Dell EqualLogic Group Manager Administrator’s Guide PS Series Firmware Version 10.0 FS Series Firmware Version 4.
Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. Copyright © 2018 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries.
Contents About This Manual........................................................................................................... 24 Audience.......................................................................................................................................................................... 24 Related Documentation....................................................................................................................................................
About NAS Containers..................................................................................................................................................... 50 About the NAS Reserve................................................................................................................................................... 50 3 Set Up the iSCSI SAN................................................................................................... 52 4 Post-Setup Tasks.......................
About Single Sign-On....................................................................................................................................................... 77 Check Server and Single Sign-On Configuration.........................................................................................................77 Use Single Sign-On to Log In to a PS Series Group....................................................................................................
Authenticate Initiators with CHAP................................................................................................................................... 117 Display Local CHAP Accounts....................................................................................................................................117 Create a Local CHAP Account...................................................................................................................................
Delete a Storage Pool......................................................................................................................................................134 About Groupwide Volume Defaults..................................................................................................................................134 Modify Groupwide Volume Settings..........................................................................................................................
Delete Volume Folders.............................................................................................................................................. 149 About Restoring Deleted Volumes.................................................................................................................................. 150 Enable or Disable Volume Undelete...........................................................................................................................
Delete a Storage Container............................................................................................................................................. 170 Virtual Machines Tab.......................................................................................................................................................170 11 NAS Operations.......................................................................................................... 172 12 NAS Cluster Operations...........
Update NAS Controller Firmware..............................................................................................................................189 Cleanly Shut Down a NAS Controller Pair....................................................................................................................... 189 14 NAS Container Operations.......................................................................................... 191 Create a NAS Container............................................
How NAS Antivirus Protects Data............................................................................................................................208 NAS Antivirus Server Specifications........................................................................................................................ 209 Add a NAS Antivirus Server.....................................................................................................................................
Reinstall FS Series Firmware v4 from an Internal USB.....................................................................................................231 16 About Backing Up and Protecting Your Data.............................................................. 232 About Volume Data Protection....................................................................................................................................... 232 Protect NAS Container Data with NDMP.......................................
Convert a Failback Replica Set to an Inbound Replica Set........................................................................................ 277 Make a Temporary Volume Available on the Secondary Group....................................................................................... 278 Replicate a Recovery Volume to the Primary Group....................................................................................................... 278 Where to Go from Here......................................
Pause Synchronous Replication (SyncRep).....................................................................................................................316 Resume Synchronous Replication (SyncRep)..................................................................................................................317 Enable Synchronous Replication (SyncRep) for a Volume Collection...............................................................................
Monitor a Specific Member......................................................................................................................................335 Monitor Control Modules......................................................................................................................................... 336 Monitor Disk Drives..................................................................................................................................................
About Replication...........................................................................................................................................................365 About Volumes...............................................................................................................................................................366 Access Control List Panel.......................................................................................................................................
Configure DMA Servers Dialog Box................................................................................................................................ 401 Configure DNS Dialog Box.............................................................................................................................................. 401 Configure Member Wizard..............................................................................................................................................
Delete Local Group Message..........................................................................................................................................440 Delete Local User Message............................................................................................................................................ 440 Delete NAS Cluster Message.........................................................................................................................................
Group Disk Space Panel................................................................................................................................................. 459 Group Disk Space Panel................................................................................................................................................. 459 Group Information Panel................................................................................................................................................
Modify Passwords Dialog Box (for Replication)..............................................................................................................485 Modify Policy Dialog Box................................................................................................................................................485 Modify Quota Dialog Box...............................................................................................................................................
NAS Replications Detected............................................................................................................................................. 515 NAS Reserve Panel.........................................................................................................................................................515 NAS SAN Panel..........................................................................................................................................................
Remote Replicas Panel (Outbound Collections)............................................................................................................. 544 Remote Replicas Panel (Outbound Collections)............................................................................................................. 544 Remote Replicas Panel (Outbound)...............................................................................................................................
Storage Container Panel................................................................................................................................................ 563 General Container Information....................................................................................................................................... 563 Container Space Information..........................................................................................................................................
About This Manual Dell EqualLogic PS Series arrays optimize resources by automating capacity, performance, and network load balancing. Additionally, PS Series arrays offer all-inclusive array management software and firmware updates. Dell EqualLogic FS Series appliances, when combined with PS Series arrays, offer a high-performance, high-availability, scalable NAS solution.
Contacting Dell Dell provides several online and telephone-based support and service options. Availability varies by country and product, and some services might not be available in your area. To contact Dell for sales, technical support, or customer service issues, go to dell.com/ support.
1 About Group Manager Group Manager is an easy-to-use SAN and NAS management tool integrated with the Dell EqualLogic PS Series firmware. Providing a comprehensive single point of management, Group Manager eliminates the need for a dedicated management workstation or server by enabling administrators to remotely manage virtually any aspect of their EqualLogic iSCSI-based SAN or NAS.
About GUI and CLI Access By default, PS Series group administrators can access the GUI remotely using a web browser or a standalone Java application. Administrators can also manage a group by using the CLI across a telnet, SSH or a serial connection. If you use a serial connection you must be connected to the primary controller. The Group Manager graphical user interface (GUI) is based on the Java platform.
About the Localized GUI The Group Manager GUI is available in the following languages: • French (fr) • German (de) • Japanese (ja) • Korean (ko) • Simplified Chinese (zh) • Spanish (es) The Group Manager GUI defaults to the same language as set for the browser and operating system. If your browser and operating system are set to a non-English supported language, and you want the GUI to display in English, log in to the Group Manager GUI using the Group Manager IP with /english.
Show or Hide the Session Banner You can customize the message on the sign-on banner page that displays when you log in to Group Manager. NOTE: The custom banner page can contain up to 1000 bytes of text. The number of characters in the banner page varies with the number of bytes required for each character. Banner pages containing multibyte characters accommodate shorter messages. To set the session banner: 1. Click Group → Group Configuration. 2. Click the Administration tab. 3.
Location Action Shortcut Table Navigation Move to the next row Down arrow Move to the previous row Up arrow Move to the next cell Tab Move to the previous cell Shift+Tab Leave table and move to the next item in the pane Ctrl+Tab Leave table and move to the previous item in the pane Shift+Ctrl+Tab Show context (right-click) menu for current table row Shift+F10 Move to previous tree node Up arrow Move to next tree node Down arrow Collapse current tree node or move to parent of a collapse
Icon Description Shortcut Help Menu — Opens the online help menu. F1 Tree view options — Opens a drop-down menu with various options for the different views None (for example: Group, Volumes) Search for Volumes, Collections, Pools, Partners, and Members The search function checks for all matches against the names or descriptions for volumes, volume collections, storage pools, replication partners, and members in the group, and then displays the results in the Find Objects dialog box. 1.
Localized Online Help The Group Manager online help is available in the following languages: • English (en) • French (fr) • German (de) • Japanese (ja) • Korean (ko) • Simplified Chinese (zh) • Spanish (es) You can download non-English versions of the online help from eqlsupport.dell.com. The readme file in each language kit includes instructions for installing and using the localized online help.
2. Click and select Compatibility View settings. 3. Clear the option to display websites in Compatibility view.
2 Architecture Fundamentals The Dell EqualLogic product family provides a unified file and block storage platform. Block-level storage consists of a sequence of bytes and bits of a certain length, called a block. Each block stores the data (like a hard drive) and the disk controller reads and writes data to the disks inside the storage array. Block-level access enables storage administrators to stipulate which block to send reads and writes to for the best performance.
Figure 2. PS Series Group and Pools depicts a PS Series group with three members and two storage pools. Table 3. PS Series Group and Pools explains the callouts used in the figure. Figure 2. PS Series Group and Pools Table 3. PS Series Group and Pools Callout Description 1 PS Series group Storage area network (SAN) comprising one or more PS Series arrays connected to an IP network. Arrays are high-performance (physical) block-storage devices.
Callout Description 9 Snapshots A point-in-time copy of data on a volume. Snapshots can be taken on a single volume or on a collection. 10 Thin-provisioned volume With thin provisioning, a minimal amount of space (10 percent by default) is reserved on a volume and then allocated when the space is needed. FS Series Architecture You can design a unified (block and file) storage architecture by adding a Dell FluidFS NAS appliance to a PS Series SAN.
Figure 3. PS Series Group with NAS Cluster Table 4. PS Series Group with NAS Cluster Callout Description 1 PS Series group Storage area network (SAN) comprising one or more PS Series arrays connected to an IP network. Arrays are high-performance (physical) block-storage devices. 2 NAS cluster Collection of NAS hardware (appliances) configured as part of a PS Series group. The FluidFS software runs on the cluster. 3 NAS appliances Hardware enclosures that contain NAS controllers.
Figure 4. PS Series Group Table 5. PS Series Group Callout Description 1 PS Series group Storage area network (SAN) comprising one or more PS Series arrays connected to an IP network. Arrays are high-performance (physical) block storage devices. 2 PS Series members One or more PS Series arrays represented as individual members within a pool to which it provides storage space to utilize. 3 PS Series storage pools Containers for storage resources (disk space, processing power, and network bandwidth).
members in the pool. The system automatically rebalances the load as the group scales. These operations are transparent to the servers, applications, and users. Group Configuration Recommendations Before you configure a group, review the following recommendations. • Make sure all the network interfaces on the members are configured, functioning, and accessible. If you have any issues, contact Dell Technical Support. NOTE: Limit configuration changes when a group has members that are offline.
– Verify that the storage pool does not have the maximum number of iSCSI connections for the release in use. – Verify the access control policies for the volume. Using the iSCSI initiator name instead of an IP address can make access controls easier to manage and more secure. – Ensure that Dell EqualLogic MPIO extensions are properly installed on the supported operating systems. See the Host Integration Tools documentation for details.
NOTE: You can add both FS Series NAS reserve and PS Series volumes to a storage pool. However, you might want to keep the NAS reserve and the block (volume) space in different pools so that you can monitor space usage more easily. Storage Pool: Design Checklist Before you can design storage pools for your environment, you must identify your storage requirements: capacity, performance, data type, and applications. You can then make informed decisions about the storage pool design that best meets your needs.
• You can segment bulk storage for long-term retention. You can create a separate pool with arrays configured to maximize storage capacity. Example 3: Use pools to optimize performance of your data. • You might want to optimize the performance of the database application. You can implement three pools: one for the database, one for applications, and one for backup and archival data. In this case, the database would be assigned to the pool that contains the members with the best random-access performance.
Callout Description Containers for storage resources (disk space, processing power, and network bandwidth). 4 PS Series single-member pool A PS Series array represented as a member within a pool to which it is assigned. 5 PS Series multimember pool Multiple PS Series arrays represented as individual members within a pool to which it is assigned.
• Control Access to Hosts (servers) – To prevent inadvertent corruption of the volume caused by multiple hosts writing to it in an uncoordinated manner, enable multihost access to a volume. Volume Attributes You set some attributes when you create a volume; other attributes use default values. In most cases, you can modify all the volume attributes. Template volumes and thin clones have some restrictions. Table 7.
Volume Attribute Description RAID preference RAID policies are established on a per-member basis. You can override this policy by enabling a RAID level preference for individual volumes. Thin clones inherit the RAID preference of the template volume. Sector size Size of the sector. The sector size of a volume does not depend on the sector size of the physical drives in the array. The default volume setting of 512 bytes is almost always optimal, even if the physical drives use 4K-byte sectors.
About NAS Architecture NAS architecture is an advanced clustered architecture, providing the performance of a networked file system with the efficiency of a storage system. Figure 6. NAS Hardware Architecture shows a typical configuration, although other types of configurations are possible. Table 8. NAS Hardware Architecture explains the callouts used in the figure. Figure 6. NAS Hardware Architecture Table 8.
Figure 7. NAS Software Architecture Table 9. NAS Software Architecture Callout Description 1 PS Series group (partial) Storage area network (SAN) comprising one or more PS Series arrays connected to an IP network. Arrays are high-performance (physical) block-storage devices. 2 NAS cluster Collection of NAS hardware (appliances) configured as part of a PS Series group. The FluidFS software runs on the cluster. 3 NAS appliances Hardware enclosures that contain NAS controllers.
Callout Description Redundant, hot-swappable controllers in NAS appliances. The controllers interface over a fabric to the PS Series SAN storage.
A NAS cluster can serve data to multiple clients simultaneously, with no performance degradation. Clients connect to NAS storage through the NAS protocols of their operating system: • UNIX users access NAS storage through the NFS protocol. • Windows users access NAS storage through the SMB protocol. After the client establishes the preliminary connection, the NAS storage acts as a normal storage subsystem, accessed in the usual way by users or applications.
• Add a NAS appliance to a NAS cluster to increase processing power and allow more client connections • Replace a failed controller If a NAS controller fails, the NAS cluster is still operational, but you cannot perform most service configuration modifications until you detach the failed NAS controller. While a NAS controller is down or detached, performance might decrease because data is no longer cached.
Figure 8. NAS Reserve Table 10. NAS Reserve Callout Description 1 NAS storage space Space allocated for storing user data as needed through various structures (volumes, snapshots, thin provisioning, replicas, containers, SMB/NFS, quotas, and local users and groups) 2 NAS reserve Amount of available storage space allocated to the NAS cluster for storing internal data and user data.
3 Set Up the iSCSI SAN To start using the PS Series array: 1. Configure the array on the network and create a PS Series group. See the Installation and Setup Guide for more information. 2. Log In to the Group Manager GUI. 3. Set the RAID Policy and Pool for a New Member (and assign the member to the default pool). 4. Create a Volume. 5. Connect Initiators to iSCSI Targets.
4 Post-Setup Tasks After you complete the initial setup and deployment of your PS Series array, Dell strongly recommends that you perform the following tasks to finish configuring the group.
4. Type the IP address for the NTP server. 5. Type the port number for the NTP server. 6. Click OK. 7. Select the IP address and click Modify or Delete as needed. 8. Use the arrows to move a server up or down in the list. Change the Time Zone and Clock Time To display the current date and time values: 1. Click Group → Group Configuration. 2. Click the General tab. 3. Select the time zone and city from the Time zone drop-down list. 4.
Set GUI Communication Policies You can set policies for managing connections between your workstation and the Group Manager GUI. 1. Click Tools. 2. Click User Preferences. 3. Click the Communication tab. 4. Select your preferences and click OK. Set Alarm Policies You can set alarm policies to control problem notification. 1. Click Tools. 2. Click User Preferences. 3. Click the Alarms tab. 4. Select your preferences and click OK. An alarm indicates a potential problem with your array.
space is insufficient). The group also generates event messages when certain normal operations occur (for example, when a user logs in to the group or creates a volume). To display events: 1. Click Monitoring. 2. Under Events, select Event Log. The events display in the window. To change which group’s events display in the window, select the group from the View dropdown menu. From the Event Log window, you can: • Display all events or events of a specific priority.
• Clear the event list. To erase all the events from the panel, click the Clear event list icon ( More. • Show or hide details about a specific event: ). To show the events again, click – Move the pointer over an event. A pop-up window opens, showing event details. – Double-click an event. The event details panel opens at the bottom of the events list. – Select an event and click the Show/Hide details icon near the upper-right corner of the window.
Configure Email Notifications You can define the list of email recipients to whom notifications will be sent for various alert levels. You can also change the email notification configuration at any time. 1. Click Group → Group Configuration. 2. Click the Notifications tab to open the Email Event Notifications panel. 3. If it is not already selected, select the Send email to addresses checkbox. 4. In the Email recipients section, click Add to open the dialog box.
• An email address to send (the address that appears in the From field in the notification email). You can use the group name at your company’s email address. For example: GroupA@company.com When the intended recipient receives email, the email itself specifies which group it came from. This information is helpful in multigroup environments, and reduces the chance that the email server or recipient will discard or reject notifications.
Change the syslog Notification Configuration 1. Click Group → Group Configuration. 2. Click the Notifications tab to display the Event Logs panel. 3. Make any of the following changes: 4. • To disable syslog notification, clear Send events to syslog servers. • To modify the IP address for a syslog server: 1. Select the IP address and click Modify. 2. Change the address and click OK. • To delete a syslog server, select the IP address and click Delete.
5 Data Security You can secure data at the group, volume, or NAS container level. Table 12.
6 About Group-Level Security Group Manager supports several strategies to ensure that only the people and applications that have approved credentials can log in to the PS Series group and gain access to your data. Security can be accomplished through the following methods: • Administration accounts — You can assign several predefined levels of administrative accounts to provide individuals with various levels of access to Group Manager’s features.
About Administration Accounts Administration accounts provide various levels of access to Group Manager’s features. You must have a valid group administration account in order to log into Group Manager and gain access to a group. If your environment requires additional security, you might consider a dedicated management network. (See Configure a Management Network for more information.
Account Type Description Pool administrator Can view the volumes, members, snapshots, and other objects only in the pool or pools for which the account has authorization. They cannot manage members. Optionally, pool administrators can view information about all group objects except NAS clusters. Pool administrators can assign volumes to volume administrators, provided that the pool administrator has access to the pool containing the volumes, and the volume administrator has sufficient free quota space.
Differences Between Authentication Methods Depending on the size of your environment, the form of authorization that you choose for administrator accounts can have advantages or disadvantages. Table 14. Differences Between Authentication Methods compares various approaches. Table 14.
Attribute Description comment. For example, if you try to create an account named AdminUser#Account, the resulting account is named AdminUser. The Group Manager GUI does not allow you to input pound signs when creating user names. NOTE: Dell recommends that administrator account names not be reused after they have been deleted. All accounts can always view their own audit log information, and new accounts with previously used account names will be able to view audit records for the old account.
SSH key pair authentication supports the following: • RSA and SSH 2 keys • One public key per user • A maximum of 4096 bit. • Minimum key length of 128 bytes. • Local users only. To create or view the SSH public key: 1. Click Group → Group Configuration. 2. Click the Administration tab. 3. In the Accounts and Groups panel, select either: 4. • All accounts and groups to view both local and remote accounts. • Local accounts to view local accounts only.
NOTE: • Account Name, Password, and Contact information must be ASCII characters only. Description can be up to 127 Unicode characters. Fewer characters are accepted for this field if you type the value as a Unicode character string, which takes up a variable number of bytes, depending on the specific character. • Dell recommends that administrator account names not be reused after they have been deleted.
4. Click Delete and confirm that you want to delete the account. NOTE: Dell recommends that administrator account names not be reused after they have been deleted. All accounts can always view their own audit log information, and new accounts with previously used account names will be able to view audit records for the old account.
• You plan to select the Require vendor-specific RADIUS attribute option when you configure the group to use a RADIUS authentication server. You must specify the EQL-Admin-Privilege attribute. Table 16. Vendor-Specific Attributes describes the Dell vendor-specific attributes and values for RADIUS attributes. Table 16.
Attribute Field Required Value VSA syntax String (3 to 247 ASCII characters) Admin-Email VSA vendor ID 12740 (Optional) Email address of the administrator. VSA number 2 VSA syntax String (3 to 247 ASCII characters) Admin-Phone VSA vendor ID 12740 (Optional) Phone number for the administrator. VSA number 3 VSA syntax String (3 to 247 ASCII characters) Admin-Mobile VSA vendor ID 12740 (Optional) Mobile phone number for the administrator.
1. Click Group → Group Configuration. 2. Click the Administration tab. 3. In the Authentication panel, select RADIUS and then click the RADIUS settings button to open the RADIUS Settings dialog box. 4. In the RADIUS Authentication Servers section, click Add. The Add RADIUS Authentication Server dialog box opens. 5. Specify the IP address of the server. If the server uses a port other than port 1812 (the default), specify the correct port number. 6.
About LDAP Authorization and Active Directory LDAP is the abbreviation for Lightweight Directory Access Protocol, which provides a simplified protocol for authenticating users. An LDAP server typically contains a database of users, user names, passwords, and related information. LDAP clients are able to interrogate the server to authenticate these users and obtain the account characteristics.
6. Repeat steps 3 to 5 to add up to three IP addresses. NOTE: Adding multiple Active Directory servers ensures continued authentication of Active Directory accounts even in the event of a resource outage. The group uses the first Active Directory server in the list for authenticating accounts; if the group cannot establish contact with the first server, it uses the other Active Directory servers to authenticate administrator logins. 7. Select the Active Directory server that you want to configure. 8.
• If the account type is Pool administrator or Volume administrator, you can use the Pool access section to specify the pools to which the account has access and the storage quota for the account. • If the account type is Pool administrator, you can use the Additional access section to give the account read-only access to the entire group. You can also grant read-only accounts permission to save diagnostics and save config from this dialog box. 5.
3. Click AD settings button to display the Active Directory settings dialog box. 4. Select the IP address of the server in the list of Active Directory servers, and then either click Up to promote the server or click Down to demote the server. Remove an Active Directory Server 1. Click Group → Group Configuration. 2. Click the Administration tab. 3.
NOTE: If you log in to Windows using your Active Directory credentials, you will be logged in to the PS Series group automatically without re-authenticating. Change the Active Directory Group Name Before you change the name of a PS Series group that has already been configured for single sign-on, Dell recommends that you leave the current Active Directory (AD) domain, change the group name, and then join the AD domain again using the new name.
4. Select Use Windows Credentials and click OK. 5. If login is successful, the GUI prompts whether to automatically use single sign-on credentials for all future logins. 6. Select Yes to automatically log in with single sign-on, or No to retain the option to select the login method for the next session. The GUI directs you to the Group Manager home page. After you are logged in, your AD user name appears at the top of the Group Manager window.
1. Click Group → Group Configuration. 2. Click the SNMP tab. 3. Click Add in the SNMP Access panel. 4. Enter an SNMP community name (for example, public). You can specify up to 5 names, and each name can be up to 64 ASCII characters long. Names cannot contain the following characters: space, tab, comma, pound sign (#). 5. Click OK. 6. Click Save all changes. To change or delete an SNMP community name: 1. In the SNMP Access panel, select the name. 2. Click Modify or Delete as needed.
Trap Type Trap Names iSCSI iscsiTgtLoginFailure, iscsiIntrLoginFailure, iscsiInstSessionFailure, scsiTgtDevicesStatusChanged, scsiLuStatusChanged Link linkUp, linkDown Member Offline eqlMemberStatusChanged eqliscsiVolumeMultiInit allowed or not-allowed iatorAttributeChanged Network Configuration • MemberGatewayIPAddrChanged • NetmaskChange • eqlgroupIPv4AddrChanged • eqlgroupIPv6AddrChanged • eqlMWKAChangeNotification RAID eqlMemberHealthRAIDSetDoubleFaulted, eqlMemberHealthRAIDLostCache
About VDS and VSS Authentication Microsoft provides the following services for storage management on Microsoft Windows computers: • Virtual Disk Service (VDS) provides an end-to-end solution for managing storage hardware and disks, and for creating volumes on those disks. VDS provides an interface using a set of APIs that allows you to manage disks. • Volume Shadow Copy Service (VSS) is a Windows service for capturing and creating snapshots called shadow copies.
• 4. In the Modify Basic Access Point dialog box, change the CHAP user name, iSCSI initiator name, or IP address, then click OK. Click OK. Delete a VDS/VSS Access Control Policy 1. Click Group → Group Configuration. 2. Click the VDS/VSS tab. 3. Select the policy from the appropriate subpanel (Access policy groups, Access policies, or Basic access points) and click the corresponding Delete command. 4. Confirm that you want to delete the policy.
NOTE: This process is not required for protecting communications between group members. After IPsec is enabled, all network traffic between group members is automatically protected, without need for further configuration. 1. A group administrator creates security parameters to specify how traffic should be authenticated. 2. A group administrator creates policies to identify traffic and determine what action to take for it: • Traffic is dropped.
You can also use IPsec policies to determine what traffic is being protected using IPsec, and what traffic is being passed or dropped without encryption. Security Certificates Security certificates are used in an IPsec configuration as one method of authenticating secured connections between iSCSI initiators and the group. Implementation of an IPsec-enabled SAN requires both a root-CA (Certificate Authority) certificate from the issuing authority and a local certificate to authenticate the group.
Examples of IPsec Configurations The following examples are provided and depict several scenarios for using IPsec with your PS Series group. They provide configuration settings for the array and for initiators and hosts.
Table 18. iSCSI Initiator Configuration (IPv4) Setting IPv4 Value Rule Name ToPSA_IPSEC_IPv4_CERT_IKEv1 Enabled? Yes Profiles Domain,Private,Public Mode Transport Endpoint1 10.125.56.10/32 Endpoint2 10.122.56.2/32 10.125.56.3/32 10.125.56.4/32 10.125.56.
Setting IPv6 Value fe80::b4a5:d2d6:431d:1f81-fe80::b4a5:d2d6:431d:1f81 fe80::ccd9:8e77:1389:ea69-fe80::ccd9:8e77:1389:ea69 Port1 Any Port2 Any Protocol TCP Action RequireInRequireOut Auth1 ComputerPSK Auth1PSK password MainModeSecMethods DHGroup14-AES256-SHA384 QuickModeSecMethods ESP:SHA256-AES256+60min+10000000kb CLI Commands (IPv4) Enter the following CLI commands on the PS Series group to implement the IPv4 configuration shown in Figure 10.
Figure 11. Tunnel Mode Between Linux Hosts Using PSK iSCSI Initiator Configuration (IPv4) This example uses the following configuration: • • • Mint 17 (also known as Qiana) Linux Kernel 3.13.0-36-generic, x86_64 strongSwan 5.1.2 The following configuration files are relevant: • • • • • /etc/strongswan.conf is the configuration file that governs the operation of the strongSwan components (for example, debugging level, log file locations, and so on). You will not need to modify this file. /etc/ipsec.
# # # # # # leftcert=selfCert.der leftsendcert=never right=192.168.0.2 rightsubnet=10.2.0.0/16 rightcert=peerCert.der auto=start # conn sample-with-ca-cert # leftsubnet=10.1.0.0/16 # leftcert=myCert.pem # right=192.168.0.2 # rightsubnet=10.2.0.0/16 # rightid="C=CH, O=Linux strongSwan CN=peer name" # auto=start Begin Pre-Shared Key Authentication, IPv4 1. strongSwan host IP address is 10.127.238.154 2. array addresses are 10.124.65.38 (the wka) and 10.124.65.
NOTE: strongSwan allows you to specify properties that apply to all connections (conn %default). The auto=route directive tells strongSwan to install an IPsec security policy into the host's security policy database for every defined connection. If this directive were not present here, it would need to appear in the configuration for every connection. keyexchange=ikev1 is necessary because by default it will use/expect IKE version 1 for the key exchange algorithm.
Figure 12. Tunnel Mode Between Linux Hosts Using Certificate-Based Authentication iSCSI Initiator Configuration (IPv4) This example uses the following configuration: • • • Mint 17 (also known as Qiana) Linux Kernel 3.13.0-36-generic, x86_64 strongSwan 5.1.2 The following configuration files are relevant: • • • • • /etc/strongswan.conf is the configuration file that governs the operation of the strongSwan components (for example, debugging level, log file locations, and so on).
# # # # # # leftcert=selfCert.der leftsendcert=never right=192.168.0.2 rightsubnet=10.2.0.0/16 rightcert=peerCert.der auto=start # conn sample-with-ca-cert # leftsubnet=10.1.0.0/16 # leftcert=myCert.pem # right=192.168.0.2 # rightsubnet=10.2.0.0/16 # rightid="C=CH, O=Linux strongSwan CN=peer name" # auto=start Begin Certificate-Based Authentication, IPv4 1. strongSwan host IP address is 10.127.238.154 2. array addresses are 10.124.65.38 (the wka) and 10.124.65.39 (eth0) 3.
Issuer: C=US, ST=New Hampshire, L=Nashua, O=Dell Equallogic, OU=Networking and iSCSI, CN=Joe Secure/emailAddress=Joe_Secure@dell.com Validity Not Before: Oct 14 19:01:25 2014 GMT Not After : Oct 14 19:01:25 2015 GMT Subject: C=US, ST=New Hampshire, L=Nashua, O=Dell Equallogic, OU=Networking and iSCSI, CN=Joe Secure/emailAddress=Joe_Secure@dell.
You will be prompted to enter information that will be incorporated into the certificate request. This is called a Distinguished Name or a DN. There are quite a few fields but you can leave some blank For some fields there will be a default value. If you enter '.', the field will be left blank.
Certificate: Data: Version: 1 (0x0) Serial Number: 9335600219447230923 (0x818eb6effd3601cb) Signature Algorithm: sha256WithRSAEncryption Issuer: C=US, ST=New Hampshire, L=Nashua, O=Dell Equallogic, OU=Networking and iSCSI, CN=Joe Secure/emailAddress=Joe_Secure@dell.com Validity Not Before: Oct 14 19:24:12 2014 GMT Not After : Oct 14 19:24:12 2015 GMT Subject: C=US, ST=New Hampshire, L=Nashua, O=Dell Equallogic, OU=Networking and iSCSI, CN=kirt5.lab.equallogic.com/emailAddress=Joe_Secure@dell.
Modulus: 00:ef:67:f5:d5:06:06:38:33:54:41:44:7e:bc:6d: 70:35:ea:9a:10:7e:d4:f3:a2:c9:f5:3b:8c:35:19: 59:ba:77:09:01:b8:26:9e:e8:76:5e:54:06:82:5c: f7:2c:a8:17:1a:16:bb:12:54:56:b5:3c:62:0b:58: e8:4a:30:78:aa:3f:9f:9c:39:8a:3a:d2:9e:1d:3f: dc:ea:4e:ff:e9:ae:a5:f0:c2:2c:ca:62:e2:56:00: 65:1b:96:0f:22:6a:c5:58:5c:00:d2:e3:b7:75:76: 02:1e:8e:47:59:07:8b:bc:4b:a5:b3:84:b0:ac:2e: 43:61:d2:29:a7:96:e2:60:21:5b:47:93:09:92:33: 7f:b9:94:78:6e:d3:cb:02:13:9d:18:53:62:f0:a2: 5a:27:c1:fd:31:8c:28:7a:48:8c:aa:5d:dc:6d:4
221Data traffic for this session was 6250 bytes in 4 files. Total traffic for this session was 7728 bytes in 6 transfers. 221 Thank you for using the FTP service on 10.124.65.39. 9. Drop the certificates in place on the strongSwan host side: # cp draoidoir.crt /etc/ipsec.d/certs # cp root-ca.crt /etc/ipsec.d/cacerts # cp client.key /etc/ipsec.d/private 10. Configure strongSwan to use the certificates for authentication. Here we have opted to use a Distinguished Name as the identifier on each side.
# # # rightsubnet=10.2.0.0/16 rightid="C=CH, O=Linux strongSwan CN=peer name" auto=start "leftcert=draoidoir.crt" tells strongSwan where it can find its local certificate (in /etc/ ipsec.d/certs). This is the local certificate that it will present to the array. "leftsendcert=yes" tells strongSwan that it should always send its certificate chain to any peers. "authby=pubkey" in each connection tells strongSwan that these peers will use certificatebased authentication. "rightid=...
Example 4: Tunnel Mode (Host-to-Gateway) Using PSK In Figure 13. Tunnel Mode (Host-to-Gateway) Using PSK, a tunnel mode connection to a Cisco ASA gateway is established, using pre-shared keys to authenticate IPv4 traffic. The example uses IKEv1. Figure 13. Tunnel Mode (Host-to-Gateway) Using PSK . Cisco ASA Configuration The following Cisco ASA configuration for the gateway is shown in Figure 13. Tunnel Mode (Host-to-Gateway) Using PSK. ASA Version 7.2(3) ! hostname ciscoasa domain-name company.
interface Ethernet0/7 !passwd <> encrypted ftp mode passive dns server-group DefaultDNS domain-name company.com access-list 101 extended permit ip 10.125.55.0 255.255.255.0 host 10.125.56.2 pager lines 24 mtu outside 1500 mtu inside 1500 icmp unreachable rate-limit 1 burst-size 1 asdm image disk0:/asdm-523.
CLI Commands (IPsec) Enter the following CLI commands on the PS Series group to implement the configuration shown in Figure 13. Tunnel Mode (Hostto-Gateway) Using PSK: > ipsec security-params create RemGW_PSK_Auth_Tunnel pre-shared-key key tunnel type v4 tun-ip-addr 10.125.56.1 > ipsec policy create ToRemGW_IPv4_PSK_Ikev1 type v4 ip-addr 10.125.56.0 netmask 255.255.255.
• The PS Series firmware provides no mechanism for using IPsec to protect traffic between replication partners. It is technically possible to create IPsec polices on both the primary and secondary group in which each group treats the other as an iSCSI initiator and traffic is protected accordingly. However, this configuration is not supported, and Dell recommends against implementing it in a production environment.
Table 20. Supported RDNs OID RDN Meaning 2.5.4.6 C Country 2.5.4.7 L Locality Name 2.5.4.5 serialNumber Serial Number 2.5.4.9 STREET Street Address 2.5.4.8 ST State or Province 2.5.4.10 O Organization 2.5.4.11 OU Organizational Unit 2.5.4.3 CN Common Name DC Domain Component RSA.1.9.1 MAILTO PKCS9 Email Address RSA.1.9.1 emailAddress PKCS9 Email Address RSA.1.9.2 unstructuredName PKCS9 Unstructured Name 2.5.4.4 SN Surname 2.5.4.12 title Title 2.5.4.
Algorithm Type Supported Algorithms • AES-CBC–256 IKE (Diffie-Hellman) Key Exchange • • • 2 (if legacy support is not disabled) 14 24 IPsec Integrity • • • • • HMAC-SHA1–96 HMAC-SHA2–224 HMAC-SHA2-256 HMAC-SHA2-384 HMAC-SHA2-512 IPsec Encryption • • • • • NULL 3DES-CBC AES-CBC AES-CBC–192 AES-CBC–256 NOTE: IKE (Diffie-Hellman) Key Exchange Group 2 algorithm is supported only if legacy support is not disabled.
Protect Communication Between Group Members To enable IPsec security for communication between group members, use the ipsec enable CLI command. No further configuration actions are required. Protect iSCSI Initiator Connections IP traffic between the group and iSCSI initiators is not automatically protected after IPsec has been enabled. Configure an IPsec configuration as follows: NOTE: See the Dell EqualLogic Group Manager CLI Reference Guide for command syntax and examples of the CLI commands. 1.
About Dedicated Management Networks For increased security, or if your environment requires the separation of management traffic and iSCSI traffic, you can configure a dedicated management network (DMN) that is used only for administrative access to the group. The management network is separate from the network that handles iSCSI traffic to the group.
• Obtain an IP address and default gateway information for the management network address. This address is the one to which administrators can connect. • For each group member, obtain an IP address for the management network interface. The IP address must be on the same subnet as the management network address, and this subnet should not be the same as the one used for data I/O.
• • If you are running SAN Headquarters, you must update the group IP address in the application to the dedicated management address. For more information, see the SAN Headquarters documentation. If you are using an NTP server, Dell recommends that the NTP server be on the same subnet as the dedicated management network. Display Management Network Information 1. Click Group → Group Configuration. 2. Click the Advanced tab. 3. Click Configure management network to display details.
• The volume is moved to the recovery bin. • Pages are overwritten with zeros as a background operation. • Page map entries are cleared. Known Limitations • This process consumes system resources. I/O timings are also slightly impacted while the data is being cleared. • The deleted pages are not immediately available for new allocation in existing or new volumes.
7 About Volume-Level Security To secure your data, you must prevent access by unauthorized iSCSI initiators. By controlling access to your iSCSI targets, you can secure access to individual volumes. Group Manager provides several ways to control access to your volumes. You can use these security measures in tandem with group-level and NAS-level security to provide the required level of security for your data. • • • • You can specify a CHAP user name, IP address, or iSCSI initiator name.
Different access methods are available depending on the needs of your environment: • An access policy consists of a set of extended access points. Each extended access point enables users to provide a set of access attributes describing the endpoints, such as an IQN initiator name, CHAP name, and IP addresses. After an access policy is associated with a volume, all the endpoints described by the extended access points will have access to the volume.
Study 2: Apply an existing policy to a volume Scenario: A user wants to grant access to a volume using a previously specified access policy (or policy group), without having to reenter the IP address, initiator name, and CHAP user name. Solution: If the volume has not been created yet: 1. Run the Create volume wizard to define the parameters of the new volume. Complete wizard steps 1 and 2. 2. When the Define iSCSI Access Points step is reached, select Select or define access control policies. 3.
3. To remove a node from cluster A, remove the node’s access policy from the group policy. This disassociation instantly removes the node from the group. Study 6: Determine each volume a host/cluster can access Scenario: The group administrator needs to determine which volumes a host can access. Solution: 1. Click Group → Group Configuration. 2. Click the Access Policies tab. 3. In the Access Policies panel, select either the policy group or the access policy that is assigned to the host or cluster.
NOTE: Click Access to show all access policies and access points that are currently assigned to this volume. 3. In the Activities panel, click Add basic access point. 4. Specify the authorization parameters (CHAP account name, iSCSI initiator name, or IP address) for the host that you are configuring. NOTE: Asterisk characters can be used within an IP address to indicate that any value is accepted in an octet (for example: 12.16.*.*). Group Manager displays *.*.*.
4. Perform the desired action in the corresponding subpanel: Add, Modify, or Remove an Access Policy Group: • To bind an additional access policy group to the volume, click Add to open the Add Access Policy dialog box. You can then select additional groups that you want to bind to this volume. • To make changes to the access policies within an access policy group, select a group policy and click Modify to open the Edit Access Policy Group dialog box.
Create an Access Policy Group Access policy groups combine individual access policies together so that they can be managed as a single entity. 1. Click Group → Group Configuration. 2. Click the Access Policies tab. 3. In the Access Policies panel, locate the Access Policy Groups section and click New to open the New Access Policy Group dialog box. 4. Specify a policy name for the new group and (optionally) a description. 5. In the Access Policies section, click Add.
• To make changes to the access points within an access policy, select a policy and click Modify to open the Edit Access Policy dialog box. You can create new access points, edit existing access points, or remove access points that belong to this policy. • To remove an access policy from VDS/VSS access, select the policy name and click Delete. When prompted to confirm the decision, click Yes.
– CHAP user name – Password (otherwise known as a CHAP secret). For optimal security, passwords must contain at least 12 characters (preferably random). Individual iSCSI initiators have their own rules and restrictions for length and format. Consult your initiator documentation for details. To create a local CHAP account: 1. Click Group → Group Configuration. 2. Click the iSCSI tab. 3. (Optional) Select Enable local authentication and check local first in the iSCSI Authentication panel. 4.
Configure CHAP for Initiator Authentication on Existing Volumes To configure CHAP for an existing volume: 1. Click Volumes 2. Expand Volumes and then select the volume that you want to configure. 3. In the Activities panel, click Add basic access point to open the New Basic Access Point dialog box. 4. In the dialog box, type a description for the volume and a CHAP account name. Names can be up to 63 ASCII characters. 5. Enter a CHAP acount name, an iSCSI initiator name, or an IP address. 6.
With target authentication, when the initiator tries to connect to a target, the target supplies a user name and password to the initiator. The initiator compares the user name and password to mutual authentication credentials that you configure in the initiator configuration interface. The iSCSI connection succeeds only if the information matches. A group automatically enables target authentication using a default user name and password, which you can change.
You cannot use the Group Manager GUI to enable or disable iSNS discovery for a volume or snapshot. Instead, you must use the following CLI command lines: volume select volume_name isns-discovery enable | disable volume select volume_name snapshot select snapshot_name isns-discovery enable | disable Configure an iSNS Server in the Group To configure an iSNS server: 1. Click Group → Group Configuration. 2. Click the iSCSI tab. 3.
Table 22. Access Requirements for iSCSI Targets Security Condition Description Network access To discover targets, the initiator must have network access to the group IP address. Initiator access controls (Optional) If the initiator enabled target authentication (sometimes called mutual authentication), the target authentication credentials in the group must match the credentials that were configured in the initiator. These credentials apply to all group targets.
You can enable or disable multihost access when creating a volume. You can also modify a volume or snapshot and enable or disable multihost access. Allow or Disallow Multihost Volume Access In a shared storage environment, you must control computer access to iSCSI targets (volumes and snapshots), because multiple computers writing to a target in an uncoordinated manner will result in volume corruption. You can allow or disallow shared (multihost) access to a volume.
5. To allow multiple initiators to access the target, select the Allow simultaneous connections from initiators with different IQNs checkbox. (By default, this checkbox is not selected.) 6. Click OK. About NAS Container Security You control access to your NAS containers through volume-level and group-level security. Windows and UNIX operating systems use different mechanisms for user identification, authentication, and resource access control.
3. In the Modify Settings dialog box, click the Access Permissions tab. 4. Set the permission (Read, Write, or Execute) for each user (Owner, Group, and Others). Alternatively, you can specify the equivalent three-digit format in the Numeric value field. 5. Click OK.
8 PS Series Group Operations You can perform basic and advanced operations on the PS Series SAN. Table 23.
Before modifying the group name or group IP address, make sure you understand how these changes will affect your environment: • You identify replication partners by group name and use the group IP address to perform replication. If you modify the group name or IP address, make sure replication partner administrators make the change to their partner configuration. Replication fails if the partner information is incorrect.
• Enable the management port, if needed (see Configure a Management Network) • Select the RAID policy (see Set the RAID Policy and Pool for a New Member) After you complete these tasks, you can configure the new member either through the CLI or through the GUI. To configure the member through the GUI: 1. Click Group, expand Members, and select the unconfigured member. 2. In the Warning dialog box, click Yes or No.
5. Click OK. Set RAID Expansion Status You can pause and resume the start of RAID expansion when new drives are added. This option allows more time when a large number of drives are added. 1. Click Group. 2. Expand Members and then select the member name. 3. Click Modify RAID configuration to open the Modify RAID Configuration dialog box. 4. In the RAID auto expansion panel, select one of the two options: • Check Enable RAID auto expansion to immediately expand group capacity.
Table 26. 14–Drive Configuration shows the RAID set relationship for each RAID type in a 14-drive configuration. Table 26. 14–Drive Configuration RAID Policy Spare Disks RAID Set Relationship Best Practices RAID 6 1 (11+2) Yes RAID 6 Accelerated 1 HDD (6+2 HDD) (6+2 SSD) N/A RAID 10 2 (6+6) Yes RAID 50 2 (5+1)(5+1) For selected configurations RAID 5 1 (12+1) Not for business-critical data Table 27.
RAID Policy Spare Disks RAID Set Relationship Best Practices RAID 50 2 (6+1 ,6+,1, 6+1, 6+1, 6+1, 6+1) (3+1) For selected configurations RAID 5 2 (12+1, 12+1, 12+1) (6+1) Not for business-critical data Table 31. 84–Drive Configuration shows the RAID set relationship for each RAID type in a 84-drive configuration. Table 31.
About Overriding Automatic Load Balancing A PS Series group uses automatic performance load balancing (enabled by default) to identify the RAID level that provides the best performance for a volume and store volume data on pool members with that RAID level, if such members are available. You can override automatic performance load balancing (or ignore any RAID preference for the volume) by binding a volume to a specific pool member.
5. • Name can be up to 63 bytes and is case-insensitive. You can use any printable Unicode character except for ! " # $ % & ' ( ) * + , / ; < = > ?@ [ \ ] ^ _ ` { | } ~. First and last characters cannot be a period, hyphen, or colon. Fewer characters are accepted for this field if you type the value as a Unicode character string, which takes up a variable number of bytes, depending on the specific character. • The pool description can be up to 127 characters.
are accepted for this field if you type the value as a Unicode character string, which takes up a variable number of bytes, depending on the specific character. • 5. The pool description can be up to 127 characters. Fewer characters are accepted for this field if you type the value as a Unicode character string, which takes up a variable number of bytes, depending on the specific character. Click OK.
About Space Borrowing Space borrowing includes snapshot space borrowing and replication borrowing. (For more information about these borrowing methods, see About Snapshot Space Borrowing and About Replication Borrowing.) PS Series firmware v8.
NOTE: This display applies only to the space in the pool that is available for borrowing, not to all of the space in the pool. Volume reserve and storage containers do not appear in the tables because that space cannot be borrowed. • Click the Total borrowed space link from either the Group Disk Space panel or the Pool Disk Space panel. You can also see these statistics through several CLI commands. Refer to the Dell EqualLogic Group Manager CLI Reference Guide for more information.
Question Answer For each volume or replica set, you can see the amount of space reserved and the amount of space in use. The amount of in-use space includes the amount of space that the snapshot or replica is borrowing. To determine whether the reserves are set appropriately, you should continually monitor the volume’s snapshot or replica borrowing.
About Compression Statistics Compression statistics assess the overall space-savings achieved within a storage pool, a member, or a volume, including replicated volumes. These statistics are accessible through the GUI or the CLI. After starting compression initially or resuming it from a suspended state, it might be several hours before any new compression activity occurs. NOTE: When a compressed snapshot is cloned or rolled back, the compression statistics will indicate that the space has been rehydrated.
Member State Description NOTE: This status is visible only within the pool area. Enable Compression Snapshot and replica compression can be enabled on any PS6210 or PS6610 array running the supported firmware. Compression is enabled at the pool level. If the group contains more than one compression-enabled member, compression must be enabled on each member individually. 1. Click Group. 2. Expand Members and select the group member on which compression is to be enabled. 3.
2. Expand Storage Pools and select the pool for which you want to view compression statistics. 3. Click the Status tab and locate the Pool Disk Space panel. The statistics are listed under Snapshot and replica set compression. See Compression Statistics by Pool. View Compression Statistics by Member You can view compression statistics for any compression-enabled member. 1. Click Group. 2. Expand Members and select the member for which you want to view compression statistics. 3.
Action Command Display pool compression statistics pool select pool_name show The General settings section of the General Member Information panel shows Compression ... running, and the Activities panel contains the Suspend compression link, which is used to temporarily pause compression. NOTE: When compression is initially enabled or resumed after being suspended, the display for compression statistics might not change for several hours as the array monitors activity.
9 About Volumes Volumes provide the storage allocation structure within the PS Series group. To access storage in a PS Series group, you allocate portions of a storage pool to volumes. You can create a volume on a single group member or one that spans multiple group members. You assign each volume a name, size, and a storage pool. The group automatically load balances volume data across pool members. Create a Volume To create a new volume: 1. Click Volumes → Volumes. 2.
• You cannot set a template volume to read-write permission. To modify a volume permission: 1. Click Volumes. 2. Expand Volumes and then select the volume name. 3. In the Activities panel, click Set access type. 4. Change the permission in the Set access type dialog box. 5. (Optional) Select the Allow simultaneous connections from initiators with different IQNs checkbox. 6. Click OK. Modify a Volume Alias An alias can help administrators identify a volume.
• A simple tag has no values. For example, the tag “Backup” indicates that the volume is used as a backup volume without going into further detail. • An extended tag uses a main tag and a value. For example, the tag “Applications” with the value “Sharepoint” indicates that the volume information is used within that application. Within Group Manager, only group administrators are allowed to create, rename, and delete tags.
To associate tags for a specific volume, you can use either the Volumes panel, the Activities panel, or the General Volume Information panel. From the Volumes panel: 1. Click Volumes → Volumes. 2. Select a volume from the list displayed in the Volumes panel. 3. In the Activities panel, click Modify tags to open the Pick Tags for Volume dialog box. From the Activities panel: 1. Click Volumes. 2. Expand Volumes and select a volume from the tree view. 3.
Delete a Volume When you delete a volume, space that the group allocated to the volume becomes part of free pool space. The following requirements and considerations apply: • • • If you delete a volume, the group also deletes its snapshots. However, the group does not delete any volume replicas on the secondary group. The volume must be set offline to perform the delete operation. The group closes any active iSCSI connections to the volume.
1. Click Volumes. 2. Expand Volume Collections and then select the collection. 3. Click Modify volume collection to open the Modify Volume Collection dialog box. 4. Click the General tab to change the collection name or description. 5. Modify the name (up to 63 characters) or description (up to 127 characters). Name can be up to 63 bytes and is case-insensitive. You can use any printable Unicode character except for ! " # $ % & ' ( ) * + , / ; < = > ?@ [ \ ] ^ _ ` { | } ~.
• When the last volume is removed from a folder, the folder is not deleted. • Volume administrators can view all of the volumes in a folder, provided that the volumes were not created by other volume administrators. Create a Volume Folder 1. Click the Volumes tab. 2. In the Activities panel, click Create volume folder to open the dialog box. 3. In the dialog box, type a name for the volume folder in the Name field. Name can be up to 63 bytes and is case-insensitive.
Add and Remove Volumes from Folders You can move volumes into, out of, or between folders. Your account must have group administrator privileges. If volume folders are not being displayed, you can enable the option from the tree view menu ( Show volume folders. ). Select Group volumes → Add Volumes to a Volume Folder 1. Click the Volumes tab. 2. Expand Volumes to display a list of available volumes. 3. Select the name of the volume that you want to add to the folder. 4.
If the deleted folder contained volumes, the volumes are displayed in the Volumes list in the tree view. About Restoring Deleted Volumes Volume undelete provides an administrator with the ability to restore volumes that might have been deleted by mistake. This feature is enabled by default. To turn it off or to turn it back on after it has been disabled, use the CLI recovery-bin volume command.
• When a volume has been deleted, its information appears slightly differently in the CLI than in the GUI. Whereas the GUI shows the original name of the volume even after it has been deleted, the CLI shows a modified name for the volume when you list the contents of the recovery bin. NOTE: • If the amount of available free space within the group decreases to less than the specified system level, the firmware will automatically begin to purge deleted volumes, even if a week has not elapsed.
3. In the Activities panel, click Manage recovery bin. The Volume Recovery Bin dialog box opens. 4. Select the volume name that you want to permanently delete in the recovery bin. 5. Click Purge. To purge all volumes in the recovery bin at the same time, click Purge All. 6. When prompted to confirm the decision, click Yes to continue with the purge or No to cancel. NOTE: When a volume is purged, all of its data is lost.
Increase the Reported Size of a Volume You can increase the reported size of the volume while the volume remains online. The following considerations apply to increasing the size of a volume: • If the size you specify is not a multiple of 15MB, the group rounds up the value to the nearest multiple of 15MB. • If you do not specify a unit for the size, the unit defaults to MB. • If you configured the volume for replication, the wizard shows the delegated space on the replication partner.
Running Defrag Tools Run defragmentation tools (such as fstrim, windows manual defrag, or esxtool) during periods of low I/O activity, because these operations might result in large numbers of unmapping operations and reduce array performance. XCopy Support for VVol Datastores SCSI Extended Copy (XCopy) now supports VVol-based datastores. This feature is typically used in live migration of VMs by the ESX server.
unmapping on hosts or volumes (depending on the host operating system) that are using replicated volumes. Refer to the following sections for information about disabling and enabling unmapping in VMware ESX, Red Hat Enterprise Linux, or Windows Servers 2012 and 2016 operating systems. Unmapping with Red Hat Enterprise Linux By default, unmapping is disabled in Red Hat Enterprise Linux.
NOTE: Setting a volume with lost blocks online is a data integrity risk. The blocks might contain old or invalid data. To manage a volume or snapshot with lost blocks: 1. Click Volumes. 2. Expand Volumes and then select the volume name. 3. Click the Status tab. 4. Click offline-lost-cached-blocks. 5. Either: 6. • Click Set the volume online but retain the lost blocks to set the volume or snapshot online but keep the lost blocks. The volume (or snapshot) status changes to online-lost-blocks.
Status Description Solution unavailable due to SyncRep Volume or snapshot is unavailable because SyncRep is confused, often due to a mismatch between the state in the database and the expected state. Determine the reason for the issue and correct the problem. available (no new connections) During a failover, SyncRep is trying to determine Wait for SyncRep for to determine which which volume should be active. Until then, no volume is active. new connections are allowed.
The volume reserve is equal to the reported size. For example, even if only 10 percent of a volume is in use, the group allocates the full reported size. • Thin provisioning enabled The volume reserve is equal to or less than the reported size, depending on volume usage and the thin-provisioning settings. Initially, the group allocates the minimum amount of volume reserve for a thin-provisioned volume. The minimum is 10 percent of the reported volume size or the user-specified percentage.
Thin-Provisioning Space Settings Three settings control how the group allocates space to thin-provisioned volumes and when the group generates events related to space usage: • Minimum volume reserve Minimum amount of pool space that the group allocates to the volume, based on a percentage of the reported volume size. The default groupwide setting is 10 percent. • In-use space warning limit Amount of in-use volume reserve that results in notification, based on a percentage of the reported volume size.
The values in the table change based on the new values. If a change exceeds capacity, the Free pool space field contains a negative value. 6. Click OK. Disable Thin Provisioning on a Volume You can disable thin provisioning on a standard volume. NOTE: You cannot disable thin provisioning on a template volume, thin clone volume, recovery template volume, or a recovery thin clone volume.
You can also modify the thin clone and change the data that the thin clone shares with the template volume. However, the data in the template volume is always preserved because a template volume is read-only. Group Manager tracks the amount of data that is shared between each thin clone and template volume. With a few exceptions, all normal volume operations apply to template volumes and thin clones.
If you detach a thin clone, the resulting new standard volume has in-use space equal to the combined shared space and unshared space, as shown in the Shared Space table in the Volume Status window. Restrictions on Template Volumes and Thin Clones With a few exceptions, all normal volume attributes and operations apply to template volumes and thin clones as specified in Table 37. Template Volume and Thin Clone Restrictions. Table 37.
• Before converting to a template volume, make sure that the standard volume contains all the data that is shared with the thin clones. • You cannot convert a volume to a template while it is a member of a collection. • Make sure that the standard volume has sufficient free space to hold the approximate amount of data that you write to each thin clone.
The following restrictions apply: • You cannot detach a thin clone if replication is enabled for the thin clone. • If you detach a thin clone from a template volume, the thin clone is converted to a standard volume and no longer shares space with the template volume. • The volume reserve for the thin clone increases by the amount of space the thin clone shares with the template volume.
Configure Data Center Bridging Ensure that you have properly configured your environment (switch fabric) for all DCB-enabled devices, according to the requirements described in the following section. Requirements For DCB to function correctly, your configuration must meet the following requirements: • All group members must be 10Gb arrays. • All group members must be running PS Series firmware version 6.0 or later.
NOTE: • All group members must be active. • This procedure requires modifying the configuration of third-party products. See the documentation for your switches for detailed instructions on these tasks. 1. Set the switch ports used by group members to allow both the old and new VLAN IDs. 2. Bridge the old and new VLANs either by modifying switch settings or by creating an untagged access port for each VLAN and bridging the connections using the appropriate cable. 3. Set the VLAN ID in the group: a.
10 VMware Group Access Panel The VMware Group Access panel allows you to view VMware virtual volume (VVol) settings, if VVols are configured for your group. To open the VMware Group Access panel, click the VMware tab in the selection pane on the lower-left side of the Group Manager window. NOTE: If the VMware tab is not displayed in the selection pane, move the View Drag handle (the two arrows above the list of tabs) up to expand the list. Or, click the VMware icon ( ).
About Protocol Endpoints A protocol endpoint is the iSCSI target used for VVol storage, and the mean by which to access VVol storage containers. In order to perform VVol user operations from within vCenter, protocol endpoint access rules need to be established. NOTE: Configuring a protocol endpoint requires establishing one or more access policies. Dell requires the use of Virtual Storage Manager (VSM) to establish Protocol Endpoint (PE) access rules. To view all access policies defined for a group: 1.
Storage Container Space Limits Storage container space is managed by the storage administrator. Storage administrators must allow access to enough physical storage to meet the needs of a storage container of a given logical size under a reasonable range of operating circumstances, without preallocating too much physical storage to the container. A storage container will have access to a finite amount of physical storage, which is defined as the container’s physical size.
4. In the Activities panel, click Modify storage container. The Modify Storage Container dialog box opens. 5. On the General settings tab: a. Modify the name for the container and/or the description. b. Select a different storage pool for the container (if more than one pool is available). 6. On the Physical space tab: a. Type a value in the Container physical size field. b. Change the unit of measurement for the size (MB, GB, TB) if necessary. 7. Click OK to modify the storage container.
NOTE: The Dell Virtual Storage Manager (VSM) runs an event process that enables Group Manager to show the correlation between the virtual machine and the VVol. In some cases, the vCenter virtual machine-related event might be incorrectly propagated to Group Manager. To manually trigger a verification between the VSM and Group Manager, use the VSM system schedule command Verify Snapshots and Replicas Run Now. For details, see the Dell Virtual Storage Manager Installation and User’s Guide.
11 NAS Operations Network-attached storage (NAS) provides high-performance, high-availability, scalable resources with on-demand provisioning in a unified storage environment. You can perform basic and advanced operations on NAS storage, as shown in Table 39. Basic and Advanced NAS Operations. Table 39.
12 NAS Cluster Operations Table 40. Basic and Advanced NAS Cluster Operations provides a list of basic and advanced NAS cluster operations. Table 40. Basic and Advanced NAS Cluster Operations Basic Configure a NAS cluster Modify NAS cluster settings Add, modify, or delete a local group for a NAS cluster Advanced Diagnose problems in a NAS cluster Delete a NAS cluster NAS Cluster Configuration A NAS cluster is a collection of NAS appliances configured in a PS Series group.
Table 41. NAS Cluster Expansion Existing NAS Cluster Expansion NAS Controllers Two model FS7500 NAS controllers Two FS7500 One FS7600 (creates a mixed cluster) One model FS7600 NAS appliance One FS7600 Two FS7500 (creates a mixed cluster) One model FS7610 NAS appliance One FS7610 Configure a NAS Cluster You must configure two NAS controllers to a NAS cluster as a NAS controller pair; you cannot add just one NAS controller.
• If the SAN network failed, the Modify SAN network page opens. • If the client network failed, the Modify client network page opens. You can change any of the settings that were not already stored in the system on these pages. Click OK to accept your changes. Click Retry. If the network configuration fails again, contact your customer support representative. Validation Failure Description: You see a system validation error or similar error message.
• Configure the NAS cluster to use DNS (Domain Name Service), which is a networking service that translates Internet domain names into IP addresses. If you want to use DNS, manually add the NAS cluster IP address and NAS cluster name to the DNS server. If you are in a routed client network and using multiple NAS cluster IP addresses, add all the NAS cluster IP addresses to the DNS server and associate them with the same NAS cluster name.
• Create a snapshot. To protect NAS container data, you can create snapshots. • Create a snapshot schedule. Use a schedule to regularly create NAS container snapshots. • Configure NAS container replication. Modify a NAS Cluster Name To modify the name of a NAS cluster: 1. Click Group, expand Group Configuration, and then select the NAS cluster. 2. Click Rename NAS cluster. 3. In the Rename NAS cluster dialog box, specify the new NAS cluster name.
1. Click Group, expand Group Configuration, and then select the NAS cluster. 2. Click the Local Users and Groups tab. 3. In the Local Groups panel, click Add. 4. In the Add local user dialog box, specify the group name. NOTE: The group name accepts up to 20 ASCII characters, including letters, numbers, underscores, hyphens, and periods. The first character must be a letter or a number. 5. Click OK. NOTE: You cannot modify a local group.
3. In the Local Users panel, select the user and click Delete. NOTE: You cannot delete the built-in local administrator account (Administrator). 4. Confirm that you want to delete the local user. Map Users for a NAS Cluster NOTE: To map users, you must have Active Directory and either LDAP or NIS configured in the NAS cluster. To define a mapping between a Windows user and a UNIX user: 1. Click Group, expand Group Configuration, and then select the NAS cluster. 2. Click the Authentication tab. 3.
You can specify an NTP server for the group and a DNS server for the NAS cluster when configuring Active Directory, or you can perform these tasks separately. NOTE: Configuring Active Directory interrupts client access to SMB shares. To configure Active Directory: 1. Click Group, expand Group Configuration, and then select the NAS cluster. 2. Click the Authentication tab. 3. In the Active Directory panel, click Configure Active Directory.
3. In the Active Directory panel, click Leave. Domain users will be prevented from access if you leave the Active Directory domain. The status changes to not configured. NOTE: You cannot delete the Active Directory configuration. Configure or Modify NIS or LDAP for a NAS Cluster To authenticate UNIX clients, you can use NIS or LDAP for external authentication. NOTE: Configuring NIS or LDAP interrupts client access to SMB shares.
4. Click OK to apply the changes. 5. In the Activities panel, click Modify client properties to open the dialog box. 6. Modify the following properties as needed: • Default gateway • MTU size If you change the MTU size, clients are disconnected. The client usually reconnects automatically. NOTE: Modify the MTU byte size only if directed by Dell support. For normal NAS cluster operation, a value of 1500 is required. • 7. Bonding mode (ALB or LACP) Click OK to apply the changes.
The SAN network configuration for a NAS cluster includes the following IP addresses: • Management IP address, which allows access between the PS Series group and the NAS cluster. The management IP address must be on the same subnet as the group IP address. • IP addresses for each NAS controller, which allows access between the PS Series group and the NAS controllers. The NAS controller IP addresses must be on the same subnet as the group IP address.
While the NAS cluster is in maintenance mode, all client connections to the NAS controllers are stopped and no new connections can be made. Put the NAS cluster into maintenance mode when you: • Move the NAS hardware to a different location. • Change the PS Series group IP address because of: – Network changes in your environment – A new configuration, such as adding a management network to the group • Perform maintenance or infrastructure work.
3. After the hardware restarts, start the NAS cluster. About Deleting a NAS Cluster If you no longer need to provide NAS operations, you can delete the NAS cluster from the PS Series group. When you delete a NAS cluster: • All service data and all client data that is stored in the NAS reserve is destroyed. • The NAS reserve space is added back to the free pool space. • The NAS controllers are reset to the factory defaults. • The NAS controllers reboot.
13 NAS Controller Operations Table 42. Basic and Advanced NAS Controller Operations provides a list of basic and advanced NAS controller operations. Table 42. Basic and Advanced NAS Controller Operations Basic Add or replace NAS controllers Update NAS controller firmware Advanced Shut down a NAS controller pair Add Additional NAS Controllers After you add NAS controllers using the wizard, you can improve performance and availability of your network by adding up to two NAS appliances to the NAS cluster.
7. 8. For each client network, verify the following settings for the NAS cluster, and click Auto fill: • VLAN tagging • IP address • Netmask • Default gateway Click Auto fill to populate the table with NAS controller IP addresses, or type the addresses. NOTE: • The Auto Fill option bases new addresses on the first NAS cluster IP address. This approach results in duplicate addresses if any of the new addresses are already used on the network.
NOTE: Detach a NAS controller only when directed by your customer support representative. In some cases, your support representative might instruct you to cleanly shut down a NAS controller before detaching it. After cleanly shutting down the NAS controller, you can turn on power, wait for the NAS cluster to recognize the NAS controller, and then detach the NAS controller. You cannot detach a NAS controller if its peer NAS controller is already detached.
4. In the Attach NAS controller dialog box, select the NAS controller that you want to attach to the NAS cluster. You can identify a NAS controller by its service tag. NOTE: If the NAS controller is not listed, verify the physical state and network connections for the controller and then click Rediscover to refresh the list of controllers in the dialog box. 5. Click the Attach NAS controller button. A progress window opens, showing the progress of the attach NAS controller operation.
• Dell Equallogic FS7500 Series Appliances Hardware Owner’s Manual • Dell Equallogic FS7600 Series Appliances Hardware Owner’s Manual • Dell Equallogic FS7610 Series Appliances Hardware Owner’s Manual 190 NAS Controller Operations
14 NAS Container Operations Table 43. Basic and Advanced NAS Container Operations provides a list of basic and advanced NAS container operations. Table 43.
Modify NAS Clusterwide Default NAS Container Settings To modify or display the NAS clusterwide default NAS container space settings: 1. Click Group, expand Group Configuration, and then select the NAS cluster. 2. Click the Defaults tab. 3. In the Default NAS Container Settings panel, modify the settings as needed. Modify NAS Clusterwide Default NAS Container Permissions To modify or display the NAS clusterwide default NAS container permission settings: 1.
2. Click Modify Settings. The Modify Settings dialog box opens. 3. Click the Space tab. 4. In the Size field, enter the new size for the NAS container. 5. Click OK. Modify the Snapshot Reserve and Warning Limit for a NAS Container NOTE: Select the Enable data reduction checkbox to activate the Modify policy button. Enabling data reduction permanently removes the snapshot reserve functionality from the NAS container.
NOTE: Deleting a NAS container deletes all the snapshots of the NAS container and all the SMB shares and NFS exports in the NAS container. After they are deleted, recovery containers cannot be recovered using the volume recovery bin. When you delete a NAS container, its replica is not deleted; the replica is promoted to a container on the destination cluster. To delete a NAS container: 1. Click NAS, expand NAS Clusters and Local Containers, and then select the NAS container name. 2.
1. Ensure that the NFS export has read-write permissions. Also, make sure that the trusted user setting is All. 2. For security, type the IP address of the export client in the Limit access to IP address field. This action ensures that only the client’s root user can access the export. 3. From a Linux or UNIX client, enter the showmount command to display the NFS exports that are hosted by the NAS cluster. For example: showmount -e nas_vip 4.
3. Select the NFS export in the NFS Exports panel and then click Modify NFS Export. The Modify NFS Export dialog box opens. 4. In the dialog box, click the Permissions tab. 5. Specify whether to allow access to all clients, if they meet other access control requirements, or to a specific IP address or subnet. You can use asterisks in the IP address. 6. Click OK. Modify the Permission for an NFS Export To modify the permission (read-write or read-only) for an NFS export: 1.
6. Click OK. Modify an NFS Export NOTE: To edit an NFS export, you must have group administrator (grpadmin) privileges. To edit the properties of an NFS export: 1. Click NAS, expand NAS Clusters and Local Containers, and then select the NAS container name. 2. Click the NFS Exports tab. 3. Select the NFS export in the NFS Exports panel and then click Modify NFS export. The Modify NFS Export dialog box opens. 4.
About SMB Shares SMB shares provide an effective way to share files located on a FluidFS cluster, such as the FS76x0, by using the Server Message Block (SMB) protocol. FluidFS v4 supports SMB protocol versions 1.0, 2.0, and 3.0. The default SMB protocol version is SMB 3.0. You can set the default to an earlier version using the CLI command nas-cluster select cluster_name smb-protocol. Refer to the Dell EqualLogic Group Manager CLI Reference Guide for more information about this command.
NOTE: You can create an initial SMB share when you create a NAS container. However, you cannot configure and enable the NAS antivirus service. You must modify this initial SMB share to configure and enable the antivirus service. 1. Click NAS, expand NAS clusters and Local Containers, and then select the NAS container name. 2. Click Create SMB share to open the wizard. 3. In the General Settings page: a. Type a name for the SMB share in the Name field.
2. Click the SMB Shares tab. 3. Select the SMB share in the SMB Shares panel and click Modify SMB share. 4. In the Modify SMB Share dialog box, click the General tab. 5. Modify the directory as needed. 6. Click OK. Delete an SMB Share To delete an SMB share and delete all the user data stored in that share: 1. Click NAS, expand NAS Clusters and Local Containers, and then select the NAS container name. 2. Click the SMB Shares tab. 3.
7. • Enable or disable virus scanning. • Modify file extensions. • Select directory paths to exclude. Click OK. NOTE: The default antivirus exclude path is no longer available. Directory paths must already exist in the SMB share before they can be excluded. To exclude directory paths from antivirus scanning: 1. Create the SMB share without the exclude option. See Create an SMB Share. 2. Go to the SMB share and create the directory paths that you want to exclude from antivirus scanning. 3.
NOTE: Only the SMB shares created in a NAS container after setting this default property will have access-based enumeration by default. SMB shares that were created before setting this property still have the properties that were set when the shares were created. Enable Access-Based Enumeration on Newly Created SMB Shares To write data to a NAS container, you must create an SMB share. 1. Click NAS, expand NAS Clusters and Local Containers, and then select the NAS container name. 2.
For example, when client jsmith connects to the FluidFS cluster, the feature will present jsmith with any available SMB shares, as well as an SMB home share labeled jsmith. NOTE: You still must create the user folders yourself and set the permissions manually or by using an automated script if the automatic home folder creation option is not enabled in the SMB home share settings.
Check marks appear in all the Allow checkboxes. This object is the share from which you will be creating a folder for each user’s home share. 5. In the Group or user names box, select Everyone, then click Remove → Apply. Replace the Owner 1. In the Properties window on the Security tab, click the Advanced button to open the window for Advanced Security Settings for home. 2. In the Advanced Security Settings window, click the Owner tab and then click the Edit button. 3.
3. Click Yes to confirm. Modify SMB Home Share Settings To modify SMB home share settings: 1. Click NAS, expand NAS Clusters, and select SMB Home Share. 2. In the Activities panel, click Modify settings. 3. In the SMB Home Share General dialog box, you can enable or disable automatic home folder creation, and enable or disable access-based enumeration. You can also modify antivirus settings if antivirus is enabled. 4. Click OK.
Check marks appear in all the Allow checkboxes. 6. Click OK. 7. Click two OK buttons. Both windows close, returning you to the Windows Explorer main window. 8. Close the MMC console. Create a NAS Thin Clone During the creation of a NAS thin clone, you cannot modify its size, minimum reserve percentage, or in-use warning limit percentage. These settings can be changed later. 1. In the NAS panel, select a local container that contains a snapshot. 2. Select the snapshot. 3.
Optimal Virtual IP Assignment To optimize availability and performance, client connections are load balanced across the available NAS controllers. NAS controllers in a NAS cluster operate simultaneously. If one NAS controller fails, clients are automatically failed over to the remaining controllers. When failover occurs, some SMB clients reconnect automatically, while in other cases, an SMB application might fail and the user must restart it.
To cancel, click No. Modifying Client Network Properties Default values for gateway IP address, bonding mode, and MTU are shared among all the client networks for a NAS cluster. Depending on the bonding mode selection, a message prompts you about the change in the number of virtual IP addresses for your client networks and the need to change the virtual IP address settings for each client network to ensure that load balancing is optimal. To modify the client network properties: 1.
NAS Antivirus Server Specifications The following requirements apply for antivirus servers: • FluidFS version 3.0 or later must be loaded on the cluster. • The server must be accessible by the network. Dell recommends that the server be located on the same subnet as the NAS cluster. • The server must run certified ICAP-enabled antivirus software.
6. In the Port field, type the port number or click Use default port. 7. Click OK to confirm your changes. Delete a NAS Antivirus Server You cannot delete the last server unless you first allow any in-progress operations to complete and you disable NAS antivirus on all SMB shares. NOTE: Reducing the number of available antivirus servers might affect file-access performance. To delete a NAS antivirus server: 1. Click Group, expand Group Configuration, and select the NAS cluster. 2.
• Use only numbers, letters, underscores, and dollar signs ($) in the file types. 2. Click Group, expand Group Configuration, and select the NAS cluster. 3. Click the Advanced tab and go to the Antivirus Defaults for SMB Shares panel. 4. In either the File Extensions to Exclude or Directory Paths to Exclude subpanel, click Add to open the Add List Item dialog box. 5. Specify a file type such as xls or ppt. Do not include the period (.) that separates a file type from the file name. 6.
Monitor the NAS Antivirus Service If you have configured NAS antivirus, you can monitor which SMB shares are using the service. 1. Click NAS , expand NAS Clusters and Local Containers, and then select the NAS container name. 2. Click the SMB Shares tab. 3. In the Virus scanning column, determine which shares have virus scanning enabled or disabled.
NOTE: Wildcard characters (*) and question marks (?) are not supported in antivirus exclude paths. – Click Delete and then click Yes to confirm. 4. Click OK. 5. Click the Save all changes icon. Exclude Directory Paths for an SMB Share You can exclude directory paths for a specific SMB share when you create an SMB share or when you subsequently modify the NAS antivirus settings for an SMB share. 1. Click NAS, expand NAS Clusters and Local Containers, and then select the NAS container name. 2.
• Select an extension, click Modify, change the extension, and click OK. • Select an extension, click Delete, and click Yes to confirm. 6. Repeat to add, modify, or delete additional file types. 7. Click OK. Antivirus Policy Depending on the antivirus policy, a file could be deleted immediately or made inaccessible to users and programs. If the antivirus server or NAS cluster's default setting causes file deletion, you can only recover a previous (uninfected) file.
5. Select the user type. 6. In the User field, you can enter a user name (or the beginning of a user name) and click the Search button. 7. Select the user and click Next. 8. In the Create quota – Quota settings dialog box, specify the following configuration settings: • Quota size and units (MB, GB, or TB) • In-use space warning limit, as a percentage of the quota size NOTE: Specifying zero for a quota size and warning limit disables the quota. 9. Click Next. 10.
3. In the Quotas panel, select defuser and click Modify. The Modify Quota dialog box opens. 4. In the dialog box, specify the following configuration settings: 5. • Quota size and units (MB, GB, or TB) • In-use space warning limit, as a percentage of the quota size Click OK. Delete a NAS Container Quota You cannot delete the default group quota or the default user quota. To disable a default quota, set the quota size and the warning limit to zero. To delete a NAS container quota: 1.
NOTE: Dell does not recommend using a combination of local and external authentication where replication and quotas are applied. External Authentication External authentication is managed on a server whenever a user logs in to a container in the same group as the server. Using external authentication, a user can log in to different containers in the group using the same user name and password. This authentication is performed with Active Directory, LDAP, or NIS, for example.
Term Description Available Space Storage space that is physically available for the NAS container. The available space for a NAS container is the amount of unused NAS container space (reserved and unreserved), provided that the NAS reserve has free space. Oversubscribed Space A portion of a thin-provisioned NAS container that is not available and not in use by the NAS container.
NOTE: • The NAS clusterwide default values are applied when new containers are created. • If you select the Container thin provisioning default checkbox, ensure that you click the Save all changes icon afterward. If you do not, updates from the array will clear your selection. Thin-Provisioned Container Attributes Thin-provisioned containers have the following characteristics: • Minimum reserve is 0% to 99%. The default is 0%. • Maximum size for thin-provisioned container is 500TB.
The data reduction settings are shown at the bottom of the status information panel. NAS Container Data Reduction Data reduction is a process that runs according to a schedule on each NAS container that has data reduction enabled. A policy that you define determines whether or not a file qualifies for data reduction, on the basis of access and modification times of that file.
Data Reduction Methods Data reduction is supported on a per-NAS-volume basis to store data more efficiently. The Dell FluidFS cluster supports two types of data reduction: • Deduplication — Performed on qualified data when data reduction is enabled on a container. You cannot disable deduplication when data reduction is enabled. Deduplication (or dedupe) provides data reduction by eliminating redundant copies of data across files in a volume by keeping only one copy of unique deduplicated data.
3. Click the Data Reduction tab. 4. Select the Enable data reduction checkbox. A confirmation message is displayed. 5. Click Yes to confirm enabling data reduction. 6. Review the data reduction policy shown on the dialog box. 7. (Optional) If you want to modify the policy settings for the container, click the Modify policy button to open the dialog box. • Compression By default, compression is disabled and only deduplication is enabled.
NOTE: The status of the filter is listed as File filters….disabled if the ignore-filters option was set through the CLI. If the status is File filters…disabled, any filters that have been configured through the GUI (or CLI) for Access Time or Modify Time have been disabled and all files are candidates for data reduction. Specifying the ignorefilters flag enables data reduction on a container with archive data without waiting for the minimum Access Time/ Modify Time data-reduction policy.
• This value must be in the range of 30 to 365 days if compression is enabled. If compression is disabled, the range is 5 to 365 days. By default, this value is 30 days. In Modify Time, enter a value. After modifying the modify time, click the Save icon to save the changes. The modify time is the minimum number of days that must pass since the file was last modified before the file is eligible for data reduction. This value must be in the range of 30 to 365 days if compression is enabled.
Analyzing data on a container for data reduction will take longer than scanning and reducing previously analyzed data. When defining the data reduction schedule on your system, consider when all files on a container need to have been analyzed for data reduction. The efficiency of the data reduction process is affected by the number of controllers analyzing data. Create a Data Reduction Schedule 1. Click Group, expand Group Configuration, and select a NAS cluster. 2. Click the Data Reduction tab. 3.
FS Series VAAI Plugin The VAAI plugin allows ESXi hosts to offload some specific storage-related tasks to the underlying FluidFS appliances.
To verify that an FS Series datastore has VAAI enabled use the command vmkfstools –P in the ESXi host console. The following example illustrates the query and output for a datastore named FSseries_datastore residing on a FS Series v4 or later system: ~ # vmkfstools -Ph /vmfs/volumes/FSseries_Datastore/ NFS-1.00 file system spanning 1 partitions File system label (if any): FSseries_Datastore Mode: public Capacity 200 GB, 178.
15 Diagnose and Resolve NAS Cluster and PS Series Issues If you have to work with Dell support to resolve an issue related to a PS Series array or a NAS cluster, you can provide the support team with necessary data to facilitate successful troubleshooting of the issue without having to install software or download tools from the Dell support site.
2. Day – Last 24 hours. Data is shown for each hour. 3. Week – Last 7 days. Data is shown every 6 hours in the last 7 days. 4. Month – Last month. Daily for the last month. 5. Year- Last year. Data is shown for every 2 weeks of the last year. Online Diagnostics You can obtain online diagnostic information while the system is still online and running.
4. Choose the appropriate option. 5. Press the Escape key at any time during a test to stop the test. Generating PS Series and NAS Cluster Diagnostics Reports NOTE: To generate diagnostics reports, you must have group administrator (grpadmin) privileges. To generate a diagnostics report: 1. Log in to Group Manager by using your administrator login ID and password. 2. In the navigation pane, click Tools. 3. Click Diagnostics reports. 4.
The following message is displayed: Do you want to delete TCP/SCP_server_ip_address? 7. Click Yes. The server is deleted from the list and the SMTP servers section is updated. Reinstall FS Series Firmware v4 from an Internal USB FS7600 and FS7610 NAS appliances contain an internal USB from which you can reinstall the FS Series firmware v4 factory image. If you experience general system instability or a failure to boot, you might have to reinstall the image.
16 About Backing Up and Protecting Your Data A PS Series group is part of a comprehensive backup and data protection solution. Snapshots provide quick recovery and offloading backup operations. On a PS Series group, the system creates the copy instantly and maintains it on disk storage within the group. It does not disrupt access to the volume and requires minimal impact on running applications. Snapshots can provide a stable copy of data for copying to backup media.
Protect NAS Container Data with NDMP A NAS cluster supports the Network Data Management Protocol (NDMP), which facilitates backup operations for network-attached storage, including NAS containers. A NAS cluster includes an NDMP server that performs NAS container backups to an external Data Management Application (DMA) server running backup software. After you configure a DMA server for a NAS cluster, the NDMP server listens on the client network for backup requests from the DMA servers.
NOTE: • You cannot restore a template volume from a snapshot. • Generally, snapshots will not be deleted unless you take action to delete them. In some instances, however, snapshots can be deleted by the system. For example, when a new snapshot is taken and not enough snapshot reserve space is available for the new snapshot and the previous one, the older one will be deleted. A snapshot can also be deleted during snapshot borrowing if you run out of borrowable space.
Snapshot reserve is a percentage of the volume reserve. Because the volume reserve for a thin-provisioned volume changes as volume usage increases, the snapshot reserve for a thin-provisioned volume also changes. The group generates event messages when the amount of free snapshot reserve falls below a user-defined threshold. NOTE: • Depending on the policy that you set for snapshot space recovery, the group preserves snapshot reserve.
NOTE: To change the groupwide default values for both the snapshot space reserve and the warning percentage: 1. Click Group → Group Configuration. 2. Click the Defaults tab. 3. In the Snapshot space reserve section of the Volume Settings panel, modify the settings as needed. Settings specified here apply to newly created volumes only, not to existing volumes. Modify Snapshot Space Recovery Policy To modify the snapshot space recovery policy: 1. Click Volumes. 2.
Set a Snapshot Online or Offline By default, a snapshot is offline. You can set a snapshot online, making it accessible to iSCSI initiators that match one of the snapshot’s access control policies. If you set a snapshot offline, any current iSCSI connections to the snapshot are lost. 1. Click Volumes. 2. Expand Volumes. 3. Expand the volume name and then select the snapshot timestamp. 4. In the Activities panel, click Set snapshot online or Set snapshot offline. 5.
NOTE: Snapshot names can be up to 127 characters. Fewer characters are accepted for this field if you type the value as a Unicode character string, which takes up a variable number of bytes, depending on the specific character. Modify the Snapshot Alias You can modify the public alias (public name) for a snapshot. Some iSCSI initiators show the alias along with the iSCSI target name. The alias can help you identify the snapshot.
The following considerations and constraints apply when restoring a volume from a snapshot: • All members that contain data from a volume or snapshot must be online. • A template volume cannot be restored from a snapshot. • Before the restore operation starts, the group automatically creates a snapshot of the current volume. • A synchronous replication (SyncRep) volume cannot be restored from a snapshot if the snapshot’s size is different from that of the volume.
The snapshot appears (identified by its timestamp) when you expand the NAS container name in the far-left panel. About Deleting NAS Container Snapshots You can manually delete a snapshot when it is no longer needed. The NAS cluster automatically deletes one or more of the oldest snapshots for a NAS container when: • The number of snapshots created from a schedule exceeds the max-keep limit.
A plus sign appears next to the container names that are associated with one or more snapshots. 3. Expand the container and select the snapshot to modify. 4. In the Activities panel, click Modify snapshot properties to open the dialog box. 5. In Snapshot name, modify the snapshot name. A snapshot name can contain up to 229 characters.
2. Click Custom Snapshot Collections in the Volumes list. 3. In the Activities panel, click Create custom collection to open the dialog box. 4. Provide the requested information in each step of the wizard and click Next. 5. Click Finish to create the collection or click Back to make changes. The default custom snapshot collection name is the volume collection name followed by the date and time when you created the snapshots (for example, UserData-2014-05-14-15:08:18.3).
A regular (standard) volume has a fixed volume reserve; this volume reserve for regular volumes does not change when its usage increases. With a thin-provisioned volume, the system automatically increases volume reserve as more data is written to that volume. As the volume reserve increases, so does the allotted snapshot space for that volume. Snapshot borrowing allows a thin-provisioned volume to keep its snapshots when snapshot reserve shrinks due to volume unmapping.
To disable snapshot space borrowing, clear the checkbox. NOTE: You can also control snapshot space borrowing under the Group Configuration Defaults tab. Settings specified here apply to newly created volumes only, not to existing volumes.
• Promote the replica set to a recovery volume (and snapshots) on the secondary group and configure initiators to connect to the recovery volume. If the primary group becomes available, you can replicate the recovery volume to the primary group and then fail back to the primary group, returning to the original configuration. NOTE: Replication is used primarily for disaster recovery and does not take the place of a comprehensive backup strategy.
• The primary group is configured as a replication partner. • The correct amount of space is delegated to the primary group for storing replicas of primary group volumes. Increase that space if necessary. 6. On the primary group, configure the volume for replication, specifying the appropriate replication space values, and verifying the replication partnership. 7. On the primary group, replicate the volume. 8. (Optional) Set up a schedule to create replicas on a regular basis. 9.
Figure 16. Replication to Multiple Partners Reciprocal Replication Between Partners Both partners replicate volumes to each other. For example, in Figure 17. Reciprocal Replication Between Partners, GroupA replicates Volume1 to GroupB, and GroupB replicates Volume2 to GroupA. For the replication of Volume1, GroupA is the primary group and GroupB is the secondary group. For the replication of Volume2, GroupB is the primary group and GroupA is the secondary group. Figure 17.
Figure 18. Centralized Replication About Replication Space Volume replication between partners requires space on both the primary group (the volume location) and the secondary group (the replica location). These space requirements are classified in the following way: • Local replication reserve Each volume requires primary group space for use during replication and, optionally, for storing the failback snapshot.
Figure 19. Local Replication Reserve Local replication reserve has two purposes: • Preserve the contents of the volume at the time replication started. The primary group creates a snapshot of the volume in the local replication reserve to preserve the contents of the volume at the time replication started. If the volume changes occur during replication, the snapshot tracks those changes, consuming more local replication reserve.
• If you did not enable the option to borrow free pool space (or if you enabled the option, but not enough free pool space is available), the primary group deletes the failback snapshot and generates an event message. To reestablish the failback snapshot, increase the local replication reserve and replicate the volume.
The local replication reserve size is based on a percentage (5 percent to 200 percent) of the volume reserve. For a thin-provisioned volume, the volume reserve size changes dynamically based on volume usage; therefore, the local replication reserve size also changes. The recommended local replication reserve percentage depends on whether you want to keep the failback snapshot: • No failback snapshot Specify 100 percent for the local replication reserve.
The secondary group administrator delegates space to the primary group when configuring the group as a replication partner. The administrator can modify the partner configuration and increase or decrease delegated space as needed. When the primary group administrator configures a volume for replication, a portion of that delegated space is reserved for the volume. This space, called replica reserve, limits the number of replicas for that volume that you can keep on the secondary group.
2. The primary group increases the replica reserve if the replica volume usage increased since you enabled replication on the volume. NOTE: If delegated space is too small to hold the increased, replica reserve, the primary group generates an event message and replication pauses. Replication resumes automatically when delegated space is large enough to hold the reserve. 3. The primary group copies the contents of the volume to replica reserve, decreasing the amount of free replica reserve.
Guidelines for Sizing Replica Reserve for a Volume To determine the amount of space that the secondary group must delegate to the primary group, you must obtain the replica reserve requirement for each primary group volume that you are replicating to the secondary group. When you configure a volume for replication, you specify the replica reserve size as a percentage (minimum 105 percent) of the replica volume reserve, which approximates in-use volume space.
NOTE: If your system has delegated space configured across multiple storage pools, the size of the space in at least one of the pools must be greater than the volume size. Otherwise, replications will fail. For example, if you have 4 pools with 20GB of space each, but the volume size is 30GB, one or more of the pools must be changed to greater than 30GB for replications to succeed.
About Replication Partners Before you can replicate volume and NAS container data between two PS Series groups, you must configure the groups as replication partners. Each partner plays a role in the replication of a volume, and you can monitor replication activity and manage replicas from either partner: • Primary group Location of the volume. The primary group administrator configures the secondary group as a replication partner and initiates the replication operation.
Primary Group Replication Attributes Table 48. Primary Volume Replication Attributes describes attributes that you set when you configure a volume for replication in the primary group. You can modify the replication configuration and change the attribute values. Table 48. Primary Volume Replication Attributes Attribute Description Replication partner Partner that stores the volume replicas. The partner must have space delegated to the group.
Attribute Description Passwords are case sensitive and can include up to 254 ASCII characters. Delegated space Amount of space to delegate to the partner. Required only if the group stores replicas from the partner. See About Delegated Space and Replica Reserve. NAS configuration If you are replicating NAS containers, the replication partner must have a compatible NAS configuration.
2. Expand Volume Replication and then select Inbound Replicas. The Inbound Replicas panel displays information about the replicas. You can also choose to perform the replication by using manual transfer replication. See the Dell EqualLogic Manual Transfer Utility Installation and User’s Guide for more information. Replication Partner Fields You need the information in the following table for both primary and secondary groups. Data Description Example Name Name of the primary group.
Modify Partner Contact Information To modify partner contact information: 1. Click Replication and then select the partner name. 2. Click Modify partner settings. 3. Change the contact name, email address, or phone numbers. 4. Click OK. Manage Space Delegated to a Partner You can modify the space delegated to a partner, subject to the following restrictions: • You cannot decrease the space delegated to a lower capacity than is currently reserved for the partner’s replicas.
NOTE: If the group is hosting a recovery volume from the partner, before you delete the partner either: • Demote the recovery volume to an inbound replica set (which is deleted when you delete the partner). Double-click the recovery volume in the far-left panel and click Demote to replica set. • Promote the recovery volume to a permanent volume. To delete a replication partner: 1. Determine whether NAS container replication is enabled. If so, delete all NAS container replication relationships. 2.
Pause and Resume Replication of a Volume You can pause and resume volume replication. For example, tasks such as promoting a replica set require you to first pause volume replication. To pause replication for a volume: 1. Click Volumes. 2. Expand Volumes and then select the volume name. 3. In the Activities panel, click Pause volume replication. 4. When prompted to confirm the decision, click Yes. To resume replication for a volume: 1. Click Volumes. 2.
• When you disable replication on a volume, the delegated space on the secondary group that is storing the replicas becomes an unmanaged space. You cannot manage this space from the primary group. If you do not need the replicas, log in to the secondary group and delete the replica set. • You cannot disable replication on a template volume if any attached thin clones have replication enabled. To disable replication for one volume: 1. Click Volumes. 2. Expand Volumes and then select the volume name.
Configure a Volume Collection for Replication You can simultaneously replicate data in related volumes by replicating the volume collection. The resulting set of replicas is called a replica collection. NOTE: To replicate a volume collection, you must configure all the volumes in the collection to replicate to the same partner. 1. Click Volumes. 2. Expand Volume Collections and then select the collection that you want to replicate. 3.
A volume and its replica set are always stored in different groups connected by a robust network link. Separating the groups geographically protects volume data in the event of a complete site disaster. All replicas are thin provisioned by default. Create a Replica The first time that you replicate a volume to a partner, the primary group copies the entire volume contents to replica reserve on the secondary group.
• To selectively delete replicas from a set, select the replica set and click Delete replicas in the Activities panel, or right-click the replica set and select Delete Replicas from the menu. In the dialog box that opens, you can select the replicas to be deleted. Hold down the Control key while clicking to select multiple replicas, then click OK to delete the selected replicas.
• • • To delete a replica collection set, select it in the Remote Replicas panel, then click Delete replica collection set. To delete a replica collection, expand the replica collection set, then select the replica collection and click Delete replica collection. To delete a single replica from a replica collection, expand the replica collection, then select the replica and click Delete replica.
Previous to v8.0, writing a significant amount of data to a volume might result in the day’s replica being unusually large. The size of this replica might be so large that older replicas are deleted from the replica set, which means that the replica set no longer retains three replicas. As of v8.0, replication borrowing allows replica sets to borrow enough space to hold the replicas that would otherwise be deleted.
Time-to-Live When using PS Series v10.0 or later with Dell Storage Manager 2018 R1 or later, you can modify the amount of time a replica remains in the PS Series Group. Time-to-Live (TTL) deletes the replica snapshots on the PS array based on the TTL value sent by the Storage Center during the creation of a replica snapshot. Only the expired snapshots are deleted. NOTE: • TTL is applicable for SC to PS cross-platform replication only.
• If you are creating a replication schedule, you must configure both groups to be replication partners for each other. • You cannot schedule a snapshot or replication operation for a template volume. Using a schedule can generate many snapshots or replicas, so make sure that you have sufficient snapshot or replication space. You can set a limit on the number of snapshots or replicas that a schedule creates. Create a Schedule 1. Click Volumes, expand Volumes, and then select the volume name. 2.
4. • Schedule name – Name can be up to 63 bytes and is case insensitive. Fewer characters are accepted for this field if you type the value as a Unicode character string, which takes up a variable number of bytes, depending on the specific character. • Start and end dates • Time of day and repetition • Snapshot settings (keep, writable) • Enable or disable the schedule Click OK. Delete a Schedule You can delete unwanted schedules for volumes or collections.
• Time — Time of day that the schedule runs. • Status — Whether the schedule is enabled (running) or disabled (paused). • Actions — Tasks that you can perform for this schedule (including modify, enable or disable, and delete). Disable a NAS Container Snapshot Schedule To temporarily stop a schedule from creating NAS container snapshots, you can disable the schedule. Enable the schedule to resume the regular creation of snapshots. To disable a NAS container snapshot schedule: 1.
17 About Data Recovery A PS Series group is part of a comprehensive backup and data protection solution. Snapshots provide quick recovery and offloading backup operations. Restore operations are more reliable because snapshots ensure the integrity of the backed-up data. Replication protects data from serious failures such as destruction of a volume during a power outage, or a complete site disaster.
How quickly you can replicate the recovery volume depends on the presence of the failback snapshot on the primary group. The failback snapshot establishes the failback baseline, which is the point in time at which the volume on the primary group and the most recent complete replica on the secondary group have the same data. If the failback snapshot exists, only the changes made to the recovery volume are replicated.
• You cannot use snapshots to restore data to template volumes. • Restoring the volume from a snapshot requires taking the volume offline and terminating any iSCSI connections to the volume. • You cannot restore a synchronous replication (SyncRep) volume from a snapshot if the snapshot’s size is different from that of the volume. • You cannot restore template volumes from snapshots. Failback to Primary Operation (Manual) The Failback to Primary operation consolidates multiple tasks.
• You can use manual replication if a large amount of data must be transferred. See the Dell EqualLogic Manual Transfer Utility Installation and User’s Guide or the online help for information. To replicate a recovery volume to a partner using individual tasks: 1. 2. Log in to the primary group and then: a. Set the original volume offline. b. Cancel any in-progress replication. c. Set any snapshots for the volume offline. d.
• Before you can make a template replica set promotion permanent, you must permanently promote all the attached thin clone replica sets. • You must specify: – A new volume name, must be unique name in the group Name can be up to 63 bytes and is case-insensitive. You can use any printable Unicode character except for ! " # $ % & ' ( ) * + , / ; < = > ?@ [ \ ] ^ _ ` { | } ~. First and last characters cannot be a period, hyphen, or colon.
Make a Temporary Volume Available on the Secondary Group You can make a temporary copy of a volume available on the secondary group, while providing continuous access to the original volume on the primary group. Using a temporary copy is helpful when you want to perform an operation (such as a backup) on the copy with no disruption to users. When the operation is completed, you can resume replicating the volume.
4. Click Replicate to partner to open the Replicate Recovery Volume dialog box. 5. Specify the group administrator account name and password. 6. Select whether to perform the replication by using manual transfer replication. 7. Select whether to save the primary group administrator account name and password for future use in the current GUI session. 8. Click OK. Monitor the Replicate to Partner operation to make sure that all tasks complete: 1.
• Retain the iSCSI target name of the original volume. • Keep the ability to demote to the replica set. (Unless you are permanently promoting the replica set, make sure that you keep this ability.) 7. Click Next to open the Promote Replica Set – iSCSI Access panel. 8. Specify the following information: • Conditions that a computer must match to connect to the recovery volume. Type a CHAP user name, IP address, or iSCSI initiator name. • Recovery volume permission (either read-only or read-write).
2. Expand the recovery volume to display the status of each task in the operation. If an individual task fails during a Replicate to Partner or Failback to Primary operation, correct the problem. After correcting the problem, in the Failback Operations panel, right-click the failed operation and click Retry task. The operation continues automatically. Fail Back to the Primary Group When you want to return to the original volume replication configuration, you can use the Failback to Primary operation.
3. a. Demote the original volume to a failback replica set on the primary group. b. Replicate the recovery volume to the primary group. If you kept the failback snapshot for the original volume, only the changes made to the recovery volume are replicated. When you are ready to fail back to the primary group, use the Failback to Partner operation to: a. Set the recovery volume offline. b. Perform a final replication to synchronize the volume data across both groups. c.
Prerequisites for Permanently Promoting a Replica Set to a Volume The following constraints apply: • • In some cases, you cannot permanently promote a replica set in a single operation. If you cannot deselect the Keep ability to demote to replica set option, you must temporarily promote the replica set and then make the promotion permanent. See Promote an Inbound Replica Set to a Recovery Volume and Make an Inbound Replica Set Promotion Permanent.
About Failing Over and Failing Back a Volume If a failure or maintenance in the primary group makes a volume unavailable, you can fail over to the secondary group and allow users to access the volume. If the primary group becomes available, you can fail back to the primary group. Restriction: You cannot replicate a recovery template volume, and you cannot demote a template volume to a failback replica set.
Figure 22. Primary Group Failure (Data Not Available) Figure 23. Step 1–Fail Over to the Secondary Group (Data Available) shows the first step in recovering data on the secondary group, which is to fail over the volume to the secondary group. To fail over the volume, promote the inbound replica set to a recovery volume and snapshots. The recovery volume contains the volume data represented by the most recent, complete replica. Users can connect to the recovery volume to resume access to volume data.
Figure 24. Step 2–Replicate to the Primary Group (Data Available and Protected) shows the second step in recovering data— replicate to the primary group. When the primary group is available: • Demote the original volume to a failback replica set. • Replicate the recovery volume to the primary group. NOTE: If the failback snapshot is not available on the primary group, the first replication transfers all the recovery volume data, instead of only the changes that users made to the recovery volume.
Figure 25. Step 3–Fail Back to the Primary Group About NAS Disaster Recovery Disaster recovery restores data on a primary storage resource and returns that resource to a full working state with minimal data loss after operation on that resource is interrupted. The interruption could be planned, such as a maintenance update, or unplanned, such as a power outage. CAUTION: If the site containing the source container incurs a catastrophic loss, contact Dell Technical Support for assistance.
opens several TCP ports to mirror differences across the network. Figure 26. Basic NAS Replication shows an example of basic NAS replication. When replication finishes, the system creates a replication snapshot and compares the replication snapshot on the destination NAS cluster to the replication snapshot on the source NAS cluster. Data flows in both directions in NAS replication, meaning that the same cluster can host both source and destination clusters.
1. On the source cluster, select NAS, expand Local Volumes, and select the NAS volume that you are replicating. 2. Click Replicate. 3. Click Yes. 4. (Optional) Display the Alarms and Operations toolbar and click the Failback Operations tab. NAS Replication Network Architecture NAS replication depends on specific network capabilities, such as TCP ports opened over a secure tunnel and communication using the storage area network (SAN). NAS replication opens several TCP ports.
• All EqualLogic SAN ports by way of the EqualLogic Group IP • NAS cluster SAN Management Virtual IP (VIP) address • Physical SAN ports on every NAS controller and SAN IP address NOTE: Ports referred to here are physical and do not refer to TCP/IP port numbers opened through the TCP/IP stack using an application. Table 50. TCP/IP Port Numbers shows the ports that must be open on the firewall. Table 50.
FS7610 Cluster Management and Replication Port CAUTION: The ports identified with an arrow in Figure 28. FS7610 NAS Cluster Management and Replication Port are used for NAS cluster management and replication functionality. It is critical that these ports remain connected and operational at all times. Figure 28. FS7610 NAS Cluster Management and Replication Port FS7600 Cluster Management and Replication Port CAUTION: The ports identified with an arrow in Figure 29.
Figure 30. FS7500 NAS Cluster Management and Replication Port Set Up Your NAS Replication Environment To help ensure successful replication, for each NAS container that you want to replicate, follow these steps to set up your replication environment: 1. Gather the following information to help you determine how much replication space you need: • Number of replicas that you want to keep • Average time span between each consecutive replica • Reported size of the volume • Whether thin-provisioned 2.
Pausing NAS container replication suspends any replication operations for the container that are in process. While replication is paused, scheduled replications do not take place. • You can pause NAS container replication for individual containers. Unlike volume replication, it cannot be paused for all replications to a specific partner. You can pause replication from either the source or destination group.
NOTE: • The requirements for NAS container replication are not validated when you create the replication partnership. The system will not allow you to configure replication for a container if the source and destination clusters do not meet the configuration requirements. • Restoring volume configuration on the destination cluster is not supported between major revisions (such as version 3 > version 4).
The configuration of your environment determines how you change the configuration. For example, if the source cluster uses Active Directory (AD) / Lightweight Directory Access Protocol (LDAP), the destination cluster must use the same AD/LDAP. This setup ensures all user information is retained in the new configuration. • Change the Domain Name System (DNS) server to point to the destination cluster instead of the source cluster.
• Both groups must be running PS Series firmware version 7.0 or later, and the clusters on those groups must be running FS Series firmware version 3.0 or later. To perform single-step failback to primary: 1. Click NAS, expand NAS Cluster, and expand Local Containers. 2. Select the recovery container. 3. Click Failback to primary. The Failback to Primary message is displayed. 4. Click Yes. The Replicate Recovery Container message is displayed. 5.
To replicate to a container in a cluster: 1. Log in to Group Manager and delete replication for the source container. 2. From the destination cluster, configure replication for the promoted recovery container, specifying that it replicate back to the original source container. 3. Manually perform replication on the promoted recovery container. 4. After replication completes, log in to the source cluster and promote the original source container. 5.
NOTE: To display replication history: 1. Click Monitoring. 2. Below NAS Replication, select Outbound Replica Containers. 3. Select the Replication History button. Activate the Source Cluster When you configure the source cluster to serve client requests, you reverse the changes that you made when you activated the destination cluster for failover. While the source cluster is being activated, client connections might fail and need to be reestablished.
1. Click Replication → Replication Partners. 2. In the Activities panel, click Configure partner. The Replication Partner Identification tab of the Configure Replication Partner wizard opens. 3. Provide the requested information in each step of the wizard and click Next. Refer to the online help resources that are available in the user interface to view descriptions of individual fields. 4. 5. 6.
Attribute Tested Authentication Status Action Test was not run An internal error prevented this test from running. If you continue to receive this error, contact Dell customer support. OK All of the following conditions have been validated: • • Invalid The configured partner's name matches the remote group name. The inbound and outbound passwords configured on the remote replication partner.
For disaster recovery on NAS containers, after you fail over to the destination container, you can fail back to the primary container in a single-step process. A properly configured system does not require a configuration restoration to perform a failover operation. However, if the source cluster configuration needs to be applied to the destination cluster, contact Dell Technical Support for assistance.
Figure 31. NAS Replication Failover Performing a failover to the NAS destination cluster involves the following steps: • Promoting each replication destination NAS container • Activating the destination cluster After resolving the cause of the failure on the NAS source cluster, fail back to the NAS source cluster. Fail Back to a Source Volume Failing back to the source, or primary, volume reestablishes the originally configured replication relationship.
5. Activate the source cluster. 6. Recreate the replication relationship. NOTE: You have to reinstall Dell Fluid File System (FluidFS) on the source cluster only if the source cluster is entirely new. See the Installation and Setup Guide if you must reconfigure the source cluster. About Promotions and Recovery Containers If a NAS container becomes unavailable, you can promote a replica container to a recovery container, preserving host access to the container’s data.
About Cloning Volumes Cloning a volume creates a new standard volume, template volume, or thin clone volume, with a new name and iSCSI target, but the same reported size, pool, and contents as the original volume at the time of the cloning. • [Parent volume] Templates are read-only (gold image) copies of a volume. • Thin clones are duplicate volumes that share space with their parent volume. Cloning a volume consumes space from the pool where the original volume resides.
• Cloning a thin clone replica creates a new thin clone volume, which remains attached to the thin clone replica set. By default, the new volume is set online, has read-write permissions, and uses the group default snapshot space and iSCSI settings. Cloning a replica consumes 100 percent of the original volume reserve from free secondary group pool space. If you want to create additional snapshots or replicas of the new volume, additional space is needed.
18 About Synchronous Replication Synchronous replication (SyncRep) is the simultaneous writing of data to two pools for a volume in the same PS Series group, resulting in two hardware-independent copies of the volume data. Each write must go to both pools before the write is acknowledged as complete. If one copy of the volume data is not available due to a power failure or resource outage, you can still obtain the data from the other pool.
Table 52. Comparing Synchronous Replication and Traditional Replication provides in-depth information about the differences between the two features. Table 52. Comparing Synchronous Replication and Traditional Replication Consideration Traditional Replication Synchronous Replication (SyncRep) Typical use case A point-in-time process that is conducted between two groups, often in geographically diverse locations.
Consideration Traditional Replication Synchronous Replication (SyncRep) See About Synchronous Replication and Snapshots for more information. Scheduling Replication operations can be scheduled using the same mechanism used for scheduling snapshots. Pool space requirements The primary group must have enough space for the volume reserve and local replication reserve, in addition to any snapshot reserve.
Figure 32. Synchronous Replication 1. The iSCSI initiator sends a write to the group. 2. Data is simultaneously written to both the SyncActive and SyncAlternate volumes. 3. The SyncActive and SyncAlternate volumes confirm to the group that the writes are complete. 4. The write is confirmed to the iSCSI initiator.
• Until all tracked changes are written, the data in the SyncAlternate volume is valid only up to the point in time when the volume went out of sync. • While changes are being tracked or when tracked changes are being written back to the SyncAlternate volume, performance might be temporarily degraded. Figure 34. Tracked Changes Written to SyncAlternate Volume 5. When all tracked changes are written, the volume goes back in sync. 6.
• Disconnect the SyncActive volume, as documented in the Group Manager online help. If the disconnect fails, try logging in to a different member in the SyncActive pool. NOTE: If the disconnect operation will not succeed from any member in the SyncActive pool, contact your Dell support provider for assistance. • Log in to the Group Manager GUI using an IP address that belongs to a group member in the pool containing the SyncAlternate volume. Do not use the group IP address. • Fail over the volume. 5.
A volume can become out of sync if synchronous replication is paused, or if one of the volumes becomes unavailable or has no free space. The volume can become out of sync when the snapshot reserve in the SyncAlternate volume is full, but only when the snapshot space recovery policy sets volumes offline when the snapshot reserve is depleted.
NOTE: If data reduction has been enabled on the volume, snapshot reserve is permanently disabled. When you create a snapshot of a volume for which synchronous replication (SyncRep) is enabled, the snapshot resides in the pool that is the SyncActive pool at the time the snapshot is created. If the SyncActive pool is switched, existing snapshots remain in the pool in which they were created, and subsequent snapshots reside in the new SyncActive pool.
You can switch the synchronous replication configuration if a failure is imminent for the active pool, or if maintenance needs to be performed on the array hardware in the active pool. You can also switch pools at any time, even if a failure has occurred, provided that the volume is in sync. Aside from the brief period when the volume is offline during the switch, switching eliminates downtime during a maintenance window on the active pool.
For example, assume you have a collection for which the active pool is Pool-A and the alternate pool is Pool-B, and Pool-C is a third pool in the group. Any synchronous replication-enabled volumes that use Pool-C must have their pool assignments changed to be using Pool-A and Pool-B before they can be added to the collection. • When you create the collection, active and alternate pools for the collection’s volumes are chosen based on the pool assignment of the first volume added to the collection.
• Before converting a synchronous replication volume into a template, it must be in sync. To convert an out-of-sync volume to a template, you must first disable synchronous replication for the volume. Configure Synchronous Replication (SyncRep) on a Volume Before you can configure synchronous replication for a group, the group must include at least two different storage pools. See the following sections for more information: Create an Empty Storage Pool and Create a Storage Pool from an Existing Member.
1. Click Volumes. 2. Expand Volumes and then select the volume. 3. In the Activities panel, click Pause SyncRep. When prompted, confirm the action. While synchronous replication is paused: • The volume’s SyncRep status in the General Volume Information panel indicates that it is paused. • If any data is written to the volume while synchronous replication is paused, the writes are tracked. The tracked changes are written to the SyncAlternate volume when synchronous replication is resumed.
Change the Pool Assignment of a Synchronous Replication (SyncRep) Volume To change the pool assignment for a synchronous replication volume, use the following steps. NOTE: The same free space requirements apply to changing the pool containing the SyncActive or SyncAlternate volume that also apply when moving a volume for which synchronous replication is not enabled. 1. Click Volumes. 2. Expand Volumes and then select the volume. 3.
If you fail over to the alternate pool while the volume is out of sync, any changes written to the volume since it went out of sync will be written to a snapshot. As with other snapshots, it can be cloned or restored, but is also subject to deletion by the group’s snapshot retention policy. If the snapshot is deleted, its data will be lost and cannot be recovered. If you fail over to the alternate pool while the active pool is disconnected, all unreplicated data will be lost and unrecoverable.
19 About Self-Encrypting Drives (SEDs) and AutoSED A self-encrypting drive (SED) performs Advanced Encryption Standard (AES) encryption on all data stored within that drive. SED hardware handles this encryption in real-time with no impact on performance. To protect your data, a SED will immediately lock itself whenever it is removed from the array (or otherwise powers down). If the drive is lost or stolen, its contents are inaccessible without the encryption key.
About Self-Encrypting Drives (SED) SEDs (self-encrypting drives) are disk drives that use an encryption key to secure the data stored on the disk. This encryption protects the PS series array from data theft when a drive is removed from the array. SED operates across all disks in an array at once. If one drive in a RAID set is removed from the array, a new set of encryption key shares is generated automatically and shared among the remaining disks.
• Loss of the entire array, or simultaneous loss of half of the drives in the array. If half of the drives on an array are lost, the data on those drives is compromised. The locking mechanism for the remaining drives is also compromised, leaving the data exposed. If more than half of the drives are lost, the array is rendered inoperable.
During normal operation, the array has the information it needs to operate SED disks. The key shares are stored across the array on the non-spare disks. If a disk fails and is replaced by a spare, the configuration generates a new set of key shares, and the original key shares are discarded. If a SED disk goes offline due to power failure, removal from the array, or disk failure, the disk is automatically locked, and any data residing in memory about that disk drive is automatically wiped.
Is it safe to discard or return a locked SED? Yes. Any data that you have written to the drive will be locked and inaccessible. When you return a drive to Dell, the only information that remains readable are its operating statistics (S.M.A.R.T. data), its RAID type, and its hardware error logs. Can I add SEDs to a non-SED array, or vice versa? No. Do not mix SEDs and non-SEDs in the same array.
Security is not compromised. Array Y cannot unlock the drive because it needs the SEDset key from array X. The drive can be manually converted to a spare, and doing so will instantly erase it. 7. SED array is operating normally. A drive and a controller are removed. Security is not compromised on the drive. The SEDset key cannot be found on the controller, even if it is pulled from a running system.
When AutoSED generates a backup set, this set consists of three shares with a threshold of two, which adds security and reliability to a sensitive process. To destroy a set of shares, you could erase every share. However, if you erase only two shares from a backup set, the remaining share cannot recover the key and is useless. Example: AutoSED Key Sharing Consider an enclosure with 22 active drives and 2 spares: 1.
20 About Monitoring You can review comprehensive data about your array groups. Monitoring your PS Series array groups provides data that enables you to assess the health of your storage environment to quickly identify hardware and software problems. Monitoring provides valuable data about the time and action of users on the system, protecting against security intrusions.
• • • • • • • • Replication schedules, replication (including inbound and outbound replication), and replication partners Alarms and operations (including critical and warning alarms, actions, group operations, and failback operations), and storage pool free space Group members (including a specific member), the member health status, and member space Member enclosures, including power supplies and other hardware Control modules Disk drives Network hardware Volumes, collections, and snapshots, including cur
NOTE: The “Go to” icons work only when monitoring is paused. Table 53. Performance Monitor Operation Iconss Icon Operation Start polling the data. Stop polling the data. Go to the start (first item). Go to the previous item. Go to the next item. Go to the end (last item). Add, Change, or Remove Statistics You can display up to four sets of statistics in the Performance Monitor window. To add more statistics: 1. Click Add statistics to open the Select Statistics dialog box. 2. Expand Members. 3.
To delete counter sets: 1. In the Performance Monitor window, click Add statistics. 2. In the Select Statistics dialog box, click Counter sets. 3. In the Counter Set Management dialog box, select the counter set that you want to delete. 4. Click the Delete link. 5. In the Delete Counter Set Confirmation dialog box, click Yes. Change How Data Is Displayed Table 54. Changing How Data Is Displayed shows the icons that you use to change the data display.
Figure 35. Performance Monitor – Select Data Point Customizing the Performance Monitor Within the Performance Monitor window, you can change the following items: • Colors used in graphs See Change the Display Colors. • Values for data points: – Length of time between which data points are collected – Number of data points to save See Change the Data Collection Values.
Figure 36. Performance Monitor – Select a Color Dialog Box Change the Data Collection Parameter Values You can change the following parameter values for data collection as needed: • Time between data points • Number of data points to save Table 55. Data Collection Values shows the parameters and their default and maximum values. Table 55.
About SAN Headquarters SAN Headquarters (SAN HQ) is a performance-monitoring tool that enables you to monitor multiple PS Series groups from a single graphical user interface (GUI). SAN HQ gathers and formats configuration and performance data into easy-to-view charts and graphs. Analyzing this data can help you improve performance and more effectively allocate group resources.
• Click the Hide SAN HQ reminder option from within the alarm. To reverse this configuration and reenable the display of SAN HQ monitoring alarms: 1. Click Group → Group Configuration → General. 2. In the SAN Headquarters section of the panel, select Enable reminder in Alarms panel. Monitor Group Members Member hardware problems typically cause event messages and alarms. Monitor the member hardware and replace any failed components immediately.
EIP or OPS Card • Some array models include an Enclosure Interface Processor (EIP) card, and others contain an OPS (operations) card. An array continues to operate if the EIP or OPS card fails. You can replace the failed EIP or OPS card with no impact on group operation. • In the Member Enclosure window, the EIP card panel shows the EIP card status. The OPS card panel shows the OPS card status. Channel Cards • Some array models include redundant channel cards.
The various panels display information about the selected member. Monitor Control Modules Each group member has one or two control modules installed. One control module is designated as active (responsible for serving I/O to the member). On the active control module the LED labeled ACT is lit. In a dual control module array, the other control module is secondary (mirrors cache data from the active control module).
Table 56. Control Module Status Status Description Solution active Serving I/O to the member None needed; informational secondary Mirroring cache data from the active control module None needed; informational Cache Battery Status Table 57. Cache Battery or Cache-to-Flash Module Status describes status values for control module cache batteries or cache-toflash modules, depending on the array model, and provides solutions for any problems. Table 57.
For information about replacing channel cards, see the Hardware Owner's Manual for your array model or contact your PS Series support provider. NVRAM Battery Status Table 59. NVRAM Battery Status describes status values for control module NVRAM coin cell batteries and provides solutions for any problems. NOTE: Some arrays do not have an NVRAM battery. Table 59. NVRAM Battery Status Status Description Solution good Battery installed and fully charged None needed; informational.
Status Description Solution copying to spare Data is being written to a spare drive. None needed; informational unsupported version Drive is running an unsupported firmware version. Contact your PS Series support provider. When a drive in a RAID set fails, a member behaves as follows: • If a spare drive is available — Data from the failed drive is reconstructed on the spare. During the reconstruction, the RAID set that contains the failed drive is temporarily degraded.
– down — Not operational, not connected to a functioning network, not configured with an IP address or subnet mask, or disabled • Port failover status (under Controller) — Current status of the controller: – Primary — no vertical port failover – Secondary — vertical port failover has occurred – Unknown — value cannot be determined • Requested status (under Network interface) — Status set by administrative action: – enabled — Configured and serving I/O – disabled — Not serving I/O, but might be configured
• Check your PS Series group capacity. A key component of the health of your PS Series group is capacity. To fully understand the capacity for new applications or support the growth of existing servers, you must examine the overall group and pool capacity, storage utilization statistics, thinprovisioned space, and space used for replication. To ensure a healthy SAN, it is important to detect any sudden or unexpected changes in capacity utilization.
• An action takes too long to complete. • An action did not finish on time. Follow these guidelines to analyze the performance problem: • Are users getting the response time they expect? If not, identify which area might be causing the problem: – Operating system problem, as it interacts with storage – Network problem – Application being run or accessed – Storage environment • Use the 80/20 rule.
Damaged Hardware Typical Symptom Detected By Possible Corrective Actions Defective array hardware Alerts Contact Dell customer support to replace malfunctioning component Monitor PS Series group Monitor SAN Headquarters Set up email alerts on group and SAN Headquarters As best practice, use the SAN Headquarters GUI to help identify hardware-related issues. SAN Headquarters easily tracks the array model, service tag, and serial number, plus RAID status and policy, and firmware version.
• Greater than 80 ms — An average latency of more than 80 ms indicates a problem, especially if this value is sustained over time. Most enterprise applications will experience problems if latencies exceed 100 ms. You should reduce the workload or add additional storage resources to handle the load. If the average I/O operation size is greater than 16KB, these latency guidelines might not apply. If latency statistics indicate a performance problem, examine the total IOPS in the pools.
Queue Depth SAN Headquarters displays the queue depth (average number of outstanding I/O operations at the start of each incoming I/O operation) for each disk drive (raw I/O), volumes (only iSCSI traffic), groups, and pools. A queue depth of zero indicates no I/O activity. High or sustained queue depths might indicate that the group is under a high load. NOTE: A group must be running PS Series firmware version 6.0 or a later version to display iSCSI queue depth for a volume.
2. Expand Volumes. 3. Select the volume name that you want to monitor. 4. Click the tabs to display specific information about the volume. To display snapshot information: 1. Click Volumes. 2. Expand Volumes. 3. Expand a volume name. 4. Select a snapshot timestamp. 5. Click the tabs to display specific information about the snapshot. Information That You Should Monitor • Check the status of all volumes and snapshots.
For example, you should monitor information about: • Outbound replication (all volumes on the group configured for replication) • Inbound replication (all replica sets stored in the group from all partners replicating to this group) • Replication history (history of all outbound replications) NOTE: Replication history displays the last 10 replicas only. In addition, you should monitor the usage of delegated space. If free delegated space is not available, replica reserve cannot increase automatically.
• In-process replication activity between groups • Amount of free delegated space If free delegated space is low and the replica volume reserve for each replicated volume has not reached its maximum (and, therefore, can increase), consider increasing the delegated space. About Monitoring Replication Operations If you are replicating volume data, you should monitor replication operations to make sure that each operation completes.
The Outbound Volume Replication panel displays a list of volumes. Select a volume name to display statistics about that volume. Monitor Outbound Replication History To see replication history: 1. Click Monitoring. 2. Select Replication History. The Outbound Replication History panel displays a list of volumes. You should periodically examine the replication duration information. If you see long replication times, make sure that the network connection between the partners is sufficient.
The Replication Partners panel shows all replication partners, replication direction (inbound and outbound), replication status, delegated space, and free space. You should monitor the usage of delegated space. If free delegated space is not available, replica reserve cannot increase automatically. Monitor a Specific Partner To display details about a specific partner: 1. Click Replication. 2. Select the replication partner.
• LEDs on the array chassis light. The Alarms panel header is divided into two areas: Alarms and Operations. Each header includes icons that match the tabs in the panel.
• Data integrity: – RAID is not functioning – More than one valid RAID set in the array – Full lost block table • Cache: – Control module cache has lost data – Cache battery is not charging because it exceeds the temperature limit – Cache contains data that does not belong to any of the installed disk drives • Cooling component fault: – Array temperature exceeds upper or lower limit – Missing fan tray or cooling module – Both fans failed on a fan tray or cooling module • Hardware component fault: – F
• – Power supply does not have power Control module: • – One installed control module – Control module failover occurred – Control module has insufficient RAM – Lock on secondary control module is open (not all array models) – Active control module syncing with secondary – No communication between control modules Batteries: – Real-time-clock battery has low charge – Cache battery has less than 72 hours of charge Monitor Group Operations 1. Open the Alarms and Operations panel. 2.
for your system. These diagnostic reports are stored on both the FS Series and PS Series arrays. The PS Series diagnostic report can be emailed automatically to your Dell customer support representative. Due to the size of the FS Series diagnostic report, that diagnostic report can be stored only on the array. • Generate diagnostic reports only when your support representative instructs you to do so. • Change the default settings only if your support representative instructs you to do so.
8. On the PS Series Diagnostics – Report Destination tab, specify email information for sending the generated report: • If you are working with a Dell support representative and want to email a diagnostic report to your representative, select Send reports to your support provider. • If you need to specify other email addresses where you want to send diagnostic reports, select Send reports to other email addresses and enter the email addresses.
To view the status of the diagnostics on each member, expand Operations at the bottom of the window, and click the Group Operations tab. Enable FTP on a NAS Cluster If you are working with a Dell customer support representative to run diagnostics on NAS controllers, you must enable FTP to provide your representative access to the NAS diagnostics report. To enable FTP on a NAS cluster: 1. Click Group, expand Group Configuration, and select the NAS cluster. 2. Click the Advanced tab. 3.
• • • • Consider using multipathing (or MPIO), which provides a high-performance and highly available path between a server and storage. Use the Dell EqualLogic Host Integration Tools for a multipathing solution. Make sure the server Ethernet ports, PCI bus, and CPU are rated for the workload. If the server is a clustered computer, isolate cluster network traffic from iSCSI storage traffic. Check for other network traffic interference.
NOTE: If you need more network bandwidth for iSCSI I/O, do not configure a dedicated management network. Storage Pool Capacity Low storage pool capacity is a problem that generates an alert in SAN Headquarters. If a pool has less than 5 percent of free space (or less than 100GB per member, whichever is less), a PS Series group might not have sufficient free space to efficiently perform the virtualization functions required for automatic optimization of the SAN.
• Verify the access control policies for the volume. Using the iSCSI initiator name instead of an IP address can make access controls easier to manage and more secure. • Ensure that Dell EqualLogic MPIO extensions are properly installed on the supported operating systems. See the Dell EqualLogic Host Integration Tools documentation for details. • Ensure that MPIO is supported and properly configured, according to the documentation for the operating system.
21 Reference: GUI Panels, Wizards, and Dialog Boxes Provide detailed information for each GUI panel, operation message, wizard, and dialog box in Group Manager. This information includes: • Field name and description • Field input limits • Shortcut keys About Groups A PS Series group is a fully functional iSCSI storage area network (SAN). You create a group when you configure one or more PS Series arrays and connect them to an IP network.
Callout Description Containers for storage resources (disk space, processing power, and network bandwidth). A pool can have one or more members assigned to it. A group can provide both block and file access to storage data. Access to block-level storage requires direct iSCSI access to PS Series arrays (iSCSI initiator). Access to file storage requires the FS Series NAS appliance using NFS or SMB protocols and the Dell FluidFS scale-out file system.
Panel Description Object types in pool “pool” that can borrow space Objects in pool “pool” that can borrow space (n) • Storage pool and resource – Each storage pool on the group and its associated resources • Total – Amount of space being used on each storage pool and its associated resources, but does not include the total amount of space allocated to volume reserves • Used as designated – Total amount of allocated reserves being used for the objects in the pool • Borrowed – Amount of space bein
Panel Description • Replica sets on partner “group (n)” All partners – Amount of space being used in each category on all partners Displays information about all of the replica sets on the group or only those replica sets that are borrowing space.
NOTE: Only an account with group administrator privileges can view or manage a NAS cluster. When you configure a NAS cluster, you specify the network configuration for the service and the amount of storage pool space for the NAS reserve. The NAS reserve is configured with Fluid FS and stores client data, in addition to NAS cluster metadata. The NAS reserve is divided into NAS containers in which you create SMB shares and NFS exports to make storage space available to users.
Network interfaces in a NAS controller are numbered. Each interface has a specific function and is used for a client network, SAN network, internal network, or IPMI connection. If you understand the function of each network interface, you can ensure a highly available network configuration in which no single switch failure or network cable disconnection results in a service disruption.
• Promote the replica set to a recovery volume (and snapshots) on the secondary group and configure initiators to connect to the recovery volume. If the primary group becomes available, you can replicate the recovery volume to the primary group and then fail back to the primary group, returning to the original configuration. NOTE: Replication is used primarily for disaster recovery and does not take the place of a comprehensive backup strategy.
Callout Description 3 PS Series storage pools Containers for storage resources (disk space, processing power, and network bandwidth). 4 PS Series single-member pool A PS Series array represented as a member within a pool to which it is assigned. 5 PS Series multimember pool Multiple PS Series arrays represented as individual members within a pool to which it is assigned.
• Control Access to iSCSI Initiators – To protect your volumes from unauthorized and uncoordinated access by iSCSI initiators, you can use access control policies. • Control Access to Hosts (servers) – To prevent inadvertent corruption of the volume caused by multiple hosts writing to it in an uncoordinated manner, enable multihost access to a volume. Access Control List Panel The Access Control List panel displays which access policies are assigned to the selected volume.
Attribute Description IP addresses IP address specified in the access point, if applicable. Requires that access policies be expanded so that access points are shown. Applies to Indicates whether an extended access point or access policy is to be applied to both the volume and its snapshots, the volume only, or the snapshot only. You can edit the Applies to parameter directly from the subpanel. Access Control List Panel (for selected volume) Table 73.
Access Panel - SNMP Table 74. Access Panel Field Description Read-only community name Adds, modifies, or deletes community names. A community name is a password that allows a management console access to group configuration and management data. You can specify up to 5 names, and each name can be up to 64 ASCII characters long. Names cannot contain the following characters: space, tab, comma, pound sign (#). NOTE: SAN Headquarters requires you to configure access to a group.
Field Description Access Policies Access Policies Contains a list of all available access control policies. The "+” sign next to a policy name indicates that you can expand it to view the access points that make up the policy. New Creates a new access policy Modify Opens the currently selected access policy for editing Delete Deletes the currently selected access policy. When prompted, click Yes to confirm.
Active Directory Panel Table 78. Active Directory Panel Field Description Shortcut Status Status of Active Directory on the NAS cluster: None • • • • optimal non optimal offline unknown Domain Domain configured for the NAS cluster None Configure Active Directory Configures the NAS cluster to use an Active Directory configuration to authenticate Windows clients. This button appears only if Active Directory is not configured.
Field Description Shortcut To restore the default port, click Use default port (Alt+D). Base DN Base domain name (DN), if different from the default. The name can be up to 511 ASCII characters. Alt+B To restore the default base DN, click Get default (Alt+G), which retrieves the default domain name from the AD server. User Search Path Path from which all the LDAP searches for object type User are to be performed.
Field Description Modify Enables you to modify the name, description, or access point properties of the currently selected access policy Delete Deletes the currently selected access policy from the Access Policies list, and removes it from the PS Series group. Removing the policy also removes all connections the policy had to any targets. When you are prompted to confirm the deletion, click Yes. Add Access Policies Dialog Box CAUTION: Do not add or modify access policies on NAS ACL volumes.
Attribute Description Shortcut Delete Deletes the currently selected access policy from the access policy group, and the None Access Policy Groups list. When you are prompted to confirm the deletion, click Yes.
Add Local User Dialog Box Table 86. Add Local User Dialog Box Title Field Description Shortcut User names can have up to 20 ASCII characters, including letters, numbers, underscores, hyphens, and periods (multiple periods cannot be consecutive). The name must start with a letter or a number and cannot end with a period. Alt+U General settings User name NOTE: After the account is created, you cannot modify the name. To change the name, delete the account and create a new account.
Add NAS Controller Pair Message Verifies that you want to configure a NAS controller pair. You cannot perform any other NAS cluster operations while adding a NAS controller pair. Add NAS Controller Pair Wizard The Add NAS Controller Pair wizard is used to configure initial controllers on the cluster. The user interface contains the following tabs: • Client Network • Secondary Client Networks • SAN Access • Summary Table 87.
Field Description Shortcut Next Navigates to the next configuration screen Alt-N Back Navigates to the previous configuration screen Alt+B Field Description Shortcut Group IP address (readonly) Network address for the PS Series group Alt+G NAS cluster management IP address (read-only) Allows access between the PS Series group and the NAS cluster. The management IP address must be on the same subnet as the group IP address.
Advanced NAS Container Information Dialog Box Defines whether the few writers workloads feature distributes files (inodes) among domains to optimize resource usage on the NAS cluster. You can enable or disable this feature for a specific NAS container using either the Group Manager GUI or CLI. Table 93.
Field Description Condition Summary of the condition of the object that triggered the alarm. Displays information regarding how to correct the situation. Table 97. Group Operations Tab Field Description Started Date and time the operation started Object Object on which the operation is performed Operation Summary of the condition of the object that triggered the alarm Status Displays that the operation is “in progress.” Shows “canceling” if you clicked Cancel in the actions section.
Field Description Shortcut Directory paths to exclude Excludes only the specified directory paths from virus scans.
Field Description Shortcut Clear Event List Deletes all events in the list None Show/Hide Event Details Shows or hides details about the selected event None Account Account that performed the logged action None Date and Time Date and time the action was performed None Message Description of the event None NOTE: You can also use the CLI to view the contents of the audit log.
Field Description Shortcut Enable RADIUS accounting for authenticated users You can use a RADIUS accounting server to monitor the login and logout times for accounts that a RADIUS server authenticates. Alt+N Change Account Password Dialog Box Table 103. Change Account Password Dialog Box Field Description Enter new password Enter a new password for the account or group. Confirm new password Retype the new password. Change Group Membership Password Dialog Box Table 104.
Choosing a RAID Policy When selecting a RAID policy, you should consider the level of data protection you require, as well as I/O performance, capacity needs, and the types of drives contained in your PS Series array. Table 106. RAID Policies summarizes best practices for RAID policy selection. Table 106.
Workload Requirement RAID 5 RAID 6 RAID 10 RAID 50 Random reads Excellent Excellent Excellent Excellent Random writes Fair Fair Excellent Good Performance impact of drive failure or RAID reconstruction RAID performance and availability are directly affected during rebuild and reconstruction. RAID reconstruction times increase substantially as physical drive size increases.
Client Network Panel Table 113. Client Network Panel Title Field Description Client network settings VLAN tagging Supported during the create and modify processes only. The default ID will be 0, providing for backwards compatibility. Enter a number of 1–4094.
Field Description Shortcut Create volume in folder (Optional) Places this thin clone in a folder. You must create folders before running the wizard. Folders are for organizational purposes only. If no folders exists for the group, this option is disabled.
Field Description Shortcut Some environments might need multihost access to a target. You can enable multihost access to a target if you meet any of the following conditions: • • • • No Your cluster environment gives the initiators on each cluster computer a different IQN, and the environment can manage multiple connections to a target. For example, the environment uses a Distributed Lock Manager or SCSI reservations.
NOTE: Cloning a snapshot creates a new standard volume, template volume, or thin clone volume with a new name and new iSCSI target name, but with the same reported size, pool, and contents as the original volume at the time you created the snapshot. The group allocates space equal to the volume reserve you specify for the new volume. If you reserve snapshot space for the new volume, the group allocates additional space. Also, the snapshot still exists after the clone operation.
Field Description Estimated changes in storage pool pool Shows the differences between the amount of current space and new space in the specified pool for these categories: volume reserve, snapshot reserve, replication reserve, delegate space, free pool space, and the amount of space available for borrowing.
Field Description Shortcut Pick one or more access policies or policy groups.
Field Description Shortcut Storage pool Lists the storage pool to which the clone will belong (matching that of the original) Alt+S (Optional) Select a folder to place this clone in. Alt+F Folder Create volume in folder Storage pool assignment Displays all the pools within the group, information about each pool (name, capacity, free space, drives, pool encryption), and which pool your clone will be created in None Table 124. Space Field Description Shortcut Volume size Size of the volume.
Field Description Shortcut Some environments might need multihost access to a target. You can enable multihost access to a target if you meet any of the following conditions: • • • • No Your cluster environment gives the initiators on each cluster computer a different IQN, and the environment can manage multiple connections to a target. For example, the environment uses a Distributed Lock Manager or SCSI reservations.
Clone Volume Wizard You can clone a volume, including a template volume or a thin clone volume. Cloning creates new copies of a volume that are the same type and have the same contents as the original volume. Table 127. General Volume Settings Field Description Shortcut Name Name can be up to 63 bytes and is case-insensitive. You can use any printable Unicode character except for ! " # $ % & ' ( ) * + , / ; < = > ?@ [ \ ] ^ _ ` { | } ~. First and last characters cannot be a period, hyphen, or colon.
NOTE: The following table shows the different access-type configurations that you can choose in the Define iSCSI Access Points window, and whether you can access the volume or snapshot from multiple iSCSI initiators. Table 129.
Field Description Shortcut Edit Displays a dialog box to modify the selected access policy or access policy group, depending on whether you have Access Policies or Access Policy Groups selected None Add Adds the selected access policy or access policy group and moves it to the list of access controls that will be applied to the volume.
Collection Volumes Panel Table 133. Collection Volumes Panel Field Description Volume Name of the volume within the selected collection Storage pool Storage pool to which the volume belongs Reported size Maximum amount of space for the volume that the group can allocate to the volume Volume reserve Actual amount of pool space that the group has allocated to the volume. The value of the volume reserve depends on whether you enable thin provisioning on the volume.
Field Description ECO level ECO level of the component Boot ROM Boot ROM version followed by the date and time the boot ROM ran for the component Configure Active Directory Wizard NOTE: Configuring Active Directory interrupts client access to SMB shares. • Configure NTP Servers • Configure DNS • Configure Active Directory • Summary Tab Table 135. Configure NTP Servers Field Description Add Opens the Add NTP server dialog box, where you can define an IP address.
Table 137. Configure Active Directory Title Field Description Shortcut Active Directory domain to which you want to add the NAS cluster. Use the fully qualified domain name (for example, mydomain.company.com), not the NetBIOS domain name. Alt+D General settings Domain The Active Directory domain name accepts up to 63 characters, including underscore, hyphen, and period.
Title Field Description Shortcut Replica Container Replicate to an existing Does not create a new container as the replica container on the container on the partner partner cluster. Instead, uses a container that already exists on the cluster as the replica container. Alt+P Any data on the specified container is lost with the first replication. I understand that using an existing container as a replica will destroy all data residing on it.
Configure DMA Servers Dialog Box Table 141. Configure DMA Servers Dialog Box Field Description Add Adds a DMA server IP address. This address can contain up to 63 characters. You can specify up to 3 addresses. Modify Modifies the selected IP address Delete Deletes the selected IP address Configure DNS Dialog Box Table 142. Configure DNS Dialog Box Field Description DNS servers, in order of preference Lists the configured DNS servers. Servers are listed in the order that they are used.
Table 143. General Settings Field Description Shortcut Name Unique name, up to 63 characters (including periods, hyphens, and colons), that identifies the member. Alt+A Description (Optional) Description of the member, up to 127 characters. Fewer characters are accepted for this field if you enter the value as a Unicode character string, which takes up a variable number of bytes, depending on the specific character.
Table 147.
Title Field Description Shortcut Controller IP addresses IP address field Enter one IP address for each NAS controller. Auto fill Automatically enters NAS controller IP addresses based on their virtual IP address Alt+F Clear Clears the NAS controller IP addresses field Alt+R Description Shortcut Group IP address (readonly) Network address for the PS Series group Alt+G NAS cluster management IP address Address that allows access between the PS Series group and the NAS cluster.
• Replication Services • Delegated Space • Summary • Test Partnership Table 153. Replication Partner Identification Field Description Shortcut Group name Name of the partner group. Group names are case sensitive. The group name can contain a maximum of 54 ASCII characters including hyphens. The first character must be a letter or a number. Alt+M Group IP address IP address of the partner group (for example, 12.16.22.123). No wildcards are accepted in this field.
Configuring delegated space is optional. Table 156. Delegated Space Field Description Shortcut Delegated space Amount of storage space for the enabled pool that the group delegates to store replicas from the partner. This value can be no larger than the space available for borrowing. Alt+D Storage pool (Volume replication only) Select the pool from which you want to delegate space. The default storage pool is available if the pool contains enough space.
Configure SMTP Servers Dialog Box Table 160. Configure SMTP Servers Dialog Box Field Description Shortcut Add Adds a new SMTP server None Modify Modifies the selected SMTP server None Delete Deletes the selected SMTP server None Up Moves the selected SMTP server up in order of preference None Down Moves the selected SMTP server down in order of preference None Sender email address Specifies the recipient of the diagnostics report Alt+A Configure SyncRep Wizard Table 161.
Table 163. Advanced Settings Field Description Shortcut Keep failback snapshot The most recent complete replica will be retained in the local replication reserve to allow the partners to synchronize by replicating changes only. Alt+K Control Module Panel Table 164.
Field Description Shortcut Description (Optional) Descriptive text about the volume's purpose or other distinguishing characteristics. Maximum length is 127 characters. Fewer characters are accepted for this field if you type the value as a Unicode character string, which takes up a variable number of bytes, depending on the specific character.
Field Description Shortcut To use an existing policy or policy group, either double-click it, or select it in the Available list and click Add to move it to the Selected list. Access policy groups: Alt+G To use all the available policies and policy groups, click Add All. Available list: Alt +V Add: Alt+A Remove: Alt+R New Defines a new access policy or policy group None Edit Opens the Modify Access Policy dialog box None Table 169.
Field Description • • Warning — Fan speed is either too fast or too slow (outside normal operating RPM). Check the event log in the monitoring section of the Group Manager GUI for the warning message. If the event occurs only once, and another event indicates that the fan speed is back to normal, then the problem has been resolved. If the warning persists, replace the fan module. You might have to replace a fan tray or the entire power supply, depending on the array model.
Field Description – The data does not benefit from further compression (such as video or audio files). – The media has enough space for the transfer file without compression. – The speed of the copy operation is more important than data compression. • • Transfer options Verify transfer file – If selected, MTU verifies that the files are readable on the device to which they are transferred and that they contain the correct data.
Field Description Color Shows the color used by each counter Description Explains the data that the selected counter contains NOTE: You cannot modify or delete preconfigured counter sets. Create Administration Account Wizard • General Settings • Account Permissions • Contact Information Table 177. General Settings Field Description Shortcut Account type Local user account Account authentication occurs within the group.
Table 178. Account Permissions Field Description Shortcut Group administrator (all permissions) Can perform the same tasks as the grpadmin account, except for updating member firmware or fetching diagnostic files using FTP. Alt+G Read-only account (read-only access to group) Can view information about all group objects except NAS clusters, but cannot change the group configuration.
Field Description Shortcut Mobile (Optional) Mobile phone number of account contact, up to 31 ASCII characters Alt+L Create SMB Share Wizard • General Settings • Antivirus Settings • Summary Table 181. General Settings Field Description Shortcut Name An SMB share name can contain up to 24 characters, including letters, numbers, dollar sign ($), and underscores. You cannot modify the SMB share name.
Field Description • Shortcut /data/*/tmp The path can contain up to 511 ASCII characters. Modify Changes the selected extension None Delete Confirms that you want to delete the selected path None Large file handling Specifies the size of files to exclude from antivirus scanning. Units are MB, GB, or TB. To allow users to access unscanned files, check the Allow user access to large unscanned files checkbox. None Table 183.
Create NAS Container Wizard The Create NAS Container wizard guides you through the process of creating a NAS container. This wizard includes the following screens: • Container Name • Data Reduction • Space Settings • Create Share • Summary NOTE: The process for creating a NAS thin clone is similar, but with the following exceptions: • The Name field is populated with a default container name. • Data reduction cannot be configured.
Field Description Shortcut Snapshot Reserve Percentage of the NAS container size to be allocated for snapshot reserve. The snapshot reserve is the amount of space that will be used for storing snapshots. By default, the snapshot reserve is 50 percent of the volume reserve. Alt+R This field is available only if you do not enable data reduction on the NAS container. Minimum container reserve Slider that controls reservation — default is 0 percent reservation.
Table 190. Summary Field Description Copy Copy contents of the Summary screen to the clipboard. Use this copy to save the information in a text file, such as Notepad, for future reference. Create NAS Snapshot Dialog Box Table 191. Create Snapshot Dialog Box Field Description Shortcut Name Specifies a snapshot name. If you do not assign a snapshot name, the NAS cluster generates a name automatically, based on the NAS container name and the timestamp.
Title Field Description Shortcut All Clients in Netgroup Allows access provision at the Netgroup level, decreasing the need to enter individual IP addresses Alt+C Read-write Creates a share with read and write permissions Alt+W Read-only Creates a share with read-only permissions Alt+Y All except root Reduces the access rights of the root user. All other users are trusted. This option is also known as root squash. Alt+A Nobody Does not allow access for any users.
Field Description • Schedule Status Shortcut End Time Enables the schedule to run Alt+B Create Quota Wizard • Type • NAS User/Group Template • Limits • Summary Table 196. Type Tab Field Description Shortcut Single user Applies a quota limit to a specific user. Alt+S Each user in the group Applies a quota limit to each user in a group. A per-user quota that is applied to each Alt+E user in a group.
Create a Replica Dialog Box Table 200. Create a Replica Dialog Box Checkbox Description Shortcut Perform manual replication Enables you to choose manual transfer replication for the volume, instead of network replication (the default).With manual transfer replication, you create one or more transfer files on removable media, send them to the location of the replication partner, and upload the data into the replica set on the partner group.
Title Field Description Shortcut Snapshot schedule Defines a schedule to create snapshots Alt+S Replication schedule Defines a schedule to replicate with a partner. To define a replication schedule, you must have defined a replication partner for the container.
Type Title Field Description Shortcut Start Start date of the schedule Alt+S End End date of the schedule. This field is optional; not selecting it creates a schedule that runs continuously. Alt+D Run every Enter the number of days in between each replication or snapshot creation. (Only in Daily Schedule.) Alt+V Start Time when the schedule will start running Alt+A Repeat interval How often the schedule will create a snapshot or replica Alt+R (for example, every 5 minutes).
Create Storage Container Wizard Table 207. Create Storage Container Wizard Field Description Shortcut (Required) Name that uniquely identifies the storage container. Alt+A General settings Name Name can be up to 63 bytes and is case-insensitive. You can use any printable Unicode character except for ! " # $ % & ' ( ) * + , / ; < = > ?@ [ \ ] ^ _ ` { | } ~. First and last characters cannot be a period, hyphen, or colon.
Create Thin Clone Wizard • Volume Settings • Space • Define iSCSI Access Points • Access Types NOTE: Thin clones can be created only from a template volume. Table 210. Volume Settings Field Description Shortcut Name Name can be up to 63 bytes and is case-insensitive. You can use any printable Unicode character except for ! " # $ % & ' ( ) * + , / ; < = > ?@ [ \ ] ^ _ ` { | } ~. First and last characters cannot be a period, hyphen, or colon.
Table 212.
Field Description Shortcut Edit Displays a dialog box to modify the selected access policy or access policy group, depending on whether you have Access Policies or Access Policy Groups selected None Add Adds the selected access policy or access policy group and moves it to the list of access controls that will be applied to the snapshot Alt+A Remove Removes the selected access policy or access policy group from the list of access controls that will be applied to the snapshot Alt+R Define one or
Create Volume Wizard • Volume Settings • Space • Define iSCSI Access Points • Access Types • Volume Tags • Sector Size • Summary Table 216. Volume Settings Field Description Shortcut (Required) Name that uniquely identifies the volume. Alt+A Volume settings Name Name can be up to 63 bytes and is case-insensitive. You can use any printable Unicode character except for ! " # $ % & ' ( ) * + , / ; < = > ?@ [ \ ] ^ _ ` { | } ~. First and last characters cannot be a period, hyphen, or colon.
Field Description Shortcut At 100%, a 20GB volume would consume 40GB of storage space: 20GB for storage and 20GB for snapshots. Reported Volume Size Displays the space allocation on the volume. When thin provisioning is enabled, this field becomes a space allocating tool outfitted with 3 sliding pointer controls colored purple, yellow, and red, respectively. Click and drag the pointers to slide them back and forth.
NOTE: The following table shows the individual options that are displayed when each different access type is selected in Define iSCSI Access Points. Table 219. Access Types Field Description Shortcut Copy access controls from another volume Select the volume from which to copy access controls Select a volume from the list to copy its access controls and apply them to the clone. The window to the right of the list shows the access controls of the selected volume.
Table 221. Sector Size Field Description Shortcut 512 bytes per sector (group default) Sets the sector size to 512 bytes per sector Alt+5 4K bytes per sector Sets the sector size to 4 kilobytes per sector Alt+4 NOTE: Sector size is a permanent volume setting; it cannot be modified later. Some operating systems might not support 4K-byte sector volumes Table 222.
Custom Snapshot Collections Panel Table 224. Custom Snapshot Collections Panel Field Description Total snapshot collections Number of snapshot collections for this group Created Date and time the snapshot was created Name Name of the collection or snapshot Status Status of the collection: • • complete — A snapshot exists for each volume in the collection. incomplete — A snapshot that was originally part of the collection does not exist.
Title Field Description Rehydrate on read Indicates whether Rehydrate on read is enabled or disabled. Appears only if container was previously reduced and data reduction is currently disabled. Data Reduction Policy Deduplication Status of deduplication on the NAS container if data reduction is enabled. Deduplication increases storage space efficiency with both text and binary files, such as audio and video files. Compression Status of compression on the NAS container.
Field Description Shortcut • error – Client cannot find the file specified by the user, either because the file has not been created yet (the copy is not complete) or the correct file or location was not provided. • running – Data transfer is currently in progress. • need more files – When manually replicating a volume, if you need to break it into segments (usually due to space limits) this message is displayed when MTU is done copying that segment.
Date and Time Panel Table 228. Date and Time Panel Field Description Shortcut Time zone Time zone where the group is located. All members of a group share the same time zone. Each array’s clock is set at the factory, based on GMT. The default time zone is America/New York, EST (Eastern Standard Time). Alt+T Current group time Group time is initially based on the time set on the array that was used to create the group. Each array that you add updates its clock to match the group’s date and time.
Field Description • Pause per class — Ability to prioritize one class of traffic at the expense of another, less critical, class. Lossless Priorities Indicates whether priority-based flow control (PFC) is in use. PFC allows network devices to signal the next device that the data stream should be paused to prevent dropped packets and retransmissions.
Field Description Shortcut Use compression with text files to increase storage space efficiency. Compression does not increase storage space efficiency with binary files, such as audio and video files. Default NAS Container Permissions Panel When a file or directory is created, the default NAS container security style, which controls the permissions and ownership, is applied. You must modify the NAS container to change the default file security style Table 231.
Field Description Shortcut Minimum space reservation (0–100 percent) Minimum amount of space to reserve if thin provisioning is enabled. Default NFS Export Settings Panel Table 233. Default NFS Export Settings Panel Title Option Description Shortcut 32bit Sets the file ID compatibility to 32bit.
Field Description If your system has more than one storage pool, the GUI displays information about the default pool first and then for any other pools. Delete Local Group Message Table 235. Delete Local Group Message Field Description Shortcut Yes Deletes the selected local group Alt+Y No Does not delete the selected local group Alt+N Delete Local User Message Table 236.
Delete NAS Container Snapshots Dialog Box Table 239. Delete Snapshots Dialog Box Field Description Select snapshots to delete: Timestamp Timestamps of the snapshots that can be deleted. Click the arrow to change the order of the list. Name Name of the snapshot Size Size of the snapshot Delete NAS Container Snapshot Message Table 240. Delete NAS Container Snapshot Message Field Description Yes Deletes the snapshot from the container. The snapshot cannot be recovered.
Detach a NAS Controller Message Table 243. Detach NAS Controller Message Field Description Yes Detaches the selected controller from the group No Does not detach the selected controller from the group Disable Active Directory Message Table 244.
Discover NAS Devices Wizard The Discover NAS Devices wizard opens when you first configure a NAS cluster. Table 246. Discover NAS Devices Wizard Field Description Shortcut Discover uninitialized devices Lists uninitialized NAS controllers or appliances that were discovered and that can be configured. This list includes the following fields: None • Device — List the controllers/appliances, grouped by model number.
Drive Status Description Disk is offline Indicates that the disk drive does not fall into the other status categories. No disk installed No disk drive is installed in the slot. NOTE: When you remove a drive from an array, Dell recommends that you not reinsert it immediately. Instead, wait for the system to recognize that the drive is missing before reinserting it. Disk Encryption Panel Table 248. Disk Encryption Panel Field Description Shortcut Encryption key shares...
Email Event Notifications Panel Table 251. Email Event Notifications Panel Field Description Shortcut Send email to addresses Enables sending email messages to a list of recipients Alt+S Email recipients Maintains the email recipient list. Options include adding, modifying, or removing addresses.
EqualLogic Software Updates Table 253. EqualLogic Software Updates Field Description Top window Lists available updates to EqualLogic software, including the PS Series firmware and the Host Integration Tools Bottom window Displays a summary of the selected update, and provides a link to download the update NOTE: You must have an account on the EqualLogic support website to download EqualLogic software. Event Logs Panel Use the fields described to set up an event log. Table 254.
Filter Volumes Dialog Box Table 256. Filter Volumes Dialog Box Field Description Customize Click to open the Customize filter dialog box. From there, you can select and/or set the tags and values to be used as filters for the Volumes panel. (Filter volumes) Displays a list of tags and tag values and the number of volumes that use them. Select the ones that you want to include in the volume display. Firmware Panel Table 257.
General Member Information Panel Table 259. General Member Information Panel Field Description Status Status Status of the member: • • • • • • Online — Array is a functioning member of the group. A member can experience a failure but still be online. Offline — Member is unavailable, failed, or power was removed. Unconfigured — You did not select a RAID policy for the member. Initializing — Member is initializing according to the selected RAID policy.
Field Description • • • • • • • • OK — Disk array initialization is complete. Performance is normal. No action is necessary. RAID is not configured — The RAID settings have not been configured for the array. Failed — Multiple disk drive failures occurred in the same RAID set. The member is set offline. Contact your support provider for help. Expanding — Disk array is expanding (for example, because you installed additional disk drives or changed the member RAID policy). No action is necessary.
Field Description • • Maintenance — The cluster is down for maintenance. The cluster cannot provide client access to SMB share and NFS export. Transitioning to normal — The cluster is being taken out of maintenance mode. NAS members Number of NAS controllers or appliances in the NAS cluster. Storage pool Storage pool containing the NAS reserve. General Partner Information Panel Table 262.
Field Description Description Description of the pool. This field appears only if a description was provided by the user.
Title Field Description Original volume Replication partner Group on which the original volume resides Primary pool Name of the primary volume’s pool on the primary group Volume name Name of the original volume Size Size of the original volume. Volume capacities that are displayed in the Group Manager GUI might be rounded up by as much as 15MB. This behavior is normal, and is the result of the array’s internal calculations for capacity allocation.
General Snapshot Information Panel Table 267. General Snapshot Information Panel Field Description Created Date and time the snapshot was created Schedule Name of the schedule by which the snapshot was created, if any Size Size of the snapshot General Snapshot Information Panel Table 268.
General Volume Information Panel Table 269. General Volume Information Panel Field Description Status Status Status of the volume iSCSI access Type of iSCSI access for the volume: • • • Access type unrestricted – Volume is open to all iSCSI initiators. restricted – Volume is open only to iSCSI initiators with a certain CHAP user name, IP address, or initiator name. no access – Volume is not open to iSCSI initiators.
Field Description If no tags are associated, the system displays No tags assigned. Settings Replication partner Name of the replication partner. Visible when replication is enabled. Replica reserve Delegated replica reserve capacity for the volume on the replication partner. Visible when replication is enabled on the selected volume. Local reserve Delegated local reserve capacity for the volume. Visible when replication is enabled on the selected volume.
Getting Started The Getting Started page enables you to associate the diagnostic reports with a support case that you have opened with Dell Technical Support and select the diagnostics to run. All diagnostics are initially selected. NOTE: The Generate PS Series diagnostics and Generate NAS cluster diagnostics options appear only if NAS is configured on the system. Table 270.
Table 272. PS Series Diagnostics – Report Destination Field Description Shortcut Send reports to your support provider Emails a PS Series diagnostic report to your Dell customer support representative. Alt+S Send reports to other email addresses Emails a PS Series diagnostic report to additional email addresses. Selecting this option enables two fields where you can enter email addresses to which the diagnostic report will be sent.
Field Description Shortcut Use default port Uses the default port with the specified IP address. The default port is 25. Alt+D NAS Cluster – Report Destination The NAS Cluster – Report Destination page opens only if you selected NAS cluster diagnostics on the Getting Started screen. The Report Destination screen displays the FTP and SCP information where the NAS diagnostic report will be available. The output of NAS cluster diagnostics is approximately 1.2GB.
Group Disk Space Panel Table 278. Group Disk Space Panel Field Description Group space by use Capacity in the group reserved for volumes, snapshots, and replication, as well as delegated and free space in the pool Group space by storage pool Total capacity of each pool in the group Group free space by storage pool Free space in each pool in the group Group space by RAID level Group space configured with each RAID level (RAID 10, RAID 5, RAID 50, RAID 6, and RAID 6 Accelerated) Table 279.
Table 281. Borrowed and Oversubscribed Space Field Description Total borrowed space Total amount of borrowed pool space, including the amount of space that has already been borrowed and the amount of space that can be recovered from deleted volumes in the recovery bin. Click the link to display the Borrowed Space pane. Oversubscribed group space Amount of space that is overallocated due to thin provisioning Group Information Panel Table 282.
Field Description • • • Time between data points – Sets the number of seconds (1 through 60; the default is 1) between each moment that data is collected for the statistic that you selected. You can also select one of the predefined values from the list. Number of data points to save – Sets the number of data points that will be collected (1 through 1000; the default is 100). You can also select one of the predefined values from the list.
Field Description RAID policy RAID policy of the member Number of disks Number of disks in the member and their type (SAS, SATA, SSD) Member status Status of the member: • • • • • Compression online – Member is online and has no health conditions offline – Member is offline warning – Member has a warning health condition error – Member has a critical health condition unconfigured – Member has not been configured Compression status: • • • • • not available – Compression cannot be enabled on this m
Inbound Replica Containers Panel The Inbound Replica Containers panel displays information from monitoring inbound NAS replication. Table 287.
Field Description • remote disallow downgrade not set – Replication paused because the secondary group did not disallow firmware downgrades. • remote partner needs upgrade – Replication paused because the secondary group is running incompatible firmware. • remote replicaset is recovery volume – Replica set on the partner has been promoted to a recovery volume. stopped — Administrator paused replication.
Inbound Replicas Panel Table 290. Inbound Replicas Panel Field Description Total inbound replica sets Number of replica sets on the partner Replica set placement Location of the replica set on the partner Replica Names of the replica sets on the partner. Expand the name to see the timestamp for each replica. Replication status Status of the replica and of the replication operation. Can be either: • ready – Replication has been successfully configured.
Field Description • • Unsupported version — Disk drive is running an unsupported firmware version. Copying to spare — Disk is in the process of writing data to a spare. Errors Number of errors in the disk Health Disk health status. Possible values: • • • Sector size Not available — Current health status of the disk is not available. Healthy — Disk is running well.
Field Description • disabled Changed Date and time of the last configuration change Requested status Requested status of the network interface: • enabled — Configured and serving I/O • disabled — Not serving I/O Speed Speed of the network interface MTU size Maximum transmission unit (MTU) size. Typically, this value is 9000 for iSCSI network interfaces.
iSCSI Authentication Panel Table 294. iSCSI Authentication Panel Field Description Shortcut Enable RADIUS authentication for iSCSI initiators Configures the group to use an external RADIUS authentication server to centralize the management of administration accounts. The RADIUS server authenticates administration accounts and also determines the account privileges.
iSCSI Connections Panel (Snapshots) Table 296.
iSCSI Discovery Panel Table 299. iSCSI Discovery Panel Field Description Shortcut iSNS servers, in order of IP address (and optional port) for each iSNS server. The iSNS (Internet Storage preference Name Service) server automatically discovers and maintains an up-to-date list of group targets. The iSNS server then provides the target names to initiators configured to use the server.
Load Data from Transfer File Wizard The Manual Transfer Utility Load Data from Transfer File wizard copies the transfer file that you created on the primary group to the secondary group. Using the wizard, you specify the location of the transfer file and the encryption password, if applicable.
Field Description Account owner Administrative account that created the CHAP user account NOTE: Right-click a specific account for additional actions or click Add, Modify, or Delete from within the panel. Local Groups Panel Table 307.
Title Field Description The table at the bottom of the panel shows how space is being used for the pool selected in the table above. Replica Set Placement Initial replica set placement by storage pools Displays the current placement mapping between the source pools and the destination pools. The last row of the list contains an asterisk if a mapping has not been specified. It is blank if a mapping is invalid. Add Adds a placement mapping between the source pool and the destination pool.
Field Description Shortcut You can also use predefined tags. You can rename these tags (for example, if you want to have the tag names in a different language) or you can delete them if they are not needed. Uses Number of volumes associated to the tag or tag value None New simple tag Adds a new simple tag, which has no value Alt+N New tag with values Adds a new tag with values. Alt+T NOTE: If you cancel the operation without adding a value, the new operation is aborted and no tag is created.
Field Description Shortcut Search Searches for the UNIX user Alt+S User Select the UNIX users to set the mapping for. None User Enter the full name or partial name of the Windows user to search for. None Search subdomain Select a domain to search in for the Windows user None Search Searches for the Windows user Alt+S User Select the Windows users to set the mapping for. None Direction Specifies the direction of the mapping None Windows users Manual User Mapping Dialog Box Table 314.
Member Health Status Panel The Member Health Status panel displays the status of the PS Series array components. Table 316. Member Health Status Panel Field Description Shortcut Status overview table Displays the status of the member components. Each area is a link to the tab where more information is available. The status can be either: None • • • OK — All elements are working within the valid operating range. A green checkmark indicates an OK status.
Field Description • • Shortcut Channel cards — Channel card number, status, firmware revision, and initial (init) revision. Channel card 0 is on the right, channel card 1 is on the left. EIP card — Status and firmware revision. Only one per member. Member Space Panel Table 317.
Field Description Shortcut Use write-through mode If you enable this policy (the default) on a member with a single control module, the if battery charge is cache uses write-through mode if the charge on the cache battery is low or if the below tolerance cache-to-flash module (on some array models) might not be able to back up the memory contents to flash. Alt+W NOTE: For certain PS Series models that do not support write-through mode, not all cache control options are available.
Modify Access Policy Group Dialog Box Use this dialog box to make changes to the selected access policy group. Table 323. Modify Access Policy Group Dialog Box Field Description Shortcut Name Name of the access policy group. The policy name can contain up to 31 ASCII characters, including letters, numbers, hyphens, and periods. Names are not casesensitive.
Field Description Shortcut Description (Optional) Description of the account, up to 127 characters. Fewer characters are accepted for this field if you type the value as a Unicode character string, which takes up a variable number of bytes, depending on the specific character.
Table 327. Contact Field Description Shortcut Contact information Name (Optional) Contact name for the account, up to 63 characters. Fewer characters are Alt + A accepted for this field if you type the value as a Unicode character string, which takes up a variable number of bytes, depending on the specific character.
Title Field Description Shortcut Auto fill Automatically enters IP addresses based on the next available addresses after the first IP address Alt+T Clear Deletes NAS cluster IP addresses from the table Alt+L NAS Controller IP Address IP address for each NAS controller. This address is used None for internal maintenance operations. You must specify one IP address for each NAS controller.
Modify Custom Snapshot Collection Dialog Box Table 332. Modify Custom Snapshot Collection Dialog Box Field Description Shortcut Name Modify the name of the selected snapshot collection. Alt+A Description Modify or enter a new description for the snapshot collection. Alt+D Modify IP Settings of Network Interface Dialog Box Table 333. Modify IP Settings of Network Interface Dialog Box Field Description Shortcut IP address IP address of the interface.
Field Description Shortcut Select the Enable data reduction checkbox to activate the Modify policy button. Enabling data reduction permanently removes the snapshot reserve functionality from the NAS container. Warning limit Percentage of the snapshot reserve that, when reached by in-use snapshot reserve, None causes an event message to be sent. The minimum in-use space warning limit is 10% of the snapshot reserve; the maximum is 100%. Modify NDMP Settings Dialog Box Table 336.
Modify Passwords Dialog Box (for Replication) Table 338. Modify Passwords Dialog Box Field Description Shortcuts Inbound password Modifies the inbound password. This method is used by the partner to authenticate the group with which it will perform replication. Alt+P Outbound password Modifies the outbound password. This method is used by this group to authenticate the partner with which it will perform replication.
Modify Quota Dialog Box Table 340. Modify Quota Dialog Box Field Description Shortcut Quota size Maximum space available to the user, users in a group, or the collective group. Alt+Q You can disable a NAS container quota by setting the quota size and the warning limit to zero. Warning limit (percent of quota size) Percentage of quota size that, when reached, causes the NAS cluster to generate an event.
Modify Replica Set Wizard Table 342. Modify Failback Replica Set Wizard (for volume) Field Description Storage pool assignment Select a storage pool in the primary group for the failback replica set. If you later promote the failback replica set to a volume, the volume belongs to the new pool. Modify Replication Partner Dialog Box Table 343. Modify Replication Partner Column Description Shortcut Group name Name of the partner group. Group names are case sensitive.
Title Field Description Shortcut NAS cluster management IP address IP address that allows access between the PS Series group and the Alt+M NAS cluster. The management IP address must be on the same subnet as the group IP address. Netmask (Read-only) Subnet to which the SAN IP address belongs Alt+E NOTE: After you perform a SAN network change with replication configured, you will need to manually create a new static route for the new SAN network.
Field Description Schedule Type and Object Shortcut Run until The end of the repeat interval. For example, you can specify the schedule to run hourly from noon until 9:00 p.m. Hourly and daily Alt+U Maximum number of snapshots to keep Specifies how many snapshots to keep that result from this schedule, from 1 to 512. The default is 10.
Table 349. Space Tab Field Description Shortcut Size NAS container size. The minimum NAS container size is 20MB. The maximum NAS container size is the size of the available space in the NAS reserve. After creating a NAS container, you can increase the NAS container size as needed. You can also decrease the size of a NAS container in the Size field or use the Group Manager CLI. Alt+S NAS container size inuse warning Graphical representation of the NAS container.
Modify Snapshot Properties Dialog Box Table 353. General Settings Field Description Shortcut Name (Optional) Enter a new name for the snapshot. Alt+N Description (Optional) Add or edit a description for the snapshot. Alt+D Description Shortcut iSCSI target The iSCSI target name for the volume. You cannot modify this value. You can copy the target to the clipboard. None Public alias Public name for the iSCSI target.
Field Description Shortcut Container physical size Numeric value that specifies the size of the storage container. Select appropriate units (MB, GB, or TB) from the list. Alt+S Modify Storage Pool Dialog Box Table 356. Modify Storage Pool Dialog Box Field Description Shortcut Name Name can be up to 63 bytes and is case-insensitive. You can use any printable Unicode character except for ! " # $ % & ' ( ) * + , / ; < = > ?@ [ \ ] ^ _ ` { | } ~.
Field Description Shortcut Selects a view window to display when starting Group Manager. The default setting is Group. Alt+V Description Shortcut Automatically log in using Windows Active Directory credentials Automatically logs administrators in using their Active Directory credentials. Alt+L Automatically reconnect if disconnected Automatically tries to reconnect for 100 seconds. If the reconnect fails, the login screen is displayed. Alt+R Startup Show view at startup Table 358.
Table 360. Advanced Field Description Shortcut Checks typed text for errors before you submit data. Recommended for early error detection. Alt+V Input validation Validate input before saving Debug logging Data poller activities Logs data polling activities to a Java console. Not recommended because it can slow Alt+P performance. Server notifications Logs server notifications to a Java console. Not recommended because it can slow performance.
Field Description Shortcut Estimated changes in storage pool Displays the effect of the changes you are making. None Field Description Shortcut iSCSI target Name of the iSCSI target to the volume. You can copy the target to the clipboard. None Public alias Public alias of the volume Alt+P Allow simultaneous connections from initiators with different IQNs Select this option if you meet any of the following conditions: Alt+C Table 363.
Modifying Volume Replication Configuration Settings You can modify the settings described in Volume Replication Configuration Attributes. Changes are not applied until the next replication. NOTE: The space currently used to store replicas represents the lower limit for replica reserve. You cannot decrease replica reserve below this limit. If you select Keep failback snapshot, you must create a replica to establish the failback snapshot. Table 364.
Field Description NOTE: The default administrator account, grpadmin, can perform all group management tasks, including managing the group, storage pools, members, NAS clusters, volumes, and accounts. You set the password for the grpadmin account when you create a group. Last login • Read-only account — Can view information about all group objects except NAS clusters, but cannot change the group configuration.
Move to Folder Dialog Box Table 369. Move to Folder Dialog Box Field Description Shortcut Folder Select which folder to move the volume to. Alt+F NOTE: You can move volumes into, out of, or between folders only if your account has grpadmin privileges. Move Recovery Volume Dialog Box If your group has more than one storage pool, you can move a recovery volume from one pool to another. Table 370.
Move Volume Dialog Box Table 372. Move Volume Dialog Box Field Description Storage pool Lists the pools that are available to transfer the volume to. Select a different pool to move the volume. The following restrictions apply: • Thin clones inherit the pool setting of the template volume. You cannot move a thin clone separately from its template volume.
NAS SMB Connections Panel The SMB Connections panel is on the SMB Connections tab of a member page. This panel displays the status of server Message Block (SMB) connections to an FS7500 controller. Table 374. CIFS Connections Panel Field Description User name Name of the user who accesses the SMB share from the client host Client host IP address of the client host configured to access the SMB share. This host must be configured with the correct credentials to access the share.
Field Description MTU size Maximum transmission unit (MTU) size, the largest physical packet size the interface can transmit. This value is given in bytes. Typically, the MTU size is 9000 bytes for iSCSI network interfaces. DCB State of data center bridging (DCB) on this interface: Slot • on — DCB is available. Multiple protocols can be run on this interface. • off — DCB is not available.
NAS Configuration Window The NAS Configuration window, which appears after you run the Configure NAS Cluster wizard, shows the progress of the NAS cluster configuration. The rest of the group remains operational while the NAS cluster is being configured. When the configuration succeeds, the progress window displays a success message. During the NAS cluster configuration, you might see the following message: Status of 0 is failed. Status of 1 is failed. You can disregard this message.
• Space • Data Reduction Table 379. Overview Field Description Container Name of the NAS container Type Container type.
Field Description Total free space Amount of NAS container space not used Data reduction space savings Total space saved through data reduction on this NAS container. Snapshot reserve Amount of space reserved for snapshots. If data reduction has been enabled on this container, snapshot reserve is permanently removed from this NAS container, and this value does not apply. Free snapshot reserve Amount of snapshot reserve not used by snapshots.
Field Description The access time is the minimum number of days that must pass since the file was last accessed before the file can be data reduced. This value must be in the range of 5 to 365, inclusive. By default, this value is 30 days. The status of the filter is listed as File filters…disabled if the ignore-filters option was set through the CLI.
Field Description Time Starting time and ending time of the schedule on each of the defined days Status Status of the schedule. Possible values are: • Enabled — Schedule will start running on the specified day at the defined time. • Disabled — Schedule has been defined, but will not run at the specified day. Add Defines a new data reduction schedule. Modify Modifies the selected data reduction schedule.
Field Description • Disabled — Data reduction has never been enabled on the container. The snapshot reserve functionality is available. • Was Enabled — Data reduction was previously enabled, but is not currently enabled on the container. The snapshot reserve functionality remains disabled on the container. Table 385.
Field Description The access time is the minimum number of days that must pass since the file was last accessed before the file can be data reduced. This value must be in the range of 5 to 365, inclusive. By default, this value is 30 days. The status of the filter is listed as File filters…disabled if the ignore-filters option was set through the CLI.
Field Description Name Name of the NAS controller (prefixed with the NAS cluster name) Service tag NAS controller service tag containing a unique identification number Peer controller Peer for the selected NAS controller. NAS controllers are configured in pairs to ensure that failure does not occur at a single point. The peer NAS controller name is prefixed by the NAS cluster name. NAS Members Panel Table 389.
NAS Quotas Panel Table 391. Quotas Panel Field Description Organize by quota type Displays group quota information by quota type Add Launches the Create Quota wizard, where you can add a new quota Modify Launches the Modify Quote dialog box, where you can modify the selected quota Delete Deletes the selected quota. NOTE: You cannot delete the default group quota or the default user quota.
Field Description NOTE: If NAS quota rules are in effect, the system does not display quota usage values for the default user or default group, or when the “each user in group” option is used. In these cases, quota usage is always displayed as zero. However, the system does show quota usage for all other groups and users. NAS Replica Containers Panel • Overview • Space • Data Reduction Table 392.
Field Description Snapshot reserve Amount of space reserved for snapshots. If data reduction has been enabled on this container, snapshot reserve is permanently removed from this NAS container, and this value is not applicable. Used by snapshots Amount of NAS container space used by snapshots Free snapshot reserve Amount of snapshot reserve not used by snapshots.
Field Description CLI) for Access Time or Modify Time have been disabled and all files are candidates for data reduction. Specifying the ignore-filters flag enables data reduction on a container with archive data without waiting for the minimum Access Time/Modify Time data-reduction policy. Dell recommends that you not use this setting on containers with live data; that is, you should use this setting only on containers with archive data. NAS Replication Schedules Panel Table 395.
Field Description Replication status can be: • ready — Container is ready for replication. • in progress — Replication is in progress. • paused — Replication is paused. • not configured — Replication has not been set up for the container. • canceled — Replication is canceled.
Field Description Next replication Date and time of the next scheduled replication for the NAS container. If no replication is scheduled, the system displays none scheduled. NAS Replications Detected Before deleting a NAS cluster, you must either manually delete all NAS replication relationships and disable NAS for all partners, or the system can do that automatically. Cleaning up manually also deletes remote replica containers and replications.
Table 402. Data Reduction Field Description Total space savings Total NAS reserve space saved on the NAS container through data reduction NAS SAN Panel The SAN panel is on the Network tab of a member page. This panel displays the status of the SAN in an FS7500 controller. NOTE: In FS7600/FS7610 appliances, this information appears on the SAN/Internal panel. Table 403.
Field Description transmission of network traffic between two nodes on an Ethernet physical link in fullduplex mode. Controlling the flow prevents buffers on the nodes from overflowing and dropping frames. Possible values: • on — Flow control is operational. • off — Flow control is not operational. • unknown — The state of flow control could not be determined. NAS Schedules Summary Panel Table 404.
NAS Snapshot Schedules Panel Table 406. NAS Snapshot Schedules Panel Field Description Name User-defined schedule name Container Name of the source NAS container. Select the name to go to the container’s data. Create Schedule action (for example, create a snapshot) Run Date on which the schedule started Time Time of day that the schedule runs Status Status of the schedule. The status can be: Actions • Enabled — Schedule is running. • Disabled — Schedule is paused.
Title Field Description Next snapshot Time and date of the next scheduled run NAS Snapshots Panel Table 408. NAS Snapshots Panel Field Description Created Date and time that the snapshot was created Name Snapshot name. If you did not specify a snapshot name, the NAS cluster generates a snapshot name based on the NAS container name and the snapshot timestamp.
Field Description Total capacity Total amount of space that is available on the thin clone Snapshots Number of snapshots that have been created on the thin clone NFS exports Number of NFS exports that have been created on the thin clone SMB shares Number of SMB shares that have been created on the thin clone Replication partner Name of the replication partner (if any) for the thin clone Total used Amount of space that is being used by the thin clone Free and unreserved Amount of space that is
Field Description • Shortcut Started (NDMP online) DMA servers Number of DMA servers None Modify settings Opens the Modify NDMP Settings dialog box Alt+M Configure DMA Servers Opens the Configure DMA Servers dialog box. You can configure up to three DMA servers. Alt+D Network Management Panel Table 413. Network Management Panel Field Description Shortcut Management network status Configure management network Opens a window for configuring a management network.
New Access Policy Group Dialog Box This dialog box defines a new access policy group and lets you select the access policies that are to belong to the group. New access policies can be created here and subsequently assigned to the group. Table 415. New Access Policy Group Dialog Box Field Description Shortcut Name Enter a descriptive name for the new access policy group. The name can contain up to 31 ASCII characters, including letters, numbers, hyphens, and periods. Letters are not case-sensitive.
Field Description Shortcut Snapshots only — Indicates that the selected policies provide access only to this volume's snapshots. Click OK to create the new basic access point or click Cancel to close the dialog box without creating the access point. Table 417.
Field Description File Security Style Type of security style applied to the NAS cluster: • NTFS — All access permissions are controlled by the Windows administrator by using access control lists or share level permissions. • UNIX — Windows clients cannot change any file or directory permissions. Read and write access is controlled by the UNIX permissions for Windows files and directories, which you set in Group Manager.
Outbound NAS Replica Containers Panel The outbound NAS replica container information is provided on the Remote Replica Containers panel. Table 421.
Field Description • • complete – Replication operation is complete, and all the data is on the secondary group. incomplete – Replication operation is not complete. Replication History Panel Each row in the Replication History panel represents a previous replication operation that was performed on the NAS container. Table 424.
Field Description • incomplete – Replication of the volume is not completed. • in progress – Replication operation cannot start if another replication operation for the same volume is in progress. • manual transfer in progress – Manual transfer is in progress. • partner down – Volume replication cannot continue because the partner is unavailable. • partner paused inbound – Partner administrator paused inbound replication.
Field Description • Actions Complete – The transfer operation has finished. Click Start data copy to start the replication process. Pick Tags for Columns Dialog Box Table 428. Pick Tags for Columns Dialog Box Field Description Shortcut Tags to display Displays the list of tags that you can select as additional column headings in the Volumes panel.
Pool Disk Space Panel Table 431. Pool Disk Space Panel Field Description Pool space by use Space breakdown for the volume, snapshot, and replication reserves as well as delegated and free space. Shows in MB, GB, and TB size as well as percentage of space taken within the pool. Snapshot reserve details Used, free, and reclaimable snapshot reserve space in the pool displayed in MB, GB, and TB as well as the percentage of the total snapshot reserve space it takes.
Field Description Free space Free space on the member RAID policy RAID configuration of disks in the member (RAID 50, RAID 10, RAID, 5, RAID 6, RAID 6 accelerated) Number of disks Number and type of disks in the member (for example, 24 (SAS HDD) ) Member status Possible member statuses: Compression • Unconfigured — You did not select a RAID policy for the member. (Informational.) • Initializing — Member is initializing according to the selected RAID policy. (Informational.
Field Description Reported size Reported size of the volume in MB, GB, or TB. The group rounds up volume sizes to the next 15MB if the size is not a multiple of 15MB. You cannot change the reported size of a template volume. Replication partne Name of the replication partner group SyncRep status Displays the SyncRep status for the synchronous replication collection. The synchronous replication states for a volume are: • in sync — SyncActive and SyncAlternate pools contain the same volume data.
Field Description Load balancing Indicates whether load balancing is enabled Access type Read-write or read-only Shared access Shared (multihost access) or not shared. Sector size Either 512 bytes or 4K-bytes. The logical sector size assigned to a volume does not depend on the sector size used by the physical drives on the array. For example, a volume can use 4K-byte logical sectors even if the physical drives on the array use 512-byte sectors.
Field Description Snapshot reserve Amount of space, based on a percentage of the volume reserve, that the group allocates to snapshots Free snap reserve Amount of space available for snapshots Borrowed space Amount of space borrowed from the free pool space Table 440. Replication Field Description Volume Name of the volume Status Indicates whether a volume is online or offline. An iSCSI initiator can only discover or connect to an online volume.
Field Description which the SyncAlternate pool is taken offline. If data is written to the volume while synchronous replication is paused, it is written only to the SyncActive pool, and the two pools are out of sync. The group tracks all volume writes while synchronous replication is paused and, when the administrator resumes synchronous replication, writes the tracked changes to the SyncAlternate pool.
Field Description • Fan status Failed — The power supply has failed. Replace the power supply as soon as possible. Contact your support provider. (Not displayed for all members) Operational status of the fan: Firmware revision • Normal — Fans are present and working correctly. • Warning — Fan speed is either too fast or too slow (outside normal operating RPM). Check the event log in the monitoring section of the Group Manager GUI to look for the warning message.
Field Description • Do you want to allow simultaneous access to this volume from more than one iSCSI initiator? Shortcut None (do not allow access) Default is No. Select Yes to permit the volume to allow simultaneous access from initiators with different IQNs. • • • • Alt+S Alt+O Yes No Table 447.
Table 450. Assign volume tags Field Description Shortcut Tags assigned (n of n) Select a tag from the list shown that best defines the attributes of the volume. Alt+T Copy from volume Copies tag information from an existing volume with tags. If no tags exist on the system or no volumes with tags are associated, the link is still active but an error is generated: No volumes have tags assigned.
Table 454. Select or define access controls policies Field Description Shortcut Pick one or more access policies or policy groups Lists the available access policies and policy groups to choose from. Select either Access Policies or Access Policy Groups to change the list. • • • • • • New Defines a new access policy or policy group. None Edit From either the Available list or the Selected list, select an access policy or policy group and click Edit to change it.
Field Description Capacity Total capacity of the member Free space Free space on the member RAID policy RAID policy of the member Number of disks Number of disks in the member and their type (SAS, SATA, SSD) Member status Status of the member: • • • • • Compression online – Member is online and has no health conditions offline – Member is offline warning – Member has a warning health condition error – Member has a critical health condition unconfigured – Member has not been configured Compress
Field Description Shortcut Add Specify the IP address of the server, set a port number, or use the default port. None (Optional) Provide a RADIUS secret and confirm the secret. Modify Modify the IP address of the server, set a port number, or use the default port. None (Optional) Provide a RADIUS secret and confirm the secret.
Field Description Transferred If replication is currently taking place for the NAS container, this field indicates the percentage of the replication operation that has been completed. Last replication Date and time data was last replicated to the selected replica container Table 460.
Field Description Details Provides details of the replication job (for example: 1 replica. Reserved 30MB) Table 463.
Table 466. Remote Replica – Template Replicas View Field Description Replica Lists the replicas of the volume, the date and time each replica of the volume was created, and the replication partner Replication status Status of the replication task, indicating whether the replication was successful.
Field Description Details Provides details of the replication job (for example: 1 replica. Reserved 30MB) Remote Replicas Panel (Outbound Collections) Table 469. Remote Replicas Panel Field Description Total replicated volume collections Number of replicated volume collections on the partner Replica Contains a tree diagram listing the volume collections that have replicas. Expand the tree to view individual collections, which are sorted by their creation date.
Table 472. Remote Replicas Panel – Volume Replicas Field Description Replica Shows the volume name and the replicas, identified by a timestamp Replication status Status of the replication operation for the volume and for the individual replicas. Can be either: • • • • • Details completed – Replication of the volume is finished. incomplete – Replication of the volume is not finished. in progress – Replication operation cannot start if another replication operation for the same volume is in progress.
Field Description • waiting – Replication data transfer did not start because the group cannot create more iSCSI sessions. Schedule Name of the schedule that created the replica Details Name of the collection that the replica belongs to, if any Remote Replicas Panel Table 475. Remote Replicas Panel Field Description Replica Replication collection Replication status Status of the replication. Possible statuses: • enabled – Replication for the volume collection is permitted.
Field Description Details Shows the number of replica collections and/or the complete name of the replica collection and of the replicas Replicas Panel (Inbound Collection) Table 478. Replicas Panel Field Description Total volume replica collections Number of volume replica collections Replica Timestamp of the replica collection. Expand the timestamp to see the replicas in the collection and their replication status.
Replicas Panel (Inbound) The Replicas panel displays information about inbound replicas of the selected volume. Table 480. Replicas Panel Field Description Total volume replicas Number of inbound replicas for this volume Created Date and time the replica was created Size Size of the original volume Replication status Status of the replication operation for the replica: Collection • complete – Replication of the volume is complete. • in progress – Replication is in progress.
Field Description Status Indicates whether the status of replication activity to or from the partner is enabled or paused. Click the link to change the setting. Delegated space Delegated space on the replication partner Free space Unused delegated space on the replication partner NAS status (FS Series group only) Indicates whether the status of NAS replication activity to or from the partner is enabled or paused Replication Progress Panel Table 483.
Field Description Last replication Date and time replication was last performed on the NAS container Replication Schedules Panel Table 485.
Title Field Description • • Replication settings paused – Administrator paused replication. ready – Replication is correctly configured on the volume. Failback snapshot Indicates whether keeping the failback snapshot is enabled or disabled for the volume Failback baseline Date and time at which the volume and the most recent complete replica represent the same data Pending data transfer Amount of data that must be transferred for the next replication.
Title Field Description Settings Replication partner Partner that is storing the replicas Replica reserve Current size of the replica reserve for the volume Local reserve Current size of the local replication reserve for the volume Replication schedules Schedules for replicating the volume Running schedules Enabled schedules for replicating the volume Next replica Next scheduled replication Replication schedules Replication Summary Panel Table 490.
Title Settings Replication schedules Field Description Pending data transfer Amount of data that must be transferred for the next replication. This amount represents the data that has changed since the most recent complete replication started.
Step 1 describes the SNMP community strings that are created during the process. Table 494. Resume Data Transfer Field Description SNMP community Describes the SNMP community strings that are temporarily added to your system’s MIB in order to facilitate copying or loading the data transfer file. These community strings are deleted when the transfer is completed. Step 2 summarizes the settings that MTU will use to complete the operation if you click Finish.
Title Field Description Advanced SAN network settings MTU size Lists MTU size for the SAN network. By default, the internal network uses 9000 (jumbo frames) for a maximum transmission unit (MTU) size. You cannot change the MTU size for the SAN network. Before you can modify the SAN network configuration, you must temporarily stop the NAS cluster. Member IP addresses Lists the SAN IP addresses for each NAS controller (1–4) Schedules Summary Panel (Volume Collections) Table 498.
Field Description Shortcut Fewer characters are accepted for this field if you type the value as a Unicode character string, which takes up a variable number of bytes, depending on the specific character. Preview Opens a pop-up window containing the text you have entered. This sign-on banner appears when you log in to Group Manager. Alt+R Session Security Panel Table 501.
Sideplanes Panel Table 503. Sideplanes Panel Field Description Top left Top right Bottom left Bottom right Location of the sideplane for the information being displayed Status Current status of the sideplane. Possible values are: good, failed, unknown Firmware revision Current version number of the firmware SMB Home Shares Information Panel Table 504. SMB Home Shares Information Panel Field Description NAS container Name Container name, from 1 to 229 characters plus underscores.
Snapshot and Replication Schedules Panel (Volume Collections) Table 505. Snapshot and Replication Schedules Panel (Volume Collections) Field Description Schedule Name of the schedule Create Type of schedule Run Date or range of dates when the schedule runs Time Times of day and frequency with which the schedule runs Status Indicates whether the schedule is enabled or disabled Add Click the link to create a new schedule. Modify Click the link to revise the selected schedule.
Snapshot Collection Status Panel Table 507. Snapshot Collection Status Panel Field Description Name Name of the custom snapshot collection Created Date and time the custom snapshot collection was created Volume collection Volume collection, if applicable, to which the volumes belong Description Description of the custom snapshot collection. This field appears only if a description was provided by the user.
Field Description Modify Click the link to revise the selected schedule. Delete Click the link to delete the selected schedule. To disable a schedule, right-click the selected schedule and choose Disable schedule from the menu. Snapshot Summary Panel Table 510.
Field Description Snapshot schedules Number of snapshot schedules created for the volume Running schedules Number of snapshot schedules for the volume that are enabled Next snapshot Next scheduled time for a snapshot operation on this volume Snapshots Panel Table 512.
Field Description • • • Connections read-only — Access to only view the snapshot shared — Multihost access not shared — Limited access Number of iSCSI initiators connected to the snapshots in the collection Snapshots Panel Table 514.
Field Description • • Start or resume compression – Member is compression-capable and in the “inactive” state or is in the “suspended” state. Pause compression – Member is in the “running” state. NOTE: When compression is suspended, new snapshots are not compressed and previously compressed snapshots remain compressed. Storage Container Panel Use the Storage Container panel to create, modify, or delete storage containers.
Field Description Logical size This field is equivalent to the Logical space field in the main Storage Container panel. It identifies the amount of logical space allocated for the storage container. The logical size of a storage container is 10 times the physical size of the storage container.
Storage Pools Panel Table 521.
Targets Panel Use the Targets panel to associate access policies and policy groups with volumes. When an access policy or a policy group is selected in the Access Policies panel, the Targets panel lists the volumes currently associated with that policy. Table 523. Targets Panel Field Description Add Associates one or more volumes to the currently selected access policy or policy group in the Access Policies panel.
Field Field Description when the original volume is no longer available or no longer configured for replication. If these replicas are no longer needed, you can delete them or permanently promote them to a volume. Original volume Replica reserve • waiting – Replication data transfer did not start because the group cannot create more iSCSI sessions. In most cases, the problem resolves itself, and replication continues automatically. • in progress – Replication is in progress. No action is required.
Test AD Settings Dialog Box Table 527. Test AD Settings Dialog Box Field Description Check (Success) Tests the connection. A checkmark indicates that the test was successful. X (Failure) Indicates that the test has failed due to an issue with connecting to the Active Directory server (for example, the IP address, user name, and/or password might be incorrect). Thin Clone Replica Sets Panel Table 528.
Thin Clones Summary Panel Table 529. Thin Clones Summary Panel Field Description Thin clone Name of the thin clone. You can change the name in the Modify settings option for the thin clone. Shared space Space that the thin clone is sharing with the template volume. The amount of space includes the space that is shared with the template volume and the unshared (in-use) space. Reported size Reported size of the thin clone.
Field Description Shortcut PS Series storage array SNMP traps are generated when hardware or security issues occur in the group. To receive these traps, configure up to 5 IP addresses. Trap community name Sets the trap community name, which can be up to 64 ASCII characters long. The name must be unique and cannot contain the following characters: space, tab, comma, pound sign (#). The default name is SNMP-trap. Alt+T The group uses the trap community name when it sends traps.
Title Field Description Shortcut Down Moves the selected IP address down in order of importance None LDAP server LDAP server IP address Alt+S Base DN Base DN (distinguished name) that you want to use for authentication purposes. Typically, the Base DN uses the following format: Alt+B LDAP settings dc=domain,dc=com. The Base DN can be up to 254 ASCII characters. Update Firmware Dialog Box Table 534.
The Dell Storage Update Manager application helps you analyze your current Dell EqualLogic storage configurations to determine which components, if any, can or need to be updated. Using a multistep firmware update wizard, Dell Storage Update Manager guides you and simplifies the update process. It provides an outline of all components that require updating and the estimated time to complete. NOTE: If you are running FS Series firmware prior to version 3.0.
Field Description Add Creates a new basic access point Modify Opens the currently selected access point for editing Delete Permanently deletes the currently selected access point Columns CHAP Account The name of the CHAP account defined in the access point, if applicable. Requires access policies to be expanded so that access points are shown. iSCSI Initiator The iSCSI initiator used by the access point, if applicable. Requires access policies to be expanded so that access points are shown.
NOTE: Although you can use the Group Manager to create storage containers, Dell recommends that you use the Dell Virtual Storage Manager (VSM) to perform this task. The VSM procedures for setting up VVols is simpler than using the Group Manager. Using the Group Manager for VVol operations is recommended for experienced users only. For detailed information about setting up VVols using VSM, see the Dell Virtual Storage Manager for VMware Installation and User’s Guide.
Field Description Members Lists any members associated to the snapshot. These members have snapshot space reserved. Volume distribution RAID preference Displays one of the following configurations: • Automatic — Indicates that the RAID configuration is the same as that of the pool containing the volume. • RAID 50 — Recommended situation: Applications requiring an optimal combination of performance, availability, and capacity.
Field Description Snapshot reserve Amount of space allocated for the snapshots of each volume Number of snapshots Number of snapshots for the collection or volume Status Indicates whether the volume is online or offline Replication partner Replication partner for the collection and volume. This field remains empty if replication is not enabled for the volume collection.
Field Description Shortcut Purge All Opens a window asking if you want to permanently delete all volumes in the recovery bin Alt+A NOTE: When a volume has been deleted, if no space is in use (no data is on the volume), the volume is not sent to the volume recovery bin. Instead, it is permanently deleted.
Volume Settings Panel Table 543. Volume Settings Panel Field Description Shortcut Percentage of the volume reserve allocated for snapshots. The groupwide default is 100 percent of the volume reserve. Alt+S Snapshot space reserve Snapshot reserve (percent of volume reserve) Warn when in-use space Percentage of the snapshot reserve that, when consumed, results in event Alt+A reaches this percentage messages and an alarm.
• Table 546. Overview • Table 547. Configuration • Table 548. Space • Table 549. Space by Percent • Table 550. Replication • Table 551. SyncRep You can sort the view by clicking the heading of a column. By default, the view is sorted by volume name. Table 544.
Field Description Shortcut You can also use the checkbox to turn filtering on or off without changing the filter settings. Settings Opens the Filter volumes dialog box. Select one or more tags and their values to use as filters. None Pick tag columns Opens the Pick tags for columns dialog box. Select one or more tags to display as additional columns in the Folder Information panel. None Group rows Select this checkbox to change the order of the information displayed in the panel.
Field Description Storage pool Storage pool where the volume is located Reported size Reported size of the volume in MB, GB, or TB. The group rounds up volume sizes to the next 15MB if the size is not a multiple of 15MB. You cannot change the reported size of a template volume.
Field Description Free snap reserve Amount of space available for snapshots Borrowed space Amount of space borrowed from the free pool space Table 549. Space by Percent Field Description Volume Name of the volume Status Indicates whether a volume is online or offline. An iSCSI initiator can only discover or connect to an online volume. Storage pool Storage pool where the volume is located Reported size Reported size of the volume in MB, GB, or TB.
Field Description Replication status Indicates the status of replication activity to or from the partner is enabled or paused Fallback baseline Point in time at which the volume on the primary group and the most recent complete replica on the secondary group have the same data Pending data Amount of data that must be transferred for the next or current replication Table 551. SyncRep Field Description Volume Name of the volume Status Indicates whether a volume is online or offline.