Beruflich Dokumente
Kultur Dokumente
Maintenance Guide
Issue 06
Date 2016-03-01
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective
holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or
representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Website: http://e.huawei.com
Intended Audience
This document applies to the system administrators who are responsible for carrying out
routine maintenance activities, monitoring the storage device, and rectifying common device
faults.
Conventions
The purchased products, services, and features are stipulated by the commercial contract
made between Huawei and the customer. All or partial products, services and features
described in this document may not be within the purchased scope or the usage scope. Unless
otherwise agreed by the contract, all statements, information, and recommendations in this
document are provided "AS IS" without warranties, guarantees, or representations of any
kind, either express or implied.
As part of an effort to improve and enhance the product performance and capabilities, Huawei
Technologies Co., Ltd. periodically releases revisions of the hardware and software.
Therefore, some functions described in this document may not be supported by all versions of
the software or hardware currently in use. For the most up-to-date information about product
features, refer to the product release notes.
If a product does not function as described in this document, contact Huawei technical support
engineers.
Change History
Changes between document issues are cumulative. The latest document issue contains all the
changes made in earlier issues.
Issue 06 (2016-03-01)
This is the sixth official release.
Issue 05 (2015-06-30)
This is the fifth official release.
Optimizes some descriptions in documents.
Issue 04 (2015-01-09)
This is the fourth official release.
Optimizes some descriptions in documents.
Issue 03 (2014-11-05)
This is the third official release.
Modified the section of managing a route.
Issue 02 (2014-08-30)
This is the second official release.
Optimizes some descriptions in documents.
Issue 01 (2014-05-30)
This is the first official release.
Contents
7 Managing Permissions............................................................................................................... 21
7.1 Managing Users............................................................................................................................................................ 22
7.1.1 Creating a User Account............................................................................................................................................22
7.1.2 Modifying Users........................................................................................................................................................ 26
7.1.3 Logging Out a User................................................................................................................................................... 28
7.1.4 Removing a User....................................................................................................................................................... 29
7.1.5 User Permission List..................................................................................................................................................30
7.2 Configuring Security Policy......................................................................................................................................... 36
7.3 Setting Domain Authentication Server Information.....................................................................................................40
7.4 Configuring Authorized IP Addresses..........................................................................................................................45
21 Connection Change Between the Storage System and an Application Server........... 312
21.1 Operations After an HBA Replacement (in Windows)............................................................................................ 316
21.1.1 Preparing for Configuration (in Windows)............................................................................................................316
21.1.2 Configurations and Operations After an HBA Replacement (in Windows)......................................................... 318
21.2 Operations After an HBA Replacement (in Linux)..................................................................................................319
21.2.1 Preparing for Configuration (in Linux)................................................................................................................. 319
21.2.2 Configurations and Operations After an HBA Replacement (in Linux)............................................................... 320
21.3 Operations After an HBA Replacement (in AIX).................................................................................................... 321
21.3.1 Preparing for Configuration (in AIX)....................................................................................................................321
21.3.2 Configurations and Operations After an HBA Replacement (in AIX)..................................................................323
21.4 Operations After an HBA Replacement (in HP-UX)............................................................................................... 324
21.4.1 Preparing for Configuration (in HP-UX)...............................................................................................................324
21.4.2 Configurations and Operations After an HBA Replacement (in HP-UX)............................................................ 326
21.5 Emergency Rollback of Configurations and Operations After Replacing an HBA................................................. 327
C Glossary...................................................................................................................................... 337
D Acronyms and Abbreviations................................................................................................ 348
Routine maintenance activities are the most common activities for the storage device,
including powering on or off the storage device, managing users, modifying basic parameters
of the storage device, and managing hardware components. This document applies to the
system administrators who are responsible for carrying out routine maintenance activities,
monitoring the storage device, and rectifying common device faults.
Safety Precautions
Follow the safety precautions for the storage device to protect yourself and devices. For
details about the safety precautions, see 2 Safety Operation Guide.
Maintenance Methods
You can maintain the storage system either in graphical user interface (GUI) mode or
command line interface (CLI) mode. This document exemplifies how to perform the routine
maintenance in GUI mode.
Related Information
To obtain detailed information about an feature or function of the storage device, refer to
other product manuals for the device. You can find up-to-date product manuals on our
technical support website: http://support.huawei.com/enterprise/.
This chapter provides guidelines to safety operations during activities such as installation,
maintenance, and troubleshooting. The guidelines consist of the safety regulations for
personnel and equipment. These guidelines must be followed to avoid personal injury and
equipment damage.
2.2 ESD
When installing or maintaining the equipment, follow the ESD safety precautions to prevent
personal injury or equipment damage.
indicates an electrostatic sensitive area. When operating equipment in this area, wear
an ESD wrist strap, ESD clothes, and ESD gloves, to prevent personal injury or equipment
damage. Note the following:
l Do not wear an ESD strap while the equipment is powering on. This may cause a power
shock.
l Do not touch the device with bare hands to avoid damaging the electrostatic sensitive
devices (ESSDs) on the circuit board.
l The electronic line is very prone to electrostatic damage. Wear the ESD wrist strap, ESD
gloves, and ESD clothes properly when handling disks, especially bare disks. Hold only
the edge of the disk.
l Since an ESD wrist strap only prevents static electricity from the body, an ESD clothes is
required to prevent static electricity from clothes.
l Before installing or replacing devices, wear an ESD wrist strap, ESD gloves, and an ESD
clothes to prevent static electricity from causing damage to you and equipment.
Personal Injury
DANGER
The laser emitted by the optical transceiver is invisible infrared ray, which may cause
permanent damage to human eyes. Do not look into the optical transceiver during device
maintenance.
Equipment Damage
To prevent equipment damage when you handle the equipment, be aware of the following
precautions:
l The optical transceivers on the equipment or the cables, which are not used, must be
covered with protective caps.
l When removing the cable that connects to the optical interface on the equipment, cover
the interface and the cable with dust-proof caps to prevent dust.
l When you perform the hardware loopback test by connecting the cable to the optical
transceiver, add an attenuator to avoid damage to the optical transceiver as a result of
strong optical power.
l When using the Optical Time Domain Reflectometer (OTDR), disconnect the cable
between the peer equipment and the local equipment to avoid damage to the optical
transceiver as a result of strong optical power.
l Do not remove or insert the optical transceiver connecting to cables at will.
DANGER
The laser beam on the optical interface board or from the fiber may cause injuries to eyes. Do
not stare into the optical interface or fiber connector during installation and maintenance of
optical interface boards or fibers.
Replacing Fibers
Use filter caps to cap the connectors of the fibers that are not used temporarily.
NOTICE
l Do not place tools on the air intake board of the enclosure. Otherwise, a short circuit may
be caused.
l Do not drop screws into the enclosure or the equipment. Otherwise, a short circuit may
be caused.
DANGER
l Before checking the device and cables, ensure that the system power supply is switched
off. Otherwise, incorrect or loose cable connections may result in personal injury or
equipment damage.
l Do not wear an ESD wrist strap when the equipment is being powered on. This may cause
a power shock.
l Do not swap cables and field replaceable units (FRUs) during system startup. Otherwise,
data loss may occur.
l After you switch off the power supply, wait at least one minute before switching it back
on.
l To avoid disk damage and data loss, do not switch the power supply off while any disk
running indicators are still blinking.
Troubleshooting
DANGER
l Do not touch the connectors of power cables or communication cables. Otherwise, an
electrical shock may result if there is current in the cables.
l Do not touch the device with bare hands in electrostatic sensitive areas. Wear an ESD
wrist strap, ESD gloves, or ESD clothes to prevent personal injury or equipment damage.
Prerequisites
Verify that the maintenance terminal meets the following requirements before you use the
DeviceManager software:
l Operating system and browser versions
The DeviceManager is compatible with multiple types of operating systems and
browsers. However, the partially compatible browsers cannot provide guaranteed ease-
of-use experience for using the DeviceManager. Table 3-1 lists the operating systems
and browsers compatible with the DeviceManager.
Ubuntu 11 Firefox 24 to 28 -
Context
l DeviceManager only supports TSL protocols (including TLS 1.0, TLS 1.1, and TLS
1.2).
l For a 2 U controller enclosure (5300 V3/5500 V3), the default IP addresses of the
management network ports on controllers A and B are respectively 192.168.128.101 and
192.168.128.102, and the default subnet mask is 255.255.0.0. For a 3 U or 6 U controller
enclosure (5600 V3/5800 V3/6800 V3/6900 V3), the default IP addresses of the
management network ports on management modules 0 and 1 are respectively
192.168.128.101 and 192.168.128.102, and the default subnet mask is 255.255.0.0.
l The default user name and password of the super administrator are admin and
Admin@storage.
l This document uses the Windows operating system as an example to explain how to log
in to the DeviceManager. The login operations on other operating systems need to be
adjusted accordingly.
Procedure
Step 1 Run Internet Explorer on the maintenance terminal.
l XXX.XXX.XXX.XXX represents the management network port IP address of the storage system.
l Your web browser may display that the website has a security certificate error. If the IP address is
correct, you can neglect the prompt and continue to access the storage system.
l If you have a usable security certificate, you are advised to use corresponding commands to import
the certificate to improve system security. For details about the corresponding commands, see
OceanStor 5300 V3&5500 V3&5600 V3&5800 V3&6800 V3&6900 V3 Storage System V300R001
Command Reference.
Local user: You will log in to the storage system in local authentication mode.
The super administrator can log in to the storage system using the Local user
authentication mode only.
LDAP user: You will log in to the storage system in LDAP domain authentication
mode.
You can log in to the storage system in LDAP domain authentication mode only
after the LDAP server is properly configured.
3. Choose a language from the Language list.
Step 4 Type your user name and password in Username and Password respectively.
NOTE
2 Status bar Shows the name and login time of the currently logged-in user.
4 Log out and The log out and help area shows log out button and help button.
help area
----End
Follow-up Procedure
If you need to log out of the DeviceManager, perform the following steps:
You can use a tablet computer to log in to a storage system and conduct basic maintenance
operations, such as checking alarms, performance statistics, and the basic information of the
storage system.
Prerequisites
A Wi-Fi network that is connected to the storage system's management network is available
onsite.
Context
l Customers can use a tablet computer to log in to the storage system through their
wireless routers. You can use iPad Air (Safari) and HUAWEI MediaPad 10 FHD
(Chrome) to log in to the storage system. This section uses iPad as an example to
describe how to log in to the DeviceManager. The login operations on other operating
systems are similar.
l For a 2 U controller enclosure (5300 V3/5500 V3), the default IP addresses of the
management network ports on controllers A and B are respectively 192.168.128.101 and
192.168.128.102, and the default subnet mask is 255.255.0.0. For a 3 U or 6 U controller
enclosure (5600 V3/5800 V3/6800 V3/6900 V3), the default IP addresses of the
management network ports on management modules 0 and 1 are respectively
192.168.128.101 and 192.168.128.102, and the default subnet mask is 255.255.0.0.
l The default user name and password of the super administrator are admin and
Admin@storage.
Procedure
Step 1 Connect the iPad to the Wi-Fi network.
1. On the iPad desktop, choose Settings > WLAN.
The default user name and password are admin and Admin@storage.
If a verification code is required, enter the correct verification code.
Change the default login password immediately after you have logged in to the storage
system for the first time. Periodically change your login password. For details about how to
change the password, see 7.1.2 Modifying Users.
5. Click Login.
The system enters the management page, where you can check the alarms, performance
statistics, and the basic information of the storage system.
----End
Print the following table to record the status, remarks, and owner information for the listed
maintenance items.
......
Known issues:
Verification results:
Date:
Powering on or off the storage device includes powering on or off interface modules and other
hardware components. A correct power-on or power-off procedure effectively avoids device
damage caused by misoperations.
Prerequisites
The storage device contains coffer disks.
Precautions
Take the following precautions when you power on the storage device:
l Before powering on a dual-controller storage system for the first time or powering on a
dual-controller storage system after the system configurations are cleared, ensure that
controller A is correctly connected and inserted in the controller enclosure. Otherwise,
the storage system cannot be correctly powered on. Before powering on a four-controller
storage system for the first time or powering on a four-controller storage system after the
system configurations are cleared, ensure that controllers A and C are correctly
connected and inserted in the controller enclosures. Otherwise, the storage system cannot
be correctly powered on.
l Do not wear any ESD wrist straps during a power-on to avoid electric shocks.
l Do not remove or insert any optical fibers, network cables, coffer disks, and interface
modules during a power-on to avoid data loss.
l Do not online modify any expansion cable connections after the storage device has been
powered on; otherwise, device failures may occur.
l Complete expansion cable connections for a newly added disk enclosure before you
power on the enclosure. Also, do not modify any expansion cable connections after the
new disk enclosure has been powered on; otherwise, device failures may occur.
The correct storage device power-on sequence is as follows: turning on the external power
switches that map all devices pressing the power button of controller enclosure turning
on the power switches of Ethernet switches or Fibre Channel switches (if they are configured
but not powered on) turning on the power switches of application servers (if they are not
powered on).
Procedure
Step 1 Check that all of the power cables have snapped into place.
Step 2 Check the labels on the power cables and identify the power switches corresponding to those
cables in the power distribution unit (PDU).
l During the power-on, the power indicator of the controller enclosure blinks until the storage
device is fully powered on in five to ten minutes.
----End
Follow-up Procedure
After the storage device has been powered on, verify that the indicator of each hardware
component is in a normal state by referring to 16 Checking the Running Status of the
Storage Device. If you find an anomaly for any indicator, try to rectify it by referring to the
OceanStor 5300 V3&5500 V3&5600 V3&5800 V3&6800 V3&6900 V3 Storage System
V300R001 Event Reference or OceanStor 5300 V3&5500 V3&5600 V3&5800 V3&6800
V3&6900 V3 Storage System V300R001 Troubleshooting.
Prerequisites
No service is running on the storage device.
Context
The correct power-off sequence is: stopping services running on the storage device
synchronously pressing and holding the power button on controller enclosure for five seconds
wait until the power-off completes, disconnecting the controller enclosure and disk
enclosures from their external power supplies.
To power off the storage device, you can either switch off controller enclosure synchronously
or utilize the DeviceManager. This document exemplifies how to power off the storage device
using the DeviceManager.
Procedure
Step 2 In the function pane, click Power Off Device in the Task area.
Step 3 Read the content of the dialog box carefully and select I have read the previous information
and understood subsequences of the operation. to confirm the information.
The Success dialog box is displayed indicating the success of powering off the storage device.
Step 5 Click OK and you have finished powering off the storage device.
----End
Prerequisites
No service is running on the storage device.
Precautions
Exercise caution when you restart the storage device as doing so interrupts the services
running on the device.
Procedure
Step 2 In the function pane, click Restart Device in the Task area.
Step 3 Read the content of the dialog box carefully and select I have read the previous information
and understood subsequences of the operation. to confirm the information.
The Success dialog box is displayed indicating the success of restarting the storage device.
Step 5 Click OK and you have finished restarting the storage device.
----End
NOTICE
Powering off the storage device in an irregular way may cause data loss or disrupt the services
for other clients. For this reason, perform this activity only when bodily injury or device
damage is involved.
Follow the electricity guidelines for your equipment room when you power off the storage
device.
Re-powering on the storage device that was powered off in an irregular way may incur
exceptions. If this happens, record the error messages and contact our technical support
engineers for troubleshooting.
Procedure
Step 2 On the main window, click Device View to access the front view of the storage device.
Step 3 Click in the front view to switch to the rear view of the storage device.
Step 4 Click the interface module that you want to power on.
Step 6 Click OK and you have finished powering on the interface module.
----End
Prerequisites
All services related to the interface module have been stopped.
Procedure
Step 2 On the main window, click Device View to access the front view of the storage device.
Step 3 Click in the front view to switch to the rear view of the storage device.
Step 4 Click the interface module that you want to power off.
----End
7 Managing Permissions
After configuring basic storage services, you can manage user accounts and configure domain
authentication and accessible IP addresses to ensure the security of the storage system.
7.1 Managing Users
To prevent misoperations from affecting device stability and service data security, the storage
device defines three levels of users each with certain permissions.
7.2 Configuring Security Policy
Security policies include the username policy, password policy, login policy and advanced
settings. Security policies are used to protect the system security.
7.3 Setting Domain Authentication Server Information
To centrally manage user information, the DeviceManager allows users to log in to the storage
device in Lightweight Directory Access Protocol (LDAP) server authentication mode.
7.4 Configuring Authorized IP Addresses
To prevent unauthorized IP addresses from accessing DeviceManager, specify the IP
addresses that you permit to access the device from the DeviceManager. This ensures that the
DeviceManager is accessible only to the IP addresses or address segments in the IP address
list.
7.5 Replacing an OceanStor SystemReporter Security Certificate
The OceanStor SystemReporter uses a self-signed certificate, and you can replace the self-
signed certificate with a certificate trusted by the browser. This section describes how to
replace the OceanStor SystemReporter security certificate.
Prerequisites
A domain authentication server is available for creating LDAP users or LDAP user groups.
Context
The storage device defines the following levels of users:
l Super administrator: The super administrator has full administrative permissions on the
storage device, and is able to create the users at the administrator and read-only user
levels.
l Administrator: An administrator user has partial administrative permissions on the
storage device but cannot manage users, upgrade the storage device, modify system time,
activate license files. Local user administrator cannot import license files, and LDAP
user administrator cannot perform any import or export operation.
l Read-only user: A read-only user has only the access permission on the storage device.
After logging in to the storage device, read-only users can only query information about
the storage device.
For optimal reliability and security, create different user levels to control their operations on
the system.
Procedure
Step 1 Go to the Add User dialog box.
l Select LDAP user or LDAP user group from the Type list and configure the
information about LDAP users or LDAP user groups respectively. Table 7-2 describes
related parameters.
Context
l To prevent security risks of the storage system due to password leakage, you need to
periodically change the password used for logging in to the storage system. This
Procedure
l Change the login password of the current user
The Success dialog box is displayed indicating that the operation succeeded.
f. Click OK.
The system returns to the permission settings page. You have complete the
password modification.
l Adjust the level of a lower-level user or initialize the password of the user
To initialize a password, select Initialize Password and enter New Password and
Confirm Password.
NOTE
If you are modifying the information about a LDAP user or LDAP user group, this operation
is unavailable.
e. Modify user information.
When a user cannot perform some operations on a storage device or does not
need the current permissions, the super administrator can adjust the level of the
user. Otherwise, there is no need to adjust the user level.
2) Click OK.
The Info dialog box is displayed. Ensure that you have set a correct user
level.
3) Click OK.
The Execution Result dialog box is displayed indicating that the
operation succeeded.
n Initialize the password of the current user.
1) Select Initialize password.
NOTE
When a user forgets the password, the user can initialize the password.
Otherwise, there is no need to initialize the password.
2) Click OK.
The Execution Result dialog box is displayed indicating that the
operation succeeded.
f. Click Close. The user information modification is complete.
----End
Prerequisites
l Only a super administrator has the permission to perform this operation.
Precautions
Logout users are locked for 5 minutes. During that period, the logged-out users cannot log in
to the DeviceManager.
Procedure
Step 1 Go to the Permission Settings page.
----End
Context
l Only a super administrator has the permission to remove the users at the administrator
and read-only user levels.
l Logged-in users cannot be removed.
Procedure
Step 1 Go to the Permission Settings page.
----End
Built-in Root level The user is set _super_ad Admin@r For details about
controller to prevent the min evive how to change the
enclosure super password, see
user administrator OceanStor 5300
from forgetting V3&5500
the password V3&5600
and only can be V3&5800
logged in to V3&6800
through a serial V3&6900 V3
port. The old Storage System
password is V300R001
required when Restricted
the super Command
administrator Reference.
attempts to Contact Huawei
change the technical support.
password. The
user is used to
initialize the
password of the
super
administrator
and change the
password of
root.
> Viewing
and Settings
> Permission
Settings >
User
Management.
3. Select the user
whose
password you
want to change
and click
Modify.
4. In the Modify
User dialog
box that is
displayed,
change the
password of
the user.
5. Click OK.
a: You are advised to change the default login password immediately after you have logged
in to the storage system for the first time and periodically change your login password in
the future. This reduces the password leakage risks.
Procedure
Step 1 Go to the Security Policies page.
Max. Length Maximum length of the user password. This [Value range]
parameter prevents administrators from Its value is an integer
configuring lengthy passwords. ranging from 8 to 32.
[Default]
16
----End
Prerequisites
The LDAP server has been configured.
Context
The LDAP protocol is a TCP/IP network protocol that enables users to access Directory
System Agents (DSAs). It involves some reduced functionality from X.500 DAP
specification.
The complexity of managing networks, especially users, increases as the number of network
applications grows. Most systems that provide a single service implement authentication in
"username-password" mode. However, each user has different permissions on various
network applications, which means each user requires a different username and password for
each application. In this condition, users need to enter different usernames and passwords to
access different applications. Then, directory services provided by the LDAP come to address
this issue through the following mechanism.
The principal purpose of LDAP-based authentication applications is to set up a directory-
oriented user authentication system, that is, an LDAP. When a client user needs to access
applications under the environment, the LDAP server compares the username and password
sent by the client with corresponding authentication information in the directory database for
identity verification.
For new-generation storage applications, client hierarchy information is stored in the LDAP
server, and the users who attempt to access the storage device will be authenticated by the
LDAP server.
LDAPS(LDAP over SSL): indicates that the system uses the LDAP over SSL to
communicate with the LDAP domain server if the LDAP domain server supports the SSL.
NOTE
Before selecting the LDAPS protocol, import the CA certificate file for the LDAP domain server.
Procedure
Step 1 Go to the Permission Settings page.
To remove an IP address, select the IP address from the IP Address list and click Remove.
5. Set basis parameters of the LDAP server. Table 7-6 describes related parameters.
6. Click Advanced and set advanced parameters of the LDAP server. Table 7-7 describes
related parameters.
NOTE
After you have finished configuring the LDAP server on the storage system side, you need to log in to
the storage system using the LDAP user name. Therefore, you need to create the LDAP user name or
LDAP user group name on the storage system.
----End
Procedure
Step 1 Go to the Permission Settings page.
4. Enter the IP segment or IP address that is allowed to access the storage system.
To authorize an IP address segment, select By IP address segment and set Start IP
Address and End IP Address. IP addresses included in the IP address segment are
allowed to access the storage device.
To authorize IP addresses, select By IP address and set By IP address.
5. Click OK. The specified IP segment or IP address is added to the IP addresses/address
segments list.
NOTE
To disable an IP address or IP segment from accessing the storage system, select it from the IP
address list and click Remove.
6. Click Save.
The Execution Result dialog box is displayed, indicating that the operation succeeded.
----End
Prerequisites
The security certificate has been generated.
Context
l A certificate is a declaration with a digital signature from an entity (issuer). The
certificate provides identity authentication for the communications parties.
l Because the self-signed certificate of the OceanStor SystemReporter is not trusted by
users' browser. The users can replace the certificate with a certificate trusted by their
browser.
Procedure
Step 1 Log in as user Administrator to the server where the OceanStor SystemReporter is installed.
Step 2 Go to the installation directory of the OceanStor SystemReporter, for example, C:\Runtime
\bin.
Step 3 Double-click the shutdownSystem.bat file, enter y or Y, and press Enter to disable the
OceanStor SystemReporter service.
Step 4 On the CLI, run cd /DC:\Runtime\bin to switch from the current directory to the installation
directory.
1. On the CLI, run replace_cert.bat XXX, where XXX indicates a customized certificate
key.
2. Type the new location of the certificate file, for example, C:\customStore
\server.keystore, and press Enter.
Step 5 Type y or Y and press Enter to confirm the certificate replacement.
----End
Follow-up Procedure
Restart the OceanStor SystemReporter, then you can use the new certificate to log in.
If a storage system's storage space is insufficient for current services, current resources are
improperly allocated, or network links are changed due to the change of a customer's service
requirements, you can adjust storage resources to ensure the normal and stable running of the
services.
8.1 Expanding Storage Space
If the storage system's storage space cannot meet a customer's service requirements, you can
expand the LUNs, storage pools, or disk domains to ensure the normal and stable running of
the services.
8.2 Adjusting Resource Allocation
If the storage system's current resources cannot meet a customer's service requirements, you
can adjust storage resources to ensure the normal and stable running of the services. Adjusting
resource allocation involves modifying LUN groups, host groups, port groups, and mapping
groups.
8.3 Changing Links
If the storage system's current network links cannot meet a customer's service requirements,
you can adjust storage resources to ensure the normal and stable running of the services.
Prerequisites
Disks used for capacity expansion are available.
Procedure
Step 1 Go to the Expand Disk Pool page.
----End
Prerequisites
The disk domain has available storage space for capacity expansion of the storage pool.
Procedure
Step 1 Go to the Expand Storage dialog box.
l You can create a new storage tier or expand the existing storage tier to expand storage pools. If the
storage pool consists of multiple storage tiers, you are advised to set a SmartTier policy. The policy
enables data to migrate among different types of disks, optimizing storage performance distribution.
l You can configure RAID policy only for new created storage tier. For the storage tier already exists in the
storage pool, you cannot modify its RAID policy.
l The number of RAID data disks of different storage pool tiers must be a multiple of 1, 2, 4, or 8.
Step 3 Optional: If there are multiple storage tiers, you are advised to set a SmartTier policy. The
policy enables data to migrate among different types of disks, optimizing storage performance
distribution. Table 8-1 lists related parameters.
NOTE
l If Data Migration Plan is set to Periodical, I/Os are monitored on a 7x24 basis by default.
l If the remaining capacity in a storage pool is equal to or smaller than 10% of the total capacity, data does
not migrate in the storage pool.
Step 4 Optional: If there is new added storage tier, you can click Advanced to set the strip depth for
this tier.
The Advanced Property Setting dialog box is displayed. Table 8-2 describes the related
parameters.
1. Click OK.
The Warning dialog box is displayed.
2. Confirm the information in the dialog box and select I have read the previous
information and understood subsequences of the operation.
3. Click OK.
The Execution Result dialog box is displayed indicating that the operation succeeded.
4. Click Close.
----End
Prerequisites
The storage pool can provide sufficient storage space for LUN expansion.
Context
The following operations must be performed in sequence to expand the LUN:
1. Expand the LUN on the storage system.
2. Configure the application server as required. The configuration of the application server
varies with the operating system running on the application server. For details, see the
corresponding sections.
Prerequisites
l If a Fibre Channel network is used, ensure that the world wide name (WWN) of a Fibre
Channel initiator has been obtained.
l If an Internet Small Computer Systems Interface (iSCSI) network is used, ensure that the
iSCSI qualified name (IQN) of an iSCSI initiator has been obtained.
Procedure
Step 1 Log in to the CLI as a super administrator.
Step 2 Run the show initiator initiator_type=? [ wwn=? | iscsi_iqn_name=? ] command to query
host information based on the WWN or IQN of an initiator.
WWN : 21000024ff53b640
Running Status : Online
Free : Yes
Alias : suse2_01
Host ID : 2
Multipath Type : Default
Step 3 Run the show host lun host_id=? command to view all LUNs mapped to the host in the
storage system.
host_id=? indicates a host ID.
admin:/>show host lun host_id=2
The value of LUN ID is the ID of a LUN mapped to the host in the storage system.
Step 4 Run the show lun general lun_id=? command to view the WWN of the LUN mapped to the
host.
Step 5 On the multipathing software of an application server, run the show vlun command to view
the WWN of the LUN.
Step 6 Check whether the two WWNs are the same. If they are the same, you can determine that the
LUN is the one to be expanded.
NOTE
For details about the preceding commands, see the OceanStor 5300 V3&5500 V3&5600 V3&5800
V3&6800 V3&6900 V3 Storage System V300R001 Command Reference.
----End
Prerequisites
l The storage system has at least one formatted LUN.
l You cannot expand LUNs for which snapshot, remote replication, clone, LUN copy,
SmartMigration and HyperMirrors has been configured.
Precautions
To ensure data integrity, stop services on the LUN before LUN expansion.
When LUNs of different types are expanded, the capacity that can be expanded is restricted.
Specific conditions are as follows:
l The capacity of a thin LUN is restricted by its specifications and irrelevant to the
remaining capacity of the storage pool.
l The capacity of a thick LUN is restricted by its specifications. It cannot be larger than
the remaining capacity of the storage pool.
Rescan for the LUN on the server side after the capacity expansion.
Procedure
Step 1 Go to the Expand LUN dialog box.
The total capacity of the thick LUN after expansion must be smaller than the available
capacity of the storage pool.
The total capacity of the thin LUN after expansion must be smaller than its specifications.
The total capacity of the LUN after expansion must be larger or equal than the original
capacity of the LUN.
2. Select a capacity unit from the drop-down list on the right of Added Capacity.
Possible values are Blocks, MB, GB, or TB.
Step 3 Confirm the LUN expansion.
1. Click OK.
The Info dialog box is displayed.
2. Click OK.
The Success dialog box is displayed indicating that the operation succeeded.
3. Click OK.
----End
to expand a LUN on an application server. For application servers running other versions of
Windows operating systems, adjust the operations based on actual conditions.
Prerequisites
A LUN has been expanded on the storage system.
Context
In the example of this section, the LUN is mapped as disk 3 on the application server. Its drive
letter is G:\, original capacity is 25 GB, and expanded capacity is 50 GB.
Procedure
Step 1 Log in to the Windows-based application server as administrator.
Step 2 On the Windows desktop, click Start and choose Administrative Tools > Server Manager
from the shortcut menu.
Step 3 On the left navigation bar of the Server Manager dialog box, right-click Disk Management
and choose Rescan Disks from the shortcut menu.
After the scanning is complete, the system displays the result as shown in Figure 8-1. On the
right of disk G, the capacity of the partition to be expanded is displayed.
Step 4 Right-click disk G and choose Extend Volume from the shortcut menu.
The Extend Volume Wizard dialog box is displayed, as shown in Figure 8-2.
NOTE
l Disk 3 is the disk mapped from the LUN to be expanded on the application server.
l You can change the expansion storage space in Select the amount of space in MB to suit your
need. By default, the maximum storage space is used.
----End
Result
In the Server Manager dialog box, view the capacity of disk G after expansion, as shown in
Figure 8-4.
Prerequisites
A LUN has been expanded on the storage system.
Context
In the example of the section, the capacity of the LUN to be expanded is 25 GB and it will be
expanded to 50 GB. The drive letter of the mapped disk on the application server is sdf.
Procedure
Step 1 Scan for disks on the SUSE-based application server.
1. Scan for disks.
i. Run lsscsi command to obtain the ID of the host where the LUN resides. The
following is an example.
suse:~ # lsscsi
[5:0:0:0] disk HUAWEI XXXX 2101 /dev/sdf
In the preceding command output, 5 in [5:0:0:0] indicates the host ID, XXXX
indicates a specific product model or brand.
ii. Run echo '- - -' > /sys/class/scsi_host/hostN/scan command, where N
indicates the host ID obtained in the preceding step.
sdf is the drive letter of the disk mapped from the LUN on the application server. The actual drive
letter may be different.
Step 2 Run fdisk -l to view the information about all disks on the application server.
suse:~ # fdisk -l
Disk /dev/sdb: 598.0 GB, 597998698496 bytes
255 heads, 63 sectors/track, 72702 cylinders
Units = cylinders of 16065 * 512 = 8225280 bytes
Disk identifier: 0xc433d0ae
Step 3 To add the file system of the LUN to the new storage space, run resize2fs /dev/sdf.
l If the following command output is displayed, the file system is successfully expanded.
suse:~ # resize2fs /dev/sdf
resize2fs 1.41.9 (22-Aug-2009)
Resizing the filesystem on /dev/sdf to 13107200 (4k) blocks.
The filesystem on /dev/sdf is now 13107200 blocks long.
l If the following information is displayed, run the e2fsck -f /dev/sdf command and then
the resize2fs /dev/sdf command.
suse:~ # resize2fs /dev/sdf
resize2fs 1.41.9 (22-Aug-2009)
Please run 'e2fsck -f /dev/sdf' first.
----End
application server using logical volume manager (LVM). For application servers running
other versions of SUSE operating systems, adjust the operations based on site conditions.
Prerequisites
l LUN expansion has completed on the storage system.
l A physical volume to be expanded has been determined.
Context
In the example of the section, sdb5 is a physical volume in the drive letter of the disk mapped
from the LUN on the application server. The primal capacity of sdb5 is 104 MB, and the
capacity after expansion is 120 MB.
Procedure
Step 1 On the application server, view the block device ID of the LUN in the operating system.
1. Run the hot_add command to scan for disks.
2. Run the show vlun command to query the LUN WWN.
UltraPath CLI #0 >show vlun
------------------------------------------------------------------------------
------------------------------------------------------
Vlun ID Disk Name Lun WWN
Status Capacity Ctrl(Own/Work) Array Name Dev Lun ID
0 sda WMQ_LUN_TEST_002 60022a11000beb2a0421c1cc000002d0
Normal 3.00GB 0B/0B Array8.1 --
1tagei sdb WMQ_LUN_TEST_003
60022a11000beb2a0421c2a2000002d1 Normal 3.00GB 0A/0A
Array8.1 --
2 sdc WMQ_LUN_TEST_004 60022a11000beb2a0421c365000002d2
Normal 3.00GB 0B/0B Array8.1 --
3 sdd WMQ_LUN_TEST_005 60022a11000beb2a0421c4bd000002d3
Normal 3.00GB 0A/0A Array8.1 --
------------------------------------------------------------------------------
------------------------------------------------------
Lun WWN is the WWN of a LUN and Disk is the drive letter of a disk mapped from the
LUN on the application server.
Step 2 Run the echo 1 > /sys/block/sdb5/device/rescan command to rescan for disks.
NOTE
sdb5 is a physical volume in the drive letter of the disk mapped from the LUN on the application server.
Adjust configuration operations based on an actual physical volume to be expanded.
Step 3 Run the pvresize /dev/sdb5 command to expand the physical volume.
Step 4 Run the lvextend -L +16M /dev/testvg/testlv command to expand a logical volume.
pro
lvextend -L +16M /dev/testvg/testlv
Extending logical volume testlv to 120.00 MB
Logical volume testlv successfully resized
Step 5 Run the resize2fs /dev/testvg/testlv command to expand the file system.
resize2fs /dev/testvg/testlv
resize2fs 1.41.9 (22-Aug-2009)
----End
Prerequisites
A LUN has been expanded on the storage system.
Context
In the example of the section, the capacity of the LUN to be expanded is 25 GB and it will be
expanded to 50 GB. The drive letter of the mapped disk on the application server is sdh.
Procedure
Step 1 Scan for disks on the Red Hat-based application server.
1. Scan for disks.
If the UltraPath software is installed, run hot_add command.
If the UltraPath software is not installed, perform the following operations:
i. Run lsscsi command to obtain the ID of the host where the LUN resides. The
following is an example.
[root@localhost ~]# lsscsi
[5:0:0:0] disk HUAWEI XXXX 2101 /dev/sdh
In the preceding command output, 5 in [5:0:0:0] indicates the host ID, XXXX
indicates a specific product model or brand.
ii. Run echo '- - -' > /sys/class/scsi_host/hostN/scan command, where N
indicates the host ID obtained in the preceding step.
After the scan is complete, the disk capacity remains 25 GB.
2. Run echo 1 > /sys/block/sdh/device/rescan command to rescan for disks.
After the scan is complete, the disk capacity becomes 50 GB.
NOTE
sdh is the drive letter of the disk mapped from the LUN on the application server. The actual drive
letter may be different.
Step 2 Run fdisk -1 to view the information about all disks on the application server.
[root@localhost ~]# fdisk -l
Step 3 To add the file system of the LUN to the new storage space, run resize2fs /dev/sdh.
[root@localhost ~]# resize2fs /dev/sdh
resize2fs 1.41.12 (17-May-2010)
Filesystem at /dev/sdh is mounted on /fs1; on-line resizing required
old desc_blocks = 2, new_desc_blocks = 4
Performing an on-line resize of /dev/sdh to 13107200 (4k) blocks.
The filesystem on /dev/sdh is now 13107200 blocks long.
----End
Prerequisites
l A LUN has been expanded on the storage system.
l Services on the LUN to be expanded have been stopped.
Context
This section uses the default disk-based UNIX File System (UFS) on a Solaris-based
application server as an example to describe how to expand a LUN and its file system on a
raw disk. The LUN will be expanded from 50 GB to 60 GB.
Procedure
Step 1 Run cfgadm -al to scan for the LUNs mapped to the application server.
root@solaris:~# cfgadm -al
Ap_Id Type Receptacle Occupant Condition
c2 scsi-sas connected configured unknown
c2::dsk/c2t6d0 CD-ROM connected configured unknown
c4 scsi-sas connected configured unknown
c4::w5000cca0258a82e5,0 disk-path connected configured unknown
c5 scsi-sas connected unconfigured unknown
c6 scsi-sas connected configured unknown
c6::w5000cca02570b521,0 disk-path connected configured unknown
c7 scsi-sas connected unconfigured unknown
c10 fc-private connected configured unknown
Step 2 Run umount /mnt/ to unmount corresponding disks of the LUN that you want to expand on
the application server.
If disks of the LUN that you want to expand are not mounted, skip this operation.
Step 3 Run format to query the information about all disks detected by the the application server.
root@solaris:~# format
Searching for disks...done
In the preceding command output, c10t5d1 indicates the driver letter mapped by the LUN to
the application server.
Step 4 After Specify disk (enter its number), enter the corresponding ID 3 of c10t5d1.
Specify disk (enter its number): 3
selecting c10t5d1
[disk formatted]
Note: detected additional allowable expansion storage space that can be
added to current SMI label's computed capacity.
Select <partition> <expand> to adjust the label capacity.
FORMAT MENU:
disk - select a disk
type - select (define) a disk type
partition - select (define) a partition table
current - describe the current disk
format - format and analyze the disk
Step 6 After Specify disk type (enter its number)[20]: , enter 0 to automatically update disks, re-
define the disk type, and refresh the disk capacity.
Specify disk type (enter its number)[20]: 0
c10t5d1: configured with capacity of 59.98GB
<HUAWEI-S5600T-2201 cyl 7678 alt 2 hd 64 sec 256>
selecting c10t5d1
[disk formatted]
After the operations are complete, the disk capacity becomes 60 GB.
Step 7 Run partition and then run print to view disk partitions.
format> partition
PARTITION MENU:
0 - change `0' partition
1 - change `1' partition
2 - change `2' partition
3 - change `3' partition
4 - change `4' partition
5 - change `5' partition
6 - change `6' partition
7 - change `7' partition
select - select a predefined table
modify - modify a predefined partition table
name - name the current table
print - display the current table
NOTE
Generally, if Part of a partition is numbered 2, the partition indicates the entire disk that mapped to the
application server.
Step 8 Run l and enter y to label the LUN that has been expanded.
partition> l
Ready to label disk, continue? y
Step 10 Run growfs -M /mnt /dev/rdsk/c10t5d1s6 to expand the file system of the LUN.
root@solaris:~# growfs -M /mnt /dev/rdsk/c10t5d1s6
/dev/rdsk/c10t5d1s6: 125272064 sectors in 20390 cylinders of 48 tracks, 128
sectors
61168.0MB in 1275 cyl groups (16 c/g, 48.00MB/g, 5824 i/g)
super-block backups (for fsck -F ufs -o b=#) at:
32, 98464, 196896, 295328, 393760, 492192, 590624, 689056, 787488, 885920,
Initializing cylinder groups:
.........................
super-block backups for last 10 cylinder groups at:
124360864, 124459296, 124557728, 124656160, 124754592, 124853024, 124951456,
125049888, 125148320, 125246752
Oracle_Solaris-11_1-Text-SPARC
/dev/dsk/c10t5d1s6 61687396 61185 61120192 1% /mnt
----End
Prerequisites
l A LUN has been expanded on the storage system.
l Services on the LUN to be expanded have been stopped.
Context
In the example of the section, the LUN to be expanded is LUN005 and its capacity is 25 GB.
The capacity of the file system created on the LUN is 24 GB. The LUN and file system will
be expanded to 50 GB and 48 GB respectively. The volume group name and logical volume
name of the LUN that you want to expand are vg1 and lv1 respectively. The mount directory
of the file system that uses the LUN is /mnt/lv1.
Procedure
Step 1 Scan for disks on the AIX-based application server.
NOTICE
l If the LUN that you want to expand has been mapped to the application server and has
mapping relationship with the application server, run rmdev -dl diskName to delete disk
information and perform the follow-up operations. In the command, diskName indicates
the disk of the LUN before expansion.
l If the mapping between the LUN and application server is canceled before expansion
and rebulit after expansion, directly perform the following operations.
If there are multiple disks, run the upadm show lun command to check the drive letter of
each disk. At the bottom of the command output, the drive letter of the newly created LUN is
displayed. In this example, the LUN name is LUN005 and its drive letter is hdisk5. In the
command output, XXXX indicates a specific product model or brand.
Step 4 Run umount /mnt/lv1 to unmount the file system.
In the command output, /mnt/lv1 indicates the mount directory of the file system.
Step 5 Run varyoffvg vg1 to deactivate volume group vg1.
In the command output, vg1 indicates the name of the volume group corresponding to the
LUN that you want to expand.
Step 6 Run bootinfo -s hdiskX to check the LUN capacity after expansion. In the command, X
indicates the number of the drive letter. In this example, X is 5.
# bootinfo -s hdisk5
51200
In the preceding command output, if the unit is MB, the capacity is 51,200 MB (50 GB) that
is the same as the expansion result displayed on the storage system.
Step 7 Run varyonvg vg1 to activate volume group vg1.
Step 8 Refresh the capacity of the volume group corresponding to the LUN that you want to expand.
1. Run chvg -g vg1 to refresh the volume group of the LUN that you want to expand.
# chvg -g vg1
0516-1164 chvg: Volume group vg1 changed. With given characteristics vg1
can include up to 64 physical volumes with 2032 physical partitions
each.
In the command output, pay attention to the PP SIZE parameter. If you want to create or
modify a logical volume, you need to refer to the parameter to determine the size of the
logical volume. In the example of this section, the value of PP SIZE is 32 MB.
Step 9 Modify the capacity of the logical volume to meet the need for expanding the file system.
1. Run lslv lv1 to view parameters related to the logical volume.
# lslv lv1
LOGICAL VOLUME: lv1 VOLUME GROUP: vg1
LV IDENTIFIER: 00f6e07400004c00000000011660e3d1.1 PERMISSION: read/
write
VG STATE: active/complete LV STATE: closed/syncd
TYPE: jfs2 WRITE VERIFY: off
MAX LPs: 768 PP SIZE: 32 megabyte(s)
COPIES: 1 SCHED POLICY: parallel
LPs: 768 PPs: 768
STALE PPs: 0 BB POLICY: relocatable
INTER-POLICY: minimum RELOCATABLE: yes
INTRA-POLICY: middle UPPER BOUND: 128
MOUNT POINT: /mnt/lv1 LABEL: /mnt/lv1
MIRROR WRITE CONSISTENCY: on/ACTIVE
EACH LP COPY ON A SEPARATE PV ?: yes
Serialize IO ?: NO
lv1 indicates the name of a logical volume on the volume group. Pay attention to the
MAX LPs, LPs, and PP SIZE parameters in the command output. MAX LPs, LPs, and
PP SIZE indicate the maximum number of logical partitions, number of logical
partitions, and size of the physical partition respectively. The value of MAX LPs
multiplied by PP SIZE is the size of the logical volume, and the value of LPs multiplied
by PP SIZE is the capacity of the logical volume's file system. In the example of this
section, the values of MAX LPs and LPs are both 768, and the value of PP SIZE is 32
MB. Therefore, the capacities of the logical volume and the file system are both 24,576
MB (24 GB).
2. Run smit lv.
# smit lv
Logical Volumes
3. In the command output, select Set Characteristic of a Logical Volume and press Enter.
Set Characteristic of a Logical Volume
4. In the command output, select Change a Logical Volume and press Enter.
Change a Logical Volume
[Entry Fields]
* LOGICAL VOLUME name [] +
5. Press Esc+4 to go to the logical volume name list. Select the logical volume you want to
modify and press Enter.
Change a Logical Volume
[Entry Fields]
* Logical volume NAME lv1
Logical volume TYPE [jfs2] +
POSITION on physical volume middle +
RANGE of physical volumes minimum +
MAXIMUM NUMBER of PHYSICAL VOLUMES [128]
#
to use for allocation
Allocate each logical partition copy yes +
on a SEPARATE physical volume?
RELOCATE the logical volume during yes +
reorganization?
Logical volume LABEL [/mnt/lv1]
MAXIMUM NUMBER of LOGICAL PARTITIONS [1536]
#
SCHEDULING POLICY for writing/reading parallel
+
logical partition copies
PERMISSIONS read/write +
Enable BAD BLOCK relocation? yes +
Enable WRITE VERIFY? no +
Mirror Write Consistency? active +
Serialize IO? no +
Mirror Pool for First Copy +
Mirror Pool for Second Copy +
Mirror Pool for Third Copy +
Because a file system is created on a logical volume, you need to expand the capacity of
the logical volume before the file system can be expanded. The capacity of the logical
volume must not be smaller than that of the file system. Otherwise, the file system will
fail to be expanded. In the example of this section, the capacity of the file system will be
expanded to 48 GB. First, you need to adjust the maximum number of logical partitions
to ensure that the capacity of the logical volume is not smaller than 48 GB. For example,
if the capacity of the file system needs to be expanded to 48 GB (49,152 MB), the
maximum number of logical partitions must be not smaller than 1536 (49,152/32).
7. After modifying the parameter, press Enter.
COMMAND STATUS
As shown in the command output, the capacity of the file system has been expanded to
48 GB.
2. Run mount /mnt/lv1 to mount the file system again.
----End
Prerequisites
l A LUN has been expanded on the storage system.
l Services on the LUN to be expanded have been stopped.
Context
In the example of the section, the capacity of the LUN will be expanded from 25 GB to 50
GB and its mount directory is /test/.
Procedure
Step 1 Scan for LUNs on the HP-UX-based application server.
1. Run ioscan command to scan for hardware.
2. Run ioscan -funNC disk to view information about detected LUNs.
bash-3.2# ioscan -funNC disk
Class I H/W Path Driver S/W State H/W Type Description
===================================================================
disk 2 64000/0xfa00/0x0 esdisk CLAIMED DEVICE HP
DG146ABAB4
/dev/disk/disk2 /dev/disk/disk2_p1 /dev/rdisk/
disk2 /dev/rdisk/disk2_p1
disk 3 64000/0xfa00/0x1 esdisk CLAIMED DEVICE HP
DG146ABAB4
/dev/disk/disk3 /dev/disk/disk3_p1 /dev/disk/
disk3_p2 /dev/disk/disk3_p3 /dev/rdisk/disk3 /dev/rdisk/disk3_p1 /dev/
rdisk/disk3_p2 /dev/rdisk/disk3_p3
disk 5 64000/0xfa00/0x2 esdisk CLAIMED DEVICE TEAC DV-28E-V
/dev/disk/disk5 /dev/rdisk/disk5
disk 399 64000/0xfa00/0x90 esdisk CLAIMED DEVICE HUAWEI S2600T
/dev/disk/disk399 /dev/rdisk/disk399
In this example, /dev/disk/disk399 indicates the device file of the LUN mapped to the
application server.
NOTE
If the operating system is HP-UX 11i v2 or HP-UX 11i v1, run the ioscan -funC disk command to view
LUNs detected by the application server.
Step 2 Run umount /test/ to unmount the file system of the LUN.
Step 3 Run extendfs -F vxfs /dev/disk/disk399 to expand the file system of the LUN.
Step 4 Run mount /dev/disk/disk399 /test/ to mount the file system of the LUN.
Step 5 Run bdf to view the file system capacity after it is expanded.
bash-3.2# bdf
Filesystem kbytes used avail %used Mounted on
/dev/vg00/lvol3 1048576 920416 127376 88% /
/dev/vg00/lvol1 1835008 368824 1454800 20% /stand
/dev/vg00/lvol8 8912896 2309816 6552824 26% /var
/dev/vg00/lvol7 6553600 3012368 3513640 46% /usr
/dev/vg00/lvol4 524288 23504 497008 5% /tmp
/dev/vg00/lvol6 7864320 4358216 3479048 56% /opt
/dev/vg00/lvol5 131072 64088 66464 49% /home
/dev/disk/disk399 52428800 79504 49077472 0% /test
The preceding command output displays that the capacity of the file system becomes 50 GB.
----End
Prerequisites
A LUN has been expanded on the storage system.
Context
In this example of the section, the capacity of the LUN to be expanded is 25 GB and it will be
expanded to 50 GB. The ID of the LUN to be expanded is 14.
Procedure
Step 1 In vSphere Client, click the Configuration tab.
On the Devices page, view the device mapped from the LUN to be expanded on the
application server, as shown in Figure 8-5.
Figure 8-5 Device mapped from the LUN to be expanded on the application server
l If the task status is Completed as shown in Figure 8-8, the scanning is completed.
Figure 8-9 Device mapped from the LUN to be expanded on the application server
Step 7 Right-click the datastore corresponding to the LUN to be expanded, and choose Properties
from the shortcut menu.
The DataStore_Extend Properties dialog box is displayed, as shown in Figure 8-10.
Step 9 Select the datastore corresponding to the LUN to be expanded and click Next.
Step 11 Set the size of the expansion data area. The maximum storage space is recommended, as
shown in Figure 8-12. Click Next.
----End
Result
l On the Datastores tab of Storage page, view the expanded datastore, as shown in
Figure 8-13.
Figure 8-13 Datastore mapped from the expanded LUN on the application server
l On the Devices tab of Storage page, view the expanded device, as shown in Figure
8-14.
Figure 8-14 Device mapped from the expanded LUN on the application server
Procedure
Step 1 Go to the Modify Mapping View dialog box.
Step 2 Optional: Modify the LUN group mapping in the mapping view.
1. Click .
The Select LUN Group dialog box is displayed.
NOTE
If your service requires a new LUN group, click Create to create one.
2. From the LUN group list, select the LUN group you want to add to the mapping view.
NOTE
To facilitate locating the LUN group, select Shows only the LUN groups that do not belong to any
mapping view in the lower left corner of the dialog box.
3. Optional: Select Set Host LUN ID, in Start ID, select an ID.
NOTE
Step 3 Optional: Modify the host group mapping in the mapping view.
1. Click .
The Select Host Group dialog box is displayed.
NOTE
If your service requires a new host group, click Create to create one.
2. From the host group list, select the host group you want to add to the mapping view.
3. Click OK.
Step 4 Optional: Modify the port group mapping in the mapping view.
1. Select the port group.
2. Click .
The Select Port Group dialog box is displayed.
NOTE
If your service requires a new port group, click Create to create one.
3. From the port group list, select the port group you want to add to the mapping view.
4. Click OK.
----End
Procedure
Step 1 Go to the Add Object dialog box.
Step 2 Select the LUN or snapshot you want to add to the LUN group.
NOTE
To facilitate locating the LUN, select Shows only the LUNs that do not belong to any LUN group in
the lower left corner of the dialog box.
Step 3 Click Right Arrow and add a LUN or snapshot to Selected LUNs or Selected Snapshots.
----End
Procedure
Step 1 Go to the Remove Object dialog box.
Step 2 Select the LUN or snapshot you want to remove from the LUN group.
Step 3 Click Right Arrow and add a LUN or snapshot to Selected LUNs or Selected Snapshots.
----End
Procedure
Step 1 Go to the Host Group page.
l When adding a host, if hosts belong to different clusters, data access conflict may occur and cause
data loss.
l When adding a host, to facilitate locating the host, select Shows only the hosts that do not belong
to any host group in the lower left corner of the dialog box.
----End
Precautions
l Physical ports are bonded to create a bond port that cannot be added to the port group.
l After the physical ports that are bonded are added to the port group, the port mapping
does not take effect.
Procedure
Step 1 Go to the Add Port management page.
Step 2 From the Available Ports list, select the ports you want to add.
Step 3 Click Right Arrowto move the ports to the Selected Ports.
----End
Procedure
Step 1 Go to the Remove Port management page.
Step 2 From the Added Ports list, select the ports you want to remove.
Step 3 Click Right Arrow to move the ports to the To-Be-Removed Ports.
----End
Context
The system provides the following two methods of data sanitation:
l DoD: The system overwrites a LUN in accordance with US Department of Defense
(DoD) Standards to destroy source data.
l Customize: The system overwrites a LUN according to the configured overwrite times.
Precautions
l The LUN to be destroyed must be a thick LUN. A thin LUN cannot be fully destroyed
because of capacity-on-write and space release.
Procedure
Step 1 Go to the Create SmartErase Task dialog box.
If you want to stop the ongoing data sanitation, right-click the LUN and choose Delete SmartErase
Task.
1. Click OK.
The Warning dialog box is displayed.
2. Carefully read the content in the dialog box. Then select I have read and understood
the consequences associated with performing this operation. for confirmation.
3. Click OK.
The Success message box is displayed, indicating that the operation succeeded.
4. Click OK.
----End
Context
Deleting this LUN is recommended since keeping this LUN for value-added services may
cause service abnormalties after you have deleted the SmartErase task. Before deleting this
LUN, check that the data on it is of no use or has been backed up.
Procedure
Step 1 Go to the LUN management page.
1. Select the LUN whose SmartErase task you want to delete and choose More > Delete
SmartErase Task.
The Warning dialog box is displayed.
2. Carefully read the content of the dialog box. Then click the check box next to the
statement I have read and understood the consequences associated with performing
this operation. to confirm the information.
3. Click OK.
The Execution Result dialog box is displayed, indicating that the operation succeeded.
4. Click Close.
----End
Prerequisites
l If a Fibre Channel network is used, ensure that the world wide name (WWN) of a Fibre
Channel initiator has been obtained.
l If an Internet Small Computer Systems Interface (iSCSI) network is used, ensure that the
iSCSI qualified name (IQN) of an iSCSI initiator has been obtained.
l The UltraPath software has been installed on the host.
Procedure
Step 1 On the storage system, obtain the WWN of the LUN mapped to the host.
1. Log in to the command-line interface (CLI) of the storage system as a super
administrator.
2. Run show initiator initiator_type=? [ wwn=? | iscsi_iqn_name=? ] to show the host
corresponding to the WWN or iSCSI IQN.
Parameter Description Value
WWN : 21000024ff53b640
Running Status : Online
Free : Yes
Alias : suse2_01
Host ID : 2
Multipath Type : Default
The value of LUN ID is the ID of a LUN mapped to the host in the storage system.
4. Run the show lun general lun_id=? command to view the WWN of the LUN mapped to
the host.
Step 2 On the storage system, view the WWNs of vLUNs.
1. Log in to the CLI of UltraPath on the host.
2. On the host where UltraPath is installed, run show vlun to view the WWN of a disk on
the host.
NOTE
Step 3 Check whether the WWN of the LUN mapped to the host and that of the host disk are the
same. If they are, the LUN is just the one corresponding to the host disk.
NOTE
For details about related commands, see OceanStor 5300 V3&5500 V3&5600 V3&5800 V3&6800
V3&6900 V3 Storage System V300R001 Command Reference.
----End
Prerequisites
The UltraPath software has been installed on the host.
Procedure
Step 1 Log in to the CLI of UltraPath on the host.
NOTE
l If UltraPath is installed on a Windows/Linux/AIX operating system, see the UltraPath User Guide
for that specific operating system to know how to use the show vlun command.
l If the operating system is HP-UX where the Native Multi-Pathing (NMP) software is installed, run
scsimgr lun_map to show a disk on the host.
The following is the disk path information on an AIX host queried by the UltraPath software:
UltraPath CLI #11 >show path
----------------------------------------------------------------------------------
-----------------------------------------------------
Vlun ID Path ID PhyPath ID Initiator Port Array Name Controller
Target Port Path State Port Type Port ID
2 0 0 10000090fa1c6b8c Huawei.Storage 2A
20080022a10e6421 Enabled FC ENG2.A1.P0
2 1 1 10000090fa1c6b8c Huawei.Storage 3B
2210200bc71fa9bd Enabled FC ENG3.B2.P0
2 2 2 10000090fa1c6b8d Huawei.Storage 0A
2400200bc71fa9be Enabled FC ENG0.A4.P0
2 3 3 10000090fa1c6b8d Huawei.Storage 1B
2210333533383336 Enabled FC ENG1.B2.P0
3 0 0 10000090fa1c6b8c Huawei.Storage 2A
20080022a10e6421 Enabled FC ENG2.A1.P0
3 1 1 10000090fa1c6b8c Huawei.Storage 3B
2210200bc71fa9bd Enabled FC ENG3.B2.P0
3 2 2 10000090fa1c6b8d Huawei.Storage 0A
2400200bc71fa9be Enabled FC ENG0.A4.P0
3 3 3 10000090fa1c6b8d Huawei.Storage 1B
2210333533383336 Enabled FC ENG1.B2.P0
4 0 0 10000090fa1c6b8c Huawei.Storage 2A
20080022a10e6421 Enabled FC ENG2.A1.P0
4 1 1 10000090fa1c6b8c Huawei.Storage 3B
2210200bc71fa9bd Enabled FC ENG3.B2.P0
4 2 2 10000090fa1c6b8d Huawei.Storage 0A
2400200bc71fa9be Enabled FC ENG0.A4.P0
4 3 3 10000090fa1c6b8d Huawei.Storage 1B
2210333533383336 Enabled FC ENG1.B2.P0
----------------------------------------------------------------------------------
-----------------------------------------------------
where Initiator Port indicates the WWN of the host HBA, Array Name indicates the storage
device where the LUN mapped to the host resides, and Target Port indicates the WWN of the
Fibre Channel port on the storage device.
----End
Prerequisites
The IP address of an Ethernet port has been configured.
NOTE
l In redundant links, you must configure IP addresses and route for multiple Ethernet ports.
l When a domain controller exists, ensure that the logical IP addresses, domain controller, and DNS can
ping each other. If they cannot ping each other, add the logical IP addresses to the network segment route
between the domain controller and the DNS.
l When configuring NFS share access, if the NFS clients and logical IP addresses cannot ping each other,
add the logical IP addresses to the network segment route between the NFS clients.
Procedure
Step 1 Go to the Route Management dialog box.
NOTICE
The default IP addresses of the internal heartbeat on the system are 127.127.127.1X.
Therefore, the IP address of the router cannot fall within the 127.127.127.XXX segment.
Besides, the IP address of the gateway cannot be 127.127.127.1X. Otherwise, routing
will fail. (Internal heartbeat links are established between controllers for these controllers
to detect each other's working status. You do not need to separately connect cables. In
addition, internal heartbeat IP addresses have been assigned before delivery, and you
cannot change these IP addresses).
Default route
Data is forwarded through this route by default if no preferred route is available.
The target address field and the target mask field (IPv4) or prefix (IPv6) of the
default route are automatically set to 0. To use this option, you only need to add a
gateway.
Host route
The host route is the route to an individual host. The target mask (IPv4) or prefix
(IPv6) of the host route are automatically set respectively to 255.255.255.255 or
128. To use this option, you only need to add the target address and a gateway.
Network segment route
The network segment route is the route to a network segment. You need to add the
target address, target mask (IPv4) or prefix (IPv6), and gateway.
4. Add Destination address.
If IP address is an IPv4 address, set Destination address to the IPv4 address or
network segment of the application server's service network port or the IPv4
address or network segment of the storage device's Ethernet port.
If IP address is an IPv6 address, set Destination address to the IPv6 address or
network segment of the application server's service network port or the IPv6
address or network segment of the storage device's Ethernet port.
5. Add Destination mask (IPv4) or Prefix (IPv6).
Add Destination mask for an IPv4 address. This parameter specifies the subnet
mask of the IP address for the service network port on the application server or on
the storage device that connects to the Ethernet port.
Add Prefix for an IPv6 address. This parameter specifies the prefix to the IPv6
address of the host's service network port or the prefix to the IPv6 address of the
storage device's Ethernet port.
6. In Gateway, enter the gateway where the local end Ethernet port's IP address resides.
Step 3 Click OK. The route information is added to the route list.
The Danger dialog box is displayed.
Step 4 Confirm the information in the dialog box and select I have read and understood the
consequences associated with performing this operation.
The Success message box is displayed, indicating that the operation succeeded.
NOTE
----End
Prerequisites
l The storage system supports bonding Ethernet ports.
l Given bonding Ethernet ports interrupts ongoing services, you must stop any services
running on the Ethernet ports that you want to bond.
Precautions
l After Ethernet ports are bound, the IP address assigned to each separate Ethernet port is
deleted. You need to assign an IP address to the bound Ethernet port.
l After a bonding is complete, MTU (Byte) of the bonded host ports becomes 1500.
l After bonding, the mode of all switch ports connected to the Ethernet port must be
configured to 802.3AD LACP.
l Bonding Ethernet ports is not available to read-only users.
l Physical ports are bonded to create a bond port that cannot be added to the port group.
l After the physical ports that are bonded are added to the port group, the port mapping
does not take effect.
Procedure
Step 1 Go to the Bond dialog box.
Step 2 Set the bonding name and available ports for the Ethernet port.
1. In Bond Name, enter a name for the port to be bound.
The name:
Can contain only letters, digits, periods (.), underscores (_), and hyphens (-).
Contains 1 to 31 characters.
2. From the Available Ports list, select the Ethernet ports you want to bond with the
current Ethernet port.
3. Click OK.
The Danger dialog box is displayed.
----End
Prerequisites
Given unbinding Ethernet ports interrupts ongoing services, you must stop any services
running on the Ethernet ports that you want to unbind.
Precautions
After an unbinding is complete, the IP addresses of the unbound Ethernet ports are cleared.
Procedure
Step 1 Go to the page for canceling Ethernet port bonding.
----End
Precautions
l Given changing the IP address of an Ethernet port interrupts services, check that the
storage device is connected in a redundant way; otherwise, stop services running on the
storage device first. Do not change the IP address of the Ethernet port unless you are
asked to.
l The IP addresses of the ethernet port and internal heartbeat must be on different network
segments. The default IP addresses of the internal heartbeat on the storage system are
127.127.127.1X. (Internal heartbeat links are established between controllers for these
controllers to detect each other's working status. You do not need to separately connect
cables. In addition, internal heartbeat IP addresses have been assigned before delivery,
and you cannot change these IP addresses).
l The IP address of an Ethernet port cannot be in the same network segment as that of a
management network port.
l The IP address of the Ethernet port cannot be in the same network segment as that of a
maintenance network port.
l If the Ethernet port connects to an application server, the IP address of the Ethernet port
must be in the same network segment as that of the service network port on the
application server. If the Ethernet port connects to another storage device, the IP address
of the Ethernet port must be in the same network segment as that of the peer Ethernet
port on the other storage device. Add routes if available IP addresses become insufficient
for a network segment that you want to add an IP address to.
Procedure
Step 1 Go to the Ethernet Port dialog box.
----End
Context
Note the following when you modify Fibre Channel ports:
l If the storage device connects to an application server through a Fibre Channel port,
ensure that the rate of the Fibre Channel port on the storage device is the same as that of
the peer host bus adapter (HBA) port on the application server.
l When two storage devices connect to each other through Fibre Channel ports, ensure that
the rates of the Fibre Channel ports on both storage device are the same.
l Given modifying the Fibre Channel ports interrupts the communication between the
storage device and application servers, do not modify any Fibre Channel port settings
when ongoing services are present on the storage device.
Procedure
Step 1 Go to the FC port dialog box.
NOTICE
l The rate and mode of the Fibre Channel port on a storage system must be consistent with
those of the Fibre Channel HBA on the peer application server. If the rates and modes are
inconsistent, the communication fails.
l The rate and mode of the Fibre Channel ports on two storage systems that are connected to
each other must be consistent. If the rates and modes are inconsistent, the communication
fails.
Available rates of a Fibre Channel port are 2 Gbit/s, 4 Gbit/s, 8Gbit/s, 16Gbit/s and
Autonegotiation. Select a fixed value after learning the rate of the peer Fibre Channel port.
NOTE
l If the configured maximum rate of the port is 4 Gbit/s, you can set the value to be 2 Gbit/s or 4
Gbit/s.
l If the configured maximum rate of the port is 8 Gbit/s, you can set the value to be 2 Gbit/s, 4 Gbit/s,
or 8 Gbit/s.
l If the configured maximum rate of the port is 16 Gbit/s, you can set the value to be 4 Gbit/s, 8
Gbit/s, or 16 Gbit/s.
l If the configured rate of the port is Autonegotiation, the rate of the peer FC port can automatically
adjust. If adaptive rate mismatch occurs , please change the port rate to another value.
----End
Procedure
Step 1 Go to the iSCSI Settings page.
4. Click Save.
The Execution Result dialog box is displayed, indicating that the operation succeeded.
5. Click Close.
----End
Context
The traditional device-by-device mode used to configure and manage devices on a storage
network requires each storage device be configured with an initiator and a target separately.
This costs high management and maintenance expenses. After configuring the Internet
Storage Name Service (iSNS), you do not need to manually configure each initiator or the
initiator list for each storage device. Instead, the iSNS server takes over the initiator detection
and management work, greatly reducing the management and maintenance costs.
Procedure
Step 1 Go to the iSCSI configuration page.
----End
storage device, the IP addresses of management network ports on controller modules must be
on the same network segment as that of the maintenance terminal.
Prerequisites
The maintenance terminal has been connected to the serial port on the storage device through
a serial cable.
Precautions
When changing the IP address of the management network port, note the following:
l The maintenance terminal and storage device must be interconnected through a serial
port.
l For a 2 U controller enclosure (5300 V3/5500 V3), the default IP addresses of the
management network ports on controllers A and B are respectively 192.168.128.101 and
192.168.128.102, and the default subnet mask is 255.255.0.0. For a 3 U or 6 U controller
enclosure (5600 V3/5800 V3/6800 V3), the default IP addresses of the management
network ports on management modules 0 and 1 are respectively 192.168.128.101 and
192.168.128.102, and the default subnet mask is 255.255.0.0.
l The IP addresses of both management network ports and those of internal heartbeat IP
addresses or iSCSI host ports must be on different network segments. Otherwise, route
conflicts may occur. The default internal heartbeat IP addresses are 127.127.127.10 and
127.127.127.11 for a dual-controller storage system and are 127.127.127.10,
127.127.127.11, 127.127.127.12, and 127.127.127.13 for a four-controller storage
system, and the subnet mask is 255.255.255.0. Therefore, for a dual-controller system,
you cannot use IP addresses that belong to the 127.127.127.XXX network segment. For
a four-controller storage system, you cannot set IP addresses that belong to the
127.127.127.XXX, 172.16.126.XXX, 172.16.127.XXX, and 172.16.128.XXX network
segments.
NOTE
l Heartbeats are the packets, requiring no acknowledgement, transmitted between two devices.
The device can judge the validity status of the peer device. Heartbeat supports node
communication, fault diagnosis, and event triggering.
l Internal heartbeat links are established between controllers for these controllers to detect each
other's working status. You do not need to separately connect cables. In addition, internal
heartbeat IP addresses have been assigned before delivery, and you cannot change these IP
addresses.
l The IP addresses of both management network ports and those of maintenance network
ports must be on different network segments. Otherwise, route conflicts may occur. The
default IP addresses of maintenance network ports are 172.31.128.101 and
172.31.128.102, and the subnet mask is 255.255.0.0. You cannot use IP addresses that
belong to the 172.31.XXX.XXX. You are advised to only connect the management
network port to the network.
l Make sure that the IP addresses of the management network ports on both controllers are
in the same network segment.
Context
After connecting the controller enclosure to the maintenance terminal by using a network
cable, you can log in to the storage system by using any type of remote login software (This
document uses the PuTTY software as an example).
NOTE
l This document uses the PuTTY software as an example. You can download the PuTTY software
from the http://www.chiark.greenend.org.uk.
l You are advised to use the latest version of PuTTY, otherwise you may fail to log in to the storage
system.
Procedure
Step 1 Run PuTTY.
The PuTTY Configuration dialog box is displayed, as show in Figure 8-15.
Step 2 Set Connection type to Serial. In the Serial line text box, enter the name of the serial port
that connects the maintenance terminal to the storage system, for example, COM1. In Speed,
enter 115200.
You can query the serial port that connects the maintenance terminal to the storage system as
follows (Windows 7 is used as an example):
1. Right-click the icon of Computer on the desktop of the maintenance terminal and
choose Manage from the shortcut menu.
2. In the navigation tree of the Computer Manager dialog box, choose System Tools >
Device Manager.
3. Click Ports. The serial port that connects the maintenance terminal to the storage
system, for example, COM1.
There may be multiple serial port names, such as COM1, COM2, and COM3, on the
maintenance terminal. Try these ports until you can successfully log in to the storage
system.
Step 3 Log in to the serial port.
1. Click Open.
If the connectivity between the maintenance terminal and controller is normal,
information similar to Figure 8-16 is displayed.
Figure 8-16 Successful connection between the controller and the maintenance terminal
The default user name for the storage system is admin, and the password is Admin@storage.
You must change the default login password immediately after you have logged in to the
storage system for the first time and periodically change your login password in the future.
This reduces the password leakage risks. For details about how to change a password, see
OceanStor 5300 V3&5500 V3&5600 V3&5800 V3&6800 V3&6900 V3 Storage System
V300R001 Maintenance Guide.
For security reasons, entering a password displays no local echo.
NOTE
When you log in to different devices, the login page displays different values. Obtain the correct
value based on actual conditions.
NOTICE
Ensure that the IP addresses of the two management network ports have been modified.
Run the change system management_ip command to change the IP address of the port, as
shown in Table 8-4.
For example:
Set the IPv4 address, subnet mask, and gateway of management module 0 to 172.16.190.2,
255.255.0.0, and 172.16.0.1.
admin:/>change system management_ip eth_port_id=CTE0.SMM0.MGMT0
ip_type=ipv4_address ipv4_address=172.16.190.2 mask=255.255.0.0
gateway_ipv4=172.16.0.1
WARNING: You are going to modify the network address of network port. If you
enter an unavailable network address, the O&M interface of the storage system is
inaccessible.
Suggestion: Before you perform this operation, ensure that you have entered an
available network address.
NOTE
----End
If all or some services of a storage system do not need to be running anymore, or some
expanded space is unused, you can reclaim the space used by these services or the unused
space and then use the space for new services, thereby enhancing storage space utilization.
Based on the range of reclaimed space, space reclamation can be classified into full
reclamation and partial reclamation. The major procedure of space reclamation is shown in
Figure 9-1 and Figure 9-2.
NOTICE
Before a space reclamation, ensure that the space to be reclaimed does not need to be used
anymore and data has been backed up, to avoid the data loss during space reclamation.
Start
Applicable to Windows,
Restart the host.
Linux and AIX hosts.
Start
Procedure
Step 1 Confirm the range of to-be-reclaimed storage space and back up disk information.
1. Confirm whether it is full reclamation or partial reclamation.
2. Back up disk Information.
a. Log in to the Windows Server 2008 application server as an administrator.
b. Press Windows+R (if the operation is performed remotely, perform it in full screen
mode) to open the Run dialog box.
c. Type diskmgmt.msc and press Enter.
d. In the Disk Management page that is displayed, view the host disk information.
3. Make sure that the to-be-reclaimed disk will not be used anymore.
Step 3 Check the storage system status. If there are alarms, clear them and then proceed to the next
step.
Step 4 On the storage system, export the storage system configuration data.
1. Log in to the command-line interface (CLI) of the storage system using PuTTY.
NOTE
The default user name and password are admin and Admin@storage respectively.
2. Run export running_data to export and save the current configuration file.
Step 5 Check the status of the connection between the host HBA and the storage device.
1. As planned, check whether the two devices (the HBA and the storage device) are
connected and whether the zoning on the switch is correct by using the WWN of the host
HBA and the front-end port of the storage device.
2. Run show port general to check whether the planned front-end network is connected.
Specify the front-end port using the port_id parameter.
If the planned front-end network is connected, its Type is Host Port and its Running
status is Link up.
3. Run show initiator initiator_type=FC isfree=yes to check whether the storage device
can query the initiator on the host and filter out initiators that are not assigned to the host.
In the command output, the planned HBA should exist and its running status should be
Online.
admin:/>show initiator initiator_type=FC isfree=yes
WWN Running Status Free Alias Host
ID Multipath Type
----------------- ------------------- ----- -------
---------- ------------------
100000000000* Online Yes --
-- Default
----End
Full Reclamation
Step 1 Reclaim the World Wide Name (WWN).
1. Run show mapping_view general to query the ID of a host group in a mapping view to
be reclaimed. Specify which mapping view to reclaim using the mapping_view_id
parameter.
2. Obtain the information about hosts and initiators in the to-be-reclaimed host group.
a. Run show host_group host to show the host that has been added to the to-be-
reclaimed host group. Specify the ID of the to-be-reclaimed host group using the
mapping_view_id parameter.
b. Run show initiator to view the WWN about the host HBA that has been added to
the to-be-reclaimed host group. Specify the ID of the host in the to-be-reclaimed
host group using the host_id parameter.
3. Run remove host initiator initiator_type=FC to remove the WWN. Specify which WWN
to reclaim using the wwn parameter.
4. Run show initiator isfree=yes initiator_type=FC to check whether the WWN is
successfully deleted.
If the deleted WWN exists in the command output, the deletion is successful.
admin:/>show
initiator isfree=yes initiator_type=FC WWN Running
Status Free Alias Host ID Multipath Type
----------------- ------------------- ----- -------
---------- ------------------ 100000000000* Online
Yes -- -- Default
4. Run delete host to delete a to-be-reclaimed host. Specify the to-be-reclaimed host using
the host_id parameter.
Step 7 Scan for disks on the host.
1. Press Windows+R (if the operation is performed remotely, perform it in full screen
mode) to open the Run dialog box.
2. Type devmgmt.msc and press Enter.
3. In the Device Manager window that is displayed, click View and select Show hidden
devices.
4. Right-click Disk Drives and choose Scan for hardware changes to start scanning.
5. Check whether the number of newly generated UltraPath_Disks is the same as the
number of mapped LUNs. If they are different, check the LUN mapping and path
connection status on the storage device.
6. Check whether the number of newly generated SCSI disks (SCSI Disk Devices on the
Huawei storage device) doubles or quadruples the number of UltraPath_Disks in Step
7.5. If not, check the LUN mapping and path connection status on the storage device.
Step 8 Uninstall UltraPath.
1. Press Windows+R (if the operation is performed remotely, perform it in full screen
mode) to open the Run dialog box.
2. Type appwiz.cpl and press Enter.
The Programs and Features page is displayed.
3. Right-click UltraPath and choose Uninstall from the shortcut menu.
4. Follow the wizard until UltraPath is uninstalled.
Step 9 Run shutdown -r -t 0 to restart the host.
----End
Partial Reclamation
Step 1 Remove the to-be-reclaimed LUN from the owning LUN group.
1. Run show mapping_view general to obtain the details about the to-be-reclaimed
mapping view. Specify the mapping view using the mapping_view_id parameter.
2. Run remove lun_group lun to remove the to-be-reclaimed LUN from the LUN group.
Specify the LUN group and to-be-reclaimed LUN using the lun_group_id and
lun_id_list parameters.
3. Run show lun_group lun to check whether the to-be-reclaimed LUN has been deleted
from the LUN group successfully. Specify the LUN group using the lun_group_id
parameter.
The deleted LUN should not exist in the command output.
admin:/>show lun_group lun lun_group_id=LGID
ID Name Pool ID Capacity Helth Status Running
Status Type WWN
---- --------- ---------- ------------- ---------------
------------------- ------- ---------------------------------
1 LUN1 0 1.000TB Normal
Online Thin 60022a11000******************
1. Press Windows+R (if the operation is performed remotely, perform it in full screen
mode) to open the Run dialog box.
2. Type devmgmt.msc and press Enter.
3. In the Device Manager window that is displayed, click View and select Show hidden
devices.
4. Right-click Disk Drives and choose Scan for hardware changes to start scanning.
5. Check whether the number of newly generated UltraPath_Disks is the same as the
number of mapped LUNs. If they are different, check the LUN mapping and path
connection status on the storage device.
6. Check whether the number of newly generated SCSI disks (SCSI Disk Devices on the
Huawei storage device) doubles or quadruples the number of UltraPath_Disks in Step
2.5. If not, check the LUN mapping and path connection status on the storage device.
----End
Procedure
Step 1 Confirm the range of to-be-reclaimed storage space and back up disk information.
1. Confirm whether it is full reclamation or partial reclamation.
2. Run vgdisplay -v, pvdisplay, and fdisk -l to view volume group (VG), physical volume
(PV), and disk information. Back up the information.
3. Make sure that the to-be-reclaimed disk will not be used anymore.
a. Run upadmin show vlun to view the mappings between the to-be-reclaimed LUN
and the disk on the host.
b. Run vgdisplay -v and make sure that the to-be-reclaimed disk is not in a VG.
----End
Full Reclamation
Step 1 Reclaim the World Wide Name (WWN).
1. Run show mapping_view general to obtain the host group ID in the mapping view to be
reclaimed. Specify the mapping view using the mapping_view_id parameter.
2. Obtain the information about hosts and initiators in the to-be-reclaimed host group.
a. Run show host_group host to show the host that has been added to the to-be-
reclaimed host group. Specify the ID of the to-be-reclaimed host group using the
mapping_view_id parameter.
b. Run show initiator to view the WWN about the host HBA that has been added to
the to-be-reclaimed host group. Specify the ID of the host in the to-be-reclaimed
host group using the host_id parameter.
3. Run remove host initiator initiator_type=FC to remove the WWN. Specify the to-be-
reclaimed WWN using the wwn parameter.
4. Run show initiator isfree=yes initiator_type=FC to check whether the WWN is
successfully deleted.
If the deleted WWN exists in the command output, the deletion is successful.
admin:/>show initiator isfree=yes initiator_type=FC
WWN Running Status Free Alias Host
ID Multipath Type
----------------- ------------------- ----- -------
---------- ------------------
100000000000* Online Yes --
-- Default
2. Run delete port_group to delete a port group. Specify the to-be-reclaimed port group
using the port_group_id parameter.
2. Run upadmin show vlun to check whether the number of disks managed by UltraPath is
the same as planned.
3. Run upadmin show path to check whether the disk path status is normal. If the status of
a path is Degrade, run upadmin set phypathnormal to set the path to Normal. In the
command, set path_id to the ID of the Degrade path.
----End
Partial Reclamation
Step 1 Remove the to-be-reclaimed LUN from the owning LUN group.
1. Run show mapping_view general to obtain the details about the to-be-reclaimed
mapping view. Specify the mapping view using the mapping_view_id parameter.
2. Run remove lun_group lun to remove the to-be-reclaimed LUN from the LUN group.
Specify the LUN group and to-be-reclaimed LUN using the lun_group_id and
lun_id_list parameters.
3. Run show lun_group lun to see whether the to-be-reclaimed LUN has been removed
from the LUN group. Specify the LUN group where the to-be-claimed LUN resides
using the lun_group_id parameter.
The deleted LUN should not exist in the command output.
admin:/>show lun_group lun lun_group_id=LGID
ID Name Pool ID Capacity Helth Status Running
Status Type WWN
---- ------------- ---------- ------------- ---------------
------------------- ------- ---------------------------------
1 LUN1 0 1.000TB Normal
Online Thin 60022a11000******************
2. Run upadmin show vlun to check whether the number of disks managed by UltraPath is
the same as planned.
3. Run upadmin show path to check whether the disk path status is normal. If the status of
a path is Degrade, run upadmin set phypathnormal to set the path to Normal. In the
command, set path_id to the ID of the Degrade path.
----End
Procedure
Step 1 Confirm the range of to-be-reclaimed storage space and back up disk information.
1. Confirm whether it is full reclamation or partial reclamation.
2. Run lsvg, lspv and lsdev -Cc disk to view volume group (VG), physical volume (PV),
and disk information. Back up the information.
3. Confirm that the to-be-reclaimed disk will not be used anymore.
a. Run upadm show vlun to view the mappings between the to-be-reclaimed LUN
and the disk on the host.
b. Run lspv and make sure that the to-be-reclaimed disk is not in a VG.
1. Run errpt to check whether there are any errors on the host. Remove the errors before
proceeding to the next step.
2. Check the disk path status.
a. Run upadm show vlun to query the status of all vLUNs. Confirm that the status of
all vLUNs is Normal.
b. Run upadm show path. Check whether the system path status is Normal. If the
status of a path is Degrade, run upadm set phypathnormal. Specify the path using
the path_id parameter.
Step 3 Check the storage system status. If there are alarms, clear them and then proceed to the next
step.
Step 4 On the storage system, export the storage system configuration data.
1. Log in to the command-line interface (CLI) of the storage system using PuTTY.
NOTE
The default user name and password are admin and Admin@storage respectively.
2. Run export running_data to export and save the current configuration file.
Step 5 Check the status of the connection between the host HBA and the storage device.
1. As planned, check whether the two devices (the HBA and the storage device) are
connected and whether the zoning on the switch is correct by using the WWN of the host
HBA and the front-end port of the storage device.
2. Run show port general to check whether the planned front-end network is connected.
Specify the front-end port using the port_id parameter.
If the planned front-end network is connected, its Type is Host Port and its Running
status is Link up.
3. Run show initiator initiator_type=FC isfree=yes to check whether the storage device
can query the initiator on the host and filter out initiators that are not assigned to the host.
In the command output, the planned HBA should exist and its running status should be
Online.
admin:/>show initiator initiator_type=FC isfree=yes
WWN Running Status Free Alias Host
ID Multipath Type
----------------- ------------------- ----- -------
---------- ------------------
100000000000* Online Yes --
-- Default
----End
Full Reclamation
Step 1 Delete a disk device.
1. Run upadm show vlun and lsdev -Cc disk to show all LUNs and disks on the host.
2. Run rmdev -dl hdiskX to delete the aggregation device composed of the disks to be
reclaimed. hdiskX represents the aggregation device.
3. Run upadm show path and view the result in Step 1.1 to check whether the aggregation
device has been deleted.
4. Run lsdev -Cc disk and lsdev -Cc disk | wc -l and view the result in Step 1.1 to check
whether the device path file has been deleted.
Step 2 Reclaim the World Wide Name (WWN).
1. Run show mapping_view general to obtain the host group ID in the mapping view to be
reclaimed. Specify the mapping view using the mapping_view_id parameter.
2. Obtain the information about hosts and initiators in the to-be-reclaimed host group.
a. Run show host_group host to show the host that has been added to the to-be-
reclaimed host group. Specify the ID of the to-be-reclaimed host group using the
mapping_view_id parameter.
b. Run show initiator to view the WWN about the host HBA that has been added to
the to-be-reclaimed host group. Specify the ID of the host in the to-be-reclaimed
host group using the host_id parameter.
3. Run remove host initiator initiator_type=FC to remove the WWN. Specify the to-be-
reclaimed WWN using the wwn parameter.
4. Run show initiator isfree=yes initiator_type=FC to check whether the WWN is
successfully deleted.
If the deleted WWN exists in the command output, the deletion is successful.
admin:/>show initiator isfree=yes initiator_type=FC WWN
Running Status Free Alias Host ID
Multipath Type ----------------- -------------------
----- ------- ---------- ------------------ 100000000000*
Online Yes -- --
Default
The deleted mapping view should not exist in the command output.
7. In DeviceManager, view all mapping views. The deleted mapping view should not exist.
Step 5 Delete a LUN Group
1. Run remove lun_group lun to remove all LUNs in the LUN group. Specify the to-be-
reclaimed LUN group and the to-be-removed LUN using the lun_group_id and
lun_id_list parameters.
2. Run delete lun_group to delete a LUN group. Specify the to-be-reclaimed LUN group
using the lun_group_id parameter.
Step 6 Delete a port group.
1. Run remove port_group port to remove all ports in the port group. Specify the to-be-
reclaimed port group and to-be-removed ports using the port_group_id and port_id_list
parameters.
2. Run delete port_group to delete a port group. Specify the to-be-reclaimed port group
using the port_group_id parameter.
Step 7 Delete a host group.
1. Run remove host_group host to remove all hosts in the host group. Specify the to-be-
reclaimed host group and to-be-removed hosts using the host_group_id and host_id_list
parameters.
2. Run delete host_group to delete a host group. Specify the to-be-reclaimed host group
using the host_group_id parameter.
3. Run remove host initiator initiator_type=FC to remove all initiators of the to-be-
reclaimed host. Specify the to-be-removed initiator using the wwn parameter.
4. Run delete host to delete a to-be-reclaimed host. Specify the to-be-reclaimed host using
the host_id parameter.
Step 8 Uninstall UltraPath.
1. Run lslpp -L | grep -i UltraPath to see the version of the installed UltraPath.
2. Run installp -u program_name to uninstall UltraPath, where program_name is the
name of UltraPath shown in Step 8.1.
3. Run lslpp -L | grep -i UltraPath. If the command output does not contain the UltraPath
shown in Step 8.1, the uninstallation is successful.
Step 9 Run shutdown -Fr to restart the host.
Step 10 On the switch, delete zone configurations.
----End
Partial Reclamation
Step 1 Delete a disk device.
1. Run upadm show vlun and lsdev -Cc disk to show all LUNs and disks on the host.
2. Run rmdev -dl hdiskX to delete the aggregation device composed of the disks to be
reclaimed. hdiskX represents the aggregation device.
3. Run upadm show path and view the result in Step 1.1 to check whether the aggregation
device has been deleted.
4. Run lsdev -Cc disk and lsdev -Cc disk | wc -l and view the result in Step 1.1 to check
whether the device path file has been deleted.
Step 2 Remove the to-be-reclaimed LUN from the owning LUN group.
1. Run show mapping_view general to obtain the details about the to-be-reclaimed
mapping view. Specify the mapping view using the mapping_view_id parameter.
2. Run remove lun_group lun to remove the to-be-reclaimed LUN from the LUN group.
Specify the LUN group and to-be-reclaimed LUN using the lun_group_id and
lun_id_list parameters.
3. Run show lun_group lun to see whether the to-be-reclaimed LUN has been removed
from the LUN group. Specify the LUN group where the to-be-claimed LUN resides
using the lun_group_id parameter.
The deleted LUN should not exist in the command output.
admin:/>show lun_group lun
lun_group_id=LGID ID Name Pool ID Capacity
Helth Status Running Status Type WWN ----
------------- ---------- ------------- ---------------
-------------------
------- --------------------------------- 1 LUN1
0 1.000TB Normal Online
Thin 60022a11000******************
----End
Procedure
Step 1 Confirm the range of to-be-reclaimed storage space and back up disk information.
1. Confirm whether it is full reclamation or partial reclamation.
2. Run ioscan -fnkC disk and vgdisplay -v to view information about a disk in a volume
group (VG) and back up the information.
3. Make sure that the to-be-reclaimed disk will not be used anymore.
a. Run ioscan -fnkC disk to view the mappings between the to-be-reclaimed LUN
and the disk on the host.
b. Run vgdisplay -v and make sure that the to-be-reclaimed disk is not in a VG.
Step 2 Check the host running status.
1. Run tail -200 /var/adm/syslog/syslog.log to check the host status. If an error exists on
storage device, remove it and proceed to the next step.
2. Check the disk path status.
a. Run scsimgr get_attr -a leg_mpath_enable and make sure that Native Multi-
Pathing (NMP) is enabled.
----End
Full Reclamation
Step 1 Reclaim the World Wide Name (WWN).
1. Run show mapping_view general to obtain the host group ID in the to-be-reclaimed
mapping view. Specify which mapping view to reclaim using the mapping_view_id
parameter.
2. Obtain the information about hosts and initiators in the to-be-reclaimed host group.
a. Run show host_group host to show the host that has been added to the to-be-
reclaimed host group. Specify the ID of the to-be-reclaimed host group using the
mapping_view_id parameter.
b. Run show initiator to view the WWN about the host HBA that has been added to
the to-be-reclaimed host group. Specify the ID of the host in the to-be-reclaimed
host group using the host_id parameter.
3. Run remove host initiator initiator_type=FC to remove the WWN. Specify the to-be-
reclaimed WWN using the wwn parameter.
4. Run show initiator isfree=yes initiator_type=FC to check whether the WWN is
successfully deleted.
If the deleted WWN exists in the command output, the deletion is successful.
admin:/>show initiator isfree=yes initiator_type=FC
WWN Running Status Free Alias Host
ID Multipath Type
----------------- ------------------- ----- -------
---------- ------------------
100000000000* Online Yes --
-- Default
1. Run remove port_group port to remove all ports in the port group. Specify the to-be-
reclaimed port group and to-be-removed ports using the port_group_id and port_id_list
parameters.
2. Run delete port_group to delete a port group. Specify the to-be-reclaimed port group
using the port_group_id parameter.
----End
Partial Reclamation
Step 1 Remove the to-be-reclaimed LUN from the owning LUN group.
1. Run show mapping_view general to obtain the details about the to-be-reclaimed
mapping view. Specify the mapping view using the mapping_view_id parameter.
2. Run remove lun_group lun to remove the to-be-reclaimed LUN from the LUN group.
Specify the LUN group and to-be-reclaimed LUN using the lun_group_id and
lun_id_list parameters.
3. Run show lun_group lun to see whether the to-be-reclaimed LUN has been removed
from the LUN group. Specify the LUN group where the to-be-claimed LUN resides
using the lun_group_id parameter.
The deleted LUN should not exist in the command output.
admin:/>show lun_group lun lun_group_id=LGID
ID Name Pool ID Capacity Helth Status Running
Status Type WWN
---- ------------- ---------- ------------- ---------------
------------------- ------- ---------------------------------
1 LUN1 0 1.000TB Normal
Online Thin 60022a11000******************
----End
Start
Applicable to Windows,
Reinstall UltraPath. Linux and AIX hosts.
Start
End
Supporting applications including email boxes, databases, and virtual machines, the storage
system automatically offers storage management best practices based on service
configurations.
Prerequisites
At least one Microsoft Exchange instance has been created in the storage system.
Procedure
Step 1 Go to the Microsoft Exchange management page.
Step 3 Optional: Select a Microsoft Exchange instance to view Storage Resource and Snapshot of
the instance in the Details area.
----End
Procedure
Step 1 Go to the Properties of Exchange Storage Resource page.
Step 2 Click the General tab to modify the general properties of the selected Microsoft Exchange
instance.
----End
Prerequisites
At least one Microsoft Exchange instance has been created in the storage system.
Context
After the application instance is successfully created, the system creates mapping view
xx_Mapping by default. xx indicates the instance name.
Procedure
Step 1 Go to the Properties of Exchange Storage Resource page.
Table 10-3 Parameters of the owning mapping view of a Microsoft Exchange instance
Parameter Description Value
----End
Prerequisites
l At least one Microsoft Exchange instance has been created in the storage system.
l The snapshot license is valid.
Context
The snapshot created for a Microsoft Exchange instance is actually a snapshot group. Since
when you create a snapshot for a Microsoft Exchange instance, you actually create a snapshot
for each LUN contained in the Microsoft Exchange instance. You can choose Data
Protection > Snapshot to view the snapshot of each LUN contained in the Microsoft
Exchange instance.
Procedure
Step 1 Go to the Create Snapshot page.
2. Click Close.
----End
Follow-up Procedure
After Microsoft Exchange snapshots are created, you can select a Microsoft Exchange
instance and click the Snapshot tab in Details. Then you can operate the snapshot of the
Microsoft Exchange instance based on service requirements.
Prerequisites
At least one VMware instance has been created in the storage system.
Procedure
Step 1 Go to the VMware management page.
Step 3 Optional: Select a VMware instance to view Storage Resource and Snapshot of the instance
in the Details area.
----End
Procedure
Step 1 Go to the Properties of VMware Storage Resource page.
----End
Context
After the application instance is successfully created, the system creates mapping view
xx_Mapping by default. xx indicates the instance name.
Procedure
Step 1 Go to the Properties of VMware Storage Resource page.
----End
Prerequisites
l At least one VMware instance has been created in the storage system.
l The snapshot license is valid.
Context
l The snapshot created for a VMware instance which doesn't use shared folders is actually
a snapshot group. Since when you create a snapshot for a VMware instance, you actually
create a snapshot for each LUN contained in the VMware instance. You can choose Data
Protection > Snapshot to view the snapshot of each LUN contained in the VMware
instance.
l The snapshot created for a VMware instance which use shared folders is actually a
snapshot for a file system.
Procedure
Step 1 Go to the Create Snapshot page.
----End
Follow-up Procedure
After VMware snapshots are created, you can select a VMware instance and click the
Snapshot tab in Details. Then you can operate the snapshot of the VMware instance based on
service requirements.
Prerequisites
At least one Hyper-V instance has been created in the storage system.
Procedure
Step 1 Go to the Hyper-V management page.
Step 3 Optional: Select a Hyper-V instance to view Storage Resource and Snapshot of the instance
in the Details area.
----End
Procedure
Step 1 Go to the Properties of Hyper-V Storage Resource page.
Step 2 Click the General tab to modify the general properties of the selected Hyper-V instance.
----End
Context
After the application instance is successfully created, the system creates mapping view
xx_Mapping by default. xx indicates the instance name.
Procedure
Step 1 Go to the Properties of Hyper-V Storage Resource management page.
----End
Prerequisites
l At least one Hyper-V instance has been created in the storage system.
l The snapshot license is valid.
Context
The snapshot created for a Hyper-V instance is actually a snapshot group. Since when you
create a snapshot for a Hyper-V instance, you actually create a snapshot for each LUN
contained in the Hyper-V instance. You can choose Data Protection > Snapshot to view the
snapshot of each LUN contained in the Hyper-V instance.
Procedure
Step 1 Go to the Create Snapshot management page.
----End
Follow-up Procedure
After Hyper-V snapshots are created, you can select a Hyper-V instance and click the
Snapshot tab in Details. Then you can operate the snapshot of the Hyper-V instance based on
service requirements.
Prerequisites
At least one Oracle instance has been created in the storage system.
Procedure
Step 1 Go to the Oracle management page.
Step 3 Optional: Select an Oracle instance to view Storage Resource and Snapshot of the instance
in the Details area.
----End
Procedure
Step 1 Go to the Properties of Exchange Storage Resource page.
4. Select the Oracle instance whose general properties you want to modify and click
Properties.
The Properties of Oracle Storage Resource dialog box is displayed.
Step 2 Click the General tab to modify the general properties of the selected Oracle instance.
Table 10-14 describes related parameters.
----End
Context
After the application instance is successfully created, the system creates mapping view
xx_Mapping by default. xx indicates the instance name.
Procedure
Step 1 Go to the Properties of Oracle Storage Resource page.
----End
Prerequisites
l At least one Oracle instance has been created in the storage system.
l The snapshot license is valid.
Context
The snapshot created for an Oracle instance is actually a snapshot group. Since when you
create a snapshot for an Oracle instance, you actually create a snapshot for each LUN
contained in the Oracle instance. You can choose Data Protection > Snapshot to view the
snapshot of each LUN contained in the Oracle instance.
Procedure
Step 1 Go to the Create Snapshot page.
----End
Follow-up Procedure
After Oracle snapshots are created, you can select an Oracle instance and click the Snapshot
tab in Details. Then you can operate the snapshot of the Oracle instance based on service
requirements.
Prerequisites
At least one SQL Server instance has been created in the storage system.
Procedure
Step 1 Go to the SQL Server management page.
Step 2 In the function pane, view information about an SQL Server instance.
Table 10-17 describes related parameters.
Step 3 Optional: Select an SQL Server instance to view Storage Resource and Snapshot of the
instance in the Details area.
----End
Procedure
Step 1 Go to the Properties of SQL Server Storage Resource page.
----End
Context
After the application instance is successfully created, the system creates mapping view
xx_Mapping by default. xx indicates the instance name.
Procedure
Step 1 Go to the Properties of SQL Server Storage Resource page.
Table 10-19 Parameters of the owning mapping view of an SQL Server instance
----End
Prerequisites
l At least one SQL Server instance has been created in the storage system.
l The snapshot license is valid.
Context
The snapshot created for an SQL Server instance is actually a snapshot group. Since when
you create a snapshot for an SQL Server instance, you actually create a snapshot for each
LUN contained in the SQL Server instance. You can choose Data Protection > Snapshot to
view the snapshot of each LUN contained in the SQL Server instance.
Procedure
Step 1 Go to the Create Snapshot page.
----End
Follow-up Procedure
After SQL Server snapshots are created, you can select a SQL Server instance and click the
Snapshot tab in Details. Then you can operate the snapshot of the SQL Server instance based
on service requirements.
Context
An application-based snapshot is a snapshot group in essence. The snapshot group contains
snapshots of multiple LUNs of the application. Those LUNs are specifically created for the
application.
Prerequisites
At least one application-based snapshot has been created in the system.
Procedure
Step 1 Go to the Apply page of snapshots.
Step 3 In the upper area of the left function pane, view the application-based snapshot information.
Table 10-21 describes related parameters.
ID ID of a snapshot. [Example]
1
Step 4 In the upper area of the left function pane, select an application-based snapshot.
Step 5 In the lower area of the left function pane, view the information about the snapshot of each
LUN contained in the application-based snapshot. Table 10-22 describes related parameters.
ID ID of a snapshot. [Example]
2
----End
Prerequisites
At least one application-based snapshot has been created in the system.
Procedure
Step 1 Go to the Apply page of snapshots.
Step 2 From the drop-down list in the upper area of the left function pane, select an application type.
Step 3 In the upper area of the left function pane, select the snapshot that you want to modify and
click Properties on the menu bar.
The Properties of Snapshot dialog box is displayed.
----End
Prerequisites
At least one application-based snapshot has been created in the system.
Procedure
Step 1 Go to the Apply page of snapshots.
Step 2 From the drop-down list in the upper area of the left function pane, select an application type.
Step 3 In the upper area of the left function pane, select an application-based snapshot.
Step 4 In the lower area of the left function pane, select the snapshot of a LUN and click Properties
on the menu bar.
The Properties of Snapshot dialog box is displayed.
3. Click OK.
The Results dialog box is displayed, indicating that the operation succeeded.
4. Click Close.
----End
Prerequisites
At least one application-based snapshot has been created in the system.
Context
The snapshot created for a application instance is actually a snapshot group. Since when you
create a snapshot for application instance, you actually create a snapshot for each LUN
contained in the application instance.
Procedure
Step 1 Go to the Application page of snapshots.
Step 3 In the upper area of the left function pane, select an application-based snapshot and click
Properties on the menu bar.
The Properties of Snapshot dialog box is displayed.
Step 4 Click the Snapshot List tab, view the application-based snapshot group.
----End
Prerequisites
At least one application-based snapshot has been created in the system.
Procedure
Step 1 Go to the Apply page of snapshots.
Step 3 In the upper area of the left function pane, select an application-based snapshot.
Step 4 In the lower area of the left function pane, select the snapshot of a LUN and click Properties
on the menu bar.
The Properties of Snapshot dialog box is displayed.
Step 5 Viewing the owning LUN group of the snapshot.
1. Click the Owning LUN Group tab.
2. View the properties of the owning LUN group.
Table 10-25 describes related parameters.
3. Click OK.
----End
Prerequisites
l At least one application-based snapshot has been created in the system.
l Health Status of the snapshot of each LUN contained in the application-based snapshot
is Normal.
Context
After an application-based snapshot is activated, all snapshots within the snapshot group are
activated. Data duplicates are generated for each LUN contained by the application at the
activation point in time.
Procedure
Step 1 Go to the Apply page of snapshots.
Step 2 From the drop-down list in the upper area of the left function pane, select an application type.
Step 3 In the upper area of the left function pane, select a snapshot that you want to activate and
choose More > Activate on the menu bar.
The Warning dialog box is displayed.
----End
Prerequisites
l At least one application-based snapshot has been created in the system.
l Running Status of the snapshot of each LUN contained in the application-based
snapshot is Activated.
Context
After an application-based snapshot group is deactivated, all snapshots contained in the
snapshot group are deactivated and become unavailable.
Procedure
Step 1 Go to the Apply page of snapshots.
Step 3 In the upper area of the left function pane, select a snapshot that you want to deactivate and
choose More > Deactivate on the menu bar.
The Warning dialog box is displayed.
Step 4 Confirm the snapshot deactivation.
1. Confirm the information in the dialog box and select I have read the previous
information and understood consequences of the operation.
2. Click OK.
The Execution Result dialog box is displayed, indicating that the operation succeeded.
3. Click Close.
----End
Prerequisites
l At least one application-based snapshot has been created in the system.
l Health Status of the snapshot of each LUN contained in the application-based snapshot
is Normal.
l Running Status of the snapshot of each LUN contained in the application-based
snapshot is Activated.
Context
After an application-based snapshot group is rolled back, all snapshots contained in the
snapshot group are rolled back. Each LUN contained in the application is rolled back to the
snapshot activation point in time.
Precautions
l You can roll back only one snapshot of a source LUN at a time.
l You cannot roll back a snapshot if its source LUN is the primary LUN or slave LUN of a
remote replication.
l You cannot roll back a snapshot if its source LUN is used as the primary LUN of a clone.
l You can roll back a snapshot if its source LUN is used as the slave LUN of a clone, and
the clone pair is being split while the data of the primary LUN and slave LUN is
consistent or the reverse data of the primary LUN and slave LUN is inconsistent.
Procedure
Step 1 Go to the Apply page of snapshots.
Step 3 In the upper area of the left function pane, select a snapshot that you want to roll back and
choose More > Start Rollback on the menu bar.
The Roll Back Snapshot dialog box is displayed.
Step 4 Set the snapshot rollback speed.
1. From the Rollback Speed drop-down list, select a rollback speed. Available speeds are
Low, Medium, High, and Highest.
When the service load on the storage system is heavy, set the rollback speed to Low
or Medium.
When the service load on the storage system is light, set the rollback speed to High
or Highest.
2. Click OK.
The Danger dialog box is displayed.
Step 5 Roll back the snapshot.
1. Confirm the information in the dialog box and select I have read the previous
information and understood consequences of the operation.
2. Click OK.
The Execution Result dialog box is displayed, indicating that the operation succeeded.
3. Click Close.
----End
Prerequisites
l At least one application-based snapshot has been created in the system.
l Running Status of the snapshot of each LUN contained in the application-based
snapshot is Restore.
Context
After the rollback of an application-based snapshot group is stopped, the rollback of all
snapshots contained in the snapshot group is stopped. After the rollback is stopped, all
snapshots in the snapshot group turn into the activated state. However, the related source LUN
data is incomplete and is no longer the original data at the activation point in time.
Procedure
Step 1 Go to the Apply page of snapshots.
Step 2 From the drop-down list in the upper area of the left function pane, select an application type.
Step 3 In the upper area of the left function pane, select a snapshot that you want to roll back and
choose More > Stop Rollback on the menu bar.
The Danger dialog box is displayed.
----End
Prerequisites
l At least one application-based snapshot has been created in the system.
l Running Status of the snapshot of each LUN contained in the application-based
snapshot is Inactive.
l LUN snapshots contained in the application-based snapshot have not been mapped.
Precautions
When a snapshot LUN serves as the source LUN for LUN copy, the snapshot cannot be
deleted.
Procedure
Step 1 Go to the Apply page of snapshots.
Step 3 In the upper area of the left function pane, select a snapshot that you want to delete and click
Delete on the menu bar.
The Warning dialog box is displayed.
Step 4 Confirm the deletion of the snapshot.
1. Carefully read the content in the dialog box. Then select I have read the previous
information and understood consequences of the operation. for confirmation.
2. Click OK.
The Execution Result dialog box is displayed, indicating that the operation succeeded.
3. Click Close.
----End
Basic parameters of a storage system include the license file, storage system information
parameters, and system time parameters. By setting and modifying the basic parameters of a
storage system, you can record and manage the storage system.
Prerequisites
l Complete the NTP server configuration before setting NTP automatic synchronization.
For details about the operations, see related configuration documents of the NTP server.
l In an environment with the firewall function, when the NTP automatic synchronization
function is enabled, you need to enable port 123.
Context
l Network time protocol (NTP) is a computer system time synchronization protocol, which
can synchronize the computer system time to universal time coordinated (UTC). The
server supporting and running the NTP is referred to as the NTP server.
l By synchronizing the client time, you can adjust the storage system time to be consistent
with the client time.
l By configuring the NTP automatic synchronization, you can periodically and
automatically synchronize a storage device with the NTP server which serves as an
external time source.
Procedure
Step 1 Go to the Basic Information management page.
If the DeviceManager cannot obtain the time zone ID, Time Zone is displayed. Set Time
Zone to the time zone of the place where the client resides.
NTP Automatic Synchronization
i. Select NTP Automatic Synchronization.
ii. In Server IP Address, enter the IP address of the server whose time you want
to synchronize to the device.
iii. In Synchronization Period, set the period for synchronizing the server time to
the device time.
NOTE
You can set day, hours, minutes, and seconds of the synchronization period.
Manual
i. Select Manual.
ii. Click Modify.
The Change Time dialog box is displayed.
iii. Change the storage device time.
In the Date group box, change the device date.
In the Time group box, change the device time.
From the Current Time Zone drop-down list, select the time zone of the
storage device.
Step 3 Confirm the device time setting.
1. Click Save or OK.
The Warning dialog box is displayed.
2. Confirm the information in the dialog box and select I have read and understood the
consequences associated with performing this operation..
3. Click OK.
The Execution Result dialog box is displayed, indicating that the operation succeeded.
4. Click Close.
----End
Follow-up Procedure
You can run the change system ntp command to enable or disable the Network Time
Protocol (NTP) time synchronization function. For details, see the OceanStor 5300 V3&5500
V3&5600 V3&5800 V3&6800 V3&6900 V3 Storage System V300R001 Command Reference.
Procedure
Step 1 Go to the Basic Information management page.
----End
Context
A license file is a type of certificate that defines the usage scope, available functions, and
expiration date of a value-added feature. You must import a license file for each of the
following applications or functions:
l HyperSnap(Snapshot)
l HyperCopy(LUN Copy)
l HyperClone(Clone)
l HyperReplication(Remote Replication)
l HyperMirror
l SmartThin
l SmartTier
l SmartMotion
l SmartQoS
l SmartPartition
l SmartVirtualization
l SmartMulti-Tenant
l SmartCache
l SmartMigration
l SmartErase
11.3.1 Preparations
Before applying for a license, make preparations to facilitate the license application.
Item Description
GTS permission for the ESDP Users who have the GTS permission can apply
(applicable to Huawei service for licenses in Entitlement Activation mode. If
engineers) you do not have the GTS permission, click
Permission Application in the left navigation
tree of the ESDP home page and complete the
permission application.
ASP or Guest permission for the ESDP Users who have the ASP or Guest permission
(applicable to Huawei partners or can apply for licenses in Password Activation
customers) mode. Click Register Now on the ESDP home
page and fill in related registration information.
Then you are granted the ASP or Guest
permission.
Prerequisites
An applicant can log in to the ESDP platform (website: http://app.huawei.com/isdp).
Additionally, the applicant have the GTS permission.
If you have ASP or Guest permission only, apply for a license in Password Activation mode.
For details, see Applying for a License in Password Activation Mode.
Context
1. Concepts related to license application on the ESDP include the following:
Entitlement
Entitlement is a form of agreement between a software provider and a customer,
which entitles the customer to the scope, functions, validity period of the product
purchased or sold.
Entitlement ID
An entitlement ID is a unique ID that identifies entitlement.
Entitlement Line
An entitlement line is a unit of entitlement that can be activated. Entitlement
contains one or multiple entitlement lines.
Activation ID
An activation ID is a unique ID that identifies an entitlement line.
Equipment (Node)
A piece of equipment or node is a system device, entity, or node.
2. On the ESDP, entitlement is managed by equipment (node). License application is also
based on equipment (node).
Procedure
Step 1 Select entitlement.
1. On the home page of the ESDP, choose License Activation > Entitlement Activation.
The Step 1: Select Entitlement page is displayed.
2. In the Status field, select Ready and click Search.
The results are listed, as shown in Figure 11-1.
NOTE
To improve the accuracy of searching, you can input customer PO, product name, version, and
contract No. The ESDP supports fuzzy match.
3. Select one or more entitlement lines from the list. Click Next. The Step 2: Binding Of
ESN page is displayed.
Step 2 Bind the ESN.
1. Set ESN and Equipment (Node) Name, as shown in Figure 11-2.
NOTICE
Ensure that you have input the correct ESN to avoid application licenses is unavailable.
2. Select the activation information you want to operate, and click Next.
If the entitlement information differs from the equipment (node) information, the system
displays an error and asks you to reset the information. If the entitlement information is
correct, the Step 3: Confirm Activation page is displayed.
----End
Follow-up Procedure
After applying for the license, carefully store your license file, for it will be used in following
operations.
Prerequisites
An applicant can log in to the ESDP platform (website: http://app.huawei.com/isdp).
Additionally, the applicant have the GTS permission.
The user has a valid license certificate that contains the activation password.
NOTE
If the user does not have a valid license certificate, the user can send the contract No. to the agent to
obtain the license certificate.
Context
1. Concepts related to license application on the ESDP include the following:
Entitlement
Entitlement is a form of agreement between a software provider and a customer,
which entitles the customer to the scope, functions, validity period of the product
purchased or sold.
Entitlement ID
An entitlement ID is a unique ID that identifies entitlement.
Entitlement Line
An entitlement line is a unit of entitlement that can be activated. Entitlement
contains one or multiple entitlement lines.
Activation ID
An activation ID is a unique ID that identifies an entitlement line.
Equipment (Node)
A piece of equipment or node is a system device, entity, or node.
2. On the ESDP, entitlement is managed by equipment (node). License application is also
based on equipment (node).
Procedure
Step 1 Enter your password for activation.
1. On the home page of the ESDP, choose License Activation > Password Activation.
The Step 1: Input Activation Password page is displayed. as shown in Figure 11-3.
2. Confirm the information and select I have read the above carefully.
3. In the Activation Password field, enter the password for activation.
NOTE
Each activation password can be bound with the ESN only once. Therefore, ensure that all
information is correct to avoid application licenses is unavailable.
To enter more activation passwords, click Add.
4. Select the activation password you want to bind, and click Next. The Step 2: Input ESN
page is displayed.
Step 2 Bind the ESN.
1. In the ESN field, enter the ESN.
NOTICE
Ensure that you have input the correct ESN to avoid application licenses is unavailable.
For a password activation task, the name of the task generated by the system is Activate
License By Password.
l Method 1: Check the task status in the task list of Operation Record. If the status
becomes Success, click Download to download the license.
l Method 2: After the task is successfully completed, the system automatically sends an
email to your registered email account. You can obtain the license from the email.
----End
Follow-up Procedure
After applying for the license, carefully store your license file, for it will be used in following
operations.
Context
The license file is a *.dat file.
Procedure
Step 1 Import the license file on the DeviceManager.
Different web browsers may have differences on dialog box display, please operate according to
the actual display.
7. Click Upload.
----End
Procedure
Step 1 Go to the License Management page.
----End
Procedure
Step 1 Go to the License Management page.
2. In the function pane on the left, click More in the Viewing and Settings area.
Go to the More page.
3. Click License Management.
Go to the License Management page.
----End
Procedure
Step 1 Go to the license management page.
4. Click Save and you have finished backing up the license files.
----End
You can use DeviceManager and the command-line interface (CLI) to query and familiarize
yourself with storage system version information so that you can quickly determine matching
software versions based on the system version in maintenance. In addition, you can also use
the CLI to query historical versions of the storage system.
12.1 Obtaining Current System Version Information
12.2 Obtaining System Historical Version Information
You can use the command-line interface (CLI) to query and familiarize yourself with
historical versions of the storage system.
You can understand the supported software version based on the obtained storage system
version and the Version Mapping when installing or upgrading UltraPath and Toolkit.
----End
In the command output, the value of Product Version is the version of the current storage
system.
You can understand the supported software version based on the obtained storage system
version and the Version Mapping when installing or upgrading UltraPath and Toolkit.
----End
Prerequisites
You can successfully log in to the CLI on site.
Procedure
Step 1 Log in to the CLI as a super administrator.
Step 2 Run the show upgrade package command to view historical versions of the storage system.
admin:/>show upgrade package
Software Version
History Version indicates historical version information about the storage system, including
historical version information about the software and hot patches.
----End
System interface modules include iSCSI interface modules and Fibre Channel interface
modules. You can view information about desired interface modules based on service
requirements.
13.1 Viewing Ethernet Port Information
iSCSI interface modules are used to connect a storage system to application servers through
iSCSI links. You can view information about Ethernet ports based on service requirements.
13.2 Viewing Fibre Channel Host Port Information
Fibre Channel interface modules are used to connect a storage system to application servers
through Fibre Channel links. You can view information about Fibre Channel host ports based
on service requirements.
Prerequisites
An Ethernet interface module has been correctly installed on a controller.
Procedure
Step 1 Go to the Ethernet Port dialog box.
Step 2 View the Ethernet port information. Table 13-1 describes related parameters.
----End
Procedure
Step 1 Go to the Bit Error Statistics dialog box.
----End
Prerequisites
A Fibre Channel interface module has been correctly installed on a controller.
Procedure
Step 1 Go to the FC Port dialog box.
4. Click the controller enclosure where the Fibre Channel port resides.
The system displays the front view of the controller enclosure.
Step 2 View the Fibre Channel port information. Table 13-2 describes related parameters.
----End
Procedure
Step 1 Go to the Bit Error Statistics dialog box.
Step 2 View bit error information about the Fibre Channel port.
----End
Prerequisites
The Fibre Channel host bus adapter (HBA) driver is properly installed.
The following procedure uses the Qlogic Fibre Channel HBA as an example. For details about how to
query the WWNs of other vendors' Fibre Channel HBAs, see their corresponding manuals.
NOTE
The WWNs of the HBA are shown in the red frame in Figure 13-3.
----End
The following procedure uses the Qlogic Fibre Channel HBA as an example. For details about how to
query the WWNs of other vendors' Fibre Channel HBAs, see their corresponding manuals.
For details about how to query the WWNs on the application servers running other versions of SUSE
operating systems, adjust the operations based on actual conditions.
Step 3 Run the ls command to query the IDs of all Fibre Channel interface modules.
Step 4 Run the cat 4 |grep port command to query the information about Fibre Channel ports.
Figure 13-4 shows the information about Fibre Channel ports.
Figure 13-4 Querying Fibre Channel port information on a SUSE-based application server
NOTE
The WWNs of the HBA are shown in the red frame in Figure 13-4.
----End
Step 2 Run the following command to query the information about a Fibre Channel HBA.
# lscfg -vps -l fcs0
fcs0 U787F.001.DPM59Y0-P1-C1-T1
FC Adapter
Part Number.................03N5014
EC Level....................A
Serial Number...............1F8200CA1B
Manufacturer................001F
Customer Card ID Number.....280D
FRU Number.................. 03N5014
Device Specific.)ZM)........3
Network Address.............10000000C977835E
ROS Level and ID............02C82774
Device Specific.)Z0)........1036406D
Device Specific.)Z1)........00000000
Device Specific.)Z2)........00000000
Device Specific.)Z3)........03000909
Device Specific.)Z4)........FFC01231
Device Specific.)Z5)........02C82774
Device Specific.)Z6)........06C32715
Device Specific.)Z7)........07C32774
Device Specific.)Z8)........20000000C977835E
Device Specific.)Z9)........BS2.71X4
Device Specific.)ZA)........B1D2.70A5
Device Specific.)ZB)........B2D2.71X4
Device Specific.)ZC)........00000000
Hardware Location Code......U787F.001.DPM59Y0-P1-C1-T1
PLATFORM SPECIFIC
Name: fiber-channel
Model: LP11000
Node: fiber-channel@1
Device Type: fcp
Physical Location: U787F.001.DPM59Y0-P1-C1-T1
NOTE
The value of Network Address in the command output indicates the WWN of the Fibre Channel HBA.
----End
----End
Step 2 Run the ioscan -fn command to query the I/O information.
The output shows that the Fibre Channel HBA resides on /dev/td0.
Step 3 Run the fcsmutil command to query the WWN of the Fibre Channel HBA.
In this example, the output shows that the WWN of the Fibre Channel HBA is
0x50060b0000072dac.
----End
Step 3 Run the cat 4|grep port command to query the WWN of the Fibre Channel HBA.
The output shows that the WWN of the Fibre Channel HBA is the value of scsi-qlal-port0.
login as: root
root@192.168.11.211's password:
Last login: Tue Sep 28 01:40:54 2010 from 192.168.11.210
[root@localhost ~]# cd /proc/scsi/qla2xxx
[root@localhost qla2xxx]# cat 4|grep port
scsi-qla1-adapter-port=2101001b32bcda22;
scsi-qla1-port-0=21000022a100ef02:22030022a100ef02:0000e1:0;
[root@localhost qla2xxx]#
----End
Check that the operating environment under which the storage device works meets associated
requirements to ensure the stable running of the device.
Reference Standard
Table 14-1 lists the items and standards for inspecting an equipment room.
Corrosive airborne contaminants l The copper corrosion rate is lower than 300
b/month (according to the ANSIc/
ISAd-71.04-1985 severity level G1).
l The silver corrosion rate is lower than 200 /
month.
Procedure
l Measure the ambient temperature using the thermometer.
l Measure the ambient humidity using the hygrometer.
l Measure the ambient altitude.
l Monitor the particle contaminants in the equipment room by a professional
environmental surveillance organization.
l Verify the power parameters of the equipment room.
----End
Exception Handling
l If the measured temperature or humidity falls outside the normal range, tune the air
conditioners in the equipment room until the temperature or humidity falls within the
normal range.
l If a power parameter fails to meet the standard, append dedicated power lines and a
power transformer with sufficient capacity.
Reference Standard
Table 14-2 lists the items and standards for checking rack conditions.
General layout of Power cables (with strong electrical current) and service cables
cables (with weak electrical current) lay on different sides of a rack.
Layout of power cables Power cables are laid out orderly and arranged in a similar
manner to power cables on other racks.
Layout of service Service cables are laid out orderly and arranged in a similar
cables manner to service cables on other racks.
Empty slot Empty slots are covered with filler panels for proper heat
dissipation and a neat appearance.
Power cable plug One end of each power cable is fully plugged into an external
power socket and the other end into a storage device socket.
Signal cable plug Signal cables are fully plugged into appropriate device ports.
Ground cable One end of each ground cable is secured by a ground clip and the
other end is fastened to a rack ground terminal.
Power cable Two groups of power cables are available for redundancy.
Management network One end of each management network cable is fully plugged into
port connection a storage device management network port and the other end is
connected to the network where the maintenance terminal
resides.
Precaution
When you check power cables and ground cables, always follow the precautions described in
2.1 Alarm and Safety Symbols to avoid bodily injury and device damage.
Procedure
l Verify that power cables (with strong electrical current) and service cables (with weak
electrical current) lay on different sides of a rack.
l Verify that power cables and service cables are laid out orderly and arranged in a similar
manner to cables on other racks.
l Verify that labels are clearly marked and securely attached.
l Verify that vacant slots are covered with filler panels.
l Verify that one end of each power cable is fully plugged into an external power socket
and the other end into a storage device socket.
l Verify that signal cables are fully plugged into appropriate device ports.
l Verify that one end of each ground cable is secured by a ground clip and the other end is
fastened to a rack ground terminal.
l Verify that two groups of power cables are available for redundancy.
l Verify that one end of each network cable or optical fiber is fully plugged into a storage
device host port and the other end into an application server port or a switch port.
l Verify that one end of each management network cable is fully plugged into a storage
device management network port and the other end is connected to the network where
the maintenance terminal resides.
----End
Exception Handling
If any check item fails to meet its standard, rectify the issue by referring to Table 14-2.
15 Checking Indicators
Indicators reflect the working status of hardware in real time. By observing these indicators,
you can quickly assess whether the hardware is correctly working.
15.1 Checking Controller Enclosure Indicators (For the 5300 V3 and 5500 V3)
Controller enclosure indicators show the running status of a controller enclosure. By checking
these indicators, you can promptly learn about the status of each module.
15.2 Checking Controller Enclosure Indicators (For the 5600 V3/5800 V3)
Controller enclosure indicators show the running status of the controller enclosure. By
checking these indicators, you can promptly learn about the status of each component module.
15.3 Checking Controller Enclosure Indicators (For the 6800 V3/6900 V3)
Controller enclosure indicators show the running status of the controller enclosure. By
checking these indicators, you can promptly learn about the status of each component module.
15.4 Checking Disk Enclosure Indicators (2U Disk Enclosure)
Disk enclosure indicators show the running status of a disk enclosure. By checking these
indicators, you can promptly learn about the status of each component module.
15.5 Checking Disk Enclosure Indicators (4U Disk Enclosure)
Disk enclosure indicators show the running status of a disk enclosure. By checking these
indicators, you can promptly learn about the status of each component module.
15.6 Checking Disk Enclosure Indicators (High-density Disk Enclosure)
Disk enclosure indicators show the running status of a disk enclosure. By checking these
indicators, you can promptly learn about the status of each component module.
Reference Standard
Controller enclosure indicators are located on the front and rear panels of a controller
enclosure.
Figure 15-1, Figure 15-2, and Figure 15-3 depict the front-panel and rear-panel indicators of
the controller enclosure that has been correctly powered on.
Table 15-1 lists the states and their meanings of the controller enclosure front-panel indicators
shown in Figure 15-1 and Figure 15-2.
Table 15-1 Controller enclosure front-panel indicator states and their meanings
Module No. Indicator Normality Abnormality
1 Module Power indicator/Hot Swap button 2 16 Gbit/s Fibre Channel host port Link/Speed
indicator
Table 15-2 lists the states and their meanings of the controller enclosure rear-panel indicators
shown in Figure 15-3. This section lists only the indicator states and their meanings of some
interface modules. For details, see the OceanStor 5300 V3&5500 V3&5600 V3&5800
V3&6800 V3&6900 V3 Storage System V300R001 Hardware Description.
Table 15-2 Controller enclosure rear-panel indicator states and their meanings
Module No. Indicator Normality Abnormality
a: When the onboard port is a GE port, the indicators on both sides of the port are the Speed
indicator and Link/Active indicator. For details about these indicators, see 4 and 5.
Procedure
l Check onsite indicators on the front and rear panels of a controller enclosure according
to Figure 15-1, Figure 15-2 and Figure 15-3 Predetermine whether all components in
the controller enclosure are working properly.
----End
Exception Handling
If a module of the storage system is abnormal, refer to the OceanStor 5300 V3&5500
V3&5600 V3&5800 V3&6800 V3&6900 V3 Storage System V300R001 Hardware Description
to learn about detailed indicator meanings. Then, troubleshoot faults based on the detailed
fault information you have obtained.
Reference Standard
Controller enclosure indicators locate on the front and rear panels of the controller enclosure.
Figure 15-4 and Figure 15-5 depict the front-panel and rear-panel indicators of the controller
enclosure that has been correctly powered on.
1 2
BB U BB U BB U BB U 3
7 6 5 4
1 Running/Alarm indicator on a BBU 2 Location indicator on the controller enclosure
3 Alarm indicator on the controller enclosure 4 Power indicator/Power button on the controller enclosure
Table 15-3 lists the states and meanings of the controller enclosure front-panel indicators
shown in Figure 15-4.
Table 15-3 Controller enclosure front-panel indicator states and their meanings
Module No. Indicator Normality Abnormality
12 11 10 9 8 76
1 Running/Alarm indicator on a power module 2 Power indicator on a management module
3 Management network port Speed indicator 4 Management network port Link/Active indicator
11 Link/Speed indicator of an 8 Gbit/s Fibre Channel 12 Mini SAS HD expansion port indicator
port
Table 15-4 lists the states and their meanings of the controller enclosure rear-panel indicators
shown in Figure 15-5. This section lists only the indicator states and their meanings of some
interface modules. For details, see the OceanStor 5300 V3&5500 V3&5600 V3&5800
V3&6800 V3&6900 V3 Storage System V300R001 Hardware Description.
Table 15-4 Controller enclosure rear-panel indicator states and their meanings
Module No. Indicator Normality Abnormality
Procedure
l Check onsite controller enclosure front-panel and rear-panel indicators according to
Figure 15-4 and Figure 15-5. Predetermine whether all component modules on the
controller enclosure are working properly.
----End
Exception Handling
If any module is abnormal, refer to the OceanStor 5300 V3&5500 V3&5600 V3&5800
V3&6800 V3&6900 V3 Storage System V300R001 Hardware Description to learn about
detailed indicator meanings. Then, troubleshoot faults based on the detailed fault information
you have obtained.
Reference Standard
Controller enclosure indicators locate on the front and rear panels of the controller enclosure.
Figure 15-6 and Figure 15-7 depict the front-panel and rear-panel indicators of the controller
enclosure that has been correctly powered on.
BB U BB U BB U BB U
7 6 54 3 2
1 Running/Alarm indicator on a BBU 2 Fan module running/alarm indicator
5 Power indicator/Power button on the controller enclosure 6 Location indicator on the controller enclosure
Table 15-5 lists the states and meanings of the controller enclosure front-panel indicators
shown in Figure 15-6.
Table 15-5 Controller enclosure front-panel indicator states and their meanings
Module No. Indicator Normality Abnormality
Controller 2 Fan module running/ l Steady green: Fan Off: Fan modules
alarm indicator modules are are powered off.
working
correctly.
l Steady red: A fan
module is faulty.
1 2
4
5
11 10 9 8 76
1 Running/Alarm indicator on a power module 2 Power indicator/Hot Swap button on an interface
module
Table 15-6 lists the states and their meanings of the controller enclosure rear-panel indicators
shown in Figure 15-7. This section lists only the indicator states and their meanings of some
interface modules. For details, see the OceanStor 5300 V3&5500 V3&5600 V3&5800
V3&6800 V3&6900 V3 Storage System V300R001 Hardware Description.
Table 15-6 Controller enclosure rear-panel indicator states and their meanings
Procedure
l Check onsite controller enclosure front-panel and rear-panel indicators according to
Figure 15-6 and Figure 15-7. Predetermine whether all component modules on the
controller enclosure are working properly.
----End
Exception Handling
If any module is abnormal, refer to the OceanStor 5300 V3&5500 V3&5600 V3&5800
V3&6800 V3&6900 V3 Storage System V300R001 Hardware Description to learn about
detailed indicator meanings. Then, troubleshoot faults based on the detailed fault information
you have obtained.
Reference Standard
Disk enclosure indicators locate on the front and rear panels of the disk enclosure.
Figure 15-8 and Figure 15-9 depict the front-panel and rear-panel indicators of the disk
enclosure that has been correctly powered on.
1 Running indicator of the disk module 2 Location/Alarm indicator of the disk module
3 Location indicator of the disk enclosure 4 Alarm indicator of the disk enclosure
Table 15-7 lists the states and their meanings of the disk enclosure front-panel indicators
shown in Figure 15-8.
Table 15-7 Disk enclosure front-panel indicator states and their meanings
8A 8A
1 Alarm indicator of the expansion module 2 Power indicator of the expansion module
3 Mini SAS HD expansion port indicator 4 Running/Alarm indicator of the power module
Table 15-8 lists the states and their meanings of the disk enclosure rear-panel indicators
shown in Figure 15-9.
Table 15-8 Disk enclosure rear-panel indicator states and their meanings
Procedure
l Check onsite front-panel and rear-panel indicators of a disk enclosure according to
Figure 15-8 and Figure 15-9. Predetermine whether all component modules on the disk
enclosure are working properly.
----End
Exception Handling
In the event that a module of the storage system is abnormal, refer to the OceanStor 5300
V3&5500 V3&5600 V3&5800 V3&6800 V3&6900 V3 Storage System V300R001 Product
Description to learn about detailed indicator meanings. Then, troubleshoot faults based on the
detailed fault information you have obtained.
Reference Standard
Disk enclosure indicators locate on the front and rear panels of the disk enclosure.
Figure 15-10 and Figure 15-11 depict the front-panel and rear-panel indicators of the disk
enclosure that has been correctly powered on.
0 1 2 3
20 21 22 23
4
5
1 Running indicator of the disk module 2 Location/Alarm indicator of the disk module
3 Location indicator of the disk enclosure 4 Alarm indicator of the disk enclosure
Table 15-9 lists the states and their meanings of the disk enclosure front-panel indicators
shown in Figure 15-10.
Table 15-9 Disk enclosure front-panel indicator states and their meanings
Module No. Indicator Normality Abnormality
8A 8A
54 3 2
1 Running/Alarm indicator of the fan module 2 Running/Alarm indicator of the power module
3 Mini SAS HD expansion port indicator 4 Power indicator of the expansion module
Table 15-10 lists the states and their meanings of the disk enclosure rear-panel indicators
shown in Figure 15-11.
Table 15-10 Disk enclosure rear-panel indicator states and their meanings
Module No. Indicator Normality Abnormality
Procedure
l Check onsite front-panel and rear-panel indicators of a disk enclosure according to
Figure 15-10 and Figure 15-11. Predetermine whether all component modules on the
disk enclosure are working properly.
----End
Exception Handling
In the event that a module of the storage system is abnormal, refer to the OceanStor 5300
V3&5500 V3&5600 V3&5800 V3&6800 V3&6900 V3 Storage System V300R001 Hardware
Description to learn about detailed indicator meanings. Then, troubleshoot faults based on the
detailed fault information you have obtained.
Reference Standard
Disk enclosure indicators locate on the front and rear panels of the disk enclosure.
Figure 15-12 and Figure 15-13 depict the front-panel and rear-panel indicators of the disk
enclosure that has been correctly powered on.
6 3
5 4
1 High-density disk enclosure Location indicator 2 High-density disk enclosure over temperature Alarm
indicator
3 High-density disk enclosure internal module 4 High-density disk enclosure rear module Alarm
Alarm indicator indicator
5 High-density disk enclosure Power indicator 6 High-density disk enclosure Alarm indicator
Table 15-11 lists the states and their meanings of the disk enclosure front-panel indicators
shown in Figure 15-12.
Table 15-11 Disk enclosure front-panel indicator states and their meanings
P0 P1 P2 P3
F0 F1
B A
54 3 2
1 Power module Running indicator 2 Indicator of a mini SAS HD expansion port
Table 15-12 lists the states and their meanings of the disk enclosure rear-panel indicators
shown in Figure 15-13.
Table 15-12 Disk enclosure rear-panel indicator states and their meanings
Module No. Indicator Normality Abnormality
Power module 1 Power module Steady green: The Off: The power
Running indicator power module is module is not
running correctly. power on,
undervoltage, or
overvoltage.
Procedure
l Check onsite front-panel and rear-panel indicators of a disk enclosure according to
Figure 15-12 and Figure 15-13. Predetermine whether all component modules on the
disk enclosure are working properly.
----End
Exception Handling
In the event that a module of the storage system is abnormal, refer to the OceanStor 5300
V3&5500 V3&5600 V3&5800 V3&6800 V3&6900 V3 Storage System V300R001 Hardware
Description to learn about detailed indicator meanings. Then, troubleshoot faults based on the
detailed fault information you have obtained.
Check the physical status of the storage device by examining its indicators and check the
functional status of the device on the DeviceManager. This allows you to sense device faults
in a timely manner.
16.1 Checking Controller Enclosures or Disk Enclosures
You can learn about the health and running status of the controller enclosure or a disk
enclosure by checking its status information on the DeviceManager.
16.2 Checking Controllers
Controllers of the storage device are responsible for running storage applications,
implementing storage mechanisms (StoragePool, LUN mapping, and striping), and managing
alarms. You can learn about the health and running status of a controller by checking its status
information on the DeviceManager.
16.3 Checking Power Modules
Power modules provide power for controller enclosures and disk enclosures, ensuring reliable
running of storage systems. You can learn about the health and running status of a power
module by checking its status information on the DeviceManager.
16.4 Checking Controller Enclosure BBUs
Controller enclosure backup battery units (BBUs) provide power failure protection for
controller enclosures, allowing data to be stored in the event of a power failure. You can learn
about the health and running status of a BBU by checking its status information on the
DeviceManager.
16.5 Checking Fan Modules
Fan modules in the controller enclosure or a disk enclosure provide a cyclic aeration system to
ensure the reliable running of the storage device. You can learn about the health and running
status of a fan module by checking its status information on the DeviceManager.
16.6 Checking Hard Disks
Hard disks are used to store data as a basic component of the storage device. You can learn
about the health and running status of a hard disk by checking its status information on the
DeviceManager.
Reference Standard
If the controller enclosure and disk enclosures are working properly, the following items are
true on the DeviceManager:
l All of the enclosures are in the Normal health status and Online running status.
l No enclosure alarm appears on the Current Alarms tab page.
Precaution
None
Procedure
Step 2 On the main window, click Device View to access the device view.
Step 4 View the enclosure information in the group box that is displayed.
Table 16-1 describes associated status parameters.
Parameter Description
Running Status Running status of an enclosure. The value can be Online or Offline.
----End
Exception Handling
If an enclosure alarm appears on the Current Alarms tab page, select the alarm and diagnose
the problem according to its details and repair suggestions.
Reference Standard
If controllers are working properly, the following items are true on the DeviceManager:
l All of the controllers are in the Normal health status and Online running status.
l No controller alarm appears on the Current Alarms tab page.
Precaution
None
Procedure
Step 2 On the main window, click Device View to access the device view.
Step 4 View the controller module information in the group box that is displayed.
Parameter Description
Health Status Health status of a controller module. The value can be:
l Normal: The functionality and operating performance of the controller
are normal.
l Fault: The controller is working improperly.
Parameter Description
Running Running status of a controller module. The value can be Online or Offline.
Status
----End
Exception Handling
If a controller alarm appears on the Current Alarms tab page, select the alarm and diagnose
the problem according to its details and repair suggestions.
Reference Standard
If power modules are working properly, the following items are true on the DeviceManager:
l All of the power modules are in the Normal health status and Online running status.
l No power module alarm appears on the Current Alarms tab page.
Precaution
None
Procedure
Step 2 On the main window, click Device View to access the front view of the storage device.
Step 3 Click in the front view to switch to the rear review of the storage device.
Parameter Description
Health Status Health status of a power module. The value can be:
l Normal: The functionality and operating performance of the power
module are normal.
l Fault: The power module is working improperly.
l No input: The power module has been installed but does not supply
power.
Running Running status of a power module. The value can be Online or Offline.
Status
----End
Exception Handling
If a power module alarm appears on the Current Alarms tab page, select the alarm and
diagnose the problem according to its details and repair suggestions.
Reference Standard
If controller enclosure BBUs are working properly, the following items are true on the
DeviceManager:
l All of the BBUs are in the Normal health status and Online running status.
l No BBU alarm appears on the Current Alarms tab page.
Procedure
Step 2 On the main window, click Device View to access the device view.
Step 3 Click the desired BBU in the view. The detailed information about the BBU is displayed.
Step 4 View the BBU information in the group box that is displayed.
Parameter Description
Running Status Running status of a BBU. The value can be Online, Charging, or
Discharging.
----End
Exception Handling
If a BBU alarm appears on the Current Alarms tab page, select the alarm and diagnose the
problem according to its details and repair suggestions.
Reference Standard
If fan modules are working properly, the following items are true on the DeviceManager:
l All of the fan modules are in the Normal health status and Running running status.
l No fan module alarm appears on the Current Alarms tab page.
Precaution
None
Procedure
Step 2 On the main window, click Device View to access the front view of the storage device.
Step 3 Click in the front view to switch to the rear view of the storage device.
Step 4 Click the desired fan module in the view. The detailed information about the fan module is
displayed.
Step 5 View the fan module information in the group box that is displayed.
Table 16-5 describes associated status parameters.
Health Status Health status of a fan module. The value can be:
l Normal: The functionality and operating performance of the fan
module are normal.
l Fault: The fan module is working improperly.
Running Running status of a fan module. The value can be Running or Not
Status running.
----End
Exception Handling
If a fan module alarm appears on the Current Alarms tab page, select the alarm and diagnose
the problem according to its details and repair suggestions.
Reference Standard
If hard disks are working properly, the following items are true on the DeviceManager:
l All of the disks are in the Normal health status and Online running status.
Precaution
None
Procedure
Step 2 On the main window, click Device View to access the front view of the storage device.
Step 3 Click the desired disk in the view. The detailed information about the hard disk is displayed.
Step 4 View the disk information in the group box that is displayed.
Table 16-6 describes associated status parameters.
Parameter Description
Health Status Health status of a hard disk. The value can be:
l Normal: The functionality and operating performance of the hard disk
are normal.
l Fault: The hard disk is working improperly.
l Failing: The hard disk is about to fail.
Running Running status of a hard disk. The value can be Online or Offline.
Status
----End
Exception Handling
If a disk alarm appears on the Current Alarms tab page, select the alarm and diagnose the
problem according to its details and repair suggestions.
Reference Standard
If front-end host ports are working properly, the following items are true on the
DeviceManager:
l All of the host ports are in the Normal health status and Link Up running status.
l No host port alarm appears on the Current Alarms tab page.
Precaution
None
Procedure
Step 2 On the main window, click Device View to access the front view of the storage device.
Step 3 Click in the front view to switch to the rear view of the storage device.
Step 4 Click the desired host port in the view. The detailed information about the host port is
displayed.
Step 5 View the host port information in the group box that is displayed.
Table 16-7 describes associated status parameters.
Health Status Health status of a host port. The value can be:
l Normal: The functionality and operating performance of the host port
are normal.
l Fault: The host port is working improperly.
Running Running status of a host port. The value can be Link Up or Link Down.
Status
----End
Exception Handling
If a host port alarm appears on the Current Alarms tab page, select the alarm and diagnose
the problem according to its details and repair suggestions.
Reference Standard
If interface modules are working properly, the following items are true on the
DeviceManager:
l All of the interface modules are in the Normal health status and Running running status.
l No interface module alarm appears on the Current Alarms tab page.
Precaution
None
Procedure
Step 2 On the main window, click Device View to access the front view of the storage device.
Step 3 Click in the front view to switch to the rear view of the storage device.
Step 4 Click the desired interface module in the view. The detailed information about the interface
module is displayed.
Step 5 View the interface module information in the group box that is displayed.
Table 16-8 describes associated status parameters.
Health Status Health status of an interface module. The value can be:
l Normal: The functionality and operating performance of the interface
module are normal.
l Fault: The interface module is working improperly.
----End
Exception Handling
If an interface module alarm appears on the Current Alarms tab page, select the alarm and
diagnose the problem according to its details and repair suggestions.
Reference Standard
If remote devices are working properly, their Health Status is Normal and Running Status
is Link Up on the DeviceManager.
Precaution
None
Procedure
Step 3 On the Remote Device page, view the detailed information about the desired remote device.
Table 16-9 describes associated status parameters.
Parameter Description
Health Status Health status of a remote device. The value can be:
l Normal: The remote device is working properly.
l Fault: The remote device is working improperly.
Running Running status of a remote device. The value can be Link Up or Link
Status Down.
----End
Exception Handling
For a remote device, if its Health Status is Fault or Running Status is Link Down, contact
our technical support engineers for troubleshooting.
17 Managing Alarms
This topic guides you through the process of viewing and configuring current alarms,
historical alarms, and alarm settings.
Reference Standard
If the storage device is working properly, there is no alarm appears on the Current Alarms
tab page of the Alarms and Events page.
Precaution
None
Procedure
Step 1 On the navigation bar of the DeviceManager, click . In the function pane, click
Alarms and Events.
The Alarms and Events page is displayed.
Step 2 On the Alarms and Events page, click the Current Alarms tab.
l indicates Critical.
l indicates Major.
l indicates Warning.
Parameter Description
Details Detailed description of an alarm. It determines the module where the alarm
occurred.
Suggestion Repair suggestions on an alarm and the information about how to obtain
help.
NOTE
You can set filter conditions on the Current Alarms tab page to view specific severities of alarms. Also,
you can save the filtered alarms to a local computer.
----End
Exception Handling
If an alarm appears on the Current Alarms tab page, select the alarm and diagnose the
problem according to its details and repair suggestions.
Reference Standard
None
Precaution
None
Procedure
Step 1 On the navigation bar of the DeviceManager, click . In the function pane, click
Alarms and Events. The Alarms and Events page is displayed.
Step 2 On the Alarms and Events page, click the All Events tab.
Parameter Description
l indicates Critical.
l indicates Major.
l indicates Warning.
l indicates Info.
Details Detailed description of an event. It determines the module where the event
occurred.
Parameter Description
Suggestion Repair suggestions on an event and the information about how to obtain
help.
NOTE
You can set filter conditions on the All Events tab page to view specific severities of events. Also, you
can save filtered events to a local computer.
----End
Exception Handling
None
Prerequisites
l A Simple Mail Transfer Protocol (SMTP) server is available. Otherwise, specified email
addresses will not be able to receive any alarm messages.
l You have logged in to the DeviceManager as an administrator that has the permission.
The following administrators have the permission:
Super administrator
Administrator
Procedure
Step 1 Go to the alarm configuration page.
2. Select Enable.
3. Set parameters for email notification. Table 17-3 describes the parameters.
----End
Prerequisites
l You have logged in to the DeviceManager as an administrator that has the permission.
The following administrators have the permission:
Super administrator
Administrator
l The email notification function has been enabled.
l An SMTP server is available and has been configured.
Context
Each alarm severity allows a maximum of 64 recipient emails to be configured. The total
number of recipient emails that are allowed by all alarm severities cannot exceed 96.
Procedure
Step 1 Go to the alarm configuration page.
Step 2 Add recipient email addresses and specify the severities of alarms triggering the email
notification.
1. In the navigation tree, choose Email notification.
2. Click Add.
The Add Recipient Information dialog box is displayed.
3. Enter recipient email addresses and specify the severities of alarms triggering the email
notification.
NOTE
----End
Result
After the recipient email addresses are successfully added, you can view the added email
addresses in the recipient email address area.
Prerequisites
l You have logged in to the DeviceManager as an administrator that has the permission.
The following administrators have the permission:
Super administrator
Administrator
l The email notification function has been enabled.
l Recipient email addresses have been added.
Procedure
Step 1 Go to the alarm configuration page.
----End
Result
After recipient email addresses are successfully changed, you can view the new email
addresses in the recipient email address area.
Prerequisites
l You have logged in to the DeviceManager as an administrator that has the permission.
The following administrators have the permission:
Super administrator
Administrator
l The email notification function has been enabled.
l Recipient email addresses have been added.
Procedure
Step 1 Go to the alarm configuration page.
----End
Prerequisites
l You have logged in to the DeviceManager as an administrator that has the permission.
The following administrators have the permission:
Super administrator
Administrator
l An SMS modem has been installed on the system or maintenance terminal. The COM
port of the SMS modem has been configured for sending short messages.
Context
The short message (SM) notification function is not available to read-only users.
Procedure
Step 1 Go to the alarm configuration page.
2. Select Enable.
3. Set a phone number for the Short Message (SM) service center.
NOTE
The phone number must be in the following format: plus sign+country code+11-bit phone number
of your local SM service center.
4. Add a mobile phone number or change the existing one for receiving alarm short
messages.
Add a mobile phone number.
i. Click Add.
The Add Recipient Information dialog box is displayed.
ii. Set a mobile phone number for receiving alarm short messages and select an
alarm severity for it.
Step 3 (Optional) Click Test to verify the settings of the configured mobile phone number.
The Info dialog box is displayed.
----End
Prerequisites
l You have logged in to the DeviceManager as an administrator that has the permission.
The following administrators have the permission:
Super administrator
Administrator
l The email notification function has been enabled.
Procedure
Step 1 Go to the alarm configuration page.
3. Enter recipient mobile phone numbers and specify the severities of alarms triggering the
short message notification.
4. Click OK.
5. Click Save.
The Execution Result dialog box is displayed indicating that the operation succeeded.
6. Click Close.
----End
Result
After the recipient mobile phone numbers are successfully added, you can view the added
mobile phone numbers in the recipient mobile phone number area.
Prerequisites
l The short message notification function has been enabled.
l Recipient mobile phone numbers have been added.
Procedure
Step 1 Go to the alarm configuration page.
----End
Result
After recipient mobile phone numbers are successfully changed, you can view the new mobile
phone numbers in the recipient mobile phone number area.
Prerequisites
l The short message notification function has been enabled.
l Recipient mobile phone numbers have been added.
Context
The test aims to check whether recipient mobile phone numbers are correctly configured.
Procedure
Step 1 Go to the alarm configuration page.
----End
Prerequisites
l The email notification and short message notification functions have been correctly
configured.
Procedure
Step 1 Go to the alarm configuration page.
2. In Sending cycle (h), enter a period. The value of the period is an integer ranging from 1
to 168 in hours.
3. In Customer information, enter the company name and contact information of the
customer, helping maintenance engineers search and locate faults.
NOTE
Step 3 Confirm the configuration of the sending period and customer information.
1. Click Save.
The Execution Result dialog box is displayed indicating that the operation succeeded.
2. Click Close.
----End
Prerequisites
You have logged in to the DeviceManager as an administrator that has the permission. The
following administrators have the permission:
l Super administrator
l Administrator
Context
Alarms, alarm recovery messages and system log information can be received by Syslog
service.
Procedure
Step 1 Go to the syslog notification configuration page.
----End
Context
Based on your requirements, enable or disable the sound alarm function by clicking .
Procedure
----End
Prerequisites
l The alarm dump function has been enabled.
l The application server or maintenance terminal used to receive the alarm information is
normally in communication with the storage device.
l In an environment with the firewall function, when the FTP server is used to save
alarms, you need to enable port 21.
Context
l If alarm dump is not configured for the storage system
when the number of generated events reaches 45,000, the alarm named The Space
That Stores Event Logs Is To Be Used Up is triggered
when the number of generated events reaches 50,000 (upper limit), the earliest
10,000 events are automatically deleted.
l If alarm dump is configured for the storage system
when the number of generated events reaches 45,000, the alarm named The Space
That Stores Event Logs Is To Be Used Up is not triggered.
when the number of generated events reaches 50,000 (upper limit), the earliest
10,000 events are automatically dumped to the specified application server or
maintenance terminal.
NOTE
To ensure that all events generated by the storage system are retained, it is recommended that you
configure alarm dump.
Precaution
The following requirements must be met to implement the dump function:
l The server is connected to the management network port on the primary controller of the
storage system.
l The server and primary controller reside on the same LAN and their IP addresses fall
within the same network segment. Run the show controller general command on the
CLI. If Role of a controller is Master, the controller is the primary controller of the
storage system.
NOTE
If the server is connected to the management network port on the secondary controller of the storage system,
the dump function is unavailable.
Procedure
Step 1 Go to the page for setting alarms.
[Example]
192.168.1.100
4300:20::3340
----End
Context
Trap is a type of Simple Network Management Protocol (SNMP) message that indicates the
occurrence of an event. By using the User Datagram Protocol (UDP) protocol, you can send
this type of messages which are partially reliable to recipients.
The DeviceManager provides the trap IP function to send the alarm messages of managed
storage devices to another network management system or to a device at a specific IP address.
If alarm messages are reported in SNMP mode, you must configure Trap IP addresses.
NOTE
To enable the trap IP function, install associated software on application servers. For example, you must
install MIB interface software on the application servers running Windows 2003. Click (Link) , and see
MIB_Interface_File_Usage_Guideto download software.
Procedure
Step 1 Go to the page for setting alarms.
4300:21::3000
4. Click OK.
Step 3 Confirm the creation of the service IP address.
1. Click Save.
The Execution Result message box is displayed, indicating that the operation
succeeded.
2. Click Close.
----End
Context
l Changing service IP addresses is unavailable to read-only users.
l If the service IP address is not on the management network segment, configure routes to
interconnect storage devices with the servers pertaining to the service IP addresses.
NOTICE
Before changing service IP addresses, ensure that no alarm message is being reported to
network management systems or storage devices pertaining to those IP addresses.
Otherwise, alarm messages being reported at the time of the change will be lost.
Procedure
Step 1 Go to the page for setting alarms.
----End
Prerequisites
A service IP address has been created.
Procedure
Step 1 Go to the page for setting alarms.
----End
A storage system provides performance monitoring and system information and power
consumption viewing functions, allowing you to monitor the working status of the storage
system in real time.
Procedure
Step 2 In the Basic Information area, check the system's basic information.
Step 4 In the System Capacity Trend area, view the system capacity trend of the storage system.
Table 18-3 describes related parameters.
Step 5 In the Performance area, view the bandwidth and total IOPS of the storage system.
Table 18-4 describes related parameters.
----End
Procedure
Step 1 Go to the page for viewing Power Consumption.
Step 2 From the Year, Month, and Day lists next to Date, set a date.
You can view system power consumption during a day, a month, or a year.
Step 3 Click View. The system power consumption is displayed in the lower graph.
You can also view power consumption at different points of time or during different time
ranges.
----End
Context
l You can monitor the performance of the storage device only when the performance
monitoring status is Enable.
l In scenarios where controller software is upgraded, parts are replaced, or operations are
performed on hot patches or heterogeneous support packets, the performance statistics
switch is automatically disabled. After the operation, the status of the performance
statistics switch will automatically restore to the pre-operation state.
Procedure
Step 1 Go to the performance monitoring configuration page.
----End
Prerequisites
l The login account, password, and IP address of the FTP server for storing dumped
performance monitoring statistics have been obtained.
l The login account, password, and IP address of the SFTP server for storing dumped
performance monitoring statistics have been obtained.
l The storage device communicates with the FTP or SFTP server properly.
Precaution
The following requirements must be met to dump performance monitoring data to a third-
party application server using FTP or SFTP:
l The third-party application server is connected to the management network port on the
primary controller of the storage system.
l The third-party application server and primary controller reside on the same LAN and
their IP addresses fall within the same network segment. Run the show controller
general command on the CLI. If Role of a controller is Master, the controller is the
primary controller of the storage system.
NOTE
If the third-party application server is connected to the management network port on the secondary controller
of the storage system, the dump function is unavailable.
Procedure
Step 1 Go to the performance monitoring configuration page.
To ensure compatibility, the system still supports File Transfer Protocol (FTP). It is recommended
to use the Secure File Transfer Protocol (SFTP) for data transfer security.
4. In Username, type a username.
5. In Password, type a password for the username.
6. In Server IP address, type the IP address of the server.
7. In Save file to, type a path for storing the performance monitoring statistics to be
dumped.
NOTE
A saving path is set on the user FTP software. Users need to create a folder in the saving path.
Enter the folder name in Save file to. If you need to save the file to the root directory, Enter / in
Save file to.
Example: If the save path configured on the FTP is G:\ and the folder name is alarm, enter alarm
in Save file to on the DeviceManager interface.
8. Click Save.
The Execution Result dialog box is displayed indicating that the operation succeeded.
9. Click Close and you have finished modifying the settings for dumping performance
monitoring statistics.
----End
Prerequisites
The performance monitoring function has been enabled.
Procedure
Step 1 Go to the real-time performance monitoring page.
Click set parameters on Real-Time Performance Monitoring page, enables the performance monitoring
function.
l Single graph
a. Click Single-graph.
b. Select the object type of the storage device that you want to monitor in Object
Type.
NOTE
If the Object Type is Remote Replication, the system only provides the performance statistics of
remote replication in Asynchronous mode.
c. Select the object of the storage device you want to monitor.
d. Select the data type of the statistics in Data Type.
e. Select the statistics items you want to monitor in Statistical Items.
The performance line graph is displayed in the Real-Time Performance
Monitoring dialog box.
NOTE
n For details about the parameter explanations of the related statistics items, please refer to
the appendix section of SystemReporter User Guide.
n When you place the cursor on the performance data sampling point, the statistic and
sampling time are displayed.
l Multiple graph
a. Click Multi-graph.
b. Select the object type of the storage device that you want to monitor in Object
Type.
NOTE
If the Object Type is Remote Replication, the system only provides the performance statistics of
remote replication in Asynchronous mode.
c. Select the object of the storage device you want to monitor.
d. Select the statistics items you want to monitor in Statistics.
The performance line graph is displayed in the Real-Time Performance
Monitoring dialog box.
NOTE
n For details about the parameter explanations of the related statistics items, please refer
to the appendix section of SystemReporter User Guide.
n Click the icon in the top right corner, and you can view details of performance
monitoring data.
n When you place the cursor on the performance data sampling point, the statistic and
sampling time are displayed in the details page.
n The statistical item Ratio of cache flushes to write requests (%) might be larger than
100%.
The ratio of cache flushes to write requests (%) indicates the ratio of cache flushing
times to write request quantity in a specified period. Cache flushing is a background
thread that periodically writes data to disks. If the write request quantity is smaller than
the background cache flushing times, the ratio is greater than 100%.
----End
Procedure
Step 1 Go to the Storage Pool Properties dialog box.
2. Click OK.
The Execution Result dialog box is displayed indicating that the operation succeeded.
3. Click Close.
----End
Prerequisites
l At least a LUN whose relocation policy is Automatic relocation is available.
l The I/O monitoring of the storage pool has been enabled.
l LUNs have been accessed after the I/O monitoring is enabled.
Procedure
Step 1 Go to the Storage Pool Properties dialog box.
----End
Check the running status of various services running on the storage device by using the
DeviceManager. This allows you to discover service faults in a timely manner, preventing
data loss caused by service interruptions.
19.1 Checking Disk Domain Status
By checking the status of a disk domain, you can understand its health status, operating status
and used capacity. The operating status of a disk domain directly affects that of a storage pool.
19.2 Checking Storage Pools
A storage pool is a logical disk group consisting of independent physical disks. It provides
higher storage performance and redundancy than a single disk. You can learn about the health
and running status of a storage pool by checking its status information on the DeviceManager.
19.3 Checking LUNs
Logical unit numbers (LUNs) are basic storage resources of the storage device accessible to
application servers. You can learn about the health and running status of a LUN by checking
its status information on the DeviceManager.
19.4 Checking Host Status
You can view host information to understand host status.
19.5 Viewing Mapping Status
You can view mapping information to understand mapping status.
19.6 Checking Remote Replication Tasks
The remote replication function is critical to a disaster recovery system. It can implement real-
time disaster recovery over any distance and can protect application continuity and data
reliability. You can learn about the health and running status of a remote replication task by
checking its status information.
19.7 Checking Consistency Groups
A consistency group centrally manages remote replication tasks so that multiple replication
pairs can be synchronized or split in a batch. You can learn about the health and running status
of a consistency group by checking its status information.
Prerequisites
Log in to DeviceManager as a read-only user.
Procedure
Step 1 Go to the Disk Domain page.
For details, click next to the table heading. From the drop-down list, select
indicators you are concerned with.
If the free capacity of a disk domain is insufficient, expand the disk domain within
the licensed capacity limit to ensure that the storage pools and LUNs in the disk
domain provide adequate storage space.
2. If you select a disk domain, the bottom area shows details about its capacity distribution
and contained storage pools and disks.
NOTE
You can also view the task progress of the disk domain you have selected. Click Properties, click
the General tab in the dialog box that is displayed, and view the progress of Precopy and
Reconstruction in the Progress area.
----End
Reference Standard
If storage pools are working properly, the following items are true on the DeviceManager:
l All of the storage pools are in the Normal health status and Online running status.
l No storage pool alarm appears on the Current Alarms tab page.
Precaution
None
Procedure
Health Status Health status of a storage pool. The value can be:
l Normal: The functionality and operating performance of the storage
pool are normal.
l Degrade: The storage pool is working in a poor performance.
l Fault: The storage pool is working improperly.
----End
Exception Handling
If a storage pool alarm appears on the Current Alarms tab page, select the alarm and
diagnose the problem according to its details and repair suggestions.
Reference Standard
If LUNs are working properly, the following items are true on the DeviceManager:
l All of the LUNs are in the Normal health status and Online running status.
l No LUN alarm appears on the Current Alarms tab page.
Precaution
None
Procedure
Step 3 On the LUN page, view the information about the desired LUN.
Table 19-2 describes associated status parameters.
Parameter Description
----End
Exception Handling
If a LUN alarm appears on the Current Alarms tab page, select the alarm and diagnose the
problem according to its details and repair suggestions.
Reference Standard
If the host status is normal, on the DeviceManager management page:
l The Status of the host is Normal.
l No alarm about the host is displayed on the Current Alarms tab page.
Precaution
None
Procedure
Step 3 On the Host tab of the Host page, view detailed information about the host.
----End
Exception Handling
If a new alarm about the host is displayed on the Current Alarms tab page, select the alarm,
and troubleshoot the fault according to the alarm details and repair suggestions.
Precaution
None
Procedure
Step 3 On the Mapping View page, select a mapping you want to view.
Step 4 In the details area, view LUN group, host group, and port group information in the mapping.
----End
Exception Handling
If a new alarm about the host is displayed on the Current Alarms tab page, select the alarm,
and troubleshoot the fault according to the alarm details and repair suggestions.
Prerequisites
A license file is required for enabling the remote replication function.
Reference Standard
If remote replication tasks are running properly, the following items are true on the
DeviceManager:
l All of the remote replication tasks are in the Normal health status and Normal running
status.
l No remote replication alarm appears on the Current Alarms tab page.
Precaution
None
Procedure
Step 3 On the Remote Replication page, view the information about the desired remote replication
task.
Table 19-3 describes associated status parameters.
Pair Health Health status of a remote replication task. The value can be:
Status l Normal: The functionality and operating performance of the remote
replication task are normal.
l Fault: One or more replication pairs for the remote replication task are
abnormal.
Pair Running Running status of a remote replication task. The value can be Normal,
Status Synchronizing, To be recovered, Interrupted, Split, or Invalid.
----End
Exception Handling
If a remote replication alarm appears on the Current Alarms tab page, select the alarm and
diagnose the problem according to its details and repair suggestions.
Prerequisites
A license file is required for enabling the consistency group function.
Reference Standard
If consistency groups are working properly, the following items are true on the
DeviceManager:
l All of the consistency groups are in the Normal health status and Normal running
status.
l No consistency group alarm appears on the Current Alarms tab page.
Precaution
The running status of a consistency group is the same as Pair Running Status of the remote
replications added to the consistency group. Only remote replications whose Pair Running
Status is Split can be added to a consistency group. When the status of any of the remote
replication members contained in a consistency group changes, the status of the remaining
members also changes accordingly.
Procedure
Step 3 On the Remote Replication Consistency Group tab, view the information about the desired
consistency group.
Table 19-4 describes associated status parameters.
Parameter Definition
Health Status Health status of a consistency group. The value can be:
l Normal: The functionality and operating performance of the
consistency group are normal.
l Fault: One or more replication pairs for the consistency group are
abnormal.
----End
Exception Handling
If a consistency group alarm appears on the Current Alarms tab page, select the alarm and
diagnose the problem according to its details and repair suggestions.
Prerequisites
A license file is required for enabling the clone function.
Reference Standard
If clone tasks are running properly, the following items are true on the DeviceManager:
l All of the clone tasks are in the Normal health status and Normal running status.
l No clone alarm appears on the Current Alarms tab page.
Precaution
None
Procedure
Health Status Health status of a clone task. The value can be:
l Normal: The functionality and operating performance of the clone task
are normal.
l Fault: One or more mirror pairs for the clone task are abnormal.
Running Running status of a clone task. The value can be Normal, Synchronizing,
Status Reversely synchronizing, To be recovered, Interrupted, Split, or
Queuing.
----End
Exception Handling
If a clone alarm appears on the Current Alarms tab page, select the alarm and diagnose the
problem according to its details and repair suggestions.
Prerequisites
A license file is required for enabling the snapshot function.
Reference Standard
If snapshot tasks are working properly, the following items are true on the DeviceManager:
l All of the snapshot tasks are in the Normal health status.
l No snapshot alarm appears on the Current Alarms tab page.
Precaution
None
Procedure
Health Status Health status of a snapshot task. The value can be:
l Normal: The functionality and operating performance of the
snapshot task are normal.
l Fault: The snapshot task is running improperly.
Running Status Running status of a snapshot task. The value can be Activated,
Inactive, or Restore.
----End
Exception Handling
If an snapshot alarm appears on the Current Alarms tab page, select the alarm and diagnose
the problem according to its details and repair suggestions.
Prerequisites
A license file is required for enabling the LUN copy function.
Reference Standard
If LUN copy tasks are running properly, the following items are true on the DeviceManager:
l All of the LUN copy tasks are in the Normal health status.
l No LUN copy alarm appears on the Current Alarms tab page.
Precaution
None
Procedure
Step 3 On the LUN Copy page, view the information about the desired LUN copy task.
Table 19-7 describes associated status parameters.
Parameter Definition
Health Status Health status of a LUN copy task. The value can be:
l Normal: The functionality and operating performance of the LUN copy
task are normal.
l Fault: The LUN copy task is running improperly.
Running Running status of a LUN copy task. The value can be Not start, Stopped,
Status Copying, Paused, Queuing, or Completed.
----End
Exception Handling
If a LUN copy alarm appears on the Current Alarms tab page, select the alarm and diagnose
the problem according to its details and repair suggestions.
Prerequisites
HyperMirror is license enabled.
Reference Standard
If the status of HyperMirror is normal, on the DeviceManager management page:
l Health Status is Normal.
l No alarms about HyperMirror are displayed on the Current alarms tab page.
Precaution
None
Procedure
----End
Exception Handling
If a new alarm about HyperMirror is displayed on the Current alarms tab page, select the
alarm, and troubleshoot the fault according to the alarm details and recommended actions.
Prerequisites
SmartMigration is license enabled.
Reference Standard
If the status of SmartMigration is normal, on the DeviceManager management page:
l Running Status is not Fault.
l No alarms about SmartMigration are displayed on the Current alarms tab page.
Precaution
None
Procedure
----End
Exception Handling
If a new alarm about SmartMigration is displayed on the Current alarms tab page, select the
alarm, and troubleshoot the fault according to the alarm details and recommended actions.
Prerequisites
Log in to DeviceManager as a read-only user.
Procedure
Step 2 In the Provisioning area on the left, click Resource Performance Tuning.
The Resource Performance Tuning page is displayed.
Step 3 Click an optimization feature that you want to view and check its status. If a fault occurs,
report it to maintenance personnel for handling. Table 19-10 provides items for checking
optimization features.
SmartQoS l On the Priority Control tab page, check I/O Priority, Health
Status and Running Status of LUNs or snapshots.
l On the Traffic Control tab page, check Status and Control Type
of a SmartQoS policy.
SmartPartition View Type and Read Partition Size of a SmartPartition and check
Health Status and Running Status of LUNs in the SmartPartition.
SmartCache l On the SmartCache Pool tab page, view Total Capacity and Used
Capacity of a SmartCache pool and check Health Status and
Running Status of disks in the SmartCache pool.
l On the SmartCache Partition tab page, view Expect Capacity
and Used Capacity of a SmartCache partition.
To view details, click next to the table heading. From the drop-down list, select indicators
you are concerned with.
----End
After a fault occurs, collect the basic information, fault information, storage device
information, network information, and application server information, and send it to
maintenance engineers. This can help maintenance engineers quickly locate and rectify the
fault. Please note that the information collection operations described in this chapter must be
authorized by customers in advance.
20.1 Types of Information to Be Collected
The information to be collected includes the basic information, fault information, storage
device information, network information, and application server information.
20.2 Exporting System Data
Periodically export the system data of a storage system and save it in a safe place. This helps
you know the operating status of the storage system and prevent the damage to the storage
system caused by system faults and unexpected disasters. When a system failure occurs, the
exported system data can be used to locate and analyze the failure. The system data to be
exported includes running data, system logs and disk logs.
20.3 Backing Up Storage System Configuration Data
All configuration data of a storage system must be backed up before a system upgrade or
capacity expansion. Backup data can be used to restore the storage system when the upgrade
or capacity expansion fails.
20.4 Exporting Alarms and Events
Alarms and Events record the faults and events that occur during storage system operation.
When the storage device is faulty, view the Alarms and Events to locate and rectify the fault.
20.5 Importing Storage System Configuration Data
When a system fails to be upgraded or malfunctions, you can import backed up system
configuration data to restore system configurations.
20.6 Huawei Technical Support
In the event of a storage system fault, you are advised to collect the information about the
fault, storage device, network, and application servers before contacting technical support
engineers. The mentioned information will help maintenance engineers quickly locate and
rectify the fault.
Basic Device serial Provide the serial number and version of the storage
information number and device.
version NOTE
You can log in to the DeviceManager and query the serial
number and version of the storage device in the General
area.
System data Manually export the operating data, and system logs of
the storage device.
Alarms and Manually export the alarms and events of the storage
events device.
Switch model Record the switch models if any switches exist on the
network.
Application Operating Record the types and versions of the operating systems
server system version installed on the application servers.
information
Port rate Record the port rates of the application servers
connected to the storage device. For details about how
to view port rate, see Help.
Context
l Running data indicates the real-time running status of a storage system, such as, the
configuration information of LUN. The running data file is in *.txt format.
l System logs record the information about the running data, events, and debugging
operations on a storage system and can be used for analyzing the running status of the
storage system. The system log includes recent log and historical log. When the size of
recent log reaches 10 MB, the system will dump the recent log to historical log. The
system log file is in *.tgz format.
l DHA runtime log is the daily runtime log of disk. It mainly includes daily disk health
status and IO information. The DHA runtime log file is in *.tgz format.
l HSSD log is working log of HSSD, such as, the S.M.A.R.T information of disk. The
HSSD log file is in *.tgz format.
Before the download of system logs, DHA runtime logs, or HSSD logs, the system collects
those logs of controllers and shows the collection progress. After all logs are collected, you
can download your desired logs.
NOTICE
l It takes several minutes to collect and export system logs or disk logs.
l After the system starts collecting system logs, DHA run logs, or HSSD logs, you need to
wait for five minutes or download all the collected logs before you collect and download
other logs.
Procedure
Step 1 Go to the Export Data dialog box.
l Under System Log, if you select Export All Logs, the system exports all system logs. If not, the
system exports the recent system logs.
l If you export the data using the Firefox browser with the default settings , the data will be saved in
the default download path of the browser. You can choose Tools > Options and click the General >
Browser in the Options dialog box to view the default download path.
l If you export the data using the Google Chrome browser with the default settings , the data will be
saved in the default download path of the browser. You can choose Customize and Control Google
Chrome > Settings and view the default download path in the Download Content area of the
Settings page.
----End
Prerequisites
l The storage system can access the File Transfer Protocol (FTP) server correctly.
l The FTP service has been enabled on the FTP server.
l A folder has been created for saving configuration files.
Context
Configuration data of the storage system can be collected only on the CLI.
Precautions
l Running status data of the storage system is exported in a .dat file. Do not modify any
content in this file.
l If configuration files need to be imported when anomalies occur, contact Huawei
technical support.
Procedure
Step 1 Log in to the CLI as a super administrator.
Step 2 Run the export configuration_data command to export configuration files to an FTP server.
NOTE
For details about this command, see the OceanStor 5300 V3&5500 V3&5600 V3&5800 V3&6800
V3&6900 V3 Storage System V300R001 Command Reference.
----End
Context
Specify the alarms to be exported by setting the alarm severity or time of occurrence.
This document uses Internet Explorer on a Windows server as an example. If you are using
other web browsers, adjust the operations accordingly.
Precautions
Alarms and system logs are saved in *.xls files. After they are exported, do not modify the file
content.
Procedure
Step 1 Go to the Alarms and Events page.
On the Current Alarms tab page, critical alarms, major alarms, and warnings are displayed.
You can export all or specified entries on the Current Alarms tab page.
On the All Events tab page, alarms of all severities are displayed. Alarms on the Current
Alarms tab page are exported to All Events.
You can export all or specified entries on the All Events tab page.
To export alarms or events of a specific severity, set the filter condition before exporting them.
2. Click Save As to save selected or all entries.
3. The Download dialog box is displayed. Click Save.
4. The Save As dialog box is displayed. Select a save path and click Save.
----End
Prerequisites
l The storage system can access the File Transfer Protocol (FTP) server correctly.
l The FTP service has been enabled on the FTP server.
l Ensure that the selected system configuration file is correct and has been backed up.
Context
Storage system configuration information can be imported only on the command-line
interface (CLI).
Precautions
l The type of configuration files to be imported is *.dat. Do not modify exported
configuration file contents.
l Do not perform any operation when importing configuration files.
Procedure
Step 1 Log in to the CLI as a super administrator.
NOTE
For details about this command, see the OceanStor 5300 V3&5500 V3&5600 V3&5800 V3&6800
V3&6900 V3 Storage System V300R001 Command Reference.
----End
After the connection between the storage system and an application server changes, relevant
configurations on the storage system and the application server must be changed. The purpose
is to allow the application server to use storage space through the new connection channels.
This chapter describes how to change configurations after replacing an HBA.
An HBA can be replacement either online or offline. The main configuration procedures after
an HBA replacement are shown in Figure 21-1 and Figure 21-2.
Start
Start
This section describes after replacing the HBA of an HP-UX host, how to configure the HBA
on the storage system and the host to make it work correctly.
21.5 Emergency Rollback of Configurations and Operations After Replacing an HBA
After replacing an HBA, if you encounter an abnormality or fault during configurations and
operations on the host or storage system, you can perform an emergency rollback as instructed
in this section.
Prerequisites
l The UltraPath software has been installed on the host.
l The old HBA of the host has been replaced.
Procedure
Step 1 Back up UltraPath and disk information.
1. Run upadm show vlun and upadm show path to view and back up the UltraPath status
information.
2. Back up disk Information.
a. Log in to the Windows Server 2008 application server as an administrator.
b. Press Windows+R (if the operation is performed remotely, perform it in full screen
mode) to open the Run dialog box.
c. Type diskmgmt.msc and press Enter.
d. In the Disk Management page that is displayed, view the host disk information.
3. Back up HBA information.
If the fcinfo software is installed on the host, do the following:
i. Press Window+R to open the Run dialog box.
ii. Type cmd and press Enter.
iii. In the command window that is displayed, run fcinfo to view the HBA
information.
If the fcinfo software is not installed on the host, do the following:
i. Press Window+R to open the Run dialog box.
ii. Type devmgmt.msc and press Enter to open the Device Manager page.
iii. Select Storage controllers and double-click Fibre Chanel Adapter. On the
Attribute page, view the vendor and version information.
Step 2 Check the storage system status. If there are alarms, clear them and then proceed to the next
step.
Step 3 On the storage system, export the storage system configuration data.
1. Log in to the command-line interface (CLI) of the storage system using PuTTY.
NOTE
The default user name and password are admin and Admin@storage respectively.
2. Run export running_data to export and save the current configuration file.
Step 4 Optional: If online replacement is used, you need to delete path information.
l If the HBA is replaced due to a failure, do the following:
a. Run upadm show path to show UltraPath status information.
b. Run upadm show iostat array_id=? to monitor the load balancing of paths.
Specify the storage device using the array_id parameter.
If I/Os are evenly distributed in the remaining paths and there are no errors after 30
seconds, press Ctrl+c to exit.
l If the HBA is replaced proactively, do the following:
a. Run upadm show path and upadm show vlun to show UltraPath status
information.
b. Run upadm set pathstate=disable to disable all paths connected to the old HBA.
Specify the path to be disabled using its path_id.
c. Run upadm show iostat array_id=? to monitor the load balancing of paths.
Specify the storage device using the array_id parameter.
If I/Os are evenly distributed in the remaining paths and there are no errors after 30
seconds, press Ctrl+c to exit.
d. Run upadm show path to show UltraPath status information.
In the execution result, the states of all paths connected to the old HBA are Disable.
Step 5 Check whether the new HBA is compatible with the storage system.
1. Press Window+R to open the Run dialog box.
2. Type devmgmt.msc and press Enter to open the Device Manager page.
3. Select Storage controllers and double-click Fibre Chanel Adapter. On the Attribute
page, view the vendor and version information.
Step 7 On the switch, check whether the zoning of the new HBA is complete.
----End
Prerequisites
l The old HBA has been replaced and the new HBA has been correctly installed.
l The WWNs of the old and new HBAs have been obtained.
l UltraPath has been installed on the application server.
Procedure
Step 1 On the storage system, replace the old WWN.
1. Run show initiator initiator_type=FC to view the connection status between the HBA
and the storage device and obtain the ID of the host to which the old HBA belongs.
2. Run remove host initiator initiator_type=FC to remove the WWN of the old HBA.
Specify the WWN of the old HBA using the wwn parameter.
3. Run add host initiator host_id=? initiator_type=FC wwn=? to add the new WWN to
the host. Specify the host and WWN of the new HBA using the host_id and wwn
parameters.
4. Run show initiator isfree=yes initiator_type=FC. If in the command output, the WWN
status of the new HBA is not Free, then the replacement is successful.
Step 2 Scan for disks on the host.
1. Press Windows+R (if the operation is performed remotely, perform it in full screen
mode) to open the Run dialog box.
2. Type devmgmt.msc and press Enter.
3. In the Device Manager window that is displayed, click View and select Show hidden
devices.
4. Right-click Disk Drives > Scan for hardware changes. The system will scan for disks
automatically.
5. Check whether the number of newly generated UltraPath_Disks is the same as the
number of mapped LUNs. If they are not the same, check the LUN mapping and path
connection status on the storage device.
6. Check whether the number of newly generated SCSI disks (SCSI Disk Devices on the
Huawei storage device) doubles or quadruples the number of UltraPath_Disks in Step
2.5. If not, check the LUN mapping and path connection status on the storage device.
Step 3 Run upadm show iostat array_id=? to monitor the load balancing of paths. Specify the
storage device using the array_id parameter.
If I/Os are evenly distributed in all paths and there are no errors after 30 seconds, press Ctrl+c
to exit.
----End
Prerequisites
l The UltraPath software has been installed on the host.
l The old HBA of the host has been replaced.
Procedure
Step 1 Back up UltraPath and disk information.
1. Run upadmin show vlun and upadmin show path to view and back up the UltraPath
status information.
2. Run vgdisplay and vgs to view and back up volume group (VG) information.
3. Run pvs -a to back up physical volume (PV) information.
4. Run fdisk -l|grep "Disk " and systool -c fc_host -v to back up disk and HBA
information.
Step 2 Check the storage system status. If there are alarms, clear them and then proceed to the next
step.
Step 3 On the storage system, export the storage system configuration data.
1. Log in to the command-line interface (CLI) of the storage system using PuTTY.
NOTE
The default user name and password are admin and Admin@storage respectively.
2. Run export running_data to export and save the current configuration file.
Step 4 Optional: If online replacement is used, you need to delete path information.
l If the HBA is replaced due to a failure, do the following:
a. Run upadmin show path to check whether the path status of the faulty HBA is
Fault. If the path status is Fault, run upadmin clear obsolete_path to delete the
faulty path. Specify the path whose status is Fault using its path_id.
b. Run upadmin show iostat array_id=? to monitor the load balancing of paths.
Specify the storage device using the array_id parameter.
If I/Os are evenly distributed in the remaining paths and there are no errors after 30
seconds, press Ctrl+c to exit.
c. Run upadmin show path to show UltraPath status information.
The information about the deleted paths should not appear in the execution result.
----End
Procedure
Step 1 On the storage system, replace the old WWN.
1. Run show initiator initiator_type=FC to view the connection status between the HBA
and the storage device and obtain the ID of the host to which the old HBA belongs.
2. Run remove host initiator initiator_type=FC to remove the WWN of the old HBA.
Specify the WWN of the old HBA using the wwn parameter.
3. Run add host initiator host_id=? initiator_type=FC wwn=? to add the new WWN to
the host. Specify the host and WWN of the new HBA using the host_id and wwn
parameters.
4. Run show initiator isfree=yes initiator_type=FC. If in the command output, the WWN
status of the new HBA is not Free, then the replacement is successful.
Step 2 Scan for disks on the host.
1. Run upRescan to scan for disks.
#upRescan
Begin to delete LUNs whose mappings do not exist
Begin to delete LUNs whose mappings are changed
2. Run upadmin show vlun to check whether the number of disks managed by UltraPath is
the same as planned.
3. Run upadmin show path to check whether the disk path status is normal. If you find a
path whose status is Degrade, run upadmin set phypathnormal to set the path to
Normal. Specify the path whose status is Degrade using the path_id.
Step 3 Run upadmin show iostat array_id=? to monitor the load balancing of paths. Specify the
storage device using the array_id parameter.
If I/Os are evenly distributed in all paths and there are no errors after 30 seconds, press Ctrl+c
to exit.
----End
Prerequisites
l The UltraPath software has been installed on the host.
l The old HBA of the host has been replaced.
Procedure
Step 1 Back up UltraPath and disk information.
1. Run upadm show vlun and upadm show path to view and back up the UltraPath status
information.
2. Run lsvg and lsvg vgname to view and back up volume group (VG) information where
vgname represents the name of the VG.
3. Run lspv to back up physical volume (PV) information.
4. Run lsdev -Cc disk and lsdev -Cc adapter respectively to back up disk and HBA
information.
Step 2 Check the storage system status. If there are alarms, clear them and then proceed to the next
step.
Step 3 On the storage system, export the storage system configuration data.
1. Log in to the command-line interface (CLI) of the storage system using PuTTY.
NOTE
The default user name and password are admin and Admin@storage respectively.
2. Run export running_data to export and save the current configuration file.
Step 4 Optional: If online replacement is used, you need to delete path information.
l If the HBA is replaced due to a failure, do the following:
a. Run upadm show path to show UltraPath status information.
b. Run rmpath -dl hdiskX -p fscsiY to delete paths whose parent is fscsiY, where
hdiskX and fscsiY indicates the device file name of a host disk and a to-be-replaced
HBA respectively.
c. Run upadm show iostat array_id=? to monitor the load balancing of paths.
Specify the storage device using the array_id parameter.
If I/Os are evenly distributed in the remaining paths and there are no errors after 30
seconds, press Ctrl+c to exit.
If I/Os are evenly distributed in the remaining paths and there are no errors after 30
seconds, press Ctrl+c to exit.
d. Run upadm show path to show UltraPath status information.
The information about the deleted paths should not appear in the execution result.
l If the HBA is replaced proactively, do the following:
a. Run upadm show path and upadm show vlun to show UltraPath status
information.
b. Run chpath -s disable -l hdiskX -p fscsiY to disable paths whose parent is fscsiY,
where hdiskX and fscsiY indicates the device file name of a host disk and a to-be-
replaced HBA.
c. Run upadm show iostat array_id=? to monitor the load balancing of paths.
Specify the storage device using the array_id parameter.
If I/Os are evenly distributed in the remaining paths and there are no errors after 30
seconds, press Ctrl+c to exit.
d. Run rmpath -dl hdiskX -p fscsiY to delete all disabled links.
e. Run upadm show path to show UltraPath status information.
The information about the deleted paths should not appear in the execution result.
Step 5 Delete disk devices connected to the links.
1. Run lsdev -Cc disk and lsdev -Cc disk | wc -l to view system disk status.
2. Run lsdev -p fscsiY and lsdev -p fscsiY -c disk -F name | xargs -n1 rmdev -dl to delete
disks connected to the path.
3. Rerun lsdev -Cc disk and lsdev -Cc disk | wc -l to view system disk information in
which the deleted disks should not exist.
Step 6 Check whether the new HBA is compatible with the storage system.
1. Run lscfg -vpl fcsY | grep Address to check whether the WWN of the new HBA is as
planned, where fcdY represents the new HBA.
2. Run fcstat fcsY to check whether the HBA model is compatible with the storage system.
Step 7 Check the system status and see whether there are disks or tapes connected to the HBA.
1. Run errpt to check the storage system status. If an error exists on the HBA or any disk,
remove it and proceed to the next step.
2. Run lsdev -p fcsY and lsdev -p fscsiY to check whether there are disks or tapes
connected to the new HBA, where fcsY indicates the device file name of the new HBA
and fscsiY indicates the subdevice of fcsY.
There should be no disk or tape under fscsiY.
3. Modify the properties of the device fscsiY.
a. Run the lsattr -El fscsiY to command to check whether fc_err_recov is fast_fail
and dyntrk is yes. If yes, go to Step 7.4. If no, go to Step 7.3.b.
b. Run the rmdev -l fscsiY -R command to clear the configuration of device fscsiY.
c. Run the chdev -l fscsiY -a fc_err_recov=fast_fail and chdev -l fscsiY -a
dyntrk=yes commands to modify the properties of device fscsiY.
4. Run cfgmgr -vl fcsY to scan for the HBA and generate the fscsiY device.
5. Run lsattr -El fcsY and lsattr -El fscsiY to see whether device parameters are changed
successfully.
6. Run lscfg -vpl fcsY | grep Address to view the WWN of the new HBA and record it.
Step 8 On the switch, check whether the zoning of the new HBA is complete.
----End
Procedure
Step 1 On the storage system, replace the old WWN.
1. Run show initiator initiator_type=FC to view the connection status between the HBA
and the storage device and obtain the ID of the host to which the old HBA belongs.
2. Run remove host initiator initiator_type=FC to remove the WWN of the old HBA.
Specify the WWN of the old HBA using the wwn parameter.
3. Run add host initiator host_id=? initiator_type=FC wwn=? to add the new WWN to
the host. Specify the host and WWN of the new HBA using the host_id and wwn
parameters.
4. Run show initiator isfree=yes initiator_type=FC. If in the command output, the WWN
status of the new HBA is not Free, then the replacement is successful.
Step 2 Scan for disks on the host.
1. Run lsdev -Cc disk and lsdev -Cc disk | wc -l to show disks on the host.
2. Run cfgmgr -vl fcsY to scan for the HBA and recognize the storage device.
3. Rerun lsdev -Cc disk and lsdev -Cc disk | wc -l and compare the result with that in Step
2.1. The number of newly generated device files should be the same as expected, and the
vendors should all be Huawei.
4. Run upadm show vlun and compare the result with that in Step 2.1 to check whether
the number of disks managed by UltraPath is the same as planned.
5. Run upadm show path to check whether the disk path status is Enable. If you find a
path whose status is Degrade, run upadmin set phypathnormal to set the path to
Normal. Specify the path whose status is Degrade using the path_id.
Step 3 Run upadm show iostat array_id=? to monitor the load balancing of paths. Specify the
storage device using the array_id parameter.
If I/Os are evenly distributed in all paths and there are no errors after 30 seconds, press Ctrl+c
to exit.
----End
Prerequisites
The old HBA of the host has been replaced.
Procedure
Step 1 Back up the NMP multipath and disk information.
1. Run scsimgr get_attr -a leg_mpath_enable to view and back up the multipath status.
2. Run vgdisplay -v to view and back up volume group (VG) information.
3. Run lspv to back up physical volume (PV) information.
4. Run ioscan -fkNC disk and ioscan -fnkC fc to back up disk and HBA information.
Step 2 Check the storage system status. If there are alarms, clear them and then proceed to the next
step.
Step 3 On the storage system, export the storage system configuration data.
1. Log in to the command-line interface (CLI) of the storage system using PuTTY.
NOTE
The default user name and password are admin and Admin@storage respectively.
2. Run export running_data to export and save the current configuration file.
Step 4 Optional: If online replacement is used, you need to delete link information from the NMP
multipath software.
l If the HBA is replaced due to a failure, do the following:
a. Run scsimgr lun_map -D /dev/rdisk/diskX to view disk path information, where
diskX represents a disk on the host.
b. Run ioscan -fnkC fc, ioscan -kfNC tgtpath, ioscan -P health -H xxx, and rmsf -
H xxx to delete links, where xxx indicates the ID of the HBA to be replaced.
c. Run sar -L 1 30 to monitor link I/Os.
d. Run scsimgr lun_map -D /dev/rdisk/diskX to view disk path information, where
diskX represents a disk on the host.
The information about the deleted links should not appear in the command output.
l If the HBA is replaced proactively, do the following:
a. Run scsimgr lun_map -D /dev/rdisk/diskX to view disk path information, where
diskX represents a disk on the host.
b. Run ioscan -fnkC fc, scsimgr -f disable -H xxx and ioscan -P health -H xxx to
disable links, where xxx indicates the ID of the HBA to be replaced.
c. Run rmsf -H xxx to delete all disabled links.
d. Run sar -L 1 30 to monitor link I/Os.
e. Run scsimgr lun_map -D /dev/rdisk/diskX to view disk path information. The
information about the deleted links should not appear in the command output.
Step 6 Check whether the new HBA is compatible with the storage system.
1. Run fcmsutil /dev/fcdY to check whether the WWN of the new HBA is as planned,
where fcdY represents the new HBA.
2. Run fcmsutil /dev/fcdY vpd to check whether the HBA is compatible with the storage
system.
Step 7 Check the system status and see whether there are disks or tapes connected to the HBA.
1. Run tail -200 /var/adm/syslog/syslog.log to check the storage system status. If an error
exists on the HBA or any disk, remove it and proceed to the next step.
2. Run ioscan -fnkC fc and ioscan -fnkH HW Path to see whether there are disks or tapes
connected to the new HBA, where HW Path indicates the path of the HBA to be
replaced.
There should be no disk or tape under fcdY.
Step 8 On the switch, check whether the zoning of the new HBA is complete.
----End
Prerequisites
l The old HBA has been replaced and the new HBA has been correctly installed.
l The WWNs of the old and new HBAs have been obtained.
Procedure
Step 1 On the storage system, replace the old WWN.
1. Run show initiator initiator_type=FC command to view the connection status between
the HBA and the storage device and obtain the ID of the host to which the old HBA
belongs.
2. Run remove host initiator initiator_type=FC command to remove the WWN of the old
HBA. Specify the WWN of the old HBA using the wwn parameter.
3. Run add host initiator host_id=? initiator_type=FC wwn=? command to add the new
WWN to the host. Specify the host and WWN of the new HBA using the host_id and
wwn parameters.
4. Run show initiator isfree=yes initiator_type=FC command. If in the command output,
the WWN status of the new HBA is not Free, then the replacement is successful.
d. Run ioscan -m dsf command to view the mappings between persistent disks and
legacy disks.
e. Run scsimgr lun_map -D /dev/rdisk/diskX command to view disk path
information with NMP enabled, where diskX represents a disk on the host.
Step 3 Run sar -L 1 30 command to monitor path I/Os.
If I/Os are evenly distributed in all paths and there are no errors after 30 seconds, press Ctrl+c
to exit.
----End
Start
End
Start
End
Alarm notification service configurations include the basic configurations of File Transfer
Protocol (FTP) servers, Simple Mail Transfer Protocol (SMTP) servers, and short message
service (SMS) modems. These configurations ensure that common alarm management
operations can be correctly performed.
Prerequisites
The FTP server software installation package is ready.
The IP address to be configured can correctly communicate with the storage system.
Procedure
Step 1 Start the Xlight FTP server software.
The Xlight FTP Server page is displayed.
Step 2 Configure a virtual server.
Select the added virtual server and click to start the server.
NOTE
You can select the added virtual server, right-click, and choose Start Server to start the server.
2. Click .
The adding users dialog box is displayed.
3. In the dialog box, enter Username and Password and set Home Directory.
4. Click OK.
The user is added, and user information is displayed on the user page.
----End
Prerequisites
The SMTP server software installation package is ready.
The IP address to be configured can correctly communicate with the storage system.
Procedure
Step 1 Install the Winmail Server software.
4. Click OK.
The created domain name is displayed in the domain name list.
Step 5 Set an email account.
1. In the navigation tree, choose User and Group > Users.
2. On the Users page, click Add.
The General dialog box is displayed.
3. In the General dialog box, set User name, Password, and Confirm password.
4. Click Next.
The Group page is displayed.
5. Optional: Select a group to which you want to add the user.
6. Click Next.
The Right page is displayed.
7. On the Right page, configure parameters in the Right and Auto forward areas.
8. Click Next.
The Quota page is displayed.
9. On the Quota page, set Mailbox quota, Number of mails, and Warning limit.
10. Click Finish.
The user and email account are configured. The user is displayed in the user list of the
Users page.
----End
Follow-up Procedure
After configuring the email server, you need to configure an email address for receiving
notifications. The detailed configuration steps vary depending on your email version.
Prerequisites
The SMS modem to be installed is working correctly.
The subscriber identity module (SIM) card has a positive balance.
Procedure
Step 1 Set a baud rate for the SMS modem.
Ensure that the baud rate of the SMS modem is the same as that of the storage device.
NOTE
The default baud rage of Huawei storage systems is 115,200.
----End
C Glossary
A
AC power The module that transfers the external AC power supply into the
module power supply for internal use.
Application A service processing node (a computer device) in the network.
server Application programs of data services are run on the application
server.
Asynchronous A kind of remote replication. When the data on the primary site is
remote updated, the data does not need to be updated on the mirroring site
replication synchronously to finish the update. In this way, performance is not
reduced due to data mirroring.
B
Backup A periodic operation performed on the data stored in the database for
the purposes of database recovery in case that the database is faulty.
The backup also refers to data synchronization between active and
standby boards.
Bandwidth A range of transmission frequencies that a transmission line or
channel can carry in a network. In fact, it is the difference between
the highest and lowest frequencies the transmission line or channel.
The greater the bandwidth, the faster the data transfer rate.
Baud rate The number of times per second the signal can change on a
transmission line. Commonly, the transmission line uses only two
signal states, making the baud rate equal to the number of bits per
second that can be transferred. The underlying transmission technique
may use some of the bandwidth, so it may not be the case that user
data transfers at the line's specified bit rate.
Bit error A computer that is connected to the serial port or management
network port of the storage system for maintenance.
Bit error rate The percentage of bits that have errors relative to the total number of
bits received in a transmission.
Bonding Bonding can bind multiple independent physical network ports into a
logical port, which ensures the high availability of server network
connections and improving network performance.
Boundary scan A test methodology that uses shift registers in the output connections
of integrated circuits. One IC often is connected to the next. A data
pattern is passed through the chain and the observed returned data
stream affected by the circuit conditions gives an indication of any
faults present. The system is defined under IEEE standard 1149.1 and
is also often known as JTAG (Joint Test Action Group).
Browser/Server An architecture that defines the roles of browser and server, where the
browser is the service request party and the server is the service
provider.
C
Cache hit ratio The ratio of directly accessed I/O from Cache to all the I/O operation
during the read operation.
Cache prefetch According to the operation in which data has been read or is being
strategy read, the required data is read from a disk into the cache in advance.
Captive Screw After the screw is loosened, screw caps and bolts are not disconnected
from the main body.
Cascading Connect the storage system to more disk enclosures through
connection cables, thus expanding the capacity of the storage system.
CHAP A method to periodically verify the identity of the peer using a 3-way
handshake. During the establishment of a link, the authenticator sends
a "challenge" message to the peer. The peer responds with a value
calculated using a "one-way hash" function. The authenticator checks
the response against its own calculation of the expected hash value. If
the values match, the authentication is acknowledged. CHAP
provides protection against playback attack.
Clone A snapshot technology. The source data is completely copied to
generate a data duplicate; therefore the duplicate needs the storage
space as the same size as the source data. It is also called clone. In the
VIS system, it is also called third-mirror break-off snapshot.
Cluster A mechanism adopted to improve the system performance. Several
devices of the same type form a cluster. The exterior of a cluster is
some like a kind of equipment. In the interior of a cluster, the nodes
share the load.
Coffer A technology for ensuring data security and integrity in a storage
system. It is used to store the mission-critical data of the system.
Coffer disk Disks that build up the coffer.
Constant prefetch A cache prefetch strategy. The size of the data to be prefetched is the
size as set. This strategy applies to the applications that require
reading data of a fixed size in a certain order. An example is the
streaming media demanded by multiple subscribers who use the same
bit rate.
Controller The core module that processes services in a storage system. It
contains physical components such as system-level CPUs and
memory.
Controller An enclosure that accommodates controllers and provides storage
enclosure services. It is the core component of a storage system, and generally
consists of components such as controllers, power supplies, and fans.
Copyback The process of copying the data from the hot spare disk back to the
previous disk when the faulty member disk is restored or replaced by
a new one.
Copying A state of pair. The state indicates that the source LUN data is being
synchronized to the target LUN.
D
Data flow A process that involves processing the data extracted from the source
system, such as filtering, integration, calculation, and summary,
finding and solving data inconsistency, and deleting invalid data so
that the processed data meets the requirements of the destination
system for the input data.
Data migration It is the process to cleanse and transform historical data, and then load
them to the new system.
Data source A system, database, or file that can make BOs persistent. A data
source can be a database instance or a database user.
Data switch A data switch used for interconnections between controllers.
Dirty data The data that is stored temporarily on cache and has not been written
onto disks.
Disaster recovery A system deployment solution aiming at reducing loss in disasters. A
set of disaster recovery system that is the same as the production
system is deployed as a backup to store the production data when a
fault occurs in the production system. The applications are switched
over to the disaster recovery system before the production system
recovers. After the production system recovers, the applications are
switched back to the production system.
Disk array A set of disks from one or more commonly accessible disk
subsystem. These disks are combined and controlled by the control
software. The control software provides the storage capacity of these
disks for hosts as one or more virtual disks.
Disk Domain A combination of disks. A disk domain consists of the same type or
different types of disks. Disk domains are isolated from each other.
Therefore, services carried by different disk domains do not affect
each other in terms of performance and faults (if any).
Disk location Locate a hard disk, that is, determine the enclosure number and slot
number of the hard disk in the storage system.
Disk enclosure It consists of the following parts in redundancy: expansion module,
hard disk, power module, and fan module. System capacity can be
expanded by cascading multiple disk enclosures.
Disk utilization The percentage of used capacity in the total available capacity.
E
eDevLUN Logic space created by third-party storage systems.
(external device
LUN)
Engine Two controllers in one enclosure are called Engine.
Expansion Connecting a storage system to more disk enclosures through
connection cables, thus expanding the capacity of the storage system.
Expander module A component used for expanding.
F
Failover The automatic substitution of a functionally equivalent system
component for a failed one. The term failover is most often applied to
intelligent controllers connected to the same storage devices and host
computers. If one of the controllers fails, failover occurs, and the
survivor takes over its I/O load.
Field replaceable A unit that can function as a circuit board, part, or component of an
unit electronic device. It can be quickly and easily removed from a
personal computer or other electronic devices. If an FRU becomes
faulty, users can replace it with a new one instead of sending the
entire product or system for maintenance.
File Engine The component in a unified storage systems that provides file-level
service.
Firmware The programmable software part in a hardware component. A
firmware is a part of hardware, but is scalable as software.
Front-end host The port that connects the controller enclosure to the service side and
port transfers service data. There are three types of front-end host ports:
SAS, FC, and iSCSI.
H
Hard disk A non-volatile storage device that stores digitally encoded data on
rapidly rotating platters with magnetic surfaces. Hard disks generally
offer more storage and quicker access to data than floppy disks do.
Hard disk tray The tray that bears the hard disk.
Heartbeat Heartbeats are the packets, requiring no acknowledgement,
transmitted between two devices. The device can judge the validity
status of the peer device. Heartbeat supports node communication,
fault diagnosis, and event triggering.
Hit ratio The ratio of directly accessed I/Os from cache to all I/Os.
Hot swap In a running system, inserting or removing a blade does not affect
normal running of the system.
I
I/O Data movement process between memory and peripheral devices in
the computer system. I/O is a collective name, indicating the
operations reading data into the memory and writing data to other
places from computer memory.
Initiator A system component that can initiate an I/O operation on an I/O bus
or on a network.
Intelligent A cache prefetch strategy. The system software calculates a proper
prefetch size of prefetched data. This strategy applies to a read application
involving a single bit stream or to the situations where you do not
know whether the data is read in a certain order. An example is
reading or writing a file.
Interface module interface module connects various types of front-end host port, such
as the front-end host ports of SAS, FC and iSCSI.
The interface module can be configured with one type of the
following host ports or expansion ports: 10Gb iSCSI, 8Gb FC, and
iSCSI host ports, or 4Gb FC and 6Gb SAS expansion ports.
Load balance A method of adjusting the system, application components and data to
averagely distribute the applied I/O or computing requests for
physical resources of the system.
Logical unit The entity is located inside the SCSI object, and can execute I/O
commands. After a SCSI I/O command is sent to an object, the logic
unit inside the object executes this command. Usually, each SCSI
physical disk has one logic unit. A tape drive and array controller may
have multiple logic units, which process different I/O commands.
Each logic unit inside an array controller corresponds to a virtual
disk.
Logical unit The SCSI identifier of the internal logical unit of a target.
number
LUN format The process of writing 0 bits in the data area on the logical drive and
generating related parity bits so that the logical drive can be in the
ready state.
LUN mapping The storage system maps LUNs to ASs so that the ASs can access the
storage reorganization.
SmartMigration It is also called LUN migration. It indicates a method for the data in
the LUN to migrate between different physical storage space while
ensuring data integrity and uninterrupted operation host services.
LUN copy The function of copying the original LUN data to one or multiple
target LUNs.
M
Maintenance The computer that is connected through a serial port or management
terminal network port and maintains the storage system.
Management An entity that provides a means to transmit and process the
network information related to network management.
Management The network port on the controller enclosure that is connected to the
network port maintenance terminal. It is provided for the remote maintenance
terminal.
N
Node A managed device in the network. For a device with a single frame,
one node stands for one device. For a device with multiple frames,
one node stands for one frame of the device.
P
Power failure When the external power failure occurs, the AC PEM depends on the
protection battery for power supply, which ensures the integrity of the dirty data
in cache.
Pre-copy When the system monitors that a member disk in a RAID group is to
fail, the system copies the data on the disk to a hot spare disk in
advance. This technology is called pre-copy.
Primary storage The controller that plays a leading role in controlling the management
controller is the primary storage controller. It can perform relevant management
operations on the controller enclosure.
Primary/ A procedure during which the two controllers of the storage system
Secondary change their master/slave states.
switchover
Prior controller For the application server LUN, prior controller means that the
working controller is the owner controller of the corresponding array
LUN.
R
RAID level The application of different redundant types to a logical drive. A
RAID level improves the fault tolerance or performance of the logical
drive but reduces the available capacity of the logical drive. You must
specify a RAID level for each logical drive.
Reconstruction A function of the storage system. It refers to the process of restoring
the data saved in the faulty member disk in a storage pool.
Redundancy The scheme to add more than one channels, elements or parts that
have the same functions with the counterparts in the system or device
at a critical place. When a fault occurs, the system or device can work
well, and the reliability is then improved.
S
Script A collection of data statements used to perform an operation.
Secondary (1) A controller that backs up service and management data of the
controller primary controller in a clustered system. When the primary controller
fails, the secondary controller is upgraded to the primary controller
and takes over the management and services of the controller
enclosure. (2) A controller that backs up the management data of the
primary controller in a block-level array. When the primary controller
fails, the secondary controller is upgraded to the primary controller
and takes over the management of the system.
Serial port An input/output location (channel) that sends and receives data to and
from a computer's CPU or a communications device one bit at a time.
Serial ports are used for serial data communication and as interfaces
with some peripheral devices, such as mice and printers.
Service data Data which is saved in data disk. Service data is the data source for
computing check data in parity disk.
Service network The network port that is used to store services.
port
SFP optical A component that can make data conversion between optical signals
transceiver and electrical signals and that can receive and transfer data.
Simple network A network management protocol of TCP/IP. It enables remote users to
management view and modify the management information of a network element.
protocol This protocol ensures the transmission of management information
between any two points. The polling mechanism is adopted to provide
basic function sets. According to SNMP, agents, which can be
hardware as well as software, can monitor the activities of various
devices on the network and report these activities to the network
console workstation. Control information about each device is
maintained by a management information block.
Single point A type of failure. Data transmission over a network is stopped and
failure cannot be recovered automatically if a single point failure occurs. The
point can be an interface, a board, a device, or a link.
Small computer A set of standards for physically connecting and transferring data
system interface between computers and peripheral devices. SCSI is most commonly
used for hard disks and tape drives, but it can connect a wide range of
other devices, including scanners, and optical drive.
SmartTenancy A feature of Huawei storage system. With SmartTenancy, multiple
virtual storage systems can be created in one physical storage system,
which allows tenants to share the same storage system hardware
resource without affecting data security and privacy of each other.
This feature achieves more flexible, easy-to-manage and low-cost
shared storage in a multi-protocol unified storage architecture.
Snapshot A data backup technology through which a fully usable copy of a data
object can be quickly generated. The duplicate contains the image of
the data object at a point in time.
Snapshot copy A copy of the snapshot LUN, which is also a snapshot LUN.
Storage system An integrated system. It consists of the following parts: controller,
storage array, host bus adapter, physical connection between storage
units, and all control software.
Storage unit An abstract definition of backup storage media for storing backup
data. The storage unit is connected with actual storage media, used to
back up data.
Streaming media A transmission mode in which data is consumed (read, listened to, or
watched) while it is being sent.
Stripe The set of strips at corresponding locations of each member extent of
a disk array which uses striped data mapping. The strips in a stripe are
associated with each other in a way (e.g. relative extent block
addresses) that allows membership in the stripe to be quickly and
uniquely determined by a computational algorithm. Parity RAID uses
stripes to map virtual disk block addresses to member extent block
addresses.
Subnet A type of smaller networks that form a larger network according to a
rule, for example, according to different districts. This facilitates the
management of the large network.
Subnet mask The technique used by the IP protocol to determine which network
segment packets are destined for. The subnet mask is a binary pattern
that is stored in the device and is matched with the IP address.
Synchronous A kind of remote replication. When the data on the primary site is
remote updated, the data must be synchronously updated on the mirroring site
replication before the update is complete. In this way, the data that is stored on
both the primary and mirroring sites can be synchronized.
Target A system component that can receive SCSI I/O operation commands.
Target LUN The target for LUN copy.
Thin provisioning A mechanism that offers on-demand allocation of storage space.
Thin LUN The thin LUN is a logic disk that can be accessed by hosts. The thin
LUN dynamically allocates storage resources from the thin pool
according to the actual capacity requirements of users.
Timing Snapshot To create snapshots periodically to continuously protect data.
Topology The logical layout where computer systems and network components
are interconnected with one another. The topological structure gives
the interconnection relationship among the components from the
viewpoint of communication, but the topological structure does not
specify the exact locations of components and the interconnection
mode.
Trap A type of SNMP message that indicates the occurrence of an event.
This type of message is transmitted to the received through UDP. The
transmission process is not completely reliable.
U
User datagram A TCP/IP standard protocol that allows an application program on
protocol one device to send a datagram to an application program on another.
User Datagram Protocol (UDP) uses IP to deliver datagram. UDP
provides application programs with the unreliable connectionless
packet delivery service. There is a possibility that UDP messages will
be lost, duplicated, delayed, or delivered out of order. The destination
device does not confirm whether a data packet is received.
User interface The space in which users interact with a machine.
V
Variable prefetch A cache prefetch strategy. The size of the data to be prefetched is the
multiple for prefetching multiplied by the length of a read command.
This strategy applies to the applications that require reading data of
variable size in a certain order or to the situations where multiple
subscribers read data concurrently but no fixed prefetch size can be
set, because the amount of pre-read data cannot be judged. An
example is the streaming media demanded by multiple subscribers
who use different bit rates.
vStore A property of SmartTenancy. In Huawei SmartTenancy, a tenant is
called a vStore, which represents a virtual storage system.
Working The controller used by the array LUN to read and write a disk.
controller
Write back A caching technology in which the completion of a write request is
signaled as soon as the data is in cache, and actual writing to non-
volatile media occurs at a later time. Write back includes an inherent
risk that an application will take some action predicated on the write
completion signal, and a system failure before the data is written to
non-volatile media will cause media contents to be inconsistent with
that subsequent action. For this reason, good write back
implementations include mechanisms to preserve cache contents
across system failures (including power failures) and to flush the
cache at system restart time.
Write through A caching technology in which the completion of a write request is
not signaled until data is safely stored on non-volatile media. Write
performance with the write through technology is approximately that
of a non-cached system, but if the data written is also held in cache,
subsequent read performance may be dramatically improved.
Z
Zone In the fiber channel, a collection of the N_Port or the NL_Port which
can communicate with each other in the optical network. Only the
N_Port or the NL_Port in the same partition can communicate with
each other through the optical network.
A
ANSI American National Standards Institute
B
BBU Backup Battery Unit
C
CLI Command Line Interface
E
ESN Equipment Serial Number
F
FC Fiber Channel
FRU Field Replaceable Unit
FTP File Transfer Protocol
G
GUI Graphical User Interface
H
HBA Host Bus Adapter
I
I/O Input/Output
IP Internet Protocol
IPv4 Internet Protocol version 4
IPv6 Internet Protocol version 6
ISA Instrument Society of America
iSCSI Internet Small Computer Systems Interface
ISO International Organization for Standardization
L
LDAP Lightweight Directory Access Protocol
LUN Logical Unit Number
N
NTP Network Time Protocol
S
SAS Serial Attached SCSI
SMTP Simple Mail Transfer Protocol
SNMP Simple Network Management Protocol
T
TCP/IP Transmission Control Protocol/Internet Protocol
U
UDP User Datagram Protocol
UTC Coordinated Universal Time