USP V

Hitachi USP V User And Reference Manual

  • Hello! I am an AI chatbot trained to assist you with the Hitachi USP V User And Reference Manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Command Control Interface
User and Reference Guide
Hitachi Virtual Storage Platform G1000 and G1500
Hitachi Virtual Storage Platform F1500
Hitachi Virtual Storage Platform G200, G400, G600, G800
Hitachi Virtual Storage Platform F400, F600, F800
Hitachi Virtual Storage
Hitachi PlatformUnified Storage VM
Hitachi Universal Storage Platform V/VM
MK-90RD7010-32
May 2017
© 2010, 2017 Hitachi, Ltd. All rights reserved.
No part of this publication may be reproduced or transmitted in any form or by any means,
electronic or mechanical, including copying and recording, or stored in a database or retrieval
system for any purpose without the express written permission of Hitachi, Ltd., or Hitachi Data
Systems Corporation (collectively “Hitachi”). Licensee may make copies of the Materials provided
that any such copy is: (i) created as an essential step in utilization of the Software as licensed and
is used in no other manner; or (ii) used for archival purposes. Licensee may not make any other
copies of the Materials. “Materials” mean text, data, photographs, graphics, audio, video and
documents.
Hitachi reserves the right to make changes to this Material at any time without notice and assumes
no responsibility for its use. The Materials contain the most current information available at the time
of publication.
Some of the features described in the Materials might not be currently available. Refer to the most
recent product announcement for information about feature and product availability, or contact
Hitachi Data Systems Corporation at
https://support.hds.com/en_us/contact-us.html.
Notice: Hitachi products and services can be ordered only under the terms and conditions of the
applicable Hitachi Data Systems Corporation agreements. The use of Hitachi products is governed
by the terms of your agreements with Hitachi Data Systems Corporation.
By using this software, you agree that you are responsible for:
1) Acquiring the relevant consents as may be required under local privacy laws or otherwise from
authorized employees and other individuals to access relevant data; and
2) Verifying that data continues to be held, retrieved, deleted, or otherwise processed in accordance
with relevant laws.
Notice on Export Controls. The technical data and technology inherent in this Document may be
subject to U.S. export control laws, including the U.S. Export Administration Act and its associated
regulations, and may be subject to export or import regulations in other countries. Reader agrees to
comply strictly with all such regulations and acknowledges that Reader has the responsibility to
obtain licenses to export, re-export, or import the Document and any Compliant Products.
Hitachi is a registered trademark of Hitachi, Ltd., in the United States and other countries.
AIX, AS/400e, DB2, Domino, DS6000, DS8000, Enterprise Storage Server, eServer, FICON,
FlashCopy, IBM, Lotus, MVS, OS/390, PowerPC, RS/6000, S/390, System z9, System z10, Tivoli,
z/OS, z9, z10, z13, z/VM, and z/VSE are registered trademarks or trademarks of International
Business Machines Corporation.
Active Directory, ActiveX, Bing, Excel, Hyper-V, Internet Explorer, the Internet Explorer logo,
Microsoft, the Microsoft Corporate Logo, MS-DOS, Outlook, PowerPoint, SharePoint, Silverlight,
SmartScreen, SQL Server, Visual Basic, Visual C++, Visual Studio, Windows, the Windows logo,
Windows Azure, Windows PowerShell, Windows Server, the Windows start button, and Windows
Vista are registered trademarks or trademarks of Microsoft Corporation. Microsoft product screen
shots are reprinted with permission from Microsoft Corporation.
All other trademarks, service marks, and company names in this document or website are
properties of their respective owners.
ii
Command Control Interface User and Reference Guide
Contents
Preface.................................................................................................. xi
Intended audience....................................................................................................xii
Product version........................................................................................................ xii
Release notes...........................................................................................................xii
Changes in this revision............................................................................................ xii
Referenced documents.............................................................................................xiii
Document conventions.............................................................................................xiv
Convention for storage capacity values......................................................................xvi
Accessing product documentation............................................................................ xvii
Getting help........................................................................................................... xvii
Comments..............................................................................................................xvii
1 Overview..............................................................................................1-1
About Command Control Interface........................................................................... 1-2
CCI functions..........................................................................................................1-2
CCI functions matrix......................................................................................... 1-2
Provisioning functions....................................................................................... 1-3
Asynchronous command processing...................................................................1-3
Command execution modes...............................................................................1-4
Precheck function............................................................................................. 1-4
Command execution by the in-band and out-of-band methods.............................1-5
User authentication mode................................................................................. 1-8
LDEV nickname function....................................................................................1-8
LDEV grouping function.................................................................................... 1-8
Resource group function................................................................................... 1-9
Resource locking function..................................................................................1-9
CCI functions available on all RAID storage systems..................................................1-9
In-system replication........................................................................................ 1-9
Remote replication............................................................................................1-9
Data protection...............................................................................................1-10
2 CCI software environment.....................................................................2-1
Overview of the CCI software environment...............................................................2-2
CCI components on the RAID storage system........................................................... 2-2
Command device..............................................................................................2-2
iii
Command Control Interface User and Reference Guide
Command device guarding.......................................................................2-3
Alternate command device function.......................................................... 2-5
Remote command device.........................................................................2-6
CCI and the SCSI command interface.................................................................2-7
Command competition.............................................................................2-8
Command flow........................................................................................2-8
Issuing commands for LDEVs within a LUSE device....................................2-9
CCI instance components on the host server.............................................................2-9
HORCM operational environment....................................................................... 2-9
CCI instance configurations............................................................................. 2-10
Host machines that can be paired.................................................................... 2-12
Configuration definition file..............................................................................2-13
Configuration definition file settings................................................................. 2-16
HORCM_MON........................................................................................2-17
HORCM_CMD (in-band method)............................................................. 2-17
HORCM_CMD (out-of-band method)....................................................... 2-21
HORCM_DEV.........................................................................................2-23
HORCM_INST........................................................................................2-25
HORCM_LDEV....................................................................................... 2-26
HORCM_LDEVG.....................................................................................2-27
HORCM_INSTP......................................................................................2-28
HORCM_ALLOW_INST........................................................................... 2-28
Correspondence of the configuration definition file for cascading volume and mirror
descriptors..................................................................................................... 2-28
Correspondence of configuration file and mirror descriptors......................2-29
Cascading connection and configuration files...........................................2-30
ShadowImage.......................................................................................2-31
Cascading connections for TrueCopy and ShadowImage.......................... 2-33
CCI software files..................................................................................................2-35
CCI files supplied with the software..................................................................2-36
CCI files for UNIX-based systems............................................................2-36
CCI files for Windows-based systems...................................................... 2-37
CCI files for OpenVMS-based systems..................................................... 2-39
CCI log and trace files........................................................................................... 2-40
CCI log files....................................................................................................2-40
CCI trace files.................................................................................................2-43
CCI trace control command............................................................................. 2-43
Command logging for audit............................................................................. 2-43
Logging other than raidcom command.................................................... 2-43
Logging raidcom command.................................................................... 2-46
User-created files..................................................................................................2-49
User environment variable..................................................................................... 2-49
3 CCI functions........................................................................................3-1
System configuration using CCI............................................................................... 3-2
In-band system configurations and out-of-band system configurations................. 3-2
System configuration for connecting to a CCI server connected by the in-band
method using the out-of-band method............................................................... 3-5
Connecting to CCI server already connected by In-Band method using Out-of-Band
method.................................................................................................................. 3-5
User authentication.................................................................................................3-8
Command operation authority and user authentication.............................................. 3-9
iv
Command Control Interface User and Reference Guide
Controlling User Role........................................................................................ 3-9
Controlling user resources............................................................................... 3-10
Commands executed depending on operation authorities...................................3-13
Relation between resource groups and command operations....................................3-21
Resource lock function.......................................................................................... 3-24
Command execution modes...................................................................................3-25
Overview........................................................................................................3-25
Context check.................................................................................................3-26
How to check........................................................................................ 3-27
Details of check contents....................................................................... 3-27
Configuration check........................................................................................ 3-33
Resource location and parameter........................................................................... 3-34
MP blade location and parameter..................................................................... 3-34
LDEV grouping function.........................................................................................3-35
Overview........................................................................................................3-35
Device group definition methods......................................................................3-38
Read operations and command device settings................................................. 3-38
Define device group........................................................................................3-39
Device group creation............................................................................3-40
LDEV addition to device group................................................................3-41
LDEV deletion from device group............................................................3-41
Device group deletion............................................................................ 3-42
Copy group function........................................................................................3-43
Copy group creation.............................................................................. 3-45
LDEV addition to a copy group............................................................... 3-45
LDEV deletion from copy group.............................................................. 3-46
Copy group deletion.............................................................................. 3-47
Pair operation by specifying a copy group............................................... 3-47
Pair operations with mainframe volumes.................................................................3-49
Using "dummy" LUs for mainframe LDEVs........................................................ 3-49
Pair status and access permission for mainframe LDEVs.................................... 3-50
Operational differences for multiplatform volumes.............................................3-52
Operational differences for replication commands............................................. 3-53
Global storage virtualization function...................................................................... 3-54
System configuration example with the global storage virtualization function...... 3-54
Using CCI with the global storage virtualization function.................................... 3-55
Configuration definition file settings with global storage virtualization................. 3-55
Example of the configuration definition files when specifying a virtual storage
machine by HORCM_CMD................................................................................3-57
Specifying a virtual storage machine to HORCM_VCMD......................................3-59
Command operations to the virtual storage machine................................3-59
Operation target for raidcom commands when specifying the virtual storage
machine in HORCM_VCMD..................................................................... 3-61
raidcom commands for volumes that belong to virtual storage machine for
HORCM_CMD........................................................................................ 3-68
4 Starting up CCI.....................................................................................4-1
Starting up on UNIX systems................................................................................... 4-2
Starting up on Windows systems..............................................................................4-3
Starting up on OpenVMS systems.............................................................................4-4
Starting CCI as a service (Windows systems)............................................................ 4-6
v
Command Control Interface User and Reference Guide
5 Provisioning operations with CCI............................................................5-1
About provisioning operations..................................................................................5-2
Overview of the configuration setting command..................................................5-2
Synchronous command processing........................................................... 5-3
Asynchronous command processing..........................................................5-3
Errors during asynchronous command processing......................................5-3
Workflow for executing asynchronous commands...................................... 5-4
Asynchronous commands.........................................................................5-4
Help on configuration setting commands............................................................5-6
LDEV nickname function....................................................................................5-6
Available provisioning operations............................................................................. 5-6
Provisioning operations that can be performed on device groups..............................5-13
Operation method...........................................................................................5-14
Workflow for performing provisioning operations.....................................................5-15
Resource group operations.................................................................................... 5-16
Creating resource groups................................................................................ 5-16
Deleting resource groups.................................................................................5-16
Allocating resources to other resource groups...................................................5-17
Execution example..........................................................................................5-18
Internal volume operations.................................................................................... 5-18
Creating internal volumes (open-systems)........................................................ 5-18
Script examples (open systems).......................................................................5-20
Creating internal volumes (Mainframe volume)................................................. 5-22
Script examples.....................................................................................5-23
Script examples.............................................................................................. 5-25
Virtual volume (Dynamic Provisioning) operations....................................................5-26
Creating virtual volumes (Dynamic Provisioning)............................................... 5-26
Script examples.............................................................................................. 5-28
Deleting a virtual volume for which capacity saving is enabled........................... 5-31
Using the -operation initialize_capacity_saving option of the
raidcom delete ldev command to delete a virtual volume.................5-31
Deleting a virtual volume by blocking, initializing, and then deleting the
volume................................................................................................. 5-32
Virtual volume (Dynamic Provisioning for Mainframe) operations.............................. 5-33
Creating virtual volumes (Dynamic Provisioning for Mainframe)..........................5-33
Script examples.............................................................................................. 5-34
Virtual volume (Dynamic Tiering) operations........................................................... 5-36
Operational flow............................................................................................. 5-36
Creating virtual volumes (Dynamic Tiering).......................................................5-38
Script examples.............................................................................................. 5-40
Configuring iSCSI virtual ports............................................................................... 5-43
Setting an iSCSI virtual port.............................................................................5-44
Deleting an iSCSI virtual port...........................................................................5-44
External volume operations....................................................................................5-45
Creating external volumes (Fibre Channel)........................................................5-45
Creating external volumes (iSCSI)....................................................................5-47
Script Examples.............................................................................................. 5-50
Virtual Partition Manager operations.......................................................................5-53
Performing Virtual Partition Manager operations................................................5-53
Displaying CLPR information............................................................................ 5-54
Migrating parity groups in a CLPR.................................................................... 5-54
Displaying parity group information........................................................ 5-54
vi
Command Control Interface User and Reference Guide
Moving parity groups............................................................................. 5-54
Checking result of CLPR transfer.............................................................5-55
Server Priority Manager operations.........................................................................5-55
Configuring Server Priority Manager by specifying ports and WWNs of HBAs....... 5-56
Controlling the priority of I/O operations in storage systems on servers.....5-56
Using and managing Server Priority Manager...........................................5-57
Setting SPM names for WWNs and registering them to the SPM group...... 5-58
Configuring Server Priority Manager by specifying ports and WWNs of HBAs
............................................................................................................5-58
Cautions about using Server Priority Manager..........................................5-63
Cautions when using host groups after registering them in SPM groups (VSP
only).................................................................................................... 5-65
Configuring Server Priority Manager by specifying LDEVs and WWNs or iSCSI names
of HBAs..........................................................................................................5-66
Virtual storage machine operations.........................................................................5-68
Creating host groups in a virtual storage machine............................................. 5-68
Adding LDEVs to a virtual storage machine.......................................................5-69
Removing the virtual storage machine..............................................................5-70
6 Data replication operations with CCI...................................................... 6-1
About data replication operations.............................................................................6-2
Features of paired volumes......................................................................................6-2
Using CCI with ShadowImage and TrueCopy............................................................ 6-3
Using CCI with Thin Image......................................................................................6-4
Using CCI with global-active device..........................................................................6-5
ShadowImage operations........................................................................................ 6-5
ShadowImage duplicated mirroring....................................................................6-6
ShadowImage cascading pairs...........................................................................6-7
Restrictions for ShadowImage cascading volumes......................................6-8
Restriction for TrueCopy/ShadowImage cascading volumes........................6-9
TrueCopy operations...............................................................................................6-9
TrueCopy takeover commands.........................................................................6-10
Takeover-switch function....................................................................... 6-12
Swap-takeover function......................................................................... 6-13
SVOL-takeover function......................................................................... 6-14
PVOL-takeover function......................................................................... 6-15
TrueCopy remote commands........................................................................... 6-15
TrueCopy local commands...............................................................................6-17
TrueCopy, ShadowImage, and Universal Replicator operations................................. 6-17
TrueCopy/ShadowImage volumes.................................................................... 6-17
TrueCopy/ShadowImage/Universal Replicator pair status...................................6-18
TrueCopy Async, TrueCopy, Universal Replicator, and global-active device volumes
..................................................................................................................... 6-24
Sidefile cache for TrueCopy Async.......................................................... 6-27
TrueCopy Async transition states and sidefile control............................... 6-27
TrueCopy Async/Universal Replicator error state......................................6-29
TrueCopy/TrueCopy Async and Universal Replicator/global-active device fence level
settings..........................................................................................................6-30
Setting the fence level........................................................................... 6-32
Copy-on-Write Snapshot operations........................................................................6-33
Copy-on-Write Snapshot volumes.....................................................................6-33
Pair operations and commands for Copy-on-Write Snapshot and Thin Image ..... 6-34
vii
Command Control Interface User and Reference Guide
Creating a Copy-on-Write Snapshot pair........................................................... 6-34
Copy-on-Write Snapshot pair status................................................................. 6-35
Pair status relationship to Copy-on-Write Snapshot commands...........................6-36
Controlling Volume Migration................................................................................. 6-37
Specifications for Volume Migration..................................................................6-37
Commands to control Volume Migration........................................................... 6-39
Relations between "cc" command issues and status.......................................... 6-42
Restrictions for Volume Migration.....................................................................6-43
Universal Replicator MxN configuration and control..................................................6-44
Overview........................................................................................................6-44
Policy ............................................................................................................6-44
horcm.conf.....................................................................................................6-45
Command specifications.................................................................................. 6-46
pairdisplay command.............................................................................6-46
pairsplit command................................................................................. 6-47
Notice on system operation............................................................................. 6-50
Configuration examples...................................................................................6-52
Duplication of CCI applications...............................................................................6-54
Requirements for duplication of CCI................................................................. 6-57
Note for duplication of CCI.............................................................................. 6-58
Remote volume discovery......................................................................................6-58
Discovering a remote volume...........................................................................6-59
7 Data protection operations with CCI.......................................................7-1
Data protection operations...................................................................................... 7-2
Data Retention Utility .......................................................................................7-2
Restrictions on Data Retention Utility volumes...........................................7-3
Database Validator .......................................................................................... 7-3
Restrictions on Database Validator............................................................7-4
Protection parameters and operations...................................................................... 7-5
Data Protection facility............................................................................................ 7-5
Data Protection Facility specifications................................................................. 7-7
Examples for configuration and protected volumes..............................................7-8
Operation authority with CMD security enabled...................................................7-9
Target commands for protection........................................................................7-9
permission command...................................................................................... 7-10
New options for security..................................................................................7-10
raidscan -find inst..................................................................................7-10
raidscan -find verify [MU#].................................................................... 7-11
raidscan -f[d]........................................................................................ 7-11
pairdisplay -f[d].....................................................................................7-12
Permitting protected volumes.......................................................................... 7-12
With a $HORCMPERM file.......................................................................7-12
Without a $HORCMPERM file: Commands to run on different operating
systems................................................................................................ 7-13
Environment variables.....................................................................................7-14
$HORCMPROMOD................................................................................. 7-14
$HORCMPERM.......................................................................................7-15
Determining the protection mode command device........................................... 7-15
viii
Command Control Interface User and Reference Guide
8 Examples of using CCI commands .........................................................8-1
Group version control for mixed storage system configurations.................................. 8-2
LDM volume discovery and flushing for Windows...................................................... 8-2
Volume discovery function.................................................................................8-3
Mountvol attached to Windows 2012/2008/2003/2000 systems........................... 8-5
System buffer flushing function......................................................................... 8-6
Special facilities for Windows systems...................................................................... 8-9
Signature changing facility for Windows systems.................................................8-9
GPT disk for Windows..................................................................................... 8-10
Directory mount facility for Windows systems................................................... 8-12
Host group control................................................................................................ 8-14
Specifying a host group...................................................................................8-14
Commands and options including a host group................................................. 8-15
Using CCI SLPR security........................................................................................ 8-16
Specifying the SLPR Protection Facility............................................................. 8-17
SLPR configuration examples...........................................................................8-18
9 Troubleshooting....................................................................................9-1
General troubleshooting.......................................................................................... 9-2
Operational notes and restrictions for CCI operations................................................ 9-3
Error messages and error codes...............................................................................9-6
System log messages........................................................................................9-6
Command error messages ................................................................................9-8
Generic error codes (horctakeover and pair commands).................................... 9-18
Generic error codes (raidscan, raidqry, raidar, horcctl).......................................9-20
Specific error codes.........................................................................................9-21
SSB codes...................................................................................................... 9-22
SSB codes returned by the replication commands.................................... 9-22
SSB codes returned by the configuration setting command (raidcom)........9-24
Other SSB codes indicating internal errors............................................. 9-197
Calling Hitachi Data Systems customer support..................................................... 9-199
Index
ix
Command Control Interface User and Reference Guide
x
Command Control Interface User and Reference Guide
Preface
This document describes and provides instructions for using the Command
Control Interface (CCI) software to configure and perform operations on the
Hitachi RAID storage systems.
Please read this document carefully to understand how to use this product,
and maintain a copy for reference purposes.
Intended audience
Product version
Release notes
Changes in this revision
Referenced documents
Document conventions
Convention for storage capacity values
Accessing product documentation
Getting help
Comments
Preface
xi
Command Control Interface User and Reference Guide
Intended audience
This document is intended for system administrators, Hitachi Data Systems
representatives, and authorized service providers who install, configure, and
operate the Hitachi RAID storage systems.
Readers of this document should be familiar with the following:
Data processing and RAID storage systems and their basic functions.
The Hitachi RAID storage system and the manual for the storage system
(for example, Hardware Guide, Hitachi Virtual Storage Platform User and
Reference Guide).
The management software for the storage system (for example, Hitachi
Command Suite, Hitachi Device Manager - Storage Navigator) and the
applicable user manuals (for example, Hitachi Command Suite User
Guide, System Administrator Guide, Hitachi Storage Navigator User
Guide).
The host systems attached to the Hitachi RAID storage systems.
Product version
This document revision applies to Command Control Interface software
version 01-41-03/xx or later.
Release notes
The CCI release notes are available on Hitachi Data Systems Support
Connect:
https://knowledge.hds.com/Documents. Read the release notes
before installing and using this product. They may contain requirements or
restrictions that are not fully described in this document or updates or
corrections to this document.
Changes in this revision
Added instructions for configuring iSCSI virtual ports (
Setting an iSCSI
virtual port on page 5-44, Deleting an iSCSI virtual port on page 5-44).
Added information about the raidcom get quorum, raidcom modify
quorum, and raidcom replace quorum commands (
Commands executed
depending on operation authorities on page 3-13, Operation target for
raidcom commands when specifying the virtual storage machine in
HORCM_VCMD on page 3-61).
Added information about creating external volumes using iSCSI (Creating
external volumes (iSCSI) on page 5-47).
Added information about moving a parity group by specifying the LDEV
numbers of virtual volumes of Dynamic Provisioning, Copy-on-Write
Snapshot, or Thin Image (
Moving parity groups on page 5-54).
Updated the error code tables.
xii
Preface
Command Control Interface User and Reference Guide
Referenced documents
Command Control Interface:
Command Control Interface Installation and Configuration Guide,
MK-90RD7008
Command Control Interface User and Reference Guide, MK-90RD7010
Hitachi Command Suite:
Hitachi Command Suite User Guide, MK-90HC172
Hitachi Virtual Storage Platform G200, G400, G600, G800 and Hitachi Virtual
Storage Platform F400, F600, F800:
Hitachi Thin Image User Guide, MK-92RD8011
Product Overview for Hitachi Virtual Storage Platform Gx00 and Fx00
Models, MK-94HM8013
Provisioning Guide for Hitachi Virtual Storage Platform Gx00 and Fx00
Models, MK-94HM8014
System Administrator Guide, MK-94HM8016
Hitachi Device Manager - Storage Navigator Messages, MK-94HM8017
Hitachi TrueCopy® User Guide, MK-94HM8019
Hitachi ShadowImage® User Guide, MK-94HM8021
Hitachi Universal Replicator User Guide, MK-94HM8023
Hitachi Universal Volume Manager User Guide, MK-92RD8024
Global-Active Device User Guide, MK-92RD8072
Hitachi Virtual Storage Platform G1000, G1500, and Hitachi Virtual Storage
Platform F1500:
Hitachi Thin Image User Guide, MK-92RD8011
Provisioning Guide for Open Systems, MK-92RD8014
System Administrator Guide, MK-92RD8016
Hitachi Device Manager - Storage Navigator Messages, MK-92RD8017
Hitachi TrueCopy® User Guide, MK-92RD8019
Hitachi ShadowImage® User Guide, MK-92RD8021
Hitachi Universal Replicator User Guide, MK-92RD8023
Hitachi Universal Volume Manager User Guide, MK-92RD8024
Product Overview, MK-92RD8051
Global-Active Device User Guide, MK-92RD8072
Hitachi Unified Storage VM:
Hitachi Unified Storage VM Block Module Provisioning Guide,
MK-92HM7012
Hitachi ShadowImage® User Guide, MK-92HM7013
Hitachi Storage Navigator User Guide, MK-92HM7016
Preface
xiii
Command Control Interface User and Reference Guide
Hitachi Storage Navigator Messages, MK-92HM7017
Hitachi TrueCopy® User Guide, MK-92HM7018
Hitachi Universal Replicator User Guide, MK-92HM7019
Hitachi Universal Volume Manager User Guide, MK-92HM7020
Hitachi Virtual Storage Platform:
Hitachi Copy-on-Write Snapshot User Guide, MK-90RD7013
Provisioning Guide for Mainframe Systems, MK-90RD7021
Provisioning Guide for Open Systems, MK-90RD7022
Hitachi ShadowImage® for Mainframe User Guide, MK-90RD7023
Hitachi ShadowImage® User Guide, MK-90RD7024
Hitachi Storage Navigator User Guide, MK-90RD7027
Hitachi Storage Navigator Messages, MK-90RD7028
Hitachi TrueCopy® User Guide, MK-90RD7029
Hitachi TrueCopy® for Mainframe User Guide, MK-90RD7030
Hitachi Universal Replicator for Mainframe User Guide, MK-90RD7031
Hitachi Universal Replicator User Guide, MK-90RD7032
Hitachi Universal Volume Manager User Guide, MK-90RD7033
Hitachi Thin Image User Guide, MK-90RD7179
Hitachi Universal Storage Platform V/VM:
Hitachi Copy-on-Write Snapshot User Guide, MK-96RD607
LUN Manager User’s Guide, MK-96RD615
Hitachi ShadowImage® for Mainframe User Guide, MK-96RD619
Hitachi ShadowImage® User Guide, MK-96RD618
Hitachi Storage Navigator User Guide, MK-96RD621
Hitachi Storage Navigator Messages, MK-96RD613
Hitachi TrueCopy® User Guide, MK-96RD622
Hitachi TrueCopy® for Mainframe User Guide, MK-96RD623
Hitachi Universal Replicator for Mainframe User Guide, MK-96RD625
Hitachi Universal Replicator User Guide, MK-96RD624
Hitachi Universal Volume Manager User Guide, MK-96RD626
Document conventions
This document uses the following terminology conventions:
Convention Description
Hitachi RAID
storage system
Refers to all supported storage system models, unless otherwise
noted.
xiv
Preface
Command Control Interface User and Reference Guide
Convention Description
Hitachi Virtual
Storage Platform
G200, G400, G600,
G800 (VSP G200,
G400, G600, G800)
VSP Gx00 models
Refers to all models of the Hitachi Virtual Storage Platform G200,
G400, G600, G800 storage systems, unless otherwise noted.
Hitachi Virtual
Storage Platform
F400, F600, F800
(VSP F400, F600,
F800)
VSP Fx00 models
VSP F series
Refers to all models of the Hitachi Virtual Storage Platform F400,
F600, F800 storage systems, unless otherwise noted.
Hitachi enterprise
storage system
Refers to the Hitachi RAID storage systems except for the VSP
Gx00 models, VSP Fx00 models, and HUS VM.
This document uses the following typographic conventions:
Convention Description
Bold Indicates text in a window, including window titles, menus,
menu options, buttons, fields, and labels. Example: Click OK.
Indicates emphasized words in list items.
Italic Indicates a document title or emphasized words in text.
Indicates a variable, which is a placeholder for actual text
provided by the user or for output by the system. Example:
pairdisplay -g group
(For exceptions to this convention for variables, see the
entry for angle brackets.)
Monospace
Indicates text that is displayed on screen or entered by the user.
Example: pairdisplay -g oradb
< > (angle brackets) Indicates variables in the following scenarios:
Variables are not clearly separated from the surrounding text
or from other variables. Example:
Status-<report-name><file-version>.csv
Variables in headings.
[ ] (square brackets) Indicates optional values. Example: [ a | b ] indicates that you
can choose a, b, or nothing.
{ } (braces) Indicates required or expected values. Example: { a | b }
indicates that you must choose either a or b.
| (vertical bar) Indicates that you have a choice between two or more options or
arguments. Examples:
[ a | b ] indicates that you can choose a, b, or nothing.
{ a | b } indicates that you must choose either a or b.
value floor Floor function (round down value to the next integer)
Preface
xv
Command Control Interface User and Reference Guide
Convention Description
floor(value)
value ceiling
ceiling(value)
Ceiling function (round up value to the next integer)
_ (underlined text) Default value
This document uses the following icons to draw attention to information:
Icon Label Description
Note Calls attention to important or additional information.
Tip Provides helpful information, guidelines, or suggestions for
performing tasks more effectively.
Caution Warns the user of adverse conditions or consequences (for
example, disruptive operations).
WARNING Warns the user of severe conditions or consequences (for
example, destructive operations).
Convention for storage capacity values
Physical storage capacity values (for example, disk drive capacity) are
calculated based on the following values:
Physical capacity unit Value
1 KB
1,000 (10
3
) bytes
1 MB
1,000 KB or 1,000
2
bytes
1 GB
1,000 MB or 1,000
3
bytes
1 TB
1,000 GB or 1,000
4
bytes
1 PB
1,000 TB or 1,000
5
bytes
1 EB
1,000 PB or 1,000
6
bytes
Logical storage capacity values (for example, logical device capacity) are
calculated based on the following values:
Logical capacity unit Value
1 block 512 bytes
1 cylinder Mainframe: 870 KB
Open-systems:
OPEN-V: 960 KB
xvi
Preface
Command Control Interface User and Reference Guide
Logical capacity unit Value
Others: 720 KB
1 KB
1,024 (2
10
) bytes
1 MB
1,024 KB or 1,024
2
bytes
1 GB
1,024 MB or 1,024
3
bytes
1 TB
1,024 GB or 1,024
4
bytes
1 PB
1,024 TB or 1,024
5
bytes
1 EB
1,024 PB or 1,024
6
bytes
Accessing product documentation
Product documentation is available on Hitachi Data Systems Support
Connect:
https://knowledge.hds.com/Documents. Check this site for the
most current documentation, including important updates that may have
been made after the release of the product.
Getting help
Hitachi Data Systems Support Connect is the destination for technical
support of products and solutions sold by Hitachi Data Systems. To contact
technical support, log on to Hitachi Data Systems Support Connect for
contact information: https://support.hds.com/en_us/contact-us.html.
Hitachi Data Systems Community is a new global online community for
HDS customers, partners, independent software vendors, employees, and
prospects. It is the destination to get answers, discover insights, and make
connections. Join the conversation today! Go to community.hds.com,
register, and complete your profile.
Comments
Please send us your comments on this document: doc.comments@hds.com.
Include the document title and number, including the revision level (for
example, -07), and refer to specific sections and paragraphs whenever
possible. All comments become the property of Hitachi Data Systems
Corporation.
Thank you!
Preface
xvii
Command Control Interface User and Reference Guide
xviii
Preface
Command Control Interface User and Reference Guide
1
Overview
This chapter provides an overview of the Command Control Interface (CCI)
software and CCI operations on the Hitachi RAID storage systems.
About Command Control Interface
CCI functions
CCI functions available on all RAID storage systems
Overview
1-1
Command Control Interface User and Reference Guide
About Command Control Interface
The Command Control Interface software enables you to perform storage
system configuration and data management operations by issuing commands
to the Hitachi RAID storage systems:
Hitachi Virtual Storage Platform G200, G400, G600, G800
Hitachi Virtual Storage Platform F400, F600, F800
Hitachi Virtual Storage Platform G1000 and G1500 (VSP G1000 and
G1500)
For information about availability of Virtual Storage Platform F1500,
contact your Hitachi Data Systems representative.
Hitachi Virtual Storage Platform F1500 (VSP F1500)
Hitachi Unified Storage VM (HUS VM)
Hitachi Virtual Storage Platform (VSP)
Hitachi Universal Storage Platform V/VM (USP V/VM)
Hitachi TagmaStore® Universal Storage Platform (TagmaStore USP)
Hitachi TagmaStore® Network Storage Controller (TagmaStore NSC)
CCI continues to provide the proven functionality that has been available for
the USP V/VM and previous storage system models, including in-system
replication, remote replication, and data protection operations.
In addition, CCI for VSP and later provides command-line access to the same
provisioning and storage management operations that are available in the
GUI software (for example, Hitachi Command Suite, Storage Navigator). CCI
commands can be used interactively or in scripts to automate and
standardize storage administration functions, thereby simplifying the job of
the storage administrator and reducing administration costs.
Note: If a storage system rejects CCI commands, verify the software licenses
for the storage system (for example, TrueCopy) and the status of the
software product and storage system.
CCI functions
CCI functions matrix
The following table lists and describes the CCI functions available on the
Hitachi storage systems.
1-2
Overview
Command Control Interface User and Reference Guide
1/530