SGI Confidential 9 - 1 Revolution VTL. SGI Confidential 9 - 2 VTL Installation and Configuration Overview Upload the application AOR file Install the.

Slides:



Advertisements
Similar presentations
Copyright © 2014 EMC Corporation. All Rights Reserved. Linux Host Installation and Integration for Block Upon completion of this module, you should be.
Advertisements

SGI Confidential Copan 400 Installation. SGI Confidential Installation Overview The approximate minimum time to complete this procedure is.
DNR-322L & DNR-326.
Module 5: Configuring Access for Remote Clients and Networks.
Unauthorized Reproduction Prohibited SkyPoint Alarm Integration Add-On Using OnGuard Alarms to create events in SkyPoint Also called ‘SkyPoint V0’ CR4400.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Unit 3 IT278 Network Administration Course Name – IT278 Network Administration Instructor.
Lesson 15 – INSTALL AND SET UP NETWARE 5.1. Understanding NetWare 5.1 Preparing for installation Installing NetWare 5.1 Configuring NetWare 5.1 client.
Lab 03 Windows Operating Systems (Cont.). PYP002 Preparatory Computer ScienceWindows Operating System2 Objectives Develop a good understanding of 1. The.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
Module 6 Windows 2000 Professional 6.1 Installation 6.2 Administration/User Interface 6.3 User Accounts 6.4 Managing the File System 6.5 Services.
SGI Confidential Platform Service Manager. SGI Confidential PSM Front Chassis View Two 2.0 USB Ports, one of which connects to the front chassis.
Week:#14 Windows Recovery
SGI Confidential Application Processor. SGI Confidential Application Processor Overview Application Field Replaceable Units The Application.
SETUP AND CONFIGURATIONS WEBLOGIC SERVER. 1.Weblogic Installation 2.Creating domain through configuration wizard 3.Creating domain using existing template.
MZ790 Print Driver and RINC Software Install and Setup These instructions are to assist you in installation and setup of the MZ790 Print Driver and RINC.
1 Chapter Overview Introduction to Windows XP Professional Printing Setting Up Network Printers Connecting to Network Printers Configuring Network Printers.
© 2010 VMware Inc. All rights reserved VMware ESX and ESXi Module 3.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 7 Configuring File Services in Windows Server 2008.
11 SYSTEMS ADMINISTRATION AND TERMINAL SERVICES Chapter 12.
1 Semester 2 Module 2 Introduction to Routers Yuda college of business James Chen
Ch 8-3 Working with domains and Active Directory.
TrendReader Standard 2 This generation of TrendReader Standard software utilizes the more familiar Windows format (“tree”) views of functions and file.
 The operating system is essential for the computer; without it the computer could not work.  The main function of any operating system is being an intermediary.
1 Semester 2 Module 3 Configuring a Router Yuda college of business James Chen
Ch 11 Managing System Reliability and Availability 1.
One to One instructions Installing and configuring samba on Ubuntu Linux to enable Linux to share files and documents with Windows XP.
Linux+ Guide to Linux Certification, Third Edition
CompTIA Linux+ Certification
Module 10 Configuring and Managing Storage Technologies.
Configuring the MagicInfo Pro Display
Hands-On Microsoft Windows Server 2008
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Two Deploying Windows Servers.
Module 13: Configuring Availability of Network Resources and Content.
Chapter Three Designing The File System. Chapter Objectives Describe the components of the NetWare file system Describe the purpose of each NetWare-created.
Please Dial in, class will begin shortly
Guide to Linux Installation and Administration, 2e1 Chapter 3 Installing Linux.
1 Guide to Novell NetWare 6.0 Network Administration Chapter 13.
Copyright ®xSpring Pte Ltd, All rights reserved Versions DateVersionDescriptionAuthor May First version. Modified from Enterprise edition.NBL.
CHAPTER NT Installation Screens. Chapter Objectives Explain the installation in detail Focus on the three stages of installation Use screen images to.
CIM6400 CTNW (04/05) 1 CIM6400 CTNW Lesson 6 – More on Windows 2000.
Chapter 18: Windows Server 2008 R2 and Active Directory Backup and Maintenance BAI617.
Creating a Web Site to Gather Data and Conduct Research.
Installing and Using Active Directory Written by Marc Zacharko.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Three Configuring Windows Server 2008 Storage.
1. Insert the Resource CD into your CD-ROM drive, click Start and choose Run. In the field that appears, enter F:\XXX\Setup.exe (if “F” is the letter of.
INSTALLATION HANDS-ON. Page 2 About the Hands-On This hands-on section is structured in a way, that it allows you to work independently, but still giving.
Service Publications and Training SGI Confidential SGI COPAN 400 MAID and VTL Maintenance and Administration Intro & Overview Product Features Installation.
VistA Imaging Capture via Scanning. October VistA Imaging Capture via Scanning The information in this documentation includes only new and updated.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
Using OUI to install Oracle9i Release 2 on an OpenVMS System.
Cisco Confidential © 2010 Cisco and/or its affiliates. All rights reserved. 1 MSE Virtual Appliance Presenter Name: Patrick Nicholson.
Chapter 10 Chapter 10: Managing the Distributed File System, Disk Quotas, and Software Installation.
Page 1 Printing & Terminal Services Lecture 8 Hassan Shuja 11/16/2004.
Introduction to Routers
PAYware Transact Terminal Interface Manager
Linux Operations and Administration
SQL SERVER 2008 Installation Guide A Step by Step Guide Prepared by Hassan Tariq.
Hands-On Microsoft Windows Server 2008 Chapter 5 Configuring Windows Server 2008 Printing.
How to setup DSS V6 iSCSI Failover with XenServer using Multipath Software Version: DSS ver up55 Presentation updated: February 2011.
CACI Proprietary Information | Date 1 PD² v4.2 Increment 2 SR13 and FPDS Engine v3.5 Database Upgrade Name: Semarria Rosemond Title: Systems Analyst, Lead.
C Copyright © 2006, Oracle. All rights reserved. Oracle Secure Backup Additional Installation Topics.
Guide to Operating Systems, 5th Edition
VMware ESX and ESXi Module 3.
Installing VMware ESX and ESXi
Installation The Intercompany Integration Solution for SAP Business One Version 2.0 for SAP Business One 9.1 Welcome to the course on the installation.
Guide to Linux Installation and Administration, 2e
Installation The Intercompany Integration Solution for SAP Business One Version 2.0 for SAP Business One 9.1 Welcome to the course on the installation.
How to install and manage exchange server 2010 OP Saklani.
Presentation transcript:

SGI Confidential Revolution VTL

SGI Confidential VTL Installation and Configuration Overview Upload the application AOR file Install the VTL Software Gather HBA WWNs Create the COPAN Configuration File Perform the VTL Setup

SGI Confidential VTL Software Installation ( 1 of 4) The VTL Software is not installed by manufacturing. 1. If not already logged in, log in to the Application Processor as user root. 2. Insert the DVD containing the VTL software into the DVD drive of the AP 3. Open a terminal window. 4. To run the installation, type:./revolutioninstall 5. The installation script will begin. 6. iSCSI Initiator - You will be given the option to stop the installation and install the iSCSI Initiator RPM. Select Y (yes) to continue with the installation.

SGI Confidential VTL Software Installation (2 of 4) 7. Configure Maximum LUNs per Adapter - The installation will proceed. You will be asked to configure the maximum LUNs per adapter. It is recommended to select the default by selecting Enter 8. Configure Maximum SCSI Disk Scan - The max_scsi_disk_fs parameter will force the Linux operating system to scan a fixed number of SCSI devices on boot-up. Select Enter to accept the current value.

SGI Confidential VTL Software Installation (3 of 4) 9. Enable NTP - To enable the use of NTP (Network Time Protocol). Type Y (yes) or N (no). 10. Confirmation Screen - Accept the configuration displayed on the confirmation screen. 11. Select HBA Family - Select the target mode HBA.Type Note: For a Failover system type: 2400mid.

SGI Confidential VTL Software Installation (4 of 4) 12. Unmount the USB Flash drive and remove it from the USB drive. 13. You will find a log file, X-rays, and configuration backup in the /usr/local/revolutionT-archive directory

SGI Confidential Gather Shelf Controller HBA WWNs from PSM The WWNs will be used in the Copan.conf file 1. From the KVM, log in to the PSM. 2. Gather the WWPN for each shelf connected to this Application Processor. Note that Shelf 0 is located on the bottom and Shelf 7 is located on the top of the cabinet. Use the following table to record this information:

SGI Confidential Create the copan.conf File (1 of 2) Note: This file comes from FalconStor

SGI Confidential Create the copan.conf File (2 of 2)

SGI Confidential Start the Revolution VTL Console From the KVM or a remote client, connect to the Application Processor. You may have to set display environment variables to echo the GUI. To connect to the VTL Server: 1. Once started, choose Connect. 2. Log in using: User Name: root and password: CPN200t If the VTL server has not been configured yet, the Configuration wizard is launched. NOTE: If the VTL Console GUI does not start, then ensure that all revolution services/ processes are started by running the revolution status command at the Linux prompt, and if there are any processes that are not started, run the revolution start all command. 3. To launch the VTL Console, execute the following: /usr/local/sgi/vtlconsole/revolutionconsole & 4. Ensure the revolution processes are running

SGI Confidential Revolution Processes

SGI Confidential Logging onto the VTL

SGI Confidential Configuration Wizard

SGI Confidential Getting Started with Setup Access the Wizard 1. Connect to the VTL server 2. Select Next to enter the wizard.

SGI Confidential VTL Setup Step 1 (Add License Keys) To enable features, click the Add button and enter a license keycode for all purchased features. Note: Each VTL option requires a keycode. NOTE: To add license key, without the wizard, right-click on the VTL server and select License.

SGI Confidential VTL Setup Step 2 (Network setup)

SGI Confidential VTL Setup Step 3 (Set Hostname) 1. Enter a hostname for the VTL server. Note: Valid characters are letters, numbers, underscore, or dash. 2. The Appliance Processor will restart automatically so that the change will take effect. 3. You must restart the VTL software. Type the following on the command line: revolution start all 4. Once the restart is complete, reconnect to the controller by right-clicking on the controller icon and selecting Connect.

SGI Confidential VTL Setup Step 4 (Enable Fibre Channel) This step takes just a moment and there is no additional windows for this option.

SGI Confidential VTL Setup Step 5 (Switch to Target Mode) By default, all Fibre Channel ports are set to Initiator mode, which means they will initiate requests rather than receive them. It is necessary to set the port(s) connected to the application servers to Target mode so that they can receive requests from the application servers.

SGI Confidential VTL Setup Step 6 (Enable Virtual Libraries) The wizard will allow the operator to create the VirtualTape Library’s Database Resource as well as enable compression for the data stored in the VTL. The VirtualTape Library’s database resource requires 200 MB of disk space, and contains the VTL configuration.

SGI Confidential VTL Setup Step 7 (Assign Physical Libraries) If importing data from physical tapes into the Virtual Tape Library or exporting Virtual Tapes to physical tapes, the physical tape libraries/drives must be assigned to the VTL. This step also inventories the physical tapes in the library/drive so that Virtual Tapes that match the physical tapes can be created.

SGI Confidential VTL Setup Step 8 (Create Virtual Libraries) (1 of 11) Select the shelf on which to create the virtual library. You can select to create the library on a single shelf, or the VTL can be spanned across a maximum of seven shelves by selecting multiple shelves.

SGI Confidential VTL Setup Step 8 (Create Virtual Libraries) (2 of 11) Select the tape library to be emulated.

SGI Confidential VTL Setup Step 8 (Create Virtual Libraries) (3 of 11) Enter information about the tape drives in the library.

SGI Confidential VTL Setup Step 8 (Create Virtual Libraries) (4 of 11) Enter Virtual Tape Library information.

SGI Confidential VTL Setup Step 8 (Create Virtual Libraries) (5 of 11) Configure Auto Archive.

SGI Confidential VTL Setup Step 8 (Create Virtual Libraries) (6 of 11) Define Tape Capacity. Note: Be sure to match the physical tapes.

SGI Confidential VTL Setup Step 8 (Create Virtual Libraries) (7 of 11) Verify all information, and click Finish to create the Virtual Tape Library.

SGI Confidential VTL Setup Step 8 (Create Virtual Libraries) (8 of 11) Select how to create a Virtual Tape(s).

SGI Confidential Tape Cartridge Calculator

SGI Confidential VTL Setup Step 8 (Create Virtual Libraries) (9 of 11) Select Virtualized Physical Devices and specify the Batch Mode information. Depending upon the method selected, specify name and number of tapes (referred to as resources) to create.

SGI Confidential VTL Setup Step 8 (Create Virtual Libraries) (10 of 11) Set the Barcode range.

SGI Confidential VTL Setup Step 8 (Create Virtual Libraries) (11 of 11) Verify all information, and click Finish to create the Virtual Tape(s).

SGI Confidential VTL Setup Step 9 (Add SAN Clients 1 of 3) Select the type of clients (backup servers) to assign a tape library. Add your own SAN Clients - Complete the steps below to create SAN Clients. Use the EveryoneFC client - When Fibre Channel was enabled, an EveryoneFC client was created under SAN Clients. This is a generic client to which all (or some) of the SAN Resources may be assigned. It allows any WWPN not already associated with a Fibre Channel client to have read/write, non-exclusive access to any SAN Resources assigned to Everyone.

SGI Confidential VTL Setup Step 9 (Add SAN Clients 2 of 3) Select the Fibre Channel protocol, and click Next then select the initiator WWPN that represents the client.

SGI Confidential VTL Setup Step 9 (Add SAN Clients 3 of 3) Set the Fibre Channel options and click Next, then verify the information and click Finish.

SGI Confidential VTL Setup Step 10 (Assign VTL to Clients) On the Select a Device Type window, select the Tape Libraries and Tape Drives option, and click Next. On the Select SAN Resource(s) window, select the VTL to be assigned to the client.

SGI Confidential VTL Setup Step 10 (Assign VTL to Clients) On the Select a Fibre Channel Target window, select the WWPN for the Application Processor target port through which the client will access the COPAN 400T/TX. Click Next. Verify the information and click Finish.

SGI Confidential Following the VTL Setup Mirror the VTL Repository To mirror the VTL database that was created during the wizard: 1. Expand the tree in the left pane. 2. Expand the VirtualTape Library System tree. 3. Right-click to select the Database option. Select Mirror -> Add. Change Default Password Once the VTL has been configured, change the default configuration password. 1. Right-click on the Application Processor and select Change Password. 2. Enter the original password, new password, and then confirm the new password. Note: Passwords are case-sensitive. Add an Administrator Account The first time the VTL Console is used after installation, at least one administrator account should be added. 1. Right-click on the Controller name 2. Select Administrators to add VTL Console administrators. Save the VTL System Configuration After the VTL configuration is complete, save the VTL system configuration to a secure location on another machine.

SGI Confidential Revolutionconsole Graphical User Interface

SGI Confidential Connecting to the Application Server The VTL Console can automatically discover all Application Processors on the local subnet. 1. Select Tools --> Discover Application Processors.

SGI Confidential VTL Console Each Application Processor tree is comprised of the following: Physical Resources - Storage HBAs - Storage Devices - Storage Pools Logical Resources - SAN Resources - VirtualTape Libraries SAN Clients Reports Each object on the VTL Console tree has a corresponding display window. These windows show the current configuration of the object and can also show health and performance statistics.

SGI Confidential Event Log

SGI Confidential Performing an X-Ray

SGI Confidential X-Ray (1 of 4) There are four main files in an X-Ray: Messages Info ipstor.conf ipstor.dat. messages This is the Linux system message file and is located in /var/log. All IPStor server messages, including status and error messages, are stored in this file Example:

SGI Confidential X-Ray (2 of 4) The messages file requires some expertise to understand and to know what to look for It documents every event that happens on the system. You can track specific user actions in the file, for example:

SGI Confidential X-Ray (3 of 4) info This file contains a wealth of information, including, but not limited to: IP, physical disk, modules, kernel, IPStor VID and memory information along with the current running processes It is worth scanning through an info file to become familiar with the contents. Example:

SGI Confidential X-Ray (4 of 4) ipstor.conf This file contains information on all the physical devices, logical devices, and IPStor SAN clients, and xml information File closely maps what is seen in the GUI ipstor.dat This file contains the information that the Console uses to display current status For example, mirror progress, replication progress and failover status is stored within this file Similar in appearance to ipstor.conf Other files worth knowing include: nas.conf Contains NAS configuration information rpm Shows all the packages installed in Linux nasrsvdlist.conf Shows uid and gid range for NAS

SGI Confidential Tape Loaded into Drive

SGI Confidential Move Tape to Slot

SGI Confidential Create a Tape (1 of 4)

SGI Confidential Create a Tape (2 of 4)

SGI Confidential Create a Tape (3 of 4)

SGI Confidential Create a Tape (4 of 4)

SGI Confidential Save/Restore the Configuration

SGI Confidential Reports (1 of 2)

SGI Confidential Reports (2 of 2)

SGI Confidential Revolutionconsole Command line Interface

SGI Confidential iscli Overview Type iscli at the command line to display a list of commands. Each command must be combined with the appropriate long or short arguments (ex. Long: --server-name Short: -s servername). With the command name (for example, iscli importtape), a list of arguments will be displayed for that command. Type each command on a single line, separating arguments with a space Use either the short or long arguments Variables are listed in <> after each argument Arguments listed in brackets [ ] are optional The order of the arguments is irrelevant Arguments separated by | are choices. Only one can be selected For a value entered as a literal, it is necessary to enclose the value in quotes (double or single) if it contains special characters such as *,, ?, |, %, $, or space. Otherwise, the system will interpret the characters with a special meaning before it is passed to the command. Literals cannot contain leading or trailing spaces. Leading or trailing spaces enclosed in quotes will be removed before the command is processed.

SGI Confidential Logging into the VTL Server via the cli Log into the VTL Server Syntax: iscli login [-s -u -p |-e] [-X ] iscli login [--server-name= --server-username= --server-password= |--environment] [--rpc-timeout= ] In order to use the -e (--environment) parameter, you must set the following three environment variables: ISSERVERNAME ISUSERNAME ISPASSWORD After setting these variables, the environment parameter can be used in the login command in place of -s -u -p. Therefore, you could type the following to log in: iscli login -e

SGI Confidential Miscellaneous AP and VTL Items

SGI Confidential ismon command

SGI Confidential fcmon command

SGI Confidential VTL Message Log

SGI Confidential Module Review Questions This completes the Revolution VTL module. Answer the review questions before proceeding. 01. What is the login and password for revolution? 02. How do you start the revolution GUI? 03. What is the command to start or stop revolution processes? 04. Where is the copan.conf located and describe how its edited ? 05. At a high level, describe how you configure a VTL. 06. Why should you care about creating a certain number of tapes of a certain size? 07. What component of revolution saves the current state of the VTL? 08. List some things you should do once you’ve configured a VTL. 09. Where is the VTL message log located? 10. List two AP commands that provide metrics of bandwidth and performance? 11. What must you do is there are no tapes after completing the VTL configuration wizard? 12. Where is the X-ray and configuration backup files located ? 13. Describe VTL licensing?

SGI Confidential Lab Project You will be given 120 minutes to: Optionally install the Falconstor software Optionally install Falconstor client software Create the copan.conf file Configure a VTL using the revolutionconsole GUI Explore the various pages and panels of the GUI Optionally explore the CLI Load and unload tapes Save the configuration View VTL logs Run AP VTL commands Perform an X-ray

SGI Confidential