Anda di halaman 1dari 30

XIV Storage Administrative Procedures

The following will provide the XIV Storage Administrator an understanding of how to
work with both the GUI and xCLI for storage provisioning operations.

XIV Storage Administrative Procedures.............................................................................1


Storage Provisioning Using the XIV GUI...........................................................................2
Host presentation.........................................................................................................2
Step 1: Create a Storage Pool.......................................................................................2
Step 2: Create a Volume..............................................................................................4
Step 3: Add a Host Definition......................................................................................6
Step 4: Add Host Port(s) to the Host Definition..........................................................8
Step 5: LUN Mapping Operation................................................................................9
Growth of existing host..............................................................................................11
Host removal..............................................................................................................12
Storage Provisioning Using the XIV Command Line Interface (xcli)..............................16
Host presentation...........................................................................................................16
Step 1: Create a Storage Pool.....................................................................................16
Step 2: Create a Volume............................................................................................16
Step 3: Add a Host Definition....................................................................................16
Step 4: Add Host Port(s) to the Host Definition........................................................17
Step 5: LUN Mapping Operation..............................................................................17
Growth of existing host..............................................................................................18
Host Removal (xcli).......................................................................................................19
Step 1: Obtain the Host Name...................................................................................19
Step 2: Determine what Volume(s) are presented to the host....................................19
Step 3: Determine if the Volume(s) is presented to more than one host. .................19
Step 4: Unmap the Volume from the host.................................................................20
Step 5: Verify that the host does not have any remaining volumes...........................20
Step 6: Shows the Volume is not listed in the overall list of Volumes.....................20
Step 7a: Volume Deletion..........................................................................................21
Step 7b: Verify the volume has been deleted from the XIV......................................21
Step 8a: HBA Removal..............................................................................................22
Step 8b: HBA removal verification...........................................................................22
Step 9a: Host Definition Removal.............................................................................22
Step 9b: Host Definition Removal Verification.........................................................23
Volume Resizing (both directions)............................................................................23
Reporting............................................................................................................................24
Performance...................................................................................................................24
Alert and Problem History.............................................................................................26
Monitor - Events........................................................................................................26
Event severity:...........................................................................................................27
Audit..................................................................................................................................28
Security User and Group Related..................................................................................28
Storage Provisioning Using the XIV GUI

Host presentation

Step 1: Create a Storage Pool

Once Pool screen comes up ‘Right Click’ in open area and select ‘Add Pool’.
Create the Pool based on your requirements.
You can create a Regular Pool or Thin Provisioning Pool

The Pool ‘std_002’ is created. This screenshot shows the pool status.
Step 2: Create a Volume
To create a new volume, click on View, Volumes, and select Volumes.

Once in the volumes screen, right click and select ‘Add Volumes’
Select your Pool that your Volume will be created in. Input Volume, Size, and Volume
Name. Click Create.
Step 3: Add a Host Definition
Under Hosts, right click and select ‘Add Host’

Enter the name of the host and click ‘Add’


ONLY Complete this step if the host is running HP-UX
If your host is not running HP-UX go to Step 4.
If the server is running HP-UX you MUST change the server type from ‘default’ to HP-
UX. Complete this by right clicking on the host and selecting ‘Change Type’.

Select hpux and select ‘OK’.


Step 4: Add Host Port(s) to the Host Definition
Right click on newly added host, test_srv2, and select Add Port

Select the Port Type (FibreChannel or iSCSI) and the server HBA wwpn that is going to
be presented with XIV Storage and click ‘Add’. Zoning would have been completed prior
to this step.
Complete this for each HBA in this host.

Expand the server selection to show each of the HBA wwpns that you associated with the
new host.
Step 5: LUN Mapping Operation
Present the Volume to the Host
Select View, Hosts and LUNs, and Hosts

Right Click on the host you created in Step 3 and select ‘Map Volumes to This Host’
In the Volumes Table, on left, highlight the Volume you would like to present to the host.
It will automatically add it to the first LUN position in the LUNs table.
You can change the LUN address if needed by clicking on an available LUN number in
the LUNs table, on right.

Click the Map button to complete the LUN Mapping Operation.

You will see that the Volume is no longer available in the Volumes table. At this point
the Server can access the storage volume.
Growth of existing host

Complete Step 2 and Step 5


Host removal

Select the Hosts Screen

Highlight the host and select ‘MapVolumes to This Host’


Under the LUNs column, on the right, highlight all of the LUNs from the host.
Note: This step presumes all host side LUN operations have been completed by the SA.
Click on the Unmap Button to remove the LUN(s) from the host.

Click OK to confirm the Host LUN removal operation.


Return to the Hosts Screen

Open the host and complete the following for each HBA
• Right Click on the HBA
• Select Delete

Answer OK for each HBA you delete


Return to the Hosts Screen and Right Click on the host you’re removing and select Delete

Click on OK to complete the Host Removal Process


Storage Provisioning Using the XIV Command Line
Interface (xcli)

Host presentation
This process outlines defining a HP host AND including both HBAs in one host
definition

Step 1: Create a Storage Pool


xcli -m 167.210.165.5 -u USER_NAME -p PASSWORD pool_create "pool=thin_001"
"size=50" "snapshot_size=0"
Command executed successfully.

Note: snapshot_size must be entered regardless if snaps will be used or not.

Step 2: Create a Volume


xcli -m 167.210.165.5 -u USER_NAME -p PASSWORD vol_create "vol=
vol01_thin_01" "size=32" "pool=std_001"
Command executed successfully.

Step 3: Add a Host Definition


xcli -m 167.210.165.5 -u USER_NAME -p PASSWORD host_define "host=hp_srv1"
Command executed successfully.

xcli -m 167.210.165.5 -u USER_NAME -p PASSWORD special_type_set


"host=hp_srv1" "type=hpux"
Command executed successfully.

xcli -m 167.210.165.5 -u USER_NAME -p PASSWORD host_list

Name Type FC Ports iSCSI Ports User Group Cluster


mssw2000_a default 10000000C92A972C
test_srv1_a default 1111111111111111
test_srv1_b default 2222222222222222
hp_srv1 hpux
Step 4: Add Host Port(s) to the Host Definition
Defined 2 WWPNs to this host (cmds not shown for this example; see prior examples if
needed)
xcli -m 167.210.165.5 -u USER_NAME -p PASSWORD host_list

Name Type FC Ports iSCSI Ports User Gr


oup Cluster
mssw2000_a default 10000000C92A972C
test_srv1_a default 1111111111111111
test_srv1_b default 2222222222222222
hp_srv1 hpux 0000000000000000,4444444444444444

Step 5: LUN Mapping Operation


Map Volume to Host definition
xcli -m 167.210.165.5 -u USER_NAME -p PASSWORD map_vol "host=hp_srv1"
"vol=vol01_thin_01" "lun=0"
Command executed successfully.

List mappings for hp_srv1


xcli -m 167.210.165.5 -u USER_NAME -p PASSWORD mapping_list "host=hp_srv1"
LUN Volume Size Master Serial Number Locked
0 vol01_thin_01 34 75 no
Growth of existing host
Complete Step 2 and Step 5 to add volumes to an existing host.
Host Removal (xcli)
The following steps instruct you how to remove XIV Volumes (LUNs), HBAs, and Host
Definitions from the XIV. In this example server test_srv1 will be removed.

Step 1: Obtain the Host Name


The Host Name is the name under the Name field. To confirm the host name, verify it
matches the HBA that is in the host you are removing. The HBA WWPN is listed under
FC Ports.

xcli -m XIV_IP -u XIV_USERID -p XIV_PASSWORD host_list

Name Type FC Ports iSCSI Ports User Group Cluster


mssw2003_a default 10000000C92A972C mssw2000 server

dis1tpc003_a default 10000000C92A94F0

test_srv1 default 210000E08B897BC2

Step 2: Determine what Volume(s) are presented to the host


You supply the name of the host obtained in Step 1. Document the Volume(s) listed in
the Volume column.

xcli -m XIV_IP -u XIV_USERID -p XIV_PASSWORD mapping_list host=test_srv1

LUN Volume Size Master Serial Number Locked


1 vol002_std_002 17 85 no

Step 3: Determine if the Volume(s) is presented to more than one


host.
The actions you’d take would vary depending on your configuration and circumstances.
In this example it shows the Volume is only presented to server test_srv1.

xcli -m XIV_IP -u XIV_USERID -p XIV_PASSWORD vol_mapping_list


vol=vol002_std_002

Host/Cluster Type LUN


test_srv1 host 1
Step 4: Unmap the Volume from the host
You must enter a –y on the command line to answer yes to remove the LUN. Two
examples are provided, one of which does not include the –y.

xcli -m XIV_IP -u XIV_USERID -p XIV_PASSWORD unmap_vol host=test_srv1


vol=vol002_std_002
Command executed successfully.

Step 5: Verify that the host does not have any remaining volumes.
xcli -m XIV_IP -u XIV_USERID -p XIV_PASSWORD mapping_list host=test_srv1
No Mappings

Step 6: Shows the Volume is not listed in the overall list of Volumes
xcli -m XIV_IP -u XIV_USERID -p XIV_PASSWORD vol_list

Name Size (GB) Master Name Consistency Group


Pool Creator Used Capacity (GB)
vol001_std_001 17
std_001 XIV_USERID 11
vol002_std_002 17
std_001 XIV_USERID 0
vol001_std_001.snapshot_00002 17 vol001_std_001
std_001 XIV_USERID
vol001_std_002 17
std_001 XIV_USERID 0
test_vol_001 34
test_std_002 XIV_USERID 16
Only complete the remaining steps if the volume wasn't mapped to any
other hosts/cluster. This will delete the Volume and the Host Definition
form the XIV.

Step 7: Delete the volume. VERY IMPORTANT to have validated that the
volume was not presented to any other hosts. Reference Step 2.

DO NOT PROCEED unless you have verified this volume is not mapped to any
other hosts.

Step 7a: Volume Deletion


You must enter a –y on the command line to answer yes to delete the LUN. Two
examples are provided, one of which does not include the –y.

xcli -m XIV_IP -u XIV_USERID -p XIV_PASSWORD vol_delete vol=vol002_std_002

Warning: ARE_YOU_SURE_YOU_WANT_TO_DELETE_VOLUME

xcli -m XIV_IP -u XIV_USERID -p XIV_PASSWORD vol_delete vol=vol002_std_002 -y


Command executed successfully.

Step 7b: Verify the volume has been deleted from the XIV
List all volumes to see that the LUN has been deleted.
xcli -m XIV_IP -u XIV_USERID -p XIV_PASSWORD vol_list

Name Size (GB) Master Name Consistency Group


Pool Creator Used Capacity (GB)
vol001_std_001 17
std_001 XIV_USERID 11
vol001_std_001.snapshot_00002 17 vol001_std_001
std_001 XIV_USERID
vol001_std_002 17
std_001 XIV_USERID 0
test_vol_001 34
test_std_002 XIV_USERID 16
Step 8a: HBA Removal
This removes the HBA WWPN which is associated to the host definition.

xcli -m XIV_IP -u XIV_USERID -p XIV_PASSWORD host_list

Name Type FC Ports iSCSI Ports User Group Cluster


mssw2003_a default 10000000C92A972C mssw2000 server
dis1tpc003_a default 10000000C92A94F0
test_srv1 default 210000E08B897BC2

xcli -m XIV_IP -u XIV_USERID -p XIV_PASSWORD host_remove_port


host=test_srv1 fcaddress=210000E08B897BC2
Command executed successfully.

Step 8b: HBA removal verification


This verifies the WWPN has been logically removed from the XIV

xcli -m XIV_IP -u XIV_USERID -p XIV_PASSWORD host_list


Name Type FC Ports iSCSI Ports User Group Cluster
mssw2003_a default 10000000C92A972C mssw2000 server

dis1tpc003_a default 10000000C92A94F0

test_srv1 default

Step 9a: Host Definition Removal


This removes the host definition from the XIV. The HBA removal, step 8, should be
completed prior.

xcli -m XIV_IP -u XIV_USERID -p XIV_PASSWORD host_delete host=test_srv1


Warning: ARE_YOU_SURE_YOU_WANT_TO_DELETE_HOST

xcli -m XIV_IP -u XIV_USERID -p XIV_PASSWORD host_delete host=test_srv1 -y


Command executed successfully.
Step 9b: Host Definition Removal Verification
By running a host listing for the entire XIV you can verify host ‘test_srv1’ has been
removed.

xcli -m XIV_IP -u XIV_USERID -p XIV_PASSWORD host_list

Name Type FC Ports iSCSI Ports User Group Cluster


mssw2003_a default 10000000C92A972C mssw2000 server

dis1tpc003_a default 10000000C92A94F0

Volume Resizing (both directions)

Resizing a volume requires you to issue a ‘-y’ flag, indicating Yes, to the resizing
operation. The first example shows you what occurs if the –y flag is not issued.

xcli -m 167.210.165.5 -u USER_NAME -p PASSWORD vol_resize


"vol=vol04_thin_pool_01" "size=34"
Warning: ARE_YOU_SURE_YOU_WANT_TO_ENLARGE_VOLUME

xcli -m 167.210.165.5 -u USER_NAME -p PASSWORD vol_resize


"vol=vol04_thin_pool_01" "size=34" -y
Command executed successfully.
Reporting

Performance
The first item to note is the current IOPS for the system is always displayed in the bottom
center of the screen. This feature provides simple access to the current stress of the system.
The following image displays the GUI and the IOPS display; this figure also describes how to start
the statistics monitor.
Select the statistics option from the Monitor menu as shown in Figure 9-3 to display the
Monitor default view shown in Figure 9-4.
Figure 9-4 shows the system IOPS for the past 24 hours:
_ The X axis of the graph represents the time and can vary from minutes to months.
_ The Y axis of the graph is the measurement selected. In the default case it is displaying
IOPS.
The statistics monitor also illustrates latency and bandwidth.

The other options in the statistics monitor act as filters for separating data. These filters are
separated by the type of transaction (reads or writes), cache properties (Hits vs. Misses), or
transfer size of I/O as seen by the XIV Storage System. See Figure 9-5 for a better view of the
filter pane.

Figure 9-5 Filter pane for the statistics monitor

The filter pane allows the user to select multiple items within a specific filter. For example, the
user would like to see reads and writes separated on the graph. By holding down the <CTRL>
key on the keyboard and selecting the read option and then the write option the user
witnesses both items displayed on the graph.
Alert and Problem History
Monitor - Events
To get to the Events window, select Events from the Monitor menu as shown in the following
figure. A lot of information and many different events are logged by the XIV Storage System. The
system captures entries for problems with different levels of severity, including warnings and
other informational messages. These informational messages include detailed information
about logins, configuration changes and status of attached hosts and paths.

Because many events are logged, the number of entries is typically huge.
To get a more useful and workable view, there is an option to filter the events logged. Without
filtering the events it would be extremely difficult to find the entries for a specific incident or
information.

If you double click on a specific event in the list, you can get more detailed information about
that particular event, along with a recommendation on what eventual action to take.
Event severity:
The events are classified into different severities depending on their impact on the system.
Figure 10-6 gives an overview of the criteria and meaning of the different severity levels.

The XIV GUI does not display the user who performed a transaction. Transaction
audit with user can only be performed on the XCLI.
Audit

Security User and Group Related

The Events tool allows you to filter based on Type ‘User’ or ‘User_Group’. You have
other parameters you can combine within the filter. By selecting ‘User’ and clicking the
Filter Button on the top Right, you will see any Events based on User related tasks that
were completed. By selecting ‘User_Group’ and than filter, you can determine what
group level Events were completed.

By double clicking on USER_DEFINED Event you can see what UserID was created.
The same is true for any of the events, details about the event can be obtained by opening
up that event.
All events or tasks performed can be determined by clearing all Filters.

 User and Security Group Related using xcli


Using the event_list command you can query the XIV system based on prefined Event
Codes. The xcli will provide you with the same output as the GUI and also displays what
userID executed the event.

This command shows when new users where created and who created them. It does not
display what userID was created.

:user_defined example
xcli -m 167.210.165.5 -u USERID -p PASSWORD event_list "code=user_defined"
Index Code Severity Timestamp Alerting Cleared User
17 USER_DEFINED Informational 2008-10-14 19:35:06 no yes admin
18 USER_DEFINED Informational 2008-10-14 19:35:50 no yes admin
46 USER_DEFINED Informational 2008-10-15 15:21:01 no yes pjlongse
314 USER_DEFINED Informational 2008-11-21 03:01:11 no yes erust

:user_group_created example
xcli -m 167.210.165.5 -u USERID -p PASSWORD event_list
"code=user_group_created"
Index Code Severity Timestamp Alerting Cleared User
315 USER_GROUP_CREATED Informational 2008-11-21 03:03:45 no yes erust

:access_to_host_granted_to_user_group example
xcli -m 167.210.165.5 -u USERID -p PASSWORD event_list
code=access_to_host_granted_to_user_group"
Index Code Severity Timestamp Alerting Cleared User
317 ACCESS_TO_HOST_GRANTED_TO_USER_GROUP Informational 2008-
11-21 03:06:30 no yes erust
:event_list without any event codes in the filter will supply you with all events
xcli -m 167.210.165.5 -u USERID -p PASSWORDevent_list "after=2008-11-
20.00:00:00"
Index Code Severity Timestamp Alerting Cleared User
308 HOST_DISCONNECTED Informational 2008-11-20 17:56:44 no yes
309 HOST_CONNECTED Informational 2008-11-20 17:56:44 no yes
310 HOST_NO_MULTIPATH_ONLY_ONE_PORT Informational 2008-11-20
17:56:49 no yes
311 HOST_DISCONNECTED Informational 2008-11-20 20:07:59 no yes

Anda mungkin juga menyukai