Addonics iSCSI Subsystem ISC8P2G-S User Manual
Table of Contents Chapter 1 1.1 1.2 1.3 1.4 RAID introduction ................................ ........ 4 Features ............................................................................ 4 Terminology....................................................................... 6 RAID levels ........................................................................ 8 Volume relationship diagr am........................................... 10 Chapter 2 2.1 2.2 2.3 Getting started .............................
.6.6 3.6.7 3.7 Logical unit number ................................ . Error! Bookmark not defined. Examples ................................ ................. Error! Bookmark not defined. Enclosure management .................................................. 56 3.7.1 3.7.2 3.7.3 3.7.4 3.8 SES configuration ................................ ................................ ................... 56 Hardware monitor ................................ ................................ ...................
Chapter 1 RAID Introduction 1.1 Features The Addonics ISC8P2G -S iSCSI subsystem is a high -performance hardware RAID controller. • • • • • • • • • • • • 2 GbE NIC ports . iSCSI jumbo frame support . RAID 6, 60 ready . Snapshot (QSnap) integrated on the subsystem. SATA II drives backward compatible . One logic volume can be shared by as many as 32 hosts . Host access control . Configurable N -way mirror for high data protection . On-line volume migration with no system downtime . HDD S.M.A.R.T.
taken at target side and done by ISC8P2G -S. It will not con sume any host CPU. The snapshot copies can be taken manually or be scheduled every hour or every day. Caution Snapshot (QSnap) / rollback feature s need 512MB RAM or more. Please refer to RAM certificati on list in Appendix A for more detail.
1.2 Terminology The document uses the following terms: RAID RAID is th e abbreviation of “Redundant Array of Independent Disks”. There are different RAID levels with different degree of data protection , data availability, and performance to the host environment. PD The Physical Disk is a member disk of one specific volume group. VG Volume Group. A collection of removable media . One VG consists of a set of UDVs and owns one RAID level attribute. UDV User Data Volume.
3. One RAID 10 volume over 3 4 -disk RAID 1 volume: RAID width=1; RAID copy=4; RAID row=3. WT Write-Through cache write policy. A caching technique in which the completion of a write request is not signaled until data is safely stored on non -volatile media. Each data is synchronized in both data cache and the accessed physical disks. WB Write-Back cache write policy.
MC/S Multiple Connections per Session S.E.S SCSI Enclosure Services. SAF-TE SCSI Accessed Fault-Tolerant Enclosures. NIC Network Interface Card. iSCSI Internet Small Computer Systems Interface. LACP Link Aggregation Control Protocol. MTU Maximum Transmission Unit. CHAP Challenge Handshake Authentication Protocol. An optional security mechanism to control access to an iSCSI storage system over the iSCSI data ports. iSNS Internet Storage Name Service. 1.3 RAID levels RAID 0 Disk striping.
RAID 0+1 Mirroring of the member RAID 0 volumes. RAID 0+1 ne eds at least four hard drives. RAID 10 Striping over the member RAID 1 volumes. RAID 10 needs at least four hard drives. RAID 30 Striping over the member RAID 3 volumes . RAID 30 needs at least six hard drives. RAID 50 Striping over the member RAID 5 v olumes. RAID 50 needs at least six hard drives. RAID 60 Striping over the member RAID 6 volumes. RAID 60 needs at least eight hard drives.
1.4 Volume relationship diagram LUN 1 VD 1 LUN 2 LUN 3 VD 2 Snap VD + + + RG PD 1 PD 2 Global CV PD 3 DS Dedicate d CV RAM Figure 1.4.1 This is the volume structure Addonics designed. It describes the relationship of RAID components. One RG (RAID group) consists of a set of VDs (Virtual disk) and owns one RAID level attribute. Each RG can be divided into several VDs. The VDs in one RG share the same RAID level, but may have different volume capacity.
Chapter 2 Getting started 2.1 Before starting Before starting, prepare the following items. 1. 2. 3. 4. 5. 6. 7. 8. Check the “Certification list” in Appendix A to confirm the hardware setting is fully supported. A server or worksation with a NIC or iSCSI HBA. CAT 5e, or CAT 6 network cable s for web GUI IP port and iSCSI data ports. We recommend CAT 6 cables for best performance. Prepare storag e system configuration plan. Management (web GUI IP port) and iSCSI data ports network information.
The iSCSI target is the storage dev ice itself or an appliance which controls and serves volumes or virtual volumes. The target is the device which performs SCSI commands or bridges it to an attached storage device. iSCSI targets can be disks, tapes, RAID arrays, tape libraries, and etc. Host 2 (initiator) iSCSI HBA Host 1 (initiator) NIC IP SAN iSCSI device 1 (target) iSCSI device 2 (target) Figure 2.2.1 The host side need s an iSCSI initiator.
Open-iSCSI README: http://www.open -iscsi.org/docs/README Google g roups: http://groups.google.com/group/open -iscsi/threads?gvc=2 http://groups.google.com/group/open -iscsi/topics 3. globalSAN iSCSI Initiator for OS X http://www.studionetworksolutions.com/products/product_detail.php?t= more&pi=11 ATTO iSCSI initiator is available for Mac. Website: http://www.attotech.com/xtend.html 2.3 Management methods There are three management methods to manage ISC8P2G-S iSCSI subsystem : 2.3.
2.3.2 Console serial port (Optional) Use NULL modem cable to connect console port. The console setting is baud rate: 115200, 8 bits, 1 stop bit, and no parity. Terminal type: vt100 Login name: admin Default password: supervisor 2.3.3 Remote control – secure shell SSH (secure shell) is requir ed for ISC8P2G -S to remote login. The SSH client software is available at the followin g web site: SSHWinClient WWW: http://www.ssh.com/ Putty WWW: http://www.chiark.gre enend.org.uk/ Host name: 192.168.1.
Press “ENT”. The following are LCM functions: “Alarm Mute ”, “Reset/Shutdown” , “Quick Install”, “View IP Setting” , “Change IP Config” and “Reset to Default” . To shift between the menus, press • (up) or ‚ (down) buttons. When a WARNING or ERROR is detected within the device , the LCM displays the event log to provide users more detail s. The following table shows each function ’s description. System Info. Display system information.
The following is LCM menu hierarchy. [System Info.] [Alarm Mute] [Firmware Version x.x.x] [RAM Size xxx MB] [•Yes No‚] [Reset] [Reset/Shutdown] [Shutdown] [Quick Install] Addonics Technology •‚ [Volume Wizard] [View IP Setting] RAID 0 RAID 1 RAID 3 RAID 5 RAID 6 RAID 0+1 xxx GB [Local] RAID 0 RAID 1 RAID 3 RAID 5 RAID 6 RAID 0+1 [JBOD x] •‚ RAID 0 RAID 1 RAID 3 RAID 5 RAID 6 RAID 0+1 [IP Config] [Static IP] [IP Address] [192.168.010.050] [IP Subnet Mask] [255.255.255.0] [IP Gateway] [192.168.010.
Caution Before powering off, it is recommended to execute “Shutdown” to flush the data from cache to physical disks. 2.4.2 System buzzer The system buzzer features ar e describe in the following: 1. 2. 3. 2.4.3 The system buzzer alarm s for 1 second when system boots up successfully. The system buzzer alarm s continuously when an error event happens. To stop the alarm , use the alarm mute option . The alarm will be muted automatically wh en the error situation is resolved. E.g.
Chapter 3 Web GUI guideline 3.1 ISC8P2G-S Web GUI Hierarchy The table below shows the hierarchy of ISC8P2G-S Web GUI.
System information Upgrade Reset to default Import and export Event log Reboot and shutdown Logout à System information à Browse the firmware to upgrade / Export configuration à Sure to reset to factory default? à Import/Export / Import file à Download / Mute / Clear à Reboot / Shutdown Sure to logout? 3.2 Login On the web browser, ty pe the IP address shown on the LCM display. Figure 3.2.
After lo gin, you can ch oose the Quick installation function block on the left side of the window to do configuration. Figure 3.2.3 There are four indicators at the top -right corner of the web GUI. Figure 3.2.4 1. RAID light: Green means , the RAID array is correctly functioning . Red represents RAID failure or degradation . 2. Temperature light: Green is normal. Red represents abnormal temperature. 3. Voltage light: Green is normal. Red represents abnormal voltage status. 4.
3.3 Quick Installation The “Quick installation” function is used to create a volume. The ISC8P2G-S Quick Install ation function has a smart policy. When the system is full, meaning all 8 HDD are connected and all HDD have the same size, ISC8P2G-S’s Quick Install function lists all possible configurations and sizes among different RAID level options. The ISC8P2G -S Quick installation will use all available HDD for the RAID level which the user decides.
Step 4: Confirm page. Click “ a VD will be created. ” if all setups are correct. Then Done. You can start to use the system now. Figure 3.3.2 (Figure 3.3.2: A RAID 0 Virtual disk with the VD name “QUICK83716”, named by system itself, with the total available volume size 297GB.
3.4 System configuration “System config uration” is used for setting up the “System setting”, “IP address”, “Login setting”, “Mail setting ”, and “Notification setting ”. Figure 3.4.1 3.4.1 Formatted System setting “System setting ” can set system name and date . Default “System name” is the model name, e .g.: ISC8P2G-S. You can modify the system name. Figure 3.4.1.
3.4.2 IP address “IP address” enables you to change the IP address for remote administration usage. There are 2 options, DHCP (Get IP address from DHCP server) or static IP. The default setting is DHCP. User can change the HTTP, HTTPS, and SSH port number when the default port number is not allowed on host/server. Figure 3.4.2.1 3.4.3 Login setting “Login setting” enables you to set single admin management , auto logout time and Admin/User password .
2. Login lock: Disable/Enable. When the login lock is enabled, the system allows only one user to login or modify system settings. Figure 3.4.3.1 Check “Change admin p assword” or “Change user p assword” to change admin or user password. The maximum length of the password is 12 chara cters.
3.4.4 Mail setting “Mail setting” Enter at most 3 mail addresses for receiving the ev ent notification. Some mail servers would check “Mail-from address” and need authentication for anti -spam. Fill the necessary fields and click “Send test mail” to test whether email functions are available. User can also select which levels of event logs w ill be sent via mail. Default setting only enables ERROR and WARNING event logs. Figure 3.4.4.
3.4.5 Notification setting “Notification setting ” can set up SNMP trap for alerting via SNMP , pop-up message via Windows Messenger (not MSN) , alert via syslog protocol , and event log filter. Figure 3.4.5.1 “SNMP” allows up to 3 SNMP trap addresses. Default community setting is “public”. User can choose the event log levels and default setting only enables INFO event log in SNMP. There are many S NMP tools.
SNMPc: http://www.snmpc.com/ Net-SNMP: http://net-snmp.sourceforge.net/ Using “Messenger” , user must enabl e the service “Messenger” in Windows (Start à Control Panel à Administrative Tools à Serv ices à Messenger), and then event logs can be received. It allows up to 3 messenger addresses. User can choose the event log levels and default setting enables the WAR NING and ERROR event logs. Using “System log server” , user can choose the facility and the event log level. The default port of syslog is 514.
3.5.1 Entity property “Entity property ” will enable you to view the entity name of the ISC8P2G-S, and setup “iSNS IP ” for iSNS (Internet Storage Name Service ). iSNS protocol allows automated discovery, management and configuration of iSCSI devices on a TCP/IP netw ork. If using iSNS, you need to install a iSNS server in the SAN. Add an iSNS server IP address into iSNS server lists in order that iSCSI initiat or service can send queries. The entity name of ISC8P2G -S can not changed. Figure 3.5.1.1 3.
Default gateway: Default gateway can be changed by m oving cursor to the gray button of the LAN port, click “Become default gateway ”. MTU / Jumbo frame: MTU (Maximum Transmission Unit) size can be enabled by moving cursor to the gray button of LAN port, click “Enable jumbo frame ”. Caution The MTU size of the switching hub and HBA on the host must be enabled. Otherwise, the LAN connection cannot work properly.
3.5.3 Node “Node” enables you to view the target name for iSCSI initiator. ISC8P2G -S supports single -node. The node name of ISC8P2G-S cannot be changed. Figure 3.5.3.1 (Figure 3.5.3.1: ISC8P2G-S, single-mode.) CHAP: CHAP is the abbreviation of Challenge Handshake Authorization Protocol. CHAP is a strong authentication method used in point-to-point for user login.
3.5.4 Session “Session” can display iSCSI session and connection information, including the following items: 1. 2. 3. 4. Host (Initiator Name) Error Recovery Level Error Recovery Count Detail of Authentication status and Source IP: port number. Figure 3.5.4.1 (Figure 3.5.4.1: iSCSI Session.) To view more information, move c ursor to the gray button of sessi on number, click “List connection ”. It will list all connection(s) of the session. Figure 3.5.4.2 (Figure 3.5.4.2: iSCSI Connection.) 3.5.
Figure 3.5.5.3 3. Click “ ”. Figure 3.5.5.4 (Figure 3.5.5.4: created a CHAP account named “chap1”.) 4. Click “Delete” to delete CHAP account. 3.6 Volume configuration “Volume config uration” is designed for setting up volume configuration information which includes “Volume create wizard ”, “Physical disk” , “RAID group”, “Virtual disk”, “Snapshot”, and “Logical unit” . Figure 3.6.
3.6.1 Volume creation wizard The “Volume creation wizard ” has a smart policy. When the system is full , meaning all 8 HDD are connected , and all HDD have the same size, ISC8P2G S’s Quick Install function lists all possible configurations and si zes among different RAID level options. The ISC8P2G -S Quick Install ation will use all available HDD for the RAID level which the user decides. But when the system is inserted with different sizes of HDD, e.g.
Step 4: Confirm page. Click “ a VD will be created. ” if all setups are correct. Then Done. You can start to use the system now. Figure 3.3.2 3.6.2 Formatted Physical disk “Physical disk” allows you to view the status of hard drives in the system. The followings are operational tips: 1. 2. Move the cursor to the gray button next to the drive number under Slot . It will show the functions that can be executed. Active function s can be selected, but inactive functions will be grayed out.
Step 2: Select the RGs which you want this drive to be set as a dedicated spare disk, then click “ ”. Figure 3.6.2.2 Formatted Done. View “Physical disk ” page. Figure 3.6.2.3 (Figure 3.6.2.3: Physical disks of slot 1,2,3 are created for a RG named “RG-R5”. Slot 4 is set as dedicated spare disk of RG named “RG-R5”. The others are free disks.) • PD column description: Slot The position of the hard drive s. The button next to the number of slot shows the functions which can be executed.
Health The health of hard drive. “Good” à the hard drive is good. “Failed” à the hard drive failed. “Error Alert” à S.M.A.R.T. error alert. “Read Errors ” à the hard drive has unrecoverable read errors. Usage “RD” à RAID Disk. This hard drive has been set to RAID. “FR” à FRee disk. This hard drive is free for use. “DS” à Dedicated Spare. This hard drive has been set to the dedicated spare of the RG. “GS” à Global Spare. This hard dri ve has been set as a global spare of all RGs. “RS” à ReServe.
Set Global spare Set the selected hard drive to global spare of all RGs. Set Dedicated spares Set hard drive to dedicated spare of selected RGs. Set property Change the status of write cache and standby . Write cache options: “Enabled” à Enable disk write cache . “Disabled” à Disable disk write cache. Standby options: “Disabled” à Disable spindown . “30 sec / 1 min / 5 min / 30 min ” à Enable hard drive auto spindown to save power. More information 3.6.3 Shows hard drive detail ed information.
Step 2: Confirm page. Click “ ” if all setups are correct . Figure 3.6.3.2 (Figure 3.6.3.2: There is a RAID 0 with 4 physical disks, named “RG-R0”, total size is 135GB. Another is a RAID 5 with 3 physical disks, named “RG-R5”.) Done. View “RAID group ” page. • RG column description: No. Number of RAID group. The button next to the No. shows the function which can be executed. Name RAID group name. Total(GB) Total capacity of this RAID group. Free(GB) Free capacity of this RAID group.
“Migrate” à the RAID group is being migrated . “Scrub” à the RAID group is being scrubbed . Health The health of RAID group. “Good” à the RAID group is good. “Failed” à a hard drive failed. “Degraded” à RAID volume failure. The reason could be disk failure. RAID • The RAID level of the RAID group. RG operations description: Create Create a RAID g roup. Migrate Migrate a RAID group . Refer to next chapter for more detail. Activate Activate a RAID group; it can be executed when RG status is offline.
3.6.4 Virtual disk “Virtual disk” allows you to view the status of each Virtual disk. The f ollowing is an example to create a VD. Step 1: Click “ ”, enter “Name”, choose “RG name”, “Stripe height (KB) ”, “Block size (B) ”, “Read/Write” mode, “Priority”, “Bg rate” (Background task priority), change “Capacity (GB) ” if necessary. Then click “ ”. Figure 3.6.4.1 Step 2: Confirm page. Click “ Formatted ” if all setups are correct . Figure 3.6.4.2 (Figure 3.6.4.
Done. View “Virtual disk” page. • VD column description: No. Number of this Virtual disk. The button next to the VD No. shows the functions which can be executed. Name Virtual disk name . Size(GB) Total capacity of th e Virtual disk. Right “WT” à Write Through. “WB” à Write Back. “RO” à Read Only. Priority “HI” à HIgh priority. “MD” à MiD priority. “LO” à LOw priority. Bg rate Background task prior ity. “4 / 3 / 2 / 1 / 0 ” à Default value is 4 .
Health The health of Virtual disk . “Optimal” à the Virtual disk is operating and has experienced no disk failures that would compromise the RG . “Degraded” à At least one disk which is part of the Virtual disk has been marked as failed or has been unplugged. “Missing” à the Virtual disk has been marked as missing by the system. “Failed” à the Virtual disk has experienced enough disk failures that would compromise the VD for unrecoverable data loss to occur.
Set property Change the VD name, access rights, priority and bg rate. Access Rights options: “WT” à Write Through. “WB” à Write Back. “RO” à Read Only. Priority options: “HI” à HIgh priority. “MD” à MiD priority. “LO” à LOw priority. Bg rate options: “4 / 3 / 2 / 1 / 0 ” à Default value is 4 . The higher number the background priority of a VD has, the more background I/O will be scheduled to execute. Attach LUN Attach to a LUN. Detach LUN Detach to a LUN. List LUN List attached LUN(s).
3.6.5 Snapshot “Snapshot” allow you to view the status of snapshot. Refer to next chapter for more detail about snapshot concept. The following is an example to create a snapshot. Step 1: Create snapshot space. I n “/ Volume config uration / Virtual disk” , move cursor to the gray button next to the VD number; click “Set snapshot space”. Step 2: Set snapshot space. Then click “ space is created. Figure 3.6.5.1 ”.
Figure 3.6.5.2 Formatted (Figure 3.6.5.2: “ VD-01” snapshot space has been created, snapshot space is 15360MB, and used 263MB for saving snapshot index.) Step 3: Take a snapshot. I n “/ Volume config uration / Snapshot”, click “ ”. It will link to next page. Enter a snapshot name. Figure 3.6.5.3 Formatted Step 4: Export the snapshot VD. Move cursor to the gray button next to the Snapshot VD number; click “Export”. Enter a capacity for snapshot VD.
Figure 3.6.5.5 (Figure 3.6.5.5: This is the list of “VD-01”. There are two snapshots in “VD-01”. Snapshot VD “SnapVD-01” is exported to read only, “SnapVD-02” is exported to read/write.) Step 5: Attach a LUN for snapshot VD. Refer to the next section for attaching a LUN. Done. Snapshot VD can be used. • Snapshot column description: No. Number of this snapshot VD . The button next to the snapshot VD No. showS the functions which can be executed. Name Snapshot VD n ame.
• 3.6.6 Snapshot operations description: Export Export the snapshot VD. Rollback Rollback the snapshot VD to the original. Delete Delete the snapshot VD . Attach Attach to a LUN. Detach Detach to a LUN. List LUN List attached LUN(s). Logical unit “Logical unit” allow you to view the status of attached logical unit number of each VD. User can attach LUN by clicking the “ ”.
Figure 3.6.6.2 (Figure 3.6.6.2: ISC8P2G-S, QUICK87678 is attached to LUN 0 and every host can access. QUICK87678 is attached to LUN 1 and only initiator note which is named “iqn.199105.com.microsoft:tech” can access. The other models do not display “Target” column.) • LUN operations des cription: Attach Attach a logical unit number to a Virtual disk. Detach Detach a logical unit number from a Virtual disk. The rules of access control are rated in importance from top to bottom of the list.
3.6.7 Example The following is an example for creating volumes. Example 1 is to create two VDs and set a global spare disk. • Example 1 Example 1 is to create two VDs in one RG, each VD uses global cache volume. Global cache volume is created after system boots up automatically. So, no action is ne eded to set CV. Then set a global spare disk. Eventually, delete all of them. Step 1: Create RG (RAID group). To create the RAID group, follow the steps below: Figure 3.6.7.1 Formatted 1.
Figure 3.6.7.2 Formatted (Figure 3.6.7.2: Creating a RAID 5 with 3 physical disks, named “RG-R5”. The total size is 148GB. Because there is no related VD, free size still remains 148GB.) Step 2: Create VD (Virtual disk). To create a data user volume, follow the steps below. Figure 3.6.7.3 5. Select “/ Volume configuration / Virtual disk” . 6. 7. Click “ ”.
Figure 3.6.7.4 Formatted (Figure 3.6.7.4: Create VDs named “VD-R5-1” and “VD-R5-2”. Regarding to “RG-R5”, the size of “VD-R5-1” is 100GB, the size of “VD-R5-2” is 48GB. “VD-R5-1” is initialing about 3%. There is no LUN attached.) Step 3: Attach LUN to VD. There are 2 methods to attach LUN to VD. 1. In “/ Volume configuration / Virtual disk” , move cursor to the g ray button next to the VD number; click “Attach LUN ”. 2. In “/ Volume configuration / Logical unit” , click “ ”.
Figure 3.6.7.6 (Figure 3.5.8.6: VD-R5-1 is attached to LUN 0. VD-R5-2 is attached LUN 1.) Tips The rules of access control are rank in importance from top to bottom in the list. Step 4: Set global spare disk. To set global spare disks, follow the steps below. 1. 2. 3. Select “/ Volume configuration / Physical disk” . Move cursor to the gray button next to the PD slot; click “Set G lobal spare”. “GS” icon is shown in “Usage” column.
Figure 3.6.7.7 Formatted (Figure 3.5.8.7: Slot 4 is set as global spare disk.) Step 5: Done. They can be used as disks. Delete VDs, RG, follow the steps listed below. Step 6: Detach LUN from VD . In “/ Volume configuration / Logical unit” , Figure 3.6.7.8 1. 2. 3. Move cursor to the gray button next to the LUN; click “Detach”. There will pop up a confirmation page. Choose “OK”. Done. Step 7: Delete VD (Virtua l disk). To delete the Virtual disk , follow the p rocedures: 1. 2. 3.
Step 8: Delete RG (RAID group). To delete the RAID group, follow the steps below: 1. 2. 3. 4. 5. Select “/ Volume config uration / RAID group” . Select a RG which is no VD related on this RG, otherwise the VD(s) on this RG must be deleted first. Move cursor to the gray button next to the RG number click “Delete”. There will pop up a confirmation page , click “OK”. Done. The RG has been deleted. Tips The action of deleting one RG will succeed only when all of the related VD(s) are deleted in this RG.
3.7 Enclosure management The “Enclosure management” function allows managing the encl osure information including “SES config”, “Hardware monitor ”, “S.M.A.R.T. ” and “UPS”. The enclosure management provide s sensors for different purposes, such as temperature sensors, voltage sensors, hard disks, fan sensors, power sensors, and LED status. And because the hardware characteristics are different among these sensors, different sensors have differen t polling intervals.
3.7.2 Hardware monitor Select “Hardware monitor ” function to view informa tion on current voltage and temperature. Figure 3.7.2.1 If “Auto shutdown ” has been checked, the system will shutdown automatically when voltage or temperature is out of the normal range. For better data protection, check “Auto Shutdow n”. For better protection and to avoid single short period of high temperature triggering Auto shutdown, ISC8P2G-S uses multiple condition judgments for Auto shutdown .
3.7.3 Hard drive S.M.A.R.T. function support S.M.A.R.T. (Self-Monitoring Analysis and Reporting Technology) is a diagnostic tool for hard drives to give advanced warning of drive failures. S.M.A.R.T. provides users a chance to take actions before possible drive failure. S.M.A.R.T. measures many attrib utes of the hard drive all the time and determine the hard drives which are close to failure.
3.7.4 UPS Select “UPS” function. It will set UPS ( Uninterruptible Power Supply) parameters. Figure 3.7.4.1 Currently, the system only support s and communicate s with smart-UPS function of APC (American Power Conversion Corp .) UPS. Check detail s from http://www.apc.com/ . First, connect the system and APC UPS via RS -232. Then set up the shutdown value. UPS Type Select UPS Type. Choose Smart -UPS for APC. None for other vendors or no UPS.
Status The status of UPS. “Detecting…” “Running” “Unable to detect UPS ” “Communication lost ” “UPS reboot in progress ” “UPS shutdown in progress ” “Batteries failed. Please change them NOW! ” Battery Level (%) Current percentage of battery level.
3.8 System maintenance “Maintenance” allows the operation of system functions which include “System information” to show the system version, “Upgrade” to the latest firmware, “Reset to factory default” to reset all controller configuration values to factory settings, “Import and export” to import and export all controller configuration, “Event log” to view system event log to record critical e vents, and “Reboot and shutdown” to either reboot or shutdown the system. Figure 3.8.1 3.8.
3.8.2 Upgrade “Upgrade” allow you to upgrade the firmware. Prepare new firmware file named “xxxx.bin” in l ocal hard drive, then click “ ” to select the file. Click “ ”, it will pop up a message “Upgrade system now? If you want to downgrade to the previous FW later (not recommend), export your system configuration in advance”, click “Cancel” to export system co nfiguration in advance, then click “OK” to start to upgrade firmware. Figure 3.8.2.1 Formatted Figure 3.8.2.
Default gateway: 192.168.10.254 3.8.4 Import and export “Import and export” allows user to save system configuration values. Figure 3.8.4.1 1. 2. Import: Import all system configurations configuration. Export: Export all configurations to a file. excluding volume Caution “Import” will import all system configurations excluding volume configuration; the current configurations will be replaced. 3.8.5 Event log “Event log” allows you to view the event messages.
Figure 3.8.5.1 Formatted The event l og is displayed in reverse order which means the latest event log is on the first page. The event logs are actually saved in the first four hard drives; each hard drive has one copy of event log. For one controller, there are four copies of event logs to m ake sure users can check event log any time when there is/are failed disk(s). Tips Please plug-in any of the first four hard drives, then event logs can be saved and displayed in next system boo t up.
Chapter 4 Advanced operation 4.1 Rebuild If one of the physical disk o n the VG which was set to a protected RAID level (e.g.: RAID 3, RAID 5, or RAID 6) has FAILED or has been unplugged/removed, then, the VG status is changed to degraded mode. The system will search/detect for a spare disk to rebuild the degraded V G. It will look for a dedicated spare disk first and if none is found, it will check if a global spare disk has been set up and use this disk for rebuild.
When rebuilding, the status of PD/VG/UDV is “R”; and “R%” in UDV will display the ratio in percentage. After complete rebuilding, “R” and “DG” will disappear. Tips The list box doesn ’t exist if there is no VG or only VG of RAID 0, JBOD. This is because user cannot set dedicated spare disk for these RAID levels. Sometimes, rebuild is called recover. These two have the same meaning. The table below lists the rel ationship between RAID levels and rebuild. RAID 0 Disk striping . No protection of data .
RAID 30 Striping over the members of the RAID 3 volumes . RAID 30 allows two hard drives to fail or gets unplugged, but the y need to be part of different arrays. RAID 50 Striping over the member RAID 5 volumes . RAID 50 allows two hard d rives to fail or gets unplugg ed, but the y need to be part of different arrays. RAID 60 Striping over the member RAID 6 volumes. RAID 40 allo ws four hard drives to fail or gets unplugged, but each two need to be part of different arrays.
5. 6. Finally a confirmation page shows the detail of RAID info rmation. If there is no problem, click “ “ to start migration. System also pops up a message of “Warning: power lost during migration may cause damage of data!” to give user warning. When the power is abnormally off during the migration, the data is in high risk. Migration starts and it can be seen fro m the “status” of a RG wit h “Migrating ”.
4.3 VD Extension To extend VD size , follow the steps below. 1. 2. 3. Select “/ Volume config uration / Virtual disk”. Move cursor to the gr ay button next to the VD number; click “Extend”. Change the size. The size must be larger than the original, and then click “ “ to start extension . Figure 4.3.1 4. Formatted Extension starts. If VD needs initialization, it will display an “Initiating” in “Status” and complete percentage of initialization in “R%”. Figure 4.3.2 (Figure 4.3.
4.4 Snapshot (QSnap) / Rollback Snapshot-on-the-box (QSnap) captures the instant state of data in the target volume in a logical sense. The underlying logic is Copy -on-Write -- moving out the data which would be written to certain location where a write action occurs since the time of data capture. The certain location, named as “ Snap VD” , is essentially a new VD which can be attached to a LUN provisioned to a host as a disk like other ordinary VDs in the system.
4.4.1 Create snapshot volume To take a snapshot of the data, follow the steps below. 1. Select “/ Volume config uration / Virtual disk” . 2. Move cursor to the gray button next to the VD number ; click “Set snapshot space ”. Set up the size for snapshot. The minimum size is suggested to be 20% of VD size, then click “ “. It will go ba ck to the VD page and the size will show in the snapshot column. It may not be the same as the number entered because some size is reserved for snapshot’s internal usage.
Figure 4.4.1.1 Formatted (Figure 4.4.1.1: This is Snap VD, but it is not exported.) 7. 8. 9. Move cursor to the gray button next to the Snapshot V D number; click “Export”. Enter a capacity for snapshot VD. If size is zero, the exported snapshot VD will be read only. Otherwise, the exported snapshot VD can be read/written, and the size will be the maximum capacity to read/write. Attach a LUN for snap shot VD. Please refer to the previous chapter for attaching a LUN. Done. It can be used as a disk.
Snapshot has some constraints: 1. 2. 3. 4. 4.4.2 Minimum RAM size of enabling snapshot is 512MB. For performance and future rollback, system saves snapshot with names in sequences. For example, three snapshots has been taken and named “SnapVD-01”(first), “SnapVD-02” and “SnapVD-03”(last). When deleting “ SnapVD-02”, both of “ SnapVD-02” and “SnapVD-03” will be deleted because “ SnapVD-03” is related to “ SnapVD-02”. For resource management, maximum number of snapshots is 32.
Tips Daily snapshot wi ll be taken every 00:00. Weekly snapshot will be taken every Sunday 00:00. Monthly snapshot will be taken every first day of month 00:00. 4.4.3 Rollback The data in snapshot VD can be roll back to original VD. Follow the steps below. 1. 2. 3. Select “/ Volume c onfiguration / Snapshot”. Move cursor to the gray button next to the Snap VD number which user wants to rollback the data ; click “Rollback”. Done, the data in snapshot VD will rollback to original VD.
4.5 Disk roaming Physical disks can be re -sequenced in the same system or all physical disks be moved from ISC8P2G -S system-1 to system-2. This is called disk roaming. System can execute disk roaming online. Follow the steps below. 1. 2. 3. 4. 5. Select “/ Volume config uration / RAID group ”. Move cursor to the gray bu tton next to the RG number ; click “Deactivate”. Move all PDs related to the RG to another system. Move cursor to the gray button next to the RG number ; click “Activate”. Done.
4.6 Support Microsoft MPIO and MC/S MPIO (Multi-Path Input/Output) and MC/S (Multiple Connections per Session) use multiple physical path s to create logical "paths" between the server and the storage device. In the case where one or more of these components fails, causing the path to fail, multi -path logic uses an alternate path for I/O so applications can still access their data. Microsoft iSCSI initiator supports multi -path. Please f ollow the procedures to use MPIO feature. 1. 2. 3. 4. 5. 6. 7.
Appendix A. Certification list • RAM ISC8P2G-S RAM Spec: 184pins, DDR333(PC2700), Reg.(register) or UB(Unbufferred) , ECC or Non -ECC, from 64MB to 1GB, 32 -bit or 64-bit data bus width, x8 or x16 devices, 9 to 11 bits column a ddress. • iSCSI Initiator (Software) OS Microsoft Windows Software/Release Number Microsoft iSCSI Software Initiator Release v2.05 System Requirements: 1. Windows XP Professional with SP2 2. Windows 2000 Server with SP4 3. Windows Server 2003 with SP1 4.
• iSCSI HBA card Vendor Adaptec HP QLogic QLogic Model ASC-7211C (PCI-X, Gigabit, 1 port, TCP/IP offload, iSCSI offload) NC380T (PCI-Express, Gigabit, 2 ports, TCP/IP offload, iSCSI offload) QLA4010C (PCI-X, Gigabit, 1 port, TCP/IP offload, iSCSI offload) QLA4052C (PCI-X, Gigabit, 2 ports, TCP/IP offload, iSCSI offload) For detailed setup steps of Q logic QLA4010C , please refer to Appendix G: QLogic QLA4010C setup instructions.
• Hard drive ISC8P2G-S support SATA I, II disks.
B. Event notifications • PD/S.M.A.R.T. events Level • Type Info Info Warning Disk inserted Disk removed S.M.A.R.T. threshold exceed condition Warning S.M.A.R.T. information Info: Disk is inserted. Info: Disk is removed. Warning: Disk S.M.A.R.T. threshold exceed condition occurred for attribute of 1. read error rate 2. spin up time 3. reallocated sector count 4. seek error rate 5. spin up retries 6. calibration retries Warning: Disk : Failure to get S.M.A.R.
• SES events Level Info Warning Info Info • Type SES load conf. OK SES Load Conf. Failure SES is disabled SES is enabled Description Info: SES configuration has been loaded. Error: Failed to load SES configuration. The SES device is disabled. Info: The SES device is disabled.
Error UPS power low Info Mgmt Lan Port Active Mgmt Lan Port Failed RTC Device OK RTC Access Failed Reset Password Reset IP Warning Info Warning Info Info • Info Info Error Warning Type Sys Config. Defaults Restored Sys NVRAM OK Sys NVRAM IO Failed Sys NVRAM is full Description Info: Default system configurations restored. Info: The system NVRAM is active. Error: Can’t access the system NVRAM. Warning: The system NVRAM is full.
Warning UDV Detached Fail Info UDV_OP Rebuild Started UDV_OP Rebuild Finished UDV_OP Rebuild Fail UDV_OP Migrate Started UDV_OP Migrate Finished UDV_OP Migrate Failed VG Degraded UDV Degraded Info Warning Info Info Warning Warning Warning Info Warning Warning UDV Init OK UDV_OP Stop Initialization UDV IO Fault Warning Warning VG Failed UDV Failed Warning Info Global CV Adjustment Failed Global Cache Global CV Creation Failed UDV Rename Info VG Rename Info Set VG Dedicated Spare Disks Set Globa
Info UDV stripe rewrite start/fail/succeed Info: UDV stripe <#> rewrite column bitmap . C. Known issues 1. Microsoft MPIO is not supported on Windows XP or Windows 2000 Professional. Workaround solution: Using Windows Server 2008 , 2003 or Windows 2000 server to run MPIO. D. Microsoft iSCSI Initiator Here is the step -by-step procedure to setup Microsoft iSCSI Initiator. Visit Microsoft website for latest iSCSI initiator. 1. 2.
3. Click “Add”. Input IP address or DNS name of ISC8P2G . Please see Figure D.2. Figure D.2 4. Click “OK”. Please see Figure D.3. Figure D.
5. Click “Targets”. Please see Figure D.4. 6. Click “Log On”. Please see Figure D.5. Check “Enable multi -path” if running MPIO. Figure D.4 Figure D.
7. Click “Advance …” if CHAP information is needed. Please see Figure D.6. Figure D.6 8. Click “OK”. The status would b e “Connected”. Please see Figure D.7. Figure D.7 9. Done. You can connect to the iSCSI disk.
The following steps shows how to log off iSCSI dri ve. 1. Click “Details”. Please see Figure D.8. Figure D.8 2. 3. 4. Check the Identifier, which will be d eleted. Click “Log off”. Done. The iSCSI drive was log off successfully.
E. MPIO and MC/S setup instructions Here is the step -by-step procedure to setup MPIO. There are 2 kinds of scenarios for MPIO. Please see Figure F.1. We suggest using scenario 2 for better performance. ž Network diagram of MPIO. Figure F.
Below are the setup instructions. Microsoft MPIO is NOT supported on Windows XP or Windows 2000 Professional. Workaround solution: Using Windows Server 2003, 2008 or Windows 2000 server to run MPIO. You have to enable MPIO or install MPIO driver on the server before doing this instruction. On a Windows Server 2008, to install MPIO 1. In the Server Manager console tree, click Features node. 2. In the Features pane, under Features Su mmary, click Add Features. 3.
3. Run Microsoft iSCSI initiator and check the Initiator Node Name. Figure F.4 4. Attached LUN to R5 UDV. Input the Initiator Node Name in Host field. Figure F.
5. The volume config setting is done . Figure F.6 6. Check iSCSI settings. The IP address of iSCSI data port 192.168.1.113, port 2 is 192.168.1.112 for example. Figure F.7 7. Add Target Portals on Microsoft iSCSI initiator. Figure F.
8. Input the IP address of iSCSI data port 1 (192.16 8.1.112 as mentioned in previous page ). Figure F.9 9. Add second Target Portals on Microsoft iSCSI initiator. Figure F.
10. Input the IP address of iSCSI data port 2 (192.16 8.1.113 as mentioned in previous page ). Figure F.11 11. The initiator setting is d one. Figure F.
12. Log on. Figure F.13 13. Enable “Enable multi-path” checkbox. Then click “Advanced”. Figure F.
14. Select Target Portal to iSCSI data port 1 (192.168.1.112). Then click “OK” Figure F.15 15. Log on “Enable multi -path” again. Figure F.
16. Enable “Enable multi -path” checkbox. Then click “Advanced…” . Figure F.17 17. Select Target Portal to iSCSI data port 2 (192.168.1.113). Then select “OK” Figure F.
18. The iSCSI drive is connected. 19. After the MPIO feature has been enabled, configure MPIO through the tool in Administrative Tools.
20. The MPIO Properties window opens. Figure F.19 21. Click on the Discover Multi -Paths tab. Figure F.
22. Check the option of Add support for iSCSI device and click on Add button. Figure F.21 23. The system will ask you to reboot to make the change take e ffect. Figure F.
24. After reboot, log on the iSCSI target again. Under Disk Driver in Device Manager, notice that the Addonics iSCSI is now a Multi -Path Disk Device. Figure F.23 25. Connect to the iSCSI device. Figure F.
26. Click “Details”. Figure F.25 27. Click “Device” tab, then click “Advanced”. Figure F.
28. The Device Details window opens Figure F.26 29. Click “MPIO” tab, select “Fail Over Only” to “Round Robin” . Figure F.
30. Click “Apply”. Both connections Type now becomes Active. Figure F.
The MC/S setup instructions is very similar to MPIO. Detailed steps are presented below. For the target side setting, the steps are exactly the same as MPIO. Please refer to Figure F.1 to Figure F.8 . 1. 2. 3. 4. 5. 6. 7. 8. Create a VG with RAID 5, using 3 HDDs. Create a UDV by using RAID 5 VG. Run Microsoft iSCSI initiator 2.0 8 and check the Initiator Node Name. Attach LUN to R5 UDV. Input the Initiator Node Name in Host field. The volume config setting is done. Check iSCSI settings.
9. Click Log On button. 10. Then click “Advanced…”. Figure F.2 11. Select Local Adapter, Source IP, and Target Portal to iSCSI data port 1 (192.168.1.112). Then click “OK”. Figure F.
12. After connected , click “Details”, then in the “Session” tab, click “Connections” . Figure F.4 13. Choose “Round Robin” for Load Balance Policy Figure F.
14. “Add” Source Portal for the iSCSI data port 2(192.168.1.113) Figure F.6 Figure F.
15. Click on the Advance button. Select Local adapter, Source IP, and Target Portal to iSCSI data port 2 (192.168.1.113). Then select “OK”. Click OK. Figure F.8 16. The MC/S setting is done .
E. QLogic QLA4010C setup instructions The following is the step -by-step setup of Q logic QLA4010C. 1. Log on the iSCSI HBA Manager and the current state shows “No Connection Active” . Figure G.1 2. Click “Target settings” . Then select the target and click “Config Parameters”. Figure G.
3. Disable “Immediate Data” and enable “Initial R2T” . Figure G.3 4. Click “OK”. Figure G.
5. Click “Save settings” and click “Yes” on next page. Figure G.5 6. Click “Refresh” and find a new target with iSCSI name. Figure G.
7. Check the parameters . “Initial R2T” are must be enabled. Figure G.7 8. Check “Target Information” again and the state change d to “Session Active”. Figure G.
9. Then, run “Computer Management” in Windows. Make sure the disk appears. Figure G.
G. Installation Steps for Large Volume (TB) Introduction: The ISC8P2G-S is capable of support ing large volumes (>2TB). When connecting controllers to 64bit OS installed host/server, the host/server is inherently capable for large v olumes from the 64bit address. On the other side, if the host/server is installed with 32bit OS, user has to change the block size to 1KB, 2KB or 4KB to support volumes up to 4TB, 8TB or 16TB , for the 32bit host/server is not LBA (Logical Block Addressing ) 64-bit supported.
4. A RAID 6 VG is created. Figure H.4 5. Go to / Volume config / User data volume , create a UDV Figure H.5 6. Setup capacity, stripe height, and block size for UDV. Figure H.6 Tips When the OS is 64bit, user can set the block size to any available value. If the OS is 32bit, user must change the block size to values larger than 512B. There will be a confirmation pop-up when UDV size is over 2TB.
Figure H.7: (Figure H.7: choose “OK” for 64bit OS, choose “Cancel” for 32bit OS, this step will change block size to 4K automatically.) 7. A 2.793TB UDV is created. Figure H.8: a 2793G UDV is created. 8. Check the detail information. Figure H.9 (Figure H.9: block size = 512B, for 64bit OS setting.) Figure H.10 (Figure H.10: block size = 4K, for 32bit OS setting.
9. Attach LUN. Figure H.11 Figure H.12 (Figure H.12: Left: P series; Right: S series attach LUN.
Step B: configure your host/server 1. You need to setup software iscsi initiat or or iSCSI HBA first. 2. Below is the configuration for Windows Server 2003 R2 with Microsoft iscsi initiator. Please install the latest Microsoft iscsi initiator from the link below. http://www.microsoft.com/downloads/details.aspx?familyid=12cb3c1a 15d6-4585-b385-befd1319f825&displaylang=en Figure H.13 (Figure H.13: Run MS iSCSI initiator, go to “Discovery” tab, add target portal (iSCSI data).
Figure H.14 (Figure H.14: go to “Targets” tab, click “Refresh”, and then “Log On…” the target.) Figure H.15 (Figure H.15: Status is “Connected”, the initiator setting is done.
Step C: Initialize/Format/Mount the disk 1. Go to Start à Control Panel à Computer Management à Device Manger à Disk drives Figure H.16 (Figure H.16: Disk drive status of ISC8P2G-S.) 2. Go to Start à Control Panel à Computer Management à Disk Management, it displays a new disk. Figure H.
3. Initialize disk. Figure H.18 4. Convert to GPT disk for over 2TB capacity. For more detail information about GPT, please visit http://www.microsoft.com/whdc/device/storage/GPT_FAQ.mspx Figure H.19 5. Format disk. Figure H.
6. Format disk is done. Figure H.21 7. The new disk is ready, available size = 2.72TB. Figure H.22 Caution If the user has setup 512B as block size for UDV and the host/server OS is 32bit, in the last step of formatting disk, user will find OS cannot format the area after 2048GB (2TB).
8. Wrong setting result: OS cannot format area after 2048GB(2TB). Figure H.