Command Control Interface User And Reference Guide CCI V01 46 03 02 MK 90RD7010 35
User Manual:
Open the PDF directly: View PDF .
Page Count: 636
Download | |
Open PDF In Browser | View PDF |
Command Control Interface 01-46-03/02 User and Reference Guide This document describes and provides instructions for using the Command Control Interface (CCI) software to configure and perform operations on the Hitachi RAID storage systems. MK- 90RD7010-35 March 2018 © 2018 Hitachi, Ltd. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including copying and recording, or stored in a database or retrieval system for commercial purposes without the express written permission of Hitachi, Ltd., or Hitachi Vantara Corporation (collectively “Hitachi”). Licensee may make copies of the Materials provided that any such copy is: (i) created as an essential step in utilization of the Software as licensed and is used in no other manner; or (ii) used for archival purposes. Licensee may not make any other copies of the Materials. “Materials” mean text, data, photographs, graphics, audio, video and documents. Hitachi reserves the right to make changes to this Material at any time without notice and assumes no responsibility for its use. The Materials contain the most current information available at the time of publication. Some of the features described in the Materials might not be currently available. Refer to the most recent product announcement for information about feature and product availability, or contact Hitachi Vantara Corporation at https://support.hitachivantara.com/en_us/contactus.html. Notice: Hitachi products and services can be ordered only under the terms and conditions of the applicable Hitachi agreements. The use of Hitachi products is governed by the terms of your agreements with Hitachi Vantara Corporation. By using this software, you agree that you are responsible for: 1. Acquiring the relevant consents as may be required under local privacy laws or otherwise from authorized employees and other individuals; and 2. Verifying that your data continues to be held, retrieved, deleted, or otherwise processed in accordance with relevant laws. Notice on Export Controls. The technical data and technology inherent in this Document may be subject to U.S. export control laws, including the U.S. Export Administration Act and its associated regulations, and may be subject to export or import regulations in other countries. Reader agrees to comply strictly with all such regulations and acknowledges that Reader has the responsibility to obtain licenses to export, re-export, or import the Document and any Compliant Products. Hitachi is a registered trademark of Hitachi, Ltd., in the United States and other countries. AIX, AS/400e, DB2, Domino, DS6000, DS8000, Enterprise Storage Server, eServer, FICON, FlashCopy, IBM, Lotus, MVS, OS/390, PowerPC, RS/6000, S/390, System z9, System z10, Tivoli, z/OS, z9, z10, z13, z/VM, and z/VSE are registered trademarks or trademarks of International Business Machines Corporation. Active Directory, ActiveX, Bing, Excel, Hyper-V, Internet Explorer, the Internet Explorer logo, Microsoft, the Microsoft Corporate Logo, MS-DOS, Outlook, PowerPoint, SharePoint, Silverlight, SmartScreen, SQL Server, Visual Basic, Visual C++, Visual Studio, Windows, the Windows logo, Windows Azure, Windows PowerShell, Windows Server, the Windows start button, and Windows Vista are registered trademarks or trademarks of Microsoft Corporation. Microsoft product screen shots are reprinted with permission from Microsoft Corporation. All other trademarks, service marks, and company names in this document or website are properties of their respective owners. Command Control Interface User and Reference Guide ii Contents Preface.............................................................................................................xiv Intended audience.............................................................................................xiv Product version..................................................................................................xiv Release notes....................................................................................................xiv Changes in this revision..................................................................................... xv Referenced documents...................................................................................... xv Document conventions......................................................................................xvi Conventions for storage capacity values...........................................................xix Accessing product documentation..................................................................... xx Getting help........................................................................................................xx Comments..........................................................................................................xx Chapter 1: Overview............................................................................. 21 About Command Control Interface.................................................................... 21 CCI functions..................................................................................................... 22 CCI functions matrix..................................................................................... 22 Provisioning functions...................................................................................23 Asynchronous command processing........................................................... 23 Command execution modes.........................................................................23 Precheck function.........................................................................................24 Command execution by the in-band and out-of-band methods................... 26 User authentication mode............................................................................ 28 LDEV nickname function.............................................................................. 28 LDEV grouping function............................................................................... 28 Resource group function.............................................................................. 29 Resource locking function............................................................................ 29 CCI functions available on all RAID storage systems........................................29 In-system replication.....................................................................................29 Contents Command Control Interface User and Reference Guide 3 Remote replication........................................................................................30 Data protection............................................................................................. 30 Chapter 2: CCI software environment.................................................31 Overview of the CCI software environment....................................................... 31 CCI components on the RAID storage system.................................................. 32 Command device..........................................................................................32 Command device guarding..................................................................... 33 Alternate command device function........................................................ 35 Remote command device....................................................................... 36 CCI and the SCSI command interface......................................................... 37 Command competition............................................................................ 38 Command flow........................................................................................ 38 Issuing commands for LDEVs within a LUSE device..............................38 CCI instance components on the host server.................................................... 39 HORCM operational environment................................................................ 39 CCI instance configurations......................................................................... 40 Host machines that can be paired................................................................42 Configuration definition file........................................................................... 43 Configuration definition file settings..............................................................47 HORCM_MON........................................................................................ 47 HORCM_CMD (in-band method)............................................................ 48 HORCM_CMD (out-of-band method)......................................................53 HORCM_DEV......................................................................................... 56 HORCM_INST........................................................................................ 59 HORCM_LDEV....................................................................................... 60 HORCM_LDEVG.................................................................................... 61 HORCM_INSTP...................................................................................... 62 HORCM_ALLOW_INST..........................................................................62 Correspondence of the configuration definition file for cascading volume and mirror descriptors...................................................................................63 Correspondence of configuration file and mirror descriptors.................. 63 Cascading connection and configuration files.........................................67 ShadowImage......................................................................................... 68 Contents Command Control Interface User and Reference Guide 4 Cascading connections for TrueCopy and ShadowImage...................... 69 CCI software files...............................................................................................72 CCI files supplied with the software............................................................. 72 CCI files for UNIX-based systems...........................................................72 CCI files for Windows-based systems.....................................................74 CCI files for OpenVMS-based systems...................................................77 CCI log and trace files........................................................................................79 CCI log files.................................................................................................. 79 CCI trace files...............................................................................................82 CCI trace control command..........................................................................82 Command logging for audit.......................................................................... 82 Logging other than raidcom command................................................... 83 Logging raidcom command.....................................................................85 User-created files...............................................................................................88 User environment variable.................................................................................89 Chapter 3: CCI functions...................................................................... 90 System configuration using CCI........................................................................ 90 In-band system configurations and out-of-band system configurations....... 90 System configuration for connecting to a CCI server connected by the in-band method using the out-of-band method............................................ 92 Connecting to CCI server already connected by In-Band method using Outof-Band method................................................................................................. 93 Hardware requirements................................................................................94 I/O Traffic Control......................................................................................... 94 Security setting.............................................................................................95 User authentication............................................................................................96 Command operation authority and user authentication..................................... 97 Controlling User Role................................................................................... 97 Controlling user resources............................................................................98 Commands executed depending on operation authorities......................... 101 Relation between resource groups and command operations......................... 111 Resource lock function.....................................................................................115 Command execution modes............................................................................ 116 Contents Command Control Interface User and Reference Guide 5 Overview.....................................................................................................116 Context check............................................................................................. 118 Checking contents before executing scripts..........................................118 Details of check contents...................................................................... 118 Configuration check....................................................................................125 Resource location and parameter....................................................................125 MP blade location and parameter.............................................................. 125 LDEV grouping function...................................................................................127 Overview.....................................................................................................127 Device group definition methods................................................................ 130 Read operations and command device settings........................................ 130 Defining device groups...............................................................................132 Creating device groups......................................................................... 133 Adding LDEVs to device groups........................................................... 133 Deleting LDEVs from device groups..................................................... 134 Deleting device groups......................................................................... 135 Copy group function................................................................................... 136 Creating copy groups............................................................................137 Adding LDEVS to copy groups............................................................. 138 Deleting LDEVs from copy groups........................................................ 139 Deleting copy groups............................................................................ 140 Pair operation by specifying a copy group............................................ 141 Pair operations with mainframe volumes......................................................... 143 Using "dummy" LUs for mainframe LDEVs................................................ 143 Pair status and access permission for mainframe LDEVs......................... 144 Operational differences for multiplatform volumes..................................... 147 Operational differences for replication commands..................................... 147 Global storage virtualization function...............................................................149 System configuration example with the global storage virtualization function.......................................................................................................150 Using CCI with the global storage virtualization function........................... 150 Configuration definition file settings with global storage virtualization........152 Example of the configuration definition files when specifying a virtual storage machine by HORCM_CMD........................................................... 153 Contents Command Control Interface User and Reference Guide 6 Specifying a virtual storage machine to HORCM_VCMD.......................... 155 Command operations to virtual storage machines................................155 Operation target for raidcom commands when specifying the virtual storage machine in HORCM_VCMD.....................................................159 raidcom commands for volumes that belong to virtual storage machine for HORCM_CMD...................................................................167 Chapter 4: Starting up CCI................................................................. 168 Starting up on UNIX systems...........................................................................168 Starting up one instance of CCI on a UNIX system................................... 168 Starting up two instances of CCI on a UNIX system.................................. 168 Starting up on Windows systems.....................................................................169 Starting up one instance of CCI on a Windows system............................. 169 Starting up two instances of CCI on a Windows system............................ 170 Starting up on OpenVMS systems...................................................................170 Starting up one instance of CCI on an OpenVMS system......................... 170 Starting up two instances of CCI on an OpenVMS system........................ 171 Starting CCI as a service (Windows systems)................................................. 172 Chapter 5: Provisioning operations with CCI...................................175 About provisioning operations......................................................................... 175 Overview of the configuration setting command........................................ 175 Synchronous command processing...................................................... 176 Asynchronous command processing.................................................... 176 Errors during asynchronous command processing...............................176 Workflow for executing asynchronous commands................................177 Asynchronous commands.....................................................................177 Help on configuration setting commands................................................... 180 LDEV nickname function............................................................................ 180 Available provisioning operations.................................................................... 180 Provisioning operations that can be performed on device groups...................189 Operation method.......................................................................................190 Workflow for performing provisioning operations.............................................192 Resource group operations............................................................................. 193 Creating resource groups...........................................................................193 Contents Command Control Interface User and Reference Guide 7 Deleting resource groups........................................................................... 194 Allocating resources to other resource groups........................................... 195 Execution example for registering LDEVS to the pools as device groups. 196 Internal volume operations.............................................................................. 197 Creating internal volumes (open volumes)................................................. 197 Script examples for internal volume operation (open volumes)................. 199 Creating internal volumes (mainframe volumes)........................................ 202 Script examples of internal volume (mainframe volumes) operations.. 203 Virtual volume (Dynamic Provisioning) operations.......................................... 204 Creating virtual volumes (Dynamic Provisioning)....................................... 204 Script examples of virtual volume (Dynamic Provisioning) operation.........207 Deleting a virtual volume for which capacity saving is enabled..................209 Using the -operation initialize_capacity_saving option of the raidcom delete ldev command to delete a virtual volume. 209 Deleting a virtual volume by blocking, initializing, and then deleting the volume.............................................................................................210 Virtual volume (Dynamic Provisioning for Mainframe) operations................... 211 Creating virtual volumes (Dynamic Provisioning for Mainframe)................ 211 Script examples of virtual volume (Dynamic Provisioning for Mainframe) operation.....................................................................................................213 Virtual volume (Dynamic Tiering) operations................................................... 215 Operational flow..........................................................................................215 Creating virtual volumes (Dynamic Tiering)................................................216 Script examples cript examples of virtual volume (Dynamic Tiering) operation.....................................................................................................219 Configuring iSCSI virtual ports.........................................................................222 Setting an iSCSI virtual port....................................................................... 222 Deleting an iSCSI virtual port..................................................................... 223 External volume operations............................................................................. 224 Creating external volumes (Fibre Channel)................................................224 Creating external volumes (iSCSI)............................................................. 227 Script examples of external volume operations..........................................232 Virtual Partition Manager operations................................................................235 Performing Virtual Partition Manager operations........................................235 Contents Command Control Interface User and Reference Guide 8 Displaying CLPR information......................................................................236 Migrating parity groups in a CLPR............................................................. 236 Displaying parity group information.......................................................236 Moving parity groups.............................................................................237 Checking result of CLPR transfer..........................................................237 Server Priority Manager operations................................................................. 238 Configuring Server Priority Manager by specifying ports and WWNs of HBAs.......................................................................................................... 238 Controlling the priority of I/O operations in storage systems on servers.................................................................................................. 239 Using and managing Server Priority Manager...................................... 239 Setting SPM names for WWNs and registering them to the SPM group.....................................................................................................240 Configuring Server Priority Manager by specifying ports and WWNs of HBAs.................................................................................................241 Controlling server performance when the host group is not registered in the SPM group.................................................................................. 241 Controlling server performance when the host group is registered in the SPM group (VSP only).................................................................... 243 Displaying the WWN of host bus adapters........................................... 245 Setting the priority on host bus adapters.............................................. 245 Displaying the status of the prioritized WWN and the non-prioritized WWN settings....................................................................................... 246 Setting SPM names for host bus adapters........................................... 247 Grouping multiple host bus adapters into one group............................ 247 Obtaining monitoring information of the prioritized WWN and the non-prioritized WWN............................................................................. 247 Stopping performance control of server by using SPM function........... 248 Cautions about using Server Priority Manager..................................... 248 Cautions when using host groups after registering them in SPM groups (VSP only).................................................................................251 Configuring Server Priority Manager by specifying LDEVs and WWNs or iSCSI names of HBAs................................................................................ 252 Virtual storage machine operations................................................................. 255 Creating host groups in a virtual storage machine..................................... 255 Adding LDEVs to a virtual storage machine...............................................256 Contents Command Control Interface User and Reference Guide 9 Removing the virtual storage machine....................................................... 256 Chapter 6: Data replication operations with CCI..............................259 About data replication operations.................................................................... 259 Features of paired volumes............................................................................. 260 Using CCI with ShadowImage and TrueCopy................................................. 261 Using CCI with Thin Image.............................................................................. 261 Using CCI with global-active device................................................................ 262 ShadowImage operations................................................................................ 262 ShadowImage duplicated mirroring............................................................263 ShadowImage cascading pairs.................................................................. 264 Restrictions for ShadowImage cascading volumes.............................. 265 Restriction for TrueCopy/ShadowImage cascading volumes................266 TrueCopy operations....................................................................................... 266 TrueCopy takeover commands.................................................................. 267 Takeover-switch function.......................................................................269 Swap-takeover function........................................................................ 270 SVOL-takeover function........................................................................271 PVOL-takeover function........................................................................272 TrueCopy remote commands..................................................................... 273 TrueCopy local commands.........................................................................274 TrueCopy, ShadowImage, and Universal Replicator operations..................... 275 TrueCopy/ShadowImage volumes............................................................. 275 TrueCopy/ShadowImage/Universal Replicator pair status......................... 276 TrueCopy Async, TrueCopy Sync, Universal Replicator, and globalactive device volumes................................................................................ 284 TrueCopy Async and Universal Replicator volume characteristics.......286 Sidefile cache for TrueCopy Async....................................................... 287 TrueCopy Async transition states and sidefile control.......................... 287 TrueCopy Async/Universal Replicator error state................................. 290 TrueCopy Sync/TrueCopy Async and Universal Replicator/global-active device fence level settings......................................................................... 290 Setting the fence level...........................................................................292 Copy-on-Write Snapshot operations................................................................293 Contents Command Control Interface User and Reference Guide 10 Copy-on-Write Snapshot volumes..............................................................294 Pair operations and commands for Copy-on-Write Snapshot and Thin Image..........................................................................................................294 Creating a Copy-on-Write Snapshot pair....................................................295 Copy-on-Write Snapshot pair status...........................................................295 Pair status relationship to Copy-on-Write Snapshot commands................ 296 Controlling Volume Migration...........................................................................297 Specifications for Volume Migration........................................................... 298 Commands to control Volume Migration.................................................... 299 Relations between "cc" command issues and migration volume status.....304 Restrictions for Volume Migration...............................................................305 Universal Replicator MxN configuration and control........................................ 305 Overview.....................................................................................................305 Policy..........................................................................................................306 Configuration definition file (horcm.conf).................................................... 307 Command specifications............................................................................ 308 pairdisplay command............................................................................ 308 pairsplit command................................................................................. 309 Notice on system operation........................................................................ 311 Configuration examples..............................................................................314 Duplication of CCI applications........................................................................315 Requirements for duplication of CCI.......................................................... 318 Note for duplication of CCI......................................................................... 319 Remote volume discovery................................................................................319 Discovering a remote volume.....................................................................320 Import method by the startup of CCI (horcmstart.sh) on the remote host....................................................................................................... 321 Chapter 7: Data protection operations with CCI.............................. 323 Data protection operations...............................................................................323 Data Retention Utility..................................................................................323 Restrictions on Data Retention Utility volumes..................................... 324 Database Validator..................................................................................... 325 Restrictions on Database Validator....................................................... 325 Contents Command Control Interface User and Reference Guide 11 Protection parameters and operations.............................................................326 Data Protection facility..................................................................................... 327 Data Protection Facility specifications........................................................ 328 Examples for configuration and protected volumes................................... 329 Operation authority with CMD security enabled......................................... 331 Target commands for protection................................................................. 332 permission command................................................................................. 332 New options for security............................................................................. 333 raidscan -find inst..................................................................................333 raidscan -find verify [MU#].................................................................... 333 raidscan -f[d]......................................................................................... 334 pairdisplay -f[d]......................................................................................334 Permitting protected volumes..................................................................... 335 With a $HORCMPERM file................................................................... 335 Without a $HORCMPERM file: Commands to run on different operating systems.................................................................................337 Environment variables................................................................................338 $HORCMPROMOD.............................................................................. 338 $HORCMPERM.................................................................................... 338 Determining the protection mode command device................................... 338 Chapter 8: Examples of using CCI commands ............................... 340 Group version control for mixed storage system configurations...................... 340 LDM volume discovery and flushing for Windows........................................... 341 Volume discovery function..........................................................................341 Mountvol attached to Windows 2012/2008/2003/2000 systems................ 344 System buffer flushing function.................................................................. 344 Special facilities for Windows systems............................................................ 348 Signature changing facility for Windows systems...................................... 348 GPT disk for Windows................................................................................ 351 Directory mount facility for Windows systems............................................ 352 Host group control............................................................................................355 Specifying a host group..............................................................................355 Commands and options including a host group......................................... 356 Contents Command Control Interface User and Reference Guide 12 Using CCI SLPR security.................................................................................357 Specifying the SLPR protection facility.......................................................358 SLPR configuration examples.................................................................... 359 Single host............................................................................................ 359 Dual Hosts.............................................................................................360 Chapter 9: Troubleshooting............................................................... 363 General troubleshooting.................................................................................. 363 Operational notes and restrictions for CCI operations..................................... 366 Error messages and error codes..................................................................... 370 System log messages................................................................................ 370 Command error messages ........................................................................ 372 Generic error codes (horctakeover and pair commands)................... 390 Generic error codes (raidscan, raidqry, raidar, horcctl).............................. 392 Specific error codes....................................................................................393 SSB codes..................................................................................................395 SSB codes returned by the replication commands............................... 395 SSB codes returned by the configuration setting command (raidcom). 397 Other SSB codes indicating internal errors........................................... 628 Calling customer support................................................................................. 630 Glossary........................................................................................... 631 Index................................................................................................. 632 Contents Command Control Interface User and Reference Guide 13 Preface This document describes and provides instructions for using the Command Control Interface (CCI) software to configure and perform operations on RAID storage systems. Please read this document carefully to understand how to use these products, and maintain a copy for your reference. Intended audience This document is intended for system administrators, Hitachi Vantara representatives, and authorized service providers who install, configure, and operate Hitachi Vantara RAID storage systems. Readers of this document should be familiar with the following: ■ Data processing and RAID storage systems and their basic functions. ■ The Hitachi Vantara RAID storage system and the manual for the storage system (for example, Hardware Guide for Hitachi Virtual Storage Platform G1000, G1500, and F1500, Hitachi Virtual Storage Platform User and Reference Guide ■ The management software for the storage system (for example, Hitachi Command Suite, Hitachi Device Manager - Storage Navigator) and the applicable user manuals (for example, Hitachi Command Suite User Guide and System Administrator Guide). ■ The host systems attached to the Hitachi Vantara RAID storage system. Product version This document revision applies to CCI version 01-46-03/02 or later. Release notes Read the release notes before installing and using this product. They may contain requirements or restrictions that are not fully described in this document or updates or corrections to this document. Release notes are available on Hitachi Vantara Support Connect: https://knowledge.hitachivantara.com/Documents. Command Control Interface User and Reference Guide xiv Changes in this revision Changes in this revision ■ Updated the description of the resource lock function (Resource lock function (on page 115) ). ■ Updated the description of the suspending/deleting status for Universal Replicator MxN configurations (Notice on system operation (on page 311) ). ■ Updated the error code tables. Referenced documents Referenced documents Command Control Interface documents: ■ Command Control Interface Installation and Configuration Guide, MK-90RD7008 ■ Command Control Interface User and Reference Guide, MK-90RD7010 Hitachi Command Suite documents: ■ Hitachi Command Suite User Guide, MK-90HC172 Hitachi Virtual Storage Platform F series and G series documents: ■ Hitachi Thin Image User Guide, MK-92RD8011 ■ Provisioning Guide, MK-94HM8014 ■ Provisioning Guide for Open Systems, MK-92RD8014 ■ System Administrator Guide, MK-94HM8016 ■ System Administrator Guide, MK-92RD8016 ■ Hitachi Device Manager - Storage Navigator Messages, MK-94HM8017 ■ Hitachi Device Manager - Storage Navigator Messages, MK-92RD8017 ■ Hitachi TrueCopy® User Guide, MK-92RD8019 ■ Hitachi ShadowImage® User Guide, MK-92RD8021 ■ Hitachi Universal Replicator User Guide, MK-92RD8023 ■ Hitachi Universal Volume Manager User Guide, MK-92RD8024 ■ Global-Active Device User Guide, MK-92RD8072 Command Control Interface User and Reference Guide xv Document conventions Hitachi Unified Storage VM documents: ■ Provisioning Guide, MK-92HM7012 ■ Hitachi ShadowImage® User Guide, MK-92HM7013 ■ System Administrator Guide, MK-92HM7016 ■ Hitachi Device Manager - Storage Navigator Messages,MK-92HM7017 ■ Hitachi TrueCopy® User Guide, MK-92HM7018 ■ Hitachi Universal Replicator User Guide, MK-92HM7019 ■ Hitachi Universal Volume Manager User Guide, MK-92HM7020 Hitachi Virtual Storage Platform documents: ■ Hitachi Copy-on-Write Snapshot User Guide, MK-90RD7013 ■ Provisioning Guide for Mainframe Systems, MK-90RD7021 ■ Provisioning Guide for Open Systems, MK-90RD7022 ■ Hitachi ShadowImage® for Mainframe User Guide, MK-90RD7023 ■ Hitachi ShadowImage® User Guide, MK-90RD7024 ■ Hitachi Storage Navigator User Guide, MK-90RD7027 ■ Hitachi Storage Navigator Messages, MK-90RD7028 ■ Hitachi TrueCopy® User Guide, MK-90RD7029 ■ Hitachi TrueCopy® for Mainframe User Guide, MK-90RD7030 ■ Hitachi Universal Replicator for Mainframe User Guide, MK-90RD7031 ■ Hitachi Universal Replicator User Guide, MK-90RD7032 ■ Hitachi Universal Volume Manager User Guide, MK-90RD7033 ■ Hitachi Thin Image User Guide, MK-90RD7179 Document conventions This document uses the following storage system terminology conventions: Convention Hitachi Virtual Storage Platform family (VSP family) Description Refers to the following storage systems: ■ Hitachi Virtual Storage Platform ■ Hitachi Virtual Storage Platform G1x00 ■ Hitachi Virtual Storage Platform F1500 ■ Hitachi Virtual Storage Platform G200 ■ Hitachi Virtual Storage Platform G400 Command Control Interface User and Reference Guide xvi Document conventions Convention VSP G series VSP F series Description ■ Hitachi Virtual Storage Platform G600 ■ Hitachi Virtual Storage Platform G800 ■ Hitachi Virtual Storage Platform F400 ■ Hitachi Virtual Storage Platform F600 ■ Hitachi Virtual Storage Platform F800 Refers to the following storage systems: ■ Hitachi Virtual Storage Platform G1x00 ■ Hitachi Virtual Storage Platform G200 ■ Hitachi Virtual Storage Platform G400 ■ Hitachi Virtual Storage Platform G600 ■ Hitachi Virtual Storage Platform G800 Refers to the following storage systems: VSP Gx00 models VSP Fx00 models ■ Hitachi Virtual Storage Platform F1500 ■ Hitachi Virtual Storage Platform F400 ■ Hitachi Virtual Storage Platform F600 ■ Hitachi Virtual Storage Platform F800 Refers to all of the following models, unless otherwise noted. ■ Hitachi Virtual Storage Platform G200 ■ Hitachi Virtual Storage Platform G400 ■ Hitachi Virtual Storage Platform G600 ■ Hitachi Virtual Storage Platform G800 Refers to all of the following models, unless otherwise noted. ■ Hitachi Virtual Storage Platform F400 ■ Hitachi Virtual Storage Platform F600 ■ Hitachi Virtual Storage Platform F800 This document uses the following typographic conventions: Command Control Interface User and Reference Guide xvii Document conventions Convention Bold Description ■ Indicates text in a window, including window titles, menus, menu options, buttons, fields, and labels. Example: Click OK. Italic ■ Indicates emphasized words in list items. ■ Indicates a document title or emphasized words in text. ■ Indicates a variable, which is a placeholder for actual text provided by the user or for output by the system. Example: pairdisplay -g group (For exceptions to this convention for variables, see the entry for angle brackets.) Monospace Indicates text that is displayed on screen or entered by the user. Example: pairdisplay -g oradb < > angle brackets Indicates variables in the following scenarios: ■ Variables are not clearly separated from the surrounding text or from other variables. Example: Status-.csv ■ Variables in headings. [ ] square brackets Indicates optional values. Example: [ a | b ] indicates that you can choose a, b, or nothing. { } braces Indicates required or expected values. Example: { a | b } indicates that you must choose either a or b. | vertical bar Indicates that you have a choice between two or more options or arguments. Examples: [ a | b ] indicates that you can choose a, b, or nothing. { a | b } indicates that you must choose either a or b. This document uses the following icons to draw attention to information: Icon Label Note Description Calls attention to important or additional information. Command Control Interface User and Reference Guide xviii Conventions for storage capacity values Icon Label Description Tip Provides helpful information, guidelines, or suggestions for performing tasks more effectively. Caution Warns the user of adverse conditions and/or consequences (for example, disruptive operations, data loss, or a system crash). WARNING Warns the user of a hazardous situation which, if not avoided, could result in death or serious injury. Conventions for storage capacity values Physical storage capacity values (for example, disk drive capacity) are calculated based on the following values: Physical capacity unit Value 1 kilobyte (KB) 1,000 (103) bytes 1 megabyte (MB) 1,000 KB or 1,0002 bytes 1 gigabyte (GB) 1,000 MB or 1,0003 bytes 1 terabyte (TB) 1,000 GB or 1,0004 bytes 1 petabyte (PB) 1,000 TB or 1,0005 bytes 1 exabyte (EB) 1,000 PB or 1,0006 bytes Logical capacity values (for example, logical device capacity, cache memory capacity) are calculated based on the following values: Logical capacity unit Value 1 block 512 bytes 1 cylinder Mainframe: 870 KB Open-systems: 1 KB ■ OPEN-V: 960 KB ■ Others: 720 KB 1,024 (210) bytes Command Control Interface User and Reference Guide xix Accessing product documentation Logical capacity unit Value 1 MB 1,024 KB or 1,0242 bytes 1 GB 1,024 MB or 1,0243 bytes 1 TB 1,024 GB or 1,0244 bytes 1 PB 1,024 TB or 1,0245 bytes 1 EB 1,024 PB or 1,0246 bytes Accessing product documentation Product user documentation is available on Hitachi Vantara Support Connect: https:// knowledge.hitachivantara.com/Documents. Check this site for the most current documentation, including important updates that may have been made after the release of the product. Getting help Hitachi Vantara Support Connect is the destination for technical support of products and solutions sold by Hitachi Vantara. To contact technical support, log on to Hitachi Vantara Support Connect for contact information: https://support.hitachivantara.com/en_us/ contact-us.html. Hitachi Vantara Community is a global online community for Hitachi Vantara customers, partners, independent software vendors, employees, and prospects. It is the destination to get answers, discover insights, and make connections. Join the conversation today! Go to community.hitachivantara.com, register, and complete your profile. Comments Please send us your comments on this document to doc.comments@hitachivantara.com. Include the document title and number, including the revision level (for example, -07), and refer to specific sections and paragraphs whenever possible. All comments become the property of Hitachi Vantara Corporation. Thank you! Command Control Interface User and Reference Guide xx Chapter 1: Overview This chapter provides an overview of the Command Control Interface (CCI) software and CCI operations on the Hitachi RAID storage systems. About Command Control Interface The Command Control Interface software enables you to perform storage system configuration and data management operations by issuing commands to the RAID storage systems: ■ Hitachi Virtual Storage Platform G200, G400, G600, G800 ■ Hitachi Virtual Storage Platform F400, F600, F800 ■ Hitachi Virtual Storage Platform F1500 (VSP F1500) ■ Hitachi Unified Storage VM (HUS VM) ■ Hitachi Virtual Storage Platform (VSP) ■ Hitachi Universal Storage Platform V/VM (USP V/VM) ■ Hitachi TagmaStore Universal Storage Platform (TagmaStore USP) ■ Hitachi TagmaStore Network Storage Controller (TagmaStore NSC) ® ® CCI continues to provide the proven functionality that has been available for the USP V/VM and previous storage system models, including in-system replication, remote replication, and data protection operations. In addition, CCI for VSP and later provides command-line access to the same provisioning and storage management operations that are available in the GUI software (for example, Hitachi Command Suite, Storage Navigator). CCI commands can be used interactively or in scripts to automate and standardize storage administration functions, thereby simplifying the job of the storage administrator and reducing administration costs. Note: If a storage system rejects CCI commands, verify the software licenses for the storage system (for example, TrueCopy) and the status of the software product and storage system. Chapter 1: Overview Command Control Interface User and Reference Guide 21 CCI functions CCI functions CCI functions matrix The following table lists and describes the CCI functions available on the RAID storage systems. Storage system Function TagmaStore USP/ TagmaStore NSC USP V/VM VSP VSP G1x00 VSP F1500 HUS VM VSP Gx00 models, VSP Fx00 models Local copy (open) Yes Yes Yes Yes Yes Yes Local copy (mainframe) No No Yes* No Yes No Remote copy (open) Yes Yes Yes Yes Yes Yes Remote copy (mainframe) No No Yes* No Yes No Data protection Yes Yes Yes Yes Yes Yes VSS configuration Yes Yes Yes Yes Yes Yes SRM SRA Yes Yes Yes Yes Yes Yes Provisioning (raidcom) No No Yes Yes Yes Yes Out-of-band method No No Yes Yes Yes Yes User authentication No No Yes Yes Yes Yes LDEV nickname No No Yes Yes Yes Yes LDEV group No No Yes Yes Yes Yes Resource group No No Yes Yes Yes Yes Resource lock No No Yes Yes Yes Yes *If DKCMAIN microcode version of the VSP storage system is 70-03-3x-xx/xx or later, the operation of TrueCopy for Mainframe, Universal Replicator for Mainframe, and ShadowImage for Mainframe can be performed from Command Control Interface. Chapter 1: Overview Command Control Interface User and Reference Guide 22 Provisioning functions Provisioning functions The raidcom configuration setting command enables you to perform provisioning functions, such as setting commands or creating LDEVs, from CCI. For information about the configuration setting command (raidcom command), see Provisioning operations with CCI (on page 175) . Asynchronous command processing For the raidcom configuration setting commands, asynchronous command processing is used for operations that take time to process on the storage system. Once an asynchronous command has been issued, you can execute additional commands without having to wait for the asynchronous command to complete. You can also monitor the completion status of asynchronous commands by using a status reference command (for example, raidcom get command_status). Command execution modes CCI provides two command execution modes: ■ Transaction mode, in which a script file is specified with the -zt option ■ Line-by-line mode, in which commands are executed row-by-row for the configuration setting (raidcom) commands Chapter 1: Overview Command Control Interface User and Reference Guide 23 Precheck function You can use transaction mode to execute the following checking: ■ Context check: This check is executed when a script file is specified by -zt option. It checks the context of preceding commands and determines whether a subsequent command can be executed. Specifying example: raidcom -zt ■ Configuration check: This check verifies that the actual storage system configuration is valid (implemented) for the resources specified in the commands (for example, LDEVs, ports, pools). Syntax example: raidcom get ldev -ldev_id -cnt 65280 -store raidcom -zt -load Precheck function CCI provides a precheck function for the configuration setting (raidcom) commands that checks the command before it is executed. In earlier versions of CCI, an error was returned when the syntax of a command to be executed was not correct. The precheck function checks the command syntax before the command is executed. To use the precheck function, specify either the -checkmode precheck option or the -zt option. The following table shows the summary of the checking function combinations between the precheck function and the transaction mode. Syntax check Context check Config check Executio n raidcom Execute d Not execute d Not execute d Executed raidcom -checkmode precheck Execute d Not execute d Not execute d Not executed raidcom -zt