Rorke Data RAIDWatch Manual v3.48
Rorke Data RAIDWatch Manual v3.48
User’s Manual
Software Revision: 2.3.x
Contact Information
ii
RAIDWatch User’s Manual
Copyright 2006
First Edition Published 2005
All rights reserved. This publication may not be reproduced, transmitted,
transcribed, stored in a retrieval system, or translated into any language or
computer language, in any form or by any means, electronic, mechanical,
magnetic, optical, chemical, manual or otherwise, without the prior written
consent of Rorke Data.
Disclaimer
Rorke Data makes no representations or warranties with respect to the contents
hereof and specifically disclaims any implied warranties of merchantability or
fitness for any particular purpose. Furthermore, Rorke Data reserves the right to
revise this publication and to make changes from time to time in the content
hereof without obligation to notify any person of such revisions or changes.
Product specifications are also subject to change without prior notice.
Trademarks
Rorke Data, Galaxy, and RAIDWatch are all registered trademarks of Rorke
Data, Inc.
iii
RAIDWatch User’s Manual
Table of Contents
CHAPTER 1 INTRODUCTION
1.1 RAIDWATCH OVERVIEW ....................................................................................... 1-2
1.1.1 Product Description .............................................................................................. 1-2
1.1.2 Feature Summary .................................................................................................. 1-2
1.2 FEATURED HIGHLIGHTS .......................................................................................... 1-3
1.2.1 Graphical User Interface (GUI)............................................................................ 1-3
1.2.2 Enclosure View...................................................................................................... 1-4
1.2.3 Powerful Event Notification Function ................................................................... 1-4
1.2.4 Java-based Remote Management.................................................................... 1-5
1.2.4.1 Mode One: Centralized Management .......................................................... 1-5
1.2.4.2 Mode Two: Stand-alone (on Host) ............................................................... 1-6
1.2.4.3 Mode Three: Stand-alone (on Subsystems) .................................................. 1-6
1.2.4.4 Access Requirements.................................................................................... 1-6
1.2.5 Multi-Language Support ....................................................................................... 1-9
1.2.6 Password Protection ............................................................................................. 1-9
1.3 CONCEPTUAL FOUNDATION .................................................................................. 1-10
1.3.1 Centralized Management (Agent-based) Installation.......................................... 1-10
1.3.2 Stand-alone (on Host) Installation ...................................................................... 1-11
1.3.3 Stand-alone (on Subsystem) Installation ............................................................. 1-11
CHAPTER 3 INSTALLATION
3.1 SYSTEM REQUIREMENTS ......................................................................................... 3-2
3.1.1 Server Running RAIDWatch.................................................................................. 3-2
3.1.2 Local Client Running RAIDWatch Manager......................................................... 3-2
3.2 RAID CHART .......................................................................................................... 3-3
3.3 PLATFORM REQUIREMENTS .................................................................................... 3-4
3.4 SOFTWARE SETUP ................................................................................................... 3-4
3.4.1 Before You Start .................................................................................................... 3-4
3.4.2 Installing RAIDWatch in Windows Platform......................................................... 3-5
3.4.3 Installing RAIDWatch in Linux Platform .............................................................. 3-6
3.4.4 Installing RAIDWatch in Solaris Platform ............................................................ 3-7
3.4.5 Installing RAIDWatch Main Program................................................................... 3-8
3.4.6 Installing Software Components.......................................................................... 3-11
3.4.7 Stand-alone (on Host or Subsystem) Installation ................................................ 3-13
3.5 PROGRAM UPDATES .............................................................................................. 3-15
3.6 IN-BAND SCSI ...................................................................................................... 3-16
3.6.1 Overview.............................................................................................................. 3-16
3.6.2 Related Configuration on Controller/Subsystem................................................. 3-16
iv
RAIDWatch User’s Manual
v
RAIDWatch User’s Manual
vi
RAIDWatch User’s Manual
vii
RAIDWatch User’s Manual
APPENDICES
viii
RAIDWatch User’s Manual
APPENDIX B GLOSSARY
This manual discusses how to install and use RAIDWatch to manage disk array
systems incorporating Galaxy RAID enclosures. Please note that RAIDWatch
does not support drive enclosure displays manufactured by other vendors.
In addition to RAIDWatch, you can also use the on-board COM port or LCD
panel to manage the Galaxy subsystems.
ix
RAIDWatch User’s Manual
Provides some background information on RAID and defines some terms that
will be used throughout the rest of the manual. Discusses the use of spares and
how to replace a drive if no spares were available. Finally, provides a short
discussion on RAIDWatch preliminaries.
Chapter 3: Installation
x
RAIDWatch User’s Manual
This chapter describes the creation, expansion and deletion of both logical drives
(LD) and logical volumes (LV). Different LD and LV options are explained and
steps to setting the different options are described in detail. A discussion on
partitioning LDs and LVs is also found in this chapter.
Discusses how to obtain the current status of SAF-TE, I2C, and S.E.S.
monitoring devices and get updates on the status of storage system components.
Descriptions on how to access these different monitoring devices are given and
the type of information that is offered by these devices is shown.
Appendices
Appendix A: Command Summary
xi
RAIDWatch User’s Manual
Appendix B: Glossary
xii
RAIDWatch User’s Manual
Usage Conventions
Throughout this document, the following terminology usage rules apply:
• “RAID Agent” is the part of the software, which allows the RAID
controller/subsystem to talk to the RAIDWatch Manager or Root
Agent. A RAID Agent communicates with the RAID array via SCSI
bus, iSCSI or Fibre channels (using the In-band protocols), or via an
Ethernet port. RAID Agents are the intermediaries between RAID
systems and the RAIDWatch program.
NOTE:
These messages inform the reader of essential but non-critical
information. These messages should be read carefully as any directions
or instructions contained therein can help you avoid making mistakes.
CAUTION!
Cautionary messages should also be heeded to help you reduce the
xiii
RAIDWatch User’s Manual
IMPORTANT!
The Important messages emphasis on using RAIDWatch management
software.
WARNING!
Warnings appear where overlooked details may cause damage to the
equipment or result in personal injury. Warnings should be taken
seriously.
Problems that occur during the updating process may cause unrecoverable errors
and system down time. Always consult technical personnel before proceeding
with any firmware upgrade.
NOTE:
Firmware version installed on your system should provide the complete
functionality listed in the specification sheet/user’s manual. We provide
special revisions for various application purposes. Therefore, DO NOT
upgrade your firmware unless you fully understand what a firmware
revision will do.
xiv
RAIDWatch User’s Manual
Revision History
March 23, 2006
The ICQ event notification function was removed through out the manual. The
function was described mainly in Chapter 4.
January 5, 2006
Support for 64-bit Operating Systems, including Windows 2003 64-bit, Linux
Suse9 64-bit, Linux Fedora3 64-bit, and Linux RedHat Enterprise ES 4, has
been added. Additionally, support of Solaris 8 OS has been removed.
October 5, 2005
Some new features are added to the new version of RAIDWatch. Features such
as identify drive and scan/add/clear drive features are added in the physical
drives maintenance window. Those features are described in Chapter 6. In
Chapter 7, more items are included in the host-side parameter category.
RAID level 6 is newly added to RAIDWatch 2.2.c. The RAID level 6 function is
mentioned in Chapter 2, Chapter 9 as well as a clear description in Appendix C.
This manual was revised for RAIDWatch revision 2.2. Chapter 6 was moved to
Chapter 2 to introduce RAID and RAIDWatch considerations to user before
installation.
xv
RAIDWatch User’s Manual
The program supports more operation environments that are listed in Chapter 1.
Chapter 1 also describe the new features such as the multi-language support
include English, Deutsch and Japanese for the software GUI and online help.
The auto complete feature is added. This feature saves time when user is trying
to connect a RAID system by typing in an IP address that was previously
connected in the connection window.
The new Chapter 6 (previously Chapter 5) was rearranged to fit the current
software version. The auto complete feature is included in the connection
window. The new agent list window combined with auto discovery function is
described in the chapter. A new function called Quick Installation is being added
in the configuration category. The explanation of using Window commands is
being added.
In Chapter 11, the event log list/configuration list functions are newly
described. Users are able to use those functions to monitor and report the system
status.
Two new functions are being added. By using RAIDWatch revision 2.1.c, the
configuration client supports the auto discovery of iSCSI models to auto detect
the available agents. The new function is fully described in Section 3.5. A
restore factory defaults function is newly provided in the RAIDWatch main
program. The function description can be found in Section 7.4.
xvi
RAIDWatch User’s Manual
was added. SCSI channel and compatible cables were explained clearer in
Chapter 8.
Revised for RAIDWatch revision 2.1. Added descriptions for new configuration
options including the NPC utility for the Applet mode installation. Added
Chapter 13: NPC Utility.
Completely revised for RAIDWatch 2.0, but still kept the manual structure.
Although software revision 2.0 has a brand new look and feel and a different
configuration access, the available configuration options are basically the same.
One chapter, Event Monitor, was removed because the functionality was
combined with GUI screen interface. The chapter for NPC functionality was
also removed because the event notifications were integrated with the
Configuration Client utility.
Chapter 13 and Chapter 14 were merged into a single chapter, Chapter 13:
Panel View. This chapter generally describes the panel view and removes the
redundant descriptions that were previously in both Chapter 13 and Chapter 14.
Part 4 of the previous edition was also removed and Chapter 13 has been
included in Part 3 of the Manual.
This manual was completely revised from previous editions. Previous editions
came with six chapters and six appendices; the current revision has fourteen
chapters divided into four parts and five appendices. The main changes to this
edition are given below.
Chapter 1 remained largely unchanged with only minor editorial corrections that
do not directly affect the content.
Chapter 2 was separated into two chapters. In the previous revision, Chapter 2,
Installation, described system and platform requirements, installation, and
xvii
RAIDWatch User’s Manual
Chapter 3 in the old revision on Basic Operations became Chapter 4 in the new
revision. More detailed instructions on how to use RAIDWatch were added and
new screen captures included.
Chapter 4 in the old revision on Array Management has been separated into six
new chapters in the new revision. Five of the new chapters, Chapter 5 – Chapter
9, make up Part 2 of this revision of the user’s manual and the sections in
Chapter 4 of the previous edition on S.E.S. management and IIC, SAF-TE and
Fault bus management were moved into Chapter 10 of this revision. All these
chapters have enhanced descriptions on how to manage an array, and a series of
more indicative screen captures were added.
xviii
RAIDWatch User’s Manual
xix
Chapter 1: Introduction
Chapter 1
Introduction
The enclosure window shown in Figure 1-1 provides real-time reporting of the
status of enclosure components, including components that can be accessed
through the front or the rear side of an enclosure. When a drive fails, the system
highlights the corresponding LED icon of the failed drive by changing its
display color. When you remove a drive, its icon is removed from the enclosure
window. This feature is particularly useful in cases when a drive fails, and you
need to identify its exact location for subsequent replacement.
The enclosure window also appears in other configuration windows showing the
logical relationship between the member drives of a logical configuration.
Drives belonging to the same logical drive will be displayed in the same color.
This allows you to easily identify members of different configurations. To see a
cascaded enclosure, single click on the “JBOD” page on top of the enclosure
graphic.
NOTE:
NOTE:
• Access Requirements
Three (3) installation schemes for different access requirements are discussed
below.
NOTE:
The RAIDWatch management screen has a navigation tree panel that provides
access to functional windows under three major categories:
NOTE:
The default password for Information categories is 1234.
3. The main management server will also need Java Run-time Environment
(JRE) installed if a system administrator needs to configure the arrays
from it.
NOTE:
The items in the lower section of Table 1-4, JRE, web browser and/or
web server are not included with RAIDWatch management program;
therefore, they must be installed or modified by system users.
Yes, if it is
RAIDWatch Yes - used to run Yes
Manager RAIDWatch
Configuration Yes - - -
Client
Yes, if it is
JRE used to run Yes Yes -
RAIDWatch
NOTE:
The RAIDWatch 2.0 or above installation only executed when hard drive
is formatted or at least one logical drive exists. Use LCD panel or RS-
232 terminal program to create a logical drive when you are using new
hard drive before installing RAIDWatch 2.0 or above version.
Chapter 1
Introduction
1.1 RAIDWatch Overview .................................................................................................. 2
1.1.1 Product Description ............................................................................................2
1.1.2 Feature Summary................................................................................................2
1.2 Featured Highlights ....................................................................................................... 3
1.2.1 Graphical User Interface (GUI) ..........................................................................3
1.2.2 Enclosure View ..................................................................................................4
1.2.3 Powerful Event Notification Function................................................................4
1.2.4 Java-based Remote Management .......................................................................5
1.2.4.1 Mode One: Centralized Management.....................................................................5
1.2.4.2 Mode Two: Stand-alone (on Host) .........................................................................6
1.2.4.3 Mode Three: Stand-alone (on Subsystems) ............................................................6
1.2.4.4 Access Requirements..............................................................................................6
1.2.5 Multi-Language Support.....................................................................................9
1.2.6 Password Protection ...........................................................................................9
1.3 Conceptual Foundation................................................................................................ 11
1.3.1 Centralized Management (Agent-based) Installation .......................................11
1.3.2 Stand-alone (on Host) Installation....................................................................12
1.3.3 Stand-alone (on Subsystem) Installation ..........................................................12
Chapter 2
RAIDWatch Considerations
RAID has several levels and multi-level configurations including RAID 10,
30, 50 and 60. RAID levels 1, 3 and 5 are the most commonly used levels;
while the highest fault-tolerance, RAID level 6 are also available. Appendix
C, RAID Levels, gives information about these levels and the benefits of
each.
Galaxy disk array controllers support hot-swapping so that a failed drive can
be replaced while the disk array system continues to function. Spares can
also be assigned so that, as soon as a drive fails, the spare is automatically
configured into the array and reconstruction will commence.
♦ Physical drives. These are the actual drives installed into the enclosure
drive slots. These drives are displayed in Enclosure View and the Front
View of different configuration windows.
♦ Spare drives. These are physical drives that serve as backups. When a
drive fails, the spare automatically joins the array and data
reconstruction commences immediately. Dedicated and Global Spares
are shown in different colors. A Dedicated Spare appears in the same
color as other members of the logical drive it belongs to. A Global
Spare uses the default color (black). Both Dedicated and Global Spares
have an orange cross superimposed on them.
rebuild the array, you will also need to replace the failed drive
manually to create another spare in case another drive fails.
♦ Failed drives. These are physical drives that fail due to some type of
error. Failed drives appear with red LED marks on their respective
icons.
The following are guidelines for disk failure recovery when a spare drive is
available:
♦ If a spare drive exists in the same logical drive, the controller will
automatically mount the spare drive and start rebuilding data in the
background.
IMPORTANT!
Although the RAID system provides uninterrupted disk access even after a
disk failure, do not leave a failed drive unattended. Without replacement, the
system will not survive a second physical drive failure on the same logical
drive. A defective drive must be promptly replaced and data rebuilt.
CAUTION!
When performing hot-swapping, be sure to remove only the defective drive.
Removing the wrong drive will result in complete, unrecoverable data loss.
Use the Enclosure View window or Logical Drive Information window to
locate exactly which physical drive has failed.
Chapter 2
RAIDWatch Considerations
2.1 Background Information ............................................................................................2
2.2 Definition of Terms ....................................................................................................2
2.3 Operating with Spare Drives ......................................................................................3
2.4 Operating without Spare Drives .................................................................................3
2.5 Before You Start.........................................................................................................4
Chapter 3
Installation
3.6.1 Overview
NOTE:
Linux 64-bit Operating Systems currently do not support Java applet mode.
♦ Remote station must be running Netscape 4.7X, IE6.0 or Mozilla 5.0, Java
Runtime 1.4.2 (for a particular platform).
♦ A GSM modem is required (if using the SMS short message event
notification function). RAIDWatch currently supports two GSM modem
models:
♦ Siemens TC35
NOTE:
Please contact DMarc for the complete list of compatible GSM modems.
Location HQ Storage ….
Center
♦ IP Address – If available.
♦ Your system display must be running in 256 colors or higher mode otherwise
some configuration items may not be visible.
♦ Be certain that your system meets the minimum hardware and software
requirements listed in Section 3.1 System Requirements.
♦ Check to confirm that the RAID disk arrays and controllers are installed
properly. For the installation procedure, see the documentation that came
with the controller/subsystems.
Step 1. Insert the RAIDWatch installation CD into the systems CD-ROM drive.
Step 2. If you are currently running other applications, close them before
proceeding with the setup process. This will minimize the possibility of
encountering system errors during setup.
Step 4. Click the supported platform on the right-hand side to start the
installation process. The current availability is “Windows 2000 and
above.” (See Figure 3-2)
Step 5. If your server or workstation is not ready with Java Runtime (at least
version 1.4.2), an install shield will automatically install Java Runtime
onto your machine. Please follow the on-screen instructions to proceed.
Step 1. Insert the RAIDWatch installation CD into the systems CD-ROM drive.
Step 2. If you are currently running other applications, close them before
proceeding with the setup process. This will minimize the possibility of
encountering system errors during setup.
Step 3. Open the file manager and change the directory to /mnt/cdrom
Step 5. Be sure to install JRE 1.4.2 or above version on your server. Running
older version of Java runtime may cause a failure of installing
RAIDWatch main program.
Step 1. Insert the RAIDWatch installation CD into the systems CD-ROM drive.
Step 2. If you are currently running other applications, close them before
proceeding with the setup process. This will minimize the possibility of
encountering system errors during setup.
Step 3. Be sure to install JRE 1.4.2 or above version on your server. Running
older version of Java runtime may cause a failure of the RAIDWatch
main program installation.
Step 4. When the File Manager window pops up on the screen, double-click the
file “unix.sh.” (See Figure 3-3)
Step 5. A Run window prompt will display. (See Figure 3-4) To install the
Java-based GUI RAIDWatch manager main program, type YES and
then press Enter. This will launch RAIDWatch manager install shield.
Please refer to Section 3.4.5 for step-by-step installation procedures.
Step 1. To install RAIDWatch, click the Next button at the bottom of the
window. If you do not wish to continue with the installation process,
select the Cancel button.
Step 2. If you selected the Next button on Figure 3-5, the License Agreement
window seen in Figure 3-6 will appear. First read through the License
Agreement. If you are in agreement with the specified terms and wish to
continue installing the RAIDWatch program, select Accept. If you do
not wish to continue with the installation process then select the Decline
button.
Step 3. If you accepted the License Agreement in Figure 3-6, a new window
with two installation options will appear. These options, shown in
Figure 3-7, are Typical Install and Custom Install. The default is set to
Basic Install. All users are recommended to install RAIDWatch
program using the default settings. This will create a new “Galaxy”
folder on the computer chosen as a management center. If you want to
install RAIDWatch in a different folder, type in a new location or click
the Browse button to select a destination folder. If you follow the default
selection and click the Next button, the install shield will start install the
RAIDWatch software, RAID Agents, and necessary drivers on the
computer.
NOTE:
Step 4. If you choose the Custom install on the previous screen, three (3)
installation modes will appear. These modes, shown in Figure 3-8, are
Centralized Management, Stand-alone (on Host), and Stand-alone (on
Subsystem).
♦ Stand-alone (on Host) – Selecting this option will install the In-
band driver (RAID agents) for servers that are directly attached to
a RAID subsystem, and the RAIDWatch software on the local
computer.
IMPORTANT!
There is no need to configure the Peripheral Device setting if you are trying
to manage a RAID subsystem from a RAIDWatch station through an
Ethernet connection (to the Galaxy subsystem’s Ethernet port). An
Ethernet connection to RAID uses TCP/IP as the communication protocol.
Once the components that you want have been selected, select the Next
button to proceed with the installation. If you do not wish to proceed
with the installation process, select the Cancel button. If you wish to re-
select the installation options, select the Back button.
Step 1. If the Next button from Figure 3-10 was selected, the Install Active
window shown in Figure 3-11 will appear. If you wish to stop the
installation procedure, then click the Cancel button.
Step 2. Once the software has been successfully installed, a window indicating
the successful installation (see Figure 3-12) will appear. To complete the
process and exit the window, click Finish.
Step 1. As shown in Figure 3-13 above, enter the IP address or the host name of
the controller/subsystem and the controller password in their respective
fields. The default for the controller/subsystem IP or password is blank.
The preset IP and password should have been configured along with
other configuration utilities before proceeding with the RAIDWatch
installation.
Once the IP (or host name) and the controller password have been
entered, select the Next button if you wish to proceed with the
installation process. If you do not wish to proceed with the installation
process, select the Stop button. If you wish to re-select the installation
options, then select the Back button.
Step 2. If the Next button from Figure 3-13 was selected, the Install Active
window shown in Figure 3-14 will appear. If you wish to stop the
installation procedure, then click the Cancel button. If you wish to
continue installing the Applet components, allow the installation shield
to continue through the rest of the procedure.
Step 3. Once the software has been successfully installed, a window indicating
the successful installation (see Figure 3-15) will appear. To complete the
process and exit the window, click the Finish button.
Step 4. If you wish to immediately access the RAIDWatch manager, open a web
browser and type in the IP address that you used in Figure 3-13.
http://www.xxx.yyy.zzz
There are limitations on the use of in-band protocols however. In order for a host
to “see” the RAID controller/subsystem, at least one (1) logical drive must exist
and be mapped to a host ID/LUN. Otherwise, the RAID controller/subsystem
itself must be configured to appear as a peripheral device to the host computers.
Step 1. From the Main Menu, press the Up or Down buttons to select “View
and Edit Configuration Parameters.”
Step 2. Press Enter; and then use the Up or Down keys to select “Host-side
SCSI Parameters.” Then press Enter.
Step 1. First select the “Peripheral Device Type” submenu and then select
“Enclosure Services Devices <Type=0xd>.”
Step 3. Leave other options as defaulted. In-band should work fine by setting
these two options. The adjustments necessary to use in-band protocols
have been completed.
NOTE:
Be sure to change the Peripheral Device Type to your preference after in-
band SCSI connection has been setup.
Chapter 3
Installation
3.1 System Requirements ...................................................................................................... 2
3.1.1 Server Running RAIDWatch ................................................................................... 2
3.1.2 Local Client Running RAIDWatch Manager .......................................................... 2
3.2 RAID Chart ..................................................................................................................... 3
3.3 Platform Requirements .................................................................................................... 4
3.4 Software Setup................................................................................................................. 5
3.4.1 Before You Start...................................................................................................... 5
3.4.2 Installing RAIDWatch in Windows Platform.......................................................... 5
3.4.3 Installing RAIDWatch in Linux Platform................................................................ 7
3.4.4 Installing RAIDWatch in Solaris Platform.............................................................. 7
3.4.5 Installing RAIDWatch Main Program ..................................................................... 9
3.4.6 Installing Software Components............................................................................ 12
3.4.7 Stand-alone (on Host or Subsystem) Installation................................................... 15
3.5 Program Updates ........................................................................................................... 17
3.6 In-band SCSI ................................................................................................................. 18
3.6.1 Overview ............................................................................................................... 18
3.6.2 Related Configuration on Controller/Subsystem ................................................... 18
Chapter 4
Configuration Client Options
This chapter describes the Configuration Client options. There are a number
of different items that users can configure. These include the Root Agent and
RAID Agents relationship and the configuration options concerning event
notification. The following sections are covered in this chapter:
Step 2. If you are using a Windows operating environment, you may start the
Configuration Client by double-clicking on the Configuration Client
shortcut on your Windows Desktop. (See Figure 4-1) Otherwise,
select Start on the bottom left of your screen, select the Programs
menu, and then select Galaxy. Under the Galaxy directory, select the
Configuration Client option shown in Figure 4-2.
♦ Auto Discovery
Step 2. From the Command menu, select File->Add Host (see Figure 4-4),
or right-click on Connection View to bring up the Input Root Agent
Dialog Box, and enter a Root Agent IP here. (See Figure 4-5)
NOTE:
Step 4. The Confige user dialog box appears. Select to log in either as an
Administrator or Guest. An administrator has the authority to change
any configuration client settings, unlike a guest is allowed to view
the settings only. (See Figure 4-8)
Step 7. Double-click the Admin Tool item on the Connection View window
in the Configuration Client User Interface. (See Figure 4-10)
Step 8. The Module Configuration window will display on the right of the
Configuration Client User Interface. You may now start
configuring event receivers under each notification method window.
Click on the Module Name pull-down list to display all the
configuration options. (See Figure 4-11)
• File commands include Add Host and Exit. The Add Host command
connects you to a Root Agent host. A Root Agent host is one that is
chosen as a management center to manage multiple RAID agents,
which are, in turn, used to access different arrays. By connecting to a
Root Agent IP, all its subsidiary RAIDs are then managed by the
management center. The Exit command will let you exit the
Configuration Client User Interface and close the program.
The tool bar has six (6) buttons, described from left to right as follows:
saved profile of the access to multiple arrays (via Root Agent and RAID
Agent IPs).
• Save Bookmark File: This button allows you to save the current
connection profile (as shown in the Navigation panel) as a file to your
system drive. A file path dialog box displays when selected.
• Connect Root Agent Server: This button allows you to connect to a Root
Agent server to begin monitoring, for example, in situations when it has
been manually disconnected.
NOTE:
The Root Agent IP is the IP of the computer where you installed your
Configuration Client utility.
• Help Cursor: Click the Help Cursor button and then click on the area
where you have question. A Help window will appear to explain the
functionality.
These commands on the selection menu allow you to remove a Root Agent
entry, to connect, disconnect, or refresh the current connectivity status. The
Connection View window automatically updates when an array is turned on
or off, and automatically prompts you for a status change, e.g., a managed
array once disconnected is now connected.
Delete Host: Delete the Root Agent Server by selecting this command.
Connect: Select this command to connect your computer to the Root Agent
Server.
Disconnect: To disconnect the Root Agent Server from your computer, select
this command.
Generate Dummy Event: You can also generate simulated events to test the
notification functions once you have configured any or all of the notification
methods.
Refresh: Refresh the connection between your computer and the Root Agent
Server.
The Module Config panel provides access to ten (10) configurable items,
and each item contains two or more setup options. Seven (7) of them belong
NOTE:
This password is independent from the password set for the
“Configuration” login to start the RAIDWatch management program.
Agents can be associated with a Root Agent. A Root Agent then summarizes
and presents these RAID Agents to the Configuration Client so that system
administrators can be notified of system alerts if any faulty conditions are
detected within these RAID arrays.
Step 1. RAID Agents currently being managed by a Root Agent are listed in
the lower right corner of the RAIDWatch screen.
Step 2. To add or delete RAID Agents, click the Create button next to the
Root Agent pull-down list to open an Add Monitor Controller
window. (See Figure 4-17) The same command can also be
activated by right-clicking on the agent list under Current Value
section. (See Figure 4-18)
Right-click on the
Current Value
section
Step 3. Enter the IP address of the array you wish the Root Agent to manage.
Click OK to complete the process. An example is shown in Figure
4-19.
Step 1. Enable the function by double-clicking the Current Value field in the
Status field.
Step 2. Set an SMTP server address in the SMTP server field so that event
log emails can be sent to the administrator.
Step 3. Set a valid mail address in the Sender mailbox field and an
administrator’s email address in the Recipient Email field.
Prepare your execution file, and place it under the plug-in sub-folder
under the directory where you installed the RAIDWatch program. If the
default installation path has not been altered, the plug-in folder should be
similar to the following:
Program Files -> Galaxy -> RAID GUI Tools -> bin -> plug-in.
Step 2. Make sure you have placed the execution file in the plug-in folder as
described earlier.
Step 3. Enter the appropriate data in the Plug-in Description and Plug-in
Label fields, and then select an execution file from the Application
Program field (if there is more than one).
Step 5. Select the Plug-in tab from the panel. Click Create Receiver to
display an input field dialog box.
Step 6. Enter the configuration string to be read when the application
program starts. (See Figure 4-22) A configuration argument may
look like this:
There are seven notification methods listed in the pull-down menus. Along
with seven different means of informing RAID managers that an event has
occurred (fax, broadcast, email, SNMP traps, SMS, and MSN messenger),
the severity level of events to be sent via these notification methods can also
be configured.
Level Description
1 All severity levels
2 Two levels: Warning and Alert
3 Only the most serious events: Alert messages
Table 4-1: Levels of Notification Severity
The event security level can be set during notification function setting. If you
wish to modify the security levels for any notification setting, right-click on
the Severity section in the lower level of Configuration screen. Select Edit
common to view the Edit dialog box. (See Figure 4-23) Select the desired
severity level in the Severity pull-down menu. (See Figure 4-28) Once the
severity level is selected, click OK to exit the dialog box.
You can also turn on and off each notification method by double-clicking on
the switch button located on the upper left of the user interface. (See Figure
4-26)
The Root Agent runs as an application and is automatically loaded when the
server is powered on. Restart the Configuration Client for the changes to take
effect.
Receiver Side
To set a client listening to SNMP traps:
Step 1. Open the Module Config page. Use the Module Name pull-down
menu to select SNMP trap.
Step 2. To create a new SNMP trap, click the Create button on the top right
screen or right-click on the lower half of the configuration screen; the
Add SNMP Receiver dialog box will appear.
Step 3. Enter the IP addresses of the SNMP agents that will be listening for
trap notification in the Add SNMP Receiver dialog box
Step 4. Select the severity level of events that will be sent to the SNMP
agent. Refer to Section 4.4.2.
Sender Side
From the Module Config window:
Step 1. Find the SNMP settings from the pull-down list.
Step 2. Click on the On/Off switch beside the pull-down button to enable
SNMP traps notification.
Step 3. Double-click on the Current Value field of the Status row to enable
SNMP traps notification.
Step 4. Select the severity level of events to be sent to the receiver station.
Step 5. Provide a valid out port IP that will be used for delivering SNMP
traps. Usually the default IP detected by the Root Agent will be
sufficient. If you have more than one Ethernet port, double-click to
configure it.
Receiver Side
NOTE:
SASL authentication is supported with this revision.
Step 1. Open the Module Configuration page. Use the Module Name pull-
down menu to select Email.
Step 2. To create a new email notification, click Create on the top right of
the screen or right-click on the lower half of the configuration screen
to display the Add Email Recipient dialog box.
Step 3. An Add Email Recipient dialog box appears. Enter an email address
that is able to receive email notification.
Step 4. Select the severity level of events to be sent to the receiver's email.
Sender Side
From the Module Config window:
Step 1. Find the email settings from the Module Name pull-down list.
Step 2. Click the On/Off switch beside the pull-down list button to enable
Email notification.
Step 3. Double-click on the Current Value field of the Status row to enable
email notification.
Step 4. Select the severity level of events to be sent to the receiver station.
Step 5. Enter the mail subject by double-clicking the Current Value field.
Step 6. Set your SMTP mail server through which emails will be sent.
Step 7. Enter the Account name and Password if your mail server requires
these values. SASL is the currently supported mechanism.
Receiver Side
To set a computer to receive broadcast messages:
Step 1. Open the Module Configuration page. Use the Module Name pull-
down menu to select Broadcast.
Step 2. To create a new LAN broadcast notification, click the Create button
on the top right of the screen or right-click on the lower half of the
configuration screen to display the Add Broadcast Recipient dialog
box.
Step 3. An Add Broadcast Receiver dialog box appears. Simply enter the
IP addresses of a station configured on a network.
Step 4. Select the severity level of events to be sent to the receiver station.
NOTE:
NETBUES and TCP/IP should be active services on your Centralized
Management station for message broadcasting.
Sender Side
From the Module Config window:
Step 1. Find the Broadcast settings from the pull-down list.
Step 2. Click on the On/Off switch beside the pull-down button to enable
LAN broadcast notification.
Step 3. Double-click on the Current Value field of the Status row to enable
LAN broadcast. Set Status to Enable if you want the module to be
activated every time the Root Agent is started. Note that the On/Off
switch should also be in the On position before you turn off the
server or close the utility. Otherwise, you will have to manually
enable the function whenever you reboot the server.
Step 4. Select the severity level of events to be sent to the receiver station.
Receiver Side
To set a fax machine to receive event messages:
Step 1. Open the Module Configuration page. Use the Module Name pull-
down menu to select Fax.
Step 2. To create a new Fax notification, click Create on the top right of the
screen or right-click on the lower half of the configuration screen to
display the Add Fax Recipient dialog box.
Step 3. An Add Fax Receiver dialog box prompts. Enter the phone number
of the fax machine that will receive event notifications.
NOTE:
The physical connection and fax service with Windows MAPI should
be ready before configuring this function.
Sender Side
From the Module Config window:
Step 2. Click on the On/Off switch beside the pull-down button to enable
Fax notification.
Step 3. Double-click on the Current Value field of the Status row to enable
fax notification. Set Status to Enable if you want the module to be
activated every time the Root Agent is started. Note that the On/Off
switch should also be in the On position before you turn off the
server or close the utility. Otherwise, you will have to manually
enable the function whenever you reboot the server.
Step 4. Select the severity level of events to be sent to the receiver station.
Step 5. The Fax device row shows the fax machine(s) currently available.
Check for appropriate setup in the Windows control panel.
Step 6. Queue size determines how many events will be accumulated and
then sent via a single fax transmission.
Receiver Side
To set an MSN messenger address to receive notification messages:
Step 1. Open the Module Configuration page. Use the Module Name pull-
down menu to select MSN.
Step 2. To create an MSN notification, click Create on the top right of the
screen or right-click on the lower half of the configuration screen to
display the Add MSN Recipient dialog box.
Step 3. Enter the MSN account of the contact receiving event messages.
Sender Side
From the Module Config window:
Step 1. Find the MSN settings from the pull-down list.
Step 2. Click on the On/Off switch beside the pull-down button to enable
MSN notification.
Step 3. Double-click on the Current Value field of the Status row to enable
MSN notification. Set Status to Enable if you want the module to be
activated every time the Root Agent is started. Note that the On/Off
switch should also be in the On position before you turn off the
server or close the utility. Otherwise, you will have to manually
enable the function whenever you reboot your server.
Step 4. Select the severity level of events to be sent to the receiver station.
♦ Siemens TC35
Please contact DMarc for the complete list of compatible GSM modems.
Receiver Side
To set a cell phone to receive notification messages:
Step 1. Open the Module Configuration page. Use the Module Name pull-
down menu to select SMS Message Service.
Step 2. To create a new SMS notification, click the Create button on the top
right of the screen or right-click on the lower half of the configuration
screen to display the Add SMS Recipient dialog box.
Step 3. Enter the Cell Phone Number of the contact who will receive event
messages.
Sender Side
From the Module Config window:
Step 2. Click on the On/Off switch beside the pull-down button to enable
SMS notification.
Step 3. Set Status to Enable if you want the module to be activated every
time the Configuration Client is started. Note that the On/Off switch
should also be in the On position before you turn off the server or
close the utility. Otherwise, you will have to manually enable the
function whenever you reboot the server.
Step 4. Select the severity level of events to be sent to the receiver station.
Step 5. Select the COM port where you connect your GSM modem.
Step 6. Enter the four-digit identification Pin Code required by the modem.
To setup the Auto Discovery option, please follow the steps below:
Step 1. Open the Module Configuration page. Use the Module Name pull-
down menu to select Auto Discovery option. (See Figure 4-45)
Step 2. Double-click on the current value under IP scan range row to open
the Auto Discovery dialog box. (See Figure 4-46)
Step 3. Enter a set of IP range that you want the system to detect in the IP
range dialog box.
NOTE:
You may modify an existing IP range by clicking the Modify button or
delete an existing IP range by clicking the Delete button. Click on the
Cancel button to cancel any action you made in the Auto Discovery
dialog box and return to the Auto Discovery main screen.
Step 4. Click the Expand button to add the new IP range into a preset list.
Step 5. Click Finish button to close this dialog box and return to the Auto
Discovery option main screen.
Step 6. Double-click on the current value under Rescan time row to modify
a time frame in minute that you like the system to scan the network.
NOTE:
The default rescan time is set to 0 minute that indicates the system will
scan the network only when Configuration Client is starting up. The
Auto Discovery option will be turned off after the first scan.
Step 7. You may turn on and off this option by double click on current value
under Status row (see Figure 4-47) or click on the On/Off switch
beside the pull-down button to enable the option.
NOTE:
If you already have the Auto Discovery option turned on, be sure to
turn off and then turn on the option for any adjustments that you
newly made to take effect.
Once the Auto Discovery option is successfully configured, the system will
detect the IP range that you designated, and automatically add the search
results into the agent list. An Auto Discovery Notice window will prompt,
you may click OK button to close the window and start using Configuration
Client and RAIDWatch Manager.
If you open the Root Agent setting option under module configuration
window, an available agent list will be shown in the lower section of the
Configuration Client user interface. (See Figure 4-49)
If you like to start using the RAIDWatch manager, please refer to Section
5.2. A Agent List window will automatically show the controllers that were
detected by the Auto Discovery option.
NOTE:
The severity levels here are different from the levels used for
configuring the notification methods
To check the events that have happened since the Configuration Client
started, single-click on a connected RAID.
The event log window displays on the right-hand side of the RAIDWatch
screen.
NOTE:
The utility does not display events that happened before the utility
started.
Chapter 4
Configuration Client Options
4.1 The Configuration Client Utility ................................................................................2
4.1.1 Start the Configuration Client Program..............................................................2
4.1.2 Setting Up a Root Agent.....................................................................................3
4.2 Configuration Client User Interface ...........................................................................6
4.2.1 Command Menu .................................................................................................7
4.2.2 Tool Bar Buttons ................................................................................................7
4.2.3 Connection View Window .................................................................................8
4.2.4 Module Configuration Window..........................................................................9
4.3 Root Agent Configuration ........................................................................................10
4.3.1 Root Agent Settings..........................................................................................10
4.3.2 Adding RAID Agents IPs (Associating Root Agent with Multiple
RAID Arrays) ...................................................................................................10
4.3.3 Root Agent Log Settings ..................................................................................12
4.3.4 Create Plug-ins with Event Notification...........................................................12
4.3.4.1 Before you begin ..............................................................................................12
4.3.4.2 The Configuration Process ...............................................................................13
4.4 Event Notification Settings.......................................................................................15
4.4.1 Configuration Client Notification Methods......................................................15
4.4.2 Event Severity Levels.......................................................................................15
4.4.3 Enabling Notification Functions.......................................................................16
4.4.4 SNMP Traps Settings .......................................................................................17
4.4.5 Email Settings...................................................................................................19
4.4.6 LAN Broadcast Settings ...................................................................................21
4.4.7 Fax Settings ......................................................................................................22
4.4.8 MSN Settings ...................................................................................................24
4.4.9 SMS Settings ....................................................................................................26
4.5 Auto Discovery.........................................................................................................28
4.6 Event Severity Levels...............................................................................................31
4.6.1 Level 1 Severity Events (Examples).................................................................31
4.6.2 Level 2 Severity Events (Examples).................................................................31
4.6.3 Level 3 Severity Events (example)...................................................................32
4.7 Event Log Display....................................................................................................32
Chapter 5
RAIDWatch Icons
Information
Enclosure View
System Information
Statistics
Maintenance
Logical Drive
Physical Drive
Task Scheduler
Configuration
Quick Installation
Host Channel
Configuration Parameters
Enclosure View
Drive in good condition
Global Spare
Progress indicator
A partitioned
logical drive
volume is
represented as a
color bar that can be
split into many
segments. Each
color segment
indicates a partition
of a configured
array.
A partitioned
logical volume
is represented
as a color bar
System Information
A battery module
A current sensor
A cooling module
A power supply
A temperature sensor
An UPS device
A voltage sensor
Maintenance
This category uses the same icons as in the Logical Drive Information
window. See Logical Drive Information section.
A partitioned logical
volume is represented
as a color bar that can
be split into many
segments. Each color
segment indicates a
partition of a
configured array.
A logical volume
Host Channel
A host channel
A logical volume
A partitioned array
volume is represented
as a color bar that can
be split into many
segments. Each color
segment indicates a
partition of a
configured array.
Configuration Parameters
No icons are used in the window.
Event Messages
Severity Levels
Event Type
Type of messages detected by the subsystem. The event view panel displays
icons representing specific categories using the same icons as those used in
the System Information window.
Chapter 5
RAIDWatch Icons
5.1 Navigation Tree Icons ................................................................................................1
5.2 Array Information Icons .............................................................................................3
Enclosure View ..................................................................................................................3
Tasks Under Process ..........................................................................................................4
Logical Drive Information..................................................................................................4
Logical Volume Information..............................................................................................4
Fibre Channel Status ..........................................................................................................5
System Information ............................................................................................................5
5.3 Maintenance Icons......................................................................................................6
Maintenance .......................................................................................................................6
5.4 Configuration Icons....................................................................................................6
Create Logical Drives.........................................................................................................6
Existing Logical Drives......................................................................................................6
Create Logical Volume ......................................................................................................6
Existing Logical Volumes ..................................................................................................6
Host Channel ......................................................................................................................7
Host LUN Mapping............................................................................................................7
Configuration Parameters...................................................................................................7
5.5 Event Log Icons..........................................................................................................7
Event Messages ..................................................................................................................8
Chapter 6
Basic Operations
This chapter describes the RAIDWatch screen elements and basic operations.
Since the majority of RAID storage applications require non-stop operation, the
Configuration Client utility, which is used to monitor and report array
conditions, should be installed on a management server that runs 24-7 operation.
For a higher level of fault tolerance in case of server failure, the Configuration
Client can be installed onto more than one server. As shown below, when
installing RAIDWatch using the Advance/Centralized Management scheme, a
pair of redundant servers can be specified in the installation wizard prompt. The
configuration is done by specifying IP addresses for a Master Host and a Slave
Host.
IMPORTANT!
RAIDWatch must be manually installed (Advanced Installation, and then
choose Mode 1 installation: Centralized Management) onto both the
Master and Slave hosts. The Configuration Client functionality on the
Slave host becomes active only when the Master host fails.
connection between your array and the directly attached server. Once a
connection is established successfully, management can be started.
Depending on your setup, you can start RAIDWatch Manager in various ways.
For both local and remote management, and under various OSes, starting the
program is fairly simple. Please refer to the appropriate sub-sections below for
information.
- OR -
Double-click the RAIDWatch Manager icon from the desktop (see Figure 6-3)
if a shortcut was added during the installation process.
Step 1. After the main program of RAIDWatch manager is installed, the files
will be installed on the path: /usr/local/Galaxy/RAID GUI Tools
NOTE:
In Applet mode, connecting to the second array requires opening
another browser window and entering its IP.
On the computer screen, if you don’t see the RAIDWatch Connection window,
it can be opened from the RAIDWatch program menu. Click on the System and
then select Open Device command, and the RAIDWatch Connection window
will prompt up. (See Figure 6-5)
Step 1. If you have a specific RAID array’s IP address in mind and wish
only to manage one array, simply enter the IP address to proceed.
NOTE:
If you are not certain of a RAID array’s IP address, you may rely on
the Auto Discovery option in the Configuration Client to automatically
detect the available RAID arrays that are controlled by root agents. If
the Auto Discovery option is enabled, the available RAID array will be
shown automatically in the Agent List window that is described in
later this section. To use the Auto Discovery option, please refer to
Section 4.5: Auto Discovery.
Step 2. You may select to enable the Secure Sockets Layer (SSL) security
option by a single mouse-click on its check box. SSL works by
using a private key to encrypt data when transmitting private
documents and obtain confidential information. SSL creates a
secure connection between a client and a server, over which any
amount of data can be sent securely.
Step 3. Enter a user name by selecting from the pull-down menu. Each
user name represents an authorized access level. Enter a password
to proceed. Leave it blank if there is no preset password. Click OK
button to start the management session.
NOTE:
Refer to Section 6.4 for the details of the three authorized access
levels.
Step 1. If you would like to see the available RAID subsystems that are
connected to the network or a specific root agent, you may click the
Show Root Agent List button on the bottom of the RAIDWatch
Connection window. The window displays the tree tables of the
available RAID systems that are detected by Auto Discovery
function. An example of an Agent List window is shown in Figure
6-6.
Step 2. If you like to add a new root agent, pull-down the Root Agent
command menu in the Agent List window and select Add Root
Agent. Enter a root agent IP address in the prompt up window.
Any RAID systems that are connected to the root agent will be
shown in a tree table in the Agent List window.
Step 3. You may refresh the Agent List window by select Refresh under
Root Agent command menu.
Step 4. Click on the controller that you want to manage and select an
authorized access level. Enter any necessary password and the
program will lead you to its management session.
Step 5. If you like the system to search the available RAID systems again,
pull down the System command menu and select Auto Discovery.
(See Figure 6-8) The new search result will be showing in the
Agent List Window.
NOTE:
Setting up Auto Discovery is shown in Section 4.5: Auto Discovery.
Select Logout will close the current management session and return to the
Outer Shell window. If you wish to connect to another RAID array, enter its IP
address and then click OK to proceed. Click Cancel to close the connection
prompt and return to the Outer Shell window.
Selecting the Refresh button allows you to re-connect with an array if a RAID
system has been temporarily disconnected; e.g., the RAID system is being reset
or the host links were disconnected for maintenance reasons.
By default, no password is required to access a RAID system using the first two
protection levels, “Configuration” (Administrator) and “Maintenance” (User).
A default password is required for the Information login.
Default Passwords
It is recommended to configure passwords for the first two access levels at the
first time you successfully connect to an array. Information users can monitor
array status and see event messages. A user logging for Maintenance access can
perform maintenance jobs onto configured arrays, and a user logging in using
the Configuration login has full access to create, modify, or delete all related
array configurations.
Note that some RAID subsystem/controllers may have been configured with a
password using terminal or LCD keypad utilities. This preset password can be
used for a “Configuration” login. However, the password can be changed using
“Configuration Parameters” window in RAIDWatch’s main program. See
Chapter 7 for the description of password setup.
Just like other GUI-based applications, the RAIDWatch Manager works entirely
with windows, buttons, and menus to facilitate various disk array operations.
These windows follow the standard Windows look-and-feel specifications, so
NOTE:
Screen captures throughout this document show the Windows look and
feel.
The GUI screen can be divided mainly into three (3) separate windows: a tree-
structure Navigation Panel, the Information/Configuration window, and the
Event Log/Configuration View window at the bottom.
All menus provide a list of commands (shown in Figure 6-13) for invoking
various disk array and display-related operations.
NOTE:
Multiple simultaneous RAIDWatch Managers can connect to one RAID system.
♦ Under System menu, the Open Device command lets you connect to a
RAID array. This command triggers the connection prompt. Multiple
arrays can be managed each in a separate management window.
Click the Auto Discovery command will start a new search of any
available RAID systems in the specific IP ranges on the network. The
function can be setup using Configuration Client utility.
The Exit command under the System menu is always available and is used
to end all RAIDWatch Manager sessions at once.
♦ The Language items allow you to display the on-screen GUI, instructions,
commands, messages, and explanatory legends in a different languages.
The current supporting languages are English, Deutsch, Spanish and
Japanese.
♦ Under the Help menu, the About command displays a window that
provides RAIDWatch version and copyright information.
The Help Topic commands displays the online help contents, which are
implemented in Java Help format.
You may click the What’s this? command, move it around the screen, and
display related information by a second mouse-click on the screen element
you are interested in.
♦ The Refresh command sends instructions to the GUI asking to review the
connection status. The Logout command under the System menu allows
you to disconnect from a controller/subsystem and to end the software
♦ The Action menu brings up sub-menus that allow you to access various
options under the three (3) configuration categories: Information,
Maintenance and Configuration. Each of these options will be discussed
in later this chapter.
To access the information category, either select the icon from the navigation
tree or go to the Action Command menus and then select Information on the
top of the screen. (See Figure 6-15)
Front View: This sub-window helps you to quickly identify configured arrays
by the physical locations of their members. Different arrays are distinguished
by different colors. When any member drive is selected by a mouse click the
rest of the array’s members will be highlighted by bright blue lines, indicating
they are members of the selected array.
includes CPU, firmware/boot record version, serial number, CPU and board
temperature, voltage, and status of the battery. This window has no
configuration options.
To access the maintenance category, either select the icon from the navigation
tree or go to the Action Command menus and then select Maintenance on the
top of the screen. (See Figure 6-23)
There are three (3) sub-windows in the Logical Drives maintenance mode
window:
♦ The Logical Drives window provides a list of all configured arrays. Use a
single mouse-click to select the logical drive you wish to perform
maintenance tasks on.
♦ The Front View window allows you to see the locations of logical drives.
Note that a logical drive is selected by a single mouse-click from the list
of configured arrays on the upper screen.
NOTE:
The function is available for logical drive that is configured to
RAID level 1, 3, 5 and 6.
There are two (2) sub-windows in the Physical Drives maintenance mode
window:
♦ The Front View window allows you to select a hard drive to perform
maintenance tasks on. A selected drive is highlighted by bright blue lines,
and its slot number is shown in the Functions window in the Selected
Drive Slot field.
Maintain Spare - You can add a spare drive from the list of the
unused drives. The spare chosen here can be selected as global or
local spare drive. If you choose to create a local spare drive, enter a
logical drive ID in the next page. Click Finish, the controller will
then rebuild data onto the replacement drive.
NOTE:
A logical drive composed in a non-redundancy RAID level
(NRAID or RAID 0) does not support spare drive rebuild.
Low Level Format – This function only appear when you have
inserted a new disk drive without disk format. This function allows
you to format a new disk drive.
There are two (2) sub-windows in the Task Schedules maintenance mode
window:
♦ The Configure Task Schedule window allows you to select a hard drive
or logical drive to perform a scheduled task on. A selected drive or
logical drive is highlighted by bright blue lines and its related
configuration options are displayed on the selection boxes on the right of
the screen.
♦ The Apply button allows you to complete the process and add the
schedule.
To access the Configuration category, either select the icon from the navigation
tree or go to the Action Command menus and then select Configuration on the
top of the screen. (See Figure 6-23)
If you already have at least one logical drive existed in the RAID system, this
function will be disabled. You will be prompt a message window that indicates
logical drive already exists.
The basic rules for using the functional elements in the Create Logical Drive
window are:
For detail of creating a logical drive, please refer to Chapter 9 of this document.
The basic rules for using the functional elements in the Existing Logical Drives
window are:
♦ This window also uses a parallel display and the up-then-down principle.
To start configuring an existing array, select a configured array from the
LD list above. Locations of its members are automatically displayed, and
then the available functions are displayed in the Functions window.
♦ This window contains three edit commands that can be triggered by right-
clicking your mouse button.
NOTE:
This window also contains Edit mode commands that are only
accessible by a mouse right-click.
When the Channel window is opened, the screen shown in Figure 6-30 should
appear.
Two pages, Parameters and ID, display on the right of the Channel screen.
On the Parameters page, channel mode, current data rate, default data rate and
current transfer width are displayed.
Channel Mode: Special Option not applicable to Galaxy. This option allows
you to change the I/O channel operating mode. The channel mode selections can
be: host, drive, RCC, drive +RCC.
Be sure to click Apply for the configuration to take effect. For detail of how
to configure channels, please refer to Chapter 8 of this document.
NOTE:
This window allows you to create LUN masking entries with host LUN mapping
when access control over a Fibre Channel network is necessary.
This window uses tabbed panels to provide access to the functional sub-
windows. Each sub-window provides configurable options using check boxes,
check circles, or pull-down menus. Clicking Apply button will complete the
configuration process. A mixture of message prompts, file path windows, text
fields, and confirm boxes ensure ease of use. Refer to Chapter 7 for details of
each configuration options.
♦ Tile All: Use the Tile All command to arrange and display all system
view windows. This allows you to view multiple systems simultaneously.
♦ Cascade All: Use the Cascade All command to diagonally arrange and
display all system view windows on the screen. This allows you to view
multiple systems at a glance.
♦ Hide All: When you select this command, all active system view
windows will be minimized to small icons on the bottom left of the
♦ Close All: If you select this command, all the RAID systems will be
discounted and every system view windows will be closed.
Chapter 6
Basic Operations
6.1 Starting RAIDWatch Agents ......................................................................................3
6.2 Starting RAIDWatch Manager ...................................................................................4
6.2.1 Locally or via LAN under Windows 2000/ 2003 Environments ........................4
6.2.2 Locally or via LAN under Linux Environments.................................................5
6.2.3 Locally or via LAN under Solaris Environments ...............................................5
6.2.4 For Remote Management via Web Browser (Any Supported OSes) .................5
6.3 Start Using RAIDWatch Manager..............................................................................6
6.3.1 Connecting to a RAID Subsystem......................................................................7
6.3.2 Using the Agent List Window ............................................................................8
6.3.3 Disconnecting and Refreshing a Connection....................................................10
6.4 Security: Authorized Access Levels.........................................................................10
6.5 Look and Feel...........................................................................................................11
6.5.1 Look and Feel Overview ..................................................................................11
6.5.2 Screen Elements ...............................................................................................12
6.5.3 Command Menus..............................................................................................12
6.5.4 Outer Shell Commands.....................................................................................13
6.5.5 Management Window Commands ...................................................................14
6.6 The Information Category ........................................................................................15
6.6.1 Enclosure View Window..................................................................................16
6.6.2 Tasks Under Process Window..........................................................................16
6.6.3 Logical Drive Information Window .................................................................16
6.6.4 Logical Volume Information Window .............................................................17
6.6.5 Fibre Channel Status Window..........................................................................18
6.6.6 System Information Window............................................................................18
6.6.7 Statistics Window.............................................................................................19
6.7 The Maintenance Category.......................................................................................20
6.7.1 Logical Drives Maintenance Window ..............................................................21
6.7.2 Physical Drives Maintenance Window.............................................................22
6.7.3 Task Schedules Maintenance Window.............................................................24
6.8 The Configuration Category.....................................................................................25
6.8.1 Quick Installation .............................................................................................25
6.8.2 Create Logical Drive Window..........................................................................26
6.8.3 Existing Logical Drives Window .....................................................................26
6.8.4 Create Logical Volume Window......................................................................27
6.8.5 Existing Logical Volumes Window..................................................................27
6.8.6 Channel Window ..............................................................................................27
6.8.7 Host LUN Mapping Window ...........................................................................29
6.8.8 Configuration Parameters Window ..................................................................29
6.9 Arranging Windows .................................................................................................30
6.10 Multi-array Management..........................................................................................31
Chapter 7
Configuration Parameters
RAIDWatch Manager enables you to modify the configuration of the disk array
controller from your manager console. This chapter describes the following
subsystem configuration features:
7.2 Communications
To configure the Communication options, select the Communication page, as
shown in Figure 7-2, from the Configuration Parameters window.
RS-232C Port
Galaxy RAID subsystems/controllers come with one or two serial ports. Before
proceeding with configuration, first select COM1 or COM2 by a single mouse
click.
♦ Baud rate allows you to control the serial port baud rate. Select an
appropriate value from the pull-down menu.
Network Interface
Communications 7-3
RAIDWatch User’s Manual
7.3 Controller
“Controller” here refers to the RAID controller unit, which is the main
processing unit of a RAID subsystem. The configuration window contains two
sub-windows: “Caching” and “Controller Parameters.” To configure the
controller’s caching behaviors, select an appropriate value from each of the pull-
down menus, as shown in Figure 7-3.
The data cache can be configured for optimal I/O performance using the
following variables:
Caching Parameters
♦ Write-Back Cache
7-4 Controller
Chapter 7: Configuration Parameters
♦ Optimization Policy
♦ Sync. Period
This option allows you to select the desired interval for the partner
controllers in a dual-controller configuration to synchronize (mirror-
copy) their cached data. RAID controllers have defaults for this;
however, this option provides more choices with the sync. period.
Controller Parameters
♦ Controller Name
A manually entered nickname for the RAID controller. This name can
also be used to recognize a RAID subsystem in an environment where
multiple RAID subsystems reside.
♦ Time Zone(GMT)
♦ Date/Time
♦ SDRAM ECC
Controller 7-5
RAIDWatch User’s Manual
If the DIMM module installed for data caching supports ECC, you may
select to enable or disable the error check function here.
When preferences have been set with the configurations above, click Apply
to make the changes.
7.4 System
To access the System-specific functions, select the System page, as shown in
Figure 7-4, from the Configuration Parameters window.
Each function is executed by a two-step procedure. Click the select button of the
function you wish to perform and click the “Apply” button for the configuration
to take effect.
Select only one option each time from the System page. You may repeat the
steps if you like to change more than one option.
System Functions
7-6 System
Chapter 7: Configuration Parameters
♦ Mute Beeper. Turns the beeper off temporarily for the current event. The
beeper will still be activated by the next event. Be sure that you have
checked carefully to determine the cause of the event.
♦ Restore Factory Default. When you apply this function, any settings that
you have made in RAIDWatch program will be formated and the
original factory default configuration will be restored.
Download/Upload
♦ Download FW+BR: This allows you to download the firmware and boot
record together. It may not be necessary to upgrade the boot record each
time you update your firmware binaries. Please refer to the readme text
file that came with each firmware version.
NOTE:
All of the download functions will prompt for a file source from the
current workstation.
System 7-7
RAIDWatch User’s Manual
♦ Restore NVRAM from Disk: While user likes to retrieve the previously
saved NVRAM backup from subsystem hard drives, all the settings
including system password will also be restored. It causes inconvenience
if user doesn’t get the stored password before and hence user can’t
access subsystem. With this option, user can decide whether to restore
with or without password through user interface (terminal) according to
individual requirement.
When this option is applied, a question window will prompt up. (See
Figure 7-5)
NOTE:
Upload NVRAM will prompt for a file destination at the current
workstation.
7.5 Password
To configure different levels of the Access authorization Password, select the
Password page, as shown in Figure 7-6, from the Configuration Parameter
window.
7-8 Password
Chapter 7: Configuration Parameters
Maintenance Password
Users logging in using the Maintainance Password will be able to access the first
two configuration categories, Information and Maintenance. You may set the
Maintenace Password here and click OK for the change to take effect.
Configuration Password
Users logging in using the Configuration Password have full access to all
configuration options. A super-user has the right to access all three configuration
categories on the navigation tree. You may set the Configuration Password here
and click OK for the change to take effect.
7.6 Threshold
To access the event threshold options, click the Threshold page in the
Configuration Parameters window.
This window allows you to change the preset values on thresholds used to
monitor the condition of the RAID controller unit(s) in your subsystem. For
example, these threshold values can be changed if the controller operates in a
system enclosure where the upper or lower limit on ambient temperature is
much higher or lower than that on the RAID controller. Adjusting the default
thresholds can coordinate the controller status monitoring with that of the
system enclosure.
Threshold 7-9
RAIDWatch User’s Manual
To change the threshold values on a specific monitored item, for example, the
CPU Temp Sensor, right-click on the item. The Configuration button will
prompt. (See Figure 7-7) Left-click on the Configuration button to bring up the
Configuration prompt window. (See Figure 7-8)
WARNING!
The upper or lower thresholds can also be disabled by entering “-1” in
the threshold field. However, users who disable the thresholds do this at
their own risk. The controller(s) will not report condition warning when
the original thresholds are exceeded.
You may then enter a value in either the lower or upper threshold field.
NOTE:
7-10 Threshold
Chapter 7: Configuration Parameters
Click Cancel to cancel this action and go back to the Threshold page in
Configuration Parameter window.
NOTE:
Access to the Secondary controller only allows you to see controller
settings. In a redundant configuration, configuration changes have to be
made through the Primary controller.
NOTE:
3. The adaptive policy changes the preset write policy of an array when
handling I/Os with heterogeneous characteristics. If the firmware
determines it is receiving write requests in sequential order, the write-
caching algorithm is disabled on the target logical drives.
IMPORTANT!
The Adaptive Write Policy is applicable to subsystems working under normal
conditions. For example, if a drive fails in an array, the firmware
automatically restores the array’s original write policy.
1. Controller Failure
5. Fan Failure
Each option is executed by a two-step procedure. Select the check box of the
events for which you wish the controller/subsystem to commence the cache
flush, and then click Apply for the configuration to take effect.
NOTE:
The thresholds on temperature refer to the defaults set for “RAID
controller board temperature.”
7.9 Other
I/O channel host-side, drive-side, and rebuild priority options are included in the
Other sub-window. To configure these configuration options, select the Other
page, as shown in Figure 7-11, from the Configuration Parameters window.
7-14 Other
Chapter 7: Configuration Parameters
Drive-side Parameters
Disk Access Delay Time (Sec): Sets the delay time before the subsystem
tries to access the hard drives after power-on. Default is 15 seconds.
Drive Check Period (Sec): This is the time interval for the controller to
check all disk drives that were on the drive buses at controller startup.
The default value is “Disabled.” Disabled means that if a drive is
removed from the bus, the controller will not know it is missing as long
as no host accesses that drive. Changing the check time to any other value
allows the controller to check all array hard drives at the selected time
interval. If any drive is then removed, the controller will be able to know
– even if no host accesses that drive.
Drive Motor Spin Up: Selected when hard drives need to Spin-up by
SCSI command. By default, all hard drives will start spinning up when
powered-on. Also refer to the documentation that came with your hard
drives.
Drive Delayed Write: User is able to enable/disable the drive write cache.
With enabled drive write cache, the non-mission critical application can
achieve better performance. Whereas, the disabled drive write cache is
recommended to be used for mission-critical applications. Galaxy’s
RAID system will maintain the system reliability. The default setting is
“Disabled.”
NOTE:
This function is only applicable on RAID subsystems running Firmware
3.47 or above version with SATA HDD configured.
Disk I/O Timeout (Sec): This is the time interval for the subsystem to
wait for a drive to respond to I/O requests. Selectable intervals range
from 1 to 10 seconds.
Other 7-15
RAIDWatch User’s Manual
to decide at what interval the subsystem will check the status of these
devices.
Drive Fail Swap Check Period (Sec): The subsystem scans drive buses at
this interval to check if a failed drive has been replaced.
Spindown Idle Delay Period (Sec): User can setup an idle period for the
drives. Drives will automatically spin down while there is no read/write
command to drives within the idle period. Then if any I/O command is
issued, such as disk backup, the drives will wake up and serve the I/O
requirement. This feature rises up drives’ usage life.
NOTE:
This function is only applicable on RAID subsystems running Firmware
3.47 or above version with SATA HDD configured.
Host-side Parameters
LUNs per Host ID: Each SCSI ID can have up to 32 LUNs (Logical Unit
Numbers). A logical configuration of array capacity can be presented
through one of the LUNs under each host channel ID. Most SCSI host
adapters treat a LUN like another SCSI device.
7-16 Other
Chapter 7: Configuration Parameters
Other 7-17
RAIDWatch User’s Manual
8/9
Table 7-1: Peripheral Device Type Parameters
Sequential-access Device 1
Processor Device 3
CD-ROM Device 5
Scanner Device 6
MO Device 7
Cylinder, Head, and Sector counts are selectable from the configuration
menus shown below. To avoid any difficulties with a Sun Solaris
configuration, the values listed below can be applied.
<64 GB Variable 64 32
64 – 128 GB Variable 64 64
7-18 Other
Chapter 7: Configuration Parameters
Variable 255
NOTE:
This function is not only applicable on Galaxy SCSI series RAID
subsystems.
Disk-Array Parameters
Other 7-19
RAIDWatch User’s Manual
Write-Verify Options: Errors may occur when a hard drive writes data.
In order to avoid write errors, the controller can force the hard drives to
verify the written data. There are three selectable methods:
Maximum Drive Response Timeout (ms): The main purpose for having
a maximum response time on hard drives is to ensure delays caused by
media errors or drive erratic behaviors do not result in host I/O timeouts.
Doing so can avoid the unnecessary efforts dealing with delays especially
when drives showing problems are often the failing drives. Below are
some operation limitations:
NOTE:
This function is only applicable on RAID subsystems running Firmware
3.42 or above version.
7-20 Other
Chapter 7: Configuration Parameters
3. Low Priority Rebuild will be much slow down when host I/O
loading.
3. Low Priority Rebuild will be much slow down when host I/O
loading.
NOTE:
1. No matter what user configures for the Maximum Drive Response
Timeout, once the AV optimization is set to Fewer Streaming option,
the Maximum Drive Response Timeout is fixed at 160ms. If the AV
optimization is set to Multiple Streaming option, the Maximum
Drive Response Timeout is fixed at 960ms.
2. The above parameter (2) & (3) will leave modification capability in
append file for specific ODM/OEM requirement.
Other 7-21
RAIDWatch User’s Manual
Chapter 7
Configuration Parameters
7.1 Accessing Configuration Parameters Options ............................................................2
7.2 Communications.........................................................................................................3
7.3 Controller ...................................................................................................................4
7.4 System ........................................................................................................................6
7.5 Password.....................................................................................................................8
7.6 Threshold....................................................................................................................9
7.7 Redundant Controller Settings .................................................................................11
7.8 Event Triggered Operations .....................................................................................13
7.9 Other.........................................................................................................................14
7-22 Other
Chapter 7: Configuration Parameters
Other 7-23
Chapter 8: Channel Configuration
Chapter 8
Channel Configuration
Using RAIDWatch Manager, you can modify the configuration of any channel
on the controller. With RAID controllers like the Galaxy, you can set the
channel operation mode to host or drive, enable or disable channel termination,
set IDs, set the transfer clock rate for synchronous communication, and select
the transfer width.
NOTE:
The Galaxy A12U-XXXXX series of RAIDs does not support this
channel operation mode feature.
Channel configuration settings are available under Physical View in the RAID
View window. This chapter describes the following Channel Configuration
features:
8.2.2 Termination
To access the Channel window, use either the command from the Action menu
or select the Channel icon from the navigation panel. (See Figure 8-1).
Once the Channel window has been opened and channel items have appeared,
click on the channel that needs to be configured and its configuration window
will appear on the right. (See Figure 8-2)
NOTE:
A SCSI host channel is shown in Figure 8-3.
The Galaxy series controller allows flexible reconfigurations of its I/O channels.
An I/O channel can be assigned as Host, Drive, dedicated RCC (RCCOM), or
Drive+RCCOM channels. For example, the combination of I/O channels may
look like the following:
channels
For more information about all possible combinations, please refer to the
Installation and Hardware Reference Manual that came with your controller.
8.2.2. Termination
This parameter enables or disables channel SCSI termination on subsystems
featuring SCSI host channels. SCSI buses must be properly terminated at both
ends; that is, when connecting one end of a SCSI cable to a host HBA, the
termination of the channel must be enabled on the subsystem side. An alternate
configuration should be applied when multiple enclosures are being cascaded on
the host buses. An enclosure situated in the middle of a SCSI bus should have its
termination set to disabled.
Data transferred across the bus in synchronous transfer mode is clocked using a
synchronous transfer clock signal. The frequency of this signal determines the
rate at which data is transferred. For example, if the synchronous transfer clock
is 10 MHz, data transfer rate will be 10 million bytes per second (using narrow
transfer).
Data transfer across the SCSI bus can be either 8-bits or 16-bits at a time. The
former is referred to as narrow transfer, while the latter is referred to as wide
transfer. According to SCSI channel specifications, transfer speed shown in
MHz is the SCSI bus synchronous frequency. At the same synchronous transfer
clock rate, 16-bit wide transfer rate is double of 8-bit narrow transfer rate. Please
refer to the transfer speed in the table below.
SCSI-320 160MHz
SCSI-160 80MHz
NOTE:
Galaxy’s SCSI products are backward compatible with older version of
SCSI type. However, using older versions of SCSI type may slow down
the data transferring speed and do not enjoy some of the new SCSI
features.
Under conditions in which SCSI signal quality is poor, such as with extremely
long cables, poor connections, or bad termination, it may occasionally be
necessary to reduce the synchronous transfer clock to allow the SCSI channel to
function normally. Worst case, it may be necessary to switch to asynchronous
communication mode.
Furthermore, certain older SCSI devices may only support narrow transfer and
behave abnormally when attempting to negotiate wide transfer. Under such
conditions, wide transfer may need to be disabled, forcing the controller to use
narrow transfer mode with that device.
IMPORTANT!
Every time you change the transfer speed, you must reset the controller
for the changes to take effect.
This parameter sets the IDs to appear on the host channels. Each channel must
have a unique ID in order to work properly. For a SCSI-host subsystem, IDs
range from 0 to 15. For an iSCSI-host subsystem, IDs range from 0 to 3. For a
Fibre-host controller/subsystem, IDs range from 0 to 125. ID 0 is the default
value assigned for host channels on SCSI-host and iSCSI-host subsystems and
ID 112/113 is the default value assigned for host channels on Fibre-host
controller/subsystems. Preset IDs are available with drive channels and it is
recommended to keep the defaults.
For more information on host channel and drive channel IDs, please refer to the
Generic Operation Manual and the hardware documentation that came with
your controller/subsystems.
Step 3. If you want to assign a different ID to the selected channel, choose the
ID panel. An ID pool scroll menu will appear as shown in Figure 8-5.
When selecting an ID, be sure that it does not conflict with the other devices on
the channel. Preset IDs should have been grayed out and excluded from
selection. The ID pool lists all available IDs for the current selection. Highlight
the IDs you want to use by selecting their check boxes and click Apply to create
either the PIDs (Primary ID) or SIDs (Secondary ID) for the channel.
Chapter 8
Channel Configuration
8.1 Channel Configuration Window.................................................................................2
8.2 User-Configurable Channel Parameters .....................................................................3
8.2.1. Channel Mode ....................................................................................................4
8.2.2. Termination ........................................................................................................5
8.2.3. Default Transfer Clock (in MHz) .......................................................................5
8.2.4. ID Pool / PID / SID ............................................................................................6
8.3 Setting the Configurations for a Channel ...................................................................7
Chapter 9
Drive Management
Using RAIDWatch Manager, you can make and delete Logical Drives (LDs) and
Logical Volumes (LVs). Both LDs and LVs can be partitioned. This chapter describes
the following drive management features:
• 9.2.2.1 LD Creation
9.2.7 Deleting an LD
• 9.3.2.1 LV Creation
• 9.3.2.2 Expanding a LV
9.3.4 Deleting an LV
9.4.1 Overview
Spare Drive
Before you start configuring a logical array, please read the following:
♦ All members in a logical configuration are displayed in the same unique color.
♦ Whenever a disk drive is selected by a single mouse click on its icon, the drive’s
status is displayed on the associated configuration window. For example, when a
drive is selected by clicking its icon, it automatically appears in the Selected
Members column. In this way, mistakes can be avoided by double-checking the
information related to a specific disk drive.
♦ Create LDs
♦ Expand LDs
♦ Migrate LDs
♦ Delete LDs
NOTE:
When you delete a logical drive, all physical drives assigned to the logical
drive will be released, making them available for creation or expansion of
logical drives.
Step 1. To manage LDs, such as to create and set related parameters, display the
Create Logical Drive window by clicking on the Create Logical Drive icon
in the functional navigation panel or clicking on the Action menu items
located on top of the screen.
9.2.2.1. LD Creation
To create a logical drive:
Step 1. Select the physical drives that will be used in the LD. (See Section 9.2.2.2)
♦ Drive Size
♦ Stripe Size
♦ Initialization Mode
♦ RAID Level
♦ Write Policy
Step 2. Drives selected for a new logical drive will be listed in the Selected Members
sub-window on the right-hand side of the screen.
Step 3. Continue to set appropriate RAID parameters in the Select menu at the lower
part of the configuration screen.
Drive Size
The value entered in the Drive Size field determines how much capacity from each
drive will be used in the logical drive.
NOTE:
Enter a smaller number if you do not want to use up all of the capacity
at this time. The unused capacity can be utilized later using the Expand
Logical Drive function.
Select a stripe size, but note that stripe size arrangement has a tremendous effect on
RAID subsystem performance. Changing strip size is only recommended for
experienced users. Stripe size defaulted to this menu is determined by the subsystem
Optimization mode and the RAID level selected.
Initialization Options
This allows you immediate availability of the array. "Online" means the logical drive
T
is immediately available for I/Os and the initialization process can be automatically
completed some time later.
Write Policy
Define the write policy that will be applied to this array. "Default" means identical to
the subsystem’s overall setting. The overall setting can be accessed in the Caching
Parameters section of the Configuration Parameters sub-window.
Step 2. A confirmation window will appear. If you are certain that you want to create
the LD with the settings you have selected, click OK.
Step 4. If you selected OK in the Please Confirm window, the Create In Progress
content window will display the logical drive creation progress.
Step 5. Click the Reset button to redo or abort the process. When the initialization
process begins, you can check the Tasks Under Process window to view its
progress.
After the Existing Logical Drives window is opened, the LDs that have been created
will appear in the Logical Drives panel.
From the list shown in Figure 9-4, select the LD for which you wish to change its
characteristics or configure. Once this LD has been selected, its members will appear
in the Front View sub-window. At the top of the Functions window, three tabs
(Properties, Add Disk and Expand) will appear.
Each option is executed by a two-step procedure. Click to select a desired value from
the pull-down menu or input a name, and then click Apply for the configuration to take
effect.
Write Policy: Write policy can be adjusted on a per logical drive basis. This option
allows you to set a write policy for the specific logical drive you selected. “Default” is
a neutral value that is coordinated with the controller’s caching mode setting. Other
choices are “Write-back” and “Write-through.”
Name: You can name a logical drive per logical drive basis.
Step 1. Select the logical drive you wish to expand from the LD list on
top of the GUI screen.
Step 2. Select the Add Disk tab to display the content panel.
Step 3. Select one or more drives you wish to add to the logical drive by
single mouse-click from the Front View window. When the
drive(s) are selected, its status is displayed in the Add Disk
content panel.
Step 4. The Add Disk panel has two functional buttons: Add Disk and
Add Local Spare Disk. Click on the Add Disk button to include
new members into the array.
Step 5. The Add Disk process should immediately begin. You may
check the add drive progress in the Tasks Under Process
window.
Execute Expand
Execute Expand allows you to determine whether or not the expansion
will be done online or offline. If you wish to do an online expansion, then
the expand process will be completed once the subsystem finds I/O
requests from the host are comparatively low and allows the expand
operation. If you wish to do an offline expansion, then the OFFLINE
menu item will begin immediately.
Step 6. Once the LD expansion parameters have been selected, click the
Expand button at the bottom of the Expand page.
Step 7. The expand process begins and you may check the progress in the
Tasks Under Process window.
Step 8. The logical drive will now have a new last partition the same size
as the expansion. You may right-click the logical drive field
listed above to display the Edit Partition command to verify this.
NOTE:
Only RAID level 5 and 6 support the migration option currently. This
function is disabled when a LD is configured as other RAID levels.
The display panel shows the slot number and its available size that are
currently selected.
You can assign a RAID level, strip size and drive size for the new logical
drive after migration.
Each RAID level required a certain amount of hard disk drives. You need
a minimum of three (3) drives for RAID 5 and four (4) drives for RAID
6. This drag down menu only shows available RAID levels according to
the number of physical drives you selected. You can add drives by click
on an available drive in the Front View window. A selected drive is
circled in a light-blue line. To deselect a drive, click on the selected drive
in the Front View window. The slot number and available size
information will be changed accordingly in the display panel.
WARNING!
1. Different RAID configurations use different sizes of disk space to
store parity or mirrored data. When migrating from one to another,
disk space might not be enough to hold the original data. So the
total drive spaces of new RAID level must not less than original
RAID level.
Select a stripe size, but note that stripe size arrangement has a
tremendous effect on RAID subsystem performance. Changing strip size
is only recommended for experienced users. Stripe size defaulted to this
menu is determined by the subsystem Optimization mode and the RAID
level selected.
Step 1. Once the LD migration parameters have been set to the value
desired, click the Migrate LD button at the bottom of the
Migrate Logical Drives page.
Step 2. The migration process begins and you may check the progress in
the Tasks Under Process window.
Step 3. The logical drive will now have a new RAID level, strip size and
drive size. All data will be moved from the old logical drive to
the new logical drive.
Mode 1
Mode 1 Expansion is illustrated in Figure 9-9 and involves adding more
hard disk drives to a logical drive, which may require that the purchase of
an enclosure with more drive bays. The data will be re-striped onto the
original and newly added disks.
In Figure 9-9 above, new drives are added to increase the capacity of a
4-Gigabyte (GB) RAID 5 logical drive. The two new drives increase the
capacity to 8GB.
Mode 2
Figure 9-10 above illustrates expansion of the same 4GB RAID 5 logical
drive using Mode 2 Expansion. Drives are copied and replaced, one by
one, onto three higher-capacity drives.
2 4 GB
2 GB 2 GB 4 GB
New
Drive
RAID 5 (4GB)
RAID 5 (8GB)
n partitions
3 Partition n+1
4 GB 4 GB 4 GB
RAID or
Expansion
RAID 5 (8GB)
RAID 5 (4GB)
IMPORTANT!
The increased capacity from either expansion type will be listed as a
new partition.
Three new drives are scanned in. To add the drives to the logical drive,
select the logical drive where they will be added, then choose the Add
Disk tab to begin the process described above. Select one or more drives
to add and click the Add Disk button. When you have selected all of the
new drives you want to add, click OK.
When you return to the partition table, you will notice that either partition
0 or the last partition will now be larger than before.
Follow the directions in the next chapter to map the new partition to a
host LUN. The new partition must be mapped to a host LUN in order for
the HBA (host-bus adapter) to see it.
NOTE:
Adding a spare drive can be done automatically by selecting the RAID
1+Spare, RAID 3+Spare, RAID 5+Spare or RAID 6+Spare option
from the logical drive RAID Level selection dialog box when creating
a logical drive. These options apply to RAID 1, RAID 3, RAID 5 and
RAID 6 levels respectively.
Step 1. Select the logical drive to which you wish to add a dedicated
spare from the list of the logical drives above. In the Functions
window, click the Add Disk tab. The functional window is
accessed from the Existing Logical Drives window as shown in
Figure 9-13, the Add Spare button appears next to the Add Disk
button.
Step 2. From the Front View window, select the disk drive you want to
use as a dedicated spare with a single mouse-click.
Step 3. After selecting the drive that will be used as a spare, the selected
drive’s status will be displayed and you may click the Add Spare
button to complete the process.
NOTE:
Spare drive assignments can also be made in the Maintenance mode
window. Note that a Global Spare cannot be added in the Existing
Logical Drives window.
9.2.7 Deleting an LD
If you want to delete an LD from your RAID subsystem, follow the steps
outlined below. Remember that deleting an LD results in all the data on
the LD being deleted and any data that was previously stored on the LD
will be irretrievable.
IMPORTANT!
Deleting a logical drive irretrievably wipes all data currently stored on
the logical drive.
Step 1. Select the logical drive you wish to remove with a single mouse-
click. Right-click on the adjacent screen area. A command menu
will prompt as shown in Figure 9-15.
Step 2. Select the Delete Logical Drive command. The delete process is
completed almost immediately.
Step 3. Once the Delete command has been selected, a confirm box will
prompt asking you whether to proceed or not.
Step 4. If you are certain that you wish to delete the LD, press the OK
button. If you are not sure, click the Cancel button.
NOTE:
When you delete a logical volume, all logical drives assigned to it will
be released, making them available for new logical volume creation.
9.3.2.1. LV Creation
Step 1. Select the LDs that will be used in the LV from the Logical
Drives Available panel.
♦ Write Policy
♦ Assignment
Step 3. Information about the selected LDs will appear on the Selected
Members panel. Click the OK button.
Step 2. All available logical drives are listed on the left. There are no
limitations as to the number of logical drives that can be included
in a logical volume. Double-check to ensure that you have
selected the appropriate members.
LV Assignment
Choose Primary Controller or Secondary Controller from the Logical
Volume Assignment menu.
NOTE:
If the redundant controller function has not been enabled or the SIDs
are not assigned on drive channels, the LD Assignment pull-down
menu will not be available.
Step 1. Click the OK button at the bottom of the Create Logical Volume
window.
Write Policy: Write policy can be adjusted on a per logical volume basis.
This option allows you to set a write policy for the specific logical
volume you selected. “Default” is a neutral value that is coordinated with
the controller’s caching mode setting. Other choices are “Write-back”
and “Write-through.”
9.3.3.2. Expanding a LV
When members of a logical volume have free and unused capacity, the
additional capacity can be added to existing logical volumes. The unused
capacity can result from the following situations:
Step 2. The expand command can be found by clicking the Expand tab
under the LV Parameters panel.
Step 4. Click the Expand button at the bottom of the configuration panel.
The expand process should be completed in a short while because
all unused capacity in the members of a logical volume must be
made useful by the same expansion process. The expansion
process on a logical volume simply lets subsystem firmware
recognize the change in the arrangement of free capacity.
NOTE:
You may combine partitions under View and Edit LV Partition Table
by expanding the size of earlier partitions (such as increasing the size
of partition 0 so that it is as large as all partitions combined to make
one partition).
WARNING!
Combining partitions destroys existing data on all drive partitions.
Step 5. The logical volume will now have a new last partition the same
size as the expansion. Right-click the expanded volume and
select the Edit Partition command to look at the partition verify
this.
9.3.4 Deleting an LV
Step 1. Select the configured volume you wish to remove with a single
mouse-click. Right-click the adjacent area to display a command
menu. As shown in Figure 9-22, all the LVs that have been
created will appear below the Logical Volume Status panel.
Step 2. You will be asked to confirm that you wish to delete the selected
LV. If you are certain that you want to delete the LV then select
OK. The logical volume will be deleted and removed from the
logical volumes list.
NOTE:
You can create a maximum of eight partitions per logical drive or
logical volume. Also, partitioned logical drives cannot be included in a
logical volume.
WARNING!
Partitioning a configured array destroys the data already stored on it.
Step 1. Select the logical drive you want to partition. Move your cursor
to the Logical Drives window. Right-click to display the Edit
Partition command menu.
Step 3. The Edit Partition window displays. Use the arrow keys on the
button on the lower right to switch between partitions.
Step 4. If the array has not been partitioned, all of its capacity appears as
one single partition. Single-click to select the partition (the color
bar).
Step 6. The Partition Size window displays. Enter the desired capacity
and press OK to proceed.
The arrow buttons help you travel from one partition to another.
Step 4. If the volume has not been partitioned, all of its capacity appears
as one single partition. Single-click to select the partition (the
color bar).
Step 6. The Partition Size window displays. Enter the desired capacity
and press OK to proceed.
The arrow buttons help you travel from one partition to another.
Chapter 9
Drive Management
9.1. Locating Drives ..........................................................................................................3
9.2. Logical Drive Management........................................................................................3
9.2.1 Accessing the Create Logical Drive Window.....................................................4
9.2.2 Creating Logical Drives......................................................................................5
9.2.2.1. LD Creation ................................................................................................5
9.2.2.2. Selecting Drives..........................................................................................5
9.2.2.3. Setting RAID Parameters ...........................................................................6
9.2.2.4. Click OK to Create LD ...............................................................................7
9.2.3 Accessing the Existing Logical Drive Window..................................................7
9.2.3.1. Modifying LD Configurations....................................................................8
9.2.3.2. Expanding LD by Adding Disks.................................................................9
9.2.3.3. Accessing the Expand Command page.......................................................9
9.2.3.4. Click Expand to Initiate LD Expansion....................................................10
9.2.3.5. Accessing the Migrate LD Command page..............................................11
9.2.3.6. Click Migrate Logical Drives to Initiate LD Migration............................12
9.2.4 Dynamic Logical Drive Expansion ..................................................................13
9.2.4.1. What Is It and How Does It Work? ..........................................................13
9.2.4.2. Two Modes of Dynamic LD Expansion ...................................................13
9.2.5 Adding Spare Drive Assignments ....................................................................15
9.2.5.1. Accessing the Spare Drive Management Screen ......................................16
9.2.6 Rebuilding Logical Drives................................................................................17
9.2.7 Deleting an LD .................................................................................................17
9.3. Logical Volume Management ..................................................................................18
9.3.1 Accessing the Create Logical Volume Window...............................................18
9.3.2 Creating Logical Volumes................................................................................19
9.3.2.1. LV Creation ..............................................................................................19
9.3.2.2. Selecting LDs ...........................................................................................20
9.3.2.3. Setting LV Parameters..............................................................................20
9.3.2.4. Click OK to Create LV.............................................................................20
9.3.3 Accessing the Existing Logical Volumes Window ..........................................21
9.3.3.1. Modifying LV Configurations..................................................................21
9.3.3.2. Expanding a LV........................................................................................22
9.3.3.3. Accessing the Expand LV Command Page ..............................................22
9.3.4 Deleting an LV .................................................................................................23
9.4. Partitioning a Logical Configuration........................................................................24
9.4.1 Overview ..........................................................................................................24
9.4.2 Partitioning a Logical Drive .............................................................................25
9.4.3 Partitioning a Logical Volume .........................................................................26
Chapter 10
LUN Mapping
After creating a logical drive (LD) or logical volume (LV), you can map it as
is to a host LUN; or, if partitions are set, you can map each partition to a
specific host LUN. RAIDWatch supports eight LUNs per host channel
(numbered 0 - 7), each of which appears as a single drive letter to the host if
mapped to an LD, LV, or a partition of either. Existing host LUN mappings
can also be deleted. In cases where certain mappings are found to be useless,
or the disk array needs to be reconfigured, you can delete unwanted mappings
in your system.
Step 2. The Host LUN Mapping window should appear on the right. Right-
click on the Host LUN(s) sub-window to display PID (Primary
controller ID)/SID (Secondary controller ID) command menu as
shown in Figure 10-2. Galaxy’s controllers or subsystems always
come with pre-configured IDs. If it is necessary to add alternative
IDs, please select the Channel window from the navigation panel.
Step 3. After selecting the ID, the LUN Map Setting window appears as
shown in Figure 10-3.
10.2.LUN Mapping
10.2.1. Mapping a Complete LD or LV
Step 1. If you want to map a complete LD or LV, make sure that the LD or
LV has not been partitioned.
Step 2. Follow the steps listed in Section 10.1 above to access the Host LUN
Mapping window shown in Figure 10-3.
Step 3. Select the appropriate Channel, SCSI ID, and LUN numbers from
the separate pull-down lists above.
10-3
RAIDWatch User’s Manual
Step 4. Select a Logical Drive or Logical Volume and then select the
Partition color bar with a single mouse-click. The partition bar
appears on the right-hand side of the screen. An LD or LV that has
not been partitioned should have only one partition.
Step 5. Click on the Map LUN button to complete the process. (See Figure
10-4)
Step 2. Follow the steps listed in Section 10.1 above to access the LUN Map
Setting window shown in Figure 10-3.
Step 3. When the LUN Map window appears, select the appropriate
Channel, SCSI ID, and LUN numbers from the separate pull-down
lists above.
Step 3. When prompted for a password or an answer, enter it and click OK.
The LUN mapping should no longer be listed in the LUN Map
table. After deleting the LUN mapping it no longer appears in the
host LUN(s).
Chapter 10
LUN Mapping
10.1. Accessing the LUN Map Table ..............................................................................2
10.2. LUN Mapping ........................................................................................................3
10.2.1. Mapping a Complete LD or LV .........................................................................3
10.2.2. Map a Logical Drive or Volume Partition to a Host LUN .................................4
10.2.3. Deleting a Host LUN Mapping ..........................................................................5
Chapter 11
System Monitoring and Management
Support for device monitoring via SAF-TE, SES, and I2C data buses is the
same. However, RAIDWatch now uses a more object-oriented approach by
showing the enclosure graphics, which are identical to your Galaxy
enclosures. RAIDWatch reads identification data from connected arrays and
presents a correct display as an enclosure graphic. This process is
automatically completed without user’s setup.
NOTE:
RAIDWatch does not support the display of drive enclosures provided
by other vendors.
Icon Description
Maintaining the system date and time is important, because it is used for
tracking a pending task, past events, configuring a maintenance task
schedule, etc. Date and time are generated by the real-time clock on the
RAID controller/subsystems.
♦ Power supplies
♦ Fans
♦ Ambient temperature
♦ Voltage
♦ UPS
♦ Disk drives
To read more information about enclosure devices, place your cursor either
over the front view or rear view graphic. An information text field displays as
shown below.
More information about each enclosure device can also be found in the
System Information window.
♦ If you find that you have made the wrong configuration choice, you
may also left-click and then right-click on the task information to
display the Abort command.
Tabbed Panel
Figure 11-5: Event Log List and Configuration List Window Tabbed Panel
The Event Lot List window generates the system’s event log list in the
bottom of the RAIDWatch screen. The Event Log window give user the real-
time monitoring, alerting as well as status reporting of the RAID systems.
When a new event is generated, the icon under Severity column will flash to
draw user’s attention. The severity icons also indicate the severity level of an
event. (See Table 11-2) You can easily read the time of an event occurred by
viewing the Time column.
The Event log list function allow you to export the logs to a text file, and the
event log filter option enable user to easily filter through stores of log files
for specific event logs and then view, filter, export, and report on those
events of interest.
To export or filter the event logs, mouse right-click on the event log list
window. A list of three selections will appear on the screen. You may select
Export all logs to a text file, Event log filter option or Event log clear
option.
• Export All Logs to a Text File: This option will export all logs start
from the time you accessed the RAID system to a text file. You may
select a location where you like to save the file in a prompt up Save
window. If you like to export any specific events, set the Event log
Filter option before export the logs to a text file.
• Event Log Filter Option: When you click this option, an Event View
Option window will prompt up.
In the Event View Option window, the tabbed panel on the top of the
window allow you to switch between Filter and column pages.
You may set the event sorting criteria, the type of event you like to
export, the severity of the event and the time occurrence range in the
Filter page of the Event View Option window. Switch to Column page
allows you to set the column you like to view. Click Apply for the
changes to take effect. The Event Log List window will immediately
shows the event list follows the new criteria. Click OK to exist the
window, or click Default to return to the system default settings.
• Event Log Clear Option: This option allow you to clear the event logs
in the Event Log List window. All event logs will be erased when you
select Clear All Logs option. Select the Clear Log Precede Index: X
option will erase the beginning of the events to the one before you
selected.
Right-click on the Configuration List window will allow you to select four
(4) options and they are explained as below:
Export Configuration Data as Text File: When you select this option, the
program will save the system’s configuration data to a text file. You may
select a file destination in a prompt up Save window.
Export Configuration Data as XML File: Select a file location where you
like to save the system’s configuration data as an XML file in a prompt up
Save window when you select this option.
Export Host LUN List as XML File: This option will only export Host
LUN list to a XML file. You may select a file destination in a prompt up
Save window.
Restore Configuration from XML File: You may retrieve the configuration
data that you export earlier to the system. Browse the file in the prompt up
Open window.
♦ Having a clear idea of the logical relationship can help avoid removing
the wrong drive in the event of drive failure. A logical drive (RAID)
configuration of disk drives cannot afford two failed disk drives.
NOTE:
The Logical Drive Messages column only displays messages that are
related to a selected array.
NOTE:
The Related Information column only displays messages that are
related to the selected volume.
Step 1. To access the window, click on the Fibre Channel Status icon on the
GUI navigation panel or select the command from the Action
command menu.
The events in the window are listed according to the date and time
they occurred with the most recent event at the bottom. A description
of each event is provided.
Step 2. A Refresh button allows you to renew the information in cases when
loop IDs are changed or an LIP has been issued.
If the application includes multiple cascaded enclosures, you may also refer
to the Enclosure View window where a faulty unit is indicated by the lit red
Step 1. To access the window, click on the System Information icon on the
GUI navigation panel or select the command from the Action
command menu.
Step 2. Carefully check the display icons in front of the Device Name.
Devices are categorized by the data bus by which they are
connected. See the icon list below for more information:
Icon Description
Temperature sensors
A Refresh button allows you to renew the information in cases when loop IDs
are changed or when an LIP has been issued.
NOTE:
Place your cursor on a specific item to display its device category.
Component status is constantly refreshed, yet the refresh time depends on the
value set for device bus polling intervals, e.g., polling period set for SAF-TE
or SES devices.
11.6 Statistics
RAIDWatch Manager includes a statistics-monitoring feature to report the
overall performance of the disk array system. This feature provides a
continually updated real-time report on the current throughput of the system,
displaying the number of bytes being read and written per second, and the
percentage of data access being cached in memory. These values are
displayed by numeric value and as a graph.
To access the Statistics window, click on the Statistics icon on the GUI
navigation panel or select the Statistics command from the Action menu.
Then choose either Cache Dirty (%) or Disk Read/Write Performance
(MB/s) by checking the respective select box.
11-15 Statistics
RAIDWatch User’s Manual
Statistics 11-16
Chapter 11: System Monitoring and Management
11-17 Statistics
RAIDWatch User’s Manual
Chapter 11
System Monitoring and Management
11.1 RAID Information ......................................................................................................2
11.1.1 The Information Category ..................................................................................2
11.1.2 Date and Time ....................................................................................................4
11.1.3 Enclosure View ..................................................................................................4
11.1.4 Task Under Process ............................................................................................5
11.1.5 Event Log List/Configuration List Window.......................................................6
11.2 Logical Drive Information..........................................................................................9
11.2.1 Accessing Logical Drive Information ..............................................................10
11.3 Logical Volume Information....................................................................................11
11.3.1 Accessing Logical Volume Information...........................................................11
11.4 Fibre Channel Status ................................................................................................13
11.5 System Information ..................................................................................................13
11.6 Statistics ...................................................................................................................15
Statistics 11-18
Chapter 11: System Monitoring and Management
11-19 Statistics
Chapter 12: Enclosure Display
Chapter 12
Enclosure Display
This chapter introduces the enclosure display using the Enclosure View window
in the RAIDWatch’s main program. The following topics are discussed:
The Enclosure View window shows both the front and rear panel (e.g., the
Galaxy 2510FS controller head series, see Figure 12-1). The Enclosure View of
each RAIDWatch session defaults to the display of the connected RAID
controller or RAID subsystem. The tabbed panel provides access to other
cascaded enclosures (e.g., JBODs, the Galaxy series, see Figure 12-2), so you
can monitor multiple enclosures by your computer screen.
Tabbed Panel
NOTE:
The BBU is an optional item for some subsystem models.
♦ Power Supply Unit (PSU) – All RAID devices should come with at
least one PSU that provides power to the RAID device from the main
power source.
♦ Cooling Module – All RAID devices should come with at least one
cooling module. The cooling modules keep the RAID device
temperature down to prevent the RAID device from overheating.
The definition for each LED has been completely described in the Installation
and Hardware Reference Manual that came with your RAID
controller/subsystem. Please refer to the manual to determine what the different
LEDs represent.
Pressing the service button on the subsystem can also enable the service LED.
After servicing the subsystem, the administrator should turn off this service LED
by pressing the service button or remotely using the RAIDWatch management
software.
To generate the message tags, move the mouse cursor onto the relevant RAID
device component. For example, if you wish to determine the operational status
of a RAID subsystem, move the cursor onto the enclosure graphic and the
corresponding message tag will appear.
The enclosure front view message tag displays the current configuration of the
drive, including the channel number of the drive slot on the subsystem to which
the drives are connected, the drive’s capacity, transfer rate, and current status.
NOTE:
Messages do not always appear instantaneously. After the cursor has
been moved onto the component, there is usually a delay of a second
before the message tag appears.
NOTE:
More device-dependent information is provided in the System
Information window. To access the System Information window, please
refer to Chapter 6.
Chapter 12
Enclosure Display
12.1 About The Enclosure View Window..........................................................................2
12.2 Accessing the Enclosure View ...................................................................................2
12.2.1 Connecting to the RAID Agent ..........................................................................2
12.2.2 Opening the Enclosure View Window ...............................................................3
12.2.3 Component Information .....................................................................................3
12.3 LED Representations..................................................................................................4
12.3.1 Service LED (Support LED panel model)..........................................................4
12.4 Enclosure View Messages..........................................................................................5
12.5 Information Summary ................................................................................................6
Chapter 13
NPC Utility Coupled with Mode Three
Installation
This chapter introduces the NPC utility. The following topics are discussed:
13.2.1 SSL
13.2.4 Broadcast
Step 3. A safe content warning message might prompt. Click Yes to proceed.
NOTE:
The configuration will take effect after you restart the network
connection or reset the management station.
Step 1. Click on the Notification Process Center Setting tab. Open the Base
Setting page.
Step 4. Click Mail Address List from the tabbed panel above.
Fill in or select the following configuration fields:
Receiver's email: Shows a list of all the email addresses that the
NPC will send a message to. Addresses added will be listed on the
right.
Severity: Select the severity level of events to be sent to the receiver
station.
Step 4. Click SNMP Trap List from the tabbed panel above.
Host IP: The port number of the agents listening for traps.
Severity: Select the severity level of events to be sent to the receiver
station.
Trap receivers will be added to the Trap Receivers list on the right.
Step 5. Click Apply or OK to complete the configuration.
IMPORTANT!
In a massive capacity configuration, it takes a while for the RAID
subsystem to write the NPC configuration profile to every disk member.
DO NOT reset or power down the subsystem before the configuration
can be safely distributed to the array.
Also make sure the subsystem’s Ethernet port and related TCP/IP
settings have been properly configured for the NPC functionality to take
effect.
Chapter 13
NPC Utility Coupled with Mode Three Installation
13.1. The NPC Utility......................................................................................................2
13.1.1 Introduction ........................................................................................................2
13.1.2 To Access the Utility ..........................................................................................2
13.2. Configuring the Utility Options..............................................................................3
13.2.1 SSL .....................................................................................................................3
13.2.2 Email Notification ..............................................................................................3
13.2.3 SNMP Traps .......................................................................................................4
13.2.4 Broadcast Notification........................................................................................6
Chapter 14
Central Management Utility
This chapter introduces the Central Management utility. The following topics
are discussed:
Step 1. Open the Configuration Client and select Add Host. (See Figure
14-1)
Step 2. Add one (1) Root Agent by entering the IP address for the Root
Agent. (See Figure 14- 2: Input Root Agent IP)
Step 3. Select the Auto Discovery option from the Module Name drop-
down box. (See Figure 14-3)
Step 4. Input the IP scan range to search the network. Click Finish.
The Root Agent will automatically scan the IP range for available subsystems
on the network.
IMPORTANT!
The Auto Discovery Module only supports the Firmware versions listed
below.
FW 3.42H03 or later - Fibre to SATA
FW 3.42J09 or later - SCSI to SATA
FW3.42R01 or later - Fibre to Fibre
Auto Discovery cannot detect a subsystem if the firmware version is
older then those listed above. However, you still can manually enter the
Agent IP.
Central Management will display subsystems based on the Agent IP list. The
information is queried from the RootAgent and available subsystems are
displayed via icons.
Figure 14-4 shows that Central Management is not connected with the
RootAgent and there will be no systems listed in Central Management.
Figure 14-5 shows that Central Management is querying data from the
RootAgent.
Figure 14-6 shows that Central Management is connected with the RootAgent.
Move the cursor over the icon and an information box will pop up with more
detailed system information such as, the System Name, ID, IP and event log.
(See Figure 14-7)
NOTE:
Icons that are blinking red have warning messages or events that should
be checked. The event log is the same as used in RAIDWatch.
2. Right-clicking the system icon will also provide you with two (2) options -
filtering the event log and exporting the event log to a text file. (See Figure
14-8)
The Event log filter option allows you to filter events based on various criteria.
(See Figure 14-9)
NOTE:
Using multi-RootAgents for load balance/redundant purpose: You can
add more RootAgents to query information from the system. Add
procedure is the same as described in 14.2.
Chapter 14
Central Management Utility
14.1. Central Management Introduction..........................................................................2
14.2. Setting Up the Utility..............................................................................................2
14.3. Central Management Connectivity .........................................................................4
14.4. Maintenance & Configuration ................................................................................4
14.4.1 Icon labels...........................................................................................................4
14.4.2 System Events ....................................................................................................5
Appendices
Menu Commands
This section lists and explains the commands available from the menus in the
menu bar.
Command Description
Open Device Connects RAIDWatch Manager to a particular disk
array system for management.
Auto Discovery Search the available RAID systems in the specific
range on the network.
Exit <X> Closes the RAIDWatch Manager application.
Language Commands
Command Description
English The Configuration Client, online help will show in
English.
Deutsch The Configuration Client, online help will show in
Deutsch.
Japanese The Configuration Client, online help will show in
Japanese.
Appendix B. Glossary
Fibre
(Also known as “Fibre Channel”) A device protocol (in the case of
RAID, a data storage device) capable of high data transfer rates. Fibre
Channel simplifies data bus sharing and supports greater speed and
more devices on the same bus. Fibre Channel can be used over both
copper wire and optical cables.
Fiber
An optical network data transmission type of cable, which is unrelated
to the Fibre Channel described above.
HBA
Host-Bus Adapter – an HBA is a device that permits a PC bus to pass
data to and receive data from a storage bus (such as SCSI or Fibre
Channel).
Host
A computer, typically a server, which uses a RAID system (internal or
external) for data storage.
Host LUN
(See Host and LUN). “Host LUN” is another term for a LUN.
I2C
Inter-Integrated Circuit – a type of bus designed by Philips
Semiconductors, which is used to connect integrated circuits. I2C is a
multi-master bus, which means that multiple chips can be connected to
the same bus and each one can act as a master by initiating a data
transfer.
In-Band SCSI
(Also known as “in-band” or “In-band”.) A means whereby RAID
management software can use SCSI cabling and protocols to manage a
controller. (Note: in-band SCSI is typically used in place of RS-232
for controller management.)
iSCSI
Glossary App-7
RAIDWatch User’s Manual
JBOD
Just a Bunch of Disk – non-RAID use of multiple hard disks for data
storage.
JRE
Logical Drive
Typically, a group of hard disks logically combined to form a single
large storage unit. More broadly, the assignment of an ID to a drive or
drives used in storage management. Often abbreviated “LD.”
Logical Volume
A group of logical drives logically combined to form a single large
storage unit. Often abbreviated “LV.”
LUN
Logical Unit Number – A 3-bit identifier used on a bus to distinguish
between up to eight devices (logical units) with the same ID.
Mapping
Mirroring
A form of RAID where two or more identical copies of data are kept on
separate disks. Used in RAID 1.
Configuration Client
An independently run software application included with RAIDWatch,
which permits centralized management using the Root Agent as the
bridging element and event notification via various methods including
e-mail and fax.
NRAID
App-8 Glossary
Appendices
Parity
Parity checking is used to detect errors in binary-coded data. The fact
that all numbers have parity is commonly used in data communications
to ensure the validity of data. This is called parity checking.
RAID
Redundant Arrays of Independent Disks (Originally “Redundant Arrays
of Inexpensive Disks”). The use of two or more disk drives instead of
one disk, which provides better disk performance, error recovery, and
fault tolerance, and includes interleaved storage techniques and
mirroring of important data. See 0.
RAID Agent
The RAIDWatch module that manages and monitors a RAID controller
and receives RAIDWatch Manager commands via the RAID Agent.
RAIDWatch Manager
The RAIDWatch management software interface. It’s part of the
RAIDWatch software.
SAF-TE
SCSI Accessed Fault-Tolerant Enclosures – an evolving enclosure
monitoring device type used as a simple real-time check on the go/no-
go status of enclosure UPS, fans, and other items.
SAN
Storage Area Network – is a high-speed subnetwork of shared storage
devices. A storage device is a machine that contains nothing but a disk
or disks for storing data. A SAN's architecture works in a way that
makes all storage devices available to all servers on a LAN or WAN.
Glossary App-9
RAIDWatch User’s Manual
Because stored data does not reside directly on the network’s servers,
server power is utilized for applications rather than for data passing.
SASL
SASL is the Simple Authentication and Security Layer, a mechanism
for identifying and authenticating a user login to a server and for
providing negotiating protection with protocol interactions.
SCSI
Small Computer Systems Interface (pronounced “scuzzy”) – a high-
speed interface for mass storage that can connect computer devices
such as hard drives, CD-ROM drives, floppy drives, and tape drives.
SCSI can connect up to sixteen devices.
S.E.S.
SCSI Enclosure Services is a protocol used to manage and sense the
state of the power supplies, cooling devices, temperature sensors,
individual drives, and other non-SCSI elements installed in a Fibre
Channel JBOD enclosure.
S.M.A.R.T.
Self-Monitoring, Analysis and Reporting Technology – an open
standard for developing disk drives and software systems that
automatically monitor a disk drive’s health and report potential
problems. Ideally, this should allow users to take proactive actions to
prevent impending disk crashes.
SMS
The Short Message Service (SMS) is the ability to send and receive
text messages to and from mobile telephones. SMS was created and
incorporated into the Global System for Mobiles (GSM) digital
standard.
Spare
Spares are defined as dedicated (Local) or Global. A drive designation
used in RAID systems for drives that are not used but are instead “hot-
ready” and used to automatically replace a failed drive. RAIDs
generally support two types of spare, Local and Global. Local Spares
only replace drives that fail in the same logical drive. Global Spares
replace any drive in the RAID that fails.
Stripe
App-10 Glossary
Appendices
Striping
Also called RAID 0. A method of distributing data evenly across all
drives in an array by concatenating interleaved stripes from each drive.
Stripe Size
(A.k.a. “chunk size.”) The smallest block of data read from or written
to a physical drive. Modern hardware implementations let users tune
this block to the typical access patterns of the most common system
applications.
Stripe Width
The number of physical drives used for a stripe. As a rule, the wider the
stripe, the better the performance.
Write-back Cache
Many modern disk controllers have several megabytes of cache on
board. Onboard cache gives the controller greater freedom in
scheduling reads and writes to disks attached to the controller. In write-
back mode, the controller reports a write operation as complete as soon
as the data is in the cache. This sequence improves write performance
at the expense of reliability. Power failures or system crashes can result
in lost data in the cache, possibly corrupting the file system.
Write-through Cache
The opposite of write-back. When running in a write-through mode, the
controller will not report a write as complete until it is written to the
disk drives. This sequence reduces read/write performance by forcing
the controller to suspend an operation while it satisfies the write
request.
Glossary App-11
RAIDWatch User’s Manual
App-12 Glossary
Appendices
RAID Description
Redundant Array of Independent Disks (RAID) is a storage technology used to
improve the processing capability of storage systems. This technology is
designed to provide reliability in disk array systems and to take advantage of the
performance gains multiple disks can offer.
RAID has several different levels and can be configured into multi-levels, such
as RAID 10, 30, and 50. RAID levels 1, 3 and 5 are the most commonly used
levels, while RAID levels 2 and 4 are rarely implemented. The following
sections described in detail each of the commonly used RAID levels.
Non-RAID Storage
One common option for expanding disk storage capacity is simply to install
multiple disk drives into the system and then combine them end-to-end. This
method is called disk spanning.
In disk spanning, the total disk capacity is equivalent to the sum of the capacities
of all SCSI drives in the combination. This combination appears to the system as
a single logical drive. For example, combining four 1GB drives in this way
would create a single logical drive with a total disk capacity of 4GB.
Disk spanning is considered non-RAID due to the fact that it provides neither
redundancy nor improved performance. Disk spanning is inexpensive, flexible,
and easy to implement; however, it does not improve the performance of the
drives and any single disk failure will result in total data loss.
RAID 0
RAID 0 implements block striping where data is broken into logical blocks and
striped across several drives. Although called RAID 0, this is not a true
implementation of RAID because there is no facility for redundancy. In the
event of a disk failure, data is lost.
In block striping, the total disk capacity is equivalent to the sum of the capacities
of all drives in the array. This combination of drives appears to the system as a
single logical drive.
RAID 1
RAID 1 implements disk mirroring where a copy of the same data is recorded
onto two sets of striped drives. By keeping two copies of data on separate disks
or arrays, data is protected against a disk failure. If a disk on either side fails at
any time, the good disks can provide all of the data needed, thus preventing
downtime.
In disk mirroring, the total disk capacity is equivalent to half the sum of the
capacities of all drives in the combination. For example, combining four 1GB
drives would create a single logical drive with a total disk capacity of 2GB. This
combination of drives appears to the system as a single logical drive.
In addition to the data protection RAID 1 provides, this RAID level also
improves performance. In cases where multiple concurrent I/Os are occurring,
these I/Os can be distributed between two disk copies, thus reducing total
effective data access time.
RAID 1(0+1)
RAID 1(0+1) combines RAID 0 and RAID 1 – mirroring and disk striping.
RAID (0+1) allows multiple drive failure because of the full redundancy of the
hard disk drives. If more than two hard disk drives are chosen for RAID 1,
RAID (0+1) will be performed automatically.
IMPORTANT!
RAID (0+1) will not appear in the list of RAID levels supported by the
controller. If you wish to perform RAID 1, the controller will determine
whether to perform RAID 1 or RAID (0+1). This will depend on the
drive number that has been selected for the logical drive.
RAID 3
RAID 3 implements block striping with dedicated parity. This RAID level
breaks data into logical blocks, the size of a disk block, and then stripes these
blocks across several drives. One drive is dedicated to parity. In the event a disk
fails, the original data can be reconstructed from the parity information.
In RAID 3, the total disk capacity is equivalent to the sum of the capacities of all
drives in the combination, excluding the parity drive. For example, combining
four 1GB drives would create a single logical drive with a total disk capacity of
3GB. This combination appears to the system as a single logical drive.
RAID 3 provides increased data transfer rates when data is being accessed in
large chunks or sequentially.
RAID 5
RAID 5 implements multiple-block striping with distributed parity. This RAID
level offers the same redundancy available in RAID 3, though the parity
information is distributed across all disks in the array. Data and relative parity
are never stored on the same disk. In the event a disk fails, original data can be
reconstructed using the available parity information.
For small I/Os, as few as one disk may be activated for improved access speed.
RAID 5 offers both increased data transfer rates when data is being accessed in
large chunks or sequentially and reduced total effective data access time for
multiple concurrent I/Os that do not span multiple drives.
RAID 6
A RAID 6 array is essentially an extension of a RAID 5 array with a second
independent distributed parity scheme. Data and parity are striped on a block
level across multiple array members, just like in RAID 5, and a second set of
parity is calculated and written across all the drives.
The goal of this duplication is solely to improve fault tolerance; RAID 6 can
handle the failure of any two drives in the array while other single RAID levels
can handle at most one fault. This is a perfect solution when data is mission-
critical.
Using logical volumes to contain multiple logical drives can help manage arrays
of large capacity. It is, however, difficult to define the RAID level of a logical
volume when it includes members composed of different RAID levels.
www.sun.com/software/solaris/jre/download.html
Uninstalling RAIDWatch
RAIDWatch agents, Configuration Client and RAIDWatch Manager can be
uninstalled. Choose the Uninstall icon in the RAIDWatch group. Click on the
Uninstall button on the bottom of the uninstallation program window to start the
uninstall process. The RAIDWatch program will be uninstalled and files will be
removed from your computer.
Appendices
Appendix A. Command Summary ...................................................................................2
A.1. Menu Commands....................................................................................................2
A.1.1 RAID Watch Program Commands .....................................................................2
A.2. Configuration Client Utility Commands ................................................................4
Appendix B. Glossary......................................................................................................7
Appendix C. RAID Levels.............................................................................................13
C.1. RAID Description.................................................................................................13
C.2. Non-RAID Storage...............................................................................................13
C.3. RAID 0 .................................................................................................................14
C.4. RAID 1 .................................................................................................................15
C.5. RAID 1(0+1) ........................................................................................................15
C.6. RAID 3 .................................................................................................................16
C.7. RAID 5 .................................................................................................................17
C.8. RAID 6 .................................................................................................................18
C.9. RAID 10, 30, 50 and 60........................................................................................18
Appendix D. Additional References ..............................................................................19
D.1. Java Runtime Environment ..................................................................................19
D.2. RAIDWatch Update Downloads & Upgrading ....................................................19
D.3. Uninstalling RAIDWatch .....................................................................................19
INDEX
-A-
COM port, 4-27
About command, 6-13 Command Menus, 6-11, 6-14
access rights selection box, 4-5 Communications, 7-3
Account name, 4-19 Community, 13-5
Action command menu, 11-11 Conceptual Foundation, 1-10
Action command, 11-10, 6-13 Configuration Category, 6-21
Action menu, 9-4 Configuration Client, 1-4, 1-10, 4-2,
Adaptive Write Policy, 7-11 6-3
Add Disk, 9-8, 9-9 Configuration Parameters, 7-2
Add New Schedule Task, 6-20 Configuration, 5-2
Add receiver, 4-19 Configure Task Schedule, 6-21
Add recipient, 4-18 Configure, 4-3
Add Spare Drive, 9-9 Connect Root Agent Server, 4-8
adding spare drive, 9-1, 9-13 Connection Prompt, 6-5, 6-7, 6-8
additional capacity, 9-19 Connection View, 6-9
administrator, 4-5 connection wizard, 6-5, 6-8
Alert, 4-14 controller parameters, 7-13
Applet Mode, 3-8 controller configuration, 7-2
Application Program, 4-13 Controller Name, 7-5
Array Information Icons, 5-3 Controller Parameters, 7-4
Array Information, 6-14 Controller, 7-4
Authorized Access Levels, 6-9 controllers, 1-2, 1-4
Auto Discovery, 4-28 cooling module, 12-3
AV applications, 7-16 create LD, 9-3
Available Expand Size, 9-9 Create Logical Drive Window, 6-22
Create Logical Volume Window, 6-
-B- 23
Create Logical Volume, 5-6, 9-2, 9-
battery backup, 7-4, 12-3 16
Baud rate, 7-3 create LUN mapping, 10-2
BBU, 12-3 create LV, 9-2, 9-15, 9-17
Broadcast, 4-19, 13-6 current status, 12-5
Broadcasting List, 13-7 Current Value field, 4-9, 4-18
Current Value, 4-15
-C-
-D-
cache hits statistics, 11-13
Cache Hits, 6-18 data cache, 7-4
Cache Synchronization on Write- data transfer clock rate, 8-5
Through, 7-10 Date/Time, 7-5
cache write back, 7-4 Delay Second, 4-22
cache write through, 7-4, 5 delete LUN mapping, 10-2
caching mode, 7-11 Delete LUN, 10-5
caching, 7-4 delete LV, 9-2, 9-15, 9-21
Cell Phone Number, 4-27 device components, 12-2
Centralized Managemen, 1-1, 1-10 directly-attached server, 6-3
Centralized Management Station, 1-6, Disconnect Root Agent Server, 4-8
4-2 Disk Access Delay Time(Sec) , 7-13
Centralized Management, 1-5, 3-8, 4-2 Disk I/O Timeout(Sec) , 7-14
channel configuration, 8-1, 8-2 Disk R/W, 6-18
Channel Mode, 8-4 download firmware and binary, 7-7
channel parameters, 8-3 download firmware, 7-7
Channel Window, 6-24, 8-2 download NVRAM from host disk,
check boxes, 6-25 7-7
check circles, 6-25 Drive Check Period(Sec) , 7-13
color bar, 9-22, 10-4 Drive Fail Swap Check Period, 7-14
Index - 1
RAIDWatch User’s Manual
Index - 2
Index
Index - 3
RAIDWatch User’s Manual
Index - 4
Index
-T-
-U-
-W-
Warning, 4-14
wide transfer, 8-5, 8-6
Windows Messaging, 3-4
Write Policy, 9-17
write policy, 9-5, 9-6
write-back cacche, 7-4
write-caching algorithm, 7-11
Write-Verify options, 7-15
WWN Names(s), 6-25
WWN port name, 6-17
Index - 5