User's Manual
Verifying connectivity.....................................................................................................60
Verifying virtual disks from the host.......................................................................................60
Verifying virtual disks from the host.......................................................................................60
HP EVA P6000 Software Plug-in for VMware VAAI.................................................................61
System prerequisites......................................................................................................61
Enabling vSphere Storage API for Array Integration (VAAI).................................................61
Installing the VAAI Plug-in...............................................................................................62
Installation overview.................................................................................................62
Installing the HP EVA VAAI Plug-in using ESX host console utilities...................................63
Installing the HP VAAI Plug-in using vCLI/vMA.............................................................64
Installing the VAAI Plug-in using VUM.........................................................................66
Uninstalling the VAAI Plug-in...........................................................................................68
Uninstalling VAAI Plug-in using the automated script (hpeva.pl).......................................68
Uninstalling VAAI Plug-in using vCLI/vMA (vihostupdate)...............................................68
Uninstalling VAAI Plug-in using VMware native tools (esxupdate)....................................68
4 Replacing array components......................................................................70
Customer self repair ...............................................................................................................70
Parts-only warranty service..................................................................................................70
Best practices for replacing hardware components......................................................................70
Component replacement videos...........................................................................................70
Verifying component failure.................................................................................................70
Identifying the spare part....................................................................................................70
Replaceable parts...................................................................................................................71
Replacing the failed component................................................................................................73
Replacement instructions..........................................................................................................73
5 Single path implementation.......................................................................75
Installation requirements..........................................................................................................75
Recommended mitigations.......................................................................................................75
Supported configurations.........................................................................................................76
General configuration components.......................................................................................76
Connecting a single path HBA server to a switch in a fabric zone............................................76
HP-UX configuration................................................................................................................78
Requirements.....................................................................................................................78
HBA configuration..............................................................................................................79
Risks................................................................................................................................79
Limitations.........................................................................................................................79
Windows Server 2003 (32-bit), Windows Server 2008 (32-bit), Windows Server 2012 (32-bit)
configurations........................................................................................................................80
Requirements.....................................................................................................................80
HBA configuration..............................................................................................................80
Risks................................................................................................................................80
Limitations.........................................................................................................................80
Windows Server 2008 (64-bit) and Windows Server 2003 (64-bit) configurations..........................81
Requirements.....................................................................................................................81
HBA configuration..............................................................................................................81
Risks................................................................................................................................82
Limitations.........................................................................................................................82
Oracle Solaris configuration.....................................................................................................82
Requirements.....................................................................................................................82
HBA configuration..............................................................................................................83
Risks................................................................................................................................83
Limitations.........................................................................................................................83
OpenVMS configuration..........................................................................................................84
Requirements.....................................................................................................................84
Contents 5