HM 80166
HM 80166
HM 80166
MK-94HM8016-06
October 2016
© 2014, 2016 Hitachi, Ltd. All rights reserved.
No part of this publication may be reproduced or transmitted in any form or by any means, electronic
or mechanical, including copying and recording, or stored in a database or retrieval system for
commercial purposes without the express written permission of Hitachi, Ltd., or Hitachi Data Systems
Corporation (collectively “Hitachi”). Licensee may make copies of the Materials provided that any such
copy is: (i) created as an essential step in utilization of the Software as licensed and is used in no
other manner; or (ii) used for archival purposes. Licensee may not make any other copies of the
Materials. “Materials” mean text, data, photographs, graphics, audio, video and documents.
Hitachi reserves the right to make changes to this Material at any time without notice and assumes
no responsibility for its use. The Materials contain the most current information available at the time
of publication.
Some of the features described in the Materials might not be currently available. Refer to the most
recent product announcement for information about feature and product availability, or contact
Hitachi Data Systems Corporation at https://support.hds.com/en_us/contact-us.html.
Notice: Hitachi products and services can be ordered only under the terms and conditions of the
applicable Hitachi agreements. The use of Hitachi products is governed by the terms of your
agreements with Hitachi Data Systems Corporation.
By using this software, you agree that you are responsible for:
1. Acquiring the relevant consents as may be required under local privacy laws or otherwise from
authorized employees and other individuals to access relevant data; and
2. Verifying that data continues to be held, retrieved, deleted, or otherwise processed in
accordance with relevant laws.
Notice on Export Controls. The technical data and technology inherent in this Document may be
subject to U.S. export control laws, including the U.S. Export Administration Act and its associated
regulations, and may be subject to export or import regulations in other countries. Reader agrees to
comply strictly with all such regulations and acknowledges that Reader has the responsibility to obtain
licenses to export, re-export, or import the Document and any Compliant Products.
Hitachi is a registered trademark of Hitachi, Ltd., in the United States and other countries.
AIX, AS/400e, DB2, Domino, DS6000, DS8000, Enterprise Storage Server, eServer, FICON,
FlashCopy, IBM, Lotus, MVS, OS/390, PowerPC, RS/6000, S/390, System z9, System z10, Tivoli,
z/OS, z9, z10, z13, z/VM, and z/VSE are registered trademarks or trademarks of International
Business Machines Corporation.
Active Directory, ActiveX, Bing, Excel, Hyper-V, Internet Explorer, the Internet Explorer logo,
Microsoft, the Microsoft Corporate Logo, MS-DOS, Outlook, PowerPoint, SharePoint, Silverlight,
SmartScreen, SQL Server, Visual Basic, Visual C++, Visual Studio, Windows, the Windows logo,
Windows Azure, Windows PowerShell, Windows Server, the Windows start button, and Windows Vista
are registered trademarks or trademarks of Microsoft Corporation. Microsoft product screen shots are
reprinted with permission from Microsoft Corporation.
All other trademarks, service marks, and company names in this document or website are properties
of their respective owners.
2
System Administrator Guide
Contents
Preface............................................................................................... 11
Intended audience................................................................................................. 12
Product version...................................................................................................... 12
Release notes........................................................................................................ 12
Changes in this revision.......................................................................................... 12
Related documents.................................................................................................12
Document conventions........................................................................................... 13
Conventions for storage capacity values...................................................................14
Accessing product documentation........................................................................... 15
Getting help...........................................................................................................15
Comments............................................................................................................. 16
3
System Administrator Guide
Generating and installing a signed SSL certificate................................................ 40
Using Device Manager - Storage Navigator...............................................................41
Setting up a management client........................................................................ 41
Requirements for management clients.......................................................... 41
Setting up TCP/IP for a firewall.................................................................... 44
Configuring the web browser....................................................................... 44
Installing Adobe Flash Player........................................................................46
Logging in to Device Manager - Storage Navigator.............................................. 46
Initial super-user login.................................................................................47
Normal login............................................................................................... 47
Changing your password..............................................................................49
Adding your SVP to the trusted sites zone for Windows Server computers....... 49
Onboarding and configuring a storage system.......................................................... 50
Overview..........................................................................................................51
Adding the first storage system..........................................................................51
Adding a fabric switch.......................................................................................52
Adding servers................................................................................................. 53
Creating parity groups.......................................................................................54
Using the maintenance utility.................................................................................. 56
Starting from Hitachi Command Suite.................................................................57
Starting from Hitachi Device Manager - Storage Navigator................................... 57
Accessing a storage system without management software....................................... 58
3 System configuration.......................................................................61
System administration tasks at a glance...................................................................62
System administration using Hitachi Storage Advisor.................................................63
Configure block storage.....................................................................................63
Enabling or disabling port security................................................................ 64
Adding a fabric switch................................................................................. 64
Creating parity groups ................................................................................ 67
Creating a pool........................................................................................... 76
Create and attach volumes to servers........................................................... 83
Managing storage systems...........................................................................86
Managing servers........................................................................................ 93
Managing volumes...................................................................................... 96
Configure file storage...................................................................................... 102
Managing file pools....................................................................................102
Managing virtual file servers.......................................................................106
Managing file systems................................................................................107
Managing shares and exports..................................................................... 109
System administration using Device Manager - Storage Navigator............................ 113
Setting storage system information.................................................................. 113
Backing up HDvM - SN configuration files......................................................... 114
Restoring HDvM - SN configuration files ...........................................................115
System administration using the maintenance utility............................................... 116
Changing the date and time.............................................................................116
Changing the controller clock settings......................................................... 116
Changing the SVP clock settings................................................................. 116
Changing network settings.............................................................................. 117
Setting up TCP/IP for a firewall...................................................................117
Enabling IPv6 communication.....................................................................117
4
System Administrator Guide
Changing the administrator password...............................................................118
Creating a login message................................................................................ 119
Forcing the system lock to release....................................................................119
Registering the primary SVP host name............................................................ 120
System administration using NAS Manager............................................................. 121
Changing the system date and time of the NAS modules................................... 121
Miscellaneous system administration considerations................................................ 122
Report configuration tool................................................................................. 122
Prerequisites for the report configuration tool.............................................. 123
Installing the report configuration tool........................................................ 123
Using the report configuration tool..............................................................123
Modifying SVP port numbers............................................................................124
Viewing the port number used in SVP......................................................... 125
Effects of changing SVP port numbers.........................................................125
Changing the SVP port number.................................................................. 127
Initializing the SVP port number................................................................. 128
Reassigning an automatically assigned port number.....................................128
Initializing and reassigning an automatically assigned port number .............. 129
Changing the range of an automatically assigned port number..................... 130
Initializing the range of an automatically assigned port number.................... 131
Releasing HTTP communication blocking.......................................................... 132
Blocking HTTP communication to the SVP ........................................................132
5
System Administrator Guide
Changing user group permissions............................................................... 160
Changing assigned resource groups............................................................ 161
Deleting a user group................................................................................ 161
Using an authentication server and authorization server.................................... 162
Authentication server protocols...................................................................163
Authorization server requirements.............................................................. 164
Connecting two authentication servers........................................................ 164
Connecting authentication and authorization servers....................................165
Naming a user group in Device Manager - Storage Navigator........................165
Creating configuration files.............................................................................. 166
Creating an LDAP configuration file.............................................................166
Creating a RADIUS configuration file........................................................... 169
Creating a Kerberos configuration file..........................................................172
User Administration for NAS Manager.................................................................... 176
Administrator types and responsibilities............................................................ 176
Adding an SMU user (an administrator)............................................................ 177
Changing the password for a currently logged in user........................................180
Changing your own password.....................................................................181
Changing another user's password..............................................................182
Changing an SMU user profile.......................................................................... 184
SMU user authentication..................................................................................187
Active Directory user authentication............................................................188
Using Transport Layer Security (TLS) with Active Directory authentication..... 188
Configuring Active Directory servers............................................................189
Configuring Active Directory groups............................................................ 192
User authentication through RADIUS servers (HNAS server only).................. 196
Displaying list of RADIUS servers................................................................ 197
Adding a RADIUS server............................................................................ 198
Displaying details of RADIUS server............................................................ 200
6
System Administrator Guide
6 Alert notifications.......................................................................... 217
Viewing alert notifications..................................................................................... 218
Configuring alert notifications................................................................................218
General settings..............................................................................................219
Email settings................................................................................................. 220
Syslog settings................................................................................................220
SNMP settings................................................................................................ 222
Sending test messages......................................................................................... 222
Sending a test email message..........................................................................223
Example of a test email message................................................................223
Sending a test Syslog message........................................................................ 223
Sending a test SNMP trap................................................................................ 224
Using the Windows event log................................................................................ 224
Monitoring failure information in the Windows event log.................................... 224
Viewing the Windows event log....................................................................... 225
Output example of the failure information.........................................................225
7
System Administrator Guide
A Raidinf command reference (obtaining configuration reports and tier
relocation logs)............................................................................. 249
raidinf command list and command description.......................................................250
raidinf -login........................................................................................................ 251
raidinf add report................................................................................................. 252
raidinf delete report..............................................................................................253
raidinf download report.........................................................................................254
raidinf get reportinfo.............................................................................................255
raidinf add relocationlog........................................................................................256
raidinf download relocationlog...............................................................................257
raidinf delete relocationlog.................................................................................... 258
raidinf get relocationloginfo...................................................................................258
raidinf -logout...................................................................................................... 259
raidinf -h............................................................................................................. 260
8
System Administrator Guide
EnvMonInfo.csv.............................................................................................. 306
FcSpNameInfo.csv.......................................................................................... 307
FcSpPortInfo.csv............................................................................................. 307
HduInfo.csv....................................................................................................308
IscsiHostInfo.csv.............................................................................................308
IscsiPortInfo.csv............................................................................................. 309
IscsiTargetInfo.csv.......................................................................................... 310
JnlInfo.csv......................................................................................................311
LdevCapaInfo.csv............................................................................................311
LdevCountInfo.csv.......................................................................................... 312
LdevInfo.csv...................................................................................................312
LdevStatus.csv................................................................................................315
LPartition.csv..................................................................................................315
LunInfo.csv.................................................................................................... 316
LunPortInfo.csv...............................................................................................317
MicroVersion.csv............................................................................................. 318
MlcEnduranceInfo.csv......................................................................................319
ModePerLpr.csv...............................................................................................320
MpPathStatus.csv............................................................................................320
MpPcbStatus.csv.............................................................................................321
PcbRevInfo.csv............................................................................................... 321
PdevCapaInfo.csv........................................................................................... 322
PdevInfo.csv...................................................................................................322
PdevStatus.csv............................................................................................... 324
PECBInfo.csv.................................................................................................. 324
PkInfo.csv...................................................................................................... 324
PpInfo.csv...................................................................................................... 326
SMfundat.csv..................................................................................................326
SsdDriveInfo.csv............................................................................................. 327
SsidInfo.csv....................................................................................................327
SysoptInfo.csv................................................................................................ 328
WwnInfo.csv.................................................................................................. 328
Glossary............................................................................................ 331
Index................................................................................................ 351
9
System Administrator Guide
10
System Administrator Guide
Preface
This document provides information and instructions to help you use the
maintenance utility and some of the functions in Device Manager - Storage
Navigator as needed to perform system administration tasks and change
settings for Hitachi Virtual Storage Platform G200, G400, G600, G800 or
Hitachi Virtual Storage Platform F400, F600, F800 storage systems. It
explains the GUI features and provides basic navigation information.
Please read this document carefully to understand how to use the software
described in this manual, and keep a copy for reference.
□ Intended audience
□ Product version
□ Release notes
□ Related documents
□ Document conventions
□ Getting help
□ Comments
Preface 11
System Administrator Guide
Intended audience
This document is intended for system administrators, Hitachi Data Systems
representatives, and authorized service providers who are involved in
installing, configuring, and operating Hitachi Virtual Storage Platform G200,
G400, G600, G800 or Hitachi Virtual Storage Platform F400, F600, F800
systems.
Product version
This document revision applies to:
• VSP Gx00 models and VSP Fx00 models: firmware 83-04-0x or later
• SVOS 7.0 or later
Release notes
Read the release notes before installing and using this product. They may
contain requirements or restrictions that are not fully described in this
document or updates or corrections to this document. Release notes are
available on Hitachi Data Systems Support Connect: https://
knowledge.hds.com/Documents.
Related documents
The documents below are referenced in this document or contain more
information about the features described in this document.
12 Preface
System Administrator Guide
• Hitachi Audit Log User Guide, MK-94HM8028
• Encryption License Key User Guide, MK-92RD8009
• Performance Guide, MK-94HM8012
• Hitachi ShadowImage® User Guide, MK-94HM8021
• Hitachi SNMP Agent User Guide, MK-94HM8015
• Hitachi Device Manager - Storage Navigator Messages, MK-94HM8017
• Hitachi TrueCopy® User Guide, MK-94HM8019
• Hitachi Universal Replicator User Guide, MK-94HM8023
• Global-Active Device User Guide, MK-92RD8072
• Hitachi Virtual Storage Platform G200 Hardware Reference Guide,
MK-94HM8020
• Hitachi Virtual Storage Platform G400, G600 Hardware Reference Guide,
MK-94HM8022
• Hitachi Virtual Storage Platform G800 Hardware Reference Guide,
MK-94HM8026
• Hitachi Virtual Storage Platform F400, F600 Hardware Reference Guide,
MK-94HM8045
• Hitachi Virtual Storage Platform F800 Hardware Reference Guide,
MK-94HM8046
Document conventions
This document uses the following terminology conventions:
Convention Description
Convention Description
Bold • Indicates text in a window, including window titles, menus, menu options,
buttons, fields, and labels. Example:
Click OK.
• Indicates emphasized words in list items.
Italic • Indicates a document title or emphasized words in text.
Preface 13
System Administrator Guide
Convention Description
(For exceptions to this convention for variables, see the entry for angle
brackets.)
Monospace Indicates text that is displayed on screen or entered by the user. Example:
pairdisplay -g oradb
WARNING Warns the user of a hazardous situation which, if not avoided, could
result in death or serious injury.
14 Preface
System Administrator Guide
Physical capacity unit Value
Logical capacity values (for example, logical device capacity) are calculated
based on the following values:
Open-systems:
• OPEN-V: 960 KB
• Others: 720 KB
1 KB 1,024 (210) bytes
1 MB 1,024 KB or 1,0242 bytes
1 GB 1,024 MB or 1,0243 bytes
1 TB 1,024 GB or 1,0244 bytes
1 PB 1,024 TB or 1,0245 bytes
1 EB 1,024 PB or 1,0246 bytes
Getting help
Hitachi Data Systems Support Connect is the destination for technical support
of products and solutions sold by Hitachi Data Systems. To contact technical
support, log on to Hitachi Data Systems Support Connect for contact
information: https://support.hds.com/en_us/contact-us.html.
Preface 15
System Administrator Guide
connections. Join the conversation today! Go to community.hds.com,
register, and complete your profile.
Comments
Please send us your comments on this document to [email protected].
Include the document title and number, including the revision level (for
example, -07), and refer to specific sections and paragraphs whenever
possible. All comments become the property of Hitachi Data Systems
Corporation.
Thank you!
16 Preface
System Administrator Guide
1
System administration overview
This chapter provides a high-level view of system administration tasks for the
Hitachi Virtual Storage Platform G200, G400, G600, G800 or Hitachi Virtual
Storage Platform F400, F600, F800 storage systems. It describes:
• Software architecture and access to system administration tools from
management software (Hitachi Storage Advisor and Hitachi Command
Suite).
• System administration tasks for the VSP Gx00 models and VSP Fx00
models storage systems, including some with NAS modules installed to
provide native file functionality (VSP G400, G600, G800).
Related tasks
• Accessing a storage system without management software on page 58
Users with storage systems that do not have NAS modules use Hitachi
Storage Advisor (HSA), Device Manager - Storage Navigator, and the
maintenance utility to administer block operations. If your storage system
For more information about administration tasks for file operations, see the
following documentation:
You can also perform some administration tasks from a command line. For
information, see Command Control Interface User and Reference Guide
(MK-90RD7010) and the Command Control Interface Command Reference
(MK-90RD7009), which you can access from the Documentation page of NAS
Manager.
Unified configuration
Once a storage system is onboarded, all block and file resources can be
configured and managed from a single Storage System page. File pool
creation workflow incorporates best practices that simplify workflow and
enhance usability. The file pools are used to easily create virtual file servers,
file systems, and shares and exports. File system creation automatically
mounts and formats the new file system.
Capacity is also displayed for each storage system in the Storage System
detail page.
Three views of capacity are available: file only, block only, or a unified view of
block and file.
Dashboard
Once a storage system has been onboarded to Storage Advisor, the
dashboard displays as soon as you log in. The Storage Advisor dashboard
provides the tools to easily configure, manage, and monitor storage systems.
From the Storage Advisor dashboard, you can access managed resources and
provision storage in the context of a given storage system or server. The
provided templates and configurations make it possible to quickly and easily
provision a storage system, without knowing the details of the underlying
hardware and software.
The top navigation menu provides access to Jobs and Monitoring pages. Links
to the following settings are available, based on the user role:
• Tier Management
• Security Settings
• SNMP Settings
• Change Local Password
Alert tiles
Across the top of the dashboard are tiles that display alerts for storage
capacity, data protection, jobs, and hardware.
If a tile includes a circled check mark, there are no alerts for that part of the
storage system, and everything is functioning normally. A number in a red
circle within a tile indicates one or more problems with that part of the
storage system.
You can click a tile for Capacity Alerts, Data Protection Alerts, or Hardware
Alerts to view the summary for the category in the Monitoring tab.
The Jobs Alert tile displays the number of jobs in the last 24 hours with a
status of Failed or Success with Errors.
Resource summary
The circular information gauge, which shows information about the available
storage.
• If the storage systems include file storage, you can click Block or File
next to the information gauge to view a legend and capacity values for
either type of storage. Click Unified to view a legend and capacity values
for both block and file.
• For block-only storage systems, the numerical data for each capacity
parameter in the ring is displayed to the left of the information gauge.
If you notice the total pool capacity (white) and Thin used (light green)
values getting closer to total capacity, you may be running out of storage on
one or more storage systems and may need to add disks to increase storage
capacity. Review the information gauge for each storage system to identify
which storage system needs additional capacity.
If there are any alerts, you can drill down to the relevant alert page to
investigate the cause. Storage Advisor provides alerts for capacity utilization,
hardware, data protection, and jobs status.
The capacity indicated in the center of the ring is the total usable capacity
available via the configured parity groups. After you add a storage system
and configure parity groups, the total capacity indicator will show the
capacity from the newly added storage system. The Thin Used capacity
(green ring) indicates the total capacity that is currently being used. If the
usage is around 70-80% of the total capacity, you may receive capacity alerts
based on the thresholds set by your storage administrator. The default
thresholds are 70% and 80%, and can be changed during pool creation.
The white ring that provides a sum of capacities of all pools in the systems
should be closer to 100% capacity. This would mean that you are using your
entire parity group capacity by allocating it to pools. If the Thin Used capacity
in green ring nears the total capacity (white ring) then you may run out of
pool capacity soon. In such a case, expand the pool to consume more
capacity.
You can access Device Manager - Storage Navigator from the management
software to perform additional system administration tasks on your storage
system besides those available in the maintenance utility. In addition, you
can easily access advanced storage configuration options while performing
management operations with the management software.
In addition to the information in this guide, the HDvM - SN online help has
procedures for setting up and managing the storage system.
You can use the maintenance utility to configure settings such as licenses,
syslog, alerts, and network configuration. As shown in the following figure,
these settings are available from the Administration navigation tree.
Note: Self-service features that are used to install and remove hardware
components and to update the firmware are currently available for use only
by customer support personnel or by authorized service providers.
NAS Manager
NAS Manager is the element manager for NAS modules. It is a factory-
installed application running on the NAS module.
Procedure
If the installation produces any warnings, they may point to the cause of the
problem. Correct any issues the installer identifies, delete any Storage
Advisor containers and images and start the installation again.
Next steps
1. From the installation media, deploy the Storage Advisor OVF to the ESXi
host.
2. Start the Storage Advisor virtual machine.
3. In the vSphere® client, wait for the System status to change to Online.
The status is just below the banner in the virtual machine console.
*****************************************
*****Hitachi Storage Advisor*****
*****************************************
System status: Online
Please wait for system to be online before using any
services.
4. Open a browser and enter https://ip-address/vam in the address bar.
Next steps
• Change the root password.
• Log in to Storage Advisor and onboard a storage system.
• Get a digitally signed SSL certificate from a trusted certificate authority
(CA) by sending the CA a certificate signing request (CSR). After you
obtain the signed certificate, you can import it to the server. By default,
the Storage Advisor installation package comes with a self-signed
certificate that you can use to initially log in to Storage Advisor.
Procedure
1. From the installation media, deploy the Storage Advisor OVF to the ESXi
host.
2. Start the Storage Advisor virtual machine.
3. In the vSphere® client, wait for the System status to change to Online.
The status is just below the banner in the virtual machine console.
*****************************************
*****Hitachi Storage Advisor*****
*****************************************
System status: Online
Please wait for system to be online before using any
services.
4. Press Alt+F2.
5. Log in with the service account.
Next steps
• Change the root password.
• Log in to Storage Advisor and onboard a storage system.
• Get a digitally signed SSL certificate from a trusted certificate authority
(CA) by sending the CA a certificate signing request (CSR). After you
obtain the signed certificate, you can import it to the server. By default,
the Storage Advisor installation package comes with a self-signed
certificate that you can use to initially log in to Storage Advisor.
Procedure
Procedure
where:
• ip-address is the IP address of the Storage Advisor server.
• port-number is the port number of the Storage Advisor server. The
default port number is 443.
3. In the login window, log in to Storage Advisor.
Procedure
Result
You are successfully logged in to Device Manager - Storage Navigator.
Note: If the login process fails three times by using the same user ID, Device
Manager - Storage Navigator will stop responding for one minute. This is for
security purposes and is not a system failure. Wait, and then try again.
Procedure
1. Open the virtual machine console and log in with the service account.
2. Start the openssl program:
openssl req –nodes –x509 -newkey rsa:2048 -sha1 -keyout /etc/
nginx/certificates/server.key -out /etc/nginx/certificates/
server.crt
Hardware requirements
Item Requirement
Recommended: 3 GB
Available storage space 500 MB or more
Monitor True Color 32-bit or better
1000BASE-T
Software requirements
Java Runtime
Operating system1 Architecture Browser Adobe Flash Player2
Environment (JRE)
Windows 7 SP1 32 bit or 64 bit Internet Explorer 11.03 JRE 7.0 Update 67 14.0
Windows 8.1 32 bit or 64 bit Internet Explorer 11.03 JRE 7.0 Update 67 14.0
Google Chrome 48.0 or JRE 8.0 Update 71 20.0
later
Hardware requirements
Item Requirement
Recommended: 3 GB
Available storage space 500 MB or more
Keyboard and mouse You cannot use the mouse wheel feature.
Ethernet LAN card for TCP/IP network 100BASE-TX
1000BASE-T
Software requirements
Java Runtime
Operating system Architecture Browser1 Adobe Flash Player2
Environment (JRE)
For details about setting up the SVP, see the Hardware Installation and
Reference Guide for your storage system.
Procedure
1. From the Internet Explorer menu, click Tools > Internet Options.
2. Enable cookies.
a. On the Privacy tab, click Advanced.
b. In the Advanced Privacy Settings window, specify the following:
• Select Override automatic cookie handling.
• For First-party Cookies, select Accept.
• For Third-party Cookies, select Accept.
• Select Always allow session cookies.
c. Click OK to close the Advanced Privacy Settings window.
3. Allow pop-up windows.
For Internet Explorer 10:
a. On the Privacy tab, clear the check box for Turn on Pop-up
Blocker, and then click Close.
For other versions of Internet Explorer:
a. On the Privacy tab, click Pop-up Blocker Settings.
b. In Address of website to allow, enter the IP address or host name
of the SVP, click Add, and then click Close.
4. Click OK to close the Internet Options window.
5. If any third-party add-ons block pop-up windows, configure them to
allow pop-ups.
Procedure
To install the latest Adobe Flash Player, download the installer from http://
get.adobe.com/flashplayer/.
To install earlier versions, search for "Archived Flash Player versions" on the
Adobe Systems Incorporated website.
Note:
• There are two versions of Windows Flash Player: ActiveX for Internet
Explorer and Plugin for other than Internet Explorer. Choose the Flash
Player installer that is appropriate for your browser.
• Adobe Flash Player might be installed with Internet Explorer. If so, you can
perform Windows Update to install the latest version.
• You can also download an earlier version from Microsoft Security Advisory
(2755801).
Procedure
1. Launch the web browser that you normally use and go to the Adobe
website http://www.adobe.com.
2. Scroll upward as needed to display the top of the Adobe web page.
3. In the Adobe search box in the upper right corner of the web page (not
the browser search box) enter archived Adobe Flash Player and click
Search.
4. In the search results, select Archived Adobe Flash Player versions.
The Archived Adobe Flash Player version web page on the Adobe website
opens.
5. Scroll down to the list of archived Adobe Flash Player versions, select the
archived version you want, download the installer, and then run it.
Procedure
To change the port number of the protocol from the initial value (443),
specify the following URL:
https://IP-address-or-host-name-of-SVP:port-number-of-the-
protocol/
3. Log in with the superuser ID and password.
4. To prevent unauthorized use of the superuser account, change the
password immediately after you log in. Click Settings > User
Management > Change Password to change your password.
Normal login
Normal login allows you to perform only the following:
• User management
• License management
• Creating a login message
• Editing advanced system settings
When the initial settings are complete, use Hitachi Command Suite or
Storage Advisor to configure the storage system.
Procedure
If you changed the port number of the protocol HTTP from the initial
value (443), specify the following URL:
https://IP-address-or-host-name-of-SVP:port-number-of-the-
protocol-HTTPS/
2. The following actions might be required to open the login dialog box,
depending on your environment:
• If a message indicates that the enhanced security configuration is
enabled on the management client, select In the future, do not
show this message and click OK.
• If the SVP is set to support SSL-encrypted communication and security
messages appear, make sure the certificate is correct and follow the
instructions in the dialog box.
• If a message indicates that certain web sites are blocked, follow
instructions in Adding your SVP to the trusted sites zone for Windows
Server computers on page 49.
• If multiple storage systems are connected, a window which allows
selection of the storage system is displayed. Select the storage system
you want to connect.
3. When the Storage Device List window opens, select the storage system.
The Device Manager - Storage Navigator login window appears.
4. Type the user ID and password.
5. Click Login.
6. If the Security Information dialog box appears, click Yes.
7. If a local storage area pop-up dialog box of Adobe Flash Player Setting
appears, click Allow to open the Device Manager - Storage Navigator
main window. The cache function of Adobe Flash Player optimizes the
process of Device Manager - Storage Navigator. Denial of the request
might delay the processing speed of Device Manager - Storage
Navigator.
Procedure
Adding your SVP to the trusted sites zone for Windows Server computers
If you are using Device Manager - Storage Navigator on a Windows Server
computer, the following message may appear during login. If it does, you
must add the SVP to the trusted sites zone.
1. Click Add in the message dialog box. The Trusted Sites dialog box
opens.
2. In Add this web site to the zone, enter the URL of the SVP that you
want to log in to. For example, if the host name is host01, the URL is
http://host01. If the IP address is 127.0.0.1, the URL is http://
127.0.0.1.
3. Click Add to add the URL of the SVP to the web sites list.
4. Click Close to close the dialog box.
If the storage system includes NAS modules, the file storage is automatically
added with the block storage.
If a storage array includes block storage and NAS modules, the file storage is
automatically added with the block storage. Then file pools and other file
resources can be created in the Storage Advisor web interface or by using the
API.
You can add up to eight VSP Gx00 or VSP Fx00 storage systems at once by
specifying an SVP IP address that has multiple storage systems. Storage
systems with different credentials cannot be added in the same operation.
1. On the Storage Advisor dashboard, click the plus sign (+) to add a
storage system.
2. Enter values for the following parameters on the Add Storage System
page.
• SVP IP Address: Enter the IP address of the external service
processor for the storage system you want to discover.
• User name and password: Log in as a user that has administrator
privileges on this storage system. For example, you can log in as the
user maintenance.
3. Click Submit.
4. (Optional) Onboard other storage systems.
Result
The Jobs tab is updated with the job called Create Storage System. If
multiple storage systems are being added, there will be a job for each one.
Wait a while for the storage system to be added. Refresh the Jobs tab to
verify that storage system is onboarded.
Next steps
• Verify the storage system initial settings.
• Create parity groups.
After a fabric switch is added, you can choose to auto-create zones during
volume provisioning. A fabric switch is required for any operations that use
auto-select, such as host group creation and auto-selection of ports while
attaching volumes to servers.
Procedure
3. Enter the following information from the configuration of the switch you
are adding:
• Virtual Fabric ID: For Cisco switches, the VSAN ID. Not applicable to
Brocade switches.
• Fabric Switch Type: Select Brocade or Cisco.
• Fabric Switch IP Address
To add or update a core switch, use the Management IP address of the
switch or the Active CP IP address.
• Port Number
• Username
• Password
4. Click Submit.
Result
A job is created to add the fabric switch.
Adding servers
Procedure
1. On the Storage Advisor dashboard, click Servers. Then click the plus
sign (+) to open the Add Server page.
2. On the Add Server page, do one of the following:
• Click the upper plus sign (+) to browse for the CSV file or drag the file
to the plus sign. The values from the file will populate the page.
• Click the plus sign (+) in the table to add a row and enter a Name,
Description (optional), IP Address (optional), OS Type, and WWN.
You can add more servers by clicking the plus sign.
3. Click Submit to add the servers.
Result
A job is started to add the servers.
Next steps
Note: Parity groups for VSP G1000 storage systems are created outside
Storage Advisor by an authorized service representative.
Procedure
7. Click Submit.
Result
A job is started to create the parity group for the storage system. This job
includes the following tasks:
• Identifies the appropriate number and position for the spare disk.
• Assigns a spare disk.
• Creates the required number of parity groups for the requested RAID
layout.
• Creates and quick formats the necessary volumes on the parity group so
that it is ready for pool creation.
• The job may create sub-jobs when multiple parity groups are being
created. Each sub-job will show the status of the parity groups being
created.
Note: If you are creating parity groups for the entire array, it may take
several hours before the storage system is configured.
Next steps
• Create a pool.
• Create and attach volumes.
Note: For further information, access Help from within the Storage Advisor
web interface.
Procedure
1. Launch a web browser from the console PC connected to the SVP, and
then start Device Manager - Storage Navigator.
2. Enter the following URL in the address field of your browser, and then
press the Enter key: http://[IP address of SVP]/module/sn2/0/
index.do
3. In the Storage Device List window, click the picture of the registered
storage system.
4. Log in to Device Manager - Storage Navigator.
5. On the Maintenance Utility menu, click Hardware.
6. Select the pull-down menu for the part that needs to be replaced (see
the following table).
Procedure
https://IP-address-or-host-name-of-the-SVP/dev/storage/
8340004XXXXX/emergency.do (where the model number is '8340004'
and '4XXXXX' indicates the system serial number)
• For VSP G800 and VSP F800 storage systems, enter:
https://IP-address-or-host-name-of-the-SVP/dev/storage/
8360004XXXXX/emergency.do (where the model number is '8360004'
and '4XXXXX' indicates the system serial number)
3. The following actions might be required to open the login dialog box,
depending on your environment:
• If a message indicates that the enhanced security configuration is
enabled on the computer, select In the future, do not show this
message and click OK.
• If the SVP is set to support SSL-encrypted communication and security
messages appear, make sure the certificate is correct and follow the
instructions in the dialog box.
• If a messages indicates that certain web sites are blocked, make sure
you have added the SVP to the trusted sites zone.
4. Enter a user ID and password for the account.
5. Click Log In.
6. If the Security Information dialog box appears, click Yes.
7. If an Adobe Flash Player local storage area pop-up dialog box appears,
click Allow to open the Device Manager - Storage Navigator main
window.
The cache function of Adobe Flash Player optimizes the process of Device
Manager - Storage Navigator. Denial of the request might reduce
processing speed.
Note: If the login process fails three times with the same user ID,
Device Manager - Storage Navigator will stop responding for one
minute. This is for security purposes and is not a system failure.
Wait, and then try again.
Related tasks
• System management architecture on page 18
System configuration 61
System Administrator Guide
System administration tasks at a glance
The following table summarizes key system administration tasks. The tool
used to perform these tasks depends on whether the storage system contains
NAS modules.
Block-only storage
Block and file storage systems (NAS
Task systems (no NAS
modules installed)
modules installed)
• Set IPv4 and IPv6 Maintenance utility IP addresses cannot be added, deleted,
network settings and set or modified in the NAS Manager. To
HTTP blocking See Changing network
change these addresses, use the
settings on page 117
maintenance utility.
62 System configuration
System Administrator Guide
Block-only storage
Block and file storage systems (NAS
Task systems (no NAS
modules installed)
modules installed)
System configuration 63
System Administrator Guide
Enabling or disabling port security
Before a host storage domain (HSD) can be created on a port, port security
must be enabled. By default, security is disabled on supported storage
systems. If port security is disabled Storage Advisor will not select the port
for HSD creation. If you select a port that has security disabled, you are
limited to the default host group. If the user manually selects the port with
security disabled, the host group will be created.
Procedure
Note: Any changes you make in Storage Navigator may not be reflected in
Storage Advisor for a few minutes.
After a fabric switch is added, you can choose to auto-create zones during
volume provisioning. A fabric switch is required for any operations that use
64 System configuration
System Administrator Guide
auto-select, such as host group creation and auto-selection of ports while
attaching volumes to servers.
Procedure
3. Enter the following information from the configuration of the switch you
are adding:
• Virtual Fabric ID: For Cisco switches, the VSAN ID. Not applicable to
Brocade switches.
• Fabric Switch Type: Select Brocade or Cisco.
• Fabric Switch IP Address
To add or update a core switch, use the Management IP address of the
switch or the Active CP IP address.
System configuration 65
System Administrator Guide
• Port Number
• Username
• Password
4. Click Submit.
Result
A job is created to add the fabric switch.
300 71
7.0
7.1
7.2
5300 64
7.0
7.1
7.2
6505 118
7.0
7.1
7.2
6510 109
7.0
7.1
7.2
6520 133
7.0
7.1
7.2
7800 83
7.0
7.1
7.2
66 System configuration
System Administrator Guide
Cisco MDS NX-OS Release 6.2(9) or later is required.
Creating parity groups in Storage Advisor also creates LDEVs that can be
consumed for pool creation.
Normal practice is to use all available disk capacity when creating parity
groups to ensure that all of the storage system capacity is usable. There can
be exceptions to this practice; for example:
• If the entire capacity of the storage system is not needed.
• If there is a need to create fewer parity groups in order to reserve more
disks as spares.
System configuration 67
System Administrator Guide
When you open the Create Parity Groups page, the basic method is
selected by default. Encryption can be enabled using either method.
○ Basic option: Creating a parity group using the basic option requires no
input, but you can change the RAID type or the number of parity
groups. Storage Advisor applies recommended best practices for
creating these parity groups.
○ Advanced option: The advanced option allows the user to fully configure
the RAID layout of the parity group by selecting the specific disks to
assign for parity group creation.
Note: Any changes you make in Storage Navigator may not be reflected in
Storage Advisor for a few minutes.
Procedure
68 System configuration
System Administrator Guide
grouped by disk type, disk speed, and disk capacity, and includes the
following details:
• Number of available disks.
• Available spares detected for each disk type, disk speed, and capacity.
• Number of new or additional spares to reserve. This calculation is
based on the total spares needed based on recommended best
practices, and the number of existing spares in the system.
• The recommended RAID configuration for the disk type.
• The number of parity groups that can be created.
• The total usable capacity that is available based on the number of
parity groups and the RAID configuration.
7. Click Submit.
System configuration 69
System Administrator Guide
Result
A job is started to create the parity group for the storage system. This job
includes the following tasks:
• Identifies the appropriate number and position for the spare disk.
• Assigns a spare disk.
• Creates the required number of parity groups for the requested RAID
layout.
• Creates and quick formats the necessary volumes on the parity group so
that it is ready for pool creation.
• The job may create sub-jobs when multiple parity groups are being
created. Each sub-job will show the status of the parity groups being
created.
Next steps
• Check the status of the parity group creation job by clicking Jobs.
The advanced option allows you to fully configure the RAID layout of the
parity group by selecting the specific disks and hot spares to assign for parity
group creation.
Procedure
70 System configuration
System Administrator Guide
4. Select a RAID Type and a RAID Layout.
6. Choose available disks. Select enough disks to match the RAID Layout.
7. Click Submit.
Result
A job is started to create the parity group for the storage system.
Next steps
• Check the status of the job by clicking Jobs.
• Create a pool.
System configuration 71
System Administrator Guide
Managing free and spare disks
You can set free disks to spare and spare to free.
Note: Disk management is not available for VSP G1000 storage systems.
If you choose to use the basic method to create parity groups, Storage
Advisor will automatically review the available spare disks and allocate more
spare disks if needed.
If you choose to create parity groups using the advanced method, you should
review the number of spare disks in the parity groups inventory summary. If
you want to assign more or fewer spare disks, use disk management.
Procedure
To view parity groups for a storage system, click Storage Systems on the
dashboard and click a storage system tile to view the associated parity
groups, pools, volumes, and ports. Click Parity Groups to open the Parity
Groups page.
72 System configuration
System Administrator Guide
You can perform the following actions on this page:
• If there are hardware alerts related to the parity groups, you can click the
Hardware Alerts tile to view details for different types of components on
the Monitoring page for the storage system.
• To assign free and spare disks, click Manage Spare Disks to open the Disk
Management page.
System configuration 73
System Administrator Guide
○ To delete the parity group, click Delete. When you delete a parity group,
it is removed from the storage system and the disks used to create the
parity group are no longer in use. You can delete the parity group if you
want to reconfigure the storage system with some other RAID
configuration or simply decommission the array.
• Use the filters to view the status of parity groups. Click a filter to apply it
and click it again to remove it.
○ AVAILABLE: Parity group is not being used for any storage pools. It is
available for pool creation.
○ AVAILABLE_PHYSICAL: Parity group is not being used for any storage
pools. Compression is enabled on the parity group and physical capacity
of the parity group is available for pool creation. Not applicable to parity
groups that are not enabled for compression.
○ FORMATTED: At least one of the pool volumes in the parity group is
being formatted. The full format takes longer than a quick format
because the service processor fully scans the hard drive.
○ QUICK_FORMATTING: At least one of the pool volumes in the parity
group is being formatted using the quick format method. To make the
formatting process quick, the drive is not fully checked, the files are still
there, and the volume could be re-built to gain access to the files again.
○ IN_USE: Parity group is being used by a storage pool.
○ UNINITIALIZED: The parity group either has no volumes or at least one
of the pool volumes is in Blocked status, or one or more partitions is
uninitialized and has a size greater than 16,787,456 blocks.
74 System configuration
System Administrator Guide
○ UNSUPPORTED_ATTACHED: At least one of the pool volumes has a path
to a storage port.
○ UNSUPPORTED_INACCESSIBLE_RESOURCE_GROUP: Parity group and at
least one of its pool volumes are in different resource groups and user
does not have access to one of the resource groups.
You can display a list of external parity groups in a storage system that has
been registered with Device Manager - Storage Navigator.
You can access the External Parity Groups page by clicking the External Parity
Groups tile on the detail page for a storage system. If the storage system has
no external parity groups, the tile does not display.
Storage Advisor only uses the physical capacity of the FMD DC2 parity groups
for which write is assured.
When you create pools, you can select capacity from compression-enabled
parity groups by selecting the AVAILABLE_PHYSICAL status.
System configuration 75
System Administrator Guide
After creating a pool with capacity from a parity group that is enabled for
accelerated compression, you can view the following in the detail page for the
pool:
• Expansion Rate: The ratio of the total capacity of FMD DC2 pool volumes
with respect to the total capacity of FMD DC2 pool volumes assured for
writing.
• Compression rate: The ratio of data size compression.
• Savings %: Displays the percentage of the capacity reduced by data
compression with respect to the used capacity before the data
compression. This will not display a value until data is compressed.
If the savings percentage for a pool is not high enough, you can provision
additional pool volumes to the pool from the parity groups using FMD DC2
drives.
Creating a pool
Use the basic option to take advantage of tiers that are based on best
practices.
If you want more flexibility and do not need to take advantage of best
practices, you can use the advanced option to select specific parity groups.
You cannot create pools on external parity groups. They must be created
outside Storage Advisor.
Snap = HTI (Thin Image), which stores snapshot data in pools. A pool
consists of multiple pool-VOLs. The pool-VOLs contain the snapshot data. A
pool can contain up to 1,024 pool-VOLs.
Pools inventory
Access the Pools page to add, update, and delete pools.
From the dashboard, click Storage Systems and then click a storage system
tile to view parity groups, pools, volumes, and ports.
76 System configuration
System Administrator Guide
Click Pools to view the inventory of pools.
Note: If there are external pools (on external storage), they display in Pools
inventory, but they cannot be added, updated, or deleted.
View pool details in either a tile view or a list view. Capacity utilization is
represented by a color bar:
• Green Below 70%.
• Orange From 70% to 80%.
• Red Over 80%.
FMD DC2 Compression status indicates whether a pool is using a parity group
that is enabled for accelerated compression.
System configuration 77
System Administrator Guide
Opening the Pools inventory page in Hitachi Storage Navigator
You can open the Pools inventory page in Hitachi Storage Navigator by
clicking the icon ( ) to launch Storage Navigator and:
• Shrink or restore a HDP/HDT pool
• View the Tier properties of the HDT Pool
• Update the Monitoring Mode of the HDT pool (Manual Tier management)
• Start or stop the monitoring of the HDT pool (Manual Tier management)
• Start or stop tier relocation on the HDT pool (Manual Tier management)
Note: Any changes you make in Storage Navigator may not be reflected in
Storage Advisor for a few minutes.
You need a minimum of four parity groups of the Bronze, Silver, or Gold tiers,
or one parity group of the Platinum tier to create a pool using the basic
method. Otherwise, you can use the advanced method of pool creation.
License requirements:
• For a Tiered pool: Dynamic Tiering
• For a Thin pool: Dynamic Provisioning
• For a Snap pool: Thin Image
• For active flash: active flash
Procedure
78 System configuration
System Administrator Guide
5. Enter a Pool Label.
Pool labels can contain only alphanumeric characters, hyphens, and
underscores. Initial hyphens are not allowed.
6. In the Select capacity from Tiers to Allocate to Pool pane, you can
choose storage from 1, 2, or a maximum of 3 tiers (Platinum, Gold,
Silver, or Bronze).
• If you select only one tier, you can use the Intend to use for Snap?
toggle to decide whether to use Snap pools.
○ Click Yes to create Snap pools.
7. Click a selected tier to view the available storage capacity and select a
capacity size.
8. Click Tier Management to see the disk type, capacity, and speed of
each pool category.
System configuration 79
System Administrator Guide
9. Review the high and low pool utilization thresholds, for watermarks or
warnings, and the subscription limit. The thresholds will serve as the
Warning and Critical thresholds for monitoring capacity. Adjust the
thresholds if needed. Select the Subscription Limit % checkbox to set
the limit to Unlimited.
Result
A job is started to allocate the storage capacity and create the pool.
Next steps
• Check the status of the pool creation job by clicking Jobs.
• Create a volume.
How Storage Advisor calculates pool sizes for the basic method of pool creation
Storage Advisor incorporates best practices to calculate the best pool sizes
based on the media available in the storage system. When the basic pool
creation option is used, pool size is determined as follows:
• Storage Advisor identifies all the parity groups of the same disk type, disk
capacity, disk speed, RAID type and layout and determines the available
capacity of their usable LDEVs. Only parity groups in the Available and
Quick Formatting states are eligible for pool creating using the basic
method.
• Storage Advisor then uses combinations of these parity groups where four
or more parity groups of the Bronze, Silver, or Gold tiers can be added
together, or there is a parity group of the Platinum tier, to compute various
possible pool sizes that can be created for the combination of disk type,
disk capacity, disk speed, RAID type and layout.
80 System configuration
System Administrator Guide
Note: Mixing different disk types in a Thin pool is not recommended. If you
choose to create such a pool, Storage Advisor identifies the tier in this pool
as "mixed".
License requirements:
• For a Tiered pool: Dynamic Tiering
• For a Thin pool: Dynamic Provisioning
• For a Snap pool: Thin image
• For active flash: active flash
Procedure
System configuration 81
System Administrator Guide
9. Select one or more parity groups to use to create the pool. You can scroll
through the parity groups to use search and filter functions.
• For a Snap pool, select one or more parity groups with identical disk
types.
• For a Thin pool, select one or more parity groups with identical disk
types.
• For a Tiered pool, select one or more parity groups with two or three
disk types.
Storage Advisor shows the total size of the pool using the selected parity
groups.
10. Set the utilization thresholds, or use the default threshold settings. The
subscription limit can be set above 100%. Select the Subscription Limit
% checkbox to set the limit to Unlimited.
The thresholds are used as the Warning and Critical thresholds for
Capacity Monitoring.
11. Click Submit.
Result
A job is started to allocate the storage capacity and create the pool.
Next steps
• Check the status of the pool-creation job by clicking Jobs.
• Create volumes.
Pool details
To access pool details, click Storage Systems. Then click a storage system to
view all resources. Click Pools and then click a pool tile.
82 System configuration
System Administrator Guide
• Unmanaged: the volume has only a LUN path associated. For example,
a volume may be attached to a server that is not known to Storage
Advisor.
• If the volume uses compression or deduplication and compression, you can
view the compression ratio and deduplication ratio.
• Delete the pool.
• Edit the pool configuration by clicking the pencil icon to open the Update
Storage Pool page.
Once a pool is created, you can edit the pool label or expand the pool.
Basic and advanced options, similar to those for pool creation, are
available for pool expansion. The basic option includes choices for a new/
expanded pool size based on the current set of parity groups in the pool.
You can choose to expand an existing tier in the pool or add a new tier to
the pool. If you add a tier to a thin pool, it will be expanded and converted
into a tiered pool. Using the advanced option enables you to add more
parity groups to the pool and increase capacity.
Note: To expand a Thin pool, you must add a parity group of the
same RAID layout, the same disk type, the same RAID level, and
the same disk speed.
Click Submit to update the window and start a job that will update the
pool.
System configuration 83
System Administrator Guide
Procedure
84 System configuration
System Administrator Guide
Attaching newly-created volumes to servers
Storage Advisor provides options as part of the attachment of the new
volumes to a single server or multiple servers.
Procedure
1. The Host Mode is set by default to the server operating system. You can
make a selection if needed.
The server OS Type is provided when the server is added to Storage
Advisor.
2. By default, the Host Mode Option will depend on the Host Mode
selection.
Default values are set only for VMWARE EX and WIN EX host modes.
The default for all other Host Modes is none.
Storage Advisor identifies all host groups containing any of the server
WWNs. If all of those host groups have the same host mode and host
mode options, those settings are prepopulated with the same settings in
the host groups.
3. Select the LUN Alignment.
By default, Storage Advisor uses the LUN number that is common to the
servers. If attachment is to only one server, this setting has no effect.
4. The Auto Create Zone is set to No by default. You can set it to Yes to
automatically create zones.
5. Click Next to view options for creating and editing LUN paths.
System configuration 85
System Administrator Guide
6. In the Create Paths panel, you can view servers and their WWNs, along
with ports on the storage system. The following options are available for
managing LUN paths:
• Existing paths are populated as follows: all existing host groups with
one or more server WWN and the exact same host mode and host
mode options selected on the Attach Settings panel are populated as
paths.
To prevent the volume from being added to an existing path, click the
path to highlight it and click Delete Selected.
• Click Suggest to populate automatically selected paths. By default,
the least-used ports are selected.
• To manually create a path, click a WWN and a port to connect them
with a blue connector line. Click the connector again and then click
Delete Selected to delete the connection.
7. When you are satisfied with the paths, click Next to view options for
protecting volumes.
86 System configuration
System Administrator Guide
The Storage Systems page includes a summary section identical to the
summary on the dashboard. This includes monitoring tiles, capacity summary
and data protection summary.
You can search for a specific storage system by searching for its serial
number in the search box. You can also use various filters to find a specific
storage systems.
From the storage systems page you can view and manage individual storage
systems.
View storage system details in either a tile view or a list view. Capacity
utilization is represented by a color bar:
• Green: Below 70%.
• Orange: From 70% to 80%.
• Red: Over 80%.
On the dashboard, click Storage Systems and then click a Storage System
<serial number> tile.
System configuration 87
System Administrator Guide
On a storage system detail page, you can do the following:
• Click Delete to delete the storage system. This action is available only to
users with the SystemAdministrator role.
• Click Edit to update the storage system user name and password. This
action is available only to users with the SystemAdministrator role.
• Click Settings in the upper-right corner to launch either of the following:
○ Device Manager - Storage Navigator to perform any advanced storage
management operations that are not available in Storage Advisor.
○ If the storage system includes optional NAS modules, you can launch
NAS Manager to perform operations that are not available in Storage
Advisor.
• Review the information gauge regarding available capacity in storage
system.
• Use the Alerts tiles to access alerts related to the storage system.
• Click Review Tiered Categories to open the Tier Management page to view
and edit tier categories.
•
Field Description
88 System configuration
System Administrator Guide
Field Description
Use the Device Manager - Storage Navigator online help to obtain procedure
information for advanced storage configuration tasks.
Accessing Device Manager - Storage Navigator
System configuration 89
System Administrator Guide
Launch Device Manager - Storage Navigator or from the Settings menu
available in the Storage System details page. In the login dialog, use the user
account assigned to you by your security administrator. The tasks that you
can do on the system depend on the user role assigned to the user groups to
which you belong.
In the login dialog, use the user account assigned to you by your security
administrator. The tasks that you can do on the system depend on the user
role assigned to the user groups to which you belong. Security administrators
with view and modify privileges are responsible for setting up user accounts
in Device Manager - Storage Navigator.
Refer to the Roles table for roles that are available for use in Device Manager
- Storage Navigator and the permissions that each role provides to the users.
Roles
The following table shows all the roles that are available for use and the
permissions that each role provides to the users. You cannot create a custom
role.
Role Capabilities
Security Administrator • Viewing information about user accounts and encryption settings
(View Only) • Viewing information about the encryption key in the key SVP
Security Administrator • Configuring user accounts
(View & Modify) • Creating encryption keys and configuring encryption settings
• Viewing and switching where encryption keys are generated
• Backing up and restoring encryption keys
• Deleting encryption keys backed up in the key SVP
• Viewing and changing the password policy for backing up encryption keys on the
management client
• Connection to the external server
• Backing up and restoring connection configuration to the external server
• Configuring the certificate used for the SSL communication
• Configuring the fibre channel authentication (FC-SP)
• Configuring resource groups
• Editing virtual management settings
• Setting reserved attributes for global-active device
Audit Log Administrator • Viewing audit log information and downloading audit logs
(View Only)
Audit Log Administrator • Configuring audit log settings and downloading audit logs
(View & Modify)
Storage Administrator • Viewing storage system information
(View Only)
Storage Administrator • Configuring settings for storage systems
(Initial Configuration) • Configuring settings for SNMP
• Configuring settings for e-mail notification
• Configuring settings for license keys
• Viewing, deleting, and downloading storage configuration reports
• Acquiring all the information about the storage system and updating Device
Manager - Storage Navigator window by clicking Refresh All
90 System configuration
System Administrator Guide
Role Capabilities
Use the NAS Manager online help to obtain procedure information for
advanced file storage configuration tasks.
Accessing NAS Manager
Launch NAS Manager from the Settings menu available in the Storage
System details page. In the login dialog, use the user account assigned to
you by your administrator. The tasks that you can do on the system depend
on your user role.
System configuration 91
System Administrator Guide
Refer to the Administrator types and responsibilities list for roles that are
available for use in NAS Manager and the permissions that each role provides
to the users.
This section describes the types of NAS storage system administrators and
defines their expected roles in managing the system and the associated
storage subsystems.
• Global Administrators can manage everything in the system: file
systems, file services, or file system related features and functions,
storage devices and their components. Also, the Global Administrator
creates and manages SMU user profiles (Server Administrators, Storage
Administrators, Server+Storage Administrators, and other Global
Administrators). Global Administrators also control what servers and
storage devices each administrator can access.
• Storage Administrators manage storage devices, as specified in the
administrator profile created by the Global Administrator.
Storage Administrators can manage only storage devices and their
components (racks, physical disks, SDs, and storage pools). Storage
Administrators cannot manage file systems, file services, or file system
related features and functions, and they cannot manage users.
• Server Administrators manage servers and clusters, as specified in the
administrator profile created by the Global Administrator. Server
Administrators cannot manage storage devices.
Server Administrators can manage file systems and file services such as
CIFS Shares, NFS Exports, and they can manage file system related
features and functions such as snapshots, quotas, and migration policies
and schedules.
• Server+Storage Administrators manage servers, clusters, and storage
devices, as specified in the administrator profile created by the Global
Administrator.
Server+Storage administrators can manage everything Server
Administrators and Storage Administrators can manage: file systems, file
services, or file system related features and functions, and they can also
manage storage devices and their components.
All administrators can connect to the NAS storage system through NAS
Manager, the browser-based management utility provided by the system
management unit (SMU). Additionally, Global Administrators can connect to
the SMU command line interface (CLI).
Tier management
92 System configuration
System Administrator Guide
The Tier Management page displays the tier definitions. You can edit the tier
names (Platinum, Gold, Silver, Bronze, and External).
Procedure
Managing servers
Storage Advisor supports provisioning storage to a group of server WWNs by
allowing logical servers to be managed by Storage Advisor. Once servers are
onboarded in Storage Advisor, storage volumes can be provisioned to the
servers by creating Host Storage Domains and optionally creating zones to
provide a path between the storage volume and server.
Adding servers
Add servers so you can attach volumes. You can add multiple server
parameters from a file, or add one server at a time.
System configuration 93
System Administrator Guide
• TRU64
• VMWARE
• VMWARE_EX
• WIN
• WIN_EX
Procedure
1. On the Storage Advisor dashboard, click Servers. Then click the plus
sign (+) to open the Add Server page.
2. On the Add Server page, do one of the following:
• Click the upper plus sign (+) to browse for the CSV file or drag the file
to the plus sign. The values from the file will populate the page.
• Click the plus sign (+) in the table to add a row and enter a Name,
Description (optional), IP Address (optional), OS Type, and WWN.
You can add more servers by clicking the plus sign.
3. Click Submit to add the servers.
Result
A job is started to add the servers.
Next steps
Server inventory
The Servers page displays all servers and includes a graphic summary based
on operating systems.
94 System configuration
System Administrator Guide
To find the server you are looking for, you can either search by server ID or
narrow down the list of servers using filters available.
You can click server tiles on this page to access details of individual servers
and manage their volumes.
Server details
The Server details page provides you all the details about the server as well
as a list of volumes, if any, attached to the server.
This page also shows path details for every volume attached to the server,
including the storage ports and server WWNs used to create HSDs as well as
the host mode options set up on the HSD.
You can perform server actions such as removing the server, editing the
server or provisioning volumes to server by attaching existing volumes or
creating and attaching new volumes.
On the dashboard, click Servers to open the Servers inventory page. Then
click a server tile to open the Server <ID> detail page for the selected server.
System configuration 95
System Administrator Guide
• Click Protect Volumes to protect volumes using Storage Advisor data
protection technologies.
• Click Unprotect Volumes to remove data protection applied to volumes.
• Click Restore Volumes to restore from a backup.
Updating a server
You can change the parameters for an existing server.
Detach all volumes from the server. If you want to remove a WWN, detach all
volumes using the WWN.
Procedure
Managing volumes
A volume is a single accessible storage area, created in a pool within a parity
group on a storage system. Create a volume and manage its properties with
Storage Advisor
Hitachi Storage Advisor allows you to use capacity saving when you create or
update a volume.
When you create a capacity saving volume, HSA first creates a deduplication
system data volume. This volume is used internally by the storage system,
does not contain user data, and cannot be accessed by hosts.
96 System configuration
System Administrator Guide
Creating volumes
Create volumes for a registered storage system so you can attach them to a
server.
Procedure
System configuration 97
System Administrator Guide
7. Click Submit.
Result
A job is started to create the volumes and add them to the volume inventory
for the storage system.
Next steps
• Check the status of the volume-creation job by clicking Jobs.
• Attach volumes to a server.
Procedure
98 System configuration
System Administrator Guide
3. The Host Mode is set by default to the server operating system. You can
make a selection if needed.
The server OS Type is provided when the server is added to Storage
Advisor.
4. By default, the Host Mode Option will depend on the Host Mode
selection.
Default values are set only for VMWARE EX and WIN EX host modes.
The default for all other Host Modes is none.
Storage Advisor identifies all host groups containing any of the server
WWNs. If all of those host groups have the same host mode and host
mode options, those settings are prepopulated with the same settings in
the host groups.
5. Select the LUN Alignment.
By default, Storage Advisor uses the LUN number that is common to the
servers. If attachment is to only one server, this setting has no effect.
6. The Auto Create Zone is set to No by default. You can set it to Yes to
automatically create zones.
7. Click Next to view options for creating and editing LUN paths.
System configuration 99
System Administrator Guide
8. In the Create Paths panel, you can view servers and their WWNs, along
with ports on the storage system. The following options are available for
managing LUN paths:
• Existing paths are populated as follows: all existing host groups with
one or more server WWN and the exact same host mode and host
mode options selected on the Attach Settings panel are populated as
paths.
To prevent the volume from being added to an existing path, click the
path to highlight it and click Delete Selected.
• Click Suggest to populate automatically selected paths. By default,
the least-used ports are selected.
• To manually create a path, click a WWN and a port to connect them
with a blue connector line. Click the connector again and then click
Delete Selected to delete the connection.
9. When you are satisfied with the paths, click Submit.
Update a volume
You can expand an unprotected volume and rename any volume.
Procedure
3. You can rename the volume, and if it is unprotected, you can change the
size by clicking the right, left, up, and down arrows next to the volume
size.
4. Toggle Compression and Deduplication to enable the desired capacity
saving type.
Toggle
Capacity saving type Toggle compression
deduplication
5. Click Submit
Result
A job is started to update the volume.
Volumes inventory
The Volumes page enables you to filter, sort, and edit volumes for a single
storage system, and to select volumes for data protection.
Access the inventory of volumes for a storage system to gain insight into
volume size, data protection and utilization. You can also create volumes,
attach existing volumes and perform data protection operations.
View volume details in either a tile view or a list view. Capacity utilization is
represented by a color bar:
• Green: Below 70%.
• Orange: From 70% to 80%.
• Red: Over 80%.
Note: Any changes you make in Storage Navigator may not be reflected in
Storage Advisor for a few minutes.
Then create file systems and use them to create shares and exports that you
can use to offer storage to users.
• Creation of a Thin pool that comprises each selected tier (either one or
two).
• Minimum disk requirements for file pool creation:
○ 24 disks for SAS 10K, 15K
○ 48 disks for SAS 7.2K
○ 8 disks for FMD, FMD DC2, SSD
When a user creates a file pool in Storage Advisor, the system automatically
performs the following operations:
1. Identifies parity groups.
2. Creates a block pool.
3. Creates volumes and attaches them to NAS modules.
4. Configures volumes as system drives.
5. Creates a file pool.
Use this page to view file pool information in a tile or list view, and to delete
or expand existing pools, as well as to create new pools.
Each tile or list row shows whether the file pool is tiered, it's File Pool Label,
and capacity utilization.
Procedure
1. On the File Pools page, click the plus (+) sign to open the Create File
Pool page.
2. Enter a label for the file pool.
3. In the Select Capacity for New File Pool pane, choose storage from
one or two tiers. For a tiered pool, select Platinum and one other tier.
Use this page to view details about a file pool and to manage file systems in
the pool.
You can search for a specific file system by searching for its File System Label
in the search box. You can also use the Free Space and File Systems Size
filters to find specific file systems, or filter by virtual file server.
View file system information in either a tile view or a list view, including
capacity utilization and whether or not the file system is mounted.
Procedure
1. To expand the file pool, select capacity from one of the tiers.
An untiered file pool cannot be expanded into a tiered file pool.
2. If you want to change the file pool label, enter it in the File Pool Label
field.
3. If you want to change utilization thresholds, use the sliders.
4. Click Submit.
The job is added to the Jobs page.
Use this page to view information about virtual file servers in a tile or list
view. Use the filters to show only offline or online virtual file servers, or filter
by blade number.
Procedure
1. On the Virtual File Servers page, click the plus sign (+) to open the
Create Virtual File Server page.
2. Enter a label for the virtual file server.
3. Enter the IP address (ipv4 or ipv6) for the virtual file server.
4. Enter the subnet mask for the virtual file server.
5. Select the cluster node Gigabit Ethernet port to which the IP address for
the virtual file server is assigned.
6. Click Submit.
A job is added on the Jobs page to create the virtual file server.
You can search for a specific file system by searching for its file system label
in the search box. You can also use the Free Space and File Systems Size
filters to find specific file systems, or filter by virtual file server.
Procedure
1. Click the plus sign (+) on the File Systems page to open the Create
File System page.
2. Select a virtual file server.
a. Enter a label up to 255 alphanumeric characters.
b. Select a format:
• 4K: This choice is best for small block random applications (Virtual
Server / Virtual Desktops / Databases).
• 32K: This choice is best for large block sequential applications
(Video, Media, Images) or when the file system is hosted on NL-SAS
drives.
3. Enter capacity up to 1PB.
4. Select a pool and click Submit.
A job is added to the Jobs page to create the file system.
Procedure
1. On the File Systems page, select a file system and click Edit to open
the Update File System page.
2. You can change the file system label, the capacity, or both.
• To edit the label, enter changes in the label field.
• To change the capacity, enter it and select a new unit of measure, if
necessary.
3. Click Submit.
The new job is added to the Jobs page.
Use this page to add, edit, and delete shares and exports. You can also
access related resources.
Procedure
1. Access the Create Shares/Exports page by clicking the plus sign (+)
on the Shares/Exports page.
2. Enter a File System Path and a Share/Export Label.
3. Select a File System.
4. Create a share by selecting Windows or create an export by selecting
Linux.
5. Click Submit.
A job to create the share or export is added to the Jobs page.
Export details
Access the detail page for an export to review internal and external paths and
to edit the export.
Updating an export
You can update an export to change the file system path and access
configuration.
Procedure
You can also specify the required flavors of NFS security in a colon-
separated list using the option (sec=<list>).
Share details
Access the detail page for an share to review internal and external paths and
to edit the export.
You can add an existing account domain group to a share. This enables you
to change users permissions when they access the share.
The account domain group and CIFS setup must already exist.
1. On the detail page for a share, click the plus sign (+) to open the Create
Groups page.
2. In the Group Name field, type in a user group name from the account
domain.
3. Choose permissions; Full Control, Change, or Read.
4. Click Submit.
A job is started to add the group to the share.
Updating a share
You can update a share to change the file system path, permissions, and
access configuration.
Procedure
1. Access the Update Share page by clicking Edit in a Share detail page.
2. (Optional) Enter a new path in the Modify File System Path field.
3. (Optional) In the Access Configuration field, enter IP addresses of the
clients who can access the share (up to 5,957 characters allowed in this
field).
Blank or * Partial addresses All clients can access the 10.168.*.* Clients with
using wildcards. share. matching addresses can
access the share.
Specific addresses Only clients with the specified 10.168.20.2
IP address can access the
share.
Specific address range Only clients with an IP 10.168.20.0/16
address within the specified IP
address range (10.168.20.0
to 10.168.20.255) can access
the share.
Partial addresses using Clients with matching 10.168.*.*
wildcards addresses can access the
share.
Permisssions
What to type Permissions granted
(rw) read-write
(ro) read only
Note: The order in which you specify the entries is important. Take
the following two lines:
• *(ro)
• 10.1.2.38(rw)
Caution: When changing a setting more than once, ensure that the current
setting is complete before changing it again. Otherwise, only the new change
will be applied, and the result might be different from what you expected.
Procedure
The following configuration items can be backed up and restored. Before you
create the backup, ensure that the settings are correct.
• Device Manager - Storage Navigator environment parameters
• Authentication server connection settings
• Key management server connection settings
• Password policy when backing up the management client encryption key
• Display settings (table width) for each Device Manager - Storage Navigator
user
• Device Manager - Storage Navigator login warning messages
• Device Manager - Storage Navigator task information
• SMI-S application settings
• SSL certification for HTTPS/SMI-S/RMI
Procedure
Note:
• The backup file must be in .tgz format.
• A space is required between MappBackup.bat and the path to
the backup file.
Related tasks
• Restoring HDvM - SN configuration files on page 115
Procedure
Note:
• The backup file must be in .tgz format.
• A space is required between MappRestore.bat and the path to
the backup file.
Related tasks
• Backing up HDvM - SN configuration files on page 114
Procedure
Procedure
For details about setting up the SVP, see the Hardware Installation and
Reference Guide for your storage system.
If you use IPv6 to display the Device Manager - Storage Navigator main
window when both IPv4 and IPv6 are available, IPv6 addresses are displayed
in the Device Manager - Storage Navigator secondary window but IPv4
communication is actually used.
Procedure
Procedure
Procedure
You must have the Storage Administrator (View & Modify) role to complete
this procedure.
Procedure
Caution: Before using this feature, ensure that releasing the system lock will
not cause system problems due to processes that are currently running.
Releasing the system lock can terminate a process before it completes and
possibly leave the system in an unknown state. Check with any users that are
logged on. Wait until their processes are complete before releasing the
system lock.
You must have the Storage Administrator (View & Modify) role to complete
this procedure.
Procedure
When the system date and time are set by NAS Manager, they are also
reflected in the system date and time of the storage system.
Tip: See the Hitachi NAS Platform Server and Cluster Administration Guide
for more details about changing the system date and time of the NAS
modules.
Procedure
Tip: You are not required to enter Time and Date because the
settings are acquired from the NTP server.
6. Click OK.
The window changes to the Login window a few minutes later.
Procedure
Note: Perform this task only if an SVP port number is used by another
application.
You need to verify the effects before you modify an SVP port number. See
Effects of changing SVP port numbers on page 125.
The following table describes the port number key names and the initial value
of the port number.
Procedure
For the port on which the port number information is not allocated, Not
Defined is displayed and a completion message displays.
3. Press any key to acknowledge the message and close the message box.
4. Close the Windows command prompt.
The following table describes the effects for each port number.
SLP You must change the SMI-S Hardware Reference Guide for
port number to the same your storage system
number.
SMIS_CIMOM You must change the SMI-S Hardware Reference Guide for
port number to the same your storage system
number.
If the storage system is
83-03-01-XX/00 or later, check
the port number which is used
after registering the storage
system. For detail, see Viewing
the port number used in SVP on
page 125.
Note:
• Do not change the management file of the port number.
• Close the management file of the port number while executing the
command for changing or initializing.
• If the SVP software version of the registered storage system does not
support changing the port number, update the SVP software.
• Port numbers 1 to 1023 are reserved for other application programs, so do
not use these numbers. If you use these numbers and encounter a
problem, change the number to 1024 or higher.
• The following port numbers cannot be used for MAPPWebServer or
MAPPWebServerHttps:
2049, 4045, 6000
Procedure
Note:
• A space is required between MappSetPortEdit.bat and port-
number-key-name.
Remote desktop connection from the management client to SVP has been
performed.
Procedure
Caution:
Procedure
If you omitted the serial number, it is executed for the storage system of
83-03-01-XX/00 or later that is registered in the Storage Device List
window.
5. A confirmation message box displays.
If you want to continue, enter Y, and then press the Enter key. If you
want to cancel the task, enter N, and then press the Enter key.
6. Press any key to acknowledge the message and close the message box.
7. Close the Windows command prompt.
8. Start the service of the storage system which is reassigned.
Caution:
• Stop the service of the storage system which has the status Ready in the
Storage Device List window before initializing.
• If you did not stop before initializing, execute Reassigning an automatically
assigned port number on page 128.
Procedure
If you omitted the serial number, the batch file is run for the storage
system of 83-03-01-XX/00 or later which is registered in Storage
Device List window.
8. A confirmation message box displays.
• If you want to continue, enter Y, and then press the Enter key.
• If you want to cancel the task, enter N, and then press the Enter key.
9. Press any key to acknowledge the message and close the message box.
10. Reassign the port number for all the registered storage systems by
executing Steps 7 through 9.
11. Close the Windows command prompt.
12. Start the service of the storage system.
Procedure
Note:
• A space is required between MappPortRangeSet.bat and port-
number-key-name.
The following table shows the port number key name and initial value of
the port number range which can be changed. Port 0 is not assigned.
• The valid range of the port number is between 1 and 65535. Use a
port number that is not used in another service.
• Port numbers between 1 and 1023 are reserved for the other
applications. If you exclude a number between 1 and 1023 from the
setting value of unavailable, the port numbers might not operate
normally.
• The following can be used for the port number range:
Numbers, space, symbols (, -) and rm
• You can specify multiple port-number-key-name and port-number-
range.
For example: MappPortRangeSet.bat PreRMIServer 51200-55000
SMIS_CIMOM 5989-6244,8000
3. Press any key to acknowledge the message and close the message box.
4. Close the Windows command prompt.
Procedure
• If you want to cancel the task, enter N, and then press the Enter key.
4. Press any key to acknowledge the message and close the message box.
Procedure
Procedure
The following table lists the required roles for using specific Maintenance
Utility operation windows.
*
• Support Personnel: Operations performed by the service personnel
• User Maintenance: Operations performed by the user
Procedure
3. Create a new user account. Specify the User Name, Account Status,
Authentication and User Group. Click Finish.
Procedure
4. Click Edit.
5. For Account Status, click Disable, and then click Finish.
Note: To delete the user account specified by the registered storage system
in the Storage Device List window, click Stop Service of the registered
storage system. After deletion, click Edit to enable the user account.
Procedure
4. Click Remove.
The Confirm window opens.
5. In the Confirm window, confirm the settings, and then click Apply.
Procedure
Related tasks
• Changing assigned resource groups on page 161
Administrator tasks
To authenticate a user using an authentication server, specify settings for
connecting to the server.
Procedure
User tasks
Procedure
1. Use the user name and password provided by the administrator to log in
to Device Manager - Storage Navigator.
2. Click Settings > User Management > Change Password to change
the password to your own password.
It is prudent to create more than one user account in case the system
administrator is not available when the management software becomes
unavailable, or when someone else needs to access the system. This is also
helpful if multiple users need to access Device Manager - Storage Navigator
to use storage features that are not available in the management software.
Table 4 User name and password for Device Manager - Storage Navigator
Length in
Item Characters that can be used
characters
Length in
Item Characters that can be used
characters
Note:
1. When you use a Windows computer, you can also specify a backslash (\). When you use a
UNIX computer, you can also specify a slash (/).
Procedure
The number of characters and types of characters that can be used vary
between Device Manager - Storage Navigator, CCI, and NAS Manager. If a
user uses all three programs, specify a user name and a password that
satisfy the following conditions.
Note: To use NAS Manager after installing NAS modules, users created with
DKCMAIN firmware 83-03-2x or earlier, must change the password. If you do
not change the password, you cannot log in to NAS Manager. Also, if a user
name contains more than 20 characters, the user cannot log in to NAS
Manager.
Length in
Item Characters that can be used
characters
You cannot use the # symbol when you enter a user name in
a screen from the Tool Panel dialog box.
Password 6-256 • Alphanumeric (ASCII code) characters
• All symbols
Note: If you cannot log in on a Tool Panel dialog box screen, check to see if
you have used a number sign (#) in the user name, or used a quotation
mark (") or a backslash (\) in the password.
Length in
Item Characters that can be used
characters
Length in
Item Characters that can be used
characters
*When you use a Windows computer for CCI, you can also specify a backslash (\). When you use a
UNIX computer for CCI, you can also specify a slash (/).
Caution: Do not select any user account used to connect to a storage system
that is registered in the Storage Device List window. For details, see the
Hardware Reference Guide for your storage system.
Procedure
For example, if you want to change the role of the user who manages
security to the performance management role, add this user to the Storage
Administrator (Performance Management) role group and then remove the
user from the Security Administrator (View & Modify) role group.
Procedure
Caution: Do not select any user account used to connect to a storage system
that is registered in the Storage Device List window. For details, see the
Hardware Reference Guide for your storage system.
Procedure
Caution: Do not select any user account used to connect to a storage system
that is registered in the Storage Device List window. For details, see the
Hardware Reference Guide for your storage system.
You must have the Security Administrator (View & Modify) role to perform
this task.
Procedure
You must have the Security Administrator (View & Modify) role to perform
this task.
Procedure
Roles
The following table shows all the roles that are available for use and the
permissions that each role provides to the users. You cannot create a custom
role.
Role Capabilities
Security Administrator • Viewing information about user accounts and encryption settings
(View Only) • Viewing information about the encryption key in the key SVP
Security Administrator • Configuring user accounts
(View & Modify) • Creating encryption keys and configuring encryption settings
• Viewing and switching where encryption keys are generated
• Backing up and restoring encryption keys
• Deleting encryption keys backed up in the key SVP
• Viewing and changing the password policy for backing up encryption keys on the
management client
• Connection to the external server
• Backing up and restoring connection configuration to the external server
• Configuring the certificate used for the SSL communication
• Configuring the fibre channel authentication (FC-SP)
• Configuring resource groups
• Editing virtual management settings
• Setting reserved attributes for global-active device
Audit Log Administrator • Viewing audit log information and downloading audit logs
(View Only)
Audit Log Administrator • Configuring audit log settings and downloading audit logs
(View & Modify)
Storage Administrator • Viewing storage system information
(View Only)
Storage Administrator • Configuring settings for storage systems
(Initial Configuration)
The following table shows all the built-in groups, and their built-in roles and
resource groups.
Security Administrator (View & • Security Administrator (View & Modify) All Resource
Modify) • Audit Log Administrator (View & Modify) Groups
• Storage Administrator (View Only) Assigned
Audit Log Administrator (View • Audit Log Administrator (View Only) All Resource
Only) • Storage Administrator (View Only) Groups
Assigned
Audit Log Administrator (View & • Audit Log Administrator (View & Modify) All Resource
Modify) • Storage Administrator (View Only) Groups
Assigned
Storage Administrator (View Only) • Storage Administrator (View Only) meta_resource
Related tasks
• Checking if a role is available to a user group on page 158
You must have the Security Administrator (View Only) role to perform this
task.
Procedure
You can assign users to one or more built-in user groups and custom user
groups. You cannot change roles or resource groups set to the built-in
groups, but you can create custom user groups according to the needs of
your storage environment.
You must have the Security Administrator (View Only) role to perform this
task.
Procedure
Related references
• Built-in groups, roles, and resource groups on page 156
!#$%&'()+-.=@[]^_`{}~
The system can support a maximum of 32 user groups, including the nine
built-in user groups.
Procedure
Procedure
Procedure
Procedure
Procedure
The following figure shows the login workflow with an authentication server:
You can use the authentication server without knowing the host names and
port numbers, if you register the information of the authentication server as
an SRV record in the DNS server. If you register multiple numbers of
authentication servers to the SRV record, you can determine the
authentication server to be used, based on the priority that has been set in
advance.
The following certificate file formats are available for LDAP server settings:
• X509 DER format
• X509 PEM format
One of the following encryption types must be used for the Kerberos server:
Windows
• AES128-CTS-HMAC-SHA1-96
• RC4-HMAC
• DES3-CBC-SHA1
• DES-CBC-CRC
• DES-CBC-MD5
Solaris or Linux
• DES-CBC-MD5
Prerequisite OS
• Windows Server 2003
• Windows Server 2003 R2
• Windows Server 2008
• Windows Server 2008 R2
Prerequisite software
• Active Directory
If you search for a server using information registered in the SRV records in
the DNS server, confirm that the following conditions are satisfied:
Procedure
After entering the user group name, verify that the user group name that you
entered is registered in the authorization server.
Caution: If a user needs to use different user groups for different purposes,
create local user accounts on Device Manager - Storage Navigator. Do not
use the authorization server.
Caution: If you save the configuration file when using the Windows standard
Notepad application, specify ANSI for the letter code. If you use an editor
other than the memo pad and have the YTF-8 BOM setting, specify No BOM
then save.
auth.server.type=ldap
auth.server.name=<server_name>
auth.group.mapping=<value>
auth.ldap.<server_name>.<attribute>=<value>
Required /
Attribute Description Default value
Optional
3. To use symbols such as + ; , < = and >, enter a backslash (\) before each symbol. When
using multiple symbols, each symbol must have a backslash before it. For example, to enter
abc++ in the searchdn field, use \+ instead of + as shown here: abc\+\+
To enter \ , /, or ", enter a backslash and then enter the ASCII code in hex for the following
symbols:
• Enter \5c for \
• Enter \2f for /
• Enter \22 for "
Caution: If you save the configuration file when using the Windows standard
Notepad application, specify ANSI for the letter code. If you use an editor
other than the memo pad and have the YTF-8 BOM setting, specify No BOM
then save.
auth.server.type=radius
auth.server.name=server-name
auth.group.mapping=value
auth.radius.server-name.attribute=value
auth.group.domain-name.attribute=value
Required / Default
Attribute Description
Optional value
\/:,;*?"<>|$%&'˜
auth.radius.server- RADIUS secret key used for PAP or CHAP Required None
name.secret authentication
Notes:
1. If the specified value is not applicable, the default value will be used.
2. Set either NAS-Identifier, NAS-IP-Address, or NAS-IPv6-Address.
Required / Default
Attribute Description
Optional value
Notes:
1. The item can be omitted if true is specified for "auth.ldap.server-name.dns_lookup".
2. If the specified value is not valid, the default value will be used.
3. To use symbols such as + ; , < = and >, enter a backslash (\) before each symbol. When
using multiple symbols, each symbol must have a backslash before it. For example, to enter
abc++ in the searchdn field, use \+ instead of + as shown here: abc\+\+
To enter \ , /, or ", enter a backslash and then the ASCII code in hex for these symbols.
• Enter \5c for \.
• Enter \2f for /.
• Enter \22 for "
Caution: If you save the configuration file when using the Windows standard
Notepad application, specify ANSI for the letter code. If you use an editor
Required /
Attribute Description Default value
Optional
Notes:
1. The item can be omitted if true is specified for "auth.ldap.<server_name>.dns_lookup".
2. If the specified value is not valid, the default value will be used.
3. To use symbols such as + ; , < = and >, enter a backslash (\) before each symbol. When
using multiple symbols, each symbol must have a backslash before it. For example, to enter
abc++ in the searchdn field, use \+ instead of + as shown here: abc\+\+
To enter \ , /, or ", enter a backslash and then the ASCII code in hex for these symbols.
• Enter \5c for \.
• Enter \2f for /.
• Enter \22 for ".
Notes:
1. If the specified value is not valid, the default value will be used.
2. To use symbols such as + ; , < = and >, enter a backslash (\) before each symbol. When
using multiple symbols, each symbol must have a backslash before it. For example, to enter
abc++ in the searchdn field, use \+ instead of + as shown here: abc\+\+
To enter \ , /, or ", enter a backslash and then the ASCII code in hex for these symbols.
Related concepts
• Using an authentication server and authorization server on page 162
Related tasks
• Connecting authentication and authorization servers on page 165
All administrators can connect to the NAS storage system through NAS
Manager, the browser-based management utility provided by the system
management unit (SMU). Additionally, Global Administrators can connect to
the SMU command line interface (CLI).
Procedure
1. Navigate to Home > SMU Administration > SMU Users > SMU Users
to display the SMU Users page.
2. Click add to display the Add SMU User page:
Field/Item Description
Name The name of the new user account. This name will be requested when
logging in to the SMU. The rules for user names are:
• For Global administrators only, if the user will access the SMU
through the CLI, the user name:
User Type The user type. User types are either local or RADIUS.
• Local users are those whose passwords are locally defined and
authenticated in the SMU.
• RADIUS users are those whose passwords are defined and
authenticated in an external RADIUS servers. The RADIUS
administrator must add a user name and password to all RADIUS
servers.
Password Enter the password that will be used when this user account logs in. The
password cannot exceed 256 characters.
This field only applies when the User Type is selected to Local. It does
not apply when the RADIUS User Type is selected.
Confirm Password Confirm the password entered in the previous field by entering it in
again. Only applies when the Local User type is selected.
User Level Specify the level for the new administrator that you are creating. You
can select any one of the following:
• Global Administrators can manage everything in the system: file
systems, file services, or file system related features and functions,
storage devices and their components. Also, the Global Administrator
creates and manages SMU user profiles (Server Administrators,
Storage Administrators, Server+Storage Administrators, and other
Global Administrators). Global Administrators also control what
servers and storage devices each administrator can access.
• Storage Administrators manage storage devices, as specified in
the administrator profile created by the Global Administrator.
Storage Administrators can manage only storage devices and their
components (racks, physical disks, SDs, and storage pools). Storage
Administrators cannot manage file systems, file services, or file
system related features and functions, and they cannot manage
users.
SMU CLI Access If the administrator is allowed to log in and access the SMU CLI of an
(for Global external SMU, select the SMU CLI Access check box.
Administrators
only)
Selected HNAS For Server administrators, lists the servers that the administrator can
Servers manage. Note that a Server administrator cannot manage the storage
attached to these servers. Not available for Global administrators,
because Global administrators are allowed to manage all storage and all
servers.
For Storage administrators, lists servers that have attached storage that
the administrator can manage. Note that a Storage administrator cannot
manage these servers, only the storage attached to these servers.
OK When the profile is complete and correct, click OK to save and enable
the user profile, and then return to the SMU Users page.
cancel Closes the page without saving the profile, and returns to the SMU
Users page.
3. Enter the user name for the new administrator in the Name field.
4. Specify if the administrator login is authenticated locally (by the SMU) or
by a RADIUS server by selecting the appropriate User Type.
5. If the User Type is local, enter the password for the new administrator
in the Password field.
6. If the User Type is local, confirm the password for the new
administrator in the Confirm Password field.
7. Specify the initial login password for the user by filling in the Password
and the Confirm Password fields.
8. Specify the user level for the new administrator that you are creating.
You can select one of the following:
• Global Administrator
• Storage Administrator
• Server Administrator
• Server+Storage
9. For Global Administrators only, if the administrator is allowed to log in
and access the SMU command line interface (CLI) of an external SMU,
select the SMU CLI Access check box.
10. Using the Available Servers and the Selected Servers lists, specify
the servers the administrator can access or the servers with the storage
the administrator can manage.
• To grant management privileges for a server or the storage attached
to a server, move the server from the Available Servers list to the
Selected Servers list.
• To revoke management privileges for a server or the storage attached
to a server, move the server from the Selected Servers list to the
Available Servers list.
• To move the server between the Available Servers and the Selected
Servers lists, select the server, and use the arrow buttons between
the lists.
11. Review the profile, and verify that it is correct.
• If the profile is correct, click OK to save and enable the user profile,
and then return to return to the SMU Users page.
• To return to the SMU Users page without saving the profile, click
back.
Procedure
Field/Item Description
Current Password Displays a series of dots representing the currently specified password
(the actual password cannot be displayed).
New Password The new password. The password cannot exceed 256 characters.
Confirm New The new password again. Must be exactly the same as what you
Password entered in the New Password field.
Procedure
1. Navigate to Home > SMU Administration > SMU Users to display the
SMU Users page.
2. Click details to display the SMU User Details page.
Item/Field Description
User Type Describes if the user is authenticated by the SMU itself (local
users), or if the user is authenticated by a RADIUS server.
Password and Confirm For users authenticated by the SMU only (local users). These
Password fields do not apply for users authenticated by a RADIUS server.
The password for the user. Characters are hidden, and the exact
same password must be entered in both fields. The password
cannot exceed 256 characters.
You cannot change the User Type or User Level of a user. If such a
change is needed, delete the old user and create a new user.
SMU CLI Access For global administrators only, when the check box is selected,
the administrator can access the SMU using the CLI as well as
NAS Manager.
Available HNAS Servers Not available for global administrators, because global
administrators are allowed to manage all storage and all servers.
For server administrators, storage administrators, and server
+storage administrators, lists the HNAS servers managed by the
SMU to which the administrator has not yet been give
management privileges.
Selected HNAS Servers Not available for global administrators, because global
administrators are allowed to manage all storage and all servers.
For server administrators, lists the HNAS servers that the
administrator can manage. Note that a Server administrator
cannot manage the storage attached to these servers.
OK Saves the currently defined user profile and returns to the SMU
Users page.
Cancel Returns to the SMU Users page without saving the profile.
Procedure
1. Navigate to Home > SMU Administration > SMU Users to open the
SMU Users page.
2. Click details to display the SMU User Details page for the user whose
profile you want to modify.
User Type Describes if the user is authenticated by the SMU itself (local
users), or if the user is authenticated by a RADIUS server.
Password and Confirm For users authenticated by the SMU only (local users). These
Password fields do not apply for users authenticated by a RADIUS server.
The password for the user. Characters are hidden, and the exact
same password must be entered in both fields. The password
cannot exceed 256 characters.
You cannot change the User Type or User Level of a user. If such a
change is needed, delete the old user and create a new user.
SMU CLI Access For global administrators only, when the check box is selected,
the administrator can access the SMU using the CLI as well as
NAS Manager.
Available HNAS Servers Not available for global administrators, because global
administrators are allowed to manage all storage and all servers.
For server administrators, storage administrators, and server
+storage administrators, lists the HNAS servers managed by the
SMU to which the administrator has not yet been give
management privileges.
Selected HNAS Servers Not available for global administrators, because global
administrators are allowed to manage all storage and all servers.
For server administrators, lists the HNAS servers that the
administrator can manage. Note that a Server administrator
cannot manage the storage attached to these servers.
OK Saves the currently defined user profile and returns to the SMU
Users page.
Cancel Returns to the SMU Users page without saving the profile.
To edit the user’s password, type the new password in the Password
and Confirm Password fields.
4. For global administrators only, allow or disallow SMU CLI access.
When the check box is selected, the administrator can access the SMU by
using the CLI as well as NAS Manager.
5. Specify server and/or storage management rights.
• To grant management privileges for a server or the storage attached
to a server, move the server from the Available Servers list to the
Selected Servers list.
• To revoke management privileges for a server or the storage attached
to a server, move the server from the Selected Servers list to the
Available Servers list.
• To move the server between the Available Servers and the Selected
Servers lists, select the server, and use the arrow buttons between
the lists.
6. Click OK to save the profile and return to the SMU Users page.
Active Directory users are assigned full access rights to the SMU functionality.
For local and RADIUS users the user profile details are specified when the
user account is created.
After Active Directory connection settings and groups have been configured
for the SMU, it will allow logins from enabled users who supply their Active
Directory name and password. This is typically the same name and password
that the user would use to log into Windows and other enterprise
applications. Unlike SMU local and RADIUS user names, Active Directory user
names are case-insensitive. Active Directory passwords are case-sensitive
and cannot be changed from the SMU; they are maintained in the Active
Directory server.
There are a number of benefits for SMU users. The administrator does not
need to maintain a separate set of user details, because the SMU can just
make use of the Active Directory enterprise user database. Users can login
using their usual name and password instead of having to remember a
separate set of credentials for the SMU. And instead of configuring access for
individual users, the SMU administrator just has to specify the Active
Directory groups whose members have login rights.
Although the SMU supports RADIUS and Active Directory for external
authentication, they are mutually exclusive; it is not possible to have them
both configured for external authentication at the same time.
When a login attempt is made, the SMU first tries to authenticate the
credentials as a local user. If that fails, and Active Directory is configured,
they are authenticated as an Active Directory user.
In order to enable Active Directory use, the SMU administrator needs to know
the following information:
• The domain in which the Active Directory users and groups that will access
the SMU are located.
• The LDAP distinguished name and password of an Active Directory user
that has read access to users and groups on the Active Directory servers.
This is referred to as the Search User. The user can search for users or
groups under the supplied base distinguished name.
• The addresses of one or more Active Directory servers that maintain the
users and groups for the domain. The content of all configured servers
must be identical. If DNS servers have been configured for the SMU, then
the SMU should be able to automatically discover these server addresses
via the find servers button on the setup page. SRV records must be setup
in order for find servers to find the Active Directory servers.
• The Active Directory group or groups whose members are to be given the
right to log into the SMU.
• If RADIUS was previously in use and it is to be replaced by Active
Directory, then the RADIUS configuration must first be removed before
Active Directory can be configured. This is done from the Home>SMU
Administrator>RADIUS Servers page by clicking the remove all
settings button. No RADIUS user will be able to log into the SMU after
this is done.
Procedure
Field/Item Description
Connection settings
Base Distinguished Name The LDAP root location for users and groups. The name is
recommended to contain just the domain components.
Distinguished Name The LDAP distinguished name for a user that has search
capabilities.
Servers
IP Address or DNS Name The address of one or more Active Directory servers for the
domain. Each server should hold identical content. The
maximum number of servers is 20.
find servers Queries DNS to show the list of available Active Directory
servers for the domain.
Add Add an Active Directory server after you have entered its
fully qualified domain name or IP address.
apply Submit the page and save the connection settings and server
list to the SMU database.
Groups
Groups with access to the Shows groups with access to the SMU. Active Directory users
SMU who belong to these groups can access the SMU.
Modify groups Click to go to the Active Directory Groups page, where you
can add groups.
Actions
remove all settings Removes all Active Directory server settings, including server
list, connection settings, search user credentials and groups.
After this action, Active Directory users can no longer log into
the SMU.
○ Select one or more servers and click add to add them to the list. No
more than 20 Active Directory servers can be configured at a time.
○ When you are finished, click close to return to the Active
Directory Servers window.
Note that the administrator is only able to configure groups after Active
Directory servers have been added on the Active Directory Servers page.
Procedure
Field/Item Description
2. Click add and use the Add Active Directory Group page to add
groups.
Field/Item Description
Base Distinguished Name The LDAP root location for users and groups. The name is
recommended to contain just the domain components.
Group Distinguished Name The LDAP root location for users and groups. The name is
recommended to contain just the domain components. Groups
can be added manually by entering their distinguished name and
then pressing the OK button. A maximum of 100 groups can be
added. Alternatively, groups can be added by using the find
group button.
find group Queries the Active Directory to show the list of available groups.
The list can be filtered by entering a partial group name. A
maximum of 1000 group names is displayed.
User Level for Group The user levels that can be assigned to group members are the
Members same as those that can be assigned to local or RADIUS users
and have the same meanings. The default is Global, but the
level can be modified by selecting one of the other radio buttons.
OK Click to save the group details. The SMU checks that the group
exists in Active Directory. If the group does not exist (or if the
SMU failed to access any AD server) the user is asked for
confirmation that they still wish to save it. After saving the
group, the updated group list page is displayed.
cancel Cancels input.
The SMU will perform a test to check the group exists in Active Directory
and displays warning if it is not, giving the user the opportunity to
modify the group.
When displaying the group details, the SMU checks that the group exists
in Active Directory and displays a warning if it does not exist or if it could
not access an Active Directory server. The user level cannot be modified
once the group has been added. In order to modify the user level, the
group would have to be deleted, then added again. Click the cancel
button to return to the Active Directory Groups page.
Field/Item Description
Group Distinguished Name The LDAP root location for users and groups. The name is
recommended to contain just the domain components.
User Level for Group The user levels that can be assigned to group members are the
Members same as those that can be assigned to local or RADIUS users
and have the same meanings. The default is Global , but the
level can be modified by selecting one of the other radio buttons.
OK No details can be modified for a group, so the OK button is
disabled.
cancel Returns to the Active Directory Groups page.
You can specify and prioritize multiple RADIUS servers for authentication.
Note: The SMU contacts RADIUS servers in order of priority; the SMU will
always try to contact higher priority servers before lower priority servers, and
you cannot map SMU users to authenticate through a specific RADIUS server.
Procedure
Field/Item Description
Timeout Specifies the timeout count. The default is 3 seconds. The timeout
is the number of seconds the SMU waits before retrying (retying is
re-transmitting the authentication request to the same RADIUS
server). If the timeout is reached and there is no response from
the first RADIUS server in the list, the SMU attempts another retry.
Retry Count Specifies the retry count. The default is 3. When the retry limit is
reached, the SMU sends the request to the next RADIUS server in
the list. When the retry limit for the second server is reached, the
SMU attempts to reach the next server in the list, until there are no
more servers to try. If the timeout is reached, and there are no
more servers to try, the user cannot be authenticated, and the
login fails.
details Displays the RADIUS Server Details page in which you can view
the details of the selected RADIUS server.
Check All Selects all of the RADIUS servers in the server list.
Clear All Unselects any selected RADIUS servers in the server list.
Increase Priority and Click Increase Priority to increase the server priority. Click
Decrease Priority Decrease Priority to decrease the server priority.
The SMU contacts RADIUS servers in order of priority; the SMU will
always try to contact higher priority servers before lower priority
servers, and you cannot map SMU users to authenticate through a
specific RADIUS server. If you specify an incorrect secret or there
are network problems that prevent the SMU from communicating
with the highest priority RADIUS server, the SMU will try to contact
the secondary RADIUS server, then the third RADIUS server, then
the next server, until the SMU has tried to contact all the RADIUS
servers in the list.
add Opens the Add Server RADIUS page where the properties of the
new server account are defined.
SMU Users Opens the SMU Users page where you can view and add new SMU
users.
Procedure
RADIUS server IP To connect with the RADIUS server, specify an IPv4 or IPv6 address,
address or DNS name or a host name (host name is not recommended). An IP address is
preferred, both because it eliminates the dependency on the network
DNS sever(s), and to improve login performance.
The SMU Network Configuration page (navigate to Home > SMU
Administration > SMU Network Configuration) shows the active
IP addresses. It is recommended that IPv4 on eth0 and the current
IPv6 addresses be added to the "allowed client" list on each RADIUS
server. For more information on setting up the SMU Network
Configuration for IPv6, see the Network Administration Guide.
Port Specify the RADIUS server authentication port. The default RADIUS
server authentication port is 1812, but you should check with the
RADIUS server administrator to make sure that 1812 is the correct
port.
Timeout Specify the timeout, which is the number of seconds the SMU waits
before retrying (retying is re-transmitting the authentication request
Retry Count Specify the retry count. The default is 3. When the retry limit is
reached, the SMU sends the request to the next RADIUS server in the
list. When the retry limit for the second server is reached, the SMU
attempts to reach the next server in the list, until there are no more
servers to try. If there are no more servers to try, the user cannot be
authenticated, and the login fails.
OK When you are done making changes, click OK to test connectivity and
save the configuration for this RADIUS server and return to the
RADIUS Servers page.
Procedure
Field/Item Description
Timeout The number of seconds the SMU waits before retrying (retrying
is re-transmitting the authentication request to the same
RADIUS server). If the timeout is reached and there is no
response from the first RADIUS server in the list, the SMU
attempts another retry.
Retry Count When the retry limit is reached, the SMU sends the request to
the next RADIUS server in the list. When the retry limit for the
second server is reached, the SMU attempts to reach the next
server in the list, until there are no more servers to try. If the
timeout is reached, and there are no more servers to try, the
user cannot be authenticated, and the login fails.
Check connectivity Click to check the connectivity status of the RADIUS server.
You can use a Secure Sockets Layer (SSL) certificate, HCS certificate, or both
to create a secure, encrypted connection between the SVP and the storage
system.
Note: Ensure that you register or delete the correct certificate. Otherwise,
HCS external authentication will not return.
Procedure
Procedure
SSL certificates consist of small data files that digitally bind a cryptographic
key to an SVP's log on credentials. When installed on the SVP, SSL activates
the padlock and the HTTPS protocol, allowing secure connections between the
SVP and the storage system.
Procedure
Procedure
Example
The following example shows the contents of a command window when you
create a public key.
......++++++
..++++++
is 65537 (0x10001)
C:\key>c:\openssl\bin\openssl req -sha256 -new -key server.key -
config c
You are about to be asked to enter information that will be
incorporated into your certificate request. What you are about
to enter is what is called a Distinguished Name or a DN.
\openssl\bin\openssl.cfg -out server.csr
For some fields there will be a default value.
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [AU]:JP
State or Province Name (full name) [Some-State]:Kanagawa
Note: When you send a request to a certificate authority, specify the SVP as
the host name.
This command creates a server.crt file in the c:\key folder, which is valid
for 10,000 days. This is the signed private key, which is also referred to as a
self-signed certificate.
Procedure
Procedure
Procedure
You must have the Storage Administrator (View & Modify) role to complete
this procedure.
Procedure
Procedure
4. Browse to the certificate file and click Open. The File Upload window
closes and returns you to the Update Certificate Files dialog box.
5. In the Web Server Password: field, enter the certificate password.
6. Enter the password again in the Web Server Re-enter Password: field.
7. Select a Connect to SVP certificate file to update. Click the Connect to
SVP checkbox, then click Browse.
8. Browse to the certificate file and click Open. The File Upload window
closes and returns you to the Update Certificate Files dialog box.
9. In the Connect to SVP Password: field, enter the certificate password.
10. Enter the password again in the Connect to SVP Re-enter Password:
field.
11. Click Apply to update the certificates.
The SMU can be configured to control the hosts that can access the SMU and
auxiliary devices managed by the SMU.
Procedure
Field/Item Description
Web Application This section allows you to change web application security settings.
Security Settings
Enable HTTPS By default, all HTTPS protocols are enabled, and the boxes next to the
Protocols protocols are checked. Uncheck the check box next to a protocol to
change its state to disabled. Leave at least one protocol enabled that
your browser supports.
Enabled Cipher By default, all cipher suites are enabled and are shown in the Enabled
Suites Cipher Suites list box.
Disabled Cipher To disable cipher suites, use the arrow to move selected cipher suites to
Suites the Disabled Cipher Suites list box. Leave at least one cipher suite
enabled that your browser supports.
apply Click apply to save your changes.
Note: Take care before disabling cipher suites, because not all
cipher suites are supported by all browsers.
Note: Take care before disabling HTTPS protocols, because not all
HTTPS protocols are supported by all browsers.
• Syslog: Check the messages on the Syslog server to view alert information
sent there.
• SNMP traps: To view SNMP trap information, use the SNMP Manager in
Device Manager - Storage Navigator. See the Hitachi SNMP Agent User
Guide for information about using SNMP traps.
Procedure
Procedure
1. To send email notices, click Enable, next to Email Notice. Click Disable
to not send email notices.
2. Click Add to add an email address to the list of registered addresses.
3. Enter the email address and then use the pull-down menu to select the
type of address: To, Cc, or Bcc.
4. Click OK to save the email address and close the dialog box.
5. Enter an email address in Email Address (From).
6. Enter an email address in Email Address (Reply To:).
7. In Mail Server Settings, select the mail server type: Identifier, IPv4,
or IPv6.
8. To use SMTP authentication, click Enable.
9. In Account, enter an SMTP account name.
10. In Password, enter the SMTP account password.
11. Click Apply to save the changes and close the Set Up Alert
Notifications window.
Syslog settings
Procedure
Procedure
Procedure
The field definitions in the test email message are listed in the following
table.
Item Description
RefCode Reference code. The same code as the one reported by SNMP traps.
Detail Failure details. The same information as the one reported by SNMP traps.
See the Hitachi SNMP Agent User Guide for reference codes and failure
details.
Procedure
Procedure
Procedure
Note:
• C:\Mapp indicates the installation directory of Device
Manager - Storage Navigator. If you specified another
directory, replace C:\Mapp: with the specified installation
directory.
• Without moving the current directory, failure information is
not output to the Windows event log if you execute the batch
file in step 3.
Procedure
1. From the Windows start menu, click Control Panel > System and
Security > Administrative Tools > Event Viewer.
2. Click Windows Logs > Application in the left pane.
9 Logged Displays the date and time when the event log
was registered
*For reference code, failure details, and alert level, see the SNMP failure trap reference code
section in the Hitachi SNMP Agent User Guide.
□ Overview
□ Managing licenses
If you do not install the software before you install the license key software,
the software will install correctly but will be disabled. To enable a license key,
install the prerequisite software, and then enable the key.
You can use software with licensed capacity for a term key by installing a
term key and overwriting a permanent key as long as the term key is valid. If
the term key expires when the system is being used, and the capacity
needed for the operation is insufficient, operations that you can perform are
limited. In this case, a SIM that indicates the term key expiration (reference
code 7ff7xx) is output on the Alerts tab in the Storage Systems window.
The following table describes the four types of license keys.
Estimating
Effective
Type Description licensed
term1
capacity
• The number of effective days is decremented by one day when the date
changes.
For example, if the term key is set to be enabled for 150 days during
installation and the term key is disabled for 100 days and a total of 250
days have elapsed since the installation, the number of remaining effective
days of the term key is 215 days. This is determined by subtracting 150
days from 365 days. By disabling the term key on the days when the
software application is not used, you can prevent the unnecessary
shortening of the period in which the term key can be used.
• If the term key is expired, Not Installed displays in the status field of the
License Keys window, and the software application is disabled.
If you uninstall the temporary key, even though the effective term remains,
Temporary is displayed in the status field, Not Installed is displayed in the
Key Type field, and the remaining days of the effective term are displayed in
the Term (Days) field of the License Keys window.
If the temporary key expires, you cannot reinstall the temporary key for 180
days. Expired displays in the status field of the License Keys window, and
the software application is disabled.
Caution:
• If an emergency key is installed for a software application for which a
permanent or term key is installed, the effective term of the license key is
30 days. However, because the emergency key can be reinstalled during
the effective term, the effective term can be restored to 30 days.
• In other scenarios, the emergency key can be installed only once.
For example: You install a term key that has a license capacity of 5 TB for
Compatible FlashCopy®, and when the term expires, you use an emergency
key. In license-related windows, 5 TB is displayed in the Permitted (TB) field.
However, in the Licensed Capacity field in a Replication window, Unlimited
(capacity of the emergency key) is displayed.
Managing licenses
Use the Licenses window in the maintenance utility to install and uninstall
block license keys.
Related tasks
• Enabling a license on page 235
• Disabling a license on page 235
• Removing a software license on page 236
Related references
• Examples of license information on page 237
Procedure
Field/Item Description
File License Key Enables the user to manually enter the license key.
File License Key Enables the user to import a license key from a file.
File Name
Block License Enables the user to import a software application license key from a file.
Key File Name
For a file license, you can either enter the key manually or import it from
a file. For a block license, you can only import the key from a file:
• To enter the key manually, type it in the field, then click add.
• To import the key, click Choose File / Browse, navigate to the file,
select the key file, then click Import.
After all the keys have been entered or imported, they will be displayed
on the License Keys page. Follow the instructions to reboot the system
(if necessary).
Procedure
Enabling a license
You can enable a license that is in disabled status.
Procedure
1. From the Maintenance Utility menu, click License Keys to open the
License Keys window.
2. Select the license to enable. You can select from one to all of the licenses
listed in the window at the same time.
3. Click Enable to display the License Keys window.
4. Check the settings and click Apply.
Disabling a license
You can disable a license that is in enabled status.
Procedure
1. From the Maintenance Utility menu, click License Keys to open the
License Keys window.
Procedure
Related tasks
• Removing a Data Retention Utility license on page 236
Caution: When you remove a Data Retention Utility license, an error might
occur, even if the Permitted Volumes column of the License Keys window
indicates that the licensed capacity is 0 TB.
Procedure
1. Click Actions > Other Function > Data Retention to open the Data
Retention window.
2. In the Data Retention window, find logical volumes that are unusable
as S-VOLs.
3. Change the settings so that the logical volumes are usable as S-VOLs.
4. Uninstall the Data Retention Utility.
After your license key expires, no new configuration settings can be made,
and no monitoring functions can be used with Performance Monitor.
Configuration settings made before the expiration of the license key remain
in effect. You can cancel configuration changes for some software.
The Audit Log Settings window shows the current audit log settings. Select
one of more of the three tabs to change the settings.
Related tasks
• Setting up a syslog server on page 240
• Exporting an audit log on page 241
• Sending a test Syslog message on page 223
You must have the Audit Log Administrator (View & Modify) role to perform
this task.
Procedure
You must have the Audit Log Administrator (View Only) role to perform this
task.
Procedure
3. To open the file without saving, click Open with and then use the pull-
down menu to select the software application to use to open the file.
4. Click OK. The auditlog.txt file is displayed.
5. To save the file, click Save File.
6. To use one of the two settings in steps 3 through 5 when you export an
another auditlog.txt file, click Do this automatically for files like this
from now on.
7. Click OK.
8. Browse to the directory where you want to save the file. Use the default
file name auditlog.txt or change the file name as desired.
Click Save. The file is saved and the dialog box closes.
9. Browse to the directory where you want the file. Use the default file
name auditlog.txt or change the file name as desired.
You must have the Audit Log Administrator (View Only) role to perform this
task.
Procedure
3. Click OK to close the message box. Check the syslog server messages
and verify that the test message was received and is on the server.
Procedure
Procedure
Procedure
Users that create the report or users with the Storage Administrator (Initial
Configuration) role can delete a configuration report.
Procedure
Note:
• A space is required between Dump_Detail.bat and C:\Result.
• The dump file name is hdcp.tgz. To manage dump files by
storage systems, we recommend adding a serial number to the
output folder name. For example, if the serial number is
832000400001, the folder name should be C:
\Result_832000400001.
• When the tool is being executed, is displayed in the command
prompt. When the execution is completed, is displayed.
"Executing..."
"zSv_AutoDump.exe is completed."
□ raidinf -login
□ raidinf -logout
□ raidinf -h
Raidinf command reference (obtaining configuration reports and tier relocation logs) 249
System Administrator Guide
raidinf command list and command description
The following table lists the raidinf commands and symbols.
Command Description
Symbol Description
-A | -B
Specifies -A or -B.
[] The enclosed item can be omitted. If some items are delimited
by the vertical bar, specify one item or omit all items.
Square brackets
For example:
[ -A ]
[ -a | -b ]
250 Raidinf command reference (obtaining configuration reports and tier relocation logs)
System Administrator Guide
Symbol Description
raidinf -login
Syntax
raidinf -login <user_name> <password> -servername {<hostname> |
<ipaddress>} [-port <port>] [-serial <serial>]
Option Description
[-port <port>] If you have changed the TCP port number for raidinf, specify the
new TCP port number. If omitted, TCP port number will perform by
specifying the initial value (5443). For operations after login (such
as report creation), the port number used for login will be used.
Therefore, specifying the port number will not be necessary for the
operations after login.
[-serial <serial>] If two or more DKCs are managed by the SVP, this is specified to
identify the system to execute the raidinf command. You cannot
omit this option if two or more DKCs are managed by the SVP.
In operations after the log in, such as report creation, use the
serial number specified when logging in. You do not need to specify
the serial number after the log in.
Examples
This example authenticates user01 using the password xxxxxx:
# raidinf -login user01 xxxxxx -servername svp.xxx.co.jp
This example authenticates user01 using the password xxxxxx with TCP port
number 6443:
# raidinf -login user01 xxxxxx -servername svp.xxx.co.jp -port
6443
Raidinf command reference (obtaining configuration reports and tier relocation logs) 251
System Administrator Guide
This example authenticates user01 using the password xxxxxx with TCP port
number 6443 and serial number 430123:
# raidinf -login user01 xxxxxx -servername svp.xxx.co.jp -port
6443 -serial 430123
If other users have created 20 reports, the logged in user cannot create a
report and will receive an error.
Syntax
raidinf add report -servername {<hostname> | <ipaddress>} [-
report <report_name>]
Option Description
Examples
The following example creates a report with the default report name:
# raidinf add report -servername 10.213.74.121
252 Raidinf command reference (obtaining configuration reports and tier relocation logs)
System Administrator Guide
The user name is displayed (up to 16 characters). If the user name
exceeds 16 characters, an ellipsis (...) is displayed.
• CreateTime
The time of creating a report is displayed (up to 19 characters).
If multiple reports of the same name exist, the command deletes the oldest
report. If the specified report does not exist, the command does nothing, and
terminates normally.
Syntax
raidinf delete report -servername {<hostname> | <ipaddress>}
{-report<report_name> | -report_id
<report_id>} [-fill]
Option Description
-servername {<hostname> | Specifies the host name or the IP address of the SVP.
<ipaddress>}
Examples
The following example deletes the report named 101009-
CreateConfigurationReport:
# raidinf delete report -servername 10.213.74.121 -report 101009-
CreateConfigurationReport
Raidinf command reference (obtaining configuration reports and tier relocation logs) 253
System Administrator Guide
raidinf download report
The raidinf download report command downloads a report.
The name of the downloaded file is Report_report name.tgz. The files are
overwritten if reports of the same name has already existed.
Example: the name of the downloaded file when the report name is 110309-
CreateConfigurationReport
Report_110309-CreateConfigurationReport.tgz
Syntax
raidinf download report -servername {<hostname> | <ipaddress>}
{-report <report_name> | -report_id <report_id>}
-targetfolder <folder>
Option Description
-servername {<hostname> | Specifies the host name or the IP address of the Web server (SVP).
<ipaddress>}
Examples
The following example shows how to download the most recent report:
# raidinf download report -servername 10.213.74.121
-report LatestReport -targetfolder C:\tmp
254 Raidinf command reference (obtaining configuration reports and tier relocation logs)
System Administrator Guide
The following example shows how to download the report named 101009-
CreateConfigurationReport:
# raidinf download report -servername 10.213.74.121
-report 101009-CreateConfigurationReport -targetfolder C:\tmp
Syntax
raidinf get reportinfo -servername {<hostname> | <ipaddress>}
Option Description
-servername {<hostname> | Specifies the host name or IP address of the web server.
<ipaddress>}
Examples
The following example displays a list of reports:
# raidinf get reportinfo -servername 10.213.74.121
Raidinf command reference (obtaining configuration reports and tier relocation logs) 255
System Administrator Guide
The report ID is displayed.
If another user has already generated a tier relocation log, an error occurs if
a tier relocation login user tries to obtain tier relocation logs. When this
happens, you must delete the existing tier relocation logs.
Syntax
raidinf add relocationlog -servername {<hostname> | <ipaddress>}
-logname <logname>>
Option Description
[-logname <logname>>] Specifies the tier relocation log name, up to 32 characters. All
characters exceeding 32 are ignored.
Examples
The following example generates a tier relocation log with the default log
name:
# raidinf add relocationlog -servername 10.213.74.121
RelocationLogName CreateTime
160201-400001-RelocationLog 2016/02/01-12:43:10
256 Raidinf command reference (obtaining configuration reports and tier relocation logs)
System Administrator Guide
raidinf download relocationlog
The raidinf download relocationlog command is used to download a tier
relocation log.
Log_160201-400001-RelocationLog.tgz
Syntax
raidinf download relocationlog -servername {<hostname> |
<ipaddress>}
-logname <logname>> -targetfolder <folder>
Option Description
[-logname <logname>>] Specifies the tier relocation log name, up to 32 characters. All
characters exceeding 32 are ignored.
If you specify LatestLog as the tier relocation log name, the log
with the most recent date is downloaded.
-targetfolder <folder> Specifies a folder name to which a tier relocation log is
downloaded. The folder whose name you specify must already
exist, and you must have write permissions to the folder.
Examples
The example below shows how to download the log with the most recent
date. In the following example, Log_160201-400001-RelocationLog.tgz is
downloaded to C:\tmp:
# raidinf download relocationlog -servername 10.213.74.121 –
logname LatestLog -targetfolder C:\tmp
The example below shows how to download the tier relocation log by
specifying the tier relocation log name, 160201-400001-RelocationLog. In
Raidinf command reference (obtaining configuration reports and tier relocation logs) 257
System Administrator Guide
the following example, Log_160201-400001-RelocationLog is downloaded to
C:\tmp:
# raidinf download relocationlog -servername 10.213.74.121 -
report
160201-400001-RelocationLog -targetfolder C:\tmp
Syntax
raidinf delete relocationlog -servername {<hostname> |
<ipaddress>}
-logname <logname>>
Option Description
[-logname <logname>>] Specifies the tier relocation log name, up to 32 characters. All
characters exceeding 32 are ignored.
If you specify LatestLog as the tier relocation log name, the log
with the most recent date is deleted.
Examples
The following example deletes the tier relocation log with the most recent
date:
# raidinf delete relocationlog -servername 10.213.74.121 –
logname LatestLog
The example below shows how to delete the tier relocation log by specifying
the tier relocation log name, 160201-400001-RelocationLog. In the
following example, 160201-400001-RelocationLog is deleted in the SVP:
# raidinf delete relocationlog -servername 10.213.74.121 –report
160201-400001-RelocationLog
258 Raidinf command reference (obtaining configuration reports and tier relocation logs)
System Administrator Guide
Syntax
raidinf delete relocationlog -servername {<hostname> |
<ipaddress>}
Option Description
Examples
The example below shows how to generate a tier relocation log by specifying
the tier relocation log name, 160201-400001-RelocationLog.
# raidinf add relocationlog -servername 10.213.74.121 -report
160201-400001-RelocationLog
RelocationLogName CreateTime
160201-400001-RelocationLog 2016/02/01-12:43:10
The example below shows the script for checking if the tier relocation log was
created by using the raidinf get relocationloginfo command. In this
example, if the creation of the tier relocation log was completed successfully,
the tier relocation log is downloaded.
REM
REM Create Completed Relocation Log
Script(CreateCompletedRelocationLog.bat)
REM
SET SERVER= <hostname-or-IP-address-of-SVP>
SET LOG_NAME=DailyRelocationLog
raidinf get relocationloginfo -servername %SERVER% | find
"%LOG_NAME%"
>NUL
if not ERRORLEVEL 1 raidinf download relocationlog -servername
%SERVER% -targetfolder C:\tmp -logname "%LOG_NAME%"
raidinf -logout
The raidinf -logout command is used for logging out from Device Manager
- Storage Navigator.
Syntax
raidinf -logout -servername {<hostname> | <ipaddress>}
Raidinf command reference (obtaining configuration reports and tier relocation logs) 259
System Administrator Guide
Options and parameters
Option Description
-servername {<hostname> | Specifies the host name or the IP address of the SVP.
<ipaddress>}
Example
# raidinf -logout -servername mapp.xxx.co.jp
raidinf -h
The raidinf -h command is used to display the syntax..
Syntax
raidinf -h
Option Description
260 Raidinf command reference (obtaining configuration reports and tier relocation logs)
System Administrator Guide
B
Storage configuration reports
This chapter describes the configuration reports you can generate in Device
Manager - Storage Navigator. They are grouped in this appendix according to
the way they display: in tables, graphs, or CSV files.
□ CSV files
Item Description
Number of LDEVs The number of the logical volumes that are inaccessible from the host and belong to
(Unallocated) the parity groups controlled by the disk board.
Total LDEV Capacity (MB) Total capacity of the logical volumes belonging to the parity groups that the disk board
controls.
Unallocated LDEV Capacity Total capacity of the logical volumes that are inaccessible from the host and belong to
(MB) the parity groups controlled by the disk board.
Item Description
Host Group Name / iSCSI Name of the host group / alias of the iSCSI target
Target Alias
Host Group ID / iSCSI Target Number of the host group / ID of the iSCSI target
ID
Resource Group Name Resource Group Name where the host group belongs
Number of LDEVs The number of logical volumes that are accessible from the hosts in the host group
Number of PGs The number of parity groups with logical volumes that are accessible from the hosts in
the host group
Number of DKBs The number of disk boards controlling the parity groups where the logical volumes
that are accessible from the hosts in the host group belong
Total LDEV Capacity (MB) Total capacity of the logical volumes accessible from the hosts in the host group. This
is the total capacity of LDEVs referred to in "Number of LDEVs".
Authentication : Number of The number of authenticated users registered in the iSCSI target
Users
Host Mode Option Host mode option of the host group. Host mode options are separated by semicolons
(;) when more than one option is specified.
Hosts report
The following figure shows an example of a hosts report. The table following
the figure describes the items in the report. When a host is registered to
more than one port, more than one record shows information about the same
host.
Item Description
Host Group Name / iSCSI Name of the host group / alias of the iSCSI target
Target Alias
Host Mode Option Host group host mode option. When more than one host mode option is specified,
they are separated by semicolons (;)
Host Name Name of the host that can access the LU path through the port
HBA WWN / iSCSI Name Host WWN / host iSCSI name. The name is in 16-digit hex format.
Item Description
For mainframe volumes and multi-platform volumes, "Y" is displayed unless the
volumes are in the reserved status.
SSID SSID of the logical volume
CVS Information about whether the logical volume is a customized volume
OCS Oracle checksum
Attribute The attribute of the logical volume
Provisioning Type Provisioning type of the logical volume
Pool Name • For V-VOLs of Dynamic Provisioning, the name of the pool related to the logical
volume is displayed1
• If the logical volume attribute is Pool, the name of the pool where the logical
volume belongs is displayed
• When neither of the above are displayed, the pool name is blank
Pool ID The ID of the pool indicated by "Pool Name" A hyphen (-) displays for volumes other
than pool-VOLs or V-VOLs
Current MPU The number of the MP unit that currently controls the logical volume
Setting MPU The number of the MP unit that you specified to control the logical volume
Command Device: Security Indicates whether Security is specified as the attribute for the command device. A
hyphen (-) displays when "Attribute" is not "CMDDEV".
Command Device: Indicates whether User Authentication is specified as the attribute for the command
device. A hyphen (-) displays when "Attribute" is not "CMDDEV".
User Authentication
Command Device: Indicates whether Device Group Definition is specified as the attribute for the
command device. A hyphen (-) displays when "Attribute" is not "CMDDEV".
Device Group Definition
Encryption Indicates whether the parity group to which the LDEV belongs is encrypted.
• For internal volumes: Enabled (encrypted) or Disabled (not encrypted)
• For external volumes: blank
T10 PI Indicates the T10 PI attribute set for the LDEV.
• Enabled
• Disabled
• Blank if the emulation type is not OPEN-V
ALUA Mode Indicates whether the ALUA mode is enabled:
• Enabled: ALUA mode is enabled.
• Disabled: ALUA mode is disabled.
Notes:
1. A hyphen (-) displays if the LDEV is an external volume.
Item Description
MP Units report
The following figure shows an example of an MP units report. The table
following the figure describes the items in the report.
MP Unit ID MP unit ID
Auto Assignment Auto assignment attribute for the MP unit
Number of Resources (LDEV) Number of LDEVs that the MP unit controls
Number of Resources Number of journals that the MP unit controls
(Journal)
Number of Resources Number of external volumes that the MP unit controls (includes volumes for FICON
(External Volume) DM)
Number of Resources (Total) The total number of resources that the MP unit controls. It is the total of Number of
Resources (LDEV), Number of Resources (Journal), and Number of Resources
(External Volume).
MP Unit ID MP unit ID
Auto Assignment Auto assignment attribute for the MP unit
Resource ID ID of this resource that the MP unit controls
Resource Name The name of the resource that the MP unit controls. If "Type" is LDEV, the LDEV name
that is set is displayed. A hyphen (-) displays for journal volumes or external volumes.
Type The type of the resource that the MP unit controls
Item Description
Drive Type-Code The type code of the drive in the parity group.
• The type code of the first drive in the parity group.
• If the parity group contains external volumes, the drive type code displays the
vendor, the model, and the serial number of the storage system.
• Separated by semicolons (;) if multiple drive types are set.
Drive Type/RPM Drive type and revolutions-per-minute (RPM) of the drive in the parity group1
A hyphen (-) is displayed instead of the RPM when the drive is an SSD.
Drive Capacity Capacity of the drive in the parity group1
RAID Concatenation #0 The number indicating a parity group #0 connected to this parity group1,2
RAID Concatenation #1 The number indicating a parity group #1 connected to this parity group1,2
RAID Concatenation #2 The number indicating a parity group #1,2 connected to this parity group1,2
Encryption Indicates whether the parity group is encrypted.
• For internal volumes: Enabled (encrypted) or Disabled (not encrypted)
• For external volumes: A hyphen (-) is displayed
Accelerated Compression Accelerated compression of the parity group
• If accelerated compression is supported, Enabled or Disabled is displayed.
• If accelerated compression is not supported, a hyphen (-) is displayed.
Notes:
1. A hyphen is displayed if the parity group contains external volumes.
2. A hyphen is displayed if the parity group is not connected with another parity group or if the parity group
contains external volumes including volumes for FICON DM.
A hyphen (-) is displayed instead of the RPM when the drive type is an SSD.
RAID Concatenation#0 Number indicating a parity group #0 connected to this parity group
Output example: 2-1, 3-1, 4-1
RAID Concatenation#1 Number indicating a parity group #1 connected to this parity group
Output example: 2-1, 3-1, 4-1
RAID Concatenation#2 Number indicating a parity group #2 connected to this parity group
Output example: 2-1, 3-1, 4-1
Resource Group Name Name of resource group to which the parity group of physical devices belong
Encryption Enable or disable status of the parity group to which the physical devices belong
• Enabled: Encryption is enabled.
• Disabled: Encryption is disabled.
Item Description
Fabric One of the Fibre topology settings indicating the setting status of the Fabric switch
IPv6 : Link Local Address IPv6 link local address of the port (16-digit hexadecimal)
iSNS Server : TCP Port Number of the TCP port used in iSNS (binary)
Number
Address (Loop ID) Fibre port address and Loop ID of the port
SFP Data Transfer Rate Maximum transfer rate of SFP which the mounted package supports.
• 8G
• 10G
• 16G
• 32G
• Blank if the Package Type is 10iSCSI2c (CHB) or NAS module (CHB).
T10 PI Mode Indicates whether the T10 PI mode can be applied to the port.
• Enabled
• Disabled
• Blank if the port type is a Fibre port other than 16FC2(CHB). For iSCSI ports, a
hyphen (-) is displayed.
Resource Group Name Name of the resource group to which the port belongs
Resource Group ID ID for the resource group to which the port belongs (0 to 1023)
Number of LDEVs The number of the logical volumes that can be accessed through the port
Number of PGs The number of the parity groups having the logical volumes that can be accessed
through the port
Number of DKBs The number of the disk boards controlling the parity group that contains the logical
volumes that can be accessed through the port
No records are created during a system power failure or if the breakers are
turned off. If the system is in maintenance mode or the SVP is rebooted, up
to two hours of records could be lost.
If a failure occurs in the storage system, the correct information might not be
output.
Item Description
Date and Time Date and time when power consumption and
temperature were recorded for the two-hour
period
Power Consumption Average (W) Average of the power consumption
Power Consumption Maximum (W) Maximum of the power consumption
Power Consumption Minimum (W) Minimum of the power consumption
TEMP:DKC0-Cluster1 Average (degrees C) Average temperature of DKC0:CL1
TEMP:DKC0-Cluster1 Maximum (degrees C) Maximum temperature of DKC0:CL1
Figure 11 Channel Boards report (VSP G400, G600, VSP F400, F600)
It also shows the storage system type, serial number, and software version.
You can check the legend for disk units, such as SAS, SSD, Spare, Free, or
Not Installed.
CSV files
This topic describes reports that are saved in CSV format.
AllConf.csv
This is the concatenated file of all the csv files.
Item Content
Location Name of the cache controller board on which the memory is installed
CMG#0 Size (GB) Cache memory capacity in the controller board per CMG (16/32/64/128/ blank). The
number of CMG differs by model and the displayed items are different.
CMG#1 Size (GB) • VSP G200: Only CMG#0 Size displays
• VSP G400, G600, G800 or VSP F400, F600, F800: CMG#0 Size and CMG#1 Size
display
Depending on the installed number of the cache memory (DIMM), one of the CMG
capacities might be blank for VSP G400, G600, G800 or VSP F400, F600, F800.
Cache Size (GB) Total cache memory capacity on the controller board (0 to 256)
SM Size (MB) The capacity that cannot be used as data cache memory in the total cache memory
capacity inside of the controller board.
Includes the shared memory capacity, cache directory capacity, and the fixed capacity.
Fixed capacity is the cache memory capacity that is used for controlling the storage
system with the controller board.
Depending on the installed CFM number, one of the CFM types might be displayed as
blank.
Information about the NAS module is not displayed in this CSV file.
Unified Hypervisor Cache The cache memory capacity (blank/16/32/64) (Unit: GB) assigned for Unified
Size (GB) Hypervisor usage within the total cache memory capacity in controller board.
• Blank if Unified Mode of DkcInfo.csv is Off.
ChapUserInfo.csv
This CSV file contains information about the iSCSI CHAP authenticated user
registered to the port in the channel board. A record is created for each
target related to the CHAP authenticated user. Information about the NAS
module is not displayed in this CSV file.
Item Content
ChaStatus.csv
This CSV file contains information about the status of each channel board
(CHB). A record is created for each CHB.
Item Content
CHB Location CHB name (CHB-1A/1B/1C/1D or CHB-2A/2B/2C/2D if Package Type is NAS module)
PCB Status Status of this CHB1 (Blank if CHB location is CHB-1A/1B/1C/1D or CHB-2A/2B/2C/2D
in NAS module)
Port#00, #01, …, #03 Status of ports on this CHB (Blank if CHB location is CHB-1A/1B/1C/1D or
CHB-2A/2B/2C/2D in NAS module)
Notes:
1. 1 Normal, 0: Abnormal
DeviceEquipInfo.csv
This CSV file contains information about equipment and devices that are part
of the storage system, including power supplies and batteries for DKC, DB,
and CHBB. A record is created for each device.
Item Content
DkaInfo.csv
This CSV file contains information about disk boards (DKBs). A record is
created for each DKB.
Item Content
Output example:
• Unecryption DKB (2Port)
• Encryption EDKB (2Port)
DkaStatus.csv
This CSV file contains information about the status of disk boards (DKBs). A
record is created for each DKB.
Item Content
DkcInfo.csv
This CSV file contains information about the DKC. A record is created for each
module.
When Module #1 is not installed, the record for Module #1 is not created.
Item Content
Output example:
• G2001
• VSP G400, G600 and VSP F400, F6002
• VSP G800 and VSP F8003
Serial Number # Serial product number (decimal, from 400001 to 499999)
IP Address IP address
• To determine whether the model type is VSP G400, VSP F400, VSP G600, or VSP F600, see PpInfo.csv on
page 326.
○ VSP G400: Install is Disabled for both Model upgrade license and All Flash Array
○ VSP F400: Install is Disabled for Model upgrade license and Install is Enabled for All Flash Array
○ VSP G600: Install is Enabled for Model upgrade license and Install is Disabled for All Flash Array
○ VSP F600: Install is Enabled for both Model upgrade license and All Flash Array
• To determine whether the model type is VSP G800 or VSP F800, see PpInfo.csv on page 326.
○ VSP G800: Install is Disabled for All Flash Array
○ VSP F800: Install is Enabled for All Flash Array
DkuTempAveInfo.csv
This CSV file contains information about DB temperature for every two hours.
A record is DB temperature information obtained from the environment
monitor. A record output to the first line shows the latest temperature
information. Because DB temperature information is measured by DBPS,
items are displayed in this unit*.
If the system is in maintenance mode or the SVP is rebooted, the data that is
output every two hours might not contain data for the period. If a failure
occurs in the storage system, the correct information might not be output.
Item Description
YYYY/MM/DD hh:mm:ss
DB00 DBPS001 Average temperature (°C) for the two-hour
period of DB00 DBPS001
Temperature average
DB47 DBPS472 Average temperature (°C) for the two-hour
period of DB47 DBPS472
Temperature average
For VSP G200, item shows up to DB07 DBPS072.
Note: An item name is displayed as DBxx DBPSxxy. The names are listed in
ascending order of the DB number. See DkuTempInfo.csv on page 300 for
locations and values for DBxx and DBPSxxy.
DkuTempInfo.csv
This CSV file contains information about DB temperature for every two hours.
A record is DB temperature information obtained from the environment
monitor. A record output to the first line shows the latest temperature
information. Because DB temperature information is measured by DBPS,
items are displayed in this unit*.
If the system is in maintenance mode or the SVP is rebooted, the data that is
output every two hours might not contain data for the period. If a failure
occurs in the storage system, the correct information might not be output.
Item Description
YYYY/MM/DD hh:mm:ss
DB00 DBPS001 Average temperature (°C) for the two-hour
period of DB00 DBPS001
Temperature average
DB00 DBPS001 Maximum temperature (°C) for the two-hour
period of DB00 DBPS001
Temperature maximum value
DB00 DBPS001 Minimum temperature (°C) for the two-hour
period of DB00 DBPS001
Temperature minimum value
DB47 DBPS472 Average temperature (°C) for the two-hour
period of DB47 DBPS472
Temperature average
For VSP G200, item shows up to DB07 DBPS072.
*Note: An item name is displayed as DBxx DBPSxxy. The names are listed in
ascending order of the DB number.
The following tables list DBxx and DBPSxxy: xx values, where xx is a value
from 00 to 07 (VSP G200), 00 to 23 (VSP G400, G600, VSP F400, VSP F600),
or 00 to 47 (VSP G800, VSP F800).
DB # 0 1 2 3 4 5
xx 00 01 02 03 04 04
xx 42 43 44 45 46 47
The following table lists the DBPSxxy: y values (where DB# is 0 and xx is 00)
DB# 0
y 1 2
DkuTempMaxInfo.csv
This CSV file contains information about DB temperature for every two hours.
A record is DB temperature information obtained from the environment
monitor. A record output to the first line shows the latest temperature
information. Because DB temperature information is measured by DBPS,
items are displayed in this unit*.
If the system is in maintenance mode or the SVP is rebooted, the data that is
output every two hours might not contain data for the period. If a failure
occurs in the storage system, the correct information might not be output.
Item Description
YYYY/MM/DD hh:mm:ss
DB00 DBPS001 Maximum temperature (°C) for the two-hour
period of DB00 DBPS001
Temperature maximum value
DB47 DBPS472 Maximum temperature (°C) for the two-hour
period of DB47 DBPS472
Temperature maximum value
For VSP G200, item shows up to DB07 DBPS072.
Note: An item name is displayed as DBxx DBPSxxy. The names are listed in
ascending order of the DB number. See DkuTempInfo.csv on page 300 for
locations and values for DBxx and DBPSxxy.
DkuTempMinInfo.csv
This CSV file contains information about DB temperature for every two hours.
A record is DB temperature information obtained from the environment
monitor. A record output to the first line shows the latest temperature
information. Because DB temperature information is measured by DBPS,
items are displayed in this unit*.
If the system is in maintenance mode or the SVP is rebooted, the data that is
output every two hours might not contain data for the period. If a failure
occurs in the storage system, the correct information might not be output.
Item Description
YYYY/MM/DD hh:mm:ss
DB00 DBPS001 Minimum temperature (°C) for the two-hour
period of DB00 DBPS001
Temperature minimum value
DB47 DBPS472 Minimum temperature (°C) for the two-hour
period of DB47 DBPS472
Temperature minimum value
For VSP G200, item shows up to DB07 DBPS072.
For details of external volumes, see Hitachi Universal Volume Manager User
Guide. Information about the NAS module is not displayed in this CSV file.
Item Content
If the number starts with "E" (for example, E1-1), the parity group contains external
volumes.
XXX.XXX.XXX.XXX (decimal)
• Blank if "Package Type" is iSCSI.
TCP Port Number TCP port number (1 through 65535) for the iSCSI target of an external storage
system
EnvMonInfo.csv
This CSV file contains information about the power and temperature of the
storage system. Power and temperature measurements from the
environment monitor are recorded every two hours.
No records are created during a system power failure or if the breakers are
turned off. If the system is in maintenance mode or the SVP is rebooted, up
to two hours of records could be lost.
If a failure occurs in the storage system, the correct information might not be
output.
Item Description
Date Year, month, and date when record data was acquired for the two-hour period in the
format:
YYYY/MM/DD HH:MM:SS
Electric power average Average value of electric power (W)
Electric power maximum Maximum value of electric power (W)
value
Electric power minimum Minimum value of electric power (W)
value
In the following cases, a lower value might be temporarily displayed:
• When the storage system is starting up
• Right after replacing storage system parts
• During or after microcode update
DKC0 CL1 Temperature DKC0: Average temperature of CL1 (°C)
average
DKC0 CL1 Temperature DKC0: Maximum temperature of CL1 (°C)
maximum value
DKC0 CL1 Temperature DKC0: Minimum temperature of CL1 (°C)
minimum value
FcSpNameInfo.csv
This CSV file contains information about Fibre Channel Security Protocols
(FCSPs). A record is created for each initiator (host).
For details of port setting, see the Provisioning Guide. Information about the
NAS module is not displayed in this CSV file.
Item Content
FcSpPortInfo.csv
This CSV file contains information about ports related to Fibre Channel
Security Protocols (FCSPs). A record is created for each port.
For details of port setting, see the Provisioning Guide. Information about the
NAS module is not displayed in this CSV file.
Item Content
Switch Port Username WWN information about the Fabric switch required for authentication (16-digit
hexadecimal number)
Mode Mode of authentication between ports and FC switches
• Bidirectional
• Unidirectional
Authentication of Fabric Information about whether to perform authentication of the FC switch identified by
Switch "Switch Port Username"
• Enabled
• Disabled
HduInfo.csv
This CSV file contains information about hard drive boxes (DB). A record is
created for each drive box.
Item Description
IscsiHostInfo.csv
This CSV file contains information about iSCSI Initiator (Host) set to the
channel board port. A record is created for each iSCSI Host (Initiator) target.
Information about the NAS module is not displayed in this CSV file.
Item Content
1. For the target information, see the record information with the same iSCSI target ID in IscsiTargetInfo.csv.
IscsiPortInfo.csv
This CSV file contains information about iSCSI information set to the channel
board port. A record is created for each iSCSI host (initiator) target.
Information about the NAS module is not displayed in this CSV file.
Item Content
Auto is displayed if the link local address is automatically set. Blank if "IPv6 | Mode" is
Disabled.
IPv6 | Global Address IPv6 global address of the port
• Output example: xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx (hexadecimal)
• Output example: Auto
Auto is displayed if the global address is automatically set. Blank if "IPv6 | Mode" is
Disabled.
IPv6 | Assigned Default Port IPv6 assigned default gateway
Gateway • Output example: xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx (hexadecimal)
Keep Alive Timer (sec.) Keep alive timer value of iSCSI (30 to 64800) (sec)
Auto is displayed if the global address 2 is automatically set. Blank if "IPv6 | Mode" is
Disabled.
IscsiTargetInfo.csv
This CSV file contains information about iSCSI target information set to the
channel board port. A record is created for each iSCSI target. Information
about the NAS module is not displayed in this CSV file.
Item Content
Separated with a semicolon (;) if multiple host mode options are set.
Security Switch Security switch status set to the iSCSI target port
• On
• Off
Authentication | Method Authentication method settings of the iSCSI target
• CHAP
• None
• Comply with Host Setting
Authentication | Mutual Mutual CHAP authentication function settings of the iSCSI target
CHAP • Enabled
• Disabled
Authentication | User Name User name set when iSCSI target was authenticated
Resource Group ID (iSCSI Resource group ID of the iSCSI target (0 to 1023)
Target)
Resource Group Name (iSCSI Resource group name of the iSCSI target
Target)
JnlInfo.csv
This CSV file contains information about journals. A record is created for each
journal.
Item Content
LdevCapaInfo.csv
This CSV file contains information about LDEV capacities. A record is created
for each of the classifications shown in "Volume Kind".
Item Content
LdevCountInfo.csv
This CSV file contains information about the number of logical devices
(LDEVs). A record is created for each of the classifications shown in "Volume
Kind".
Item Content
LdevInfo.csv
This CSV file contains information about logical devices (LDEVs). A record is
created for each LDEV.
Item Content
(00:00:00 to 00:3f:ff)
LDEV Name LDEV name1
LDEV Emulation LDEV emulation type
LDEV Type LDEV type:
• Basic
• Dynamic Provisioning
• External
• Thin Image
• ALU
LDEV Attribute LDEV Attribute:
• CMDDEV (Command device)
• CMDDEV1 (Remote command device)
• Journal (Journal volume)
• Pool (Pool volume)
• Quorum disk (used with global-active device)
• ALU
• SLU
• Deduplication system data volume
• Regular (Others)
Volume Size(Cyl) LDEV capacity (in cylinders)
Volume Size(MB) LDEV capacity (in MB)
Volume Size(Blocks) LDEV capacity (in blocks)
CVS Information about whether the LDEV is a custom-sized volume:
• On: Custom-sized volume
• Off: Others
Pool ID Pool number. This is blank except for the following cases:
• If "LDEV Type" is Dynamic Provisioning
• If LDEV Attribute is Pool
RAID Concatenation#0 Number of parity group to be concatenated to parity group (#0) identified by ECC
Group. Blank if the parity group is not concatenated to another parity group.
RAID Concatenation#1 Number of parity group to be concatenated to parity group (#1) identified by ECC
Group. Blank if the parity group is not concatenated to another parity group.
RAID Concatenation#2 Number of parity group to be concatenated to parity group (#2) identified by ECC
Group. Blank if the parity group is not concatenated to another parity group.
ORACLE CHECK SUM Information about whether this LDEV is an Oracle check sum target.
• On
• Off
Current MPU Number of the MP unit currently controlling the LDEV.
If the parity group with LDEV does not support accelerated compression, a blank
space is displayed. Also, for external volumes, a blank is displayed.
Notes:
1. If the character string contains a comma, the comma is converted to a tab.
Item Content
LPartition.csv
This CSV file contains information about the cache logical partitioning
function. A record is created for each cache partition for a managed resource.
For details of the cache logical partitioning function, see the Performance
Guide.
Item Content
LunInfo.csv
This CSV file contains information about LU path definitions. A record is
created for each host group. For more information about LU path definitions,
see the Provisioning Guide.
Item Description
If more than one option is specified, the options are separated by semicolons (;).
LUN# LUN number for this LU path definition (hexadecimal)
LDEV# LDEV number for this LU path definition
Command Device Information about whether the LDEV is a command device:
• On: Command Device
• On*: Remote Command Device
• Off: Others
Command Security Information about whether the command device is secured:
• On
• Off
CVS Information about whether the LDEV is a custom-sized volume:
• On: Customized volume
• Off: Other volumes
CHB Location Name of the CHB on which this port is installed
T10 PI Mode Indicates whether the T10 PI mode can be applied to the port for which the LU path is
defined.
• Enabled
• Disabled
• Blank if "Package Type" is not 16FC2 (CHB) or 32FC4R (CHB).
T10 PI Information about the T10 PI attribute which is set for the LDEV number of the LU
path definition.
• Enabled
• Disabled
• Blank if LDEV# is blank
Asymmetric Access State Asymmetric access status (output only for an open system CHA that is Fibre or FCoE)
Indicates the asymmetric access status:
• Active/Optimized: Prioritized
• Active/Non-Optimized: Lower priority
LunPortInfo.csv
This CSV file contains information about LU path definition. A record is
created for each port.
Item Content
• 8 Gbps
• 10 Gbps
• 16 Gbps
• 32 Gbps
• Auto
• Blank if "Package Type" is NAS module
WWN WWN of this port (hexadecimal number)
T10 PI Mode Indicates whether the T10 PI mode can be applied to the port.
• Enabled
• Disabled
• Blank if "Package Type" is not 16FC2 (CHB) or 32FC4R (CHB)
MicroVersion.csv
This CSV file contains information about software versions.
Item Content
DKCMAIN The version of the firmware for the RAID storage system (10 digits)
ROM BOOT ROM BOOT firmware version (6 digits)
RAM BOOT RAM BOOT firmware version (6 digits)
Config Config version (8 digits)
HDD HDD firmware version (4 digits)
MlcEnduranceInfo.csv
This CSV file contains information about endurance information of MLC. A
record is created for each MLC endurance information.
If you change the SVP time 1 month or more, the history acquisition months
will not be in order.
Item Content
ECC Group Number of parity group of which this MLC (including FMD and FMC) is a component
• If it is a spare drive, Spare Drive is displayed.
• If it is a free drive, Free Drive is displayed.
CR# C# and R# (2-digit hexadecimal numbers), which identify the PDEV
XX: C#
YY: R#
Device Type-Code Drive type code of this drive
History3 (%) ... History 119 SSD life (0 to 100) (3 months ago ...119 months ago)
(%)
History120 (date) Date on which SSD life was acquired (120 months ago)
History120 (%) SSD life (0 to 100) (120 months ago)
ModePerLpr.csv
This CSV file contains information about system option modes. A record is
created for each system option mode.
Item Content
MpPathStatus.csv
This CSV file contains information about the status of logical paths. A record
is created for each MP blade or LR.
Item Content
MpPcbStatus.csv
This CSV file contains information about the status of MP Unit. A record is
created for each MP unit.
Item Content
The number of output items differs for each model, because the number of installed
MPs is different.
• VSP G200: MP#00,01
• VSP G400, G600 or VSP F400, F600: MP#00, 01,…, 03
• VSP G800 or VSP F800: MP#00, 01,…, 07
Note:
1. 1=Normal, 0=Abnormal
PcbRevInfo.csv
This CSV file contains information about revisions of packages such as
channel boards (CHBs) and others. A record is created for each package.
Item Content
• 2
Location Name of the part
FRU number Product name of the package or some other name
PK Revision Revision of the package
Factory Factory manufacturing the package
Number Serial number of the package
MAC Address MAC address of the package
PdevCapaInfo.csv
This CSV file contains information about physical device (PDEV) capacities. A
record is created for each of the classifications shown in "PDEV Kind".
Item Content
PdevInfo.csv
This CSV file contains information about physical devices (PDEVs). A record is
created for each PDEV.
Item Content
If the parity group with PDEV does not support accelerated compression, or if the ECC
Group is Spare Drive, a blank space is displayed.
Notes:
1. Blank if the parity group is not concatenated to another parity group or is Spare Drive.
Item Content
PECBInfo.csv
This CSV file contains information about the PECB (PCIe channel board) and
connecting destination for VSP G800 or VSP F800.
For all other VSP Gx00 models or VSP Fx00 models, hyphens are displayed
for all contents.
Item Content
Expansion mode Expansion mode set in the destination module of the PECB
• 1:2
PkInfo.csv
This CSV file contains information about channel boards (CHBs). A record is
created for each CHB.
Item Content
For details about the license key, see License keys on page 229.
Item Content
SMfundat.csv
This CSV file contains information about SM functions. A record is created for
each of the classifications shown in "SM Install Function".
Item Content
SM Install function The following classifications are output for VSP G200:
1. Base
2. Extension 1
3. Extension 2
The following classifications are output for VSP G400, G600, G800 or VSP F400, F600,
F800:
1. Base
2. Extension1
3. Extension2
4. Extension3
5. Extension4
Availability Information about whether the function of "SM Install function" is enabled
• Enabled
• Disabled
SsdDriveInfo.csv
This CSV file contains information about SSDs. A record is created for each
SSD.
Item Content
ECC Group Number of the parity group of which this SSD is a component.
• Spare Drive: The SSD is a spare drive.
• Free Drive: The SSD is a free drive.
CR# C# and R# (2-digit hexadecimal numbers), which identify the PDEV
SsidInfo.csv
This CSV file contains information about SSIDs. A record is created for each
SSID.
Item Content
SysoptInfo.csv
This CSV file contains information about system options.
Item Content
WwnInfo.csv
This CSV file contains information about hosts. A record is created for each
host.
For details about the host setting, see the Provisioning Guide.
Item Content
Host Mode Host mode that is set for the host group (0 to 127, hexadecimal)
Host Mode Option Host mode option that is set for the host group (decimal)
3DC
three-data-center. Refers to the local, intermediate, and remote sites, or
data centers, in which TrueCopy and Universal Replicator combine to form
a remote replication configuration.
A
array
See disk array
audit log
Files that store a history of the operations performed from Device
Manager - Storage Navigator and the commands that the storage system
received from hosts, and data encryption operations.
Glossary 331
System Administrator Guide
B
back-end director (BED)
The hardware component that controls the transfer of data between the
drives and cache. A BED feature consists of a pair of boards. A BED is also
referred to as a disk board (DKB).
BED
See back-end director.
bind mode
In bind mode the Cache Residency Manager extents are used to hold read
and write data for specific extent(s) on volume(s). Data written to the
Cache Residency Manager bind area is not destaged to the drives. For
bind mode, all targeted read and write data is transferred at host data
transfer speed.
blade
A computer module, generally a single circuit board, used mostly in
servers.
C
cache logical partition (CLPR)
Consists of virtual cache memory that is set up to be allocated to different
hosts in contention for cache memory.
capacity
The amount of data storage space available on a physical storage device,
usually measured in bytes (MB, GB, TB, and so on).
CCI
Command Control Interface
CHAP
challenge handshake authentication protocol
CLPR
See cache logical partition (CLPR).
332 Glossary
System Administrator Guide
cluster
Multiple-storage servers working together to respond to multiple read and
write requests.
command device
A dedicated logical volume used only by Command Control Interface and
Business Continuity Manager to interface with the storage system. Can be
shared by several hosts.
controller
The component in a storage system that manages all storage functions. It
is analogous to a computer and contains a processors, I/O devices, RAM,
power supplies, cooling fans, and other sub-components as needed to
support the operation of the storage system.
copy pair
A pair of volumes in which one volume contains original data and the
other volume contains the copy of the original. Copy operations can be
synchronous or asynchronous, and the volumes of the copy pair can be
located in the same storage system (local copy) or in different storage
systems (remote copy).
A copy pair can also be called a volume pair, or just pair. A pair created by
Compatible FlashCopy® is called a relationship.
copy-on-write (COW)
Point-in-time snapshot copy of any data volume within a storage system.
Copy-on-write snapshots only store changed data blocks, therefore the
amount of storage capacity required for each copy is substantially smaller
than the source volume.
COW
See copy-on-write (COW).
COW Snapshot
Hitachi Copy-on-Write Snapshot
Glossary 333
System Administrator Guide
CV
See custom volume.
CVS
custom volume size
CXFS
clustered version of XFS file system
D
data drive
A physical data storage device that can be either a hard disk drive (HDD)
or a flash drive (also called a solid-state device).
DBV
Hitachi Database Validator
DC
data center
delta resync
A disaster recovery solution in which TrueCopy and Universal Replicator
systems are configured to provide a quick recovery using only differential
data stored at an intermediate site.
device
A physical or logical unit with a specific function.
device emulation
Indicates the type of logical volume. Mainframe device emulation types
provide logical volumes of fixed size, called logical volume images (LVIs),
which contain EBCDIC data in CKD format. Typical mainframe device
emulation types include 3390-9 and 3390-M. Open-systems device
emulation types provide logical volumes of variable size, called logical
units (LUs), that contain ASCII data in FBA format. The typical open-
systems device emulation type is OPEN-V.
disaster recovery
A set of procedures to recover critical application data and processing
after a disaster or other failure.
334 Glossary
System Administrator Guide
disk array
Disk array, or just array, is a complete storage system, including the
control and logic devices, storage devices (HDD, SSD), connecting cables,
and racks
DKC
See disk controller (DKC).
DKCMAIN
disk controller main. Refers to the software for the storage system.
DKU
disk unit. Refers to the cabinet (floor model) or rack-mounted hardware
component that contains data drives and no controller components.
dump
A collection of data that is saved to a file when an error or crash occurs.
The data is used by support personnel to determine the cause of the error
or crash.
Dump tool
Downloads Device Manager - Storage Navigator configuration information
onto recording media for backup and troubleshooting purposes.
E
emulation
The operation of a storage system to emulate the characteristics of a
different storage system. For device emulation, the mainframe host
recognizes the logical devices on the storage system as 3390-x devices.
For controller emulation, the mainframe host recognizes the control units
(CUs) on the storage system as 2105 or 2107 controllers.
The storage system operates the same as the storage system being
emulated.
emulation group
A set of device emulation types that can be intermixed within a RAID
group and treated as a group.
Glossary 335
System Administrator Guide
external application
A software module that is used by a storage system but runs on a
separate platform.
external volume
A logical volume whose data resides on drives that are physically located
outside the Hitachi storage system.
F
FC
Fibre Channel; FlashCopy
FC-AL
fibre-channel arbitrated loop
FCP
fibre-channel protocol
FCSP
fibre-channel security protocol
FICON
Fibre Connectivity
flash drive
A data drive that uses a solid-state memory device instead of a rotating
hard disk.
flash module
A high speed data storage device that includes a custom flash controller
and several flash memory sub-modules on a single PCB.
FMD
See flash module
H
HBA
host bus adapter
336 Glossary
System Administrator Guide
HDD
hard disk drive
HDT
Hitachi Dynamic Tiering
HDU
hard disk unit
head LDEV
See top LDEV.
host group
A group of hosts of the same operating system platform.
host mode
Operational modes that provide enhanced compatibility with supported
host platforms. Used with fibre-channel ports on RAID storage systems.
HP XP7 CVAE
HP XP7 Command View Advanced Edition - a set of software applications
included in the system firmware. Via the GUI, they are used to configure,
control, and monitor the storage system.
I
in-system replication
The original data volume and its copy are located in the same storage
system. ShadowImage in-system replication provides duplication of
logical volumes; Thin Image in-system replication provides "snapshots" of
logical volumes that are stored and managed as virtual volumes (V-
VOLs).
initiator
An attribute of the port that is connected to the port with RCU target
attribute.
Glossary 337
System Administrator Guide
internal volume
A logical volume whose data resides on drives that are physically located
within the storage system. See also external volume.
J
JNL
journal
journal volume
A volume that records and stores a log of all events that take place in
another volume. In the event of a system crash, the journal volume logs
are used to restore lost data and maintain data integrity.
JRE
Java Runtime Environment
K
key management server
A server that manages encryption keys. Encryption keys can be backed
up to, and restored from, a key management server that complies with
the Key Management Interoperability Protocol (KMIP).
keypair
Two mathematically-related cryptographic keys: a private key and its
associated public key.
L
LBA
logical block address
LCP
local control port; link control processor
LD
local directory; logical device
338 Glossary
System Administrator Guide
LDAP
lightweight directory access protocol
LDEV
logical device
LDKC
See logical disk controller (LDKC).
LDM
Logical Disk Manager
license key
A specific set of characters that unlocks an application and allows it to be
used.
local copy
See in-system replication.
Glossary 339
System Administrator Guide
physical storage system. For example, the Hitachi Universal Storage
Platform V storage system supports two LDKCs, LDKC 00 and LDKC 01.
LU
See logical unit (LU).
LUN
See logical unit number
LUN volume
A custom-size volume whose size is defined by the user using Virtual LUN.
Also called a custom volume (CV).
LV
logical volume
LVI
See logical volume image.
340 Glossary
System Administrator Guide
M
MF, M/F
mainframe
modify mode
The mode of operation of Device Manager - Storage Navigator that allows
changes to the storage system configuration. See also view mode.
O
OPEN-V
A logical unit (LU) of user-defined size that is formatted for use by open-
systems hosts.
OPEN-x
A logical unit (LU) of fixed size (for example, OPEN-3 or OPEN-9) that is
used primarily for sharing data between mainframe and open-systems
hosts using Hitachi Cross-OS File Exchange.
P
P-VOL
This term is used only in the earlier version of the Device Manager -
Storage Navigator GUI (still in use) for the primary volume. See primary
volume.
pair
Two logical volumes in a replication relationship in which one volume
contains original data to be copied and the other volume contains the
copy of the original data. The copy operations can be synchronous or
asynchronous, and the pair volumes can be located in the same storage
system (in-system replication) or in different storage systems (remote
replication).
parity group
See RAID group.
PAV
Hitachi Compatible PAV
Glossary 341
System Administrator Guide
PCB
printed circuit board
PDEV
physical device
PG
parity group. See RAID group.
physical device
See device.
pool
A set of volumes that are reserved for storing pool volumes (pool-VOL),
and used by Thin Image, Dynamic Provisioning, Dynamic Tiering, or
active flash data.
port attribute
Indicates the type of fibre-channel port: target, RCU target, or initiator.
The following Hitachi products use the term P-VOL: Thin Image, Copy-on-
Write Snapshot, ShadowImage, TrueCopy, Universal Replicator, Universal
Replicator for Mainframe, and High Availability Manager.
prio
priority mode. Used in Cache Residency Manager.
342 Glossary
System Administrator Guide
Q
quick format
The quick format feature in Virtual LVI/Virtual LUN in which the formatting
of the internal volumes is done in the background. This allows system
configuration (such as defining a path or creating a TrueCopy pair) before
the formatting is completed. To execute quick formatting, the volumes
must be in blocked status.
quick restore
A reverse resynchronization in which no data is actually copied: the
primary and secondary volumes are swapped.
R
RAID
redundant array of inexpensive disks
RAID group
A set of RAID disks that have the same capacity and are treated as one
group for data storage and recovery. A RAID group contains both user
data and parity information. This allows user data to be accessed in the
event that one or more of the drives within the RAID group are not
available. The RAID level of a RAID group determines the number of data
drives and parity drives and how the data is "striped" across the drives.
For RAID1, user data is duplicated within the RAID group, so there is no
parity data for RAID1 RAID groups.
RAID level
The type of RAID implementation. RAID levels include RAID0, RAID1,
RAID2, RAID3, RAID4, RAID5 and RAID6.
RCU
See remote control unit.
Glossary 343
System Administrator Guide
remote control unit (RCU)
A storage system at a secondary or remote site that is configured to
receive remote I/Os from one or more storage systems at the primary or
main site.
remote copy
See remote replication.
resync
resynchronize.
RMI
Remote Method Invocation
S
S-VOL
See secondary volume or source volume. When used for "secondary
volume", "S-VOL" is only seen in the earlier version of the Device
Manager - Storage Navigator GUI (still in use).
SAS
serial-attached SCSI
service processor
The computer in a storage system that hosts the Device Manager -
Storage Navigator software and is used to configure and maintain the
storage system.
344 Glossary
System Administrator Guide
severity level
Applies to service information messages (SIMs) and Device Manager -
Storage Navigator error codes.
SFP
small form-factor pluggable
shared memory
Memory that exists logically in the cache. It stores common information
about the storage system and the cache management information
(directory). The storage system uses this information to control exclusions
and differential table information. Shared memory is managed in two
segments and is used when copy pairs are created.
In the event of a power failure, the shared memory is kept alive by the
cache memory batteries while the data is copied to the cache flash
memory (SSDs).
shredding
See volume shredding.
SIM
See service information message.
size
Generally refers to the storage capacity of a memory module or cache.
Not usually used for storage of data on disk or flash drives.
SM
shared memory
SMTP
simple mail transfer protocol
snapshot
A point-in-time virtual copy of a Hitachi Thin Image primary volume (P-
VOL). The snapshot is maintained when the P-VOL is updated by storing
pre-updated data (snapshot data) in a data pool.
SNMP
See Simple Network Management Protocol.
Glossary 345
System Administrator Guide
SOM
See system option mode.
In the current version of the GUI, "target volume" and "T-VOL" are
replaced with "primary volume".
space
Generally refers to the data storage capacity of a disk drive or flash drive.
SRM
Storage Replication Manager
SSD
solid-state drive. Also called flash drive.
SSID
See storage subsystem identifier.
SSL
secure socket layer
storage cluster
See cluster.
storage tiers
See tiered storage.
SVP
See service processor.
SVS
Storage Virtualization System
346 Glossary
System Administrator Guide
SW, sw
short wavelength, software
syslog
The file on the SVP that includes both syslog and audit log information,
such as the date and time.
system disk
The volume from which an open-systems host boots.
T
T-VOL
See target volume.
target
An attribute of the port that is connected to the host.
target port
A fibre-channel port that is configured to receive and process host I/Os.
TC
Hitachi TrueCopy
TI
See Thin Image.
Glossary 347
System Administrator Guide
tiered storage
A layered structure of performance levels, or tiers, that matches data
access requirements with the appropriate performance tiers. The tiers
are:
total capacity
The aggregate amount of storage space in a data storage system.
TPF
Transaction Processing Facility
V
V-VOL
virtual volume
VDEV
See virtual device.
view mode
The mode of operation of Device Manager - Storage Navigator that allows
viewing only of the storage system configuration. The two Device
Manager - Storage Navigator modes are view mode and modify mode.
348 Glossary
System Administrator Guide
virtual volume (V-VOL)
A logical volume in a storage system. A V-VOL has no physical storage
space.
VLUN
Hitachi Virtual LUN
VM
volume migration; volume manager
volume shredding
Deleting the user data on a volume by overwriting all data in the volume
with dummy data.
Glossary 349
System Administrator Guide
350 Glossary
System Administrator Guide
Index
A C
accelerated data compression 75 Cache Memories report 283
accessing a storage system certificate files 213
without the management software 58 certificates
account obtaining 208
release lock 154 certificates, obtaining 208
Active Directory authentication 188 changing 113, 121
adding changing a user’s password 151
RADIUS servers 198 Changing assigned resource groups 161
adding SVP to trusted zone 49 changing permissions 152
administration changing the date and time 116
tasks 18 controller settings 116
tools 18 SVP clock 116
administrator password 118 Channel Boards report 285
Adobe Flash 46 cipher suite 212
Alert notifications 217–219 client computer
configuring 218 UNIX requirements 43
email 220 Windows requirements 42
SNMP 222 Configuration files
Syslog 220 creating 166
audit log configuring Active Directory groups 192
exporting 241 configuring active directory servers 189
Audit logs creating
settings 240 user accounts 148
authentication server 162 Creating a keypair 206
Authentication server creating a report 123, 245
protocols 163 creating a user account 159
authentication servers 165 CSV files 295
Authentication servers 164
authorization server 162
authorization servers 165
D
Authorization servers
dashboard 21
requirements 164
analyzing data 24
data compression 75
Data Retention Utility license
B removal 236
backing up user accounts 143 date 121
block storage deduplication 96
configuring 63 deleting a report 245
built-in groups 156 deleting a user account 154
built-in user 47 Device Manager - Storage Navigator 26
accessing 89
using 89
Index 351
System Administrator Guide
Device Manager- Storage Navigator H
client setup for 41 HCS certificates 204
disabling a user account 153 deleting 204
disabling user accounts 137 registering 204
displaying HduInfo.csv 308
RADIUS servers 200 HDvM - SN configuration files
displaying RADIUS servers 197 restoring 115
DKU 299, 303 HDvM SN configuration files
Dump files backing up 114
collecting 246 hosts
updating 96
Hosts report 265
E HTTP communication to SVP 132
EVS blocking 132
details 107
inventory 106
EVSs I
creating 106 installation
exports in a DHCP environment 33
creating 110 in a static environment 35
details 110 using the application installer 32
updating 110 installation verification 38
external parity groups 75 Internet Explorer
configuring 45
inventory 25
F IPv6, configuring communications 117
fabric switches
adding 52, 64
supported models 66 K
system requirements 66 Kerberos configuration file 172
file pool
details 105
file pools
creating 104
L
expanding 105 LDAP configuration file 166
inventory 103 license capacities
managing 102 unlicensed software 232
file storage license keys
configuring 102 expiration 238
file system overview 230
inventory 107 permanent 230
file systems term 231
creating 108 types 230
deleting 108 viewing information 237
expanding 109 License keys 229
managing 107 disabling 235
mounting/unmounting 108 emergency 231
updating 109 enabling 235
viewing details 108 installing 235
Firefox managing 232, 233
configuring 45 removing a software license 236
firewall setup 44, 117 temporary 231
force release system lock 119 logging in 39, 47
Logical Devices report 266
login message 119
LUNs report 268
G
general 219
352 Index
System Administrator Guide
M viewing details 82
maintenance utility 27 pools, creating 78
starting 56 ports
management client enabling security 64
setup 41 Ports report 273
management software architecture 18 Power Consumption report 275
modules 121 primary SVP 120
MP Unit Details report 269
MP Units report 268
R
RADIUS configuration file 169
N RADIUS server
NAS 121 adding 198
NAS Manager 28 RADIUS server, accessing 164
accessing 91 RADIUS servers
using for advanced file storage configuration displaying 197, 200
91 raidinf add relocationlog 256
network communication settings 117 raidinf add report 252
Network permissions 118 raidinf delete relocationlog 258
Network settings 117 raidinf delete report 253, 254, 259, 260
raidinf download relocationlog 257
raidinf get relocationloginfo 258
raidinf get reportinfo 255
O releasing 132
onboard removing user accounts 141
workflow 51 Report Configuration Tool Command Reference
overview 249
Hitachi Storage Advisor 19 Report Viewer window 245
reports
Cache Memories 283
P Channel Boards 285
parity groups CHAP Users 262
creating 54, 67 Disk Boards 263
initializing 72 downloading 244
inventory 72 Host Groups 264
reserved for NAS firmware 72 Hosts 265
status 72 iSCSI Targets 264
Parity Groups report 270, 277 Logical Devices 266
parity groups, creating LUNs 268
advanced method 70 MP Unit Details 269
basic method 68 MP Units 268
password Parity Groups 270, 277
allowable characters and symbols 148 Physical Devices 271
changing a user’s 151 Physical View 289
local, changing 21 Ports 273
passwords power consumption 275
changing 180 Spare Drives 276
permissions, changing 152 Storage System Summary 278
Physical Devices report 271 table view 262
Physical View report 289 requirements
PKCS#12 format 210 management clients 41
pool creation resetting passwords 180
basic method, calculation of pool sizes 80 resource groups 156
pools Resource groups
creating 76 changing 161
creating with advanced method 80 resources 25
expanding 82 restoring user account information 144
inventory 76 roles 134, 156
updating 82 Roles 90, 155
Index 353
System Administrator Guide
root password storage systems
changing 38 adding 51
deleting 87
details 87
editing 87
S
inventory 86
Security certificates 213
managing 86
self-signed certificate 208
SVP
servers
host name 120
adding 53, 93
SVP, adding to trusted sites 49
attach existing volumes 94
Syslog server
create and attach volumes 94
send test message 242
delete 94
setup 240
details 95
system 121
edit 94
System administration overview 17
inventory 94
system architecture 18
Servers
System configuration 61
connecting authentication and authorization
system lock 119
servers 165
setting up management client 41
setting up user accounts 135
Settings menu 21 T
shares Test messages 222
adding AD groups to 111 email 223
creating 110 SNMP 224
details 111 Syslog 223
updating 112 There is a problem with this website's security
shares and exports certificate 213
inventory 109 tiers
managing 109 managing 92
signed certificates 208 time 121
updating 210
Signed certificates 208
notes 211
U
returning to default 211
unified management
signed private key 208
overview 20
signed public key 208
UNIX
Spare Drives report 276
requirements 43
spares
user accounts
managing 72
creating 148, 159
SsdDriveInfo.csv 327
deleting 154
SSdDriveInfo.csv 327
disabling 153
ssl certificate 40
managing 147
SSL certificate passphrase 209
user administration 134, 146
SSL certificates 205
overview 146
converting 210
user groups
SSL communication settings 205
deleting 161
SSL-encrypted communications
managing 155
creating a private keypair 206
names 160
creating a public key 207
roles 90, 155, 156, 158
starting
User groups
maintenance utility 56
permissions 160
Storage Navigator
creating a user account 159
storage system
editing 93 V
updating 93 viewing a report 244
storage system information 113 virtual file server
Storage system reports 244 deleting 106
Storage System Summary report 278 details 107
354 Index
System Administrator Guide
enabling/disabling 106
inventory 106
renaming 107
virtual file servers
creating 106
volumes
attaching 85, 98
create and attach 83
expanding 100
inventory 101
managing 96
updating 100
volumes, creating 83, 97
W
web browser
configuring Firefox 45
configuring Internet Explorer 45
Web browser
configuring 44
Windows requirements 42
Index 355
System Administrator Guide
356 Index
System Administrator Guide
System Administrator Guide
Hitachi Data Systems
Corporate Headquarters
2845 Lafayette Street
Santa Clara, California 95050-2639
U.S.A.
www.hds.com
Americas
+1 408 970 1000
[email protected]
Asia Pacific
+852 3189 7900
[email protected]
Contact Us
www.hds.com/en-us/contact.html
MK-94HM8016-06
October 2016