Manuel d'utilisation / d'entretien du produit MD3200 du fabricant Dell
Aller à la page of 74
Dell PowerV ault MD3200 and MD3220 Storage Array s Deployment Guide book.book Page 1 Thur sday, July 18, 2013 5:56 PM.
Notes, Cautions, and W arnings NOTE: A NOTE indicates important information that helps you make better use of your computer . CAUTION: A CAUTION indicates potential damage to hardware or loss of data if instructions are not followed. WAR N IN G : A WARNING indicates a potential for property damage, personal injury , or death.
Contents 3 Contents 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . 7 Sy stem Requirements . . . . . . . . . . . . . . . . . . . 7 Management Station Requirements . . . . . . . . . 7 Introduction to Storage Array s . . . . . . . . . . .
4 Contents Console Installation . . . . . . . . . . . . . . . . . 29 Silent Installation . . . . . . . . . . . . . . . . . . 29 Upgrading PowerV ault MD Storage Software . . . . . 30 4 Post Installation T asks . . . . . . . . . . . . . . 31 Before Y ou Begin .
Contents 5 5 Uninstalling PowerV ault MD Storage Software . . . . . . . . . . . . . . . . . . 45 Uninstalling MD Storage Software From Windows . . 45 Uninstalling MD Storage Software From Linux . . . . . 46 6 Getting Help . . . . . . . . . . . . . . .
6 Contents Step 2: Configure t he iSCSI Ports on the Storage Array . . . . . . . . . . . . . . . . . . . . . . . 57 Step 3: Perform T ar get Discovery From the iSCSI Initiator . . . . . . . . . . . . . . . . . . . . 59 Step 4: Configur e Host Access .
Introduction 7 1 Introduction This guide provides in formation about deploying Dell P owerV ault MD3200 and Dell P owerV ault MD3220 storage arrays. The deployme nt process includes: • Hardwar e ins.
8 Introduction • Display resolution of 1024x768 with 16 million colors (1280x1024 32-bit recommended). • Microsoft W indows, Red Hat Enterprise Linux, or SUSE Li nux Enterprise Server . NOTE: Supported operating sy stems include both native and guest operating sy stems.
Introduction 9 Unconfigured capacity comprises physical disks not already assigned to a disk group. When a virtual disk is cr eate d using unconfigur ed capacity , a disk group is automatically created. If the only virtual disk in a disk group is deleted, the disk group is also deleted.
10 Introduction book.book Page 10 Thursday, July 18, 2013 5:5 6 PM.
Hardware Installation 11 2 Hardware Installation Be fo re us i ng t hi s g u id e , e n su re t h at y ou rev i ew t he in s tr u ct i on s in th e : • Getting Started Guide —The Getting Started Guide that shipped with the storage array provides informat ion to configur e the initial setup of t he system.
12 Hardware Installation Connecting the Storage Array The storage array is connected to a host using two hot-swappable R AID controller modules. The R AID controll er modules ar e identifi ed as R AID controller module 0 and R AID controller module 1.
Hardware Installation 13 Redundant a nd Non-Redundan t Configurations Non-redundant configurations ar e configurations that provide only a single data path from a host to the storage arra y . This type of configuration is only recommended for non-critical data storage.
14 Hardware Installation Figure 2-2. T wo Hosts Connected to a Single Controller Server 1 Server 2 Storage array Corporate, public, or private network book.
Hardware Installation 15 Figure 2-3. Four Hosts Connected to a Single Controller Server 1 Server 2 Storage array Corporate, public, or private network Server 3 Server 4 book.
16 Hardware Installation Dual Controller Configurations F igur e 2-4 thro ugh F igure 2-6 show two an d four hosts, each connected to two RAID controller modules. Since each host ha s redundant pa ths, loss of a single path would still allow access to the st orage array through the altern ate path.
Hardware Installation 17 Figure 2-5. Four Hosts Connected to T w o Controllers Server 1 Server 2 Storage array Corporate, public, or private network Server 3 Server 4 book.
18 Hardware Installation Figure 2-6. Four Hosts Connected to T wo Controllers Server 1 Server 2 Storage array Corporate, public, or private network Server 3 Server 4 book.
Hardware Installation 19 F igur e 2-7 shows eight hosts, each co nnected to only one RAID controller module. This configuratio n allows the maximum num ber of hosts that may be connected, but provides no redundancy .
20 Hardware Installation F igur e 2- 8 and F igure 2-9 show up to fo ur cluster nodes connected to two RAID controller modules. Since each cl uster node has r edundant paths, loss of a single path would still allow a ccess to the storage array through the alternat e path.
Hardware Installation 21 Figure 2-9. Four Cluster Nodes Connected to T wo Controllers Four cluster nodes Storage array Corporate, public, or private network book.
22 Hardware Installation Cabling PowerV ault MD 1200 Series Expansion Enclosures Y ou can expand the capacity of your P o werV ault MD3200 series storage array by adding P owerV ault MD1200 series expansion enclosur es.
Hardware Installation 23 a Install the software and drive r pa ckage included on the P owerV ault MD series resource media. F or information about installing the software, see "Installing P owerV ault MD Storage Software" on page 27.
24 Hardware Installation Expanding With New Po werV aul t MD1200 Series Expa nsion Enclosures P erfo rm the following steps to attach new P owerV ault MD1200 series expansion enclosures to a P owerV ault MD3200 series storage array: 1 Before adding the expansion enclosur e(s), ensur e that the storage array software is installed and is up to date.
Hardware Installation 25 • If the status LEDs are blinking am ber , there is an error that can be viewed using P o werV ault MDSM. • If the status LEDs ar e solid blue, the storage array is ready . c After the storage array is online and ready , turn on any attached host systems.
26 Hardware Installation book.book Page 26 Thursday, July 18, 2013 5:5 6 PM.
Installing PowerV ault MD Storage Software 27 3 Installing PowerV ault MD Storage Software The Dell P owerV ault MD series resource media contains software and drivers for both Linux and Microsoft W indows operating systems. The root of the media contains a readme.
28 Installing PowerV ault MD Storage Software • Console Installation—This installation procedure is useful for Linux users who do not want to ins tall an X - W indow environment on their supported Linux platform. • Silent Installation—This instal lation procedure is useful for users who want to cr eate scripted installations.
Installing PowerV ault MD Storage So ftware 29 NOTE: This option is applicable only to Wind ows client softwa re installation. 7 Confirm the installation location and choose Install . 8 If prompted, r eboot the host server once the installation completes.
30 Installing PowerV ault MD Storage Software # md_prereq_install.sh 1 Copy the custom_silent.properties file in th e /win dows folder of the installation medi a or image to a writ able location on the host server . 2 Modify the custom_silent.properti es file to refl ect the featur es, models and installation options to be used.
Post Installation T asks 31 4 Post Installation T asks Before using the storage array for th e first time, comp lete the initial configuration tasks in the order shown.
32 Post Installation T asks iSCSI Configuration W orksheet The "IPv4 Settings—W orksh eet" on page 33 and "IPv 6 Settings—W orksheet" on page 34 helps you plan your config uration. Recor ding host server and storage array IP addresses at a single location enables you to configure your setup faster and mor e effici ently .
Post Installation T asks 33 IPv4 Settings—W orksheet Mutual CHAP Secret T arget CHAP Secret A B host server PowerV ault MD36 x 0i 192.168.131.101 ( In 1 default) 192.168.128.101 (management network port) 192.168.130.102 (I n 0 default) 192.168.131.102 (In 1 default ) 192.
34 Post Installation T asks IPv6 Settings—Worksheet Mutual CHAP T arget CHAP A B If you need addi tional space for more than on e host server , use an addi tional sheet. Link local IP addr ess Routable IP addr ess Subnet prefix Gateway A Host server Host iSCSI port 1 ___ .
Post Installation T asks 35 Configuring iSCSI on Y our Storage Array The following sections contain step-b y-step instructions for configuring iSCSI on your storage array . Howev er , before you begin, it is important to understand where each of these steps occur in relation to your host server or storage array environment.
36 Post Installation T asks T able 4-2. Host Server Vs. Storage Array NOTE: It is recommended that you use the Po werV ault Modular Disk Configuration Utility (MDCU) for iSCSI configuration. The PowerV ault MDCU wizards guides you through the configuration steps desc ribed abov e.
Post Installation T asks 37 The MDCU performs: • Storage array con figuration • Host configuration Storage Array Configuration Before a host iSCSI init iator and an iSCSI -based storage array can communicate, they must be configured with information such as which IP addresses and authentication method to use.
38 Post Installation T asks informational message. If you are running the utility on a host which is not connected to the iSCSI–based storage array (or which you do not wish to connect to the array), the inform ational message can be ignored. The task generally involves the following steps: 1 Discover available storage ar ray(s) for connection.
Post Installation T asks 39 Configure the Storage Array Using MDCU T o configure the iSCSI-based storage array(s) using the MDCU: 1 Launch the utility (if it is not launched a utomatically) from the server with access to the management port s of the storage arra y(s) to be configured.
40 Post Installation T asks Guidelines For Configuring Y our Network For iSCSI This section provides ge neral guid elines for setting up your network environment and IP addresses for use with the iSCSI ports on your host server and storage arra y .
Post Installation T asks 41 2 Right-click the netw ork connection you want to configu re and select P roperties . 3 On the General tab (for a local area connection) or the Networking tab (for all other connections), select Internet P rotocol (TCP/IP) , and then click P roperties .
42 Post Installation T asks 7 T o specify the location of the file that you want to import into the Lmhosts file, select Import LMHOSTS and then select the file in the Open dialog box.
Post Installation T asks 43 NETWORKING=yes HOSTNAME=mymachine.mycompany.com GATEWAY=255.255.255.0 2 Edit the configuration file for the conn ection you want to configure, either /etc/sysconfig/network-scripts/ifcfg-ethX (for Re d Hat Enterprise Linux) or /etc/sysconfig/network/ifcfg-e th-id- XX:XX:XX:XX:XX (for SUSE Enterprise Linux).
44 Post Installation T asks book.book Page 44 Thursday, July 18, 2013 5:5 6 PM.
Uninstalling PowerV ault MD Storage Software 45 5 Uninstalling PowerV ault MD Storage Software Uninstalling MD Storage Software From Windows Use the Change/R emove P rogram feature to uninstall the Mo.
46 Uninstalling PowerV ault MD Storage Software NOTE: By default, MD Storage Manag er is installed in the Program FilesDellMD Storage Software directory . If another directory was used during installation, navigate to that directory before beginning the uninstallation procedure.
Getting Help 47 6 Getting Help Locating Y our Sy stem Service T ag Y our system is identified by a uniqu e Express Service Code and Se rvice T ag number . The Express Service Code and Se rvice T ag are found on the front of the system by pulling out the informatio n tag.
48 Getting Help Documentation Feedback If you have feedback for this document, write to documentati on_feedba ck@dell. com . Alternatively , you can click on the Fe e d b a c k link in any of the Dell document ation pages, fill up the form, and click Submit to send your feedback.
Appendix—Load Balancing 49 A Appendix—Load Balancing Windows Load Balance Policy Multi-path drivers select the I/O path to a virtual disk through a specific R AID controller modul e. When the multi-path dri ver r eceives a new I /O , the driver tries to find a path to the curr ent R AID controller module that owns the virtual disk.
50 Appendix—Load Balancing Least Queue Dep th With Subset The least queue depth with subset policy is also kn own as the least I/Os, or least requests , policy . Th is policy ro utes the next I/O r equest to a data path that has the least outstanding I/O r equests queued.
Appendix—Load Balancing 51 Changing the Load Balance Policy Using the Windows Server 2008 Disk Management Options 1 Right-click My Computer from the host desktop and select Manage to open the Computer Managemen t window . 2 Click Disk Management to show the list of virtual disks attached to the host.
52 Appendix—Load Balancing book.book Page 52 Thursday, July 18, 2013 5:5 6 PM.
Appendix—Manual Configuration of iSCSI 53 B Appendix—Manual Configuration of iSCSI The following sections contain step-b y-step instructions for configuring iSCSI on your storage array . Howev er , before beginning, it is important to understand where each of these steps occur in relation to your host server or the storage array environme nt.
54 Appendix—Manual Configuration of iSCSI Step 1: Discover the St orage Array (Out-of-band Management Only) Default Management IPv4 Port Settings By default, the storage array management ports ar e set to Dynamic Host Configuration P rotocol (DHCP).
Appendix—Manual Configuration of iSCSI 55 4 F inally , add the last thr ee bytes of the MAC addr ess FE80::0200:08FF :FEAA:BBCC. NOTE: This procedure applies to out-of-band management only .
56 Appendix—Manual Configuration of iSCSI After discovery is complete, a confirmation screen is displayed. 3 Click Close to close the screen. Manual Storage Array Discovery 1 Launch MDSM. If this is the first storage array to be set up, the Add New Storage Array window is d isplayed.
Appendix—Manual Configuration of iSCSI 57 Step 2: Configure the i SCSI Ports on the Storage Array By default, the iSCSI ports on the stor age array ar e set to the following IPv4 settings: Controller 0, Port 0: IP: 192.168.130.101 Subnet Mask: 255.255.
58 Appendix—Manual Configuration of iSCSI Controller 1, Port 2: IP: 192.168.132.102 Subnet Mask: 255.255.255.0 Port: 3260 Controller 1, Port 3: IP: 192.168.133.102 Subnet Mask: 255.255.255.0 Port: 3260 NOTE: No default gateway is set. T o configure the iSCSI ports on th e storage array: 1 F rom MDSM, navigate to the Setup tab on the AMW .
Appendix—Manual Configuration of iSCSI 59 Step 3: Perform T arget Discovery From the iSCSI Initiator This step ident ifies the iSCSI por ts on the st orage array to the host server . Select the set of steps in one of the following se ctions (Microsoft W indows or Linux) that corr esponds to your operating system.
60 Appendix—Manual Configuration of iSCSI • If you do not plan to configure CHAP authentication , repeat step 1 thorough step 6 for all iSCSI ports on the storage array .
Appendix—Manual Configuration of iSCSI 61 5 T o display the available iSCSI targets at the specified IP address, use the following command: iscsiadm –m discovery –t st -p <IP_address_of_iSCSI.
62 Appendix—Manual Configuration of iSCSI Understanding CHAP Authentication What is CHAP? Challenge Handshak e A uthentication P rotocol (CHAP) is an optional iSCSI authentication method where the storag e arr ay (target) authenticates iSCSI initiators on the host server .
Appendix—Manual Configuration of iSCSI 63 CHAP Definitions T o summarize the differences between target CHAP and mutual CHAP authentication, see T able B-3.
64 Appendix—Manual Configuration of iSCSI Although the storage array allows size s from 12 to 57 characters, many initiators only support CHAP secret sizes up to 16 char acters (128 -bit). NOTE: A CHAP secret is not retrievable af ter it is entered .
Appendix—Manual Configuration of iSCSI 65 Step 6: Configure CHAP Authentication on the Host Server (Optional) If you configured CHAP authentica tion in "Step 5: Conf igure CHAP Authenticat ion on the Storage Array (Optional)" on page 63, complete the following steps.
66 Appendix—Manual Configuration of iSCSI • P erform mutual authentication—If mutual CHAP authentication i s configured, select this option. NOTE: IPSec is not supported. 8 Click OK . If you requ ire a discovery ses sion failover , repeat step 5 and step 6 (in this procedure) for all iSCSI ports on the storage array .
Appendix—Manual Configuration of iSCSI 67 1 T o enable CHAP (optional), the following line needs to be enabled in yo ur /etc/iscsi/isc sid.conf file: node.session.auth.authmethod = CHAP 2 T o set a user name and password for CHAP authentication of the initiator by the target(s), edit the following lines: node.
68 Appendix—Manual Configuration of iSCSI 7 The final configuration contained in the /etc/iscsi/iscsid.conf file might look like this: node.session.auth.authmethod = CHAP node.session.auth.username = iqn.2005- 03.com.redhat01.78b1b8cad821 node.session.
Appendix—Manual Configuration of iSCSI 69 7 Select one: • If you ar e not using CHAP authentica tion, select No Authent ication . Go to step 8. or • I f you are using CHAP authenticati on, enter the CHAP user name and password. T o enable Mutual CHAP , select and enter th e Mutual CHAP user name and p assword.
70 Appendix—Manual Configuration of iSCSI • Data Digest and Header Digest —Optionally , you can specify that a digest of data or head er information be compiled during transmission to assist in troubleshooting. • CHAP logon information —If CHAP authentication is re quired, select this option and enter the T arget secret.
Appendix—Manual Configuration of iSCSI 71 where, – <T arget_Name> is the target name as displayed in the target list. Use the iscsicli ListT argets command to display the target list. – <Report_T o_PNP > is T , which exposes the L UN to the operating system as a storage device.
72 Appendix—Manual Configuration of iSCSI P e rsistent Log inT arget does not initia te a login to the target until after the system is rebooted. T o establish imme diate login to the tar get, substitute LoginT arget for P ersistentL oginT arget. : NOTE: See the Microsoft iSCSI So ftware Initiator 2.
Appendix—Manual Configuration of iSCSI 73 NOTE: Configure the management stati on you are using for network communication to the same IP subnet as the PowerV ault MD36 x 0i host ports. 1 Establish an iSCSI session to the P owerV ault MD3600i RAID storage array .
74 Appendix—Manual Configuration of iSCSI book.book Page 74 Thursday, July 18, 2013 5:5 6 PM.
Un point important après l'achat de l'appareil (ou même avant l'achat) est de lire le manuel d'utilisation. Nous devons le faire pour quelques raisons simples:
Si vous n'avez pas encore acheté Dell MD3200 c'est un bon moment pour vous familiariser avec les données de base sur le produit. Consulter d'abord les pages initiales du manuel d'utilisation, que vous trouverez ci-dessus. Vous devriez y trouver les données techniques les plus importants du Dell MD3200 - de cette manière, vous pouvez vérifier si l'équipement répond à vos besoins. Explorant les pages suivantes du manuel d'utilisation Dell MD3200, vous apprendrez toutes les caractéristiques du produit et des informations sur son fonctionnement. Les informations sur le Dell MD3200 va certainement vous aider à prendre une décision concernant l'achat.
Dans une situation où vous avez déjà le Dell MD3200, mais vous avez pas encore lu le manuel d'utilisation, vous devez le faire pour les raisons décrites ci-dessus,. Vous saurez alors si vous avez correctement utilisé les fonctions disponibles, et si vous avez commis des erreurs qui peuvent réduire la durée de vie du Dell MD3200.
Cependant, l'un des rôles les plus importants pour l'utilisateur joués par les manuels d'utilisateur est d'aider à résoudre les problèmes concernant le Dell MD3200. Presque toujours, vous y trouverez Troubleshooting, soit les pannes et les défaillances les plus fréquentes de l'apparei Dell MD3200 ainsi que les instructions sur la façon de les résoudre. Même si vous ne parvenez pas à résoudre le problème, le manuel d‘utilisation va vous montrer le chemin d'une nouvelle procédure – le contact avec le centre de service à la clientèle ou le service le plus proche.