IPStor User Guide Virtual Tape Library 316855201A
User Manual: Virtual Tape Library
Open the PDF directly: View PDF .
Page Count: 164
Download | |
Open PDF In Browser | View PDF |
Sun StorageTek Virtual Tape Library VTL Prime VTL Prime Solaris User’s Guide 316855201 Rev A September 2008 Virtual Tape Library VTL Prime Solaris User’s Guide Sun Microsystems, Inc. www.sun.com Part No. 316855201 September 2008, Revision A Submit comments about this document at: glsfs@sun.com Copyright 2008 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, California 95054, U.S.A. All rights reserved. Sun Microsystems, Inc. has intellectual property rights relating to technology that is described in this document. In particular, and without limitation, these intellectual property rights may include one or more of the U.S. patents listed at http://www.sun.com/patents and one or more additional patents or pending patent applications in the U.S. and in other countries. This document and the product to which it pertains are distributed under licenses restricting their use, copying, distribution, and decompilation. No part of the product or of this document may be reproduced in any form by any means without prior written authorization of Sun and its licensors, if any. Third-party software, including font technology, is copyrighted and licensed from Sun suppliers. Parts of the product may be derived from Berkeley BSD systems, licensed from the University of California. UNIX is a registered trademark in the U.S. and in other countries, exclusively licensed through X/Open Company, Ltd. Sun, Sun Microsystems, the Sun logo, Java, AnswerBook2, docs.sun.com, and Solaris are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. and in other countries. AMD Opteron is a trademark or registered trademark of Advanced Microdevices, Inc. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. in the U.S. and in other countries. Products bearing SPARC trademarks are based upon an architecture developed by Sun Microsystems, Inc. The OPEN LOOK and Sun™ Graphical User Interface was developed by Sun Microsystems, Inc. for its users and licensees. Sun acknowledges the pioneering efforts of Xerox in researching and developing the concept of visual or graphical user interfaces for the computer industry. Sun holds a non-exclusive license from Xerox to the Xerox Graphical User Interface, which license also covers Sun’s licensees who implement OPEN LOOK GUIs and otherwise comply with Sun’s written license agreements. U.S. Government Rights—Commercial use. Government users are subject to the Sun Microsystems, Inc. standard license agreement and applicable provisions of the FAR and its supplements. DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. Copyright 2008 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, Californie 95054, Etats-Unis. Tous droits réservés. Sun Microsystems, Inc. a les droits de propriété intellectuels relatants à la technologie qui est décrit dans ce document. En particulier, et sans la limitation, ces droits de propriété intellectuels peuvent inclure un ou plus des brevets américains énumérés à http://www.sun.com/patents et un ou les brevets plus supplémentaires ou les applications de brevet en attente dans les Etats-Unis et dans les autres pays. Ce produit ou document est protégé par un copyright et distribué avec des licences qui en restreignent l’utilisation, la copie, la distribution, et la décompilation. Aucune partie de ce produit ou document ne peut être reproduite sous aucune forme, par quelque moyen que ce soit, sans l’autorisation préalable et écrite de Sun et de ses bailleurs de licence, s’il y en a. Le logiciel détenu par des tiers, et qui comprend la technologie relative aux polices de caractères, est protégé par un copyright et licencié par des fournisseurs de Sun. Des parties de ce produit pourront être dérivées des systèmes Berkeley BSD licenciés par l’Université de Californie. UNIX est une marque déposée aux Etats-Unis et dans d’autres pays et licenciée exclusivement par X/Open Company, Ltd. Sun, Sun Microsystems, le logo Sun, Java, AnswerBook2, docs.sun.com, et Solaris sont des marques de fabrique ou des marques déposées de Sun Microsystems, Inc. aux Etats-Unis et dans d’autres pays. AMD Opteron est une marque de fabrique ou une marque deposee de Advanced Microdevices, Inc. Toutes les marques SPARC sont utilisées sous licence et sont des marques de fabrique ou des marques déposées de SPARC International, Inc. aux Etats-Unis et dans d’autres pays. Les produits portant les marques SPARC sont basés sur une architecture développée par Sun Microsystems, Inc. L’interface d’utilisation graphique OPEN LOOK et Sun™ a été développée par Sun Microsystems, Inc. pour ses utilisateurs et licenciés. Sun reconnaît les efforts de pionniers de Xerox pour la recherche et le développement du concept des interfaces d’utilisation visuelle ou graphique pour l’industrie de l’informatique. Sun détient une license non exclusive de Xerox sur l’interface d’utilisation graphique Xerox, cette licence couvrant également les licenciées de Sun qui mettent en place l’interface d ’utilisation graphique OPEN LOOK et qui en outre se conforment aux licences écrites de Sun. LA DOCUMENTATION EST FOURNIE "EN L’ÉTAT" ET TOUTES AUTRES CONDITIONS, DECLARATIONS ET GARANTIES EXPRESSES OU TACITES SONT FORMELLEMENT EXCLUES, DANS LA MESURE AUTORISEE PAR LA LOI APPLICABLE, Y COMPRIS NOTAMMENT TOUTE GARANTIE IMPLICITE RELATIVE A LA QUALITE MARCHANDE, A L’APTITUDE A UNE UTILISATION PARTICULIERE OU A L’ABSENCE DE CONTREFAÇON. Revision History Name Part # Revision Date Comments VTL Prime Solaris User’s Guide 316855201 A September 2008 EC000729 This document describes procedures for using VTL Prime with either the Graphical User Interface (GUI) or Command Line Interface (CLI). VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A Support Information Sun Microsystems, Inc. (Sun) offers several methods for you to obtain additional information. Sun’s External Web Site Sun’s external Web site provides marketing, product, event, corporate, and serviceinformation. The external Web site is accessible to anyone with a Web browser and anInternet connection. The URL for the Sun external Web site is: http://www.sun.com The URL for Sun StorageTek brand‐specific information is: http://www.sun.com/storagetek Product Publications The Sun Documentation Web site provides online access to Sun product publications: http://www.docs.sun.com To order hardcopy versions of Sun publications, contact a Sun sales or marketing representative. Partners Site The Sun Partners site is a web site for partners with a Sun Partner Agreement. This site provides information about products, services, customer support, upcoming events, training programs, and sales tools to support partners. Access to this site, 316855201 • A v beyond the Partners Login page, is restricted. On the Partners Login page, Sun employees and current partners who do not have access can request a login ID and password and prospective partners can apply to become Sun StorageTek resellers. The URL for partners with a Sun Partner Agreement is: http://www.sun.com/partners/ Third‐Party Web Sites Sun is not responsible for the availability of third‐party web sites mentioned in this document. Sun does not endorse and is not responsible or liable for any content, advertising, products, or other materials that are available on or through such sites or resources. Sun will not be responsible or liable for any actual or alleged damage or loss caused by or in connection with the use of or reliance on any such content, goods, or services that are available on or through such sites or resources. Customer Support Customer support is available 24 hours a day, seven days a week, to customers with Sun or StorageTek maintenance contracts and to Sun employees. The URL for SunStorageTek support is: http://www.sun.com/storagetek/support Customer‐initiated Maintenance Customer‐initiated maintenance begins with a telephone call from you to Sun Microsystems StorageTek Support. You receive immediate attention from qualified Sun personnel, who record problem information and respond with the appropriate level of support. To contact Sun Microsystems StorageTek Support about a problem: 1. Use the telephone and call: ✎ ✎ 800.872.4786 (1.800.USA.4SUN) (inside the United States) 800.722.4786 (Canada) For international locations, go to http://www.sun.com/service/contacting/solution.html for the appropriate telephone number. 2. Describe the problem to the call taker. The call taker will ask several questions and will either route your call to or dispatch a support representative. vi VTL Prime Solaris User’s Guide • September 2008 A • 316855201 If you have the following information when you place a service call, the process will be much easier: ■ Account name ■ Site location number ■ Contact name ■ Telephone number ■ Equipment model number ■ Device address ■ Device serial number (if known) ■ Urgency of problem ■ Fault Symptom Code (FSC) ■ Problem description Sun’s Worldwide Offices You may contact any of Sunís worldwide offices to discuss complete storage, service, and support solutions for your organization. You can find address and telephone number information on Sunís external Web site at: http://www.sun.com/worldwide/ Commenting on this book Sun welcomes your comments and suggestions for improving this book. Contact us at glsfs@sun.com. Please include the title, part number, issue date, and revision. 316855201 • A Support Information vii Contents Introduction Sun StorageTek Virtual Tape Library Prime (VTL Prime) overview . . . . . . . . . . . . . . . . .1 Single Instance Repository . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 VTL Prime Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2 VTL Prime components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2 Basic Features Launch the Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4 Search for tapes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4 Understanding the objects in the tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4 VirtualTape Library System object . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4 Virtual Tape Libraries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4 Virtual Tape Drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4 Virtual Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5 Replica Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5 Deduplication Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5 Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5 Disk Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5 SAN Clients object . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5 Reports object . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5 Create a report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6 View a report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6 Export data from a report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6 Physical Resources object . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6 Rescan physical devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7 Create virtual tape libraries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8 Create virtual tapes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12 How virtual tapes are allocated from multiple LUNs . . . . . . . . . . . . . . . . . . . . . . . . . . . .16 Round Robin Logic with Tape Capacity on Demand disabled . . . . . . . . . . . . . . . . .16 Round Robin Logic with Tape Capacity on Demand enabled . . . . . . . . . . . . . . . . .16 Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17 Add SAN Clients (backup servers) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18 Assign virtual tape libraries to clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19 Mirror the VTL database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21 Check mirroring status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21 Replace a failed disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22 Fix a minor disk failure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22 Replace a disk that is part of an active mirror configuration . . . . . . . . . . . . . . . . .22 Swap the primary disk with the mirrored copy. . . . . . . . . . . . . . . . . . . . . . . . . . . .22 Remove a mirror configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22 Set Console options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23 Manage Administrators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25 VTL compression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26 VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A viii Enable/disable compression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26 View the Event Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27 Sort the Event Log. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27 Filter the Event Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27 Print/export the Event Log. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27 Refer to the Attention Required tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28 Set Server properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .29 Apply software patch updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .29 Configure VTL to send SNMP traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30 Appliance health checking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30 Data Deduplication Enable deduplication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .32 Replicating the deduplication repository . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33 Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .34 Connect appliances . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .35 Add the replication target server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .35 Data deduplication policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37 Add deduplication policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37 Modify deduplication policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .40 Perform deduplication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .40 Monitor deduplication and view statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .41 Deduplication Policies object . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .41 Individual deduplication policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .42 Repository statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .46 Reclaim data repository disk space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .48 Replicate Data Remote Replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .49 Local Replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .49 Types of replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .50 Auto Replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .51 Remote Copy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .51 Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .52 Configuring replication for virtual tapes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .53 Configuring replication for Virtual Index Tapes (VITs) . . . . . . . . . . . . . . . . . . . . . . . . . .58 Check replication status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .58 Promote a replica resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .59 Change your replication configuration options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .60 Suspend/resume replication schedule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .60 Manually start the replication process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .60 Remove a replication configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .60 Fibre Channel Target Mode Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .62 VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A ix Installation and configuration overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .63 Configure Fibre Channel hardware on server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .64 Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .64 Zoning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .64 Switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .65 Persistent binding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .66 VSA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .66 QLogic HBAs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .67 QLogic Multi-ID HBAs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .68 QLA2X00FS.CONF file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .69 Configure Fibre Channel hardware on clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .71 NetWare clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .71 HBA settings for Fibre Channel clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .72 Windows 2000/2003 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .72 HP-UX 10, 11, and 11i . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73 AIX 4.3 and higher . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73 Linux – all versions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73 Solaris 7, 8, 9, and 10 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .74 NetWare – all versions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .74 Verify your hardware configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .75 Set QLogic ports to target mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .78 Single port QLogic HBAs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .78 Multi port QLogic HBAs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .79 Associate World Wide Port Names with clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .80 iSCSI Clients Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .82 Supported platforms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .82 Windows configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .83 Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .83 Enable iSCSI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .83 Register client initiators with your VTL server . . . . . . . . . . . . . . . . . . . . . . . . . . . . .84 Add your iSCSI client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .85 Create targets for the iSCSI client to log onto . . . . . . . . . . . . . . . . . . . . . . . . . . . . .86 Log the client onto the target . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .87 Disable iSCSI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .87 Linux client configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .88 Prepare the iSCSI initiator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .88 Add your iSCSI client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .88 Create targets for the iSCSI client to log onto . . . . . . . . . . . . . . . . . . . . . . . . . . . . .89 Log the client onto the target . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .90 Email Alerts Configure Email Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .91 Modify Email Alerts properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .95 Script/program trigger information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .96 VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A x Customize email for a specific trigger . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .96 New script/program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .96 Command Line Using the command line utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .98 Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .98 Common arguments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .99 Login/logout to the VTL Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .100 Virtual devices / Clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .101 System configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .114 Replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .116 Physical devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .122 Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .124 Event Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .130 Technical support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .131 Appendix System security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .132 Install an operating system on your VTL Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .134 Install Solaris . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .134 Install a certified operating system on your VTL appliance . . . . . . . . . . . . . . . . . . . . . .134 Console installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .137 Pre-installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .137 Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .137 Troubleshooting General Console operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .138 Physical resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .140 Logical resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .141 Client cannot see tape library/drive as provisioned by VTL . . . . . . . . . . . . . . . . . .143 Take an X-ray of your system for technical support . . . . . . . . . . . . . . . . . . . . . . . . . . .145 Index VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A xi Introduction Sun StorageTek Virtual Tape Library Prime (VTL Prime) overview Sun StorageTek VTL Prime increases the speed and reliability of backups that use standard third-party backup applications by leveraging disk to emulate industrystandard tape libraries. VTL leverages your existing Fibre Channel or IP SAN to transfer data to and restore data from a disk-based virtual tape at ultra-high speeds. Since VTL Prime uses disk to back up data, it eliminates the media and mechanical errors that can occur with physical tapes and drives. And, because VTL Prime can emulate more tape drives than your physical tape library really has, more backup streams can run simultaneously, enabling organizations to easily complete their backups within the allotted backup window. Single Instance Repository Single Instance Repository (SIR) works seamlessly with VTL Prime to eliminate redundant data without impacting your established backup window, thereby minimizing storage requirements. Deduplication occurs as a separate, off-line process. After a virtual tape is unloaded from a tape drive and moved to a slot, the deduplication process scans the tape, analyzes the data, and determines whether data is unique or has already been copied to the SIR repository. The process then passes only single instances of unique data to the SIR repository; data is compressed automatically. The original virtual tape is replaced with a virtual index tape (VIT) pointing to SIR storage, freeing considerable space on the tape for more data. Deduplication occurs as a separate, off-line process. Backup and restore jobs have higher priority than deduplication. Deduplication jobs are temporarily suspended when the tape being deduplicated is needed for backup or restore; when the backup application finishes using that particular tape, the deduplication job automatically resumes from where it left off. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 1 If replication is configured, SIR replicates its repository and metadata. Data duplicated across remote sites is deduplicated at the central site, enabling only globally unique data to be replicated to the disaster recovery site. VTL Prime Configuration Once VTL Prime is configured, the backup software treats the virtual tape library as though it were just another standalone tape library attached to the backup server. This configuration is ideal for organizations that already have a backup process in place with which they are comfortable but which is not meeting all of their backup objectives. Adding a VTL Prime appliance as another tape library allows you to easily increase your parallel backup streams and take advantage of VTL Prime’s rapid data recovery without having to alter your current configuration. With the backup application managing the entire backup process, a virtual tape is just another tape. VTL Prime components There are three components to VTL Prime: • • • VTL Prime Server - Manages the VTL Prime system. VTL Prime Console - The graphical administration tool where you configure VTL Prime add/configure clients, set properties, and configure deduplication policies. VTL Prime Clients - The backup servers that use VTL Prime. VTL Prime supports Fibre Channel, SCSI, and iSCSI backup servers on most major platforms. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 2 Basic Features The VTL Console displays the configuration for your VTL appliance. The information is organized in a familiar Explorer-like tree view. The tree allows you to navigate the various VTL appliances and their configuration objects. You can expand or collapse the display to show only the information that you wish to view. To expand an item that is collapsed, click on the symbol next to the item. To collapse an item, click on the symbol next to the item. Doubleclicking on the item will also toggle the expanded/collapsed view of the item. You need to connect to a server before you can expand it. When you highlight any object in the tree, the right-hand pane contains detailed information about the object. You can select one of the tabs for more information. The Console log located at the bottom of the window displays information about the local version of the Console. The log features a drop-down box that allows you to see activity from this Console session. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 3 Launch the Console On the VTL server or a Solaris workstation with vtlconsole installed, change the directory location to the directory where the vtlconsole program resides and start the vtlconsole GUI: cd /usr/local/vtlconsole ./vtlconsole& Search for tapes The Console has a search feature that helps you find any virtual tape. To search: 1. Select Edit menu --> Find. 2. Enter the full barcode. Once you click Search, you will be taken directly to that tape in the tree. Understanding the objects in the tree VirtualTape Library System object The VirtualTape Library System object contains all of the information about your VTL system: Virtual Tape Libraries This object lists the virtual tape libraries that are currently available. Each virtual tape library consists of one or more virtual tape drives and one or more virtual tapes. Each virtual tape library and drive can be assigned to one or more backup servers (SAN clients). Each library’s virtual tapes are sorted in barcode order. For each library, you can: • • • • Create/delete virtual tapes Create/delete virtual tape drives Enable replication for tapes in the library Set tape properties for the library (enable/modify tape capacity on demand, change maximum tape capacity) For each virtual tape, you can: • • • Virtual Tape Drives Move the virtual tape to a slot, drive, or to the virtual vault Enable replication for that tape or make a single remote copy Change tape properties (change barcode, enable/modify tape capacity on demand, enable write protection, and configure Auto Archive/Replication) This object lists the standalone virtual tape drives that are currently available. Each virtual tape drive can be assigned to one or more backup servers (SAN clients). For each virtual tape drive, you can create/delete virtual tapes. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 4 Virtual Vault Replica Resources Deduplication Policies Database Disk Resources VirtualTape icons This object lists the virtual tapes that are currently in the virtual vault. The virtual vault is a tape storage area for tapes that are not inside a virtual tape library. Virtual tapes will only appear in the virtual vault after they have been moved from a virtual tape library. Virtual tapes in the vault can be replicated, exported to a physical tape, or moved to a virtual library or standalone drive. There is no limit to the number of tapes that can be in the virtual vault. Tapes in the vault are sorted in barcode order. This object lists the Replica Resources that are on this VTL server. Replica Resources store data from virtual tapes that has been replicated from a remote server. Clients do not have access to Replica Resources. This object lists the deduplication policies that have been set for virtual tapes. You can create or modify policies from this object, set clusters, perform deduplication, and view deduplication statistics and status. This object contains configuration information for the VTL. The database can be mirrored for high availability. Refer to ‘Mirror the VTL database’ for more detailed information. This object lists the virtual disks that have been allocated for The following table describes the icons that are used to describe virtual tape drives and virtual tapes in the console: Icon Description The C icon indicates that this virtual tape drive has compression enabled. SAN Clients object SAN clients are the backup servers that use the VTL. VTL supports Fibre Channel and iSCSI backup servers. For client configuration information, refer to the appropriate sections in this guide. Reports object VTL provides reports that offer a wide variety of information: • • • • • • • Throughput Physical resources - allocation and configuration Disk space usage Fibre Channel adapters configuration Replication status Virtual tape/library information Job status VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 5 Create a report 1. To create a report, right-click on the Reports object and select New. 2. Select a report. Depending upon which report you select, additional windows appear to allow you to filter the information for the report. 3. If applicable, set the date or date range for the report and indicate which SAN Clients or resources to use in the report. Selecting Past 30 Days, or Past 7 Days will create reports that generate data relative to the time of execution. Include All Resources and Clients – Includes all current and previous configurations for this server (including clients that you may have changed or deleted). Include Current Active Resources and Clients Only – Includes only those resources and clients that are currently configured for this server. The Replication Status Report has a different dialog that lets you specify a range by selecting starting and ending dates. 4. Enter a name for the report. 5. Confirm all information and click Finish to create the report. View a report When you create a report, it is displayed in the right-hand pane and is added beneath the Reports object in the configuration tree. Expand the Reports object to see the existing reports (including reports created using the Command Line Interface) available for this server. When you select an existing report, it is displayed in the right-hand pane. Export data from a report You can save the data from the server and device throughput and usage reports. The data can be saved in a comma delimited (.csv) or tab delimited (.txt) text file. To export information, right-click on a report that is generated and select Export. Physical Resources object Physical resources are all of your SCSI adapters/FC HBAs and storage devices. Storage devices include hard disks, tape drives, and tape libraries. Hard disks are used for creating virtual tape libraries/drives and virtual tapes. From Physical Resources, you can prepare new hardware and rescan devices. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 6 Physical resource icons The following table describes the icons that are used to describe physical resources in the console: Icon Description The T icon indicates that this is a target port. The I icon indicates that this is an initiator port. The red arrow indicates that this Fibre Channel HBA is down and cannot access its storage. The V icon indicates that this disk has been virtualized. The F icon indicates that this is shared storage and is being used by another server. The Owner field lists the other server. Rescan physical devices 1. To rescan devices, right-click on Physical Resources and select Rescan. You only rescan at the adapter level but Solaris only supports a system rescan, which rescans all adapters. 2. Determine what you want to rescan. If you are discovering new devices, set the range of adapters, SCSI IDs, and LUNs that you want to scan. Use Report LUNs - The system sends a SCSI request to LUN 0 and asks for a list of LUNs. Note that this SCSI command is not supported by all devices. Stop scan when a LUN without a device is encountered - This option will scan LUNs sequentially and then stop after the last LUN is found. Use this option only if all of your LUNs are sequential. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 7 Create virtual tape libraries You can create a virtual tape library in the following two ways: • • Use the configuration wizard - If you have already configured your system, you can launch the wizard by right-clicking on the VirtualTape Library System object in the console and selecting Configuration Wizard. Right-click on the Virtual Tape Libraries object and select New. Note: If you have recently added additional storage to your VTL system, before you can use it to create a virtual tape library, you must reserve it for virtual use. To do this: Right-click on Physical Resources and select Prepare Devices. Set hard drives to Reserved for Virtual Device. 1. Select the tape library that you are emulating. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 8 2. Enter information about the tape drives in your library. Virtual Drive Name Prefix - The prefix is combined with a number to form the name of the virtual drive. Total Virtual Drives - Determines the number of virtual tape drives available. This translates into the number of concurrent backup jobs that can run. Backup software licensing considerations may affect the number of tape drives you wish to present to each client server. This number can exceed the standard number of drives for the library as long as the backup software supports it. 3. Determine if you want to use Auto Replication for this virtual library. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 9 Auto Replication replicates data to another VTL server whenever a virtual tape is moved to an IE slot from a virtual library (such as from a backup application or other utility). If selected, determine whether you want the virtual tape copied (retained) or moved (removed) after the data is replicated. If you select Move, indicate how long to wait before deleting it. Also, select the remote server from the list of existing target servers. You can also click Add to add another VTL server. 4. Enter barcode information for the virtual library. Barcode Starts/Ends - Indicate a range of barcodes that will be used when creating virtual tapes. By default, barcodes increment in an alphanumeric sequence; for example, XXX0009 to XXX000A. In order to set the barcode to increment in a numeric sequence (XXX0009 to XXX0010), you have to set the last three digits of the Barcode Ends field to 999; for example, XXX0999 Note that for IBM libraries, the default barcode range is set to six characters. Slot - Maximum number of tape slots in your tape library. Import/Export Slots - Number of slots used to take tapes in and out of the bin. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 10 5. Enter the guidelines for expanding virtual tape capacity. Tape Capacity On Demand - Allows you to create small resources for your tapes and then automatically allocate additional space when needed. This can save considerable amounts of disk space without affecting system performance. If you do not select this option, VTL will allocate each virtual tape at the full size of the tape you are emulating. Initial Tape Size/Incremental Size - Enter the initial size of each resource and the amount by which it will be incremented. Maximum Capacity - Indicate the maximum size for each tape. 6. Verify all information and then click Finish to create the virtual tape library. You will be prompted to create virtual tapes. Answer Yes to continue. Refer to the following section for more information about creating virtual tapes. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 11 Create virtual tapes You can create virtual tapes in the following two ways: • • Use the configuration wizard - If you have already configured your system, you can launch the wizard by right-clicking on the VirtualTape Library System object in the console and selecting Configuration Wizard. Right-click on a virtual tape library or on the Tapes object and select New Tape(s). 1. Select how you want to create the virtual tape(s). Custom lets you select which physical device(s) to use and lets you designate how much space to allocate from each. Express automatically creates the resource(s) for you using an available device(s). If you select Express, you can create multiple virtual tapes at the same time. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 12 2. Specify which physical device should be used to create the virtual tapes. 3. Specify Batch Mode information. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 13 4. If Auto Replication is enabled for the virtual library and you want it enabled for this/these tapes, select the target server. You will be asked to confirm the hostname/IP address and indicate how long the system should attempt to replicate data before timing out and how often it should attempt to retry before skipping a scheduled replication. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 14 5. Depending upon which method you selected, specify the size of the tape(s), name, and number of tapes to create. 6. If desired, set a barcode range for the virtual tapes you are creating. 7. Verify all information and then click Finish to create the virtual tape(s). VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 15 How virtual tapes are allocated from multiple LUNs Round Robin Logic is the algorithm VTL uses when allocating new tapes from multiple LUNs. This logic ensures that tapes are evenly distributed across all LUNs rather than having multiple tapes allocated on a single LUN, which will decrease the performance of the storage unit. VTL chooses the LUN from which the tape will be allocated according to the amount of space the LUN has available. The LUN with the most available space will be selected for the tape. You can view the amount of available space on each LUN by highlighting Storage Devices under Physical Resources in the left pane of the VTL Console. When a virtual tape is deleted, the allocated space will be freed on its specified LUN. Note that it is possible for a virtual tape to be created from multiple LUNs. This will happen if a virtual tape has a larger capacity than the available space of the initial LUN from which the tape is allocated. Round Robin Logic with Tape Capacity on Demand disabled When Tape Capacity on Demand is disabled, the entire capacity of the virtual tape will be allocated on the LUN at once. There is no way for VTL to free any unused allocated space on the LUN unless the virtual tape is deleted. As an example, let us say that the user has three LUNs: LUN1, LUN2, and LUN3. LUN1 has a total of 100 GB available. LUN2 has a total of 200 GB available. LUN3 has a total of 300 GB available. When the user attempts to create a tape that is 200 GB, it will be allocated from LUN3 because this LUN has the most available space. When this tape is created, the available space on LUN3 will become 100 GB. When the user attempts to create a second tape that is 100 GB, it will be allocated from LUN2 because this LUN currently has the most available space. Round Robin Logic with Tape Capacity on Demand enabled When Tape Capacity on Demand is enabled, the user has the option to specify the following values: Initial Tape Size, Incremental Size, and Maximum Capacity. Only the Initial Tape Size of the virtual tape will be allocated on the LUN. The Incremental Size tells VTL how much additional space needs to be allocated as the tape expands. The Tape Capacity on Demand logic attempts to expand the tape on the same LUN, provided there is enough space available. If there is not enough space available, VTL will expand the virtual tape across another LUN using the round robin logic and the LUN selected will be the one with the most available space. VTL will allocate the minimum amount of space that the virtual tape needs, depending upon how much data is written and the incremental size specified. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 16 If the user decides to erase all of the data on the tape, VTL will free up the allocated space, except for the initial size. The initial size will remain allocated. If the user decides to erase a portion of the tape, the allocated space will be freed up until the rewind point on the tape. Considerations Initially, tape creation will use round robin logic because each LUN has exactly one segment. Once the LUNs start to have holes and different segments are deleted, the round robin logic will begin to diminish. This is because VTL will need to take into account the segments that become available. Therefore, VTL will consider larger segments on a LUN to be the preferred choice in allocating space. At times, even if a LUN has more space available, it will not be the preferred choice by VTL to allocate a tape. Instead, VTL will choose a LUN with a larger segment size. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 17 Add SAN Clients (backup servers) You can add SAN Clients in the following two ways: • • Use the configuration wizard - If you have already configured your system, you can launch the wizard by right-clicking on the VirtualTape Library System object in the console and selecting Configuration Wizard. Right-click on the SAN Clients object and select Add. 1. Enter the client name. 2. Select the protocol being used by the client. (Note-Only FC shown when I tried this) 3. Identify your backup server. For Fibre Channel clients, click Next and select the initiator WWPN for the client. Note that if the client WWPN is in a zone, it will automatically let you select initiators only from that zone. In addition, if there is only one initiator WWPN in the client, VTL will automatically select it for you and the dialog will not be displayed. Click Next and set Fibre Channel options. Enable Volume Set Addressing may be required for particular Fibre Channel clients, such as HP-UX clients that require VSA to access storage devices. Select IBM i-Series Server Support if you have a licensed iSeries client. Select Enable Celerra Support if you have a licensed EMC Celerra client. For iSCSI clients, specify if the client is a mobile client. A mobile client is simply a username and password that can be used to authenticate to the VTL server from any iSCSI client machine. If this a mobile client, you will have to enter a username and password on the next dialog. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 18 If this is a stationary (not mobile) client, click Next and select the initiator that the client uses. If the initiator does not appear, you can manually add it. Click Next and add/select users who can authenticate for this client. When you add users, you will have to enter a name and password for each. If you select Allow Unauthenticated Access, the VTL Server will recognize the client as long as it has an authorized initiator name. With authenticated access, an additional check is added that requires the user to type in a username and password. More than one username/password pair can be assigned to the client, but they will only be useful when coming from the machine with an authorized initiator name. 4. Click Finish when you are done. Assign virtual tape libraries to clients You can assign virtual tape libraries to clients in the following three ways: • • • Use the configuration wizard - If you have already configured your system, you can launch the wizard by right-clicking on the VirtualTape Library System object in the console and selecting Configuration Wizard. Right-click on a SAN Client or on the Everyone client and select Assign. The Everyone client is a generic client that you can assign to all (or some) of your virtual libraries/drives. Right-click on a virtual tape library and select Assign. 1. Assign virtual tape libraries/drives to your backup clients. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 19 You can assign the entire library to a backup client or you can assign individual tape drives. Note: Do not select any “SIR Tape Drive” virtual drive that may appear in the list of available libraries and drives. 2. Click Finish when you are done. (FC version only) After configuring VTL, you should perform a device scan on your backup server. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 20 Mirror the VTL database Mirroring the VTL database protects your configuration if the disk storing the database is lost. With mirroring, each time data is written to the VTL database, the same data is simultaneously written to the mirrored copy. This disk maintains an exact copy of the database. In the event that the database is unusable, VTL seamlessly swaps to the mirrored copy. The mirror can be defined with disks that are not necessarily identical to each other in terms of vendor, type, or even interface (SCSI, FC, iSCSI). To set mirroring: 1. Right-click on the Database object (under the Virtual Tape Library System object) and select Mirror --> Add. 2. Select the physical device to use for the mirror. 3. Confirm that all information is correct and then click Finish to create the mirroring configuration. Check mirroring status You can see the current status of your mirroring configuration by checking the General tab of the database. Current status of mirroring configuration. • • • Synchronized - Both disks are synchronized. This is the normal state. Not synchronized - A failure in one of the disks has occurred or synchronization has not yet started. If there is a failure in the primary database VTL swaps to the mirrored copy. If the synchronization is occurring, you will see a progress bar along with the percentage that is completed. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 21 Replace a failed disk If one of the mirrored disks has failed and needs to be replaced: 1. Right-click on the database and select Mirror --> Remove to remove the mirroring configuration. 2. Physically replace the failed disk. The failed disk is always the mirrored copy because if the primary database disk fails, VTL swaps the primary with the mirrored copy. 3. Right-click on the database and select Mirror --> Add to create a new mirroring configuration. Fix a minor disk failure If one of the mirrored disks has a minor failure, such as a power loss: 1. Fix the problem (turn the power back on, plug the drive in, etc.). 2. Right-click on the database and select Mirror --> Synchronize. This re-synchronizes the disks and re-starts the mirroring. Replace a disk that is part of an active mirror configuration If you need to replace a disk that is part of an active mirror configuration: 1. If you need to replace the primary database’s disk, right-click on the database and select Mirror --> Swap to reverse the roles of the disks and make it a mirrored copy. 2. Select Mirror --> Remove to cancel mirroring. 3. Replace the disk. 4. Right-click on the database and select Mirror --> Add to create a new mirroring configuration. Swap the primary disk with the mirrored copy Remove a mirror configuration Right-click on the database and select Mirror --> Swap to reverse the roles of the primary database disk and the mirrored copy. You will need to do this if you are going to perform maintenance on the primary database disk or if you need to remove the primary database disk. Right-click on the database and select Mirror --> Remove to delete the mirrored copy and cancel mirroring. You will not be able to access the mirrored copy afterwards. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 22 Set Console options To set options for the Console: 1. Select Tools --> Console Options. 2. Make any necessary changes. Remember password for session - If the Console is already connected to a server, when you attempt to open a second, third, or subsequent server, the Console will use the credentials that were used for the last successful connection. If this option is unchecked, you will be prompted to enter a password for every server you try to open. Automatically time out servers after nn minute(s) - The Console will collapse a server that has been idle for the number of minutes you specify. If you need to access the server again, you will have to reconnect to it. The default is 10 minutes. Enter 00 minutes to disable the timeout. Do not show the welcome screen for wizards - Each wizard starts with a welcome screen that describes the function of the wizard. Determine whether or not you want the welcome screen to be displayed. Enable Advanced Tape Creation Method - With Advance Tape Creation enabled, you are offered advanced options when creating tapes, such as capacity-ondemand settings for virtual libraries, tape capacity of tapes, and device, name, and barcode selection for each tape that is created. Scan for Accessibility Themes - Select if your computer uses Windows Accessibility Options. Console Log Options - The Console log (vtlconsole.log) is kept on the local machine and stores information about the local version of the Console. The VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 23 Console log is displayed at the very bottom of the Console screen. The options affect how information for each Console session will be maintained: Overwrite log file - Overwrite the information from the last Console session when you start a new session. Append to log file - Keep all session information. Do not write to log file - Do not maintain a Console log. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 24 Manage Administrators Only the root user can add or delete a VTL administrator or change an administrator’s password. 1. Right-click on the server and select Administrators. There are two types of administrators: - VTL Administrators are authorized for full Console access. - VTL Read-Only Users are only permitted to view information in the Console. They are not authorized to make changes and they are not authorized for client authentication. 2. Select the appropriate option. When you add an administrator, the name must adhere to the naming convention of the operating system running on your VTL Server. Refer to your operating system’s documentation for naming restrictions. You cannot delete the root user or change the root user’s password from this screen. Use the Change Password option instead. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 25 VTL compression VTL’s compression saves disk space by compressing files so that more data can be stored by a virtual tape drive. The increase in capacity is directly related to the compressibility of the data being backed up. If you can compress the data being backed up by a factor of up to 2:1, you can store up to twice as much information on the virtual tape. Software compression uses an LZO algorithm that runs on the VTL server. In order to use compression, you must also enable tape drive compression in your backup application. Note: If you are already using software compression that is supplied by your backup application, you should not use VTL’s compression. Using both types of compression will cause VTL to try to compress already-compressed data and this can slow down your backups. Enable/disable compression To enable or disable compression: 1. In the VTL Console, right-click on VirtualTape Library System and select Properties. 2. Select the Enable VirtualTape Library compression mode checkbox Compression will apply to all tapes in your system. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 26 View the Event Log The Event Log details significant occurrences during the operation of the VTL Server. The Event Log can be viewed in the VTL Console when you highlight a server in the tree and select the Event Log tab in the right pane. The columns displayed are: Type I: This is an informational message. No action is required. W: This is a warning message that states that something occurred that may require maintenance or corrective action. However, the VTL system is still operational. E: This is an error that indicates a failure has occurred such that a device is not available, an operation has failed, or a licensing violation. Corrective action should be taken to resolve the cause of the error. C: These are critical errors that stop the system from operating properly. Date The date on which the event occurred. Time The time at which the event occurred. ID This is the message number. Event Message This is a text description of the event describing what has occurred. Sort the Event Log When you initially view the Event Log, all information is displayed in chronological order (most recent at the top). If you want to reverse the order (oldest at top) or change the way the information is displayed, you can click on a column heading to re-sort the information. For example, if you click on the ID heading, you can sort the events numerically. This can help you identify how often a particular event occurs. Filter the Event Log By default, all informational system messages, warnings, and errors are displayed. To filter the information that is displayed: 1. Right-click on a server and select Event Log --> Filter. 2. Select which message types you want to include. 3. Search for records that contain/do not contain specific text. 4. Specify the maximum number of lines to display. 5. Select a time or date range for messages. Print/export the Event Log You can print the Event Log to a printer or save it as a text file. These options are available (once you have displayed the Event Log) when you right-click on the server and select the Event Log options. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 27 Refer to the Attention Required tab The Attention Required tab displays information that may require your attention, such as: • • Hardware appliance errors Replication errors It also notifies you when an import/export job has completed. The Attention Required tab only appears for a VTL server when an error/notification occurs; it will not appear at other times. When the tab does appear, you will see an exclamation icon on the server. object in the navigation tree. Clear issues from the list After you have resolved an issue, you can click the check box next to it and click the Clear button. You can clear individual issues or you can click the box next to one of the categories to deleted all issues in that section. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 28 Set Server properties To set properties for a specific server: 1. Right-click on the server and select Properties. 2. On the Activity Database Maintenance tab, indicate how often the VTL activity data should be purged. The Activity Log is a database that tracks all system activity, including all data read, data written, number of read commands, write commands, number of errors etc. This information is used to generate information for the VTL reports. 3. On the SNMP Maintenance tab, VTL to send traps to your SNMP manager. Refer to ‘Configure VTL to send SNMP traps’ for more information. 4. On the Storage Monitoring tab, enter the maximum amount of storage that can be used by VTL before you should be alerted. When the utilization percentage is reached, a warning message will be sent to the Event Log. Apply software patch updates You can apply patches to your VTL server through the Console. Add patch To apply a patch: 1. Download the patch onto the computer where the Console is installed. 2. Highlight an VTL server in the tree. 3. Select Tools menu --> Add Patch. 4. Confirm that you want to continue. 5. Locate the patch file and click Open. The patch will be copied to the server and installed. Rollback patch To remove (uninstall) a patch and restore the original files: 1. Highlight an VTL server in the tree. 2. Select Tools menu --> Rollback Patch. 3. Confirm that you want to continue. 4. Select the patch and click OK. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 29 Configure VTL to send SNMP traps VTL provides Simple Network Management Protocol (SNMP) support to integrate VTL management into an existing enterprise management solution, such as HP OpenView, CA Unicenter, IBM Tivoli NetView, or BMC Patrol. By default, event log messages will not be sent, but you may want to configure VTL to send certain types of messages. To do this: 1. In the Console, right-click on your VTL server appliance and select Properties. 2. Select the SNMP Maintenance tab. 3. Indicate the information that should be included in traps sent to your SNMP manager. SysLocation - Enter the location that should be included in traps. SysContact - Enter any contact information that should be included in traps. This could be a name or an email address. 4. Specify the type of message that should be sent. Five levels of messages are available: • None – No messages will be sent. • Critical - Only critical errors that stop the system from operating properly will be sent. • Error – Errors (failure such as a resource is not available or an operation has failed) and critical errors will be sent. • Warning – Warnings (something occurred that may require maintenance or corrective action), errors, and critical errors will be sent. • Informational – Informational messages, errors, warnings, and critical error messages will be sent. 5. Click Add to enter the name of your SNMP server and a valid SNMP community name. 6. To verify that SNMP traps are set up properly, set the level to Informational and then do anything that causes an entry to be added to the event log (such as logging into the VTL console or creating a new virtual tape library or virtual tape drive). You should see an SNMP trap for the event. Appliance health checking (SuperMicro motherboards only) VTL provides a mechanism to periodically check the health of the VTL appliance for possible failures. Any errors that are detected will be reported to the Console Event log and can be used to send out SNMP traps. Error checking is performed every three minutes. To eliminate reporting repeated error conditions, an error condition will not be reported more than once in every two hours. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 30 Data Deduplication The data deduplication solution integrates seamlessly with VTL to eliminate redundant data without impacting your established backup window. Deduplication offers as much as a 30:1 reduction of backup data, minimizing replication time and storage requirements. The deduplication process scans virtual tape cartridges, analyzes the data, and determines whether data is unique or has already been copied to the deduplication repository. The process then passes only single instances of unique data to the deduplication repository. The original virtual tape is replaced with a virtual index tape (VIT) pointing to deduplication storage, freeing considerable space for more data. Deduplication occurs as a separate, off-line process. Backup and restore jobs have higher priority than deduplication. Deduplication jobs are temporarily suspended when the tape being deduplicated is needed for backup or restore; when the backup application finishes using that particular tape, the deduplication job automatically resumes from where it left off. Deduplication is controlled by policies managed in VTL. You can set policies for all tapes in a library, groups or ranges of tapes, or just an individual tape. Deduplication is performed in the background without user intervention. During normal use, the deduplication option is transparent to the backup operation. Data duplicated across remote sites is deduplicated at the central site, enabling only globally unique data to be replicated to the disaster recovery site. When replication is configured as part of a deduplication policy, the deduplication repository and metadata are replicated. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 31 Enable deduplication Deduplication must be enabled on the VTL server, as well as on any VTL server that will serve as a replica target for a replicated deduplication repository. To do this: 1. Right-click on the server and select Options --> Enable Deduplication. 2. To automate the process of preparing SIR storage, select Physical Device. 3. In the Select Devices for Index dialog, select the virtualized disk that will serve as the index resource, scratch resource, and configuration repository resource. The LUN must be of sufficient size to contain these resources. The minimum size disk required for these resources is calculated in GB as Number of CPUs on deduplication appliance x 20 + 10. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 32 4. In the Select Devices for Data dialog, select the device(s) that will be used for data storage. Select 1, 2, 4, 8, 16, or any number of disks based on 2 to the Nth power. 5. In the confirmation dialog, select Finish to complete the wizard. Replicating the deduplication repository When you create a deduplication policy, you have the option of configuring replication for the tapes in the policy. If you do this for all deduplication policies, you effectively replicate the entire deduplication repository. Replication from the source server to the target server occurs via Fibre Channel or iSCSI. The target server is usually located at a remote location. If a disaster occurs and the replica is needed, the administrator can move the replicated tape from the virtual vault to its virtual tape library so that it can be accessed by backup software. Replication of deduplicated data occurs in several stages: • • • When replication occurs, the virtual index tape (VIT) from the source server is copied to the target server and becomes a foreign virtual index tape (FVIT) which you can see when you select the Replica Resources object. The FVIT is scanned to determine whether or not the data blocks it uses exist locally. Missing data blocks are replicated from the source server to the target server. After all missing data blocks are replicated, the target server has all the data blocks used by the FVIT. The target server automatically creates a local virtual index tape (LVIT) and puts it in the target server’s virtual vault; the LVIT is now a replica of the source VIT and contains pointers to the replicated blocks of data. Replication is complete when you see the LVIT in the target server’s virtual vault. The name of the LVIT corresponds to the name of the FVIT. The VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 33 image below shows the VTL target server, with FVITs listed for the Replica Resources object and the LVITs for replicated data listed for the Virtual Vault object. Note: This final step may not occur immediately after the initial replication of data and can take some time to complete, depending on the availability of SIR tape drives on the target server and the amount of data on the FVIT. Local virtual index tapes in the Virtual Vault after replication Foreign virtual index tapes (VIT replicas) in Replica Resources Requirements • • • • (Remote Replication) You must have two VTL servers. (Remote Replication) You must have write access to both servers. You must have enough space on the target server for the replica resource. You must enable replication between the two VTL servers by adding the target server to the primary server using the console on the primary server. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 34 • • You must enable deduplication on the target server using the console on the target server. The target server must be a 64-bit server. Connect appliances In order to configure replication to another VTL server using a Fibre Channel (FC) switch, the servers must be zoned so a target port on the replica source server is zoned to an initiator port on the replica target server (refer to “Fibre Channel Target Mode” for complete information on zoning and configuring a replica target server). While most customers choose to use a Fibre Channel switch to connect their VTL and deduplication appliances, it is also possible to direct-connect the appliances. If you are using an iSCSI connection, the iSCSI option must be enabled on both servers. If you are direct-connecting the appliances, the source VTL server must have at least two target ports and you must connect the appliances as follows: • • • Target port on the replica source server with the initiator port on the replica target server Initiator port on the replica source server with the target port on the replication target server Target port(s) on the replica source server with the initiator port(s) on the backup server Add the replication target server Before you can configure replication for a tape, you must enable replication between the two VTL servers. To do this: 1. Right-click the server and select Options --> Deduplication --> Replication --> Add Target. 2. If the server you wish to use as a target is listed, select the server. (You must be logged into that server). VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 35 3. If the server is not listed, select Add. 4. Enter login information for the VTL server that will serve as the target. 5. Select OK. The server appears in the list. Select the server. 6. In the next screen, iSCSI is selected by default. Select the correct replication protocol. 7. In the next screen, confirm the information and click Finish. The target server is configured to be the replication target. The SIR Replication tab appears in the right-hand pane for both servers when replication has been configured. Content identifies the replicator (the data source) and the replica (the VTL server to which data is replicated). VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 36 Data deduplication policies Add deduplication policies Deduplication policies specify which virtual tapes need to have deduplication and when deduplication should occur. You must have at least one virtual tape library and one virtual tape in order to create a policy. Note: Once you set your deduplication policies, you should not change the IP address or hostname of your appliance(s). If you need to change the IP address or host name, do it BEFORE setting your policies. 1. On your VTL server, right-click on the Deduplication Policies object and select New. 2. For a new policy, enter a name for the policy. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 37 3. Select a deduplication cluster to associate with the policy. 4. Indicate how often deduplication should occur. If you are setting deduplication for a specific time, be sure to set the deduplication policy to a time after the backup job will be completed for the virtual tape associated with the policy. Note: If the job is not completed by the time the next deduplication job should begin, the policy will wait the selected time after the current deduplication job is complete. For example, if you choose to deduplicate every two minutes and the deduplication policy is running for more than two minutes, the policy will continue until completion and then wait two minutes before starting again. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 38 5. Select the virtual tape(s) that you want to include in this policy. A virtual tape can be part of only one deduplication policy at a time. Use the Location drop-down box to select a virtual tape library. Then, highlight one or more tapes and use the >> button to move the tape(s) to the right column. 6. Indicate whether you want to enable Replication for the tapes in this policy. If this is the first deduplication policy being created for this library, no replication targets will be listed. Add the target server. If a replication target has already been created for this VTL, be sure to add the same replication target (refer to ‘Add the replication target server’). Deduplication must already be enabled on the target server. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 39 For information on replicating the deduplication repository, refer to ‘Replicating the deduplication repository’. 7. Click Finish to finalize the policy. The policy is enabled and will execute at the next scheduled time. To view statistics about running policies, refer to ‘Monitor deduplication and view statistics’. Modify deduplication policies After a policy is created, you can do the following: • • • • To modify the properties of a policy, right-click on the policy and select Edit. To execute a policy right now, regardless of the time, right-click on the policy and select Run. If a policy is running and you want it to stop, right-click on the policy and select Stop. To completely remove a policy, right-click on the policy and select Delete. Perform deduplication If your deduplication job has not started yet, you can use the console to force it to run now by right-clicking on a policy and selecting Run. Before deduplication, the virtual tape’s backup data is stored on the disks of the VTL Server. When the deduplication policy runs, an intelligent “Tape Scanner“ process on the deduplication server analyzes the backup data to perform deduplication. Upon completion, the entire virtual tape will be free of any backup data, and instead, an “index” to the real data is stored. All truly unique data blocks found during the deduplication process are stored on the deduplication server disk space. Therefore, you can describe the deduplication process as a “data block mover” that moves all blocks from VTL storage space to the deduplication storage space, except that redundant blocks are discarded. A virtual tape that has been deduplicated is called a “Virtual Index Tape” because it contains only the pointers to the data, instead of the actual data. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 40 Monitor deduplication and view statistics From the console, you can view the following: • • • Status of running policies Scanner history Repository statistics for the cluster Deduplication Policies object When you highlight the Deduplication Policies object, the right-hand pane lists all of the policies that are configured for deduplication on this server. For each policy, you can see the number of tapes included, schedule information (such as status, history, and next run time), and the deduplication cluster to which this policy belongs. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 41 Individual deduplication policies When you highlight a policy in the tree, you can view information about that policy. General Info tab Tapes tab The General Info tab shows how many tapes are included in this policy, deduplication cluster and server information, schedule and replication information, and policy history, including when and why the policy was run, number of tapes scanned, total amount of data scanned, total amount of unique data written to the repository, and the deduplication ratio. The Tapes tab lists information about each virtual tape in the policy. Tape name - The name of the virtual tape. Barcode - The barcode assigned to the tape. Size - Maximum uncompressed storage capacity of the tape. This is determined when the tape was created. Written - The amount of data (before compression) that is written to tape by backup applications. This amount can be greater then the tape size if the data is compressed. New - The amount of data (before compression) that has not yet been deduplicated, including newly appended data to a tape. In deduplication - The amount of data (before compression) written that has now been moved to deduplication storage. This is basically the difference between the data written and the data not yet deduplicated. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 42 Unique data - The actual physical storage in deduplication used to store tape data. This includes the effect of deduplication compression. Dedupe ratio - The ratio between the data moved to deduplication and the unique data. Last run Dedupe - The last time the tape was deduplicated. Last run Replicated - The last time the tape was replicated. Next run - The next time the tape will be deduplicated. When you highlight a tape in the top section, the Policy Tape Info tab in the bottom section displays additional details about the tape: Virtual ID - The tape’s virtual ID. Tape location and slot - The tape’s current location. Physical allocation - The physical size of the tape. Last Dedupe Status - The status of the last time this policy ran. Last Replication Status - The status of the last time data for tapes in this policy was replicated VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 43 Active Policies tab Tape History tab The Active Policies tab lists information about currently running policies and replication jobs. The data is automatically refreshed. The Tape History tab lists all of the deduplication and replication jobs that have run and provides statistics for each. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 44 Event Log tab The Event Log tab displays informational events and errors pertaining to this policy. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 45 Repository statistics To view repository statistics for the entire cluster, highlight the VTL server and select the Deduplication Statistics tab in the right panel. The values displayed for Data written represent data scanned in VTL; Data stored values represent the amount of unique data stored in the repository. The Redundancy elimination ratio (frequently referred to in the industry as the Deduplication Ratio) represents this formula: [(data scanned)÷(data stored)]. The Deduplication Statistics display provides three ways to look at these values: • • Repository usage Deduplication results VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 46 • Repository usage Deduplication statistics This section of the display shows the current state of the physical disk used as the deduplication repository, which includes deduplication data and deduplication index storage. Values are based on all tape scans performed during the life span of the selected server. Disk Usage values show how much disk space has been allocated to each deduplication storage component and how much space has been used. The Repository object capacity graphic represents memory usage. Select Refresh to update the display to include activity that has occurred since the last refresh. Deduplication results This section of the display combines data written and data stored statistics for all accumulated data to show deduplication activity over time. Viewing data in this way allows you to calculate the redundancy elimination ratio for any period of time. Reviewing deduplication operations for successive weeks of full backup reveals the true redundancy ratios of week-to-week data evolution and can be used to accurately forecast repository requirements. You can identify how quickly you are using your repository disk space and when you are likely to need to add more. Select a Unit of time from the drop-down list to adjust the granularity of the graph. Use the arrow buttons to scan through accumulated data. Click Refresh to include data for deduplication activity that has occurred since the last refresh. Deduplication statistics This section of the display shows current statistics: a view of the redundancy elimination ratio based on tape scans performed since a user last reset the display. For example, statistics might reflect 7 days, 1 hour, 2 minutes, and 2 seconds of deduplication processing, during which 125 GB of data was scanned by deduplication. 45 GB of data was unique and therefore stored in the repository, resulting in a redundancy elimination ratio of 2.8:1. Statistics are automatically updated every 30 seconds. You can click the Reset button to reset values to zero and reset the time to the current time. Subsequent updates will reflect activity since the reset. If you view the display after a few minutes, the redundancy elimination ratio will reflect tapes currently being scanned. Note: It is not uncommon to see a ratio of 1000:1 for a particular tape; this simply indicates that extremely little data has changed. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 47 Reclaim data repository disk space During the deduplication process, only single instances of unique data are passed to the deduplication repository. The original virtual tape is replaced with a VIT pointing to deduplication storage. Over time, VITs can be erased, formatted or overwritten by your backup application (such as when a tape has expired). It is also possible that you may have manually deleted a VIT from the VTL console. When a VIT is eliminated, the pointers to deduplication storage are deleted but the actual deduplicated data is not. The Space Reclamation option allows you to delete the deduplicated data and free up the associated disk space from the data repository. To do this right-click on the VTL server object and then select Options/Deduplication/Run Space Reclamation. Note: Putting a VIT in a scratch pool of a backup application does not mean that the storage used by that VIT can be reclaimed. Storage can be reclaimed only when a VIT is deleted from the console or erased/formatted/overwritten by the backup application. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 48 Replicate Data Replication protects the information on a virtual tape by maintaining a copy of the virtual tape on the same VTL server or on another VTL server. At prescribed intervals, when the tape is not in use, changed data from the primary virtual tape on the source server is transmitted to the replica resource on the target server so that they are synchronized. The target server is usually located at a remote location. Under normal operation, backup clients do not have access to the replica resource on the target server. If a disaster occurs and the replica is needed, the administrator can promote the replica to become the primary virtual tape so that clients can access it. VTL offers two types of replication, Remote Replication and Local Replication. Both types can be enhanced with the Compression and/or Encryption options. Remote Replication Remote Replication allows fast, data synchronization of storage volumes from one VTL server to another over the IP network. With Remote Replication, the replica disk is located on a separate VTL server, called the target server. Local Replication Local Replication allows fast, data synchronization of storage volumes within one VTL server. Because there is only one VTL server, the primary and target servers are the same server. Local Replication can be used to maintain a local copy of virtual tape data or it can be used to maintain a remote copy within metropolitan area Fibre Channel SANs. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 49 With Local Replication, the replica disk can be connected to the VTL server via a gateway using edge routers or protocol converters. Disaster Recovery Site Primary Site VTL Virtual Tape Gateway VTL Server Primary Disk VTL Virtual Tape Types of replication Note: For information on replicating the deduplication repository, refer to ‘Replicating the deduplication repository’. There are three methods for replicating tape data in VTL; two provide automatic replication and one is a manual process that can be used if you are not using the automatic methods: Feature Automatic/Manual Description Auto Replication Automatic Replicates the contents of a single tape whenever a virtual tape is exported from a virtual library (such as from a backup application or other utility). Remote Copy Manual Replicates the contents of a single tape on demand. Replication Automatic Replicates changed data from a primary virtual tape to the same VTL server or another VTL server at prescribed intervals, based on user-defined policies. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 50 Auto Replication Auto Replication replicates the contents of a single tape whenever a virtual tape is exported from a virtual library (such as from a backup application or other utility). Auto Replication is enabled when you create a virtual tape library. If it is enabled for a library, when you create tapes for the library, you can enable/disable Auto Replication for the individual tape. Note: Do not enable auto-replication for libraries or tapes for which you will defining a deduplication policy. This feature is not supported for Virtual Index Tapes (VITs). If you want to enable Auto Replication for an existing library: 1. Right-click on a virtual tape library and select Properties. 2. Select Auto Replication. 3. Select whether you want the virtual tape copied (retained) or moved (removed) after the data is replicated. If you select to move it, indicate how long to wait before deleting it 4. Select the target server. Remote Copy You can copy the contents of a single tape whenever you need to. Because the Remote Copy feature replicates the full tape rather than appending to an existing virtual tape, you can copy a tape only if there is no virtual tape on the target server with the same barcode. Therefore, if you have copied this tape before, you must delete the copy from the target server before continuing. Note: You cannot copy a tape that is configured for replication or Auto Replication. 1. Right-click on a tape and select Remote Copy. 2. Select if you want to copy to a local or remote server. If you select to copy to a remote server, you will have to select the server. If the server you want does not appear in the list, click the Add button. 3. Confirm/enter the target server’s IP address. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 51 4. Select a location for the copied tape. You can select a tape library or the virtual vault. If you select a tape library, the media must be compatible. 5. Confirm that all information is correct and then click Finish to create the copy. Requirements The following are the requirements for setting up a replication configuration: • • • • • (Remote Replication) You must have two VTL servers. (Remote Replication) You must have write access to both servers. You must have enough space on the target server for the replica resource. You must enable replication between the two VTL servers by adding the target server to the primary server using the console on the primary server. The target server must be a 64-bit server. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 52 Configuring replication for virtual tapes You must enable replication for each virtual tape that you want to replicate. 1. Right-click on a virtual tape and select Replication --> Add. To enable replication for multiple virtual tapes in the same virtual tape library, right-click on the virtual tape library and select Replication --> Add. You can also right-click on the virtual vault and enable replication for the virtual tapes in the virtual vault. Each virtual tape in the library can only have one replica resource. 2. If you selected a virtual tape library, select one or more available virtual tapes to replicate. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 53 3. Indicate whether you want to use remote replication or local replication. 4. Select the server that will contain the replica. If the server you want does not appear on the list, click the Add button. Note: For Solaris systems, the target server must be a 64-bit server. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 54 5. Confirm/enter the target server’s IP address. 6. Configure how often, and under what circumstances, replication should occur. You must select at least one policy, but you can have multiple. Start replication when the amount of new data reaches - If you enter a watermark value, when the value is reached, replication of the changed data will begin as soon as the virtual tape is back in the library. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 55 Start an initial replication on mm/dd/yyyy at hh:mm and then every n hours/ minutes thereafter - Indicate when replication should begin and how often it should be repeated. If a replication is already occurring when the next time interval is reached, the new replication request will be ignored. 7. Indicate what to do if a replication attempt fails. Replication can only occur when the virtual tape is in the vault and is not in use. Indicate how long the system should attempt to replicate data before timing out and how often it should attempt to retry before skipping a scheduled replication. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 56 8. (Remote Replication only) Indicate if you want to use Compression or Encryption. The Compression option provides enhanced throughput during replication by compressing the data stream. The Encryption option secures data transmission over the network during replication. Initial key distribution is accomplished using the authenticated DiffieHellman exchange protocol. Subsequent session keys are derived from the master shared secret, making it very secure. The Compression option is not supported for replication of virtual tapes or for tapes that are or will be included in a deduplication policy; Encryption is not supported for replicating tapes that are or will be included in a deduplication policy. 9. If you selected a virtual tape library, review your configuration settings and select Finish. 10. If you selected a single tape, select Express in the next screen shown after the screen in step 8. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 57 11. Enter a name for the virtual tape replica: The name is not case sensitive. 12. Confirm that all information is correct and then click Finish to create the replication configuration. Note: Once you create your replication configuration, you should not change the hostname of the source (primary) server. If you do, you will need to recreate your replication configuration. Configuring replication for Virtual Index Tapes (VITs) Replication for VITs is defined as part of the process of creating deduplication policies (refer to ‘Data deduplication policies’) Check replication status There are several ways to check replication status: • Replication tab of the primary virtual tape - displays the policies set for replication as well as the replication status. • General tab of the Replica Resource on the target server - displays status of replication in progress. • Event Log - displays status and operational information, as well as any errors. • Replication Status Report - can be run from the Reports object. It provides a centralized view for displaying real-time replication status for all tapes enabled for replication. It can be generated for an individual tapes, multiple tapes, source server or target server, for any range of dates. This report is VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 58 useful for administrators managing multiple servers that either replicate data or are the recipients of replicated data. The report can display information about existing replication configurations only or it can include information about replication configurations that have been deleted or promoted (you must select to view all replication activities in the database). The following is a sample Replication Status Report: Promote a replica resource Note: Promoting a replica resource is valid only for virtual tapes, not for Virtual Index Tapes (VITs). If a replica resource is needed, the administrator can promote the replica to become a usable virtual tape. After promotion, the virtual tape is put into the virtual vault so that you can move it to any virtual library on that server (formerly the target server). If you need to get the virtual tape back to the formerly primary server, you must replicate it back to that server. Promoting a replica resource breaks the replication configuration. Once a replica resource is promoted, it cannot revert back to a replica resource. You must have a valid replica resource in order to promote it. For example, if a problem occurred (such as a transmission problem or the replica resource failing) during the first and only replication, the replicated data would be compromised and therefore could not be promoted to a primary virtual tape. You cannot promote a replica resource while a replication is in progress. 1. In the Console, locate the target server, right-click on the appropriate Replica Resource and select Replication --> Promote. 2. Confirm the promotion and click OK. 3. From the client, rescan devices or restart the client to see the promoted virtual tape. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 59 Change your replication configuration options You can change the following for your replication configuration: • • • • Static IP address of your target server Policies that trigger replication (watermark, interval, time) Timeout and retry policies Data transmission options (encryption, compression) To change the configuration: 1. Right-click on the primary virtual tape and select Replication --> Properties. 2. Make the appropriate changes and click OK. Suspend/resume replication schedule You can suspend future replications from automatically being triggered by your replication policies (watermark, interval, time). This will not stop a replication that is currently in progress. You can still manually start the replication process while the schedule is suspended. To suspend/resume replication, right-click on the primary virtual tape and select Replication --> Suspend (or Resume). You can see the current settings by checking the Replication Schedule field on Replication tab of the primary virtual tape. Stop a replication in progress To stop a replication that is currently in progress, right-click on the primary virtual tape and select Replication --> Stop. Note that you do not need to stop an active replication job so that a backup can occur. When a virtual tape is mounted in a virtual tape drive, the active replication job will automatically be cancelled so that the backup application can write to the tape. Replication will continue when the next replication trigger occurs. Manually start the replication process To force a replication that is not scheduled, select Replication --> Synchronize. Remove a replication configuration This procedure allows you to remove the replication configuration on the source server and either delete or promote the replica resource on the target server at the same time. 1. Right-click on the virtual tape library and select Replication-->Remove. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 60 2. Select the replication target server, the option to remove or promote, and select the virtual tape replicas. 3. Select OK. 4. In the confirmation message box, type Yes to confirm that you want to remove replication configuration from the selected tapes. A success message is displayed when the process is complete. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 61 Fibre Channel Target Mode Overview The VTL server is protocol-independent and supports multiple outbound target protocols, including Fibre Channel Target Mode. This chapter provides configuration information for Fibre Channel Target Mode as well as the associated Fibre Channel SAN equipment. NIC NIC FC Card Initiators Windows 2003 application server Windows 2000 application server FC Card Windows 2003 application server NetWare server FC Card Windows 2003 application server Fibre Channel SAN IP SAN FC Switch GB Switch Targets NIC (IP) FC Card SCSI Card FC Card Initiators VTL Server Targets SCSI Disk array FC Disk array As you can see from the illustration above, an application server can be either an iSCSI client or a Fibre Channel client, but not both. Using separate cards and switches, you can have all types of VTL Clients (FC and iSCSI) on your network. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 62 Installation and configuration overview The installation and configuration of Fibre Channel Target Mode involves several steps. Where necessary, detailed information appears in subsequent sections. 1. Configure Fibre Channel hardware on server. 2. Configure Fibre Channel hardware on clients. 3. Verify your hardware configuration. 4. Enable Fibre Channel Target Mode. This is done in the configuration wizard. If it was not, do the following: • In the Console, highlight the VTL Server that has the FC HBAs. • Right-click on the Server and select Options --> Enable FC Target Mode. An Everyone_FC client will be created under SAN Clients. This is a generic client that you can assign to all (or some) of your tape libraries/drives. It allows any WWPN not already associated with a Fibre Channel client to have read/write non-exclusive access to any tape libraries/drives assigned to Everyone_FC. 5. Set QLogic ports to target mode. 6. Add Fibre Channel clients. You can add clients in the following two ways: • Use the configuration wizard - If you have already configured your system, you can launch the wizard by right-clicking on the VirtualTape Library System object in the console and selecting Configuration Wizard. • Right-click on the SAN Clients object and select Add. 7. (Optionally) Associate World Wide Port Names with clients. 8. Assign virtual tape libraries to clients. For security purposes, you can assign specific tape libraries/drives to specific clients. For the rest, you can use the Everyone client. Refer to ‘Assign virtual tape libraries to clients’ for more information. 9. Trigger a device rescan or reboot client machine to access new devices. In order to see the new devices, after you have finished configuring your Fibre Channel Clients, you will need to trigger a device rescan or reboot the Client machine, depending upon the requirements of the operating system. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 63 Configure Fibre Channel hardware on server VTL supports the use of QLogic HBAs for the VTL server. Ports Your VTL appliance will be equipped with several Fibre Channel ports. Some of these ports will interface with storage arrays. Others will interface with physical tape libraries, while the remaining ports will interface with backup (media) servers. The ports that connect to storage arrays are commonly known as Initiator Ports. The ports that will interface with the backup servers' FC initiator ports will run in a different mode known as Target Mode. Zoning Note: If a port is connected to a switch, we highly recommend the port be in at least one zone. There are two types of zoning that can be configured on each switch, hard zoning (based on port #) and soft zoning (based on WWPNs). Hard zoning is zoning using the port number of the switches. With hard zoning, if a zone has two ports (0 and 1) and port 0 goes down for some reason, you will need to remove the current zoning configuration, move the plug to another valid port, rezone, and then enable the new zoning configuration. Soft zoning uses the WWPN in the configuration. The WWPN remains the same in the zoning configuration regardless of the port location. If a port fails, you can simply move the cable from the failed port to another valid port without having to reconfigure the zoning. VTL requires isolated zoning where one initiator is zoned to one target in order to minimize I/O interruptions by non-related FC activities, such as port login/out and resets. For example, for the case of upstream (to client) zoning, if there are two client initiators and two VTL targets on the same FC fabric and if it is desirable for all four path combinations to be established, you should use four specific zones, one for each path (Client_Init1/VTL_Tgt1, Client_Init1/VTL_Tgt2, Client_Init2/VTL_Tgt1, and Client_Init2/VTL_Tgt2). You cannot create a single zone that includes all four ports. The four-zone method is cleaner because it does not allow the two client initiators nor the two VTL target ports to see each other. This eliminates all of the potential issues such as initiators trying to log in to each other under certain conditions. The same should be done for downstream (to storage) zoning. If there are two VTL initiators and two storage targets on the same fabric, there should be four zones (VTL_Init1/Storage_Tgt1, VTL_Init1/Storage_Tgt2, VTL_Init2/Storage_Tgt1, and VTL_Init2/Storage_Tgt2). VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 64 If hard zoning is used, it is necessary to create zones for each standby target, doubling the number of upstream zones. This extra set of zones is not necessary in the case of soft zoning because zones are defined by WWPN combinations. Additionally, make sure that storage devices to be used by VTL are not zoned to clients (backup servers). Ports on storage devices to be used by VTL should be zoned to VTL’s initiator ports while the clients are zoned to VTL’s target ports. Make sure that from the storage unit’s management GUI (such as SANtricity and NaviSphere), the LUNs are re-assigned to VTL as the “host”. VTL will virtualize these LUNS. VTL can then define virtual tapes out of these LUNS and further provision them to the clients. Switches For the best performance, if you are using 2 or 4 Gig switches, all of your cards should be 2 or 4 Gig cards. Examples of 2 Gig cards include the QLogic 2300 and Emulex LP952L. Examples of 4 Gig cards include the QLogic 24xx. Storage array Connect an FC cable from a port on the storage array to an FC port on the FC switch. Backup servers Typically, backup servers are already connected to the FC switch before the deployment. In this case, only FC switch zoning requires modification. Connect an FC cable from each backup server to an FC port on the FC switch. Configure a FC switch using soft zoning The following are generic FC zoning steps applicable to any FC switch hardware. Refer to hardware or vendor documentation for specific zoning instructions for your FC switch. 1. Access the FC switch via its web interface and log in if necessary. 2. Access the Name Server Table. 3. Access the zoning configuration and log in if necessary. 4. Using previously recorded FC HBA information, look for the WWPNs for the adapters from the VTL appliance, storage array, and backup servers. 5. Create aliases for each WWPN. Note that some switches (i.e. McData) do not use aliasing. 6. Create zones for your configuration, for example: • Zone 1: VTL WWPN (initiator)->storage array WWPN (target) • Zone 2: VTL WWPN (initiator)->Tape Library WWPN (target) • Zone 3: VTL WWPN (target)->backup server WWPN (initiator) 7. Save the configuration. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 65 Configure a FC switch using hard zoning Follow the steps above but use the port number in place of the WWPN. Persistent binding Persistent binding is automatically enabled for all QLogic HBAs connected to storage device targets upon the discovery of the device (via a Console physical device rescan with the Discover New Devices option enabled). However, persistent binding will not be SET until the HBA is reloaded. You can reload HBAs by rebooting the VTL server. Without persistent binding, there is a risk that the wrong storage controller port will be accessed when the VTL appliance is rebooted (or VTL HBA driver is reloaded). VSA Some storage devices (such as EMC Symmetric storage controller and older HP storage) use VSA (Volume Set Addressing) mode. This addressing method is used primarily for addressing virtual buses, targets, and LUNs. If your storage device uses VSA, you must enable it through the console. Incorrect use of VSA can lead to problems seeing the disks at the HBA level. If the HBA cannot see the disks, VTL is not able to access and manage them. This is true both ways: (1) the storage requires VSA, but it is not enabled and (2) the storage does not use VSA, but it is enabled. To determine if the storage device that is being provisioned by VTL has VSA mode, use the storage's own management utility. To enable VSA, right-click on Physical Resources or a specific adapter and select Target Port Binding. Click the VSA checkbox for the appropriate storage device targets. Some clients, such as HP-UX clients, use VSA mode. In order for these clients to access VTL, you must enable VSA on the VTL's target ports (this is done when you enable Target Mode on an HBA port from the Console). Otherwise, for example, HPUX (10, 11, 11i) Fibre Channel Clients using HP Tachyon Fibre Channel HBAs cannot detect more than eight LUNs (eight VTL virtual tape drives and robotic arm). VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 66 QLogic HBAs Target mode settings The table below lists the recommended settings (changes are indicated in bold) for QLogic HBA target mode. These values are set in the qla2x00fs.conf file and will override those set through the BIOS settings of the HBA. For initiators, consult the best practice guideline from the storage vendor. If an initiator is to be used by multiple brands, the best practice is to select a setting that best satisfies all brands. If this is not possible, consult technical support for advice, or separate the conflicting storage units to their own initiator connections. Name Default Recommendation frame_size 2 (2048byte) 2 (2048byte) loop_reset_delay 0 0 adapter_hard_loop_id 0 0 connection_option 1 (point to point) 1 (point to point) hard_loop_id 0 0-124 Make sure that both primary target adapter and secondary standby adapter are set to the SAME value fibre_channel_tape_support 0 (disable) 1 (enable) data_rate 2 (auto) Based on the switch capability – 0 (1 Gig), 1 (2 Gig), 2 (auto), or 2 (4Gig) execution_throttle 255 255 LUNs_per_target 256 256 enable_lip_reset 1 (enable) 1 (enable) enable_lip_full_login 1 (enable) 1 (enable) enable_target_reset 1 (enable) 1 (enable) login_retry_count 8 8 port_down_retry_count 8 8 link_down_timeout 45 45 extended_error_logging_flag 0 (no logging) 0 (no logging) interrupt_delay_timer 0 0 iocb_allocation 512 512 enable_64bit_addressing 0 (disable) 0 (disable) fibrechannelconfirm 0 (disable) 0 (disable) class2service 0 (disable) 0 (disable) acko 0 (disable) 0 (disable) VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 67 Name Default Recommendation responsetimer 0 (disable) 0 (disable) fastpost 0 (disable) 0 (disable) driverloadrisccode 1 (enable) 1 (enable) q12xmaxqdepth 32 32 (configurable through the VTL Console) max_srbs 4096 4096 q12xlogintimeout 20 seconds 20 seconds q12xretrycount 20 20 q12xsuspendcount 10 10 q12xdevflag 0 0 q12xplogiabsentdevice 0 (no PLOGI) 0 (no PLOGI) busbusytimeout 60 seconds 60 seconds displayconfig 1 1 retry_gnnft 10 10 recoverytime 10 seconds 10 seconds failbacktime 5 seconds 5 seconds bind 0 (by Port Name) 0 (by Port Name) qfull_retry_count 16 16 qfull_retry_delay 2 2 q12xloopupwait 10 10 QLogic Multi-ID HBAs With a Multi-ID HBA, each port can be both a target and an initiator (dual mode). When using a Multi-ID HBA, there are two WWPNs, the base port and the alias. Important notes: • • • • • You should not use the Multi-ID driver if you intend to directly connect a target port to a client host. With dual mode, clients will need to be zoned to the alias port (called Target WWPN). If they are zoned to the base port, clients will not see any devices. You will only see the alias port when that port is in target mode. You will only see the alias once all of the VTL services are started. If you are using the QLogic Multi-ID driver with loop-only mode, you will not be able to use a McData Director class switch. The standard point-to-point driver is required for this configuration. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 68 QLA2X00FS.CONF file The qla2x00fs.conf file is used to adjust settings for FC adapters installed on the VTL appliance. Refer to ‘QLogic HBAs’ for recommended target settings. 1. Determine the HBA settings to change. 2. Back up the qla2x00fs.conf file: cp /kernel/drv/qla2x00fs.conf /kernel/drv/qla2x00fs.conf.bak 3. Modify qla2x00fs.conf using the vi editor. 4. Save the qla2x00fs.conf file. 5. Update driver properties and reboot VTL: update_drv -f qla2x00fs reboot You must reboot the VTL server for the changes in the qla2x00fs.conf file to take effect and to recognize the new settings. Link speed In the qla2x00fs.conf file, the link speed is set to auto-negotiate by default for every FC port. You must manually update this and match the link speed with the switch speed. # Fibre Channel Data Rate Option # 0 = 1 gigabit/second # 1 = 2 gigabit/second # 2 = Auto-negotiate # 3 = 4 gigabit/second hba0-fc-data-rate=2; It may be necessary to manually set the port switch speed on the FC switch as well. If you are attaching storage array directly to the VTL appliance, adjust the link speed for all FC ports. Check with your vendor to obtain any recommended FC HBA settings. Device identification Typically, Solaris will assign its own device numbers, such as c1 and c2 (controller 1 and 2), etc. These controller numbers were assigned when Solaris first discovered a new adapter. However, the VTL appliance does not identify the same devices in the same way. VTL will identify QLogic adapters as hba0, hba1, hba2, and so on in the qla2x00fs.conf file. Settings for each individual FC port (for example, hba0 or hba1) can be modified in qla2x00fs.conf. To identify which adapter belongs to which HBA in qla2x00fs.conf: 1. Run the following command: For example: VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 69 ispdev | grep qla2x00fs This command will output all QLogic adapters with the assigned adapter #, qla2x00fs instance #, device path, WWPN, mode, and other properties, if available. adapter2 qla2x00fs0 /devices/pci@1d,0/pci1022,7450@1/pci1014,1a7@1/ pci1077,102@4 210000e08b833490 initiator | | adapter3 qla2x00fs1 /devices/pci@1d,0/pci1022,7450@1/pci1014,1a7@1/ pci1077,102@4,1 210100e08ba33490 initiator | | adapter4 qla2x00fs2 /devices/pci@1d,0/pci1022,7450@1/pci1014,1a7@1/ pci1077,102@6 210200e08bc33490 initiator | | adapter5 qla2x00fs3 /devices/pci@1d,0/pci1022,7450@1/pci1014,1a7@1/ pci1077,102@6,1 210300e08be33490 initiator | | For example, in the above example, adapter2 is mapped to qla2x00fs instance0, which is also referred to as hba0 in the qla2x00fs.conf file. adapter2->qla2x00fs0(hba0) adapter3->qla2x00fs1(hba1) adapter4->qla2x00fs2(hba2) adapter5->qla2x00fs3(hba3) 2. Run the following command to determine which physical port belongs to each adapter number in qla2x00fs.conf: tail -f /var/adm/messages and unplug the FC port. You will see a loop down message like the one below. "Oct 1 14:54:38 SUN81sf029 qla2x00fs: [ID 376780 kern.notice] QLA2x00fs(4): LOOP DOWN" The 4 is the instance number in the above example. Data rate 1. Scroll down to the appropriate section. 2. Search for data_rate. It should look like this: # Fibre Channel Data Rate Option # 0 = 1 gigabit/second # 1 = 2 gigabit/second # 2 = Auto-negotiate # 3 = 4 gigabit/second hba0-fc-data-rate=2; 3. For the adapter to be configured (i.e., hba4), change the value: hba4-fc-data-rate=1; The hba0-fc-data-rate should be left untouched. It is the default setting for the rest of ports. 4. Repeat for each adapter to be configured. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 70 Configure Fibre Channel hardware on clients Fabric topology (For all clients except Solaris SPARC clients) When setting up clients on a Fibre Channel network using a Fabric topology, we recommend that you set the topology that each HBA will use to log into your switch to Point-to-Point Only. If you are using a QLogic 2200 HBA, the topology is set through the QLogic BIOS: Configure Settings --> Extended Firmware settings --> Connection Option: Point-toPoint Only Note: We recommend hard coding the link speed of the HBA to be in line with the switch speed. NetWare clients HBA settings are configured through nwconfig. Do the following after installing the card: 1. Type nwconfig. 2. Go to Driver Options and select Config disk and Storage device drivers. 3. Select Select an Additional Driver and type the path for the updated driver (i.e sys:\qlogic). 4. Set the following parameters: • Scan All Luns = yes • FailBack Enabled = yes • Read configuration = yes • Requires configuration = no • Report all paths = yes • Use Portnames = no • Qualified Inquiry = no • Report Lun Zero = yes • GNFT SNS Query = no • Console Alerts = no VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 71 HBA settings for Fibre Channel clients This section provides recommended settings for clients that are connected to VTL. For QLogic HBAs, you can modify the BIOS settings using the SANsurfer tool. We do not support FC port drivers. For all HBAs that support persistent binding, persistent binding should be configured. Check with the HBA vendor for persistent binding procedures. We recommend that you reload the driver (reboot) in order for changes to be made effective for most operating systems, such as Windows, Linux, and Solaris. It is not necessary to reboot AIX clients since there are no BIOS settings that need to be configured. For HP-UX, you will not be required to reboot unless you are using an Emulex HBA since you will need to recompile the kernel. Below are charts for different types of HBAs for different types of clients. These settings apply for cluster and non-cluster environments unless specified. Windows 2000/2003 LUNS per target HBA Card Type Setting QLogic Login Retry Count = 180 Port Down Retry Count = 251805 Link Down Count = 30 Enable Target Reset = True FrameSize = 2048 Execution Throttle = 255 LUNS per target = 64 Tape mode = Enable Queue depth = 32 Emulex Node Timeout = 30 Link Timeout = 30 Reset FF = 1 (true) The LUNS per target should be set to 64. You can set this value to 256 because we use Report LUN upstream. However, this is dependent on your requirements and is based on the number of LUNs. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 72 HP-UX 10, 11, and 11i HBA Card Type Settings Emulex Node timeout = 30 Link timeout = 30 scsi timeout = 30 Port swapping not required Tachyon scsi timeout = 30 For Tachyon HBAs, you must use port swapping scripts for special switches, such as the Brocade 3900 / 12000 with firmware 4.1.2b. Cisco switches can detect the port change automatically so there is no need to use port swapping scripts with Cisco switches. AIX 4.3 and higher HBA Card Type Settings IBM Retry Timeout = 30 Emulex Retry Timeout = 30 Cambex Retry Timeout = 30 There are no BIOS or OS level changes that can be made for AIX. Linux – all versions HBA Card Type Settings QLogic Login Retry Count = 180 Port Down Retry Count = 180 Link Down Count = 30 Enable Target Reset = True FrameSize = 2048 Execution Throttle = 255 LUNS per target = 256 Tape mode = Enable Queue depth = 32 Emulex Node Timeout = 30 Link Timeout = 30 Disk timeout value = 60 There are no OS level modifications to be made for a Linux client. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 73 Solaris 7, 8, 9, and 10 HBA Card Type Settings QLogic Login Retry Count = 8 Port Down Retry Count = 8 Link Down Count = 30 Enable Target Reset = True FrameSize = 2048 Throttle = 255 LUNS per target = 256 Tape mode = Enable Queue depth = 32 Emulex Node Timeout = 30 Link Timeout = 30 Disk timeout value = 60 The changes indicated above should be changed in the *.conf files for their respective HBAs. NetWare – all versions HBA Card Type Settings QLogic Port Down Retry Count = 30 Link Down Retry = 30 /XRetry = 60 /XTimeout = 120 /PortDown = 120 Set Multi-Path Support = ON Link Down Retry= 30 The settings indicated above should be modified at the ql23xx driver line in the startup.ncf file. The Port Down Retry Count and Link Down Retry is configurable in the BIOS whereas the /XRetry, /XTimeout, and /PortDown values are configured by the driver. The Port Down Retry Count and the /Portdown values combined will approximately be the total disk timeout. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 74 Verify your hardware configuration After all of your Fibre Channel hardware has been configured, you should verify that everything is set correctly. You can do this in the VTL console by highlighting a port under Physical Resources. General tab SCSI Devices tab The General tab displays information about the port, including mode (target or initiator), status, and WWPN. The SCSI Devices tab lists the SCSI storage devices attached to this adapter. If you expect to see a device that is not listed, right-click on the adapter and select Rescan. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 75 SNS Table tab Persistent Binding tab Bios Setting tab The SNS Table tab lists the ports to which this adapter is zoned. VTL queries the switch for its Simple Name Server (SNS) database and displays this information. If you expect to see a WWPN that is not listed, right-click on the adapter and select Refresh SNS. (Initiator ports only) The Persistent Binding tab lists all of the target ports to which this adapter is bound. The Bios Setting tab lists all of the HBA settings for this adapter so that you can confirm what is set. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 76 VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 77 Set QLogic ports to target mode Single port QLogic HBAs By default, all QLogic point-to-point ports are set to initiator mode, which means they will initiate requests rather than receive them. Determine which ports you want to use in target mode and set them to become target ports so that they can receive requests from your Fibre Channel Clients. You need to switch one of those initiators into target mode so your clients will be able to see the VTL Server. You will then need to select the equivalent adapter on the secondary server and switch it to target mode. Note: If a port is in initiator mode and has devices attached to it, that port cannot be set for target mode. To set a port: 1. In the Console, expand Physical Resources. 2. Right-click on a HBA and select Options --> Enable Target Mode. You will get a Loop Up message on your VTL Server if the port has successfully been placed in target mode. 3. When done, make a note of all of your WWPNs. It may be convenient for you to highlight your server and take a screenshot of the Console. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 78 Multi port QLogic HBAs With a multi-ID HBA, each port can be both a target and an initiator. To use target mode, you must enable target mode on a port. To set target mode: 1. In the Console, expand Physical Resources. 2. Right-click on a multi-ID HBA and select Options --> Enable Target Mode. Note: If you want to spoof a multi-ID WWPN, enter the spoofed target WWPN to replace the default Target WWPN. All targets must use either the soft or hard Alpa (Arbitrated Loop Physical Address) creation method. You cannot mix and match. Soft Alpa creation method - HBA firmware generates Alpa addresses. Hard Alpa creation method - You have to specify Alpa addresses. 3. Click OK to enable. Afterwards, you will see two WWPNs listed for the port. The first is the base WWPN and the second is the Target WWPN (also known as the alias port). Clients need to be zoned to this port in order to see devices. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 79 Associate World Wide Port Names with clients Similar to an IP address, the WWPN uniquely identifies a port in a Fibre Channel environment. Unlike an IP address, the WWPN is vendor assigned and is hardcoded and embedded. Depending upon whether or not you are using a switched Fibre Channel environment, determining the WWPN for each port may be difficult. • • If you are using a switched Fibre Channel environment, VTL will query the switch for its Simple Name Server (SNS) database and will display a list of all available WWPNs. You will still have to identify which WWPN is associated with each machine. If you are not using a switched Fibre Channel environment, you can manually determine the WWPN for each of your ports. There are different ways to determine it, depending upon the hardware vendor. You may be able to get the WWPN from the BIOS during bootup or you may have to read it from the physical card. Check with your hardware vendor for their preferred method. To simplify this process, when you enabled Fibre Channel, an Everyone client was created under SAN Clients. This is a generic client that you can assign to all (or some) of your tape libraries/drives. It allows any WWPN not already associated with a Fibre Channel client to have read/write non-exclusive access to any tape libraries/ drives assigned to Everyone. For security purposes, you may want to assign specific WWPNs to specific clients. For the rest, you can use the Everyone client. Do the following for each client for which you want to assign specific virtual devices: 1. Highlight the Fibre Channel Client in the Console. 2. Right-click on the Client and select Properties. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 80 3. Select the Initiator WWPN(s) belonging to your client. Here are some methods to determine the WWPN of your clients: - Most Fibre Channel switches allow administration of the switch through an Ethernet port. These administration applications have utilities to reveal or allow you to change the following: Configuration of each port on the switch, zoning configurations, the WWPNs of connected Fibre Channel cards, and the current status of each connection. You can use this utility to view the WWPN of each Client connected to the switch. - When starting up your Client, there is usually a point at which you can access the BIOS of your Fibre Channel card. The WWPN can be found there. - The first time a new Client connects to the VTL Server, the following message appears on the server screen: FSQLtgt: New Client WWPN Found: 21 00 00 e0 8b 43 23 52 4. If necessary, click Add to add WWPNs for the client. You will see the following dialog if there are no WWPNs in the server’s list. This could occur because the client machines were not turned on or because all WWPNs were previously associated with clients. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 81 iSCSI Clients Overview The VTL server is protocol-independent and supports multiple outbound target protocols, including iSCSI Target Mode. iSCSI builds on top of the regular SCSI standard by using the IP network as the connection link between various entities involved in a configuration. iSCSI inherits many of the basic concepts of SCSI. For example, just like SCSI, the entity that makes requests is called an initiator, while the entity that responds to requests is called a target. Only an initiator can make requests to a target; not the other way around. Each entity involved, initiator or target, is uniquely identified. By default, when a client machine is added as an iSCSI client of a VTL server, it becomes an iSCSI initiator. The initiator name is important because it is the main identity of an iSCSI initiator. Supported platforms iSCSI target mode is supported for the following platforms: • • Windows Linux VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 82 Windows configuration Requirements • • • A VTL server with an Ethernet adapter installed. A Windows client machine. You must install an iSCSI software initiator on each of your client machines. iSCSI initiator software/hardware is available from many sources and needs to be installed and configured on all clients that will access shared storage. For Windows hosts, you can download from Microsoft’s website: http:// www.microsoft.com/windowsserversystem/storage/iscsi.mspx Enable iSCSI In order to add a client using the iSCSI protocol, you must enable iSCSI for your VTL server. In the VTL Console, right-click on your VTL server, select Options --> Enable iSCSI. As soon as iSCSI is enabled, a new SAN client called Everyone_iSCSI is automatically created on your VTL server. This is a special SAN client that does not correspond to any specific client machine. Using this client, you can create iSCSI targets that are accessible by any iSCSI client that connects to the VTL server. While such a publicly available target is convenient, it should be avoided, or at least configured with the proper read/write access, so that there will be no data corruption if two or more clients use the Everyone_iSCSI client simultaneously. Before an iSCSI client can be served by a VTL server, the two entities need to mutually recognize each other. The following sections take you through this process. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 83 Register client initiators with your VTL server This enables the VTL server to see the available initiators. The following steps are for the Microsoft iSCSI Initiator. If you are using a different iSCSI initiator, refer to the documentation provided by the vendor. You can also manually add your initiators through the Add Client wizard in the VTL Console. 1. Run Microsoft iSCSI Initiator on the Windows client machine. You can find the program in the Control Panel or on your desktop (if you are the user that installed it). 2. Click Add on the Target Portals tab and enter the VTL server’s IP address or name (if resolvable). Use the default socket. 3. Click Advanced and go to the General tab. In the CHAP logon information section, you can see the iSCSI initiator name of the client machine automatically filled in as the user name. Note that it is possible to change the initiator name of the machine by going to the Initiator Settings tab. However, it should be avoided because the default name is the one most appropriate according to the iSCSI standard as well as common practices. Altering it can possibly introduce unnecessary complications. If the client machine is a mobile client, select CHAP logon information and replace the initiator name with a user name that belongs to one of the VTL server’s mobile clients. It can still obtain iSCSI targets by authenticating as a mobile client. In this case, in Target secret, enter the corresponding password. Then, click OK to finish adding the target portal. Note: If the client machine is not a mobile client, do not select CHAP logon information. 4. Click OK to add the client. When you click OK, any iSCSI target assigned to the client will appear on the Available Targets tab. However, since no actual iSCSI target has been assigned to the VTL server’s iSCSI clients yet, the Available Targets tab will currently be blank. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 84 Add your iSCSI client 1. Right-click on SAN Clients and select Add. 2. Select iSCSI and determine if the client is a mobile client. Stationary iSCSI clients corresponds to specific iSCSI client initiators, and consequently, the client machine that owns the specific initiator names. Only a client machine with a correct initiator name can connect to the VTL server to access the resources assigned to this stationary client. A mobile client is simply a username and password that a user can use to authenticate to the VTL server from any iSCSI client machine. Note that when you right-click on a mobile client in the VTL Console, the Properties option is grayed out because the properties, such as the list of assigned iSCSI initiator names, do not apply to mobile clients. If you want to change the username or password for a mobile client, you must delete the current one and then recreate it with the desired username and password. 3. Determine how the client should be named. You can create the name from the initiator name or enter a custom name. 4. Select the initiator that this client uses. If the initiator does not appear, you can manually add it. 5. Add/select users who can authenticate for this client. Click Add to add users. You will have to enter a name and password for each. For unauthenticated access, select Allow Unauthenticated Access. With unauthenticated access, the VTL server will recognize the client as long as it has an authorized initiator name. With authenticated access, an additional check is added that requires the user to type in a username and password. More than one username/password pair can be assigned to the client, but they will only be useful when coming from the machine with an authorized initiator name. 6. Confirm all information and click Finish. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 85 Create targets for the iSCSI client to log onto 1. In the VTL Console, create at least one virtual iSCSI device (i.e. a virtual tape library) that can be used for iSCSI clients but do not assign it/them to the iSCSI clients until a target is created. 2. Right-click on an iSCSI client and select Create Target. 3. Enter a new target name for the client or accept the default. 4. Select the IP address of the VTL server. 5. Use the default starting LUN. LUN IDs must start with zero. Once the iSCSI target is created for a client, LUNs can be assigned under the target using available virtual iSCSI devices. 6. Confirm all information and click Finish. 7. Select Yes to assign a resource to the new target. 8. Select the virtual iSCSI device(s) to be assigned to the client. You can only assign a device to a client once even if the client has multiple targets. You cannot assign the same device to the same client more than once. 9. If needed, change the LUN for the resource. 10. Confirm all information and click Finish. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 86 Log the client onto the target The following steps are for the Microsoft iSCSI Initiator. If you are using a different iSCSI initiator, refer to the documentation provider by the vendor. 1. To see the iSCSI targets from the client machine, run Microsoft iSCSI Initiator again. 2. Since the VTL server is already added as a target portal, go to the Available Targets tab and click Refresh to get the latest status. Assigned iSCSI targets should now appear. 3. Click Log On and select Automatically restore this connection when the system reboots if it is desirable to have a persistent target. 4. Click Advanced and select CHAP logon information. If the iSCSI target is assigned to a mobile client from the VTL server, enter the authentication credential for that mobile client. If the target is assigned to this particular client machine, and authenticated access is used, enter an assigned username and password for this client. This should be the same username/password that you entered when you added the client in the VTL Console. Once logged on, the status of an iSCSI target should change to Connected. The Active Sessions tab lists all of the iSCSI targets that are already in Connected status. It also allows the client machine to log off from each iSCSI target. Disable iSCSI To disable iSCSI for a VTL server, right-click on the server node in the VTL Console, and select Options --> Disable iSCSI. Note that before disabling iSCSI, all iSCSI initiators and targets for this VTL server must be removed. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 87 Linux client configuration Prepare the iSCSI initiator You must install and configure an iSCSI software initiator on each of your Linux client machines. 1. Download the latest production iSCSI initiator from the following website: http:// sourceforge.net/projects/linux-iscsi/ 2. Extract the files from the .gz file that you downloaded by typing: tar xfvz filename For example: tar xfvz linux-iscsi-3.4.3.gz 3. Compile the iSCSI initiator. To do this, go to the newly created directory (such as linux-iscsi-3.4.3) and type the following commands: make clean make make install 4. Edit the /etc/iscsi.conf file. If you are not using CHAP, add the following line to the end of the file: DiscoveryAddress=IP address of VTL server For example: DiscoveryAddress=192.10.10.1 If you are using CHAP, add the following lines to the end of the file: DiscoveryAddress=IP address of VTL server OutgoingUsername=CHAP username OutgoingPassword=CHAP password You must make a note of the CHAP username and password because you will have to enter it in the VTL Console. 5. Start the initiator by typing: /etc/init.d/iscsi start Add your iSCSI client 1. In the VTL Console, right-click on SAN Clients and select Add. 2. Enter a name for the client. 3. Click Find to locate the client machine. The IP address of the machine with the specified host name will be automatically filled in if the name is resolvable. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 88 4. Select iSCSI and determine if the client is a mobile client. Stationary iSCSI clients corresponds to specific iSCSI client initiators, and consequently, the client machine that owns the specific initiator names. Only a client machine with a correct initiator name can connect to the VTL server to access the resources assigned to this stationary client. A mobile client is simply a username and password that a user can use to authenticate to the VTL server from any iSCSI client machine. Note that when you right-click on a mobile client in the VTL Console, the Properties option is grayed out because the properties, such as the list of assigned iSCSI initiator names, do not apply to mobile clients. 5. Select the initiator that this client uses. If the initiator does not appear, you can manually add it. 6. Enter/select users who can authenticate for this client. Click Add to add users. You will have to enter a name and password for each. For unauthenticated access, select Allow Unauthenticated Access. With unauthenticated access, the VTL server will recognize the client as long as it has an authorized initiator name. With authenticated access, an additional check is added that requires the user to type in a username and password. More than one username/password pair can be assigned to the client, but they will only be useful when coming from the machine with an authorized initiator name. 7. Confirm all information and click Finish. Create targets for the iSCSI client to log onto 1. In the VTL Console, create at least one virtual iSCSI device (i.e. a virtual tape library) that can be used for iSCSI clients but do not assign them to the iSCSI clients until a target is created. 2. Right-click on an iSCSI client and select Create Target. 3. Enter a new target name for the client or accept the default. 4. Select the IP address of the VTL server. 5. Select the iSCSI device(s) to be assigned to the client. 6. Use the default starting LUN. LUN IDs must start with zero. Once the iSCSI target is created for a client, LUNs can be assigned under the target using available iSCSI devices. 7. Confirm all information and click Finish. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 89 Log the client onto the target On the client machine, type the following command to log the client onto the target: /etc/init.d/iscsi reload Afterwards, you can display a list of all the disks that this client can access (including the target) by typing: cat /proc/scsi/scsi VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 90 Email Alerts VTL includes a unique customer support utility that proactively identifies and diagnoses potential system or component failures and automatically notifies system administrators via email. Using pre-configured scripts (called triggers), Email Alerts monitors a set of predefined, critical system components (memory, disk, etc.). With its open architecture, administrators can easily register new elements to be monitored by these scripts. When an error is triggered, Email Alerts generates an email and sends it to a system administrator. With Email Alerts, system administrators are able to take corrective measures within the shortest amount of time, ensuring optimum service uptime and IT efficiency. Configure Email Alerts 1. In the Console, right-click on your VTL server and select Options --> Enable Email Alerts. 2. Enter general information for your Email Alerts configuration. SMTP Server - Specify the mail server that Email Alerts should use to send out notification emails. SMTP Port - Specify the mail server port that Email Alerts should use. SMTP Server supports authentication - Indicate if the SMTP server supports authentication. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 91 SMTP Username/Password - Specify the user account that will be used by Email Alerts to log into the mail server. From - Specify the email account that will be used in the “From” field of emails sent by Email Alerts. To - Specify the email address of the account that will receive emails from Email Alerts. This will be used in the “To” field of emails sent by Email Alerts. CC - Specify any other email accounts that should receive emails from Email Alerts. Subject - Specify the text that should appear on the subject line. Interval - Specify how frequently the Email Alerts triggers and the System Log should be checked. Test - Click the Test button to send a test Email Alerts email. 3. In the Signature tab, enter the contact information that should appear in each Email Alerts email. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 92 4. In the Trigger tab, selectt the triggers that will cause Email Alerts to send an email. Triggers are the scripts/programs that perform various types of error checking. By default, scripts/programs are provided that check for low system memory, low disk space, and relevant new entries in the system log. The following are the default scripts that are provided: chkcore.sh 10 (Core file check) - This script checks to see if a new core file has been created by the operating system in the bin directory of VTL. If a core file is found, Email Alerts compresses it, deletes the original, and sends an email report but does not send the compressed core file (which can still be large). If there are more than 10 (variable) compressed core files, they will all be deleted. memchk.sh 5 (Memory check) - This script takes in a percentage as the parameter and checks whether the available system memory is below this percentage. If yes, Email Alerts sends an email report. syslogchk.sh (System log check) - This script looks at the system log for specific entries that it needs to report on. This is determined by information specified on the System Log Check dialog. If matches are found, Email Alerts sends an email report. diskusagechk.sh / 95 (Disk usage check) - This script checks the disk space usage of the root file system. If the current percentage is over the specified percentage (default is 95), Email Alerts sends an email report. You can add multiple diskusagechk.sh triggers for different mount points (for example, /home could be used in another trigger). vtlstatus.sh (VTL status check) - This script calls “vtl status” and checks if any module of VTL has stopped. If so, Email Alerts sends an email report. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 93 If you need to modify an existing script or create a new script/program, refer to ‘Script/program trigger information’ for more information. 5. In the System Log Check tab, indicate the terms that should be tracked in the system log by Email Alerts. The system log records important events or errors that occur in the system, including those generated by VTL. This dialog allows you to rule out entries in the system log that have nothing to do with VTL, and to list the types of log entries generated by VTL that Email Alerts needs to examine. Entries that do not match the entries here will be ignored, regardless of whether or not they are relevant to VTL. The trigger for monitoring the system log is syslogchk.sh. To inform the trigger of which specific log entries need to be captured, you can specify the general types of entries that need to be inspected by Email Alerts. Each line is a regular expression. The regular expression rules follow the pattern for AWK (a standard Unix utility). VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 94 6. In the Event Notification Configuration tab, indicate the severity level of messages that should be sent as email alerts by Email Alerts. If you select None, no messages will be sent via email. Maximum event wait time is the maximum period of time within which an e-mail will be sent once a message is received. 7. Confirm all information and click Finish to enable Email Alerts. Modify Email Alerts properties Once Email Alerts is enabled, you can modify the information by right-clicking on your VTL server and selecting Email Alerts. Click on the appropriate tab to update the desired information. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 95 Script/program trigger information Email Alerts uses script/program triggers to perform various types of error checking. By default, several scripts/programs are provided that check for low system memory, changes to the VTL XML configuration file, and relevant new entries in the system log. Customize email for a specific trigger You can specify an email address to override the default To address or a text subject to override the default Subject. To do this: 1. Right-click on your VTL server and select Email Alerts. 2. Select the Trigger tab. 3. For an existing trigger, highlight the trigger and click Edit. For a new trigger, click Add. 4. Check the Redirect Notification Without Attachment checkbox. 5. Enter the alternate email address or subject. If you specify an email address, it overrides the return code. Therefore, no attachment will be sent, regardless of the return code. New script/program The trigger can be a shell script or a program (Java, C, etc.). If you create a new script/program, you must add it in the Console so that Email Alerts knows of its existence. To do this: 1. Right-click on your VTL server and select Email Alerts. 2. Select the Trigger tab. 3. Click Add. 4. Click Browser to locate the shell script/program. 5. If required, enter an argument for the trigger. You can also enter a comment for the trigger and specify alternate email information. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 96 Return codes Return codes determine what happens as a result of the script’s/program’s execution. The following return codes are valid: • • Output from trigger Sample script 0: No action is required and no email is sent. Non-zero: Email Alerts sends an email. In order for a trigger to send useful information in the email body, it must redirect its output to the environment variable $IPSTORCLHMLOG. The following is the content of the VTL status check trigger, vtlstatus.sh: #!/bin/sh RET=0 if [ -f /etc/.is.sh ] then . /etc/.is.sh else echo Installation is not complete. Environment profile is missing in /etc. echo exit 0 # don't want to report error here so have to exit with error code 0 fi $ISHOME/bin/vtl status | grep STOPPED >> $VTLCLHMLOG if [ $? -eq 0 ] ; then RET=1 fi exit $RET If any VTL module has stopped, this trigger generates a return code of 1 and sends an email. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 97 Command Line VirtualTape Library (VTL) provides a simple utility that allows you to perform some of the more common VTL functions at a command line instead of through the VTL Console. You can use this command line utility to automate many tasks, as well as integrate VTL with your existing management tools. Using the command line utility Type iscon at the command line to display a list of commands. Each command must be combined with the appropriate long or short arguments (ex. Long: --server-name Short: -s servername) that are described in this chapter. If you type the command name (for example, c:\iscon importtape), a list of arguments will be displayed for that command. Commands On the following pages is a list of commands you can use to perform VTL functions from the command line. You should be aware of the following as you enter commands: • • • • • • • • Type each command on a single line, separating arguments with a space. You can use either the short or long arguments. Variables are listed in <> after each argument. Arguments listed in brackets [ ] are optional. The order of the arguments is irrelevant. Arguments separated by | are choices. Only one can be selected. For a value entered as a literal, it is necessary to enclose the value in quotes (double or single) if it contains special characters such as *, <, >, ?, |, %, $, or space. Otherwise, the system will interpret the characters with a special meaning before it is passed to the command. Literals cannot contain leading or trailing spaces. Leading or trailing spaces enclosed in quotes will be removed before the command is processed. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 98 Common arguments The following arguments are used by many commands. For each, a long and short variation is included. You can use either one. The short arguments ARE case sensitive. For arguments that are specific to each command, refer to the section for that command. Short Argument Long Argument Value/Description -s --server-name VTL Server Name (hostname or IP address) -u --server-username VTL Server Username -p --server-password VTL Server User Password -c --client-name VTL Client Name -v --vdevid VTL Virtual Device ID Note: You only need to use the --server-username (-u) and --server-password (-p) arguments when you log into a server. You do not need them for subsequent commands on the same server during your current session. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 99 Login/logout to the VTL Server Log in to the VTL Server iscon login [-s-u -p |-e] [-X ] iscon login [--server-name= --server-username= --server-password= |--environment] [--rpc-timeout= ] Description: This command allows you to log into the specified VTL Server with a given username and password. Once successfully logged into the server, -u (--server-username) and –p (--server-password) are not necessary for the other CLI commands with optional –u and –p arguments. In order to use the -e (--environment) parameter, you must set the following three environment variables: • • • ISSERVERNAME ISUSERNAME ISPASSWORD After setting these variables, the environment parameter can be used in the login command in place of -s -u -p . Therefore, you could type the following to log in: iscon login -e To set these environment variables in the bash shell, you must set three variables as follows: • • • export ISSERVERNAME=10.1.1.1 export ISUSERNAME=root export ISPASSWORD=password -X (--rpc-timeout) is an option to specify a number between 1 and 30000 in seconds for the RPC timeout. The system will retry the command for the amount of time specified if the server does not respond. The default RPC timeout is 30 seconds. Log out from the VTL Server iscon logout -s [-X ] iscon logout --server-name= [--rpc-timeout= ] Description: This command allows you to log out from the specified VTL Server. If the server was not logged in or you have already logged out from the server when this command is issued, error 0x0902000f will be returned. After logging out from the server, the -u and –p arguments will not be optional for the server commands. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 100 Virtual devices / Clients Get virtual device list iscon getvdevlist -s [-u -p ] [-l [-v | -n ] [-A] [-C] [-M ] ] [-X ] iscon getvdevlist --server-name= [--server-username= --server-password= ] [--longlist [--vdevid= | --vdevname= ] [--long-physical-layout] [--long-client-list] [--output-delimiter= ] ] [--rpc-timeout= ] Description: This command retrieves and displays information about all virtual devices or a specific virtual device from the specified server. The default output format is a list with a heading. The –l (--longlist) optional argument displays detailed information for each virtual device. Additional options can be specified along with the –l (--longlist) option to display the physical device layout and/or the assigned client information. -v (--vdevid) or -n (--vdevname) are options to display only the specified virtual device information when -l (--longlist) is specified. -A(--long-physical-layout) displays the physical layout when -l (--longlist) is specified. -C (--long-client-list) displays the assigned client list when -l (--longlist) option is specified. -M (--output-delimiter) can be specified when -l is specified to replace the linefeed with the specified delimiter. The maximum length of the delimiter is 8. -X (--rpc-timeout) is an option to specify a number between 1 and 30000 in seconds for the RPC timeout. The system will retry the command for the amount of time specified if the server does not respond. The default RPC timeout is 30 seconds. Get Client virtual device list iscon getclientvdevlist -s [-u -p ] -c [-t ] [-l [-M ] ] [-X ] iscon getclientvdevlist --server-name= [--server-username= --server-password= ] --client-name= [--client-type= ] [--longlist [--output-delimiter= ] ] [--rpc-timeout= ] Description: This command retrieves and displays information about all virtual devices assigned to the client from the specified server. The default output format is a list with heading. Use -c (--client-name) to specify a client name or * for all clients. -t (client-type) is the type of the client protocol to be retrieved in one of the following values: SCSI, FC, or ISCSI. The client type will only take effect when the client name is *. Be aware that in some platforms you are required to enclose the "*" in double quote to take it as a literal. -l(--longlist) is an option to display the long format. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 101 -M (--output-delimiter) can be specified when -l is specified to replace the linefeed with the specified delimiter. The maximum length of the delimiter is 8. -X (--rpc-timeout) is an option to specify a number between 1 and 30000 in seconds for the RPC timeout. The system will retry the command for the amount of time specified if the server does not respond. The default RPC timeout is 30 seconds. Add client iscon addclient -s [-u -p ] -c [-I ] [-a ] [-A ]] | [-C ] [-X ] iscon addclient --server-name= [--server-username= --server-password= ] --client-name= [--initiator-wwpns= ] [--enable-VSA= ] [--enable-iSeries= ]] | [--enable-Celerra= ] [--rpc-timeout= ] Description: This command allows you to add a client to the specified server. -c (--client-name) is a unique client name for the client to be created. The maximum length of the client name is 64. The following characters are invalid for a client name: <>"&$/\' -I (--initiator-wwpns) is the option to set the initiator WWPNs. An initiator WWPN is a 16-byte Hex value. Separate initiator WWPNs with commas if more than one initiator WWPN is specified. For example: 13af35d2f4ea6fbc,13af35d2f4ea6fad -a (--enable-VSA) is an option for Volume Set Addressing with the following values: on or off (default). -A (--enable-iSeries) is an option to support IBM iSeries Server with the following values: on or off (default). -C (--enable-Celerra) is an option to support Celerra with the following values: on or off (default). Enabling Celerra will automatically disable VSA and iSeries, and vice versa. -X (--rpc-timeout) is an option to specify a number between 1 and 30000 in seconds for the RPC timeout. The system will retry the command for the amount of time specified if the server does not respond. The default RPC timeout is 30 seconds. Delete client iscon deleteclient -s [-u -p ] -c [-X ] iscon deleteclient --server-name= [--server-username= --server-password= ] --client-name= [--rpc-timeout= ] Description: This command allows you to delete a client from the specified server. -c (--client-name) is the name of the client to be deleted. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 102 -X (--rpc-timeout) is an option to specify a number between 1 and 30000 in seconds for the RPC timeout. The system will retry the command for the amount of time specified if the server does not respond. The default RPC timeout is 30 seconds. Get client properties iscon getclientprop -s [-u -p ] -c [-X ] iscon getclientprop --server-name= [--server-username= --server-password= ] --client-name= [--rpc-timeout= ] Description: This command gets client properties. -c (--client-name) is required to specify the client name. -X (--rpc-timeout) is an option to specify a number between 1 and 30000 in seconds for the RPC timeout. The system will retry the command for the amount of time specified if the server does not respond. The default RPC timeout is 30 seconds. Assign virtual device iscon assignvdev -s [-u -p ] -v -c -a [-y] [-I ] [-T ] [-l ] [-X ] iscon assignvdev --server-name= [--server-username= --server-password= ] --vdevid= --client-name= --access-mode= [--vlib-only] [--initiatorWWPN= ] [--targetWWPN= ] [--lun= ] [--rpc-timeout= ] Description: This command allows you to assign a virtual device on a specified server to a client. -v (--vdevid) is required to specify the virtual device ID of the virtual tape library or virtual tape drive to be assigned. -c (--client-name) is required to specify the client to which the virtual tape library or drive will be assigned. The values for are: Readonly, ReadWrite, ReadWriteNonExclusive. The values for the short format are: R / W / N. -y (--vlib-only) is an option that allows you to assign the virtual tape library to the client without assigning all of the virtual tape drives in the library. The default is to assign all of the virtual tape drives in the library. -I (--initiatorWWPN) and -T (--targetWWPN) are options for Fibre Channel clients. The initiator WWPN or target WWPN is a 16-byte hex value or "*" for all. For example, 13af35d2f4ea6fbc. The default is "*" if it is -I or the -T option is not specified. -l (--lun) is another option for Fibre Channel clients. The range is between 0 and 15. The next available LUN will be assigned if is it is not specified. -M (--output-delimiter) can be specified when -l is specified to replace the linefeed with the specified delimiter. The maximum length of the delimiter is 8. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 103 -X (--rpc-timeout) is an option to specify a number between 1 and 30000 in seconds for the RPC timeout. The system will retry the command for the amount of time specified if the server does not respond. The default RPC timeout is 30 seconds. Unassign virtual device iscon unassignvdev -s [-u -p ] -v -c [-y] [-f] [-X ] iscon unassignvdev --server-name= [--server-username= ] [--server-password= ] --vdevid= --client-name= [--vlib-only] [--force] [--rpc-timeout= ] Description: This command allows you to unassign a virtual device on the specified server from a client. -v (--vdevid) is required to specify the virtual device ID of the virtual tape library or drive to be unassigned. -c (--client-name) is required to specify the client name from which to unassign the library or drive. -y (--vlib-only) is an option that allows you to unassign the virtual tape library to the client without unassigning all of the virtual tape drives in the library. The default is to unassign all of the virtual tape drives in the library. The -f (--force) option is required to unassign the virtual device when the client is connected and the virtual device is attached. An error will be returned if the force option is not specified. -X (--rpc-timeout) is an option to specify a number between 1 and 30000 in seconds for the RPC timeout. The system will retry the command for the amount of time specified if the server does not respond. The default RPC timeout is 30 seconds. Create virtual device iscon createvdev -s [-u -p ] -I [-n ] [-X ] iscon createvdev --server-name= [--server-username= --server-password= ] --scsiaddress= [--vdevname= ] [--rpc-timeout= ] Description: This command allows you to create a direct virtual device, such as virtual tape library or virtual tape drive. -I (--scsiaddress) is required to specify the SCSI address of the virtual tape library or virtual tape drive in the following format: ACSL=#:#:#:# (adapter:channel:id:lun) -n (--vdevname) is an option to specify the direct virtual device name. A default name will be generated if the name is not specified.The maximum length is 64. Leading and trailing spaces will be removed. Enclose the name in double quotes.The following characters are invalid for the direct virtual device name: <>"&$/\' -X (--rpc-timeout) is an option to specify a number between 1 and 30000 in seconds for the RPC timeout. The system will retry the command for the amount of time specified if the server does not respond. The default RPC timeout is 300 seconds. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 104 Delete virtual device iscon deletevdev -s [-u -p ] -v [-d] [-f] [-X ]] iscon deletevdev --server-name= [--server-username= --server-password= ] --vdevid= [--delete-virtual-tapes] [--force] [--rpc-timeout= ] Description: This command allows you to delete a virtual tape library, virtual tape drive, standalone virtual tape drive, or virtual tape. In order to delete a virtual tape drive from a virtual tape library, the virtual tape drive must have the highest element number in the library. -v (--vdevid) is required to specify the virtual device ID. A virtual device cannot be deleted if any of the following conditions apply: • • • The specified virtual device is a virtual tape library or a virtual tape drive and there are clients currently connected to the library or drive. The specified virtual device is a virtual tape configured for replication, unless the -f (--force) option is used. The specified virtual device is the only existing virtual tape drive in the parent virtual tape library. -d (--delete-virtual-tapes) is an option to delete all of the existing virtual tapes from a virtual tape library, a standalone virtual tape drive, or a loaded virtual tape drive selected for deletion. By default, the virtual tapes are moved to the vault, or, if a loaded virtual tape drive is selected, back to the library. -f (--force) is an option to force the deletion of a virtual tape configured for replication. The corresponding virtual tape replica will not be deleted or promoted. -X (--rpc-timeout) is an option to specify a number between 1 and 30000 seconds for the RPC timeout. The system will retry the command for the amount of time specified if the server does not respond. The default RPC timeout is 30 seconds. Get supported virtual libraries iscon getsupportedvlibs -s [-u -p ] [-l [-t ] [-c][-M ] ] [-X ] iscon getsupportedvlibs --server-name= [--server-username= --server-password= ] [--longlist [--vlib-type= ] [--compatible-drive-list] [--output-delimiter= ] ] [--rpc-timeout= ] Description: This command retrieves information about all supported virtual tape libraries. -l (--longlist) can be specified to get the supported library information in a long format. The default is to display the information in a list format. -t (--vlib-type) is an option with the -l (--longlist) option to get the detail library information for a specific library. The format for the is: : . For example, ADIC:Scalar 100 VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 105 -c (--compatible-drive-list) is an option to display the compatible drives in a tabular format instead of the default long format. -M (--output-delimiter) can also be specified with the -l (--longlist) option to replace the linefeed with the specified delimiter. The maximum length of the delimiter is 8. -X (--rpc-timeout) is an option to specify a number between 1 and 30000 in seconds for the RPC timeout. The system will retry the command for the amount of time specified if the server does not respond. The default RPC timeout is 30 seconds. Get supported virtual drives iscon getsupportedvdrives -s [-u -p ] [-l [-M ] ] [-X ] iscon getsupportedvdrives --server-name= [--server-username= --server-password= ] [--longlist [--output-delimiter= ] ] [--rpc-timeout= ] Description: This command retrieves information about all supported virtual tape drives. -l (--longlist) can be specified to get the supported drive information in a long format. The default is to display the information in a list format. -M (--output-delimiter) can be specified when -l is specified to replace the linefeed with the specified delimiter. The maximum length of the delimiter is 8. -X (--rpc-timeout) is an option to specify a number between 1 and 30000 in seconds for the RPC timeout. The system will retry the command for the amount of time specified if the server does not respond. The default RPC timeout is 30 seconds. Create virtual tape library iscon createvirtuallibrary -s [-u -p ] -t [-n ] -d [-r ] [-R ] [-A [-Y ] [-J] | -N -S [-M <#[D|H|M]>] ] [-B ] [-T ] [-E ] [-D -I -C ] [-m ] [-L ] [-k -W ] [-X ] iscon createvirtuallibrary --server-name= [--server-username= --server-password= ] --vlib-type= [--vlib-name= ] --vdrive-type= [--vdrive-name-prefix= ] [--num-of-drives= ] [--auto-archive-mode= [--delay-delete-days= ] [--auto-eject-to-ie] | --auto-replication= --target-name= [--delay-delete-time=<#[D|H|M]>] ] [--barcode= ] [--num-of-slots= ] [--import-export-slots= ] [--capacity-on-demand --initial-size= --increment-size= ] [--max-capacity= ] [--auto-loader= ] [--key-name= --key-pasword= ] [--rpc-timeout= ] Description: This command creates a virtual tape library. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 106 -t (--vlib-type) is required in the following format: : -n (--vlib-name) is optional. A default name will be provided in the format of - - if it is not specified. -d (--vdrive-type) is required to specify the type of tape drive to be created in the library. The format of is as follows: : -r (--vdrive-name-prefix) is an option to specify the prefix of the virtual drive. The default prefix is in the format of - - . -R (--num-of-drives) can also be specified up to the maximum number of drives supported by the library. The default is 1 if it is not specified. -A (--auto-archive-mode) is an option with one of the following values: copy or move. -Y (--delay-delete-days) is an option for move mode to specify the number of days to wait before deletion. The maximum is 365 days. -J (--auto-eject-to-ie) is an option to be specified with -A (--auto-archive-mode) to eject the tape to the import/export (IE) slot after the export job. -N (--auto-replication) is an option with one of the following values: replication or remotemove. -S (--target-name) is the remote server name for auto-replication. It is required for auto-replication. -M (--delay-delete-time) is an option for remotemove mode to specify a time to wait before deletion. It can be specified in days(D), hours(H) or minutes(M). For example, 2D, 10H, 150M. The default value is one day. -B (--barcode) can be specified in the following format: - Barcode is an alpha-numeric value with a length of 4 to 12. and have to be the same length. has to be greater then . A default will be generated if it is not specified. -T (--num-of-slots) and -E (--import-export-slots) are optional. The can exceed the maximum number of slots supported by the specified library type, but it is limited to 65536. The <--import-export-slots> cannot exceed the maximun number of IE slots supported by the specified library type. The default is to use the maximum number of slots supported by the specified library type. -D (--capacity-on-demand) is an option to expand the virtual tape when needed. The default is to create the virtual tape with the maximum capacity if it is not specified. -I (--initial-size) and -C (--increment-size) are options to be specified with option. The default value for both options is 5 GB. The <--increment-size> cannot be less than 5 GB. -m (--max-capacity) is an option to specify the maximum capacity of the virtual tape. The maximum capacity configured for the specified type of virtual library will be used if it is not specified. The unit of , and are all in GB. -L (--auto-loader) is an option to set the auto-loader for those libraries that support the feature. The default value is off. VTL Prime Solaris User’s Guide • September 2008 • 316855201 • A 107 -k (--key-name) and -W (--key-password) are options for tape encryption support to be set in conjunction with AutoArchive Mode. A virtual device ID will be assigned to the virtual library when it is created successfully. -X (--rpc-timeout) is an option to specify a number between 1 and 30000 in seconds for the RPC timeout. The system will retry the command for the amount of time specified if the server does not respond. The default RPC timeout is 30 seconds. Add virtual tape drive iscon addvirtualdrive -s [-u -p ] -L [-r ] [-R ] [-X ] iscon addvirtualdrive --server-name= [--server-username= --server-password= ] --tape-library-vid= [--vdrive-name-prefix= ] [--num-of-drives= ] [--rpc-timeout= ] Description: This command adds a virtual tape drive to a specify virtual tape library. -L (--tape-library-vid) is required to specify the virtual tape library to add the virtual tape drive(s). -r (--vdrive-name-prefix) is an option to specify the prefix of the virtual tape drive. The default prefix is in the format of - - . -R (--num-of-drives) is optional, the default is 1 if it is not specified. -X (--rpc-timeout) is an option to specify a number between 1 and 30000 in seconds for the RPC timeout. The system will retry the command for the amount of time specified if the server does not respond. The default RPC timeout is 300 seconds. Create standalone tape drive iscon createstandalonedrive -s [-u -p ] -d [-r ] [-R ] [-D -I