EasyManua.ls Logo

Hitachi VSP F1500 User Manual

Hitachi VSP F1500
530 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #197 background imageLoading...
Page #197 background image
Figure 5-15 Script examples of virtual volume operation (Dynamic Tiering)
(3/3)
Configuring iSCSI virtual ports
You can use CCI to enable and disable the iSCSI virtual port mode and set
and delete virtual port numbers for iSCSI ports.
Provisioning operations with CCI
5-43
Command Control Interface User and Reference Guide

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the Hitachi VSP F1500 and is the answer not in the manual?

Hitachi VSP F1500 Specifications

General IconGeneral
BrandHitachi
ModelVSP F1500
CategoryServer
LanguageEnglish

Summary

Preface

Intended audience

Describes the target audience for this document, outlining the expected familiarity with data processing and storage systems.

Product version

Specifies the Command Control Interface software version this document revision applies to.

Release notes

Provides information on where to find CCI release notes, which may contain requirements or corrections.

Changes in this revision

Details the modifications and additions made in the current revision of the document.

Referenced documents

Lists related documentation and manuals for further information on Hitachi storage systems and software.

Document conventions

Explains terminology and typographic conventions used throughout the document for clarity and consistency.

Convention for storage capacity values

Defines the units and calculation methods for physical and logical storage capacity values used in the document.

Accessing product documentation

Guides users on how to access the most current product documentation and updates.

Getting help

Provides contact information and resources for technical support and online communities.

Comments

Instructs users on how to submit feedback and comments regarding the document.

1 Overview

About Command Control Interface

Introduces the Command Control Interface (CCI) software and its role in storage system configuration and data management.

CCI functions

Details the functionalities provided by CCI, including replication, data protection, and provisioning operations.

CCI functions available on all RAID storage systems

Lists the CCI functionalities that are common across all supported Hitachi Data Systems RAID storage systems.

In-system replication

Describes CCI's command-line control for local replication operations like ShadowImage, Thin Image, and Copy-on-Write Snapshot.

Remote replication

Explains CCI's command-line control for remote replication operations, including TrueCopy, Universal Replicator, and global-active device.

Data protection

Details CCI's support for data protection operations, including Database Validator and Data Retention Utility.

2 CCI software environment

Overview of the CCI software environment

Describes the CCI software environment, including components on hosts and storage systems.

CCI components on the RAID storage system

Explains the CCI components residing on the RAID storage system, focusing on the command device.

CCI instance components on the host server

Details the components of a CCI instance on a host server, including HORCM operational environment.

CCI instance configurations

Explains the basic unit of CCI software structure and its possible configurations.

Host machines that can be paired

Discusses host machines that can be paired for operations, considering CCI version and OS platform compatibility.

Configuration definition file

Describes the configuration definition file, which defines a CCI instance and its connected hosts, volumes, and groups.

Configuration definition file settings

Details the settings within the configuration definition file, including HORCM_MON, HORCM_CMD, and HORCM_DEV parameters.

ShadowImage

Explains ShadowImage operations and configurations, including duplicated mirroring and cascading pairs.

Cascading connections for TrueCopy and ShadowImage

Describes how cascading connections for TrueCopy and ShadowImage can be set up using configuration definition files.

CCI software files

Lists and describes CCI files supplied with the software, log files, and user-created files.

CCI log and trace files

Explains the CCI log and trace files, including their storage locations and purposes for troubleshooting.

User-created files

Describes user-created files, such as CCI scripts, used for automated and unattended copy operations.

User environment variable

Explains the use of environment variables when HORCM or commands are invoked.

3 CCI functions

System configuration using CCI

Describes system configurations using in-band and out-of-band methods, including connecting to an in-band CCI server via out-of-band.

Connecting to CCI server already connected by In-Band method using Out-of-Band method

Explains how to connect to a CCI server using the out-of-band method, specifying CCI server ports as virtual command devices.

Hardware requirements

Details the hardware requirements for CCI, including SCSI path through driver and platform support.

User authentication

Explains how CCI allows user authentication using operation authority and the mandatory nature of user authentication for configuration and out-of-band operations.

Command operation authority and user authentication

Describes how CCI executes commands based on user operation authority and enables user authentication.

Relation between resource groups and command operations

Explains how operation for resource groups differs based on command devices used and the relationship between users, command devices, and resource groups.

Resource lock function

Describes the resource lock command to prevent multiple users from changing the same resource configuration simultaneously.

Command execution modes

Explains the two modes for executing configuration setting commands: Line-by-line and Transaction mode, including available checks.

Resource location and parameter

Details MP blade names and parameters for VSP G1000, G1500, VSP F1500, VSP Gx00, and VSP Fx00 models.

LDEV grouping function

Explains how CCI enables grouping of multiple LDEVs through device group and copy group functions.

Pair operations with mainframe volumes

Describes how to create pairs with mainframe LDEVs using CCI, noting limitations on replication functions.

Global storage virtualization function

Explains how global storage virtualization minimizes configuration file rewrites when operating migrated volumes.

4 Starting up CCI

Starting up on UNIX systems

Provides instructions for starting up one or two instances of CCI on UNIX systems.

Starting up on Windows systems

Provides instructions for starting up one or two instances of CCI on Windows systems.

Starting up on OpenVMS systems

Provides instructions for starting up one or two instances of CCI on OpenVMS systems.

Starting CCI as a service (Windows systems)

Explains how to start CCI as a service in Windows systems using the svcexe.exe command and sample script files.

5 Provisioning operations with CCI

About provisioning operations

Introduces provisioning operations that can be performed on Hitachi storage systems using CCI.

Available provisioning operations

Lists the provisioning operations that can be performed using CCI.

Provisioning operations that can be performed on device groups

Details provisioning operations executable by specifying a device group, enabling operations on all LDEVs in the group simultaneously.

Workflow for performing provisioning operations

Outlines the order of operations for provisioning, including logging in, locking resources, and viewing group information.

Resource group operations

Describes how to create and delete resource groups, and display resource group information.

Internal volume operations

Explains operations for creating internal open-systems and mainframe volumes, including LDEV creation and configuration.

Virtual volume (Dynamic Provisioning) operations

Details the provisioning operations for creating virtual volumes (Dynamic Provisioning) and making LDEVs available to hosts.

Virtual volume (Dynamic Provisioning for Mainframe) operations

Describes provisioning operations for creating virtual volumes (Dynamic Provisioning for Mainframe) and making LDEVs available to hosts.

Virtual volume (Dynamic Tiering) operations

Explains the operational flow for using virtual volumes (Dynamic Tiering), including pool creation and performance monitoring.

Configuring iSCSI virtual ports

Guides on enabling/disabling iSCSI virtual port mode and setting/deleting virtual port numbers for iSCSI ports.

External volume operations

Details operations for creating external volumes via Fibre Channel and iSCSI, including mapping and modification.

Virtual Partition Manager operations

Explains how Virtual Partition Manager operations within CCI include migrating LDEVs, parity groups, and external volume groups.

Server Priority Manager operations

Describes how Server Priority Manager prioritizes host I/O operations for high-speed processing.

Virtual storage machine operations

Explains operations for creating host groups, adding LDEVs, and removing resources from a virtual storage machine.

6 Data replication operations with CCI

About data replication operations

Provides an overview of data replication features in RAID storage systems, including local and remote replication.

Features of paired volumes

Explains how paired logical volumes are handled by replication functions and managed by servers.

Using CCI with ShadowImage and TrueCopy

Describes how to perform ShadowImage and TrueCopy operations using CCI commands for nondisruptive volume backup.

Using CCI with Thin Image

Explains how to perform Hitachi Thin Image operations using raidcom commands to store snapshots.

Using CCI with global-active device

Details the use of CCI for global-active device operations, requiring CCI command devices and configuration files.

ShadowImage operations

Provides details on ShadowImage configuration, requirements, and functions like pair creation, splitting, and resynchronization.

TrueCopy operations

Explains how CCI TrueCopy commands operate with UNIX/PC servers and RAID storage systems for failover and backup.

TrueCopy, ShadowImage, and Universal Replicator operations

Covers operations for TrueCopy, ShadowImage, and Universal Replicator, including volume pair management and status.

Copy-on-Write Snapshot operations

Describes Copy-on-Write Snapshot operations, including virtual volume mapping and snapshot creation.

Controlling Volume Migration

Explains how to control Volume Migration using CLI, including compatibility considerations and command specifications.

Universal Replicator MxN configuration and control

Details Universal Replicator MxN configuration and control, including timestamps and journal data arbitration.

Duplication of CCI applications

Outlines the requirements for duplicating CCI applications to ensure data consistency across multiple storage systems.

Remote volume discovery

Explains how to discover remote volumes by exporting and importing volume information using inqraid and raidscan commands.

7 Data protection operations with CCI

Data protection operations

Describes CCI's data protection functions, including Data Retention Utility, Volume Retention Manager, and Database Validator.

Protection parameters and operations

Details how RAID storage systems set protection checking parameters for LUs through CCI and its command device.

Data Protection facility

Explains the Data Protection Facility's main operations to protect volumes and prevent wrong operations.

Examples for configuration and protected volumes

Provides examples of two-host and one-host configurations for data protection and protected volumes.

Operation authority with CMD security enabled

Describes operation authority for LUs when CMD security is enabled, outlining requirements for host connection and pair operations.

Target commands for protection

Lists commands controlled by the Data Protection Facility and explains how CCI rejects requests for non-permitted volumes.

Permission command

Explains how CCI recognizes permitted volumes via the permission command and its relation to horcm.conf.

New options for security

Introduces new options for security, specifically raidscan -find inst and raidscan -find verify.

raidscan -find inst

Registers device file names to LDEV map tables for CCI, permitting matching volumes in protection mode.

raidscan -find verify [MU#]

Shows the relation between horcm.conf groups and Device_File registered in LDEV map tables.

raidscan -f[d]

Displays Device_File registered on the HORCM group, based on the LDEV defined in the local instance configuration definition file.

Permitting protected volumes

Explains the need for protection mode recognition and the role of the permission command for HORCM startup.

With a $HORCMPERM file

Details the execution of the permitted volume file registration ($HORCMPERM file) if it exists.

Naming of $HORCMPERM file on UNIX systems

Specifies the default path for the $HORCMPERM file on UNIX systems.

Naming of $HORCMPERM file on Windows systems

Specifies the default path for the $HORCMPERM file on Windows systems.

Without a $HORCMPERM file: Commands to run on different operating systems

Provides commands to permit all volumes on the host if no $HORCMPERM file exists.

Environment variables

Discusses environment variables like $HORCMPROMOD and $HORCMPERM for managing protection modes.

$HORCMPROMOD

Explains how the $HORCMPROMOD environment variable turns protection mode ON or OFF.

$HORCMPERM

Specifies the HORCM permission file name, with default paths for UNIX and Windows systems.

Determining the protection mode command device

Explains how to find the protection mode command device using the horcctl -D command.

8 Examples of using CCI commands

Group version control for mixed storage system configurations

Explains how CCI checks facility versions for mixed storage system configurations and supports group version control.

LDM volume discovery and flushing for Windows

Details how to use CCI configuration files to understand LDM volume relationships with physical volumes in Windows.

Special facilities for Windows systems

Describes special facilities for Windows systems, including signature changing and GPT disk support.

Host group control

Explains how RAID storage systems define host groups in ports and allocate host LUs, supporting host group and LUN specification.

Using CCI SLPR security

Describes how CCI SLPR security protects target volumes by defining command devices through the Virtual Partition Manager feature.

9 Troubleshooting

General troubleshooting

Provides general troubleshooting steps for CCI software and server issues, including checking configuration and logs.

Operational notes and restrictions for CCI operations

Covers important operational notes and restrictions for CCI, including volume failure handling and coexistence with LVM mirror.

Error messages and error codes

Lists system log messages, command error messages, and SSB codes with their conditions and recommended actions.

Calling Hitachi Data Systems customer support

Provides guidance on contacting customer support, including information to provide for efficient problem resolution.

Related product manuals