background image

Enabling and creating shadow copies

Enabling shadow copies on a volume automatically results in several actions:

Creates a shadow copy of the selected volume.

Sets the maximum storage space for the shadow copies.

Schedules shadow copies to be made at 7 a.m. and 12 noon on weekdays.

NOTE:

Creating a shadow copy only makes one copy of the volume; it does not create a schedule.

NOTE:

After the first shadow copy is created, it cannot be relocated. Relocate the cache file by

altering the cache file location under Properties prior to enabling shadow copy. See

Viewing

shadow copy properties (page 43)

.

Viewing a list of shadow copies

To view a list of shadow copies on a volume:
1.

Access Disk Management.

2.

Select the volume or logical drive, then right-click on it.

3.

Select

Properties

.

4.

Select

Shadow Copies

tab.

All shadow copies are listed, sorted by the date and time they were created.

NOTE:

It is also possible to create new shadow copies or delete shadow copies from this page.

Set schedules

Shadow copy schedules control how frequently shadow copies of a volume are made. There are
a number of factors that can help determine the most effective shadow copy schedule for an
organization. These include the work habits and locations of the users. For example, if users do
not all live in the same time zone, or they work on different schedules, it is possible to adjust the
daily shadow copy schedule to allow for these differences.

Do not schedule shadow copies more frequently than once per hour.

NOTE:

When deleting a shadow copy schedule, that action has no effect on existing shadow

copies.

Viewing shadow copy properties

The Shadow Copy Properties page lists the number of copies, the date and time the most recent
shadow copy was made, and the maximum size setting.

CAUTION:

Use caution when reducing the size limit for all shadow copies. When the size is set

to less than the total size currently used for all shadow copies, enough shadow copies are deleted
to reduce the total size to the new limit. A shadow copy cannot be recovered after it has been
deleted.

NOTE:

For volumes where shadow copies do not exist currently, it is possible to change the

location of the cache file. Managing the cache files on a separate disk is recommended.

Redirecting shadow copies to an alternate volume

IMPORTANT:

Shadow copies must be initially disabled on the volume before redirecting to an

alternate volume. If shadow copies are enabled and you disable them, a message appears informing
you that all existing shadow copies on the volume will be permanently deleted.

To redirect shadow copies to an alternate volume:

Volume shadow copies

43

Summary of Contents for StoreEasy 3000

Page 1: ...es how to install configure and maintain all models of HP StoreEasy 3000 Storage and is intended for system administrators For the latest version of this guide go to http www hp com support StoreEasy3000Manuals HP Part Number B7D88 96142 Published April 2014 Edition 3 ...

Page 2: ...e The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services Nothing herein should be construed as constituting an additional warranty HP shall not be liable for technical or editorial errors or omissions contained herein Acknowledgments Microsoft and Windows are U S registered trademarks of Microsoft Corporation Java i...

Page 3: ...ation 18 Configure networking 18 Provisioning cluster shared storage 18 Provisioning storage 19 Complete system configuration 20 Adding a node to an existing cluster 21 Using Server Core 22 Configuring failover properties for multi site environments 23 Additional access methods 23 Using the Remote Desktop method 23 Using the Telnet method 23 3 Administration tools 24 Microsoft Windows Storage Serv...

Page 4: ...olume 39 Allocating disk space 39 Identifying the storage area 40 Determining creation frequency 40 Shadow copies and drive defragmentation 40 Mounted drives 40 Managing shadow copies 41 The shadow copy cache file 41 Enabling and creating shadow copies 43 Viewing a list of shadow copies 43 Set schedules 43 Viewing shadow copy properties 43 Redirecting shadow copies to an alternate volume 43 Disabl...

Page 5: ...4 Shared disk requirements 65 Cluster installation 65 Setting up networks 66 Configuring the private network adapter 66 Configuring the public network adapter 66 Renaming the local area connection icons 66 Verifying connectivity and name resolution 66 Verifying domain membership 66 Setting up a cluster account 66 About the Quorum disk 66 Configuring shared disks 67 Verifying disk access and functi...

Page 6: ...t Homepage main page 77 Certificate of Authenticity 79 Known issues 79 Error codes 83 HP Insight Management CSP WBEM Providers for Windows error codes 83 HP Support websites 84 Autonomy LiveVault 85 Microsoft Systems Center Operations Manager 85 Removing and replacing hardware components 85 8 Storage system recovery 86 System Recovery DVD 86 Drive letters are not assigned after a restore 86 Restor...

Page 7: ...Warranty information 96 Glossary 98 Index 100 Contents 7 ...

Page 8: ... management without increasing costs HP and Microsoft management integration including Microsoft Server Manager and System Center and HP Systems Insight Manager and Integrated Lights Out iLO Each system ships from the factory with preintegrated hardware and preloaded software to significantly reduce the time and complexity of installation For more information about HP StoreEasy 3000 Storage featur...

Page 9: ...mponents in degraded or critical state see Systems Insight Display LED combinations page 13 Solid blue Activated UID LED and button 3 Flashing blue System being remotely managed Off Deactivated Off Power cord not attached or power supply failure Power On Standby button and system power LED 4 Solid Amber System is in standby Power On Standby Button service is initialized Flashing Green Power On Sta...

Page 10: ... iLO connector 1 1 FlexibleLOM ports Shown 4x1Gb Optional 2x10Gb port 1 on right side Figure 4 HP StoreEasy 38x0 Gateway Storage rear panel LEDs and buttons Status Description Item Blue Activated UID LED button 1 Flashing blue System is being managed remotely Off Deactivated Off System is off or power supply has failed Power supply 2 LED 2 Solid green Normal Off System is off or power supply has f...

Page 11: ...ont panel components 2 Server blade release button 1 Hard drive bay 1 4 Hard drive bay 2 3 Server blade release lever 6 Serial label pull tab 5 HP c Class Blade SUV connector behind the serial label pull tab Figure 6 HP StoreEasy 38x0 Gateway Storage Blade front panel LEDs and buttons Status Description Item Solid Green Normal System is powered on Health status LED bar 1 Flashing Green Power On St...

Page 12: ...ardware information The following list identifies the ProLiant model for each HP StoreEasy 3000 Storage 3840 Gateway Storage ProLiant DL380p Gen8 3840 Gateway Storage Blade ProLiant BL460c Gen8 The ProLiant documentation is available at http www hp com go proliantgen8 docs Drive LED definitions The following figure shows the drive LEDs These LEDs are located on all HP ProLiant hot plug hard drives...

Page 13: ...stems Insight Display LED and color One or more of the following conditions may exist Amber Red Processor amber Processor in socket X has failed Processor X is not installed in the socket Processor X is unsupported ROM detects a failed processor during POST Processor in socket X is in a pre failure condition Green Amber One or more DIMMs have failed Green Red DIMM amber DIMM in slot X is in a pre ...

Page 14: ...alled in Server with a GUI mode by default You can switch to Server Core Installation mode however Server Core Installation mode is only supported on an HP StoreEasy Storage system when the operating environment does not require user interaction such as in a data center Any activity that requires the use of a GUI must be done in Server with a GUI mode For more information about installation option...

Page 15: ...nt Essentials Integrated Lights Out Advanced Pack Locate the serial number Certificate of Authenticity and End User License Agreement For technical support purposes locate the storage system s serial number Certificate of Authenticity COA and End User License Agreement EULA Record the serial number and COA product key and make a print copy of the EULA as needed The storage system s serial number i...

Page 16: ...onnect a power cable to the storage system 4 Locate the iLO Network Settings tag attached to the storage system and record the default user name password and DNS name 5 From a remote computer open a standard Web browser and enter the iLO management hostname of the storage system NOTE By default iLO obtains the management IP address and subnet mask from your network s DHCP server The hostname found...

Page 17: ...and registration credentials A secure HTTPS connection is used to connect to port 5989 on the array If a different protocol is required or a different port is configured on the array the SMI S registration must be performed at an elevated PowerShell command prompt For more information see the storage array documentation Registering the SMI S provider automatically updates the operating system stor...

Page 18: ...e network interfaces Use NCT to perform the following tasks Change the network interface settings Configure network teams Configure VLAN assignments and assign VLAN IDs Configure the IP address for the selected interface Confirm network settings and diagnose environmental network issues using the network validation system For more information on any of these tasks click Help for the respective tas...

Page 19: ...ng are the requirements for shared storage that will enable creation of the cluster Create a LUN that will be used as a witness disk or quorum disk Create a LUN of at least 544 MB This will allow for a volume size of the required 512 MB after NTFS formatting Present the LUN to all hosts that will be part of the cluster Optionally create an additional LUN or LUNs that will be assigned to the first ...

Page 20: ...date your configuration when using clusters Whether you create a cluster through the ICT or the Failover Cluster Manager one of the first steps is validating your configuration using the Microsoft cluster validation tool If you choose to skip the validation step you can still validate the cluster after it is created After the storage system is physically set up and you have completed all of the re...

Page 21: ...onnect it from Port 1 of the first node to any port on the switch Assign the IP address that was recorded in step 3 for example 169 X X 1 5 Connect Port 1 of the second node to the next port on the same switch and assign an IP address for example 169 X X 2 6 Connect Port 1 of the new node to the next port on the same switch and assign an IP address for example 169 X X 3 7 From the first node selec...

Page 22: ...hen prompted restart the server by executing the following command PS C Users Administrator shutdown r t 0 After the server restart only the command prompt will be available indicating the server is now in Server Core mode NOTE If you close all command prompts there will be no way to manage the server in Server Core mode To resolve this issue complete the following steps 1 Press CTRL ALT DELETE 2 ...

Page 23: ... start at the section entitled Overivew of the DFS Management Snap in Additional access methods After the storage system installation process is complete and the system s IP address has been assigned you can then additionally use the Remote Desktop and Telnet methods to access the storage system Using the Remote Desktop method Remote Desktop provides the ability for you to log on to and remotely a...

Page 24: ... as well as other Windows servers may be managed as described in the Manage Multiple Remote Servers with Server Manager article on Microsoft TechNet Windows Server Manager can also be used for remote management of the storage system by installing it on a Windows 8 client as part of Remote Server Administration tools To download the tools go to the following Microsft website Download Center NOTE Th...

Page 25: ...olume contains the following Unoptimized files For example unoptimized files could include files that do not meet the selected file age policy setting system state files alternate data streams encrypted files files with extended attributes files smaller than 32 KB other reparse point files or files in use by other applications Optimized files Files that are stored as reparse points that contain po...

Page 26: ...rint jobs such as canceling all print jobs at once You can also delete multiple printers at the same time Administrators can install printers remotely by using the automatic detection feature which finds and installs printers on the local subnet to the local print server Administrators can log on remotely to a server at a branch location and then install printers remotely For more information see ...

Page 27: ...four major divisions Physical storage elements Logical storage elements File system elements File sharing elements Each of these elements is composed of the previous level s elements Storage management example Figure 8 page 28 depicts many of the storage elements that one would find on a storage device The following sections provide an overview of the storage elements Storage management elements 2...

Page 28: ...tructure Analyze the current file server structure and environment Plan properly to ensure the best configuration and use of storage Determine the desired priority of fault tolerance performance and storage capacity Use the determined priority of system characteristics to determine the optimal striping policy and RAID level Include the appropriate number of physical drives in the arrays to create ...

Page 29: ...ithin each stripe must be the same This sequencing process is performed by the array controller which sends the data blocks to the drive write heads in the correct order A natural consequence of the striping process is that each hard drive in a given array contains the same number of data blocks NOTE If one hard drive has a larger capacity than other hard drives in the same array the extra capacit...

Page 30: ...written to the spare the logical drive still fails Logical storage elements Logical storage elements consist of those components that translate the physical storage elements to file system elements The storage system uses the Window Disk Management utility to manage the various types of disks presented to the file system There are two types of LUN presentation basic disk and dynamic disk Each of t...

Page 31: ...uld have the same high availability characteristics In other words the units should all be of the same RAID level For example it would not be a good practice to include both a RAID 1 0 and a RAID 5 array in the same volume set By keeping all the units the same the entire volume retains the same performance and high availability characteristics making managing and maintaining the volume much easier...

Page 32: ... against data loss due to media failures however recovering data from shadow copies can reduce the number of times needed to restore data from tape Using storage elements The last step in creating the element is determining its drive letter or mount point and formatting the element Each element created can exist as a drive letter assuming one is available and or as mount points on an existing fold...

Page 33: ...y modules For additional information refer to the Management CD in the HP ProLiant Essentials Foundation Pack or the HP SIM website http www hp com go hpsim Management Agents Management Agents provide the information to enable fault performance and configuration management The agents allow easy manageability of the server through HP SIM software and thirdparty SNMP management platforms Management ...

Page 34: ...lecting Local Application Mode allows you to run the ACU from a Remote Desktop remote console or storage system web access mode Remote service mode allows you to access the ACU from a remote browser 1 Click Start and then click Select HP System Tools HP Array Configuration Utility 2 If the Execution Mode for ACU is set to Remote Mode log on to the HP System Management Homepage The default user nam...

Page 35: ...sion When closing Disk Management through a Remote Desktop connection it may take a few moments for the remote session to log off Guidelines for managing disks and volumes The single logical drive is configured for the storage system operating system and should not be altered in any manner If this logical drive is altered the system recovery process may not function properly when using the System ...

Page 36: ...mes NOTE To limit the size of a folder or share see Quota management page 57 Configure the volumes on the server to perform the following tasks Prevent further disk space use and log an event when a user exceeds a specified disk space limit Log an event when a user exceeds a specified disk space warning level When enabling disk quotas it is possible to set both the disk quota limit and the disk qu...

Page 37: ... storage space to an existing logical drive on the same array usually after the array has been expanded An administrator may have gained this new storage space by either expansion or by deleting another logical drive on the same array Unlike drive expansion the operating system must be aware of changes to the logical drive size You extend a volume to Increase raw data storage Improve performance b...

Page 38: ...ow Copy supports 64 shadow copies per volume A shadow copy contains previous versions of the files or folders contained on a volume at a specific point in time While the shadow copy mechanism is managed at the server previous versions of files and folders are only available over the network from clients and are seen on a per folder or file level and not as an entire volume The shadow copy feature ...

Page 39: ...d folder the administrator must first share the folder NOTE Shadow copies are available only on NTFS not FAT or FAT32 volumes Files or folders that are recorded by using Shadow Copy appear static even though the original data is changing Allocating disk space When determining the amount of space to allocate for storing shadow copies consider both the number and size of files that are being copied ...

Page 40: ...cceptable to administrators or end users it is best to use a separate volume on separate disks to store shadow copies Determining creation frequency The more frequently shadow copies are created the more likely that end users will get the version that they want However with a maximum of 64 shadow copies per volume there is a trade off between the frequency of making shadow copies and the amount of...

Page 41: ...w copies The system administrator can make shadow copies available to end users through a feature called Shadow Copies for Shared Folders The administrator uses the Properties menu see Figure 12 page 41 to turn on the Shadow Copies feature select the volumes to be copied and determine the frequency with which shadow copies are made Figure 12 System administrator view of Shadow Copies for Shared Fo...

Page 42: ... copies on a source volume must be continually monitored and can consume space designated for file sharing Setting the limit too high takes up valuable storage space Setting the limit too low can cause shadow copies to be purged too soon or not created at all By storing shadow copies on a separate volume space limits can generally be set higher or set to No Limit See the online help for instructio...

Page 43: ...its and locations of the users For example if users do not all live in the same time zone or they work on different schedules it is possible to adjust the daily shadow copy schedule to allow for these differences Do not schedule shadow copies more frequently than once per hour NOTE When deleting a shadow copy schedule that action has no effect on existing shadow copies Viewing shadow copy properti...

Page 44: ... selected and then click Enable Shadow copies are now scheduled to be made on the alternate volume Disabling shadow copies When shadow copies are disabled on a volume all existing shadow copies on the volume are deleted as well as the schedule for making new shadow copies CAUTION When the Shadow Copies Service is disabled all shadow copies on the selected volumes are deleted Once deleted shadow co...

Page 45: ... 2000 SP3 and later operating system versions No additional software is required to enable UNIX users to independently retrieve previous versions of files stored on NFS shares NOTE Shadow Copies for Shared Folders supports retrieval only of shadow copies of network shares It does not support retrieval of shadow copies of local folders NOTE Shadow Copies for Shared Folders clients are not available...

Page 46: ...n only access shadow copies for shares to which they have access In other words if a user does not have access to a share he also does not have access to the share s shadow copies The Shadow Copies for Shared Folders client pack installs a Previous Versions tab in the Properties window of files and folders on network shares Users access shadow copies with Windows Explorer by selecting Open Copy or...

Page 47: ...difying shadow copies all pseudo subdirectories are marked read only regardless of the user s ownership or access rights or the permissions set on the original files Server for NFS periodically polls the system for the arrival or removal of shadow copies and updates the root directory view accordingly Clients then capture the updated view the next time they issue a directory read on the root of th...

Page 48: ...tion as a complete file system snapshot If the built in backup application NTbackup is used the backup software forces a snapshot and then uses the snapshot as the means for backup The user is unaware of this activity and it is not self evident although it does address the issue of open files Shadow Copy Transport Shadow Copy Transport provides the ability to transport data on a Storage Area Netwo...

Page 49: ...lders on any system are used to organize data Regardless of system size systematic structuring and naming conventions of volumes and folders eases the administrative burden Moving from volumes to folders to shares increases the level of granularity of the types of data stored in the unit and the level of security access allowed Folders can be managed using Server Manager Tasks include Accessing a ...

Page 50: ...ired user or group and then click Remove The center section of the Security tab lists permission levels When new users or groups are added to the permissions list select the appropriate boxes to configure the common file access levels 3 To modify ownership of files or to modify individual file access level permissions click Advanced Figure 18 page 51 illustrates the properties available on the Adv...

Page 51: ... entries shown here that apply to child objects This allows all child folders and files to inherit the current folder permissions by default Modify specific permissions assigned to a particular user or group Select the desired user or group and then click Edit 4 Enable or disable permissions by selecting the Allow box to enable permission or the Deny box to disable permission If neither box is sel...

Page 52: ...ced Security Settings is the Auditing tab Auditing allows you to set rules for the auditing of access or attempted access to files or folders Users or groups can be added deleted viewed or modified through the Advanced Security Settings Auditing tab 52 File server management ...

Page 53: ...y Settings screen Auditing tab 5 Click Add to display the Auditing Entry screen Figure 21 Auditing Entry for New Volume screen 6 Click Select a principal to display the Select User or Group screen Folder and share management 53 ...

Page 54: ...it policy on the storage system The Owner tab allows taking ownership of files Typically administrators use this area to take ownership of files when the file ACL is incomplete or corrupt By taking ownership you gain access to the files and then manually apply the appropriate security configurations Figure 23 Advanced Security Settings screen The current owner of the file or folder is listed at th...

Page 55: ...ctory and let the users map personal drives to their own subdirectory Defining Access Control Lists The Access Control List ACL contains the information that dictates which users and groups have access to a share as well as the type of access that is permitted Each share on an NTFS file system has one ACL with multiple associated user permissions For example an ACL can define that User1 has read a...

Page 56: ...ive and standard SMB shares To create an administrative share end the share name with the character when setting up the share Do not type a character at the end of the share name when creating a standard share Managing shares Shares can be managed using Server Manager Tasks include Creating a new share Deleting a share Modifying share properties Publishing in DFS CAUTION Before deleting a share wa...

Page 57: ...e File Server Resource Manager snap in you can perform the following tasks Create file screens to control the types of files that users can save and to send notifications when users attempt to save blocked files Define file screening templates that can be easily applied to new volumes or folders and that can be used across an organization Create file screening exceptions that extend the flexibilit...

Page 58: ...to track the state of each cluster node Each node sends out periodic messages to the other nodes these messages are called heartbeats If a node stops sending heartbeats the cluster service fails over any resources that the node owns to another node For example if the node that owns the Quorum disk is shut down for any reason its heartbeat stops The other nodes detect the lack of the heartbeat and ...

Page 59: ...which they are contained Virtual servers A virtual server is a cluster group that consists of a static IP Address resource and a Network Name resource Several virtual servers can be created By assigning ownership of the virtual servers to the different server nodes the processing load on the storage systems can be distributed between the nodes of a cluster The creation of a virtual server allows r...

Page 60: ...state This physical disk in the common cluster disk array plays a critical role in cluster operations The Quorum disk offers a means of persistent storage The disk must provide physical storage that can be accessed by all nodes in the cluster If a node has control of the quorum resource upon startup it can initiate the cluster In addition if the node can communicate with the node that owns the quo...

Page 61: ...hares are created organized in groups and placed within the folders using Failover Cluster Management exclusively Hierarchy of cluster resource components Figure 25 page 61 depicts the cluster resource hierarchy as follows Physical Disk resources are placed in a cluster group and relate to the basic disk When a Physical Disk resource is created through Failover Cluster Management the resource shou...

Page 62: ...sed by the network to give each group a virtual name Without this virtual reference to the group the only way to address a share that is created as a clustered resource is by node name Physical node names do not transition during a failover whereas virtual names do For example if a client maps a network share to Node1 Eng1 instead of Fileserver1 Eng1 when Node1 fails and Node2 assumes ownership th...

Page 63: ...dresses are required Virtual names and addresses are the only identification used by clients on the network Because the names and addresses are virtual their ownership can transition from one node to the other during a failover preserving access to the resources in the cluster group A cluster uses at least two network connections on each node The private cluster interconnect or heartbeat crossover...

Page 64: ...r that does not force the failover of the node Clusters can be configured with single path but if a failure in the path does occur all of the node resources will be failed to the non affected node Using multipath data paths for high availability HP recommends that cluster configurations be deployed with dual data paths for high availability Clusters can be configured with single path but if a fail...

Page 65: ...se steps guarantee that the data on disks that are attached to the shared storage bus is not lost or corrupted This can happen when multiple nodes try to simultaneously write to the same disk that is not yet protected by the cluster software Use Table 4 page 65 to determine which nodes and storage devices should be presented during each step Table 4 Power sequencing for cluster installation Commen...

Page 66: ...rvice recognizes only one network interface per subnet Renaming the local area connection icons HP recommends changing the names of the network connections for clarity The naming helps identify a network and correctly assign its role For example Cluster interconnect for the private network and Public connection for the public network Verifying connectivity and name resolution To verify name resolu...

Page 67: ...problems A comprehensive and easy to read report is created listing any potential configuration issues before the cluster is created Some issues that can occur are No shared disk for the Quorum disk A shared disk must be created with a NTFS partition at least 512 MB in size Use of DHCP addresses for network connections All Network adapters must be configured with static IP addresses in a cluster c...

Page 68: ...l contain all resources owned by that node or the administrator may choose to create a resource group and virtual server for each physical disk resource Additionally the administrator should try to balance the load of the groups and their resources on the cluster between the nodes Node based cluster groups Creating only one resource group and one virtual server for each node facilitates group and ...

Page 69: ...and are detailed in the Microsoft Services for NFS section within the Other network file and print services chapter Changes to NFS setup information are automatically replicated to all nodes in a cluster 3 Create the file share resources 4 Assign ownership of the file share resources to the resource groups a Divide ownership of the file share resource between the resource groups which are in turn ...

Page 70: ...password and group files on each server node must be updated periodically to maintain consistency and prevent users or groups from being inadvertently squashed Non cluster aware file sharing protocols Services for Macintosh SFM File and Print Services for NetWare HTTP file sharing protocols are not cluster aware and will experience service interruption if installed on a clustered resource during f...

Page 71: ... location of the cache file be placed on a separate disk from the original data In this case a physical disk resource for the cache file disk should be created in the same cluster group as the intended Shadow Copy resource and the volume for which snapshots will be enabled The resource should be created prior to the establishment of Shadow Copies The Shadow Copy resource should be dependent on bot...

Page 72: ...difying Administer Server for NFS only from computers in a trusted domain Restart the Server for NFS service after the cluster service restarts Choose the appropriate sharing mode Use the command line properly when creating or modifying NFS share cluster resources Use hard mounts Use the correct virtual server name Print services in a cluster The Windows Storage Server 2012 or 2012 R2 Cluster serv...

Page 73: ...r node Processing continues but in a reduced manner because all operations must be processed on the remaining node s In clusters containing more than two nodes additional fail over rules can be applied For instance groups can be configured to fail over different nodes to balance the additional work load imposed by the failed node Nodes can be excluded from the possible owners list to prevent a res...

Page 74: ... the cluster nodes 2 Removing power from the cluster nodes The sequence of these steps is critical The devices must be shut down before the storage subsystem Improperly shutting down the nodes and the storage subsystem causes corruption and loss of data CAUTION Before powering down the cluster nodes follow the proper shutdown procedure as previously illustrated See Shutting down one cluster node p...

Page 75: ...re notification on each node You can launch the Event Notifier Configuration Wizard From Windows Server Manager select Tools HP StoreEasy Configure Email Alerts Maintaining your storage system HP recommends the following maintenance guidelines for upgrading your system components operating system software firmware and drivers depending on your environment If your storage system is working properly...

Page 76: ...gating the data from HP web based agents and management utilities the SMH provides a common easy to use interface for displaying the following information Hardware fault and status monitoring System thresholds Diagnostics Software and firmware version control for an individual server The SMH Help menu provides documentation for using maintaining and troubleshooting the application For more informa...

Page 77: ... disconnect a cable the SMH interface might not display alerts when you click the Refresh button You can force a hard refresh by clicking the Home button or by navigating to the problem area The default refresh interval is two minutes To change the interval in the Settings menu select Autorefresh and then Configure Page refresh settings The minimum interval is five seconds and the maximum is 30 mi...

Page 78: ...th the external network none of the other items in the Enclosure Information section can be displayed Network This section shows the status of the network connections Storage This section displays information about the Smart Array and storage controllers within the storage system The Storage System page is organized as a left panel and a main page Figure 27 Storage system The left panel provides l...

Page 79: ...main board motherboard Upgrade the factory installed operating system using the Microsoft Upgrade program for license validation Reinstall the operating system because of a failure that has permanently disabled it The COA label location varies by server model On rack mounted server models the COA label is located either on the front section of the right panel or on the right front corner of the to...

Page 80: ...select Enable You will need to obtain the Cluster Internal IP address and add it manually to the registry After initial installation or a system recovery the connection status for the second node is listed as The second node is not accessible 1 Use iLO or Remote Desktop to log in to the second node and retrieve the Cluster Internal IP address 2 Open a Command Prompt or PowerShell on the first node...

Page 81: ...cess to your HA file servers from using the proxy To resolve this issue create MSR Microsoft Reserved Partition on the disks that you want to use in the cluster Enter the following PowerShell command at an While validating a cluster the following message might be elevated PowerShell command prompt to determine the disks that require a new displayed for each cluster MSR partition Get disk where _ P...

Page 82: ...the complete remaining space is used g format fs ntfs quick label disk label h exit 3 Enter the Get partition DiskNumber disk number from above command to verify the new partitions Method 2 Non destructive partition creation IMPORTANT To use this method you must have at least 128 MB of unpartitioned space on the disk To create the missing partition using PowerShell perform the following steps 1 Op...

Page 83: ... may occur HP Insight Management CSP WBEM Providers for Windows error codes The HP Insight Management CSP WBEM Providers for Windows error codes are listed in Table 6 page 83 Table 6 HP Insight Management CSP WBEM Providers for Windows errors Resolution Event Log Entry Type Source Description Error code Retry query to provider after 3 minutes Informational HP CSP WBEM Providers The CSP Enclosure P...

Page 84: ...Success HP CSP WBEM Providers CSP Server Provider initialization successful 0x931 Check the provider logs for details Warning HP CSP WBEM Providers CSP Server provider does not give instances for top level class HP_WinComputerSystem 0x932 Check the provider logs for details Error HP CSP WBEM Providers Querying the top level class HP_WinComputerSystem failed in CSP Server Provider 0x934 HP Support ...

Page 85: ...ion platforms This solution allows you to monitor Microsoft Windows environments and HP storage products through a common OpsMgr console To download HP management packs for Microsoft System Center Operations Manager including installation configuration and usage documentation visit the HP Management Packs for Microsoft Systems Center site at www hp com go storageworks scom2007 Removing and replaci...

Page 86: ...ility to delete logical drives For more information about ORCA see the Configuring Arrays on HP Smart Array Controllers Reference Guide which is available at http www hp com support manuals Under servers select Server Management and then select HP Smart Array Advanced Pack Software under Server Management Software Drive letters are not assigned after a restore When a system that has existing data ...

Page 87: ...eate a system recovery USB flash drive 1 Obtain a blank 8 GB or larger USB flash drive 2 Insert the USB flash device into your workstation or laptop 3 Open an elevated command prompt with Administrator privileges 4 At the command prompt enter diskpart 5 At the diskpart prompt enter list disk 6 Identify the disk number that corresponds to the flash drive This is typically the last disk listed 7 Ent...

Page 88: ... with a DVD or USB flash device page 86 2 When the Set Up Windows wizard appears select your desired language regional settings keyboard layout and accept the EULA After completing the wizard an attempt is made to discover the second node The attempt fails and the following error message displays Figure 28 Error message during second node discovery 3 Click Cancel A pop up window displays with the ...

Page 89: ... a member of the local administrators group In Server Manager select Configuration Local Users and Groups to add any domain users to the Administrators group 9 Remove the failed node from the cluster also called evicting the node before you add the newly recovered node to the cluster See the following Microsoft article for more information http technet microsoft com en us library cc784955 v WS 10 ...

Page 90: ...etwork click Cancel 9 Select one of the following options and click Next Use the latest available image Select this option to use the backup image that was recently created If you are restoring from the network this option is unavailable Select a system image Select this option to choose a different image to restore from or to restore from the network 10 If you are restoring from the network click...

Page 91: ...d with Windows recovery IMPORTANT Do not interrupt the recovery process 18 Remove the directly connected DVD or flash device or remotely connected iLO virtual DVD or flash device from the server Restoring the system with Windows Recovery Environment 91 ...

Page 92: ...egister your product at the Subscriber s Choice for Business website http www hp com go e updates After registering you receive email notification of product enhancements new driver versions firmware updates and other product resources Related information You can find related documentation at http www hp com support StoreEasy3000Manuals HP websites For additional HP information see the following H...

Page 93: ...mponent at a time Racks can become unstable if more than one component is extended Customer self repair HP customer self repair CSR programs allow you to repair your storage product If a CSR part needs replacing HP ships the part directly to you so that you can install it at your convenience Some parts do not qualify for CSR Your HP authorized service provider will determine whether a repair can b...

Page 94: ... that meets your needs To help us improve the documentation send any errors suggestions or comments to Documentation Feedback docsfeedback hp com Include the document title and part number version number or the URL when submitting your feedback 94 Documentation feedback ...

Page 95: ...he System Recovery DVD is run the System Recovery process will configure the storage system using the factory default settings listed in the table below HP StoreEasy 3000 Storage systems do not include preconfigured data volumes The administrator must configure data storage for the storage system The system reserved partition contains the operating system boot loader and allows you to enable BitLo...

Page 96: ...HP Kazakhstan ЖШС Хьюлетт Паккард К Қазақстан Алматы қ Бостандық ауданы Тимирязев к сі 28В тел факс 7 727 355 35 50 7 727 355 35 51 Manufacturing date The manufacturing date is defined by the serial number CCSYWWZZZZ HP serial number format for this product Valid date formats include YWW where Y indicates the year counting from within each new decade with 2000 as the starting point for example 238...

Page 97: ...Servers http www hp com support EnterpriseServers Warranties HP Storage Products http www hp com support Storage Warranties HP Networking Products http www hp com support Networking Warranties Warranty information 97 ...

Page 98: ...figuration Protocol DNS Domain Name System fault tolerance The capacity to cope with internal hardware problems without interrupting the system s data availability often by using backup systems brought online when a failure is detected Many systems provide fault tolerance by using RAID architecture to give protection against loss of data when a single disk drive fails Using RAID 1 3 5 6 10 or 50 t...

Page 99: ...f storage devices available to one or more servers SAS Serial Attached SCSI SATA Serial Advanced Technology Attachment SNMP Simple Network Management Protocol A widely used network monitoring and control protocol Data is passed from SNMP agents which are hardware and or software processes reporting activity in each network device hub router bridge and so on to the workstation console used to overs...

Page 100: ...k adapter 66 shared disks 67 connectivity verifying 66 contacting HP 92 customer self repair 93 D data blocks 29 Data Deduplication 25 data striping 29 disk access verifying 67 Disk Management extending volumes 37 documentation providing feedback on 94 domain membership verifying 66 drive LED definitions 12 dual data paths 64 dynamic disks spanning multiple LUNs 31 E EAC marking Belarus Kazakhstan...

Page 101: ...ves and shadow copies 41 N network name resource 62 network planning 63 network requirements cluster 64 NFS share resource 71 node server 58 O online spares 30 operating system logical drives 95 OpsMgr see Microsoft Systems Center Operations Manager SCOM P partitions extended 31 primary 31 permissions file level 49 list adding users and groups 50 removing users and groups 50 modifying 50 resetting...

Page 102: ...t websites contacting HP 92 HP 84 92 Subscribers s Choice for Business 92 Subscription service 92 System Management Homepage description 76 Help menu 76 main page 77 starting 76 Storage System page 78 system recovery DVD 86 USB flash drive 87 Systems Insight Display LED combinations 13 T technical support see Support websites Telnet 23 troubleshooting tools Microsoft Systems Center Operations Mana...

Reviews: