NEC Storage Manager User s Manual (UNIX)

Size: px
Start display at page:

Download "NEC Storage Manager User s Manual (UNIX)"

Transcription

1 NEC Storage Software NEC Storage Manager User s Manual (UNIX) IS001-11E

2 NEC Corporation No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC Corporation. The contents of this book may be modified without notice in the future.

3 Preface This manual describes the usage of NEC Storage Manager. NEC Storage Manager centrally operates/manages NEC Storage series disk array subsystems connected to server machines. To do so, it manages the configurations and statuses of the NEC Storage series disk array subsystems and issues alert messages according to performance and fault information. ism consists of server and client functions. The server function controls the storage and the client function performs monitoring and operations, which enables remote management of the storage. In addition, the client function provides the following two GUIs: Windows-based GUI GUI based on the Web In this manual, ism client or client is used for describing the client function without separating the above two. Also, to describe the former GUI only, ism client (Win GUI) or client (Win GUI) is used, and to describe the latter GUI only, ism client (Web GUI) or client (Web GUI) is used. Refer to the NEC Storage Software Manual Guide (IS901) for the overview of NEC Storage and the related manuals and also the installation guide for how to install NEC Storage Manager and set the environment for it. Remarks 1. This manual explains functions implemented by the following program products: NEC Storage Manager and NEC Storage BaseProduct 2. This manual is applicable to the program products of the following versions: NEC Storage Manager Ver6.2 NEC Storage BaseProduct Ver The NEC Storage Manager is referred to as ism or Storage Manager in this manual unless clearly specified. Also, the following terms refer to the corresponding NEC Storage software products. Term NEC Storage Software Product AccessControl NEC Storage AccessControl BaseProduct NEC Storage BaseProduct CachePartitioning NEC Storage CachePartitioning ControlCommand NEC Storage ControlCommand (Note) DynamicDataReplication NEC Storage DynamicDataReplication ESMPRO Agent NEC Storage ESMPRO Agent ESMPRO Alert Manager NEC Storage ESMPRO Alert Manager

4 Term ESMPRO Manager PerformanceMonitor PerformanceOptimizer ReallocationControl RemoteDataReplication RemoteDataReplication/DisasterRecovery Storage Manager Express StoragePowerConserver VirtualStoragePartitioning VolumeProtect NEC Storage Software Product NEC Storage ESMPRO Manager NEC Storage PerformanceMonitor NEC Storage PerformanceOptimizer NEC Storage ReallocationControl NEC Storage RemoteDataReplication NEC Storage RemoteDataReplication/DisasterRecovery NEC Storage Manager Express NEC Storage StoragePowerConserver NEC Storage VirtualStoragePartitioning NEC Storage VolumeProtect Note: NEC Storage ControlCommand is a program product that has integrated the following five functions. ReplicationControl SnapControl ReplicationControl/DisasterRecovery ProtectControl PowerControl 4. The NEC Storage series disk array subsystem is referred to as a disk array in this manual unless clearly specified. Also, the following terms refer to the corresponding NEC Storage hardware products. Term NEC Storage Hardware Product D series E series xxx series or xxxx series Sxxx or Sxxxx * xxx and xxxx represent the model number. NEC Storage D series NEC Storage E series NEC Storage xxx series or NEC Storage xxxx series NEC Storage Sxxx or NEC Storage Sxxxx 5. The following terms in this manual refer to the NEC Storage software manuals. Term NEC Storage Software Manual Configuration Setting Tool User s Manual Configuration Setting Tool User s Manual (GUI) Messages Handbook Data Replication User's Manual (Function Guide) Data Replication User's Manual (Installation and Operation Guide) Performance Monitoring User's Manual Performance Optimization User's Manual Snapshot User s Manual (Function Guide) Data Retention User s Manual Thin Provisioning User s Manual NEC Storage Software Configuration Setting Tool User s Manual (IS002) NEC Storage Software Configuration Setting Tool User s Manual (GUI) (IS007) NEC Storage Software Messages Handbook (IS010) NEC Storage Software Data Replication User's Manual (Function Guide) (IS015) NEC Storage Software Data Replication User's Manual (Installation and Operation Guide for Linux) (IS020) NEC Storage Software Performance Monitoring User's Manual (IS025) NEC Storage Software Performance Optimization User's Manual (IS026) NEC Storage Software Snapshot User s Manual (Function Guide) (IS030) NEC Storage Software Data Retention User s Manual (IS040) NEC Storage Software Thin Provisioning User s Manual (IS044)

5 6. Trademarks and registered trademarks Microsoft, Windows, Windows Server, and Windows Vista are trademarks or registered trademarks of Microsoft Corporation in the United States and other countries. HP-UX is a registered trademark of Hewlett-Packard Co. in the United States. UNIX is a registered trademark of The Open Group in the United States and other countries. Solaris is a trademark or a registered trademark of Sun Microsystems, Inc. in the United States and other countries. Linux is a trademark or registered trademark of Mr. Linus Torvalds in the United States and other countries. Other product names and company names, etc. are trademarks or registered trademarks of the associated companies. 7. This product includes the OSSs below. For details on the licenses, refer to Appendix D in this manual. Apache log4j ( flex ( OpenSSL ( 8. In this document, the capacity is calculated based on units of 1024 (for example 1 KB = 1024 bytes) unless otherwise specified. 9. In this document, System Volume means Storage System Volume unless otherwise specified. 10. This document covers the combinations of NEC Storage Manager and all the NEC Storage series disk arrays supported by NEC Storage Manager. Some display contents and provided functions may not be intended for the NEC Storage disk array actually used. 11. In this document, matters to which careful attention needs to be paid will be described as follows: Be sure to observe the instructions. If the indications are ignored and the system is improperly operated, settings which have been already made might be affected. Type of Indication Type Description Describes contents which require users to pay special attention for operation. Describes information about restrictions on operation. 1st Edition in February th Edition in January 2010

6 Contents Part I Functions...I-1 Chapter 1 Basic Functions...I Configuration Display... I Function Overview... I Elements of ism Main Window... I Disk Array Information Display... I Partition Information Display... I Component Information Display... I Pool Information Display... I Logical Disk Information Display... I Physical Disk Information Display... I Cache Segment Information Display... I Port Information Display... I Connected Host Information Display... I Controller Information Display... I Disk Enclosure Information Display... I State Monitoring... I Function Overview... I Screen and Operation... I Nickname Setting... I Function Overview... I Screen and Operation... I Disk Array Monitoring for Failure... I Function Overview... I How the Function Works... I Log Output... I Function Overview... I How the Function Works... I Record Format... I Event Link... I Function Overview... I Outline of Link Definition and Processing... I How the Function Works... I Definition Update... I ESMPRO Link... I Function Overview... I Relationship with ESMPRO Manager... I Disk Array Failure Report... I Link Between ESMPRO Manager and ESMPRO Alert Manager... I ALIV ... I-142 Part II Operations...II-1 Chapter 2 Normal Operation... II Server Start/Stop...II Server Start...II Server Stop...II Environment Definition File Check Command...II Start Command...II Stop Command...II Link Definition Information Modification Command...II Disk Array Status Monitoring On/Off Command...II Performance Monitoring Display Refresh Rate Modification Command...II Client Start/Stop...II Starting the ism Client (Web GUI)...II-10 i

7 2.2.2 Starting the ism Client (Win GUI)...II Starting Functions...II Starting Storage Manager Express...II Collecting Host Information...II Starting/Terminating the Host Information Collection Command...II Example of Running an Option...II How to Check WWPN of HBA...II Storing Collected Host Information...II Starting/Terminating the Host Information Store Command...II Example of Running an Option...II Volume List Command (ismvollist)...ii Starting/Terminating Volume List...II Examples of Option Display...II Selecting Volume List in HP-UX...II Configuration Display Command (ismview)...ii Starting/Terminating the ismview Command...II ismview Command Options...II Configuration Information File Output Command (ismcsv)...ii Start and Stop...II Descriptions of Options...II Execution of the Command...II Descriptions of Output Files...II Configuration Display Command (ismcc_view)...ii Differences from the Configuration Display Command (ismview)...ii Configuration Information File Output Command (ismcc_csv)...ii Differences from the Configuration Information File Output Command (ismcsv)...ii-176 Chapter 3 Measures in Abnormalities... II Measures for Server Failure...II Fault Detection from Client Screen...II Checking the Server State...II Fault Caused by Environment Definition File Description...II Fault Caused by Failure in Connection with Disk Array...II Monitoring on Disk Array has Stopped Due to Failure...II Fault in Client Management...II Failures in Performance Relation, Replication and Snapshot Operation...II Restart after Server Abnormalities...II Others...II Information Gathering Method when Server Fault with Unknown Cause...II Measures for Client Fault...II Message Dialog...II Communication Fault...II Reconnection...II Information Gathering Method when Client Fault with Unknown Cause...II-185 Appendix A Specifications...A-1 A.1 Number of Monitored Disk Arrays...A-1 A.2 Number of Connected Clients...A-1 A.3 Maximum Number of ism Clients That Can Be Started Simultaneously...A-1 Appendix B File...B-1 B.1 Link Definition File...B-1 B.2 Host Information File...B-6 Appendix C Notes...C-1 C.1 Items about Server...C-1 C.2 Items about Client...C-3 Appendix D License...D-1 D.1 Apache log4j License...D-1 D.2 Flex License...D-7 D.3 OpenSSL License...D-8 ii

8 Index...Index-1 iii

9 Part I Functions

10 Chapter 1 Basic Functions Chapter 1 Basic Functions This chapter explains the functions that can be used when ism is introduced. ism provides the following basic functions necessary for disk array operations such as the function to display physical disk configuration in a disk array and logical disk configuration that can be recognized by the application server. Configuration display: A function to display the configuration information on the physical and logical components (resources) composing a disk array. State monitoring: A function to display the status of components (resources) composing a disk array. Configuration setting: A function to setup the disk array configurations and bind logical components. Failure monitoring: A function that to provide the information about failures had occurred in a disk array in real time. Log output: A function to output the operation history containing the information on failures and operation status to a system log and own log file. Event link: A function to notify an operator of the occurrence of a certain operating status or failure, and perform the defined actions on a server. With above six basic functions, more efficient operation of disk arrays can be achieved. The details of them are described in the following sections Confiiguratiion Diispllay The configuration display function is provided to display the information on the physical resource configuration in a disk array, logical disks recognized by application servers, and application servers. The configuration management of multiple disk arrays is possible with ism. They can be centrally monitored on an ism client with the same viewer. Operation administrator Storage Manager Configuration display screens Logical disks Controller (DAC) Disk enclosure (DE) Physical disks Disk array Figure 1-1 Operation Image I-2

11 Chapter 1 Basic Functions Functtiion Overviiew (1) Display Function The display function is provided to show the information of disk arrays, physical resource configuration of them, and logical disks recognized by application servers through an ism client. (Table 1-1) (*1) Section Disk array related Pool related (*2) Logical components Table 1-1 Display Information List Display Information Disk Array Subsystem name Monitoring status (by ism Server) (Operating) Status Operating status for each component Configuration change guard setting status Product ID Product FW REV Serial Number SAA (SubsystemAbsoluteAddress) World Wide Name Total capacity (data physical disk) Number of Nodes Number of DEs Control Path Cross Call information Cache partitioning function status User system code Revision of storage control software Copy Back Mode setting status Access Control information Partition information License Pool Name Type Physical Disk Type Pool Number (Operating) Status Expansion Status Progress Ratio RAID type Node number Eco mode Configuration setting enable/disable Capacity Free capacity Used capacity Snapshot capacity Snapshot control capacity Snapshot used capacity Snapshot threshold Snapshot reserve area list Configuration logical disk list Partition allocated Partition name Configuration physical disk list Actual capacity [GB] Actual used capacity [GB] Actual capacity threshold [GB] Actual capacity threshold (pre) [GB] I-3

12 Chapter 1 Basic Functions Logical components Section Logical disk related Cache segment related (*8) Display Information Logical disk name (including OS type) Number (Operating) Status Access mode RAID type Partition name Capacity Node number RANK number (*3) Pool Number (*2) Pool Name (*2) Physical Disk Type Existence of cache resident Progress ratio (At Formatting/Rebuilding/Copy back/ Expanding) RPL type Snapshot type Link Logical disk information during link Group Purpose Configuration change guard setting status Protection setting information Cache segment name Bind Mode Ownership Physical disk list Access Control information Actual used capacity [GB] LD capacity quota [GB] LD capacity threshold [GB] Capacity allocation Number (Group number - cache segment number) Segment name (Operating) Status Min [GB] Min [%] Max [GB] Max [%] Number of LDs Assigned Logical Disk [GB] LD Conf.Chg Allocate [GB] Allocate [%] Partition Allocated Partition Name Node Number I-4

13 Chapter 1 Basic Functions Section Display Information Physical disk related Number (Group number - Position number) (Operating) Status Capacity Rotation speed Transfer Rate Disk Type Product ID Product Rev Serial Number RANK Number (*3) Pool Number (*2) Pool Name (*2) Node Number Section (Rebuilding) Progress ratio Configuration change guard setting status Configuration logical disk list Controller related Component type (*4) (Operating) Status Information of each component (*5) Disk enclosure related Component type (*6) (Operating) Status Information of each component (*5) Node number Port related (*8) Port Number (Director number - Port number) Port Name Status Conf.Chg Protocol Mode Partition Allocated Partition Name Node Number WWNN WWPN Data Rate Topology N_Port_ID/Switch Host related (*7) Host Name Platform Type Logical disk status Partition name IP address World Wide Node Name World Wide Port Name Host Set Date Time Partition name Partition related (*8) Operating status for each component *1 When the disk array to be monitored is the E series, only a part of disk array information is displayed. For refering to the detailed information, use Storage Manager Express. *2 Displayed if the disk array to be monitored is a disk array with pool. *3 Displayed if the disk array to be monitored is other than a disk array with pool. *4 Director, Cache module, Service processor, Power supply, Battery, Fan, Temperature, Backboard, Junction box, Panel, Maintenance PC, Power control card *5 The displayed contents vary depending on the component. *6 Adapter, Power Supply, FAN, Temperature, Back Board, and EC Junction Box *7 Displayed if the disk array supports host information display. *8 Displayed only for the disk arrays for which VirtualStoragePartitioning license is unlocked. Physical components Physical components I-5

14 Chapter 1 Basic Functions (2) Configuration information Output Function This function is used to output the configuration information of disk array to a CSV format file. For an ism client (Web GUI), select [File] [State monitor] [CSV Output of Information List] from the menu. For an ism client (Win GUI), select [File] [CSV Output of Information List]. Then, specify the file save location and file name in the dialog. I-6

15 Chapter 1 Basic Functions Ellementts off iism Maiin Wiindow This subsection describes the elements of the main window for ism client. Figures 1-2 and 1-3 show the ism client main window displayed right after you log in to the ism server. Figure 1-2 and Figure 1-3 show, respectively, the window displayed when you use an ism client (Web GUI) and when you use an ism client (Win GUI) to log in to the ism server. There is no difference between these windows in the basic elements. The ism main window consists of the configuration display area, information list display area, and message display area. Refer to Starting the ism Client (Web GUI) or Starting the ism Client (Win GUI) for how to open the main window. Tool Bar Title Bar Menu Bar Configuration Display Information List Display Message Display Status Bar Figure 1-2 ism Main Window (ism Client (Web GUI)) I-7

16 Chapter 1 Basic Functions Title Bar Menu Bar Tool Bar Configuration Display Information List Display Status Bar Message Display Figure 1-3 ism Main Window (ism Client (Win GUI)) To monitor a D series or E series disk array, use the ism client (Web GUI) to log in to the ism server. (1) Title Bar The Title Bar displays the component name currently selected in the configuration display area in the following format: Status - (component name) If more than one connection is defined using the ism client (Win GUI), the Title Bar displays the nickname of the connection and the component name currently selected in the configuration display area in the following format: nickname : Status - (element name) I-8

17 Chapter 1 Basic Functions (2) Menu bar (ism client (Web GUI)) This section describes the menus displayed when an ism client (Web GUI) is used. For details of the menus displayed when the ism client (Win GUI) is used, refer to (3) Menu bar (ism client (Win GUI)). Perform various operations by selecting the necessary item from the menu. For details, refer to the description of each menu. Displays the login screen for the ism server being connected. Disconnects the ism server being connected. Refer to 2.2.3, Starting Functions. Refer to 1.4, Disk Array Monitoring for Failure. Refer to 1.1.1, Function Overview. Displays the status bar. Displays the message display area. Displays the message display area with stripes. Displays the information list display area with stripes. Display the background graphic in the configuration display area. Displays property information if the currently selected component has the information. For details, refer to the description on the detail information screen of each component. Displays snapshot-volume (SV) or link-volume (LV) in the logical disk list on the main window, pool properties screen, and physical disk properties screen. For the disk array not using the snapshot (DynamicSnapVolume) function, this setting is ignored. Records the size of each area on the main screen (the height is recorded as the proportion to the whole screen), which is used as the initial value at the next client (Web GUI) startup. Also saves the column order, column widths, and column items to be displayed in the information list display area, and restores at the next startup. Refreshes the information list display to get the latest information from the ism server. I-9

18 Chapter 1 Basic Functions Displays the Log Collection screen to get the information required for the failure analysis. Refer to 1.2, State Monitoring. Refer to 1.3, Nickname Setting. Refer to 1.3, Nickname Setting. Deletes all information of the host being selected. Issues an instruction to start or stop the blink of the service LED installed at the front of a controller or a disk enclosure selected on the state monitoring screen displayed in the information display area. Displays the Help about ism client. Displays the Help about the dialogs related to the main window. Displays the Help about the messages to be displayed in the message display area. Displays the version information of the ism server being connected to the ism client. I-10

19 Chapter 1 Basic Functions (3) Menu bar (ism client (Win GUI)) This section describes the menus displayed when an ism client (Win GUI) is used. For details of the menus displayed when the ism client (Web GUI) is used, refer to (2) Menu bar (ism client (Web GUI)). Perform various operations by selecting the necessary item from the menu. For details, refer to the description of each menu. Refer to 2.2.2, Starting the ism Client (Win GUI). Disconnects the ism server being connected. Refer to 2.2.3, Starting Functions. Refer to 1.4, Disk Array Monitoring for Failure. Refer to 1.1.1, Function Overview. Starts the editor to save the contents currently displayed in the message display area as a text file. Refer to 2.2.2, Starting the ism Client (Win GUI). Disconnects the ism server and exits the ism client. Displays the tool bar. Displays the status bar. Displays the information list display area normally or with stripes. Displays the message display area normally or with stripes. Saves the current location and size of main window as the initial value at the next ism client startup. (For other screens, the screen location and size must be saved separately.) Also saves the width of each column in the information list display area to restore it at the next startup. Displays property information if the currently selected component has the information. For details of each component, refer to the description on the detail information screen. Refreshes the information list display to get the latest information from the ism server. Displays snapshot-volume (SV) or link-volume (LV) in the logical disk list on the main window, pool properties screen, and physical disk properties screen. For the disk array not using the snapshot (DynamicSnapVolume) function, this setting is ignored. I-11

20 Chapter 1 Basic Functions Refer to 1.2, State Monitoring. Refer to 1.3, Nickname Setting. Refer to 1.3, Nickname Setting. Displays the Log Collection screen to get the information required for the fault analysis. Displays the Help of the ism client. Displays the Help for the dialog list related to the main screen. Displays the Help for the message list to be displayed in the message display area. Displays the version information of ism client and the version information of ism server if it is connected. (4) Toolbar The tool bar contains the buttons to perform the functions frequently used on the menu, which are [Connect], [Disconnect], [Configuration Settings/References], [Performance], [Optimizer], [Replication], [Snapshot], [Protection], and [Stop Alarm]. For details, refer to the corresponding items in (2) Menu bar (ism client (Web GUI)) or (3) Menu bar (ism client (Win GUI)). (5) Status Bar The Status bar in the lowest line is the area containing the current status of the ism client. During the establishment of session, the status bar shows the connection status ([Con] or [Connected]), IP address of server, port number of server, client name, user level, types and the number of displayed components. When an ism client (Web GUI) is used, the types and the number of displayed components are displayed in the status bar of the information list display area. (6) Configuration display area This is the area containing the (physical/logical) configurations of the disk arrays to be managed. You can define a disk array to be managed in the ism server connected to the ism client. When the disk array where VirtualStoragePartitioning has been installed is monitored, the configuration display area contains tabs labeled Disk Array for viewing general information related to the resources, and Partition for viewing the partition information. If, however, you log into the system as the partition user, only the partition tab is displayed. In the disk array tab, the configuration information of the disk array is displayed in a Tree View form divided into Disk array layer, Component layer, and Individual Component layer. I-12

21 Chapter 1 Basic Functions Disk array layer: Component layer: Displays the disk arrays managed by the ism server. Displays the category of resources that constitute a disk array. Individual component layer: Displays a list of disks that have been bound/installed in this layer if the component is a pool, a logical disk, or a physical disk. Figure 1-4 Configuration Information Display in Tree View In the partition tab, the configuration information of the disk array is displayed in a Tree View form divided into Disk array layer, Partition layer, Component layer, and Individual Component layer. Disk array layer: Partition layer: Component layer: Displays the disk array for which VirtualStoragePartitioning has been purchased. Lists the partitions created for the disk array. Displays the category of resources that constitute a partition. Individual component layer: Displays a list of disks that have been bound/installed in this layer if the component is a pool, a logical disk, or a physical disk. Figure 1-5 Configuration Information in a Tree View Display I-13

22 Chapter 1 Basic Functions In the configuration display area, the status of the components to be managed is shown with the shape and (shaded/unshaded) colors of icons. Refer to the explanation of icons on each information list screen for details on the icons. (a) Disk array layer This layer consists of disk arrays managed by the ism server. The operating or monitoring status is shown using an icon. (b) Partition layer The partition layer is displayed only in the partition tab. The layer consists of the partitions created in a disk array. The operating or monitoring status is shown using an icon. (c) Component layer (*1) The resources composing a disk array are classified into the following eight categories. - Pool: The assembly of pools bound in the disk array (*2) - Logical disk: The assembly of logical disks bound in the disk array - Physical disk: The assembly of physical disks stored in the disk array - Cache segment: The assembly of cache segments bound in the disk array (*3) - Port: The assembly of host ports stored in the disk array (*3) - Connected Host: The assembly of connected hosts using logical disks bound in the disk array as volumes (*4) - Controller: The assembly of control system resources in the disk array, which is composed of a director, a cache module, an adapter, a power supply, a fan, and other equipment. - Enclosure: A disk enclosure unit that stores physical disks, which is composed of an adapter, a power supply, a fan, and other equipment. Enclosure may not be provided depending on your system configuration. This layer consists of above components, which are shown using icons with their operating/monitoring status. *1 For an E series disk array, the component layer is not displayed. For referring to the detailed information, use Storage Manager Express. *2 Pool-related information is displayed if the disk array to be monitored is a disk array with pool. *3 Information related to cache segments and ports is displayed only when VirtualStoragePartitioning has been installed on the disk array. *4 Connected Host-related information is displayed if the disk array to be monitored supports the display of the information. (d) Individual component layer (*1) This layer consists of pools, logical disks, physical disks, controllers, and enclosures, which are shown using icons with operating status/monitoring status. Either a logical disk number or logical disk name can be displayed to identify a logical disk by using the environmental settings. For details on the setting method, refer to 2.2 Client Start/Stop. I-14

23 Chapter 1 Basic Functions When the snapshot function is used, snapshot-volume (SV) and link-volume (LV) of logical disks can be set to non-display. Setting can be made from the menu bar. For details, refer to (2) Menu bar (ism client (Web GUI)) or (3) Menu bar (ism client (Win GUI)). To display the detailed information of a selected component, right-click on the component and select [Properties]. *1 For an E series disk array, the individual component layer is not displayed. For referring to the detailed information, use Storage Manager Express. (7) Information list display area This is the area containing the information on the components that are one level lower than the component that you select (with left click). (*1) If a disk array is selected in the Diskarray tab in the configuration display area, the list contains the information on the resources ( Pool, (*2) Logical Disk, Physical Disk, Cache Segment, Port, Connected Host, (*3) Controller, and Disk Enclosure ) composing the disk array. If a partition is selected in the Partition tab, the list shows the information on the resources ( Pool, Logical Disk, Physical Disk, Cache Segment, Port, Connected Host, Controller, and Disk Enclosure ) composing the partition. Each list initially displayed contains only the columns displayed by default. You can select whether or not to display each column for your purposes. Right-click on a column to change the setting. Moreover, you can change the column display order. The changed settings are saved and will be restored at the next startup by selecting [View] [Record Screen Information] from the menu bar. The following screens are displayed according to the component selected in the configuration display area. - Disk Array Subsystem list screen: displays disk array name and operating status - Partition list screen: displays the list of partitions created in the disk array - Component list screen: displays the operating status for each component - Pool list screen: displays pool name, operating status, and various attribute information. (*2) - Logical Disk list screen: displays logical disk name, operating status, and various attribute information - Physical Disk list screen: displays operation status of physical disk and various attribute information - Cache Segment list screen: displays the cache segment name, capacity, and various attribute information. (*3) - Port list screen: displays the port number and various attribute information. (*3) - Controller list screen: displays the operation status by component - Disk Enclosure list screen: displays the operation status for each component - Connected Host list screen: displays the connected host name, operating status, and various attribute information. (*4) *1 For an E series disk array, the start screen of Storage Manager Express is displayed. Start Storage Manager Express to get the information. *2 Pool-related information is displayed if the disk array to be monitored is a disk array with pool. I-15

24 Chapter 1 Basic Functions *3 Information related to cache segments and ports is displayed for a disk array for which VirtualStoragePartitioning has been purchased. *4 Connected Host-related information is displayed if the disk array to be monitored supports the display of the information. (8) Message display area This is the area containing the messages to notify the failures or the operating status of disk arrays and ism itself. Double-clicking on a message displays the Help information of the message. Refer to the Messages Handbook for the contents of the messages. You can select whether or not to display each column for your purposes. Right-click on a column to change the setting. Moreover, you can change the column display order. The changed settings are saved and will be restored at the next startup by selecting [View] [Record Screen Information] from the menu bar. I-16

25 Chapter 1 Basic Functions Diisk Array IInfformattiion Diispllay Disk array information is displayed in the following areas: Configuration display area Disk Array Subsystem list screen in the information list display area Disk Array Subsystem detail information screen that is shown as properties This section describes each item displayed as disk array information. (1) Disk Array Subsystem list screen You can see the disk array names and their operating status in this screen (panes surrounded by dashed lines in Figure 1-6 and 1-7) by selecting ism server in the configuration display area. For ism client (Web GUI), SAA is not displayed at initial setting. If you want to display the item, right-click on the column title bar and set SAA to be displayed. Figure 1-6 Disk Array Subsystem List Screen (ism Client (Web GUI)) I-17

26 Chapter 1 Basic Functions Figure 1-7 Disk Array List Screen (ism Client (Win GUI)) (i) Icon (operating status/monitoring status of disk array) Displays the general operating status of the disk array as well as the status obtained from the ism server that monitors the disk array using an icon placed in front of the name of each component. Icon etc. etc. Table 1-2 Display Icons Status The disk array is under monitoring, and all disk array components are in the normal state. The icon s shape differs by disk array type. The disk array is under monitoring, and an event or failure (except a critical failure) that needs maintenance had occurred in any of the disk array components. (Note 1, 2) The disk array is under monitoring, and a critical failure had occurred in any of the disk array components. (Note 2) The disk array is under monitoring and a threshold excess had occurred in any of the pools for snapshot. Alternatively, an actual capacity threshold excess or actual capacity threshold (pre) excess had occurred in a virtual capacity pool. (Note 3) The disk array is out of monitoring or under configuration setting. The icon s shape varies depending on the disk array type. The disk array is out of monitoring or under configuration setting. If this icon is displayed, an event or failure (except a critical failure) that needs maintenance had occurred in any of the disk array components just before monitoring was stopped. I-18

27 Chapter 1 Basic Functions Icon Status The disk array is out of monitoring or under configuration setting. If this icon is displayed, a critical failure had occurred in any of the disk array components just before monitoring was stopped. The disk array is out of monitoring or under configuration setting. If this icon is displayed, a threshold excess had occurred in any of the pools just before monitoring was stopped. The disk array is out of monitoring. If this icon is displayed, the network settings of the disk array include an incorrect IP address, or the connection to the ism server failed. Note 1. You can choose or to show the status of the disk array where an event or failure (except critical failure) that needs maintenance had occurred. Refer to 2.2, Client Start/Stop for details of the switching method. Note 2. Whether a failure is critical or not is decided at a higher layer, and the icon is displayed accordingly. Refer to 1.2.2, Screen and Operation about the component status icon and display in higher layer. Note 3. If a threshold excess had occurred in a pool for snapshot or if an actual capacity threshold excess or actual capacity threshold (pre) excess had occurred in a virtual capacity pool, the icon is displayed. However, when any failure (including a critical failure) or event that needs maintenance had occurred, the display of this icon is preceded by that of the icon to show the general operating status of the disk array. For details on actions to be taken when a snapshot threshold excess had occurred, refer to the Snapshot User s Manual (Function Guide). For details on actions to be taken when a virtual capacity threshold excess had occurred, refer to the Thin Provisioning User s Manual. Note 4. The shaded icons indicate the status of the disk arrays that are currently out of monitoring. (ii) Disk Array Subsystem Name Displays an arbitrary name that you set to identify the disk array. Refer to 1.3, Nickname Setting for setting method. (iii) Status Displays the general operating status of the disk array. Ready: All disk array components are in normal operation. Ready (Maintenance): An event that needs maintenance had occurred in any of the disk array components. Fault: A failure had occurred in any of the disk array components. (iv) Monitoring Status Displays the monitoring status for the disk array. Running: Status that the disk array is currently under monitoring Starting demand: Status that monitoring for the disk array is in the start process I-19

28 Chapter 1 Basic Functions Configuring: Status that the configuration setting of the disk array is under way Stopping demand: Status that monitoring for the disk array is in the stop process by user s request Stop: Status that monitoring for the disk array is being stopped by user s request Stop (Maintenance): Status that monitoring for the disk array is being stopped to carry out maintenance such as configuration change Stop (Fault): Status that monitoring for the disk array is being stopped due to failure detection Wait Recovery: Status that the disk array waits for the recovery of monitoring that has been stopped due to a disk array failure or control path failure Unknown: Status in which disk array components are not being monitored. This status indicates that the network settings of the disk array include an incorrect IP address, or the connection to the ism server failed. (v) Product ID Displays the product model name (maximum of 16 characters) of the disk array. (vi) SAA Displays the Subsystem Absolute Address (56 hexadecimal digits) to identify the disk array. I-20

29 Chapter 1 Basic Functions (2) Disk Array Subsystem detail information screen This screen (Figures 1-8, 1-9, 1-10, 1-11, or Figure 1-12 for the E series) shows the detailed information of the disk array selected (with left click) in the configuration display area or in the information list display area. The screen is obtained by right clicking on the selected disk array and selecting [Properties]. It can also be obtained from the menu by selecting [View] [State monitor] [Properties] (for ism client (Web GUI)), or by selecting [View] [Properties] (for ism client (Win GUI).) Figure 1-8 Disk Array Subsystem Detail Information-1 ([General] Tab) I-21

30 Chapter 1 Basic Functions Figure 1-9 Disk Array Subsystem Detail Information-1 (Detail Information Displayed from the Partition Tab) (i) (ii) Name Displays a name to identify the disk array. The information you see here is the same as shown in the Disk Array Subsystem list screen described earlier in (1). Monitoring Status Displays the monitoring status for the disk array. The information you see here is the same as shown in the Disk Array Subsystem list screen described earlier in (1). When the status is Waiting Recovery, or Stop (Fault), or Unknown, the cause of failure that resulted in monitoring stop for the disk array is shown in any of the following types. - Control path failure: Failure caused by control path (network failure, etc.) - Disk array failure: Internal failure in disk array - Others: Failure caused by management server If the client is under configuration setting, the login user name and the IP address of the client are I-22

31 Chapter 1 Basic Functions displayed. * For details on failures, refer to messages of operation log, etc. output upon a failure. (iii) Status The general operating status of the entire disk array and disk array components. The information you see here is the same as shown in the Disk Array Subsystem list screen described earlier in (1). One of the followings is additionally displayed as the disk array shutdown status. (shutting down): Shutdown is in progress. (shutdown completed): Shutdown has normally completed. (shutdown fail): Shutdown has failed. No additional display: Shutdown is not performed. (iv) Conf.Chg Displays one of the followings as the setting status of change guard for the disk array name. This is not displayed for the disk array that does not support the configuration change guard function. Lock: Guard has been set. -: Guard has not been set. (v) Product ID Displays the product model name (maximum of 16 characters) of the disk array. The information you see here is the same as shown in the Disk Array Subsystem list screen described earlier in (1). (vi) Product FW Rev Displays the Product Revision (4 characters) of the disk array. (vii) Serial Number Displays the product number (16 characters) of the disk array. (viii) SAA Displays the SAA of the disk array. The information you see here is the same as shown in the Disk Array Subsystem list screen described earlier in (1). (ix) World Wide Name Displays the WWNN (World Wide Node Name in 16 digits in hexadecimal) of the disk array. This item is not displayed if the ism on the server is Ver1.5 or earlier. (x) Total Capacity Displays the total capacity of physical disk (total capacity of data disk) of the disk array in Gigabyte units (1 G byte=1,073,741,824 byte) and Terabyte units. (1 T byte = 1,024 G byte). (xi) Number of DEs Displays the number of disk enclosure cabinets connected to the disk array. It is not displayed if not obtained from the disk array. (xii) Number of Nodes Displays the number of nodes of the disk array. This item is displayed for the disk array with node. (xiii) Control Path Displays the control path to the disk array used by the ism server, which is shown by IP Address (when LAN connection is used) or FC pathname (when using a special file name or else). The first path is the one currently controlled and the second path is the one to be switched in cause of failure. If I-23

32 Chapter 1 Basic Functions is shown after the second path, it indicates that an error had occurred on the path Example 1: LAN connection: Control Path (1): Control Path (2): Example 2: FC connection Control Path (1): /dev/nec_ism/mkdl/c15t0d0 Control Path (2): /dev/nec_ism/mkdl/c24t0d0 - is displayed in Control Path (2) if the path to be switched in case of failure is not provided. (xiv) Cross Call Displays the setting information of Cross Call function in any of the followings: ON: Cross Call is enabled. OFF (Auto Assignment OFF): Cross Call is disabled and Auto Assignment function is disabled. OFF (Auto Assignment ON): Cross Call is disabled and Auto Assignment function is enabled. -: Cross Call function is not supported. (xv) Cache Partitioning Function As information about CachePartitioning function, either of the followings is displayed. This column does not appear when CachePartitioning is not purchased. ON: CachePartitioning function is enabled. OFF: CachePartitioning function is disabled. (xvi) User System Code Displays the 10-digit user system code if the user is under a maintenance contract. If not, is displayed. Even if the user is under a maintenance contract, may be displayed depending on the combination of ism and the disk array. (xvii) Revision of Storage Control Software Displays the revision of storage control software (4 characters). - is displayed if no value is set. This column does not appear if the revision information cannot be obtained from the disk array. (xviii) Copy Back Mode Displays the setting information of Copy Back Mode function in either of the followings. This column appears only when the disk array supports Copy Back Mode. ON: Copy back the data when replacing a faulty disk. OFF: Does not copy back the data when replacing a faulty disk. I-24

33 Chapter 1 Basic Functions Figure 1-10 Disk Array Subsystem Detail Information-2 ([Access] Tab) For a disk array with only iscsi, the [Access (iscsi)] tab is displayed instead of the [Access] tab. I-25

34 Chapter 1 Basic Functions Figure 1-11 Disk Array Subsystem Detail Information-2 ([Access (iscsi)] Tab) (i) Access Control information Displays the information on Access Control of the disk array. For a disk array with only FC, it includes ON/OFF setting of Access Control, port information, and LD information. For a disk array with only iscsi, displayed information includes information on the isns servers, iscsi ports, and iscsi LD Sets. For details, refer to the Configuration Setting Tool User s Manual (GUI). I-26

35 Chapter 1 Basic Functions Figure 1-12 Disk Array Subsystem Detail Information-3 ([License] Tab) (i) License Displays the availability status of the products on the disk array in any of the followings: Available: The product is available. Available (Expires on YYYY/MM/DD): The product is available until the expiration date. Not Available (Product is needed): The product is unavailable because it is not purchased. Not Available (License capacity is insufficient compared with total capacity (x.xtb)): The purchased license capacity is insufficient compared with the total disk array capacity. Not Available (Expired): The product is unavailable because the license has expired. Not Available (License capacity is insufficient compared with the number of DEs (xdes)): The purchased license capacity is insufficient compared with the number of disk enclosures. I-27

36 Chapter 1 Basic Functions Not Available (License is insufficient compared with total number of nodes (xxnodes)): The purchased license capacity is insufficient compared with the number of nodes. Not Available (Model is disagreement): The target disk array type of the purchased license and the actual disk array type are different. For an E series disk array, the screen shown in Figure 1-13 is displayed. For referring to the detailed information not displayed on the screen, use Storage Manager Express. Figure 1-13 Disk Array Subsystem Detail Information for E Series (i) Name Displays a name to identify the disk array. The information you see here is the same as shown in Figures 1-8 and 1-9 described earlier. (ii) Monitoring Status Displays the monitoring status for the disk array. The information you see here is the same as shown in Figures 1-8 and 1-9 described earlier. (iii) Status The general operating status of the entire disk array and disk array components. The information you see here is the same as shown in Figures 1-8 and 1-9 described earlier. However, the disk array shutdown status is not added. (iv) Product ID Displays the product model name of the disk array. The information you see here is the same as shown in Figures 1-8 and 1-9 described earlier. (v) Product FW Rev Displays the Product Revision of the disk array. The information you see here is the same as shown in Figures 1-8 and 1-9 described earlier. I-28

37 Chapter 1 Basic Functions (vi) Serial Number Displays the product number (14 characters) of the disk array. (vii) World Wide Name Displays the WWNN (World Wide Node Name) of the disk array. The information you see here is the same as shown in Figures 1-8 and 1-9 described earlier. (viii) Control Path Displays the control path to the disk array used by the ism server, which is shown by IP Address. The information you see here is the same as shown in Figures 1-8 and 1-9 described earlier. I-29

38 Chapter 1 Basic Functions Parttiittiion IInfformattiion Diispllay If VirtualStoragePartitioning has been purchased for the disk array to be monitored, partition information is displayed in the following areas: Configuration display area Partition list screen in the information list display area Partition detail information screen that is shown as properties This section describes each item displayed as partition information. (1) Partition list screen The partition list screen (pane surrounded by dashed lines in Figure 1-14) is displayed by selecting (click the left button) the disk array in the partition tab of the configuration display area. It displays partition names and operating status. If you login to the system as a partition user, only the partitions authorized for the partition user are displayed. Figure 1-14 Partition List Screen (ism Client (Web GUI)) (i) Icon (operating status of partition components) Displays the integrated operating status of a partition component with the icon next to the partition name. I-30

39 Chapter 1 Basic Functions Icon Table 1-3 Display Icons Status The partition is under monitoring and all partition components are in the normal state. The partition is under monitoring, allocation to the partition fails, and configuration of the partition is invalid. The partition is under monitoring, and an event or failure (except a critical failure) that needs maintenance had occurred any of the partition components (Note 1, 2). The partition is under monitoring, and a critical failure had occurred any of the partition components (Note 2). The partition is under monitoring, and a threshold excess had occurred in any of the pools for snapshot. Alternatively, an actual capacity threshold excess or actual capacity threshold (pre) excess had occurred in a virtual capacity pool. (Note 3) The partition is out of monitoring or the disk array to which the partition belongs is under configuration setting. The partition is out of monitoring or the disk array to which the partition belongs is under configuration setting. If this icon is displayed, allocation to the partition fails and partition configuration is invalid. The partition is out of monitoring or the disk array to which the partition belongs is under configuration setting. If this icon is displayed, an event or failure (except critical failure) that needs maintenance had occurred in any of the partition components just before monitoring was stopped. The partition is out of monitoring or the disk array to which the partition belongs is under configuration setting. If this icon is displayed, a critical failure had occurred in any of the partition components just before monitoring was stopped. The partition is out of monitoring or the disk array to which the partition belongs is under configuration setting. If this icon is displayed, a threshold excess had occurred in any of the pools just before monitoring was stopped. Note 1. You can choose or to show the status of the partition where an event or failure (except critical failure) that needs maintenance had occurred. Refer to 2.2, Client Start/Stop for details of the switching method. Note 2. Whether a failure is critical or not is decided at a higher layer, and the icon is displayed accordingly. Refer to 1.2.2, Screen and Operation for the component status icon and display in higher layers. Note 3. If a threshold excess had occurred in a pool for snapshot or if an actual capacity threshold excess or actual capacity threshold (pre) excess had occurred in a virtual capacity pool, the icon is displayed. However, when any failure (including a critical failure) or event that needs maintenance had occurred, the display of this icon is preceded by that of the icon to show the general operating status of the disk array. For details on actions to be taken when a snapshot threshold excess had occurred, refer to the Snapshot User's Manual (Function Guide). For details on actions to be taken when a virtual capacity threshold excess had occurred, refer to the Thin Provisioning User s Manual. Note 4. The shaded icons indicate the status of the partitions that are currently out of monitoring. I-31

40 Chapter 1 Basic Functions (ii) Partition Name This is a name to identify the partition. (iii) Status Displays the integrated operating status of the entire partition. Ready: All partition components are in normal operation. Ready (Maintenance): An event that needs maintenance had occurred any of the partition components. Note (Partition configuration is invalid): Allocation to the partition fails and partition configuration is invalid. Fault: A failure had occurred any of the partition components. Unknown: Relation of the resource allocated to the partition is the unknown status. (2) Partition detail information screen This screen (Figure 1-15) shows the detailed information of the partition selected (with left click) in the configuration display area or the information list display area. The screen is obtained by right-clicking on the selected partition and selecting [Properties]. (It can also be obtained from the menu by selecting [View] [State monitor] [Properties].) Figure 1-15 Partition Detail Information (i) (ii) Name This is the partition name. The information you see here is the same as shown in the Partition list screen described earlier in (1). Status Displays the general operating status of partition components. The information you see here is the same as shown in the Partition list screen described earlier in (1). I-32

41 Chapter 1 Basic Functions Componentt IInfformattiion Diispllay You can see the operating status of each component in this screen (pane surrounded by dashed lines in Figure 1-16 or 1-17) which is obtained by selecting a disk array (other than that of E series) in the configuration display area. For D series, a front view of the disk array is shown at the top of the information list display area. Figure 1-16 Component List Screen (ism Client (Web GUI)) I-33

42 Chapter 1 Basic Functions Figure 1-17 Component List Screen (ism Client (Win GUI)) (i) Icon (operating status/monitoring status of disk array component) Displays the operating or monitoring status of each component, which is a pool (*1), logical disk, physical disk, cache segment (*2), port (*2), connected host (*3), controller, or disk enclosure. (Enclosure is not provided depending on your system configuration.) The icon is placed in front of the name of each component. Icon Table 1-4 Display Icons Status The component (pool) is in normal operation. (*1) The component (logical disk) is in normal operation. The component (physical disk) is in normal operation. The component (cache segment) is in normal operation. The component (port) is in normal operation. The component (controller) is in normal operation. The component (disk enclosure) is in normal operation. The component (connected host) is in normal operation. (*2) An event or failure (except a critical failure) that needs maintenance had occurred in any of the components. (Note 1, 2) A critical failure had occurred in any of the components. (Note 2) A threshold excess had occurred in any of the pools for snapshot. Alternatively, an actual capacity threshold excess or actual capacity threshold (pre) excess had occurred in a virtual capacity pool. (Note 3). I-34

43 Chapter 1 Basic Functions Icon etc. Status The disk array is out of monitoring or under configuration setting. The component is out of monitoring or under configuration setting. If this icon is displayed, an event or failure (except critical failure) that needs maintenance had occurred in any of the components just before monitoring was stopped. The component is out of monitoring or under configuration setting. If displaying this icon, a critical failure had occurred in any of the components just before monitoring was stopped. The component is out of monitoring or under configuration setting. If this icon is displayed, a threshold excess had occurred in any of the pools for snapshot just before monitoring was stopped. Note 1. You can choose whether to use to show the status of a component where an event or failure (except critical failure) that needs maintenance had occurred. Refer to 2.2, Client Start/Stop for details of the switching method. Note 2. Whether a failure is critical or not is decided at a higher layer, and the icon is displayed accordingly. Refer to 1.2.2, Screen and Operation for status icon of component and display in the higher layer. Note 3. If a threshold excess had occurred in a pool for snapshot or if an actual capacity threshold excess or actual capacity threshold (pre) excess had occurred in a virtual capacity pool, the icon is displayed. However, when any failure (including a critical failure) or event that needs maintenance had occurred, the display of this icon is preceded by that of the icon to show the general operating status of the disk array. For details on actions to be taken when a snapshot threshold excess had occurred, refer to the Snapshot User s Manual (Function Guide). For details on actions to be taken when a virtual capacity threshold excess had occurred, refer to the Thin Provisioning User s Manual. Note 4. The shaded icons indicate the status of the disk arrays that are currently out of monitoring. (ii) Type Displays the type of the disk array component, which is Pool (*1), Logical Disk, Physical Disk, Controller, Enclosure, or Connected Host (*2). (iii) Status Displays the general operating status of the disk array component. Ready: All disk array components are in normal operation. Ready (Maintenance): An event that needs maintenance had occurred anywhere in the disk array component. Failure: A failure had occurred in any of the disk array components. (iv) Number of Elements Displays the number of components included by type. For the number of logical disk components, the number of all logical disks is displayed regardless of I-35

44 Chapter 1 Basic Functions the display settings on the menu for the snapshot-volume (SV) and link-volume (LV). *1 Pool-related information is displayed if the disk array to be monitored is a disk array with pool. *2 Connected host-related information is displayed if the disk array to be monitored supports host information display. For the E series, the start screen of the Storage Manager Express (Figure 1-18), which is the control screen for monitoring and setting up the E series disk arrays, is displayed instead of the component information display screen. For details on how to start Storage Manager Express, refer to 2.2.4, Starting Storage Manager Express. Figure 1-18 Start Screen of Storage Manager Express I-36

45 Chapter 1 Basic Functions Pooll IInfformattiion Diispllay If the disk array to be monitored supports pool storage, the pool information is displayed in the following areas: Configuration display area Pool list screen in the information list display area Pool detail information screen that is shown as properties This section describes each item displayed as pool information. (1) Pool list screen You can see the attribute information of the pool such as a pool name, operating status, and capacity in this screen (pane surrounded by dashed lines in Figure 1-19 or 1-20) by selecting Pool (with left click) in the configuration display area. If selecting any pool in the configuration display area, you can see the list of logical disks created in the selected pool or the list of physical disks composing the pool. For ism client (Web GUI), Free Capacity[GB], Type, PD Type, Snapshot Capacity[GB], Snapshot Used Capacity[GB], Snapshot Threshold[GB], Actual Capacity Threshold (Pre)[GB], and Actual Capacity Threshold[GB] are not displayed at initial setting. If you want to display them, right-click the item name part and set the relevant item to be displayed. Figure 1-19 Pool List Screen (ism Client (Web GUI)) I-37

46 Chapter 1 Basic Functions Figure 1-20 Pool List Screen (ism Client (Win GUI)) (i) Icon (operating status/monitoring status of pool) Displays the operating status/monitoring status of the pool with the icon next to the pool number. Icon Table 1-5 Display Icons Status The pool is in normal operation An event that requires attention had occurred in the pool. A failure had occurred in the pool. A threshold excess had occurred in the pool. The pool is out of monitoring or under configuration setting. The pool is out of monitoring or under configuration setting. If this icon is displayed, an event that requires attention had occurred in the pool just before monitoring was stopped. The pool is out of monitoring or under configuration setting. If displaying this icon, a failure had occurred in the pool just before monitoring was stopped. The pool is out of monitoring or under configuration setting. If this icon is displayed, a threshold excess had occurred in the pool just before monitoring was stopped. I-38

47 Chapter 1 Basic Functions If a threshold excess had occurred in a pool for snapshot or if actual capacity threshold excess or actual capacity threshold (pre) excess had occurred in a virtual capacity pool, the icon is displayed. If, however, the integrated operating status of pool is failure or an event or failure (except critical failure) that needs maintenance had occurred, the icon displays the integrated operating status. For details on actions to be taken when a snapshot threshold excess had occurred, refer to the Snapshot User s Manual (Function Guide). For details on actions to be taken when a virtual capacity threshold excess had occurred, refer to the Thin Provisioning User s Manual. (ii) Pool Number Displays pool number (4 digits in hexadecimal). (iii) Pool Name Displays pool name (maximum of 32 characters). An arbitrary name can be set for a pool. Refer to the Configuration Setting Tool User s Manual (GUI) for setting method. (iv) Status Displays the operating state or event occurrence in the pool in any of the followings: Ready: Under normal operation Attn. (reduce): Under degenerate operation (RAID configuration redundancy disappears.) Attn. (rebuilding): Rebuilding data within pool Attn. (preventive copy): While copying data to spare disk (Redundancy of the RAID configuration is maintained.) Attn. (copy back): While writing back from the spare disk (redundancy maintained by RAID configuration) Attn. (stop): Pool is in rotation stop state. Failure: Failure occurs in pool. Failure (over capacity): Capacity shortage had occurred in the virtual capacity pool. (v) Expansion Status Displays the expansion status of pool in any of the followings: (Blank): Pool expansion is not in progress or expansion terminated normally. Expanding: Pool expansion is in progress. Expand-fail: Pool expansion failed. (vi) Type Displays the pool type. Basic: Basic pool Basic (System Volume): Pool dedicated to System Volume Dynamic: Dynamic pool Dynamic (Virtual): Virtual capacity pool I-39

48 Chapter 1 Basic Functions (vii) RAID Displays RAID type of pool in any of the followings: 0 : RAID0 1 : RAID1 3 : RAID3 3DP : RAID3DP 5 : RAID5 6 : RAID6 10 : RAID10 50 : RAID50 TM : RAID-TM (viii) PD Type Displays the type of physical disks composing the pool in either of the followings. FC: FC disk ATA: ATA disk SAS: SAS disk SSD: SSD disk (ix) Partition Allocated Displays the pool allocation status. Shared: The pool has the shared attribute. (It can be shared by multiple partitions.) Exclusive: The pool has the exclusive attribute. (It can be used by a single partition.) * Displayed only for the disk array for which VirtualStoragePartitioning has been purchased. (x) Partition Name Displays the name of allocation partition, if the pool is shared or exclusive. When the pool is not allocated to any partition, a blank is displayed. If the pool is shared by multiple partitions, each partition is listed (up to four partitions). * Displayed only for the disk array for which VirtualStoragePartitioning has been purchased. (xi) Node Number Displays the number of the node to which the pool belongs (hexadecimal, 2 digits). * Displayed only for the disk array with node. (xii) Capacity Displays the capacity of pool in Gigabyte units (1 G byte=1,073,741,824 bytes) to 1 decimal place. (Truncates at the second decimal place. Displays 1 byte to 100 Megabytes as 0.1.) (xiii) Used Capacity Displays the used capacity of pool in Gigabyte units (1 G byte=1,073,741,824 bytes) to 1 decimal place. (Truncate it at the second decimal place. However, displays 1 byte to 100 Megabytes as 0.1.) (xiv) Free Capacity Displays the capacity of pool in Gigabyte units (1 G byte=1,073,741,824 bytes) to 1 decimal place. (Truncate it at the second decimal place. However, displays 1 byte to 100 Megabytes as 0.1.) I-40

49 Chapter 1 Basic Functions (xv) Snapshot Capacity Displays the capacity of the snapshot reserve area in Gigabyte units (1 G byte=1,073,741,824 bytes) to 1 decimal place. (Truncate it at the second decimal place. However, displays 1 byte to 100 Megabytes as 0.1.) * Displayed only for the disk array for which DynamicSnapVolume has been purchased. (xvi) Snapshot Used Capacity Displays the used capacity of the snapshot reserve area in Gigabyte units (1 G byte=1,073,741,824 bytes) to 1 decimal place. (Truncate it at the second decimal place. However, displays 1 byte to 100 Megabytes as 0.1.) If a threshold excess had occurred, * is displayed at the left of snapshot used capacity. * Displayed only for the disk array for which DynamicSnapVolume has been purchased. (xvii) Snapshot Threshold Displays the snapshot threshold in Gigabyte units (1 G byte=1,073,741,824 bytes) to 1 decimal place. (Truncate it at the second decimal place. However, displays 1 byte to 100 Megabytes as 0.1.) * Displayed only for the disk array for which DynamicSnapVolume has been purchased. (xviii) Actual Capacity Displays the capacity actually allocated in the physical disk that is allocated for the virtual capacity pool in Gigabyte units (1 G byte = 1,073,741,824 bytes) to 1 decimal place. (Truncate it at the second decimal place. However, displays 1 byte to 100 Megabytes as 0.1.) For a pool other than an actual capacity pool, a blank is displayed. * Displayed only for the disk array for which ThinProvisioning has been purchased. (xix) Actual Used Capacity Displays the total actual capacity allocated from the virtual capacity pool to virtual capacity logical disks in Gigabyte units (1 G byte = 1,073,741,824 bytes) to 1 decimal place. (Truncate it at the second decimal place. However, displays 1 byte to 100 Megabytes as 0.1.) For a pool other than an actual capacity pool, a blank is displayed. If an actual capacity threshold (pre) excess or actual capacity threshold excess had occurred, * is displayed at the left of the actual used capacity. * Displayed only for the disk array for which ThinProvisioning has been purchased. (xx) Actual Capacity Threshold Displays the actual used capacity threshold in Gigabyte units (1 G byte = 1,073,741,824 bytes) to 1 decimal place. (Truncate it as the second decimal place. However, displays 1 byte to 100 Megabytes as 0.1.) For a pool other than an actual capacity pool, a blank is displayed. If an actual capacity threshold excess had occurred, * is displayed at the left of the actual capacity threshold. * Displayed only for the disk array for which ThinProvisioning has been purchased. (xxi) Actual Capacity Threshold (pre) Displays the actual capacity threshold (pre) in Gigabyte units (1 G byte = 1,073,741,824 bytes) to 1 decimal place. (Truncate it as the second decimal place. However, displays 1 byte to 100 Megabytes as 0.1.) I-41

50 Chapter 1 Basic Functions If the actual capacity threshold (pre) is not set, a blank is displayed. If an actual capacity threshold (pre) excess had occurred, * is displayed at the left of the actual capacity threshold (pre). * Displayed only for the disk array for which ThinProvisioning has been purchased. (2) Pool detail information screen This screen (Figures 1-21, 1-22, or 1-23) shows the detailed information of the pool selected (with left click) in the configuration display area or the information list display area. The screen is obtained by right clicking on the selected pool and selecting [Properties]. (It can also be obtained from the menu by selecting [View] [State monitor] [Properties] (for ism client (Web GUI)), or by selecting [View] [Properties] (for ism client (Win GUI).) This screen displays detail information related to pools. Figure 1-21 Pool Detail Information-1 ([General] Tab) (i) (ii) (iii) Name Displays the pool name. The information you see here is the same as shown in the Pool list screen described earlier in (1). Number Displays the pool number. The information you see here is the same as shown in the Pool list screen described earlier in (1). Type Displays the pool type. Basic: Basic pool I-42

51 Chapter 1 Basic Functions Basic (System Volume): Pool dedicated to System Volume Dynamic: Dynamic pool Dynamic (Virtual): Virtual capacity pool (iv) Status Displays the operating status of pool. The information you see here is the same as shown in the Pool list screen described earlier in (1). (v) Expansion Status Displays the expansion status of pool. The information you see here is the same as shown in the Pool list screen described earlier in (1). (vi) Progress Ratio Displays the progress ratio during pool capacity expansion. (vii) RAID Displays the RAID type of pool. The information you see here is the same as shown in the Pool list screen described earlier in (1). For a dynamic pool, displays the configuration ratio of the data disk and the parity disk after the RAID type, like 6(4+PQ) (for the D Series, the configuration ratio is also displayed in RAID5). (viii) Partition Allocated Displays the allocation state of the pool. The information you see here is the same as shown in the Pool list screen described earlier in (1). * Displayed only for the disk array for which VirtualStoragePartitioning has been purchased. (ix) Node Number Displays the node number of the pool. The information you see here is the same as shown in the Pool list screen described earlier in (1). * Node-related information is displayed only for the disk array with node. (x) PD Type Displays the physical disk type configuring the pool. The information you see here is the same as shown in the Pool list screen described earlier in (1). (xi) Eco Mode Displays either of the following as the eco mode setting for the pool. ON: Eco mode is enabled. OFF: Eco mode is disabled. * Displayed only for the disk array for which StoragePowerConserver has been purchased. (xii) Conf.Setting Displays the availability of configuration settings (such as LD binding/unbinding) for the pool in any of the followings: This is displayed only for S4900. Enable: The configuration setting operations are available. Disable: The configuration setting operations are unavailable. (xiii) Capacity Displays the capacity of pool. The information you see here is the same as shown in the Pool list screen described earlier in (1). I-43

52 Chapter 1 Basic Functions (xiv) Used Capacity Displays the used capacity of pool. The information you see here is the same as shown in the Pool list screen described earlier in (1). (xv) Logical Disk List Displays information on the logical disks contained in the pool: logical disk number, OS type, logical disk name, state, and configuration change. When the snapshot function is used, snapshot-volume (SV) and link-volume (LV) can be set to nondisplay. Setting can be made from the menu bar. For details, refer to the Help. Example: Logic Disk Number OS Type Logical Disk Name Status Conf.Chg 0000h NX LDNX00000 Ready Lock 0001h A4 LDA Failure (xvi) Physical Disk List Displays the information on the physical disks composing the pool, which contains physical disk number expressed as PD group number (2 digits in hexadecimal) - physical disk number (2 digits in hexadecimal), and state. If the expansion state of the pool is either Expanding or Expand-Fail, the physical disks subject to expansion are not displayed on the list. Example: Physical Disk Number Status 00h - 01h 00h - 02h Ready Failure I-44

53 Chapter 1 Basic Functions Figure 1-22 Pool Detail Information-2 ([Snapshot] Tab) This screen displays information related to snapshot. * If you do not buy snapshot (DynamicSnapVolume), the [Snapshot] tab is not displayed. (i) Snapshot Capacity Displays the total snapshot capacity. The information you see here is the same as shown in the Pool list screen described earlier in (1). (ii) Snapshot Used Capacity Displays the used snapshot capacity. The information you see here is the same as shown in the Pool list screen described earlier in (1). (iii) Snapshot Threshold Displays the snapshot threshold. The information you see here is the same as shown in the Pool list screen described earlier in (1). (iv) Control Capacity of Snapshot Displays the capacity of the snapshot under control. (v) Snapshot Reserve Area List Lists the information (logical disk number, logical disk name, and capacity) on snapshot reserve area in the target pool. Example: Logical Disk Number Logical Disk Name Capacity 0000h POOL001_SDV_ h POOL001_SDV_ I-45

54 Chapter 1 Basic Functions Figure 1-23 Pool Detail Information-3 ([Partition] Tab) (i) Partition List Lists information (partition name and status) on the partition to which the pool belongs. Example: Partition Name par1 par2 Status Ready Ready * Displayed only for the disk array for which VirtualStoragePartitioning has been purchased. I-46

55 Chapter 1 Basic Functions Figure 1-24 Pool Detail Information-4 ([Thin Provisioning] Tab) This screen displays information related to Thin Provisioning. * If you do not buy ThinProvisioning or the selected pool is not a virtual capacity pool, the [Thin Provisioning] tab is not displayed. (i) (ii) (iii) (iv) Capacity Displays the capacity of the virtual capacity pool. The information you see here is the same as shown in the Pool list screen described earlier in (1). Used Capacity Displays the used capacity of the virtual capacity pool. The information you see here is the same as shown in the Pool list screen described earlier in (1). Free Capacity Displays the capacity of the unused area in the pool. The information you see here is the same as shown in the Pool list screen described earlier in (1). Actual Capacity Displays the capacity actually allocated in the physical disk that is allocated for the virtual capacity pool. The information you see here is the same as shown in the Pool list screen described earlier in (1). I-47

56 Chapter 1 Basic Functions (v) (vi) (vii) Actual Used Capacity Displays the actual capacity allocated from the virtual capacity pool to logical disks and the percentage (%) of the actual used capacity in the actual capacity. The information you see here is the same as shown in the Pool list screen described earlier in (1). Actual Capacity Threshold Displays the actual capacity threshold of the virtual capacity pool and the percentage (%) of the actual capacity threshold in the actual capacity. The information you see here is the same as shown in the Pool list screen described earlier in (1). Actual Capacity Threshold (Pre) Displays the actual capacity threshold (pre) of the virtual capacity pool and the percentage (%) of the actual capacity threshold (pre) in the actual capacity. If the actual capacity threshold (pre) is not set, - is displayed. The information you see here is the same as shown in the Pool list screen described earlier in (1). I-48

57 Chapter 1 Basic Functions Logiicall Diisk IInfformattiion Diispllay Logical disk information is displayed in the following areas: Configuration display area Logical disk list screen in the information list display area Logical disk detail information screen that is shown as properties This section describes each item displayed as logical disk information. (1) Logical disk list screen The logical disk list screen (pane surrounded by dashed lines in Figure 1-25 or 1-26) is displayed by selecting (click the left button) [Logical Disk] in configuration display area displaying various attribute information such as logical disk name, operating state and capacity. If selecting any logical disk (with left click) in the configuration display area, you can see the list of physical disks composing the selected logical disk under RAID configuration. When the snapshot function is used, snapshot-volume (SV) and link-volume (LV) can be set to nondisplay. Setting can be made from the menu bar. For details, refer to the Help. For ism client (Web GUI), the following items are set to hide at initial setting: RPL Type Snapshot Type Link Group Purpose PD Type Cache Resident Data Protection Cache Segment Name LD Capacity Quota[GB] LD Capacity Threshold[GB] Capacity Allocation To display the item, right-click the item name and set the item to display. I-49

58 Chapter 1 Basic Functions Figure 1-25 Logical Disk List Screen (ism Client (Web GUI)) Figure 1-26 Logical Disk List Screen (ism Client (Win GUI)) I-50

59 Chapter 1 Basic Functions (i) Icon (operating status/monitoring status of logical disk) Displays the operating status/monitoring status of the logical disk with the icon next to the logical disk number. Icon Table 1-6 Display Icons Status The logical disk is in normal operation. An event that requires attention had occurred in the logical disk. A failure had occurred in the logical disk. A threshold excess had occurred in the logical disk. The logical disk is in the locked state. The logical disk is out of monitoring or under configuration setting. The logical disk is out of monitoring or under configuration setting. If this icon is displayed, an event that requires attention had occurred in the logical disk just before monitoring was stopped. The logical disk is out of monitoring or under configuration setting. When this icon is displayed, a failure had occurred in the logical disk just before monitoring was stopped. The logical disk is out of monitoring or under configuration setting. If this icon is displayed, a threshold excess had occurred in the logical disk just before monitoring was stopped. The logical disk is out of monitoring or under configuration setting. When this icon is displayed, the logical disk is in the locked state. (ii) Logical Disk Number Displays logical disk number (4 digits in hexadecimal). (iii) OS Type/Logical Disk Name Displays logical disk name (maximum of 24 characters) and OS type. The optional name for logical disk name can be set. Refer to 1.3, Nickname Setting for setting method. * The logical disks can be listed so that either of the (ii) Logical Disk Number column or the (iii) OS Type/Logical Disk Name column comes first depending on your setting. Number first order: Order of [Number], [OS Type], [Logical Disk Name], [Status]... Name first order: Order of [OS Type], [Logical Disk Name], [Number], [Status]... Refer to 2.2, Client Start/Stop for setting method. (iv) Status Displays the operating status of logical disk and occurrence of event in any of the followings: Ready: Ready (formatting): Logical disk is in normal operation. Logical disk is being formatted. * The logical disk is available, but I/O response may delay until logical format is completed. Attn. (reduce): Attn. (rebuilding): Reduction (RAID configuration redundancy disappears) While rebuilding (while rebuilding data within RANK) Attn. (preventive copy): While copying data to spare disk (redundancy maintained by RAID I-51

60 Chapter 1 Basic Functions configuration) Attn. (copy back): While writing back from the spare disk (redundancy maintained by RAID configuration) Attn. (unformatted): Waiting for logic formatting to start. Attn. (formatting): Logical disk is being formatted. * The logical disk is not available until logic formatting is completed. Attn. (format fail): Logical format fails. Attn. (expanding): RANK expansion is being in progress. Attn. (expand-fail): Fails in RANK expansion Attn. (stop): Logical disk is in rotation stop state. Failure: A failure had occurred in a logical disk Failure (media error): Media failure had occurred in a logical disk Failure (over quota): An LD capacity quota excess had occurred in a virtual capacity logical disk. Failure (over capacity): Capacity shortage had occurred in the virtual capacity pool. (v) RAID Displays one of the followings as the RAID type of logical disk. 0 : RAID0 1 : RAID1 3 : RAID3 3DP : RAID3DP 5 : RAID5 6 : RAID6 10 : RAID10 50 : RAID50 TM : RAID-TM (vi) Capacity Displays the capacity of logical disk in Gigabyte units (1G byte=1,073,741,824 bytes) to 1 decimal place. (Truncate less than 2 decimal places. However, displays 0 byte to 100 Megabyte in 0.1.) (vii) Partition Name Displays the name of the partition to which the logical disk belongs. * Displayed only for the disk array for which VirtualStoragePartitioning has been purchased. (viii) Node Number Displays the number of the node to which the logical disk belongs (2 digits in hexadecimal). * Node-related information is displayed only for the disk array with node. (vix) RPL Type Displays one of the followings as the replication type of logical disk. This column does not appear when none of DynamicDataReplication and RemoteDataReplication is purchased. IV: Not used as a replication volume MV: Used as a Master Volume (replication source volume) RV: Used as a Replication Volume (replication destination volume) RV/MV: Used as both RV and MV (Blank): Cannot be used as a replication volume I-52

61 Chapter 1 Basic Functions (x) Snapshot Type Displays the snapshot type. If DynamicSnapVolume is not installed, this is not displayed. (Blank): Not used for snapshot BV: Used as Base Volume (copy source volume) SV: Snapshot-volume (volume used for the snapshot generation) LV: Link-volume (virtual volume establishing connection with BV or SV and implementing indirect access) SDV: Snapshot data volume (logical disk configuring snapshot reserve area (SRA)) SV*: A type of snapshot-volumes (inappropriate volume for snapshot generations) * This type of SV is created due to an ism abnormal end or other reasons, and not reusable. Therefore, if you find such volume, unbind it immediately by changing the configuration setting. (xi) Link Displays the connection state between BV-LV or SV-LV. If DynamicSnapVolume is not installed, this is not displayed. (xii) Group Displays the group to which a logical disk belongs in any of the followings at Group column. This column does not appear when AccessControl and ReallocationControl are not purchased. Preserve: Logical disk belonging to preserve group Reserve: Logical disk belonging to reserve group LD Set: Logical disk assigned to the LD Set LD Set (FC): Logical disk assigned to the FC LD Set LD Set (iscsi): Logical disk assigned to the iscsi LD Set (Blank): Logical disk not belonging to any of the above (xiii) Purpose Displays the purpose of a logical disk in any of the followings at Purpose column. RPL: Logical disk to which only the pair setting for replication has been performed. Snapshot: Logical disk to which only the snapshot setting has been performed. Link Volume: Logical disk that is a link-volume (LV) RPL/Snapshot: Logical disk to which both the pair setting for replication and the snapshot setting have been performed. Optimization: Work disk for performance optimization Data Protection: Logical disk which is protected with the setting of data retention function. RPL/Data Protection: Logical disk which is protected with the setting of data retention function, and also to which the pair setting for replication has been performed. System Volume: Volume to store storage system information Control Volume: Logical disk for a control volume (Blank): General logical disk to which no specific purpose is set I-53

62 Chapter 1 Basic Functions (xiv) RANK/Pool Number Displays the RANK number or the pool number, to which the logical disk belongs. RANK numbers are displayed in PD group number (2 digits in hexadecimal) - RANK number (2 digits in hexadecimal). A maximum of four RANK numbers are displayed. Numbers exceeding four are indicated by... at the end of line. * The pool number (4 digits in hexadecimal) is displayed only for the disk arrays with pool. (xv) Pool Name Displays the name of the pool (maximum of 32 characters) to which the logical disk belongs. * The name is displayed only for the disk arrays with pool. (xvi) PD Type Displays the physical disk type configuring the logical disk in either of the following. FC: FC disk ATA: ATA disk SAS: SAS disk SSD: SSD disk (xvii) Cache Resident Displays cache resident status of logical disk in resident column. Resident: Cache resident (Blank): Cache non-resident (xviii) Progress Ratio Displays the event progress ratio in a logical disk where any of the following events occurs: formatting, rebuilding, copy back, expanding, or preventive copy. For the disk arrays with pool, the progress ratio is displayed only if a formatting event occurs, and not displayed if other events occur. (xix) Conf.Chg Displays one of the followings as the setting state of configuration change guard for the logical disk. The OS type/name cannot be changed for the logical disk in the Lock state. This is not displayed for the disk array where the configuration change guard function is not available. Lock: Guard has been set. (Blank): Guard has not been set. (xx) LD Set Name Displays up to four names of LD sets to which the logical disk belongs (If there are five or more LD sets, is displayed at the end of the names). (xxi) Data Protection Displays the disk protection state of the logical disk in either of the followings. When VolumeProtect has not been purchased, this item does not appear. protection: Protected (Blank): Unprotected (xxii) Cache Segment Name Displays the cache segment name (maximum of 16 characters) to which the logical disk belongs. * Displayed only for the disk array for which VirtualStoragePartitioning or CachePartitioning has I-54

63 Chapter 1 Basic Functions been purchased. (xxiii) LD Capacity Displays the actual capacity allocated from the virtual capacity pool in Gigabyte units (1 G byte = 1,073,741,824 bytes) to 1 decimal place. (Truncate it at the second decimal place. However, displays 1 byte to 100 Megabytes as 0.1.) If the logical disk is not a virtual capacity logical disk, a blank is displayed. If an actual used capacity threshold excess had occurred, * is displayed at the left of the actual used capacity. * Displayed only for the disk array for which ThinProvisioning has been purchased. (xxiv) LD Capacity Quota Displays the LD capacity quota in Gigabyte units (1 G byte = 1,073,741,824 bytes) to 1 decimal place. (Truncate it at the second decimal place. However, displays 1 byte to 100 Megabytes as 0.1.) If the LD capacity quota is not set, a blank is displayed. * Displayed only for the disk array for which ThinProvisioning has been purchased. (xxv) LD Capacity Threshold Displays the LD capacity threshold in Gigabyte units (1 G byte = 1,073,741,824 bytes) to 1 decimal place. (Truncate it at the second decimal place. However, displays 1 byte to 100 Megabytes as 0.1.) If the LD capacity threshold is not set, a blank is displayed. * Displayed only for the disk array for which ThinProvisioning has been purchased. (xxvi) Capacity Allocation Displays the logical disk capacity allocation mode. * Displayed only for the disk array for which ThinProvisioning has been purchased. Virtual: Virtual capacity logical disk (Blank): Actual capacity logical disk (xxvii) Access Control Displays the port information (Port number, Port name) of the host director included in the disk array and the LD Set information selected from this list box. When an LD Set name is selected, only the information of logical disks included in the LD set is displayed in the information list display area. When a port is selected, only the information of logical disks that can be accessed from the selected port is displayed in the information list display area. If Display All is selected, the information of all logical disks in the selected disk array is displayed in the information list display area. I-55

64 Chapter 1 Basic Functions (2) Logical Disk detail information screen This screen (Figures 1-27 or 1-28 as well as 1-29, 1-30, 1-31, 1-32, and 1-33) shows the detailed information of the logical disk selected (with left click) in the configuration display area or the information list display area. The screen is obtained by right clicking on the selected optional logical disk and selecting [Properties]. (It can also be obtained from the menu by selecting [View] [State monitor] [Properties] (for ism client (Web GUI)), or by selecting [View] [Properties] (for ism client (Win GUI).) This screen displays detail information related to logical disks. Figure 1-27 Logical Disk Detail Information-1 ([General] Tab, for Disk Arrays with Pool) I-56

65 Chapter 1 Basic Functions Figure 1-28 Logical Disk Detail Information-1 ([General] Tab, for Disk Arrays Other Than the Disk Arrays with Pool) (i) Name Displays the logical disk name. The information you see here is the same as shown in the Logical Disk list screen described earlier in (1). (ii) Number Displays the logical disk number. The information you see here is the same as shown in the Logical Disk list screen described earlier in (1). (iii) OS Type Displays the form of logical disk. The information you see here is the same as shown in the Logical Disk list screen described earlier in (1). (iv) Status Displays the operating status of logical disk. The information you see here is the same as shown in the Logical Disk list screen described earlier in (1). (v) Access Mode Displays one of the followings as the access mode of the logical disk. This item is displayed only for the disk arrays which support the display of access mode information. ReadWrite: Can be read and written. ReadOnly: Can be read only. NotReady: Cannot be operated from the host. I-57

66 Chapter 1 Basic Functions NotAvailable: Cannot be recognized from the host. (vi) RAID Displays the RAID type of logical disk. The information you see here is the same as shown in the Logical Disk list screen described earlier in (1). If the pool to which the logical disk belongs is a dynamic pool, the configuration ratio of the data disk and the parity disk is displayed after the RAID type as 6(4+PQ) (for the D Series, the configuration ratio is also displayed in RAID5). (vii) Capacity Displays the capacity of logical disk. (viii) Partition Name Displays the name of the partition to which the logical disk belongs. * Displayed only for the disk array for which VirtualStoragePartitioning has been purchased. (ix) Node Number Displays the node number of the logical disk. The information you see here is the same as shown in the Logical Disk list screen described earlier in (1). * Node-related information is displayed only for the disk array with node. (x) RANK/Pool Number Displays the RANK and pool numbers. The information you see here is the same as shown in the Logical Disk list screen described earlier in (1). (xi) Pool Name Displays the name of the pool to which the logical disk belongs. The information you see here is the same as shown in the Logical Disk list screen described earlier in (1). (xii) PD Type Displays the physical disk type configuring the logical disk. The information you see here is the same as shown in the Logical Disk list screen described earlier in (1). (xiii) Cache Resident Displays the cache resident status of logical disk. The information you see here is the same as shown in the Logical Disk list screen described earlier in (1). (xiv) Progress Ratio Displays the event progress ratio in a logical disk where any of the following events occurs: formatting, rebuilding, copy back, expanding or preventive copy. The information you see here is the same as shown in the Logical Disk list screen described earlier in (1). For the disk arrays with pool, the progress ratio is displayed only if a formatting event occurs, and not displayed if other events occur. (xv) RPL Type Displays the replication type of logical disk. The information you see here is the same as shown in the Logical Disk list screen described earlier in (1). This column does not appear when none of I-58

67 Chapter 1 Basic Functions DynamicDataReplication and RemoteDataReplication is purchased. (xvi) Conf.Chg Displays the setting status of configuration change guard for the logical disk. The OS type/name cannot be changed for the logical disk in the locked status. The information you see here is the same as shown in the Logical Disk list screen described earlier in (1). This is not displayed for the disk array that cannot use the configuration change guard function. (xvii) Group Displays the group to which the logical disk belongs. The information you see here is the same as shown in the Logical Disk list screen described earlier in (1). This column does not appear when AccessControl and ReallocationControl are not purchased. (xviii) Purpose Displays the purpose of the logical disk. The information you see here is the same as shown in the Logical Disk list screen described earlier in (1). (xix) Cache Segment Name Displays the cache segment name to which the logical disk belongs. The information you see here is the same as shown in the Logical Disk list screen described earlier in (1). * Displayed only for the disk array for which VirtualStoragePartitioning or CachePartitioning has been purchased. (xx) Cache Information Displays read cache and write cache information. * Displayed only for the D series. (xxi) Bind Mode Displays either of the followings as the bind mode of the logical disk if it is bound in a pool where RAID is implemented and the quick format function is supported. ( - is displayed for other logical disks). This item is displayed only for the disk arrays in which the quick format function is available. Quick: Logical disk which is bound using the quick format Normal : Logical disk which is bound using the normal method (xxii) Ownership Displays the current or default owner of the controller that controls the logical disk when the Cross Call mode is invalid. When the Cross Call function is not supported or Cross Call mode is valid, displays -. Example: Current Owner controller 0 Default Owner controller 1 (xxiii) Physical Disk List Lists the physical disk number and the status of the physical disks composing the logical disk. The number is expressed as PD group number (2 hexadecimal digits) - physical disk number (2 hexadecimal digits). For the disk arrays with pool, displays information on the physical disks contained in the pool to which the target logical disk belongs. I-59

68 Chapter 1 Basic Functions Example: Physical Disk Number Status 00h - 01h Ready 00h - 02h Failure Figure 1-29 Logical Disk Detail Information-2 ([Access] Tab) (i) Port Displays the information of the ports (port number, port name, state*1, and configuration change) which have the permission to access to the logical disk. This item is not displayed for the disk array to which the AccessControl license has been applied. Ports provided only to a host are displayed. *1 The state of a director where the port is installed Example: Port Number Port Name Status Conf.Chg 00h - 01h DB_server1 Ready Lock 00h - 02h DB_server2 Failure (ii) (iii) LD Set Displays the LD set where the logical disk is bound. Host Lists the hosts connected to the selected LD set. The list includes only the hosts which collect the relevant information using the host agent. For details on the displayed information, refer to I-60

69 Chapter 1 Basic Functions Connected Host Information Display. This item is displayed only for the disk arrays which support the host information display. Figure 1-30 Logical Disk Detail Information-2 ([Access (iscsi)] Tab) If the logical disk is assigned to the iscsi LD Set, the [Access (iscsi)] tab is displayed instead of the [Access] tab. (i) LD Set Displays the iscsi LD Set to which this logical disk belong. I-61

70 Chapter 1 Basic Functions Figure 1-31 Logical Disk Detail Information-3 ([Snapshot] Tab) The information related to snapshot is displayed. * The [Snapshot] tab is not displayed if the snapshot (DynamicSnapVolume) is not installed, or if the selected logical disk is not a snapshot volume (that is, a logical disk whose snapshot type is other than BV, SV, LV, SDV, or SV*.) (i) (ii) (iii) Snapshot Type Displays the snapshot type. The information you see here is the same as shown in the Logical Disk list screen described earlier in (1). Link Displays the connection status. The information you see here is the same as shown in the Logical Disk list screen described earlier in (1). Number Displays the connected logical disk number (4 digits in hexadecimal). The information you see here is the same as shown in the Logical Disk list screen described earlier in (1). I-62

71 Chapter 1 Basic Functions (iv) (v) (vi) OS Type Displays the (OS) type of the connected logical disk. Logical Disk Name Displays the logical disk name (up to 24 characters) of the connecting logical disk. Snapshot Type Displays the snapshot type of the connecting logical disk. The information you see here is the same as shown in the Logical Disk list screen described earlier in (1). Figure 1-32 Logical Disk Detail Information-4 ([Protection Setting] Tab) The information related to volume protection is displayed. For details, refer to the Data Retention User s Manual. * The [Protection Setting] tab is displayed only for the logical disk for which protection has been set. (i) Protection Status Displays the protection state in any of the followings: ReadOnly: Read-only NotAccessible: Read/write-protect ReadOnly (expired): Read-only (expired) I-63

72 Chapter 1 Basic Functions NotAccessible (expired): Read/write-protect (expired) (ii) Begin Date Displays the date on which protection was set. (iii) Retention Date Displays the data retention date. (iv) Retention Mode Displays the retention mode in any of the followings: normal: You can release protection and reset the retention period at any time. secure: You cannot release protection until the retention period has elapsed. However, you can extend the retention period or change the protection status. strict: You cannot release protection until the retention period has elapsed. You can reset neither retention period nor protection status. Figure 1-33 Logical Disk Detail Information-5 ([Thin Provisioning] Tab) This screen displays information related to Thin Provisioning. * If you do not buy ThinProvisioning or the selected logical disk is not a virtual capacity logical disk, the [Thin Provisioning] tab is not displayed. I-64

73 Chapter 1 Basic Functions (i) (ii) (iii) (iv) (v) (vi) Capacity Displays the capacity of the virtual capacity logical disk. The information you see here is the same as shown in the Logical Disk list screen described earlier in (1). Actual Used Capacity Displays the actual capacity allocated from the virtual capacity pool and the percentage (%) of the actual capacity in the capacity. The information you see here is the same as shown in the Logical Disk list screen described earlier in (1). LD Capacity Quota Displays the LD capacity quota of the virtual capacity logical disk and the percentage (%) of the LD capacity quota in the capacity. If the LD capacity quota is not set, - is displayed. The information you see here is the same as shown in the Logical Disk list screen described earlier in (1). LD Capacity Threshold Displays the LD capacity threshold of the virtual capacity logical disk and the percentage (%) of the LD capacity threshold in the capacity. If the LD capacity threshold is not set, - is displayed. The information you see here is the same as shown in the Logical Disk list screen described earlier in (1). Capacity Allocation Displays the logical disk capacity allocation mode. For a virtual capacity logical disk, Virtual is displayed. The information you see here is the same as shown in the Logical Disk list screen described earlier in (1). When Capacity Shortage Occurs If the actual capacity of the virtual capacity logical disk becomes insufficient or if the quota is exceeded, displays any of the following as the response operation. This information is displayed only on the devices where the response change function (insufficient capacity) is enabled. Don t make an LD Inaccessible: The logical disk can be read only. Make an LD Inaccessible: The logical disk cannot be accessed. * If the virtual capacity logical disk has the following attributes, displays a hyphen (-): The snapshot type is SV, LV, or SDV. The disk is a control volume. The work disk for performance optimization is set (logical disk administration). The disk is a system volume. I-65

74 Chapter 1 Basic Functions The capacities of the LD capacity quota and LD capacity threshold are rounded to the nearest 256 MB above. When the logical disk capacity is small (25 GB or less), the capacities of the actual used capacity, LD capacity quota, and LD capacity threshold might be the same even if their percentage values are different. I-66

75 Chapter 1 Basic Functions Physiicall Diisk IInfformattiion Diispllay Physical disk information is displayed in the following areas: Configuration display area Physical Disk list screen in the information list display area Physical Disk detailed information screen that is shown as properties This section describes each item displayed as physical disk information. (1) Physical Disk list screen The physical disk list screen (pane surrounded by dashed lines in Figure 1-34 or 1-35) is displayed when [Physical Disk] is selected (click the left button) in configuration display area and displays various attribute information such as operating state of physical disk and capacity. If selecting any physical disk (with left click) in the configuration display area, you can see the information of the logical disk composed of the selected physical disk under RAID configuration. For ism client (Web GUI), Rotation Speed[rpm] and Transfer Rate[Gbps] are not displayed at initial setting. If you want to display the item, right-click the item name part and set the relevant item to be displayed. Figure 1-34 Physical Disk List Screen (ism Client (Web GUI)) I-67

76 Chapter 1 Basic Functions Figure 1-35 Physical Disk List Screen (ism Client (Win GUI)) (i) Icon (operating status/monitoring status of physical disk) Displays the operating status/monitoring status of the physical disk with the icon next to the physical disk number. Icon Table 1-7 Display Icons Status The physical disk is in normal operation. The event that requires preventive maintenance had occurred in the physical disk. This icon indicates that one physical disk failed and the alternative physical disk is used. An event that requires attention had occurred in the physical disk. A failure had occurred in the physical disk. The physical disk is out of monitoring or under configuration setting. The physical disk is out of monitoring or under configuration setting. If this icon is displayed, an event that requires preventive maintenance had occurred in the physical disk just before monitoring was stopped. The physical disk is out of monitoring or under configuration setting. If this icon is displayed, an event that requires attention had occurred in the physical disk just before monitoring was stopped. The physical disk is out of monitoring or under configuration setting. If displaying this icon, a failure had occurred in the physical disk just before monitoring was stopped. I-68

77 Chapter 1 Basic Functions (ii) Number Displays the physical disk number as PD group number (2 hexadecimal digits) - PD number (2 hexadecimal digits). (iii) Status Displays the operating status of physical disk and the occurrence of event at Status column in any of the followings: Ready: Physical disk is in operation Info (inactive): Preventive maintenance had occurred in a physical disk Attn. (rebuilding): While re-building the data Attn. (powering up): While starting up the physical disk Attn. (formatting): While formatting physically Attn. (stop): In a rotation stop state. Failure: A failure had occurred in a physical disk Offline: Disconnected or not found. (iv) Capacity Displays the physical disk capacity in Gigabyte unit (1G byte=1,073,741,824 byte) to one decimal place. (Truncates at the second decimal places. Displays 0 byte to 100 Megabyte as 0.1). (v) Rotation Speed Displays rotation speed of the target physical disk (rpm). * For a SSD disk, a blank is displayed. (vi) Node Number Displays the number of the node to which the physical disk belongs (2 digits in hexadecimal). * Node-related information is displayed only for the disk array with node. (vii) RANK/Pool Number Displays the RANK number or the pool number, to which the logical disk belongs in PD group number (2 digits in hexadecimal) - RANK number (2 digits in hexadecimal) at RANK column. * The pool number is displayed only for the disk arrays with pool. (viii) Pool Name Displays the name of the pool (maximum of 32 characters) to which the physical disk belongs. * The name is displayed only for the disk arrays with pool. (ix) Classification Classification displays the classification of target physical disk in any of the followings: Data: Physical disk that can be used as data area Spare: Replacement of physical disk at the failure occurrence System Volume: Physical disk used to bind a System Volume No Setting: Physical disk that is not specified as data/spare * For the disk arrays with pool, the classification of the physical disk subject to pool expansion is classified as Data. (x) Type Displays the physical disk type in either of the following. FC: FC disk I-69

78 Chapter 1 Basic Functions ATA: ATA disk SAS: SAS disk SSD: SSD disk (xi) Progress Ratio If the disk array to be monitored is that with pool, displays the event progress ratio in the physical disk where a rebuilding event had occurred. (xii) Transfer Rate Displays the transfer rate of the target physical disk (unit: Gbps). * If the target physical disk is not the SAS disk, displays a blank as the transfer rate. This item is displayed only on the devices that can mount the 6-Gbps SAS disk. When a disk array from D series is selected, a front view of the disk array cabinet showing the layout of the physical disks is displayed in the upper part of the information list display area. If a physical disk is not in normal operation, the same icon of the physical disk shown in the lower part of the list is also placed on the corresponding physical disk in the upper graphic part, which helps you visually check the state of physical disk. The [Start Blink] and [Stop Blink] buttons of the cabinet service LED are displayed on the right side of the cabinet. By clicking those buttons, you can perform the same control as when selecting [Cabinet Service LED] from the menu. I-70

79 Chapter 1 Basic Functions (2) Physical Disk detailed information screen This screen (Figure 1-36 or 1-37) is displayed if selecting (click the left button) optional physical disk and selecting by right clicking [Properties] (or [View] [State Monitor] [Properties] (ism client (Web GUI)) or [View] [Properties] (ism client (Win GUI)) from the menu) in configuration display area or information list display area, displaying detailed information of the physical disk. This screen displays detail information related to physical disks. Figure 1-36 Physical Disk Detailed Information (For Disks Arrays with Pool) I-71

80 Chapter 1 Basic Functions Figure 1-37 Physical Disk Detailed Information (For Disks Arrays Other Than the Disk Arrays with Pool) (i) Number Displays the physical disk number. The information you see here is the same as shown in the Physical Disk list screen described earlier in (1). (ii) Status Displays the operating status of physical disk and the occurrence of event. The information you see here is the same as shown in the Physical Disk list screen described earlier in (1). (iii) Capacity Displays the capacity of physical disk. (iv) Rotation Speed Displays rotation speed of the target physical disk (rpm). * For a SSD disk, - is displayed. (v) Type Displays the physical disk type. The information you see here is the same as shown in the Physical Disk list screen described earlier in (1). (vi) Transfer Rate Displays the transfer rate of the target physical disk (unit: Gbps). * If the target physical disk is not the SAS disk, displays - as the transfer rate. This item is displayed only on the devices that can mount the 6-Gbps SAS disk. I-72

81 Chapter 1 Basic Functions (vii) Product ID Displays the product model name (maximum of 16 characters) of the physical disk. (viii) Product Rev Displays the Product Revision (4 characters) of the physical disk. (ix) Serial Number Displays the product serial number (20 characters) of target physical disk. (x) RANK Number/Pool Number Displays the RANK and pool numbers of physical disk. The display contents are the same as (1) Physical Disk list screen. * The pool number is displayed only for the disk arrays with pool. (xi) Node Number Displays the node number of the physical disk. The display contents are the same as (1) Physical Disk list screen. * Node-related information is displayed only for the disk array with node. (xii) Pool Name Displays the name of the pool to which the physical disk belongs. The display contents are the same as (1) Physical Disk list screen. * The name is displayed only for the disk arrays with pool. (xiii) Classification Displays the classification of physical disk. The display contents are the same as (1) Physical Disk list screen. (xiv) Progress Ratio If the disk array to be monitored is a disk array with pool, displays the progress ratio in the physical disk in which a rebuilding event had occurred. The display contents are the same as (1) Physical Disk list screen. (xv) Conf.Chg Displays one of the following as the setting status of unlock guard for the spare disk. This is not displayed for the disk array that cannot use the configuration change guard function and a physical disk other than spare disk. Lock : Guard has been set. - : Guard has not been set. (xvi) Logical Disk List Displays the logical disk number, OS type, logical disk name, status, and configuration change of the logical disk, which comprises the physical disk. For the disk arrays with pool, displays the logical disk number, form, logical disk name, and status of each logical disk contained in the pool to which the target physical disk belongs. When the snapshot function is used, snapshot-volume (SV) and link-volume (LV) can be set to nondisplay. Setting can be made from the menu bar. Refer to Help for details. I-73

82 Chapter 1 Basic Functions Example: Logical Disk Number OS Type Logical Disk Name Status Conf.Chg 0000h NX KAIKEI Ready Lock 0001h A4 KEIRI Failure I-74

83 Chapter 1 Basic Functions Cache Segmentt IInfformattiion Diispllay If VirtualStoragePartitioning has been purchased for the disk array to be monitored, the cache segment information is displayed in the following areas: Configuration display area Cache segment list screen in the information list display area Cache segment detail information screen that is shown as properties This section describes each item displayed as cache segment information. (1) Cache segment list screen The cache segment list screen (pane surrounded by dashed lines in Figure 1-38) is displayed by selecting (click the left button) [Cache Segment] in the configuration display area. It displays various attribute information such as cache segment names, operating states, and capacity. If selecting any cache segment (with left click) in the configuration display area, you can see the list of logical disks assigned to the cache segment. For ism client (Web GUI), Min [%], Max [%], LD Conf.Chg, and Allocate [%] are not displayed at initial setting. If you want to display them, right-click the item name part and set the relevant item to be displayed. Figure 1-38 Cache Segment List Screen (ism Client (Web GUI)) (i) Icon (operating status/monitoring status of cache modules attached to the disk array where the cache segment is created) Displays the operating status/monitoring status of cache modules attached to the disk array where the I-75

84 Chapter 1 Basic Functions cache segment has been created with the icon next to the cache segment number. Icon Table 1-8 Display Icons Status All cache modules are in normal operation. An event that requires attention had occurred in the cache module. A critical failure had occurred in the cache module. The cache module is out of monitoring or under configuration setting. The cache module is out of monitoring or under configuration setting. If this icon is displayed, an event or failure (except a critical failure) that needs maintenance had occurred in the cache module just before monitoring was stopped. The cache module is out of monitoring or under configuration setting. If this icon is displayed, a critical failure had occurred in the cache module just before monitoring was stopped. (ii) Number Displays the cache segment number (iii) Segment Name Cache segment name. (iv) Status Displays the operating status of the cache module attached to the disk array where the cache segment has been created. Ready: Attn.: All cache modules are in normal operation. An event or failure (except critical failure) that needs maintenance had occurred in the cache module. Failure: A critical failure had occurred in the cache module. (v) Min [GB] Displays the minimum capacity of the cache segment in GB. (vi) Min [%] Displays the minimum capacity ratio of the cache segment in %. (vii) Max [GB] Displays the maximum capacity of the cache segment in GB. (viii) Max [%] Displays the maximum capacity ratio of the cache segment in %. (ix) Number of LDs Displays the number of logical disks assigned to the cache segment. (x) Assigned Logical Disk [GB] Displays the total capacity of logical disks assigned to the cache segment in GB. (xi) LD Conf.Chg Displays one of the followings as the setting status of configuration change guard for the logical disks assigned to the cache segment. This is not displayed for the disk array that cannot use the configuration I-76

85 Chapter 1 Basic Functions change guard function. Lock: Guard has been set. (Blank): Guard has not been set. (xii) Allocate [GB] Displays the currently allocated capacity of the cache segment in GB. (xiii) Allocate [%] Displays the current allocated capacity ratio of the cache segment in %. (xiv) Partition Allocated Displays the allocation state of the cache segment by one of the followings. Shared: Already allocated to multiple partitions. Exclusive: Already allocated to a partition. Unallocated: Not allocated to any partition. (xv) Partition Name Displays the name of the partition to which the cache segment belongs (up to 32 characters). For the Shared cache segment, up to four partition names sharing the cache segment are displayed. (xvi) Node Number Displays the number of the node to which the cache segment belongs (2 digits in hexadecimal). I-77

86 Chapter 1 Basic Functions (2) Cache segment detail information screen This screen (Figures 1-39 and 1-40) shows the detailed information of the cache segment selected (with left click) in the configuration display area or the information list display area. The screen is obtained by right clicking on the selected optional cache segment and selecting [Properties]. (It can also be obtained from the menu by selecting [View] [State monitor] [Properties] (for ism client (Web GUI)), or by selecting [View] [Properties] (for ism client (Win GUI).) Figure 1-39 Cache Segment Detail Information ([General] Tab) (i) Name Displays the cache segment name. The information you see here is the same as shown in the Cache segment list screen described earlier in (1). (ii) Number Displays the cache segment number. The information you see here is the same as shown in the Cache segment list screen described earlier in (1). (iii) Status Displays the operating status of the cache module attached to the disk array which created the cache segment. The information you see here is the same as shown in the Cache segment list screen described earlier I-78

87 Chapter 1 Basic Functions in (1). (iv) Min Displays the minimum capacity of the cache segment in GB. The information you see here is the same as shown in the Cache segment list screen described earlier in (1). (v) Max Displays the maximum capacity of the cache segment in GB. The information you see here is the same as shown in the Cache segment list screen described earlier in (1). (vi) LD Count Displays the number of logical disks assigned to the cache segment. The information you see here is the same as shown in the Cache segment list screen described earlier in (1). (vii) Total LD Capacity [GB] Displays the total capacity of logical disks assigned to the cache segment in GB. The information you see here is the same as shown in the Cache segment list screen described earlier in (1). (viii) LD Conf.Chg Displays the setting status of configuration change guard for the logical disk assigned to the cache segment. The information you see here is the same as shown in the Cache segment list screen described earlier in (1). This is not displayed for the disk array that cannot use the configuration change guard function. (ix) Allocate [GB] Displays the current allocated capacity of the cache segment in GB. The information you see here is the same as shown in the Cache segment list screen described earlier in (1). (x) Partition Allocated Displays the allocation state of the cache segment. The information you see here is the same as shown in the Cache segment list screen described earlier in (1). (xi) Node Number Displays the number of the node to which the cache segment belongs. The information you see here is the same as shown in the Cache segment list screen described earlier in (1). (xii) LD List Displays information on the logical disks assigned to the target cache segment (logical disk number, OS type, logical disk name, state, and configuration change). I-79

88 Chapter 1 Basic Functions Example: Number OS Type Logical Disk Name Status Conf.Chg 0000h NX LDNX00000 Ready Lock 0001h A4 LDA Failure Figure 1-40 Cache Segment Detail Information ([Partition] Tab) This screen displays partition-related information. (i) Partition List Displays the information of the partition (name and state) to which the cache segment belongs. I-80

89 Chapter 1 Basic Functions Portt IInfformattiion Diispllay If VirtualStoragePartitioning has been purchased for the disk array to be monitored, the port information is displayed in the following areas: Port list screen in the information list display area Port detail information screen that is shown as properties This section describes each item displayed as port information. (1) Port list screen The port list screen (pane surrounded by dashed lines in Figure 1-41) is displayed by selecting (click the left button) [Port] in the configuration display area. It displays various port-related information. For the ism client (Web GUI), WWNN, WWPN, Data Rate, Topology, and N_Port ID/Switch are not displayed at initial setting. If you want to display an item, right-click the item name part and set the relevant item to be displayed. Figure 1-41 Port Information List Screen (ism Client (Web GUI)) (i) Icon (operating status/monitoring status of the port) Displays the operating status/monitoring status of the port with the icon next to the port number. I-81

90 Chapter 1 Basic Functions Icon Table 1-9 Display Icons Status The port is in normal operation. The port is in the lock status. An event that requires attention had occurred in the port. A failure had occurred in the port. The port is out of monitoring or under configuration setting. The port is out of monitoring or under configuration setting. If this icon is displayed, the port is in the lock status. The port is out of monitoring or under configuration setting. If this icon is displayed, an event that requires attention had occurred in the port just before monitoring was stopped. The port is out of monitoring or under configuration setting. If this icon is displayed, a failure had occurred in the port just before monitoring was stopped. (ii) Port Number Displays the port number. (iii) Port Name Displays the port name (iv) Status Displays the operating status of the port in any of the following: Ready: The port is in normal operation. Offline: The port is separated or does not exist. Attn. (nolicense): The program product has not been installed. Failure: A failure had occurred in the port. (v) Conf.Chg Displays one of the followings as the setting status of configuration change guard for the port. This is not displayed for the disk array that cannot use the configuration change guard function. Lock: Guard has been set. (Blank): Guard has not been set. (vi) Protocol Displays physical protocol information of the port. (vii) Mode Displays Access Control mode of the port. (viii) Partition Allocated Displays the allocation state of the port by one of the followings. Shared: Already allocated to multiple partitions. Exclusive: Unallocated: Already allocated to a partition. Not allocated to any partition. I-82

91 Chapter 1 Basic Functions (ix) Partition Name Displays the name of the partition to which the port belongs (up to 32 characters). A blank is displayed for a Shared port (in WWN mode) because the port is shared by all partitions. (x) Node Number Displays the number of the node to which the port belongs (2 digits in hexadecimal). (xi) WWNN Displays the World Wide Node Name of the port. (xii) WWPN Displays the World Wide Port Name of the port. (xiii) Data Rate Displays the port transfer rate. (xiv) Topology Displays FiberChannel topology. (xv) N_Port ID/Switch Displays N_Port ID and LoopAddressSwitch of the port. I-83

92 Chapter 1 Basic Functions (2) Port detail information screen The screen (Figure 1-42) is displayed if selecting (click the left button) an optional port and selecting by right-clicking [Properties] (or [View] [State Monitor] [Properties] from the menu) in the information list display area, displaying detailed information of the port. Figure 1-42 Port Detail Information (i) Name Displays the port name. The information you see here is the same as shown in the Port list screen described earlier in (1). (ii) Port Number Displays the port number. The information you see here is the same as shown in the Port list screen described earlier in (1). (iii) Status Displays the operating status of the port. The information you see here is the same as shown in the Port list screen described earlier in (1). (iv) Conf.Chg Displays the setting information of configuration change guard for the port. The information you see here is the same as shown in the Port list screen described earlier in (1). This is not displayed for the disk array that cannot use the configuration change guard function. I-84

93 Chapter 1 Basic Functions (v) Mode Displays the Access Control mode of the port. The information you see here is the same as shown in the Port list screen described earlier in (1). (vi) Partition Allocated Displays the allocate status of the port. The information you see here is the same as shown in the Port list screen described earlier in (1). (vii) Partition Name Displays the name of the partition to which the port belongs (up to 32 characters). The information you see here is the same as shown in the Port list screen described earlier in (1). (viii) Node Number Displays the number of the node to which the port belongs (2 digits in hexadecimal). The information you see here is the same as shown in the Port list screen described earlier in (1). (ix) Protocol Displays physical protocol information of the port. The information you see here is the same as shown in the Port list screen described earlier in (1). (x) WWNN Displays the World Wide Node Name of the port. The information you see here is the same as shown in the Port list screen described earlier in (1). (xi) WWPN Displays the World Wide Port Name of the port. The information you see here is the same as shown in the Port list screen described earlier in (1). (xii) Data Rate Displays the port transfer rate. The information you see here is the same as shown in the Port list screen described earlier in (1). (xiii) Topology Displays FibreChannel topology. The information you see here is the same as shown in the Port list screen described earlier in (1). (xiv) N_Port ID/Switch Displays N_Port ID and LoopAddressSwitch of the port. The information you see here is the same as shown in the Port list screen described earlier in (1). I-85

94 Chapter 1 Basic Functions Connectted Hostt IInfformattiion Diispllay When the disk array to be monitored supports connected host information display, the information related to the connected hosts is displayed in the following areas: Connected Host list screen in the information list display area Connected Host detail information screen that is shown as properties The information is displayed if a connected host uses any logical disks bound in the relevant disk array (or, any logical disks bound in the disk array are assigned to the host), and the information of the host is collected by a host agent. This section describes each item displayed as connected host information. (1) Connected Host list screen The connected host list screen (pane surrounded by dashed lines in Figure 1-43) is displayed when [Connected Host] is selected (the left button is clicked on it) in the configuration display area, which displays information related to connected hosts. Host Information Collection Date is not displayed at initial setting. If you want to display the item, right-click the item name part and set the item to be displayed. Figure 1-43 Connected Host List Screen (ism Client (Web (GUI)) (i) Icon (operating status/monitoring status of logical disk assigned to the connected host and bound on the disk array) Displays the operating status/monitoring status of the logical disk assigned to the connected host and bound in the disk array with the icon next to the Connected Host Name column. I-86

95 Chapter 1 Basic Functions Icon Table 1-10 Display Icons Status All the logical disks assigned to the connected host and bound in the disk array are in normal operation. An event that requires attention had occurred in the logical disk assigned to the connected host and bound in this disk array. A failure had occurred in the logical disk assigned to the connected host and bound in this disk array. The logical disk is out of monitoring or under configuration setting. The logical disk is out of monitoring or under configuration setting. If this icon is displayed, an event that requires attention had occurred in the connected host just before the host enters the monitoring stop status. The logical disk is out of monitoring or under configuration setting. If this icon is displayed, a failure had occurred in the host just before the connected host enters the monitoring stop status. (ii) Connected Host Name Displays the connected host name. (Up to 32 characters. When it consists of 33 characters or more, only the first 32 characters are displayed.) (iii) Platform Displays the platform (OS) type of the connected host. (iv) Logical Disk Status Displays any of the following as the operating status of the logical disk assigned to the connected host and bound in the disk array. Ready: All the logical disks assigned to the connected host and bound in the disk array are in normal operation. Attn.: An event that requires attention had occurred in a logical disk assigned to the connected host and created in the disk array. Failure: A failure had occurred in a logical disk assigned to the connected host and created in the disk array. -: The relation between the connected host and the logical disk created in the relevant disk array is unknown as shown in the following cases. The logical disk created in the relevant disk array is not assigned. HBA information (WWNN, WWPN) is not included in the connected host information, or wrong HBA information (WWNN, WWPN) is registered. (v) IP Address Displays the IP address of the host to identify the connected host. Even if multiple IP addresses are assigned to the connected host, only one of them is displayed. (vi) Host Information Collection Date Displays the date and time when the connected host information is collected by the host agent. (vii) Partition Name Displays the name of the partition to which the host-related LD belongs. * Displayed only for the disk array for which VirtualStoragePartitioning has been purchased. I-87

96 Chapter 1 Basic Functions The unnecessary connected host information can be deleted. Delete it in the following steps on the ism client (Web GUI): (1) Start the ism client (Web GUI) as an authorized user (L3) to display the connected host list screen. (2) Select the connected host (with left click) which you want to delete in the information list display area, right-click on it, and select [Host Information Deleting] (or select [Operation] [State monitor] [Host Information Deleting] from the menu). To delete the information on multiple hosts, repeat the step (2) above. I-88

97 Chapter 1 Basic Functions (2) Connected host detail information screen This screen (Figures 1-44 and 1-45) is displayed if selecting (the left button is clicked on it) a connected host in the information list display area, right-clicking and selecting [Properties] (or [View] [State Monitor] [Properties] from the menu), which displays detailed information of the connected host. Figure 1-44 Connected Host Detail Information Screen (i) Name Displays the connected host name. The information you see here is the same as shown in the Connected Host list screen described earlier in (1). (ii) Platform Displays the platform (OS) type of the connected host. The information you see here is the same as shown in the Connected Host list screen described earlier in (1). (iii) Logical Disk Status Displays the operating status of the logical disk assigned to the connected host and bound in the disk array. The information you see here is the same as shown in the Connected Host list screen described I-89

98 Chapter 1 Basic Functions earlier in (1). (iv) IP Address Displays the IP address of the connected host. The information you see here is the same as shown in the Connected Host list screen described earlier in (1). (v) Host Information Collection Date Displays the date and time when the connected host information is collected by the host agent. The information you see here is the same as shown in the Connected Host list screen described earlier in (1). (vi) HBA List Displays information (WWNN and WWPN) of Host Bus Adapters (HBAs) mounted on the connected host. Examples WWNN WWPN (vii) Diskarray Port Displays information (Disk Array Name, Port Number, Port Name, WWNN, and WWPN) of the disk array ports connected to the HBA selected in the HBA list. Examples Diskarray Name Port Number Port Name WWNN WWPN R100_1 00h-00h PORT_00_00 R100_2 00h-01h PORT_00_ I-90

99 Chapter 1 Basic Functions Figure 1-45 Connected Host Detail information screen (i) (ii) Partition Name Displays the name of the partition to which the host-related LD belongs. * Displayed only for the disk array for which VirtualStoragePartitioning has been purchased. Status Displays the partition status. * Displayed only for the disk array for which VirtualStoragePartitioning has been purchased. I-91

100 Chapter 1 Basic Functions Conttrollller IInfformattiion Diispllay Controller information is displayed in the following areas: Controller cabinet list screen and Controller list screen in the information list display area Controller detail information screen that is shown as properties This section describes each item displayed as controller information. (1) Controller cabinet list screen You can see the information of controllers such as the number of components included in a controller cabinet in this screen (pane surrounded by dashed lines in Figure 1-46) by selecting Controller (with left click) in the configuration display area. This screen is displayed when the D8 series is selected. Figure 1-46 Controller Cabinet List Screen (i) Icon (operating status/monitoring status of controller components) Displays the operating status/monitoring status of controller components with the icon next to the [Number] column. I-92

101 Chapter 1 Basic Functions Icon Table 1-11 Display Icons Status The component is in normal operation. An event that needs maintenance had occurred in any of the components. (Note) The component is out of monitoring or under configuration setting. The component is out of monitoring or under configuration setting. If this icon is displayed, an event that needs maintenance had occurred in any of the components just before monitoring was stopped. Note: You can choose whether to use to show the status of a component where an event or failure (except critical failure) that needs maintenance had occurred. For details on the switching method, refer to 2.2, Client Start/Stop. (ii) Number Displays the controller cabinet number. (iii) Status Displays the integrated operating status for each controller cabinet. Ready: All components are in normal operation. Ready (maintenance): An event that needs maintenance had occurred in any of the components. (iv) Number of Elements Displays how many components are included. For D8 series, back views of controller cabinets in the disk array and connections between each controller cabinet are illustrated in the upper part of the controller cabinet list screen. By selecting any controller (with right click) in the list, you can perform the same control as when selecting Cabinet Service LED from the menu. I-93

102 Chapter 1 Basic Functions (2) Controller list screen You can see the information of controllers such as the operating status of each component of a controller in this screen (pane surrounded by dashed lines in Figure1-47 or 1-48). The screen can be obtained by selecting a graphic of controller cabinet (with left click) shown in the individual component layer, or, by selecting Controller (with left click) in the configuration display area if the disk array does not support graphical display of configuration information. Figure 1-47 Controller List Screen (ism Client (Web GUI)) Figure 1-48 Controller List Screen (ism Client (Win GUI)) I-94

103 Chapter 1 Basic Functions (i) Icon (operating status/monitoring status related to controller) Displays the operating status/monitoring status of the component related to the controller with the icon next to the Type column. Icon etc. Table 1-12 Display Icons Status The component is in normal operation An event that requires attention had occurred in a component. A failure had occurred in a component. (If the component type is Temperature Alarm, this indicates an abnormal temperature or sensor failure.) etc. The component is out of monitoring or under configuration setting. The component is out of monitoring or under configuration setting. If this icon is displayed, an event that needs attention had occurred in any of the components of the controller just before monitoring was stopped. The component is out of monitoring or under configuration setting. If this icon is displayed, a failure had occurred in any of the components just before monitoring was stopped. (If the component type is Temperature Alarm, it indicates the abnormal temperature.) (ii) Type Displays the type of each component of the controller as shown in the left column of Table Table 1-13 Controller Component List Type Abbreviation Host Director HD Replication Director RD Disk Director DD Cache Module CHE Service Processor SVP Power Supply DAC_PS Battery Backup Unit DAC_BBU DAC_BBU(OP) Extended Battery Backup Unit (*1) EXT_BBU(xx) (*2) Fan DAC_FAN DAC_FANU DAC_FANL Temperature Alarm DAC_TEMP_ALM Back Board BC Junction Box Panel Maintenance PC Power Control Card DAC_BB BBU_BB BC_JB PANEL MAINTE_PC PCC I-95

104 Chapter 1 Basic Functions Adapter Local Switch Type ADP ADP(SATA) ADP(S/S) LSW Abbreviation (*1) The extended battery backup unit exists as not a component of controller cabinet but an independent cabinet (extended cabinet). It is not graphically shown in the upper part of the controller list screen but included only in the lower part of the list. (*2) (xx) represents the internal number indicating the type of the extended battery backup unit. (iii) Abbreviated Name (Number) Displays the abbreviation for the controller component (See the right column of Table 1-13) and the component number assigned to it. (iv) Status Displays the operating status of the controller component in any of the followings: Ready: A component of the controller is in normal operation Attn. (nolicense): The program product BaseProduct has not been installed. (Displayed only for Host Director) Attn. (rebuilding): Rebuilding data (Displayed only for Cache Module) Attn. (charge): Being charged (Displayed only for Battery Backup Unit) Attn. (maintenance): Being degraded Attn (exchange (pre notice)): You must plan to exchange parts since the next exchange date for controller components is approaching. (Only for batteries) Attn (exchange): Parts must be exchanged, since the next exchange date for controller components has already passed. (Only for batteries) Offline: A component of the controller is separated or does not exist. Failure: A failure had occurred in component of controller. (If the component type is Temperature Alarm, it indicates the abnormal temperature.) (v) Others Displays the cache module capacity, port number or protocol information as supplementary information of the controller. Cache module capacity If the component type is Cache Module, the cache module capacity is displayed. Port number If the component type is Host Director, Replication Director, or Disk Director, a port number (2 hexadecimal digits) that the director possesses is displayed. I-96

105 Chapter 1 Basic Functions Protocol information If the component type is Host Director, the protocol information of the director is displayed following the port number. When a disk array from D series is selected, a rear view of the controller cabinet showing the layout of controller components is displayed in the upper part of the information list display area. You cannot select each component but each minimum replaceable unit composed of several components on the picture. If a component is not in normal operation, the same icon of a component shown in the lower part of the list is also placed on the corresponding unit in the upper graphic part of the list. States of the components which are not visible entities (such as temperature) are shown with colors of the cabinet. The [Start Blink] and [Stop Blink] buttons of the cabinet service LED are displayed on the right of the cabinet. By clicking those buttons, you can perform the same control as when selecting [Cabinet Service LED] from the menu. (3) Controller detail information screen Select (left-click on) an arbitrary controller in the information list display area, right-click on it, and select [Properties] (or [View] [State monitor] [Properties] (ism client (Web GUI)) or [View] [Properties] (ism client (Win GUI)) from the menu). The Controller properties screen (Figure 1-49) appears displaying the detailed information of the selected controller. This screen displays detail information related to controllers. Figure 1-49 Controller Detail Information Screen The information to be displayed varies depending on the selected component. (In the above screen sample, a cache module is selected.) I-97

106 Chapter 1 Basic Functions Diisk Encllosure IInfformattiion Diispllay Disk enclosure information is displayed in the following areas: Disk enclosure cabinet list screen and disk enclosure list screen in the information list display area Disk enclosure detail information screen that is shown as properties This section describes each item displayed as disk enclosure information. No enclosure may be provided depending on your system configuration. (1) Disk Enclosure Cabinet list screen You can see the information of controllers such as the number of components included in a disk enclosure cabinet in this screen (pane surrounded by dashed lines in Figure 1-50) by selecting Enclosure (with left click) in the configuration display area. This screen is displayed when a disk array from D series is selected. Figure 1-50 Disk Enclosure Cabinet List Screen (i) Icon (operating status/monitoring status of each disk enclosure component) Displays the operating status/monitoring status of each disk enclosure component with the icon in the Number column. Icon Table 1-14 Display Icons Status I-98

107 Chapter 1 Basic Functions The component is in normal operation. An event that needs maintenance had occurred in the component. (Note) The component is out of monitoring or under configuration setting. The component is out of monitoring or under configuration setting. If this icon is displayed, an event that needs maintenance had occurred in the component just before monitoring was stopped. Note: You can choose whether to use to show the status of a component where an event or failure (except critical failure) that needs maintenance had occurred. For details on the switching method, refer to 2.2, Client Start/Stop. (ii) Number Displays the disk enclosure cabinet number. (iii) Status Displays the general operating status of all disk enclosure cabinets. Ready: All components are in normal operation. Ready (maintenance): An event that needs maintenance had occurred in a component. (iv) Number of Elements Displays the number of components. (v) Node Number Displays the node number (2 digits in hexadecimal). * Node-related information is displayed only for the disk array with node. If a disk array from D8 series is selected, rear views of all disk enclosures included in the disk array are displayed in the upper part of the information list display area. The [Start Blink] and [Stop Blink] buttons of the cabinet service LED are displayed on the right side of each enclosure cabinet. Clicking the button enables you to execute the same control as when you select Cabinet Service LED from the menu. I-99

108 Chapter 1 Basic Functions (2) Disk Enclosure list screen The disk enclosure list screen (pane surrounded by dashed lines in Figure 1-51 or 1-52) is displayed when a disk enclosure cabinet is selected (the left button is clicked on it) in the individual component layer (when [Enclosure] is selected (the left button is clicked on it) in the configuration display area for a disk array other than the D series), which displays the operating status and other items for each component related to the disk enclosures. Figure 1-51 Disk Enclosure List Screen (ism Client (Web GUI)) Figure 1-52 Disk Enclosure List Screen (ism Client (Win GUI)) I-100

109 Chapter 1 Basic Functions (i) Icon (operating status/monitoring status related to disk enclosure) Displays the operating or monitoring status of each component of the disk enclosure using an icon placed in front of the Type name. Icon etc. (Ready) (Offline) (Failure) etc. (Ready) (Offline) (Failure) Table 1-15 Display Icons Status The component (disk enclosure) is in normal operation. The component is separated or does not exist A failure had occurred in the component. (If component type is Temperature Alarm, it indicates temperature abnormalities or sensor failure.) The component is out of monitoring or under configuration setting. The component is out of monitoring or under configuration setting. If this icon is displayed, any component is disconnected or absent just before monitoring was stopped. The component is out of monitoring or under configuration setting. If this icon is displayed, a failure had occurred in any of the components just before monitoring was stopped. (If the component type is Temperature Alarm, it indicates the abnormal temperature.) (ii) Type Displays the type of each component of the controller as shown in the left column of Table Table 1-16 List of Components Related to Disk Enclosure Type Abbreviation Adapter Card DE_ADP DE_ADP(SATA) DE_ADP(S/S) Power Supply DE_PS Fan DE_FAN Temperature Alarm DE_TEMP_ALM Back Board DE_BB EC Junction Box EC_JB (iii) Abbreviated Name (Number) Displays the abbreviation for the controller component (See the right column of Table 1-16) and the component number assigned to it. (iv) Status Displays the operating status of the controller component in any of the followings: Ready: A component of the disk enclosure is in normal operation. Offline: A component of the disk enclosure is separated or does not exist. Failure: A failure had occurred in component of disk enclosure. (If component type is Temperature Alarm, it indicates temperature abnormalities or sensor failure.) I-101

110 Chapter 1 Basic Functions When a disk array from D series is selected, a rear view of the disk enclosure cabinet showing the layout of controller components is displayed in the upper part of the information list display area. You cannot select each component but each minimum replaceable unit composed of several components on the picture. If a component is not in normal operation, the same icon of a component shown in the lower part of the list is also placed on the corresponding unit in the upper graphic part of the list. States of the components which are not visible entities (such as temperature) are shown with colors of the cabinet. The [Start Blink] and [Stop Blink] buttons of cabinet service LED are displayed on the right side of the cabinet. By clicking those buttons, you can perform the same control as when selecting [Cabinet Service LED] from the menu. (v) Node Number Displays the node number (2 digits in hexadecimal). * Node-related information is displayed only for the disk array with node. (3) Disk Enclosure Properties screen Select (left-click on) an arbitrary disk enclosure in the information list display area, right-click on it, and select [Properties] (or [View] [State Monitor] [Properties] (ism client (Web GUI)) or [View] [Properties] (ism client (Win GUI)) from the menu). The Disk Enclosure properties screen (Figure 1-53) appears displaying the detailed information of the selected disk enclosure. This screen displays detail information related to disk enclosures. Figure 1-53 Disk Enclosure Properties Screen The information to be displayed varies depending on the selected component. (In the above screen sample, an adapter card is selected.) I-102

111 Chapter 1 Basic Functions 1..2 State Moniitoriing The state monitoring function is performed to monitor the occurrence of the following events in the disk array monitored from the ism server. <Event> Status transition of the components Change of a disk array name, a logical disk name and a port name Configuration change Threshold excess of the snapshot capacity in use Occurrence of a threshold excess or quota excess of the thin provisioning actual used capacity ism supports the polling mode to acquire the monitoring information in the fixed interval. When any of the above events is detected, ism not only reflects the detected event on the configuration control screen of an ism client but also outputs the message to various logs (system log, operation log). Besides, it can perform an action linked with the event detection such as running a script file. For log output and link function, refer to sections 1.5 Log Output and 1.6 Event Link in this manual. Operation administrator Storage Manager Configuration display screens Logical disks Displays the occurrence of a failure. Polling/Trap Occurrence of failure Physical disk Controller (DAC) Disk enclosure (DE) Disk array Figure 1-54 Operation Image I-103

112 Chapter 1 Basic Functions Functtiion Overviiew (1) Monitoring Events With state monitoring function, the disk array components under ism control are monitored for event occurrence (or transition) shown in Table Table 1-17 Monitoring Event List Section Component Element Event Level ready info info (inactive) info failure error Physical Disk attn. (rebuilding) notice attn. (powering up) notice attn. (formatting) notice attn. (stop) notice offline error ready info failure error HD/RD/DD attn. (nolicense) notice Controller CHE/SVP attn. (rebuilding) notice PS/BBU, etc attn. (charge) notice attn. (maintenance) notice offline error (Disk) Enclosure ADP/PS ready info FAN/BB failure error TEMP_ALM, etc offline error ready info ready (formatting) info failure error Status Transition failure (media error) error failure (over quota) error failure (over capacity) error attn. (reduce) error Logical Disk attn. (rebuilding) notice attn. (preventive copy) notice attn. (copy back) notice attn. (unformatted) notice attn. (formatting) notice attn. (format-fail) notice attn. (expanding) notice attn. (expand-fail) notice attn. (stop) notice Control Path stop (ctrl path fail) error ready info failure error failure (over capacity) error Pool attn. (reduce) error attn. (rebuilding) notice attn. (preventive copy) notice attn. (copy back) notice attn. (stop) notice Disk Array Disk Array Name renamed info Name Change Controller Port Name renamed info Logical Disk Logical Disk Name renamed info Logical Disk config changed notice Logical Disk Configuration Cache Disk config changed notice Change Physical Disk Physical Disk config changed notice Controller Access Control config changed notice I-104

113 Chapter 1 Basic Functions Screen and Operattiion This section describes how the state monitoring information is displayed, and how to start and stop monitoring through an ism client. (1) Monitoring information display Information monitored by the ism server is displayed as Message Output and Status Value Reflection via ism client. (a) Message Output When the status transition, name change, or configuration change is detected, messages corresponding to such events are output in the message display area of the main window. Example of message output at failure detection Sat Jan 6 02:08: Info ismrmond ism07102:state of PD(11h) has become failure. (Storage_1 productid=storage SN= No=00h-01h PoolNo=0000h PoolName=Pool0000)... (i) (i) The message indicates that a failure had occurred in the physical disk (with a resource type of 11h, product ID of Storage, serial number of , number of 00h-01h, pool number of 0000h, and pool name of Pool0000 ) of the disk array (whose disk array name is Storage_1 ). Example of message output at name change Sat Jan 6 02:08: Info ismrmond ism07201:disk Array, named Storage_1, has renamed to Storage_2. (SN= )... (i) (i) The message indicates that the disk array (whose name is Storage_1 and serial number is ) has been renamed to Storage_2. For details, refer to the Messages Handbook. (b) State Value Reflection State changes of components such as changes in status, names, or configurations are reflected in the configuration display area of the main window on an ism client. If an event such as failure, caution, or offline occurs in any of the components, the status value of the component in individual component layer is changed and the corresponding icon is also changed. Status in the component layer or the disk array layer changes depending on the status change in the individual component layer. For example, if any event that requires attention occurs in PD, the status of the PD in the component layer and the status of the disk array layer change to Ready (Maintenance) (See Table 1-18). Furthermore, when two events at different failure level simultaneously occur in the individual element layer, an event with higher failure level is always reflected on the upper layer. I-105

114 Chapter 1 Basic Functions For the information displayed refer to 1.1, Configuration Display in this manual. Table 1-18 Failure Status Reflection Disk Array Layer Partition Layer Component Layer Individual Component Layer or Serious failure Ready (maintenance) or Serious failure Ready (maintenance) or or or or or Failure Ready Ready Ready Pool LD Host PD Controller Enclosure Port Pool or LD or or or or or or Ready (maintenance) or etc. etc. PD Controller Enclosure (cabinet) Enclosure Host Cache segment Port Pool LD PD Controller Enclosure (cabinet) Enclosure Host Cache segment Port Failure Attention/ offline/ info Ready * Pool-related information is displayed if the disk array to be monitored is a disk array with pool. Host-related information is displayed if the disk array supports host information display. Information related to a partition, cache segment, and port is displayed for the disk array for which VirtualStoragePartitioning has been purchased. I-106

115 Chapter 1 Basic Functions 1. You can choose whether to use the icon to show the Ready(maintenance) status with the environment setting for the ism client. Refer to 2.2, Client Start/Stop for details of the switching method. 2. When a threshold excess occurs, icon is displayed if the states of the disk array layer, partition layer, and the component layer (pool or logical disk) are Ready or Ready (Maintenance). If, however, [Display Maintenance Status] is checked, an icon indicating the state of components is given precedence for display. 3. Shape or shading of the disk array icon varies depending on the type of disk array and the monitoring state. For further detailed information on the disk array icon, refer to Disk Array Information Display in this manual. (2) Monitoring Start/Stop In the ism server, monitoring is automatically carried out for the disk array specified by the Environment Definition file (ismsvr.conf) when the server starts-up. When you wish to temporarily stop/resume monitoring for the specific disk array due to maintenance or configuration changes, the following operation should be executed. In order to utilize this function, user level should be L3. (i) (ii) Select [Operation] [State monitor] [Start/Stop Monitoring] (ism client (Web GUI)) or [Operation] [Start/Stop Monitoring] (ism client (Win GUI)) From the menu, select to display the Start/Stop Monitoring screen. From [Disk Array Subsystem Name] on Monitoring Control Dialog, select (click) a disk array that you wish to start or stop monitoring. If you wish to start monitoring: Click [Start] button. If you wish to stop monitoring: Click [Stop] button. If you wish to stop the monitoring start/recovery process for a disk array whose monitoring status shows Starting demand or Wait Recovery. : Click [Break] button. Figure 1-55 Start/Stop Monitoring Screen I-107

116 Chapter 1 Basic Functions 1..3 Niickname Settiing Nickname setting function is used via ism client to set an arbitrary disk array name, logical disk name (and disk OS Type), and port name for disk arrays (other than the E series) monitored by ism. If setting identical names with those acquired from business systems using the disk arrays, you will be able to control the disk arrays more efficiently. Once set, they can be acquired without having to reboot ism because the setting is registered inside a disk array. For an E series disk array, you can use this function not via ism but Storage Manager Express. For details on how to start it, refer to 2.2.4, Starting Storage Manager Express. Operation administrator Accounting/ARRAY1/MS00 Accounting/ARRAY1/MS01 Storage Manager Configuration display screen SAN Accounting operation Logical disks Accounting MS00 MS01 MS02 MS03 Port ARRAY2 ARRAY1 MS04 MS05 MS06 MS07 Disk array Figure 1-56 Operation Image Disk array name should be set under the following conditions for Storage Manager Express. 1-byte uppercase and lowercase alphanumeric characters. (Using / or _ is allowed when a name should include multiple factors.) Maximum number of characters: 32. I-108

117 Chapter 1 Basic Functions Functtiion Overviiew With Nickname Setting function, the following three items can be arbitrarily set. In order to set them, you must have L3 level permissions. [Setting Items] Disk Array Name Logical Disk Name (+ OS type) Port Name Screen and Operattiion This section describes the setting method and dialogs on an ism client. (1) Disk Array Name Setting (i) Disk array name can be set through the following procedure. Select (left-click on) the disk array for which you want to set a name in the configuration display area (or the information list display area). Then, right click on the disk array and choose [Setting] to display the Setting Disk Array Subsystem dialog (Figure 1-57). You can also set from the menu by selecting [Operation] [State monitor] [Disk Array Subsystem Name Settings] for ism client (Web GUI), or, by selecting [Operation] [Disk Array Subsystem Name Settings] for ism client (Win GUI). Figure 1-57 Setting Disk Array Subsystem Dialog I-109

118 Chapter 1 Basic Functions (ii) Enter the disk array name in the [New Disk Array Subsystem Name] edit box, following the rules indicated in (2) Disk Array Setting Condition and Naming Rule, and click [Apply] button. (iii) The following message will be displayed to show the result. Message Setting has been completed Setting information is incorrect Same name exists Access error occurred to Disk Array Subsystem Cannot execute the demand during the suspension of the object Disk Array Subsystem monitoring Cannot execute the demand during the configuration setting Demanded process has already been executed Setting Failed (nn) Table 1-19 Execution Result Dialog State Execution result is normal. Parameter Error Same name exists. Access error had occurred. Setting is unavailable due to monitoring stop. Setting is unavailable due to under configuration setting. Already executed Other errors (nn is a decimal detail code.)* * Other errors When Setting Failed (nn) is displayed during the setting process of disk array name, it is considered that any error is detected after completion of I/O for disk array. Check on the browser whether the disk array setting has been executed, and set again if necessary. (2) Disk Array Setting Condition and Naming Rule (a) (b) Setting Condition Disk array name should be set under the following conditions. (Otherwise, it is treated as a parameter error.) 1-byte uppercase and lowercase alphanumeric characters. (When a name should include multiple factors, / or _ can be entered) Maximum number of characters: 32. Naming Rule A disk array used from the ACOS-4 system must be recognized by the ACOS host, especially when DynamicDataReplication or RemoteDataReplication are used. Therefore, a disk array name should be specified so that the host can locate a disk array to which its managing logical disk belongs. Make a disk array name in combination of alphanumeric characters including uppercase characters and _ (under bar), within 32 bytes. Definition Example: CABINET01,CABINET02 In addition, when a disk array is used from other systems, it is recommended to set the same disk array name as the one acquired from the system, along with logical disk name and port name. Note that when you don t set a disk array name, a disk array has a default name of 16 characters peculiar to a disk array which has been set at the time of shipment. I-110

119 Chapter 1 Basic Functions 1. If the target disk array name is in the locked state (disk array name is followed by (Lock) ), the disk array name cannot be changed. The [New Disk Array Subsystem Name] edit box and the [Apply] button are grayed. 2. If you log into the system as the partition user, you cannot set a disk array name. 3. You can copy the current disk array name displayed in [Disk Array Subsystem Name] to the clipboard. Select the character string of the disk array name and press [Ctrl] + [C] on the keyboard, or select [Copy] from the menu after right-clicking the mouse (ism client (Win GUI) only). (3) OS type/logical disk name setting (i) OS type/logical disk name can be set through the following procedure. Select (left-click on) the logical disk for which you want to set an OS type and name in the configuration display area (or the information list display area). Then, right click on the logical disk and choose [Setting] to display the Setting Disk Array Subsystem dialog (Figure 1-58). You can also set from the menu by selecting [Operation] [State monitor] [Logical Disk Name Settings] for ism client (Web GUI), or, by selecting [Operation] [Logical Disk Name Settings] for ism client (Win GUI). Figure 1-58 Setting Logical Disk OS Type / Name Dialog (ii) In [New OS Type] or [New Name] edit box, input a logical disk name following the rules defined in (4) OS Type/Logical Disk Name Setting Conditions and Naming Rules and click [OK] button. (iii) As a result of the setting, the following information is displayed in the dialog. I-111

120 Chapter 1 Basic Functions Message Setting has been completed Setting information (OS Type/Name) is incorrect Same name exists Error occurred in the access to the Disk Array Subsystem Cannot execute the demand during the configuration setting Demanded process has already been executed Table 1-20 Execution Result Dialog Status Execution result is normal. Parameter Error Same name exists. Access error had occurred. Setting is unavailable due to under configuration setting. Already executed. Failed in setting (nn) Other errors (nn is a decimal detail code.) * * Other errors When Setting Failed (nn) is displayed during the setting process of disk array name, it is considered that any error is detected after completion of I/O for disk array. Check on the browser whether the disk array setting has been executed, and set again if necessary. (4) OS Type/Logical Disk Name Setting Conditions and Naming Rules (a) OS Type setting conditions Select an OS Type from the Table 1-21 below according to a system using logical disks. Especially, you must set a correct OS type when using DynamicDataReplication or RemoteDataReplication in the following systems: Logical volume used on the ACOS-4 system Logical volume used on the ACOS-2 system Logical volume used in the Windows system OS Type Table 1-21 OS Type List Description A2 A4 AX CX LX NX SX WN WG Lgogical disks used on an ACOS-2 system Logical disks used on an ACOS-4 system (For instructions on setting this type, contact the maintenance engineer.) Logical disks used on an AIX system Logical disks used on a Solaris system Logical disks used on a Linux system Logical disks used on an HP-UX system Logical disks used on a SUPER-UX system Logical disks (excluding those composed of GPT disks) used on a Windows system Logical disks composed of GPT disks used on a Windows system For instructions on setting the ACOS-4 type, also refer to Appendix in the Configuration Setting Tool User s Manual (GUI). I-112

121 Chapter 1 Basic Functions 1. If the logical disk to be set is a replication volume (whose RPL type is MV, RV, or RV/MV) or a snapshot volume (whose snapshot type is BV, SV, LV, SV*, or SDV), the OS type cannot be changed. The [New OS Type] edit box is grayed. 2. If the logical disk to be set is in the locked status, the OS type and the logical disk name cannot be changed. 3. The OS type of a System Volume cannot be changed. 4. If you log into the system as a partition user, you can set only logical disks which belong to partitions under monitoring. You, however, cannot set a logical disk used as a System Volume. 5. The OS type cannot be changed if the logical disk has been bound using the quick format function. 6. You can copy the OS type and logical disk name displayed in [OS Type] and [Name] to the clipboard. Select the character string to be copied and press [Ctrl] + [C] on the keyboard or select [Copy] from the menu after right-clicking the mouse (ism client (Win GUI) only). (b) (c) Logical Disk Name Setting Conditions A logical disk name should be set according to the conditions below. (Otherwise, it is treated as a parameter error.) 1-byte alphanumeric characters including upper- and lowercase characters. (When a name should include multiple factors, / or _ can be entered) Maximum number of characters: 24 Naming Rules A logical disk used by the ACOS-4 system must have its logical disk name that can be identified by the ACOS host, especially when DynamicDataReplication or RemoteDataReplication are used. Therefore a logical name should be set according to the rules below. Logical disk name = [/system name/] + device identification name System name: Generic system name, which is an identifier created in combination with 1- byte uppercase alphanumeric characters including _ (under bar) within 18 bytes. It may be omitted. Device identification name: Name of device defined in ACOS-4 system Example of definition: MS01,/SYSTEM01/MS01 Moreover, when a logical disk is used by other systems, it is recommended to set the same disk array name as the one acquired from the system, along with disk array name and port name. Note that when you don t set an OS type and logical disk name, they have default values of blank and the 16 characters peculiar to disk array + 4 characters of logical disk number respectively which has I-113

122 Chapter 1 Basic Functions have been set at the time of shipment. (5) Port name setting Port name can be set through the following procedure. (i) Select (left-click on) the disk array for which you want to set a name in the configuration display area (or the information list display area). Then, right click on the disk array and choose [Setting] to display the Setting Disk Array Subsystem dialog (Figure 1-57). You can also set from the menu by selecting [Operation] [State monitor] [Disk Array Subsystem Name Settings] for ism client (Web GUI), or, by selecting [Operation] [Disk Array Subsystem Name Settings] for ism client (Win GUI). (ii) Select a port number (port name) from the [Port Number] list and input port name in the [New Port Name] edit box, following the rules defined in (6) Port Name Setting Conditions and Naming Rules and click [Apply] button. (iii) As a result of the setting, the following information is displayed in the dialog. Table 1-22 Execution Result Dialog Message Status Setting has been completed Execution result is in normal. Setting information is incorrect Parameter Error Same name exists Same name exists. Error occurred in the access to the Disk Array Access error had occurred. Subsystem Cannot execute the demand during the suspension Setting is unavailable due to monitoring stop. of the object Disk Array Subsystem monitoring Cannot execute the demand during configuration setting Demanded process has already been executed Setting is unavailable due to under configuration setting. Already executed. Setting failed (nn) Other errors (nn is a decimal Detail Code.) * * Other errors When Setting Failed (nn) is displayed during the setting process of disk array name, it is considered that any error is detected after completion of I/O for disk array. Check on the browser whether the disk array setting has been executed, and set again if necessary. I-114

123 Chapter 1 Basic Functions (6) Port Name Setting Conditions and Naming Rules (a) (b) Setting conditions Port name should be set under the following conditions. (Otherwise, it is treated as a parameter error.) 1-byte alphanumeric characters including upper- and lowercase characters. (When a name should include multiple factors, / or _ can be entered) Maximum number of characters: 32 Naming rules As well as the disk array name and the logical disk name, it is recommended to set the same port name as the one acquired from the system using the ports. Note that when you don t set a port name, the port has a default name of 16 characters peculiar to disk array + 2 characters of director number + 2 characters of port number which has been set at the time of shipment. 1. You can set a name only to ports used by a host. In Setting Disk Array Subsystem dialog, only the numbers of the ports used by a host is displayed. 2. If the port to be set is in the locked status (the port number is followed by (Lock) in the port number list), the port name cannot be changed. The [New Port Name] edit box and the [Apply] button are grayed. 3. If you log into the system as a partition user, you cannot set a port name. I-115

124 Chapter 1 Basic Functions 1..4 Diisk Array Moniitoriing for Faiillure All ism messages are reported on the message display area of client screen while the client is connected. This is a function to allow clients to monitor disk arrays for a failure. The following describes the function to monitor disk arrays for a failure Functtiion Overviiew ism s function to monitor disk arrays for a failure allows for: (1) Reporting all the messages in the message display area of the ism clients that are connected. (2) Saving displayed messages in text files in the PC where the ism client is installed (log collection). (3) Message-level-based user notification How tthe Functtiion Works What is shown for operation log is shown in the message display area. Each message is displayed with an icon showing the severity level clearly. The message which has already been displayed once also extracts to individual log file on the PC side. Whatever display status ism client may be on screen according to the message level, it has function for noticing the failure occurrence to the user. (1) Output to the message display area The same operation log that is extracted on the ism server side is displayed in the message display area. However, it displays only what is output during ism client connection. The message which shows connection/disconnection between ism client and server is also displayed as an individual message. After determining the message level, add the proper icon ( (Err) / (Warning) / (Notice, Info)) at the start of line. (2) Log collection Messages displayed in the message display area are reported to log files on the PC. Up to 1 MB data can be stored in one log file. If it exceeds 1 MB, it is renamed to an ism old file and a new ism log file is created. Because two files, OLDiSM.log and ism.log are used one after the other, a maximum of 2 MB file can be saved and more capacity is not needed. (3) User notification function Because the ism client is not always displayed in the foreground, a function to notify a failure to users according to the message levels is provided. When the message level is (Err) / (Warning), the button on the task bar blinks (ism client (Win GUI) only) and the notification button changes from to. Press the notification button or use the menu to stop notification, in which case the notification button returns from to. I-116

125 Chapter 1 Basic Functions 1..5 Log Output ism messages are reported to operation log and syslog. The following describes log output details Functtiion Overviiew ism s log output function allows for: (1) Output of messages to operation log. (2) Output of messages to syslog. (The function or facility is daemon). (3) Switching of output files when the maximum of operation log is exceeded How tthe Functtiion Works Operation log consists of a log file being reported, its generation file (backup file) and a generation management file saving the management information of generation files. An operation log is created on the log file saving directory (/opt/ismsvr/etc/log). The output destination can be changed by configuring the environment settings. Generation files are log file backups saved in sequence. They can be created up to 99. However, if the number of generation files exceeds the maximum, the oldest file will be overwritten. Switching of files or change of names are performed automatically, which remains transparent to users. Example: When 17 generation files have been created in the operation log. Currently editing New (i) Name of the generation file being updated ism_log.log Generation files 17 (ii) Name of the latest generation file ism_log17.log 16 Name of the oldest generation file (iii) Name of the generation management file ism_log01.log ism_log.cnt 01 Generation management file 17 Old I-117

126 Chapter 1 Basic Functions (1) Log file One message output by ism server is saved as one record in the log file being reported. When the log file exceeds the specified size, it is initialized after copying to a generation file. File size: 1 to 10 (MB) Default is 1 MB; the size can be from 1 to 10 (MB) File name: ism_log +.log (2) Generation file A generation file is a backup file of the log file. Up to 99 generation files can be created. The generation number of a file represents the order of the backup; the larger the number is, the newer the file is. However, the file with the largest number is not necessarily the newest one because overwriting is made from the file of the generation number 1 and subsequent files when the number of created files exceeds the maximum. For information about how to identify the newest file accurately, refer to (3) Generation management file. File name: ism_log + nn +.log Generation number: 01 to 99 (3) Generation management file A generation management file is a file that shows the latest information on the generation file numbers, and saves the information with 2-digit generation number (2 bytes). When the generation number of generation management file is 99, 01 is assigned as the next generation number. When no management file exists right after the installation of ism, or a number not within the range of 01 to 99 is specified by mistake, follow the instructions shown below: (i) Set the generation number to 01 for the next file to be processed. (ii) After backing up the information to a generation file, re-create the generation management file. File name: ism_log +.cnt I-118

127 Chapter 1 Basic Functions Example 1: File switching process when the number of generation files created is less than 99 [Before file switching process] [After file change processing] Generation management file Log file being output Generation management file Log file being output Thu May May : Thu May [ EOF ] Log file is initialized Newly created Generation files Generation files Example 2: File switching process when the number of generation files created is less than 99 [Before file switching process] [After file change processing] Generation management file Log file being output Generation management file Log file being output Thu May [ EOF ] 17 Thu May Log file is initialized Updated Generation files Generation files I-119

128 Chapter 1 Basic Functions Example 3: File switching process when no generation management file exists (including default setting) [Before file switching process] [After file change processing] Generation management file Log file being output Generation management file Log file being output Thu May [ EOF ] Thu May Log file is initialized Newly created I-120

129 Chapter 1 Basic Functions Record Formatt Operrattiion Log (1) Record format of operation log Time of Blank Process Blank Message Blank Process Blank ism Message : generation ID Type name number ch(24) ch(1) ch(10) ch(1) ch(7) ch(1) ch(10) ch(1) ch(3) ch(5) ch(1) Text ch(n) Table 1-23 Record Format (Operation Log) Size Data Type Contents Contents Details 24 char Generation time Date, time and year Data format: Time format obtained from ctime( ) 1 char Blank (space) 10 char Process ID Process number of the source from which the message is reported 1 char Blank (space) 7 char Message Type Message Type LOG_ERR Err LOG_WARNING Warning LOG_NOTICE Notice LOG_INFO Info 1 char Blank (space) 10 char Process name Process name of the source from which the message is reported 1 char Blank (space) 3 char ism 5 char Message number Message serial number 1 char : n 501 char Text Variable length: a maximum of 501 bytes of character string (terminated by \n) I-121

130 Chapter 1 Basic Functions (2) Output image to operation log (Log File) Thu May 15 17:30: Info ismlogd ism00000: This is example msg Thu May 15 17:30: Info ismlogd ism04030 : Last message repeated 2 times When the same message is reported consecutively for 3 times or more, a summarized record that shows the first message and number of times the message is reported is shown. When the same message is reported consecutively over a certain period of time (2 minutes and 30 seconds) the message reported during the period and the message reported after the period are treated as different messages. For the event link, the original message without this process is sent. Example: When the same message is received every 15 seconds during the period of 3 minutes and 15 seconds (14 times/messages in total). [Received Message] 2 30 interval [Operation Log] Thu May 15 17:00:00 This is example msg. Thu May 15 17:00:00 This is example msg. * Thu May 15 17:00:15 This is example msg. Thu May 15 17:00:30 This is example msg. Thu May 15 17:00:45 This is example msg. Thu May 15 17:00:40 Thu May 15 17:00:45 Last msg repeated 2 times This is example msg. Thu May 15 17:01:00 This is example msg. Thu May 15 17:01:15 This is example msg. Thu May 15 17:01:30 This is example msg. Thu May 15 17:01:45 This is example msg. Thu May 15 17:02:00 This is example msg. Thu May 15 17:02:15 This is example msg. Thu May 15 17:02:30 This is example msg. Thu May 15 17:02:45 This is example msg. Thu May 15 17:03:00 This is example msg. Thu May 15 17:03:15 This is example msg. Thu May 15 17:03:10 Thu May 15 17:03:15 Last msg repeated 9 times. This is example msg. * Received messages may be reported repeatedly within 2 minutes and 30 seconds for the first time since the timer is not based on the time the message is received. I-122

131 Chapter 1 Basic Functions sysllog ((HP--UX verrsiion)) (1) Record format of syslog Time of generation Blank Host name Blank ism : Process ID Blank Message Type Blank Process name ch(15) ch(1) ch(m) ch(1) ch(6) ch(10) ch(1) ch(7) ch(1) ch(10) Blank ism Message number : Text ch(1) ch(3) ch(5) ch(1) ch(n) Table 1-24 Record Format (syslog/hp-ux Version) Size Data Model Content Content Details 15 char Generating time Date and time (Example) Jun 20 11:30:17 1 char Blank (space) m 64 char Host name Variable length: a maximum of 64 characters 1 char Blank (space) 6 char ism : ismδ:δ (Δ: blank) 10 char Process ID Process number of the source from which the message is reported 1 char Blank (space) 7 char Message Type Message Type LOG_ERR Err LOG_WARNING Warning LOG_NOTICE Notice LOG_INFO Info 1 char Blank (space) 10 char Process name Process name of the source from which the message is reported 1 char Blank (space) 3 char ism 5 char Message number Message serial number 1 char : n 500 char Text Variable length: a maximum of 500 bytes of character string I-123

132 Chapter 1 Basic Functions (2) Output image to syslog (syslog) May 10 18:59:06 NX-1 ism : Info ismlogd ism00000:this is example msg May 10 18:59:06 NX-1 last message repeated 7 times Automatically assigned by syslogd Text output (This may be slightly different from the operation log date/time that is assigned by ism.) When the same message is reported repeatedly, the first message and number of times the message is reported is shown. When the same message is reported consecutively over a certain period of time the message reported during the period and the message reported after the period are treated as different messages. This process is performed by syslogd. I-124

133 Chapter 1 Basic Functions sysllog ((Sollarriis verrsiion)) (1) Record format of syslog Time of generation Blank Host name Blank ism : [ID Blank Message number ch(15) ch(1) ch(m) ch(1) ch(6) ch(3) ch(1) ch(6) ch(1) ch(x) Blank Function Classification. Level ] Process ID Blank Message Type Blank Process name Blank ism ch(1) ch(y) ch(2) ch(10) ch(1) ch(7) ch(1) ch(10) ch(1) ch(3) Message number : Text ch(5) ch(1) ch(n) Table 1-25 Record Format (syslog/solaris Version) Size Data Type Contents Contents Details 15 char Generating time Date and time Example: Jun 20 11:30:17 1 char Blank (space) m 256 char Host name Variable length: a maximum of 256 characters 1 char Blank (space) 6 char ism : ismδ:δ (Δ: blank) 3 char [ID [ID 1 char Blank (space) 6 char Message number Message number assigned by system 1 char Blank (space) x 8 char Function classification 1 char. y 7 char Level 2 char ] ]Δ (Δ: blank) 10 char Process ID Process number of the source from which the message is reported 1 char Blank (space) 7 char Message Type Message Type LOG_ERR Err LOG_WARNING Warning LOG_NOTICE Notice LOG_INFO Info 1 char Blank (space) 10 char Process name Process name of the source from which the message is reported 1 char Blank (space) 3 char ism 5 char Message number Message serial number I-125

134 Chapter 1 Basic Functions Size Data Type Contents Contents Details 1 char : n 500 char Text Variable length: a maximum of 500 bytes of character string (2) Output image to syslog (syslog) May 10 18:59:06 CX-1 ism : [ID daemon. info] Info ismlogd ism00000:this is example msg May 10 18:59:06 CX-1 last message repeated 7 times Automatically assigned by syslogd Text output (This may be slightly different from the operation log date/time that is assigned by ism.) When the same message is reported repeatedly, the first message and number of times the message is reported is shown. When the same message is reported consecutively over a certain period of time the message reported during the period and the message reported after the period are treated as different messages. This process is performed by syslogd. I-126

135 Chapter 1 Basic Functions sysllog ((Liinux verrsiion)) (1) Record format of syslog Time of generation Blank Host name Blank ism : Process ID Blank Message Type Blank Process name ch(15) ch(1) ch(m) ch(1) ch(6) ch(10) ch(1) ch(7) ch(1) ch(10) Blank ism Message number : Text ch(1) ch(3) ch(5) ch(1) ch(n) Table 1-26 Record Format (syslog/linux Version) Size Data Model Content Content Details 15 char Generating time Date and time Example: Jun 20 11:30:17 1 char Blank (space) m 64 char Host name Variable length: a maximum of 64 characters 1 char Blank (space) 6 char ism : ismδ:δ (Δ: blank) 10 char Process ID Process number of the source from which the message is reported 1 char Blank (space) 7 char Message Type Message Type LOG_ERR Err LOG_WARNING Warning LOG_NOTICE Notice LOG_INFO Info 1 char Blank (space) 10 char Process name Process name of the source from which the message is reported 1 char Blank (space) 3 char ism 5 char Message number Message serial number 1 char : n 500 char Text Variable length: a maximum of 500 bytes of character string I-127

136 Chapter 1 Basic Functions (2) Output image to syslog (syslog) May 10 18:59:06 LX-1 ism : Info ismlogd ism00000:this is example msg May 10 18:59:06 LX-1 last message repeated 7 times Automatically assigned by syslogd Text output (This may be slightly different from the operation log date/time that is assigned by ism.) When the same message is reported repeatedly, the first message and number of times the message is reported is shown. When the same message is reported consecutively over a certain period of time the message reported during the period and the message reported after the period are treated as different messages. This process is performed by syslogd. I-128

137 Chapter 1 Basic Functions 1..6 Event Liink Event link function is one of the ism functions. With this function, actions such as reporting by mail or shell starting can be executed according to the specified definitions, based on messages from ism Functtiion Overviiew ism s event link function allows for: (1) Specification of mail addresses based on the combination of message number and message level, and sending messages to specified addresses. (2) Specification of shell scripts based on the combination of message number and message level, which achieves associated processing. (3) Dynamic modification of definitions by using the ism server command for modifying the link definition information without restarting the ism server. Operation administrator Operation administrator on remote site Storage Manager Program start Remote site Failure Local site User-specific reporting process can be set. Report can be sent to anywhere. Disk array Figure 1-59 Event Link I-129

138 Chapter 1 Basic Functions Outtlliine off Liink Deffiiniittiion and Processiing When a message is generated, a certain action is started as a link operation. The action must be defined in the link definition file (/etc/ismsvr/msgdrv.conf). Additionally, the template of mail must be defined as the mail template file. For details on the link definition file and mail template file, refer to B.1 Link Definition File How tthe Functtiion Works If the definition corresponding to the message number and message level of a message that has arrived is registered in the link definition file, the defined actions are executed. For actions, starting a shell takes precedence over mail transmission. If the next message is received while an action is ongoing, the actions for the next message will be executed after the actions to be executed for the message currently being handled are completed. If the same action has been specified more than once for the same message, the action is executed just once. In shell starting, full path of the temporary file where the message body (/opt/ismsvr/etc/msgdrv/nnnn.txt) is stored is sent as the first parameter. For shell scripts or programs that are started up by them, read the temporary file if necessary and receive the message. The environment (such as environment variables) where the shell is started up is the same as the environment where the ism was started up. Note that you have to use different settings (such as environment variables) depending on whether the OS is started by the system or the user. For mail, the mail template file is sent as mail to the defined SMTP server. If the sending mails to the SMTP server does not complete within 30 seconds, the sending is interrupted due to a time-out error. Timeout, SMTP error and shell starting failure are notified via message so that they can be checked on the operation log. For mail transmission and shell starting respectively, the upper limit of the processing count per unit time (one minute) is controlled. If the upper limit is exceeded, the exceeded link processing is canceled for a maximum of one minute. Because multiple link operations cannot be performed at the same time, up to 30 messages generated during a link operation will be stored in a buffer. If more messages are generated, the excess messages will be discarded. A loop may be formed if an error event with the event link function arrives at the event link function again and, therefore, the messages output by the event link function itself will not be subject to linking. I-130

139 Chapter 1 Basic Functions Deffiiniittiion Updatte Definitions are loaded when the ism server starts up. During this process, the link definition file and mail template file are loaded and reflected to event link operations. ismsvr update -m is an ism server command for modifying the link definition information. When entered, this command is notified to event link, reloads the link definition file and mail template file and dynamically changes control. If there is a definition error, the definition is not changed and operation continues with the previous definition. I-131

140 Chapter 1 Basic Functions 1..7 ESMPRO Liink ism for Linux has a function for linking with ESMPRO as described below. ESMPRO Agent needs to be installed in advance to a server where ism operates. The ESMPRO link function is only supported by ism installed in a machine that ESMPRO Agent for Linux supports. Check the ESMPRO Agent product information for the machines supported by ESMPRO Agent for Linux. Note that ESMPRO Manager and ESMPRO Alert Manager in the explanation below are for Windows Functtiion Overviiew ism s ESMPRO link functions allows for: (1) Alert report to ESMPRO Manager (2) Invocation of the ism client function from ESMPRO Manager (3) Failure report to the maintenance engineer at a disk array failure (Note) (4) Report of an ism message on ESMPRO Manager using ESMPRO Alert Manager ALIVE report by ESMPRO link cannot be performed for disk arrays that perform ALIVE report through an optional modem or a modem that comes with the disk arrays. I-132

141 Chapter 1 Basic Functions Rellattiionshiip wiitth ESMPRO Manager When the ism server is installed, reports to ESMPRO Manager are defined automatically if ESMPRO Agent is installed in advance to the server to run. If ESMPRO Manager has been installed on the machine on which the ism client is used, the ism client can be optionally registered with the operation window menu as an operation monitoring tool. This enables ESMPRO to perform integrated monitoring including application servers and storage. (1) Alert report to ESMPRO Manager When the ism server is installed on the server machine where ESMPRO Agent has been installed, the ESMPRO report function is set to allow reporting a disk array failure or ism failure to ESMPRO Manager. Figure 1-60 Alert Report Screen I-133

142 Chapter 1 Basic Functions (2) Invocation of the ism client function from ESMPRO Manager On a machine where ESMPRO Manager has been installed, you can register the ism client to the ESMPRO operation window as an operation monitoring tool. This enables ESMPRO to perform integrated monitoring including application servers and storage. Figure 1-61 Start Menu of the Registered ism Client The ism client is registered with the ESMPRO operation window when the ism server or ism client (Web GUI) is installed, or by using ESMPRO Link Setting Utility in the ism CD medium or ism installation folder. Even if ism is not installed, the ESMPRO Link Setting Utility can be executed alone on a machine where ESMPRO Manager is installed. Follow the steps below to register the ism client with the ESMPRO operation window by executing ESMPRO Link Setting Utility independently. (Refer to steps (3) to (6) to register the ism client at ism server or ism client installation.) (i) Log in with administrator authority (Administrators group). I-134

143 Chapter 1 Basic Functions (ii) Open Explorer and select the following program in the folder in which the ism server or ism client is installed or in the CD. For Windows Vista, use the following steps to register the ism client: <When starting the ESMPRO Link Setting Utility from the installation folder> Starting the ESMPRO Link Setting Utility displays the [User Account Control] dialog. Select [Continue] to execute the ESMPRO Link Setting Utility. <When starting the ESMPRO Link Setting Utility from the CD medium> Right-click the program icon on Explorer and select [Run as Administrator]. <To start ESMPRO Link Setting Utility from the folder in which the ism server is installed (default)> [installation folder]\sbin\ismalset.exe <To start ESMPRO Link Setting Utility from the folder in which the ism client is installed (default)> [installation folder]\ismalset.exe <To start ESMPRO Link Setting Utility from the CD> CD drive: \ALSET\WINDOWS\ISMALSET.EXE (iii) The ESMPRO Link Setting Utility screen is displayed. Figure 1-62 ESMPRO Link Setting Utility Screen I-135

144 Chapter 1 Basic Functions If the ism client has already been set to the ESMPRO operation window, its information is displayed in the field displaying (not set) in Figure Click [Release] to release the ism client that has been set. (iv) Click [Set/Modify] to set the ism client to the ESMPRO operation window or change the ism client that has been set. (v) The Select ism Client screen is displayed. Figure 1-63 Select ism Client Screen (vi) The ism clients that can be set to the ESMPRO operation window are displayed in the [Select from List] pull-down list. To set an ism client in the list to the ESMPRO operation window, select the [Select from List] check box, the ism client from the pull-down list, and click [OK]. If the ism client to be set to the ESMPRO operation window cannot be found in the pull-down list, select the [Input server information] check box, enter the IP address or DNS name and the port number for the ism server to connect, and click [OK]. (vii) When the ESMPRO Link Setting Utility screen is shown again, click [Close] to terminate ESMPRO Link Setting Utility. I-136

145 Chapter 1 Basic Functions When you set the target ism client to connect by entering the information of the ism server in [Input server information], the ism client (Web GUI) is set to the operation window. I-137

146 Chapter 1 Basic Functions Diisk Array Faiillure Reportt If a failure occurs in any of the disk arrays monitored by ism, the ALIVE/express report function, one of the ESMPRO Agent functions, can be used through syslog on the server to which ism and ESMPRO Agent have been installed. The failure report function enables you to report a failure to maintenance engineer directly and get maintenance service Liink Bettween ESMPRO Manager and ESMPRO Allertt Manager You can use the ESMPRO Link Setting Utility to make notifications by working together with ESMPRO Manager and ESMPRO Alert Manager. You can make the settings to do so when you install the ism server or ism client (Win GUI), or by using ESMPRO Link Setting Utility included in the ism CD medium or ism installation folder. This utility tool can be used independently on the machine where ism is not installed but ESMPRO Manager is installed. (1) Setting at installation When the ism server or ism client is installed, the installer starts ESMPRO Link Setting Utility if ESMPRO Manager has been installed. If it has not been installed in the designated environment, ESMPRO Link Setting Utility is not started. To use ESMPRO Alert Manager to report messages being reported from ism to ESMPRO Manager, follow the steps from (iii) to (v) in (2) Setting by ESMPRO Link Setting Utility. (2) Setting by ESMPRO Link Setting Utility Follow the steps below to start and set ESMPRO Link Setting Utility independently. To set the ism client by starting the ESMPRO Link Setting Utility alone on Widows Vista, use the following steps: <When starting the ESMPRO Link Setting Utility from the installation folder> Starting the ESMPRO Link Setting Utility displays the [User Account Control] dialog. Select [Continue] to execute the ESMPRO Link Setting Utility. <When starting the ESMPRO Link Setting Utility from the CD medium> Right-click the program icon on Explorer and select [Run as Administrator]. I-138

147 Chapter 1 Basic Functions (i) Log in with administrator authority (Administrators group). (ii) Open Explorer and select the following program in the folder in which the ism server or ism client is installed or in the CD. <To start ESMPRO Link Setting Utility from the folder in which the ism server is installed (default)> [installation folder]\sbin\ismalset.exe <To start ESMPRO Link Setting Utility from the folder in which the ism client is installed (default)> [installation folder]\ismalset.exe <To start ESMPRO Link Setting Utility from the CD> CD drive: \ALSET\WINDOWS\ISMALSET.EXE (iii) When the following screen is displayed, click the [Alert Type Link] tab. Figure 1-64 ESMPRO Link Setting Utility Screen - 1 The screen to set Alert Type Link using ESMPRO Link Setting Utility is displayed. I-139

148 Chapter 1 Basic Functions Figure 1-65 ESMPRO Link Setting Utility Screen - 2 (iv) Click [Set] to set Alert Type Link. The following screen is displayed when the Alert Type Link setting is complete. Figure 1-66 ESMPRO Link Setting Utility Screen - 3 I-140

149 Chapter 1 Basic Functions The above screen is also displayed when ESMPRO Link Setting Utility is started with Alert Type Link set. (v) Click [Close] to close ESMPRO Link Setting Utility. When ESMPRO Link Setting Utility is started in the environment where ESMPRO Manager has not been installed, the following screen is displayed. In this case, start ESMPRO Link Setting Utility and make settings after ESMPRO Manager is installed. Figure 1-67 ESMPRO Link Setting Utility Execution Resurlt I-141

150 Chapter 1 Basic Functions 1..8 ALIIVEmaiill ALIV is the function that automatically notifies the maintenance engineer of a variety of information when a disk array failure is detected. ism Server Mail Server Maintenance Engineer Disk Array ALIV syslog Operation Log SAN Application Server Figure 1-68 ALIV Operation Image To use the ALIV function, you need to have a maintenance contract with the maintenance engineer. Settings for ALIV are set by the maintenance engineer so that you need not set them. I-142

151 Part II Operations

152 Chapter 2 Normal Operation Chapter 2 Normal Operation 2..1 Server Start//Stop Once the ism server is installed, it starts and stops automatically as the system starts and stops. You can also use a command to start and stop the server while the system is in operation. To cancel or resume automatic activation performed at system startup, refer to the instructions in the following sections. Table 2-1 Commands to Cancel or Resume Automatic Activation at System Startup OS To cancel automatic activation To reset automatic activation HP-UX rm /sbin/rc2.d/s982ismsvr ln -s /sbin/init.d/ismsvr /sbin/rc2.d/s982ismsvr Linux rm /etc/rc2.d/s93ismsvr rm /etc/rc3.d/s93ismsvr rm /etc/rc4.d/s93ismsvr rm /etc/rc5.d/s93ismsvr ln -s /etc/init.d/ismsvr /etc/rc2.d/s93ismsvr ln -s /etc/init.d/ismsvr /etc/rc3.d/s93ismsvr ln -s /etc/init.d/ismsvr /etc/rc4.d/s93ismsvr ln -s /etc/init.d/ismsvr /etc/rc5.d/s93ismsvr This chapter describes the commands provided by the ism server. All the commands should be entered by the super user or ism administrator. For details on the ism administrator, refer to the Installation Guide. Note that the ism administrator is used only on the HP-UX version. Notation Command syntax representation Italic Indicates a value that the user must provide. [] Indicates one or more items that can be omitted. {} Indicates a set of choices from which the user must choose one. Separates mutually exclusive choices Server Sttartt It is required to set the environment definition file (/etc/ismsvr/ismsvr.conf) to start the ism server. For details on the environment definition file, refer to the Installation Guide. Also, define the link definition file (/etc/ismsvr/msgdrv.conf) if required. An environment definition file check command that allows you to analyze the syntax of the environment definition file that has been configured is provided. When you execute this command before starting the ism server, you can see the settings of the environment definition file without starting the ism server. II-2

153 Chapter 2 Normal Operation Server Sttop If you have made any changes in the environment definition file (/etc/ismsvr/ismsvr.conf), you need to restart the ism server. Use commands to stop and start the ism server Enviironmentt Deffiiniittiion Fiille Check Command (1) Syntax ismsvr check [-p] [-f environment-definition-file-to-be-checked] (2) Description This command analyzes the syntax of the environment definition file, and checks the free space of disk in which the log file is stored. The command encrypts passwords in the environment definition file automatically by specifying the -p option. (3) Options -p Encrypts the following passwords in the environment definition file automatically. The operation of encrypting passwords is similar to the ismcipherpw command. password of user information on client section user name of FTP on file_transfer section, and user password of FTP password in the monitoring_user parameter on agent section When this option is omitted, the command analyzes the syntax of the environment definition file and checks the free space of disk in which the log file is stored. -f Specifies an environment definition file to be checked. When this option is omitted, the environment definition file (/etc/ismsvr/ismsvr.conf) which is required for ismsvr to start will be checked. When ismsvr is running, specify this option if you want to check the environment definition file which was created with a userdefined name and has been changed. (4) Warning The result of command execution will be reported as a message to the standard output or error output. For details on standard output or standard error output messages, refer to the Messages Handbook. II-3

154 Chapter 2 Normal Operation (5) Restriction A file name specified by the -f option must be up to 255 characters when it is specified by an absolute or relative path. When specifying a file name by a relative path, however, specify the file name so that its length is up to 255 characters when converting it to an absolute path. (6) Example In the following example, the syntax of the environment definition file (/etc/ismsvr/ismsvr.conf) is analyzed, the free space of the disk where the log files are stored are checked, and passwords are automatically encrypted. > ismsvr check -p Verifying syntax(/etc/ismsvr/ismsvr.conf) success Verifying disk free space(/opt/ismsvr/etc/log/) success Encrypting password success The messages are described below. * Verifying syntax(/etc/ismsvr/ismsvr.conf) success This message indicates that the syntax of the environment definition file is correct. The description in ( ) indicates the environment definition file name. * Verifying disk free space(/opt/ismsvr/etc/log/) success This message indicates that the free space of the disk in which the log file is stored is not insufficient. The description in ( ) indicates the location where the log file is stored. * Encrypting password success This message indicates that passwords have been encrypted successfully. If the syntax of the environment definition file is incorrect, this command does not check the free space of the disk and encrypt passwords. II-4

155 Chapter 2 Normal Operation Sttartt Command (1) Syntax ismsvr start [-p] (2) Description This command starts the ism server. The command encrypts the passwords in the environment definition file automatically by specifying the -p option. (3) Options -p Encrypts the following passwords in the environment definition file automatically when the ism server is started. The operation of encrypting passwords is similar to the ismcipherpw command. password of user information on client section user name of FTP on file_transfer section, and user password of FTP password in the monitoring_user parameter on agent section (4) Warning You can start only one ism server in the system including the disk array and ism servers. Multiple ism servers cannot be started. The result of command execution will be reported as a message to the standard output or error output. For details on syslog and standard error output messages, refer to the Messages Handbook. (5) Example In the following example, the ism server is started, and the passwords in the environment definition file are automatically encrypted. > ismsvr start -p II-5

156 Chapter 2 Normal Operation Sttop Command (1) Syntax ismsvr stop [-e] (2) Description This command stops the ism server. When the -e option is not specified, the delayed stop of the ism server is performed. The delayed stop is performed when the ism client is used by a level 3 user or a function to configure settings is used. Refer to the Configuration Setting Tool User s Manual for the configuration setting functions. (3) Options -e Performs emergency stop of the ism server. The ism server is stopped when this option is specified even if the ism is used by a level 3 user or the function to configure settings is used. (4) Warning This command is not accepted until the ism server becomes operable. The result of command execution will be reported as a message to the standard output or error output. For details on syslog and standard error output messages, refer to the Messages Handbook. (5) Example In the following example, the command delays the stop of the ism server. > ismsvr stop II-6

157 Chapter 2 Normal Operation Liink Deffiiniittiion IInfformattiion Modiiffiicattiion Command (1) Syntax ismsvr update -m (2) Description This command changes the link definition information while the ism server is operating. (3) Warning This command is not accepted until the ism server becomes operable. This command is not accepted after the stop command is input. The result of command execution will be reported as a message to the standard output or error output. For details on standard output and standard error output messages, refer to the Messages Handbook. (4) Example In the following example, the link definition file that has been changed during the ism server operation is updated. > ismsvr update -m ism06080:definition change is successful II-7

158 Chapter 2 Normal Operation Diisk Array Sttattus Moniittoriing On//Offff Command (1) Syntax ismsvr update {-r disk-array-name -s disk-array-name} (2) Description This command stops or restarts the monitoring of the disk array that is specified by disk_array_name. Before using a command for the function to configure the settings, disk array monitoring must be stopped by using this command. For details on the configuration setting functions, refer to Configuration Setting Tool User s Manual. (3) Options -s It stops disk array monitoring. -r It restarts disk array monitoring. (4) Warning This command is not accepted until the ism server becomes operable. This command is not accepted after the stop command is input. The result of command execution will be reported as a message to the standard output or error output. This message to the standard output indicates that the command has been accepted. Use syslog or ism operation log to see whether monitoring has been stopped/restarted. For details on syslog, ism operation log, standard output and standard error output messages, refer to the Messages Handbook. (5) Example In the following example, monitoring of the disk array (S4000/10) is stopped. > ismsvr update -s S4000/10 ism01410:this request is accepted II-8

159 Chapter 2 Normal Operation Perfformance Moniittoriing Diispllay Reffresh Ratte Modiiffiicattiion Command (1) Syntax ismsvr prf_update -t refresh-rate (2) Description This command changes the refresh rate of the performance monitoring display. (3) Options -t It changes the refresh rate of the displaying. 1 to 6 (times/min.) (4) Warning This command is not accepted until the ism server becomes operable. This command is not accepted after the stop command is input. The result of command execution will be reported as a message to the standard output or error output. For details on the standard output and standard error output messages, refer to the Messages Handbook. (5) Example In the following example, the refresh rate of the performance monitoring display is changed to 5 times per minute. > ismsvr prf_update -t 5 ism08180:accept new display refresh rate (5 times/minute old=1) II-9

160 Chapter 2 Normal Operation 2..2 Clliient Start//Stop Sttarttiing tthe iism Clliientt ((Web GUII)) This section describes how to use the ism client (Web GUI), log in to an ism server, and use various functions. If you want to monitor a D series or E series disk array, be sure to use this procedure to start the client. JRE (Java Runtime Environment) needs to be installed when you use the ism client (Web GUI). JRE is stored in the ism CD. Refer to the Installation Guide for details on the installation method. For information on the extent of JRE that the ism client supports, refer to the Installation Guide. (1) Starting the client Log in with administrator authority (Administrators group), and enter the IP address (host name) of the server where the ism server to be connected is operating and Web browser connection port number in the URL of the Web browser to start the client. Example: When the ism server is connected successfully, the login screen appears. 1. Only users with Administrator authority can operate the ism client (Web GUI). The ism client (Web GUI) may start the installer, so start the Web browser as Administrator. 2. When using the ism client (Web GUI), set the URL of the ism server to be connected to Trusted sites of the Web browser. In addition, set [ActiveX controls and plug-ins] - [Run ActiveX controls and plug-ins] to [Enable] in the security settings of the Trusted sites. For details on the procedures of the settings, refer to the Installation Guide. 3. A security warning message may be displayed when an attempt to connect to the ism server is made. When you see the message, confirm that the issuer is NEC Corporation and click the [Execute] button. 4. The message describing that functions of Internet Explorer (or the program name of the Web browser you are using) are blocked may be displayed on the Windows Security Alert dialog when connecting to the ism server. When you see the message, unblock the Internet Explorer functions on the screen where you see the message, or configure the firewall to unblock the Internet Explorer (or the Web browser you are using) functions in advance. 5. Connecting to the ism server may fail if your web browser is configured to use a proxy server. If this occurs, configure exception for your browser so that proxy server is not used to connect to the ism server. II-10

161 Chapter 2 Normal Operation However, it is unnecessary to change proxy server settings when you use the ism client (Web GUI) and ism server on the same machine. Change the proxy server settings by following the steps below. 1) Select [Control Panel] [Internet Options] [Connections] tab. Then, click the [LAN Settings] button to open the Local Area Network (LAN) Settings dialog. 2) If [Use a proxy server for your LAN] is checked, click the [Advanced] button to open the Proxy Settings dialog; if the check box is not selected, the following steps are not necessary. 3) Add both the host name and IP address for the server to connect in [Do not use proxy server for addresses beginning with:]. 4) Check the JRE proxy settings according to the steps below. JRE Select [Control Panel] [Java Plug-in] [Proxies]. Then confirm whether [Use Browser Settings] is checked. If not checked, add both the host name and IP address for the server to connect in [No Proxy Host]. JRE 6 and 5.0 Select [Control Panel] [Java] [Network Settings]. Then confirm whether [Use browser settings] is checked. If not checked, select [Advanced] and add both the host name and IP address for the server to connect in [Exceptions]. 5) Close all the Web browsers in use and restart a Web browser. 6. If an attempt to start the ism client (Web GUI) fails and message [ ] is displayed, possible causes are as follows. Check the relevant machine environment. The protected mode is enabled. When Internet Explorer 7 is used as the Web browser, if the protected mode is enabled, startup fails. Disable the protected mode according to the steps below: 1) Select [Control Panel] [Internet Options] [Security] tab. 2) Uncheck [Enable Protected Mode] for the zone in which the URL of the ism server to be connected is set ([Trusted sites]). 3) Close all Web browser windows in use and restart the ism client (Web GUI). The JRE security policy has been modified. When another product is installed, the JRE security policy may be modified, which affects the startup of the ism client (Web GUI). The JRE security policy is defined in the following file: <JRE-installation-folder>\lib\security\java.security If this case is applicable, modify the security policy according to the steps below. This modification does not affect operation of products other than the ism client (Web GUI). 1) Copy the ismclient.policy file stored in the ism CD into the following folder on the relevant machine: II-11

162 Chapter 2 Normal Operation <JRE-installation-folder>\lib\security\nec * The nec folder does not exist in the initial status. Create the folder. The ismclient.policy file is stored in the following folder in the CD: \CLIENT\WINDOWS\iSMClient.policy 2) Rewrite line 1 in the copy of the ismclient.policy file with the IP address (host name) and port number of the ism server to be connected. 3) Add the line marked with * shown below to the java.security file in the following folder: <JRE-installation-folder>\lib\security\java.security policy.url.1=file... policy.url.2=file... policy.url.<no>=file:${java.home}/lib/security/nec/ismclient.policy * * For <no>, specify the next number of the number assigned to policy.url written last. (2) Logging in Figure 2-1 shows the login screen displayed when the ism server is connected successfully. Figure 2-1 Login Screen (i) (ii) User name Enter the user name registered in the setting on the ism server side. Password Enter the password registered in the setting on the ism server side. The user name and password can be saved individually. However, once a user name and a password are saved, any person can log in to the system using the registered user name and password. The user name and password must be handled carefully. When you click [Options], as shown in Figure 2-2, a number of additional options that help you change the settings of behavior after login appear. II-12

163 Chapter 2 Normal Operation Figure 2-2 Login Screen (Options Displayed) (iii) Save Messages to a Log File Select this box to save messages shown on the client status monitoring screen as text files on the PC. (iv) Display Maintenance Status Use this option to switch the status of the upper structure to (Notice) when an event other than normal events occurs in an individual element layer. Normally, events ( (Warning) or (Err)) in the individual element layer are ignored in the upper structure because they do not affect operation. Select this box if you want to see the detailed information. When an event (e.g. LD failure) which affects operation occurs in the individual element layer, the upper structure fails (Err) regardless of this setting. (v) Logical Disk View Order Use [Logical Disk View Order] to set the order in which logical disks are initially displayed. Select either [Number] or [Name (OS Type + Logical Disk Name)]. This setting changes the order in which columns are displayed in the logical disk list. If you click the [OK] button, the current disk array configuration is displayed on the configuration information display screen and messages are displayed sequentially on the failure monitoring screen. If the ism client (Win GUI) is not installed on the PC or the ism client (Win GUI) of an earlier version is installed, the screen for downloading the ism client (Win GUI) installer file appears. To operate the ism client (Web GUI), the ism client (Win GUI) must be installed. Click the [Execute] button to start the installer directly or the [Save] button to download the installer on the PC and execute it after the completion of the downloading. ([User Account Control] dialog is displayed for Windows Vista. Select [Continue] and execute the installer.) Refer to the Installation Guide for details. If there are disk arrays for which the BaseProduct license is not unlocked yet, the screen appears listing those disk arrays (Figure 2-3). II-13

164 Chapter 2 Normal Operation Figure 2-3 BaseProduct License Unlocked Disk Array Subsystem List When you newly install the ism client (Win GUI) after downloading the installer from the ism client (Web GUI), a shortcut for starting the ism client is not created in the Start menu and on the Desktop. When you overwrite the ism client (Win GUI) or if the ism client (Web GUI) was once installed before on the same PC, the shortcut for starting the ism client is created in the Start menu and on the Desktop. However, since it is unnecessary for using the ism client (Web GUI), delete it as necessary. (3) User level Users of the ism client are defined by the ism server. Depending on extent of permitted operations, the users are categorized as shown below. Table 2-2 User Level List Level 1 Authorized for disk array monitoring, state display, etc. For standard users Level 2 Authorized for operations on replication/snapshot/performance For operators monitoring/performance optimization function. Level 3 Authorized for all operations. For system administrators When the connection to ism server is established, the user level is displayed on the ism client (Web GUI) status line. The user can use functions permitted to the user level. For information on difference of permitted functions determined by levels, see the descriptions of functions. II-14

165 Chapter 2 Normal Operation Sttarttiing tthe iism Clliientt ((Wiin GUII)) This section describes how to directly start the ism client, log in to an ism server, and use various functions. When this procedure is used to start the ism client, D series disk arrays are displayed but no operations can be done for them. (1) Starting the client Log in with administrator authority (Administrators group), select the [Start] menu [All Programs] ([Programs] for Windows 2000) [Storage Manager Client] [Storage Manager Client] to start the ism client and show the main window. If multiple connecting destinations are defined, a menu appears with a nickname added to each connection like [Storage Manager Client <connection-name>]. See the nicknames to check the connecting destinations, and then start the ism client. Alternatively, the client can be started by double-clicking the shortcut icon on the desktop. For Windows Vista, the [User Account Control] dialog appears when you start the ism client. Click the [Continue] button and start the ism client. When the client is started, proceed to (3) Connection. When the client is started for the first time since installation or a connecting destination is added, proceed to (2) Environment settings before proceeding to (3). (2) Configuring the environment settings Select [File] and [Environment Settings] to show the following dialog box when the installer was used for installation or if you want to add a connecting destination. Figure 2-4 Connection Setting List Screen Select the connecting destination for which you configure the settings and click the [Edit] button, and the Environment Setting screen, shown below, appears. To add a connection, click the [Add] button. To delete the settings of a connecting destination, select the connection and click the [Delete] button. II-15

166 Chapter 2 Normal Operation Figure 2-5 Environment Setting Screen (i) Connect Name Enter the nickname for identifying a connection. (This information must be entered, if you specify multiple connections.) The specified connection name is displayed in the title bar of each client screen. When you have started multiple clients, you can use this name to determine the server for which information is shown. Figure 2-6 Example of Display of Connection Name in Title Bar II-16

167 Chapter 2 Normal Operation For a connection name, you cannot use a blank and those characters that cannot be used for a file name (\/:,;*? <> ). If you enter a name containing an unusable character and click the [OK] button, an error message is displayed; enter a connection name again. (ii) IP Address or DNS Name of Server Specify the IP address or DNS name of the ism server (this information must be entered). (iii) Port Number of Server In general, the port number does not need to be changed. Specify a port number only when the port is assigned particularly in the ism server setting. (iv) Client Name Specify the name to identify the client (this information must be entered). You can specify any name in alphanumeric characters as long as it is unique. (v) Port Number of Client The port number that is used to transfer data between client screens is displayed here. Generally a default port number is used. If the number is used by another program already, it must be changed. If multiple connections are defined, the client allocates default values from 8021 sequentially. Follow the steps below to edit the ismmain.ini file referenced by clients and to change a port number. ismmain.ini is stored in the folder displayed in [Folder Name] of [Connection Setting List]. If [Folder Name] displays the default connection, the file is stored in the installation folder. [CLIENT] PORT=8021 Change this value into a port number that is not currently used. 1. Numbers allowed for a port number are 1 to Specifying a disallowed number results in displaying an error dialog and termination. You can click the [Browse] button only if [SHELL] is selected in Action Type. 2. If the system has been activated, the specified value becomes effective after restart of the system. 3. ismmain.ini file contains various setting data. Do not edit other data than a client port number. If you edit other data, you may not be able to operate the system. (vi) Get Messages Select this box to save messages shown on the client status monitoring screen as text files on the PC. II-17

168 Chapter 2 Normal Operation (vii) Maintenance Status Use this option to switch the status of the upper structure to (Notice) when an event other than normal events occurs in an individual element layer. Normally, events ( (Warning) or (Err)) in the individual element layer are ignored in the upper structure because they do not affect operation. This option is selected when you want to check them in detail. When an event (e.g. LD failure) which affects operation occurs in the individual element layer, the upper structure fails (Err) regardless of this setting. The setting information is saved when you click [OK] after the setting ends. (viii) Logical Disk View Order [Logical Disk View Order] sets the order in which logical disks are initially displayed on each screen. Select [Number] or [Name (OS Type + Logical Disk Name)]. This setting changes the order in which columns are displayed in the logical disk list. The setting becomes effective after the client is restarted. Click OK to save the settings. If a connection is added, a shortcut icon for the ism client is created on the desktop and in the [Start] menu. (3) Connecting to the ism server When you select File and Connect after configuring the environment settings, an attempt to connect to the ism server is made. Figure 2-7 Connection Screen (i) User name Enter the user name and password registered with the ism server side. (ii) Password Enter the user name and password which are registered at the setting of the ism server side. User name/password can be saved individually. However, once a user name and a password are saved, any person can log in to the system using the registered user name and password. II-18

169 Chapter 2 Normal Operation If you click the [OK] button, the current disk array configuration is displayed on the configuration information display screen and messages are displayed sequentially on the failure monitoring screen. If there are disk arrays for which the BaseProduct license is not unlocked yet, the screen appears listing the disk arrays. (Figure 2-8) Figure 2-8 BaseProduct License Unlocked Disk Array Subsystem List Screen (4) User Level Users of the ism client are defined by the ism server. Depending on extent of permitted operations, the users are categorized as shown below. Table 2-3 User Level List Level 1 Authorized for disk array monitoring, state display, etc. For standard users Level 2 Authorized for operations on replication/snapshot/performance For operators monitoring/performance optimization function. Level 3 Authorized for all operations. For system administrators When connection is established, the user level is displayed on the ism client status line. The user can use functions permitted to the user level. For information on difference of permitted functions determined by levels, see the descriptions of functions. II-19

170 Chapter 2 Normal Operation (5) Icons on the Desktop and the [Start] Menu If you have deleted an icon for starting client from the desktop or the Start menu, or reinstall an ism client that has once been uninstalled, you can create the icon by following the procedure described below. <<Re-creating an icon on the desktop>> (i) Click [Start] [All Programs] ([Programs] for Windows 2000) [Storage Manager Client], and right-click the menu item for creating an icon on the desktop. (ii) From the menu shown by performing the previous step, select [Copy]. (iii) On Explorer, display the \Documents and Settings\All Users\Desktop folder on the system drive ( \Users\Public\Public Desktop folder (which is a hidden folder) on the system drive for Windows Vista). (iv) Right-click on the displayed folder, and select [Paste]. <<Re-creating an icon on the desktop and in the [Start] menu>> (i) On Explorer, display ismcl.exe located in the client s installation folder. (ii) Right-click the ismcl.exe icon and select [Create Shortcut]. (On Windows Vista, the shortcut is automatically created on the desktop.) (iii) Right-click the ismcl.exe icon and select [Properties], and the property screen is displayed. (iv) Select the [Shortcut] tab from the properties screen. (v) Following the double quotation of the ismcl.exe file name for [Target], add a blank and the name of the desired folder containing connection information. Example: C:\Program Files\NEC\iSMClient\iSMCL.exe SG1 Folder containing information on connecting destinations is located in the installation folder. View the ismmain.ini (connection IP) or ismstat.ini (connection name) found in each folder, and determine the name of the folder you want to specify. (vi) Select the [General] tab. (vii) In the input field located to the right of the icon, enter the name of the shortcut. Example: Storage Manager Client <connection name> (viii) Click the [OK] button to close the properties screen. (ix) To create an icon on the desktop, copy or move the icon created with the above steps to the \Documents and Settings\All Users\Desktop folder on the system drive ( \Users\Public\Public Desktop folder (which is a hidden folder) on the system drive for Windows Vista). (x) To create a menu item, copy or move the icon created with steps up to (viii) to \Documents and Settings\All Users\Start Menu\Programs\Storage Manager Client (default value) ( \ProgramData\Microsoft\Windows\Start Menu\Programs\iSM Client (default) (which is a hidden folder) on the system drive for Windows Vista). II-20

171 Chapter 2 Normal Operation Note the following when re-creating an icon: 1. Uninstalling an ism client deletes the icon on the desktop and the menu item. If you re-install a client after uninstalling it, copy the icon to an appropriate folder on the desktop before uninstalling it. After re-installing it, you can restore the icon before uninstallation by copying the saved icon to the \Documents and Settings\All Users\Desktop folder on the system drive (for the [Start] menu, the \Documents and Settings\All Users\Start Menu\Programs\Storage Manager Client (default value) folder on the system drive). * Re-install the ism client in the same folder where it existed before uninstallation, so that the icon reference will not become invalid. * For Windows Vista, you must specify different copy destination folders. Refer to steps (ix) and (x) in <<Re-creating an icon on the desktop and in the [Start] menu>>. 2. If you delete both an icon on the desktop and a menu item, the procedure for re-creating the icon will be cumbersome. For this reason, leave the menu item undeleted. 3. The name of the icon to be created on the desktop must be in the format of Storage Manager Client <connection name>. If you create the icon name in another format, the icon on the desktop will not be deleted during uninstallation. 4. The term icon, as used throughout the above explanation refers to shortcut icon. II-21

172 Chapter 2 Normal Operation Sttarttiing Functtiions The ism client has functions for configuration monitoring, failure monitoring, performance monitoring, performance optimization, replication operation, configuration setting, snapshot management, and data protection. In the screen that opens first (Figure 2-9 or 2-10), the configuration display area (upper left corner (i)) and the information list display area (upper right corner (ii)) are responsible for configuration monitoring. The message display area (lower area (iii)) is responsible for failure monitoring. The configuration setting, performance monitoring, performance optimization, replication, snapshot, and data retention are displayed on a separate screen by clicking buttons (iv), (v), (vi), (vii), (viii), or (ix) on this screen or selecting [File] [Configuration Settings], [Performance], [Optimizer], [Replication], [Snapshot], [Protection], [Initialization Wizard], or [User Setting] from the menu. (iv) (v) (vi) (vii)(viii) (ix) Configuration Display and State Monitoring (i) Configuration Display Area (ii) Information List Display Area Failure Monitoring (iii) Message Display Area Figure 2-9 ism Client Main Window (ism Client (Web GUI)) II-22

173 Chapter 2 Normal Operation (iv) (v) (vi) (vii) (viii) (ix) Configuration Display and State Monitoring (i) Configuration Display Area (ii) Information List Display Area Failure Monitoring (iii) Message Display Area Figure 2-10 ism Client Main Window (ism Client (Win GUI)) 1. If you define a connection for each ism server to be connected based on environment settings, you can start multiple ism clients. You can also display multiple configuration setting screens; however, only a single configuration setting screen can be displayed in the set mode, while other configuration setting screens can be displayed in browse mode only. Other function screens do not differ in functions even if multiple clients are started. 2. Be sure to use the ism client (Web GUI) when you use a D series disk array. No function can be operated on a D series disk array if you use the ism client (Win GUI). II-23

Cache Partitioning User s Manual

Cache Partitioning User s Manual NEC Storage Software Cache Partitioning User s Manual IS038-10E NEC Corporation 2004-2010 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC Corporation.

More information

NEC Storage Software. Manual Guide IS901-42E

NEC Storage Software. Manual Guide IS901-42E NEC Storage Software Manual Guide IS901-42E NEC Corporation 2003-2017 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC Corporation. The contents

More information

NEC Storage Software. Manual Guide IS901-21E

NEC Storage Software. Manual Guide IS901-21E NEC Storage Software Manual Guide IS901-21E NEC Corporation 2003-2010 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC Corporation. The contents

More information

Configuration Setting Tool User s Manual (GUI) for the M Series

Configuration Setting Tool User s Manual (GUI) for the M Series NEC Storage Software Configuration Setting Tool User s Manual (GUI) for the M Series IS051-19E NEC Corporation 2011-2017 No part of the contents of this book may be reproduced or transmitted in any form

More information

Thin Provisioning User s Manual

Thin Provisioning User s Manual NEC Storage Software Thin Provisioning User s Manual IS044-16E NEC Corporation 2009-2017 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC Corporation.

More information

Thin Provisioning User s Manual

Thin Provisioning User s Manual NEC Storage Software Thin Provisioning User s Manual IS044-2E NEC Corporation 2009-2010 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC Corporation.

More information

NEC Storage Manager Manual Guide

NEC Storage Manager Manual Guide NEC Storage Manager Manual Guide NEC Corporation 2001-2003 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC Corporation. The contents of this

More information

Partitioning User s Manual

Partitioning User s Manual NEC Storage Software Partitioning User s Manual IS043-4E NEC Corporation 2007-2010 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC Corporation.

More information

Performance Monitoring User s Manual

Performance Monitoring User s Manual NEC Storage Software Performance Monitoring User s Manual IS025-32E NEC Corporation 2003-2017 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC

More information

Power Saving User s Manual

Power Saving User s Manual NEC Storage Software Power Saving User s Manual IS042-6E NEC Corporation 2007-2010 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC Corporation.

More information

Data Replication User s Manual (Installation and Operation Guide for Windows)

Data Replication User s Manual (Installation and Operation Guide for Windows) NEC Storage Software Data Replication User s Manual (Installation and Operation Guide for Windows) IS016-22E NEC Corporation 2003-2013 No part of the contents of this book may be reproduced or transmitted

More information

NEC Storage Manager Installation Guide

NEC Storage Manager Installation Guide NEC Storage Manager Installation Guide 856-128502-002-A Preface NEC Storage Manager English Version VERSION: 6.2 This CD includes the setup programs and the PDF manuals of NEC Storage Manager. For further

More information

ISRXM64LE93-1. NEC Storage ReplicationControl FileSystem Option on Linux Ver9.3 Installation Guide

ISRXM64LE93-1. NEC Storage ReplicationControl FileSystem Option on Linux Ver9.3 Installation Guide NEC Storage ReplicationControl FileSystem Option on Linux Ver9.3 Installation Guide Preface This document describes the installation of the program products in the CD labeled as: NEC Storage ReplicationControl

More information

Data Replication User s Manual (Disaster Recovery System Installation and Operation Guide)

Data Replication User s Manual (Disaster Recovery System Installation and Operation Guide) NEC Storage Software Data Replication User s Manual (Disaster Recovery System Installation and Operation Guide) IS027-34E NEC Corporation 2004-2017 No part of the contents of this book may be reproduced

More information

ReplicationControl FileSystem Option User s Manual (Linux)

ReplicationControl FileSystem Option User s Manual (Linux) NEC Storage Software ReplicationControl FileSystem Option User s Manual (Linux) IS028-15E NEC Corporation 2005-2015 No part of the contents of this book may be reproduced or transmitted in any form without

More information

ReplicationControl SQL Option User s Manual

ReplicationControl SQL Option User s Manual NEC Storage Software ReplicationControl SQL Option User s Manual IS006-17E NEC Corporation 2002-2016 No part of the contents of this book may be reproduced or transmitted in any form without permission

More information

ControlCommand Command Reference

ControlCommand Command Reference NEC Storage Software ControlCommand Command Reference IS041-9E NEC Corporation 2005-2010 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC Corporation.

More information

ControlCommand Command Reference

ControlCommand Command Reference NEC Storage Software ControlCommand Command Reference IS041-25E NEC Corporation 2005-2017 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC Corporation.

More information

M-Series Storage Family Comparison

M-Series Storage Family Comparison M-Series Storage Family Comparison Agenda M100/M300 comparison M500/M700 comparison M-Series performance comparison Page 2 M100/M300 Comparison M100/M300 Specification M100 M300 FC 8Gbx4 or 8Gb x 8 8Gb

More information

Virtual Volume User s Manual

Virtual Volume User s Manual NEC Storage Software Virtual Volume User s Manual IS069-5E NEC Corporation 2015-2017 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC Corporation.

More information

Virtual Volume User s Manual

Virtual Volume User s Manual NEC Storage Software Virtual Volume User s Manual IS069-7E NEC Corporation 2015-2018 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC Corporation.

More information

SystemGlobe GlobalMaster Operation Manual

SystemGlobe GlobalMaster Operation Manual SystemGlobe GlobalMaster Operation Manual NEC Corporation We greatly thank you for your patronage of our products. This manual explains how to operate SystemGlobe GlobalMaster. Preface This manual explains

More information

System Monitor - Performance Monitoring Services 5.8 User's Guide

System Monitor - Performance Monitoring Services 5.8 User's Guide System Monitor - Performance Monitoring Services 5.8 User's Guide - First Edition - Copyright (C) NEC Corporation 2004-2017. Disclaimer of Warranty All the information, text, graphics, links or other items

More information

NEC ESMPRO AlertManager User's Guide

NEC ESMPRO AlertManager User's Guide NEC ESMPRO AlertManager User's Guide Chapter 1 General Description Chapter 2 Installation Chapter 3 Setting Chapter 4 Appendix AM_E-UG-W-001-01-004 NEC Corporation 2014 Contents Contents... 2 Notations

More information

NEC Express5800 Series. StorView Ver. 3. Operation Guide. for N F B

NEC Express5800 Series. StorView Ver. 3. Operation Guide. for N F B NEC Express5800 Series StorView Ver. 3 Operation Guide for N8190-121F Trademarks NEC ESMPRO is the registered trademark of NEC Corporation. Microsoft, Windows are registered trademarks or trademarks of

More information

NEC Disk Array Unit D1-10/D3-10. Configuration Guide. Revision August, 2008

NEC Disk Array Unit D1-10/D3-10. Configuration Guide. Revision August, 2008 NEC Disk Array Unit D1-10/D3-10 Configuration Guide Revision 3.1 4 August, 2008 Information of disclosure and limitation of usage NEC Corporation has all the rights about this material. You can not use

More information

Solaris OE. Softek AdvancedCopy Manager User's Guide 10.2

Solaris OE. Softek AdvancedCopy Manager User's Guide 10.2 Solaris OE Softek AdvancedCopy Manager User's Guide 10.2 Preface ++ Purpose This manual explains how to operate Web-GUI with Softek AdvancedCopy Manager. ++ Reader This manual is intended for system managers

More information

ExpressCluster X SingleServerSafe 3.2 for Windows. Operation Guide. 2/19/2014 1st Edition

ExpressCluster X SingleServerSafe 3.2 for Windows. Operation Guide. 2/19/2014 1st Edition ExpressCluster X SingleServerSafe 3.2 for Windows Operation Guide 2/19/2014 1st Edition Revision History Edition Revised Date Description First 2/19/2014 New manual Copyright NEC Corporation 2014. All

More information

EXPRESSCLUSTER X SingleServerSafe 3.3 for Windows. Operation Guide. 10/03/2016 4th Edition

EXPRESSCLUSTER X SingleServerSafe 3.3 for Windows. Operation Guide. 10/03/2016 4th Edition EXPRESSCLUSTER X SingleServerSafe 3.3 for Windows Operation Guide 10/03/2016 4th Edition Revision History Edition Revised Date Description 1st 02/09/2015 New manual 2nd 04/20/2015 Corresponds to the internal

More information

ETERNUS SF AdvancedCopy Manager Operator's Guide for Tape Server Option

ETERNUS SF AdvancedCopy Manager Operator's Guide for Tape Server Option ETERNUS SF AdvancedCopy Manager 14.0 Operator's Guide for Tape Server Option J2X1-7453-01ENZ0(00) July 2009 Preface Purpose This manual describes the functionality of ETERNUS SF AdvancedCopy Manager for

More information

ExpressCluster X Integrated WebManager

ExpressCluster X Integrated WebManager ExpressCluster X Integrated WebManager Administrator s Guide 09/30/2009 Second Edition Revision History Edition Revised Date Description First 06/15/2009 New manual Second 09/30/2009 This manual has been

More information

NEC ESMPRO AlertManager User's Guide (Windows)

NEC ESMPRO AlertManager User's Guide (Windows) NEC ESMPRO AlertManager User's Guide (Windows) Chapter 1 General Description Chapter 2 Installation Chapter 3 Setting Chapter 4 Appendix 10.111.01-129.01 NEC Corporation 2016 Contents Contents... 2 Conventions

More information

ETERNUS SF Express V15.3/ Storage Cruiser V15.3/ AdvancedCopy Manager V15.3. Migration Guide

ETERNUS SF Express V15.3/ Storage Cruiser V15.3/ AdvancedCopy Manager V15.3. Migration Guide ETERNUS SF Express V15.3/ Storage Cruiser V15.3/ AdvancedCopy Manager V15.3 Migration Guide B1FW-5958-06ENZ0(00) June 2013 Preface Purpose This manual describes how to upgrade to this version from the

More information

PROMISE ARRAY MANAGEMENT ( PAM) FOR FastTrak S150 TX2plus, S150 TX4 and TX4000. User Manual. Version 1.3

PROMISE ARRAY MANAGEMENT ( PAM) FOR FastTrak S150 TX2plus, S150 TX4 and TX4000. User Manual. Version 1.3 PROMISE ARRAY MANAGEMENT ( PAM) FOR FastTrak S150 TX2plus, S150 TX4 and TX4000 User Manual Version 1.3 Promise Array Management Copyright 2003 Promise Technology, Inc. All Rights Reserved. Copyright by

More information

EXPRESSCLUSTER X Integrated WebManager

EXPRESSCLUSTER X Integrated WebManager EXPRESSCLUSTER X Integrated WebManager Administrator s Guide 10/02/2017 12th Edition Revision History Edition Revised Date Description 1st 06/15/2009 New manual 2nd 09/30/2009 This manual has been updated

More information

ETERNUS SF AdvancedCopy Manager V13.2 Operator's Guide (Linux)

ETERNUS SF AdvancedCopy Manager V13.2 Operator's Guide (Linux) J2UZ-8170-03ENZ0(A) ETERNUS SF AdvancedCopy Manager V13.2 Operator's Guide (Linux) ii Preface ++ Purpose This manual describes the operations available on ETERNUS SF AdvancedCopy Manager. ++ Intended Readers

More information

ExpressCluster X SingleServerSafe 3.2 for Windows. Configuration Guide. 2/19/2014 1st Edition

ExpressCluster X SingleServerSafe 3.2 for Windows. Configuration Guide. 2/19/2014 1st Edition ExpressCluster X SingleServerSafe 3.2 for Windows Configuration Guide 2/19/2014 1st Edition Revision History Edition Revised Date Description First 2/19/2014 New manual Copyright NEC Corporation 2014.

More information

User's Guide (Website Management Functions Edition)

User's Guide (Website Management Functions Edition) Systemwalker Service Quality Coordinator User's Guide (Website Management Functions Edition) Windows/Solaris/Linux J2X1-6860-03ENZ0(00) May 2011 Preface Purpose of this manual This manual explains how

More information

Machine Administration Guide 2.3

Machine Administration Guide 2.3 Machine Administration Guide 2.3 Preface Purpose This manual is intended for systems where the Solaris(TM) Operating Environment is installed, and explains the Machine Administration functions required

More information

PROMISE ARRAY MANAGEMENT ( PAM) USER MANUAL

PROMISE ARRAY MANAGEMENT ( PAM) USER MANUAL PROMISE ARRAY MANAGEMENT ( PAM) USER MANUAL Copyright 2002, Promise Technology, Inc. Copyright by Promise Technology, Inc. (Promise Technology). No part of this manual may be reproduced or transmitted

More information

ISRX119E22-1. NEC Storage Replication Navigator ControlCommand for Oracle Ver2.2 Installation Guide

ISRX119E22-1. NEC Storage Replication Navigator ControlCommand for Oracle Ver2.2 Installation Guide NEC Storage Replication Navigator ControlCommand for Oracle Ver2.2 Installation Guide Preface Thank you for purchasing NEC Storage Replication Navigator ControlCommand for Oracle. This installation guide

More information

Areas Covered. Chapter 1 Features (Product Overview/Note) Chapter 2 Installation Flow and Note. Chapter 3 Installing Global Array Manager (GAM)

Areas Covered. Chapter 1 Features (Product Overview/Note) Chapter 2 Installation Flow and Note. Chapter 3 Installing Global Array Manager (GAM) PRIMERGY RX200 S2 Onboard SCSI RAID User s Guide Areas Covered Chapter 1 Features (Product Overview/Note) This chapter explains the overview of the disk array and features of this product. Chapter 2 Installation

More information

ExpressCluster X 3.2 WebManager Mobile

ExpressCluster X 3.2 WebManager Mobile ExpressCluster X 3.2 WebManager Mobile Administrator s Guide 2/19/2014 1st Edition Revision History Edition Revised Date Description 1st 2/19/2014 New manual Copyright NEC Corporation 2014. All rights

More information

ETERNUS SF Express V15.0. Operation Guide. Windows/Linux

ETERNUS SF Express V15.0. Operation Guide. Windows/Linux ETERNUS SF Express V15.0 Operation Guide Windows/Linux B1FW-5962-01ENZ0(02) March 2012 Preface Purpose This manual gives an overview of ETERNUS SF Express. ETERNUS SF Express is part of the following Storage

More information

NEC Express5800 Series MegaMonitor for Linux Installation and Operation Manual

NEC Express5800 Series MegaMonitor for Linux Installation and Operation Manual NEC Express5800 Series MegaMonitor for Linux Installation and Operation Manual 3rd Edition 9-2005 808-882425-798-C Preface The manual explains MegaMonitor for Linux, a RAID system monitoring utility for

More information

dba/m Database Manager V7.1 User s Guide

dba/m Database Manager V7.1 User s Guide dba/m Database Manager V7.1 User s Guide Release 7.1. May, 2005 Copyright Information Copyright 1996-2005 by Genus Software, Incorporated. All rights reserved. Trademark Acknowledgments NonStop dba/m Database

More information

ETERNUS SF Express V15.1/ Storage Cruiser V15.1/ AdvancedCopy Manager V15.1. Migration Guide

ETERNUS SF Express V15.1/ Storage Cruiser V15.1/ AdvancedCopy Manager V15.1. Migration Guide ETERNUS SF Express V15.1/ Storage Cruiser V15.1/ AdvancedCopy Manager V15.1 Migration Guide B1FW-5958-03ENZ0(00) August 2012 Preface Purpose This manual describes how to upgrade to this version from the

More information

Introduction to NetApp E-Series E2700 with SANtricity 11.10

Introduction to NetApp E-Series E2700 with SANtricity 11.10 d Technical Report Introduction to NetApp E-Series E2700 with SANtricity 11.10 Todd Edwards, NetApp March 2014 TR-4275 1 Introduction to NetApp E-Series E2700 with SANtricity 11.10 TABLE OF CONTENTS 1

More information

ExpressCluster X 2.0 for Linux

ExpressCluster X 2.0 for Linux ExpressCluster X 2.0 for Linux Installation and Configuration Guide 03/31/2009 3rd Edition Revision History Edition Revised Date Description First 2008/04/25 New manual Second 2008/10/15 This manual has

More information

P3AM ENZ0. FUJITSU Storage ETERNUS DX100 S4/DX200 S4, ETERNUS DX100 S3/DX200 S3 Hybrid Storage Systems. Operation Guide (Basic)

P3AM ENZ0. FUJITSU Storage ETERNUS DX100 S4/DX200 S4, ETERNUS DX100 S3/DX200 S3 Hybrid Storage Systems. Operation Guide (Basic) FUJITSU Storage ETERNUS DX100 S4/DX200 S4, ETERNUS DX100 S3/DX200 S3 Hybrid Storage Systems Operation Guide (Basic) This page is intentionally left blank. Preface Fujitsu would like to thank you for purchasing

More information

ExpressCluster X 3.1 WebManager Mobile

ExpressCluster X 3.1 WebManager Mobile ExpressCluster X 3.1 WebManager Mobile Administrator s Guide 10/11/2011 First Edition Revision History Edition Revised Date Description First 10/11/2011 New manual ii Copyright NEC Corporation 2011. All

More information

NEC Express5800 Series. StorView Ver. 3. Installation Guide for N F. [Linux Server Edition] A

NEC Express5800 Series. StorView Ver. 3. Installation Guide for N F. [Linux Server Edition] A NEC Express5800 Series StorView Ver. 3 Installation Guide for N8190-121F [Linux Server Edition] Trademarks NEC ESMPRO is the registered trademark of NEC Corporation. Linux is the registered trademark of

More information

Before Reading This Manual This section explains the notes for your safety and conventions used in this manual.

Before Reading This Manual This section explains the notes for your safety and conventions used in this manual. Onboard SCSI RAID User s Guide Areas Covered Before Reading This Manual This section explains the notes for your safety and conventions used in this manual. Chapter 1 Overview This chapter explains an

More information

NEC Storage ReplicationControl SQL Option User's Manual

NEC Storage ReplicationControl SQL Option User's Manual NEC Storage ReplicationControl SQL Option User's Manual NEC Corporation 2001-2003 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC Corporation.

More information

ETERNUS SF AdvancedCopy Manager GUI User's Guide

ETERNUS SF AdvancedCopy Manager GUI User's Guide ETERNUS SF AdvancedCopy Manager 14.0 GUI User's Guide J2X1-7450-01ENZ0(00) July 2009 Preface Purpose of the User's Guide The AdvancedCopy Manager GUI User's Guide provides detailed information relating

More information

NEC Express5800 Series NEC ESMPRO Agent User's Guide

NEC Express5800 Series NEC ESMPRO Agent User's Guide NEC Express5800 Series NEC ESMPRO Agent User's Guide PROPRIETARY NOTICE AND LIABILITY DISCLAIMER The information disclosed in this document, including all designs and related materials, is the valuable

More information

SystemWalker/StorageMGR User's Guide Solaris-

SystemWalker/StorageMGR User's Guide Solaris- SystemWalker/StorageMGR User's Guide 10.0 -Solaris- Preface ++ Purpose This manual explains how to operate Web-GUI with SystemWalker/StorageMGR. SystemWalker is a generic name for products for operation

More information

Microsoft Windows NT Microsoft Windows SystemWalker/StorageMGR. User's Guide V10.0L10

Microsoft Windows NT Microsoft Windows SystemWalker/StorageMGR. User's Guide V10.0L10 Microsoft Windows NT Microsoft Windows 2000 SystemWalker/StorageMGR User's Guide V10.0L10 Preface ++ Purpose This manual explains how to operate Web-GUI with SystemWalker/StorageMGR. SystemWalker is a

More information

ExpressCluster X 3.2 for Linux

ExpressCluster X 3.2 for Linux ExpressCluster X 3.2 for Linux Installation and Configuration Guide 5/23/2014 2nd Edition Revision History Edition Revised Date Description 1st 2/19/2014 New manual 2nd 5/23/2014 Corresponds to the internal

More information

FUJITSU Storage ETERNUS SF Express V16.5 / Storage Cruiser V16.5 / AdvancedCopy Manager V16.5. Migration Guide

FUJITSU Storage ETERNUS SF Express V16.5 / Storage Cruiser V16.5 / AdvancedCopy Manager V16.5. Migration Guide FUJITSU Storage ETERNUS SF Express V16.5 / Storage Cruiser V16.5 / AdvancedCopy Manager V16.5 Migration Guide B1FW-6000-06ENZ0(01) June 2017 Preface Purpose This manual describes how to upgrade to this

More information

SANsurfer iscsi HBA Application User s Guide

SANsurfer iscsi HBA Application User s Guide Q Simplify SANsurfer iscsi HBA Application User s Guide Management Application for SANsurfer iscsi Host Bus Adapters IS0054602-00 A Page i SANsurfer iscsi HBA Application User s Guide Management Application

More information

NEC ExpressUpdate Functions and Features. September 20, 2012 Rev. 4.0

NEC ExpressUpdate Functions and Features. September 20, 2012 Rev. 4.0 September 20, 2012 Rev. 4.0 Table of Contents Table of Contents...- 2 - Table of Figures...- 5 - Trademarks...- 9 - Notes...- 9 - About this Document...- 9 - Symbols in this Document...- 9 - Terminology...-

More information

NEC Storage D Series D1/D3/D8

NEC Storage D Series D1/D3/D8 NEC Storage Series SAN Storage Product Family NEC Storage Series 1/3/8 To the new generation of storage. Microsoft, Windows are trademarks or registered trademarks of Microsoft Corp. (the United States)

More information

ExpressCluster X 3.0 for Windows

ExpressCluster X 3.0 for Windows ExpressCluster X 3.0 for Windows Installation and Configuration Guide 10/01/2010 First Edition Revision History Edition Revised Date Description First 10/01/2010 New manual Copyright NEC Corporation 2010.

More information

ETERNUS SF AdvancedCopy Manager V13.3 Message Guide

ETERNUS SF AdvancedCopy Manager V13.3 Message Guide B1WW-8881-05ENZ0 (00) ETERNUS SF AdvancedCopy Manager V13.3 Message Guide ii Preface About This Manual This manual explains the messages output by ETERNUS SF AdvancedCopy Manager. Intended Reader This

More information

Hitachi Storage Adapter for VMware vcenter Operations Management Suite Dashboard User s Guide

Hitachi Storage Adapter for VMware vcenter Operations Management Suite Dashboard User s Guide Hitachi Storage Adapter for VMware vcenter Operations Management Suite Dashboard User s Guide FASTFIND LINKS Document Organization Software Version Getting Help Contents AS-312-03 All Rights Reserved,

More information

Interstage Business Process Manager Analytics V12.1 Studio Guide

Interstage Business Process Manager Analytics V12.1 Studio Guide Interstage Business Process Manager Analytics V12.1 Studio Guide Solaris April 2013 Studio Guide Trademarks Trademarks of other companies are used in this documentation only to identify particular products

More information

FUJITSU Storage ETERNUS SF Express V16.3 / Storage Cruiser V16.3 / AdvancedCopy Manager V16.3. Migration Guide

FUJITSU Storage ETERNUS SF Express V16.3 / Storage Cruiser V16.3 / AdvancedCopy Manager V16.3. Migration Guide FUJITSU Storage ETERNUS SF Express V16.3 / Storage Cruiser V16.3 / AdvancedCopy Manager V16.3 Migration Guide B1FW-6000-04ENZ0(00) October 2015 Preface Purpose This manual describes how to upgrade to this

More information

User's Guide - Master Schedule Management

User's Guide - Master Schedule Management FUJITSU Software Systemwalker Operation Manager User's Guide - Master Schedule Management UNIX/Windows(R) J2X1-3170-14ENZ0(00) May 2015 Preface Purpose of This Document This document describes the Master

More information

Hitachi Universal Storage Platform V Hitachi Universal Storage Platform VM Hitachi Copy-on-Write Snapshot User s Guide

Hitachi Universal Storage Platform V Hitachi Universal Storage Platform VM Hitachi Copy-on-Write Snapshot User s Guide Hitachi Universal Storage Platform V Hitachi Universal Storage Platform VM Hitachi Copy-on-Write Snapshot User s Guide FASTFIND LINKS Document Organization Product Version Getting Help Contents MK-96RD607-15

More information

Lenovo N22. User Guide. included manuals before using your computer. included manuals before using your computer.

Lenovo N22. User Guide. included manuals before using your computer. included manuals before using your computer. Lenovo N22 User Guide Read Read the the safety safety notices notices and and important important tips tips in in the the included manuals before using your computer. included manuals before using your

More information

ExpressCluster X for Windows

ExpressCluster X for Windows ExpressCluster X for Windows PP Guide (Virtualization Software) 09/30/2012 5th Edition Revision History Edition Revision Date 1 04/14/2009 Created 2 10/20/2009 Corresponds to Hyper-V 2.0. Modified sample

More information

Universal RAID Utility (VMware Version) User's Guide. 1st Edition February A

Universal RAID Utility (VMware Version) User's Guide. 1st Edition February A Universal RAID Utility (VMware Version) User's Guide 1st Edition February 2009 808-882328-750-A Trademarks NEC ESMPRO and NEC EXPRESSBUILDER are trademarks of NEC Corporation. VMware is a registered trademark

More information

Manual Version: V1.01. ISS Manager Video Management Software User Manual

Manual Version: V1.01. ISS Manager Video Management Software User Manual Manual Version: V1.01 ISS Manager Video Management Software User Manual Notice The information in this manual is subject to change without notice. Every effort has been made in the preparation of this

More information

8G Fibre to SAS 6G SAS to SAS 10G iscsi to SAS

8G Fibre to SAS 6G SAS to SAS 10G iscsi to SAS ERP12S/R & ERP16S/R GUI Software Manual 42-34000-5034 8G Fibre to SAS 6G SAS to SAS 10G iscsi to SAS Disk Array Systems Version 1.0 8G Fibre to SAS 6G SAS to SAS 10G iscsi to SAS Model: ERP12S-8FR2, ERP12R-8FR2,

More information

ETERNUS SF AdvancedCopy Manager V13.1 Operator's Guide for Tape Backup Option

ETERNUS SF AdvancedCopy Manager V13.1 Operator's Guide for Tape Backup Option J2S2-0560-02ENZ0(A) ETERNUS SF AdvancedCopy Manager V13.1 Operator's Guide for Tape Backup Option Preface ++ Purpose This manual describes the functionality of ETERNUS SF AdvancedCopy Manager for Tape

More information

Hitachi Storage Command Portal Installation and Configuration Guide

Hitachi Storage Command Portal Installation and Configuration Guide Hitachi Storage Command Portal Installation and Configuration Guide FASTFIND LINKS Document Organization Product Version Getting Help Table of Contents # MK-98HSCP002-04 Copyright 2010 Hitachi Data Systems

More information

P321-E122-04EN PRIMEPOWER PRIMEPOWER200 PRIMEPOWER400 PRIMEPOWER600

P321-E122-04EN PRIMEPOWER PRIMEPOWER200 PRIMEPOWER400 PRIMEPOWER600 P321-E122-04EN PRIMEPOWER PRIMEPOWER200 PRIMEPOWER400 PRIMEPOWER600 Preface This manual explains the features, functions, installation and additions to the PRIMEPOWER200, PRIMEPOWER400 and PRIMEPOWER600

More information

NEC Express5800 Series NEC ESMPRO Manager User's Guide

NEC Express5800 Series NEC ESMPRO Manager User's Guide NEC Express5800 Series NEC ESMPRO Manager User's Guide 07-2008 PROPRIETARY NOTICE AND LIABILITY DISCLAIMER The information disclosed in this document, including all designs and related materials, is the

More information

Hitachi Compute Blade HVM Navigator User s Guide - LPAR Configuration

Hitachi Compute Blade HVM Navigator User s Guide - LPAR Configuration Hitachi Compute Blade HVM Navigator User s Guide - LPAR Configuration FASTFIND LINKS Document organization Product version Getting help Contents MK-99COM042-09 2012-2015 Hitachi, Ltd. All rights reserved.

More information

Version Monitoring Agent User s Guide SC

Version Monitoring Agent User s Guide SC Tivoli IBM Tivoli Advanced Catalog Management for z/os Version 02.01.00 Monitoring Agent User s Guide SC23-7974-00 Tivoli IBM Tivoli Advanced Catalog Management for z/os Version 02.01.00 Monitoring Agent

More information

EXPRESSCLUSTER X SingleServerSafe 3.3 for Linux. Configuration Guide. 10/02/2017 6th Edition

EXPRESSCLUSTER X SingleServerSafe 3.3 for Linux. Configuration Guide. 10/02/2017 6th Edition EXPRESSCLUSTER X SingleServerSafe 3.3 for Linux Configuration Guide 10/02/2017 6th Edition Revision History Edition Revised Date Description 1st 02/09/2015 New manual 2nd 06/30/2015 Corresponds to the

More information

EMC CLARiiON Server Support Products for Windows INSTALLATION GUIDE P/N REV A05

EMC CLARiiON Server Support Products for Windows INSTALLATION GUIDE P/N REV A05 EMC CLARiiON Server Support Products for Windows INSTALLATION GUIDE P/N 300-002-038 REV A05 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright 2004-2006

More information

Linux is a registered trademark of Linus Torvalds in the United States and other countries.

Linux is a registered trademark of Linus Torvalds in the United States and other countries. Basic Guide Guide Basic R15.2 Windows, Windows Server, Microsoft Azure, Microsoft Excel and Internet Explorer are trademarks or registered trademarks of Microsoft Corporation in the United States and other

More information

ETERNUS Web GUI User's Guide (Operation)

ETERNUS Web GUI User's Guide (Operation) ETERNUS Web GUI User's Guide (Operation) FUJITSU Storage ETERNUS DX100 S3/DX200 S3, ETERNUS DX500 S3/DX600 S3 Disk storage systems, ETERNUS DX200F All Flash Array This page is intentionally left blank.

More information

Tuning Manager Software

Tuning Manager Software Hitachi Command Suite Tuning Manager Software Getting Started Guide FASTFIND LINKS Document Organization Product Version Getting Help Contents MK-96HC120-08 Copyright 2010 Hitachi Ltd., Hitachi Data Systems

More information

SMB8000 Interactive Voice Response

SMB8000 Interactive Voice Response Notice Note that when converting this document from its original format to a.pdf file, some minor font and format changes may occur. When viewing and printing this document, we cannot guarantee that your

More information

Flexible Array Storage Tool. User s Guide

Flexible Array Storage Tool. User s Guide Flexible Array Storage Tool User s Guide HP Part Number 5969-8465 Printed in January 2001 Copyright Copyright 2001, Hewlett-Packard Company. This document contains proprietary information that is protected

More information

VPLEX Operations. System Requirements. This chapter contains the following sections:

VPLEX Operations. System Requirements. This chapter contains the following sections: This chapter contains the following sections: System Requirements, page 1 Assigning a Pod to a Cluster, page 2 Viewing VPLEX Engines, page 3 Rediscovering a Storage Array, page 4 Storage Volume Claiming,

More information

Logical Agent. Installation Guide

Logical Agent. Installation Guide Logical Agent Installation Guide August 2017 Revision History Revision No. Date Shipped Description 1st issue 08.2017 Newly released Table of Contents Chapter 1 Introduction... 1 1.1 Overview of Logical

More information

SPECTRUM. Control Panel User Guide (5029) r9.0.1

SPECTRUM. Control Panel User Guide (5029) r9.0.1 SPECTRUM Control Panel User Guide (5029) r9.0.1 This documentation and any related computer software help programs (hereinafter referred to as the Documentation ) is for the end user s informational purposes

More information

Microsoft Windows NT Microsoft Windows Softek AdvancedCopy Manager Operator's Guide V10.0L30

Microsoft Windows NT Microsoft Windows Softek AdvancedCopy Manager Operator's Guide V10.0L30 Microsoft Windows NT Microsoft Windows 2000 Softek AdvancedCopy Manager Operator's Guide V10.0L30 Preface ++ Purpose This manual describes the operations on Softek AdvancedCopy Manager. ++ Intended Readers

More information

Technical Guide Network Video Recorder Enterprise Edition Maintenance Guide

Technical Guide Network Video Recorder Enterprise Edition Maintenance Guide Technical Guide Network Video Recorder Enterprise Edition Maintenance Guide Network Video Management System March 23, 2018 NVMSTG008 Revision 1.3.0 CONTENTS 1. Overview... 3 1.1. About This Document...

More information

Archiware Pure Quick Start Guide

Archiware Pure Quick Start Guide Archiware Pure Quick Start Guide Content 1 System Requirements... 3 1.1 Hardware Requirements... 3 1.2 Supported Hypervisors... 3 1.3 Deployment Requirements... 3 2 Deploying the Virtual Appliance... 4

More information

IT 341 Introduction to System Administration Project I Installing Ubuntu Server on a Virtual Machine

IT 341 Introduction to System Administration Project I Installing Ubuntu Server on a Virtual Machine IT 341 Introduction to System Administration Project I Installing Ubuntu Server on a Virtual Machine Here we create a new virtual machine and install Ubuntu 16.04 LTS Server on it. In this instance, we

More information

USER MANUAL. PowerFrame TM Personal. UPS Monitoring Software

USER MANUAL. PowerFrame TM Personal.   UPS Monitoring Software USER MANUAL PowerFrame TM Personal UPS Monitoring Software www.bxterra.com 1 TABLE OF CONTENTS Introduction... Structure... Applications... Features... System Requirements... Supported Operating Systems...

More information

Hitachi Compute Blade HVM Navigator User s Guide - LPAR Configuration

Hitachi Compute Blade HVM Navigator User s Guide - LPAR Configuration Hitachi Compute Blade HVM Navigator User s Guide - LPAR Configuration FASTFIND LINKS Document organization Product version Getting help Contents MK-99COM042-11 2012-2015 Hitachi, Ltd. All rights reserved.

More information

MasterScope Application Navigator. Logical Agent Installation Guide

MasterScope Application Navigator. Logical Agent Installation Guide MasterScope Application Navigator Logical Agent Installation Guide October, 2014 Revision History Revision No. Date Shipped Description 1st edition 09.2010 Newly released for Ver3.1. 2nd edition 07.2011

More information

Interstage Shunsaku Data Manager Operator s Guide

Interstage Shunsaku Data Manager Operator s Guide Interstage Shunsaku Data Manager Operator s Guide Operator s Guide Trademarks Trademarks of other companies are used in this manual only to identify particular products or systems. Product Microsoft, Visual

More information

ETERNUS SF AdvancedCopy Manager V15.0. Quick Reference

ETERNUS SF AdvancedCopy Manager V15.0. Quick Reference ETERNUS SF AdvancedCopy Manager V15.0 Quick Reference B1FW-5967-02ENZ0(00) April 2012 Preface Purpose This manual describes the pre-installation requirements, installation procedure, configuration procedure,

More information