Command Control Interface User And Reference Guide CCI V01 46 03 02 MK 90RD7010 35

User Manual:

Open the PDF directly: View PDF PDF.
Page Count: 636

DownloadCommand Control Interface User And Reference Guide CCI V01 46 03 02 MK-90RD7010-35
Open PDF In BrowserView PDF
Command Control Interface
01-46-03/02

User and Reference Guide
This document describes and provides instructions for using the Command Control Interface (CCI)
software to configure and perform operations on the Hitachi RAID storage systems.

MK- 90RD7010-35
March 2018

© 2018 Hitachi, Ltd. All rights reserved.
No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including copying and
recording, or stored in a database or retrieval system for commercial purposes without the express written permission of Hitachi, Ltd., or
Hitachi Vantara Corporation (collectively “Hitachi”). Licensee may make copies of the Materials provided that any such copy is: (i) created as an
essential step in utilization of the Software as licensed and is used in no other manner; or (ii) used for archival purposes. Licensee may not
make any other copies of the Materials. “Materials” mean text, data, photographs, graphics, audio, video and documents.
Hitachi reserves the right to make changes to this Material at any time without notice and assumes no responsibility for its use. The Materials
contain the most current information available at the time of publication.
Some of the features described in the Materials might not be currently available. Refer to the most recent product announcement for
information about feature and product availability, or contact Hitachi Vantara Corporation at https://support.hitachivantara.com/en_us/contactus.html.
Notice: Hitachi products and services can be ordered only under the terms and conditions of the applicable Hitachi agreements. The use of
Hitachi products is governed by the terms of your agreements with Hitachi Vantara Corporation.
By using this software, you agree that you are responsible for:
1.

Acquiring the relevant consents as may be required under local privacy laws or otherwise from authorized employees and other
individuals; and

2.

Verifying that your data continues to be held, retrieved, deleted, or otherwise processed in accordance with relevant laws.

Notice on Export Controls. The technical data and technology inherent in this Document may be subject to U.S. export control laws, including
the U.S. Export Administration Act and its associated regulations, and may be subject to export or import regulations in other countries. Reader
agrees to comply strictly with all such regulations and acknowledges that Reader has the responsibility to obtain licenses to export, re-export, or
import the Document and any Compliant Products.
Hitachi is a registered trademark of Hitachi, Ltd., in the United States and other countries.
AIX, AS/400e, DB2, Domino, DS6000, DS8000, Enterprise Storage Server, eServer, FICON, FlashCopy, IBM, Lotus, MVS, OS/390, PowerPC, RS/6000,
S/390, System z9, System z10, Tivoli, z/OS, z9, z10, z13, z/VM, and z/VSE are registered trademarks or trademarks of International Business
Machines Corporation.
Active Directory, ActiveX, Bing, Excel, Hyper-V, Internet Explorer, the Internet Explorer logo, Microsoft, the Microsoft Corporate Logo, MS-DOS,
Outlook, PowerPoint, SharePoint, Silverlight, SmartScreen, SQL Server, Visual Basic, Visual C++, Visual Studio, Windows, the Windows logo,
Windows Azure, Windows PowerShell, Windows Server, the Windows start button, and Windows Vista are registered trademarks or trademarks
of Microsoft Corporation. Microsoft product screen shots are reprinted with permission from Microsoft Corporation.
All other trademarks, service marks, and company names in this document or website are properties of their respective owners.

Command Control Interface User and Reference Guide

ii

Contents
Preface.............................................................................................................xiv
Intended audience.............................................................................................xiv
Product version..................................................................................................xiv
Release notes....................................................................................................xiv
Changes in this revision..................................................................................... xv
Referenced documents...................................................................................... xv
Document conventions......................................................................................xvi
Conventions for storage capacity values...........................................................xix
Accessing product documentation..................................................................... xx
Getting help........................................................................................................xx
Comments..........................................................................................................xx

Chapter 1: Overview............................................................................. 21
About Command Control Interface.................................................................... 21
CCI functions..................................................................................................... 22
CCI functions matrix..................................................................................... 22
Provisioning functions...................................................................................23
Asynchronous command processing........................................................... 23
Command execution modes.........................................................................23
Precheck function.........................................................................................24
Command execution by the in-band and out-of-band methods................... 26
User authentication mode............................................................................ 28
LDEV nickname function.............................................................................. 28
LDEV grouping function............................................................................... 28
Resource group function.............................................................................. 29
Resource locking function............................................................................ 29
CCI functions available on all RAID storage systems........................................29
In-system replication.....................................................................................29

Contents
Command Control Interface User and Reference Guide

3

Remote replication........................................................................................30
Data protection............................................................................................. 30

Chapter 2: CCI software environment.................................................31
Overview of the CCI software environment....................................................... 31
CCI components on the RAID storage system.................................................. 32
Command device..........................................................................................32
Command device guarding..................................................................... 33
Alternate command device function........................................................ 35
Remote command device....................................................................... 36
CCI and the SCSI command interface......................................................... 37
Command competition............................................................................ 38
Command flow........................................................................................ 38
Issuing commands for LDEVs within a LUSE device..............................38
CCI instance components on the host server.................................................... 39
HORCM operational environment................................................................ 39
CCI instance configurations......................................................................... 40
Host machines that can be paired................................................................42
Configuration definition file........................................................................... 43
Configuration definition file settings..............................................................47
HORCM_MON........................................................................................ 47
HORCM_CMD (in-band method)............................................................ 48
HORCM_CMD (out-of-band method)......................................................53
HORCM_DEV......................................................................................... 56
HORCM_INST........................................................................................ 59
HORCM_LDEV....................................................................................... 60
HORCM_LDEVG.................................................................................... 61
HORCM_INSTP...................................................................................... 62
HORCM_ALLOW_INST..........................................................................62
Correspondence of the configuration definition file for cascading volume
and mirror descriptors...................................................................................63
Correspondence of configuration file and mirror descriptors.................. 63
Cascading connection and configuration files.........................................67
ShadowImage......................................................................................... 68
Contents
Command Control Interface User and Reference Guide

4

Cascading connections for TrueCopy and ShadowImage...................... 69
CCI software files...............................................................................................72
CCI files supplied with the software............................................................. 72
CCI files for UNIX-based systems...........................................................72
CCI files for Windows-based systems.....................................................74
CCI files for OpenVMS-based systems...................................................77
CCI log and trace files........................................................................................79
CCI log files.................................................................................................. 79
CCI trace files...............................................................................................82
CCI trace control command..........................................................................82
Command logging for audit.......................................................................... 82
Logging other than raidcom command................................................... 83
Logging raidcom command.....................................................................85
User-created files...............................................................................................88
User environment variable.................................................................................89

Chapter 3: CCI functions...................................................................... 90
System configuration using CCI........................................................................ 90
In-band system configurations and out-of-band system configurations....... 90
System configuration for connecting to a CCI server connected by the
in-band method using the out-of-band method............................................ 92
Connecting to CCI server already connected by In-Band method using Outof-Band method................................................................................................. 93
Hardware requirements................................................................................94
I/O Traffic Control......................................................................................... 94
Security setting.............................................................................................95
User authentication............................................................................................96
Command operation authority and user authentication..................................... 97
Controlling User Role................................................................................... 97
Controlling user resources............................................................................98
Commands executed depending on operation authorities......................... 101
Relation between resource groups and command operations......................... 111
Resource lock function.....................................................................................115
Command execution modes............................................................................ 116

Contents
Command Control Interface User and Reference Guide

5

Overview.....................................................................................................116
Context check............................................................................................. 118
Checking contents before executing scripts..........................................118
Details of check contents...................................................................... 118
Configuration check....................................................................................125
Resource location and parameter....................................................................125
MP blade location and parameter.............................................................. 125
LDEV grouping function...................................................................................127
Overview.....................................................................................................127
Device group definition methods................................................................ 130
Read operations and command device settings........................................ 130
Defining device groups...............................................................................132
Creating device groups......................................................................... 133
Adding LDEVs to device groups........................................................... 133
Deleting LDEVs from device groups..................................................... 134
Deleting device groups......................................................................... 135
Copy group function................................................................................... 136
Creating copy groups............................................................................137
Adding LDEVS to copy groups............................................................. 138
Deleting LDEVs from copy groups........................................................ 139
Deleting copy groups............................................................................ 140
Pair operation by specifying a copy group............................................ 141
Pair operations with mainframe volumes......................................................... 143
Using "dummy" LUs for mainframe LDEVs................................................ 143
Pair status and access permission for mainframe LDEVs......................... 144
Operational differences for multiplatform volumes..................................... 147
Operational differences for replication commands..................................... 147
Global storage virtualization function...............................................................149
System configuration example with the global storage virtualization
function.......................................................................................................150
Using CCI with the global storage virtualization function........................... 150
Configuration definition file settings with global storage virtualization........152
Example of the configuration definition files when specifying a virtual
storage machine by HORCM_CMD........................................................... 153
Contents
Command Control Interface User and Reference Guide

6

Specifying a virtual storage machine to HORCM_VCMD.......................... 155
Command operations to virtual storage machines................................155
Operation target for raidcom commands when specifying the virtual
storage machine in HORCM_VCMD.....................................................159
raidcom commands for volumes that belong to virtual storage
machine for HORCM_CMD...................................................................167

Chapter 4: Starting up CCI................................................................. 168
Starting up on UNIX systems...........................................................................168
Starting up one instance of CCI on a UNIX system................................... 168
Starting up two instances of CCI on a UNIX system.................................. 168
Starting up on Windows systems.....................................................................169
Starting up one instance of CCI on a Windows system............................. 169
Starting up two instances of CCI on a Windows system............................ 170
Starting up on OpenVMS systems...................................................................170
Starting up one instance of CCI on an OpenVMS system......................... 170
Starting up two instances of CCI on an OpenVMS system........................ 171
Starting CCI as a service (Windows systems)................................................. 172

Chapter 5: Provisioning operations with CCI...................................175
About provisioning operations......................................................................... 175
Overview of the configuration setting command........................................ 175
Synchronous command processing...................................................... 176
Asynchronous command processing.................................................... 176
Errors during asynchronous command processing...............................176
Workflow for executing asynchronous commands................................177
Asynchronous commands.....................................................................177
Help on configuration setting commands................................................... 180
LDEV nickname function............................................................................ 180
Available provisioning operations.................................................................... 180
Provisioning operations that can be performed on device groups...................189
Operation method.......................................................................................190
Workflow for performing provisioning operations.............................................192
Resource group operations............................................................................. 193
Creating resource groups...........................................................................193
Contents
Command Control Interface User and Reference Guide

7

Deleting resource groups........................................................................... 194
Allocating resources to other resource groups........................................... 195
Execution example for registering LDEVS to the pools as device groups. 196
Internal volume operations.............................................................................. 197
Creating internal volumes (open volumes)................................................. 197
Script examples for internal volume operation (open volumes)................. 199
Creating internal volumes (mainframe volumes)........................................ 202
Script examples of internal volume (mainframe volumes) operations.. 203
Virtual volume (Dynamic Provisioning) operations.......................................... 204
Creating virtual volumes (Dynamic Provisioning)....................................... 204
Script examples of virtual volume (Dynamic Provisioning) operation.........207
Deleting a virtual volume for which capacity saving is enabled..................209
Using the -operation initialize_capacity_saving option
of the raidcom delete ldev command to delete a virtual volume. 209
Deleting a virtual volume by blocking, initializing, and then deleting
the volume.............................................................................................210
Virtual volume (Dynamic Provisioning for Mainframe) operations................... 211
Creating virtual volumes (Dynamic Provisioning for Mainframe)................ 211
Script examples of virtual volume (Dynamic Provisioning for Mainframe)
operation.....................................................................................................213
Virtual volume (Dynamic Tiering) operations................................................... 215
Operational flow..........................................................................................215
Creating virtual volumes (Dynamic Tiering)................................................216
Script examples cript examples of virtual volume (Dynamic Tiering)
operation.....................................................................................................219
Configuring iSCSI virtual ports.........................................................................222
Setting an iSCSI virtual port....................................................................... 222
Deleting an iSCSI virtual port..................................................................... 223
External volume operations............................................................................. 224
Creating external volumes (Fibre Channel)................................................224
Creating external volumes (iSCSI)............................................................. 227
Script examples of external volume operations..........................................232
Virtual Partition Manager operations................................................................235
Performing Virtual Partition Manager operations........................................235

Contents
Command Control Interface User and Reference Guide

8

Displaying CLPR information......................................................................236
Migrating parity groups in a CLPR............................................................. 236
Displaying parity group information.......................................................236
Moving parity groups.............................................................................237
Checking result of CLPR transfer..........................................................237
Server Priority Manager operations................................................................. 238
Configuring Server Priority Manager by specifying ports and WWNs of
HBAs.......................................................................................................... 238
Controlling the priority of I/O operations in storage systems on
servers.................................................................................................. 239
Using and managing Server Priority Manager...................................... 239
Setting SPM names for WWNs and registering them to the SPM
group.....................................................................................................240
Configuring Server Priority Manager by specifying ports and WWNs
of HBAs.................................................................................................241
Controlling server performance when the host group is not registered
in the SPM group.................................................................................. 241
Controlling server performance when the host group is registered in
the SPM group (VSP only).................................................................... 243
Displaying the WWN of host bus adapters........................................... 245
Setting the priority on host bus adapters.............................................. 245
Displaying the status of the prioritized WWN and the non-prioritized
WWN settings....................................................................................... 246
Setting SPM names for host bus adapters........................................... 247
Grouping multiple host bus adapters into one group............................ 247
Obtaining monitoring information of the prioritized WWN and the
non-prioritized WWN............................................................................. 247
Stopping performance control of server by using SPM function........... 248
Cautions about using Server Priority Manager..................................... 248
Cautions when using host groups after registering them in SPM
groups (VSP only).................................................................................251
Configuring Server Priority Manager by specifying LDEVs and WWNs or
iSCSI names of HBAs................................................................................ 252
Virtual storage machine operations................................................................. 255
Creating host groups in a virtual storage machine..................................... 255
Adding LDEVs to a virtual storage machine...............................................256

Contents
Command Control Interface User and Reference Guide

9

Removing the virtual storage machine....................................................... 256

Chapter 6: Data replication operations with CCI..............................259
About data replication operations.................................................................... 259
Features of paired volumes............................................................................. 260
Using CCI with ShadowImage and TrueCopy................................................. 261
Using CCI with Thin Image.............................................................................. 261
Using CCI with global-active device................................................................ 262
ShadowImage operations................................................................................ 262
ShadowImage duplicated mirroring............................................................263
ShadowImage cascading pairs.................................................................. 264
Restrictions for ShadowImage cascading volumes.............................. 265
Restriction for TrueCopy/ShadowImage cascading volumes................266
TrueCopy operations....................................................................................... 266
TrueCopy takeover commands.................................................................. 267
Takeover-switch function.......................................................................269
Swap-takeover function........................................................................ 270
SVOL-takeover function........................................................................271
PVOL-takeover function........................................................................272
TrueCopy remote commands..................................................................... 273
TrueCopy local commands.........................................................................274
TrueCopy, ShadowImage, and Universal Replicator operations..................... 275
TrueCopy/ShadowImage volumes............................................................. 275
TrueCopy/ShadowImage/Universal Replicator pair status......................... 276
TrueCopy Async, TrueCopy Sync, Universal Replicator, and globalactive device volumes................................................................................ 284
TrueCopy Async and Universal Replicator volume characteristics.......286
Sidefile cache for TrueCopy Async....................................................... 287
TrueCopy Async transition states and sidefile control.......................... 287
TrueCopy Async/Universal Replicator error state................................. 290
TrueCopy Sync/TrueCopy Async and Universal Replicator/global-active
device fence level settings......................................................................... 290
Setting the fence level...........................................................................292
Copy-on-Write Snapshot operations................................................................293

Contents
Command Control Interface User and Reference Guide

10

Copy-on-Write Snapshot volumes..............................................................294
Pair operations and commands for Copy-on-Write Snapshot and Thin
Image..........................................................................................................294
Creating a Copy-on-Write Snapshot pair....................................................295
Copy-on-Write Snapshot pair status...........................................................295
Pair status relationship to Copy-on-Write Snapshot commands................ 296
Controlling Volume Migration...........................................................................297
Specifications for Volume Migration........................................................... 298
Commands to control Volume Migration.................................................... 299
Relations between "cc" command issues and migration volume status.....304
Restrictions for Volume Migration...............................................................305
Universal Replicator MxN configuration and control........................................ 305
Overview.....................................................................................................305
Policy..........................................................................................................306
Configuration definition file (horcm.conf).................................................... 307
Command specifications............................................................................ 308
pairdisplay command............................................................................ 308
pairsplit command................................................................................. 309
Notice on system operation........................................................................ 311
Configuration examples..............................................................................314
Duplication of CCI applications........................................................................315
Requirements for duplication of CCI.......................................................... 318
Note for duplication of CCI......................................................................... 319
Remote volume discovery................................................................................319
Discovering a remote volume.....................................................................320
Import method by the startup of CCI (horcmstart.sh) on the remote
host....................................................................................................... 321

Chapter 7: Data protection operations with CCI.............................. 323
Data protection operations...............................................................................323
Data Retention Utility..................................................................................323
Restrictions on Data Retention Utility volumes..................................... 324
Database Validator..................................................................................... 325
Restrictions on Database Validator....................................................... 325

Contents
Command Control Interface User and Reference Guide

11

Protection parameters and operations.............................................................326
Data Protection facility..................................................................................... 327
Data Protection Facility specifications........................................................ 328
Examples for configuration and protected volumes................................... 329
Operation authority with CMD security enabled......................................... 331
Target commands for protection................................................................. 332
permission command................................................................................. 332
New options for security............................................................................. 333
raidscan -find inst..................................................................................333
raidscan -find verify [MU#].................................................................... 333
raidscan -f[d]......................................................................................... 334
pairdisplay -f[d]......................................................................................334
Permitting protected volumes..................................................................... 335
With a $HORCMPERM file................................................................... 335
Without a $HORCMPERM file: Commands to run on different
operating systems.................................................................................337
Environment variables................................................................................338
$HORCMPROMOD.............................................................................. 338
$HORCMPERM.................................................................................... 338
Determining the protection mode command device................................... 338

Chapter 8: Examples of using CCI commands ............................... 340
Group version control for mixed storage system configurations...................... 340
LDM volume discovery and flushing for Windows........................................... 341
Volume discovery function..........................................................................341
Mountvol attached to Windows 2012/2008/2003/2000 systems................ 344
System buffer flushing function.................................................................. 344
Special facilities for Windows systems............................................................ 348
Signature changing facility for Windows systems...................................... 348
GPT disk for Windows................................................................................ 351
Directory mount facility for Windows systems............................................ 352
Host group control............................................................................................355
Specifying a host group..............................................................................355
Commands and options including a host group......................................... 356
Contents
Command Control Interface User and Reference Guide

12

Using CCI SLPR security.................................................................................357
Specifying the SLPR protection facility.......................................................358
SLPR configuration examples.................................................................... 359
Single host............................................................................................ 359
Dual Hosts.............................................................................................360

Chapter 9: Troubleshooting............................................................... 363
General troubleshooting.................................................................................. 363
Operational notes and restrictions for CCI operations..................................... 366
Error messages and error codes..................................................................... 370
System log messages................................................................................ 370
Command error messages ........................................................................ 372
Generic error codes (horctakeover and pair commands)................... 390
Generic error codes (raidscan, raidqry, raidar, horcctl).............................. 392
Specific error codes....................................................................................393
SSB codes..................................................................................................395
SSB codes returned by the replication commands............................... 395
SSB codes returned by the configuration setting command (raidcom). 397
Other SSB codes indicating internal errors........................................... 628
Calling customer support................................................................................. 630

Glossary........................................................................................... 631
Index................................................................................................. 632

Contents
Command Control Interface User and Reference Guide

13

Preface
This document describes and provides instructions for using the Command Control
Interface (CCI) software to configure and perform operations on RAID storage systems.
Please read this document carefully to understand how to use these products, and
maintain a copy for your reference.

Intended audience
This document is intended for system administrators, Hitachi Vantara representatives,
and authorized service providers who install, configure, and operate Hitachi Vantara
RAID storage systems.
Readers of this document should be familiar with the following:
■

Data processing and RAID storage systems and their basic functions.

■

The Hitachi Vantara RAID storage system and the manual for the storage system (for
example, Hardware Guide for Hitachi Virtual Storage Platform G1000, G1500, and F1500,
Hitachi Virtual Storage Platform User and Reference Guide

■

The management software for the storage system (for example, Hitachi Command
Suite, Hitachi Device Manager - Storage Navigator) and the applicable user manuals
(for example, Hitachi Command Suite User Guide and System Administrator Guide).

■

The host systems attached to the Hitachi Vantara RAID storage system.

Product version
This document revision applies to CCI version 01-46-03/02 or later.

Release notes
Read the release notes before installing and using this product. They may contain
requirements or restrictions that are not fully described in this document or updates or
corrections to this document. Release notes are available on Hitachi Vantara Support
Connect: https://knowledge.hitachivantara.com/Documents.

Command Control Interface User and Reference Guide

xiv

Changes in this revision

Changes in this revision
■

Updated the description of the resource lock function (Resource lock function (on
page 115) ).

■

Updated the description of the suspending/deleting status for Universal Replicator
MxN configurations (Notice on system operation (on page 311) ).

■

Updated the error code tables.

Referenced documents
Referenced documents
Command Control Interface documents:
■

Command Control Interface Installation and Configuration Guide, MK-90RD7008

■

Command Control Interface User and Reference Guide, MK-90RD7010

Hitachi Command Suite documents:
■

Hitachi Command Suite User Guide, MK-90HC172

Hitachi Virtual Storage Platform F series and G series documents:
■

Hitachi Thin Image User Guide, MK-92RD8011

■

Provisioning Guide, MK-94HM8014

■

Provisioning Guide for Open Systems, MK-92RD8014

■

System Administrator Guide, MK-94HM8016

■

System Administrator Guide, MK-92RD8016

■

Hitachi Device Manager - Storage Navigator Messages, MK-94HM8017

■

Hitachi Device Manager - Storage Navigator Messages, MK-92RD8017

■

Hitachi TrueCopy® User Guide, MK-92RD8019

■

Hitachi ShadowImage® User Guide, MK-92RD8021

■

Hitachi Universal Replicator User Guide, MK-92RD8023

■

Hitachi Universal Volume Manager User Guide, MK-92RD8024

■

Global-Active Device User Guide, MK-92RD8072

Command Control Interface User and Reference Guide

xv

Document conventions
Hitachi Unified Storage VM documents:
■

Provisioning Guide, MK-92HM7012

■

Hitachi ShadowImage® User Guide, MK-92HM7013

■

System Administrator Guide, MK-92HM7016

■

Hitachi Device Manager - Storage Navigator Messages,MK-92HM7017

■

Hitachi TrueCopy® User Guide, MK-92HM7018

■

Hitachi Universal Replicator User Guide, MK-92HM7019

■

Hitachi Universal Volume Manager User Guide, MK-92HM7020

Hitachi Virtual Storage Platform documents:
■

Hitachi Copy-on-Write Snapshot User Guide, MK-90RD7013

■

Provisioning Guide for Mainframe Systems, MK-90RD7021

■

Provisioning Guide for Open Systems, MK-90RD7022

■

Hitachi ShadowImage® for Mainframe User Guide, MK-90RD7023

■

Hitachi ShadowImage® User Guide, MK-90RD7024

■

Hitachi Storage Navigator User Guide, MK-90RD7027

■

Hitachi Storage Navigator Messages, MK-90RD7028

■

Hitachi TrueCopy® User Guide, MK-90RD7029

■

Hitachi TrueCopy® for Mainframe User Guide, MK-90RD7030

■

Hitachi Universal Replicator for Mainframe User Guide, MK-90RD7031

■

Hitachi Universal Replicator User Guide, MK-90RD7032

■

Hitachi Universal Volume Manager User Guide, MK-90RD7033

■

Hitachi Thin Image User Guide, MK-90RD7179

Document conventions
This document uses the following storage system terminology conventions:
Convention
Hitachi Virtual
Storage Platform
family (VSP family)

Description
Refers to the following storage systems:
■

Hitachi Virtual Storage Platform

■

Hitachi Virtual Storage Platform G1x00

■

Hitachi Virtual Storage Platform F1500

■

Hitachi Virtual Storage Platform G200

■

Hitachi Virtual Storage Platform G400

Command Control Interface User and Reference Guide

xvi

Document conventions

Convention

VSP G series

VSP F series

Description
■

Hitachi Virtual Storage Platform G600

■

Hitachi Virtual Storage Platform G800

■

Hitachi Virtual Storage Platform F400

■

Hitachi Virtual Storage Platform F600

■

Hitachi Virtual Storage Platform F800

Refers to the following storage systems:
■

Hitachi Virtual Storage Platform G1x00

■

Hitachi Virtual Storage Platform G200

■

Hitachi Virtual Storage Platform G400

■

Hitachi Virtual Storage Platform G600

■

Hitachi Virtual Storage Platform G800

Refers to the following storage systems:

VSP Gx00 models

VSP Fx00 models

■

Hitachi Virtual Storage Platform F1500

■

Hitachi Virtual Storage Platform F400

■

Hitachi Virtual Storage Platform F600

■

Hitachi Virtual Storage Platform F800

Refers to all of the following models, unless otherwise noted.
■

Hitachi Virtual Storage Platform G200

■

Hitachi Virtual Storage Platform G400

■

Hitachi Virtual Storage Platform G600

■

Hitachi Virtual Storage Platform G800

Refers to all of the following models, unless otherwise noted.
■

Hitachi Virtual Storage Platform F400

■

Hitachi Virtual Storage Platform F600

■

Hitachi Virtual Storage Platform F800

This document uses the following typographic conventions:

Command Control Interface User and Reference Guide

xvii

Document conventions

Convention
Bold

Description
■

Indicates text in a window, including window titles, menus,
menu options, buttons, fields, and labels. Example:
Click OK.

Italic

■

Indicates emphasized words in list items.

■

Indicates a document title or emphasized words in text.

■

Indicates a variable, which is a placeholder for actual text
provided by the user or for output by the system. Example:
pairdisplay -g group
(For exceptions to this convention for variables, see the entry for
angle brackets.)

Monospace

Indicates text that is displayed on screen or entered by the user.
Example: pairdisplay -g oradb

< > angle
brackets

Indicates variables in the following scenarios:
■

Variables are not clearly separated from the surrounding text or
from other variables. Example:
Status-.csv

■

Variables in headings.

[ ] square
brackets

Indicates optional values. Example: [ a | b ] indicates that you can
choose a, b, or nothing.

{ } braces

Indicates required or expected values. Example: { a | b } indicates
that you must choose either a or b.

| vertical bar

Indicates that you have a choice between two or more options or
arguments. Examples:
[ a | b ] indicates that you can choose a, b, or nothing.
{ a | b } indicates that you must choose either a or b.

This document uses the following icons to draw attention to information:
Icon

Label
Note

Description
Calls attention to important or additional information.

Command Control Interface User and Reference Guide

xviii

Conventions for storage capacity values

Icon

Label

Description

Tip

Provides helpful information, guidelines, or suggestions for
performing tasks more effectively.

Caution

Warns the user of adverse conditions and/or consequences
(for example, disruptive operations, data loss, or a system
crash).

WARNING

Warns the user of a hazardous situation which, if not
avoided, could result in death or serious injury.

Conventions for storage capacity values
Physical storage capacity values (for example, disk drive capacity) are calculated based
on the following values:
Physical capacity unit

Value

1 kilobyte (KB)

1,000 (103) bytes

1 megabyte (MB)

1,000 KB or 1,0002 bytes

1 gigabyte (GB)

1,000 MB or 1,0003 bytes

1 terabyte (TB)

1,000 GB or 1,0004 bytes

1 petabyte (PB)

1,000 TB or 1,0005 bytes

1 exabyte (EB)

1,000 PB or 1,0006 bytes

Logical capacity values (for example, logical device capacity, cache memory capacity) are
calculated based on the following values:
Logical capacity unit

Value

1 block

512 bytes

1 cylinder

Mainframe: 870 KB
Open-systems:

1 KB

■

OPEN-V: 960 KB

■

Others: 720 KB

1,024 (210) bytes

Command Control Interface User and Reference Guide

xix

Accessing product documentation

Logical capacity unit

Value

1 MB

1,024 KB or 1,0242 bytes

1 GB

1,024 MB or 1,0243 bytes

1 TB

1,024 GB or 1,0244 bytes

1 PB

1,024 TB or 1,0245 bytes

1 EB

1,024 PB or 1,0246 bytes

Accessing product documentation
Product user documentation is available on Hitachi Vantara Support Connect: https://
knowledge.hitachivantara.com/Documents. Check this site for the most current
documentation, including important updates that may have been made after the release
of the product.

Getting help
Hitachi Vantara Support Connect is the destination for technical support of products and
solutions sold by Hitachi Vantara. To contact technical support, log on to Hitachi Vantara
Support Connect for contact information: https://support.hitachivantara.com/en_us/
contact-us.html.
Hitachi Vantara Community is a global online community for Hitachi Vantara customers,
partners, independent software vendors, employees, and prospects. It is the destination
to get answers, discover insights, and make connections. Join the conversation today!
Go to community.hitachivantara.com, register, and complete your profile.

Comments
Please send us your comments on this document to
doc.comments@hitachivantara.com. Include the document title and number, including
the revision level (for example, -07), and refer to specific sections and paragraphs
whenever possible. All comments become the property of Hitachi Vantara Corporation.
Thank you!

Command Control Interface User and Reference Guide

xx

Chapter 1: Overview
This chapter provides an overview of the Command Control Interface (CCI) software and
CCI operations on the Hitachi RAID storage systems.

About Command Control Interface
The Command Control Interface software enables you to perform storage system
configuration and data management operations by issuing commands to the RAID
storage systems:
■

Hitachi Virtual Storage Platform G200, G400, G600, G800

■

Hitachi Virtual Storage Platform F400, F600, F800

■

Hitachi Virtual Storage Platform F1500 (VSP F1500)

■

Hitachi Unified Storage VM (HUS VM)

■

Hitachi Virtual Storage Platform (VSP)

■

Hitachi Universal Storage Platform V/VM (USP V/VM)

■

Hitachi TagmaStore Universal Storage Platform (TagmaStore USP)

■

Hitachi TagmaStore Network Storage Controller (TagmaStore NSC)

®
®

CCI continues to provide the proven functionality that has been available for the USP
V/VM and previous storage system models, including in-system replication, remote
replication, and data protection operations.
In addition, CCI for VSP and later provides command-line access to the same provisioning
and storage management operations that are available in the GUI software (for example,
Hitachi Command Suite, Storage Navigator). CCI commands can be used interactively or
in scripts to automate and standardize storage administration functions, thereby
simplifying the job of the storage administrator and reducing administration costs.
Note: If a storage system rejects CCI commands, verify the software licenses
for the storage system (for example, TrueCopy) and the status of the software
product and storage system.

Chapter 1: Overview
Command Control Interface User and Reference Guide

21

CCI functions

CCI functions
CCI functions matrix
The following table lists and describes the CCI functions available on the RAID storage
systems.
Storage system

Function

TagmaStore
USP/
TagmaStore
NSC

USP
V/VM

VSP

VSP
G1x00
VSP
F1500

HUS
VM

VSP Gx00
models,
VSP Fx00
models

Local copy (open)

Yes

Yes

Yes

Yes

Yes

Yes

Local copy
(mainframe)

No

No

Yes*

No

Yes

No

Remote copy (open)

Yes

Yes

Yes

Yes

Yes

Yes

Remote copy
(mainframe)

No

No

Yes*

No

Yes

No

Data protection

Yes

Yes

Yes

Yes

Yes

Yes

VSS configuration

Yes

Yes

Yes

Yes

Yes

Yes

SRM SRA

Yes

Yes

Yes

Yes

Yes

Yes

Provisioning
(raidcom)

No

No

Yes

Yes

Yes

Yes

Out-of-band
method

No

No

Yes

Yes

Yes

Yes

User authentication

No

No

Yes

Yes

Yes

Yes

LDEV nickname

No

No

Yes

Yes

Yes

Yes

LDEV group

No

No

Yes

Yes

Yes

Yes

Resource group

No

No

Yes

Yes

Yes

Yes

Resource lock

No

No

Yes

Yes

Yes

Yes

*If DKCMAIN microcode version of the VSP storage system is 70-03-3x-xx/xx or later,
the operation of TrueCopy for Mainframe, Universal Replicator for Mainframe, and
ShadowImage for Mainframe can be performed from Command Control Interface.

Chapter 1: Overview
Command Control Interface User and Reference Guide

22

Provisioning functions

Provisioning functions
The raidcom configuration setting command enables you to perform provisioning
functions, such as setting commands or creating LDEVs, from CCI. For information about
the configuration setting command (raidcom command), see Provisioning operations
with CCI (on page 175) .

Asynchronous command processing
For the raidcom configuration setting commands, asynchronous command processing
is used for operations that take time to process on the storage system. Once an
asynchronous command has been issued, you can execute additional commands
without having to wait for the asynchronous command to complete. You can also
monitor the completion status of asynchronous commands by using a status reference
command (for example, raidcom get command_status).

Command execution modes
CCI provides two command execution modes:
■

Transaction mode, in which a script file is specified with the -zt option

■

Line-by-line mode, in which commands are executed row-by-row for the configuration
setting (raidcom) commands

Chapter 1: Overview
Command Control Interface User and Reference Guide

23

Precheck function
You can use transaction mode to execute the following checking:
■

Context check: This check is executed when a script file is specified by -zt option. It
checks the context of preceding commands and determines whether a subsequent
command can be executed.
Specifying example:
raidcom -zt 

■

Configuration check: This check verifies that the actual storage system configuration
is valid (implemented) for the resources specified in the commands (for example,
LDEVs, ports, pools).
Syntax example:
raidcom get ldev -ldev_id -cnt 65280 -store

raidcom -zt  -load

Precheck function
CCI provides a precheck function for the configuration setting (raidcom) commands that
checks the command before it is executed.
In earlier versions of CCI, an error was returned when the syntax of a command to be
executed was not correct. The precheck function checks the command syntax before the
command is executed. To use the precheck function, specify either the -checkmode
precheck option or the -zt option.
The following table shows the summary of the checking function combinations between
the precheck function and the transaction mode.
Syntax
check

Context
check

Config
check

Executio
n

raidcom 

Execute
d

Not
execute
d

Not
execute
d

Executed

raidcom  -checkmode precheck

Execute
d

Not
execute
d

Not
execute
d

Not
executed

raidcom -zt 



Navigation menu