book.book Page 1 Tuesday, April 15, 2008 12:30 PM Dell™ PowerVault™ MD3000i Storage Arrays with Microsoft® Windows Server® Failover Clusters Hardware Installation and Troubleshooting Guide w w w. d e l l . c o m | s u p p o r t . d e l l .
book.book Page 2 Tuesday, April 15, 2008 12:30 PM Notes, Notices, and Cautions NOTE: A NOTE indicates important information that helps you make better use of your computer. NOTICE: A NOTICE indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. CAUTION: A CAUTION indicates a potential for property damage, personal injury, or death. __________________ Information in this document is subject to change without notice. © 2008 Dell Inc. All rights reserved.
book.book Page 3 Tuesday, April 15, 2008 12:30 PM Contents 1 Introduction . Overview . . . . . . . . . . . . . . . . . . . . . . . . 5 . . . . . . . . . . . . . . . . . . . . . . . . . 5 Cluster Solution . . . . . . . . . . . . . . . . . . . . . . Cluster Hardware requirements: Cluster Nodes . . . . . . . . . . . . . . 6 . . . . . . . . . . . . . . . . . . . . 7 Cluster Storage . . . . . . . . . . . . . . . . . . . . Cluster Storage Management Software Supported Cluster Configurations .
book.book Page 4 Tuesday, April 15, 2008 12:30 PM Cabling the Cluster in Direct-Attached Redundant Configuration . . . . . . . . . . . . . . Cabling the Cluster in Network-Attached Redundant Configuration . . . . . . . . . . . . . . Connecting a PowerEdge Cluster to Multiple PowerVault MD3000i Storage Systems . . . . 3 29 . . . . . . . . . . 31 . . . . . . . . . . . . 31 . . . . . . . . . . . . . . . . . . 33 Cluster Configuration Overview . Installing the iSCSI NICs . . . . . . . . . . . .
book.book Page 5 Tuesday, April 15, 2008 12:30 PM Introduction This document provides information for installing and managing your Cluster solution using Dell™ PowerVault™ MD3000i storage system. It is intended for experienced IT professionals who need to configure the cluster solution, and for trained service technicians who perform upgrade and maintenance procedures. This document also addresses readers who are new to clustering.
book.
book.book Page 7 Tuesday, April 15, 2008 12:30 PM Cluster Nodes Table 1-1 lists hardware requirements for the cluster docs. Table 1-1. Cluster Node Requirements Component Minimum Requirement Processor At least one processor for each cluster node. Cluster Nodes A minimum of two identical Power Edge systems are required.
book.book Page 8 Tuesday, April 15, 2008 12:30 PM Table 1-1. Cluster Node Requirements (continued) Component Minimum Requirement NICs (public and At least two NICs: one NIC for the public network and another private) NIC for the private network. NOTE: It is recommended that the NICs on each public network are identical and that the NICs on each private network are identical. Internal Disk Controller One controller connected to internal disks for each node.
book.book Page 9 Tuesday, April 15, 2008 12:30 PM Cluster Storage Management Software Modular Disk Storage Manager Client The software runs on the management station to centrally manage the PowerVault MD3000i RAID enclosures. You can use Dell PowerVault Modular Disk Storage Manager to perform tasks such as creating or managing RAID arrays, binding virtual disks, and downloading firmware.
book.book Page 10 Tuesday, April 15, 2008 12:30 PM • Virtual Disk Copy - generates a full copy of data from the source virtual disk to the target virtual disk in a storage array. You can use Virtual Disk Copy to back up data, copy data from disk groups that use smaller-capacity physical disks to disk groups using greater capacity physical disks, or restore snapshot virtual disk data to the source virtual disk.
book.book Page 11 Tuesday, April 15, 2008 12:30 PM Supported Cluster Configurations Figure 1-1.
book.book Page 12 Tuesday, April 15, 2008 12:30 PM Figure 1-2.
book.book Page 13 Tuesday, April 15, 2008 12:30 PM Figure 1-3.
book.book Page 14 Tuesday, April 15, 2008 12:30 PM Other Documents You May Need CAUTION: The safety information that shipped with your computer provides important safety and regulatory information. Warranty information may be included within this document or as a separate document. NOTE: To configure Dell blade system modules in a Dell PowerEdge Cluster, see the Using Dell Blade Servers in a Dell PowerEdge High Availability Cluster document located on Dell Support website at support.dell.com.
book.book Page 15 Tuesday, April 15, 2008 12:30 PM • The User's Guide for your PowerEdge or PowerVault system describes system features and technical specifications, the System Setup program (if applicable), software support, and the system configuration utility. • The Dell PowerVault MD3000i Hardware Owner's Manual provides information about the hardware enclosure. • The PowerVault Modular Disk Storage Manager CLI Guide provides information about using the command line interface (CLI).
book.
book.book Page 17 Tuesday, April 15, 2008 12:30 PM Cabling Your Cluster Hardware The following sections provide information on how to cable various components of your cluster. Cabling the Mouse, Keyboard, and Monitor When installing a cluster configuration in a rack, you must include a switch box to connect the mouse, keyboard, and monitor to the nodes. See the documentation included with your rack for instructions on cabling each node's connections to the switch box.
book.book Page 18 Tuesday, April 15, 2008 12:30 PM Figure 2-1. Power Cabling Examples With One Power Supply in the PowerEdge Systems primary power supplies on one AC power strip (or on one AC PDU [not shown]) redundant power supplies on one AC power strip (or on one AC PDU [not shown]) NOTE: This illustration is intended only to demonstrate the power distribution of the components.
book.book Page 19 Tuesday, April 15, 2008 12:30 PM Figure 2-2. Power Cabling Example With Two Power Supplies in the PowerEdge Systems primary power supplies on one AC power strip (or on one AC PDU [not shown]) redundant power supplies on one AC power strip (or on one AC PDU [not shown]) NOTE: This illustration is intended only to demonstrate the power distribution of the components.
book.book Page 20 Tuesday, April 15, 2008 12:30 PM Cabling Your Public and Private Networks The network adapters in the cluster nodes provide at least two network connections for each node. These connections are described in Table 2-1. Table 2-1. Network Connections Network Connection Public Network Description All connections to the client LAN. At least one public network must be configured for mixed mode (public mode and private mode) for private network failover.
book.book Page 21 Tuesday, April 15, 2008 12:30 PM Figure 2-3. Example of Network Cabling Connection public network public network adapter private network adapter private network cluster node 1 cluster node 2 Cabling Your Public Network Any network adapter supported by a system running TCP/IP may be used to connect to the public network segments.
book.book Page 22 Tuesday, April 15, 2008 12:30 PM Table 2-2. Private Network Hardware Components and Connections Method Hardware Components Connection Network switch Fast Ethernet or Gigabit Ethernet network adapters and switches. Connect standard Ethernet cables from the network adapters in both cluster nodes to a Fast Ethernet or Gigabit Ethernet switch. Point-to-Point (two node Fast Ethernet network cluster only) adapters.
book.book Page 23 Tuesday, April 15, 2008 12:30 PM Cabling the Storage Systems This section provides information for connecting your cluster to a storage system. NOTE: To configure Dell blade system modules in a Dell PowerEdge Cluster, see Using Dell Blade Servers in a Dell PowerEdge High Availability Cluster located on Dell Support website at support.dell.com. NOTE: For more details on storage hardware settings and descriptions, see Dell PowerVault™ MD3000i RAID Enclosure Hardware Owner's Manual.
book.book Page 24 Tuesday, April 15, 2008 12:30 PM Figure 2-4. Non-Redundant Cluster Configuration public network cluster node 1 private network cluster node 2 Ethernet management port SAS out port Dell PowerVault MD3000i RAID enclosure (single controller) NOTE: Multipath is required for this configuration. NOTE: Only PowerVault MD3000i with one controller is supported in this configuration. NOTE: The SAS out port provides SAS connection for cabling to MD1000 Expansion Enclosure.
book.book Page 25 Tuesday, April 15, 2008 12:30 PM Cabling the Cluster in Direct-Attached Redundant Configuration In the direct-attached redundant configuration, each cluster node is directly attached to the PowerVault MD3000i RAID controller modules using two network cables, and either one dual-port NIC or two single-port NICs.
book.book Page 26 Tuesday, April 15, 2008 12:30 PM Figure 2-5. Direct-Attached Redundant Cluster Configuration public network private network cluster node 1 cluster node 2 SAS out port (2) Dell PowerVault MD3000i RAID enclosure (dual controllers) Ethernet management port (2) NOTE: The SAS out port provides SAS connection for cabling to MD1000 expansion enclosure(s).
book.book Page 27 Tuesday, April 15, 2008 12:30 PM Cabling the Cluster in Network-Attached Redundant Configuration In the network-attached redundant configuration, each cluster node attaches to the storage system using redundant IP storage area network (SAN) industry-standard 1 Gb Ethernet switches, and either with one dual-port iSCSI NIC or two single-port iSCSI NICs.
book.book Page 28 Tuesday, April 15, 2008 12:30 PM 3 Connect each additional cluster or standalone system to the iSCSI network, similar to step 2. Figure 2-6.
book.book Page 29 Tuesday, April 15, 2008 12:30 PM Connecting a PowerEdge Cluster to Multiple PowerVault MD3000i Storage Systems You can increase your cluster storage capacity by attaching multiple storage systems to your cluster using redundant network switches. The PowerEdge cluster systems support configurations with multiple PowerVault MD3000i storage systems attached to clustered systems.
book.book Page 30 Tuesday, April 15, 2008 12:30 PM When attaching multiple PowerVault MD3000i storage systems with your cluster, the following rules apply: 30 • A maximum of four Power Vault MD3000i storage systems per cluster. • The shared storage systems and firmware must be identical. Using dissimilar storage systems and firmware for your shared storage is not supported. • Windows limits access to drives using limited drive letters which is 22.
book.book Page 31 Tuesday, April 15, 2008 12:30 PM Preparing Your Systems for Clustering CAUTION: Only trained service technicians are authorized to remove and access any of the components inside the system. See the safety information that shipped with your computer for complete information about safety precautions, working inside the computer, and protecting against electrostatic discharge. Cluster Configuration Overview 1 Ensure that your site can handle the cluster’s power requirements.
book.book Page 32 Tuesday, April 15, 2008 12:30 PM 4 Establish the physical network topology and the TCP/IP settings for network adapters on each server node to provide access to the cluster public and private networks. 5 Configure each server node as a member server in the same Windows Active Directory® Domain. NOTE: You can configure the cluster nodes as Domain Controllers.
book.book Page 33 Tuesday, April 15, 2008 12:30 PM 11 Test the failover capabilities of your new cluster. NOTE: For Windows Server 2008 Failover Clusters, you can also use the Cluster Validation Wizard. 12 Configure highly-available applications and services on your failover cluster. Depending on your configuration, this may also require providing additional LUNs to the cluster or creating new cluster resource groups. Test the failover capabilities of the new resources.
book.book Page 34 Tuesday, April 15, 2008 12:30 PM The following sub-sections describe steps that enable you to establish communication between the cluster nodes and your shared MD3000i storage array, and to present disks from the storage array to the cluster.
book.book Page 35 Tuesday, April 15, 2008 12:30 PM Installing the Microsoft iSCSI Software Initiator 1 Use a web browser and go to the Microsoft Download Center website at www.microsoft.com/downloads. 2 Search for iscsi initiator. 3 Select and download the latest supported initiator software and related documentation for your operating system.
book.book Page 36 Tuesday, April 15, 2008 12:30 PM 4 If you have third-party applications that use the Microsoft Volume Shadow-copy Service (VSS) or Virtual Disk Service (VDS) Application Programming Interface (API), install the VDS_VSS package located in the windows \VDS_VSS directory on the PowerVault MD3000i Resource CD. Separate versions for 32-bit and 64-bit operating systems are provided. The VSS and VDS provider will engage only if it is needed.
book.book Page 37 Tuesday, April 15, 2008 12:30 PM Installing and Configuring the Shared Storage System This section provides information for installing and configuring the shared storage systems. Setting up Your Storage Array The Perform Initial Setup Tasks link located on the Summary tab provides links to the basic steps you should follow when initially setting up a storage array in PowerVault Modular Disk Storage Manager.
book.book Page 38 Tuesday, April 15, 2008 12:30 PM 7 View and Enable Premium Features (Optional) — If you have purchased premium features, including Snapshot Virtual Disks and virtual disk copies, check the premium features that are currently available and enable them if they are turned off. See Using Advanced (Premium) PowerVault Modular Disk Storage Manager Features for more information.
book.book Page 39 Tuesday, April 15, 2008 12:30 PM Table 3-1. Standard Terminology Used in iSCSI Configuration Term Definition CHAP (Challenge An optional security protocol used to control access to an Handshake iSCSI storage system by restricting use of the iSCSI data Authentication Protocol) ports on both the host server and storage array. For more information on the types of CHAP authentication supported, see "Creating a Host Group" on page 48.
book.book Page 40 Tuesday, April 15, 2008 12:30 PM Table 3-2 contains the sequence of steps for configuring each specific iSCSI connections and where it occurs. The following subsections describe each of the steps in more detail. Table 3-2. Host Server vs.
book.book Page 41 Tuesday, April 15, 2008 12:30 PM Default Management Port Settings By default, the storage array management ports will be set to DHCP configuration. If the controller(s) on your storage array is unable to get IP configuration from a DHCP system, it will timeout and revert to a default static IP address. The default IP configuration is: Controller 0: IP: 192.168.128.101 Subnet Mask: 255.255.255.0 Controller 1: IP: 192.168.128.102 Subnet Mask: 255.255.255.
book.book Page 42 Tuesday, April 15, 2008 12:30 PM Manual Storage Array Discovery 1 Launch MD Storage Manager. If this is the first storage array to be set up, the Add New Storage Array window appears. 2 Select Manual and click OK. 3 Select Out-of-band management and enter the host server name(s) or IP address(es) of the iSCSI storage array controller. 4 Click Add. Out-of-band management should now be successfully configured. After discovery is complete, a confirmation screen appears.
book.book Page 43 Tuesday, April 15, 2008 12:30 PM Table 3-3. Initial Storage Array Setup Tasks Task Purpose Information Needed Rename the storage array. To provide more a meaningful name than the If you need to physically software-assigned label of Unnamed. find the device, click Blink the storage array on the Initial Setup Tasks dialog box or click the Tools tab and choose Blink. Lights on the front of the storage array blink intermittently to identify the array.
book.book Page 44 Tuesday, April 15, 2008 12:30 PM Table 3-3. Initial Storage Array Setup Tasks (continued) Task Purpose Information Needed Set up alert notifications. To arrange to notify individuals (by e-mail) and/or storage management stations (by SNMP) when a storage array component degrades or fails, or an adverse environmental condition occurs. E-mail — Sender (sender’s SMTP gateway and e-mail address) and recipients (fully qualified e-mail addresses) • Set up e-mail alerts.
book.book Page 45 Tuesday, April 15, 2008 12:30 PM Ipv6 addresses (Default IP addresses): Controller 0, Port 0: IP Configuration: Obtain configuration automatically Port: 3260 Controller 0, Port 1: IP Configuration: Obtain configuration automatically Port: 3260 Controller 1, Port 0: IP Configuration: Obtain configuration automatically Port: 3260 Controller 1, Port 1: IP Configuration: Obtain configuration automatically Port: 3260 NOTE: By default, the gateway value is not set.
book.book Page 46 Tuesday, April 15, 2008 12:30 PM Router IP address: XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX Where 'X' is a hexadecimal number between 0 and F. The following settings are available (depending on your specific configuration) by clicking the Advanced button: • Virtual LAN (VLAN) support A VLAN is a network of different systems that behave as if they are connected to the same segments of a local area network (LAN) and are supported by the same switches and routers.
book.book Page 47 Tuesday, April 15, 2008 12:30 PM Perform Target Discovery From the iSCSI Initiator This step identifies the iSCSI ports on the storage array to the host server. To perform target discovery from the iSCSI initiator: 1 Click Start→ Programs→ Microsoft iSCSI Initiator. 2 Click the Discovery tab. 3 Under Target Portals, click Add and enter the IP address or DNS name of the iSCSI port on the storage array. 4 If the iSCSI storage array uses a custom TCP/IP port, change the Port number.
book.book Page 48 Tuesday, April 15, 2008 12:30 PM Configure Host Access This section helps you configure the connection between the host servers and the virtual disks on the storage array. You must perform this step before mapping virtual disks to host servers, or whenever you connect new host servers to the storage array. 1 Launch MD Storage Manager. 2 Click Configure and select Configure Host Access (Manual).
book.book Page 49 Tuesday, April 15, 2008 12:30 PM 4 In the Select Hosts to Add list, click the names of the first cluster node, then click the Add button located to the right of the list. The host moves to the Hosts in Group list. 5 Repeat step 4 to add the second cluster node to the host group. 6 To create the host group, click OK. Creating Disk Groups and Virtual Disks In some cases, the virtual disks may have been bound when the system was shipped.
book.book Page 50 Tuesday, April 15, 2008 12:30 PM Creating Host-to-Virtual Disk Mappings Create host-to-virtual disk mappings to assign virtual disks to the host groups containing cluster nodes by clicking the Configure tab, then clicking the Create Host-to-Virtual Disk Mappings link. When you click this link, the PowerVault Modular Disk Storage Manager displays a series of pages in which you select the Host Group containing the cluster nodes and virtual disks to be mapped.
book.book Page 51 Tuesday, April 15, 2008 12:30 PM Configuring the RAID Level for the Shared Storage Subsystem The virtual disks in your shared storage subsystem must be configured into disk groups or virtual disks using the Dell PowerVault Modular Storage Manager software. All virtual disks, especially if they are used for the quorum resource, should be bound and should incorporate the appropriate RAID level to ensure high availability.
book.book Page 52 Tuesday, April 15, 2008 12:30 PM Naming and Formatting Drives on the Shared Storage System Each virtual disk being created in the PowerVault Modular Disk Storage Manager becomes a physical disk in Windows Disk Management.
book.book Page 53 Tuesday, April 15, 2008 12:30 PM 5 In the dialog box, create a partition the size of the entire drive (the default) and then click OK. NOTE: A virtual disk that is mapped or assigned from the storage system to a cluster node(s) is represented as a physical disk within the Windows operating system on each node. Microsoft Cluster allows only one node to access a given physical disk resource at a time.
book.book Page 54 Tuesday, April 15, 2008 12:30 PM 12 In the dialog box, change the file system to NTFS, select Quick Format, and click the Start button. NOTE: The NTFS file system format is required for shared-disk resources under Microsoft Cluster. 13 Click OK at the warning. 14 Click OK to acknowledge that the format is complete. 15 Click Close to close the dialog box. 16 Repeat step 3 through step 15 for each remaining drive. 17 Close Disk Management. 18 Turn off node 1. 19 Turn on node 2.
book.book Page 55 Tuesday, April 15, 2008 12:30 PM create a snapshot for your cluster disk. The Snapshot Virtual Disk can be mapped to the primary node (the node owning the source disk) or the secondary node (the node not owning the source disk) for backup, testing, or data processing. NOTICE: Avoid mapping the Snapshot Virtual Disk to more than one node in the cluster at any point of time.
book.book Page 56 Tuesday, April 15, 2008 12:30 PM Virtual Disk Copy Virtual Disk Copy generates a full copy of data from the source virtual disk to the target virtual disk in a storage array. You can use Virtual Disk Copy to back up data, copy data from disk groups that use smaller-capacity physical disks to disk groups using greater-capacity physical disks, or restore Snapshot Virtual Disk data to the source virtual disk.
book.book Page 57 Tuesday, April 15, 2008 12:30 PM Target CHAP In target CHAP, the storage array authenticates all requests for access issued by the iSCSI initiator(s) on the host server through a CHAP secret. To set up target CHAP authentication, you enter a CHAP secret on the storage array, then configure each iSCSI initiator on the host server to send that secret each time it attempts to access the storage array.
book.book Page 58 Tuesday, April 15, 2008 12:30 PM Setting Up CHAP The next two steps in your iSCSI configuration, "Configuring CHAP Authentication on the Storage Array (Optional)" on page 58 and "Configuring CHAP Authentication on the Host Server (Optional)" on page 59, offer step-by-step procedures for setting up CHAP on your storage array and host server.
book.book Page 59 Tuesday, April 15, 2008 12:30 PM 2 To configure a CHAP secret, select CHAP and select CHAP Secret. 3 Enter the Target CHAP secret (or Generate Random Secret), confirm it in Confirm Target CHAP Secret, and click OK. Although the storage array allows sizes from 12 to 57 characters, many initiators only support CHAP secret sizes up to 16 characters (128-bit). NOTE: Once entered, a CHAP secret is not retrievable. Ensure that you record the secret in an accessible place.
book.book Page 60 Tuesday, April 15, 2008 12:30 PM 3 If you are using mutual CHAP authentication: a Click the General tab. b Select Secret. c At the Enter a secure secret window, enter the mutual CHAP secret you entered for the storage array. 4 Click the Discovery tab. 5 Under Target Portals, select the IP address of the iSCSI port on the storage array and click Remove. The iSCSI port you configured on the storage array during target discovery should disappear.
book.book Page 61 Tuesday, April 15, 2008 12:30 PM Connect to the Target Storage Array From the Host Server 1 Click Start→ Programs→ Microsoft iSCSI Initiator. 2 Click the Targets tab. If previous target discovery was successful, the iqn of the storage array should be displayed under Targets. 3 Click Log On. 4 Select Automatically restore this connection when the system boots. 5 Select Enable multipath.
book.book Page 62 Tuesday, April 15, 2008 12:30 PM Viewing the Status of Your iSCSI Connections In MD Storage Manager, click the iSCSI tab and then Configure iSCSI Host Ports to view the status of each iSCSI port you attempted to connect to and the configuration state of all IP addresses.
book.book Page 63 Tuesday, April 15, 2008 12:30 PM Installing and Configuring a Failover Cluster You can configure the operating system services on your Windows Server failover cluster, after you have established the private and public networks and have assigned the shared disks from the storage array to the cluster nodes. The procedures for configuring the failover cluster are different depending on the Windows Server operating system you use.
book.
book.book Page 65 Tuesday, April 15, 2008 12:30 PM Troubleshooting This appendix provides troubleshooting information for your cluster configurations. Table A-1 describes general cluster problems you may encounter and the probable causes and solutions for each problem. Table A-1. General Cluster Troubleshooting Problem Probable Cause Corrective Action The nodes cannot access the storage system, or the cluster software is not functioning with the storage system.
book.book Page 66 Tuesday, April 15, 2008 12:30 PM Table A-1. General Cluster Troubleshooting (continued) Problem Probable Cause One of the nodes takes The node-to-node a long time to join the network has failed due to cluster. a cabling or hardware failure. OR One of the nodes fail to join the cluster. 66 Corrective Action Check the network cabling. Ensure that the node-to-node interconnection and the public network are connected to the correct NICs.
book.book Page 67 Tuesday, April 15, 2008 12:30 PM Table A-1. General Cluster Troubleshooting (continued) Problem Probable Cause Corrective Action Attempts to connect to a cluster using Cluster Administrator fail. The Cluster Service has not been started. A cluster has not been formed on the system. The system has just been booted and services are still starting. Verify that Cluster Service is running and that a cluster has been formed.
book.book Page 68 Tuesday, April 15, 2008 12:30 PM Table A-1. General Cluster Troubleshooting (continued) Problem Probable Cause You are prompted to The TCP/IP configuration configure one network is incorrect. instead of two during Microsoft Failover Cluster installation. Using Microsoft Windows NT® 4.0 to remotely administer a Windows Server® 2003 cluster generates error messages.
book.book Page 69 Tuesday, April 15, 2008 12:30 PM Table A-1. General Cluster Troubleshooting (continued) Problem Probable Cause Corrective Action Unable to add a node to the cluster. The new node cannot access the shared disks. The shared disks are enumerated by the operating system differently on the cluster nodes. Ensure that the new cluster node can enumerate the cluster disks using Windows Disk Administration.
book.book Page 70 Tuesday, April 15, 2008 12:30 PM Table A-1. General Cluster Troubleshooting (continued) Problem Probable Cause Corrective Action Microsoft Cluster does not operate correctly on a cluster running Windows Server 2003 and the Internet Firewall enabled. The Windows Internet Connection Firewall is enabled, which may conflict with Microsoft Cluster. Perform the following steps: 1 On the Windows desktop, right-click My Computer and click Manage.
book.book Page 71 Tuesday, April 15, 2008 12:30 PM Table A-1. General Cluster Troubleshooting (continued) Problem Probable Cause Corrective Action Public network clients cannot access the applications or services that are provided by the cluster. One or more nodes may have the Internet Connection Firewall enabled, blocking RPC communications between the nodes.
book.book Page 72 Tuesday, April 15, 2008 12:30 PM Table A-1. General Cluster Troubleshooting (continued) Problem Probable Cause Corrective Action Unable to assign the drive letter to the snapshot virtual disk. The snapshot virtual disk has been erroneously mapped to the node that does not own the source disk. Unmap the snapshot virtual disk from the node not owning the source disk, then assign it to the node that owns the source disk.
book.book Page 73 Tuesday, April 15, 2008 12:30 PM • • Status Icons - Status icons identify the six possible health status conditions of the storage array. For every non-Optimal status icon, use the Recovery Guru to detect and troubleshoot the problem. • Optimal - Every component in the managed array is in the desired working condition. • Needs Attention - A problem exists with the managed array that requires intervention to correct it.
book.book Page 74 Tuesday, April 15, 2008 12:30 PM Known Issues NOTE: You must schedule downtime for the clusters and applications during an upgrade because an online Dell PowerVault MD3000i storage array controller firmware upgrade is not supported in a Dell PowerEdge Cluster configuration.
book.book Page 75 Tuesday, April 15, 2008 12:30 PM Cluster Data Form You can attach the following form in a convenient location near each cluster node or rack to record information about the cluster. Use the form when you call for technical support. Table B-1. Cluster Configuration Information Cluster Information Cluster Solution Cluster name and IP address Server type Installer Date installed Applications Location Notes Table B-2.
book.book Page 76 Tuesday, April 15, 2008 12:30 PM Table B-3. Additional Network Information Additional Networks Table B-4.
book.
book.
book.
book.