Download - Sever Monitoring

Transcript
Page 1: Sever Monitoring

© 2010 Wipro Ltd - Internal & Restricted

Wipro - IAS

Server Certification

Reference Materials

Disclaimer: This document contains proprietary information of Wipro Ltd – IAS. No part of this publication may be reproduced,

stored in a retrieval system or transmitted in any form or by any means, whether electronic, mechanical, photocopying, recording

or otherwise, without the prior written permission of Wipro Ltd. – IAS. The information contained herein is confidential to Wipro

Ltd. – IAS and its Service Partners, shall not be distributed to any persons other than those involved in the assessment &

delivery of services. Wipro Ltd. – IAS reserves the right to revise and update this document as and when required. Wipro Ltd. –

IAS reserves the right to withdraw the document excluding customer specific information at the time of termination of services.

All product names referenced herein are trademarks of their respective companies.

Page 2: Sever Monitoring

© 2009 Wipro Ltd - Confidential 2 © 2010 Wipro Ltd – Internal & Restricted 2

Topics - Overview

Hardware

• Backup devices

• Basics

• Dell Server

• HP Server

• IBM Server

• Networking

• Storage Basics

• Troubleshooting

• Wipro Servers

Software

• Antivirus

• Linux Server Diag.

• Toolkit

Process

• Care, Handling & Best Practices

• Process Basics

• Server Management

Page 3: Sever Monitoring

© 2010 Wipro Ltd - Confidential 3 © 2010 Wipro Ltd – Internal & Restricted 3

Server Hardware Basics

Page 4: Sever Monitoring

© 2010 Wipro Ltd - Confidential 4 © 2010 Wipro Ltd - Internal & Restricted 4

What is ESD ?

ESD : Electrostatic discharges

Most severe form of electromagnet interference (EMI).

The following are the most common

causes of ESD:

Moving people

Low humidity (hot and dry conditions)

Improper grounding

Unshielded cables

Poor connections

Moving machines

Page 5: Sever Monitoring

© 2010 Wipro Ltd - Confidential 5 © 2010 Wipro Ltd - Internal & Restricted 5

Source of ESD voltage

Typical Electro Static Voltage in KV at a relative humidity of 20%

Walking across Vinyl floor 12 KV

Walking across synthetic carpet 35 KV

Opening a plastic bag 20 KV

Arising from a foam cushion 18 KV

Sliding plastic box on a carpet 18 KV

Removing plastic tape for a PC board 12 KV

Removing shrink film from PC board 12 KV

Triggering a vacuum solder remover 8 KV

Spraying aerosol freezer spray 15 KV

Page 6: Sever Monitoring

© 2010 Wipro Ltd - Confidential 6 © 2010 Wipro Ltd - Internal & Restricted 6

Devices Susceptibility to ESD damage

Device type ESD susceptibility

Bipolar transistors 380 to 7000 Volt

CMOS logic devices 250 to 3000 Volt

EPROM devices 100 volt

Film resistors 300 to 3000 Volt

TTL logic devices 1000 to 2500 Volt

Microprocessor chips as low as 10 Volt

Page 7: Sever Monitoring

© 2010 Wipro Ltd - Confidential 7 © 2010 Wipro Ltd - Internal & Restricted 7

ESD safe work areas and protective equipment

Workstations where static sensitive equipment is handled must be equipped with the following equipment:

Bench top grounding points ESD protective table top or mat Wrist strap and grounding points Protective clothing, including hair protection ESD safe floor area ESD safe chair Ionized air blower ESD safe containers

Page 8: Sever Monitoring

© 2010 Wipro Ltd - Confidential 8 © 2010 Wipro Ltd - Internal & Restricted 8

ESD safe work areas and protective equipment

When repairing equipment out in the field the minimum

equipment to ensure a measure of ESD protection is:

Anti-static conductive mat and grounding cable

Wrist strap and grounding cables

Supply of protective bags and other suitable containers

Field Service Technicians must also wear suitable clothing

and avoid handling objects that can generate dangerous

electrostatic potentials. These objects include non

protective bags and containers, beverage and food

containers, and furniture.

Page 9: Sever Monitoring

© 2010 Wipro Ltd - Confidential 9 © 2010 Wipro Ltd - Internal & Restricted 9

10 Point to Avoid ESD Damage

1. Make sure you have a reliable ground point available near the work site

2. Connect your body to the ground point with a wrist strap

3. Ground all equipment you are working on with ground straps

4. Handle PC components only on a grounded anti-static work surface

5. Do not wear clothing which generates static electric charges every time you move

6. Do not handle static generating objects while working on PC hardware

7. Store all chips and other components in appropriate anti-static containers

8. Keep all PC cards in anti-static envelopes until required

9. Be sure to turn off the power and remove the power plug from all equipment before working on it

10.Do not plug in or remove devices such as printers and modems while the power is on

Page 10: Sever Monitoring

© 2010 Wipro Ltd - Confidential 10 © 2010 Wipro Ltd - Internal & Restricted 10

Typical antistatic devices

Page 11: Sever Monitoring

© 2010 Wipro Ltd - Confidential 11 © 2010 Wipro Ltd - Internal & Restricted 11

Discharging through the power-supply unit

Page 12: Sever Monitoring

© 2010 Wipro Ltd - Confidential 12 © 2010 Wipro Ltd - Internal & Restricted 12

Care and Handling - Systems

Use the following guidelines to properly handle and care for your system

Protect the system from extremely low or high temperatures. Let the system warm (or cool) to room temperature before using it.

Keep the system away from magnetic forces.

Keep the system dry. Do not wash the system with a wet cloth or pour fluid into it.

Protect the system from being bumped or dropped.

Check the system for condensation. If condensation exists, allow it to evaporate before powering on the system.

Keep the system away from dust, sand, and dirt.

Page 13: Sever Monitoring

© 2010 Wipro Ltd - Confidential 13 © 2010 Wipro Ltd - Internal & Restricted 13

• Near a Properly grounded, three-pronged power outlet for 200-240V

• Clean and relatively free of excess dust

• Well-ventilated and away from sources of heat, with the ventilating openings on the server kept free from obstructions

• Maximum ambient temperature shouldn't exceed 35 oC ( 95 oF)

• Isolated from strong electromagnetic fields and noise caused by electrical devices such as elevators, copy machines, air conditioners, large electric motors, radio and TV transmitters, and high frequency security devices

• Access space provided for handling the cables connected to the server

•Clearance provide for cooling and air flow

Selecting a Sight

Page 14: Sever Monitoring

© 2010 Wipro Ltd - Confidential 14 © 2010 Wipro Ltd - Internal & Restricted 14

Server Fundamentals

Backplane board for RAID

Hot Plug Drive bays

Redundant Power Supplies

SMP Motherboard

A server is a multi user computer that runs networked, mission critical applications.

Page 15: Sever Monitoring

© 2010 Wipro Ltd - Confidential 15 © 2010 Wipro Ltd - Internal & Restricted 15

Typical Server Motherboard

PCI/ PCI-X 66/100/ 133MHz, 64-

bit Slots

Gigabit Ethernet

4/8 DDR DIMM

Sockets

Ultra 320

SCSI

Ultra 320

SCSI

PCI, 32-bit /

33MHz Slots

Adaptec U320

SCSI Chip

ATI Rage Video

with 4/8MB SGRAM ATI

Rage XL /

Rage IIC

Adaptec

AIC-79xx*

South

Bridge

EMP

Primary

Secondary

BMC

Dual Xeon DP

Processor

North

Bridge

Page 16: Sever Monitoring

© 2010 Wipro Ltd - Confidential 16 © 2010 Wipro Ltd - Internal & Restricted 16

Server Architecture - Fundamentals

The Five Pillars of a Server architecture are;

Performance

Reliability

Availability

Manageability

Scalability

Page 17: Sever Monitoring

© 2010 Wipro Ltd - Confidential 17 © 2010 Wipro Ltd - Internal & Restricted 17

Performance

The ability to run applications with a reasonable response time for each of the many users.

– Processors (Speed, no of proc)

– High Bandwidth CPU-Memory Bus

– High Bandwidth I/O Bus & Controllers (SCSI,SATA and SAS)

– Memory (Capacity, Speed)

– Operating System Support

– Ethernet (10/100/1000/10000 Mbps)

Implementing Performance

Page 18: Sever Monitoring

© 2010 Wipro Ltd - Confidential 18 © 2010 Wipro Ltd - Internal & Restricted 18

Reliability

The ability to perform correctly and consistently

Implementing Reliability

Highly integrated Motherboard

Onboard Disk controller , Ethernet and VGA

Onboard Local and remote management

High integration results in high Reliability – High MTBF(Mean Time Between Failures)

ECC (Error Checking and Correction) Memory

Page 19: Sever Monitoring

© 2010 Wipro Ltd - Confidential 19 © 2010 Wipro Ltd - Internal & Restricted 19

Availability

The ability to tolerate different degrees of failure.

Implementing Availability

EMP (Emergency Management Port)

Management Software (ISC LDCM LDSM)

PHP (PCI Hot Plug) Support

Redundant Power Supply

RAID (Redundant Array of Independent Disks)

Hot Swappable Hard disk

Page 20: Sever Monitoring

© 2010 Wipro Ltd - Confidential 20 © 2010 Wipro Ltd - Internal & Restricted 20

Manageability

The feature that enables planning, monitoring and controlling under normal & abnormal conditions of work.

Implementing Manageability

ISM (Intel Server Management) – Local Management

Super Doctor III – Local Management

EMP (Emergency Management Port) – Remote Management

WAC ( Wipro Active Console)

Page 21: Sever Monitoring

© 2010 Wipro Ltd - Confidential 21 © 2010 Wipro Ltd - Internal & Restricted 21

Scalability

The ability to perform at the same level when the load is increased.

Implementing Scalability

Max Memory supported

Max PCI / PCI-X / PCI Express slots available

Max processor speed supported

Max no of drives mounting

Page 22: Sever Monitoring

22 © 2010 Wipro Ltd – Internal & Restricted 22

Essentials of Servers

Feature Technology

Performance CPU/Chipset,Memory

Reliability High Integration, ECC

Availability Fault Detection & Correction

Manageability Local & Remote Management

Scalability Headroom for Growth

Page 23: Sever Monitoring

© 2010 Wipro Ltd - Internal & Restricted 23

Platform, Technology & RAID

Page 24: Sever Monitoring

© 2010 Wipro Ltd - Confidential 24 © 2010 Wipro Ltd - Internal & Restricted 24

Technology Overview

• Processors

• Memory

• Chipset

• Networking

• RAID & HBA

Page 25: Sever Monitoring

© 2010 Wipro Ltd - Confidential 25 © 2010 Wipro Ltd - Internal & Restricted 25

Processor Platform & Technology

Page 26: Sever Monitoring

© 2010 Wipro Ltd - Confidential 26 © 2010 Wipro Ltd - Internal & Restricted 26

Classification

Page 27: Sever Monitoring

© 2010 Wipro Ltd - Confidential 27 © 2010 Wipro Ltd - Internal & Restricted 27

UP / DP / MP

Page 28: Sever Monitoring

© 2010 Wipro Ltd - Confidential 28 © 2010 Wipro Ltd - Internal & Restricted 28

EM64T

Page 29: Sever Monitoring

© 2010 Wipro Ltd - Confidential 29 © 2010 Wipro Ltd - Internal & Restricted 29

HT – Hyper Threading

Page 30: Sever Monitoring

© 2010 Wipro Ltd - Confidential 30 © 2010 Wipro Ltd - Internal & Restricted 30

Dual Core Technology

Page 31: Sever Monitoring

© 2010 Wipro Ltd - Confidential 31 © 2010 Wipro Ltd - Internal & Restricted 31

Dual Core with Hyper Threading

Page 32: Sever Monitoring

© 2010 Wipro Ltd - Confidential 32 © 2010 Wipro Ltd - Internal & Restricted 32

Quad Core Technology

Page 33: Sever Monitoring

© 2010 Wipro Ltd - Confidential 33 © 2010 Wipro Ltd - Internal & Restricted 33

FSB – Front Side Bus

Page 34: Sever Monitoring

© 2010 Wipro Ltd - Confidential 34 © 2010 Wipro Ltd - Internal & Restricted 34

AMD Platform - Classification

Page 35: Sever Monitoring

© 2010 Wipro Ltd - Confidential 35 © 2010 Wipro Ltd - Internal & Restricted 35

AMD – Integrated Memory Controller

Page 36: Sever Monitoring

© 2010 Wipro Ltd - Confidential 36 © 2010 Wipro Ltd - Internal & Restricted 36

AMD – Features

Page 37: Sever Monitoring

© 2010 Wipro Ltd - Confidential 37 © 2010 Wipro Ltd - Internal & Restricted 37

AMD – Direct Connect Architecture

Page 38: Sever Monitoring

© 2010 Wipro Ltd - Confidential 38 © 2010 Wipro Ltd - Internal & Restricted 38

Intel VT – Virtualization Technology

Page 39: Sever Monitoring

© 2010 Wipro Ltd - Confidential 39 © 2010 Wipro Ltd - Internal & Restricted 39

Intel Processor Feature - XD

Page 40: Sever Monitoring

© 2010 Wipro Ltd - Confidential 40 © 2010 Wipro Ltd - Internal & Restricted 40

Intel / AMD – Common Features

Page 41: Sever Monitoring

© 2010 Wipro Ltd - Confidential 41 © 2010 Wipro Ltd - Internal & Restricted 41

Intel Processor Number Series

Page 42: Sever Monitoring

© 2010 Wipro Ltd - Confidential 42 © 2010 Wipro Ltd - Internal & Restricted 42

AMD Processor Number Series

Page 43: Sever Monitoring

© 2010 Wipro Ltd - Confidential 43 © 2010 Wipro Ltd - Internal & Restricted 43

Utilities

Page 44: Sever Monitoring

© 2010 Wipro Ltd – Internal & Restricted 44

Memory Platform & Technology

Page 45: Sever Monitoring

© 2009 Wipro Ltd - Confidential 45 © 2010 Wipro Ltd – Internal & Restricted 45

DDR - 1

Page 46: Sever Monitoring

© 2009 Wipro Ltd - Confidential 46 © 2010 Wipro Ltd – Internal & Restricted 46

DDR –II & Differentiation

Page 47: Sever Monitoring

© 2009 Wipro Ltd - Confidential 47 © 2010 Wipro Ltd – Internal & Restricted 47

Comparison

Page 48: Sever Monitoring

© 2009 Wipro Ltd - Confidential 48 © 2010 Wipro Ltd – Internal & Restricted 48

FBDIMM

Page 49: Sever Monitoring

© 2009 Wipro Ltd - Confidential 49 © 2010 Wipro Ltd – Internal & Restricted 49

FBDIMM – Definition

Page 50: Sever Monitoring

© 2009 Wipro Ltd - Confidential 50 © 2010 Wipro Ltd – Internal & Restricted 50

FBDIMM – AMB Technology

Page 51: Sever Monitoring

© 2009 Wipro Ltd - Confidential 51 © 2010 Wipro Ltd – Internal & Restricted 51

FBDIMM – Benefits

Page 52: Sever Monitoring

© 2009 Wipro Ltd - Confidential 52 © 2010 Wipro Ltd – Internal & Restricted 52

DDR – View

Page 53: Sever Monitoring

© 2009 Wipro Ltd - Confidential 53 © 2010 Wipro Ltd – Internal & Restricted 53

DDR 3 – Specifications

Page 54: Sever Monitoring

© 2009 Wipro Ltd - Confidential 54 © 2010 Wipro Ltd – Internal & Restricted 54

DDR 3 – A Comparison

Page 55: Sever Monitoring

© 2010 Wipro Ltd – Internal & Restricted 55

DISK SUB SYSTEM

Page 56: Sever Monitoring

© 2009 Wipro Ltd - Confidential 56 © 2010 Wipro Ltd – Internal & Restricted 56

SCSI

What is SCSI ?

Advantages of SCSI ?

Major Components of SCSI

Various SCSI Standards

SCSI Connectors / Interface

SAF-TE

SMART

Page 57: Sever Monitoring

© 2009 Wipro Ltd - Confidential 57 © 2010 Wipro Ltd – Internal & Restricted 57

Small Computer System Interface

SCSI : Small Computer System Interface

Pronounced scuzzy

Allows Multiple peripheral devices connection

Accessed concurrently, simultaneously, or in sequence, as

needed.

Page 58: Sever Monitoring

© 2009 Wipro Ltd - Confidential 58 © 2010 Wipro Ltd – Internal & Restricted 58

What do you gain with SCSI?

Expensive but good.

More versatile Systems.

Free access to use many and good units

It is easy to add Accessories / Drives.

Gives a better performance.

Page 59: Sever Monitoring

© 2009 Wipro Ltd - Confidential 59 © 2010 Wipro Ltd – Internal & Restricted 59

Major Components of SCSI

1. Host adapter card containing one controller and a terminator

2. SCSI Bus (also called a SCSI Cable)

3. SCSI compatible peripheral devices (disks, CD-ROM, tapes, etc.)

4. A terminator representing the end of the SCSI bus

Page 60: Sever Monitoring

© 2009 Wipro Ltd - Confidential 60 © 2010 Wipro Ltd – Internal & Restricted 60

Major Components of SCSI

Page 61: Sever Monitoring

© 2009 Wipro Ltd - Confidential 61 © 2010 Wipro Ltd – Internal & Restricted 61

SCSI is intelligent

SCSI is remarkable in having an intelligent protocol, which assures maximum

utilization of the data transfer. The basis of SCSI is a set of commands Each

individual device holds its own controller, which interprets these commands.

Page 62: Sever Monitoring

© 2009 Wipro Ltd - Confidential 62 © 2010 Wipro Ltd – Internal & Restricted 62

SCSI Specifications

Wide Ultra SCSI utilizes a 16-bit bus and can support data transfer rates of up to 40

MB/second. It supports up to 16 agents.

Wide Ultra2 SCSI is a 16-bit bus and can support data transfer rates of up to 80 MB/second. It

can support up to 16 agents – LVD (Low Voltage Differential)

Ultra 160 SCSI is a 16-bit bus and can support data transfer rates of up to 160 MB/second. It

can support up to 16 agents – LVD (Low Voltage Differential)/ SE (Single Ended)

Ultra 320 SCSI is the latest Technology of SCSI Data transfer and it supports data transfer rates

of upto 320 MB/Second

Page 63: Sever Monitoring

© 2009 Wipro Ltd - Confidential 63 © 2010 Wipro Ltd – Internal & Restricted 63

50pin narrow connector ( 8bits wide data bus)

68pin wide connector (16bits wide data bus)

Types of SCSI Connectors

Page 64: Sever Monitoring

© 2009 Wipro Ltd - Confidential 64 © 2010 Wipro Ltd – Internal & Restricted 64

Types of SCSI Connectors

68pin VHDCI connector (external 16bits wide data bus))

80pin connector

(internal 16bits wide data bus).

80pin connectors are mainly for hot swappable feature

Page 65: Sever Monitoring

© 2009 Wipro Ltd - Confidential 65 © 2010 Wipro Ltd – Internal & Restricted 65

SATA

Page 66: Sever Monitoring

© 2009 Wipro Ltd - Confidential 66 © 2010 Wipro Ltd – Internal & Restricted 66

SAS

Page 67: Sever Monitoring

© 2009 Wipro Ltd - Confidential 67 © 2010 Wipro Ltd – Internal & Restricted 67

SAS

A typical Serial Attached SCSI system would consist of the following basic components: An Initiator is a device that originates device service and task management requests to be processed by a target device and receives responses for the same requests from other target devices. Initiators may be provided as an on-board component on the motherboard (as is the case with many server-oriented motherboards) or as an add-on host bus adapter. A Target is a device containing logical units and target ports that receives device service and task management requests for processing and sends responses for the same requests to initiator devices. A target device could be a hard disk or a disk array system. A Service Delivery Subsystem is the part of an I/O system that transmits information between an initiator and a target. Typically cables connecting an initiator and target with or without expanders constitute a service delivery subsystem. Expanders are devices that are part of a service delivery subsystem and facilitate communication between SAS devices. It facilitates connection of multiple SAS End devices to a single initiator port.

Page 68: Sever Monitoring

© 2009 Wipro Ltd - Confidential 68 © 2010 Wipro Ltd – Internal & Restricted 68

SAS

SAS and SATA Connector Compatibility

Page 69: Sever Monitoring

© 2009 Wipro Ltd - Confidential 69 © 2010 Wipro Ltd – Internal & Restricted 69

Solid-state drive

Page 70: Sever Monitoring

© 2009 Wipro Ltd - Confidential 70 © 2010 Wipro Ltd – Internal & Restricted 70

A solid-state drive (SSD) is a data storage device that uses

solid-state memory to store persistent data. Unlike flash-

based memory

cards and USB flash drives, an SSD emulates a hard disk drive

interface, thus easily replacing it in most applications. An SSD

using SRAM or DRAM (instead of flash memory)

is often called a RAM-drive.

Solid-state drive

Page 71: Sever Monitoring

© 2009 Wipro Ltd - Confidential 71 © 2010 Wipro Ltd – Internal & Restricted 71

Solid-state drive features

An SSD is commonly composed of either DRAM volatile memory or

NAND flash nonvolatile memory.

They are often packaged in standard disk drive form factors (1.8-inch,

2.5-inch, and 3.5-inch).

Page 72: Sever Monitoring

© 2009 Wipro Ltd - Confidential 72 © 2010 Wipro Ltd – Internal & Restricted 72

Solid-state drive advantages

Faster start-up, as no spin-up is required (RAM & Flash).

Typically, fast random access for reading, as there is no read/write head to move

(RAM & Flash).

· Extremely low read latency times, as SSD seek-times are orders of magnitude

lower than the best current hard disk drives. (RAM) In applications where hard

disk seeks are the limiting factor, this results in faster boot and application launch

times (RAM &Flash).

· Extremely fast write (RAM, nearly the same for best modern flash).

· No noise: a lack of moving parts makes SSDs completely silent, unless, as in the

case of some high-end and high-capacity models, they have cooling fans attached

(RAM & Flash).

Page 73: Sever Monitoring

© 2009 Wipro Ltd - Confidential 73 © 2010 Wipro Ltd – Internal & Restricted 73

Difference between SSD & HDD

Page 74: Sever Monitoring

© 2009 Wipro Ltd - Confidential 74 © 2010 Wipro Ltd – Internal & Restricted 74

HBA Comparison

Page 75: Sever Monitoring

© 2010 Wipro Ltd - Internal & Restricted 75

System I/O

Page 76: Sever Monitoring

© 2010 Wipro Ltd - Confidential 76 © 2010 Wipro Ltd - Internal & Restricted 76

PCI Overview

Page 77: Sever Monitoring

© 2010 Wipro Ltd - Confidential 77 © 2010 Wipro Ltd - Internal & Restricted 77

PCI - X Overview

Page 78: Sever Monitoring

© 2010 Wipro Ltd - Confidential 78 © 2010 Wipro Ltd - Internal & Restricted 78

PCI -X View

Page 79: Sever Monitoring

© 2010 Wipro Ltd - Confidential 79 © 2010 Wipro Ltd - Internal & Restricted 79

PCI Keying

Page 80: Sever Monitoring

© 2010 Wipro Ltd - Confidential 80 © 2010 Wipro Ltd - Internal & Restricted 80

PCI Express (PCI-e)

Page 81: Sever Monitoring

© 2010 Wipro Ltd - Confidential 81 © 2010 Wipro Ltd - Internal & Restricted 81

PCI-e Interconnect

Page 82: Sever Monitoring

© 2010 Wipro Ltd - Confidential 82 © 2010 Wipro Ltd - Internal & Restricted 82

PCI Express - View

Page 83: Sever Monitoring

© 2010 Wipro Ltd - Confidential 83 © 2010 Wipro Ltd - Internal & Restricted 83

Comparison Table

Page 84: Sever Monitoring

© 2010 Wipro Ltd - Confidential 84 © 2010 Wipro Ltd - Internal & Restricted 84

Server Platform Chipset

Page 85: Sever Monitoring

© 2010 Wipro Ltd - Confidential 85 © 2010 Wipro Ltd - Internal & Restricted 85

Definition & Example

A set of chips that provides the interfaces between all of the PC's subsystems. It provides the buses and electronics to allow the CPU, memory and input/output devices to interact. Most Intel chipsets, which are contained on two to four chips, also include built-in EIDE support. In the past, Intel used the name "Triton" for its chipsets. It also used the name PCI set for PCI-based chipsets. Desktop Chipset:810/845/845GV/865/910/945G/Q35 Server Chipset Family:3000/5000/7000

Page 86: Sever Monitoring

© 2010 Wipro Ltd - Confidential 86 © 2010 Wipro Ltd - Internal & Restricted 86

Chipset Comparison Logical Diagram

3000 Family 5000 Family 7000 Family

Page 87: Sever Monitoring

© 2010 Wipro Ltd – Internal & Restricted 87

Redundant Array of Independent Disks

Page 88: Sever Monitoring

© 2009 Wipro Ltd - Confidential 88 © 2010 Wipro Ltd – Internal & Restricted 88

Raid Types

• Host Raid / Firmware Raid

•SATA

•SAS

•SCSI

• ROMB

• ZCR

• PCI / PCI-X / PCI –E Raid

• How to

• Best Practice

Page 89: Sever Monitoring

© 2009 Wipro Ltd - Confidential 89 © 2010 Wipro Ltd – Internal & Restricted 89

RAID 1

Page 90: Sever Monitoring

© 2009 Wipro Ltd - Confidential 90 © 2010 Wipro Ltd – Internal & Restricted 90

RAID 1

Page 91: Sever Monitoring

© 2009 Wipro Ltd - Confidential 91 © 2010 Wipro Ltd – Internal & Restricted 91

RAID 0

Page 92: Sever Monitoring

© 2009 Wipro Ltd - Confidential 92 © 2010 Wipro Ltd – Internal & Restricted 92

RAID 0

Page 93: Sever Monitoring

© 2009 Wipro Ltd - Confidential 93 © 2010 Wipro Ltd – Internal & Restricted 93

RAID 5

Page 94: Sever Monitoring

© 2009 Wipro Ltd - Confidential 94 © 2010 Wipro Ltd – Internal & Restricted 94

RAID 5

Page 95: Sever Monitoring

© 2009 Wipro Ltd - Confidential 95 © 2010 Wipro Ltd – Internal & Restricted 95

RAID 10

Page 96: Sever Monitoring

© 2009 Wipro Ltd - Confidential 96 © 2010 Wipro Ltd – Internal & Restricted 96

RAID 10

Page 97: Sever Monitoring

© 2009 Wipro Ltd - Confidential 97 © 2010 Wipro Ltd – Internal & Restricted 97

RAID 6

Page 98: Sever Monitoring

© 2009 Wipro Ltd - Confidential 98 © 2010 Wipro Ltd – Internal & Restricted 98

RAID 6

Page 99: Sever Monitoring

© 2009 Wipro Ltd - Confidential 99 © 2010 Wipro Ltd – Internal & Restricted 99

RAID LEVELS COMPARISON

Page 100: Sever Monitoring

© 2010 Wipro Ltd – Internal & Restricted 100

Wipro Netpower Servers

Page 101: Sever Monitoring

101 © 2010 Wipro Ltd – Internal & Restricted 101

Wipro Nomenclature

Net Power - Z 2 5 XX

Proc Type No. of Procs Form Factor

Z = Xeon 1 = Uni Proc 1 = 1U

O = Opteron 2 = Dual Proc 2 = 2U

I = Itanium 4 = Multi Proc 4 = 4U

5 = Tower

6 = Blades

Page 102: Sever Monitoring

102 © 2010 Wipro Ltd – Internal & Restricted 102

Wipro Models

Uni-Processor

Z1502

Z1505

O1101

Dual Processor

Z2501R

Z2503R

Z2108

Z2204

Z2601

O2501

O2502

Quad Processor

Z4402

O4401

O4402

Page 103: Sever Monitoring

103 © 2010 Wipro Ltd – Internal & Restricted 103

NP Z1502(Entry Level)

Page 104: Sever Monitoring

104 © 2010 Wipro Ltd – Internal & Restricted 104

NP Z1502

Page 105: Sever Monitoring

105 © 2010 Wipro Ltd – Internal & Restricted 105

NP Z1502

Page 106: Sever Monitoring

106 © 2010 Wipro Ltd – Internal & Restricted 106

NP Z1502

Page 107: Sever Monitoring

107 © 2010 Wipro Ltd – Internal & Restricted 107

NP Z2102

Page 108: Sever Monitoring

108 © 2010 Wipro Ltd – Internal & Restricted 108

NP Z2102

Page 109: Sever Monitoring

109 © 2010 Wipro Ltd – Internal & Restricted 109

NP Z2102

Page 110: Sever Monitoring

110 © 2010 Wipro Ltd – Internal & Restricted 110

NP Z2501

Page 111: Sever Monitoring

111 © 2010 Wipro Ltd – Internal & Restricted 111

NP Z2501

Page 112: Sever Monitoring

112 © 2010 Wipro Ltd – Internal & Restricted 112

NP Z2503

Page 113: Sever Monitoring

113 © 2010 Wipro Ltd – Internal & Restricted 113

NP Z2503

Page 114: Sever Monitoring

114 © 2010 Wipro Ltd – Internal & Restricted 114

NP Z2502

Page 115: Sever Monitoring

115 © 2010 Wipro Ltd – Internal & Restricted 115

NP Z2502

Page 116: Sever Monitoring

116 © 2010 Wipro Ltd – Internal & Restricted 116

NP Z2502

Page 117: Sever Monitoring

117 © 2010 Wipro Ltd – Internal & Restricted 117

NP Z2502

Page 118: Sever Monitoring

118 © 2010 Wipro Ltd – Internal & Restricted 118

Wipro 4 Way servers – Z4402

Page 119: Sever Monitoring

119 © 2010 Wipro Ltd – Internal & Restricted 119

Wipro Blade Server - WNB 1400

Blade Server Chassis

Compute Blades

Blade Management

Module

Fiber Channel Switch

Module

Ethernet Switch Module

Fiber Expansion Cards

Ethernet Expansion Card

Deployment Manager

Page 120: Sever Monitoring

120 © 2010 Wipro Ltd – Internal & Restricted 120

NetPower Z1505: Uni Processor Server

CPU

– Intel® Quad Core 2.4 GHz (X3220) with 8 MB &

1066 MHz Motherboard

– Intel® 3200 Board Memory: 2 x 2GB DDR2 667 MHz Unbuff ECC

HDD

– 2 x 146GB 15K RPM 3.5” SAS HDD

– 4 Hot Swap HDD cage RAID Card

– 4 Port SAS Controller with Host RAID 0 & 1 620 Watts (1+1) Redundant Power Supply

Page 121: Sever Monitoring

121 © 2010 Wipro Ltd – Internal & Restricted 121

NetPower Z2501R: Dual Processor Server

CPU

– Intel® Quad Core 2.33 GHz (E5410) with 12 MB

& 1333 MHz Motherboard

– Intel® 5000V Board Memory: 4 x 2GB DDR2 667 MHz Reg ECC

HDD

– 4 x 146GB/300GB 15K RPM 3.5” SAS HDD

– 4 x Hot swap HDD Cage RAID Cards

– 8 Port SAS RAID Controller with 512 MB cache 620 Watts (1+1) Redundant Power Supply

Page 122: Sever Monitoring

122 © 2010 Wipro Ltd – Internal & Restricted 122

NetPower Z2215: Dual Processor Server

NetPower Z2215: Dual Processor Server

CPU

– Intel® Quad Core 3.0 GHz (E5472) with 12 MB &

1600 MHz Chipset

– Intel® 5400 Chipset Memory: 4 x 4GB DDR2 667 MHz Reg ECC

HDD

– 5 x300G 15K RPM 3.5” SAS HDD RAID Cards

– 8 Port SAS RAID Controller with 512 MB cache

Page 123: Sever Monitoring

123 © 2010 Wipro Ltd – Internal & Restricted 123

NetBlade 1600

Chassis

– (2+2) 1000 Watts Redundant Power Supply

– 5 x 300 GB 2.5‟‟ 10K RPM

– 1 x Storage Controller (Optional Redundant

Controller)

– 1 x Ethernet Switch ( Optional Redundant Switch) Compute Blade Z2601

CPU

– Intel® Quad Core 2.33 GHz (E5410) with 12 MB

& 1333 MHz Motherboard

– Intel® 5000P board Memory: 4 x 4 GB DDR2 667 MHz Reg ECC

Page 124: Sever Monitoring

124 © 2010 Wipro Ltd – Internal & Restricted 124

CPU

Intel® Quad Core 2.66 GHz (X3450) with 8 MB Motherboard

Intel® 3420 Board

Memory: 2 x 2GB DDR3 1066 MHz Unreg ECC

HDD

2 x 146GB 15K RPM 3.5” SAS HDD

4 Hot Swap HDD cage

RAID Card

4 Port SAS Controller with Host RAID 0 & 1

620 Watts (1+1) Redundant Power Supply

NetPower Z1530: Nehalem-Uni Processor Server

Page 125: Sever Monitoring

125 © 2010 Wipro Ltd – Internal & Restricted 125

CPU

Intel® Quad Core 2.0 GHz (E5504) with 4 MB cache & 4.8 GT/sec QPI

Intel® Quad Core 2.4GHz (E5530) with 8 MB cache & 5.86 GT/sec QPI

Motherboard

Intel® 5500 Board

Memory: 4 x 2GB DDR3 1066 MHz UnReg ECC

HDD

2 x 146GB 15K RPM 3.5” SAS HDD

4 Hot Swap HDD cage

RAID Card

4 Port SAS Controller with Host RAID 0 & 1

700 Watts Single Power Supply

NetPower Z2531: Nehalem-Dual Processor Server

Page 126: Sever Monitoring

126 © 2010 Wipro Ltd – Internal & Restricted 126

CPU

Intel® Quad Core 2.0 GHz (E5504) with 4 MB cache & 4.8 GT/sec QPI

Intel® Quad Core 2.4GHz (E5530) with 8 MB cache & 5.86 GT/sec QPI

Chipset

Intel® 5520 Chipset

Memory: 4 x 4GB DDR3 1066 MHz Reg ECC

HDD

5 x300G 15K RPM 3.5” SAS HDD

RAID Cards

8 Port SAS RAID Controller with 512 MB cache

NetPower Z2243: Nehalem based Dual Processor Server

Page 127: Sever Monitoring

127 © 2010 Wipro Ltd – Internal & Restricted 127

NetPower Models based on Intel 5500 Chipset

Page 128: Sever Monitoring

128 © 2010 Wipro Ltd – Internal & Restricted 128

Wipro NetPower Z2531

Processor Support Intel® Xeon® Processor 5500 series-Dual CPU capable

Chipset Intel®5500 chipset

Memory Capacity 8 Un-buffered/Registered DIMM slots-32 GB Memory Exp. Native DDR-3 at 800/1066/1333MHz (4+4 Configuration)

Channel-Independent Mode/ Channel-Mirroring Mode

Demand Scrubbing Mode/ Patrol Scrubbing Mode

Disk Controller 6 SATA/SATA-II ports (3Gbps) with Intel® Embedded Server RAID Technology (0,1,10) with optional RAID 5

Expansion Slots

2 half-length PCIe2 x8 slot/ 1 half-length PCIe2 x4 slot (x8 connector)

1 half-length PCIe1 x4 slot / 1 half-length PCI 32/33 5V slot

Ethernet Dual Intel® Gigabit Ethernet

Power Supply Single 700 Watts/ Redundant 750 Watts (2+1)

Management iBMC with IPMI 2.0 support for remote management Intel® System Management Software 2.0 with Intel RMM3 upgrade option

Page 129: Sever Monitoring

129 © 2010 Wipro Ltd – Internal & Restricted 129

Wipro NetPower Z2541

Processor Support Intel® Xeon® Processor 5500 series-Dual CPU capable

Chipset Intel®5500 chipset

Memory Capacity 6 Un-buffered/Registered DIMM slots-24 GB Memory Exp. Native DDR-3 at 800/1066/1333MHz (3+3 Configuration) Memory Mirroring Supported

Disk Controller 6 SATA/SATA-II ports (3Gbps) supporting RAID levels 0,1,10 with optional RAID 5

Expansion Slots

2 PCIe2 x8 slot/ 1 PCIe2 x4 slot

1 PCIe1 x4 slot / 2 PCI 33 MHz slot

Ethernet Dual Intel® Gigabit Ethernet

Power Supply Single 700 Watts/ Redundant 750 Watts (2+1)

Management Super Doctor III-Optional IPMI 2.0 with Dedicated LAN for Remote Management

Page 130: Sever Monitoring

130 © 2010 Wipro Ltd – Internal & Restricted 130

Wipro NetPower Z2141

Processor Support Intel® Xeon® Processor 5500 series-Dual CPU capable

Chipset Intel®5500 chipset

Memory Capacity 6Un-buffered/Registered DIMM slots-24 GB Memory Exp. Native DDR-3 at 800/1066/1333MHz (3+3 Configuration) Memory Mirroring Supported

Disk Controller 6 SATA/SATA-II ports (3Gbps) supporting RAID levels 0,1,10 with optional RAID 5

Hard Disk Drive Bays 4 x 3.5’’ Hot swap SAS/ SATA

Expansion Slots

2 Full height half-length I/O slot

Ethernet Dual Intel® Gigabit Ethernet

Power Supply Single 520 Watts High Efficiency

Management Super Doctor III-Optional IPMI 2.0 with Dedicated LAN for Remote Management

1U Rack Mount

Page 131: Sever Monitoring

131 © 2010 Wipro Ltd – Internal & Restricted 131

Wipro NetPower Z2542

Processor Support Intel® Xeon® Processor 5500 series-Dual CPU capable

Chipset Intel®5500 chipset

Memory Capacity 6 Un-buffered/Registered DIMM slots-24 GB Memory Exp. Native DDR-3 at 800/1066/1333MHz (3+3 Configuration) Memory Mirroring Supported

Disk Controller LSI 1068E 8 Port SAS Controller supporting RAID levels 0,1,10 with optional RAID 5

Expansion Slots

2 PCIe2 x8 slot/ 1 PCIe2 x4 slot

1 PCIe1 x4 slot / 2 PCI 33 MHz slot

Ethernet Dual Intel® Gigabit Ethernet

Power Supply Single 700 Watts/ Redundant 750 Watts (2+1)

Management Super Doctor III –Optional IPMI 2.0 with Dedicated LAN for Remote Management

Page 132: Sever Monitoring

132 © 2010 Wipro Ltd – Internal & Restricted 132

NetPower Models based on Intel 5520 Chipset

Page 133: Sever Monitoring

133 © 2010 Wipro Ltd – Internal & Restricted 133

Wipro NetPower Z2533

Processor Support Intel® Xeon® Processor 5500 series-Dual CPU capable

Chipset Intel®5520 chipset

Memory Capacity 12 Un-buffered/Registered DIMM slots-96 GB Memory Exp.

Six Channel Native DDR-3 at 800/1066/1333MHz Channel-Independent Mode/ Channel-Mirroring Mode Demand Scrubbing Mode/ Patrol Scrubbing Mode

Disk Controller 6 SATA/SATA-II ports (3Gbps) with Intel® Embedded Server RAID Technology (0,1,10) with optional RAID 5

Expansion Slots

1 PCIe2 x8 slot (x16 mechanical)/ 3 PCIe2 x8 slot (x8 mechanical)

1 PCIe x4 slot (x8 mechanical shared w/optional SAS module)/1 PCI 32/33 5V slot

Ethernet Dual Intel® Gigabit Ethernet with Intel® Virtualization Technology

Power Supply Single 700 Watts/ Redundant 750 Watts (2+1)

Management iBMC with IPMI 2.0 support for remote management Intel® System Management Software 2.0 with Intel RMM3 upgrade option

Page 134: Sever Monitoring

134 © 2010 Wipro Ltd – Internal & Restricted 134

Wipro NetPower Z2543

Processor Support Intel® Xeon® Processor 5500 series-Dual CPU capable

Chipset Intel®5520 chipset

Memory Capacity 12 Un-buffered/Registered DIMM slots-96 GB Memory Exp. Native DDR-3 at 800/1066/1333MHz-Memory Mirroring Supported

Disk Controller 6 SATA/SATA-II ports (3Gbps) supporting RAID levels 0,1,10 with optional RAID 5

Expansion Slots

2 PCIe2 x16 slot/ 2 PCIe2 x8 slot

1 PCIe1 x4 slot / 2 PCI 33 MHz slot

Ethernet Dual Intel® Gigabit Ethernet supporting Intel® I/OAT3/ VMDq support for better Virtualization support

Power Supply Single 700 Watts/ Redundant 750 Watts (2+1)

Management Super Doctor III-Optional IPMI 2.0 with Dedicated LAN for Remote Management

Page 135: Sever Monitoring

135 © 2010 Wipro Ltd – Internal & Restricted 135

Wipro NetPower Z2544

Processor Support Intel® Xeon® Processor 5500 series-Dual CPU capable

Chipset Intel®5520 chipset

Memory Capacity 12 Un-buffered/Registered DIMM slots-96 GB Memory Exp. Native DDR-3 at 800/1066/1333MHz-Memory Mirroring Supported

Disk Controller LSI 1068E 8 Port SAS Controller supporting RAID levels 0,1,10 with optional RAID 5

Expansion Slots

3 PCIe2 x8 slot/

1 PCIe1 x4 slot / 2 PCI 33 MHz slot

Ethernet Dual Intel® Gigabit Ethernet supporting Intel® I/OAT3/ VMDq support for better Virtualization support

Power Supply Single 700 Watts/ Redundant 750 Watts (2+1)

Management Super Doctor III-Optional IPMI 2.0 with Dedicated LAN for Remote Management

Page 136: Sever Monitoring

136 © 2010 Wipro Ltd – Internal & Restricted 136

Wipro NetPower Z2135

Processor Support Intel® Xeon® Processor 5500 series-Dual CPU capable

Chipset Intel®5520 chipset

Memory Capacity 12 Un-buffered/Registered DIMM slots-96 GB Memory Exp.

Six Channel Native DDR-3 at 800/1066/1333MHz

Disk Controller 6 SATA/SATA-II ports (3Gbps) with Intel® Embedded Server RAID Technology (0,1,10)-Optional SAS Disk Drives

Hard Disk Drive Bays 6 Nos. of 2.5’’ optional expandability to 8 Nos. of Disk drive Bays

Expansion Slots

1 Full Height PCIe2 x16 slot/ 1 I/O Exp Module PCIex8

Ethernet Dual Intel® Gigabit Ethernet with Intel® Virtualization Technology

Power Supply Single 650 Watts/ Optional-Redundant 650 Watts (1+1)

Management iBMC with IPMI 2.0 support for remote management Intel® System Management Software 2.0 with Intel RMM3 upgrade option

1U Rack Mount

Page 137: Sever Monitoring

137 © 2010 Wipro Ltd – Internal & Restricted 137

Wipro NetPower Z2143

Processor Support Intel® Xeon® Processor 5500 series-Dual CPU capable

Chipset Intel®5520 chipset

Memory Capacity 12 Un-buffered/Registered DIMM slots-96 GB Memory Exp.

Six Channel Native DDR-3 at 800/1066/1333MHz

Disk Controller 6 SATA/SATA-II ports (3Gbps) supporting RAID levels 0,1,10 with optional RAID 5 –SAS Disks Optional

Hard Disk Drive Bays Options of 4 x 3.5’’& 8 x 2.5’’ Hot swap SAS Disk drive Bays

Expansion Slots

1 Full Height & Full Length

Ethernet Dual Intel® Gigabit Ethernet supporting Intel® I/OAT3/ VMDq support for better Virtualization support

Power Supply Options of Single 560 Watts or Redundant 650 Watts (1+1)

Management Super Doctor III-Optional IPMI 2.0 with Dedicated LAN for Remote Management

1U-4 x 3.5’’SAS & Single 560 Watts

1U-8 x 2.5’’SAS & RPS 650 Watts

Page 138: Sever Monitoring

138 © 2010 Wipro Ltd – Internal & Restricted 138

Wipro NetPower Z2235

Processor Support Intel® Xeon® Processor 5500 series-Dual CPU capable

Chipset Intel®5520 chipset

Memory Capacity 12 Un-buffered/Registered DIMM slots-96 GB Memory Exp.

Six Channel Native DDR-3 at 800/1066/1333MHz

Disk Controller Active Midplane 2 Board with SAS Controller-Optional HW RAID

Hard Disk Drive Bays 8 Nos. of 2.5’’ options of fixed 2.5’’ HDDs or SATA Tape Drive

Expansion Slots

One full height+low profile PCI Express* 2.0 riser card

(up to 5 PCIe 2.0 x8 slots)

Ethernet Dual Intel® Gigabit Ethernet with Intel® Virtualization Technology

Power Supply Single 750 Watts/ Optional-Redundant 750 Watts (1+1)

Management iBMC with IPMI 2.0 support for remote management Intel® System Management Software 2.0 with Intel RMM3 upgrade option

2U Rack Mount

Page 139: Sever Monitoring

139 © 2010 Wipro Ltd – Internal & Restricted 139

Wipro NetPower Z2243

Processor Support Intel® Xeon® Processor 5500 series-Dual CPU capable

Chipset Intel®5520 chipset

Memory Capacity 12 Un-buffered/Registered DIMM slots-96 GB Memory Exp.

Six Channel Native DDR-3 at 800/1066/1333MHz

Disk Controller 6 SATA/SATA-II ports (3Gbps) supporting RAID levels 0,1,10 with optional RAID 5 –SAS Disks Optional

Hard Disk Drive Bays 8 x 3.5’’ Hot swap SAS Disk drive Bays

Expansion Slots

2 PCIe2 x16 slot/ 2 PCIe2 x8 slot/ 1 PCIe1 x4 slot / 2 PCI 33 MHz slot

Ethernet Dual Intel® Gigabit Ethernet supporting Intel® I/OAT3/ VMDq support for better Virtualization support

Power Supply Options of Single 560 Watts or Redundant 720 Watts (1+1)

Management Super Doctor III-Optional IPMI 2.0 with Dedicated LAN for Remote Management

2U-8 x 3.5’’SAS & Single 560 Watts

2U-8 x 3.5’’SAS & RPS 720 Watts

Page 140: Sever Monitoring

140 © 2010 Wipro Ltd – Internal & Restricted 140

NetPower based on 5500 Chipset

Tower Z2501R Z2531

Tower

Z2502 Z2541

1U Rack Z2118 Z2141

Tower

N.A Z2542

NetPower based on 5520 Chipset

Tower

Z2511R Z2533/

Z2543

Tower

Z2503/

Z2504

Z2544

1U Rack

Z2108 Z2135/

Z2143

2 U Rack Z2204 Z2235/

Z2243

Summary

Page 141: Sever Monitoring

141 © 2010 Wipro Ltd – Internal & Restricted 141

Please refer below link for more Wipro Net power product details

http://www.wipro.in/Products

Page 142: Sever Monitoring

© 2010 Wipro Ltd – Internal & Restricted 142

IBM Servers

Page 143: Sever Monitoring

© 2009 Wipro Ltd - Confidential 143 © 2010 Wipro Ltd – Internal & Restricted 143

Agenda

IBM Server Overview

Main Components- ServeRaid

Installing IBM Servers

Troubleshooting IBM Servers

Updating Drivers & Firmware Codes

Support Links

Before you Escalate

Standard Testing Procedure

Page 144: Sever Monitoring

© 2009 Wipro Ltd - Confidential 144 © 2010 Wipro Ltd – Internal & Restricted 144

IBM Server Overview

IBM xSeries/SystemX continues to leverage decades of experience in designing, building, and supporting servers to provide the most innovative industry standard servers in the market today. Starting with our x-Architecture Blueprint we delivered innovations like LightPath Diagnostics, Extended PFA, Integrated Service Processor, Software Rejuvenation, etc…

Page 145: Sever Monitoring

© 2009 Wipro Ltd - Confidential 145 © 2010 Wipro Ltd – Internal & Restricted 145

IBM Server Overview

Page 146: Sever Monitoring

© 2009 Wipro Ltd - Confidential 146 © 2010 Wipro Ltd – Internal & Restricted 146

Major Components- ServeRaid

ServeRaid is IBM nomenclature for IBM Raid Controllers. There are different types of ServeRaid controllers available which includes, Host Raid, ZCR, SCSI, SATA/SAS.

Below is table of commonly used ServeRaid models and its connection type for reference.

4L 4Lx 4M 4Mx 4H 5i 6M 6i/6i+ 7t 7e 7k 8e 8i 8k-l 8k

SCSI SCSI SCSI SCSI SCSI SCSI SCSI SCSI SATA SCSISATA

SCSI SAS SATA

SAS SATA

SAS SATA

SAS SATA

MR10M MR10k MR10i MR10il MR10is MR10ie BR10i BR10il M1015 M5014

SAS SATA

SAS SAS SATA

SAS SATA

SAS SATA

SAS SAS SATA

SAS SATA

SAS SATA

SAS SATA

For full range of ServeRaid controller & its compatibility with picture can be found on the link given below. It also consists full technical details as supported raid level, Voltage, Bus etc.

http://www.redbooks.ibm.com/redbooks.nsf/RedbookAbstracts/tips0054.html?Open

Page 147: Sever Monitoring

© 2009 Wipro Ltd - Confidential 147 © 2010 Wipro Ltd – Internal & Restricted 147

Installing IBM Servers

IBM Server Guide IBM Server Guide is a tool that simplifies the process of installing and configuring IBM System x and Blade Center servers. Server Guide goes beyond mere hardware configuration by assisting with the automated installation of Windows server operating systems, device drivers and other system components, with minimal user intervention. The goal of Server Guide is to simplify and shorten installation. The built-in intelligence of Server Guide recognizes machine types and models as well as Serve RAID adapters and other hardware criteria. Based on the gathered hardware information, Server Guide offers installation and configuration choices tailored to your system. To Use it only we need to boot with server guide CD and follow the instruction. IBM Server Guide Can Be downloaded from IBM site. Support link has been given in last slides of this training module. Note: Installation from Server Guide CD will erase all existing data on the server, should not be used if required to format only one partition on raid subsystem.

Page 148: Sever Monitoring

© 2009 Wipro Ltd - Confidential 148 © 2010 Wipro Ltd – Internal & Restricted 148

Troubleshooting IBM servers

Standard Methods of Troubleshooting IBM Servers

• POST error messages and error logs which can be viewed using DSA or on system startup.

• System error LED and Light Path diagnostics

• F2 Diagnostics/Enhanced Diagnostic CD

•Diagnostic programs error messages – DSA

We can use BMC/ISMP/IPMI/RSA logs to analyze problem with the server hardware. All these logs can be collected through DSA on condition that Management controller (BMC/ISMP/IPMI/RSA etc.) is properly installed/updated on the system OS while trying to collect DSA logs on top of OS.

Page 149: Sever Monitoring

© 2009 Wipro Ltd - Confidential 149 © 2010 Wipro Ltd – Internal & Restricted 149

Troubleshooting IBM servers Contd…

System error LED & Light Path Diagnostics System error LED & Light Path Diagnostics

System Error LED

Information LED

• Light Path panel is visible from the front of the unit.

This revolutionary technology helps expedite repairs and minimize downtime by quickly and clearly identifying those components that need maintenance. You are alerted to problems via an indicator light on the front of the server.

Page 150: Sever Monitoring

© 2009 Wipro Ltd - Confidential 150 © 2010 Wipro Ltd – Internal & Restricted 150

Troubleshooting IBM servers contd…

To troubleshoot hardware problems IBM has inbuilt (as a bootable CD in old systems) system utility called F2 Diagnostics. We can check system health using this tool. It includes all hardware test included in base system.

To run F2 Diagnosis follow below mentioned steps:

•Boot from Enhanced Diagnosis CD or press F2 when the message F2 for Diagnostics is displayed. •Select either Extended or Basic from the top of the screen. •From the diagnostic screen, select the test you want to run from the list and then follow all instructions.

It will show the result as passed or with some error codes. On hardware related errors troubleshoot with the troubleshooting information from the below link : http://www-947.ibm.com/systems/support/supportsite.wss/selectproduct?taskind=1&brandind=5000008&taskind=2

Page 151: Sever Monitoring

© 2009 Wipro Ltd - Confidential 151 © 2010 Wipro Ltd – Internal & Restricted 151

Troubleshooting IBM servers contd…

F2 Diagnostics Snap

Page 152: Sever Monitoring

© 2009 Wipro Ltd - Confidential 152 © 2010 Wipro Ltd – Internal & Restricted 152

Troubleshooting IBM servers contd…

Using IBM Dynamic System Analysis (DSA)

IBM Dynamic System Analysis (DSA) collects and analyzes system information to aid in diagnosing system problems. Additionally, DSA creates a merged log that allows users to easily identify cause-and-effect relationships from different log sources in the system. DSA also compares device driver and firmware on the system. DSA Portable: DSA Portable Edition runs from the command prompt on a supported system without altering any system files or system settings. It expands to temporary space on the target system, runs, and deletes all intermediate files after execution completes.

DSA Installable: DSA Installable Edition provides a permanent installation of DSA onto a system. This installation shares a similar command prompt interface with the portable edition.

DSA Bootable: DSA Bootable can be created by ISO downloaded from IBM Site to boot from the same on unavailability of OS.

Page 153: Sever Monitoring

© 2009 Wipro Ltd - Confidential 153 © 2010 Wipro Ltd – Internal & Restricted 153

Troubleshooting IBM servers contd…

Using IBM Dynamic System Analysis (DSA)

To Run DSA Follow below steps: Installable edition: Go to StartProgramsIBMDSA Portable Edition: Click on the exe file downloaded as IBM Director Portable Edition. Bootable edition: Boot from the CD. It will auto start and will ask to View/Save the logs. Save in external media (e.g. FDD, USB Stick)

After running DSA (Installable or Portable) logs will be saved in folder c:\IBM_Support\ with system serial number time e.g. 8648IBS_99BAXM1_20080930-183757.xml.gz or 8648IBS_99BAXM1_20080930-183757.zip. Logs will be saved in both .zip and .xml format. Zip folder can be extracted and opening file index.html will show logs in web format. Files with .xml extension needs to be extracted only on the systems where DSA is installed by using following command. This will also save the file in c:\IBM_Support folder with above specified file name format.

Page 154: Sever Monitoring

© 2009 Wipro Ltd - Confidential 154 © 2010 Wipro Ltd – Internal & Restricted 154

Updating IBM servers Drivers & Codes

Using IBM Update Express CD/ Manually

IBM UpdateXpress can help reduce your cost of computing by providing an effective and simple way to update device drivers, server firmware and firmware of supported options contained within the server on most of your System x and BladeCenter products. If you have purchased an IBM server, UpdateXpress is available for download at no additional charge. IBM Update Xpress is ISO downloadable and very easy to update the server with minimal user intervention. We need to boot from the CD and choose components we want to update. This CD automatically recognize server type and updates the codes accordingly. It minimizes wrong updating of codes.

Important points to be considered before updating codes: •There may be some latest updates for particular server equipments. Need to cross verify on IBM site for latest updates and update it manually. Please read readme file before updating firmware codes to ensure all prerequisites. •Ensure to install latest device drivers first before updating firmware codes on a server. Drivers also can be updated with UpdateXpress CD. •To check & download UpdateXpress compatibility and version list visit below mentioned site: http://www-304.ibm.com/systems/support/supportsite.wss/docdisplay?lndocid=SERV-XPRESS&brandind=5000008

Page 155: Sever Monitoring

© 2009 Wipro Ltd - Confidential 155 © 2010 Wipro Ltd – Internal & Restricted 155

IBM Server Support Links

IBM System x Warranty Lookup:

http://www-947.ibm.com/systems/support/supportsite.wss/warrantyform?brandind=5000008

Software & Device Drivers:

http://www-304.ibm.com/systems/support/supportsite.wss/docdisplay?lndocid=JBAR-3WTLGA&brandind=5000008

IBM DSA:

http://www-304.ibm.com/systems/support/supportsite.wss/docdisplay?lndocid=SERV-DSA&brandind=5000008

IBM ServeRaid Software

http://www-947.ibm.com/systems/support/supportsite.wss/docdisplay?lndocid=SERV-RAID&brandind=5000008

IBM Server Guide

http://www-947.ibm.com/systems/support/supportsite.wss/docdisplay?lndocid=SERV-GUIDE&brandind=5000008

Support for IBM Systems Management

https://www-304.ibm.com/systems/support/supportsite.wss/selectproduct?brandind=5000016&taskind=2

Problem Determination and Service Guide index – Servers

https://www-304.ibm.com/systems/support/supportsite.wss/docdisplay?lndocid=MIGR-40462&brandind=5000008

Parts documents by server family (index) – Servers

https://www-304.ibm.com/systems/support/supportsite.wss/docdisplay?lndocid=MIGR-48RPEJ&brandind=5000008

Page 156: Sever Monitoring

© 2009 Wipro Ltd - Confidential 156 © 2010 Wipro Ltd – Internal & Restricted 156

Before You Escalate

You must have below mentioned information handy to get required help exploring IBM site:

Machine Product family (e.g. IBM x345)

Machine Type number (IBM 4 digit machine identifier e.g. 8840)

Machine model number (32x)

Machine Serial number (7 Digit Serial Number)

Verify your warranty status - This data will assist IBM in quickly providing a solution to your issue, and ensuring you receive the appropriate level service for which may have contracted. Warranty Status you can check with IBM Site “Warranty lookup” .

IBM Toll Free: 1800-425-6666

Page 157: Sever Monitoring

© 2009 Wipro Ltd - Confidential 157 © 2010 Wipro Ltd – Internal & Restricted 157

Before You Escalate

Apart from system information you should have the following tools ready for diagnosing IBM Servers.

If OS Live and running:

•Latest IBM DSA Installed.

•Management Processor driver properly installed with Mapping layer if applicable .

•Latest Serve Raid Manager Installed .

•Enhanced Diagnostic CD (For systems not having F2 Diagnosis inbuilt)

If OS not running:

•IBM DSA 3.0 Bootable CD.

•Enhanced Diagnostic CD (For systems not having F2 Diagnosis inbuilt).

Page 158: Sever Monitoring

© 2009 Wipro Ltd - Confidential 158 © 2010 Wipro Ltd – Internal & Restricted 158

Standard Testing Procedure

Basic Diagnostic: - a. Check the Front panel for errors. b. Check the LPD panel for Errors. c. Check the Beep codes. d. Check the Component LED’s for Errors. e. Check for Cable loose connections & Switches etc. Extended Diagnostic: - a. Press NMI Switch and try b. Reset BIOS to defaults c. Reseat memory and add-ons. d. Start server with minimum configuration to identify the faulty component.

No Power, No Display

Page 159: Sever Monitoring

© 2009 Wipro Ltd - Confidential 159 © 2010 Wipro Ltd – Internal & Restricted 159

Standard Testing Procedure

a. Replace the Spare identified, if any b. Take DSA Reports and analyze – Pre-update DSA c. Run F2 Diagnostics. d. Check System event log and Diagnostic log for errors. e. Update drivers, BIOS and Firmware – (Optional if there is no error reported in System Event log, DSA Log and Diagnostic Log.) f. Take DSA Report and analyze the results – Post-update DSA g. Run Standard peripherals test. i. CD / DVD – Read , Floppy Drive – Read & Write ii. Tape Drives – Read & Write. iii. Network – Ping to Gateway iv. External Storage access – Drive access v. Save and Clear the Existing Hardware event logs. Tools and Utilities Required: DSA Utility IBM Update Express CD - Reference Documents: IBM Server Hardware Maintenance Manual

Resolution & Functionality Check

Page 160: Sever Monitoring

© 2009 Wipro Ltd - Confidential 160 © 2010 Wipro Ltd – Internal & Restricted 160

Standard Testing Procedure

Basic Diagnostic: - a. Identify the Error from Error message b. Check the Error / POST Codes c. Check the System Event Log through F2 Diagnostics. d. Check the Front panel for errors. e. Check the LPD panel for Errors. f. Check the Beep codes. g. Check the Component LED’s for Errors. Extended Diagnostic: - a. Reset BIOS to defaults b. Update System BIOS & Firmware using update express c. Start server with Minimum Configuration and identify the faulty component.

Error on POST or Not Booting

Page 161: Sever Monitoring

© 2009 Wipro Ltd - Confidential 161 © 2010 Wipro Ltd – Internal & Restricted 161

Standard Testing Procedure

a. Replace the Spare identified, if any b. Take DSA Reports and analyze – Pre-update DSA c. Run F2 Diagnostics. d. Check System event log and Diagnostic log for errors. e. Update drivers, BIOS and Firmware – (Optional if there is no error reported in System Event log, DSA Log and Diagnostic Log.) f. Take DSA Report and analyze the results – Post-update DSA g. Run Standard peripherals test. i. CD / DVD – Read , Floppy Drive – Read & Write ii. Tape Drives – Read & Write. iii. Network – Ping to Gateway iv. External Storage access – Drive access v. Save and Clear the Existing Hardware event logs. Tools and Utilities Required: DSA Utility IBM Update Express CD

Resolution & Functionality Check

Page 162: Sever Monitoring

© 2009 Wipro Ltd - Confidential 162 © 2010 Wipro Ltd – Internal & Restricted 162

Standard Testing Procedure

Basic Diagnostic: - a. Diagnose through DSA Log b. Run IBM diagnostics c. Run OS Stress tests d. Check the Front panel for errors. e. Check the LPD panel for Errors. f. Check the Component LED’s for Errors. Extended Diagnostic: - a. Update Drivers , BIOS and Firmware b. Check OS Patches and updates c. Observe system performance d. Eliminate present installed OS.

Issues after OS Boot.

Page 163: Sever Monitoring

© 2009 Wipro Ltd - Confidential 163 © 2010 Wipro Ltd – Internal & Restricted 163

Standard Testing Procedure

Resolution & Functionality Check a. Replace the Spare identified, if any b. Take DSA Reports and analyze – Pre-update DSA c. Run F2 Diagnostics / IBM Diagnostics d. Check System event log and Diagnostic log for errors. e. Update drivers, BIOS and Firmware – (Optional if there is no error reported in System Event log, DSA Log and Diagnostic Log.) f. Take DSA Report and analyze the results – Post-update DSA g. Run Standard peripherals test. i. CD / DVD – Read , Floppy Drive – Read & Write ii. Tape Drives – Read & Write. iii. Network – Ping to Gateway iv. External Storage access – Drive access v. Save and Clear the Existing Hardware event logs. Tools and Utilities Required: DSA Utility IBM Update Express CD

Page 164: Sever Monitoring

© 2009 Wipro Ltd - Confidential 164 © 2010 Wipro Ltd – Internal & Restricted 164

Standard Testing Procedure

Raid & HDD related issues

Basic Diagnostic: - a. Diagnose through Raid manager ( From Installed Raid Manager , ServRaid Manager CD or IPSCEND Utility ) b. Diagnose through Raid Log ( DSA or Dump Log ) Extended Diagnostic: - a. Run Stress tools and try to simulate ( SQL IO Stress , HP Data creator , Multiple DD commands in Linux / Unix) b. Update Raid Driver & Firmware, Backplane Firmware & HDD Firmware, and then Observe. Resolution & Functionality Check: - a. Replace the Spare identified, if any b. Update Raid Card Drivers and then Firmware, if the replaced spare is Raid Card. c. Update backplane Firmware d. Run a disk subsystem stress tool like SQL IO Stress / HP Data creator / Multiple DD Commands.

Page 165: Sever Monitoring

© 2009 Wipro Ltd - Confidential 165 © 2010 Wipro Ltd – Internal & Restricted 165

Standard Testing Procedure

e. Take the Raid Logs after stress test and analyze. f. Ensure there is no predictive failure in any HDD, through raid manager / dumplogs. g. Run DSA and confirm there is no error. h. Run Standard peripherals test. i. CD / DVD – Read , Floppy Drive – Read & Write ii. Tape Drives – Read & Write. iii. Network – Ping to Gateway iv. External Storage access – Drive access i. Save and Clear existing event logs Tools and Utilities Required: DSA IBM Update Express CD IBM ServRaid Manager HP Data Creator and Reader

Page 166: Sever Monitoring

© 2009 Wipro Ltd - Confidential 166 © 2010 Wipro Ltd – Internal & Restricted 166

Standard Testing Procedure

Server Health Check Basic Health Check : - a. Visual Inspection for bend , dent, breakage etc.. b. Open the Server and ensure the components and add-ons are fixed properly c. Power on and check for Display d. Check LED’s and LPD Panel for Errors e. Run F2 Diagnostics. f. Check System event log and Diagnostic log for errors. g. Update drivers, BIOS and Firmware – (Optional if there is no error reported in System Event log and Diagnostic Log. & Must for the new systems @ Logistics ) h. Configure Raid – If raid card is available and not configured already. i. Load Supported Windows / Linux OS - If OS is not loaded already.. j. Take DSA Report and analyze the results for errors and predictive failure. k. Run Standard peripherals test. i. CD / DVD – Read , Floppy Drive – Read & Write ii. Tape Drives – Read & Write. iii. Network – Ping to Gateway

Page 167: Sever Monitoring

© 2009 Wipro Ltd - Confidential 167 © 2010 Wipro Ltd – Internal & Restricted 167

Standard Testing Procedure

l. Install IBM Director and run Real time diagnostics m. Run Stress test for CPU/Memory Subsystem – Linpack can be used directly on Linux servers and for Windows Servers, boot from KNOPIXX Linux CD and run the Linpack from HDD or PEN drive. n. Run Microsoft memory Diagnostics - Windiag o. Run Stress test for Disk Subsystem – HP Data Creator & Reader / SQL IO etc p. Save and Clear the existing Event logs Tools and Utilities Required: DSA IBM Update Express & ServRaid Manager HP Data Creator and Reader Intel Linpack for Windows and Linux Windiag utility – ( Img & ISO file available in Internal KB site )

Extended Health Check

Page 168: Sever Monitoring

© 2010 Wipro Ltd - Internal & Restricted 168

Dell Server Training

Page 169: Sever Monitoring

© 2010 Wipro Ltd - Confidential 169 © 2010 Wipro Ltd - Internal & Restricted 169

Agenda

Dell Server Overview

Major Components- PERC Controller

Installing Dell Server

Troubleshooting & Diagnostic

Support & Manuals

Standard Testing Procedure

Page 170: Sever Monitoring

© 2010 Wipro Ltd - Confidential 170 © 2010 Wipro Ltd - Internal & Restricted 170

Dell Server Overview

PowerEdge Server Product Range

PE Rack Server PE Tower Server PE SC Server

Page 171: Sever Monitoring

© 2010 Wipro Ltd - Confidential 171 © 2010 Wipro Ltd - Internal & Restricted 171

Dell Server Overview

350

650

8450

7150

2550

2450

2650

6350

6450

6650

1655MC

2850 6850

750

7250

850

1855MC

3250

1550

1650

1750

1850

2950

1955

1950

Page 172: Sever Monitoring

© 2010 Wipro Ltd - Confidential 172 © 2010 Wipro Ltd - Internal & Restricted 172

Dell Server Overview

2300

830

800

2400

2500

2600

4300

4400

4600

6300

6400

6600

6800

2900 6900

Page 173: Sever Monitoring

© 2010 Wipro Ltd - Confidential 173 © 2010 Wipro Ltd - Internal & Restricted 173

Major Components- PERC Controller

PERC is Dell nomenclature for its RAID controller. Among the standard hardware components of a server, Dell is having proprietary PowerEdge-specific PERC (PowerEdge Expandable RAID Controller). The related software in the PERC Fault Management Suite offers facilities such as the Background Patrol read, which aims to fix bad sectors on online RAID disks running under some of the more recent PERC controllers. Below is the table for different PERC controller model and connection type and chipset used.

Controller Chipset Connection Type Array Support

PERC -II AMI/LSI LOGIC SCSI Refer Manual

PERC -2 ADAPTEC SCSI 0,1,5,10

PERC 2/DC AMI/LSI LOGIC SCSI Refer Manual

PERC 2/SC AMI/LSI LOGIC SCSI Refer Manual

PERC 2/SI ADAPTEC SCSI 0,1,5,10

PERC 3/SC AMI/LSI LOGIC SCSI 0,1,5,10,50

PERC 3/QC AMI/LSI LOGIC SCSI 0,1,5,10,50

Page 174: Sever Monitoring

© 2010 Wipro Ltd - Confidential 174 © 2010 Wipro Ltd - Internal & Restricted 174

Major Components- PERC Controller

Controller Chipset Connection Type Array Support

PERC 3/DC AMI/LSI LOGIC SCSI 0,1,5,10,50

PERC 3/DCL AMI/LSI LOGIC SCSI 0,1,5,10,50

PERC 3/DI ADAPTEC SCSI 0,1,5,10

PERC 3/SI ADAPTEC SCSI 0,1,5,10

PERC 4/SC AMI/LSI LOGIC SCSI 0,1,5,10,50

PERC 4/DC AMI/LSI LOGIC SCSI 0,1,5,10,50

PERC 4e/DC AMI/LSI LOGIC SCSI 0,1,5,10,50

PERC 4/SI AMI/LSI LOGIC SCSI 0,1,5,10,50

PERC 4/DI AMI/LSI LOGIC SCSI 0,1,5,10,50

PERC 4e/SI AMI/LSI LOGIC SCSI 0,1,5,10,50

PERC 4e/DI AMI/LSI LOGIC SCSI 0,1,5,10,50

PERC 5/I AMI/LSI LOGIC SCSI Refer Manual

Page 175: Sever Monitoring

© 2010 Wipro Ltd - Confidential 175 © 2010 Wipro Ltd - Internal & Restricted 175

Major Components- PERC Controller

Controller Chipset Connection Type Array Support

PERC 5/E AMI/LSI LOGIC SCSI Refer Manual

SAS 5/I AMI/LSI LOGIC SAS Refer Manual

SAS 5/E AMI/LSI LOGIC SAS Refer Manual

SAS 6/I AMI/LSI LOGIC SAS Refer Manual

SAS 6/E AMI/LSI LOGIC SAS 0,1,5,6,10,50,60

PERC 6/I (Intg) AMI/LSI LOGIC SAS 0,1,5,6,10,50,60

PERC 6/E AMI/LSI LOGIC SAS 0,1,5,6,10,50,60

SAS 5/IR AMI/LSI LOGIC SAS 0,1

SAS 6/IR AMI/LSI LOGIC SAS 0,1

Page 176: Sever Monitoring

© 2010 Wipro Ltd - Confidential 176 © 2010 Wipro Ltd - Internal & Restricted 176

Installing Dell Server

As other MNC servers, best way to deploy new Dell server is using Dell Server Assistant CD. This CD comes along with the server. Dell Server Assistant (DSA) delivers simple, automated deployment to help you minimize the time to value of your IT infrastructure. Shipped with every Dell PowerEdge server, this bootable, stand-alone CD-ROM guides you quickly through system setup, configuration and operating system installation. It provides Dell optimized and tested drivers, diagnostics and utilities.

The tool is easy to use with a series of simple-to-follow basic or advanced interview questions through an intuitive Graphical User Interface (GUI). Plus, reboots are minimized for faster deployment. DSA delivers quick deployment capabilities enabling you to quickly set up new servers or rebuild downed systems. It also includes replication abilities to help you automatically deploy multiple identical servers. DSA features increased platform, operating system and browser support over the previous version, including 9th generation PowerEdge™ server platforms, Vmware® ESX Server™ 3.0 and Windows® Storage Server.™

Page 177: Sever Monitoring

© 2010 Wipro Ltd - Confidential 177 © 2010 Wipro Ltd - Internal & Restricted 177

Troubleshooting & Diagnostic

Dell PowerEdge™ Diagnostics is a suite of diagnostic programs, or test modules, that run locally on your system. When you start PowerEdge Diagnostics, the devices on your system are discovered. You select diagnostics tests to run from the Diagnostic Selection tree containing the hardware that PowerEdge Diagnostics discovers on your system. You can select tests for various parts of a system and run them by clicking the Run Tests button in the Tests Selected tab. You can select to run the diagnostic tests in normal or Quick Test mode.

Page 178: Sever Monitoring

© 2010 Wipro Ltd - Confidential 178 © 2010 Wipro Ltd - Internal & Restricted 178

Troubleshooting & Diagnostic

In the Results tab you can view the results for each individually selected test. To view the entire result message for a particular test, double-click the device and test. A message box appears displaying the entire test result message.

You can view the saved results by extracting the .html file from the .zip file into a directory you create. When you open the .html file, you will get a screen similar to the one above:

Page 179: Sever Monitoring

© 2010 Wipro Ltd - Confidential 179 © 2010 Wipro Ltd - Internal & Restricted 179

Troubleshooting & Diagnostic

Dell Server E-Support Tool (DSET) provides the ability to collect hardware, storage and operating system information of a Dell PowerEdge server. This information is consolidated into a single System Configuration Report that can be useful for troubleshooting or inventory collection of a system. The browser user interface provides a convenient means to view specific data through hierarchical menu trees.

DSET is intended to be a small, non-intrusive tool that does not require a reboot of the system to provide basic functionality. Immediately after installation, DSET can collect information about Windows drivers, services, network settings, etc. It will also collect basic information about the system's storage such as active drives, RAID containers, etc. DSET will also collect extended hardware information such as processors, memory, PCI cards, ESM log, BIOS/firmware versions and system health (fan/voltage levels).

* This tool only available for Windows and Linux OS.

Dell Server E-Support Tool (DSET)

Page 180: Sever Monitoring

© 2010 Wipro Ltd - Confidential 180 © 2010 Wipro Ltd - Internal & Restricted 180

Support Manuals

Baseboard Management Controller User Guide

http://docs.us.dell.com/support/edocs/software/smbmcmu/

DELL Remote Access Controller User Guide

http://docs.us.dell.com/support/edocs/software/smdrac3/

DELL OpenManage Software http://support.dell.com/support/edocs/software/smsom/

For any downloads like firmware/manuals/drives etc visit http://support.dell.com. All you need is service tag of the server or exact type of the server.

Page 181: Sever Monitoring

© 2010 Wipro Ltd - Confidential 181 © 2010 Wipro Ltd - Internal & Restricted 181

Standard Testing Procedure

No Power, No Display:

Page 182: Sever Monitoring

© 2010 Wipro Ltd - Confidential 182 © 2010 Wipro Ltd - Internal & Restricted 182

Standard Testing Procedure

POST Error – Not Booting

Page 183: Sever Monitoring

© 2010 Wipro Ltd - Confidential 183 © 2010 Wipro Ltd - Internal & Restricted 183

Standard Testing Procedure

POST Error – Not Booting

Page 184: Sever Monitoring

© 2010 Wipro Ltd - Confidential 184 © 2010 Wipro Ltd - Internal & Restricted 184

Standard Testing Procedure

Page 185: Sever Monitoring

© 2010 Wipro Ltd - Confidential 185 © 2010 Wipro Ltd - Internal & Restricted 185

Standard Testing Procedure

Page 186: Sever Monitoring

© 2010 Wipro Ltd - Confidential 186 © 2010 Wipro Ltd - Internal & Restricted 186

Standard Testing Procedure

Page 187: Sever Monitoring

© 2010 Wipro Ltd – Internal & Restricted 187

HP Servers

Page 188: Sever Monitoring

© 2009 Wipro Ltd - Confidential 188 © 2010 Wipro Ltd – Internal & Restricted 188

Agenda

ProLiant Server Classification

Main Components of Smart Array

Installing HP Servers

Troubleshooting & Diagnosing HP Servers

Firmware Maintenance

Software Tools

Support Links

Standard Testing Procedure

Page 189: Sever Monitoring

© 2009 Wipro Ltd - Confidential 189 © 2010 Wipro Ltd – Internal & Restricted 189

ProLiant Server Classification

HP ProLiant ML: expandable tower servers for small to medium-sized businesses.

HP ProLiant DL: Density optimized solution for rack mount servers offering flexibility and manageability

HP ProLiant BL: Industry-standard Blade servers featuring all-in-one storage and server infrastructure

Page 190: Sever Monitoring

© 2009 Wipro Ltd - Confidential 190 © 2010 Wipro Ltd – Internal & Restricted 190

ProLiant Server Classification

To know about server generation is very important for support through hp site. Each HP server model is known through generation prefix to the model e.g. DL380 G5. You can find generation by looking in front of the server. Another important aspect of HP server is to know HP serial number and part number. You can find those details on the asset tag sticker of HP servers.

HP Generation

Page 191: Sever Monitoring

© 2009 Wipro Ltd - Confidential 191 © 2010 Wipro Ltd – Internal & Restricted 191

Main Components of Smart Array

Smart Array Integrated Controller.

Smart Array 5i+

Smart Array 5i

Smart Array 6i

One of the above mentioned controllers are coming by default in DL 380 series server, Like DL380 , DL 380 G2, DL 380 G3 DL 380 G4.Optional Smart array Controller is mentioned Below.

Smart Array 532

Smart Array 642

Smart Array 6400

The HP Smart array Controller Comes in Dual & Single Port.

Note: For More information about different Smart Array Controllers, refer manuals.

HP Smart Array Controllers

Page 192: Sever Monitoring

© 2009 Wipro Ltd - Confidential 192 © 2010 Wipro Ltd – Internal & Restricted 192

Installing HP Servers

SmartStart is an essential single-server deployment tool that simplifies HP ProLiant server setup, providing a repeatable way to deploy reliable and consistent single-server configurations.

HP Deployment tool - SmartStart

SmartStart is delivered with every ProLiant ML and DL 300, 500, and 700 series server and supports ProLiant BL servers to provide step-by-step ProLiant deployment assistance and is included in the HP Insight Foundation Suite for ProLiant. From array configuration and OS installation to the update of optimized ProLiant server support software, SmartStart ensures a stable and reliable configuration. The SmartStart CDs contain server system utilities and operating system support software for ProLiant servers.

Page 193: Sever Monitoring

© 2009 Wipro Ltd - Confidential 193 © 2010 Wipro Ltd – Internal & Restricted 193

Troubleshooting & Diagnosing HP Servers

HP Insight Diagnostics is a proactive server management tool, available in both offline and online versions, that provides diagnostics and troubleshooting capabilities to assist IT administrators who verify server installations, troubleshoot problems, and perform repair validation. HP Insight Diagnostics Offline Edition performs various in-depth system and component testing while the OS is not running. To run this utility, launch the SmartStart CD. HP Insight Diagnostics Online Edition is a web-based application that captures system configuration and other related data needed for effective server management. Available in Microsoft® Windows® and Linux versions, the utility helps to ensure proper system operation.

HP Insight Diagnostics

Page 194: Sever Monitoring

© 2009 Wipro Ltd - Confidential 194 © 2010 Wipro Ltd – Internal & Restricted 194

Troubleshooting & Diagnosing HP Servers

The HP Insight Diagnostics Online Edition provides the capability to use non-intrusive system level checks to diagnose Smart Array SCSI hard drives. Diagnosis supports SCSI, SATA, and SAS hard drives that are attached to a Smart Array controller and configured as part of a logical volume. Diagnosis is not component testing, but is a combination of drive history and controller error status. This Diagnosis feature should be used to: • To troubleshoot why a hard drive is in a particular state. • When HP SIM reports a hard drive pre-failure or that a hard drive has failed. • When data corruption or storage problems occur, but no physical indications are evident. • When conflicting errors exist. • When repeated failures occur.

Array Diagnosis Utility

Page 195: Sever Monitoring

© 2009 Wipro Ltd - Confidential 195 © 2010 Wipro Ltd – Internal & Restricted 195

Troubleshooting & Diagnosing HP Servers

HP Insight Diagnostics Survey

HP Insight Diagnostics provides survey functionality that gathers critical hardware and software information on ProLiant servers. If a significant change occurs between data-gathering intervals, the survey function marks the previous information and overwrites the survey data files to reflect the latest changes in the configuration. Survey functionality is installed with every SmartStart-assisted HP Insight Diagnostics installation, or it can be installed through the HP PSP .

Page 196: Sever Monitoring

© 2009 Wipro Ltd - Confidential 196 © 2010 Wipro Ltd – Internal & Restricted 196

Troubleshooting & Diagnosing HP Servers

Integrated Management Log The IML records hundreds of events and stores them in an easy-to-view form. The IML timestamps each event with 1-minute granularity. You can view recorded events in the IML in several ways, including the following: From within HP SIM From within Survey Utility From within operating system: o For Windows®: IML Viewer o For Linux: IML Viewer Application From within the iLO and iLO 2 user interface From within HP Insight Diagnostics .

Page 197: Sever Monitoring

© 2009 Wipro Ltd - Confidential 197 © 2010 Wipro Ltd – Internal & Restricted 197

Firmware maintenance

The process of updating system or option firmware is referred to as a flash process or flashing the ROM. A firmware or ROM flash removes the existing version of firmware from the ROM and replaces it with a more recent version. Update the firmware to do the following: • Support new hardware, such as a processor revision • Support new features • Correct problems in a previous firmware version

Several tools are available for updating firmware. HP recommends the following methods: • ROMPaq utility • HP Smart Update Manager • Online ROM flash components • ROM Update Utility The ROM update utility is being replaced by the HP Smart Update Manager on the Firmware Maintenance CD version 7.50 and later.

Page 198: Sever Monitoring

© 2009 Wipro Ltd - Confidential 198 © 2010 Wipro Ltd – Internal & Restricted 198

Firmware maintenance

Although there are different methods to update firmware on HP systems, but it is recommended to proceed with HP firmware maintenance CD. Here we will be discussing about firmware updates using Firmware maintenance CD only.

HP Smart Update Manager deployment

The HP Smart Update Manager utility is available from the ProLiant Firmware Maintenance CD. This CD and others can be downloaded free-of-charge from the HP website . To update please follow the steps: •Boot the server from the Firmware Maintenance CD. •At the prompt, select a language and keyboard and Click Continue. •Read the End-User License Agreement, click Agree . •Click the Firmware Update tab. •Click Install Firmware. The HP Smart Update Manager is initiated. Select and install the desired components For more information, see the HP ProLiant Firmware Maintenance CD User Guide on the Firmware Maintenance CD.

Page 199: Sever Monitoring

© 2009 Wipro Ltd - Confidential 199 © 2010 Wipro Ltd – Internal & Restricted 199

Software Tools

HP ProLiant Support Packs: PSPs represent operating system-specific bundles of ProLiant optimized drivers, utilities, and management agents. HP Systems Insight Manager : HP Systems Insight Manager is the clear choice for managing HP servers and storage by being the easiest, simplest and least expensive way for HP system administrators to maximize system uptime and health. Version Control: The VCRM (version Control Repository Manager) and VCA(Version Control Agent) are Web-enabled Insight Management Agents. HP Systems Insight Manager uses these Insight Management Agents to facilitate software update tasks.

For more information about version control tools and HP SIM, refer to the HP Systems Insight Manager Help Guide and the Version Control User Guide on the HP Systems Insight Manager

website.

Page 200: Sever Monitoring

© 2009 Wipro Ltd - Confidential 200 © 2010 Wipro Ltd – Internal & Restricted 200

Support Links

HP Warranty Lookup: http://h20000.www2.hp.com/bizsupport/TechSupport/WarrantyLookup.jsp?country=&prodSeriesId=454811&prodTypeId=12454 HP Part Information: http://partsurfer.hp.com/search.aspx HP ProLiant Support Site http://h20180.www2.hp.com/apps/Nav?h_pagetype=s-001&h_lang=en&h_cc=us&h_product=241435&h_client=S-A-R163-1&h_page=hpcom&lang=en&cc=us

Page 201: Sever Monitoring

© 2009 Wipro Ltd - Confidential 201 © 2010 Wipro Ltd – Internal & Restricted 201

Standard Testing Procedure

Basic diagnostics a. Check the Front panel LED. b. Check the physical connectivity. c. Check the Power and reset switch (some times reset switch struck). d. Check the Beep codes. e. Check the Amber LED’s on the motherboard and SMPS’s backside. Extended Diagnostics a. Reset BIOS to defaults (using system maintenance switch) b. Check the SMPS output power by multi-meter,(check the power good signal) c. Run F10 Diagnostics for G1 and f9 for next generation severs d. Remove the extra ram ( swap and check the first slot ram also) e. Start server with Minimum Configuration and identify the faulty component. f. Clear bios thru dip switch g. If still no display Do the bios recovery

No Power, No Display

Page 202: Sever Monitoring

© 2009 Wipro Ltd - Confidential 202 © 2010 Wipro Ltd – Internal & Restricted 202

Standard Testing Procedure

a. Intend the spare with part number , server Generation and serial number(optional) otherwise you couldn’t identify the correct spare b. Check the part number of the spare and server serial number. c. Replace the Spare what you identified d. Run the bios setup and Run inspect utility, we can find out which spare gone bad. e. Update drivers , BIOS and Firmware

Resolution and functionality check

Error on POST or Not Booting Basic Diagnostics a. Identify the Error from POST error message b. Identify the error which it is related. c. Check the System bios Event Log through F2 Diagnostics. d. Check the array controller & array log e. Check the Front panel Lpd (light path diagnostics) for errors. f. Check the LCD panel for Errors.(optional) g. Check the Beep codes. h. Check the mother board Amber LED’s for Errors.

Page 203: Sever Monitoring

© 2009 Wipro Ltd - Confidential 203 © 2010 Wipro Ltd – Internal & Restricted 203

Standard Testing Procedure

Error on POST or Not Booting

Extended Diagnostics a. Identify the problem due to hardware (or) Operating system b. Reset BIOS to defaults c. Do bios recovery d. Update System BIOS & Firmware through firmware update CD e. Check the generation of the server- use this Url-HP Firmware f. Start server with Minimum Configuration and identify the faulty component.

a. Check the Replaced spare part number and configuration b. Check the part number through part surfer c. After replaced the Spare check iml log file. d. Remove the replaced spare and check e. Update drivers, BIOS and Firmware f. Run setup inspect Diagnostics g. Check and Clear the existing System Event Log

Resolution & Functionality Check

Page 204: Sever Monitoring

© 2009 Wipro Ltd - Confidential 204 © 2010 Wipro Ltd – Internal & Restricted 204

Standard Testing Procedure

Issues after System Boot

Basic diagnostics a. Diagnose through IML Log b. Run OS Stress tests c. Check the motherboard and check the component over heat , d. Install bios and firmware suitable version. e. Check all boards if represent any amber LED Extended diagnostics a. Update Drivers , latest BIOS and Firmware b. Update the controller firmware c. Check OS Patches and updates d. Observe system performance e. Eliminate present OS and check with new os

Page 205: Sever Monitoring

© 2009 Wipro Ltd - Confidential 205 © 2010 Wipro Ltd – Internal & Restricted 205

Standard Testing Procedure

j. Run setup inspect Diagnostics k. Check the IML log and ensure there is no error. l. Run the OS Stress test and ensure system is working fine. F. Run Standard peripherals test. i. CD / DVD – Read , Floppy Drive – Read & Write ii. Tape Drives – Read & Write. iii. Network – Ping to Gateway iv. External Storage access – Drive access

Resolution & Functionality Check:

Compaq Smart Array & HDD related issues Basic diagnostics a. Diagnose through Raid Log ( use smart start cd , view log file) b. Diagnose through smart array diagnose(ADU) utility c. Run smart start cd and view the log file d. Update Raid Driver & Firmware, Backplane Firmware & HDD Firmware, and then Observe.(before update check the i2c cable with back plane) e. Use specific scsi cable mentioned by hp use for the back plane f. If you have an error code check proliant server error codes

Page 206: Sever Monitoring

© 2009 Wipro Ltd - Confidential 206 © 2010 Wipro Ltd – Internal & Restricted 206

Standard Testing Procedure

a. Run Stress tools and try to simulate (HP Data creator, Multiple DD commands in Linux / Unix) b. Update Raid Driver & Firmware, Backplane Firmware & HDD Firmware, and then Observe.

Extended Diagnostic

Resolution & Functionality Check a. Replace the Spare identified, if any b. Update the HDD firmware to the latest one, check the part number before replaced (confirm with old replaced spare). c. Update Raid Card Drivers and then Firmware, if the replaced spare is Raid Card. d. Update backplane Firmware e. Check the IML log and ensure there is no error. f. Run the OS Stress test and ensure system is working fine. g. Run Standard Peripherals test. i. CD / DVD – Read , Floppy Drive – Read & Write ii. Tape Drives – Read & Write. iii. Network – Ping to Gateway iv. External Storage access – Drive access

Page 207: Sever Monitoring

© 2009 Wipro Ltd - Confidential 207 © 2010 Wipro Ltd – Internal & Restricted 207

Standard Testing Procedure

Server Health Check up

Basic Health Check a. Visual Inspection for bend , dent, breakage etc.. b. Open the Server and ensure the components and add-ons are fixed properly c. Power on and check for Display d. Check LED’s and Panel for Errors e. Run Inspect utility and check for errors. f. Check IML log for errors. g. Update drivers, BIOS and Firmware – (Optional if there is no error reported in System Event log and Diagnostic Log. & Must for the new systems @ Logistics ) h. Configure Raid – If raid card is available and not configured already. i. Load Supported Windows / Linux OS - If OS is not loaded already.. j. Take IML Report and analyze the results for errors and predictive failure. k. Run Standard peripherals test. i. CD / DVD – Read , Floppy Drive – Read & Write ii. Tape Drives – Read & Write. iii. Network – Ping to Gateway

Page 208: Sever Monitoring

© 2009 Wipro Ltd - Confidential 208 © 2010 Wipro Ltd – Internal & Restricted 208

Standard Testing Procedure

l. Install Insight manager and run diagnostics and survey utility. m. Run Stress test for CPU/Memory Subsystem – Linpack can be used directly on Linux servers and for Windows Servers, boot from KNOPIXX Linux CD and run the Linpack from HDD or PEN drive. n. Run Microsoft memory Diagnostics - Windiag o. Run Stress test for Disk Subsystem – HP Data Creator & Reader/SQL IO etc. p. Save and Clear the existing IML logs

Extended Health Check

01, Smart Start CD – configure array, deploy os, generate log file Visit For Generation identification: Generation 1 server – Use Smart start 5.5 Generation 2 Server – Use Smart start 7.7 Above all model server – latest version 02, firmware maintenance cd- you can update bios, firmware.: For Generation 1 server – Firmware CD 7.3 Generation 2&above server – latest version

Tools Required

Page 209: Sever Monitoring

© 2009 Wipro Ltd - Confidential 209 © 2010 Wipro Ltd – Internal & Restricted 209

Standard Testing Procedure

Page 210: Sever Monitoring

© 2010 Wipro Ltd – Internal & Restricted 210

Backup Device

Page 211: Sever Monitoring

211 © 2010 Wipro Ltd – Internal & Restricted 211

Basic Backup

WHAT DOES IT MEAN TO BACK UP, RESTORE, AND ARCHIVE?

Data backup is the process of transferring data from your

company's primary computer system to a separate storage

device, such as a tape drive. If the original data is lost or

damaged, you can restore the information from the device

and resume normal business operations. An archive is a

long-term, permanent data backup, which is kept off-site.

Page 212: Sever Monitoring

212 © 2010 Wipro Ltd – Internal & Restricted 212

Why Backup?

•Protection from hardware failures

oScratches on CD/DVD

oHard-disk failure

oNode failure

•Protection against natural calamities

oFloods

•Protection from miscreants

oComputer Virus

oTerrorist attacks

•User errors

oAccidents – delete *.*; overwrite a file with another

Page 213: Sever Monitoring

213 © 2010 Wipro Ltd – Internal & Restricted 213

How to Backup? - simple solution

Create copy

– On the same device

– On some other device

– At some other location

Source Data Source Data Source Data

City A City B

Same Device Different Device Different Location

Page 214: Sever Monitoring

214 © 2010 Wipro Ltd – Internal & Restricted 214

Backup Policies.

• Full Backup

– Backup all the files

• Incremental

– Backup only the files changed since last backup

• Differential

– Backup only the files changes since last full backup

– Recovery is simpler

Page 215: Sever Monitoring

215 © 2010 Wipro Ltd – Internal & Restricted 215

FULL BACKUPS

A full backup copies all the files on the system . the system

files, the software files, and the data files. You should

perform a full backup on a weekly, bi-weekly, or monthly

basis. With a full backup of your data set on tape, you can

restore your entire system if a disaster destroys the original

files. TIP: If your data set is small,

Backup Policies – Conti…

Page 216: Sever Monitoring

216 © 2010 Wipro Ltd – Internal & Restricted 216

PARTIAL BACKUPS

A partial backup copies all files that have been added or changed since the last backup job.

There are two main types of partial backups: incremental and differential,

summarized in the table below.

TIP: For any crucial files that would be difficult to re-create, you can perform a selective

backup at any time during the day. With this method, you don „t need to wait until the next

scheduled backup to copy the crucial files.

INCREMENTAL BACKUPS

If you need to save time and cost during regular backup jobs, choose a plan that includes

full and incremental backups. In this strategy, you perform a regular backup of

all files (weekly, bi-weekly, etc.), then a more frequent backup (daily) of only the files that

have changed since the last backup session.

This full/incremental backup method means that fewer files need to be copied and less

time is required for the backup procedure. However, this method can also make a

complete system restore slower if you have created many different incremental backup

tapes (one for each day of the week, for example), or if you need to restore only a

particular file and must hunt through several different incremental back tapes

Backup Policies – Conti…

Page 217: Sever Monitoring

217 © 2010 Wipro Ltd – Internal & Restricted 217

DIFFERENTIAL BACKUPS

If you need to save on restore time and hassle in the event of a disaster, choose a plan that includes full and differential backups. In this strategy, you perform a regular backup of all files (weekly, bi-weekly, etc.), then a more frequent backup (daily) of all files that have changed since the last full backup session. This full/differential backup method helps the restore process run more efficiently, because only one full backup tape and one differential backup tape are required for a complete restore of the system. However, this method is slower on the backup process because more files are copied daily.

Backup Policies – Conti…

Page 218: Sever Monitoring

218 © 2010 Wipro Ltd – Internal & Restricted 218

Advantages and disadvantages of

Policies.

Page 219: Sever Monitoring

219 © 2010 Wipro Ltd – Internal & Restricted 219

DAT

Digital Audio Tape (DAT or R-DAT) was a signal recording and playback

medium developed by Sony and introduced in 1987. In appearance it is

similar to a compact audio cassette, using 4 mm magnetic tape enclosed in

a protective shell, but is roughly half the size at 73 mm × 54 mm × 10.5

mm. As the name suggests, the recording is digital rather than analog.

The technology of DAT is closely based on that of video recorders, using a

rotating head and helical scan to record data. This prevents DATs from

being physically edited in the cut-and-splice manner of analog tapes

Page 220: Sever Monitoring

220 © 2010 Wipro Ltd – Internal & Restricted 220

DDS = Digital Data System

A specific term for 4mm data tapes

Spec. Introduction

(year) Data Transfer

(Bytes/sec) Tape Length

(meters) Native

(GB)

DC/Comp

ressed

(GB)

DDS-

1 1989 183K 90 2.0 4.0

DDS-

2 1993 360-750K 120 4.0 8.0

DDS-

3 1995 720K-1.5M 125 12.0 24.0

DDS-

4 1999 1-3M 150 20 40

DDS-

5 2001(est) 1-6M 150+ 36 72

Digital Data System specifications

Page 221: Sever Monitoring

221 © 2010 Wipro Ltd – Internal & Restricted 221

Jumper setting for DAT Drive

Note: Figure shows the symbolic drive, there will be variation

according to different models of drive.

Page 222: Sever Monitoring

222 © 2010 Wipro Ltd – Internal & Restricted 222

SCSI Interface Connector on the

Internal DAT Drive

Page 223: Sever Monitoring

223 © 2010 Wipro Ltd – Internal & Restricted 223

Internal DAT Drive Switch Settings

Page 224: Sever Monitoring

224 © 2010 Wipro Ltd – Internal & Restricted 224

Conti…

Page 225: Sever Monitoring

225 © 2010 Wipro Ltd – Internal & Restricted 225

Conti…

Page 226: Sever Monitoring

226 © 2010 Wipro Ltd – Internal & Restricted 226

Conti…

Page 227: Sever Monitoring

227 © 2010 Wipro Ltd – Internal & Restricted 227

• DLT ---- Digital Linear Tape

• LTO ---- Linear Tape Open

• SDLT ---- Super DLT

Page 228: Sever Monitoring

228 © 2010 Wipro Ltd – Internal & Restricted 228

Technology overview.

Digital Linear Tape (DLT) (previously called CompacTape) is a

magnetic tape data storage technology developed by Digital Equipment

Corporation (DEC) from 1984 onwards. In 1994 the technology was

purchased by Quantum Corporation, who currently manufactures drives

and licenses the technology and trademark. A variant with higher capacity

is called Super DLT (SDLT).

DLT uses linear serpentine recording with multiple tracks on half-inch

(12.7 mm) wide tape. The cartridges contain a single reel and the tape is

pulled out of the cartridge by means of a leader tape attached to the

takeup reel inside the drive. The drive leader tape is buckled to the

cartridge leader during the load process. Tape speed and tension are

controlled electronically via the reel motors, The tape is guided by 4 to 6

rollers that touch only the back side of the tape. Tape material is metal

particle tape (MP/AMP.)

Page 229: Sever Monitoring

229 © 2010 Wipro Ltd – Internal & Restricted 229

Cartridge.

Page 230: Sever Monitoring

230 © 2010 Wipro Ltd – Internal & Restricted 230

Different Types of DLT

1) DLT 4000 20/40gb Dlt

2) DLT 7000 35/70gb Dlt

3) DLT 8000 40/80gb Dlt

Page 231: Sever Monitoring

231 © 2010 Wipro Ltd – Internal & Restricted 231

Handling of Tapes

Page 232: Sever Monitoring

232 © 2010 Wipro Ltd – Internal & Restricted 232

Handling of Tapes – Conti…

Page 233: Sever Monitoring

233 © 2010 Wipro Ltd – Internal & Restricted 233

Handling of Tapes – Conti…

Page 234: Sever Monitoring

234 © 2010 Wipro Ltd – Internal & Restricted 234

Handling of Tapes – Conti…

Page 235: Sever Monitoring

© 2010 Wipro Ltd – Internal & Restricted 235

Linux Basic Installation RHEL 5 Installation

Page 236: Sever Monitoring

© 2009 Wipro Ltd - Confidential 236 © 2010 Wipro Ltd – Internal & Restricted 236

Installation Guide for RHEL 5

The below URL is having all deployment guide/Admin guide for

RHEL5 32bit and 64 Bit OS.

Manual will guide you steps by steps on Installing RHEL 5 on

Certified Hardware.

URL for downloading Manuals:

http://www.redhat.com/docs/manuals/enterprise/RHEL-5-

manual/index.html

Page 237: Sever Monitoring

© 2010 Wipro Ltd – Internal & Restricted 237

Server Management

Page 238: Sever Monitoring

© 2009 Wipro Ltd - Confidential 238 © 2010 Wipro Ltd – Internal & Restricted 238

IPMI

• WHAT IS IPMI ?

• IPMI stands for Intelligent Platform Management Interface

• What is the use of IPMI ?

• You can monitor system hardware and sensors, control system components and log important system events.

Page 239: Sever Monitoring

© 2009 Wipro Ltd - Confidential 239 © 2010 Wipro Ltd – Internal & Restricted 239

IPMI Key Features

Shares LAN controller with main board and uses out-of-band

bandwidth.

• Supports hardware monitor for: CPU / system temperature;

system fan & CPU fan status; and system voltage

• Supports Event Log information for hardware

monitor events

• Supports remote management when system dead or in power

standby

• Remote power control:

a. Control through OS: Shutdown; Reboot; and Power cycle

b. Control directly through buttons on chassis: Reset;

Power down; Power up; and Power cycle

Page 240: Sever Monitoring

© 2009 Wipro Ltd - Confidential 240 © 2010 Wipro Ltd – Internal & Restricted 240

IPMI used by Different Hardware Vendors

INTEL BMC/RMM2

Super Micro IPMICARD

IBM RSA card

DELL DRAC

HP ILO card

Page 241: Sever Monitoring

© 2009 Wipro Ltd - Confidential 241 © 2010 Wipro Ltd – Internal & Restricted 241

IPMI used by Different Hardware Vendors

INTEL BMC/RMM2

Super Micro IPMICARD

IBM RSA card

DELL DRAC

HP ILO card

Page 242: Sever Monitoring

© 2009 Wipro Ltd - Confidential 242 © 2010 Wipro Ltd – Internal & Restricted 242

IPMI IP Configurations on SuperMicro IPMI cards

Boot from the DOS CD/Floppy

Execute the command

Ipmicfg –m < IP address >

Page 243: Sever Monitoring

© 2009 Wipro Ltd - Confidential 243 © 2010 Wipro Ltd – Internal & Restricted 243

IPMIVIEW

IPMI View is management software based on IPMI specification

version 1.5 - 2.0. IPMI View sends IPMI messages to and from the

BMC (Base Management Card) on a remotely managed system.

1. Available for windows and linux OS

Default Username is ADMIN

Default Passwd is ADMIN

Page 244: Sever Monitoring

© 2009 Wipro Ltd - Confidential 244 © 2010 Wipro Ltd – Internal & Restricted 244

Login Screen

Once Device got discovered from IPMPIVIEW software,

we need to login through default username and password .

Page 245: Sever Monitoring

© 2009 Wipro Ltd - Confidential 245 © 2010 Wipro Ltd – Internal & Restricted 245

Power Functions

Once login into IPMI device , you can reboot/shutdown machine

remotely. You can also check the power status of machine in this menu.

Page 246: Sever Monitoring

© 2009 Wipro Ltd - Confidential 246 © 2010 Wipro Ltd – Internal & Restricted 246

Event Logs

Any Hardware errors log can be captured in this menu. All

fan/memory/CPU/voltages issues can be seen in this menu.

Page 247: Sever Monitoring

© 2009 Wipro Ltd - Confidential 247 © 2010 Wipro Ltd – Internal & Restricted 247

Sensors Details

All current status of voltages/fan Speed/Tempratures/chassis phsyical

status can be seen in this menu

Page 248: Sever Monitoring

© 2009 Wipro Ltd - Confidential 248 © 2010 Wipro Ltd – Internal & Restricted 248

Intel Deployment CD

1. It is different for EACH Motherboards

2. By using this CD, you can configure IP address of BMC

3. You have to define user and passwd for login

4. Once you defined the BMC configuration, save it and reboot the system.

Page 249: Sever Monitoring

© 2009 Wipro Ltd - Confidential 249 © 2010 Wipro Ltd – Internal & Restricted 249

How to Configure RMM2 Card

Psetup utility

Locally:

Psetup can be started directly on the host containing the Intel RMM2.

The tool uses SCSI/USB driver to get connected to the module.

Remotely:

Psetup can be started on any host connected to the same subnet (broadcast

domain)

as the Intel RMM2. Psetup uses UDP broadcasts to access the module.

It works on windows and Linux OS

Page 250: Sever Monitoring

© 2009 Wipro Ltd - Confidential 250 © 2010 Wipro Ltd – Internal & Restricted 250

When you execute Psetup utility

Page 251: Sever Monitoring

© 2009 Wipro Ltd - Confidential 251 © 2010 Wipro Ltd – Internal & Restricted 251

How to Configure IP Address

1. once MAC address comes you define the IP address

and subnet mask

2. Give a Superuser login : admin

3. Passwd is : password ( for new cards)

4. If you want to change the password then give a new

Superuser passwd

Page 252: Sever Monitoring

© 2009 Wipro Ltd - Confidential 252 © 2010 Wipro Ltd – Internal & Restricted 252

Intel CLI Utility -DPCCLI

1. DPCCLI utility use to check BMC logs and Health Monitoring.

2. You can take a console through SOL

3. In Remote machine(windows) , you have to Install DPCPROXY services

by using Intel CLI utility in windows machine.

4. It will open the PORT NO. 623

Page 253: Sever Monitoring

© 2009 Wipro Ltd - Confidential 253 © 2010 Wipro Ltd – Internal & Restricted 253

Sel-viewer

The Baseboard Management Controller (BMC) records details about the

system events in a log in flash memory. Each SEL entry is a single system

event.

The SEL Viewer utility provides the ability to view system event records

stored on the server management storage device of a server.

The utility also allows the user to save SEL entries to a file and load SEL

entries from a file for viewing. The user can also reload SEL entries from a

server and see properties of SEL entries. The SEL entries can be viewed in

two modes: interpreted text mode and hex mode

Page 254: Sever Monitoring

© 2009 Wipro Ltd - Confidential 254 © 2010 Wipro Ltd – Internal & Restricted 254

How to Install SEL-Viewer

To install the SEL Viewer Utility in Windows* with the standalone installation, do

the following:

1. Copy all files and subdirectories from the utility released location into a folder on the hard

drive. (for example, c:\selviewer)

2. Open a command prompt and change to that directory (for example, cd

c:\selviewer\imbdriver).

3. Execute "install.cmd <full-path>" specifying the full path of the folder in which files were

copied (for example, "install c:\selviewer\imbdriver").

4. This install script will install the imbdrv.sys driver.

5. To run the SEL Viewer Utility, open a command prompt, and change directory to the folder

in which the selview.exe file resides (for example, cd c:\selviewer).

Page 255: Sever Monitoring

© 2009 Wipro Ltd - Confidential 255 © 2010 Wipro Ltd – Internal & Restricted 255

When you execute Selview Utility

Page 256: Sever Monitoring

© 2009 Wipro Ltd - Confidential 256 © 2010 Wipro Ltd – Internal & Restricted 256

Intel Active Console

1. Simple Lightweight Console

2. Dashboard of Server Health

3. Able to see System Event logs

4. View all sensors

5. BMC configurations

6. Support Microsoft windows

Page 257: Sever Monitoring

© 2009 Wipro Ltd - Confidential 257 © 2010 Wipro Ltd – Internal & Restricted 257

Snapshot of Intel Active System Console

Once you open the console, you can click on the submenu to see

details of the sensors

Page 258: Sever Monitoring

© 2009 Wipro Ltd - Confidential 258 © 2010 Wipro Ltd – Internal & Restricted 258

BMC Configurations

BMC Menu details : will show IP address

Page 259: Sever Monitoring

© 2009 Wipro Ltd - Confidential 259 © 2010 Wipro Ltd – Internal & Restricted 259

Features

1. System Health Monitoring

2. Alerts Through Email

3. Can be Monitored Remotely

4. Remote Control

5. Performance Information

6. Only for SUPERMICRO MB and need to be installed locally.

Page 260: Sever Monitoring

© 2009 Wipro Ltd - Confidential 260 © 2010 Wipro Ltd – Internal & Restricted 260

Software Details

Super Doctor III only for Windows

Super Doctor II for Linux/Windows

System Requirements

This software is designed to run under the following operating systems:

Windows NT 4.0 with Service Pack 4.0 or later

Windows 2000

Windows XP

Windows Server 2003

Atleast 14 Mb space required for the Installation

Please Defined the Port during Installation.

Page 261: Sever Monitoring

© 2010 Wipro Ltd – Internal & Restricted 261

Basic Concepts of Network

Page 262: Sever Monitoring

262 © 2010 Wipro Ltd – Internal & Restricted 262

Agenda

Basics of Networking

Networking Standards

Network Devices & Definitions

TCP/IP Network Addressing

VLAN & ARP

Basic Definitions for L2 & L3 Networks

Page 263: Sever Monitoring

263 © 2010 Wipro Ltd – Internal & Restricted 263

Basics of Networking

What & Why is Network

• Distribute pieces of computation among computers (nodes)

• Coordination between processes running on different nodes

• Remote I/O Devices

• Remote Data/File Access

• Personal communications (email, chat, audio/video conference, messaging) • World Wide Web

Page 264: Sever Monitoring

264 © 2010 Wipro Ltd – Internal & Restricted 264

Basics of Networking

ISO-OSI is standard of network but we commonly use TCP/IP, which has no session/presentation layer

Page 265: Sever Monitoring

265 © 2010 Wipro Ltd – Internal & Restricted 265

Basics of Networking

Physical Layer:

o Standardized protocol dealing with electrical, mechanical and signaling interfaces.

o Concerned with the transmission of bits

Data Link Layer:

o Logical Link Control (LLC) defines how data is transferred over the cable and provides data link service to the higher layers.

o Medium Access Control (MAC) defines who can use the network when multiple computers are trying to access it simultaneously (i.e. Token passing, Ethernet [CSMA/CD], etc...).

o Handles errors in the physical layer.

o Groups bits into frames and ensures their correct delivery.

Network:

o Concerned with the transmission of packets.

o Choose the best path to send a packet (routing).

o It may be complex in a large network (e.g. Internet).

o Shortest (distance) route vs. route with least delay.

o Most popular protocol widely used is x.25 and TCP/IP

Page 266: Sever Monitoring

266 © 2010 Wipro Ltd – Internal & Restricted 266

Basics of Networking

Transport Layer:

o Network layer does not deal with lost messages.Transport layer ensure reliable service. It breaks the message (from sessions layer) into smaller packets, assigns sequence number and sends them.

o TCP/IP is widely used for network/transport layer. UDP (Universal Datagram Protocol): Internet connectionless transport protocol.

Session & Presentation Layer:

o Just theory! Very few applications use it.

Application Layer:

o Collection of miscellaneous protocols for high level applications

o Electronic mail, file transfer, connecting remote terminals, etc.

o E.g. SMTP, POP, IMAP, FTP, Telnet, SSH, HTTP, HTTPS, SNMP, etc...

Page 267: Sever Monitoring

267 © 2010 Wipro Ltd – Internal & Restricted 267

Networking Standards

• IEEE 802® : Internetworking

• IEEE 802.1 : Bridging & Management

• IEEE 802.2™ : Logical Link Control

• IEEE 802.3™ : CSMA/CD (Ethernet) Access Method

• IEEE 802.5™ : Token Ring Access Method

• IEEE 802.11™ : Wireless

• IEEE 802.15™ : Wireless Personal Area Networks

• IEEE 802.16™ : Broadband Wireless MAN

• IEEE 802.17™ : Resilent Packet Rings

Page 268: Sever Monitoring

268 © 2010 Wipro Ltd – Internal & Restricted 268

Network Devices & Definitions

REPEATORS

HUBS

SWITCHES

BRIDGES

ROUTERS

FIREWALL

Page 269: Sever Monitoring

269 © 2010 Wipro Ltd – Internal & Restricted 269

Network Devices & Definitions

Repeater:

o A repeater connects two segments of your network cable. It retimes and regenerates the signals to proper amplitudes and sends them to the other segments.

Hub:

o A type of repeater used on several network architectures which usually connects several stations.

Switch:

o A network switch is a computer networking device that connects network segments.

o The term commonly refers to a network bridge that processes and routes data at the data link layer (layer 2) of the OSI model. Switches that additionally process data at the network layer (layer 3 and above) are often referred to as Layer 3 switches or multilayer switches.

o The term network switch does not generally encompass unintelligent or passive network devices such as hubs and repeaters.

Page 270: Sever Monitoring

270 © 2010 Wipro Ltd – Internal & Restricted 270

Network Devices & Definitions

Bridge:

o A bridge reads the outermost section of data on the data packet, to tell where the message is going. It reduces the traffic on other network segments, since it does not send all packets. Bridges can be programmed to reject packets from particular networks. Bridging occurs at the data link layer of the OSI model, which means the bridge cannot read IP addresses, but only the outermost hardware address of the packet. In our case the bridge can read the Ethernet data which gives the hardware address of the destination address, not the IP address. Bridges forward all broadcast messages. bridges use one of:

• Transparent Bridging - They build a table of addresses (bridging table) as they receive packets. If the address is not in the bridging table, the packet is forwarded to all segments other than the one it came from. This type of bridge is used on Ethernet networks.

• Source route bridging - The source computer provides path information inside the packet.

Page 271: Sever Monitoring

271 © 2010 Wipro Ltd – Internal & Restricted 271

Network Devices & Definitions

Router:

o A router is used to route data packets between two networks. It reads the information in each packet to tell where it is going. If it is destined for an immediate network it has access to, it will strip the outer packet, readdress the packet to the proper Ethernet address, and transmit it on that network. If it is destined for another network and must be sent to another router, it will re-package the outer packet to be received by the next router and send it to the next router. The section on routing explains the theory behind this and how routing tables are used to help determine packet destinations. Routing occurs at the network layer of the OSI model. They can connect networks with different architectures such as Token Ring and Ethernet. Although they can transform information at the data link level, routers cannot transform information from one data format such as TCP/IP to another such as IPX/SPX. Routers do not send broadcast packets or corrupted packets. If the routing table does not indicate the proper address of a packet, the packet is discarded.

Page 272: Sever Monitoring

272 © 2010 Wipro Ltd – Internal & Restricted 272

Network Devices & Definitions

Firewall:

o A router is used to route data packets between two networks. It reads the information in each packet to tell where it is going. If it is destined for an immediate network it has access to, it will strip the outer packet, readdress the packet to the proper Ethernet address, and transmit it on that network. If it is destined for another network and must be sent to another router, it will re-package the outer packet to be received by the next router and send it to the next router. The section on routing explains the theory behind this and how routing tables are used to help determine packet destinations. Routing occurs at the network layer of the OSI model. They can connect networks with different architectures such as Token Ring and Ethernet. Although they can transform information at the data link level, routers cannot transform information from one data format such as TCP/IP to another such as IPX/SPX. Routers do not send broadcast packets or corrupted packets. If the routing table does not indicate the proper address of a packet, the packet is discarded.

Page 273: Sever Monitoring

273 © 2010 Wipro Ltd – Internal & Restricted 273

TCP/IP Network Addressing

Internet Protocol Because TCP/IP networks are interconnected across the world, each computer on the Internet must have a unique address (called an IP address) to make sure that transmitted data reaches the correct destination. (e.g. 192.168.1.1) Classes of IP

Class A addresses can have up to 16,777,214 hosts on a single network. Class A addresses are in this range: 1.x.x.x to 126.x.x.x.

Class B addresses can have up to 65,354 hosts on a single network. Class B addresses are in this range: 128.1.x.x to 191.254.x.x.

Class C addresses can have up to 65,354 hosts on a single network. Class B addresses are in this range: 192.0.1.x to 223.255.254.x.

Page 274: Sever Monitoring

274 © 2010 Wipro Ltd – Internal & Restricted 274

TCP/IP Network Addressing

Netmask In each of the address classes previously described, the size of the two parts (network address and host address) is implied by the class. This partitioning scheme can also be expressed by a netmask associated with the IP address. A netmask is a 32-bit quantity that, when logically combined (using an AND operator) with an IP address, yields the network address. For instance, the netmasks for Class A, B, and C addresses are 255.0.0.0, 255.255.0.0, and 255.255.255.0, respectively. By looking at the addressing structures, you can see that even with a Class C address, there are a large number of hosts per network. Such a structure is an inefficient use of addresses if each end of a routed link requires a different network number. It is unlikely that the smaller office LANs would have that many devices. You can resolve this problem by using a technique known as subnet addressing.

Page 275: Sever Monitoring

275 © 2010 Wipro Ltd – Internal & Restricted 275

TCP/IP Network Addressing

Netmask Contd… The following table lists the additional subnet mask bits in dotted-decimal notation. To use the table, write down the original class netmask and replace the 0-value octets with the dotted-decimal value of the additional subnet bits. For example, to partition your Class C network with subnet mask 255.255.255.0 into 16 subnets (four bits), the new subnet mask becomes 255.255.255.240. The following table displays several common netmask values in both the dotted-decimal and the mask-length formats.

Page 276: Sever Monitoring

276 © 2010 Wipro Ltd – Internal & Restricted 276

VLAN & ARP

VLAN & Its Usage A virtual LAN, commonly known as a VLAN, is a group of hosts with a common set of requirements that communicate as if they were attached to the same broadcast domain, regardless of their physical location. A VLAN has the same attributes as a physical LAN, but it allows for end stations to be grouped together even if they are not located on the same network switch. Network reconfiguration can be done through software instead of physically relocating devices. VLANs are created to provide the segmentation services traditionally provided by routers in LAN configurations. VLANs address issues such as scalability, security, and network management. Routers in VLAN topologies provide broadcast filtering, security, address summarization, and traffic flow management. By definition, switches may not bridge IP traffic between VLANs as it would violate the integrity of the VLAN broadcast domain. This is also useful if someone wants to create multiple Layer 3 networks on the same Layer 2 switch. For example, if a DHCP server (which will broadcast its presence) was plugged into a switch it will serve any host on that switch that was configured to get its IP from a DHCP server. By using VLANs you can easily split the network up so some hosts won't use that DHCP server and will obtain link-local addresses, or obtain an address from a different DHCP server

Page 277: Sever Monitoring

277 © 2010 Wipro Ltd – Internal & Restricted 277

VLAN & ARP

ARP ARP (Address Resolution Protocol) is used to resolve the ethernet address of a NIC from an IP address in order to construct an ethernet packet around an IP data packet. This must happen in order to send any data across the network. An IP address alone cannot be used to deliver data from one LAN device to another. To send data between LAN devices, you must convert the IP address of the destination device to its MAC address. Each device on an Ethernet network has a unique MAC address, which is a 48-bit number assigned to each device by the manufacturer. The technique that associates the IP address with a MAC address is known as address resolution. Internet Protocol uses the Address Resolution Protocol (ARP) to resolve MAC addresses. If a device sends data to another station on the network and the destination MAC address is not yet recorded, ARP is used. An ARP request is broadcast onto the network. All stations (computers, for example) on the network receive and read the request. The destination IP address for the chosen station is included as part of the message so that only the station with this IP address responds to the ARP request. All other stations discard the request.

Page 278: Sever Monitoring

278 © 2010 Wipro Ltd – Internal & Restricted 278

Basic Definitions for L2 & L3 Networks

Layer 2 Networks: Basically a layer 2 switch operates utilizing Mac addresses in it's caching table to quickly pass information from port to port. A layer 3 switch utilizes IP addresses to do the same. A layer 2 switch is essentially a multiport bridge. A layer 2 switch will learn about MAC addresses connected to each port and passes frames marked for those ports. It also knows that if a frame is sent out a port but is looking for the MAC address of the port it is connected to and drop that frame. Whereas a single CPU Bridge runs in serial, today's hardware based switches run in parallel, translating to extremely fast switching. It includes terms like, VLAN, Spanning Tree etc.

Page 279: Sever Monitoring

279 © 2010 Wipro Ltd – Internal & Restricted 279

Basic Definitions for L2 & L3 Networks

Layer 3 Networks: The network layer provides the functional and procedural means of transferring variable length data sequences from a source to a destination via one or more networks, while maintaining the quality of service requested by the Transport layer. The Network layer performs network routing functions, and might also perform fragmentation and reassembly, and report delivery errors. Routers operate at this layer sending data throughout the extended network and making the Internet possible. This is a logical addressing scheme values are chosen by the network engineer. The best-known example of a layer 3 protocol is the Internet Protocol (IP). It manages the connectionless transfer of data one hop at a time, from end system to ingress router, to router to router, and from egress router to destination end system.

Page 280: Sever Monitoring

280 © 2010 Wipro Ltd – Internal & Restricted 280

Network Cabling

Ethernet Straight Cabling: The UTP cable contains eight conductors, arranged in four twisted pairs, and is terminated with an RJ45 type connector. A normal straight-through & Cross Over UTP Ethernet cable follows the EIA568B standard wiring as described below.

Note that here on the other end of cable we are using pin 3 & 6 in replacement of 1 & 2 and vice versa

Straight Through Cross Over

Page 281: Sever Monitoring

© 2010 Wipro Ltd – Internal & Restricted 281

Storage Basics

Page 282: Sever Monitoring

© 2009 Wipro Ltd - Confidential 282 © 2010 Wipro Ltd – Internal & Restricted 282

Objectives for this Unit

Understand Storage Basics

Introduce Direct Attached Storage

Differentiate between types of storage

– DAS

– NAS

– ISCSI

– SAN

Introduce Network Attached Storage

Introduce Fibre Channel SAN

Page 283: Sever Monitoring

© 2009 Wipro Ltd - Confidential 283 © 2010 Wipro Ltd – Internal & Restricted 283

A Few Storage Basics….

Where will data finally end up?

How will it get there?

What will it pass through?

Page 284: Sever Monitoring

© 2009 Wipro Ltd - Confidential 284 © 2010 Wipro Ltd – Internal & Restricted 284

Direct Attached Storage (Internal)

Computer System

CPU

Memory

Bus

I/O - RAID

Controller

Disk Drives

Page 285: Sever Monitoring

© 2009 Wipro Ltd - Confidential 285 © 2010 Wipro Ltd – Internal & Restricted 285

Direct Attached Storage (Internal)

Computer System

CPU

Memory

Bus

I/O - RAID

Controller

Disk Drives

12345

Data

Page 286: Sever Monitoring

© 2009 Wipro Ltd - Confidential 286 © 2010 Wipro Ltd – Internal & Restricted 286

Direct Attached Storage (Internal)

Computer System

CPU

Memory

Bus

I/O - RAID

Controller

Disk Drives

12345

Page 287: Sever Monitoring

© 2009 Wipro Ltd - Confidential 287 © 2010 Wipro Ltd – Internal & Restricted 287

DAS w/ internal controller and external storage

CPU

Memory

Bus

I/O - RAID

Controller

Computer System

Disk Drives

Disk Drives

Disk Drives

Disk Enclosure

12345

Page 288: Sever Monitoring

© 2009 Wipro Ltd - Confidential 288 © 2010 Wipro Ltd – Internal & Restricted 288

Comparing Internal and External Storage

Internal Storage

Server

Storage

RAID controllers

and disk drives

are internal to the

server

SCSI, ATA, or

SATA protocol

between controller

and disks

SCSI Bus w/ external storage

Server

RAID Controller

Storage

RAID Controller

Disk Drives

RAID controller is

internal

SCSI or SATA

protocol between

controller and

disks

Disk drives are

external

Disk Drives

Page 289: Sever Monitoring

© 2009 Wipro Ltd - Confidential 289 © 2010 Wipro Ltd – Internal & Restricted 289

DAS w/ external controller and external storage

Computer System

CPU

Memory

Bus

HBA

RAID

Controller

Storage System

Disk Drives

Disk Drives

Disk Drives

Disk Enclosure 12345

Page 290: Sever Monitoring

© 2009 Wipro Ltd - Confidential 290 © 2010 Wipro Ltd – Internal & Restricted 290

DAS over Fibre Channel

Server

HBA

Storage

Disk drives and

RAID controller

are external

Disk Drives

RAID Controller

HBA is internal

Fibre Channel

protocol

between HBAs

and external

RAID controller

External SAN Array

Page 291: Sever Monitoring

© 2009 Wipro Ltd - Confidential 291 © 2010 Wipro Ltd – Internal & Restricted 291

I/O Transfer

RAID Controller

– Contains the “smarts”

– Determines how the data will be written (striping, mirroring, RAID 10, RAID 5, etc.)

Host Bus Adapter (HBA)

– Simply transfers the data to the RAID controller.

– Doesn‟t do any RAID or striping calculations.

– “Dumb” for speed.

– Required for external storage.

Page 292: Sever Monitoring

© 2009 Wipro Ltd - Confidential 292 © 2010 Wipro Ltd – Internal & Restricted 292

Storage types

Single Disk Drive

JBOD

Volume

Storage Array

SCSI device

DAS

NAS

SAN

iSCSI

Page 293: Sever Monitoring

© 2009 Wipro Ltd - Confidential 293 © 2010 Wipro Ltd – Internal & Restricted 293

NAS: What is it?

Network Attached Storage

Utilizes a TCP/IP network to “share” data

Uses file sharing protocols like Unix NFS and Windows CIFS

Storage “Appliances” utilize a stripped-down OS that optimizes file protocol

performance

Page 294: Sever Monitoring

© 2009 Wipro Ltd - Confidential 294 © 2010 Wipro Ltd – Internal & Restricted 294

Networked Attached Storage

NAS Server

Storage

Server has a

Network Interface

Card

No RAID

Controller or HBA

in the server

Public or Private Ethernet

network

RAID Controller

Disk Drives

All data converted

to file protocol for

transmission (may

slow down

database

transactions)

Server

NIC NIC

Page 295: Sever Monitoring

© 2009 Wipro Ltd - Confidential 295 © 2010 Wipro Ltd – Internal & Restricted 295

iSCSI: What is it?

An alternate form of networked storage

Like NAS, also utilizes a TCP/IP network

Encapsulates native SCSI commands in TCP/IP packets

Supported in Windows 2003 Server and Linux

TCP/IP Offload Engines (TOEs) on NICs speed up

packet encapsulation

Page 296: Sever Monitoring

© 2009 Wipro Ltd - Confidential 296 © 2010 Wipro Ltd – Internal & Restricted 296

iSCSI Storage

iSCSI Storage

Server has a

Network Interface

Card or iSCSI

HBA

iSCSI HBAs use

TCP/IP Offload

Engine (TOE)

Public or Private Ethernet

network

RAID Controller

Disk Drives

SCSI commands

are encapsulated

in TCP/IP packets

Server

NIC or iSCSI HBA NIC or iSCSI HBA

Page 297: Sever Monitoring

© 2009 Wipro Ltd - Confidential 297 © 2010 Wipro Ltd – Internal & Restricted 297

Fibre Channel: What is it?

Fibre Channel is a network protocol implemented specifically for dedicated storage networks

Fibre Channel utilizes specialized

– Switches

– Host Bus Adapters

– RAID controllers

– Cables

Page 298: Sever Monitoring

© 2009 Wipro Ltd - Confidential 298 © 2010 Wipro Ltd – Internal & Restricted 298

switch

Fibre Channel Components

RAID Controller RAID Controller

switch

Servers

– Host Bus Adapters

Cables

– Fiber optic or copper

Fibre Channel Switches

– Two switches for redundancy

Fibre Channel Storage Array

– Two RAID Controllers for

redundancy

– 4–100+ disk drives per array

A true storage network

– Multiple servers

– Multiple switches

– Multiple Storage Arrays

Server A

HBA

Server B

HBA

Server C

HBA

Disk Drives

FC Storage Array

HBA HBA HBA

Page 299: Sever Monitoring

© 2009 Wipro Ltd - Confidential 299 © 2010 Wipro Ltd – Internal & Restricted 299

SAN: What is it?

Storage Area Network

A network whose primary purpose is the transfer of

data between storage systems and computer systems

Fibre Channel is the primary technology utilized for

SANs

Recently, SANs have been implemented with

dedicated iSCSI networks

Page 300: Sever Monitoring

© 2009 Wipro Ltd - Confidential 300 © 2010 Wipro Ltd – Internal & Restricted 300

Benefits of SAN/Consolidated Storage

Reduce cost of external storage

Increase performance

Centralized and improved tape backup

LAN-less backup

High-speed, no single-point-of-failure clustering solutions

Consolidation with > 70TB of storage

Page 301: Sever Monitoring

© 2009 Wipro Ltd - Confidential 301 © 2010 Wipro Ltd – Internal & Restricted 301

Fibre Channel Technology

Provides concurrent communications between servers, storage devices, and other peripherals

A gigabit interconnect technology

FC1: Over 1,000,000,000 bits per second

FC2: Over 2,000,000,000 bits per second

A highly reliable interconnect

Up to 127 devices (SCSI: 15)

Up to 10 km of cabling (3-15 ft. for SCSI)

Physical interconnect can be copper or fiber optic

Page 302: Sever Monitoring

© 2009 Wipro Ltd - Confidential 302 © 2010 Wipro Ltd – Internal & Restricted 302

Fibre Channel – (continued)

Hot-pluggable - Devices can be removed or added at will with no ill effects to data communications

Provides a data link layer above the physical interconnect, analogous to Ethernet

Sophisticated error detection at the frame level

Data is checked and resent if necessary

Page 303: Sever Monitoring

© 2009 Wipro Ltd - Confidential 303 © 2010 Wipro Ltd – Internal & Restricted 303

Fibre Channel – Frame Dissection

Up to 2048 byte

payload

4 byte checksum for

each frame

Page 304: Sever Monitoring

© 2009 Wipro Ltd - Confidential 304 © 2010 Wipro Ltd – Internal & Restricted 304

Fibre Channel

What‟s with the funny name?

– Some background history required

– Originally developed to only support fiber optic cabling

– When copper cabling support was added, ISO decided not to rename the technology

– ISO changed to the French spelling to reduce association with fiber optics only medium

Page 305: Sever Monitoring

© 2009 Wipro Ltd - Confidential 305 © 2010 Wipro Ltd – Internal & Restricted 305

Fibre Channel

How does it work?

– Serial interface

– Data is transferred across a single piece of medium at the fastest speed

supported

– No complex signaling required

Page 306: Sever Monitoring

© 2009 Wipro Ltd - Confidential 306 © 2010 Wipro Ltd – Internal & Restricted 306

Fibre Channel Interface Layers

Device Driver

SCSI Protocol

Fibre Channel

Fiber Optic or Copper Cabling

Page 307: Sever Monitoring

© 2009 Wipro Ltd - Confidential 307 © 2010 Wipro Ltd – Internal & Restricted 307

SCSI vs. Fibre Channel

Protocol

SCSI

– SCSI protocol vs. SCSI device

– SCSI is an established, tried and true protocol

– Provides services analogous to TCP/IP

– Supported in every major OS on market

Fibre Channel

– Fibre Channel runs on top of SCSI

– No re-inventing the wheel

– Immediate OS support

Page 308: Sever Monitoring

© 2009 Wipro Ltd - Confidential 308 © 2010 Wipro Ltd – Internal & Restricted 308

SCSI vs. FC Transmission

RAID Controller Disk Drive

Fibre Channel

SCSI

RAID Controller Disk Drive

Page 309: Sever Monitoring

© 2009 Wipro Ltd - Confidential 309 © 2010 Wipro Ltd – Internal & Restricted 309

SCSI vs. Fibre Channel

Interface for internal storage to external disks

Potential down time w/ SCSI

Single bus

RAID controller is SCSI hardware

Standards:

– Ultra2 (80 MB/sec)

– Ultra 160 (160 MB/sec)

– Ultra 320 (320 MB/sec)

Media specific (copper only)

SCSI Limitations:

– Cables can‟t be any longer than 3 feet for single ended; 15 feet for LVD (low voltage differential)

– No more than 15 devices on a SCSI bus

– # of disk drives

Used with SAN

Lots of built-in redundancy with connections

Redundant network

HBA is fibre channel hardware

Standards:

FC1: 100 MB/sec

FC2: 200 MB/sec

Provides a data link layer above the physical interconnect

Analogous to Ethernet

FC is a network of devices

It can be media independent- copper or fibre optic

Fibre Channel limitations:

Cable length: Up to 10 kilometers (more a limitation of cable than FC itself)

Up to 127 devices

# of disk drives

Page 310: Sever Monitoring

© 2009 Wipro Ltd - Confidential 310 © 2010 Wipro Ltd – Internal & Restricted 310

Fibre Channel vs. iSCSI

Fibre Channel – The current market leader for shared storage technologies

– Provides the highest performance levels

– Designed for mission-critical applications

– Cost of components is relatively high, particularly per server HBA costs

– Relatively difficult to implement and manage

iSCSI – Relatively new, but usage is increasing rapidly

– Performance can approach Fibre Channel speeds

– A better fit for databases than NAS

– A good fit for Small to Medium Size Businesses

– Relatively inexpensive, compared to Fibre Channel

– Relatively easy to implement and manage

Page 311: Sever Monitoring

© 2009 Wipro Ltd - Confidential 311 © 2010 Wipro Ltd – Internal & Restricted 311

Microsoft Simple SAN Initiative

Make operating system aware of SAN and SAN capabilities

Shift integration burden from IT staff or services back to VENDORS products: – Microsoft

– Storage hardware and software

– Application developers

Key storage technologies: – Volume Shadow Copy Service (VSS)

– Virtual Disk Service (VDS)

– Microsoft Multipath Input/Output (MPIO)

– Microsoft iSCSI driver • Software Initiator (client)

• Software Target (attached to disk subsystem)

Page 312: Sever Monitoring

© 2009 Wipro Ltd - Confidential 312 © 2010 Wipro Ltd – Internal & Restricted 312

Review

What is the difference between a RAID Controller and an HBA?

How many protocols may be used for DAS?

Name two types of storage that rely on ethernet cables

Name two benefits of SANs

Describe the four interface layers of the Fibre Channel protocol

Describe a scenario where an iSCSI SAN may be preferred over a Fibre Channel SAN

Page 313: Sever Monitoring

© 2009 Wipro Ltd - Confidential 313 © 2010 Wipro Ltd – Internal & Restricted 313

Summary

How data is routed through a server to I/O

Types of storage – DAS

– NAS

– iSCSI

– SAN

Benefits of SAN technology – Storage consolidation

– Reduced costs

– Centralized, LAN-free backup and restore

The Fibre Channel protocol – How it works

– Fibre Channel protocol vs. SCSI protocol

Comparing Fibre Channel SANs and iSCSI SANs – Fibre Channel SANs offer mission-critical performance, with relatively high costs and

high complexity

– iSCSI SANs offer moderate to high performance at an attractive price/performance ration and are relatively easy to administer

Page 314: Sever Monitoring

© 2010 Wipro Ltd – Internal & Restricted 314

Antivirus

Page 315: Sever Monitoring

© 2009 Wipro Ltd - Confidential 315 © 2010 Wipro Ltd – Internal & Restricted 315

Different types of threats

Virus

Trojan Horse

Worm

Blended attack

Expanded threat

False Positives

Page 316: Sever Monitoring

© 2009 Wipro Ltd - Confidential 316 © 2010 Wipro Ltd – Internal & Restricted 316

What is a virus?

A program written to alter the way a computer operates.

It will self execute its own code and place itself in the path of execution of

another program.

It must replicate itself

For example, it can replace other executables with a copy of the virus

infected file.

It can infect desktops and network servers alike.

Page 317: Sever Monitoring

© 2009 Wipro Ltd - Confidential 317 © 2010 Wipro Ltd – Internal & Restricted 317

Types of viruses

File infectors :-

They infect any program files, they come in through .exe and .com files. Examples are Jerusalem and cascade.

Boot sector viruses:-

It infects the system are of a disk, basically the boot record a floppy disk or a hard disk. Examples are Michelangelo and disk killer.

Master boot record viruses:-

They are almost same as the boot sector viruses, the only

difference between them is that where they load themselves. Such

infectors saves a copy of the MBR in a different location. The Pc‟s

infected with boot sector viruses and MBR viruses will not boot.

Example:-Unashamed, NYB, Antiexe .

Page 318: Sever Monitoring

© 2009 Wipro Ltd - Confidential 318 © 2010 Wipro Ltd – Internal & Restricted 318

Types of viruses

Multipartite Viruses:-

These are infections that infect both the program files and boot

records. These are difficult to remove, the infections from both the

locations should be removed or else they might re-infect any one of the

locations back again. Example:-One_Half,Emperor.

Macro viruses:-

These type of Viruses infect data files. They Have cost Corporations millions. The Evolution Of Visual Basic in 97,a macro Virus can be written that can infect data files. It infects MS Word, Excel, Power point. They are circulating good numbers across the world because of the ease with which they can be created. Ex:-W97M.Mellisa,W97M.NiceDay.

Page 319: Sever Monitoring

© 2009 Wipro Ltd - Confidential 319 © 2010 Wipro Ltd – Internal & Restricted 319

What is a Trojan Horse?

Trojan horses are impostors- files that claim to be something

desirable but, in fact, are malicious.

A major distinction between a Trojan and a virus is that the

former do not replicate themselves.

Trojans contain malicious code that when

triggered causes loss of data and even theft.

To get infected by a Trojan you must invite

such programs to your computer. Example :-

By downloading an E-mail attachment.

Trojan.Vundoo is one of the Trojans that

once infected becomes difficult to clean or

delete.

Page 320: Sever Monitoring

© 2009 Wipro Ltd - Confidential 320 © 2010 Wipro Ltd – Internal & Restricted 320

What is a Worm?

Worms replicate from system to system without use of a host file.

Worms Usually reside inside word or excel documents & the worm

will release a document that has the worm macro inside it. The

document will now move from computer to computer.

Page 321: Sever Monitoring

© 2009 Wipro Ltd - Confidential 321 © 2010 Wipro Ltd – Internal & Restricted 321

Troubleshooting Virus Infection

Case I: - Unknown Infection •Suspicious activity observed and no files detected •Activities such as pop ups, file creation, URL redirection, network congestion are observed. Troubleshoot/Locate the files responsible •Check netstat output for connections made to any unknown IP addresses. •View files based on their modified dates to check for recent changes made on the system ,typically in folders like /Windows/System32 , /Windows/System32/drivers •Check the registry HKeyLocalMachine\SOFTWARE\Microsoft\Windows\CurrentVersion\Runfor any startup entries made by the virus •Check the task manager for any unknown, random name processes running •Enable view for hidden files and folders

Page 322: Sever Monitoring

© 2009 Wipro Ltd - Confidential 322 © 2010 Wipro Ltd – Internal & Restricted 322

Troubleshooting Virus Infection

Case II: - Unable to clean •Virus detected but unable to clean/delete/quarantine •As seen in the virus logs files are detected but not cleaned/removed from the affected machines. Troubleshooting •If files are in the temporary internet folder then would be in use and may not get deleted. We recommend you to delete the contents of the temporary internet files folder. •Boot machine in safe mode and run a manual scan •Use tools from recognized AV vendors like Symantec, Mcafee and Trend Micro like:- •Mcafee Avert Stinger. •Trend Micro House call 7.1 •Norton Security Scanner from Symantec.

Page 323: Sever Monitoring

© 2009 Wipro Ltd - Confidential 323 © 2010 Wipro Ltd – Internal & Restricted 323

Troubleshooting Virus Infection

Case III: - Re-infection •Virus detected but re‐infection occurring in the network. •As seen in the virus logs files are detected and cleaned/removed from the affected machines but re‐infection occurring through shared folders/mapped drives or infected USB drives. Troubleshooting •Since malware are detected and taken care of in such a way that you may need to check the sources of re‐infection and security holes in the network responsible for them. •Check virus logs to look for the infection source of the malware. •Infection level in the network will not reduce until infection sources are eliminated.

Page 324: Sever Monitoring

© 2009 Wipro Ltd - Confidential 324 © 2010 Wipro Ltd – Internal & Restricted 324

Best Practices

•Ensure the latest Virus Pattern and Scan Engine versions are loaded in the Antivirus used.

•Disable system restore Option on windows XP/Vista.

•Apply latest Microsoft Patches on all windows machines.

•Enable mapped drive scanning especially during outbreaks of malware that Spread using Shared/mapped Folders.

•Use a firewall that will prevent incoming and outgoing malicious traffic.

•Enable schedule scanning daily in case of huge network outbreaks.

•Keep Temp, temporary internet files, prefetch and startup clean.

•Use a password on shares if the shares are commonly used or else remove the shares because this will reduce the spread of infections.

Page 325: Sever Monitoring

© 2009 Wipro Ltd - Confidential 325 © 2010 Wipro Ltd – Internal & Restricted 325

Best Practices on SEPM Installation

Page 326: Sever Monitoring

© 2009 Wipro Ltd - Confidential 326 © 2010 Wipro Ltd – Internal & Restricted 326

Best Practices on SEPM Installation

2. Open the IIS Manager as below:

3. Expand Local computer as below:

Page 327: Sever Monitoring

© 2009 Wipro Ltd - Confidential 327 © 2010 Wipro Ltd – Internal & Restricted 327

Best Practices on SEPM Installation

5. Right click on default website, click browse:

4. Expand to default website as below:

Page 328: Sever Monitoring

© 2009 Wipro Ltd - Confidential 328 © 2010 Wipro Ltd – Internal & Restricted 328

Best Practices on SEPM Installation

6. On clicking browse, the following screen will appear.

You shall proceed to install SEPM now…

7. Click setup to start the SEPM installation:

Page 329: Sever Monitoring

© 2009 Wipro Ltd - Confidential 329 © 2010 Wipro Ltd – Internal & Restricted 329

Best Practices on SEPM Installation

8. Select the install location and proceed:

9. Select the custom website option

and ensure TCP port is set to 8014:

Page 330: Sever Monitoring

© 2009 Wipro Ltd - Confidential 330 © 2010 Wipro Ltd – Internal & Restricted 330

Best Practices on SEPM Installation

10. Click Install to proceed with SEPM Installation & Complete it by clicking Finish:

Page 331: Sever Monitoring

© 2009 Wipro Ltd - Confidential 331 © 2010 Wipro Ltd – Internal & Restricted 331

Best Practices on SEPM Installation

10. Management server config. window will pop-up next, select Advanced and click next:

11. Select number of users based on site requirement:

Page 332: Sever Monitoring

© 2009 Wipro Ltd - Confidential 332 © 2010 Wipro Ltd – Internal & Restricted 332

Best Practices on SEPM Installation

12. Select Install my first site and click next:

13. Prefer keeping the default details & click next:

Page 333: Sever Monitoring

© 2009 Wipro Ltd - Confidential 333 © 2010 Wipro Ltd – Internal & Restricted 333

Best Practices on SEPM Installation

14. Give the Site name and click next:

15. Give an Encryption password and store it

somewhere as its used for Disaster recovery purpose:

Page 334: Sever Monitoring

© 2009 Wipro Ltd - Confidential 334 © 2010 Wipro Ltd – Internal & Restricted 334

Best Practices on SEPM Installation

16. Select the Database, based on the clients size and proceed:

17. Enter the SEPM console Admin password & click next:

Page 335: Sever Monitoring

© 2009 Wipro Ltd - Confidential 335 © 2010 Wipro Ltd – Internal & Restricted 335

Best Practices on SEPM Installation

18. Select No for Migration deployment

wizard & Finish the SEPM Installation:

Page 336: Sever Monitoring

© 2009 Wipro Ltd - Confidential 336 © 2010 Wipro Ltd – Internal & Restricted 336

Best Practices on SEP client Installation

1. Go to SEPM & click on Migration and Deployment wizard & click next :

2. Select Deploy the client & click next:

Page 337: Sever Monitoring

© 2009 Wipro Ltd - Confidential 337 © 2010 Wipro Ltd – Internal & Restricted 337

Best Practices on SEP client Installation

3. Specify the group name for which the SEP client has to be installed:

4. Prefer leaving the default options and click next:

Page 338: Sever Monitoring

© 2009 Wipro Ltd - Confidential 338 © 2010 Wipro Ltd – Internal & Restricted 338

Best Practices on SEP client Installation

5. Specify the Install package options & click next:

6. Click No to proceed with creating Install package:

Page 339: Sever Monitoring

© 2009 Wipro Ltd - Confidential 339 © 2010 Wipro Ltd – Internal & Restricted 339

Best Practices on SEP client Installation

7. You can push out the software from the push deployment wizard., thru the following exe file:

C:\Program Files\Symantec\Symantec Endpoint protection Manager\Tomcat\Bin\clientremote.exe

8. Click Next on the

Push deployment wizard:

Page 340: Sever Monitoring

© 2009 Wipro Ltd - Confidential 340 © 2010 Wipro Ltd – Internal & Restricted 340

Best Practices on SEP client Installation

9. Browse the created package, specify the concurrent deployments and click next:

10. Select the machine(s) for SEP

client deploymentt and click Add:

Page 341: Sever Monitoring

© 2009 Wipro Ltd - Confidential 341 © 2010 Wipro Ltd – Internal & Restricted 341

Best Practices on SEP client Installation

11. Enter the remote client authentication and click Finish:

12. SEP Software will start rolling

out to the selected client(s):

Page 342: Sever Monitoring

© 2010 Wipro Ltd - Internal & Restricted 342

Best Practices

Page 343: Sever Monitoring

© 2010 Wipro Ltd - Confidential 343 © 2010 Wipro Ltd - Internal & Restricted 343

SCSI Subsystem

The most important component – Termination. Ensure it is properly set at

Controller, each devices & SCSI Bus( Cable or Back Plane)

Ensure there is Terminators are available in both the end of the SCSI bus

Remove / Disable termination from devices if it is not the first or last

device.

Beware of External and Internal Connectors in the same channel, 50 and

68 Pin connectors in same channel

Always connect Booting HDD to the channel where the boot order is 0

Always better to connect booting device to lowest SCSI ID

Ensure the controller ID is set to 7. Do not change unless until it is really

required.

When connect 68 Pin HDD‟s to old SCSI controllers , use force SE jumper

if any issues for detecting device.

If SCSI HDD‟s are giving not ready error, use Auto Spin jumper in HDD to

resolve the same

Page 344: Sever Monitoring

© 2010 Wipro Ltd - Confidential 344 © 2010 Wipro Ltd - Internal & Restricted 344

Raid Subsystem

As most of the Raid controllers uses SCSI as HBA, all points on SCSI

will be applied for Raid also.

Same Make & Model HDD‟s are suggested in a Single Raid array.

Same RPMS are must if uses different model

Average Seek time is the another point to be noted, use similar or

nearest value HDD‟s only

Higher capacity drives will work perfectly if the Make and Model

series same.

HDD goes offline issue normally caused by SCSI bus or HDD

mismatch or One or more HDD‟s problem. This is not

caused by the Raid Controller

Never make any HDD online when the raid array or logical drive is

degraded and data is accessible.

Page 345: Sever Monitoring

© 2010 Wipro Ltd - Confidential 345 © 2010 Wipro Ltd - Internal & Restricted 345

When more than one HDD goes offline, identify the order in which the

HDD‟s gone offline and make the HDD‟s online manually in the reverse

order one by one, except the last one. Rebuild the last HDD and get the

array optimal

ZCR Cards works exactly like a normal raid controller, except the SCSI

channel will be used from motherboard.

All ZCR will not be compatible on all the motherboards. Choose the

compatible cards only.

ZCR Cards will not work in all the slots, only in one identified slot it will

work

When there is mismatch of raid configuration b/w NVRAM and HDD, always

go with HDD configuration.

It is advisable to take the backup before doing any operations in raid

controller. Specifically before doing an array Migration or expansion.

Expanded array only will give additional space in the raid volume. It is OS call

that how it should be utilized

Beware of Initialize option, it will destroy the data and no way to get it back

Raid Subsystem – Conti…

Page 346: Sever Monitoring

© 2010 Wipro Ltd - Confidential 346 © 2010 Wipro Ltd - Internal & Restricted 346

Host Raid

Host Raid supports only Raid 0, 1 & 10

Host Raid is indented to use for mirroring OS drive where the

performance is not the highest priority and the redundancy has the

priority.

Rebuilding of Host Raid arrays will take significantly more time than a

normal raid controller.

Host Raid SCSI controllers will publish the Raid Volumes to OS as well as

the individual drives which is not part of the Raid array, where as a normal

raid controller will publish only raid volumes to OS.

Host raid or a Normal Raid is not a replacement for Backup. Backup

should be taken even if Host raid or any other Raid is implemented. This is

indented to give redundancy in case of a HDD failure or / and to give

better performance.

Page 347: Sever Monitoring

© 2010 Wipro Ltd - Confidential 347 © 2010 Wipro Ltd - Internal & Restricted 347

At present Host raid will not support online array expansion or migration.

The raid configuration is written to HDD and when a M/B or SCSI

controller gets replaced with a same model the raid configuration gets

loaded from HDD to NVRAM.

In LSI SCSI controllers the NVRAM write error is normally caused by the

failure of one or more HDD.

For Adaptec Host raid the driver when the host raid is enabled and the

driver when the host raid is disabled is different. The non host raid driver

will not detect HDD‟s even if the array not created, but host raid is

enabled.

For SATA host raid the raid should be enabled from M/B Bios and then

only the raid BIOS will be present. Here also the driver with host raid

enabled and host raid disabled is different.

For Some host raid controller, the mirroring & striping is chosen by the IM

or IS option selected in the M/B BIOS

Host Raid – Conti…

Page 348: Sever Monitoring

© 2010 Wipro Ltd - Confidential 348 © 2010 Wipro Ltd - Internal & Restricted 348

Power Supply

Redundant power supply‟s has a non redundant part , ie the power back

plane, where the power supplies gets inserted.

The AC power to Redundant power supply preferably should be supplied

from separate UPS, but both the UPS must have common and dedicated

ground points.

When an RPS is giving wrong voltages, the part to be replaced is the

power back plane or SMPS with power back plane as the voltage

regulators are normally located at power back plane.

Always populate all 3 SMPS, when 2+1 redundant SMPS used in Servers

with Dual processors for redundancy.

DONOT SHORT any SMPS out puts to ground to start the SMPS

manually, unless it is clearly documented and communicated.

Page 349: Sever Monitoring

© 2010 Wipro Ltd - Confidential 349 © 2010 Wipro Ltd - Internal & Restricted 349

Never plan a UPS which is equal to SMPS wattage or sum of SMPS‟s

wattage as the in trust current while starting the SMPS will be more than

what is planned.

DO NOT OPEN SMPS.

If a M/B reports voltage errors, it is not a must that the SMPS always giving

the problem. It can be from the VRM‟s in the M/B also.

Only the total power wattage does matter while choosing SMPS, some

M/B‟s or Processors requires a minimum current rating for some particular

voltage lines.

Proper working of SMPS fan also is a critical requirement for server to

work reliably.

Power Supply – Conti…

Page 350: Sever Monitoring

© 2010 Wipro Ltd - Confidential 350 © 2010 Wipro Ltd - Internal & Restricted 350

Processor Issues

Fails very rarely, if proper heat sink and fan used. Ensure the cool air passes

through the heat sink and no obstacles which blocks the air flow.

Processor error may be reported when problem is there with M/B or VRM

Take extra care to avoid damage while removing & fixing.

Lot of processor related errors can be fixed by,

Re-fixing the heat sink with newly & properly applied heat sink

compound.

Enabling the processor retest in BIOS

Updating the BIOS to the latest stable one

Re – run the FRU-SDR utility, even if the loaded one is same.

Page 351: Sever Monitoring

© 2010 Wipro Ltd - Confidential 351 © 2010 Wipro Ltd - Internal & Restricted 351

Always refer processor spec no when check for replacement. Mixing of

TWO processors with more than one stepping difference is not

recommended even the all other spec matches.

DP and MP Xeon processors are different. Can be used in only dual

processor and Multi processor servers respectively

EM64T feature cannot be enabled or disabled in BIOS. It detects the state

automatically depends on the BIOS, OS and Drivers. HT can be disabled or

enabled in BIOS. Disable the same if the OS doesn't support it.

Processor utilization cannot be resolved always by adding or upgrading

processors, this may be due to IO wait or application issue.

Source of FRB errors may be M/B or Processor. But Source of Processor

BIST error is from Processor only.

Processor Issues – Conti..

Page 352: Sever Monitoring

© 2010 Wipro Ltd - Confidential 352 © 2010 Wipro Ltd - Internal & Restricted 352

Memory Issues

Don‟t mix Registered and Unbuffered Memory modules in the same

system.

Don‟t mix different capacity in the same bank

Different speed memory may support but not suggested

Don't MIX ECC and NON ECC memory. Also Ensure only ECC memory

is installed in the Boards which supports ECC.

Always populate higher capacity memory modules in the initial banks.

OS blue screen‟s always need not be memory issue. Use diagnostics tools

or Hardware event log to check ECC errors reported.

Beware of Dual ranking memories which may disable one unused memory

slot.

Increasing physical memory may not resolve the performance issues.

Installed memory should properly assigned for Databases or Applications

by OS. This may have to get fine tuned at OS or Database level.

Nearest Slots may not be forming the Bank. Refer manual.

Cooling to memory also important. Ensure the cool air passes through

memory modules.

Page 353: Sever Monitoring

© 2010 Wipro Ltd - Confidential 353 © 2010 Wipro Ltd - Internal & Restricted 353

Other issues

The best way to diagnose the other issues are

Check the system event log ( Hardware ) and analyze.

Use Server Management Software to monitor the server.

Use the Diagnostic tool supplied along with the Server to check the

Server.

If the latest event is not logged, save the existing log to a file and clear the

logs from NVRAM . Then check the new event log , once the problem re-

occur.

Run FRU SDR utility to ensure all sensors are set properly.

The following kind of errors in the SEL to be considered seriously.

Voltage & Temperature errors

SERR , PERR , NMI and ECC errors

Page 354: Sever Monitoring

© 2010 Wipro Ltd - Confidential 354 © 2010 Wipro Ltd - Internal & Restricted 354

Refer the beep codes and Diagnostic LED‟s status for any trouble shooting

A lot of startup issues, including no display errors can be resolved by clearing

the BIOS. Removing battery will not clear the BIOS. Shorting Battery leads

may cause damage to battery / M/B. Refer M/B manual to identify the

procedure to clear BIOS. This normally happens by shorting one jumper and

switching on the system.

No display / Not booting issues may get resolved by booting from alternate

BMC / BIOS which may be available in the M/B

BIOS recovery is another option to be tried out before replacing the M/B.

Special disk need to be created for the same. Normal BIOS update disks will

not be sufficient.

Other issues – Conti…

Page 355: Sever Monitoring

© 2010 Wipro Ltd - Internal & Restricted

Thank You


Top Related