, and insert the connector. At this time,
check that the connector is inserted surely. Insert the interface Board making its
sheet metal part face inside of the Control Unit.
Note: Install the new Interface Board in the removed position.
9. Fix the Interface Board by tightening the four fixing screws.
10. Install the removed FC Host Connectors.
11. Close the cover and fix it by fastening the two cover fixing screws on the top of
the cover.
12. Connect the removed cables to the Control Unit.
13. Insert the Control Unit in the set position in the status where the right and left
levers on the Control Unit are opened, and close the levers completely until you
hear the blue buttons click.
14. Check that the READY LED is on and check the information and error
messages on the WEB tool.

HDS Confidential: For distribution only to authorized parties.

Page 14-7

Hardware Replacement
Activity 3 - Replacement of a Interface Board

Model 2100/2300

Page 14-8

HDS Confidential: For distribution only to authorized parties.

Hardware Replacement
Activity 3 - Replacement of a Interface Board

Model 2500

Activity 3 - End

HDS Confidential: For distribution only to authorized parties.

Page 14-9

Hardware Replacement
Activity 4 - Replacement of a SFP FC Host Connector

Activity 4 - Replacement of a SFP FC Host Connector


Notes:
To prevent part failures caused by static electrical charge built up on your own
body, be sure to wear a wrist strap connected to the chassis before starting and
do not take it off until you finish.
Be sure to wear a wrist strap connected to the chassis whenever you unpack
parts from a case. Otherwise, the static electrical charge on your body may
damage the parts.
Before unpacking and replacing maintenance components, be sure to wear a
wrist strap and connect to ground the grounding clip in the opposite end of the
wrist strap to the chassis frame (metal part).

Page 14-10

HDS Confidential: For distribution only to authorized parties.

Hardware Replacement
Activity 4 - Replacement of a SFP FC Host Connector

1. Remove the FC cables connected to the Control Unit mounting the FC Host
Connector to be replaced.
2. Remove the Host Connector. Pull out the Host Connector after raising the lever.
3. Make sure 20 seconds or longer has elapsed after the FC Host Connector was
taken out.
4. Check the insertion direction of the FC Host Connector.
5. Insert the FC Host Connector in the Port until it clicks.
6. Connect the FC cables.
7. Check that the port LED does light on and check the information and error
messages on the WEB tool.
Note: If the FC Host Connector is inserted before 20 seconds has elapsed, the FC
Host Connector may not be recovered normally.

Activity 4 End

HDS Confidential: For distribution only to authorized parties.

Page 14-11

Hardware Replacement
Activity 5 Replacement of a Hard Drive

Activity 5 Replacement of a Hard Drive


Note: This lab project assumes the following configuration, which has been created by
previous lab projects of this course.
LUNs 0000 and 0001, created from RAID Group 0 and 25GB in size.
Both LUNs mapped to Windows-configured Host Groups on ports 0A and 1A.
The LUNs have been discovered, initialized, and partitions created in each LUN.
Several spare drives were created earlier and are available.
HDLM is installed on the Windows host system.
Because of the previous lab project, data was written to the LUNs using Iometer.
1. From your assigned classroom PC, use the Remote Desktop Connection Utility
and connect to your assigned management server in the lab.
2. Drill to the following directory of your management server:
C:\DF800 Class\maint_mode_file
3. Right-click on mode and select copy.
4. Drill to the following directory of your management server:
C:\Program Files\HiCommand\StorageNavigatorModular\conf
5. Right-click and select paste to copy the mode file into this folder.
6. Launch SNM2 and login as system giving the password manager.
7. Check the box to the left of your systems Array Name.
8. Issue the following keyboard keystroke sequence to put SNM2 into Maintenance
Mode: Ctrl-Shift-E.

Page 14-12

HDS Confidential: For distribution only to authorized parties.

Hardware Replacement
Activity 5 Replacement of a Hard Drive

9. Connect to your storage array.


10. Expand Settings and click Advanced Settings, and then click the Open
Advanced Settings button.
Notice that a Maintenance choice is now available.
11. Select Maintenance and then click the Set button.

Detach the Drive to be Replaced


1. Select the Detach radio button.
2. Enter the following to select the drive:
Note: When the lab project was written, the assigned drives of RAID Group 000
were drives 00 04 in tray 02. Your entry will have to specify the drive unit
number and tray where your RAID Group 000 was configured.
Unit No.:
02
HDU No.: 03
3. Click Apply and then OK to the resulting prompts.
Note: The Red LED associated to disk 02 03 should be on.
4. Close the Maintenance window and then the Advanced Settings window.
5. In the Arrays panel, click on the name of your system and verify that the status
of the system is in a Warning state.
6. Click on Alerts & Events.
See next page for screen shot.

HDS Confidential: For distribution only to authorized parties.

Page 14-13

Hardware Replacement
Activity 5 Replacement of a Hard Drive

7. Click Show Details.


See next page for resulting screen shot.

Page 14-14

HDS Confidential: For distribution only to authorized parties.

Hardware Replacement
Activity 5 Replacement of a Hard Drive

8. Click Close.
9. Click the Event Log tab.

You should see that the drive was detached.

HDS Confidential: For distribution only to authorized parties.

Page 14-15

Hardware Replacement
Activity 5 Replacement of a Hard Drive

Collect Trace
1. Click the Collect Trace button.

2. Click Download.

3. Click Save.
See next page for resulting screen shot.

Page 14-16

HDS Confidential: For distribution only to authorized parties.

Hardware Replacement
Activity 5 Replacement of a Hard Drive

Save the file smpl_trc0.dat in any folder that you want, the default is the desktop.
After saving the file, you could edit the name to include the date and time.
4. Click Save and then the Close button after the process completes.
In an actual production environment you would upload the trace file to the HDS
Global Support Center Technical Upload Facility at the following URL:
https://tuf.hds.com/gsc/bin/view/Main/WebHome
See next page for resulting screen shot of what the TUF upload looks like.
In class you will not be performing the upload.

HDS Confidential: For distribution only to authorized parties.

Page 14-17

Hardware Replacement
Activity 5 Replacement of a Hard Drive

Cause the Data Reconstruction


This procedure will cause reconstruction of the data from the failed drive to a spare
drive (correction copy).
In a normal operating environment when a disk fails and a spare is available, the
system is set by default to perform the reconstruction automatically.
Since you are in Maintenance Mode and manually blocked (failed) the drive, you
will have to manually trigger the reconstruction.

Page 14-18

HDS Confidential: For distribution only to authorized parties.

Hardware Replacement
Activity 5 Replacement of a Hard Drive

1. Once more, go to Advanced Settings, click the Maintenance link and then click
the Set button.
2. Select the Data Reconstruction radio button.
3. Enter the following to select the drive (remember, your Unit Number and HDU
Number may be different).
Unit No.:

02

HDU No.:

03

4. Click Apply and then OK to the resulting prompts.


5. Close the Maintenance window and then the Advanced Settings window.
6. In the Arrays panel, click on Alerts & Events and then click the Event Log tab.

7. Wait a couple of minutes and click the Refresh Information button and then
Close at the completion prompt.

HDS Confidential: For distribution only to authorized parties.

Page 14-19

Hardware Replacement
Activity 5 Replacement of a Hard Drive

8. Go to Settings Spare Drives.

As you can see from the previous two screen shots, the reconstruction has
occurred and drive 02 14 is now part of the RAID Group.

Replace the Drive


This procedure simulates a failed drive replacement and you have to be located at
the physical equipment or have someone at the site perform the operation for you.
1. Locate the failed (blocked) drive and back it out of the tray about 1 inch and
wait about 20 seconds for it to spin down.
2. Re-install the drive and wait for it to power up and come online. Once online,
you should be able to confirm the copyback by looking at the activity LEDs for
the replaced drive and the spare drive they should be blinking.
3. Return to your management server and from the Arrays panel, click on Alerts &
Events and then click the Event Log tab.

Page 14-20

HDS Confidential: For distribution only to authorized parties.

Hardware Replacement
Activity 5 Replacement of a Hard Drive

Your array should now be indicating an Array Status of Ready.


4. Logout out of SNM2.

This ends the guided portion of the lab project.

Activity 5 End

HDS Confidential: For distribution only to authorized parties.

Page 14-21

Hardware Replacement
Activity 5 Replacement of a Hard Drive

Lab 14 - End

Page 14-22

HDS Confidential: For distribution only to authorized parties.

Lab Activity 15
Disruptive
Microcode Load:
Web Tool
Note: This lab is optional. Complete as time allows.

Objectives
Upon completion of the lab project, the learner should be able to:
Configure Java to allow the Web Tool to load microcode to the Adaptable
Modular Storage 2000
Update the microcode and initialize the system
Enter the Equipment Setup function of the Web Tool and verify how controller
serial number could be set

HDS Confidential: For distribution only to authorized parties.

Page 15-1

Disruptive Microcode Load: Web Tool


Activity

Activity
Notes on Upgrading Microcode
You can update the microcode using either SNM2 or the Web Tool. This lab uses the
Web Tool.
The Web tool microcode update is usually used for an initial setup of a new storage
system and it is a disruptive process since both controllers must be reset to put the
Web tool into Maintenance Mode.
1. From the classroom PC, use the Remote Desktop Connection Utility and
connect to your assigned Windows server in the lab.
2. Connect to your assigned DF800 using the Internet Explorer browser.
3. Go to the rear of the DF800.
4. Locate the two Soft Reset switches (one button per control unit).
5. Use a non-conducting probe and push the soft reset switch, marked RST SW, on
CTL 0: the yellow light will come on as you depress the switch.
6. Within 3 - 5 seconds push the RST SW switch on CTL 1.
7. Refresh the web browser (the F5 key) and you should get the logon screen.

8. Enter the following:


User Name = maintenance
Password = hosyu9500
See next page for the Maintenance window.

Page 15-2

HDS Confidential: For distribution only to authorized parties.

Disruptive Microcode Load: Web Tool


Activity

In this situation the host has no access to the disks and you can alter many of the
system configuration settings. Notice the Go to Normal Mode buttons. These will
cause a reboot of the subsystem and put it back online, retaining any changes you
may have made.
While in Maintenance Mode, you may change any number of system settings by
clicking on the menu links shown on the left side of the page.

HDS Confidential: For distribution only to authorized parties.

Page 15-3

Disruptive Microcode Load: Web Tool


Activity

Setting System Parameters


1. In the left panel, click the Subsystem link.

Page 15-4

HDS Confidential: For distribution only to authorized parties.

Disruptive Microcode Load: Web Tool


Activity

2. Click the Change button.

3. Select Single Mode from the System Startup Attribute, and then reselect Dual
Active Mode.
At this time do not make any changes but view what can be done. An explanation of
each of these parameters can be found in the Maintenance Manual.
IF you were making changes, you would click Set to commit any changes, and then
respond to the resulting prompts. A system restart would be performed.
Next, you are guided through some of the other functions. Examine the resulting
screens, but only make and save changes if you are instructed.

HDS Confidential: For distribution only to authorized parties.

Page 15-5

Disruptive Microcode Load: Web Tool


Activity

Host Interface
1. In the left panel, click the Host Interface link.

2. Click the Change button to see the change window.

Page 15-6

HDS Confidential: For distribution only to authorized parties.

Disruptive Microcode Load: Web Tool


Activity

Network
1. In the left panel, click the Network link.

2. Click the Change button to see the change window.

HDS Confidential: For distribution only to authorized parties.

Page 15-7

Disruptive Microcode Load: Web Tool


Activity

Name
1. In the left panel, click the Name link.

2. Click the Change button to see the change window.


You will notice that the Product ID code is set to DF600. Do not change this
setting.
When HDS introduced the DF700 product line, this parameter was left set to
DF600 (the product name for the 9500V) so the TrueCopy and ShadowImage
applications would run on the DF700. It must have the same function of the
DF800.

Page 15-8

HDS Confidential: For distribution only to authorized parties.

Disruptive Microcode Load: Web Tool


Activity

Initialize
The Initialize function sets the system parameter information of the device to a
known initial state. This would typically be carried out during an initial build of a
system prior to the first microcode install.
If you executed this function, it causes a restart of the system.

Microprogram Initial Setup


1. In the left panel, click on Microprogram.

Note: This error occurs when the correct Java Policy is not in effect.
The following steps will have you correct the problem and the
process assumes that JRE 1.6.0 or 1.6.0_07 is installed.
2. Drill to the following folder of your management server:
C:\DF800 Class\Microcode\Required Java Policy for web tool\DF800 code load

HDS Confidential: For distribution only to authorized parties.

Page 15-9

Disruptive Microcode Load: Web Tool


Activity

3. Copy HTTPClient.jar into the following folder:


C:\Program Files\Java\jre1.6.0_07\lib\ext
4. Copy .Java.policy into the following folder:
C:\Documents and Settings\Administrator
5. Close all Internet Explorer windows.
6. Launch a new browser window and again connect to your array with the Web
Tool giving the maintenance and hosyu9500 login strings.

Page 15-10

HDS Confidential: For distribution only to authorized parties.

Disruptive Microcode Load: Web Tool


Activity

7. Click on the Microprogram link.

Two radio buttons are available.


Update will update the microcode and preserve the configuration settings.
Initial Setup will update the microcode and clear out any configuration.
8. Click the Initial Setup radio button.
9. Click the Select button and browse to the following location:
C:\diskarray-microprogram\microprogram
See next page for screen shot.

HDS Confidential: For distribution only to authorized parties.

Page 15-11

Disruptive Microcode Load: Web Tool


Activity

10. Select the folder (DF_20080711-03_V43B in the screen shot above) and then click
the Open button.

Page 15-12

HDS Confidential: For distribution only to authorized parties.

Disruptive Microcode Load: Web Tool


Activity

11. Click the Install button and wait for the following prompt to appear (can take up
to a minute).

12. Click OK.

13. Check the OK to execute check box and then click OK.

HDS Confidential: For distribution only to authorized parties.

Page 15-13

Disruptive Microcode Load: Web Tool


Activity

Wait for the following screen to appear (takes several minutes)

14. Click OK.


15. Click the To Maintenance Mode Top link.
16. Click the Go to Normal Mode button.

17. Click OK and wait for about 60 seconds, then click the browser refresh button.
See next page for resulting screen.

Page 15-14

HDS Confidential: For distribution only to authorized parties.

Disruptive Microcode Load: Web Tool


Activity

Notice that Booting is indicated while the system is restarting.


18. Wait a few more minutes and refresh your screen again. The system should
again be in the Ready state.
19. Close the browser.
This ends the guided portion of the lab project.
If you want to go back and practice what you have learned, feel free to do so, but
keep in mind that you need to complete the review questions and have them ready
for review when the class reconvenes in the classroom.
Make sure you leave the system in the same state that it was in at the end of the
guided portion of the lab project, insuring that the system will be in a state that
supports the following lab projects.

HDS Confidential: For distribution only to authorized parties.

Page 15-15

Disruptive Microcode Load: Web Tool


Lab Project Review Questions

Lab Project Review Questions

Disruptive Microcode Update


1. What tool do you use to perform the disruptive microcode replacement procedure?

2. What are the strings used to put the web browser into Maintenance Mode:
User Name:
Password:
3. The Initial Setup function allows you to load a lower or higher version of microcode
while preserving the current configuration.
A. TRUE
B. FALSE
4. What folder contains the microcode?

Lab 15 - End

Page 15-16

HDS Confidential: For distribution only to authorized parties.

Das könnte Ihnen auch gefallen