hitachi unified storage operations guide · hitachi unified storage operations guide. ii ......

642
Changes in this revision Document Organization Contents FASTFIND LINKS MK-91DF8275-26 Hitachi Unified Storage Operations Guide

Upload: vanthuy

Post on 04-Jun-2018

261 views

Category:

Documents


3 download

TRANSCRIPT

  • Changes in this revision

    Document Organization

    Contents

    FASTFIND LINKS

    MK-91DF8275-26

    Hitachi Unified StorageOperations Guide

  • ii

    Operations Guide

    2012-2016 Hitachi, Ltd. All rights reserved.

    No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, or stored in a database or retrieval system for any purpose without the express written permission of Hitachi, Ltd. and Hitachi Data Systems Corporation (hereinafter referred to as Hitachi).

    Hitachi, Ltd. and Hitachi Data Systems reserve the right to make changes to this document at any time without notice and assume no responsibility for its use. Hitachi, Ltd. and Hitachi Data Systems products and services can only be ordered under the terms and conditions of Hitachi Data Systems' applicable agreements.

    All of the features described in this document may not be currently available. Refer to the most recent product announcement or contact your local Hitachi Data Systems sales office for information on feature and product availability.

    Notice: Hitachi Data Systems products and services can be ordered only under the terms and conditions of Hitachi Data Systems applicable agreements. The use of Hitachi Data Systems products is governed by the terms of your agreements with Hitachi Data Systems.

    Hitachi is a registered trademark of Hitachi, Ltd. in the United States and other countries. Hitachi Data Systems is a registered trademark and service mark of Hitachi in the United States and other countries.

    All other trademarks, service marks, and company names are properties of their respective owners.

    France Import pending completion of registration formalities

    Hong Kong Import pending completion of registration formalities

    Israel Import pending completion of registration formalities

    Russia Import pending completion of notification formalities

    Distribution Centers IDC, EDC and ADC cleared for exports

  • iii

    Hitachi Simple Modular Storage 100 Users Guide

    Table of Contents

    1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-1Navigator 2 overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2

    Navigator 2 features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2Security features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2Monitoring features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2Configuration management features . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2Data migration features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2Capacity features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-3General features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-3

    Navigator 2 benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-3Navigator 2 task flow. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-4

    Navigator 2 functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-5Browser security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-7Using the Navigator 2 online help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-7

    Use with Hitachi Command Suite . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-9

    2 System theory of operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-1Network standard and functions which the array supports . . . . . . . . . . . . . . . 2-2RAID features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-2

    RAID technology task flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-3RAID levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-3

    RAID chunks and stripes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-5Host volumes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-6

    Number of volumes per RAID group . . . . . . . . . . . . . . . . . . . . . . . . . . 2-7Volume management and controller I/O management . . . . . . . . . . . . . 2-7

    About the HUS Series of storage systems . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-7Recent features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-7

    Major controller features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-8Understanding Navigator 2 key terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-8Navigator 2 operating environment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-9

    Firewall considerations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-10Anti-virus software considerations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-10Hitachi Storage Command Suite common components . . . . . . . . . . . . . . .2-10

    3 Installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-1Connecting Hitachi Storage Navigator Modular 2 to the Host . . . . . . . . . . . . . . 3-2

    Installing Hitachi Storage Navigator Modular 2 . . . . . . . . . . . . . . . . . . . . . 3-2Preparation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-2

    Setting Linux kernel parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-5

  • iv

    Operations Guide

    Setting Solaris 8 or Solaris 9 kernel parameters . . . . . . . . . . . . . . . . . . .3-7Setting Solaris 10 kernel parameters. . . . . . . . . . . . . . . . . . . . . . . . . . .3-8

    Types of installations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-12Installing Navigator 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-13

    Getting started (all users) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-13Installing Navigator 2 on a Windows operating system . . . . . . . . . . . . . . . 3-14If the installation fails on a Windows operating system. . . . . . . . . . . . . . . 3-15Installing Navigator 2 on a Sun Solaris operating system . . . . . . . . . . . . . 3-15Installing Navigator 2 on a Red Hat Linux operating system . . . . . . . . . . . 3-16Updating Navigator 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-17Setting the server certificate and private key . . . . . . . . . . . . . . . . . . . . . . 3-18

    Preinstallation information for Storage Features. . . . . . . . . . . . . . . . . . . . . . . 3-20Environments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-20Storage feature requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-21Requirements for installing and enabling features . . . . . . . . . . . . . . . . . . 3-21

    Account Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-21Audit Logging requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-21Cache Partition Manager requirements . . . . . . . . . . . . . . . . . . . . . . . . 3-22Data Retention requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-22LUN Manager requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-22Password Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-22SNMP Agent requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-22Modular Volume Migration requirements . . . . . . . . . . . . . . . . . . . . . . . 3-23

    Installing storage features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-23Enabling storage features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-24Disabling storage features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-24

    Uninstalling storage features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-25Uninstalling Navigator 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-25Uninstalling when HCS V8.0.0 or greater is installed. . . . . . . . . . . . . . . . . . . . 3-27Starting Navigator 2 host and client configuration . . . . . . . . . . . . . . . . . . . . . 3-27

    Host side . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-27Client side . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-28

    For Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-28Changing JRE. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-28Changing JDK . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-30For Linux and Solaris . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-30

    Changing the Port Number for Applet Screen of Navigator 2 . . . . . . . . . 3-30Changing the Port Number for Starting Navigator 2 . . . . . . . . . . . . . . . 3-31Starting Navigator 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-33

    Operations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-35Setting an attribute. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-37Additional guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-37Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-38

    Understanding the Navigator 2 interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-40Menu Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-40

  • v

    Hitachi Simple Modular Storage 100 Users Guide

    Explorer Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-40Button panel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-41Page panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-41

    Performing Navigator 2 activities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-41Description of Navigator 2 activities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-43

    Stopping the Hitachi Storage Command Suite Common Components . . . . .3-46Starting the Hitachi Storage Command Suite Common Components . . . . . .3-47

    4 Provisioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-1Provisioning overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-2

    Provisioning wizards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-2Provisioning task flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-3

    Hardware considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-3Verifying your hardware installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-3Connecting the management console . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-3

    Logging in to Navigator 2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-4Selecting a storage system for the first time . . . . . . . . . . . . . . . . . . . . . . . . . 4-6

    Running the Add Array wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-6Running the Initial (Array) Setup wizard . . . . . . . . . . . . . . . . . . . . . . . . . 4-8

    Registering the Array in the Hitachi Storage Navigator Modular 2. . . . . . 4-8Initial Array (Setup) wizard configuring email alerts . . . . . . . . . . . . . 4-9Initial Array (Setup) wizard configuring management ports . . . . . . . .4-11Initial Array (Setup) wizard configuring host ports . . . . . . . . . . . . . .4-12Initial Array (Setup) wizard configuring spare drives . . . . . . . . . . . . .4-14Initial Array (Setup) wizard configuring the system date and time . . .4-14Initial Array (Setup) wizard confirming your settings. . . . . . . . . . . . .4-14

    Running the Create & Map Volume wizard . . . . . . . . . . . . . . . . . . . . . . . .4-15Manually creating a RAID group . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-15

    Using the Create & Map Volume Wizard to create a RAID group . . . . . . . .4-17Create & Map Volume wizard defining volumes . . . . . . . . . . . . . . . .4-18Create & Map Volume wizard defining host groups or iSCSI targets . .4-19Create & Map Volume wizard connecting to a host . . . . . . . . . . . . . .4-20Create & Map Volume wizard confirming your settings . . . . . . . . . . .4-21

    Provisioning concepts and environments . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-21About DP-Vols. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-21Changing DP-Vol Capacity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-21About volume numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-22About Host Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-23

    Creating Host Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-23Displaying Host Group Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-24

    About array management and provisioning . . . . . . . . . . . . . . . . . . . . . . .4-24About array discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-24Understanding the Arrays screen . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-24Add Array screen. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-25

  • vi

    Operations Guide

    Adding a Specific Array . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-25Adding Arrays Within a Range of IP Addresses . . . . . . . . . . . . . . . . . . 4-25

    Using IPv6 Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-26Notes on Using Hitachi Storage Navigator Modular 2 . . . . . . . . . . . . . . . . . . . 4-26

    5 Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-1Security overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-2Security features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-2

    Account Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-2Audit Logging. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-3Data Retention Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-3

    Security benefits. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-3Account Authentication overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-4

    Account Authentication features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-4Account Authentication benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-4Account Authentication caveats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-5Account Authentication task flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-5Account Authentication specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-8

    Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-8Account types. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-9Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-9Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-10Session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-12Session types for operating resources . . . . . . . . . . . . . . . . . . . . . . . . . 5-12

    Advanced Security Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-14Changing Advanced Security Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-14

    Account Authentication procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-15Initial settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-15Managing accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-15

    Displaying accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-15Adding accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-17

    Changing the Advanced Security Mode . . . . . . . . . . . . . . . . . . . . . . . . . . 5-18Modifying accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-19Deleting accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-21

    Changing session timeout length . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-22Forcibly logging out . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-23Setting and deleting a warning banner . . . . . . . . . . . . . . . . . . . . . . . . . . 5-23

    Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-25Audit Logging overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-27

    Audit Logging features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-27Audit Logging benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-27Audit Logging task flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-28Audit Logging specifications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-29What to log? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-30

  • vii

    Hitachi Simple Modular Storage 100 Users Guide

    Security of logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-30Pulling it all together . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-30

    Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-31Audit Logging procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-32

    Initial settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-32Optional operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-32Enabling Audit Log data transfers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-32Viewing Audit Log data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-34Initializing logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-35Configuring Audit Logging to an external Syslog server . . . . . . . . . . . . . . .5-35

    Data Retention Utility overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-36Data Retention Utility features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-36Data Retention Utility benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-36Data Retention Utility specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-37Data Retention Utility task flow. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-39

    Assigning access attribute to volumes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-40Read/Write . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-40Read Only . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-40Protect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-41Report Zero Read Cap. (Mode) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-41Invisible (Mode) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-41

    Retention terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-41Protecting volumes from copy operations . . . . . . . . . . . . . . . . . . . . . . . . . . .5-42

    Usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-43Volume access attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-43Unified volumes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-43SnapShot and TCE. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-43SYNCHRONIZE CACHE command . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-43Host Side application example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-44Operating System (OS) restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . .5-44Volume attributes set from the operating system . . . . . . . . . . . . . . . . .5-44

    Notes on usage. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-45Notes about unified LU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-45Notes About SnapShot and TCE . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-45Notes and restrictions for each operating system . . . . . . . . . . . . . . . . .5-46

    Operations example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-47Initial settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-47Configuring and modifying key settings . . . . . . . . . . . . . . . . . . . . . . . .5-47

    Data Retention Utility procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-48Optional procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-48Opening the Data Retention dialog box . . . . . . . . . . . . . . . . . . . . . . . . . .5-48Setting S-VOLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-50Setting expiration locks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-50Setting an attribute . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-51Changing the retention term . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-52

  • viii

    Operations Guide

    Setting the expiration lock . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-52Setting S-VOL Disable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-53

    6 Provisioning volumes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-1LUN Manager overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-2

    LUN Manager features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-2LUN Manager benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-3LUN Manager task flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-3

    For Fibre Channel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-3For iSCSI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-4

    Understanding preconfigured volumes . . . . . . . . . . . . . . . . . . . . . . . . . . .6-5LUN Manager specifications for Fibre Channel . . . . . . . . . . . . . . . . . . . . . . . . .6-5

    About iSCSI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-6Design configurations and best practices. . . . . . . . . . . . . . . . . . . . . . . .6-8

    Fibre Channel configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-9Conditions for Using LUN Manager for Fibre Channel . . . . . . . . . . . . . . . . .6-9Fibre Channel design considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-11

    Fibre system configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-11iSCSI system design considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-11

    iSCSI network port and switch considerations . . . . . . . . . . . . . . . . . . . 6-12Additional system design considerations . . . . . . . . . . . . . . . . . . . . . . . 6-13System topology examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-14

    Assigning iSCSI targets and volumes to hosts . . . . . . . . . . . . . . . . . . . . . 6-18Preventing unauthorized SAN access . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-20Avoiding RAID Group Conflicts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-21SAN queue depth setting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-22

    Increasing queue depth and port sharing . . . . . . . . . . . . . . . . . . . . . . 6-23Increasing queue depth through path switching. . . . . . . . . . . . . . . . . . 6-23

    LUN Manager procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-24Using Fibre Channel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-25Using iSCSI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-26

    Fibre Channel operations using LUN Manager . . . . . . . . . . . . . . . . . . . . . . . . 6-29About Host Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-29

    Adding host groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-30Enabling and disabling host group security . . . . . . . . . . . . . . . . . . . . . . . 6-30

    Creating and editing host groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-31Initializing Host Group 000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-35

    Deleting host groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-35Changing nicknames . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-37Deleting World Wide Names . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-37Copy settings to other ports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-38

    iSCSI operations using LUN Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-39Creating an iSCSI target . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-40Using the iSCSI Target Tabs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-40

  • ix

    Hitachi Simple Modular Storage 100 Users Guide

    Setting the iSCSI target security . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-43Editing iSCSI target nicknames. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-44Adding and deleting targets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-44About iSCSI target numbers, aliases, and names . . . . . . . . . . . . . . . . .6-49Editing target information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-50Editing authentication properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-51Initializing Target 000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-52Changing a nickname . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-52CHAP users. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-53Adding a CHAP user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-53Changing the CHAP user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-54

    Setting Copy to the Other Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-55Setting Information for Copying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-55Copying when iSCSI Target Creation . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-55Copying when iSCSI Target Editing . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-55

    7 Capacity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-1Capacity overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-2Cache Partition Manager overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-2

    Cache Partition Manager features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-2Cache Partition Manager benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-2Cache Partition Manager feature specifications. . . . . . . . . . . . . . . . . . . . . 7-3Confirming Environments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-3Cache Partition Manager task flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-3Operation task flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-4Stopping Cache Partition Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-4

    Pair cache partition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-5Partition capacity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-6Supported partition capacities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-7

    Segment and stripe size restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-9Specifying partition capacity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-10Using a large segment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-10Using load balancing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-11Using ShadowImage, Dynamic Provisioning, or TCE . . . . . . . . . . . . . . .7-11

    Installing Dynamic Provisioning/Dynamic Tiering when Cache Partition Manager is Used. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-11Adding or reducing cache memory . . . . . . . . . . . . . . . . . . . . . . . . . . .7-13

    Cache Partition Manager procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-14Confirming Environments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-14

    Initial settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-14Stopping Cache Partition Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-15

    Working with cache partitions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-15Adding cache partitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-16Deleting cache partitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-17

  • x

    Operations Guide

    Assigning cache partitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-17Setting a pair cache partition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-19Changing cache partitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-20Changing cache partitions owner controller . . . . . . . . . . . . . . . . . . . . . 7-21

    Installing SnapShot or TCE or Dynamic . . . . . . . . . . . . . . . . . . . . . . . . . . 7-22VMWare and Cache Partition Manager . . . . . . . . . . . . . . . . . . . . . . . . . . 7-23

    Cache Residency Manager overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-23Cache Residency Manager features . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-23Cache Residency Benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-24Cache Residency Manager task flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-24Cache Residency Manager Specifications. . . . . . . . . . . . . . . . . . . . . . . . . 7-25

    Termination Conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-26Disabling Conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-26Equipment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-27Volume Capacity. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-27

    Supported Cache Residency capacities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-29Restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-32

    Cache Residency Manager procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-33Confirming environments. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-33Initial settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-33Stopping Cache Residency Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-34Setting and canceling residency volumes. . . . . . . . . . . . . . . . . . . . . . . . . 7-34NAS Unit Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-35VMware and Cache Residency Manager . . . . . . . . . . . . . . . . . . . . . . . . . 7-36

    8 Performance Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-1Performance Monitor overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-2Monitoring features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-2Monitoring benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-3Monitoring task flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-3Monitoring feature specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-4

    Analysis bottlenecks of performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-5Launching Performance Monitor. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-6Performance Monitor procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-7

    Initial settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-7Optional operations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-7

    Optimizing system performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-8Obtaining information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-8Using graphic displays. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-8Working with the Performance Monitor Tree View . . . . . . . . . . . . . . . . . . 8-10More about Tree View items in Performance Monitor . . . . . . . . . . . . . . . . 8-12Using Performance Monitor with Dynamic Provisioning . . . . . . . . . . . . . . . 8-16Working with Graphing and Dynamic Provisioning . . . . . . . . . . . . . . . . . . 8-17

    Displayed Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-24

  • xi

    Hitachi Simple Modular Storage 100 Users Guide

    Determining the ordinate axis. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-26Saving monitored data. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-29Exporting Performance Monitor information . . . . . . . . . . . . . . . . . . . . . . .8-30Enabling performance measuring items . . . . . . . . . . . . . . . . . . . . . . . . . .8-33

    Working with port information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-35Working with RAID Group, DP Pool and volume information . . . . . . . . .8-35Working with cache information . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-35Working with processor information . . . . . . . . . . . . . . . . . . . . . . . . . .8-35

    Troubleshooting performance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-36Performance imbalance and solutions . . . . . . . . . . . . . . . . . . . . . . . . .8-36

    Dirty Data Flush . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-37

    9 SNMP Agent Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-1SNMP overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-2SNMP features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-2SNMP benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-3

    Environments and requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-4SNMP task flow. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-4

    SNMP versions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-5SNMP managers and agents. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-6Management Information Base (MIB) . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-6Object identifiers (OIDs) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-6SNMP command messages. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-7SNMP traps. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-9

    Supported configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-12Frame types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-13License key. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-13Installing Hitachi SNMP Agent Support . . . . . . . . . . . . . . . . . . . . . . . . . .9-13

    Hitachi SNMP Agent Support procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-15Preparing the SNMP manager. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-15Preparing the Hitachi modular storage array . . . . . . . . . . . . . . . . . . . . . .9-15

    Creating an operating environment file . . . . . . . . . . . . . . . . . . . . . . . .9-16Creating a storage array name file . . . . . . . . . . . . . . . . . . . . . . . . . . .9-22Registering the SNMP environment information . . . . . . . . . . . . . . . . . .9-22Registering the SNMP environment information . . . . . . . . . . . . . . . . . .9-24

    Confirming your setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-25Operational guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-26MIBs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-29

    Supported MIBs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-29MIB access mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-29OID assignment system. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-29Supported traps and extended traps . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-32

    MIB installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-35MIB II . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-35

  • xii

    Operations Guide

    system group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-36at group. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-40ip group. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-41icmp group. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-46tcp group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-46udp group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-46egp group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-46snmp group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-47

    Extended MIBs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-50dfSystemParameter group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-50dfWarningCondition group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-51dfCommandExecutionCondition group. . . . . . . . . . . . . . . . . . . . . . . . . 9-54dfPort group. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-56dfCommandExecutionInternalCondition group . . . . . . . . . . . . . . . . . . . 9-60

    Additional resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-62

    10 Virtualization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-1Virtualization overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-2

    Virtualization features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-2Virtualization task flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-2Virtualization benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-3

    Virtualization and applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-4Storage Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-5

    A sample approach to virtualization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-5Hitachi Dynamic Provisioning software . . . . . . . . . . . . . . . . . . . . . . . . . . 10-7Storage configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-8

    Redundancy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-8Zone configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-8

    Host Group configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-10One Host Group per ESX host, standalone host configuration . . . . . . . 10-10One Host Group per cluster, cluster host configuration . . . . . . . . . . . 10-10Host Group options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-10Virtual Disk and Dynamic Provisioning performance . . . . . . . . . . . . . 10-11

    Virtual disks on standard volumes . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-11

    11 Data-At-Rest Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-1Overview of Data-At-Rest Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-3

    Operation requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-10Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-15

    Operation example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-21Initial setup of Data-At-Rest Encryption . . . . . . . . . . . . . . . . . . . . . . . . 11-21Adding a drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-24Replacing a controller, Drive I/O Module (encryption), drive . . . . . . . . . . 11-26

  • xiii

    Hitachi Simple Modular Storage 100 Users Guide

    Deleting encryption keys to a RAID Group/DP Pool (crypt shredding) . . . .11-27Other provisioning. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-27

    Installing Data-At-Rest Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-28Uninstalling Data-At-Rest Encryption. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-30Disabling and enabling Data-At-Rest Encryption . . . . . . . . . . . . . . . . . . . . . .11-32Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-34

    Encryption environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-34Enabling the encryption environment . . . . . . . . . . . . . . . . . . . . . . . .11-38Disabling the encryption environment . . . . . . . . . . . . . . . . . . . . . . . .11-40Changing the encryption environment . . . . . . . . . . . . . . . . . . . . . . . .11-42When the Key Management Server is used . . . . . . . . . . . . . . . . . . . .11-44Procedure for creating a key secure root certificate . . . . . . . . . . . . . .11-46Procedure for creating a keyAuthority root certificate . . . . . . . . . . . . .11-46Procedure for creating a client certificate . . . . . . . . . . . . . . . . . . . . . .11-47Procedure for configuring Hitachi Storage Navigator Modular 2 . . . . . .11-49

    Creating encryption keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-54Creating encrypted RAID Groups/DP Pools . . . . . . . . . . . . . . . . . . . . . . . . .11-58

    Creating an encrypted RAID Group . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-58Creating an encrypted DP pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-61

    Deleting encrypted RAID Groups/DP pools. . . . . . . . . . . . . . . . . . . . . . . . . .11-64Deleting an encrypted RAID Group . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-64Deleting an encrypted DP pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-66

    Assigning encryption keys to drives. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-68Removing assigned keys from encrypted drives . . . . . . . . . . . . . . . . . . . . . .11-69Rekey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-72Connection test with Key Management Server . . . . . . . . . . . . . . . . . . . . . . .11-73Backing up encryption keys (file) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-76Backing up encryption keys (Key Management Server) . . . . . . . . . . . . . . . . .11-79Restoring encryption keys (File) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-83Restoring encryption keys (Key Management Server) . . . . . . . . . . . . . . . . . .11-85Deleting backup key and password on the Key Management Server. . . . . . . .11-88

    Deletion by Hitachi Storage Navigator Modular 2 . . . . . . . . . . . . . . . . . .11-89Deletion by the management software of the Key Management Server. . .11-92

    Deleting the backup key and its password (in Key Secure) . . . . . . . . .11-92Deleting the backup key and its password (in keyAuthority) . . . . . . . .11-93

    Setting the cluster of the Key Management Server . . . . . . . . . . . . . . . . . . . .11-94Procedure for setting the cluster (In Case of Key Secure) . . . . . . . . . . . .11-95

    Setting the Key Management Server A . . . . . . . . . . . . . . . . . . . . . . .11-95Setting the Key Management Server B. . . . . . . . . . . . . . . . . . . . . . . .11-96Operation performed by either Key Management Servers . . . . . . . . . .11-96

    Procedure for setting the cluster (for keyAuthority) . . . . . . . . . . . . . . . .11-97Backing up system key information on Key Management Server A . . . .11-97Preparing for the NFS server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-99Backing up the setting information on Key Management Server A . . . 11-100Restoring backup data of the system key information

  • xiv

    Operations Guide

    on Key Management Server A to Key Management Server B . . . . . . 11-101Restoring the backup of the setting information on Key Management Server A to Key Management Server B . . . . . . 11-102

    Instructing the cluster start on the Key Management Server . . . . . . . 11-103Procedure for releasing the cluster . . . . . . . . . . . . . . . . . . . . . . . . . 11-103

    Protecting volumes by the Key Management Server . . . . . . . . . . . . . . . . . . 11-104Precautions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-104Setting procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-109Procedure for starting the array . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-109Replacing or configuring change of Key Management Server. . . . . . . . . 11-111Replacing the Key Management Server . . . . . . . . . . . . . . . . . . . . . . . . 11-112Configuration change (IP address etc.) of Key Management Server . . . . 11-114

    Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-116Command line interface (CLI) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-120

    Installing Data-At-Rest Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-120Uninstalling Data-At-Rest Encryption . . . . . . . . . . . . . . . . . . . . . . . . . 11-121Disabling and enabling Data-At-Rest Encryption. . . . . . . . . . . . . . . . . . 11-122Creating encrypted RAID Groups/DP pools . . . . . . . . . . . . . . . . . . . . . 11-122

    Creating an encrypted RAID Group and encrypted volume . . . . . . . . 11-122Creating encrypted DP pools and encrypted volumes . . . . . . . . . . . . . . 11-124Deleting encrypted RAID Groups/DP pools . . . . . . . . . . . . . . . . . . . . . 11-125

    12 Special functions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-1Modular Volume Migration overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-2

    Modular Volume Migration Manager features . . . . . . . . . . . . . . . . . . . . . . 12-2Modular Volume Migration Manager benefits . . . . . . . . . . . . . . . . . . . . . . 12-2Modular Volume Migration task flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-2Modular Volume Migration Manager specifications . . . . . . . . . . . . . . . . . . 12-3Requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-6Supported capacity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-6Setting up Volume Migration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-7

    Setting volumes to be recognized by the host . . . . . . . . . . . . . . . . . . . 12-7Volume Migration components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-7

    Volume Migration pairs (P-VOLs and S-VOLs) . . . . . . . . . . . . . . . . . . . . . 12-8Reserved Volume . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-8DMLU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-8DMLU precautions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-9

    VxVM. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-11MSCS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-11AIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-11Windows 2000/Window Server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-12Linux and LVM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-12Windows 2000/Windows Server and Dynamic Disk. . . . . . . . . . . . . . . 12-12UNMAP Short Length Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-12

  • xv

    Hitachi Simple Modular Storage 100 Users Guide

    Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-12Using unified volumes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-13

    Using with the Data Retention Utility . . . . . . . . . . . . . . . . . . . . . . . . .12-14Using with ShadowImage. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-14Using with Cache Partition Manager . . . . . . . . . . . . . . . . . . . . . . . . .12-15Concurrent Use of Dynamic Provisioning . . . . . . . . . . . . . . . . . . . . . .12-16

    Concurrent Use of Dynamic Tiering . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-19Dirty Data Flush Limit number . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-19Load Balancing function. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-19Contents related to the connection with the host . . . . . . . . . . . . . . . . . .12-19

    Modular Volume Migration operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-21Managing Modular Volume Migration . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-22

    Pair Status of Volume Migration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-22Setting the DMLU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-22Removing the designated DMLU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-23Adding the designated DMLU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-23Adding reserved volumes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-24Deleting reserved volumes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-26Migrating volumes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-26Changing copy pace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-28Confirming Volume Migration Pairs . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-29Releasing Volume Migration pairs . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-30Canceling Volume Migration pairs . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-31

    Volume Expansion (Growth not LUSE) overview. . . . . . . . . . . . . . . . . . . . . .12-32Volume Expansion features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-32Volume Expansion benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-32Volume Expansion task flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-32Displaying Unified Volume Properties . . . . . . . . . . . . . . . . . . . . . . . . . .12-33

    Selecting new capacity. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-33Modifying a unified volume . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-33Add Volumes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-34Separate Last Volume . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-34Separate All Volumes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-35

    Power Savings overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-36Power Saving features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-36Power Saving benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-37Power Saving task flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-37

    Power Saving specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-39Estimated Spin-Up time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-44Power down best practices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-44

    Power saving procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-45Power down . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-45Power up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-45

    Power saving requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-45Start of the power down operation . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-45RAID groups that cannot power down. . . . . . . . . . . . . . . . . . . . . . . . . .12-46

  • xvi

    Operations Guide

    Things that can hinder power down or command monitoring . . . . . . . . . 12-46Number of times the same RAID group can be powered down . . . . . . . . 12-47Extended power down (health check) . . . . . . . . . . . . . . . . . . . . . . . . . . 12-47Turning off of the array. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-47Time required for powering up. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-47

    Operating system notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-48Advanced Interactive eXecutive (AIX) . . . . . . . . . . . . . . . . . . . . . . . . . . 12-48Linux . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-48Hewlett Packard UNIX (HP-UX) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-48Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-48Solaris . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-48

    Viewing Power Saving status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-50Powering down . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-53

    Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-54Powering up. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-55

    Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-56Viewing volume information in a RAID group . . . . . . . . . . . . . . . . . . . . . . . 12-56Failure notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-57Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-59Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-59HDPS AUX-Copy plus aging and retention policies . . . . . . . . . . . . . . . . . . . . 12-60HDPS Power Saving vaulting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-61HDPS sample scripts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-63

    Windows scripts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-64Power down and power up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-64Using a Windows power up and power down script . . . . . . . . . . . . . . 12-64Powering down. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-66Powering up. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-66

    UNIX scripts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-66Power down . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-66Power up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-67Using a UNIX power down and power up script . . . . . . . . . . . . . . . . . 12-68Powering down. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-69Powering up. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-69

    Power Saving Plus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-70Example of Power Saving Plus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-70

    Preparing to Use Power Saving Plus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-70Power Saving Plus Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-71About Power Savings Plus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-76Effect of Power Saving . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-77Drive Layout in RAID Group. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-77

    DBS/DBL/DBX. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-77General Power Saving Plus details . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-79

    Power Saving details by operating system . . . . . . . . . . . . . . . . . . . . . 12-81Notes on Failures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-82

  • xvii

    Hitachi Simple Modular Storage 100 Users Guide

    Notes on Hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-82Operations Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-83

    Example of operation in non I/O link mode . . . . . . . . . . . . . . . . . . . . . .12-83Example of operation in I/O link mode . . . . . . . . . . . . . . . . . . . . . . .12-83Removing Power Saving. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-84

    Operations of Power Saving Plus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-84Displaying Power Saving Information . . . . . . . . . . . . . . . . . . . . . . . . . .12-84Requesting Non I/O-linked Spin Down . . . . . . . . . . . . . . . . . . . . . . . . .12-86Requesting I/O-linked Spin Down . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-87Requesting I/O-linked Drive Power OFF . . . . . . . . . . . . . . . . . . . . . . . .12-87Requesting I/O-linked Spin Down with Drive Power OFF . . . . . . . . . . . .12-88Requesting Remove Power Saving (Spin Up) . . . . . . . . . . . . . . . . . . . . .12-89

    A Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-1Navigator 2 specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-2System requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-2

    Windows server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-2Virtual OS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-3Windows client settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-3Solaris (SPARC) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-4CPU: SPARC minimum 1 GHz (2 GHz or more is recommended) . . . . . . . . A-4

    Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-5HP-UX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-5AIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-6Linux . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-7

    Host. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-7Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-8

    IPv6 supported platforms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-11Considerations at Time of Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-13

    Volume formatting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-13Constitute array . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-14

    B Recording Navigator 2 Settings .....................................................B-1

  • xviii

    Operations Guide

  • Preface xix

    Hitachi Unified Storage Operations Guide

    Preface

    Welcome to the Hitachi Unified Storage Navigator Modular 2 (HSNM2) Operations Guide. This document describes how to use the Hitachi Unified Storage Navigator Modular storage system provisioning software.

    Please read this document carefully to understand how to use this product, and maintain a copy for reference purposes.

    This preface includes the following information:

    Intended audience

    Product version

    Changes in this revision

    Changes in this revision

    Document Organization

    Related documents

    Document conventions

    Convention for storage capacity values

    Accessing product documentation

    Getting help

    Comments

  • xx Preface

    Hitachi Unified Storage Operations Guide

    Intended audienceThis document is intended for system administrators, Hitachi Data Systems representatives, and authorized service providers who install, configure, and operate Hitachi Unified Storage systems.

    This document assumes the following: The user has a background in data processing and understands storage

    systems and their basic functions. The user has a background in data processing and understands

    Microsoft Windows and their basic functions. The user has a background in data processing and understands Web

    browsers and their basic functions.

    Product versionThis document applies to Hitachi Unified Storage firmware version 0981/D and to HSNM2 version 28.12 or later.

    Changes in this revision Updated Chapter 11, Data-At-Rest Encryption.

    Document OrganizationThumbnail descriptions of the chapters are provided in the following table. Click the chapter title in the first column to go to that chapter. The first page of every chapter or appendix contains links to the contents.

    Chapter Title Description

    Chapter 1, Introduction Describes an overview of the product

    Chapter 2, System theory of operation Describes how to install and enable Hitachi Unified Storage provisioning features.

    Chapter 3, Installation Describes the basic flow of tasks involved with setting up provisioning software for Hitachi Unified Storage systems.

    Chapter 4, Provisioning Describes how to provision the Hitachi Unified Storage systems.

    Chapter 5, Security Describes account authentication and audit log features that provide intruder filtering safety for Hitachi Unified Storage systems.

    Chapter 6, Provisioning volumes Describes how to configure volumes for your storage system.

    Chapter 7, Capacity Describes how to set up cache partitions and work with cache residency items.

    Chapter 8, Performance Monitor Describes how to monitor the Hitachi Unified Storage systems.

  • Preface xxi

    Hitachi Unified Storage Operations Guide

    Related documentsThis documentation set consists of the following documents.

    Hitachi Unified Storage Firmware Release Notes, RN-91DF8304Contains late-breaking information about the storage system firmware.

    Hitachi Storage Navigator Modular 2 Release Notes, RN-91DF8305Contains late-breaking information about the Navigator 2 software. Read the release notes before installing and using this product. They may contain requirements and restrictions not fully described in this document, along with updates and corrections to this document.

    Hitachi Unified Storage Getting Started Guide, MK-91DF8303Describes how to get Hitachi Unified Storage systems up and running in the shortest period of time. For detailed installation and configuration information, refer to the Hitachi Unified Storage Hardware Installation and Configuration Guide.

    Hitachi Unified Storage Hardware Installation and Configuration Guide, MK-91DF8273

    Contains initial site planning and pre-installation information, along with step-by-step procedures for installing and configuring Hitachi Unified Storage systems.

    Chapter 9, SNMP Agent Support Describes how to configure Simple Network Manage Protocol to manage a distributed network of storage systems from a single, centralized location.

    Chapter 10, Virtualization Describes how to create virtual sessions for storage system configuration.

    Chapter 11, Data-At-Rest Encryption Describes how to use the Data-At-Rest Encryption option with a Hitachi Unified Storage 150 array to encrypt data.

    Chapter 12, Special functions Describes how to configure storage systems using Modular Volume Migration Manager, Data Retention, Power Savings, and Data Migration, Volume Expansion and Shrinking, RAID Group Expansion, DP VOL Expansion, Mega Volumes, USP, and VSP.

    Appendix A, Specifications Describes specifications.

    Appendix B, Recording Navigator 2 Set-tings

    Provides a worksheet for your network settings.

    HSNM2 also provides a command-line interface that lets you perform operations by typing commands from a command line. For information about using the Dynamic Provisioning command line, refer to the Hitachi Unified Storage Command Line Interface Reference Guide.

    Chapter Title Description

  • xxii Preface

    Hitachi Unified Storage Operations Guide

    Hitachi Unified Storage Hardware Service Guide, MK-91DF8302Provides removal and replacement procedures for the components in Hitachi Unified Storage systems.

    Hitachi Unified Storage Operations Guide, MK-91DF8275 this document

    Describes the following topics:- Adopting virtualization with Hitachi Unified Storage systems- Enforcing security with Account Authentication and Audit Logging.- Creating DP-Vols, standard VOLs, Host Groups, provisioning

    storage, and utilizing spares- Tuning storage systems by monitoring performance and using

    cache partitioning- Monitoring storage systems using email notifications and Hi-Track- Using SNMP Agent and advanced functions such as data retention

    and power savings- Using functions such as data migration, VOL Expansion and VOL

    Shrink, RAID Group expansion, DP pool expansion, and Mega VOLs

    Hitachi Unified Storage Replication User Guide, MK-91DF8274Describes how to use the four types of Hitachi replication software to meet your needs for data recovery:- ShadowImage In-system Replication- Copy-on-Write SnapShot- TrueCopy Remote Replication- TrueCopy Extended Distance

    Hitachi Unified Storage Command Control Interface Installation and Configuration Guide, MK-91DF8306

    Describes Command Control Interface installation, operation, and troubleshooting.

    Hitachi Unified Storage Dynamic Provisioning Configuration Guide, MK-91DF8277

    Describes how to use virtual storage capabilities to simplify storage additions and administration.

    Hitachi Unified Storage Command Line Interface Reference Guide, MK-91DF8276

    Describes how to perform management and replication activities from a command line.

  • Preface xxiii

    Hitachi Unified Storage Operations Guide

    Document conventionsThe following typographic conventions are used in this document.

    This document uses the following symbols to draw attention to important safety and operational information.

    The following abbreviations for Hitachi Program Products are used in this document.

    Convention Description

    Bold Indicates text on a window, other than the window title, including menus, menu options, buttons, fields, and labels. Example: Click OK.

    Italic Indicates a variable, which is a placeholder for actual text provided by you or the system. Example: copy source-file target-fileAngled brackets (< >) are also used to indicate variables.

    screen or code

    Indicates text that is displayed on screen or entered by you. Example: # pairdisplay -g oradb

    < > angled brackets

    Indicates a variable, which is a placeholder for actual text provided by you or the system. Example: # pairdisplay -g

    Italic font is also used to indicate variables.

    [ ] square brackets

    Indicates optional values. Example: [ a | b ] indicates that you can choose a, b, or nothing.

    { } braces Indicates required or expected values. Example: { a | b } indicates that you must choose either a or b.

    | vertical bar Indicates that you have a choice between two or more options or arguments. Examples:[ a | b ] indicates that you can choose a, b, or nothing.{ a | b } indicates that you must choose either a or b.

    underline Indicates the default value. Example: [ a | b ]

    Symbol Meaning Description

    Tip Tips provide helpful information, guidelines, or suggestions for performing tasks more effectively.

    Note Notes emphasize or supplement important points of the main text.

    Caution Cautions indicate that failure to take a specified action could result in damage to the software or hardware.

    Abbreviation Description

    ShadowImage ShadowImage In-system Replication

    SnapShot Copy-on-Write SnapShot

  • xxiv Preface

    Hitachi Unified Storage Operations Guide

    Convention for storage capacity valuesPhysical storage capacity values (for example, disk drive capacity) are calculated based on the following values:

    Logical storage capacity values (for example, logical device capacity) are calculated based on the following values:

    Accessing product documentationThe Hitachi Unified Storage user documentation is available on the HDS Support Portal: https://portal.hds.com. Please check this site for the most current documentation, including important updates that may have been made after the release of the product.

    TrueCopy A term used when the following terms do not need to be distinguished:

    True Copy True Copy Extended Distance True Copy remote replication

    TCE TrueCopy Extended Distance

    Volume Migration Modular Volume Migration

    Navigator 2 Hitachi Storage Navigator Modular 2

    Abbreviation Description

    Physical capacity unit Value

    1 KB 1,000 bytes

    1 MB 1,000 KB or 1,0002 bytes

    1 GB 1,000 MB or 1,0003 bytes

    1 TB 1,000 GB or 1,0004 bytes

    1 PB 1,000 TB or 1,0005 bytes

    1 EB 1,000 PB or 1,0006 bytes

    Logical capacity unit Value

    1 block 512 bytes

    1 KB 1,024 (210) bytes

    1 MB 1,024 KB or 10242 bytes

    1 GB 1,024 MB or 10243 bytes

    1 TB 1,024 GB or 10244 bytes

    1 PB 1,024 TB or 10245 bytes

    1 EB 1,024 PB or 10246 bytes

    https://portal.hds.com

  • Preface xxv

    Hitachi Unified Storage Operations Guide

    Getting helpThe Hitachi Data Systems customer support staff is available 24 hours a day, seven days a week. If you need technical support, please log on to the HDS Support Portal for contact information: https://portal.hds.com

    CommentsPlease send us your comments on this document:[email protected]. Include the document title, number, and revision, and refer to specific sections and paragraphs whenever possible.

    Thank you!

    https://[email protected]

  • xxvi Preface

    Hitachi Unified Storage Operations Guide

  • Introduction 11

    Hitachi Unified Storage Operations Guide

    1Introduction

    This chapter provides an introduction to the Storage Navigator Modular 2 (Navigator 2).

    The topics covered in this chapter are:

    Navigator 2 overview

    Navigator 2 functions

  • 12 Introduction

    Hitachi Unified Storage Operations Guide

    Navigator 2 overviewThe Hitachi Data Systems Navigator 2 empowers you to take advantage of the full power of your Hitachi storage systems. Using Navigator 2, you can configure and manage your storage assets from a local host and from a remote host across an Intranet or TCP/IP network to ensure maximum data reliability, network up-time, and system serviceability.

    The role that the Navigator 2 management console plays is to provide views of feature settings on the storage system in addition to enabling you to configure and manage those features. The following section provides more detail about what features Navigator 2 provides to optimize your experience with the Hitachi Unified Storage system.

    Navigator 2 featuresNavigator 2 provides the features detailed in the following sections.

    Security features Account Authentication - Account authentication and audit logging

    provide access control to management functions. Audit Logging - Records all system changes. SAN Security - SAN security software helps ensure security in open

    systems storage area networking environments through restricted server access.

    Monitoring features Performance Monitor - Performance monitoring software allows you

    to see performance within the storage system.

    Configuration management features LUN Manager - Software that manages volumes streamlines

    configuration management processes by allowing you to define, configure, add, delete, expand, revise and reassign VOLs to specific paths without having to reboot your storage system.

    Replication Software - Replication setup and management feature provides basic configuration and management of Hitachi ShadowImage products, Hitachi Copy-on-Write Snapshot software and Hitachi TrueCopy mirrored pairs.

    System Maintenance - System maintenance feature allows online controller microcode updates and other system maintenance functions.

    SNMP - Simple Network Management Protocol (SNMP) function agent support includes MIBs specific to Hitachi Data Systems and enables SNMP-based reporting on status and alerts for Hitachi storage systems.

    Data migration features Modular Volume Migration Manager - Modular volume migration

    software enables dynamic data migration.

  • Introduction 13

    Hitachi Unified Storage Operations Guide

    Cache Residency Manager - This feature allows you to "lock" and "unlock" data into a cache in real time for optimal access to your most frequently accessed data.

    Capacity features Cache Partition Manager - This feature allows the application to

    partition the cache for improved performance. RAID Group Expansion - Online RAID group expansion feature

    enables dynamic addition of HDDs to a RAID group.

    General features Point and click GUI - Point-and-click graphical interface with initial

    set-up wizards that simplifies configuration, management, and visualization of Hitachi storage systems.

    Real-time view of environment - An immediate view of available storage and current usage.

    Deployment efficiency - Efficient deployment of storage resources to meet business and application needs, optimize storage productivity, and reduce the time required to configure storage systems and balance I/O workloads.

    Access protection - Protection of access to information by restricting storage access at the port level, requiring case-sensitive password logins, and providing secure domains for application-specific data.

    Data redundancy - Protection of the information itself by letting you configure data-redundancy and assign hot spares.

    System management - functions for Hitachi storage systems, such as storage system status, event logging, email alert notifications, and statistics.

    Major platform compatibility - Compatibility with Microsoft Windows, UNIX, and Linux environments.

    Online help - Online help to enable easy access to information about use of features.

    Command Line Interface - A full featured and scriptable command line interface. For more information, refer to the Hitachi Unified Storage Command Line Interface Reference Guide.

    Navigator 2 benefitsNavigator 2 provides the following benefits: Simplification - Simplifies storage configuration and management for

    the HUS family of storage systems. Access protection - Protects access to information by allowing secure

    permission to assigned storage Performance enhancement - Enhances data access performance to

    key applications and protects data availability of mission-critical information

  • 14 Introduction

    Hitachi Unified Storage Operations Guide

    Optimization of data retrieval - Optimizes storage administrator productivity by reducing the time required to configure storage systems and balance I/O workloads

    Enables integration - Facilitates integration of Hitachi storage systems with enterprise management products

    Cost reduction - Reduces storage costs. Long-term planning enabler - Improves the organizations long-term

    sustainable business strategy. Establishment of metrics - Identifies clear metrics with a full analysis

    of the payback period and savings potential. Capacity provisioning - Provisions content storage capacity to

    organizations and to post production end users.

    Navigator 2 task flowThis section details the task flow associated with the Navigator 2 Management Console.1. You install and provision a Hitachi Unified Storage system2. You install Navigator 2.3. Using Navigator 2, you access data on your host systems.4. You store data in the HUS system.5. You create volumes and assign pieces of the stored data to volumes.6. You partition portions of the cache on the HUS and assign data to the

    partitions.7. You set up Performance Monitor to view and monitor activity on the

    Hitachi Unified Storage system.8. You set up SNMP Agent Function to generate traps when certain

    thresholds have been exceeded.9. You set up the Audit Logging function to send logs to the syslog when

    certain events occur.

  • Introduction 15

    Hitachi Unified Storage Operations Guide

    Figure 1-1 shows how Navigator 2 connects directly to the front-end controller of the HUS family storage system.

    Figure 1-1: Navigator 2 task flow

    The front-end controller communicates to the back-end controller of the storage system, which in turn, communicates with the Storage Area Network (SAN), often a Fibre Channel switch. Hosts or application servers contact the SAN to retrieve data from the storage system for use in applications, commonly databases and data processing programs.

    Navigator 2 functionsTable 1-1 details the various functions.

    Table 1-1: Function details

    Category Function Name Description Notes Online Usage

    Components Component status display Displays the status of a component such as tray. Yes

    Groups

    RAID Groups RAID group: Creates, deletes, or displays a RAID group. Yes

    VOL creation: Used to add a volume. A new volume is added by specifying its capacity.

    Yes

    VOL deletion: Deletes the defined volume. User data is deleted. Yes

    VOL formatting: Required to make a defined volume accessible by the host. Writes null data to the specified volume, and deletes user data.

    Yes

  • 16 Introduction

    Hitachi Unified Storage Operations Guide

    Host Groups Review, operate, and set host groups. Yes

    iSCSI Targets Review, operate, and set iSCSI targets. Yes

    Settings

    iSCSI Settings View and configure iSCSI ports. Yes

    FC Settings View and configure FC ports. Yes

    Port Options View and configure port options. Yes

    Spare Drives View, add, or remove spare drives. Yes

    Licenses View, install, or de-install licensed storage features. Yes

    Command devices View and configure command devices. Yes

    DMLUView and configure the Differential management volumes for replication/migration.

    Yes

    SNMP Agent View and configure SNMP Agent Support Function Yes

    LAN View and configure LAN. Yes

    Drive Recovery View and configure options to recovery drives. Yes

    Constitute Array Input and output constitute array parameters. Yes

    System Parameters

    View and configure system parameters Yes

    Verification Settings

    View and configure verification for the drive and cache. Yes

    Parity Correction Recovery parity status of the volumes. Yes

    Mapping Guard View and configure Mapping Guard for the volumes Yes

    Mapping Mode View and configure mapping mode. Yes

    Boot Options View and configure boot options

    Array must be restarted to enable the settings.

    Yes

    Format Mode View and configure format mode for the volume. Yes

    Firmware Refer/update firmware.

    Array must be restarted to enable the settings.

    Yes

    E-mail Alert View and configure E-mail Alert function in the array. Yes

    Date & Time View and configure the Date & Time in the array. Yes

    Advanced Settings View and configure advanced settings. Yes

    Table 1-1: Function details

    Category Function Name Description Notes Online Usage

  • Introduction 17

    Hitachi Unified Storage Operations Guide

    Browser securityDepending on the setting of the browser security, the Hitachi Storage Navigator Modular 2 screen might not appear or might not be displayed correctly. In addition, the message "DMEG000220: Cannot display because JRE is not installed or it is disabled. Please install the JRE or enable it and try again." will appear.

    If using Internet Explorer 6 or later, register the IP address or host name of the server running Hitachi Storage Navigator Modular 2 in the browsers Trusted sites setting. Also, use the default setting for "Trusted sites" security. If it is not default setting, check that the following items are enabled in "Trusted sites" security (they are enabled by default). Run ActiveX controls and plug-ins Script ActiveX controls marked safe for scripting Active scripting Submit nonencrypted form data

    Using the Navigator 2 online helpThis document covers many, but not all, of the features in Navigator 2 software. Therefore, if you need information about a Navigator 2 function that is not included in this document, please refer to the Navigator 2 online help in the Navigator GUI. To access the help, click the Help button on the Navigator 2 GUI and select Help. For convenience, the Help button is available regardless of the window displayed in Navigator 2.

    The online help provides several layers of assistance. The Contents tab shows how the help topics are organized. You can

    drill down the topics to quickly find the support topic you are looking for, and then click a topic to view it.

    Security Secure LAN Set the SSL certificate and validity/invalidity of the normal port. Yes

    PerformanceMonitoring View and output the monitored performance in the array. Yes

    Tuning Parameter Configure the parameter to performance in the array. Yes

    Alerts & Events - Displays the alerts and events. Yes

    Error Monitoring

    Report when a failure occurs and controller status display

    Polls the array and displays the status. If an error is detected, it is output into log.

    Contact your maintenance personal.

    Yes

    Table 1-1: Function details

    Category Function Name Description Notes Online Usage

  • 18 Introduction

    Hitachi Unified Storage Operations Guide

    The Index tab lets you search for information related to a keyword. Type the keyword in the field labeled Type in the keyword to find: and the nearest match in the Index is highlighted. Click an index entry to see the topics related to the word. Click a topic to view it. If only one topic is related to an index entry, it appears automatically when you click the entry.

    The Search tab lets you scan through every help topic quickly for the word or words you are l