Thecus i Series User’s Manual
Preface About this manual This manual is the introduction of i Series, and to help user to know the operation of the disk array system easily. Information contained in the manual has been reviewed for accuracy, but not for product warranty because of the various environments/OS/settings, Information and specification will be changed without further notice. For any update information, please visit www.thecus.com and your contact windows. Copyright@2008, Thecus Technology Corp. All rights reserved.
Table of Contents Chapter 1 1.1 1.2 1.3 RAID introduction.......................................... 5 Features........................................................................... 5 Terminology ..................................................................... 6 RAID levels ...................................................................... 8 Chapter 2 2.1 2.2 2.3 Getting started ............................................... 9 Before starting...............................................
3.7 Enclosure management ................................................. 50 3.7.1 3.7.2 3.7.3 3.7.4 3.8 SES configuration................................................................................. 51 Hardware monitor ................................................................................. 51 Hard drive S.M.A.R.T. function support ................................................ 52 UPS ......................................................................................................
Chapter 1 RAID introduction 1.1 Features i Series features: • • • • • • • • • • • • • Gigabit LAN (x2) -to- SATA II (xN bays) RAID controller. RAID 6 ready. SATA II support with SATA I backward compatible. N-way mirror. On-line volume expansion and RAID level migration. Global/dedicated cache configuration by volume. S.M.A.R.T. enabled. Support Microsoft VDS (Virtual Disk Service). Disk roaming. MPIO ready (initiator driver support needed). MC/S ready (initiator driver support needed).
1.2 Terminology The document uses the following terms: RAID RAID is the abbreviation of “Redundant Array of Independent Disks”. There are different RAID levels with different degree of the data protection, data availability, performance to host environment. PD The Physical Disk belongs to the member disk of one specific volume group. VG Volume Group. A collection of removable media. One VG consists of a set of UDVs and owns one RAID level attribute. UDV User Data Volume.
WT Write-Through cache write policy. A caching technique in which the completion of a write request is not signaled until data is safely stored on non-volatile media. Each data is synchronized in both data cache and the accessed physical disks. WB Write-Back cache write policy. A caching technique in which the completion of a write request is signaled as soon as the data is in cache and actual writing to non-volatile media occurs at a later time.
iSCSI Internet Small Computer Systems Interface. CHAP Challenge Handshake Authentication Protocol. An optional security mechanism to control access to an iSCSI storage system over the iSCSI data ports. iSNS Internet Storage Name Service. 1.3 RAID levels RAID 0 Disk striping. RAID 0 needs at least one hard drive. RAID 1 Disk mirroring over two disks. RAID 1 needs at least two hard drives. N-way mirror Extension to RAID 1 level. It has N copies of the disk.
Chapter 2 Getting started 2.1 Before starting Before starting, prepare the following items. 1. 2. 3. 4. 5. 6. 7. Check the “Certification list” in Appendix A to confirm the hardware setting is fully supported. Read the latest release notes before upgrading. Release notes accompany with release firmware. A server with a NIC or iSCSI HBA. CAT 5e, or CAT 6 network cables for management port and iSCSI data ports. Recommend CAT 6 cables for best performance. Prepare storage system configuration plan.
The iSCSI target is the storage device itself or an appliance which controls and serves volumes or virtual volumes. The target is the device which performs SCSI commands or bridges it to an attached storage device. iSCSI targets can be disks, tapes, RAID arrays, tape libraries, and etc. Host 2 (initiator) iSCSI HBA Host 1 (initiator) NIC IP SAN iSCSI device 1 (target) iSCSI device 2 (target) Figure 2.2.1 The host side needs an iSCSI initiator.
Open-iSCSI website: http://www.open-iscsi.org/ Open-iSCSI README: http://www.open-iscsi.org/docs/README Features: http://www.open-iscsi.org/cgi-bin/wiki.pl/Roadmap Support Kernels: http://www.open-iscsi.org/cgi-bin/wiki.pl/Supported_Kernels Google groups: http://groups.google.com/group/open-iscsi/threads?gvc=2 http://groups.google.com/group/open-iscsi/topics Open-iSCSI Wiki: http://www.open-iscsi.org/cgi-bin/wiki.pl 3. ATTO iSCSI initiator is available for Mac. Website: http://www.attotech.com/xtend.
2.3.2 Remote control – secure shell SSH (secure shell) is required for i Series to remote login. The SSH client software is available at the following web site: SSHWinClient WWW: http://www.ssh.com/ Putty WWW: http://www.chiark.greenend.org.uk/ Host name: 192.168.1.100 Login name: admin Default password: admin Tips Thecus i Series only support SSH for remote control. For using SSH, the IP address and the password is required for login. 2.4 Enclosure 2.4.
The following table is function description. Alarm Mute Mute alarm when error occurs. Reset/Shutdown Reset or shutdown controller. Quick Install Quick three steps to create a volume. Please refer to section 3.3 for operation in web UI. View IP Setting Display current IP address, subnet mask, and gateway. Change IP Config Set IP address, subnet mask, and gateway. There are 2 selections, DHCP (Get IP address from DHCP server) or set static IP.
Caution Before power off, it is better to execute “Shutdown” to flush the data from cache to physical disks. 2.4.2 System buzzer The system buzzer features are describing in the following: 1. 2. 3. 2.4.3 The system buzzer alarms 1 second when system boots up successfully. The system buzzer alarms continuously when there is error level event happened. The alarm will be stopped after mute. The alarm will be muted automatically when the error situation is resolved. E.g.
Chapter 3 Web GUI guideline 3.1 GUI hierarchy The below table is the hierarchy of i Series GUI.
Maintenance Upgrade Info Reset to default Config import & export Shutdown Logout Æ Æ Æ Æ Browse the firmware to upgrade / Export config System information Sure to reset to factory default? Import/Export / Import file Æ Reboot / Shutdown Sure to logout? 3.2 Login i Series supports graphic user interface (GUI) to operate the system. Be sure to connect the LAN cable. The default IP address is 192.168.1.100; open the browser and enter: http://192.168.1.
1. RAID light: Green means RAID works well. Red represents RAID failure happening. 2. Temperature light: Green is normal. Red represents abnormal temperature. 3. Voltage light: Green is normal. Red represents abnormal voltage status. 4. UPS light: Green is normal. Red represents abnormal UPS status. 3.3 Quick install It is easy to use “Quick install” function to create a volume.
Step 1: Select “Quick install” then choose the RAID level to set. Please refer to Figure 3.3.1. After choosing the RAID level, click “ ”, which links to another page, user can set up “LUN” here. Figure 3.3.1 Step 2: Please select a LUN number. Access control of host would show as a wildcard “*”, which means every host can access this volume. In this page, the “Volume size” can be changed. The maximum volume size is shown. To re-enter the size be sure it has to be less or equal to maximum volume size.
3.4 System configuration “System config” selection is for the setup of “System name”, “IP address”, “Language”, “Login config”, “Password”, “Date”, “Mail”, “SNMP”, “Messenger” , “System log server” and view “Event log”. Figure 3.4.1 3.4.1 System name Select “System name” to change system name. Default system name composed by model name and serial number of this system. Figure 3.4.1.
3.4.2 IP address Select “IP address” to change IP address for remote administration usage. There are 2 selections, DHCP (Get IP address from DHCP server) or static IP. The default setting is Static IP (192.168.1.100 ) enabled. User can change the HTTP, HTTPS, and SSH port number when the default port number is not allowed on host/server. Figure 3.4.2.1 3.4.3 Language Select “Language” is to set the language shown in Web UI. The option “Auto Detect” will be detected by browser language setting.
3.4.4 Login config Select “Login config” is to set only one admin and set the auto logout timing. The only one admin can prevent multiple users access the same controller in the same time. 1. 2. Auto logout: The options are (1) Disable; (2) 5 mins; (3) 30 mins; (4) 1 hour. The system will log out automatically when the user is no response for a period of time. Login lock: Disable/Enable. When the login lock is enabled, the system allows only one user to login/modify the system settings. Figure 3.4.4.
3.4.6 Date Select “Date” to set up the current date, time, and time zone before using or synchronize time from NTP(Network Time Protocol) server. Figure 3.4.6.1 3.4.7 Mail Select “Mail” to enter at most 3 mail addresses for receiving the event notification. Some mail servers would check “Mail-from address” and need authentication for anti-spam. Please fill the necessary fields and select “Send test mail” to check whether the email works fine.
Figure 3.4.7.1 3.4.8 SNMP Select “SNMP” to set up SNMP trap for alert via SNMP. It allows up to 3 SNMP trap addresses. Default community setting is “public”. User can choose the event log levels and the default value of SNMP is INFO event log enabled only. Figure 3.4.8.1 There are many SNMP tools. The following web sites are for reference: SNMPc: http://www.snmpc.com/ Net-SNMP: http://net-snmp.sourceforge.
3.4.9 Messenger Select “Messenger” to set up pop-up message alert via Windows messenger (not MSN). User must enable the service “Messenger” in Windows (Start Æ Control Panel Æ Administrative Tools Æ Services Æ Messenger), and then event logs can be received. It allows up to 3 messenger addresses. User can choose the event log levels and the default values are WARNING and ERROR event logs enabled only. Figure 3.4.9.1 3.4.
3.4.11 Event log Select “Event log” to view the event messages. Press “Filter” button to choose the display. Press “Download” button will save the whole event log as text file with file name “log-ModelName-SerialNumber-Date-Time.txt”. Press “Clear” button will clear event log. Press “Mute” button will stop alarm if system alerts. Figure 3.4.11.1 For customizing your own display of event logs, there are total three display methods, on Web UI/Console event log page, popup windows on Web UI, and on LCM.
3.5 iSCSI config “iSCSI config” selection is for the setup of “Entity Property”, “NIC”, “Node”, “Session”, and “CHAP account”. Figure 3.5.1 3.5.1 Entity property Select “Entity property” to view the view the entity name of the controller, and setup “iSNS IP” for iSNS (Internet Storage Name Service). Add an iSNS server IP address to the iSNS servers list which the iSCSI initiator service can send queries. The entity name cann’t be changed. Figure 3.5.1.
3.5.2 NIC Select “NIC” to change IP addresses of iSCSI data ports. Figure 3.5.2.2 (Figure 3.5.2.2: there are 2 iSCSI data ports.) User can change IP address by clicking the button “ ” in the “DHCP” column. There are 2 selections, DHCP (Get IP address from DHCP server) or static IP. Figure 3.5.2.3 Default gateway can be changed by clicking the button “ “Gateway” column. There is only one default gateway. Jumbo frame setting can be changed by clicking the button “ “Jumbo frame” column.
CHAP: CHAP is the abbreviation of Challenge Handshake Authorization Protocol. CHAP is a strong authentication method used with point-to-point for user login. It’s a type of authentication in which the authentication server sends the client a key to be used for encrypting the username and password. CHAP enables the username and password to transmitting in an encrypted form for protection. 1. 2. 3. Click “ ” in Auth column. Select “CHAP”. Go to / iSCSI config / CHAP page to create account and password.
Figure 3.5.4.1 (Figure 3.5.4.1: iSCSI Session.) Pressing the button “ “ will display connection(s). Figure 3.5.4.2 (Figure 3.5.4.2: iSCSI Connection.) 3.5.5 CHAP account Enter “CHAP account” function to create/delete a CHAP account for authentication. Figure 3.5.5.1 (Figure 3.5.5.1: Press “Create” to create a CHAP account.
Figure 3.5.5.2 (Figure 3.5.5.2: Create a CHAP account named “chap1”.) 3.6 Volume configuration “Volume config” selection is for the setup of volume configurations including “Physical disk”, “Volume group”, “User data volume”, “Cache volume”, and “Logical unit” functions. Figure 3.6.1 3.6.
LUN 1 UDV 1 LUN 2 LUN 3 UDV 2 UDV 3 + + + VG PD 1 PD 2 Dedicated CV Global CV PD 3 DS RAM - 31 -
The above diagram describes the relationship of RAID components. One VG (Volume Group) consists of a set of UDVs (User Data Volume) and owns one RAID level attribute. Each VG can be divided into several UDVs. The UDVs from one VG share the same RAID level, but may have different volume capacity. Each UDV will be associated with one specific CV (Cache Volume) to execute the data transaction. Each CV could have different cache memory size from user’s modification/setting.
• PD column description: Slot The position of hard drives. The number of slot begins from left to right at the front side. The button next to the number of slot is “More Information” indication. It shows the details of the hard drive. WWN World Wide Name. Size (GB) Capacity of hard drive. VG Name Related volume group name. Status The status of hard drive. “GOOD” Æ the hard drive is good. “DEFECT” Æ the hard drive has the bad blocks. “FAIL” Æ the hard drive cannot work in the respective volume.
command, and the speed can achieve Serial ATA Gen-1 signaling speed (1.5Gbps). Unknown Æ The disk doesn’t support above command, so the speed is defined as unknown. • PD operations description: Free disks Make the selected hard drive to be free for use. Global spares Set the selected hard drive(s) to global spare of all VGs. Dedicated spares Set hard drive(s) to dedicated spare of selected VGs. In this page, i Series also provides HDD auto spindown down function to save power.
Enter “Volume group” to view the status of each volume group. • VG column description: Figure 3.6.3.1 (Figure 3.6.3.1: There is a RAID 0 with 2 physical disks, named “VG-R0”, total size is 148GB, related to 2 UDV. Another is a RAID 5 with 3 physical disks, named “VG-R5”.) No. Number of volume group. The button next to the No. is “More Information” indication. It shows the details of the volume group. Name Volume group name. The button next to the Name is “Rename” function.
• 3.6.4 Status 2 “R” Æ Rebuild. This volume group is doing rebuilding. Status 3 “M” Æ Migration. This volume group is doing migration. RAID The RAID level of the volume group. The button next to the RAID level is “Migrate” function. Click “Migrate” can add disk(s) to do expansion or change the RAID level of the Volume group.
No. Number of this user data volume. The button in below to the UDV No. is “More Information” indication. It shows the details of the User data volume. Name Name of this user data volume. The button in below to the UDV Name is “Rename” function. Size(GB) Total capacity of this user data volume. The button in below to the size is “Extend” function. Status The status of this user data volume. “Online” Æ user data volume is online. “Fail” Æ user data volume is failed. Status 1 “WT” Æ Write Through.
• 3.6.5 UDV operations description: Attach Attach to a LUN. Create Create a user data volume function. Delete Delete a user data volume function. Cache volume Enter “Cache volume” function to view the status of cache volume. The global cache volume is a default cache volume, which is created after power on automatically, and cannot be deleted. The size of global cache is based on the RAM size. It is total memory size minus the system usage. Figure 3.6.5.1 • CV column description: No.
• CV operations description: Create Create a cache volume function. Delete Delete a cache volume function. If there is no free space for creating a new dedicated cache volume, cut down the global cache size first. After resized, then dedicated cache volume can be created. Tips The minimum size of global cache volume is 40MB. The minimum size of dedicated cache volume is 20MB. 3.6.6 Logical unit number Enter “Logical unit” function to view the status of attached logical unit number of each UDV.
Figure 3.6.6.1 Figure 3.6.6.2 (Figure 3.6.6.2: UDV-01 is attached to LUN 0 with every host can access. UDV-02 is attached to LUN 1 with only initiator note named “iqn.1991-05.com.microsoft:s1300n” can access.) • LUN operations description: Attach Attach a logical unit number to a user data volume. Detach Detach a logical unit number from a user data volume. The matching rules of access control are from top to down by sequence.
Example 2 is to create two UDVs. One shares global cache volume, the other uses dedicated cache volume. Set a dedicated spare disk. • Example 1 Example 1 is to create two UDVs in one VG, each UDV uses global cache volume. Global cache volume is created after system boots up automatically. So, no action is needed to set CV. Then set a global spare disk. The last, delete all of them. Step 1: Create VG (Volume Group). To create the volume group, please follow the procedures: Figure 3.6.7.1 1.
Figure 3.6.7.2 (Figure 3.6.7.2: Creating a RAID 0 with 2 physical disks, named “VG-R0”. The total size is 148GB. Because of no related UDV there, free size still remains 148GB.) Step 2: Create UDV (User Data Volume). To create a data user volume, please follow the procedures. Figure 3.6.7.3 1. Select “/ Volume config / User data volume”. 2. 3. ”.
Figure 3.6.7.4 (Figure 3.6.7.4: Create UDVs named “UDV-1” and “UDV-2”, related to “VG-R0”, the size of “UDV-1” is 50GB, the size of “UDV-2” is 98GB. The status of these UDVs are online, write back, high priority with cache volume 383MB. There is no LUN attached.) Step 3: Attach LUN to UDV. There are 2 methods to attach LUN to UDV. 1. In “/ Volume config / User data “ ”. 2. In “/ Volume config / Logical unit”, press “ volume”, press ”. The procedures are as follows: Figure 3.6.7.5 1. 2. 3.
Figure 3.6.7.6 (Figure 3.6.7.6: UDV1 is attached to LUN 0 with any hosts can access. UDV2 is attached to LUN 1 with only initiator note named “iqn.1991-05.com.microsoft:s1300n” can access.) Tips The matching rules of access control are from top to down by sequence. Please refer 3.6.6 for details. Step 4: Set global spare disk. To set global spare disks, please follow the procedures. 1. 2. 3. Select “/ Volume config / Physical disk”.
(Figure 3.6.7.7: Slot 5 is set as global spare disk.) Step 5: Done. They can be used as iSCSI disks. Delete UDVs, VG, please follow the steps. Step 6: Detach LUN from UDV. In “/ Volume config / Logical unit”, Figure 3.6.7.8 1. Select LUNs by clicking the checkbox of the row, then click 2. 3. “ Choose “OK”. Done. ”. There will pop up a confirm page. Step 7: Delete UDV (User Data Volume). To delete the user data volume, please follow the procedures: 1. 2. Select “/ Volume config / User data volume”.
1. 2. Select “/ Volume config / Volume group”. Select a VG by clicking the checkbox of the row, make sure that there is no UDV on this VG, or the UDV(s) on this VG must be deleted first. 3. 4. 5. Click “ “. There will pop up a confirmation page. Choose “OK” Done. The VG has been deleted. Tips The action of deleting one VG will succeed only when all of the related UDV(s) are deleted in this VG. Otherwise, it will have an error when deleting this VG. Step 9: Free global spare disk.
Figure 3.6.7.9 1. 2. Select “/ Volume config / Cache volume”. If there is no free space for creating a new dedicated cache volume, cut down the global cache size first by clicking the button “ ” in the size column. After resized, click “ ” to return to cache volume page. 3. 4. 5. Click “ “ to enter the setup page. “. Fill in the size and click “ Done. A new dedicated cache volume has been set. Tips The minimum size of global cache volume is 40MB. The minimum size of dedicated cache volume is 20MB.
Figure 3.6.7.10 1. Select “/ Volume config / User data volume”. 2. 3. Click “ ”. Input a UDV name, choose a VG Name, select Dedicated cache which is created at Step 1, and input the size for the UDV; decide the stripe height, block size, read/write mode and set priority, finally click “ “. Done. A UDV using dedicated cache has been created. 4. Figure 3.6.7.11 (Figure 3.6.7.11: UDV named “UDV-1” uses global cache volume 80MB, and “UDV-2” uses dedicated cache volume 80MB. “UDV-2” is initialing about 5%.
Step 4: Attach LUN to UDV. Please refer to Step 3 of Example 1 to attach LUN. Step 5: Set dedicated spare disk. To set dedicated spare disks, please follow the procedures: 1. 2. 3. Select “/ Volume config / Physical disk”. Select a VG from the list box, then select the free disk(s), click “ ” to set as dedicated spare for the selected VG. There is a “DS” icon shown up at status 1 column. Figure 3.6.7.13 (Figure 3.6.7.13: Slot 4 has been set as dedicated spare disk of VG named “VG-R5”.) Step 6: Done.
To free dedicated spare disks, please follow the procedures: 1. 2. Select “/ Volume config / Physical disk”. Select the dedicated spare disk by clicking the checkbox of the row, then click “ “ to free disk. Step 11: Delete dedicated cache volume. To delete the cache volume, please follow the procedures: 1. 2. Select “/ Volume config / Cache volume”. Select a CV by clicking the checkbox of the row. 3. 4. 5. “. There will pop up a confirmation page. Click “ Choose “OK”. Done. The CV has been deleted.
5. LED status: 10 seconds. Figure 3.7.1 3.7.1 SES configuration SES represents SCSI Enclosure Services, one of the enclosure management standards. Enter “SES config” function can enable or disable the management of SES. Figure 3.7.1.1 (Figure 3.7.1.1: Enable SES in LUN 0, and can be accessed from every host.) The SES client software is available at the following web site: SANtools: http://www.santools.com/ 3.7.
Figure 3.7.2.1 If “Auto shutdown” has been checked, the system will shutdown automatically when voltage or temperature is out of the normal range. For better data protection, please check “Auto Shutdown”. For better protection and to avoid single short period of high temperature triggering Auto shutdown, i Series use multiple condition judgments for Auto shutdown, below is the detail of when the Auto shutdown will be triggered. 1. 2. 3.7.3 The core processor temperature limit is 85℃.
Figure 3.7.3.1 3.7.4 UPS Enter “UPS” function will set UPS (Uninterruptible Power Supply). Figure 3.7.4.1 Currently, the system only support and communicate with smart-UPS function of APC (American Power Conversion Corp.) UPS. Please check detail from http://www.apc.com/. First, connect the system and APC UPS via RS-232 for communication. Then set up the shutdown values when the power is gone. UPS of other vendors can work fine, but they have no such function of communication.
(%) function. Shutdown Delay (s) If power failure occurred, and the system can not return back to the setting value period, the system will shutdown. Setting delay to “0” will disable the function. Shutdown UPS Select ON, when power is gone, UPS will shutdown by itself after the system shutdown successfully. After power comes back, UPS will start working and notify system to boot up. OFF will not. Status The status of UPS.
Figure 3.8.1 3.8.1 Upgrade Enter “Upgrade” function to upgrade firmware. Please prepare new firmware file ” to select the file. named “xxxx.bin” in local hard drive, then press “ Click “ ”, it will pop up a message “Upgrade system now? If you want to downgrade to the previous FW later, please export your system config first”, click “Cancel” to export system config first, then click “OK” to start to upgrade firmware. Figure 3.8.1.1 Figure 3.8.1.2 When upgrading, there is a progress bar running.
3.8.3 Reset to default Enter “Reset to default” function, it allows user to reset controller to the factory default setting. Figure 3.8.3.1 Reset to default sets password to default: admin, and set IP address to default as Static IP. Default IP address: 192.168.1.100 (Static IP) Default subnet mask: 255.255.255.0 Default gateway: 192.168.1.1 3.8.
3.8.5 Shutdown Enter “Shutdown” function; it will display “Reboot” and “Shutdown” buttons. Before power off, it’s better to press “Shutdown” to flush the data from cache to physical disks. The step is better for the data protection. Figure 3.8.5.1 3.9 Logout For security reason, “Logout” function will allow logout while no user is operating the system. Re-login the system, please enter username and password again.
Chapter 4 Advanced operation 4.1 Rebuild If one physical disk of the VG which is set as protected RAID level (e.g.: RAID 3 , RAID 5, or RAID 6) is FAILED or has been unplugged/removed, then, the VG status is changed to degraded mode, the system will search/detect spare disk to rebuild the degraded VG to a complete one. It will detect dedicated spare disk as rebuild disk first, then global spare disk. i Series support Auto-Rebuild function.
When rebuilding, the status of PD/VG/UDV is “R”; and “R%” in UDV will display the ratio in percentage. After complete rebuilding, “R” and “DG” will disappear. VG will become complete one. Tips The list box doesn’t exist if there is no VG or only VG of RAID 0, JBOD. Because user cannot set dedicated spare disk for these RAID levels. Sometimes, rebuild is called recover; these two have the same meaning. The following table is the relationship between RAID levels and rebuild. RAID 0 Disk striping.
4.2 VG migration and expansion To migrate the RAID level, please follow the below procedures. If the VG migrates to the same RAID level of the original VG, it is expansion. 1. 2. Select “/ Volume config / Volume group”. Decide which VG to be migrated, click the button “ column next the RAID level. 3. Change the RAID level by clicking the down arrow mark “ ”. There will be a pup-up which shows if the HDD is not enough to 4. 5. 6.
Figure 4.2.3 (Figure 4.2.3: A RAID 0 migrates to RAID 5, complete percentage is 2%.) To do migration/expansion, the total size of VG must be larger or equal to the original VG. It does not allow expanding the same RAID level with the same hard disks of original VG. During setting migration, if user doesn’t setup correctly, controller will pop up warning messages. Below is the detail of messages. 1. 2. 3. 4. 5. 6. Invalid VG ID: Source VG is invalid. Degrade VG not allowed: Source VG is degraded.
4. Extension starts. If UDV needs initialization, it will display an “I” in “Status 3” and complete percentage of initialization in “R%”. Figure 4.3.1 (Figure 4.3.1: Extend UDV-R0 from 80GB to 90GB.) Tips The size of UDV extension must be larger than original. Caution UDV Extension cannot be executed during rebuild or migration. 4.4 Disk roaming Physical disks can be re-sequenced in the same system or move whole physical disks from system-1 to system-2. This is called disk roaming.
Appendix A. Certification list • RAM i Series RAM Spec: 184pins, DDR333(PC2700), Reg.(register) or UB(Unbufferred), ECC or Non-ECC, from 64MB to 1GB, 32-bit or 64-bit data bus width, x8 or x16 devices, 9 to 11 bits column address.
OS Microsoft Windows Linux Software/Release Number Microsoft iSCSI Software Initiator Version 2.04 System Requirements: 1. Windows XP Professional with SP2 2. Windows 2000 Server with SP4 3. Windows Server 2003 with SP1 4. Windows Server 2003 R2 The iSCSI Initiators are different for different Linux Kernels. 1. 2. 3. Mac For Red Hat Enterprise Linux 3 (Kernel 2.4), install linux-iscsi3.6.3.tar For Red Hat Enterprise Linux 4 (Kernel 2.6), use the build-in iSCSI initiator iscsi-initiator-utils-4.0.3.
Dell Dell Dell HP D-Link • PowerConnect 5324 PowerConnect 2724 PowerConnect 2708 ProCurve 1800-24G DGS-3024 Hard drive i Series support SATA I, II disks.
• PD/S.M.A.R.T. events Level • Type Info Info Warning Disk inserted Disk removed S.M.A.R.T. threshold exceed condition Warning S.M.A.R.T. information Warning Error Info Info Error Error Warning Type ECC error ECC error ECC DIMM Installed Non-ECC installed Host chip failure Drive chip failure Ethernet port failure Description Warning: Single-bit ECC error is detected. Error: Multi-bit ECC error is detected. Info: ECC Memory is installed. Info: Non-ECC Memory is installed.
Info Warning Info Info • SES load conf. OK SES Load Conf. Failure SES is disabled SES is enabled Info: SES configuration has been loaded. Error: Failed to load SES configuration. The SES device is disabled. Info: The SES device is disabled.
Warning Info Info • Info Info Error Warning Type Sys Config. Defaults Restored Sys NVRAM OK Sys NVRAM IO Failed Sys NVRAM is full Description Info: Default system configurations restored. Info: The system NVRAM is active. Error: Can’t access the system NVRAM. Warning: The system NVRAM is full. System maintenance events Level Info Error Info Info Info Error • Warning: Fail to access RTC device Info: Reset Admin Password to default. Info: Reset network settings set to default.
Warning Info Info Warning Info Info Warning Info Warning VG Created Fail VG Deleted UDV Created OK UDV Created Fail UDV Deleted UDV Attached OK UDV Attached Fail UDV Detached OK UDV Detached Fail Info UDV_OP Rebuild Started UDV_OP Rebuild Finished UDV_OP Rebuild Fail UDV_OP Migrate Started UDV_OP Migrate Finished UDV_OP Migrate Failed VG Degraded UDV Degraded Info Warning Info Info Warning Warning Warning Info Warning Warning UDV Init OK UDV_OP Stop Initialization UDV IO Fault Info VG Failed UDV Fail
Error Error Error Info read/write error PD read/write error UDV recoverable read/write error UDV unrecoverable read/write error UDV stripe rewrite start/fail/succeed failed. Error: PD <#> lba <#> length <#> error. Error: UDV stripe <#> PD <#> lba <#> length <#> recoverable Error: UDV <#> stripe <#> PD <#> lba <#> length <#> unrecoverable Info: UDV stripe <#> rewrite column bitmap . C.
Figure C.2 4. Click “OK”. Please see Figure C.3. Figure C.3 5. Click “Targets”. Please see Figure C.4.
Figure C.4 6. Click “Log On”. Please see Figure C.5. Check “Enable multi-path” if running MPIO. Figure C.5 7. Click “Advance…” if CHAP information is needed. Please see Figure C.6.
Figure C.6 8. Click “OK”. The status would be “Connected”. Please see Figure C.7 9. Done, it can connect to an iSCSI disk.
Figure C.7 The following procedure is to log off iSCSI device.
1. Click “Details”. Please see Figure C.8. Figure C.8 2. 3. 4. Check the Identifier, which will be deleted. Click “Log off”. Done, the iSCSI device log off successfully. D. MPIO and MC/S setup instructions Here is the step by step to setup MPIO. There are 2 kinds of scenarios for MPIO. Please see Figure D.1. Thecus suggests using scenario 2 for better performance. Known issues Microsoft MPIO is not supported on Windows XP or Windows 2000 Professional.
Figure D.1 The setup instructions are in the following figures. 1. Create a VG . Figure D.2 2. Create a UDV.
Figure D.3 3. Run Microsoft iSCSI initiator and check the Initiator Node Name. Figure D.4 4. Attaching LUN to UDV_1 UDV. Input the Initiator Node Name in Host field. Figure D.5 5. The volume config setting is done.
Figure D.6 6. Check iSCSI settings. The IP address of iSCSI data port 1 is 192.168.11.229, port 2 is 192.168.12.229 for example. Figure D.7 7. Add Target Portals on Microsoft iSCSI initiator. Figure D.8 8. Input the IP address of iSCSI data port 1 (192.168.11.229 as mentioned in previous page).
Figure D.9 9. Add second Target Portals on Microsoft iSCSI initiator. Figure D.
10. Input the IP address of iSCSI data port 2 (192.168.12.229 as mentioned in previous page). Figure D.11 11. The initiator setting is done.
Figure D.12 12. Log on. Figure D.
13. Enable “Enable multi-path” checkbox. Then click “Advanced”. Figure D.14 14. Select Target Portal to iSCSI data port 1 (192.168.11.229).
Figure D.15 15. Log on “Enable multi-path” again. Figure D.16 16. Enable “Enable multi-path” checkbox. Then click “Advanced…”. Figure D.
17. Select Target Portal to iSCSI data port 2 (192.168.12.229). Then select “OK” Figure D.18 18. iSCSI device is connected. Click “Details”.
Figure D.19 19. Click “Device” tab, then click “Advanced”. Figure D.
20. Click “MPIO” tab, select “Load Balance Policy” to “Round Robin”. Figure D.21 21. Click “Apply”. Figure D.
22. Run “Device Manage” in Windows. Make sure MPIO device is available. Then the disk can be tested performance by IOMETER. The MC/S setup instructions are very similar to MPIO, detail steps are in the following figures. For the target side setting, the steps are exactly the same as MPIO. Please refer to Figure D.1 to Figure D.9. 1. 2. 3. 4. 5. 6. 7. 8. Create a VG. Create a UDV. Run Microsoft iSCSI initiator and check the Initiator Node Name. Attaching LUN to UDV_1 UDV.
Figure D.24 10. Then click “Advanced…”. Figure D.
11. Select set Local Adapter, Source IP, and Target Portal to iSCSI data port 1 (192.168.11.229). Then click “OK”. Figure D.26 12. After connected, click “Details”, then in the “Session” tab, click “Connections”.
Figure D.27 13. Choose “Round Robin” for Load Balance Policy. 14. “Add” Source Portal for the iSCSI data port 2(192.168.12.229) Figure D.
15. Choose “Adavanced” Figure D.29 16. Select Local adapter, Source IP, and Target Portal to iSCSI data port 2 (192.168.12.229). Then select “OK”. Figure D.30 17. The MC/S setting is done.