EasyManua.ls Logo

Hitachi VSP F1500 User Manual

Hitachi VSP F1500
530 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #288 background imageLoading...
Page #288 background image
Data protection operations
User data files are normally placed on a disk through a software layer such as
a file system, LVM, disk driver, SCSI protocol driver, bus adapter, and SAN
switching fabric. Data corruption can happen due to software layer bugs or
human error. CCI Data Protection Facility does not prevent these types of
errors. On the other hand, the purpose of data protection is to prevent
writing to volumes that the RAID storage system is guarding.
Data protection functions include:
• Data Retention Utility
• Volume Retention Manager
• Volume Security
• Encryption License Key
• Database Validator
Data Retention Utility
The purpose of the Data Retention Utility is to prevent writing to volumes
that the RAID storage system is guarding. Similar to the command that
supports Database Validator, Data Retention Utility sets a protection attribute
for the specified LU.
• Hide from Inquiry command. The RAID storage system conceals the
target volumes from the SCSI Inquiry command by responding
"unpopulated volume" (0x7F) to the device type.
• SIZE 0 volume. The RAID storage system replies with "SIZE 0" to the
target volumes through the SCSI Read capacity command.
• Read protection. The RAID storage system protects reading from the
target volumes by responding with the "Illegal function" check condition
(SenseKey = 0x05, SenseCode = 0x2200).
• Write protection. The RAID storage system replies with "Write Protect"
in the mode sense header, and protects from writing the target volumes
by responding with the "Write Protect" check condition (SenseKey=0x07,
SenseCode=0x2700).
• S-VOL disabling.
The RAID storage system rejects the command execution of the copy
series program product for not to be overwritten the secondary (target)
volume by the copy process of copy series program product (TrueCopy,
Universal Replicator, ShadowImage, Copy-on-Write Snapshot, global-
active device), and protects the target volume. This option can be used
with the other Data Retention Utility options in parallel. For example, if
you want to protect from the writing by the both copy series program
product and the host accessing, set the both write protection option and
this option. Only the setting of write protection option cannot protect the
target volume from the writing executed by the copy processing of the
copy series program product.
7-2
Data protection operations with CCI
Command Control Interface User and Reference Guide

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the Hitachi VSP F1500 and is the answer not in the manual?

Hitachi VSP F1500 Specifications

General IconGeneral
BrandHitachi
ModelVSP F1500
CategoryServer
LanguageEnglish

Summary

Preface

Intended audience

Describes the target audience for this document, outlining the expected familiarity with data processing and storage systems.

Product version

Specifies the Command Control Interface software version this document revision applies to.

Release notes

Provides information on where to find CCI release notes, which may contain requirements or corrections.

Changes in this revision

Details the modifications and additions made in the current revision of the document.

Referenced documents

Lists related documentation and manuals for further information on Hitachi storage systems and software.

Document conventions

Explains terminology and typographic conventions used throughout the document for clarity and consistency.

Convention for storage capacity values

Defines the units and calculation methods for physical and logical storage capacity values used in the document.

Accessing product documentation

Guides users on how to access the most current product documentation and updates.

Getting help

Provides contact information and resources for technical support and online communities.

Comments

Instructs users on how to submit feedback and comments regarding the document.

1 Overview

About Command Control Interface

Introduces the Command Control Interface (CCI) software and its role in storage system configuration and data management.

CCI functions

Details the functionalities provided by CCI, including replication, data protection, and provisioning operations.

CCI functions available on all RAID storage systems

Lists the CCI functionalities that are common across all supported Hitachi Data Systems RAID storage systems.

In-system replication

Describes CCI's command-line control for local replication operations like ShadowImage, Thin Image, and Copy-on-Write Snapshot.

Remote replication

Explains CCI's command-line control for remote replication operations, including TrueCopy, Universal Replicator, and global-active device.

Data protection

Details CCI's support for data protection operations, including Database Validator and Data Retention Utility.

2 CCI software environment

Overview of the CCI software environment

Describes the CCI software environment, including components on hosts and storage systems.

CCI components on the RAID storage system

Explains the CCI components residing on the RAID storage system, focusing on the command device.

CCI instance components on the host server

Details the components of a CCI instance on a host server, including HORCM operational environment.

CCI instance configurations

Explains the basic unit of CCI software structure and its possible configurations.

Host machines that can be paired

Discusses host machines that can be paired for operations, considering CCI version and OS platform compatibility.

Configuration definition file

Describes the configuration definition file, which defines a CCI instance and its connected hosts, volumes, and groups.

Configuration definition file settings

Details the settings within the configuration definition file, including HORCM_MON, HORCM_CMD, and HORCM_DEV parameters.

ShadowImage

Explains ShadowImage operations and configurations, including duplicated mirroring and cascading pairs.

Cascading connections for TrueCopy and ShadowImage

Describes how cascading connections for TrueCopy and ShadowImage can be set up using configuration definition files.

CCI software files

Lists and describes CCI files supplied with the software, log files, and user-created files.

CCI log and trace files

Explains the CCI log and trace files, including their storage locations and purposes for troubleshooting.

User-created files

Describes user-created files, such as CCI scripts, used for automated and unattended copy operations.

User environment variable

Explains the use of environment variables when HORCM or commands are invoked.

3 CCI functions

System configuration using CCI

Describes system configurations using in-band and out-of-band methods, including connecting to an in-band CCI server via out-of-band.

Connecting to CCI server already connected by In-Band method using Out-of-Band method

Explains how to connect to a CCI server using the out-of-band method, specifying CCI server ports as virtual command devices.

Hardware requirements

Details the hardware requirements for CCI, including SCSI path through driver and platform support.

User authentication

Explains how CCI allows user authentication using operation authority and the mandatory nature of user authentication for configuration and out-of-band operations.

Command operation authority and user authentication

Describes how CCI executes commands based on user operation authority and enables user authentication.

Relation between resource groups and command operations

Explains how operation for resource groups differs based on command devices used and the relationship between users, command devices, and resource groups.

Resource lock function

Describes the resource lock command to prevent multiple users from changing the same resource configuration simultaneously.

Command execution modes

Explains the two modes for executing configuration setting commands: Line-by-line and Transaction mode, including available checks.

Resource location and parameter

Details MP blade names and parameters for VSP G1000, G1500, VSP F1500, VSP Gx00, and VSP Fx00 models.

LDEV grouping function

Explains how CCI enables grouping of multiple LDEVs through device group and copy group functions.

Pair operations with mainframe volumes

Describes how to create pairs with mainframe LDEVs using CCI, noting limitations on replication functions.

Global storage virtualization function

Explains how global storage virtualization minimizes configuration file rewrites when operating migrated volumes.

4 Starting up CCI

Starting up on UNIX systems

Provides instructions for starting up one or two instances of CCI on UNIX systems.

Starting up on Windows systems

Provides instructions for starting up one or two instances of CCI on Windows systems.

Starting up on OpenVMS systems

Provides instructions for starting up one or two instances of CCI on OpenVMS systems.

Starting CCI as a service (Windows systems)

Explains how to start CCI as a service in Windows systems using the svcexe.exe command and sample script files.

5 Provisioning operations with CCI

About provisioning operations

Introduces provisioning operations that can be performed on Hitachi storage systems using CCI.

Available provisioning operations

Lists the provisioning operations that can be performed using CCI.

Provisioning operations that can be performed on device groups

Details provisioning operations executable by specifying a device group, enabling operations on all LDEVs in the group simultaneously.

Workflow for performing provisioning operations

Outlines the order of operations for provisioning, including logging in, locking resources, and viewing group information.

Resource group operations

Describes how to create and delete resource groups, and display resource group information.

Internal volume operations

Explains operations for creating internal open-systems and mainframe volumes, including LDEV creation and configuration.

Virtual volume (Dynamic Provisioning) operations

Details the provisioning operations for creating virtual volumes (Dynamic Provisioning) and making LDEVs available to hosts.

Virtual volume (Dynamic Provisioning for Mainframe) operations

Describes provisioning operations for creating virtual volumes (Dynamic Provisioning for Mainframe) and making LDEVs available to hosts.

Virtual volume (Dynamic Tiering) operations

Explains the operational flow for using virtual volumes (Dynamic Tiering), including pool creation and performance monitoring.

Configuring iSCSI virtual ports

Guides on enabling/disabling iSCSI virtual port mode and setting/deleting virtual port numbers for iSCSI ports.

External volume operations

Details operations for creating external volumes via Fibre Channel and iSCSI, including mapping and modification.

Virtual Partition Manager operations

Explains how Virtual Partition Manager operations within CCI include migrating LDEVs, parity groups, and external volume groups.

Server Priority Manager operations

Describes how Server Priority Manager prioritizes host I/O operations for high-speed processing.

Virtual storage machine operations

Explains operations for creating host groups, adding LDEVs, and removing resources from a virtual storage machine.

6 Data replication operations with CCI

About data replication operations

Provides an overview of data replication features in RAID storage systems, including local and remote replication.

Features of paired volumes

Explains how paired logical volumes are handled by replication functions and managed by servers.

Using CCI with ShadowImage and TrueCopy

Describes how to perform ShadowImage and TrueCopy operations using CCI commands for nondisruptive volume backup.

Using CCI with Thin Image

Explains how to perform Hitachi Thin Image operations using raidcom commands to store snapshots.

Using CCI with global-active device

Details the use of CCI for global-active device operations, requiring CCI command devices and configuration files.

ShadowImage operations

Provides details on ShadowImage configuration, requirements, and functions like pair creation, splitting, and resynchronization.

TrueCopy operations

Explains how CCI TrueCopy commands operate with UNIX/PC servers and RAID storage systems for failover and backup.

TrueCopy, ShadowImage, and Universal Replicator operations

Covers operations for TrueCopy, ShadowImage, and Universal Replicator, including volume pair management and status.

Copy-on-Write Snapshot operations

Describes Copy-on-Write Snapshot operations, including virtual volume mapping and snapshot creation.

Controlling Volume Migration

Explains how to control Volume Migration using CLI, including compatibility considerations and command specifications.

Universal Replicator MxN configuration and control

Details Universal Replicator MxN configuration and control, including timestamps and journal data arbitration.

Duplication of CCI applications

Outlines the requirements for duplicating CCI applications to ensure data consistency across multiple storage systems.

Remote volume discovery

Explains how to discover remote volumes by exporting and importing volume information using inqraid and raidscan commands.

7 Data protection operations with CCI

Data protection operations

Describes CCI's data protection functions, including Data Retention Utility, Volume Retention Manager, and Database Validator.

Protection parameters and operations

Details how RAID storage systems set protection checking parameters for LUs through CCI and its command device.

Data Protection facility

Explains the Data Protection Facility's main operations to protect volumes and prevent wrong operations.

Examples for configuration and protected volumes

Provides examples of two-host and one-host configurations for data protection and protected volumes.

Operation authority with CMD security enabled

Describes operation authority for LUs when CMD security is enabled, outlining requirements for host connection and pair operations.

Target commands for protection

Lists commands controlled by the Data Protection Facility and explains how CCI rejects requests for non-permitted volumes.

Permission command

Explains how CCI recognizes permitted volumes via the permission command and its relation to horcm.conf.

New options for security

Introduces new options for security, specifically raidscan -find inst and raidscan -find verify.

raidscan -find inst

Registers device file names to LDEV map tables for CCI, permitting matching volumes in protection mode.

raidscan -find verify [MU#]

Shows the relation between horcm.conf groups and Device_File registered in LDEV map tables.

raidscan -f[d]

Displays Device_File registered on the HORCM group, based on the LDEV defined in the local instance configuration definition file.

Permitting protected volumes

Explains the need for protection mode recognition and the role of the permission command for HORCM startup.

With a $HORCMPERM file

Details the execution of the permitted volume file registration ($HORCMPERM file) if it exists.

Naming of $HORCMPERM file on UNIX systems

Specifies the default path for the $HORCMPERM file on UNIX systems.

Naming of $HORCMPERM file on Windows systems

Specifies the default path for the $HORCMPERM file on Windows systems.

Without a $HORCMPERM file: Commands to run on different operating systems

Provides commands to permit all volumes on the host if no $HORCMPERM file exists.

Environment variables

Discusses environment variables like $HORCMPROMOD and $HORCMPERM for managing protection modes.

$HORCMPROMOD

Explains how the $HORCMPROMOD environment variable turns protection mode ON or OFF.

$HORCMPERM

Specifies the HORCM permission file name, with default paths for UNIX and Windows systems.

Determining the protection mode command device

Explains how to find the protection mode command device using the horcctl -D command.

8 Examples of using CCI commands

Group version control for mixed storage system configurations

Explains how CCI checks facility versions for mixed storage system configurations and supports group version control.

LDM volume discovery and flushing for Windows

Details how to use CCI configuration files to understand LDM volume relationships with physical volumes in Windows.

Special facilities for Windows systems

Describes special facilities for Windows systems, including signature changing and GPT disk support.

Host group control

Explains how RAID storage systems define host groups in ports and allocate host LUs, supporting host group and LUN specification.

Using CCI SLPR security

Describes how CCI SLPR security protects target volumes by defining command devices through the Virtual Partition Manager feature.

9 Troubleshooting

General troubleshooting

Provides general troubleshooting steps for CCI software and server issues, including checking configuration and logs.

Operational notes and restrictions for CCI operations

Covers important operational notes and restrictions for CCI, including volume failure handling and coexistence with LVM mirror.

Error messages and error codes

Lists system log messages, command error messages, and SSB codes with their conditions and recommended actions.

Calling Hitachi Data Systems customer support

Provides guidance on contacting customer support, including information to provide for efficient problem resolution.

Related product manuals