Dell MD3220i User manual

Category
Disk arrays
Type
User manual
Dell PowerVault MD3200 and
MD3220 Storage Arrays
Deployment Guide
book.book Page 1 Thursday, July 18, 2013 5:56 PM
Notes, Cautions, and Warnings
NOTE: A NOTE indicates important information that helps you make better use of
your computer.
CAUTION: A CAUTION indicates potential damage to hardware or loss of data if
instructions are not followed.
WARNING: A WARNING indicates a potential for property damage, personal
injury, or death.
__________________
© 2013 Dell Inc.
Trademarks used in this text: Dellâ„¢, the DELL logo, PowerEdgeâ„¢, PowerVaultâ„¢, and
OpenManage™ are trademarks of Dell Inc. Intel® is a registered trademarks of Intel Corporation in
the U.S. and other countries. Microsoft®, Windows®, Windows Server®, MS-DOS®, and Internet
Explorer® are either trademarks or registered trademarks of Microsoft Corporation in the United
States and/or other countries. Red Hat® and Red Hat Enterprise Linux® are registered trademarks of
Red Hat, Inc. in the United States and other countries. SUSE® is a registered trademark of Novell,
Inc. in the United States and other countries.
2013 - 07 Rev. A02
book.book Page 2 Thursday, July 18, 2013 5:56 PM
Contents 3
Contents
1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . 7
System Requirements . . . . . . . . . . . . . . . . . . . 7
Management Station Requirements
. . . . . . . . . 7
Introduction to Storage Arrays
. . . . . . . . . . . . . . 8
2 Hardware Installation . . . . . . . . . . . . . . . 11
Planning the Storage Configuration. . . . . . . . . . . 11
Connecting the Storage Array
. . . . . . . . . . . . . . 12
Cabling the Storage Array
. . . . . . . . . . . . . . . . 12
Redundant and Non-Redundant Configurations
. . 13
Single Controller Configurations
. . . . . . . . . . 13
Dual Controller Configurations . . . . . . . . . . . 16
Cabling PowerVault MD1200 Series Expansion
Enclosures
. . . . . . . . . . . . . . . . . . . . . . . . 22
Expanding With Previously Configured
PowerVault MD1200 Series Expansion
Enclosures
. . . . . . . . . . . . . . . . . . . . . 22
Expanding With New PowerVault MD1200
Series Expansion Enclosures. . . . . . . . . . . . 24
3 Installing PowerVault MD Storage
Software
. . . . . . . . . . . . . . . . . . . . . . . . . 27
Graphical Installation (Recommended) . . . . . . 28
book.book Page 3 Thursday, July 18, 2013 5:56 PM
4 Contents
Console Installation . . . . . . . . . . . . . . . . . 29
Silent Installation . . . . . . . . . . . . . . . . . . 29
Upgrading PowerVault MD Storage Software . . . . . 30
4 Post Installation Tasks. . . . . . . . . . . . . . 31
Before You Begin. . . . . . . . . . . . . . . . . . . . . 31
iSCSI Configuration Worksheet
. . . . . . . . . . . . . 32
IPv4 Settings—Worksheet
. . . . . . . . . . . . . 33
IPv6 Settings—Worksheet
. . . . . . . . . . . . . 34
Configuring iSCSI on Your Storage Array
. . . . . . . . 35
Automatic Configuration Using the Modular
Disk Configuration Utility
. . . . . . . . . . . . . . 36
Post Connection Establishment Steps
. . . . . . . . . . 39
Guidelines For Configuring Your Network For iSCSI . . 40
Microsoft Windows Host Setup
. . . . . . . . . . . . . 40
Using A DHCP server
. . . . . . . . . . . . . . . . 40
Using static IP addressing . . . . . . . . . . . . . 40
Using A DNS server
. . . . . . . . . . . . . . . . . 41
Using A WINS Server
. . . . . . . . . . . . . . . . 41
Linux Host Setup
. . . . . . . . . . . . . . . . . . . . . 42
Using DHCP
. . . . . . . . . . . . . . . . . . . . . 42
Using A Static IP Address
. . . . . . . . . . . . . 42
book.book Page 4 Thursday, July 18, 2013 5:56 PM
Contents 5
5 Uninstalling PowerVault MD
Storage Software . . . . . . . . . . . . . . . . . . 45
Uninstalling MD Storage Software From Windows . . 45
Uninstalling MD Storage Software From Linux
. . . . . 46
6 Getting Help. . . . . . . . . . . . . . . . . . . . . . . 47
Locating Your System Service Tag . . . . . . . . . . . 47
Contacting Dell . . . . . . . . . . . . . . . . . . . . . 47
Documentation Feedback
. . . . . . . . . . . . . . . . 48
A Appendix—Load Balancing. . . . . . . . . . . 49
Windows Load Balance Policy . . . . . . . . . . . . . 49
Round Robin With Subset
. . . . . . . . . . . . . 49
Least Queue Depth With Subset
. . . . . . . . . . 50
Changing Load Balance Policies in
Windows Sever 2008 . . . . . . . . . . . . . . . . 50
Setting Load Balance Policies in Linux
. . . . . . . 51
B Appendix—Manual Configuration
of iSCSI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Step 1: Discover the Storage Array
(Out-of-band Management Only)
. . . . . . . . . . . . 54
Default Management IPv4 Port Settings
. . . . . . 54
Automatic Storage Array Discovery
. . . . . . . . 55
Manual Storage Array Discovery
. . . . . . . . . 56
Setting Up the Array
. . . . . . . . . . . . . . . . 56
book.book Page 5 Thursday, July 18, 2013 5:56 PM
6 Contents
Step 2: Configure the iSCSI Ports on the
Storage Array
. . . . . . . . . . . . . . . . . . . . . . . 57
Step 3: Perform Target Discovery From
the iSCSI Initiator
. . . . . . . . . . . . . . . . . . . . 59
Step 4: Configure Host Access. . . . . . . . . . . . . . 61
Understanding CHAP Authentication
. . . . . . . . . . 62
What is CHAP?
. . . . . . . . . . . . . . . . . . . 62
Target CHAP
. . . . . . . . . . . . . . . . . . . . . 62
Mutual CHAP . . . . . . . . . . . . . . . . . . . . 62
CHAP Definitions
. . . . . . . . . . . . . . . . . . 63
Step 5: Configure CHAP Authentication on the
Storage Array (Optional)
. . . . . . . . . . . . . . . . . 63
Configuring Target CHAP Authentication on
the Storage Array
. . . . . . . . . . . . . . . . . . 63
Configuring Mutual CHAP Authentication on
the Storage Array . . . . . . . . . . . . . . . . . . 64
Step 6: Configure CHAP Authentication on the
Host Server (Optional)
. . . . . . . . . . . . . . . . . . 65
Step 7: Connect to the Target Storage Array From
the Host Server
. . . . . . . . . . . . . . . . . . . . . . 69
Step 8: (Optional) Set Up In-Band Management
. . . . . 72
book.book Page 6 Thursday, July 18, 2013 5:56 PM
Introduction 7
1
Introduction
This guide provides information about deploying Dell PowerVault MD3200
and Dell PowerVault MD3220 storage arrays. The deployment process
includes:
• Hardware installation
• Modular Disk Storage Manager (MDSM) software installation
• Initial system configuration
Other information includes system requirements, storage array organization,
and utilities.
NOTE: For more information on product documentation, see
dell.com/support/manuals.
MDSM enables an administrator to configure and monitor storage arrays for
optimum usability. The version of MDSM included on the PowerVault MD
series resource media can be used to manage both the PowerVault MD3200
series and the earlier PowerVault MD series storage arrays. MDSM is
compatible with both Microsoft Windows and Linux operating systems.
System Requirements
Before installing and configuring the PowerVault MD3200 series hardware
and software, ensure that a supported operating system is installed and the
minimum system requirements are met. For more information, see the
Support Matrix at dell.com/support/manuals.
Management Station Requirements
A management station uses MDSM to configure and manage storage arrays
across the network. A management station must meet the following
minimum system requirements:
• Intel Pentium or an equivalent processor (1333 MHz or faster) with 512
MB RAM (1024 MB recommended).
• 1 GB disk space.
book.book Page 7 Thursday, July 18, 2013 5:56 PM
8 Introduction
• Display resolution of 1024x768 with 16 million colors (1280x1024 32-bit
recommended).
• Microsoft Windows, Red Hat Enterprise Linux, or SUSE Linux Enterprise
Server.
NOTE: Supported operating systems include both native and guest operating
systems.
NOTE: Supported hypervisors include Microsoft Hyper-V, Citrix XenServer,
and VMware ESX and ESXi. For information about the supported versions, see
the
Support Matrix
at dell.com/support/manuals.
• Administrator or equivalent permissions.
Introduction to Storage Arrays
An enclosure containing physical disks accessed through RAID controller
modules is called a storage array. A storage array includes various hardware
components, such as physical disks, RAID controller modules, fans, and
power supplies, gathered into enclosures.
One or more host servers attached to the storage array can access the data on
the storage array. You can also establish multiple physical paths between the
host(s) and the storage array so that loss of any single path (for example,
through failure of a host server port) does not result in loss of access to data
on the storage array.
The storage array is managed by MDSM running on a:
• Host server—On a host server system, MDSM and the storage array
communicate management requests and event information using
SAS connections.
• Management station—On a management station, MDSM communicates
with the storage array either through an Ethernet connection to the
storage array management port or through an Ethernet connection to a
host server. The Ethernet connection passes management information
between the management station and the storage array using SAS
connections.
Using MDSM, you can configure the physical disks in the storage array into
logical components called disk groups and then divide the disk groups into
virtual disks. Disk groups are created in the unconfigured capacity of a storage
array. Virtual disks are created in the free capacity of a disk group.
book.book Page 8 Thursday, July 18, 2013 5:56 PM
Introduction 9
Unconfigured capacity comprises physical disks not already assigned to a disk
group. When a virtual disk is created using unconfigured capacity, a disk
group is automatically created. If the only virtual disk in a disk group is
deleted, the disk group is also deleted. Free capacity is space in a disk group
that is not assigned to any virtual disk.
Data is written to the physical disks in the storage array using RAID
technology. RAID levels define the way in which data is written to physical
disks. Different RAID levels offer different levels of accessibility, redundancy,
and capacity. You can set a specified RAID level for each disk group and
virtual disk on your storage array.
For more information about using RAID and managing data in your storage
solution, see the
Owner’s Manual
at
dell.com/support/manuals
.
book.book Page 9 Thursday, July 18, 2013 5:56 PM
10 Introduction
book.book Page 10 Thursday, July 18, 2013 5:56 PM
Hardware Installation 11
2
Hardware Installation
Before using this guide, ensure that you review the instructions in the:
•
Getting Started Guide
—The
Getting Started Guide
that shipped with the
storage array provides information to configure the initial setup of the system.
• Planning section of the
Owner’s Manual—
The planning section provides
information
about important concepts you must know before setting up
your storage solution. See the Owner’s Manual at
dell.com/support/manuals
.
Planning the Storage Configuration
Consider the following before installing your storage array:
• Evaluate data storage needs and administrative requirements.
• Calculate availability requirements.
• Decide the frequency and level of backups, such as weekly full backups
with daily partial backups.
• Consider storage array options, such as password protection and e-mail
alert notifications for error conditions.
• Design the configuration of virtual disks and disk groups according to a data
organization plan. For example, use one virtual disk for inventory, a second
for financial and tax information, and a third for customer information.
• Decide whether to allow space for hot spares, which automatically replace
failed physical disks.
book.book Page 11 Thursday, July 18, 2013 5:56 PM
12 Hardware Installation
Connecting the Storage Array
The storage array is connected to a host using two hot-swappable RAID
controller modules. The RAID controller modules are identified as RAID
controller module 0 and RAID controller module 1.
For more information, see the
Getting Started
Guide.
Each RAID controller module has four SAS In port connectors that provide
SAS connections to the host or node. Each RAID controller module also
contains an Ethernet management port and a SAS Out port connector. The
Ethernet management port allows you to install a dedicated management
station (server or stand-alone system). The SAS Out port allows you to
connect the storage array to optional expansion enclosures for additional
storage capacity. For more information, see the
Getting Started
Guide
.
Each Dell PowerVault MD3200 series storage array can be expanded to a
maximum of 120 (or 192, if enabled through the Premium Feature activation)
physical disks through a maximum of seven PowerVault MD1200 series
expansion enclosures.
NOTE: When you connect a host server to a storage array SAS In port connector,
any Out port connector of the server's host bus adapter (HBA) can be used.
Cabling the Storage Array
You can cable the storage array to host servers with:
• Single path data configuration—A single path configuration allows you to
connect a maximum of eight hosts. This is a non-redundant configuration.
• Dual path data configuration—A dual path configuration allows you to
connect a maximum of four hosts.
Choose the data configuration based on:
• Number of hosts required
• Level of data redundancy required
book.book Page 12 Thursday, July 18, 2013 5:56 PM
Hardware Installation 13
Redundant and Non-Redundant Configurations
Non-redundant configurations are configurations that provide only a single
data path from a host to the storage array. This type of configuration is only
recommended for non-critical data storage. Path failure from a failed or
removed cable, a failed HBA, or a failed or removed RAID controller module
results in loss of host access to storage on the storage array.
Redundancy is established by installing separate data paths between the host
and the storage array, in which each path is set to one of the two RAID
controller modules installed in the storage array. Redundancy protects the
host from losing access to data in the event of path failure, because both
RAID controller modules can access all the disks in the storage array.
Single Controller Configurations
Figure 2-1 through Figure 2-3 show two and four hosts, each connected to
only one RAID controller module. The hosts can share storage space but
without redundant paths, if one path were to fail, the server on that path
would be disconnected from the storage array.
Figure 2-1. Two Hosts Connected to a Single Controller
Server 1
Server 2
Storage array
Corporate, public,
or private network
book.book Page 13 Thursday, July 18, 2013 5:56 PM
14 Hardware Installation
Figure 2-2. Two Hosts Connected to a Single Controller
Server 1 Server 2
Storage array
Corporate, public,
or private network
book.book Page 14 Thursday, July 18, 2013 5:56 PM
Hardware Installation 15
Figure 2-3. Four Hosts Connected to a Single Controller
Server 1 Server 2
Storage array
Corporate, public,
or private network
Server 3 Server 4
book.book Page 15 Thursday, July 18, 2013 5:56 PM
16 Hardware Installation
Dual Controller Configurations
Figure 2-4 through Figure 2-6 show two and four hosts, each connected to two
RAID controller modules. Since each host has redundant paths, loss of a single
path would still allow access to the storage array through the alternate path.
Figure 2-4. Two Hosts Connected to Two Controllers
Server 1 Server 2
Storage array
Corporate, public,
or private network
book.book Page 16 Thursday, July 18, 2013 5:56 PM
Hardware Installation 17
Figure 2-5. Four Hosts Connected to Two Controllers
Server 1 Server 2
Storage array
Corporate, public,
or private network
Server 3
Server 4
book.book Page 17 Thursday, July 18, 2013 5:56 PM
18 Hardware Installation
Figure 2-6. Four Hosts Connected to Two Controllers
Server 1 Server 2
Storage array
Corporate, public,
or private network
Server 3 Server 4
book.book Page 18 Thursday, July 18, 2013 5:56 PM
Hardware Installation 19
Figure 2-7 shows eight hosts, each connected to only one RAID controller
module. This configuration allows the maximum number of hosts that may
be connected, but provides no redundancy.
Figure 2-7. Eight Hosts Connected to Two Controllers
Server 1 Server 2
Storage array
Corporate, public,
or private network
Server 3
Server 4
Server 8
Up to 8 hosts
book.book Page 19 Thursday, July 18, 2013 5:56 PM
20 Hardware Installation
Figure 2-8 and Figure 2-9 show up to four cluster nodes connected to two
RAID controller modules. Since each cluster node has redundant paths, loss
of a single path would still allow access to the storage array through the
alternate path.
Figure 2-8. Four Cluster Nodes Connected to Two Controllers
Four cluster nodes
Storage array
Corporate, public,
or private network
book.book Page 20 Thursday, July 18, 2013 5:56 PM
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74

Dell MD3220i User manual

Category
Disk arrays
Type
User manual

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI