iSCSI – SATA II RAID SUBSYSTEM Installation and Configuration Manual Revision 1.
Table of Contents Chapter 1 Introduction...........................................................................................4 1.1 Key Features........................................................................................................................................................ 5 1.2 Technical Specifications.................................................................................................................................. 6 1.3 Terminology ..........................
.5.1 Entity Property........................................................................................................................................ 38 3.5.2 NIC............................................................................................................................................................... 39 3.5.3 Node........................................................................................................................................................... 40 3.5.
Chapter 1 Introduction The iSCSI RAID Subsystem The iSCSI RAID subsystem is a 4-bay disk array based on hardware RAID configuration. It is an easy-to-use storage system which can be configured to any RAID level. It provides reliable data protection for servers, and the RAID 6 function is available. The RAID 6 function allows failure of two disk drives without any impact on the existing data. Data can be recovered from the remaining data and parity drives.
1.1 Key Features ¾ Front-end 2 x 1Gigabit port full iSCSI offload ¾ Supports iSCSI jumbo frame ¾ Supports RAID levels 0, 1, 0+1, 3, 5, 6, 10 and JBOD ¾ Global hot spare disks ¾ Write-through or write-back cache policy for different application usage ¾ Supports greater than 2TB per volume set (64-bit LBA support) ¾ RAID level migration ¾ Online volume expansion ¾ Configurable RAID stripe size ¾ Instant RAID volume availability and background initialization ¾ Supports S.M.A.R.
1.2 Technical Specifications Form Factor: 1U 19-inch rackmount chassis RAID processor: Intel XScale IOP331 Instant RAID volume availability and background initialization support RAID Level: 0, 1, 0+1, 3, 5, 6, 10 and JBOD Supports over 2TB per volume Cache memory: 512MB ~ 1GB DDR333 DIMM supported Online consistency check No. of channels (host and drives): 2 and 4 Bad block auto-remapping Host bus interface : 1Gb/s Ethernet Drive bus interface : 3Gb/s SATA II S.M.A.R.T.
1.3 Terminology The document uses the following terms: RAID RAID is the abbreviation of “Redundant Array of Independent Disks”. There are different RAID levels with different degree of the data protection, data availability, and performance to host environment. PD The Physical Disk belongs to the member disk of one specific RAID group. RG Raid Group. A collection of removable media. One RG consists of a set of VDs and owns one RAID level attribute. VD Virtual Disk.
DS Dedicated Spare disks. The spare disks are only used by one specific RG. Others could not use these dedicated spare disks for any rebuilding purpose. GS Global Spare disks. GS is shared for rebuilding purpose. If some RGs need to use the global spare disks for rebuilding, they could get the spare disks out from the common spare disks pool for such requirement. DC Dedicated Cache. GC Global Cache. DG DeGraded mode.
1.4 RAID Concepts RAID Fundamentals The basic idea of RAID (Redundant Array of Independent Disks) is to combine multiple inexpensive disk drives into an array of disk drives to obtain performance, capacity and reliability that exceeds that of a single large drive. The array of drives appears to the host computer as a single logical drive.
Definition of RAID Levels RAID 0 is typically defined as a group of striped disk drives without parity or data redundancy. RAID 0 arrays can be configured with large stripes for multi-user environments or small stripes for single-user systems that access long sequential records. RAID 0 arrays deliver the best data storage efficiency and performance of any array type. The disadvantage is that if one drive in a RAID 0 array fails, the entire array fails.
RAID 3 sector-stripes data across groups of drives, but one drive in the group is dedicated to storing parity information. RAID 3 relies on the embedded ECC in each sector for error detection. In the case of drive failure, data recovery is accomplished by calculating the exclusive OR (XOR) of the information recorded on the remaining drives. Records typically span all drives, which optimizes the disk transfer rate.
Dual-level RAID achieves a balance between the increased data availability inherent in RAID 1 and RAID 5 and the increased read performance inherent in disk striping (RAID 0). These arrays are sometimes referred to as RAID 0+1 or RAID 10 and RAID 0+5 or RAID 50. RAID 6 is similar to RAID 5 in that data protection is achieved by writing parity information to the physical drives in the array. With RAID 6, however, two sets of parity data are used.
RAID Management The subsystem can implement several different levels of RAID technology. RAID levels supported by the subsystem are shown below. RAID Level Description Min. Drives 0 Block striping is provide, which yields higher performance than with individual drives. There is no redundancy. 1 1 Drives are paired and mirrored. All data is 100% duplicated on an equivalent drive. Fully redundant. 2 N-way mirror Extension of RAID 1 level. It has N copies of the disk.
1.5 Volume Relationship Diagram LUN 1 VD 1 LUN 2 LUN 3 VD 2 VD 3 + + + RG PD 1 PD 2 Global CV PD 3 DS Dedicated CV RAM This diagram shows how the volume structure of the iSCSI RAID subsystem is designed. It describes the relationship of RAID components. One RG (RAID group) consists of a set of VDs (Virtual disk) and owns one RAID level attribute. Each RG can be divided into several VDs. The VDs in one RG share the same RAID level, but may have different volume capacity.
Chapter 2 Getting Started 2.1 Packaging, Shipment and Delivery Before removing the subsystem from the shipping carton, you should visually inspect the physical condition of the shipping carton. Unpack the subsystem and verify that the contents of the shipping carton are all there and in good condition. Exterior damage to the shipping carton may indicate that the contents of the carton are damaged.
2.3 Identifying Parts of the iSCSI RAID Subsystem The illustrations below identify the various parts of the subsystem. 2.3.1 Front View 3 2 4 1 5 1 6 7 Carrier Open Button – Use this to open the disk tray. Press the button to open. This button also shows the Lock Indicator. When the Lock Groove is horizontal, this indicates that the Drive Tray is locked. When the Lock Groove is vertical, the Drive Tray is unlocked. Lock and unlock the Drive Trays by using a flat-head screw driver.
5 LCD Display Panel 6 LCD Control Module (LCM) Use the function keys to navigate through the menu options available in the LCM. Parts Function Up and Down Arrow buttons Use the Up or Down arrow keys to go through the information on the LCD screen. This is also used to move between each menu when you configure the subsystem. This is used to enter the option you have selected. Press this button to return to the previous menu.
2.3.2 Rear View 1. Uninterruptible Power Supply (UPS) Port (APC Smart UPS only) The subsystem may come with an optional UPS port allowing you to connect a APC Smart UPS device. Connect the cable from the UPS device to the UPS port located at the rear of the subsystem. This will automatically allow the subsystem to use the functions and features of the UPS. 2. RS232 Port The subsystem is equipped with an RS232 serial port allowing you to connect a PC or terminal. Use the null modem cable to 3.
2.4 Connecting the iSCSI RAID Subsystem to Your Network To connect the iSCSI unit to the network, insert the cable that came with the unit into the Gigabit network port (LAN1) on the back of iSCSI unit. Insert the other end into a Gigabit BASE-T Ethernet connection on your network hub or switch. You may connect the other network port LAN2 if needed. For remote management of the iSCSI RAID subsystem, connect the R-Link port to your network. 2.5 Powering On 1.
2.6 Installing Hard Drives The expansion chassis supports hot-swapping allowing you to install or replace a hard drive while the subsystem is running. Each Drive Carrier has a locking mechanism. When the Lock Groove is horizontal, this indicates that the Drive Carrier is locked. When the Lock Groove is vertical, the Drive Carrier is unlocked. Lock and unlock the Drive Carriers by using a flathead screw driver. The Lock Grooves are located on the carrier open button. a.
2.7 iSCSI Introduction iSCSI (Internet SCSI) is a protocol which encapsulates SCSI (Small Computer System Interface) commands and data in TCP/IP packets for linking storage devices with servers over common IP infrastructures. iSCSI provides high performance SANs over standard IP networks like LAN, WAN or the Internet. IP SANs are true SANs (Storage Area Networks) which allow few of servers to attach to an infinite number of storage volumes by using iSCSI over TCP/IP networks.
1. Link to download the Microsoft iSCSI software initiator: http://www.microsoft.com/downloads/details.aspx?FamilyID=12cb3c1a-15d64585-b385-befd1319f825&DisplayLang=en Please refer to Appendix D for Microsoft iSCSI initiator installation procedure. 2. Linux iSCSI initiator is also available. For different kernels, there are different iSCSI drivers. If you need the latest Linux iSCSI initiator, please visit OpeniSCSI project for most update information.
http://192.168.10.50 or https://192.168.10.50 (https: connection with encrypted Secure Sockets Layer (SSL). Please be aware of the https function is slower than http.) Click any function at the first time; it will pop up a dialog to authenticate current user. Login name: admin Default password: 00000000 Or login with the read-only account which only allows seeing the configuration and cannot change setting. Login name: user Default password: 1234 2.8.
2.9 Enclosure 2.9.1 LCD Control Module (LCM) There are four buttons to control the subsystem LCM (LCD Control Module). These are: c(Up) d(Down) (Enter) (Escape) After booting up the system, the following screen shows management port IP and model name: 192.168.10.50 iSCSI-Model-Name ← Press “ ”, the LCM functions “System Info,”, “Alarm Mute”, “Reset/Shutdown”, “Quick Install”, Volume Wizard”, “View IP Setting”, “Change IP Config” and “Reset to Default” will rotate by pressing c (up) and d (down).
The following is the LCM menu hierarchy. [System Info.] [Alarm Mute] [Firmware Version] [RAM Size] [cYes Nod] [Reset] [Reset/Shutdown] [Shutdown] [Quick Install] [Volume Wizard] proIPS cd [View IP Setting] RAID 0 RAID 1 RAID 3 RAID 5 RAID 6 RAID 0+1 xxx GB [Local] RAID 0 RAID 1 RAID 3 RAID 5 RAID 6 RAID 0+1 [JBOD x] RAID 0 RAID 1 RAID 3 RAID 5 RAID 6 RAID 0+1 [IP Config] [Static IP] [IP Address] [192.168.010.050] [IP Subnet Mask] [255.255.255.0] [IP Gateway] [192.168.010.
2.9.2 System Buzzer The system buzzer features are described as follows: 1. 2. 3. The system buzzer alarms 1 second when system boots up successfully. The system buzzer alarms continuously when there is error level event happened. The alarm will be stopped after mute. The alarm will be muted automatically when the error situation is resolved. E.g.
Chapter 3 Web GUI Guideline 3.1 iSCSI RAID Subsystem GUI Hierarchy The below table is the hierarchy of the subsystem GUI.
Logout Reboot and Æ Reboot / Shutdown shutdown Sure to logout? 3.2 Login The iSCSI RAID subsystem supports graphical user interface (GUI) to operate the system. Be sure to connect the LAN cable. The default IP setting is DHCP; open web browser and enter: http://192.168.10.50 (Please check the DHCP address first on LCM) Click any function at the first time; it will pop up a dialog for authentication.
3.2.1 Language Before clicking the Login button, you can change the GUI language if needed. There are 4 options to select: English, Simplified Chinese, German, and French. 3.2.2 Status Indicators There are six indicators at the top-right corner. 1. RAID light: Green means RAID works well. Red represents RAID failure happening. 2. Temperature light: Green is normal. Red represents abnormal temperature. 3. Voltage light: Green is normal. Red represents abnormal voltage status. 4.
3.3 Quick Install It is easy to use “Quick install” to create a volume. It uses whole physical disks to create a RG. The system will calculate maximum spaces on RAID levels 0/1/3/5/6/0+1. “Quick install” will occupy all residual RG space for one VD, and it has no space for spare disk. If spare disk is needed, please create RG and VD manually.
3.4 System Configuration “System configuration” is designed for setting up the “System setting”, “IP address”, “Login setting”, “Mail setting”, and “Notification setting”.
3.4.1 System Setting Select “System setting” to change system name and date. Default system name is the model name, e.g.: SB-1404-G1A3. Check “Change date and time” option to set up the current date, time, and time zone before using, or synchronize time from NTP (Network Time Protocol) server.
3.4.2 IP Address Select “IP address” to change IP address for remote administration usage. There are 2 options, DHCP (Get IP address from DHCP server) or Static (static IP). The default setting is DHCP enabled. User can change the HTTP, HTTPS, and SSH port number when the default port number is not allowed on host/server.
3.4.3 Login Setting Select “Login setting” to set single admin login, set the auto logout timing, and change admin or user password. The single admin login can prevent multiple users to access the same iSCSI RAID system at the same time. 1. Auto logout: The options are (1) Disable; (2) 5 minutes; (3) 30 minutes; (4) 1 hour. The system will log out automatically when user is inactive for a period of time. 2. Login lock: Disable/Enable.
3.4.4 Mail Setting Select “Mail setting” to enter at most 3 mail addresses for receiving event notifications. Some mail servers would check “Mail-from address” and need authentication for anti-spam. Please fill the necessary fields and select “Send test mail” to check whether the email works fine. User can also select which levels of event logs are needed to be sent out via Mail. In default settings, only ERROR and WARNING event logs are enabled.
3.4.5 Notification Setting You can use “Notification setting” to set up SNMP trap for sending alerts via SNMP, pop-up messages via Windows Messenger (not MSN), and alerts via syslog protocol, and set event log filter. “SNMP” allows up to 3 SNMP trap addresses. Default community is set to “public”. User can choose the event log levels; the default setting only enables INFO event log in SNMP. There are many SNMP tools. The following web sites are for your reference: SNMPc: http://www.snmpc.
Using “Messenger”, user must enable the service “Messenger” in Windows (Start Æ Control Panel Æ Administrative Tools Æ Services Æ Messenger), and then event logs can be received. It allows up to 3 messenger addresses. User can choose the event log levels. Note that in default settings, only the WARNING and ERROR event logs are enabled. Using “System log server”, user can choose the facility and the event log level. The default port of syslog is 514.
3.5 iSCSI Config “iSCSI config” selection is for the setup of “Entity Property”, “NIC”, “Node”, “Session”, and “CHAP account”. 3.5.1 Entity Property Select “Entity property” to view the entity name of the iSCSI RAID subsystem, and setup “iSNS IP” for iSNS (Internet Storage Name Service) service. iSNS protocol allows automated discovery, management and configuration of iSCSI devices on a TCP/IP network. Using iSNS, it needs to install a iSNS server in SAN.
3.5.2 NIC Select “NIC” to change IP addresses of iSCSI data ports. There are two gigabit LAN ports to transmit data. Each of them must be assigned one IP address in multi-homed mode. The screenshot above shows the 2 iSCSI data ports. Each of them is set to static IP. LAN1 has Jumbo Frame enabled. IP settings: User can change IP address by moving mouse to the gray button of LAN port, click “IP settings for iSCSI ports”.
3.5.3 Node Select “Node” to view the target name for iSCSI node. Press “Authenticate” to enable CHAP authentication. CHAP is the abbreviation of Challenge Handshake Authorization Protocol. CHAP is a strong authentication method used in point-to-point for user login. It’s a type of authentication in which the authentication server sends the client a key to be used for encrypting the username and password. CHAP enables the username and password to transmitting in an encrypted form for protection.
3.5.4 Session “Session” function can display iSCSI session and connection information, including the following items: 1. Host (Initiator Name) 2. Error Recovery Level 3. Error Recovery Count 4. Detail of Authentication status and Source IP: port number. Move the mouse pointer to the gray button of session number and click “List connection”. It will list all connection(s) of the session.
3.5.5 CHAP Account Enter “CHAP account” function to create a CHAP account for authentication. To setup CHAP account, please follow these steps: ”. 1. Click “ 2. Enter account name in “User” box, and type the secret in “Secret” and “Confirm” boxes. 3. Click “ 4. To delete the CHAP account, select “Delete”. ”. NOTE: Only one CHAP account can be created in the iSCSI RAID subsystem.
3.6 Volume Configuration “Volume configuration” is designed for setting up the volume configuration which includes “Volume create wizard”, “Physical disk”, “RAID group”, “Virtual disk”, “Snapshot”, and “Logical unit”. NOTE: Snapshot function is not available in the iSCSI RAID subsystem.
3.6.1 Volume Create Wizard “Volume create wizard” has a smarter policy. When the system is inserted with some HDDs. “Volume create wizard” lists all possibilities and sizes in different RAID levels, it will use all available HDDs for RAID level depends on which user chooses. When system has different sizes of HDDs, e.g., 3*200G and 1*80G, it lists all possibilities and combination in different RAID level and different sizes.
Step 3: Decide VD size. User can enter a number less or equal to the default number. Then click “ ”. Step 4: Confirm page. Click “ VD will be created. ” if all setups are correct. Then a It’s done. You can start to use the system now.
3.6.2 Physical Disk Enter “Physical disk” to view the status of hard drives inserted in the system. The following are operation tips: 1. Move the mouse pointer to the gray button next to the number of slot, it will show the functions which can be executed. Active function(s) can be selected, but inactive function(s) will show in gray color. 2. For example, set PD slot number 4 to dedicated spare disk. Step 1: Move the mouse pointer to the gray button of PD Slot 4, then select “Set Dedicated spare”.
It’s done. View the “Physical disk” page. Physical disks of slots 1, 2, and 3 are used for RG named “QUICK37598”. Slot 4 is set as dedicated spare disk for RG “QUICK37598”. PD column description: Slot The position of hard drives. The button next to the number of slot shows the functions which can be executed. Size (GB) Capacity of hard drive. RG Name Related RAID Group name. Status The status of hard drive. “Online” Æ the hard drive is online. “Rebuilding” Æ the hard drive is being rebuilt.
a global spare of all RGs. “RS” Æ ReServe. The hard drive contains the RG information but cannot be used. It may be caused by an uncompleted RG set, or hot-plug of this disk in the running time. In order to protect the data in the disk, the status changes to reserve. It can be reused after setting it to “FR” manually. Vendor Hard drive vendor. Serial Hard drive serial number. Type Hard drive type. “SATA” Æ SATA disk. “SATA2” Æ SATA II disk. Write cache Hard drive write cache is enabled or disabled.
3.6.3 RAID Group Enter “Volume group” to view the status of each volume group. The following is an example of how to create a RG: Step 1: Click “ “ ”, enter “Name”, choose “RAID level”, click ” to select PD. Then click “ ” if all setups are correct. Step 2: Confirm page. Click “ It’s done. View the “RAID group” page. The example above shows RAID 5 with 3 physical disks, and RG is named “RG1”. The total size is 1862GB. [49] ”.
RG column description: No. Number of RAID group. The button next to the No. shows the functions which can be executed. Name RAID group name. Total(GB) Total capacity of this RAID group. Free(GB) Free capacity of this RAID group. #PD The number of physical disks in RAID group. #VD The number of virtual disks in RAID group. Status The status of RAID group. “Online” Æ the RAID group is online. “Offline” Æ the RAID group is offline. “Rebuild” Æ the RAID group is being rebuilt.
RG operations description: Create Create a RAID group. Migrate Migrate a RAID group. Please refer to succeeding chapter for more detail. Activate Activate a RAID group; it can be executed when RG status is offline. This is for online roaming purpose. Deactivate Deactivate a RAID group; it can be executed when RG status is online. This is for online roaming purpose. Scrub Scrub a RAID group. It’s a parity regeneration function. It supports RAID 3 / 5 / 6 only. Delete Delete a RAID group.
3.6.4 Virtual Disk Enter “Virtual disk” function to view the status of each user data volume. The following is an example of how to create a VD: ”, enter “Name”, choose “RG name”, “Stripe Step 1: Click “ height (KB)”, “Block size (B)”, “Read/Write” mode, “Priority”, “Bg rate” (Background task priority), change “Capacity (GB)” if necessary. ”. Then click “ ” if all setups are correct. Step 2: Confirm page. Click “ It’s done. View the “Virtual disk” page. VD column description: No.
Right “WT” Æ Write Through. “WB” Æ Write Back. “RO” Æ Read Only. Priority “HI” Æ HIgh priority. “MD” Æ MiD priority. “LO” Æ LOw priority. Bg rate Background task priority. “4 / 3 / 2 / 1 / 0” Æ Default value is 4. The higher number the background priority of a VD has, the more background I/O will be scheduled to execute. Status The status of Virtual disk. “Online” Æ the Virtual disk is online. “Offline” Æ the Virtual disk is offline. “Initiating” Æ the Virtual disk is being initialized.
UDV operations description: Extend Extend a Virtual disk capacity. Scrub Scrub a Virtual disk. It’s a parity regeneration function. It supports RAID 3 / 5 / 6 only. Delete Delete a Virtual disk. Set property Change the VD name, right, priority and bg rate. Right options: “WT” Æ Write Through. “WB” Æ Write Back. “RO” Æ Read Only. Priority options: “HI” Æ HIgh priority. “MD” Æ MiD priority. “LO” Æ LOw priority. Bg rate options: “4 / 3 / 2 / 1 / 0” Æ Default value is 4.
3.6.5 Logical Unit Enter “Logical unit” function to view the status of attached logical unit number of each VD. ”. Select the VD to attach User can attach LUN by clicking the “ in the “VD” field. In the “Host” filed, enter the iSCSI node name for access control, or use the default wildcard “*”, which means every host can access the volume. Choose ”. LUN number and permission, then click “ LUN operations description: Attach Attach a logical unit number to a Virtual disk.
3.6.6 Example The following is an example for creating volumes. Example 1 is to create two VDs and set a global spare disk. ¾ Example 1 Example 1 is to create two VDs in one RG, each VD uses global cache volume. Global cache volume is created after system boots up automatically. So, no action is needed to set CV. Then set a global spare disk. Eventually, delete all of them. Step 1: Create RG (RAID group). To create the RAID group, please follow the procedures: 1.
Step 2: Create VD (Virtual disk). To create a volume, please follow these steps: 1. Select “/ Volume configuration / Virtual disk”. 2. Click “ 3. Input a VD name, choose a RG Name and enter a size of VD; decide the stripe high, block size, read/write mode and set priority, finally click “ ”. “. 4. Done. A VD has been created. 5. Do one more time to create another VD.
Step 3: Attach LUN to VD. There are 2 methods to attach LUN to VD. 1. In “/ Volume configuration / Virtual disk”, move the mouse pointer to the gray button next to the VD number; click “Attach LUN”. 2. In “/ Volume configuration / Logical unit”, click ”. “ The procedures are as follows: 1. Select a VD. 2. Input “Host” name, which is a FC node name for access control, or fill-in wildcard “*”, which means every host can access to this volume. Choose ”. LUN and permission, then click “ 3. Done.
Step 4: Set global spare disk. To set a global spare disk, please follow the step. 1. Select “/ Volume configuration / Physical disk”. 2. Move the mouse pointer to the gray button next to the PD slot; click “Set Global spare”. 3. “GS” icon is shown in “Usage” column. Step 5: Done. Host initiator can connect to the LUNs and use as disks. To delete VD and RG, please follow the steps listed below. Step 6: Detach LUN from VD. In “/ Volume configuration / Logical unit”, 1.
Step 7: Delete VD (Virtual disk). To delete the Virtual disk, please follow the steps: 1. Select “/ Volume configuration / Virtual disk”. 2. Move the mouse pointer to the gray button next to the VD number; click “Delete”. There will pop up a confirmation page, click “OK”. 3. Done. The VDs are deleted. NOTE: When deleting VD, the attached LUN(s) related to this VD will be detached automatically. Step 8: Delete RG (RAID group). To delete a RAID group, please follow the steps: 1.
3.7 Enclosure Management “Enclosure management” function allows managing enclosure information including “SES config”, “Hardware monitor”, “S.M.A.R.T.” and “UPS” functions. For the enclosure management, there are many sensors for different purposes, such as temperature sensors, voltage sensors, hard disks, fan sensors, power sensors, and LED status. And due to the hardware characteristics are different among these sensors, for different sensors, they have different polling intervals.
3.7.1 SES Configuration SES represents SCSI Enclosure Services, one of the enclosure management standards. Use “SES config” function to enable or disable the management of SES. To enable SES: 1. Click “Enable”. 2. Enter Host name (iSCSI node name). Click “Confirm”. 3. Done. The SES client software is available at the following web site: SANtools: http://www.santools.
3.7.2 Hardware Monitor Enter “Hardware monitor” function to view the information of current voltage, temperature, power supply, and fan status. If “Auto shutdown” has been checked, the system will shutdown automatically when voltage or temperature is out of the normal range. For better data protection, please check “Auto Shutdown”.
3.7.3 Hard Drive S.M.A.R.T. Function S.M.A.R.T. (Self-Monitoring Analysis and Reporting Technology) is a diagnostic tool for hard drives to deliver warning of drive failures in advance. S.M.A.R.T. provides users chances to take actions before possible drive failure. S.M.A.R.T. measures many attributes of the hard drive all the time and inspects the properties of hard drives which are close to be out of tolerance.
3.7.4 UPS Enter “UPS” function to set up UPS (Uninterruptible Power Supply). Currently, the system only support and communicate with smart-UPS function of APC (American Power Conversion Corp.) UPS. Please check detail from http://www.apc.com/. First, connect the RAID system UPS port and the APC UPS via RS-232 for communication. Then set up the shutdown values when the power is gone. UPS of other vendors can work fine, but they have no such function of communication. UPS Type Select UPS Type.
3.8 System Maintenance “Maintenance” allows the operation of system functions which include “System information” to show the system version, “Upgrade” to update firmware to latest version, “Reset to factory default” to reset all controller configuration values to factory settings, “Import and export” to import and export all controller configuration, “Event log” to view system event log to record critical events, and “Reboot and shutdown” to either reboot or shutdown the system. 3.8.
3.8.2 Upgrade “Upgrade” can upgrade firmware. Please prepare new firmware file named “xxxx.bin” in local hard drive, then click “ ” to select the file. Click ”, it will pop up a message “Upgrade system now? If you want “ to downgrade to the previous FW later (not recommended), please export your system configuration first!”. Click “Cancel” to export system configuration in advance, or click “OK” to start to upgrade firmware. When upgrading, there is a progress bar running.
3.8.4 Config Import & Export Use “Import and export” function to import or export configuration. “Export” allows user to save system configuration values, and “Import” to apply saved configuration. For the volume configuration setting, the values are available in export and not available in import which can avoid conflict or data deletion between two controllers. For example, if one controller already has existing valuable data in the disks and user may forget to overwrite it.
3.8.5 Event Log Use “Event log” to view the system event messages. Check the INFO, WARNING, and ERROR checkboxes to choose the level of event log to display. Clicking “ name ” button will save the whole event log as a text file with file “log-ModelName-Date-Time.txt” (e.g., log-SB-1404-G1A3-20080723- 150659.txt). Click ” “ ” button will clear event log. Click ” button will stop alarm if system alerts. The event log is displayed in reverse order which means the latest event log is on the first page.
3.8.6 Reboot and Shutdown “Reboot and shutdown” displays “Reboot” and “Shutdown” buttons. Before power off, it is better to execute “Shutdown” to flush the data from cache to physical disks. The step is necessary for data protection. 3.9 Logout For security reason, “Logout” function will allow user to logout when it is not necessary to operate the system. To re-login the system, enter username and password again.
Chapter 4 Advanced Operation 4.1 Rebuild If one physical disk of a Raid Group, which is set to a protected RAID level (e.g.: RAID 3 , RAID 5, or RAID 6), is FAILED or has been unplugged/removed, the RG status is changed to degraded mode. The system will search/detect spare disk to rebuild the degraded RG to a complete one. It will try to detect dedicated spare disk first, then global spare disk, to rebuild. The iSCSI RAID subsystem supports Auto-Rebuild function.
Sometimes, rebuild is called recover; these two have the same meaning. The following table is the relationship between RAID levels and rebuild. RAID 0 Disk striping. No protection for data. RG fails if any hard drive fails or unplugs. RAID 1 Disk mirroring over 2 disks. RAID 1 allows one hard drive fails or unplugging. Need one new hard drive to insert to the system and rebuild to be completed. N-way mirror Extension to RAID 1 level. It has N copies of the disk.
4.2 RG Migration To migrate the RAID level, please follow below procedures. 1. Select “/ Volume configuration / RAID group”. 2. Move the mouse pointer to the gray button next to the RG number; click “Migrate”. 3. Change the RAID level by clicking the down arrow to “RAID 5”. There will be a pup-up which indicates that HDD is not enough to support the new ” to increase hard drives, setting of RAID level, click “ “ to go back to setup page.
6. Migration starts and it can be seen from the “status” of a RG with “Migrating”. In “/ Volume configuration / Virtual disk”, it displays a “Migrating” in “Status” and complete percentage of migration in “R%”. To do migration, the total size of RG must be larger or equal to the original RG. It does not allow expanding the same RAID level with the same hard disks of original RG. The operation is not allowed when RG is being migrated. System would reject the following operations: 1. 2. 3. 4. 5. 6. 7. 8.
4.3 VD Extension To extend VD size, please follow the procedures. 1. Select “/ Volume configuration / Virtual disk”. 2. Move the mouse pointer to the gray button next to the VD number; click “Extend”. 3. Change the size. The size must be larger than the original, and then click “ 4. “ to start extension. Extension starts. If VD needs initialization, it will display “Initiating” in “Status” and the completed percentage of initialization in “R%”.
4.5 Disk Roaming Physical disks can be re-sequenced in the same system or move all physical disks from system-1 to system-2. This is called disk roaming. System can execute disk roaming online. Please follow the procedures. 1. 2. 3. 4. 5. Select “/ Volume configuration / RAID group”. Move the mouse pointer to the gray button next to the RG number then click “Deactivate”. Move all PDs related to the RG to another system. Move the mouse pointer to the gray button next to the RG number then click “Activate”.
Appendix A. Certification List RAM RAM Spec: 184pins, DDR333(PC2700), Reg.(register) or UB(Unbufferred), ECC or Non-ECC, from 64MB to 1GB, 32-bit or 64-bit data bus width, x8 or x16 devices, 9 to 11 bits column address. Vendor ATP ATP ATP ATP Unigen Unigen Unigen Unigen Unigen Unigen Unigen Unigen Unigen Unigen Unigen Model AG64L72T8SQC4S, 512MB DDR-400 (ECC) with Samsung AG28L64T8SHC4S, 1GB DDR-400 with Samsung AG28L72T8SHC4S, 1GB DDR-400 (ECC) with Samsung AB28L72Q8SHC4S, 1GB DDR-400 (ECC, Reg.
3. Mac build-in iSCSI initiator iscsi-initiator-utils-4.0.3.0-4 in kernel 2.6.9 For Red Hat Enterprise Linux 5 (Kernel 2.6), use the build-in iSCSI initiator iscsi-initiator-utils-6.2.0.7420.5.el5 in kernel 2.6.18 ATTO Xtend SAN iSCSI initiator v3.10 System Requirements: 1. Mac OS X v10.5 or later For ATTO Xtend SAN iSCSI initiator, it is not free. Please contact your local distributor.
Hard drive Vendor Hitachi Hitachi Hitachi Hitachi Hitachi Maxtor Maxtor Samsung Seagate Seagate Seagate Seagate Seagate Seagate Seagate Seagate Seagate Seagate Westem Westem Westem Westem Digital Digital Digital Digital Westem Digital Westem Digital Westem Digital Model Deskstar 7K250, HDS722580VLSA80, 80GB, 7200RPM, SATA, 8M Deskstar E7K500, HDS725050KLA360, 500GB, 7200RPM, SATA II, 16M Deskstar 7K80, HDS728040PLA320, 40GB, 7200RPM, SATA II, 2M Deskstar T7K500, HDT725032VLA360, 320GB, 7200RPM, SATA II,
B. Event Notifications PD events Level INFO WARNING ERROR Type Disk inserted Disk removed HDD failure Disk is inserted into system. Disk is removed from system. Disk is disabled. HW events Level WARNING ERROR INFO INFO INFO Description Type ECC error ECC error ECC info ECC info SCSI info Description Single-bit ECC error is detected. Multi-bit ECC error is detected. ECC memory is installed. Non-ECC memory is installed.
WARNING SMART T.E.C. WARNING SMART failure RMS events Level auto shutdown immediately. Disk S.M.A.R.T. Threshold Exceed Condition occurred for attribute - . Disk : Failure to get S.M.A.R.T information. Type INFO Console Login INFO Console Logout INFO INFO Web Login Web Logout Description login from via Console UI. logout from via Console UI. login from via Web UI.
INFO ERROR INFO INFO INFO INFO INFO INFO INFO INFO WARNING WARNING WARNING ERROR ERROR WARNING WARNING ERROR ERROR INFO INFO WARNING WARNING WARNING started VD migration finished VD migration failed VD scrubbing started VD scrubbing finished RG migration started RG migration finished RG activated RG deactivated VD rewrite started VD rewrite finished VD rewrite failed RG degraded VD degraded RG failed VD failed Recoverable read error occurred Recoverable write error occurred Unrecoverable read error occurre
INFO RG restored INFO VD restored iSCSI events Level INFO INFO INFO Type iSCSI login succeeds iSCSI login rejected iSCSI logout Description iSCSI login from succeeds. iSCSI login from was rejected, reason [] iSCSI logout from was received, reason []. Battery backup events Level Type INFO BBM sync data INFO BBM sync data INFO INFO INFO BBM detected BBM is good BBM is charging BBM is failed BBM WARNING INFO imported.
occurred WARNING PD write error occurred INFO PD freed
of JBOD PD . Write error occurred at LBA of JBOD PD . JBOD PD has been removed from RG . System maintenance events Level INFO INFO INFO INFO WARNING Type System shutdown System reboot FW upgrade start FW upgrade success FW upgrade failure Description System shutdown. System reboot. Firmware upgrade start. Firmware upgrade success. Firmware upgrade failure. C.D. Microsoft iSCSI Initiator Here are the steps to setup Microsoft iSCSI Initiator. Please visit Microsoft website for latest iSCSI initiator. The following setup may not use the latest Microsoft iSCSI initiator. 1. Run Microsoft iSCSI Initiator. 2. Click “Discovery”. 3. Click “Add”. Input IP address or DNS name of iSCSI storage device.
4. Click “OK”. 5. Click “Targets”.
6. Click “Log On”. Check “Enable multi-path” if running MPIO. 7. Click “Advance” if CHAP information is needed. 8. 9. Click “OK”. The status would be “Connected”. Done, it can connect to an iSCSI disk.
The following procedure is to log off iSCSI device. a. Click “Details”. b. Check the Identifier, which will be deleted. c. Click “Log off”. d. Done, the iSCSI device log off successfully.
E. Installation Steps for Large Volume (Over 2TB) Introduction: The iSCSI RAID subsystem is capable of supporting large volumes (>2TB). When connecting controllers to 64bit OS installed host/server, the host/server is inherently capable for large volumes from the 64bit address.
Step 3: Initialize/Format/Mount the disk 1. Go to Start Æ Control Panel Æ Computer Management Æ Disk Management, it displays a new disk. 2. Initialize the disk. 3. Convert to GPT disk for over 2TB capacity. For more detail information about GPT, please visit http://www.microsoft.com/whdc/device/storage/GPT_FAQ.
4. Format the disk. 5. Done. 6. The new disk is ready to use, the available size = 2.72TB. WARNING: If user setups 512B block size for VD and the host/server OS is 32bit, in the last step of formatting disk, user will find OS cannot format the disk sector after 2048GB (2TB).
7. Wrong setting result: OS can not format disk sector after 2048GB(2TB). F. MPIO and MC/S Setup Instructions Here is the instruction to setup MPIO. The following network diagrams are the examples. Please follow them to setup the environment. Remind that host must have multi NICs which are set up with different IPs ¾ Network diagram of MPIO.
The MPIO setup instructions are the following: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. Create RG/VD, and then attach LUN. Add the first “Target Portal” on Microsoft iSCSI initiator. Add the second “Target Portal” on Microsoft iSCSI initiator. Logon. Enable “Enable multi-path” checkbox. Then click “Advanced…”. Select the first “Source IP” and “Target Portal” to iSCSI data port 1. Then click “OK”. Logon again. Enable “Enable multi-path” checkbox. Then click “Advanced…”.