MegaRaid® SAS Software User Guide 80-00156-01 Rev. H August 2009 Revision History Version and Date Description of Changes 80-00156-01 Rev. H, July 2009 Documented the Full Disk Encryption (FDE) feature. 80-00156-01 Rev. G, June 2009 Updated the MegaRAID Storage Manager chapters. 80-00156-01 Rev. F, March 2009 Updated the WebBIOS Configuration Utility, MegaRAID Storage Manager, and MegaCLI chapters. 80-00156-01 Rev. E, December 2008 Added the overview chapter. Updated the WebBIOS Configuration Utility, MegaRAID Storage Manager, and MegaCLI chapters. 80-00156-01 Rev. D, April 2008 Updated the RAID overview section. Updated the WebBIOS Configuration Utility and the MegaRAID Storage Manager. Updated the MegaCLI commands. 80-00156-01 Rev. C, July 2007 Updated operating system support for MegaCLI. Version 2. 80-00156-01 Rev. B, June 2007 Updated the WebBIOS Configuration Utility and the MegaRAID Storage Manager. Updated the MegaCLI commands. Added the RAID Version 2.0 introduction chapter. 80-00156-01 Rev. A, August 2006 Corrected the procedure for creating RAID 10 and RAID 50 drive groups in the WebBIOS Configuration Utility. Version 1.1 DB15-000339-00, December 2005 Initial release of this document. Version 1.0 LSI and the LSI logo are trademarks or registered trademarks of LSI Corporation or its subsidiaries. All other brand and product names may be trademarks of their respective companies. !LIST ANY OTHER REQUIRED TRADEMARKS! REMOVE THIS STATEMENT! This preliminary document describes a preproduction product and contains information that may change substantially for any final commercial release of the product. LSI Corporation makes no express or implied representation or warranty as to the accuracy, quality, or completeness of information contained in this document, and neither the release of this document nor any information included in it obligates LSI Corporation to make a commercial release of the product. LSI Corporation reserves the right to make changes to the product(s) or information disclosed herein at any time without notice. LSI Corporation does not assume any responsibility or liability arising out of the application or use of any product or service described herein, except as expressly agreed to in writing by LSI Corporation; nor does the purchase, lease, or use of a product or service from LSI Corporation convey a license under any patent rights, copyrights, trademark rights, or any other of the intellectual property rights of LSI Corporation or of third parties. FOR ALL DOCUMENTS UNDER NDA INCLUDE THE PARAGRAPH BELOW: REMOVE THIS RED TEXT This document contains proprietary information of LSI Corporation. The information contained herein is not to be used by or disclosed to third parties without the express written permission of LSI Corporation. FOR INTERNAL DOCUMENTS INCLUDE THE PARAGRAPH BELOW: REMOVE THIS RED TEXT This document contains proprietary information of LSI Corporation. The information contained herein is not to be used by or disclosed to third parties without the express written permission of LSI Corporation. Corporate Headquarters Email Website Milpitas, CA globalsupport@lsi.com www.lsi.com 800-372-2447 Document Number: 80-00156-01 Rev. H MegaRaid SAS Software User Guide Table of Contents Table of Contents Chapter 1: Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9 1.1 SAS Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9 1.2 Serial-attached SCSI Device Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10 1.3 Serial ATA II Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10 1.4 Solid State Drive Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11 1.4.1 Solid State Drive Guard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11 1.5 Dimmer Switch Feature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11 1.6 UEFI 2.0 Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12 1.7 Configuration Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12 1.7.1 Valid Drive Mix Configurations with HDDs and SSDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13 1.8 Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14 Chapter 2: Introduction to RAID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15 2.1 RAID Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15 2.2 RAID Benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15 2.3 RAID Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15 2.4 Components and Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15 2.4.1 Physical Array . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16 2.4.2 Virtual Drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16 2.4.3 RAID Drive Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16 2.4.4 Fault Tolerance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16 2.4.5 Consistency Check . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17 2.4.6 Copyback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17 2.4.7 Background Initialization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18 2.4.8 Patrol Read . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18 2.4.9 Disk Striping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19 2.4.10 Disk Mirroring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19 2.4.11 Parity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20 2.4.12 Disk Spanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20 2.4.13 Hot Spares . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21 2.4.14 Disk Rebuilds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23 2.4.15 Rebuild Rate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23 2.4.16 Hot Swap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23 2.4.17 Drive States . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23 2.4.18 Virtual Drive States . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24 2.4.19 Enclosure Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24 2.5 RAID Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25 2.5.1 Summary of RAID Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25 2.5.2 Selecting a RAID Level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25 2.5.3 RAID 0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26 2.5.4 RAID 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26 2.5.5 RAID 5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27 2.5.6 RAID 6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28 2.5.7 RAID 00 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .29 2.5.8 RAID 10 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30 2.5.9 RAID 50 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31 2.5.10 RAID 60 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .32 2.6 RAID Configuration Strategies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33 LSI Corporation Confidential | August 2009 Page 3 Table of Contents MegaRaid SAS Software User Guide 2.6.1 Maximizing Fault Tolerance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .34 2.6.2 Maximizing Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .35 2.6.3 Maximizing Storage Capacity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .36 2.7 RAID Availability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37 2.7.1 RAID Availability Concept . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37 2.8 Configuration Planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .38 2.9 Number of Drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .38 2.9.1 Drive Group Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .38 Chapter 3: Full Disk Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .41 3.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .41 3.2 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .41 3.3 Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .41 3.4 Workflow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .42 3.4.1 Enable Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .42 3.4.2 Change Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .43 3.4.3 Create Secure Virtual Drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .43 3.4.4 Import a Foreign Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .44 3.5 Instant Secure Erase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .44 Chapter 4: WebBIOS Configuration Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .47 4.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .47 4.2 Starting the WebBIOS CU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .47 4.3 WebBIOS CU Main Screen Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .48 4.4 Creating a Storage Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .50 4.4.1 Selecting the Configuration with the Configuration Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .50 4.4.2 Using Automatic Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .51 4.4.3 Using Manual Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .52 4.5 Selecting Full Disk Encryption Security Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .87 4.5.1 Enabling the Security Key Identifier, Security Key, and Passphrase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .87 4.5.2 Changing the Security Key Identifier, Security Key, and Pass Phrase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .91 4.5.3 Disabling the Drive Security Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .97 4.5.4 Importing Foreign Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .99 4.6 Viewing and Changing Device Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .99 4.6.1 Viewing and Changing Controller Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .99 4.6.2 Viewing and Changing Virtual Drive Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 4.6.3 Viewing Drive Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 4.6.4 Viewing and Changing Battery Backup Unit Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 4.7 Viewing System Event Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108 4.8 Managing Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109 4.8.1 Running a Consistency Check . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110 4.8.2 Deleting a Virtual Drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110 4.8.3 Importing or Clearing a Foreign Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110 4.8.4 Migrating the RAID Level of a Virtual Drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113 Chapter 5: MegaRAID Command Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 5.1 Product Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 5.2 Novell NetWare, SCO, Solaris, FreeBSD, and DOS Operating System Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116 5.3 Command Line Abbreviations and Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 5.3.1 Abbreviations Used in the Command Line . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 Page 4 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Table of Contents 5.3.2 Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 5.4 Controller Property-Related Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 5.4.1 Display Controller Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 5.4.2 Display Number of Controllers Supported . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 5.4.3 Enable or Disable Automatic Rebuild . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119 5.4.4 Flush Controller Cache . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119 5.4.5 Set Controller Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119 5.4.6 Display Specified Controller Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121 5.4.7 Set Factory Defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121 5.4.8 Set SAS Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121 5.4.9 Set Time and Date on Controller . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121 5.4.10 Display Time and Date on Controller . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122 5.5 Patrol Read-Related Controller Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122 5.5.1 Set Patrol Read Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122 5.5.2 Set Patrol Read Delay Interval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122 5.6 BIOS-Related Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 5.6.1 Set or Display Bootable Virtual Drive ID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 5.6.2 Select BIOS Status Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 5.7 Battery Backup Unit-Related Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 5.7.1 Display BBU Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 5.7.2 Display BBU Status Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124 5.7.3 Display BBU Capacity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 5.7.4 Display BBU Design Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 5.7.5 Display Current BBU Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126 5.7.6 Start BBU Learning Cycle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126 5.7.7 Place Battery in Low-Power Storage Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126 5.7.8 Set BBU Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127 5.8 Options for Displaying Logs Kept at Firmware Level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127 5.8.1 Event Log Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127 5.8.2 Set BBU Terminal Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128 5.9 Configuration-Related Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128 5.9.1 Create a RAID Drive Group from All Unconfigured Good Drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128 5.9.2 Add RAID 0, 1, 5, or 6 Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130 5.9.3 Add RAID 10, 50, or 60 Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131 5.9.4 Clear the Existing Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131 5.9.5 Save the Configuration on the Controller . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131 5.9.6 Restore the Configuration Data from File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132 5.9.7 Manage Foreign Configuration Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132 5.9.8 Delete Specified Virtual Drive(s) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133 5.9.9 Display the Free Space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133 5.10 Virtual Drive-Related Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133 5.10.1 Display Virtual Drive Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133 5.10.2 Change the Virtual Drive Cache and Access Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134 5.10.3 Display the Virtual Drive Cache and Access Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134 5.10.4 Manage Virtual Drives Initialization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135 5.10.5 Manage a Consistency Check . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135 5.10.6 Manage a Background Initialization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136 5.10.7 Perform a Virtual Drive Reconstruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136 5.10.8 Display Information about Virtual Drives and Drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 5.10.9 Display the Number of Virtual Drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 5.11 Drive-Related Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 5.11.1 Display Drive Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 LSI Corporation Confidential | August 2009 Page 5 Table of Contents MegaRaid SAS Software User Guide 5.11.2 Set the Drive State to Online . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 5.11.3 Set the Drive State to Offline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 5.11.4 Change the Drive State to Unconfigured Good . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 5.11.5 Change Drive State . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 5.11.6 Manage a Drive Initialization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139 5.11.7 Rebuild a Drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139 5.11.8 Locate the Drive(s) and Activate LED . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139 5.11.9 Mark the Configured Drive as Missing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140 5.11.10 Display the Drives in Missing Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140 5.11.11 Replace the Configured Drives and Start an Automatic Rebuild . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140 5.11.12 Prepare the Unconfigured Drive for Removal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140 5.11.13 Display Total Number of Drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141 5.11.14 Display List of Physical Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141 5.11.15 Download Firmware to the Physical Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141 5.12 Enclosure-Related Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141 5.13 Flashing the Firmware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141 5.13.1 Flash the Firmware with the ROM File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142 5.13.2 Flash the Firmware in Mode 0 with the ROM File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142 5.14 SAS Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142 5.15 Diagnostic-Related Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143 5.15.1 Start Controller Diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143 5.15.2 Start Battery Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143 5.15.3 Start NVRAM Diagnostic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143 5.16 Miscellaneous Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143 5.16.1 Display the MegaCLI Version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143 5.16.2 Display Help for MegaCLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144 Chapter 6: MegaRAID Storage Manager Overview and Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145 6.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145 6.1.1 Creating Storage Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145 6.1.2 Monitoring Storage Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145 6.1.3 Maintaining Storage Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145 6.2 Hardware and Software Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145 6.3 Installing MegaRAID Storage Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146 6.3.1 Installing MegaRAID Storage Manager Software on Microsoft Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146 6.3.2 Installing MegaRAID Storage Manager Software for Linux . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150 6.3.3 Linux Error Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151 6.4 MegaRAID Storage Manager Support and Installation on VMWare . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151 6.4.1 Installing MegaRAID Storage Manager for VMWare Classic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151 6.4.2 Uninstalling MegaRAID Storage Manager for VMWare . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151 6.4.3 Installing MegaRAID Storage Manager Support on the VMWare ESX Operating System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152 6.4.4 Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156 6.4.5 Running MSM on VMWare ESX 3.5i U2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159 6.5 Installing and Configuring a CIM Provider . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160 6.5.1 Installing a CIM SAS Storage Provider on Linux . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160 6.5.2 Installing a CIM SAS Storage Provider on Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161 6.6 Installing and Configuring an SNMP Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162 6.6.1 Installing and Configuring an SNMP Agent on Linux . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162 6.6.2 Installing and Configuring an SNMP Agent on Solaris . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163 6.6.3 Installing an SNMP Agent on Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166 6.7 MegaRAID Storage Manager Support and Installation on Solaris 10 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167 6.7.1 Installing MegaRAID Storage Manager Software for Solaris 10 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167 Page 6 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Table of Contents 6.7.2 Uninstalling MegaRAID Storage Manager Software for Solaris 10 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167 Chapter 7: MegaRAID Storage Manager Window and Menus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169 7.1 Starting MegaRAID Storage Manager Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169 7.2 MegaRAID Storage Manager Window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171 7.2.1 Physical/Logical View Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172 7.2.2 Properties/Operations Panels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173 7.2.3 Event Log Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174 7.2.4 Menu Bar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174 Chapter 8: Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177 8.1 Creating a New Storage Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177 8.1.1 Selecting Virtual Drive Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177 8.1.2 Creating a Virtual Drive Using Simple Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178 8.1.3 Creating a Virtual Drive Using Advanced Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182 8.2 Selecting Full Disk Encryption Security Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189 8.2.1 Enabling Drive Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189 8.2.2 Changing the Security Key Identifier, Security Key, and Pass Phrase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195 8.2.3 Disabling Drive Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200 8.2.4 Importing or Clearing a Foreign Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202 8.3 Adding Hot Spare Drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204 8.4 Changing Adjustable Task Rates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205 8.5 Changing Power Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207 8.6 Changing Virtual Drive Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207 8.7 Changing a Virtual Drive Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208 8.7.1 Accessing the Modify Drive Group Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208 8.7.2 Adding a Drive or Drives to a Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210 8.7.3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Removing a Drive from a Configuration 211 8.7.4 Changing the RAID Level of a Virtual Drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211 8.8 Deleting a Virtual Drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212 8.9 Saving a Storage Configuration to Drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212 8.10 Clearing a Storage Configuration from a Controller . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212 8.11 Adding a Saved Storage Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212 Chapter 9: Monitoring System Events and Storage Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215 9.1 Monitoring System Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215 9.2 Configuring Alert Notifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216 9.2.1 Setting Alert Delivery Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218 9.2.2 Changing Alert Delivery Methods for Individual Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219 9.2.3 Changing the Severity Level for Individual Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220 9.2.4 Entering or Editing the Sender Email Address and SMTP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221 9.2.5 Authenticating a Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222 9.2.6 Saving Backup Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222 9.2.7 Loading Backup Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223 9.2.8 Adding Email Addresses of Recipients of Alert Notifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223 9.2.9 Testing Email Addresses of Recipients of Alert Notifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224 9.2.10 Removing Email Addresses of Recipients of Alert Notifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224 9.3 Monitoring Controllers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225 9.4 Monitoring Drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226 LSI Corporation Confidential | August 2009 Page 7 Table of Contents MegaRaid SAS Software User Guide 9.5 Running a Patrol Read . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227 9.6 Monitoring Virtual Drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229 9.7 Monitoring Enclosures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231 9.8 Monitoring Battery Backup Units . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232 9.8.1 Battery Learn Cycle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233 9.9 Monitoring Rebuilds and Other Processes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234 Chapter 10: Maintaining and Managing Storage Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235 10.1 Initializing a Virtual Drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235 10.2 Running a Consistency Check . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235 10.3 Scanning for New Drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236 10.4 Rebuilding a Drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236 10.5 Making a Drive Offline or Missing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237 10.6 Upgrading the Firmware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237 Appendix A: Events and Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239 A.1 Error Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239 A.2 Event Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239 Appendix B: Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251 Page 8 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 1: Overview | SAS Technology Chapter 1 Overview This chapter provides an overview of this guide, which documents the utilities used to configure, monitor, and maintain MegaRAID® Serial-attached SCSI (SAS) RAID controllers with RAID control capabilities and the storage-related devices connected to them. This guide explains how to use the MegaRAID Storage Manager™ software, WebBIOS, and Command Line Interface (CLI). In addition, it documents SAS technology, Serial ATA (SATA) technology, Solid State Disk (SSD) technology, configuration scenarios, and drive types. 1.1 SAS Technology The MegaRAID 6Gb/s SAS RAID controllers are high-performance intelligent PCI Express-to-SCSI/Serial ATA II controllers with RAID control capabilities. MegaRAID 6Gb/s SAS RAID controllers provide reliability, high performance, and fault-tolerant disk subsystem management. They are an ideal RAID solution for the internal storage of workgroup, departmental, and enterprise systems. MegaRAID 6Gb/s SAS RAID controllers offer a cost-effective way to implement RAID in a server. SAS technology brings a wealth of options and flexibility with the use of SAS devices, Serial ATA (SATA) II devices, and SSD devices within the same storage infrastructure. These devices bring individual characteristics that make each one a more suitable choice depending on your storage needs. MegaRAID gives you the flexibility to combine these two similar technologies on the same controller, within the same enclosure, and in the same virtual drive. NOTE: LSI recommends that you carefully assess any decision to mix SAS drives and SATA drives within the same virtual drives. Although you can mix drives, LSI strongly discourages the practice. This recommendation applies to both HDDs and SSDs. The MegaRAID 6Gb/s SAS RAID controllers are based on the LSI first-to-market SAS IC technology and proven MegaRAID technology. As second-generation PCI Express RAID controllers, the MegaRAID SAS RAID controllers address the growing demand for increased data throughput and scalability requirements across midrange and enterprise-class server platforms. LSI offers a family of MegaRAID SAS RAID controllers addressing the needs for both internal and external solutions. LSI Corporation Confidential | August 2009 Page 9 Chapter 1: Overview | Serial-attached SCSI Device Interface MegaRaid SAS Software User Guide The SAS controllers support the ANSI Serial Attached SCSI standard, version 1.1. In addition, the controller supports the SATA II protocol defined by the Serial ATA specification, version 1.0a. Supporting both the SAS and SATA II interfaces, the SAS controller is a versatile controller that provides the backbone of both server environments and high-end workstation environments. Each port on the SAS RAID controller supports SAS devices, SATA II devices, or SSD devices using the following protocols: SAS Serial SCSI Protocol (SSP), which enables communication with other SAS devices SATA II, which enables communication with other SATA II devices Serial Management Protocol (SMP), which communicates topology management information directly with an attached SAS expander device Serial Tunneling Protocol (STP), which enables communication with a SATA II device through an attached expander 1.2 Serial-attached SCSI SAS is a serial, point-to-point, enterprise-level device interface that leverages the Device Interface proven SCSI protocol set. SAS is a convergence of the advantages of SATA II, SCSI, and Fibre Channel, and is the future mainstay of the enterprise and high-end workstation storage markets. SAS offers a higher bandwidth per pin than parallel SCSI, and it improves signal and data integrity. The SAS interface uses the proven SCSI command set to ensure reliable data transfers, while providing the connectivity and flexibility of point-to-point serial data transfers. The serial transmission of SCSI commands eliminates clock-skew challenges. The SAS interface provides improved performance, simplified cabling, smaller connectors, lower pin count, and lower power requirements when compared to parallel SCSI. SAS controllers leverage a common electrical and physical connection interface that is compatible with Serial ATA technology. The SAS and SATA II protocols use a thin, 7-wire connector instead of the 68-wire SCSI cable or 26-wire ATA cable. The SAS/SATA II connector and cable are easier to manipulate, allow connections to smaller devices, and do not inhibit airflow. The point-to-point SATA II architecture eliminates inherent difficulties created by the legacy ATA master-slave architecture, while maintaining compatibility with existing ATA firmware. 1.3 Serial ATA II Features The SATA bus is a high-speed, internal bus that provides a low pin count, low voltage level bus for device connections between a host controller and a SATA device. The following list describes the SATA II features of the RAID controllers: Supports SATA II data transfers of 3.0 Gbits/s Supports STP data transfers of 3.0 Gbits/s Provides a serial, point-to-point storage interface Simplifies cabling between devices Eliminates the master-slave construction used in parallel ATA Allows addressing of multiple SATA II targets through an expander Allows multiple initiators to address a single target (in a fail-over configuration) through an expander Page 10 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 1: Overview | Solid State Drive Features 1.4 Solid State Drive Features MegaRAID firmware supports SSD drives attached to MegaRAID SAS controllers. These drives are expected to behave like SATA HDDs or SAS HDDs. The major advantages of SSD drives include: High random read speed (because there is no read-write head to move) High performance-to-power ratio, as these drives have very low power consumption compared to HDDs Low latency High mechanical reliability Lower weight and size (for low-capacity SSD drives) The features and operations on SSD drives are the same as for hard disk drives (HDD). NOTE: MegaRAID implements support for only those SATA SSD drives which support ATA-8 ACS compliance. You can choose whether to allow a virtual drive to consist of both SSD devices and HDDs. For a virtual drive that consists of SSDs only, you can choose whether to allow SAS SSD drives and SATA SSD drives in that virtual drive. For virtual drives that have both SSDs and HDDs, you can choose whether to mix SAS and SATA HDD drives with SAS and SATA SSD devices in various combinations.l NOTE: Support for SATA SDD drives applies only to those drives that support ATA-8 ACS compliance. 1.4.1 Solid State Drive Guard SSDs are known for their reliability and performance. SSD Guard™, a feature that is unique to MegaRAID, increases the reliability of SSDs by automatically copying data from a drive with potential to fail to a designated hot spare or newly inserted drive. Because SSDs are very reliable, non-redundant RAID 0 configurations are much more common than in the past. SSD Guard offers added data protection for RAID 0 configurations. SSD Guard works by looking for a predictive failure while monitoring the SDD S.M.A.R.T. (Self-Monitoring, Analysis and Reporting Technology) error log. If errors indicate a SSD failure is imminent, MegaRAID starts a rebuild to preserve the data on the SSD and sends appropriate warning event notifications. 1.5 Dimmer Switch Feature Powering and cooling drives represents a major cost for data centers. The new MegaRAID Dimmer™ Switch reduces the power consumption of the devices connected to a MegaRAID controller. This helps to share resources more efficiently and lower costs. With Dimmer Switch, any unconfigured drive connected to a MegaRAID controller is spun down after 30 minutes of inactivity, reducing its power usage. Spun down drives are spun up automatically when you create a configuration using those drives. LSI Corporation Confidential | August 2009 Page 11 Chapter 1: Overview | UEFI 2.0 Support MegaRaid SAS Software User Guide 1.6 UEFI 2.0 Support Significant challenges face operating system and platform developers to innovate using the legacy PC-AT BIOS boot environment. These include memory constraints, maintenance challenges, and increased complexities due to a lack of industry-wide standards. To handle these challenges, the Unified Extensible Firmware Interface (UEFI) was developed to do the following: Define a clean interface between operating systems and the hardware platform at boot time. Support an architecture-independent mechanism for initializing add-in cards. UEFI 2.0 provides MegaRAID customers with expanded platform support. The MegaRAID UEFI 2.0 driver, a boot service device driver, handles block IO requests and SCSI pass-through commands (SPT), and offers the ability to launch pre-boot MegaRAID management applications through a driver configuration protocol (DCP). The UEFI driver also supports driver diagnostic protocol, which allows administrators to access pre-boot diagnostics. 1.7 Configuration Scenarios There are three main scenarios in which you can use the SAS RAID controllers: Low-end, internal SATA II configurations: In this configuration, use the RAID controller as a high-end SATA II compatible controller that connects up to eight disks either directly or through a port expander. This configuration is mostly for low-end or entry servers. Enclosure management is provided through out-of-band I2C bus. Side bands of both types of internal SAS connectors support the SFF-8485 (SGPIO) interface. Midrange internal SAS configurations: This configuration is like the internal SATA II configurations, but with high-end disks. This configuration is more suitable for low-range to midrange servers. High-end external SAS/SATA II configurations: This configuration is for both internal connectivity and external connectivity, using SATA II drives, SAS drives, or both. External enclosure management is supported through in-band, SCSI-enclosed storage. The configuration must support STP and SMP. Figure 1 shows a direct-connect configuration. The Inter-IC (I2C) interface communicates with peripherals. The external memory bus provides a 32-bit memory bus, parity checking, and chip select signals for pipelined synchronous burst static random access memory (PSBRAM), nonvolatile static random access memory (NVSRAM), and Flash ROM. NOTE: The external memory bus is 32-bit for the SAS 8704ELP and the SAS 8708ELP, and 64-bit for the SAS 8708EM2, the SAS 8880EM2, and the SAS 8888ELP. Page 12 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 1: Overview | Configuration Scenarios SAS/SATA II Device 32-Bit Memory Address/Data SAS Bus Flash ROM/ SAS/SATA II Device PCI Express PSBRAM/ RAID Controller NVSRAM I2C SAS/SATA II Device Interface I2C SAS/SATA II Device PCI Express Interface Figure 1: Example of an LSI SAS Direct-Connect Application Figure 2 shows an example of a SAS RAID controller configured with an LSISASx12 expander that is connected to SAS disks, SATA II disks, or both. PCI Express Interface 8 Peripheral SAS RAID Controller Bus Flash ROM/ NVSRAM/ I2C/UART LSISAS1078 72-bit DDR/DDR2 PCI Express to SAS ROC with ECC Interface SRAM SDRAM SRAM SAS/SATA LSISASx12 Drives LSISASx12 Expander Expander SAS/SATA II SAS/SATA II SAS/SATA II SAS/SATA II Drives Drives Drives Drives Figure 2: Example of an LSI SAS RAID Controller Configured with an LSISASx12 Expander 1.7.1 Valid Drive Mix Configurations You can allow a virtual drive to consist of both SSDs and HDDs. with HDDs and SSDs For virtual drives that have both SSDs and HDDs, you can choose whether to mix SAS drives and SATA drives on the SSD devices. You can choose whether to allow a virtual drive to consist of both SSD devices and HDDs. For a virtual drive that consists of SSDs only, you can choose whether to allow SAS SSD drives and SATA SSD drives in that virtual drive. For virtual drives that have both SSDs and HDDs, you can choose whether to mix SAS and SATA HDD drives with SAS and SATA SSD devices in various combinations. Table 1 lists the valid drive mix configurations you can use when you create virtual drives and allow HDD and SSD mixing. The valid drive mix configurations are based on manufacturer settings. LSI Corporation Confidential | August 2009 Page 13 Chapter 1: Overview | Technical Support MegaRaid SAS Software User Guide Table 1: Valid Drive Mix Configurations # Valid Drive Mix Configurations 1. SAS HDD with SAS SDD (SAS-only configuration) 2. SATA HDD with SATA SSD (SATA-only configuration) 3. SAS HDD with a mix of SAS and SATA SSD (a SATA HDD cannot be added) 4. SATA HDD with a mix of SAS and SATA SSD (a SAS HDD cannot be added) 5. SAS SSD with a mix of SAS and SATA HDD (a SATA SSD cannot be added) 6. SATA SSD with a mix of SAS and SATA HDD (a SAS SSD cannot be added) 7. A mix of SAS and SATA HDD with a mix of SAS and SATA SSD 8. A SSD cannot be added to a HDD, but a SAS/SATA mix is allowed. NOTE: Only one of the valid configurations listed in Table 1 is allowed based on your controller card manufacturing setting. NOTE: The valid drive mix also applies to hot spares. For hot spare information, see Section 2.4.13, Hot Spares, on page 21. 1.8 Technical Support For assistance with installing, configuring, or running your MegaRAID 6Gb/s SAS RAID controller, contact LSI Technical Support: Phone Support: 1-800-633-4545 (North America) Page 14 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 2: Introduction to RAID | RAID Description Chapter 2 Introduction to RAID This chapter describes RAID (Redundant Array of Independent Disks), RAID functions and benefits, RAID components, RAID levels, and configuration strategies. In addition, it defines the RAID availability concept, and offers tips for configuration planning. 2.1 RAID Description RAID is an array, or group of multiple independent physical drives that provide high performance and fault tolerance. A RAID drive group improves I/O (input/output) performance and reliability. The RAID drive group appears to the host computer as a single storage unit or as multiple virtual units. I/O is expedited because several drives can be accessed simultaneously. 2.2 RAID Benefits RAID drive groups improve data storage reliability and fault tolerance compared to single-drive storage systems. Data loss resulting from a drive failure can be prevented by reconstructing missing data from the remaining drives. RAID has gained popularity because it improves I/O performance and increases storage subsystem reliability. 2.3 RAID Functions Virtual drives are drive groups or spanned drive groups that are available to the operating system. The storage space in a virtual drive is spread across all of the drives in the drive group. Your drives must be organized into virtual drives in a drive group and they must be able to support the RAID level that you select. Below are some common RAID functions: Creating hot spare drives Configuring drive groups and virtual drives Initializing one or more virtual drives Accessing controllers, virtual drives, and drives individually Rebuilding failed drives Verifying that the redundancy data in virtual drives using RAID level 1, 5, 6, 10, 50, or 60 is correct Reconstructing virtual drives after changing RAID levels or adding a drive to a drive group Selecting a host controller to work on 2.4 Components and RAID levels describe a system for ensuring the availability and redundancy of data Features stored on large disk subsystems. See Section 2.5, RAID Levels for detailed information about RAID levels. The following subsections describes the components of RAID drive groups and RAID levels. LSI Corporation Confidential | August 2009 Page 15 Chapter 2: Introduction to RAID | Components and Features MegaRaid SAS Software User Guide 2.4.1 Physical Array A physical array is a group of drives. The drives are managed in partitions known as virtual drives. 2.4.2 Virtual Drive A virtual drive is a partition in a drive group that is made up of contiguous data segments on the drives. A virtual drive can consist of an entire drive group, more than one entire drive group, a part of a drive group, parts of more than one drive group, or a combination of any two of these conditions. 2.4.3 RAID Drive Group A RAID drive group is one or more drives controlled by the RAID controller. 2.4.4 Fault Tolerance Fault tolerance is the capability of the subsystem to undergo a drive failure or failures without compromising data integrity, and processing capability. The RAID controller provides this support through redundant drive groups in RAID levels 1, 5, 6, 10, 50, and 60. The system can still work properly even with drive failure in a drive group, though performance can be degraded to some extent. In a span of RAID 1 drive groups, each RAID 1 drive group has two drives and can tolerate one drive failure. The span of RAID 1 drive groups can contain up to 32 drives, and tolerate up to 16 drive failures - one in each drive group. A RAID 5 drive group can tolerate one drive failure in each RAID 5 drive group. A RAID 6 drive group can tolerate up to two drive failures. Each spanned RAID 10 virtual drive can tolerate multiple drive failures, as long as each failure is in a separate drive group. A RAID 50 virtual drive can tolerate two drive failures, as long as each failure is in a separate drive group. RAID 60 drive groups can tolerate up to two drive failures in each drive group. NOTE: RAID level 0 is not fault tolerant. If a drive in a RAID 0 drive group fails, the whole virtual drive (all drives associated with the virtual drive) will fail. Fault tolerance is often associated with system availability because it allows the system to be available during the failures. However, this means that it is also important for the system to be available during the repair of the problem. A hot spare is an unused drive that, in case of a disk failure in a redundant RAID drive group, can be used to rebuild the data and re-establish redundancy. After the hot spare is automatically moved into the RAID drive group, the data is automatically rebuilt on the hot spare drive. The RAID drive group continues to handle requests while the rebuild occurs. Auto-rebuild allows a failed drive to be replaced and the data automatically rebuilt by “hot-swapping” the drive in the same drive bay. The RAID drive group continues to handle requests while the rebuild occurs. 2.4.4.1 Multipathing The firmware provides support for detecting and using multiple paths from the RAID controllers to the SAS devices that are in enclosures. Devices connected to enclosures have multiple paths to them. With redundant paths to the same port of a device, if one path fails, another path can be used to communicate between the controller and the device. Using multiple paths with load balancing, instead of a single path, can increase reliability through redundancy. Page 16 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 2: Introduction to RAID | Components and Features Applications show the enclosures and the drives connected to the enclosures. The firmware dynamically recognizes new enclosures added to a configuration along with their contents (new drives). In addition, the firmware dynamically adds the enclosure and its contents to the management entity currently in-use. Multipathing provides the following features: Support for failover, in the event of path failure Auto-discovery of new or restored paths while the system is online, and reversion to system load balancing policy Measurable bandwidth improvement to the multi-path device Support for changing the load balancing path while the system is online The firmware determines whether enclosure modules (ESMs) are part of the same enclosure. When a new enclosure module is added (allowing multi-path) or removed (going single path), an Asynchronous Event Notification (AEN) is generated. AENs about drives contain correct information about the "enclosure", when the drives are connected by multiple paths. The enclosure module detects partner ESMs and issue events appropriately. In a system with two ESMs, you can replace one of the ESMs without affecting the virtual drive availability. For example, the controller can run heavy I/Os, and when you replace one of the ESM modules, I/Os should not stop. The controller uses different paths to balance the load on the entire system. In the MegaRAID Storage Manager utility, when multiple paths are available to a drive, the drive information will show only one enclosure. The utility shows that a redundant path is available to a drive. All drives with a redundant path display this information. The firmware supports online replacement of enclosure modules. 2.4.5 Consistency Check The Consistency Check operation verifies correctness of the data in virtual drives that use RAID levels 1, 5, 6, 10, 50, and 60. (RAID 0 does not provide data redundancy). For example, in a system with parity, checking consistency means computing the data on one drive and comparing the results to the contents of the parity drive. NOTE: It is recommended that you perform a consistency check at least once a month. 2.4.6 Copyback The copyback feature allows you to copy data from a source drive of a virtual drive to a destination drive that is not a part of the virtual drive. Copyback is often used to create or restore a specific physical configuration for a drive group (for example, a specific arrangement of drive group members on the device I/O buses). Copyback can be run automatically or manually. Typically, when a drive fails or is expected to fail, the data is rebuilt on a hot spare. The failed drive is replaced with a new disk. Then the data is copied from the hot spare to the new drive, and the hot spare reverts from a rebuild drive to its original hot spare status. The copyback operation runs as a background activity, and the virtual drive is still available online to the host. LSI Corporation Confidential | August 2009 Page 17 Chapter 2: Introduction to RAID | Components and Features MegaRaid SAS Software User Guide Copyback is also initiated when the first Self-Monitoring Analysis and Reporting Technology (SMART) error occurs on a drive that is part of a virtual drive. The destination drive is a hot spare that qualifies as a rebuild drive. The drive with the SMART error is marked as "failed" only after the successful completion of the copyback. This avoids putting the drive group in degraded status. NOTE: During a copyback operation, if the drive group involved in the copyback is deleted because of a virtual drive deletion, the destination drive reverts to an Unconfigured Good state or hot spare state. Order of Precedence. In the following scenarios, rebuild takes precedence over the copyback operation: If a copyback operation is already taking place to a hot spare drive, and any virtual drive on the controller degrades, the copyback operation aborts, and a rebuild starts. The rebuild changes the virtual drive to the optimal state. The rebuild operation takes precedence over the copyback operation when the conditions exist to start both operations. For example: — Where the hot spare is not configured (or unavailable) in the system. — There are two drives (both members of virtual drives), with one drive exceeding the SMART error threshold, and the other failed. — If you add a hot spare (assume a global hot spare) during a copyback operation, the copyback is aborted, and the rebuild operation starts on the hot spare. 2.4.7 Background Initialization Background initialization is a consistency check that is forced when you create a virtual drive. The difference between a background initialization and a consistency check is that a background initialization is forced on new virtual drives. This is an automatic operation that starts 5 minutes after you create the virtual drive. Background initialization is a check for media errors on the drives. It ensures that striped data segments are the same on all drives in a drive group. The default and recommended background initialization rate is 30 percent. Before you change the rebuild rate, you must stop the background initialization or the rate change will not affect the background initialization rate. After you stop background initialization and change the rebuild rate, the rate change takes effect when you restart background initialization. 2.4.8 Patrol Read Patrol read involves the review of your system for possible drive errors that could lead to drive failure and then action to correct errors. The goal is to protect data integrity by detecting drive failure before the failure can damage data. The corrective actions depend on the drive group configuration and the type of errors. Patrol read starts only when the controller is idle for a defined period of time and no other background tasks are active, though it can continue to run during heavy I/O processes. You can use the MegaRAID Command Tool or the MegaRAID Storage Manager to select the patrol read options, which you can use to set automatic or manual operation, or disable patrol read. See Section 5.4, Controller Property-Related Options or Section 9.5, Running a Patrol Read. Page 18 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 2: Introduction to RAID | Components and Features 2.4.9 Disk Striping Disk striping allows you to write data across multiple drives instead of just one drive. Disk striping involves partitioning each drive storage space into stripes that can vary in size from 8 KB to 1024 KB. These stripes are interleaved in a repeated sequential manner. The combined storage space is composed of stripes from each drive. It is recommended that you keep stripe sizes the same across RAID drive groups. For example, in a four-disk system using only disk striping (used in RAID level 0), segment 1 is written to disk 1, segment 2 is written to disk 2, and so on. Disk striping enhances performance because multiple drives are accessed simultaneously, but disk striping does not provide data redundancy. Segment 1 Segment 2 Segment 3 Segment 4 Segment 5 Segment 6 Segment 7 Segment 8 Segment 9 Segment 10 Segment 11 Segment 12 Figure 3: Example of Disk Striping (RAID 0) 2.4.9.1 Stripe Width Stripe width is the number of drives involved in a drive group where striping is implemented. For example, a four-disk drive group with disk striping has a stripe width of four. 2.4.9.2 Stripe Size The stripe size is the length of the interleaved data segments that the RAID controller writes across multiple drives, not including parity drives. For example, consider a stripe that contains 64 KB of disk space and has 16 KB of data residing on each disk in the stripe. In this case, the stripe size is 64 KB and the strip size is 16 KB. 2.4.9.3 Strip Size The strip size is the portion of a stripe that resides on a single drive. 2.4.10 Disk Mirroring With mirroring (used in RAID 1 and RAID 10), data written to one drive is simultaneously written to another drive. The primary advantage of disk mirroring is that it provides 100 percent data redundancy. Because the contents of the disk are completely written to a second disk, data is not lost if one disk fails. In addition, both drives contain the same data at all times, so either disk can act as the operational disk. If one disk fails, the contents of the other disk can be used to run the system and reconstruct the failed disk. Disk mirroring provides 100 percent redundancy, but is expensive because each drive in the system must be duplicated. Figure 4 shows an example of disk mirroring. Segment 1 Segment 1 Duplicated Segment 2 Segment 2 Duplicated Segment 3 Segment 3 Duplicated Segment 4 Segment 4 Duplicated Figure 4: Example of Disk Mirroring (RAID 1) LSI Corporation Confidential | August 2009 Page 19 Chapter 2: Introduction to RAID | Components and Features MegaRaid SAS Software User Guide 2.4.11 Parity Parity generates a set of redundancy data from two or more parent data sets. The redundancy data can be used to reconstruct one of the parent data sets in the event of a drive failure. Parity data does not fully duplicate the parent data sets, but parity generation can slow the write process. In RAID, this method is applied to entire drives or stripes across all of the drives in a drive group. The types of parity are described in Table 2. Table 2: Types of Parity Parity Type Description Dedicated The parity data on two or more drives is stored on an additional disk. Distributed The parity data is distributed across more than one drive in the system. RAID 5 combines distributed parity with disk striping. If a single drive fails, it can be rebuilt from the parity and the data on the remaining drives. An example of a RAID 5 drive group is shown in Figure 5. RAID 5 uses parity to provide redundancy for one drive failure without duplicating the contents of entire drives. RAID 6 uses distributed parity and disk striping, also, but adds a second set of parity data so that it can survive up to two drive failures. Segment 1 Segment 2 Segment 3 Segment 4 Segment 5 Parity (1-5) Segment 7 Segment 8 Segment 9 Segment 10 Parity (6-10) Segment 6 Segment 13 Segment 14 Segment 15 Parity (11 15) Segment 11 Segment 12 Segment 19 Segment 20 Parity (16-20) Segment 16 Segment 17 Segment 18 Segment 25 Parity (21-25) Segment 21 Segment 22 Segment 23 Segment 24 Parity (26 30) Segment 26 Segment 27 Segment 28 Segment 29 Segment 30 Note: Parity is distributed across all drives in the drive group. Figure 5: Example of Distributed Parity (RAID 5) 2.4.12 Disk Spanning Disk spanning allows multiple drives to function like one big drive. Spanning overcomes lack of disk space and simplifies storage management by combining existing resources or adding relatively inexpensive resources. For example, four 20 GB drives can be combined to appear to the operating system as a single 80 GB drive. Spanning alone does not provide reliability or performance enhancements. Spanned virtual drives must have the same stripe size and must be contiguous. In Figure 6, RAID 1 drive groups are turned into a RAID 10 drive group. NOTE: Make sure that the spans are in different backplanes, so that if one span fails, you do not lose the whole drive group. Page 20 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 2: Introduction to RAID | Components and Features 60 GB/s 60 GB/s 60 GB/s 60 GB/s Can Be Accessed as Can Be Accessed as One 120 GB/s Drive One 120 GB/s Drive Figure 6: Example of Disk Spanning Spanning two contiguous RAID 0 virtual drives does not produce a new RAID level or add fault tolerance. It does increase the capacity of the virtual drive and improves performance by doubling the number of spindles. 2.4.12.1 Spanning for RAID 00, Table 3 describes how to configure RAID 00, RAID 10, RAID 50, and RAID 60 by RAID 10, RAID 50, and RAID 60 spanning. The virtual drives must have the same stripe size and the maximum number of spans is eight. The full drive capacity is used when you span virtual drives; you cannot specify a smaller drive capacity. See Chapter 8, Configuration for detailed procedures for configuring drive groups and virtual drives, and spanning the drives. Table 3: Spanning for RAID 10, RAID 50, and RAID 60 Level Description 00 Configure RAID 00 by spanning two contiguous RAID 0 virtual drives, up to the maximum number of supported devices for the controller. 10 Configure RAID 10 by spanning two contiguous RAID 1 virtual drives, up to the maximum number of supported devices for the controller. RAID 10 supports a maximum of eight spans. You must use an even number of drives in each RAID virtual drive in the span. The RAID 1 virtual drives must have the same stripe size. 50 Configure RAID 50 by spanning two contiguous RAID 5 virtual drives. The RAID 5 virtual drives must have the same stripe size. 60 Configure RAID 60 by spanning two contiguous RAID 6 virtual drives. The RAID 6 virtual drives must have the same stripe size. 2.4.13 Hot Spares A hot spare is an extra, unused drive that is part of the disk subsystem. It is usually in standby mode, ready for service if a drive fails. Hot spares permit you to replace failed drives without system shutdown or user intervention. MegaRAID SAS RAID controllers can implement automatic and transparent rebuilds of failed drives using hot spare drives, providing a high degree of fault tolerance and zero downtime. NOTE: When running RAID 0 and RAID 5 virtual drives on the same set of drives (a sliced configuration), a rebuild to a hot spare will not occur after a drive failure until the RAID 0 virtual drive is deleted. LSI Corporation Confidential | August 2009 Page 21 Chapter 2: Introduction to RAID | Components and Features MegaRaid SAS Software User Guide The RAID management software allows you to specify drives as hot spares. When a hot spare is needed, the RAID controller assigns the hot spare that has a capacity closest to and at least as great as that of the failed drive to take the place of the failed drive. The failed drive is removed from the virtual drive and marked ready awaiting removal once the rebuild to a hot spare begins. You can make hot spares of the drives that are not in a RAID virtual drive. You can use the RAID management software to designate the hot spare to have enclosure affinity, meaning that if there are drive failures present on a split backplane configuration, the hot spare will be used first on the backplane side that it resides in. If the hot spare is designated as having enclosure affinity, it will attempt to rebuild any failed drives on the backplane that it resides in before rebuilding any other drives on other backplanes. NOTE: If a rebuild to a hot spare fails for any reason, the hot spare drive will be marked as "failed". If the source drive fails, both the source drive and the hot spare drive will be marked as "failed". There are two types of hot spares: Global hot spare Dedicated hot spare 2.4.13.1 Global Hot Spare A global hot spare drive can be used to replace any failed drive in a redundant drive group as long as its capacity is equal to or larger than the coerced capacity of the failed drive. A global hot spare defined on any channel should be available to replace a failed drive on both channels. 2.4.13.2 Dedicated Hot Spare A dedicated hot spare can be used to replace a failed drive only in a selected drive group. One or more drives can be designated as a member of a spare drive pool. The most suitable drive from the pool is selected for fail over. A dedicated hot spare is used before one from the global hot spare pool. Hot spare drives can be located on any RAID channel. Standby hot spares (not being used in RAID drive group) are polled every 60 seconds at a minimum, and their status made available in the drive group management software. RAID controllers offer the ability to rebuild with a disk that is in a system, but not initially set to be a hot spare. Observe the following parameters when using hot spares: Hot spares are used only in drive groups with redundancy: RAID levels 1, 5, 6, 10, 50, and 60. A hot spare connected to a specific RAID controller can be used to rebuild a drive that is connected to the same controller only. You must assign the hot spare to one or more drives through the controller BIOS or use drive group management software to place it in the hot spare pool. A hot spare must have free space equal to or greater than the drive it replaces. For example, to replace an 18 GB drive, the hot spare must be 18 GB or larger. Page 22 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 2: Introduction to RAID | Components and Features 2.4.14 Disk Rebuilds When a drive in a RAID drive group fails, you can rebuild the drive by recreating the data that was stored on the drive before it failed. The RAID controller recreates the data using the data stored on the other drives in the drive group. Rebuilding can be done only in drive groups with data redundancy, which includes RAID 1, 5, 6, 10, 50, and 60 drive groups. The RAID controller uses hot spares to rebuild failed drives automatically and transparently, at user-defined rebuild rates. If a hot spare is available, the rebuild can start automatically when a drive fails. If a hot spare is not available, the failed drive must be replaced with a new drive so that the data on the failed drive can be rebuilt. The failed drive is removed from the virtual drive and marked ready awaiting removal when the rebuild to a hot spare begins. If the system goes down during a rebuild, the RAID controller automatically restarts the rebuild after the system reboots. NOTE: When the rebuild to a hot spare begins, the failed drive is often removed from the virtual drive before management applications detect the failed drive. When this occurs, the events logs show the drive rebuilding to the hot spare without showing the failed drive. The formerly failed drive will be marked as "ready" after a rebuild begins to a hot spare. NOTE: If a source drive fails during a rebuild to a hot spare, the rebuild fails, and the failed source drive is marked as offline. In addition, the rebuilding hot spare drive is changed back to a hot spare. After a rebuild fails because of a source drive failure, the dedicated hot spare is still dedicated and assigned to the correct drive group, and the global hot spare is still global. An automatic drive rebuild will not start if you replace a drive during a RAID-level migration. The rebuild must be started manually after the expansion or migration procedure is complete. 2.4.15 Rebuild Rate The rebuild rate is the percentage of the compute cycles dedicated to rebuilding failed drives. A rebuild rate of 100 percent means that the system gives priority to rebuilding the failed drives. The rebuild rate can be configured between 0 percent and 100 percent. At 0 percent, the rebuild is done only if the system is not doing anything else. At 100 percent, the rebuild has a higher priority than any other system activity. Using 0 or 100 percent is not recommended. The default rebuild rate is 30 percent. 2.4.16 Hot Swap A hot swap is the manual replacement of a defective drive unit while the computer is still running. When a new drive has been installed, a rebuild will occur automatically if: The newly inserted drive is the same capacity as or larger than the failed drive It is placed in the same drive bay as the failed drive it is replacing The RAID controller can be configured to detect the new drives and rebuild the contents of the drive automatically. 2.4.17 Drive States A drive state is a property indicating the status of the drive. The drive states are described in Table 4. LSI Corporation Confidential | August 2009 Page 23 Chapter 2: Introduction to RAID | Components and Features MegaRaid SAS Software User Guide Table 4: Drive States State Description Online A drive that can be accessed by the RAID controller and is part of the virtual drive. Unconfigured A drive that is functioning normally but is not configured as a part of a Good virtual drive or as a hot spare. Hot Spare A drive that is powered up and ready for use as a spare in case an online drive fails. Failed A drive that was originally configured as Online or Hot Spare, but on which the firmware detects an unrecoverable error. Rebuild A drive to which data is being written to restore full redundancy for a virtual drive. Unconfigured Bad A drive on which the firmware detects an unrecoverable error; the drive was Unconfigured Good or the drive could not be initialized. Missing A drive that was Online but which has been removed from its location. Offline A drive that is part of a virtual drive but which has invalid data as far as the RAID configuration is concerned. When a virtual drive with cached data goes offline, the cache for the virtual drive is discarded. Because the virtual drive is offline, the cache cannot be saved. 2.4.18 Virtual Drive States The virtual drive states are described in Table 5. Table 5: Virtual Drive States State Description Optimal The virtual drive operating condition is good. All configured drives are online. Degraded The virtual drive operating condition is not optimal. One of the configured drives has failed or is offline. Partial Degraded The operating condition in a RAID 6 virtual drive is not optimal. One of the configured drives has failed or is offline. RAID 6 can tolerate up to two drive failures. Failed The virtual drive has failed. Offline The virtual drive is not available to the RAID controller. 2.4.19 Enclosure Management Enclosure management is the intelligent monitoring of the disk subsystem by software and/or hardware. The disk subsystem can be part of the host computer or can reside in an external disk enclosure. Enclosure management helps you stay informed of events in the disk subsystem, such as a drive or power supply failure. Enclosure management increases the fault tolerance of the disk subsystem. Page 24 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 2: Introduction to RAID | RAID Levels 2.5 RAID Levels The RAID controller supports RAID levels 0, 00, 1, 5, 6, 10, 50, and 60. The supported RAID levels are summarized in the following section. In addition, it supports independent drives (configured as RAID 0 and RAID 00.) The following sections describe the RAID levels in detail. 2.5.1 Summary of RAID Levels RAID 0 uses striping to provide high data throughput, especially for large files in an environment that does not require fault tolerance. RAID 1 uses mirroring so that data written to one drive is simultaneously written to another drive. This is good for small databases or other applications that require small capacity but complete data redundancy. RAID 5 uses disk striping and parity data across all drives (distributed parity) to provide high data throughput, especially for small random access. RAID 6 uses distributed parity, with two independent parity blocks per stripe, and disk striping. A RAID 6 virtual drive can survive the loss of two drives without losing data. A RAID 6 drive group, which requires a minimum of three drives, is similar to a RAID 5 drive group. Blocks of data and parity information are written across all drives. The parity information is used to recover the data if one or two drives fail in the drive group. A RAID 00 drive group is a spanned drive group that creates a striped set from a series of RAID 0 drive groups. RAID 10, a combination of RAID 0 and RAID 1, consists of striped data across mirrored spans. A RAID 10 drive group is a spanned drive group that creates a striped set from a series of mirrored drives. RAID 10 allows a maximum of eight spans. You must use an even number of drives in each RAID virtual drive in the span. The RAID 1 virtual drives must have the same stripe size. RAID 10 provides high data throughput and complete data redundancy but uses a larger number of spans. RAID 50, a combination of RAID 0 and RAID 5, uses distributed parity and disk striping. A RAID 50 drive group is a spanned drive group in which data is striped across multiple RAID 5 drive groups. RAID 50 works best with data that requires high reliability, high request rates, high data transfers, and medium-to-large capacity. NOTE: Having virtual drives of different RAID levels, such as RAID 0 and RAID 5, in the same drive group is not allowed. For example, if an existing RAID 5 virtual drive is created out of partial space in an array, the next virtual drive in the array has to be R5 only. RAID 60, a combination of RAID 0 and RAID 6, uses distributed parity, with two independent parity blocks per stripe in each RAID set, and disk striping. A RAID 60 virtual drive can survive the loss of two drives in each of the RAID 6 sets without losing data. It works best with data that requires high reliability, high request rates, high data transfers, and medium-to-large capacity. 2.5.2 Selecting a RAID Level To ensure the best performance, you should select the optimal RAID level when you create a system drive. The optimal RAID level for your drive group depends on a number of factors: The number of drives in the drive group The capacity of the drives in the drive group LSI Corporation Confidential | August 2009 Page 25 Chapter 2: Introduction to RAID | RAID Levels MegaRaid SAS Software User Guide The need for data redundancy The disk performance requirements 2.5.3 RAID 0 RAID 0 provides disk striping across all drives in the RAID drive group. RAID 0 does not provide any data redundancy, but, along with RAID 0, does offer the best performance of any RAID level. RAID 0 breaks up data into smaller segments, and then stripes the data segments across each drive in the drive group. The size of each data segment is determined by the stripe size. RAID 0 offers high bandwidth. NOTE: RAID level 0 is not fault tolerant. If a drive in a RAID 0 drive group fails, the whole virtual drive (all drives associated with the virtual drive) will fail. By breaking up a large file into smaller segments, the RAID controller can use both SAS drives and SATA drives to read or write the file faster. RAID 0 involves no parity calculations to complicate the write operation. This makes RAID 0 ideal for applications that require high bandwidth but do not require fault tolerance. Table 6 provides an overview of RAID 0. Figure 7 provides a graphic example of a RAID 0 drive group. Table 6: RAID 0 Overview Uses Provides high data throughput, especially for large files. Any environment that does not require fault tolerance. Strong Points Provides increased data throughput for large files. No capacity loss penalty for parity. Weak Points Does not provide fault tolerance or high bandwidth. All data lost if any drive fails. Drives 1 to 32 Segment 1 Segment 2 Segment 3 Segment 4 Segment 5 Segment 6 Segment 7 Segment 8 Figure 7: RAID 0 Drive Group Example with Two Drives 2.5.4 RAID 1 In RAID 1, the RAID controller duplicates all data from one drive to a second drive in the drive group. RAID 1 supports an even number of drives from 2 to 32 in a single span. RAID 1 provides complete data redundancy, but at the cost of doubling the required data storage capacity. Table 7 provides an overview of RAID 1. Figure 8 provides a graphic example of a RAID 1 drive group. Page 26 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 2: Introduction to RAID | RAID Levels Table 7: RAID 1 Overview Uses Use RAID 1 for small databases or any other environment that requires fault tolerance but small capacity. Strong Points Provides complete data redundancy. RAID 1 is ideal for any application that requires fault tolerance and minimal capacity. Weak Points Requires twice as many drives. Performance is impaired during drive rebuilds. Drives 2 - 32 (must be an even number of drives) Segment 1 Segment 1 Segment 2 Segment 2 Segment 3 Segment 3 Segment 4 Segment 4 Duplicate Duplicate Duplicate Duplicate Segment 5 Segment 6 Segment 8 Segment 5 Duplicate Segment 6 Duplicate Segment 7 Segment 7 Duplicate Segment 8 Duplicate ... ... ... ... RAID1 RAID1 RAID1 RAID1 Figure 8: RAID 1 Drive Group 2.5.5 RAID 5 RAID 5 includes disk striping at the block level and parity. Parity is the data’s property of being odd or even, and parity checking is used to detect errors in the data. In RAID 5, the parity information is written to all drives. RAID 5 is best suited for networks that perform a lot of small input/output (I/O) transactions simultaneously. RAID 5 addresses the bottleneck issue for random I/O operations. Because each drive contains both data and parity, numerous writes can take place concurrently. Table 8 provides an overview of RAID 5. Figure 9 provides a graphic example of a RAID 5 drive group. Table 8: RAID 5 Overview Uses Provides high data throughput, especially for large files. Use RAID 5 for transaction processing applications because each drive can read and write independently. If a drive fails, the RAID controller uses the parity drive to recreate all missing information. Use also for office automation and online customer service that requires fault tolerance. Use for any application that has high read request rates but low write request rates. Strong Points Provides data redundancy, high read rates, and good performance in most environments. Provides redundancy with lowest loss of capacity. Weak Points Not well-suited to tasks requiring lot of writes. Suffers more impact if no cache is used (clustering). Drive performance will be reduced if a drive is being rebuilt. Environments with few processes do not perform as well because the RAID overhead is not offset by the performance gains in handling simultaneous processes. Drives 3 to 32 LSI Corporation Confidential | August 2009 Page 27 Chapter 2: Introduction to RAID | RAID Levels MegaRaid SAS Software User Guide Segment 1 Segment 2 Segment 3 Segment 4 Segment 5 Parity (1-5) Segment 7 Segment 8 Segment 9 Segment 10 Parity (6-10) Segment 6 Segment 13 Segment 14 Segment 15 Parity (11 15) Segment 11 Segment 12 Segment 19 Segment 20 Parity (16-20) Segment 16 Segment 17 Segment 18 Segment 25 Parity (21-25) Segment 21 Segment 22 Segment 23 Segment 24 Parity (26 30) Segment 26 Segment 27 Segment 28 Segment 29 Segment 30 Note: Parity is distributed across all drives in the drive group. Figure 9: RAID 5 Drive Group with Six Drives 2.5.6 RAID 6 RAID 6 is similar to RAID 5 (disk striping and parity), except that instead of one parity block per stripe, there are two. With two independent parity blocks, RAID 6 can survive the loss of two drives in a virtual drive without losing data. Provides a high level of data protection through the use of a second parity block in each stripe. Use RAID 6 for data that requires a very high level of protection from loss. In the case of a failure of one drive or two drives in a virtual drive, the RAID controller uses the parity blocks to recreate all of the missing information. If two drives in a RAID 6 virtual drive fail, two drive rebuilds are required, one for each drive. These rebuilds do not occur at the same time. The controller rebuilds one failed drive, and then the other failed drive. Table 9 provides anoverview of a RAID 6 drive group. Table 9: RAID 6 Overview Uses Use for office automation and online customer service that requires fault tolerance. Use for any application that has high read request rates but low write request rates. Strong Points Provides data redundancy, high read rates, and good performance in most environments. Can survive the loss of two drives or the loss of a drive while another drive is being rebuilt. Provides the highest level of protection against drive failures of all of the RAID levels. Read performance is similar to that of RAID 5. Weak Points Not well-suited to tasks requiring a lot of writes. A RAID 6 virtual drive has to generate two sets of parity data for each write operation, which results in a significant decrease in performance during writes. Drive performance is reduced during a drive rebuild. Environments with few processes do not perform as well because the RAID overhead is not offset by the performance gains in handling simultaneous processes. RAID 6 costs more because of the extra capacity required by using two parity blocks per stripe. Drives 3 to 32 Figure 10 shows a RAID 6 data layout. The second set of parity drives are denoted by Q. The P drives follow the RAID 5 parity scheme. Figure 10: Example of Distributed Parity across Two Blocks in a Stripe (RAID 6) Page 28 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 2: Introduction to RAID | RAID Levels Segment 1 Segment 2 Segment 3 Segment 4 Parity (P1-P4) Parity (Q1-Q4) Segment 6 Segment 7 Segment 8 Parity (P5-P8) Parity (Q5-Q8) Segment 5 Segment 11 Segment 12 Parity (P9-P12) Parity (Q9 Q12) Segment 9 Segment 10 Segment 16 Parity (P13-P16) Parity (Q13-Q16) Segment 13 Segment 14 Segment 15 Parity (P17-P20) Parity (Q17-Q20) Segment 17 Segment 18 Segment 19 Segment 20 Note: Parity is distributed across all drives in the drive group. 2.5.7 RAID 00 A RAID 00 drive group is a spanned drive group that creates a striped set from a series of RAID 0 drive groups. RAID 00 does not provide any data redundancy, but, along with RAID 0, does offer the best performance of any RAID level. RAID 00 breaks up data into smaller segments and then stripes the data segments across each drive in the drive groups. The size of each data segment is determined by the stripe size. RAID 00 offers high bandwidth. NOTE: RAID level 00 is not fault tolerant. If a drive in a RAID 0 drive group fails, the whole virtual drive (all drives associated with the virtual drive) will fail. By breaking up a large file into smaller segments, the RAID controller can use both SAS drives and SATA drives to read or write the file faster. RAID 00 involves no parity calculations to complicate the write operation. This makes RAID 00 ideal for applications that require high bandwidth but do not require fault tolerance. Table 10 provides an overview of RAID 00. Figure 11 provides a graphic example of a RAID 00 drive group. Table 10: RAID 00 Overview Uses Provides high data throughput, especially for large files. Any environment that does not require fault tolerance. Strong Points Provides increased data throughput for large files. No capacity loss penalty for parity. Weak Points Does not provide fault tolerance or high bandwidth. All data lost if any drive fails. Drives 2 to 256 LSI Corporation Confidential | August 2009 Page 29 Chapter 2: Introduction to RAID | RAID Levels MegaRaid SAS Software User Guide RAID 00 Segment 1 Segment 2 Segment 3 Segment 4 Segment 5 Segment 6 Segment 7 Segment 8 Segment 9 Segment 10 Segment 11 Segment 12 Segment 13 Segment 14 Segment 15 Segment 16 Segment 17 Segment 18 Segment 19 Segment 20 Segment 21 Segment 22 Segment 23 Segment 24 ... ... ... ... RAID 0 RAID 0 RAID 0 RAID 0 RAID 0 Figure 11: RAID 00 Drive Group Example with Two Drives 2.5.8 RAID 10 RAID 10 is a combination of RAID 0 and RAID 1, and consists of stripes across mirrored drives. RAID 10 breaks up data into smaller blocks and then mirrors the blocks of data to each RAID 1 drive group. The first RAID 1 drive in each drive group then duplicates its data to the second drive. The size of each block is determined by the stripe size parameter, which is set during the creation of the RAID set. The RAID 1 virtual drives must have the same stripe size. Spanning is used because one virtual drive is defined across more than one drive group. Virtual drives defined across multiple RAID 1 level drive groups are referred to as RAID level 10, (1+0). Data is striped across drive groups to increase performance by enabling access to multiple drive groups simultaneously. Each spanned RAID 10 virtual drive can tolerate multiple drive failures, as long as each failure is in a separate drive group. If there are drive failures, less than total drive capacity is available. Configure RAID 10 by spanning two contiguous RAID 1 virtual drives, up to the maximum number of supported devices for the controller. RAID 10 supports a maximum of eight spans, with a maximum of 32 drives per span. You must use an even number of drives in each RAID 10 virtual drive in the span. NOTE: Other factors, such as the type of controller, can restrict the number of drives supported by RAID 10 virtual drives. Table 11 provides an overview of RAID 10. Table 11: RAID 10 Overview Uses Appropriate when used with data storage that needs 100 percent redundancy of mirrored drive groups and that also needs the enhanced I/O performance of RAID 0 (striped drive groups.) RAID 10 works well for medium-sized databases or any environment that requires a higher degree of fault tolerance and moderate to medium capacity. Strong Points Provides both high data transfer rates and complete data redundancy. Weak Points Requires twice as many drives as all other RAID levels except RAID 1. Drives 4 - the maximum number of drives supported by the controller (with a maximum of eight spans) Page 30 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 2: Introduction to RAID | RAID Levels In Figure 12, virtual drive 0 is created by distributing data across four drive groups (drive groups 0 through 3). RAID 10 Segment 1 Segment 1 Segment 2 Segment 2 Segment 3 Segment 3 Segment 4 Segment 4 Duplicate Duplicate Duplicate Duplicate Segment 5 Segment 6 Segment 8 Segment 5 Duplicate Segment 6 Duplicate Segment 7 Segment 7 Duplicate Segment 8 Duplicate ... ... ... ... RAID1 RAID1 RAID1 RAID1 RAID 0 Figure 12: RAID 10 Level Virtual Drive 2.5.9 RAID 50 RAID 50 provides the features of both RAID 0 and RAID 5. RAID 50 includes both parity and disk striping across multiple drive groups. RAID 50 is best implemented on two RAID 5 drive groups with data striped across both drive groups. RAID 50 breaks up data into smaller blocks and then stripes the blocks of data to each RAID 5 disk set. RAID 5 breaks up data into smaller blocks, calculates parity by performing an exclusive-or on the blocks and then writes the blocks of data and parity to each drive in the drive group. The size of each block is determined by the stripe size parameter, which is set during the creation of the RAID set. RAID level 50 can support up to eight spans and tolerate up to eight drive failures, though less than total drive capacity is available. Though multiple drive failures can be tolerated, only one drive failure can be tolerated in each RAID 5 level drive group. Table 12 provides an overview of RAID 50. Table 12: RAID 50 Overview Uses Appropriate when used with data that requires high reliability, high request rates, high data transfer, and medium to large capacity. Strong Points Provides high data throughput, data redundancy, and very good performance. Weak Points Requires 2 to 8 times as many parity drives as RAID 5. Drives Eight spans of RAID 5 drive groups containing 3-32 drives each (limited by the maximum number of devices supported by the controller) LSI Corporation Confidential | August 2009 Page 31 Chapter 2: Introduction to RAID | RAID Levels MegaRaid SAS Software User Guide Segment 1 Segment 2 (Segment 1,2) Segment 3 Segment 4 (Segment 3,4) RAID 50 Segment 6 (Segment 5,6) Segment 5 Segment 8 (Segment 7,8) Segment 7 (Segment 9,10) Segment 9 Segment 10 (Segment 11,12) Segment 11 Segment 12 RAID 5 RAID 5 RAID 0 Figure 13: RAID 50 Level Virtual Drive 2.5.10 RAID 60 RAID 60 provides the features of both RAID 0 and RAID 6, and includes both parity and disk striping across multiple drive groups. RAID 6 supports two independent parity blocks per stripe. A RAID 60 virtual drive can survive the loss of two drives in each of the RAID 6 sets without losing data. RAID 60 is best implemented on two RAID 6 drive groups with data striped across both drive groups. RAID 60 breaks up data into smaller blocks, and then stripes the blocks of data to each RAID 6 disk set. RAID 6 breaks up data into smaller blocks, calculates parity by performing an exclusive-or on the blocks and then writes the blocks of data and parity to each drive in the drive group. The size of each block is determined by the stripe size parameter, which is set during the creation of the RAID set. RAID 60 can support up to 8 spans and tolerate up to 16 drive failures, though less than total drive capacity is available. Two drive failures can be tolerated in each RAID 6 level drive group. Page 32 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 2: Introduction to RAID | RAID Configuration Strategies Table 13: RAID 60 Overview Uses Provides a high level of data protection through the use of a second parity block in each stripe. Use RAID 60 for data that requires a very high level of protection from loss. In the case of a failure of one drive or two drives in a RAID set in a virtual drive, the RAID controller uses the parity blocks to recreate all of the missing information. If two drives in a RAID 6 set in a RAID 60 virtual drive fail, two drive rebuilds are required, one for each drive. These rebuilds can occur at the same time. Use for office automation and online customer service that requires fault tolerance. Use for any application that has high read request rates but low write request rates. Strong Points Provides data redundancy, high read rates, and good performance in most environments. Each RAID 6 set can survive the loss of two drives or the loss of a drive while another drive is being rebuilt. Provides the highest level of protection against drive failures of all of the RAID levels. Read performance is similar to that of RAID 50, though random reads in RAID 60 might be slightly faster because data is spread across at least one more disk in each RAID 6 set. Weak Points Not well suited to tasks requiring lot of writes. A RAID 60 virtual drive has to generate two sets of parity data for each write operation, which results in a significant decrease in performance during writes. Drive performance is reduced during a drive rebuild. Environments with few processes do not perform as well because the RAID overhead is not offset by the performance gains in handling simultaneous processes. RAID 6 costs more because of the extra capacity required by using two parity blocks per stripe. Drives A minimum of 8 Figure 14 shows a RAID 6 data layout. The second set of parity drives are denoted by Q. The P drives follow the RAID 5 parity scheme. RAID Segment 1 Segment 2 Parity (Q1-Q2) Parity (P1-P2) Segment 3 Segment 4 Parity (Q3-Q4) Parity (P3-P4) 60 Segment 8 Parity (Q3-Q4) Parity (P3-P4) Segment 7 Segment 6 Parity (Q5-Q6) Parity (P5-P6) Segment 5 Parity (Q11 Q12) Parity (P11-P12) Segment 11 Segment 12 Parity (Q9 Q10) Parity (P9-P10) Segment 9 Segment 10 Parity (P15-P16) Segment 15 Segment 16 Parity (Q15-Q16) Parity (P13-P14) Segment 13 Segment 14 Parity (Q13-Q14) RAID 6 RAID 6 RAID 0 Note: Parity is distributed across all drives in the drive group. Figure 14: RAID 60 Level Virtual Drive 2.6 RAID Configuration The most important factors in RAID drive group configuration are: Strategies Virtual drive availability (fault tolerance) Virtual drive performance Virtual drive capacity LSI Corporation Confidential | August 2009 Page 33 Chapter 2: Introduction to RAID | RAID Configuration Strategies MegaRaid SAS Software User Guide You cannot configure a virtual drive that optimizes all three factors, but it is easy to choose a virtual drive configuration that maximizes one factor at the expense of another factor. For example, RAID 1 (mirroring) provides excellent fault tolerance, but requires a redundant drive. The following subsections describe how to use the RAID levels to maximize virtual drive availability (fault tolerance), virtual drive performance, and virtual drive capacity. 2.6.1 Maximizing Fault Tolerance Fault tolerance is achieved through the ability to perform automatic and transparent rebuilds using hot spare drives and hot swaps. A hot spare drive is an unused online available drive that the RAID controller instantly plugs into the system when an active drive fails. After the hot spare is automatically moved into the RAID drive group, the failed drive is automatically rebuilt on the spare drive. The RAID drive group continues to handle requests while the rebuild occurs. A hot swap is the manual substitution of a replacement unit in a disk subsystem for a defective one, where the substitution can be performed while the subsystem is runninghot swap drives. Auto-Rebuild in the WebBIOS Configuration Utility allows a failed drive to be replaced and automatically rebuilt by “hot-swapping” the drive in the same drive bay. The RAID drive group continues to handle requests while the rebuild occurs, providing a high degree of fault tolerance and zero downtime. Table 14: RAID Levels and Fault Tolerance RAID Fault Tolerance Level 0 Does not provide fault tolerance. All data is lost if any drive fails. Disk striping writes data across multiple drives instead of just one drive. It involves partitioning each drive storage space into stripes that can vary in size. RAID 0 is ideal for applications that require high bandwidth but do not require fault tolerance. 1 Provides complete data redundancy. If one drive fails, the contents of the other drive in the drive group can be used to run the system and reconstruct the failed drive. The primary advantage of disk mirroring is that it provides 100 percent data redundancy. Since the contents of the drive are completely written to a second drive, no data is lost if one of the drives fails. Both drives contain the same data at all times. RAID 1 is ideal for any application that requires fault tolerance and minimal capacity. 5 Combines distributed parity with disk striping. Parity provides redundancy for one drive failure without duplicating the contents of entire drives. If a drive fails, the RAID controller uses the parity data to reconstruct all missing information. In RAID 5, this method is applied to entire drives or stripes across all drives in a drive group. Using distributed partiy, RAID 5 offers fault tolerance with limited overhead. 6 Combines distributed parity with disk striping. RAID 6 can sustain two drive failures and still maintain data integrity. Parity provides redundancy for two drive failures without duplicating the contents of entire drives. If a drive fails, the RAID controller uses the parity data to reconstruct all missing information. In RAID 6, this method is applied to entire drives or stripes across all of the drives in a drive group. Using distributed partiy, RAID 6 offers fault tolerance with limited overhead. 00 Does not provide fault tolerance. All data in a virtual drive is lost if any drive in that virtual drive fails. Disk striping writes data across multiple drives instead of just one drive. It involves partitioning each drive storage space into stripes that can vary in size. RAID 00 is ideal for applications that require high bandwidth but do not require fault tolerance. Page 34 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 2: Introduction to RAID | RAID Configuration Strategies Table 14: RAID Levels and Fault Tolerance (Continued) RAID Fault Tolerance Level 10 Provides complete data redundancy using striping across spanned RAID 1 drive groups. RAID 10 works well for any environment that requires the 100 percent redundancy offered by mirrored drive groups. RAID 10 can sustain a drive failure in each mirrored drive group and maintain drive integrity. 50 Provides data redundancy using distributed parity across spanned RAID 5 drive groups. RAID 50 includes both parity and disk striping across multiple drives. If a drive fails, the RAID controller uses the parity data to recreate all missing information. RAID 50 can sustain one drive failure per RAID 5 drive group and still maintain data integrity. 60 Provides data redundancy using distributed parity across spanned RAID 6 drive groups. RAID 60 can sustain two drive failures per RAID 6 drive group and still maintain data integrity. It provides the highest level of protection against drive failures of all of the RAID levels. RAID 60 includes both parity and disk striping across multiple drives. If a drive fails, the RAID controller uses the parity data to recreate all missing information. 2.6.2 Maximizing Performance A RAID disk subsystem improves I/O performance. The RAID drive group appears to the host computer as a single storage unit or as multiple virtual units. I/O is faster because drives can be accessed simultaneously. Table 15 describes the performance for each RAID level. Table 15: RAID Levels and Performance RAID Performance Level 0 RAID 0 (striping) offers excellent performance. RAID 0 breaks up data into smaller blocks and then writes a block to each drive in the drive group. Disk striping writes data across multiple drives instead of just one drive. It involves partitioning each drive storage space into stripes that can vary in size from 8 KB to 1024 KB. These stripes are interleaved in a repeated sequential manner. Disk striping enhances performance because multiple drives are accessed simultaneously. 1 With RAID 1 (mirroring), each drive in the system must be duplicated, which requires more time and resources than striping. Performance is impaired during drive rebuilds. 5 RAID 5 provides high data throughput, especially for large files. Use this RAID level for any application that requires high read request rates, but low write request rates, such as transaction processing applications, because each drive can read and write independently. Since each drive contains both data and parity, numerous writes can take place concurrently. In addition, robust caching algorithms and hardware based exclusive-or assist make RAID 5 performance exceptional in many different environments. Parity generation can slow the write process, making write performance significantly lower for RAID 5 than for RAID 0 or RAID 1. Drive performance is reduced when a drive is being rebuilt. Clustering can also reduce drive performance. Environments with few processes do not perform as well because the RAID overhead is not offset by the performance gains in handling simultaneous processes. 6 RAID 6 works best when used with data that requires high reliability, high request rates, and high data transfer. It provides high data throughput, data redundancy, and very good performance. However, RAID 6 is not well suited to tasks requiring a lot of writes. A RAID 6 virtual drive has to generate two sets of parity data for each write operation, which results in a significant decrease in performance during writes. Drive performance is reduced during a drive rebuild. Environments with few processes do not perform as well because the RAID overhead is not offset by the performance gains in handling simultaneous processes. 00 RAID 00 (striping in a spanned drive group) offers excellent performance. RAID 00 breaks up data into smaller blocks and then writes a block to each drive in the drive groups. Disk striping writes data across multiple drives instead of just one drive. Striping involves partitioning each drive storage space into stripes that can vary in size from 8 KB to 1024 KB. These stripes are interleaved in a repeated sequential manner. Disk striping enhances performance because multiple drives are accessed simultaneously. LSI Corporation Confidential | August 2009 Page 35 Chapter 2: Introduction to RAID | RAID Configuration Strategies MegaRaid SAS Software User Guide Table 15: RAID Levels and Performance (Continued) RAID Performance Level 10 RAID 10 works best for data storage that need the enhanced I/O performance of RAID 0 (striped drive groups), which provides high data transfer rates. Spanning increases the capacity of the virtual drive and improves performance by doubling the number of spindles. The system performance improves as the number of spans increases. (The maximum number of spans is eight.) As the storage space in the spans is filled, the system stripes data over fewer and fewer spans and RAID performance degrades to that of a RAID 1 or RAID 5 drive group. 50 RAID 50 works best when used with data that requires high reliability, high request rates, and high data transfer. It provides high data throughput, data redundancy, and very good performance. Spanning increases the capacity of the virtual drive and improves performance by doubling the number of spindles. The system performance improves as the number of spans increases. (The maximum number of spans is eight.) As the storage space in the spans is filled, the system stripes data over fewer and fewer spans and RAID performance degrades to that of a RAID 1 or RAID 5 drive group. 60 RAID 60 works best when used with data that requires high reliability, high request rates, and high data transfer. It provides high data throughput, data redundancy, and very good performance. Spanning increases the capacity of the virtual drive and improves performance by doubling the number of spindles. The system performance improves as the number of spans increases. (The maximum number of spans is eight.) As the storage space in the spans is filled, the system stripes data over fewer and fewer spans and RAID performance degrades to that of a RAID 1 or RAID 6 drive group. RAID 60 is not well suited to tasks requiring a lot of writes. A RAID 60 virtual drive has to generate two sets of parity data for each write operation, which results in a significant decrease in performance during writes. Drive performance is reduced during a drive rebuild. Environments with few processes do not perform as well because the RAID overhead is not offset by the performance gains in handling simultaneous processes. 2.6.3 Maximizing Storage Capacity Storage capacity is an important factor when selecting a RAID level. There are several variables to consider. Striping alone (RAID 0) requires less storage space than mirrored data (RAID 1) or distributed parity (RAID 5 or RAID 6). RAID 5, which provides redundancy for one drive failure without duplicating the contents of entire drives, requires less space then RAID 1. Table 16 explains the effects of the RAID levels on storage capacity. Table 16: RAID Levels and Capacity RAID Capacity Level 0 RAID 0 (striping) involves partitioning each drive storage space into stripes that can vary in size. The combined storage space is composed of stripes from each drive. RAID 0 provides maximum storage capacity for a given set of drives. 1 With RAID 1 (mirroring), data written to one drive is simultaneously written to another drive, which doubles the required data storage capacity. This is expensive because each drive in the system must be duplicated. 5 RAID 5 provides redundancy for one drive failure without duplicating the contents of entire drives. RAID 5 breaks up data into smaller blocks, calculates parity by performing an exclusive-or on the blocks, then writes the blocks of data and parity to each drive in the drive group. The size of each block is determined by the stripe size parameter, which is set during the creation of the RAID set. 6 RAID 6 provides redundancy for two drive failures without duplicating the contents of entire drives. However, it requires extra capacity because it uses two parity blocks per stripe. This makes RAID 60 more expensive to implement. 00 RAID 00 (striping in a spanned drive group) involves partitioning each drive storage space into stripes that can vary in size. The combined storage space is composed of stripes from each drive. RAID 00 provides maximum storage capacity for a given set of drives. Page 36 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 2: Introduction to RAID | RAID Availability Table 16: RAID Levels and Capacity (Continued) RAID Capacity Level 10 RAID 10 requires twice as many drives as all other RAID levels except RAID 1. RAID 10 works well for medium-sized databases or any environment that requires a higher degree of fault tolerance and moderate to medium capacity. Disk spanning allows multiple drives to function like one big drive. Spanning overcomes lack of disk space and simplifies storage management by combining existing resources or adding relatively inexpensive resources. 50 RAID 50 requires two to four times as many parity drives as RAID 5. This RAID level works best when used with data that requires medium to large capacity. 60 RAID 60 provides redundancy for two drive failures in each RAID set without duplicating the contents of entire drives. However, it requires extra capacity because a RAID 60 virtual drive has to generate two sets of parity data for each write operation. This makes RAID 60 more expensive to implement. 2.7 RAID Availability 2.7.1 RAID Availability Concept Data availability without downtime is essential for many types of data processing and storage systems. Businesses want to avoid the financial costs and customer frustration associated with failed servers. RAID helps you maintain data availability and avoid downtime for the servers that provide that data. RAID offers several features, such as spare drives and rebuilds, that you can use to fix any drive problems, while keeping the servers running and data available. The following subsections describe these features. 2.7.1.1 Spare Drives You can use spare drives to replace failed or defective drives in a drive group. A replacement drive must be at least as large as the drive it replaces. Spare drives include hot swaps, hot spares, and cold swaps. A hot swap is the manual substitution of a replacement unit in a disk subsystem for a defective one, where the substitution can be performed while the subsystem is running (performing its normal functions). The backplane and enclosure must support hot swap in order for the functionality to work. Hot spare drives are drives that power up along with the RAID drives and operate in a standby state. If a drive used in a RAID virtual drive fails, a hot spare automatically takes its place and the data on the failed drive is rebuilt on the hot spare. Hot spares can be used for RAID levels 1, 5, 6, 10, 50, and 60. NOTE: If a rebuild to a hot spare fails for any reason, the hot spare drive will be marked as "failed." If the source drive fails, both the source drive and the hot spare drive will be marked as "failed." A cold swap requires that you power down the system before replacing a defective drive in a disk subsystem. LSI Corporation Confidential | August 2009 Page 37 Chapter 2: Introduction to RAID | Configuration Planning MegaRaid SAS Software User Guide 2.7.1.2 Rebuilding If a drive fails in a drive group that is configured as a RAID 1, 5, 6, 10, 50, or 60 virtual drive, you can recover the lost data by rebuilding the drive. If you have configured hot spares, the RAID controller automatically tries to use them to rebuild failed drives. Manual rebuild is necessary if no hot spares with enough capacity to rebuild the failed drives are available.You must insert a drive with enough storage into the subsystem before rebuilding the failed drive. 2.8 Configuration Planning Factors to consider when planning a configuration are the number of drives the RAID controller can support, the purpose of the drive group, and the availability of spare drives. Each type of data stored in the disk subsystem has a different frequency of read and write activity. If you know the data access requirements, you can more successfully determine a strategy for optimizing the disk subsystem capacity, availability, and performance. Servers that support video on demand typically read the data often, but write data infrequently. Both the read and write operations tend to be long. Data stored on a general-purpose file server involves relatively short read and write operations with relatively small files. 2.9 Number of Drives Your configuration planning for the SAS RAID controller depends in part on the number of drives that you want to use in a RAID drive group. The number of drives in a drive group determines the RAID levels that can be supported. Only one RAID level can be assigned to each virtual drive. 2.9.1 Drive Group Purpose Important factors to consider when creating RAID drive groups include availability, performance, and capacity. Define the major purpose of the drive group by answering questions related to these factors, such as the following, which are followed by suggested RAID levels for each situation: Will this drive group increase the system storage capacity for general-purpose file and print servers? Use RAID 5, 6, 10, 50, or 60. Does this drive group support any software system that must be available 24 hours per day? Use RAID 1, 5, 6, 10, 50, or 60. Will the information stored in this drive group contain large audio or video files that must be available on demand? Use RAID 0 or 00. Will this drive group contain data from an imaging system? Use RAID 0, 00, or 10. Page 38 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 2: Introduction to RAID | Number of Drives Fill out Table 17 to help you plan the drive group configuration. Rank the requirements for your drive group, such as storage space and data redundancy, in order of importance, and then review the suggested RAID levels. Table 17: Factors to Consider for Drive Group Configuration Requirement Rank Suggested RAID Level(s) Storage space RAID 0, RAID 5, RAID 00 Data redundancy RAID 5, RAID 6, RAID 10, RAID 50, RAID 60 Drive performance and throughput RAID 0, RAID 00, RAID 10 Hot spares (extra drives required) RAID 1, RAID 5, RAID 6, RAID 10, RAID 50, RAID 60 LSI Corporation Confidential | August 2009 Page 39 Chapter 2: Introduction to RAID | Number of Drives MegaRaid SAS Software User Guide Page 40 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 3: Full Disk Encryption | Overview Chapter 3 Full Disk Encryption This chapter describes the Full Disk Encryption (FDE) feature 3.1 Overview The Full Disk Encryption feature offers the ability to encrypt data on drives and use disk-based key management to provide data security. This solution provides data protection in the event of theft or loss of physical drives. With self-encrypting drives, if you remove a drive from its storage system or the server it is housed in, the data on that drive is encrypted and useless to anyone who attempts to access without the the appropriate security authorization. With the FDE feature, data is encrypted by the drives. You can designate which data to encrypt at the individual virtual disk (VD) level. Any encryption solution requires management of the encryption keys. The security feature provides a way to manage these keys. Both the WebBIOS Configuration Utility (Section 4.2, Starting the WebBIOS CU) and MegaRAID Storage Manager (Section 8.2, Selecting Full Disk Encryption Security Options) offer procedures that you can use to manage the security settings for the drives. 3.2 Purpose Security is a growing market concern and requirement. MegaRAID customers are looking for a comprehensive storage encryption solution to protect data. You can use the FDE feature to help protect your data. 3.3 Terminology Table 18 describes the terminology related to the FDE feature. Table 18: Terminology used in FDE Option Description Authenticated Mode The RAID configuration is keyed to a user passphrase. The passphrase must be provided on system boot to authenticate the user and facilitate unlocking the configuration for user access to the encrypted data. Blob A blob is created by encrypting a key(s) using another key. There are two types of blob in the system – encryption key blob and security key blob. Key backup You need to provide the controller with a lock key if the controller is replaced or if you choose to migrate secure virtual disks. To do this, you must back up the security key. Passphrase An optional authenticated mode is supported in which you must provide a passphrase on each boot to make sure the system boots only if the user is authenticated. Firmware uses the user passphrase to encrypt the security key in the security key blob stored on the controller. Re-provisioning Re-provisioning disables the security system of a device. For a controller, it involves destroying the security key. For Full Disk (FDE) drives, when the drive lock key is deleted, the drive is unlocked and any user data on the drive is securely deleted. This does not apply to controller-encrypted drives, because deleting the virtual disk destroys the encryption keys and causes a secure erase. See Section 3.5, Instant Secure Erase for information about the instant secure erase feature. LSI Corporation Confidential | August 2009 Page 41 Chapter 3: Full Disk Encryption | Workflow MegaRaid SAS Software User Guide Table 18: Terminology used in FDE (Continued) Option Description Security Key A key based on a user-provided string. The controller uses the security key to lock and unlock access to the secure user data. This key is encrypted into the security key blob and stored on the controller. If the security key is unavailable, user data is irretrievably lost. You must take all precautions to never lose the security key. Un-Authenticated Mode This mode allows controller to boot and unlock access to user configuration without user intervention. In this mode, the security key is encrypted into a security key blob, stored on the controller, but instead of a user passphrase, an internal key specific to the controller is used to create the security key blob. Volume Encryption Keys (VEK) The controller uses the Volume Encryption Keys to encrypt data when a controller-encrypted virtual disk is created. These keys are not available to the user. The firmware (FW) uses a unique 512-bit key for each virtual disk. The VEK for the VDs are stored on the physical disks in a VEK blob. 3.4 Workflow 3.4.1 Enable Security You can enable security on the controller. After you enable security, you have the option to create secure virtual drives using a security key. There are three procedures you can perform to create secure virtual drives using a security key: Create the security key identifier Create the security key Create a pass phrase (optional) See Section 4.5, Selecting Full Disk Encryption Security Options for the procedures used to enable security in WebBIOS or Section 8.2, Selecting Full Disk Encryption Security Options fo r the procedures used to enable security in MegaRAID Storage Manage r. 3.4.1.1 Create the Security Key The security key identifier appears whenever you enter the security key. If you have Identifier multiple security keys, the identifier helps you determine which security key to enter. The controller provides a default identifier for you. You can use the default or enter your own identifier. 3.4.1.2 Create the Security Key You need to enter the security key to perform certain operations. You can choose a strong security key that the controller suggests. CAUTION: If you forget the security key, you will lose access to your data. 3.4.1.3 Create a Passphrase The pass phrase provides additional security. The pass phrase should be different from (Optional) the security key. If you choose this option, you must enter it whenever you boot your server. CAUTION: If you forget the pass phrase, you will lose access to your data. Page 42 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 3: Full Disk Encryption | Workflow When you use the specified security key identifier, security key, and pass phrase, security will be enabled on the controller. 3.4.2 Change Security You can change the security settings on the controller, and you have the option to change the security key identifier, security key, and pass phrase. If you have previously removed any secured drives, you still need to supply the old security key to import them. There are three procedures you can perform to change the security settings on the controller: Change the security key identifier Change the security key Change a pass phrase See Section 4.5, Selecting Full Disk Encryption Security Options for the procedures used to change security options in WebBIOS or Section 8.2, Selecting Full Disk Encryption Security Options for the procedures used to change security options in MegaRAID Storage Manager. 3.4.2.1 Change the Security Key You have the option to edit the security key identifier. If you plan to change the security Identifier key, it is highly recommended that you change the security key identifier. Otherwise, you will not be able to differentiate between the security keys. You can select whether you want to keep the current security key identifier or enter a new one. To change the security key identifier, enter a new security key identifier. 3.4.2.2 Change the Security Key You can choose to keep the current security key or enter a new one. To change the security key, you can either enter the new security key or accept the security key that the controller suggests. 3.4.2.3 Add or Change the Pass You have the option to add a pass phrase or change the existing one. To change the Phrase pass phrase, enter the new pass phrase. To keep the existing pass phrase, enter the current pass phrase. If you choose this option, you must enter the pass phrase whenever you boot your server. This procedure updates the existing configuration on the controller to use the new security settings. 3.4.3 Create Secure Virtual Drives You can create a secure virtual drive and set their parameters as desired. To create a secure virtual drive, select a configuration method. You can select either simple configuration or advanced configuration. 3.4.3.1 Simple Configuration If you select simple configuration, select the redundancy type and drive security method to use for the drive group. See Section 8.1.2, Creating a Virtual Drive Using Simple Configuration for the procedures used to select the redundancy type and drive security method for a configuration. 3.4.3.2 Advanced Configuration If you select advanced configuration, select the drive security method, and add the drives to the drive group. See Section 8.1.3, Creating a Virtual Drive Using Advanced Configuration for the procedures used to import a foreign configuration. LSI Corporation Confidential | August 2009 Page 43 Chapter 3: Full Disk Encryption | Instant Secure Erase MegaRaid SAS Software User Guide After the drive group is secured, you cannot remove the security without deleting the virtual drives. 3.4.4 Import a Foreign Configuration After you create a security key, you can run a scan for a foreign configuration and import a locked configuration. (You can import unsecured or unlocked configurations when security is disabled.) A foreign configuration is a RAID configuration that already exists on a replacement set of drives that you install in a computer system. WebBIOS Configuration Utility and MSM allows you to import the existing configuration to the RAID controller or clear the configuration so you can create a new one. See Section 4.5.4, Importing Foreign Configurations for the procedure used to import a foreign configuration in WebBIOS or Section 8.2.4, Importing or Clearing a Foreign Configuration for the procedure in MegaRAID Storage Manager. To import a foreign configuration, you must first enable security to allow importation of locked foreign drives. If the drives are locked and the controller security is disabled, you cannot import the foreign drives. Only unlocked drives can be imported when security is disabled. After you enable the security, you can import the locked drives. To import the locked drives, you must provide the security key used to secure them. Verify whether any drives are left to import as the locked drives can use different security keys. If there are any drives left, repeat the import process for the remaining drives. After all of the drives are imported, there is no configuration to import. 3.5 Instant Secure Erase Instant Secure Erase is a method of data erasure that you can use with FDE drives. After the initial investment into a FDE disk, there is no additional cost in dollars or time to erase data using the Instant Secure Erase feature. You can change the encryption key for all MegaRAID RAID controllers that are connected to FDE disks. All FDE drives, whether locked or unlocked, always have an encryption key. This key is set by the drive and is always active. When the drive is unlocked, the data to host from the drive (on reads) and from the host to the drive cache (on writes) is always provided. However, when resting on the drive platters, the data is always encrypted by the drive. You might not want to lock your drives because you have to manage a password if they are locked. Even if you do not lock the drives, there is still a benefit to using FDE disks. If you are concerned about data theft or other security issues, you might already invest in drive disposal costs, and there are benefits to using FDE over other technologies that exists today, both in terms of the security provided and time saved. If the encryption key on the drive changes, the drive cannot decrypt the data on the platters, effectively erasing the data on the disks. The National Institute of Standards and Technology (http://www.nist.gov) values this type of data erasure above secure erase and below physical destruction of the device. There are four major reasons for using instant secure erase. Page 44 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 3: Full Disk Encryption | Instant Secure Erase If there is a need to repurpose the hard drive for a different application. You might need to move the drive to another server to expand storage elsewhere, but the drive is in use. The data on the drive might contain sensitive data including customer information that, if lost or divulged, could cause an embarrassing disclosure of a security hole. You can use the instant secure erase feature to effectively erase the data so the drive can be moved to another server or area without concern that old data could be found. If there is a need to replace drives. If the amount of data has outgrown the storage system, and there is no room to expand capacity by adding drives, you might choose to purchase upgrade drives. If the older drives support FDE, you can erase the data instantly so the new drives can be used. If there is a need to return a disk for warranty activity. If the drive is beginning to show SMART predictive failure alerts, you might want to return the drive for replacement. If so, the drive needs to be effectively erased if there is sensitive data. Occasionally a drive is in such bad condition that standard erasure applications do not work. If the drive still allows any access, it might be possible to destroy the encryption key. LSI Corporation Confidential | August 2009 Page 45 Chapter 3: Full Disk Encryption | Instant Secure Erase MegaRaid SAS Software User Guide Page 46 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 4: WebBIOS Configuration Utility | Overview Chapter 4 WebBIOS Configuration Utility This chapter describes the WebBIOS Configuration Utility (CU), which enables you to create and manage RAID configurations on LSI SAS controllers 4.1 Overview The WebBIOS CU, unlike the MegaRAID Storage Manager™ software, resides in the SAS controller BIOS and operates independently of the operating system. You can use the WebBIOS CU to do the following tasks: Create drive groups and virtual drives for storage configurations Display controller, virtual drive, drive, and battery backup unit (BBU) properties, and change parameters Delete virtual drives Migrate a storage configuration to a different RAID level Detect configuration mismatches Import a foreign configuration Scan devices connected to the controller Initialize virtual drives Check configurations for data consistency The WebBIOS CU provides a configuration wizard to guide you through the configuration of virtual drives and drive groups. 4.2 Starting the WebBIOS CU Follow these steps to start the WebBIOS CU and access the main screen. 1. When the host computer is booting, hold down the key and press the key when the following text appears on the screen: Copyright© LSI Corporation Press for WebBIOS The Controller Selection screen appears. 2. If the system has multiple SAS controllers, select a controller. 3. Click Start to continue. The main WebBIOS CU screen appears. LSI Corporation Confidential | August 2009 Page 47 Chapter 4: WebBIOS Configuration Utility | WebBIOS CU Main Screen Options MegaRaid SAS Software User Guide 4.3 WebBIOS CU Main Screen Figure 15 shows the screen that appears when you start the WebBIOS CU and select a Options controller. Figure 15: WebBIOS CU Main Screen In the right frame, the screen shows the virtual drives configured on the controller, and the drives that are connected to the controller. In addition, the screen indentifies drives that are foreign or missing. NOTE: In the list of virtual drives, the drive nodes are sorted based on the order in which you added the drives to the drive group, rather than the physical slot order that displays in the physical trees. NOTE: The minimum screen resolution for WebBIOS is 640x480. To toggle between the physical view and logical view of the storage devices connected to the controller, click Physical View or Logical View in the menu on the left. When the physical view screen appears, it shows the drive groups that are configured on this controller. For drives in an enclosure, the screen shows the following drive information: Enclosure Slot Interface type (such as SAS or SATA) Drive type (HDD or SSD) Drive size Drive status (such as Online or Unconfigured Good) Page 48 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 4: WebBIOS Configuration Utility | WebBIOS CU Main Screen Options The toolbar at the top of the WebBIOS CU has the following buttons, as listed in Table 19. Table 19: WebBIOS CU Toolbar Icons Icon Description Click this icon to return to the main screen from any other WebBIOS CU screen. Click this icon to return to the previous screen that you were viewing. Click this icon to exit the WebBIOS CU program. Click this icon to turn off the sound on the onboard controller alarm. Click this icon to display information about the WebBIOS CU version, browser version, and HTML interface engine. Here is a description of the options listed on the left of the main WebBIOS CU screen: Controller Selection: Select this option to view the Controller Selection screen, where you can select a different SAS controller. You can then view information about the controller and the devices connected to it, or create a new configuration on the controller. Controller Properties: Select this option to view the properties of the currently selected SAS controller. For more information, see Section 4.6.1, Viewing and Changing Controller Properties Scan Devices: Select this option to have the WebBIOS CU re-scan the physical and virtual drives for any changes in the drive status or the physical configuration. The WebBIOS CU displays the results of the scan in the physical and virtual drive descriptions. Virtual Drives: Select this option to view the Virtual Drives screen, where you can change and view virtual drive properties, delete virtual drives, initialize drives, and perform other tasks. For more information, see Section 4.6.2, Viewing and Changing Virtual Drive Properties Drives: Select this option to view the Drives screen, where you can view drive properties, create hot spares, and perform other tasks. For more information, see Section 4.6.3, Viewing Drive Properties Configuration Wizard: Select this option to start the Configuration Wizard and create a new storage configuration, clear a configuration, or add a configuration. For more information, see Section 4.4, Creating a Storage Configuration LSI Corporation Confidential | August 2009 Page 49 Chapter 4: WebBIOS Configuration Utility | Creating a Storage Configuration MegaRaid SAS Software User Guide Physical View/Logical View: Select this option to toggle between the Physical View and Logical View screens. Events: Select this option to view system events in the Event Information screen. For more information, see Section 4.7, Viewing System Event Information Exit: Select this option to exit the WebBIOS CU and continue with system boot. 4.4 Creating a Storage This section explains how to use the WebBIOS CU Configuration Wizard to configure Configuration RAID drive groups and virtual drives to create storage configurations: 4.4.1 Selecting the Configuration Follow these steps to start the Configuration Wizard, and select a configuration option with the Configuration Wizard and mode: 1. Click Configuration Wizard on the WebBIOS main screen. The first Configuration Wizard screen appears, as shown in Figure 16. Figure 16: WebBIOS Configuration Wizard Screen 2. Select a configuration option. CAUTION: If you choose the first or second option, all existing data in the configuration will be deleted. Make a backup of any data that you want to keep before you choose an option. — Clear Configuration: Clears the existing configuration. — New Configuration: Clears the existing configuration and lets you create a new configuration. — Add Configuration: Retains the existing storage configuration and adds new drives to it (this does not cause any data loss). Page 50 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 4: WebBIOS Configuration Utility | Creating a Storage Configuration 3. Click Next. A dialog box warns that you will lose data if you select Clear Configuration or New Configuration. The WebBIOS Configuration Method screen appears, as shown in Figure 17. Figure 17: WebBIOS Configuration Method Screen 4. On this screen, select a configuration mode: — Manual Configuration: Allows you to control all attributes of the new storage configuration as you create drive groups and virtual drives, and set their parameters. — Automatic Configuration: Automatically creates an optimal RAID configuration. — If you select Automatic Configuration, you can choose whether to create a redundant RAID drive group or a non-redundant RAID 0 drive group. Select one of the following options in the Redundancy field: Redundancy when possible No redundancy 5. Click Next to continue. If you select the Automatic Configuration option, continue with Section 4.4.2, Using Automatic Configuration If you select Manual Configuration, continue with Section 4.4.3, Using Manual Configuration 4.4.2 Using Automatic Configuration Follow these instructions to create a configuration with automatic configuration, either with or without redundancy: 1. When WebBIOS displays the proposed new configuration, review the information on the screen, and click Accept to accept it. (Or click Back to go back and change the configuration.) LSI Corporation Confidential | August 2009 Page 51 Chapter 4: WebBIOS Configuration Utility | Creating a Storage Configuration MegaRaid SAS Software User Guide — RAID 0: If you select Automatic Configuration and No Redundancy, WebBIOS creates a RAID 0 configuration. — RAID 1: If you select Automatic Configuration and Redundancy when possible, and only two drives are available, WebBIOS creates a RAID 1 configuration. — RAID 5: If you select Automatic Configuration and Redundancy when possible, and three or more drives are available, WebBIOS creates a RAID 5 configuration. — RAID 6: If you select Automatic Configuration and Redundancy when possible, and the RAID 6 option is enabled, and three or more drives are available, WebBIOS creates a RAID 6 configuration. 2. Click Yes when you are prompted to save the configuration. 3. Click Yes when you are prompted to initialize the new virtual drive(s). WebBIOS CU begins a background initialization of the virtual drives. 4.4.3 Using Manual Configuration This section contains the procedures for creating RAID drive groups for RAID levels 0, 1, 5, 6, 00, 10, 50, and 60. 4.4.3.1 Using Manual RAID 0 provides drive striping across all drives in the RAID drive group. RAID 0 does not Configuration: RAID 0 provide any data redundancy but does offer excellent performance. RAID 0 is ideal for applications that require high bandwidth but do not require fault tolerance. RAID 0 also denotes an independent or single drive. NOTE: RAID level 0 is not fault-tolerant. If a drive in a RAID 0 drive group fails, the whole virtual drive (all drives associated with the virtual drive) fails. When you select Manual Configuration and click Next, the drive group Definition screen appears. You use this screen to select drives to create drive groups. 1. Hold while selecting two or more ready drives in the Drives panel on the left until you have selected all desired drives for the drive group. 2. Click Add To Array to move the drives to a proposed drive group configuration in the Disk Groups panel on the right, as shown in Figure 18. If you need to undo the changes, click the Reclaim button. Page 52 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 4: WebBIOS Configuration Utility | Creating a Storage Configuration Figure 18: WebBIOS Disk Group Definition Screen 3. When you have finished selecting drives for the drive group, click Accept DG. 4. Click Next. The Virtual Drive Definition screen appears, as shown in Figure 19. This screen lists the possible RAID levels for the drive group. Use this screen to select the RAID level, stripe size, read policy, and other attributes for the new virtual drives. LSI Corporation Confidential | August 2009 Page 53 Chapter 4: WebBIOS Configuration Utility | Creating a Storage Configuration MegaRaid SAS Software User Guide Figure 19: WebBIOS Virtual Drive Definition Screen 5. Change the virtual drive options from the defaults listed on the screen as needed. Here are brief explanations of the virtual drive options: — RAID Level: The drop-down menu lists the possible RAID levels for the virtual drive. Select RAID 0. — Stripe Size: The stripe size specifies the length of the data segments that the RAID controller writes across multiple drives, not including parity drives. For example, consider a stripe that contains 64 KB of drive space and has 16 KB of data residing on each drive in the stripe. In this case, the stripe size is 64 KB and the strip size is 16 KB. You can set the stripe size to 8, 16, 32, 64, 128, 256, 512, and 1024 Kbytes. A larger stripe size produces higher read performance. If your computer regularly performs random read requests, choose a smaller stripe size. The default is 64 Kbytes. — Access Policy: Select the type of data access that is allowed for this virtual drive: RW: Allow read/write access. This is the default. Read Only: Allow read-only access. Blocked: Do not allow access. — Read Policy: Specify the read policy for this virtual drive: Normal: This disables the read ahead capability. This is the default. Ahead: This enables read ahead capability, which allows the controller to read sequentially ahead of requested data and to store the additional data in cache memory, anticipating that the data will be needed soon. This speeds up reads for sequential data, but there is little improvement when accessing random data. Page 54 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 4: WebBIOS Configuration Utility | Creating a Storage Configuration Adaptive: When Adaptive read ahead is selected, the controller begins using read ahead if the two most recent drive accesses occurred in sequential sectors. If the read requests are random, the controller reverts to Normal (no read ahead). — Write Policy: Specify the write policy for this virtual drive: WBack: In Writeback mode the controller sends a data transfer completion signal to the host when the controller cache has received all of the data in a transaction. This setting is recommended in Standard mode. WThru: In Writethrough mode the controller sends a data transfer completion signal to the host when the drive subsystem has received all of the data in a transaction. This is the default. Bad BBU: Select this mode if you want the controller to use Writeback mode but the controller has no BBU or the BBU is bad. If you do not choose this option, the controller firmware automatically switches to Writethrough mode if it detects a bad or missing BBU. CAUTION: LSI allows Writeback mode to be used with or without a battery. LSI recommends that you use either a battery to protect the controller cache, or an uninterruptible power supply (UPS) to protect the entire system. If you do not use a battery or a UPS, and there is a power failure, you risk losing the data in the controller cache. — IO Policy: The IO Policy applies to reads on a specific virtual drive. It does not affect the read ahead cache. Direct: In direct I/O mode, reads are not buffered in cache memory. Data is transferred to the cache and the host concurrently. If the same data block is read again, it comes from cache memory. This is the default. Cached: In cached I/O mode, all reads are buffered in cache memory. — Drive Cache: Specify the drive cache policy: Enable: Enable the drive cache. Disable: Disable the drive cache. NoChange: Leave the current drive cache policy as is. This is the default. — Disable BGI: Specify the background initialization status: No: Leave background initialization enabled. This means that a new configuration can be initialized in the background while you use WebBIOS to do other configuration tasks. This is the default. Yes: Select Yes if you do not want to allow background initializations for configurations on this controller. — Select Size: Specify the size of the virtual drive in megabytes. Normally, this would be the full size for RAID 0 shown in the Configuration panel on the right. You may specify a smaller size if you want to create other virtual drives on the same drive group. 6. Click Accept to accept the changes to the virtual drive definition, or click Reclaim to return to the previous settings. 7. Click Next when you are finished defining virtual drives. LSI Corporation Confidential | August 2009 Page 55 Chapter 4: WebBIOS Configuration Utility | Creating a Storage Configuration MegaRaid SAS Software User Guide The Configuration Preview screen appears, as shown in Figure 20. Figure 20: RAID 0 Configuration Preview 8. Check the information in the configuration preview. 9. If the virtual drive configuration is acceptable, click Accept to save the configuration. Otherwise, click Back to return to the previous screens and change the configuration. 10. If you accept the configuration, click Yes at the prompt to save the configuration. The WebBIOS main menu appears. 4.4.3.2 Using Manual In RAID 1, the RAID controller duplicates all data from one drive to a second drive. RAID Configuration: RAID 1 1 provides complete data redundancy, but at the cost of doubling the required data storage capacity. It is appropriate for small databases or any other environment that requires fault tolerance but small capacity. When you select Manual Configuration and click Next, the Disk Group Definition screen appears. You use this screen to select drives to create drive groups. 1. Hold while you select two ready drives in the Drives panel on the left. You must select an even number of drives. 2. Click Add To Array to move the drives to a proposed drive group configuration in the Disk Groups panel on the right, as shown in Figure 21. If you need to undo the changes, click the Reclaim button. NOTE: A RAID 1 virtual drive can contain up to 16 drive groups and 32 drives in a single span. (Other factors, such as the type of controller, can limit the number of drives.) You must use two drives in each RAID 1 drive group in the span. Page 56 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 4: WebBIOS Configuration Utility | Creating a Storage Configuration Figure 21: WebBIOS Disk Group Definition Screen 3. When you have finished selecting drives for the drive group, click Accept DG. 4. Click Next. The Virtual Drive Definition screen appears, as shown in Figure 22. You use this screen to select the RAID level, stripe size, read policy, and other attributes for the new virtual drives. Figure 22: WebBIOS Virtual Drive Definition Screen LSI Corporation Confidential | August 2009 Page 57 Chapter 4: WebBIOS Configuration Utility | Creating a Storage Configuration MegaRaid SAS Software User Guide 5. Change the virtual drive options from the defaults listed on the screen as needed. Here are brief explanations of the virtual drive options: — RAID Level: The drop-down menu lists the possible RAID levels for the virtual drive. Select RAID 1. — Stripe Size: The stripe size specifies the length of the data segments that the RAID controller writes across multiple drives, not including parity drives. For example, consider a stripe that contains 64 KB of drive space and has 16 KB of data residing on each drive in the stripe. In this case, the stripe size is 64 KB and the strip size is 16 KB. You can set the stripe size to 8, 16, 32, 64, 128, 256, 512, and 1024 Kbytes. A larger stripe size produces higher read performance. If your computer regularly performs random read requests, choose a smaller stripe size. The default is 64 Kbytes. — Access Policy: Select the type of data access that is allowed for this virtual drive: RW: Allow read/write access. This is the default. Read Only: Allow read-only access. Blocked: Do not allow access. — Read Policy: Specify the read policy for this virtual drive: Normal: This disables the read ahead capability. This is the default. Ahead: This enables read ahead capability, which allows the controller to read sequentially ahead of requested data and to store the additional data in cache memory, anticipating that the data will be needed soon. This speeds up reads for sequential data, but there is little improvement when accessing random data. Adaptive: When Adaptive read ahead is selected, the controller begins using read ahead if the two most recent drive accesses occurred in sequential sectors. If the read requests are random, the controller reverts to Normal (no read ahead). — Write Policy: Specify the write policy for this virtual drive: WBack: In Writeback mode the controller sends a data transfer completion signal to the host when the controller cache has received all of the data in a transaction. This setting is recommended in Standard mode. WThru: In Writethrough mode the controller sends a data transfer completion signal to the host when the drive subsystem has received all of the data in a transaction. This is the default. Bad BBU: Select this mode if you want the controller to use Writeback mode but the controller has no BBU or the BBU is bad. If you do not choose this option, the controller firmware automatically switches to Writethrough mode if it detects a bad or missing BBU. CAUTION: LSI allows Writeback mode to be used with or without a battery. LSI recommends that you use either a battery to protect the controller cache, or an uninterruptible power supply (UPS) to protect the entire system. If you do not use a battery or a UPS, and there is a power failure, you risk losing the data in the controller cache. Page 58 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 4: WebBIOS Configuration Utility | Creating a Storage Configuration — IO Policy: The IO Policy applies to reads on a specific virtual drive. It does not affect the read ahead cache. Direct: In Direct I/O mode, reads are not buffered in cache memory. Data is transferred to the cache and the host concurrently. If the same data block is read again, it comes from cache memory. This is the default. Cached: In Cached I/O mode, all reads are buffered in cache memory. — Drive Policy: Specify the drive cache policy: Enable: Enable the drive cache. Disable: Disable the drive cache. NoChange: Leave the current drive cache policy as is. This drive policy is the default. — Disable BGI: Specify the background initialization status: No: Leave background initialization enabled. This means that a new configuration can be initialized in the background while you use WebBIOS to do other configuration tasks. This is the default. Yes: Select Yes if you do not want to allow background initializations for configurations on this controller. — Select Size: Specify the size of the virtual drive(s) in megabytes. Normally, this would be the full size for RAID 1 shown in the Configuration panel on the right. You may specify a smaller size if you want to create other virtual drives on the same drive group. 6. Click Accept to accept the changes to the virtual drive definition, or click Reclaim to return to the previous settings. 7. Click Next when you are finished defining virtual drives. The Configuration Preview screen appears, as shown in Figure 23. Figure 23: RAID 1 Configuration Preview LSI Corporation Confidential | August 2009 Page 59 Chapter 4: WebBIOS Configuration Utility | Creating a Storage Configuration MegaRaid SAS Software User Guide 8. Check the information in the configuration preview. 9. If the virtual drive configuration is acceptable, click Accept to save the configuration. Otherwise, click Back to return to the previous screens and change the configuration. 10. If you accept the configuration, click Yes at the prompt to save the configuration. The WebBIOS main menu appears. 4.4.3.3 Using Manual RAID 5 uses drive striping at the block level and parity. In RAID 5, the parity information Configuration: RAID 5 is written to all drives. It is best suited for networks that perform a lot of small input/output (I/O) transactions simultaneously. RAID 5 provides data redundancy, high read rates, and good performance in most environments. It also provides redundancy with lowest loss of capacity. RAID 5 provides high data throughput. RAID 5 is useful for transaction processing applications because each drive can read and write independently. If a drive fails, the RAID controller uses the parity drive to recreate all missing information. You can use RAID 5 for office automation and online customer service that require fault tolerance. In addition, RAID 5 is good for any application that has high read request rates but low write request rates. When you select Manual Configuration and click Next, the Disk Group Definition screen appears. You use this screen to select drives to create drive groups. 1. Hold while you select at least three ready drives in the Physical Drives panel on the left. 2. Click Add To Array to move the drives to a proposed drive group configuration in the Disk Groups panel on the right, as shown in Figure 24. If you need to undo the changes, click the Reclaim button. Figure 24: WebBIOS Disk Group Definition Screen Page 60 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 4: WebBIOS Configuration Utility | Creating a Storage Configuration 3. When you have finished selecting drives for the drive group, click Accept DG. 4. Click Next. The Virtual Drive Definition screen appears, as shown in Figure 25. You use this screen to select the RAID level, stripe size, read policy, and other attributes for the new virtual drives. f Figure 25: WebBIOS Virtual Drive Definition Screen 5. Change the virtual drive options from the defaults listed on the screen as needed. Here are brief explanations of the virtual drive options: — RAID Level: The drop-down menu lists the possible RAID levels for the virtual drive. Select RAID 5. — Stripe Size: The stripe size specifies the length of the data segments that the RAID controller writes across multiple drives, not including parity drives. For example, consider a stripe that contains 64 KB of drive space and has 16 KB of data residing on each drive in the stripe. In this case, the stripe size is 64 KB and the strip size is 16 KB. You can set the stripe size to 8, 16, 32, 64, 128, 256, 512, and 1024 Kbytes. A larger stripe size produces higher read performance. If your computer regularly performs random read requests, choose a smaller stripe size. The default is 64 Kbytes. — Access Policy: Select the type of data access that is allowed for this virtual drive: RW: Allow read/write access. This is the default. Read Only: Allow read-only access. Blocked: Do not allow access. — Read Policy: Specify the read policy for this virtual drive: Normal: This disables the read ahead capability. This is the default. LSI Corporation Confidential | August 2009 Page 61 Chapter 4: WebBIOS Configuration Utility | Creating a Storage Configuration MegaRaid SAS Software User Guide Ahead: This enables read ahead capability, which allows the controller to read sequentially ahead of requested data and to store the additional data in cache memory, anticipating that the data will be needed soon. This speeds up reads for sequential data, but there is little improvement when accessing random data. Adaptive: When Adaptive read ahead is selected, the controller begins using read ahead if the two most recent drive accesses occurred in sequential sectors. If the read requests are random, the controller reverts to Normal (no read ahead). — Write Policy: Specify the write policy for this virtual drive: WBack: In Writeback mode the controller sends a data transfer completion signal to the host when the controller cache has received all of the data in a transaction. This setting is recommended in Standard mode. WThru: In Writethrough mode the controller sends a data transfer completion signal to the host when the drive subsystem has received all of the data in a transaction. This is the default. Bad BBU: Select this mode if you want the controller to use Writeback mode but the controller has no BBU or the BBU is bad. If you do not choose this option, the controller firmware automatically switches to Writethrough mode if it detects a bad or missing BBU. CAUTION: LSI allows Writeback mode to be used with or without a battery. LSI recommends that you use either a battery to protect the controller cache, or an uninterruptible power supply (UPS) to protect the entire system. If you do not use a battery or a UPS, and there is a power failure, you risk losing the data in the controller cache. — IO Policy: The IO Policy applies to reads on a specific virtual drive. It does not affect the read ahead cache. Direct: In Direct I/O mode, reads are not buffered in cache memory. Data is transferred to the cache and the host concurrently. If the same data block is read again, it comes from cache memory. This is the default. Cached: In Cached I/O mode, all reads are buffered in cache memory. — Drive Policy: Specify the drive cache policy: Enable: Enable the drive cache. Disable: Disable the drive cache. NoChange: Leave the current drive cache policy as is. This drive policy is the default. — Disable BGI: Specify the background initialization status: No: Leave background initialization enabled. This means that a new configuration can be initialized in the background while you use WebBIOS to do other configuration tasks. This is the default. Yes: Select Yes if you do not want to allow background initializations for configurations on this controller. Page 62 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 4: WebBIOS Configuration Utility | Creating a Storage Configuration — Select Size: Specify the size of the virtual drive in megabytes. Normally, this would be the full size for RAID 5 shown in the Configuration panel on the right. You may specify a smaller size if you want to create other virtual drives on the same drive group. 6. Click Accept to accept the changes to the virtual drive definition, or click Reclaim to return to the previous settings. 7. Click Next when you are finished defining virtual drives. The Configuration Preview screen appears, as shown in Figure 26. Figure 26: RAID 5 Configuration Preview 8. Check the information in the configuration preview. 9. If the virtual drive configuration is acceptable, click Accept to save the configuration. Otherwise, click Cancel to end the operation and return to the WebBIOS main menu, or click Back to return to the previous screens and change the configuration. 10. If you accept the configuration, click Yes at the prompt to save the configuration. The WebBIOS main menu appears. 4.4.3.4 Using Manual RAID 6 is similar to RAID 5 (drive striping and distributed parity), except that instead of Configuration: RAID 6 one parity block per stripe, there are two. With two independent parity blocks, RAID 6 can survive the loss of two drives in a virtual drive without losing data. Use RAID 6 for data that requires a very high level of protection from loss. RAID 6 is best suited for networks that perform a lot of small input/output (I/O) transactions simultaneously. It provides data redundancy, high read rates, and good performance in most environments. LSI Corporation Confidential | August 2009 Page 63 Chapter 4: WebBIOS Configuration Utility | Creating a Storage Configuration MegaRaid SAS Software User Guide In the case of a failure of one drive or two drives in a virtual drive, the RAID controller uses the parity blocks to recreate all of the missing information. If two drives in a RAID 6 virtual drive fail, two drive rebuilds are required, one for each drive. These rebuilds do not occur at the same time. The controller rebuilds one failed drive, and then the other failed drive. When you select Manual Configuration and click Next, the drive Group Definition screen appears. You use this screen to select drives to create drive groups. 1. Hold while selecting at least three ready drives in the Drives panel on the left. 2. Click Add To Array to move the drives to a proposed drive group configuration in the Disk Groups panel on the right, as shown in Figure 27. If you need to undo the changes, click the Reclaim button. Figure 27: WebBIOS Disk Group Definition Screen 3. When you have finished selecting drives for the drive group, click Accept DG for each. 4. Click Next. The Virtual Drive Definition screen appears, as shown in Figure 28. Use this screen to select the RAID level, stripe size, read policy, and other attributes for the new virtual drives. Page 64 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 4: WebBIOS Configuration Utility | Creating a Storage Configuration Figure 28: WebBIOS Virtual Drive Definition Screen 1. Change the virtual drive options from the defaults listed on the screen as needed. Here are brief explanations of the virtual drive options: — RAID Level: The drop-down menu lists the possible RAID levels for the virtual drive. Select RAID 6. — Stripe Size: The stripe size specifies the length of the data segments that the RAID controller writes across multiple drives, not including parity drives. For example, consider a stripe that contains 64 KB of drive space and has 16 KB of data residing on each drive in the stripe. In this case, the stripe size is 64 KB and the strip size is 16 KB. You can set the stripe size to 8, 16, 32, 64, 128, 256, 512, and 1024 Kbytes. A larger stripe size produces higher read performance. If your computer regularly performs random read requests, choose a smaller stripe size. The default is 64 Kbytes. NOTE: WebBIOS does not not allow you to select 8 Kbytes as the stripe size when you create a RAID 6 drive group with three drives. — Access Policy: Select the type of data access that is allowed for this virtual drive: RW: Allow read/write access. This is the default. Read Only: Allow read-only access. Blocked: Do not allow access. — Read Policy: Specify the read policy for this virtual drive: Normal: This disables the read ahead capability. This is the default. LSI Corporation Confidential | August 2009 Page 65 Chapter 4: WebBIOS Configuration Utility | Creating a Storage Configuration MegaRaid SAS Software User Guide Ahead: This enables read ahead capability, which allows the controller to read sequentially ahead of requested data and to store the additional data in cache memory, anticipating that the data will be needed soon. This speeds up reads for sequential data, but there is little improvement when accessing random data. Adaptive: When Adaptive read ahead is selected, the controller begins using read ahead if the two most recent drive accesses occurred in sequential sectors. If the read requests are random, the controller reverts to Normal (no read ahead). — Write Policy: Specify the write policy for this virtual drive: WBack: In Writeback mode the controller sends a data transfer completion signal to the host when the controller cache has received all of the data in a transaction. This setting is recommended in Standard mode. WThru: In Writethrough mode the controller sends a data transfer completion signal to the host when the drive subsystem has received all of the data in a transaction. This is the default. Bad BBU: Select this mode if you want the controller to use Writeback mode but the controller has no BBU or the BBU is bad. If you do not choose this option, the controller firmware automatically switches to Writethrough mode if it detects a bad or missing BBU. CAUTION: LSI allows Writeback mode to be used with or without a battery. LSI recommends that you use either a battery to protect the controller cache, or an uninterruptible power supply (UPS) to protect the entire system. If you do not use a battery or a UPS, and there is a power failure, you risk losing the data in the controller cache. — IO Policy: The IO Policy applies to reads on a specific virtual drive. It does not affect the read ahead cache. Direct: In Direct I/O mode, reads are not buffered in cache memory. Data is transferred to the cache and the host concurrently. If the same data block is read again, it comes from cache memory. This is the default. Cached: In Cached I/O mode, all reads are buffered in cache memory. — Drive Policy: Specify the drive cache policy: Enable: Enable the drive cache. Disable: Disable the drive cache. NoChange: Leave the current drive cache policy as is. This drive policy is the default. — Disable BGI: Specify the background initialization status: No: Leave background initialization enabled. This means that a new configuration can be initialized in the background while you use WebBIOS to do other configuration tasks. This is the default. Yes: Select Yes if you do not want to allow background initializations for configurations on this controller. Page 66 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 4: WebBIOS Configuration Utility | Creating a Storage Configuration — Select Size: Specify the size of the virtual drive in megabytes. Normally, this would be the full size for RAID 6 shown in the Configuration panel on the right. You may specify a smaller size if you want to create other virtual drives on the same drive group. 2. Click Accept to accept the changes to the virtual drive definition, or click Reclaim to return to the previous settings. 3. Click Next when you are finished defining virtual drives. The Configuration Preview screen appears, as shown in Figure 29. Figure 29: RAID 6 Configuration Preview 4. Check the information in the configuration preview. 5. If the virtual drive configuration is acceptable, click Accept to save the configuration. Otherwise, click Back to return to the previous screens and change the configuration. 6. If you accept the configuration, click Yes at the prompt to save the configuration. The WebBIOS main menu appears. 4.4.3.5 Using Manual A RAID 00 drive group is a spanned drive group that creates a striped set from a series Configuration: RAID 00 of RAID 0 drive groups. It breaks up data into smaller blocks and then stripes the blocks of data to RAID 00 drive groups. The size of each block is determined by the stripe size parameter, which is 64 Kbytes. RAID 00 does not provide any data redundancy but does offer excellent performance. RAID 00 is ideal for applications that require high bandwidth but do not require fault tolerance. When you select Manual Configuration and click Next, the Disk Group Definition screen appears. LSI Corporation Confidential | August 2009 Page 67 Chapter 4: WebBIOS Configuration Utility | Creating a Storage Configuration MegaRaid SAS Software User Guide You use the Disk Group Definition screen to select drives to create drive groups. 1. Hold while you select ready drives in the Drives panel on the left. 2. Click Add To Array to move the drives to a proposed drive group configuration in the Disk Groups panel on the right. If you need to undo the changes, click the Reclaim button. 3. Click Accept DG to create a RAID 0 drive group. An icon for the next drive group appears in the right panel. 4. Hold while you select more ready drives in the Drives panel to create a second RAID 0 drive group. 5. Click Add To Array to move the drives to a second drive group configuration in the Disk Groups panel, as shown in Figure 34. If you need to undo the changes, click the Reclaim button. NOTE: RAID 00 supports a maximum of eight spans, with a maximum of 32 drives per span. (Other factors, such as the type of controller, can limit the number of drives.) 6. Click Accept DG to create a RAID 0 drive group. Figure 30: WebBIOS Disk Group Definition Screen 7. Repeat steps 4 through 6 until you have selected all the drives you want for the drive groups. 8. When you have finished selecting drives for the drive groups, select each drive group and then click Accept DG for each selection. 9. Click Next. Page 68 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 4: WebBIOS Configuration Utility | Creating a Storage Configuration The Span Definition screen appears, as shown in Figure 31. This screen shows the drive group holes that you can select to add to a span. Figure 31: WebBIOS Span Definition Screen 10. Under the heading Array With Free Space, hold while you select a drive group, and then click Add to SPAN. The drive group you select appears in the right frame under the heading Span. 11. Hold while you select a second drive group, and then click Add to SPAN. 12. Repeat the previous two steps until you have selected all of the drive groups that you want. 13. Click Next. The Virtual Drive Definition screen appears, as shown in Figure 36. You use this screen to select the RAID level, stripe size, read policy, and other attributes for the new virtual drives. 14. Hold while you select drive groups in the Configuration panel on the right. LSI Corporation Confidential | August 2009 Page 69 Chapter 4: WebBIOS Configuration Utility | Creating a Storage Configuration MegaRaid SAS Software User Guide Figure 32: WebBIOS Virtual Drive Definition Screen 15. Change the virtual drive options from the defaults listed on the screen as needed. Here are brief explanations of the virtual drive options: — RAID Level: The drop-down menu lists the possible RAID levels for the virtual drive. Select RAID 0. — Stripe Size: The stripe size specifies the length of the data segments that the RAID controller writes across multiple drives, not including parity drives. For example, consider a stripe that contains 64 KB of drive space and has 16 KB of data residing on each drive in the stripe. In this case, the stripe size is 64 KB and the strip size is 16 KB. You can set the stripe size to 8, 16, 32, 64, 128, 256, 512, and 1024 Kbytes. A larger stripe size produces higher read performance. If your computer regularly performs random read requests, choose a smaller stripe size. The default is 64 Kbytes. — Access Policy: Select the type of data access that is allowed for this virtual drive: RW: Allow read/write access. Read Only: Allow read-only access. This type of access is the default. Blocked: Do not allow access. — Read Policy: Specify the read policy for this virtual drive: Normal: This option disables the read ahead capability. This is the default. Ahead: This option enables read ahead capability, which allows the controller to read sequentially ahead of requested data and to store the additional data in cache memory, anticipating that the data will be needed soon. This speeds up reads for sequential data, but there is little improvement when accessing random data. Page 70 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 4: WebBIOS Configuration Utility | Creating a Storage Configuration Adaptive: When Adaptive read ahead is selected, the controller begins using read ahead if the two most recent drive accesses occurred in sequential sectors. If the read requests are random, the controller reverts to Normal (no read ahead). — Write Policy: Specify the write policy for this virtual drive: WBack: In Writeback mode, the controller sends a data transfer completion signal to the host when the controller cache has received all of the data in a transaction. This setting is recommended in Standard mode. WThru: In Writethrough mode, the controller sends a data transfer completion signal to the host when the drive subsystem has received all of the data in a transaction. This is the default. Bad BBU: Select this mode if you want the controller to use Writeback mode but the controller has no BBU or the BBU is bad. If you do not choose this option, the controller firmware automatically switches to Writethrough mode if it detects a bad or missing BBU. CAUTION: LSI allows Writeback mode to be used with or without a battery. To protect the entire system, LSI recommends that you use either a battery to protect the controller cache or an uninterruptible power supply (UPS). If you do not use a battery or a UPS, and there is a power failure, you risk losing the data in the controller cache. — IO Policy: The IO Policy applies to reads on a specific virtual drive. The policy does not affect the read ahead cache. Direct: In Direct I/O mode, reads are not buffered in cache memory. Data is transferred to the cache and the host concurrently. If the same data block is read again, the block comes from cache memory. This setting is the default. Cached: In Cached I/O mode, all reads are buffered in cache memory. — Drive Policy: Specify the drive cache policy: Enable: Enable the drive cache. Disable: Disable the drive cache. NoChange: Leave the current drive cache policy as is. This setting is the default. — Disable BGI: Specify the background initialization status: No: Leave background initialization enabled. This means that a new configuration can be initialized in the background while you use WebBIOS to do other configuration tasks. This setting is the default. Yes: Select Yes if you do not want to allow background initializations for configurations on this controller. — Select Size: Specify the size of the virtual drive in megabytes. Normally, this would be the full size for RAID 00 shown in the Configuration Panel on the right. You may specify a smaller size if you want to create other virtual drives on the same drive group. 16. Click Accept to accept the changes to the virtual drive definition, or click Reclaim to return to the previous settings. 17. When you are finished defining virtual drives, click Next. The Configuration Preview screen appears, as shown in Figure 33. LSI Corporation Confidential | August 2009 Page 71 Chapter 4: WebBIOS Configuration Utility | Creating a Storage Configuration MegaRaid SAS Software User Guide Figure 33: RAID 00 Configuration Preview 18. Check the information in the configuration preview. 19. If the virtual drive configuration is acceptable, click Accept to save the configuration. Otherwise, click Cancel to end the operation and return to the WebBIOS main menu, or click Back to return to the previous screens and change the configuration. 20. If you accept the configuration, click Yes at the prompt to save the configuration. The WebBIOS main menu appears. 4.4.3.6 Using Manual RAID 10, a combination of RAID 1 and RAID 0, has mirrored drives. Configuration: RAID 10 It breaks up data into smaller blocks, then stripes the blocks of data to each RAID 1 drive group. Each RAID 1 drive group then duplicates its data to its other drive. The size of each block is determined by the stripe size parameter, which is 64 Kbytes. RAID 10 can sustain one drive failure in each drive group while maintaining data integrity. RAID 10 provides both high data transfer rates and complete data redundancy. It works best for data storage that must have 100 percent redundancy of RAID 1 (mirrored drive groups) and that also needs the enhanced I/O performance of RAID 0 (striped drive groups); it works well for medium-sized databases or any environment that requires a higher degree of fault tolerance and moderate to medium capacity. When you select Manual Configuration and click Next, the Disk Group Definition screen appears. You use the Drive Group Definition screen to select drives to create drive groups. 1. Hold while selecting two ready drives in the Drives panel on the left. 2. Click Add To Array to move the drives to a proposed two-drive drive group configuration in the Drive Groups panel on the right. If you need to undo the changes, click the Reclaim button. Page 72 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 4: WebBIOS Configuration Utility | Creating a Storage Configuration 3. Click Accept DG to create a RAID 1 drive group. An icon for the next drive group displays in the right panel. 4. Click on the icon for the next drive group to select it. 5. Hold while selecting two more ready drives in the Drives panel to create a second RAID 1 drive group with two drives. 6. Click Add To Array to move the drives to a second two-drive drive group configuration in the Drive Groups panel, as shown in Figure 34. If you need to undo the changes, click the Reclaim button. NOTE: RAID 10 supports a maximum of eight spans, with a maximum of 32 drives per span. (Other factors, such as the type of controller, can limit the number of drives.) You must use an even number of drives in each RAID 10 drive group in the span. Figure 34: WebBIOS Drive Group Definition Screen 7. Repeat the previous three steps until you have selected all the drives you want for the drive groups. 8. When you have finished selecting drives for the drive groups, select each drive group and click Accept DG for each. 9. Click Next. The Span Definition screen appears, as shown in Figure 35. This screen displays the drive group holes you can select to add to a span. LSI Corporation Confidential | August 2009 Page 73 Chapter 4: WebBIOS Configuration Utility | Creating a Storage Configuration MegaRaid SAS Software User Guide Figure 35: WebBIOS Span Definition Screen 10. Under the heading Array With Free Space, hold while you select a drive group with two drives, and click Add to SPAN. The drive group you select displays in the right frame under the heading Span. 11. Hold while you select a second drive group with two drives, and click Add to SPAN. Both drive groups display in the right frame under Span. 12. If there are additional drive groups with two drives each, you can add them to the virtual drive. 13. Click Next. The Virtual Drive Definition screen appears, as shown in Figure 36. You use this screen to select the RAID level, stripe size, read policy, and other attributes for the new virtual drives. 14. Hold while you select two drive groups with two drives in the Configuration panel on the right. Page 74 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 4: WebBIOS Configuration Utility | Creating a Storage Configuration Figure 36: WebBIOS Virtual Drive Definition Screen NOTE: The WebBIOS Configuration Utility shows the maximum available capacity while creating the RAID 10 drive group. In version 1.03 of the utility, the maximum size of the RAID 10 drive group is the sum total of the two RAID 1 drive groups. In version 1.1, the maximum size is the size of the smaller drive group multiplied by two. 15. Change the virtual drive options from the defaults listed on the screen as needed. Here are brief explanations of the virtual drive options: — RAID Level: The drop-down menu lists the possible RAID levels for the virtual drive. Select RAID 10. — Stripe Size: The stripe size specifies the length of the data segments that the RAID controller writes across multiple drives, not including parity drives. For example, consider a stripe that contains 64 KB of drive space and has 16 KB of data residing on each drive in the stripe. In this case, the stripe size is 64 KB and the strip size is 16 KB. You can set the stripe size to 8, 16, 32, 64, 128, 256, 512, and 1024 Kbytes. A larger stripe size produces higher read performance. If your computer regularly performs random read requests, choose a smaller stripe size. The default is 64 Kbytes. — Access Policy: Select the type of data access that is allowed for this virtual drive: RW: Allow read/write access. Read Only: Allow read-only access. This is the default. Blocked: Do not allow access. — Read Policy: Specify the read policy for this virtual drive: Normal: This disables the read ahead capability. This is the default. LSI Corporation Confidential | August 2009 Page 75 Chapter 4: WebBIOS Configuration Utility | Creating a Storage Configuration MegaRaid SAS Software User Guide Ahead: This enables read ahead capability, which allows the controller to read sequentially ahead of requested data and to store the additional data in cache memory, anticipating that the data will be needed soon. This speeds up reads for sequential data, but there is little improvement when accessing random data. Adaptive: When Adaptive read ahead is selected, the controller begins using read ahead if the two most recent drive accesses occurred in sequential sectors. If the read requests are random, the controller reverts to Normal (no read ahead). — Write Policy: Specify the write policy for this virtual drive: WBack: In Writeback mode the controller sends a data transfer completion signal to the host when the controller cache has received all of the data in a transaction. This setting is recommended in Standard mode. WThru: In Writethrough mode the controller sends a data transfer completion signal to the host when the drive subsystem has received all of the data in a transaction. This is the default. Bad BBU: Select this mode if you want the controller to use Writeback mode but the controller has no BBU or the BBU is bad. If you do not choose this option, the controller firmware automatically switches to Writethrough mode if it detects a bad or missing BBU. CAUTION: LSI allows Writeback mode to be used with or without a battery. LSI recommends that you use either a battery to protect the controller cache, or an uninterruptible power supply (UPS) to protect the entire system. If you do not use a battery or a UPS, and there is a power failure, you risk losing the data in the controller cache. — IO Policy: The IO Policy applies to reads on a specific virtual drive. It does not affect the read ahead cache. Direct: In Direct I/O mode, reads are not buffered in cache memory. Data is transferred to the cache and the host concurrently. If the same data block is read again, it comes from cache memory. This is the default. Cached: In Cached I/O mode, all reads are buffered in cache memory. — Drive Policy: Specify the drive cache policy: Enable: Enable the drive cache. Disable: Disable the drive cache. NoChange: Leave the current drive cache policy as is. This drive policy is the default. — Disable BGI: Specify the background initialization status: No: Leave background initialization enabled. This means that a new configuration can be initialized in the background while you use WebBIOS to do other configuration tasks. This is the default. Yes: Select Yes if you do not want to allow background initializations for configurations on this controller. Page 76 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 4: WebBIOS Configuration Utility | Creating a Storage Configuration — Select Size: Specify the size of the virtual drive in megabytes. Normally, this would be the full size for RAID 10 shown in the configuration panel on the right. You may specify a smaller size if you want to create other virtual drives on the same drive group. 16. Click Accept to accept the changes to the virtual drive definition, or click Reclaim to return to the previous settings. 17. When you are finished defining virtual drives, click Next . The Configuration Preview screen appears, as shown in Figure 37. Figure 37: RAID 10 Configuration Preview 18. Check the information in the configuration preview. 19. If the virtual drive configuration is acceptable, click Accept to save the configuration. Otherwise, click Cancel to end the operation and return to the WebBIOS main menu, or click Back to return to the previous screens and change the configuration. 20. If you accept the configuration, click Yes at the prompt to save the configuration. The WebBIOS main menu appears. 4.4.3.7 Using Manual RAID 50 provides the features of both RAID 0 and RAID 5. RAID 50 uses both distributed Configuration: RAID 50 parity and drive striping across multiple drive groups. It provides high data throughput, data redundancy, and very good performance. It is best implemented on two RAID 5 drive groups with data striped across both drive groups. Though multiple drive failures can be tolerated, only one drive failure can be tolerated in each RAID 5 level drive group. RAID 50 is appropriate when used with data that requires high reliability, high request rates, high data transfer, and medium to large capacity. LSI Corporation Confidential | August 2009 Page 77 Chapter 4: WebBIOS Configuration Utility | Creating a Storage Configuration MegaRaid SAS Software User Guide When you select Manual Configuration and click Next, the Disk Group Definition screen appears. You use this screen to select drives to create drive group. 1. Hold while selecting at least three ready drives in the Drives panel on the left. 2. Click Add To Array to move the drives to a proposed drive group configuration in the Disk Groups panel on the right. If you need to undo the changes, click the Reclaim button. 3. Click Accept DG to create a RAID 5 drive group. An icon for a second drive group displays in the right panel. 4. Click on the icon for the second drive group to select it. 5. Hold while selecting at least three more ready drives in the Drives panel to create a second drive group. 6. Click Add To Array to move the drives to a proposed drive group configuration in the Disk Groups panel on the right, as shown in Figure 38. If you need to undo the changes, click the Reclaim button. Figure 38: WebBIOS Disk Group Definition Screen 7. When you have finished selecting drives for the drive groups, select each drive group and click Accept DG for each. 8. Click Next. The Span Definition screen appears, as shown in Figure 39. This screen displays the drive group holes you can select to add to a span. Page 78 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 4: WebBIOS Configuration Utility | Creating a Storage Configuration Figure 39: WebBIOS Span Definition Screen 9. Under the heading Array With Free Space, hold while you select a drive group of three or more drives, and click Add to SPAN. The drive group you select displays in the right frame under the heading Span. 10. Hold while you select a second drive group of three or more drives, and click Add to SPAN. Both drive groups display in the right frame under Span. 11. Click Next. The Virtual Drive Definition screen appears, as shown in Figure 40. You use this screen to select the RAID level, stripe size, read policy, and other attributes for the new virtual drive(s). 12. Hold while you select two 3-drive drive groups in the Configuration panel on the right. LSI Corporation Confidential | August 2009 Page 79 Chapter 4: WebBIOS Configuration Utility | Creating a Storage Configuration MegaRaid SAS Software User Guide Figure 40: WebBIOS Virtual Drive Definition Screen 13. Change the virtual drive options from the defaults listed on the screen as needed. Here are brief explanations of the virtual drive options: — RAID Level: The drop-down menu lists the possible RAID levels for the virtual drive. Select RAID 50. — Stripe Size: The stripe size specifies the length of the data segments that the RAID controller writes across multiple drives, not including parity drives. For example, consider a stripe that contains 64 KB of drive space and has 16 KB of data residing on each drive in the stripe. In this case, the stripe size is 64 KB and the strip size is 16 KB. You can set the stripe size to 8, 16, 32, 64, 128, 256, 512, and 1024 Kbytes. A larger stripe size produces higher read performance. If your computer regularly performs random read requests, choose a smaller stripe size. The default is 64 Kbytes. — Access Policy: Select the type of data access that is allowed for this virtual drive: RW: Allow read/write access. Read Only: Allow read-only access. This is the default. Blocked: Do not allow access. — Read Policy: Specify the read policy for this virtual drive: Normal: This disables the read ahead capability. This is the default. Ahead: This enables read ahead capability, which allows the controller to read sequentially ahead of requested data and to store the additional data in cache memory, anticipating that the data will be needed soon. This speeds up reads for sequential data, but there is little improvement when accessing random data. Page 80 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 4: WebBIOS Configuration Utility | Creating a Storage Configuration Adaptive: When Adaptive read ahead is selected, the controller begins using read ahead if the two most recent drive accesses occurred in sequential sectors. If the read requests are random, the controller reverts to Normal (no read ahead). — Write Policy: Specify the write policy for this virtual drive: WBack: In Writeback mode the controller sends a data transfer completion signal to the host when the controller cache has received all of the data in a transaction. This setting is recommended in Standard mode. WThru: In Writethrough mode the controller sends a data transfer completion signal to the host when the drive subsystem has received all of the data in a transaction. This is the default. Bad BBU: Select this mode if you want the controller to use Writeback mode but the controller has no BBU or the BBU is bad. If you do not choose this option, the controller firmware automatically switches to Writethrough mode if it detects a bad or missing BBU. CAUTION: LSI allows Writeback mode to be used with or without a battery. LSI recommends that you use either a battery to protect the controller cache, or an uninterruptible power supply (UPS) to protect the entire system. If you do not use a battery or a UPS, and there is a power failure, you risk losing the data in the controller cache. — IO Policy: The IO Policy applies to reads on a specific virtual drive. It does not affect the read ahead cache. Direct: In Direct I/O mode, reads are not buffered in cache memory. Data is transferred to the cache and the host concurrently. If the same data block is read again, it comes from cache memory. This is the default. Cached: In Cached I/O mode, all reads are buffered in cache memory. — Drive Policy: Specify the drive cache policy: Enable: Enable the drive cache. Disable: Disable the drive cache. This drive policy is the default. NoChange: Leave the current drive cache policy as is. This is the default. — Disable BGI: Specify the background initialization status: No: Leave background initialization enabled. This means that a new configuration can be initialized in the background while you use WebBIOS to do other configuration tasks. This is the default. Yes: Select Yes if you do not want to allow background initializations for configurations on this controller. — Select Size: Specify the size of the virtual drive in megabytes. Normally, this would be the full size for RAID 50 shown in the Configuration Panel on the right. You may specify a smaller size if you want to create other virtual drives on the same drive group. LSI Corporation Confidential | August 2009 Page 81 Chapter 4: WebBIOS Configuration Utility | Creating a Storage Configuration MegaRaid SAS Software User Guide 14. Click Accept to accept the changes to the virtual drive definition or click Reclaim to return to the previous settings. 15. Click Next when you are finished defining virtual drives. The Configuration Preview screen appears, as shown in Figure 41. Figure 41: RAID 50 Configuration Preview 16. Check the information in the configuration preview. 17. If the virtual drive configuration is acceptable, click Accept to save the configuration. Otherwise, click Back to return to the previous screens and change the configuration. 18. If you accept the configuration, click Yes at the prompt to save the configuration. The WebBIOS main menu appears. 4.4.3.8 Using Manual RAID 60 provides the features of both RAID 0 and RAID 6, and includes both parity and Configuration: RAID 60 drive striping across multiple drive groups. RAID 6 supports two independent parity blocks per stripe. A RAID 60 virtual drive can survive the loss of two drives in each of the RAID 6 sets without losing data. RAID 60 is best implemented on two RAID 6 drive groups with data striped across both drive groups. Use RAID 60 for data that requires a very high level of protection from loss. RAID 60 can support up to eight spans and tolerate up to 16 drive failures, though less than total drive capacity is available. Two drive failures can be tolerated in each RAID 6 level drive group. RAID 60 is appropriate when used with data that requires high reliability, high request rates, high data transfer, and medium to large capacity. When you select Manual Configuration and click Next, the Disk Group Definition screen appears. You use this screen to select drives to create drive groups. Page 82 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 4: WebBIOS Configuration Utility | Creating a Storage Configuration 1. Hold while selecting at least three ready drives in the Drives panel on the left. 2. Click Add To Array to move the drives to a proposed drive group configuration in the Disk Groups panel on the right. If you need to undo the changes, click the Reclaim button. 3. Click Accept DG to create a RAID 6 drive group. An icon for a second drive group displays in the right panel. 4. Click on the icon for the second drive group to select it. 5. Hold while selecting at least three more ready drives in the Drives panel to create a second drive group. 6. Click Add To Array to move the drives to a proposed drive group configuration in the Disk Groups panel on the right, as shown in Figure 42. If you need to undo the changes, click the Reclaim button. Figure 42: WebBIOS Disk Group Definition Screen 7. When you have finished selecting drives for the drive groups, select each drive group and click Accept DG for each. 8. Click Next. The Span Definition screen appears, as shown in Figure 43. This screen displays the drive group holes you can select to add to a span. LSI Corporation Confidential | August 2009 Page 83 Chapter 4: WebBIOS Configuration Utility | Creating a Storage Configuration MegaRaid SAS Software User Guide Figure 43: WebBIOS Span Definition Screen 9. Under the heading Array With Free Space, hold while you select a drive group of three or more drives, and click Add to SPAN. The drive group you select displays in the right frame under the heading Span. 10. Hold while you select a second drive group of three or more drives, and click Add to SPAN. Both drive groups display in the right frame under Span. 11. Click Next. The Virtual Drive Definition screen appears, as shown in Figure 44. You use this screen to select the RAID level, stripe size, read policy, and other attributes for the new virtual drive(s). 12. Hold while you select two 3-drive drive groups in the Configuration window on the right. Page 84 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 4: WebBIOS Configuration Utility | Creating a Storage Configuration Figure 44: WebBIOS Virtual Drive Definition Screen 13. Change the virtual drive options from the defaults listed on the screen as needed. Here are brief explanations of the virtual drive options: — RAID Level: The drop-down menu lists the possible RAID levels for the virtual drive. Select RAID 60. — Stripe Size: The stripe size specifies the length of the data segments that the RAID controller writes across multiple drives, not including parity drives. For example, consider a stripe that contains 64 KB of drive space and has 16 KB of data residing on each drive in the stripe. In this case, the stripe size is 64 KB and the strip size is 16 KB. You can set the stripe size to 8, 16, 32, 64, 128, 256, 512, and 1024 Kbytes. A larger stripe size produces higher read performance. If your computer regularly performs random read requests, choose a smaller stripe size. The default is 64 Kbytes. — Access Policy: Select the type of data access that is allowed for this virtual drive: RW: Allow read/write access. Read Only: Allow read-only access. This is the default. Blocked: Do not allow access. — Read Policy: Specify the read policy for this virtual drive: Normal: This disables the read ahead capability. This is the default. Ahead: This enables read ahead capability, which allows the controller to read sequentially ahead of requested data and to store the additional data in cache memory, anticipating that the data will be needed soon. This speeds up reads for sequential data, but there is little improvement when accessing random data. LSI Corporation Confidential | August 2009 Page 85 Chapter 4: WebBIOS Configuration Utility | Creating a Storage Configuration MegaRaid SAS Software User Guide Adaptive: When Adaptive read ahead is selected, the controller begins using read ahead if the two most recent drive accesses occurred in sequential sectors. If the read requests are random, the controller reverts to Normal (no read ahead). — Write Policy: Specify the write policy for this virtual drive: WBack: In Writeback mode the controller sends a data transfer completion signal to the host when the controller cache has received all of the data in a transaction. This setting is recommended in Standard mode. WThru: In Writethrough mode the controller sends a data transfer completion signal to the host when the drive subsystem has received all of the data in a transaction. This is the default. Bad BBU: Select this mode if you want the controller to use Writeback mode but the controller has no BBU or the BBU is bad. If you do not choose this option, the controller firmware automatically switches to Writethrough mode if it detects a bad or missing BBU. CAUTION: LSI allows Writeback mode to be used with or without a battery. LSI recommends that you use either a battery to protect the controller cache, or an uninterruptible power supply (UPS) to protect the entire system. If you do not use a battery or a UPS, and there is a power failure, you risk losing the data in the controller cache. — IO Policy: The IO Policy applies to reads on a specific virtual drive. It does not affect the read ahead cache. Direct: In Direct I/O mode, reads are not buffered in cache memory. Data is transferred to the cache and the host concurrently. If the same data block is read again, it comes from cache memory. This is the default. Cached: In Cached I/O mode, all reads are buffered in cache memory. — Drive Policy: Specify the drive cache policy: Enable: Enable the drive cache. Disable: Disable the drive cache. This drive policy is the default. NoChange: Leave the current drive cache policy as is. This is the default. — Disable BGI: Specify the background initialization status: No: Leave background initialization enabled. This means that a new configuration can be initialized in the background while you use WebBIOS to do other configuration tasks. This is the default. Yes: Select Yes if you do not want to allow background initializations for configurations on this controller. — Select Size: Specify the size of the virtual drive in megabytes. Normally, this would be the full size for RAID 60 shown in the Configuration panel on the right. You may specify a smaller size if you want to create other virtual drives on the same drive group. Page 86 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 4: WebBIOS Configuration Utility | Selecting Full Disk Encryption Security Options NOTE: WebBIOS does not not allow you to select 8 Kbytes as the stripe size when you create a RAID 60 drive group with six drives. 14. Click Accept to accept the changes to the virtual drive definition, or click Reclaim to return to the previous settings. 15. Click Next when you are finished defining virtual drives. The Configuration Preview screen appears, as shown in Figure 45. Figure 45: RAID 60 Configuration Preview 16. Check the information in the configuration preview. 17. If the virtual drive configuration is acceptable, click Accept to save the configuration. Otherwise, or click Back to return to the previous screens and change the configuration. 18. If you accept the configuration, click Yes at the prompt to save the configuration. The WebBIOS main menu appears. 4.5 Selecting Full Disk The Full Disk Encryption (FDE) feature provides the ability to encrypt data and use Encryption Security Options disk-based key management for the data security solution. This solution protects your data in case of theft or loss of physical drives. This section describes how to enable, change, or disable the drive security settings, and how to import a foreign configuration. 4.5.1 Enabling the Security Key Perform the following steps to enable the encryption settings for the security key Identifier, Security Key, and Passphrase identifier, security key, and passphrase. 1. Click Encryption Settings on the main WebBIOS screen. LSI Corporation Confidential | August 2009 Page 87 Chapter 4: WebBIOS Configuration Utility | Selecting Full Disk Encryption Security Options MegaRaid SAS Software User Guide The Encryption Settings screen appears, as shown in Figure 46. Figure 46: Encryption Settings Screen 2. To enable the drive security settings, select Enable drive security and click Accept. The Enable Drive Security – Introduction screen appears as shown in Figure 47. This screen lists the actions you can perform: editing the security key identifier, editing the security key, and adding or changing the pass phrase (optional). Figure 47: Enable Drive Security - Introduction Screen 3. Click Next. Page 88 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 4: WebBIOS Configuration Utility | Selecting Full Disk Encryption Security Options The screen used to create a security key identifier appears, as shown in Figure 48. Figure 48: Enable Drive Security – Enter Security Key ID Screen 4. Accept the default security key ID or enter a new security key ID. 5. Click Next. The Enable Drive Security – Enter Security Key screen appears as shown in Figure 49. Figure 49: Enable Drive Security – Enter Security Key LSI Corporation Confidential | August 2009 Page 89 Chapter 4: WebBIOS Configuration Utility | Selecting Full Disk Encryption Security Options MegaRaid SAS Software User Guide 6. Enter a new drive security key or click Suggest to fill the new security key. Enter the new drive security key again to confirm. The security key is case-sensitive. It must be between eight and thirty-two characters and contain at least one number, one lowercase letter, one uppercase letter, and one non-alphanumeric character (e.g. < > @ +). The space character is not permitted. 7. Click Next. The Enable Drive Security – Enter Pass Phrase screen appears as shown in Figure 50. You have the option to provide a pass phrase for additional security. Figure 50: Enable Drive Security – Enter Pass Phrase 8. If you want to use a pass phrase, click the checkbox Use a pass phrase in addition to the security key. 9. Enter a new pass phrase and then enter the new pass phrase again to confirm. The pass phrase is case-sensitive. It must be between eight and thirty-two characters and contain at least one number, one lowercase letter, one uppercase letter, and one non-alphanumeric character (e.g. < > @ +). The space character is not permitted. Non-US keyboard users must be careful not to enter DBCS characters in the pass phrase field or security key field. Firmware works only with the ASCII character set. 10. Click Accept. The Confirm Enable Drive Security screen appears, as shown in Figure 51 Page 90 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 4: WebBIOS Configuration Utility | Selecting Full Disk Encryption Security Options Figure 51: Confirm Enable Drive Security Screen 11. Click Yes on the Confirm Enable Drive Security screen to confirm that you want to enable the drive security settings. WebBIOS enables the security key ID, security key, and pass phrase (if applicable) that you entered and returns you to the main menu. CAUTION: If you forget the security key, you will lose access to your data. Be sure to record your security key information. You might need to enter the security key to perform certain operations. 4.5.2 Changing the Security Key If you selected disk-based encryption when you made the RAID configuration, the drive Identifier, Security Key, and Pass Phrase security will be enabled. Perform the following steps to change the encryption settings for the security key identifier, security key, and pass phrase. 1. Click Encryption Settings on the main WebBIOS screen. The Encryption Settings screen appears as shown in Figure 52. LSI Corporation Confidential | August 2009 Page 91 Chapter 4: WebBIOS Configuration Utility | Selecting Full Disk Encryption Security Options MegaRaid SAS Software User Guide Figure 52: Encryption Settings Screen 2. To change the drive security settings, select Change drive security settings... and click Accept. The Change Security Settings – Introduction screen appears as shown in Figure 53. This screen lists the optional actions you can perform: editing the security key identifier, editing the security key, and adding or changing the pass phrase. Figure 53: Change Security Settings – Introduction Page 92 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 4: WebBIOS Configuration Utility | Selecting Full Disk Encryption Security Options 3. To access the option to use the existing security key identifier or enter a new security key identifier, click Next. The Change Security Settings – Security Key ID screen appears as shown in Figure 54. Figure 54: Change Security Settings – Security Key ID 4. Choose whether you want to use the existing security key ID or enter a new security key ID. The options are: — Use the existing security key identifier (Current security key identifier). — Enter a new security key identifier (New security key identifier). 1. Click Next. The Change Security Settings – Security Key screen appears as shown in Figure 55. You have the option to use the existing security key or enter a new one. LSI Corporation Confidential | August 2009 Page 93 Chapter 4: WebBIOS Configuration Utility | Selecting Full Disk Encryption Security Options MegaRaid SAS Software User Guide Figure 55: Change Security Settings – Security Key 2. Choose whether you want to use the existing security key or enter a new security key. The options are: — Use the existing drive security key. — Enter a new drive security key. 3. If you choose to enter a new drive security key, you can create a new drive security key or click Suggest to fill the new security key. Enter the new drive security key again to confirm. The security key is case-sensitive. It must be between eight and thirty-two characters and contain at least one number, one lowercase letter, one uppercase letter, and one non-alphanumeric character (e.g. < > @ +). The space character is not permitted. 4. Click Next. If you entered a new drive security key, the Authenticate Drive Security Key screen appears as shown in Figure 56. Page 94 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 4: WebBIOS Configuration Utility | Selecting Full Disk Encryption Security Options Figure 56: Authenticate Drive Security Key 5. Enter the current security key and click OK. The text box for the security key can hold up to 32 characters. The key must be at least eight characters. After you enter the correct security key, the wizard returns to the Change Security Settings – Security Key screen. 6. Click Next. The Change Security Settings – Pass Phrase screen appears as shown in Figure 57. You have the option to provide a pass phrase for additional security. LSI Corporation Confidential | August 2009 Page 95 Chapter 4: WebBIOS Configuration Utility | Selecting Full Disk Encryption Security Options MegaRaid SAS Software User Guide Figure 57: Change Security Settings – Pass Phrase 7. If you want to use a pass phrase, click the checkbox Use a pass phrase in addition to the security key. 8. Enter a new pass phrase and then enter the new pass phrase again to confirm. The pass phrase is case-sensitive. It must be between eight and thirty-two characters and contain at least one number, one lowercase letter, one uppercase letter, and one non-alphanumeric character (e.g. < > @ +). The space character is not permitted. Non-US keyboard users must be careful not to enter DBCS characters in the pass phrase field or security key field. Firmware works only with the ASCII character set. 9. Click Accept. If you entered a new a pass phrase, the Authenticate Pass Phrase screen appears. 10. On the Authenticate Pass Phrase screen, enter the pass phrase and click Finish. The Confirm Change Drive Security Settings screen appears as shown in Figure 58. This screen lists the changes you made and asks you whether you want to confirm these changes. Page 96 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 4: WebBIOS Configuration Utility | Selecting Full Disk Encryption Security Options Figure 58: Confirm Change Drive Security Settings 11. Click Yes on the Confirm Change Drive Security Settings screen, confirm that you want to change the drive security settings. If the current security key is not needed, WebBIOS saves the changes to the security settings and returns you to the main menu. If the current security key is needed, the Authenicate Drive Security Settings screen displays. 4.5.3 Disabling the Drive Security Perform the following steps to disable the drive security settings. Settings NOTE: If you disable the drive security settings, you cannot create any new secure virtual drives. Disabling these settings does not affect the security or data of foreign drives. If you removed any drives that were previously secured, you will still need to enter the security key when you import them. 1. Click Encryption Settings on the main WebBIOS screen. The Encryption Settings screen appears as shown in Figure 59. LSI Corporation Confidential | August 2009 Page 97 Chapter 4: WebBIOS Configuration Utility | Selecting Full Disk Encryption Security Options MegaRaid SAS Software User Guide Figure 59: Encryption Settings 2. To disable the drive security settings, select Disable drive security and click Accept. The Confirm Disable Drive Security screen appears as shown in Figure 60. Figure 60: Confirm Disable Drive Security Settings 3. On the Confirm Disable Security Settings screen, click No to confirm that you want to disable the drive security settings. WebBIOS returns you to the MSM main menu. Page 98 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 4: WebBIOS Configuration Utility | Viewing and Changing Device Properties 4.5.4 Importing Foreign After you create a security key, you can run a scan for a foreign configuration and Configurations import a locked configuration. (You can import unsecured or unlocked configurations when security is disabled.) A foreign configuration is a RAID configuration that already exists on a replacement set of drives that you install in a computer system. You can use the WebBIOS utility to import the existing configuration to the RAID controller or clear the configuration so you can create a new one. See Section 4.8.3, Importing or Clearing a Foreign Configuration for the procedures used to import or clear a foreign configuration. To import a foreign configuration, you must first enable security to allow importation of locked foreign drives. If the drives are locked and the controller security is disabled, you cannot import the foreign drives. Only unlocked drives can be imported when security is disabled. After you enable the security, you can import the locked drives. To import the locked drives, you must provide the security key used to secure them. Verify whether any drives are left to import as the locked drives can use different security keys. If there are any drives left, repeat the import process for the remaining drives. After all of the drives are imported, there is no configuration to import. 4.6 Viewing and Changing This section explains how you can use the WebBIOS CU to view and change the Device Properties properties for controllers, virtual drives, drives, and BBUs. 4.6.1 Viewing and Changing WebBIOS displays information for one LSI SAS controller at a time. Controller Properties If your computer system has multiple LSI SAS controllers, you can view information for a different controller by clicking Controller Selection on the main screen. When the Controller Selection screen appears, select the controller you want from the list. To view the properties for the currently selected controller, click Controller Properties on the main WebBIOS screen. There are three Controller Properties screens. Figure 61 shows the first screen. Figure 61: First Controller Properties Screen LSI Corporation Confidential | August 2009 Page 99 Chapter 4: WebBIOS Configuration Utility | Viewing and Changing Device Properties MegaRaid SAS Software User Guide The information on this screen is read-only and cannot be modified directly. Most of this information is self-explanatory. The screen lists the number of virtual drives that are already defined on this controller, and the number of drives connected to the controller. If a background initialization is in progress, you can click Background Init Progress to determine its state of completion. Click Next to view the second Controller Properties screen, as shown in Figure 62. Figure 62: Second Controller Properties Screen Click Next to view the third Controller Properties screen, as shown in Figure 63. Page 100 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 4: WebBIOS Configuration Utility | Viewing and Changing Device Properties Figure 63: Third Controller Properties Screen Table 20 describes the entries/options listed on the second and third Controller Properties screen. LSI recommends that you leave these options at their default settings to achieve the best performance, unless you have a specific reason for changing them. Table 20: Controller Properties Menu Options Option Description Battery Backup This entry indicates whether the selected controller has a BBU. If present, you can click Present to view information about the BBU. For more information, see Section 4.6.4, Viewing and Changing Battery Backup Unit Information Set Factory Defaults Use this option to load the default MegaRAID® WebBIOS CU settings. The default is No. Cluster Mode Use this option to enable or disable Cluster mode. The default is Disabled. A cluster is a grouping of independent servers that can access the same data storage and provide services to a common set of clients. When Cluster mode is disabled, the system operates in Standard mode. Rebuild Rate Use this option to select the rebuild rate for drives connected to the selected controller. The default is 30 percent. The rebuild rate is the percentage of system resources dedicated to rebuilding a failed drive. The higher the number, the more system resources devoted to a rebuild. BGI Rate Use this option to select the amount of system resources dedicated to background initialization of virtual drives connected to the selected controller. The default is 30 percent. CC Rate Use this option to select the amount of system resources dedicated to consistency checks of virtual drives connected to the selected controller. The default is 30 percent. LSI Corporation Confidential | August 2009 Page 101 Chapter 4: WebBIOS Configuration Utility | Viewing and Changing Device Properties MegaRaid SAS Software User Guide Table 20: Controller Properties Menu Options (Continued) Option Description Reconstruction Rate Use this option to select the amount of system resources dedicated to reconstruction of drives connected to the selected controller. The default is 30 percent. Controller BIOS Use this option to enable or disable the BIOS for the selected controller. The default is Enabled. If the boot device is on the selected controller, the BIOS must be enabled; otherwise, the BIOS should be disabled or it might not be possible to use a boot device elsewhere. NCQ Native Command Queuing (NCQ) gives an individual drive the ability to optimize the order in which it executes the read and write commands. The default is Enabled. Connector 1 Identifies where the chain of enclosures is connected to the RAID controller. Coercion Mode Drive coercion is a tool for forcing drives of varying capacities to the same size so they can be used in a drive group. The coercion mode options are None, 128MB-way, and 1GB-way. The default is None. The number you choose depends on how much the drives from various vendors vary in their actual size. LSI recommends that you use the 1GB coercion mode option. S.M.A.R.T. Polling Use this option to determine how frequently the controller polls for drives reporting a Predictive Drive Failure (S.M.A.R.T.: Self-Monitoring Analysis and Reporting Technology error). The default is 300 seconds (5 minutes). Alarm Control Select this option to enable, disable, or silence the onboard alarm tone generator on the controller. The default is Disabled. Patrol Read Rate Use this option to select the rate for patrol reads for drives connected to the selected controller. The default is 30 percent. The patrol read rate is the percentage of system resources dedicated to running a patrol read. See Section 5.5, Patrol Read-Related Controller Properties for additional information about patrol read. Cache Flush Interval Use this option to control the interval (in seconds) at which the contents of the onboard data cache are flushed. The default is 4 seconds. Spinup Drive Count Use this option to control the number of drives that spin up simultaneously. The default is 2 drives. Spinup Delay Use this option to control the interval (in seconds) between spinup of drives connected to this controller. The delay prevents a drain on the system’s power supply that would occur if all drives spun up at the same time. The default is 12 seconds. StopOnError Enable this option if you want the boot process to stop when the controller BIOS encounters an error during boot-up. The default is Disabled. Page 102 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 4: WebBIOS Configuration Utility | Viewing and Changing Device Properties Table 20: Controller Properties Menu Options (Continued) Option Description Drive Powersave Drive Powersave conserves energy by placing certain unused drives into powersave mode. Use this field to choose whether to allow unconfigured drives to enter powersave mode. When this option is selected, unconfigured drives may be spun down. When not selected, these drives are not spun down. The controller will automatically spin up drives from powersave mode whenever necessary. The powersave option is not selected by default. You have to select it to enable the spin-down of drives. Connector 2 Identifies where the chain of enclosures is connected to the RAID controller. Stop CC on Error Enable this option if you want to stop a consistency check when the controller BIOS encounters an error. The default is No. Maintain PD Fail Enable this option to maintain the history of all drive failures. The History default is Enabled. Schedule CC Indicates whether the option to schedule the date and time for a consistency check is supported. If you make changes to the options on this screen, click Submit to register them. If you change your mind, click Reset to return the options to their default values. 4.6.2 Viewing and Changing Virtual Access the Virtual Drive screen by clicking on a virtual drive in the list of virtual drives in Drive Properties the right panel on the WebBIOS CU main screen. The Virtual Drive screen displays, as shown in Figure 64. Figure 64: Virtual Drive Screen LSI Corporation Confidential | August 2009 Page 103 Chapter 4: WebBIOS Configuration Utility | Viewing and Changing Device Properties MegaRaid SAS Software User Guide The Properties panel of this screen displays the virtual drive’s RAID level, state, size, and stripe size. The Policies panel lists the virtual drive policies that were defined when the storage configuration was created. For information about these policies, see Section 4.4.3, Using Manual Configuration To change any of these policies, make a selection from the drop-down menu and click Change. The Operations panel lists operations that can be performed on the virtual drive. To perform an operation, select it and click Go. Then choose from the following options: Select Del to delete this virtual drive. For more information, see Section 4.8.2, Deleting a Virtual Drive Select Locate to make the LEDs flash on the drives used by this virtual drive. This works only if the drives are installed in a drive enclosure that supports SAFTE. Select Fast Init or Slow Init to initialize this virtual drive. A fast initialization quickly writes zeroes to the first and last 10 Mbyte regions of the new virtual drive and then completes the initialization in the background. A slow initialization is not complete until the entire virtual drive has been initialized with zeroes. It is seldom necessary to use this option, because the virtual drive was already initialized when you created it. CAUTION: Before you run an initialization, back up any data on the virtual drive that you want to save. All data on the virtual drive is lost when you initialize it. Select CC to run a consistency check on this virtual drive. For more information, see Section 4.8.1, Running a Consistency Check (This option is not available for RAID 0 virtual drives.) In the right panel of the Virtual Drive screen you can change the virtual drive configuration by adding or removing a drive or by changing the RAID level. CAUTION: Before you change a virtual drive configuration, back up any data on the virtual drive that you want to save. To remove a drive from a virtual drive, select the drive in the small panel beneath the Remove drive option. Then select Remove drive and click Go at the bottom of the panel. See Section 4.8.4, Migrating the RAID Level of a Virtual Drive for information about adding a drive to a virtual drive or migrating its RAID level. 4.6.3 Viewing Drive Properties The Physical Drive screen displays the properties of a selected drive and enables you to perform operations on the drive. There are two ways to access the Physical Drive screen: On the main menu screen, click on a drive in the right panel under the heading Physical Drives. On the main menu screen, click on Physical Drives in the left panel to display the Physical Drive screen. Then click on a drive in the right panel. Click on the Properties button, and click Go. The properties for the selected drive displays. Page 104 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 4: WebBIOS Configuration Utility | Viewing and Changing Device Properties Figure 65 shows the Physical Drive screen. Figure 65: Physical Drive Screen The drive properties are view-only and are self-explanatory. Note that the properties include the state of the drive. Operations you can perform are listed at the bottom of the screen. After you select an operation, click Go to start the operation. The operations vary depending on the drive state. If the drive state is Online, the following operations appear: Select MakeDriveOffline if you want to force the drive offline. NOTE: If you force offline a good drive that is part of a redundant drive group with a hot spare, the drive will rebuild to the hot spare drive. The drive you forced offline will go into the Unconfigured Bad state. Access the BIOS utility to set the drive to the Unconfigured Good state. Select Locate to make the LED flash on the drive. This works only if the drive is installed in a drive enclosure. If the drive state is Unconfigured Good, four additional operations appear on this screen: Select Make Global HSP to make a global hot spare, available to all of the virtual drives. Select Make Dedicated HSP to make a hot spare dedicated to a specific virtual drive. WebBIOS displays the global hot spare as Global and the dedicated hot spare as Ded. The icon for the dedicated hot spare displays under its associated virtual drive. The drive number, drive state, drive capacity, and drive manufacturer display. Select Enclosure Affinity so if there are drive failures present on a split backplane configuration, then the hot spare will be used first on the backplane side that it resides in. LSI Corporation Confidential | August 2009 Page 105 Chapter 4: WebBIOS Configuration Utility | Viewing and Changing Device Properties MegaRaid SAS Software User Guide Select Prepare for Removal to prepare the drive for removal from the enclosure. The Prepare for Removal feature is different from spinning a drive down into powersave mode because it also involves flagging the drive as ready to remove. Therefore, if you choose to prepare a drive for removal, Ready to Remove displays in the device tree for that drive, instead of Powersave. 4.6.4 Viewing and Changing Battery If your SAS controller has a battery backup unit (BBU), you can view information about Backup Unit Information it and change some settings. To do this, follow these steps: 1. Click Controller Properties on the WebBIOS CU main menu screen. The first Controller Properties screen appears, as shown in Figure 66. Figure 66: First Controller Properties Screen 2. Click Next to view the second Controller Properties screen. The second Controller Properties screen appears, as shown in Figure 67. The Battery Backup field at the top left of the screen indicates whether the iBBU is present. Page 106 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 4: WebBIOS Configuration Utility | Viewing and Changing Device Properties Figure 67: Second Controller Properties Screen 3. Click Present in the Battery Backup field. The Battery Module screen appears, as shown in Figure 68. This screen contains the following information: — Battery information — Design information — Capacity information — Auto Learn properties and settings Figure 68: Battery Module Screen LSI Corporation Confidential | August 2009 Page 107 Chapter 4: WebBIOS Configuration Utility | Viewing System Event Information MegaRaid SAS Software User Guide Most of the Battery Module properties are view-only and are self-explanatory. In the lower right corner of the screen are the auto learn options. A learning cycle is a battery calibration operation performed by the controller periodically to determine the condition of the battery. You can change the learn delay interval (the length of time between automatic learning cycles) and the auto learn mode. NOTE: LSI recommends leaving the the learn delay interval and the auto learn mode at their default settings. Setting the Learn Delay Interval The learn delay interval is the length of time between automatic learning cycles. Perform the following steps to change the interval: a. Open the drop-down menu in the Auto Learn Mode field. b. Select the learn mode as Auto (the default). This is so the controller performs the learning cycle automatically. c. Change the number of hours in the Learn Delay Interval field. You can delay the start of the learn cycles for up to 168 hours (7 days). d. Click Go to set the interval. Setting the Auto Learn Mode You can start battery learning cycles manually or automatically. The Auto Learn modes are: — BBU Auto Learn: Firmware tracks the time since the last learning cycle and performs a learn cycle when due. — BBU Auto Learn Disabled: Firmware does not monitor or initiate a learning cycle. You can schedule learning cycles manually. — BBU Auto Learn Warn: Firmware warns about a pending learning cycle. You can initiate a learning cycle manually. After the learning cycle is complete, firmware resets the counter and warns you when the next learning cycle time is reached. Perform the following steps to choose an auto learn mode: a. Open the drop-down menu in the Auto Learn Mode field. b. Select an auto learn mode. c. Click Go to set the auto learn mode. NOTE: When you replace the iBBU, the charge cycle counter is reset automatically. 4.7 Viewing System Event The SAS controller firmware monitors the activity and performance of all storage Information configurations and devices in the system. When an event occurs (such as the creation of a new virtual drive or the removal of a drive) an event message is generated and is stored in the controller NVRAM. Page 108 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 4: WebBIOS Configuration Utility | Managing Configurations You can use the WebBIOS CU to view these event messages. To do this, click Events on the main WebBIOS CU screen. The Event Information screen appears, as shown in Figure 69. Figure 69: Event Information Screen The right side of the screen is blank until you select an event to view. The First Sequence and Last Sequence fields in the upper left of the screen show you how many event entries are currently stored. To view event information, follow these steps: 1. Select an Event Locale from the menu. For example, select Enclosure to view events relating to the drive enclosure. 2. Select an Event Class: Information, Warning, Critical, Fatal, or Dead. 3. Enter a Start Sequence number, between the First Sequence and Last Sequence numbers. The higher the number, the more recent the event. 4. Enter the Number of events of this type that you want to view, and click Go. The first event in the sequence appears in the right panel. 5. Click Next or Prev to page forward or backward through the sequence of events. 6. If you want, select different event criteria in the left panel, and click Go again to view a different sequence of events. Each event entry includes a timestamp and a description to help you determine when the event occurred and what it was. 4.8 Managing Configurations This section includes information about maintaining and managing storage configurations. LSI Corporation Confidential | August 2009 Page 109 Chapter 4: WebBIOS Configuration Utility | Managing Configurations MegaRaid SAS Software User Guide 4.8.1 Running a Consistency Check You should periodically run a consistency check on fault-tolerant virtual drives. A consistency check verifies that the redundancy data is correct and available for RAID 1, RAID 5, RAID 6, RAID 10, RAID 50, and RAID 60 drive groups. To do this, follow these steps: 1. On the main WebBIOS CU screen, select a virtual drive. 2. Click Virtual Drives. 3. When the Virtual Drive screen appears, select CC in the lower left panel, and click Go. The consistency check begins. If the WebBIOS CU finds a difference between the data and the parity value on the redundant drive group, it assumes that the data is accurate and automatically corrects the parity value. Be sure to back up the data before running a consistency check if you think the data might be corrupted. 4.8.2 Deleting a Virtual Drive You can delete any virtual drive on the controller if you want to reuse that space for a new virtual drive. The WebBIOS CU provides a list of configurable drive groups where there is a space to configure. If multiple virtual drives are defined on a single drive group, you can delete a virtual drive without deleting the whole drive group. To delete a virtual drive, follow these steps: CAUTION: Back up any data that you want to keep before you delete the virtual drive. 1. On the main WebBIOS CU screen, select a virtual drive. 2. Click Virtual Drives. 3. When the Virtual Drive screen appears, select Del in the lower left panel, and click Go. 4. When the message appears, confirm that you want to delete the virtual drive. 4.8.3 Importing or Clearing a A foreign configuration is a storage configuration that already exists on a replacement Foreign Configuration set of drives that you install in a computer system. In addition, if one or more drives are removed from a configuration, by a cable pull or drive removal, for example, the configuration on those drives is considered a foreign configuration by the RAID controller. The BIOS CU allows you to import the foreign configuration to the RAID controller, or to clear the configuration so you can create a new configuration using these drives. NOTE: When you create a new configuration, the WebBIOS CU shows only the unconfigured drives. Drives that have existing configurations, including foreign configurations, will not appear. To use drives with existing configurations, you must first clear the configuration on those drives. If WebBIOS CU detects a foreign configuration, the import screen appears, as shown in Figure 70. Page 110 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 4: WebBIOS Configuration Utility | Managing Configurations Figure 70: Foreign Configuration Import Screen The GUID (Global Unique Identifier) entries on the drop-down list are OEM names and will vary from one installation to another. Click Preview if you want to preview the foreign configuration. The preview screen appears, as shown in Figure 71. Click Clear if you want to clear the configuration and reuse the drives for another virtual drive. Click Cancel to cancel the importation or preview of the configuration. Figure 71: Foreign Configuration Preview Screen LSI Corporation Confidential | August 2009 Page 111 Chapter 4: WebBIOS Configuration Utility | Managing Configurations MegaRaid SAS Software User Guide The right panel shows the virtual drive properties of the foreign configuration. In this example, there is a RAID 1 virtual drive with 1,000 Mbytes. The left panel shows the drives that comprise the foreign configuration. Click Import to import this foreign configuration and use it on this controller. Click Cancel to clear the configuration and reuse the drives for another virtual drive. 4.8.3.1 Foreign Configurations If one or more drives are removed from a configuration, by a cable pull or drive in Cable Pull and Drive Removal removal, for example, the configuration on those drives is considered a foreign Scenarios configuration by the RAID controller. Use the Foreign Configuration Preview screen to import or clear the foreign configuration in each case. The import procedure and clear procedure are described in Section 4.8.3, Importing or Clearing a Foreign Configuration The following scenarios can occur with cable pulls or drive removals. NOTE: If you want to import the foreign configuration in any of the following scenarios, you should have all of the drives in the enclosure before you perform the import operation. Scenario #1: If all of the drives in a configuration are removed and re-inserted, the controller considers the drives to have foreign configurations. Import or clear the foreign configuration. If you select Import, automatic rebuilds will occur in redundant virtual drives. NOTE: Start a consistency check immediately after the rebuild is complete to ensure data integrity for the virtual drives. See Section 4.8.1, Running a Consistency Check for more information about checking data consistency. Scenario #2: If some of the drives in a configuration are removed and re-inserted, the controller considers the drives to have foreign configurations. Import or clear the foreign configuration. If you select Import, automatic rebuilds will occur in redundant virtual drives. NOTE: Start a consistency check immediately after the rebuild is complete to ensure data integrity for the virtual drives. See Section 4.8.1, Running a Consistency Check for more information about checking data consistency. Scenario #3: If all of the drives in a virtual drive are removed, but at different times, and re-inserted, the controller considers the drives to have foreign configurations. Import or clear the foreign configuration. If you select Import, all drives that were pulled before the virtual drive became offline will be imported and then automatically rebuilt. Automatic rebuilds will occur in redundant virtual drives. Page 112 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 4: WebBIOS Configuration Utility | Managing Configurations If the drives in a non-redundant virtual drive are removed, the controller considers the drives to have foreign configurations. Import or clear the foreign configuration. No rebuilds will occur after the import operation because there is no redundant data to rebuild the drives with. 4.8.3.2 Importing Foreign The LSI Integrated RAID solution simplifies the configuration options and provides Configurations from Integrated firmware support in its host controllers. LSI offers two types of Integrated RAID (IR): RAID to MegaRAID Integrated Mirroring (IM) and Integrated Striping (IS). You can import an IM or IS RAID configuration from an IR system into a MegaRAID system. The MegaRAID system treats the IR configuration as a foreign configuration. You can import or clear the IR configuration. NOTE: For more information about Integrated RAID, refer to the Integrated RAID for SAS User’s Guide. You can find this document on the LSI web site at: http://www.lsi.com/cm/DownloadSearch.do. 4.8.3.3 Troubleshooting An IR virtual drive can have either 64 Mbytes or 512 Mbytes available for metadata at Information the end of the drive. This data is in LSI Data Format (LDF). MegaRAID virtual drives have 512 Mbytes for metadata at the end of the drive in the Disk Data format (DDF). To import an IR virtual drive into MegaRAID, the IR virtual drive must have 512 Mbytes in the metadata, which is the same amount of megadata as in a MegaRAID virtual drive. If the IR virtual drive has only 64 Mbytes when you attempt to import it into MegaRAID, the import will fail because the last 448 Mbytes of your data will be overwritten and the data lost. If your IR virtual drive has only 64 Mbytes for metadata at the end of the drive, you cannot import the virtual drive into MegaRAID. You need to use another upgrade method, such as backup/restore to the upgraded virtual drive type. In order to import an IR virtual drive into a MegaRAID system, use the Foreign Configuration Preview screen to import or clear the foreign configuration. The import procedure and the clear procedure are described in Section 4.8.3, Importing or Clearing a Foreign Configuration 4.8.4 Migrating the RAID Level of a As the amount of data and the number of drives in your system increase, you can use Virtual Drive RAID-level migration to change a virtual drive from one RAID level to another. You do not have to power down or reboot the system. When you migrate a virtual drive, you can keep the same number of drives, or you can add drives. You can use the WebBIOS CU to migrate the RAID level of an existing virtual drive. NOTE: While you can apply RAID-level migration at any time, LSI recommends that you do so when there are no reboots. Many operating systems issues I/O operations serially (one at a time) during boot. With a RAID-level migration running, a boot can often take more than 15 minutes. Migrations are allowed for the following RAID levels: RAID 0 to RAID 1 RAID 0 to RAID 5 LSI Corporation Confidential | August 2009 Page 113 Chapter 4: WebBIOS Configuration Utility | Managing Configurations MegaRaid SAS Software User Guide RAID 0 to RAID 6 RAID 1 to RAID 0 RAID 1 to RAID 5 RAID 1 to RAID 6 RAID 5 to RAID 0 RAID 5 to RAID 6 RAID 6 to RAID 0 RAID 6 to RAID 5 Table 21 lists the number of additional drives required when you change the RAID level of a virtual drive. Table 21: Additional Drives Required for RAID-Level Migration Original Number of Drives in Drive Additional Drives From RAID Level to RAID Level Group Required RAID 0 to RAID 1 RAID 0: 1 drive 1 RAID 0 to RAID 5 RAID 0: 1 drive 2 RAID 0 to RAID 6 RAID 0: 1 drive 3 RAID 1 to RAID 5 RAID 1: 2 drives 1 RAID 1 to RAID 6 RAID 1: 2 drives 1 Follow these steps to migrate the RAID level: CAUTION: Back up any data that you want to keep before you change the RAID level of the virtual drive. 1. On the main WebBIOS CU screen, select a virtual drive. 2. Click Virtual Drives. 3. When the Virtual Drive screen appears, select Migration only (and skip to step 6) or Migration with addition in the right panel. 4. If you selected Migration with addition, select one or more drives from the small window in the lower right of the screen. 5. Select a new RAID level from the drop-down menu on the right. The available RAID levels are limited, based on the current RAID level of the virtual drive plus the number of drives available. 6. When you have made your selections, click Go at the bottom of the right panel. 7. When the message appears, confirm that you want to migrate the RAID level of the virtual drive. A reconstruction operation begins on the virtual drive. You must wait until the reconstruction is completed before you perform any other tasks in the WebBIOS CU. Page 114 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 5: MegaRAID Command Tool | Product Overview Chapter 5 MegaRAID Command Tool This is the Summary tag that provides a short description of the chapter or document. It can be more that one line, but should be short. The MegaRAID Command Tool (CT) is a command line interface (CLI) application for SAS. You can use this utility to configure, monitor, and maintain MegaRAID SAS RAID controllers and the devices connected to them. NOTE: The CT supports only the MegaRAID controller. It supports SAS and SATA II, but it does not support other types of MegaRAID controllers, such as U320, SATA I, or IDE. NOTE: The IA-64 release for Windows is similar to the 32-bit release, so you can follow the 32-bit instructions. 32-bit applications that were validated on an x64 system, such as the Intel Markette system, can use the 32-bit instructions, also. 5.1 Product Overview The MegaCLI Configuration Utility is a command line interface application you can use to manage MegaRAID SAS RAID controllers. You can use MegaCLI Configuration Utility to perform the following tasks: Configure MegaRAID SAS RAID controllers and attached devices Display information about virtual drives and drives for the controller and other storage components Display ongoing progress for operations on drives and virtual drives Change properties for the virtual drives and drives for the controller and other storage components Set, retrieve, and verify controller default settings Change the firmware on the controllers Monitor the RAID storage systems Support RAID levels 0, 1, 5, 6, 10, 50, and 60 (depending on the RAID controller) Create and use scripts with the scriptable CLI tool Configure drive into groups and virtual drives on the controller Display configuration information for the controller, drives, and virtual drives Change virtual drive properties on the controller Change drive properties on the controller Display controller properties Load configuration to the controller from a file Save the controller configuration to a file LSI Corporation Confidential | August 2009 Page 115 Chapter 5: MegaRAID Command Tool | Novell NetWare, SCO, Solaris, FreeBSD, and DOS Op- MegaRaid SAS Software User Guide erating System Support Start or stop a rebuild, consistency check (CC), or initialization operation Enable or disable a background initialization (BGI) Stop or display an ongoing background initialization Start or display a reconstruction Start or stop patrol read Set and retrieve patol read related settings Flash new firmware on the SAS RAID controller Read and program NVRAM and flash memory directly into DOS Display relevant messages on the console and/or in the log file Display controller data using one command Exit with predefined success or failure exit codes Scan, preview, and import foreign configurations Set predefined environment variables, such as the number of controllers and virtual drives Display firmware event logs Display help for how to use the command line options: Display battery unit properties Display enclosure properties Display and set connector mode on supported controllers The following sections describe the command line options in the MegaCLI Configuration Utility that you can use to perform these functions. NOTE: The MegaCLI Configuration Utility has support for the Intel® Itanium (64-bit) platform. MegaCLI is the only application currently supported on IPF system. 5.2 Novell NetWare, SCO, The MegaCLI Configuration Utility functions under the Novell® NetWare®, SCO® Solaris, FreeBSD, and DOS OpenServer™, SCO UnixWare®, Solaris, FreeBSD, and DOS operating systems in the same Operating System Support way that it does under the Windows and Linux operating systems. All of the commands supported for the Windows and Linux operating systems are supported for the NetWare, SCO, and Solaris operating systems as well. For the SCO OpenServer and SCO UnixWare operating systems, LSI provides an executable file that you can execute from any folder, and an image of the same executable file on a floppy drive. The image filename is MegaCLI.image. The floppy disk is provided so that you can distribute MegaCLI and install the executable file later as needed. For the Solaris operating system, LSI provides an executable file that you can execute from any folder. No installation is required. For the Novell NetWare operating system, LSI provides an executable file, MegaCLI.nlm, that you can execute from any folder. No installation is required. The output of all of the commands appears in the console window. Page 116 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 5: MegaRAID Command Tool | Command Line Abbreviations and Conventions 5.3 Command Line This section explains the abbreviations and conventions used with MegaCLI Abbreviations and Conventions Configuration Utility commands. 5.3.1 Abbreviations Used in the Table 22 lists the abbreviations for the virtual drive parameters used in the following Command Line sections. Table 22: Command Line Abbreviations Abbreviation Description WB WriteBack write policy WT WriteThrough write policy ADRA Adaptive Read Ahead read policy RA Read Ahead read policy NORA Normal Read policy (No read ahead) DIO Direct I/O cache policy CIO Cached I/O cache policy 5.3.2 Conventions There are some options for which you can specify multiple values. You can enter commands for a single controller ( aN), multiple controllers (-a0,1,2) or work on all present controllers (-aALL). This is denoted as aN|-a0,1,2|-aALL in this document and specifies that you can enter commands for one controller, multiple controllers, or all controllers. NOTE: All options in the MegaRAID Command Tool are position-dependent, unless otherwise specified. Table 23 describes the conventions used in the options. Table 23: Conventions Convention Description | Specifies “or,” meaning you can choose between options. -aN N specifies the controller number for the command. -a0,1,2 Specifies the command is for controllers 0, 1, and 2. You can select two or more controllers in this manner. -aALL Specifies the command is for all controllers. -Lx x specifies the virtual drive number for the command. -L0,1,2 Specifies the command is for virtual drives 0, 1, and 2. You can select two or more virtual drives in this manner. -Lall Specifies the command is for all virtual drives. LSI Corporation Confidential | August 2009 Page 117 Chapter 5: MegaRAID Command Tool | Controller Property-Related Options MegaRaid SAS Software User Guide Table 23: Conventions (Continued) Convention Description [E0:S0,E1,S1 Specifies when one or more physical devices need(s) to be specified in the , ] command line. Each [E:S] pair specifies one physical device where E means device ID of the enclosure in which a drive resides, and S means the slot number of the enclosure. In the case of a physical device directly connected to the SAS port on the controller, with no enclosure involved, the format of [:S] can be used where S means the port number on the controller. For devices attached through the backplane, the firmware provides an enclosure device ID and MegaCLI expects the user input in the format of [E:S]. In the following sections, only the format, [E:S], is used in the command descriptions, although both formats are valid. [ ] Indicates that the parameter is optional except when it is used to specify physical devices. For example, [WT] means the write policy (WriteThrough) is optional. If you enter WT at the command line, the application will use WriteThrough write policy for the virtual drive. Otherwise, it uses the default value for the parameter. { } Indicates that the parameters are grouped and that they must be given at the same time. You can specify the -Silent command line option for all possible functions of the MegaCLI Configuration Utility. If you enter this option at the command line, no message displays on the screen. 5.4 Controller You can use the commands in this section to set or display properties related to the Property-Related Options controller(s), such as the virtual drive parameters and factory defaults. 5.4.1 Display Controller Properties Use the command in Table 24 to display parameters for the selected controller(s). Table 24: Controller Parameters Convention MegaCli -AdpAllinfo -aN|-a0,1,2|-aALL Description Displays information about the controller, including cluster state, BIOS, alarm, firmware version, BIOS version, battery charge counter value, rebuild rate, bus number/device number, present RAM, memory size, serial number of the board, and SAS address. 5.4.2 Display Number of Controllers Use the command in Table 25 to display the number of controllers supported on the Supported system. Table 25: Number of Controllers Supported Convention MegaCli -AdpCount Description Displays the number of controllers supported on the system and returns the number to the operating system. Page 118 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 5: MegaRAID Command Tool | Controller Property-Related Options 5.4.3 Enable or Disable Automatic Use the command in Table 26 to turn automatic rebuild on or off for the selected Rebuild controller(s). If you have configured hot spares and enabled automatic rebuild, the RAID controller automatically tries to use them to rebuild failed drives. Automatic rebuild also controls whether a rebuild will start when a drive that was part of the drive group is reinserted. Table 26: Enable or Disable Automatic Rebuild Convention MegaCli AdpAutoRbld -Enbl|-Dsbl|-Dsply -aN|-a0,1,2|-aALL Description Enables or disables automatic rebuild on the selected controller(s). The -Dsply option shows the status of the automatic rebuild state. 5.4.4 Flush Controller Cache Use the command in Table 27 to flush the controller cache on the selected controller(s). This option sends the contents of cache memory to the virtual drive(s). If the MegaRAID system must be powered down rapidly, you must flush the contents of the cache memory to preserve data integrity. Table 27: Cache Flush on Selected Controller Convention MegaCli AdpCacheFlush -aN|-a0,1,2|-aALL Description Flushes the controller cache on the selected controller(s). 5.4.5 Set Controller Properties This command sets the properties on the selected controller(s). For example, for {RebuildRate -val}, you can enter a percentage between 0 percent and 100 percent as the value for the rebuild rate. (The rebuild rate is the percentage of the compute cycles dedicated to rebuilding failed drives.) At 0 percent, the rebuild is done only if the system is not doing anything else. At 100 percent, the rebuild has a higher priority than any other system activity. NOTE: LSI recommends the default rebuild rate of 30 percent, and the default patrol read rate of 30 percent. Use the command in Table 28 to display the list of properties you can set for the controller(s). LSI Corporation Confidential | August 2009 Page 119 Chapter 5: MegaRAID Command Tool | Controller Property-Related Options MegaRaid SAS Software User Guide Table 28: Set Controller Properties Convention MegaCli AdpSetProp {CacheFlushInterval val}|{RebuildRate -val}| {PatrolReadRate val}|{BgiRate val}|{CCRate val}| {ReconRate val}| {SpinupDriveCount val}|{SpinupDelay val}|{CoercionMode val} | {ClusterEnable val}|{PredFailPollInterval val}| {BatWarnDsbl val}| {EccBucketSize val}|{EccBucketLeakRate val}|{AbortCCOnError val}|AlarmEnbl | AlarmDsbl | AlarmSilence |{SMARTCpyBkEnbl val} | -AutoDetectBackPlaneDsbl | -CopyBackDsbl | -LoadBalanceMode | NCQEnbl | NCQDsbl | {SSDSMARTCpyBkEnbl -val} | {MaintainPdFailHistoryEnbl -val} | {EnblSpinDownUnConfigDrvs -val} | {EnblSSDPatrolRead -val} | AutoEnhancedImportEnbl | AutoEnhancedImportDsbl | {-UseFDEOnlyEncrypt -val} | {-PrCorrectUncfgdAreas -val} | -aN| -a0,1,2|-aALL Description Sets the properties on the selected controller(s). The possible settings are: CacheFlushInterval: Cache flush interval in seconds. Values: 0 to 255. RebuildRate: Rebuild rate. Values: 0 to 100. PatrolReadRate: Patrol read rate. Values: 0 to 100. BgiRate: Background initilization rate. Values: 0 to 100. CCRate: Consistency check rate. Values: 0 to 100. ReconRate: Reconstruction rate. Values: 0 to 100. SpinupDriveCount: Max number of drives to spin up at one time. Values: 0 to 255. SpinupDelay: Number of seconds to delay among spinup groups. Values: 0 to 255. CoercionMode: Drive capacity Coercion mode. Values: 0 - None, 1 - 128 Mbytes, 2 - 1 Gbytes. ClusterEnable: Cluster is enabled or disabled. Values: 0 - Disabled, 1 - Enabled. PredFailPollInterval: Number of seconds between predicted fail polls. Values: 0 to 65535. BatWarnDsbl: Disable warnings for missing battery or missing hardware. Values: 0 - Enabled, 1 - Disabled. EccBucketSize: Size of ECC single-bit-error bucket. Values: 0 to 255. EccBucketLeakRate: Leak rate (in minutes) of ECC single-bit-error bucket. Values: 0 to 65535. AbortCCOnError: AlarmEnbl: Set alarm to Enabled. AlarmDsbl: Set alarm to Disabled. AlarmSilence: Silence an active alarm. SMARTCpyBkEnbl: Enable copyback operation on Self-Monitoring Analysis and Reporting Technology (SMART) errors. Copyback is initiated when the first SMART error occurs on a drive that is part of a virtual drive. AutoDetectBackPlaneDsbl: Detect automatically if the backplane has been disabled. CopyBackDsbl: Disable or enable the copyback operation. LoadBalanceMode: Disable or enable the load balancing mode. NCQEnbl: Enable the native command queueing. NCQDsbl: Disable the native command queueing. SSDSMARTCpyBkEnbl: Enable copyback operation on Self-Monitoring Analysis and Reporting Technology (SMART) errors on a Solid State Drive (SSD). Copyback is initiated when the first SMART error occurs on a SSD that is part of a virtual drive. MaintainPdFailHistoryEnbl: Enable maintenance of the history of a failed drive. EnblSpinDownUnConfigDrvs: Enable spindown of unconfigured drives. EnblSSDPatrolRead: Enable the patrol read operation (media scan) on a SSD. AutoEnhancedImportEnbl: Enable the automatic enhanced import of foreign drives. AutoEnhancedImportDsbl: Disable the automatic enhanced import of foreign drives. UseFDEOnlyEncrypt: Use encryption on FDE drives only. PrCorrectUncfgdAreas: Page 120 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 5: MegaRAID Command Tool | Controller Property-Related Options 5.4.6 Display Specified Controller Use the command in Table 29 to display specified properties on the selected Properties controller(s). Table 29: Display Specified Controller Properties Convention MegaCli AdpGetProp CacheFlushInterval | RebuildRate | PatrolReadRate| BgiRate | CCRate | ReconRate | SpinupDriveCount | SpinupDelay | CoercionMode | PredFailPollInterval | ClusterEnable | BatWarnDsbl | EccBucketSize | EccBucketLeakRate | EccBucketCount | AlarmDsply | AbortCCOnError | AutoDetectBackPlaneDsbl | CopyBackDsbl | LoadBalanceMode | SMARTCpyBkEnbl | SSDSMARTCpyBkEnbl | MaintainPdFailHistoryEnbl | EnblSpinDownUnConfigDrvs | EnblSSDPatrolRead | NCQDsply | UseFDEOnlyEncrypt | WBSupport | AutoEnhancedImportDsply | PrCorrectUncfgdAreas -aN| -a0,1,2|-aALL Description Displays the properties on the selected controller(s). EccBucketCount: Count of single-bit ECC errors currently in the bucket. See Table 28 for explanations of the other options. 5.4.7 Set Factory Defaults Use the command in Table 30 to set the factory defaults on the selected controller(s). Table 30: Set Factory Defaults Convention MegaCli -AdpFacDefSet -aN|-a0,1,2|-aALL Description Sets the factory defaults on the selected controller(s). 5.4.8 Set SAS Address Use the command in Table 31 to set the SAS address on the selected controller(s). Table 31: Set SAS Address on Controller Convention MegaCli AdpSetSASA str[0-64] -aN Description Sets the controllers SAS address. This string must be a 64-digit hexadecimal number. 5.4.9 Set Time and Date on Use the command in Table 32 to set the time and date on the selected controller(s). Controller Table 32: Set Time and Date on Controller Convention MegaCli AdpSetTime yyyymmdd HH:mm:ss -aN|-a0,1,2|-aALL Description Sets the time and date on the controller. This command uses a 24-hour format. For example, 7 p.m. displays as 19:00:00. The order of date and time is reversible. LSI Corporation Confidential | August 2009 Page 121 Chapter 5: MegaRAID Command Tool | Patrol Read-Related Controller Properties MegaRaid SAS Software User Guide 5.4.10 Display Time and Date on Use the command in Table 33 to display the time and date on the selected controller(s). Controller Table 33: Display Time and Date on Controller Convention MegaCli AdpGetTime -aN Description Displays the time and date on the controller. This command uses a 24-hour format. For example, 7 p.m. would display as 19:00:00. 5.5 Patrol Read-Related You can use the commands in this section to select the settings for Patrol Read. A Patrol Controller Properties Read scans the system for possible drive errors that could lead to drive failure, then takes action to correct the errors. The goal is to protect data integrity by detecting drive failure before the failure can damage data. The corrective actions depend on the virtual drive configuration and the type of errors. Patrol Read affects performance; the more iterations there are, the greater the impact. 5.5.1 Set Patrol Read Options Use the command in Table 34 on the selected controller(s) to set the Patrol Read options. Table 34: Set Patrol Read Options Convention MegaCli AdpPR Dsbl|EnblAuto|EnblMan|Start|Stop|Info | SSDPatrolReadEnbl | SSDPatrolReadDsbl | {-SetStartTime yyyymmdd hh} | maxConcurrentPD -aN| -a0,1,2|-aALL Description Sets Patrol Read options on a single controller, multiple controllers, or all controllers: -Dsbl: Disables Patrol Read for the selected controller(s). -EnblAuto: Enables Patrol Read automatically for the selected controller(s). This means Patrol Read will start automatically after the controller initialization is complete. -EnblMan: Enables Patrol Read manually for the selected controller(s). This means that Patrol Read does not start automatically; it has to be started manually by selecting the Start command. -Start: Starts Patrol Read for the selected controller(s). -Stop: Stops Patrol Read for the selected controller(s). -Info: Displays the following Patrol Read information for the selected controller(s): • Patrol Read operation mode • Patrol Read execution delay value • Patrol Read status SSDPatrolReadEnbl: Enable the patrol read operation (media scan) on a SSD. SSDPatrolReadDsbl: Disable the patrol read operation (media scan) on a SSD. SetStartTime yyyymmdd hh: Set the start time for the patrol read in year/month/day format. maxConcurrentPD: Sets the maximum number of concurrent drives that patrol read runs on. 5.5.2 Set Patrol Read Delay Interval Use the command in Table 35 on the selected controller(s) to set the time between Patrol Read iterations. Table 35: Set Patrol Read Delay Interval Convention MegaCli AdpPRSetDelay Val -aN|-a0,1,2|-aALL Description Sets the time between Patrol Read iterations on a single controller, multiple controllers, or all controllers: -Val: Sets delay time between Patrol Read iterations. The value is time of delay in hours. A value of zero means no delay and an immediate restart. Page 122 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 5: MegaRAID Command Tool | BIOS-Related Properties 5.6 BIOS-Related Properties You can use the commands in this section to select the settings for BIOS-related options. 5.6.1 Set or Display Bootable Virtual Use the command in Table 36 to set or display the ID of the bootable virtual drive. Drive ID NOTE: This option does not write a boot sector to the virtual drive. The operating system will not load if the boot sector is incorrect. Table 36: Bootable Virtual Drive ID Convention MegaCli AdpBootDrive {-Set Lx| -physdrv[E0:S0]}} | -Get -aN|-a0,1,2|-aALL Description Sets or displays the bootable virtual drive ID: -Set: Sets the virtual drive as bootable so that during the next reboot, the BIOS will look for a boot sector in the specified virtual drive. Identifies the physical drive in the virtual drive, by enclosure and slot, to use to boot from. -Get: Displays the bootable virtual drive ID. 5.6.2 Select BIOS Status Options Use the command in Table 37 to set the options for the BIOS status. Table 37: Options for BIOS Status Convention MegaCli AdpBIOS -Enbl|-Dsbl|-Dsply| SOE | BE -aN|-a0,1,2|-aALL Description Sets BIOS options. The following are the settings you can select on a single controller, multiple controllers, or all controllers: -Enbl, -Dsbl, -Dsply: Enables, disables or displays the BIOS status on selected controller(s). -SOE: Stops on BIOS errors during POST for selected controller(s). When set to -SOE, the BIOS stops in case of a problem with the configuration. This gives you the option to enter the configuration utility to resolve the problem. This is available only when you enable the BIOS status. -BE: Bypasses BIOS errors during POST. This is available only when you enable the BIOS status. 5.7 Battery Backup You can use the commands in this section to select the settings for BBU-related Unit-Related Properties options. 5.7.1 Display BBU Information Use the command in Table 38 to display complete information about the BBU for the selected controller(s). Table 38: Display BBU Information Convention MegaCli -AdpBbuCmd -aN|-a0,1,2|-aALL Description Displays complete information about the BBU, such as status, capacity information, design information, and properties. LSI Corporation Confidential | August 2009 Page 123 Chapter 5: MegaRAID Command Tool | Battery Backup Unit-Related Properties MegaRaid SAS Software User Guide 5.7.2 Display BBU Status Use the command in Table 39 to display complete information about the status of the Information BBU, such as temperature and voltage, for the selected controller(s). Table 39: Display BBU Status Information Convention MegaCli -AdpBbuCmd -GetBbuStatus aN|-a0,1,2|-aALL Description Displays complete information about the BBU status, such as the temperature and voltage. The information displays in the following formats: BBU Status for Adapter: xx Battery Type: XXXXXX(string) Voltage: xx mV Current: xx mA Temperature: xx C° Firmware Status: xx Battery state: xx Gas Gauge Status: Fully Discharged: Yes/No Fully Charged: Yes/No Discharging: Yes/No Initialized: Yes/No Remaining Time Alarm: Yes/No Remaining Capacity Alarm: Yes/No Discharge Terminated: Yes/No Over Temperature: Yes/No Charging Terminated: Yes/No Over Charged: Yes/No Additional status information displays differently for iBBU™ and BBU. For iBBU: Relative State of Charge: xx Charger System State: xx Charger System Ctrl: xx Charging Current: xx mA Absolute State of Charge: xx% Max Error: xx% For BBU: Relative State of Charge: xx Charger Status: xx Remaining Capacity: xx mAh Full Charge Capacity: mAh isSOHGood: Yes/No Page 124 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 5: MegaRAID Command Tool | Battery Backup Unit-Related Properties 5.7.3 Display BBU Capacity Use the command in Table 40 to display the BBU capacity for the selected controller(s). Table 40: Display BBU Capacity Information Convention MegaCli -AdpBbuCmd -GetBbuCapacityInfo aN|-a0,1,2|-aALL Description Displays BBU capacity information. The information displays in the following format: BBU Capacity Info for Adapter: x Relative State of Charge: xx% Absolute State of Charge: xx% Remaining Capacity: xx mAh Full Charge Capacity: xx mAh Run Time to Empty: xxx Min Average Time to Empty: xxx Min Average Time to Full: xxx Min Cycle Count: xx Max Error: xx% 5.7.4 Display BBU Design Use the command in Table 41 to display BBU design parameters for the selected Parameters controller(s). Table 41: Display BBU Design Parameters Convention MegaCli -AdpBbuCmd -GetBbuDesignInfo aN|-a0,1,2|-aALL Description Displays information about the BBU design parameters. The information displays in the following formats: BBU Design Info for Adapter: x Date of Manufacture: mm/dd, yyyy Design Capacity: xxx mAh Design Voltage: mV Serial Number: 0xhhhh Pack Stat Configuration: 0xhhhh Manufacture Name: XXXXXX(String) Device Name: XXXXXX(String) Device Chemistry: XXXXXX(String) LSI Corporation Confidential | August 2009 Page 125 Chapter 5: MegaRAID Command Tool | Battery Backup Unit-Related Properties MegaRaid SAS Software User Guide 5.7.5 Display Current BBU Properties Use the command in Table 42 to display the current BBU properties for the selected controller(s). Table 42: Display Current BBU Properties Convention MegaCli -AdpBbuCmd -GetBbuProperties aN|-a0,1,2|-aALL Description Displays current properties of the BBU. The information displays in the following formats: BBU Properties for Adapter: x Auto Learn Period: xxx Sec Next Learn Time: xxxx Sec Learn Delay Interval: xx Hours Auto-Learn Mode: Warn via Event/Disabled/Enabled 5.7.6 Start BBU Learning Cycle Use the command in Table 43 to start the BBU learning cycle on the selected controller(s). A learning cycle is a battery calibration operation performed by the controller periodically (approximately every three months) to determine the condition of the battery. Table 43: Start BBU Learning Cycle Convention MegaCli -AdpBbuCmd -BbuLearn -aN|-a0,1,2|-aALL Description Starts the learning cycle on the BBU. No parameter is needed for this option. 5.7.7 Place Battery in Low-Power Use the command in Table 44 to place the battery into Low-Power Storage mode on Storage Mode the selected controller(s). This saves battery power consumption. Table 44: Place Battery in Low-Power Storage Mode Convention MegaCli -AdpBbuCmd -BbuMfgSleep -aN|-a0,1,2|-aALL Description Places the battery in Low-Power Storage mode. The battery automatically exits this state after 5 seconds. Page 126 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 5: MegaRAID Command Tool | Options for Displaying Logs Kept at Firmware Level 5.7.8 Set BBU Properties Use the command in Table 45 to set the BBU properties on the selected controller(s) after reading from the file. Table 45: Set BBU Properties Convention MegaCli -AdpBbuCmd -SetBbuProperties -f -aN|-a0,1,2|-aALL Description Sets the BBU properties on the selected controller(s) after reading from the file. The information displays in the following formats: autoLearnPeriod = 1800Sec nextLearnTime = 12345678Sec Seconds past 1/1/2000 learnDelayInterval = 24hours Not greater than 7 days autoLearnMode = 0 0 – Enabled, 1 - Disabled, 2 – WarnViaEvent. NOTE: You can change only two of these parameters, learnDelayInterval and autoLearnMode. 5.8 Options for Displaying Use the commands in this section to select the display settings for the event log and Logs Kept at Firmware Level BBU terminal log, which are kept at the firmware level. 5.8.1 Event Log Management Use the command in Table 46 to manage the event entries in the event log for the selected controller(s). Table 46: Event Log Management Convention MegaCli AdpEventLog GetEventlogInfo | GetEvents {-info -warning -critical -fatal} | GetSinceShutdown {-info -warning -critical -fatal} | GetSinceReboot {-info -warning -critical -fatal} | IncludeDeleted {-info -warning -critical -fatal} | {GetLatest {-info -warning -critical -fatal} } -f | Clear -aN|-a0,1,2|-aALL | {GetCCIncon} -f -LX| -L0,2,5...|-LALL -aN|-a0,1,2|-aALL Description Manages event log entries. The following are the settings you can select on a single controller, multiple controllers, or all controllers: -GetEventlogInfo: Displays overall event information such as total number of events, newest sequence number, oldest sequence number, shutdown sequence number, reboot sequence number, and clear sequence number. -GetEvents: Gets event log entry details. The information shown consists of total number of entries available at firmware side since the last clear and details of each entries of the error log. Start_entry specifies the initial event log entry when displaying the log. -GetSinceShutdown: Displays all of the events since last controller shutdown. -GetSinceReboot: Displays all of the events since last controller reboot. -IncludeDeleted: Displays all events, including deleted events. -GetLatest: Displays the latest number of events, if any exist. The event data will be writtent to the file in reverse order. -Clear: Clears the event log for the selected controller(s). -GetCCIncon: LSI Corporation Confidential | August 2009 Page 127 Chapter 5: MegaRAID Command Tool | Configuration-Related Options MegaRaid SAS Software User Guide 5.8.2 Set BBU Terminal Logging Use the command in Table 47 to set the BBU terminal logging for the selected controller(s). Table 47: Set BBU Terminal Logging Convention MegaCli FwTermLog -Bbuoff | BbuoffTemp|-Bbuon|-BbuGet|-Dsply | -Clear -aN| -a0,1,2|-aALL Description Sets BBU terminal logging options. The following are the settings you can select on a single controller, multiple controllers, or all controllers: -Bbuoff: Turns off the BBU for firmware terminal logging. To turn off the BBU for logging, you have to shut down your system or turn off the power to the system after you run the command. BbuoffTemp: Temporarily turns off the BBU for TTY (firmware terminal) logging. The battery will be turned on at the next reboot. -Bbuon: Turns on the BBU for TTY (firmware terminal) logging. -BbuGet: Displays the current BBU settings for TTY logging. -Dsply: Displays the TTY log (firmware terminal log) entries with details on the given controllers. The information shown consists of the total number of entries available at a firmware side. -Clear: Clears the TTY log. 5.9 Configuration-Related You can specify the drives by using the Enclosure ID:Slot ID for SAS controllers. This Options assumes that all drives are connected to the controller through an enclosure. If the drives are not connected to an enclosure, it is assumed that they are connected to Enclosure 0. In this case there is no slot, so you can use the pdlist command to get the slot equivalent number. (This applies to all commands that use the Enclosure ID:Slot ID format.) MegaCLI expects the input in [:S] format for directly attached devices. In the following options, [E0:S0, E1:S1] specifies the enclosure ID and slot ID for the drive. 5.9.1 Create a RAID Drive Group Use the command in Table 49 to create one RAID drive group out of all of the from All Unconfigured Good Drives unconfigured good drives, and a hot spare, if desired. This is for RAID levels 0, 5, 6, 10, 50, or 60. All free drives are used to create a new drive group and, if desired, one hot spare drive. If it is not possible to use all of the free drives, the command will abort with a related error level. If there are drives of different capacities, the largest drive is used to make the hot spare. NOTE: A virtual drive cannot have both SAS drives and SATA drives. Therefore, if the remaining free drives are SAS and SATA, a drive group cannot be created. The command will abort with a related error level. NOTE: Firmware supports only 32 drives per drive group, so if there are more than 32 unconfigured good drives, MegaCLI cannot configure any of the drives, and the command will abort. Page 128 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 5: MegaRAID Command Tool | Configuration-Related Options Table 48: Create a Drive Group from All of the Unconfigured Drives Convention MegaCli CfgLDAdd -RX[E0:S0,E1:S1,...] [WT | WB] [NORA | RA | ADRA] [Direct | Cached] [CachedBadBBU|NoCachedBadBBU] [-szXXX [-szYYY ...]] [-strpszM] [-Hsp[E0:S0,...]] [-AfterLdX] | | -Force [FDE|CtrlBased] Description Creates one RAID drive group out of all of the unconfigured good drives, and a hot spare, if desired. This is for RAID levels 0, 5, 6, 10, 50, or 60. All free drives are used to create a new drive group and, if desired, one hot spare drive. -Rx[E0:S0,...]: Specifies the RAID level and the drive enclosure/slot numbers used to construct a drive group. -WT (Write through), WB (Write back): Selects write policy. -NORA (No read ahead), RA (Read ahead), ADRA (Adaptive read ahead): Selects read policy. -Direct, -Cached: Selects cache policy. -CachedBadBBU|NoCachedBadBBU: Specifies whether to use write cache when the BBU is bad. Hsp: Specifies drive to make the hot spare with. -Force: Specifies that drive coercion is used to make the capacity of the drives compatible. Drive coercion is a tool for forcing drives of varying capacities to the same capacity so they can be used in a drive group. NOTE: Previously -szXXX expressed capacity in Mbytes but now you can enter the capacity in your choice of units. For example, to create a virtual drive of 10 Gbytes, enter the size as sz10GB. If you do not enter a unit, by default it is considered as Mbytes. LSI Corporation Confidential | August 2009 Page 129 Chapter 5: MegaRAID Command Tool | Configuration-Related Options MegaRaid SAS Software User Guide 5.9.2 Add RAID 0, 1, 5, or 6 Use the command in Table 49 to add a RAID level 0, 1, 5, or 6 configuration to the Configuration existing configuration on the selected controller. For RAID levels 10, 50, or 60, see Section 5.9.3, Add RAID 10, 50, or 60 Configuration Table 49: Add RAID 0, 1, 5, or 6 Configuration Convention MegaCli CfgLDAdd -R0|-R1|-R5|-R6[E0:S0,E1:S1,...] [WT | WB] [NORA | RA | ADRA] [Direct | Cached] [CachedBadBBU|NoCachedBadBBU] [-szXXXXXXXX [-szYYYYYYYY [... ]]] [-strpszM] [ Hsp[E5:S5,...]] [ afterLdX] -aN Description Adds a RAID level 0, 1, 5, or 6 configuration to a specified controller. Even if no configuration is present, you have the option to write the configuration to the controller. Note that RAID 1 supports up to 32 drives in a single span of 16 drive groups. RAID 1 requires an even number of drives, as data from one drive is mirrored to the other drive in each RAID 1 drive group. -Rx[E0:S0,...]: Specifies the RAID level and the drive enclosure/slot numbers to construct a drive group. -WT (Write through), WB (Write back): Selects write policy. -NORA (No read ahead), RA (Read ahead), ADRA (Adaptive read ahead): Selects read policy. -Cached, -Direct: Selects cache policy. [{CachedBadBBU|NoCachedBadBBU }]: Specifies : Specifies whether to use write cache when the BBU is bad. -szXXXXXXXX: Specifies the capacity for the virtual drive, where XXXX is a decimal number of Mbytes. However, the actual capacity of the virtual drive can be smaller, because the driver requires the number of blocks from the drives in each virtual drive to be aligned to the stripe size. If multiple size options are specified, CT configures the virtual drives in the order of the options entered in the command line. The configuration of a particular virtual drive will fail if the remaining capacity of the drive group is too small to configure the virtual drive with the specified capacity. This option can also be used to create a configuration on the free space available in the drive group. -strpszM: Specifies the stripe size, where the stripe size values are 8, 16, 32, 64, 128, 256, 512, or 1024 KBytes. Hsp[E5:S5,...]: Creates hot spares when you create the configuration. The new hot spares will be dedicated to the virtual drive used in creating the configuration. This option does not allow you to create global hot spares. To create global hot spares, you must use the -PdHsp command with proper subcommands. You can also use this option to create a configuration on the free space available in the virtual drive. You can specify which free slot should be used by specifying the -AfterLdX: This command is optional. By default, the application uses the first free slot available in the virtual drive. This option is valid only if the virtual drive is already used for configuration. Page 130 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 5: MegaRAID Command Tool | Configuration-Related Options 5.9.3 Add RAID 10, 50, or 60 Use the command in Table 50 to add a RAID 10, RAID 50, or RAID 60 configuration to Configuration the existing configuration on the selected controller. For RAID levels 0, 1, 5, or 6, see Section 5.9.2, Add RAID 0, 1, 5, or 6 Configuration Table 50: Add RAID 10, 50, or 60 Configuration Convention MegaCli CfgSpanAdd -R10|-R50|R60 Array0[E0:S0,E1:S1,...] Array1[E0:S0,E1:S1,...] [...] [WT | WB] [NORA | RA | ADRA] [Direct | Cached] [CachedBadBBU|NoCachedBadBBU] [-szXXXXXXXX [-szYYYYYYYY [... ]]] [-strpszM] [ afterLdX] [FDE|CtrlBased] -aN|-a0,1,2|-aALL Description Creates a RAID level 10, 50, or 60 (spanned) configuration from the specified drive groups. Even if no configuration is present, you must use this option to write the configuration to the controller. Note that RAID 10 supports up to eight spans with a maximum of 32 drives in each span. (There are factors, such as the type of controller, that limit the number of drives you can use.) RAID 10 requires an even number of drives, as data from one drive is mirrored to the other drive in each RAID 1 drive group. You can have an even or odd number of spans. Multiple drive groups are specified using the ArrayX[E0:S0,...] option. (Note that X starts from 0, not 1.) All of the drive groups must have the same number of drives. At least two drive groups must be provided. The order of options {WT |WB} {NORA | RA | ADRA} {Direct | Cached} is flexible. The size option, -szXXXXXXXX, can be accepted to allow slicing in the spanned drive groups if the controller supports this feature. The [ afterLdX] option is accepted if the size option is accepted. CT exits and does not create a configuration if the size or the afterLd option is specified but the controller does not support slicing in the spanned drive groups. NOTE: Previously -szXXX expressed capacity in Mbytes but now you can enter the capacity in your choice of units. For example, to create a virtual drive of 10 Gbytes, enter the size as sz10GB. If you do not enter a unit, by default it is considered as Mbytes. 5.9.4 Clear the Existing Use the command in Table 51 to clear the existing configuration on the selected Configuration controller(s). Table 51: Clear Existing Configuration Convention MegaCli CfgClr -aN|-a0,1,2|-aALL Description Clears the existing configuration. 5.9.5 Save the Configuration on the Use the command in Table 52 to save the configuration for the selected controller(s) to Controller the given filename. Table 52: Save Configuration on the Controller Convention MegaCli CfgSave f FileName -aN Description Saves the configuration for the selected controller(s) to the given filename. LSI Corporation Confidential | August 2009 Page 131 Chapter 5: MegaRAID Command Tool | Configuration-Related Options MegaRaid SAS Software User Guide 5.9.6 Restore the Configuration Data Use the command in Table 53 to read the configuration from the file and load it on the from File selected controller(s). You can restore the read/write properties and RAID configuration using hot spares. Table 53: Restore Configuration Data from File Convention MegaCli CfgRestore f FileName -aN Description Reads the configuration from the file and loads it on the controller. MegaCLI can store or restore all read and write controller properties, all read and write properties for virtual drives, and the RAID configuration including hot spares. Note the following: • MegaCLI does not validate the setup when restoring the RAID configuration. • The -CfgSave option stores the configuration data and controller properties in the file. Configuration data has only the device ID and sequence number information of the drives used in the configuration. The CfgRestore option will fail if the same device IDs of the drives are not present. 5.9.7 Manage Foreign Configuration Use the command in Table 54 to manage configurations from other controllers, called Information foreign configurations, for the selected controller(s). You can scan, preview, import, and clear foreign configurations. NOTE: The actual status of virtual drives and drives can differ from the information displayed in the Scan option. LSI suggests that you run Preview before you import a foreign configuration. Table 54: Manage Foreign Configuration Information Convention MegaCli -CfgForeign -Scan | [-SecurityKey sssssssssss] | -Dsply [x] | [-SecurityKey sssssssssss] | -Preview [x] | [-SecurityKey sssssssssss] | -Import [x] | [-SecurityKey sssssssssss] | -Clear [x] | [-SecurityKey sssssssssss] -aN|-a0,1,2|-aALL Description Manages foreign configurations. The options for this command are: -Scan: Scans and displays available foreign configurations. -SecurityKey: This is a key based on a user-provided string. The controller uses the security key to lock and unlock access to the secure user data. This key is encrypted into the security key blob and stored on the controller. If the security key is unavailable, user data is irretrievably lost. You must be careful to never lose the security key. -Preview: Provides a preview of the imported foreign configuration. The foreign configuration ID (FID) is optional. -Dsply: Displays the foreign configuration. -Import: Imports the foreign configuration. The FID is optional. -Clear [FID]: Clears the foreign configuration. The FID is optional. Page 132 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 5: MegaRAID Command Tool | Virtual Drive-Related Options 5.9.8 Delete Specified Virtual Use the command in Table 55 to delete one, multiple, or all virtual drives on the Drive(s) selected controller(s). Table 55: Delete Specified Virtual Drives Convention MegaCli CfgLDDel Lx|-L0,1,2|-Lall -aN|-a0,1,2|-aALL Description Deletes the specified virtual drive(s) on the selected controller(s). You can delete one virtual drive, multiple virtual drives, or all of the selected virtual drives on selected controller(s). 5.9.9 Display the Free Space Use the command in Table 56 to display the free space that is available to use for configuration on the selected controller(s). Table 56: Display Free Space Convention MegaCli CfgFreeSpaceInfo -aN|-a0,1,2|-aALL Description Displays all of the free space available for configuration on the selected controller(s). The information displayed includes the number of drive groups, the number of spans in each drive group, the number of free space slots in each drive group, the start block, and the size (in both blocks and megabytes) of each free space slot. 5.10 Virtual Drive-Related You can use the commands in this section to select settings for the virtual drives and Options perform actions on them. 5.10.1 Display Virtual Drive Use the command in Table 57 to display virtual drive information for the selected Information controller(s). Table 57: Display Virtual Drive Information Convention MegaCli LDInfo Lx|-L0,1,2|-Lall -aN|-a0,1,2|-aALL Description Displays information about the virtual drive(s) on the selected controller(s). This information includes the name, RAID level, RAID level qualifier, capacity in megabytes, state, stripe size, number of drives, span depth, cache policy, access policy, and ongoing activity progress, if any, including initialization, background initialization, consistency check, and reconstruction. LSI Corporation Confidential | August 2009 Page 133 Chapter 5: MegaRAID Command Tool | Virtual Drive-Related Options MegaRaid SAS Software User Guide 5.10.2 Change the Virtual Drive Cache Use the command in Table 58 to change the cache policy and access policy for the and Access Parameters virtual drive(s) on the selected controller(s). Table 58: Change Virtual Drive Cache and Access Parameters Convention MegaCli LDSetProp WT | WB [-Immediate]| RA |NORA | ADRA|-Cached|Direct|CachedBadBBU|NoCachedBadBBU} | -RW|RO|Blocked | {-Name nameString} | -EnDskCache|DisDskCache Lx| -L0,1,2|-Lall -aN|-a0,1,2|-aALL Description Allows you to change the following virtual drive parameters: -WT (Write through), WB (Write back): Selects write policy. -NORA (No read ahead), RA (Read ahead), ADRA (Adaptive read ahead): Selects read policy. -Cached, -Direct: Selects cache policy. -CachedBadBBU|NoCachedBadBBU : Specifies whether to use write cache when the BBU is bad. -RW, -RO, Blocked: Selects access policy. -EnDskCache: Enables drive cache. -DisDskCache: Disables drive cache. 5.10.3 Display the Virtual Drive Cache Use the command in Table 59 to display cache and access parameters for the virtual and Access Parameters drive(s) on the selected controller(s). Table 59: Display Virtual Drive Cache and Access Parameters Convention MegaCli LDGetProp -Cache | -Access | -Name | -DskCache -Lx|-L0,1,2| -Lall -aN|-a0,1,2|-aALL Description Displays the cache and access policies of the virtual drive(s): -Cache: -Cached, Direct: Displays cache policy. -WT (Write through), WB (Write back): Selects write policy. -NORA (No read ahead), RA (Read ahead), ADRA (Adaptive read ahead): Selects read policy. -Access: -RW, -RO, Blocked: Displays access policy. -DskCache: Displays drive cache policy. Page 134 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 5: MegaRAID Command Tool | Virtual Drive-Related Options 5.10.4 Manage Virtual Drives Use the command in Table 60 to manage initialization of the virtual drive(s) on the Initialization selected controller(s). Table 60: Manage Virtual Drive Initialization Convention MegaCli LDInit { Start [Fast | Full]} |-Abort| ShowProg|-ProgDsply -Lx|-L0,1,2|-Lall -aN|-a0,1,2|-aALL Description Allows you to select the following actions for virtual drive initialization: -Start: Starts the initialization (writing 0s) on the virtual drive(s) and displays the progress (this is optional). The fast initialization option initializes the first and last 8 Mbyte areas on the virtual drive. The full option allows you to initialize the entire virtual drive. -Abort: Aborts the ongoing initialization on the virtual drive(s). -ShowProg: Displays the snapshot of the ongoing initialization, if any. -ProgDsply: Displays the progress of the ongoing initialization. The routine continues to display the progress until at least one initialization is completed or a key is pressed. 5.10.5 Manage a Consistency Check Use the command in Table 61 to manage a data consistency check (CC) on the virtual drives for the selected controller(s). Table 61: Manage Consistency Check Convention MegaCli LDCC Start|-Abort| ShowProg|-ProgDsply Lx|-L0,1,2|-Lall -aN|-a0,1,2|-aALL Description Allows you to select the following actions for a data CC: -Start: Starts a CC on the virtual drive(s), then displays the progress (optional) and time remaining. -Abort: Aborts an ongoing CC on the virtual drive(s). -ShowProg: Displays a snapshot of an ongoing CC. -ProgDsply: Displays ongoing CC progress. The progress displays until at least one CC is completed or a key is pressed. LSI Corporation Confidential | August 2009 Page 135 Chapter 5: MegaRAID Command Tool | Virtual Drive-Related Options MegaRaid SAS Software User Guide 5.10.6 Manage a Background Use the command in Table 62 to enable, disable, or suspend background initialization Initialization (BGI), as well as display initialization progress on the selected controller(s). Table 62: Manage Background Initialization Convention MegaCli LDBI -Enbl|-Dsbl|GetSetting|-ShowProg|-ProgDsply Lx|-L0,1,2|-Lall -aN|-a0,1,2|-aALL Description Manages background initialization options. The following are the background initialization settings you can select on a single controller, multiple controllers, or all controllers: -Enbl, -Dsbl: Enables or disables the background initialization on the selected controller(s). -ProgDsply: Displays an ongoing background initialization in a loop. This function completes only when all background initialization processes complete or you press a key to exit. -ShowProg: Displays the current progress value. - GetSetting: Displays current background initialization setting (Enabled or Disabled). 5.10.7 Perform a Virtual Drive Use the command in Table 63 to perform a reconstruction of the virtual drive(s) on the Reconstruction selected controller(s). Table 63: Virtual Drive Reconstruction Convention MegaCli LDRecon { Start Rx [Add | Rmv PhysDrv[E0:S0,E1:S1,...] ] } | ShowProg|-ProgDsply Lx aN Description Controls and manages virtual drive reconstruction. The following are the virtual drive reconstruction settings you can select on a single controller: -Start: Starts a reconstruction of the selected virtual drive to a new RAID level. -Rx: Changes the RAID level of the virtual drive when you start reconstruction. You might need to add or remove a drive to make this possible. -Start Add PhysDrv[E0:S0,E1:S1....]: Adds listed drives to the virtual drive and starts reconstruction on the selected virtual drive. -Start Rmv PhysDrv[E0:S0,E1:S1....]: Removes one drive from the existing virtual drives and starts a reconstruction. -ShowProg: Displays a snapshot of the ongoing reconstruction process. -ProgDsply: Allows you to view the ongoing reconstruction. The routine continues to display progress until at least one reconstruction is completed or a key is pressed. Page 136 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 5: MegaRAID Command Tool | Drive-Related Options 5.10.8 Display Information about Use the command in Table 64 to display information about the virtual drives and drives Virtual Drives and Drives for the selected controller(s), such as the number of virtual drives, RAID level, and drive capacity. Table 64: Display Virtual Drive and Drive Information Convention MegaCli LDPDInfo -aN|-a0,1,2|-aALL Description Displays information about the present virtual drive(s) and drive(s) on the selected controller(s). Displays information including the number of virtual drives, the RAID level of the virtual drives, and drive capacity information, which includes raw capacity, coerced capacity, uncoerced capacity, and the SAS address. 5.10.9 Display the Number of Virtual Use the command in Table 65 to display the number of virtual drives attached to the Drives controller. Table 65: Display Number of Virtual Drives Convention MegaCli LDGetNum aN|-a0,1,2|-aALL Description Displays the number of virtual drives attached to the controller. The return value is the number of virtual drives. 5.11 Drive-Related Options You can use the commands in this section to select settings for the drives and perform actions on them. 5.11.1 Display Drive Information Use the command in Table 66 to display information about the drives on the selected controller(s). Table 66: Display Drive Information Convention MegaCli PDInfo -PhysDrv[E0:S0,E1:S1....] -aN|-a0,1,2|-aALL Description Provides information about the drives connected to the enclosure and controller slot. This includes information such as the enclosure number, slot number, device ID, sequence number, drive type, capacity (if a drive), foreign state, firmware state, and inquiry data. For SAS devices, this includes additional information such as the SAS address of the drive. For SAS expanders, this includes additional information such as the number of devices connected to the expander. 5.11.2 Set the Drive State to Online Use the command in Table 67 to set the state of a drive to Online. In an online state, the drive is working normally and is a part of a configured virtual drive. Table 67: Set Drive State to Online Convention MegaCli PDOnline -PhysDrv[E0:S0,E1:S1....] -aN|-a0,1,2|-aALL Description Changes the drive state to Online. LSI Corporation Confidential | August 2009 Page 137 Chapter 5: MegaRAID Command Tool | Drive-Related Options MegaRaid SAS Software User Guide 5.11.3 Set the Drive State to Offline Use the command in Table 68 to set the state of a drive to Offline. In the offline state, the virtual drive is not available to the RAID controller. Table 68: Set Drive State to Offline Convention MegaCli PDOffline -PhysDrv[E0:S0,E1:S1....] -aN|-a0,1,2|-aALL Description Changes the drive state to Offline. 5.11.4 Change the Drive State to Use the command in Table 69 to change the state of a drive from Unconfigured-Bad to Unconfigured Good Unconfigured-Good. Table 69: Change Drive State to Unconfigured Good Convention MegaCli PDMakeGood -PhysDrv[E0:S0,E1:S1....] | [-Force] -aN|-a0,1,2|-aALL Description Changes the drive state to Unconfigured Good. Force: Force the drive to the Unconfigured Good state. 5.11.5 Change Drive State Use the command in Table 70 to change the drive state, as it relates to hot spares, and to associate the drive to an enclosure and virtual drive for the selected controller(s). Table 70: Change Drive State Convention MegaCli PDHSP { Set [{-Dedicated -ArrayN |-Array0,1...}] [-EnclAffinity] [-nonRevertible] } | -Rmv -PhysDrv[E0:S0,E1:S1,...] -aN|-a0,1,2|-aALL Description Changes the drive state (as it relates to hot spares) and associates the drive to an enclosure and virtual drive on a single controller, multiple controllers, or all controllers: -Set: Changes the drive state to dedicated hot spare for the enclosure. -Rmv: Changes the drive state to ready (removes the hot spare). -EnclAffinity: Associates the hot spare to a selected enclosure. -Array0: Dedicates the hot spare to a specific virtual drive. Page 138 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 5: MegaRAID Command Tool | Drive-Related Options 5.11.6 Manage a Drive Initialization Use the command in Table 71 to manage a drive initialization on the selected controller(s). Table 71: Drive Initialization Convention MegaCli PDClear -Start |-Stop|-ShowProg |-ProgDsply -PhysDrv[E0:S0,E1:S1....] -aN|-a0,1,2|-aALL Description Manages initialization or displays initialization progress on a single controller, multiple controllers, or all controllers: -Start: Starts initialization on the selected drive(s). -Stop: Stops an ongoing initialization on the selected drive(s). -ShowProg: Displays the current progress percentage and time remaining for the initialization. This option is useful for running the application through scripts. -ProgDsply: Displays the ongoing clear progress. The routine continues to display the initialization progress until at least one initialization is completed or a key is pressed. 5.11.7 Rebuild a Drive Use the command in Table 72 to start or stop a rebuild on a drive and display the rebuild progress. When a drive in a RAID drive group fails, you can rebuild the drive by recreating the data that was stored on the drive before it failed. Table 72: Rebuild a Drive Convention MegaCli PDRbld Start |-Stop|-ShowProg |-ProgDsply PhysDrv [E0:S0,E1:S1....] -aN|-a0,1,2|-aALL Description Manages a drive rebuild or displays the rebuild progress on a single controller, multiple controllers, or all controllers. Note that the drive must meet the capacity requirements before it can be rebuilt, and it must be part of a drive group: -Start: Starts a rebuild on the selected drive(s) and displays the rebuild progress (optional). -Stop: Stops an ongoing rebuild on the selected drive(s). -ShowProg: Displays the current progress percentage and time remaining for the rebuild. This option is useful for running the application through scripts. -ProgDsply: Displays the ongoing rebuild progress. This routine displays the rebuild progress until at least one initialization is completed or a key is pressed. 5.11.8 Locate the Drive(s) and Use the command in Table 73 to locate the drive(s) for the selected controller(s) and Activate LED activate the drive activity LED. Table 73: Locate Drive and Activate LED Convention MegaCli PDLocate PhysDrv[E0:S0,E1:S1....] -aN|-a0,1,2|-aALL Description Locates the drive(s) for the selected controller(s) and activates the drive activity LED. LSI Corporation Confidential | August 2009 Page 139 Chapter 5: MegaRAID Command Tool | Drive-Related Options MegaRaid SAS Software User Guide 5.11.9 Mark the Configured Drive as Use the command in Table 74 to mark the configured drive as missing for the selected Missing controller(s). Table 74: Mark Configured Drive as Missing Convention MegaCli PDMarkMissing PhysDrv[E0:S0,E1:S1....] -aN|-a0,1,2|-aALL Description Marks the configured drive as missing for the selected controller(s). 5.11.10 Display the Drives in Missing Use the command in Table 75 to mark the configured drive as missing for the selected Status controller(s).. Table 75: Display Drives in Missing Status Convention MegaCli PDGetMissing -aN|-a0,1,2|-aALL Description Displays the drive(s) in missing status. The format is: No Row Column SizeExpected(MB) 0 x y zzzzzzzzz … Where x is the index to the drive groups, y is the index to the drive in that drive group, and zzzzzz is the minimum capacity of the drive that can be used as a replacement. 5.11.11 Replace the Configured Drives Use the command in Table 76 to replace configured drive(s) and start an automatic and Start an Automatic Rebuild rebuild of the drive for the selected controller(s). Table 76: Replace Configured Drive(s) and Start Automatic Rebuild Convention MegaCli PDReplaceMissing PhysDrv[E0:S0,E1:S1....] -ArrayX -RowY -aN Description Replaces the configured drives that are identified as missing and then starts an automatic rebuild. 5.11.12 Prepare the Unconfigured Use the command in Table 77 to prepare the unconfigured drive(s) for removal from Drive for Removal the selected controller(s). Table 77: Prepare Unconfigured Drive(s) for Removal Convention MegaCli PDPrpRmv [-Undo] PhysDrv[E0:S0,E1:S1....] -aN|-a0,1,2|-aALL Description Prepares unconfigured drive(s) for removal. The firmware will spin down this drive. The drive state is set to unaffiliated, which marks it as offline even though it is not a part of configuration. The -Undo option undoes this operation. If you select undo, the firmware marks this drive as unconfigured good. Page 140 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 5: MegaRAID Command Tool | Enclosure-Related Options 5.11.13 Display Total Number of Drives Use the command in Table 78 to display the total number of drives attached to an controller. Drives can be attached directly or through enclosures. Table 78: Display Number of Drives Attached to an Controller Convention MegaCli PDGetNum aN|-a0,1,2|-aALL Description Displays the total number of drives attached to an controller. Drives can be attached directly or through enclosures. The return value is the number of drives. 5.11.14 Display List of Physical Devices Use the command in Table 79 to display a list of the physical devices connected to the selected controller(s). Table 79: Display List of Physical Devices Attached to Controller(s) Convention MegaCli PDList aN|-a0,1..|-aAll Description Displays information about all drives and other devices connected to the selected controller(s). This includes information such as the drive type, capacity (if a drive), serial number, and firmware version of the device. For SAS devices, this includes additional information such as the SAS address of the device. For SAS expanders, this includes additional information such as the number of drives connected to the expander. 5.11.15 Download Firmware to the Use the command in Table 80 to download firmware to the physical devices connected Physical Devices to the selected controller(s). Table 80: Download Firmware to the Physical Devices Convention MegaCli PdFwDownload -PhysDrv[E0:S0,E1:S1....] -f aN| -a0,1,2|-aAll Description Flashes the firmware with the file specified at the command line. Firmware files used to flash the physical drive can be of any format. The CLI utility assumes that you provide a valid firmware image and flashes the same. The physical device has to do error checking. Firmware files in .dlp format can be flashed with the DOS version of the command tool only. 5.12 Enclosure-Related The commands in this section are used for enclosures. Options Use the command in Table 81 to display enclosure information for selected controller(s). Table 81: Display Enclosure Information Convention MegaCli EncInfo -aN|-a0,1,2|-aALL Description Displays information about the enclosure for the selected controller(s). 5.13 Flashing the Firmware The options in this section describe the functionality of the existing flash application. The firmware flash options do not require input from the user. LSI Corporation Confidential | August 2009 Page 141 Chapter 5: MegaRAID Command Tool | SAS Topology MegaRaid SAS Software User Guide 5.13.1 Flash the Firmware with the Use the command in Table 82 to flash the firmware with the ROM file specified at the ROM File command line for the selected controller(s). Table 82: Flash Firmware with ROM File Convention MegaCli AdpFwFlash f filename [-NoSigChk] [-NoVerChk]-aN| -a0,1,2|-aALL Description Flashes the firmware with the ROM file specified at the command line. The NoSigChk option forces the application to flash the firmware even if the check word on the file does not match the required check word for the controller. This option flashes the firmware only if the existing firmware version on the controller is lower than the version on the ROM image. If you specify NoVerChk, also, the application flashes the controller firmware without checking the version of the firmware image. The version check applies only to the firmware (APP.ROM) version. This command also supports the “Mode 0” flash functionality. For Mode 0 flash, the controller number is not valid. There are two possible methods: • Select which controller to flash after the controllers are detected. • Flash the firmware on all present controllers. XML output data is generated by this option. 5.13.2 Flash the Firmware in Mode 0 Use the command in Table 83 to flash the firmware in Mode 0 with the ROM file with the ROM File specified at the command line for the selected controller(s). This option is for DOS only. Table 83: Flash Firmware in Mode 0 with ROM File Convention MegaCli AdpM0Flash f filename Description Flashes the firmware in Mode 0 with the ROM file listed on the command line. This option supports the Mode 0 flash functionality. For Mode 0 flash, the controller number is not valid. The method to handle this is to flash the firmware on all present controllers which are compatible with the image. 5.14 SAS Topology The commands in this section are used to display SAS topology. Use the command in Table 84 to display the PHY connection information for physical PHY M on the selected controller(s). Each PHY can form one side of the physical link in a connection with a PHY on a different device. The physical link contains four wires that form two differential signal pairs. One differential pair transmits signals, and the other differential pair receives signals. Both differential pairs operate simultaneously and allow concurrent data transmission in both the receive and the transmit directions. PHYs are contained within ports. A port can contain a single PHY or can contain multiple PHYs. A narrow port contains a single PHY, and a wide port contains multiple PHYs. Table 84: Display PHY Connection Information Convention MegaCli PHYInfo -phyM aN|-a0,1,2|-aALL Description Displays PHY connection information for physical PHY M on the controller(s). Page 142 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 5: MegaRAID Command Tool | Diagnostic-Related Options 5.15 Diagnostic-Related The commands in this section are used to run diagnostic tests. Options 5.15.1 Start Controller Diagnostics Use the command in Table 85 to start the controller diagnostic for a set amount of time. Table 85: Start Diagnostics Setting Convention MegaCli AdpDiag [val] aN|-a0,1,2|-aALL Description Sets the amount of time for the controller diagnostic to run. 5.15.2 Start Battery Test Use the command in Table 86 to start the battery test. This command requires a system reboot. Table 86: Start Battery Test Convention MegaCli AdpBatTest aN|-a0,1,2|-aALL Description Starts the battery test. This command requires that you turn off the power to the system, and then turn on the power and reboot the system. 5.15.3 Start NVRAM Diagnostic Use the command in Table 87 to start the controller NVRAM diagnostic for a set amount of time. This option is for DOS only. Table 87: Start NVRAM Diagnostic Convention MegaCli AdpNVRAM {-Read|-Write -ffilename}| Clear [-StartOffset 0xXXXX] [-EndOffset 0xXXXX] aN Description Starts the NVRAM diagnostic. -Read: Reads the content in NVRAM and writes the data to file filename. -Write: Reads data from file filename and writes to NVRAM. -Clear: Writes 0 to NVRAM at the specified range from start offset to end offset. -StartOffset/-EndOffset: Specifies the start offset and/or end offset in NVRAM. If you do not use the -StartOffset and -EndOffset options, the default StartOffset is 0 and the default EndOffset is the end of actual NVRAM size. 5.16 Miscellaneous Options The commands in this section are used to display various information. 5.16.1 Display the MegaCLI Version Use the command in Table 88 to display the version number of the MegaCLI utility. Table 88: Display MegaCLI Version Convention MegaCli v Description Displays the version number of the MegaCLI utility. LSI Corporation Confidential | August 2009 Page 143 Chapter 5: MegaRAID Command Tool | Miscellaneous Options MegaRaid SAS Software User Guide 5.16.2 Display Help for MegaCLI Use the command in Table 89 to display help information for the MegaCLI utility. Table 89: Display Help for MegaCLI Convention MegaCli h| Help|? Description Displays help for the MegaCLI utility. Page 144 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 6: MegaRAID Storage Manager Overview and Installation | Overview Chapter 6 MegaRAID Storage Manager Overview and Installation This chapter provides a brief overview of the MegaRAID Storage Manager (MSM) software and explains how to install it on the supported operating systems. 6.1 Overview MegaRAID Storage Manager software enables you to configure, monitor, and maintain storage configurations on LSI® SAS controllers. The MegaRAID Storage Manager graphical user interface (GUI) makes it easy for you to create and manage storage configurations. 6.1.1 Creating Storage MegaRAID Storage Manager software enables you to easily configure the controllers, Configurations drives, and virtual drives on your workstation or server. The Configuration Wizard greatly simplifies the process of creating drive groups and virtual drives. You can use the Configuration Wizard Auto Configuration mode to automatically create the best possible configuration with the available hardware. You can use the Guided Configuration mode, which asks you a few brief questions about the configuration, and then creates it for you. Or you can use the Manual Configuration mode, which gives you complete control over all aspects of the storage configuration. The Modify Drive Group Wizard enables you to increase the capacity of a virtual drive and to change the RAID level of a drive group. NOTE: The Modify Drive Group Wizard was previously known as the Reconstruction Wizard. 6.1.2 Monitoring Storage Devices MegaRAID Storage Manager software displays the status of controllers, virtual drives, and drives on the workstation or server that you are monitoring. System errors and events are recorded in an event log file and are displayed on the screen. Special device icons appear on the screen to notify you of drive failures and other events that require immediate attention. 6.1.3 Maintaining Storage You can use MegaRAID Storage Manager software to perform system maintenance Configurations tasks such as running patrol read operations, updating firmware, and running consistency checks on drive groups that support redundancy. 6.2 Hardware and Software The hardware requirements for MegaRAID Storage Manager software are as follows: Requirements PC-compatible computer with an IA-32 (32-bit) Intel Architecture processor or an EM64T (64-bit) processor and at least 128 Mbytes of system memory (256 Mbytes recommended) Drive with at least 50 Mbytes available free space LSI Corporation Confidential | August 2009 Page 145 Chapter 6: MegaRAID Storage Manager Overview and Installation | Installing MegaRAID MegaRaid SAS Software User Guide Storage Manager The supported operating systems for the MegaRAID Storage Manager software are as follows: Microsoft Windows Server 2003, Microsoft Windows Server 2008, Microsoft Windows XP, and Microsoft Windows Vista Red Hat Linux 3.0, 4.0, and 5.0 Solaris 10 x86 SUSE Linux/SLES 9 and 10, with latest updates and service packs VMWare ESX 3i Refer to your server documentation and to the operating system documentation for more information on hardware and operating system requirements. 6.3 Installing MegaRAID This section explains how to install (or reinstall) MegaRAID Storage Manager software Storage Manager on your workstation or server for the supported operating systems: Microsoft Windows, Red Hat Linux, and SUSE Linux. 6.3.1 Installing MegaRAID Storage Follow these steps if you need to install MegaRAID Storage Manager software on a Manager Software on Microsoft system running Microsoft Windows Server 2003, Microsoft Windows XP, or Microsoft Windows Windows Vista: 1. Insert the MegaRAID Storage Manager software installation CD in the CD-ROM drive. If necessary, find and double-click the setup.exe file to start the installation program. 2. When the Welcome screen appears, click Next. If MegaRAID Storage Manager software is already installed on this system, then an upgraded installation occurs. 3. Read the screen text and select Modify, Repair, or Remove. 4. When the next screen appears, read and accept the user license, and click Next. The Customer Information screen appears, as shown in Figure 72. Page 146 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 6: MegaRAID Storage Manager Overview and Installation | Installing MegaRAID Storage Manager Figure 72: Customer Information Screen 5. Enter your user name and organization name. In the bottom part of the screen, select an installation option: — If you select All users, any user with administrative privileges can use this version of MegaRAID Storage Manager software to view or change storage configurations. — If you select Only for current user, the MegaRAID Storage Manager shortcuts and associated icons will be available only to the user with this user name. 6. Click Next to continue. 7. On the next screen, accept the default Destination Folder, or click Change to select a different destination folder. Click Next to continue. The Setup Type screen appears, as shown in Figure 73. Figure 73: Setup Type Screen LSI Corporation Confidential | August 2009 Page 147 Chapter 6: MegaRAID Storage Manager Overview and Installation | Installing MegaRAID MegaRaid SAS Software User Guide Storage Manager 8. Select one of the Setup options. The options are fully explained in the screen text. — Normally, you would select Complete if you are installing MegaRAID Storage Manager software on a server. — Select Custom Installation if you want to select individual program components. 9. Click Next to continue. If you selected Custom Installation as your setup option, the second Setup Type screen appears, as shown in Figure 74. If you select Complete as your setup option, the Installation Wizard is ready to install MSM. To begin installation, click on Install on the next screen that appears. Figure 74: Setup Type Screen 10. Select one of the custom setup options. The options are fully explained in the screen text. — Select Client if you are installing MegaRAID Storage Manager software on a PC that will be used to view and configure servers over a network. To begin installation, click on Install on the next screen that appears. In the Client mode of installation, MSM installs only client-related components, such as MSM GUI, and monitor configurator. Use this mode when you want to manage and monitor servers remotely. When you install MSM in Client mode on a laptop or a desktop, you can log in to a specific server by providing the IP address. — Select Server to install only those components required for remote server management. To begin installation, click on Install on the next screen that appears. — Select StandAlone if you will use MegaRAID Storage Manager software to create and manage storage configurations on a standalone workstation. To begin installation, click on Install on the next screen that appears. — Select Custom if you want to specify individual program features to install. Page 148 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 6: MegaRAID Storage Manager Overview and Installation | Installing MegaRAID Storage Manager If you select Custom, a window listing the installation features appears, as shown in Figure 75. Select the features you want on this screen. Figure 75: Custom Setup Screen 11. Click Next to proceed. 12. Click Install to install the program. 13. When the final Configuration Wizard screen appears, click Finish. If you select Client installation for a PC used to monitor servers, and if there are no available servers with a registered framework on the local subnet (that is, servers with a complete installation of MegaRAID Storage Manager software), the server screen will appear, as shown in Figure 76. The server screen will not list any servers. You can use this screen to manage systems remotely. Figure 76: Server Screen LSI Corporation Confidential | August 2009 Page 149 Chapter 6: MegaRAID Storage Manager Overview and Installation | Installing MegaRAID MegaRaid SAS Software User Guide Storage Manager 6.3.2 Installing MegaRAID Storage Follow these steps if you need to install MegaRAID Storage Manager software on a Manager Software for Linux system running Red Hat Linux or SUSE Linux: 1. Copy the MSM_linux_installer...tar.gz file to a temporary folder. 2. Untar the MSM_linux_installer...tar.gz file using the following command: tar -zxvf MSM_linux_installer...tar.gz A new disk directory is created. 3. Go to the new disk directory. 4. In the disk directory, find and read the readme.txt file. 5. To start the installation, enter the following command: csh install.sh -a If you select Client installation for a PC used to monitor servers, and if there are no available servers with a registered framework on the local subnet (that is, servers with a complete installation of MegaRAID Storage Manager software), the server screen appears. The server screen does not list any servers. You can use this screen to manage systems remotely. To install the software using interactive mode, execute the command ./install.sh from the installation disk. To install the product in a non-interactive or silent mode, use the command ./install.sh [-options] [ -ru popup] from the installation disk. The installation options are: Complete installation Client Component Only StandAlone The -ru popup command will remove popup from installation list. You can also run non-interactive installation using the RunRPM.sh command. The installer offers three types of setup options: Complete - This installs all the features of the product. Client Components Only - The storelib feature of the product are not installed in this type of installation. As a result, the resident system can only administer and configure all of the servers in the subnet, but it cannot serve as a server. StandAlone - Only the networking feature is not installed in this case, so the resident system is not a part of the network. This means the system cannot browse any other MSM servers in the subnet, and the MSM servers cannot will recognize it as a server. This installation helps you select any of the setup types, but if you run RunRPM.sh, it installs the complete feature. Page 150 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 6: MegaRAID Storage Manager Overview and Installation | MegaRAID Storage Man- ager Support and Installation on VMWare 6.3.3 Linux Error Messages The following messages may appear while you are installing MegaRAID Storage Manager software on a Linux system: More than one copy of MegaRAID Storage Manager software has been installed. This message indicates that the user has installed more than one copy of MegaRAID Storage Manager software. (This can be done by using the rpm-force command to install the rpm file directly, which is not recommended, instead of using the install.sh file.) In such cases, the user must uninstall all of the rpm files manually before installing MegaRAID Storage Manager software with the procedure listed previously. The version is already installed. This message indicates that the version of MegaRAID Storage Manager software you are trying to install is already installed on the system. The installed version is newer. This message indicates that a version of MegaRAID Storage Manager software is already installed on the system, and it is a newer version than the version you are trying to install. Exiting installation. This is the message that appears when the installation is complete. RPM installation failed. This message indicates that the installation failed for some reason. Additional message text explains the cause of the failure. 6.4 MegaRAID Storage This section documents the installation of MegaRAID Storage Manager on VMWare Manager Support and Classic (with console operating system) and on the VMWare ESX 3i operating system. Installation on VMWare 6.4.1 Installing MegaRAID Storage VMWare does not support any graphics components. In order to install MSM on the Manager for VMWare Classic VMWare operating system, execute the script ./vmware_install.sh from the installation disk. The installer lets you accept the License agreement, operating system, and storelib as follows: End user license agreement Operating system (VMware 3.5 or VMware 4.0) Select the Storelib (Inbox Storelib or Storelib from MSM package) 6.4.2 Uninstalling MegaRAID To uninstall the Server Component of MSM on VMWare, use the Uninstall command Storage Manager for VMWare in the Program menu or run the script /usr/local/MegaRAID Storage Manager/uninstaller.sh. Note the following points: A MSM upgrade is supported in this release. This release can be upgraded by future releases. LSI Corporation Confidential | August 2009 Page 151 Chapter 6: MegaRAID Storage Manager Overview and Installation | MegaRAID Storage Man- MegaRaid SAS Software User Guide ager Support and Installation on VMWare To shut down the MSM Framework service, run the following command: /etc/init.d/vivaldiframeworkd stop It is recommended that you stop the Monitor service before you stop the MSM Framework service. To stop the Monitor service run the following command: /etc/init.d/mrmonitor stop 6.4.3 Installing MegaRAID Storage This section outlines the product requirements needed to support the VMWare ESX Manager Support on the VMWare ESX operating system. Classic VMWare includes a Service Console that is derived from the Operating System Linux 2.4 kernel, but with reduced functionality. The MSM server part cannot be installed directly in VMWare ESX 3i. Management is possible only through Common Information Model (CIM) providers. These CIM providers integrated into the ESX 3i system build an interface between the hardware driver of the LSI MegaRAID controller and remote applications, such as MSM. Management is performed through MSM installed on a remote machine (Linux/Windows). See Section 6.4.4.1, VMWare ESX 3i Management through CIM and CMPI for more information. The Linux installer of MSM works under console with minimal changes. Hardware RAID is currently supported in ESX 3.x. NOTE: There is a known limitation that virtual drives that are created or deleted will not be reflected to the kernel. The workaround is to reboot the server or to run esxcfg-rescan from COS shell. The network communication is a key element for a proper setup. The communication between the ESXi CIM provider and the LSI management software is an active/passive combination, which requires a highly reliable network. Therefore, we recommend that you install the management on a VM within the ESXi. Follow these steps to install and configure MSM support on the VMWare ESX operating system: 1. Network Configuration of the ESXi Host: — Assignment of a ESXi hostname. Even if it is not relevant for your network, you need a FQDN (Fully Qualified Domain Name). Example: local.lsi.com to be entered using the local ESXi console — Configuration of a virtual network environment: You can use the already existing Vswitch, which has a VMkernel port already attached for the communication. Alternatively, you can build a new Vswitch without a link to the Host network card. Which one of the two possibilities to choose depends on your application. It is recommended to choose between both possibilities at a early stage, because the creation of a new Vswitch with VMkernel requires a reboot to make sure a proper communication between the CIM provider and the new interface. For those who want to reach the target as quickly as possible, no change is recommended. Page 152 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 6: MegaRAID Storage Manager Overview and Installation | MegaRAID Storage Man- ager Support and Installation on VMWare — Configuration of the IP address: Configure the IP address. The address must be accessible by the VM that will be installed next. 2. VM Installation: Install the operating system as usual, including the VMWare guest tools. The virtual network card should be linked to a Vswitch that has a VMKernel port attached. For a quick installation, no change is recommended. 3. MSM Installation: Install MSM with the option “complete”. 4. VM Network Configuration: — Case 1: Your network contains a DNS server: Configure a host entry that belongs to your internal zone and make sure that the FQDN of the ESXi server can be resolved. (Example: local.lsi.com and 192.19.221.186) — Case 2: Your network does not have a DNS server: Edit your file C.\windows\system32\drivers\etc\hosts and add another entry: IP of the ESXi Host FQDN of the ESXi Host 192.19.221.186 local.lsi.com 5. Final Steps: Reboot the VM and start MegaRAID Storage Manager. The ESXi server should now appear in the list of the found hosts. You can now log in with the root account name and password of the ESXi Host. LSI Corporation Confidential | August 2009 Page 153 Chapter 6: MegaRAID Storage Manager Overview and Installation | MegaRAID Storage Man- MegaRaid SAS Software User Guide ager Support and Installation on VMWare Host Overview: Figure 77 shows the name of the host ESXi server. In this example, the host ESXi server name is local.lsi.com. Figure 77: Host ESXi Server Name You can now enter the user name and password to log in on the ESXi Host, as shown in Figure 78. Figure 78: Login on the Host Server Page 154 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 6: MegaRAID Storage Manager Overview and Installation | MegaRAID Storage Man- ager Support and Installation on VMWare After you log in, you can view the drives connected to the controller (the physical view), as shown in Figure 79. Figure 79: Physical View Click the Logical tab to view the virtual drives connected to the controller (the logical view), as shown in Figure 80. LSI Corporation Confidential | August 2009 Page 155 Chapter 6: MegaRAID Storage Manager Overview and Installation | MegaRAID Storage Man- MegaRaid SAS Software User Guide ager Support and Installation on VMWare Figure 80: Logical View 6.4.4 Limitations The following are the limitations of this installation and configuration: There is no active event notification, for example, by popup or email There is no status information for the controller There is no user authentification. Events are collected as long as MSM runs on the Client. MSM responds more slowly. For more details on these limitations, see Section 6.4.4.2, Differences in MSM for VMware ESXi. 6.4.4.1 VMWare ESX 3i Management of VMWare ESX 3i is possible only through a Common Information Model Management through CIM and (CIM) provider. It is not possible to install anything on the VMWare ESX3i system, so CMPI management is performed through MSM installed on a remote machine (Linux/Windows). VMWare ESX 3i comes with the Small Footprint CIM Broker (CFCB) CIM Object Manager (or CIMOM). A CIMOM manages communication between providers, which interact with the hardware, and a CIM client, where the administrator manages the system. Page 156 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 6: MegaRAID Storage Manager Overview and Installation | MegaRAID Storage Man- ager Support and Installation on VMWare SFCB supports Common Manageablity Programming Interface (CMPI)-style providers. CMPI defines a common standard used to interface Manageability Instrumentation (providers, instrumentation) to Management Brokers (CIM Object Manager). CMPI standardizes Manageability Instrumentation, which allows you to write and build instrumentation once and run it in different CIM environments (on one platform). 6.4.4.2 Differences in MSM for The following are some of the differences in the MSM utility when you manage a VMware ESXi VMWare server. The following limitations apply to the system information exposed through the application: — Only the IP address and the Host name display. — The operating system type and the operating system architecture do not appear. — There is no support for the controller health information. The following are the MSM screens affected: — Initial MSM framework (hosts) discovery screen: No health information or operating system type display. — Server property page: Only the IP address and the Host name display; the operating system type and operating system architecture do not display. Authentication support: — MSM allows CIMOM server authentication with the user ID and the password for VMware. — Access control is not supported. There is no support for full view or view only access modes. It is always full view access, and multiple clients can have full view access at the same time on the same server. Event Logging: Full functionality support is available for the VMware ESXi operating system, but it works differently than the normal MSM framework mode. The event logging feature for MSM Client connected to a VMware ESXi system behaves as follows: — There is no support for retrieving initial logs (the events that occurred before a client logs in). Only those events that occur after a client logs in appear in the event logger dialog. — System log does not display. — The “Save log” feature is not supported; however, the “Save Log as Text” is still supported. — The “View Log” option allows you to view the logs saved in a text file on the event logger dialog. — The event descriptions might not be identical to a normal MSM Client because the descriptions come from the firmware through the provider. — There is no filtering of events, unlike Monitor Service. — Refreshing of the MSM GUI after any updates on the firmware is slower for a client connected to VMWare ESXi hosts, compared to one connected to Windows/Linux/Solaris hosts. LSI Corporation Confidential | August 2009 Page 157 Chapter 6: MegaRAID Storage Manager Overview and Installation | MegaRAID Storage Man- MegaRaid SAS Software User Guide ager Support and Installation on VMWare Remote discovery and heartbeat mechanism: — For networks that do not have DNS configured, the “hosts” file in the machine on which MSM is installed must be edited as follows: Add an entry to map the VMWare host’s IP address with the hostname. This is for the discovery to happen correctly. In the absence of this entry, the VMWare host would be discovered as 0.0.0.0. Add an entry to map its own IP address (not the loop back address) with the Hostname. This is to ensure that the Alert Event Notifications (AENs) are delivered correctly. — For networks that has DNS configured, the “hosts” file in the machine on which MSM is installed must be edited as follows: When you do the initial configurations for the VMWare host, provide the correct DNS server IP address. In the hosts file of the machine on which MSM is installed, add an entry to map its own IP address (not the loop back address) with the Hostname. This is to ensure that the Asynchronous Event Notifications (AENs) are delivered correctly. The VMWare hosts are discovered only when the Framework service starts on the host where MSM is installed. It takes a while to discover the CIMOM servers. If you start the MSM client immediately after you install MSM (or restart Framework service), you will not be able to discover any hosts in the network. The VMWare ESX3i does not support the heartbeat mechanism to let MSM know whether VMWare ESX3i is still connected. When the connection to the remote VMWare ESX3i is lost, MSM does not indicate this. The only option is to rediscover by restarting the MSM framework. This is supported only on a full installation of MSM; standalone, client-only, and server-only modes do not support VMWare ESX3i management. Supported on following guest operating systems: — Windows Server 2003 and Windows Server 2008 — Linux RHEL 4 and 5 The following describes the status of components related to VMWare ESX3i: — MSM client GUI is supported. — There is no support for Monitor Configurator; you cannot configure the severity of the AENs. — There is no pop-up service support. — There is no email and system log support. — Monitor service support is not available. For Red Hat Enterprise Linux 5, you must create the following symbolic links: NOTE: This step is not required for MSM version 2.90-02 or later. — cd /usr/lib on RHEL 5 — Search for libcrypto, libssl and libsysfs libraries as follows: ls -lrt libcrypto*, ls -lrt libssl*, ls -lrt libsysfs* Page 158 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 6: MegaRAID Storage Manager Overview and Installation | MegaRAID Storage Man- ager Support and Installation on VMWare — If the files libcrypto.so.4, libssl.so.4, and libsysfs.so.1 are missing, manually create sym links as follows: ln -s libcrypto.so libcrypto.so.4 ln -s libssl.so libssl.so.4 ln -s libsysfs.so libsysfs.so.1 NOTE: If the ‘.so’ files are not present in the /usr/lib directory, create a link with the existing version of the library. For example, if libcrypto.so.6 is present and libcrypto.so is not, create the link as follows: ln -s libcrypto.so.6 libcrypto.so.4 NOTE: On a 64-bit operating system, the system libraries will be present in /usr/lib64 directory by default. However, for supporting CIM Plugin, make sure that the libraries are also present in /usr/lib by installing the appropriate RPMs. 6.4.5 Running MSM on VMWare ESX If you are using VMWare ESX 3.5i U2, perform the following steps to make MSM work. 3.5i U2 1. Open the maintenance console/shell in ESX3. a. Press ALT+F1. A shell without any prompt appears. b. Type unsupported (all lowercase) and press ENTER. Typed text is not prompted back. c. Enter your password when prompted. There is no password by default for the shell. If you have set any password from the “yellow” screen (DCUI), use that password. You are prompted (#) next. 2. Enable ssh for remote copy. a. Type the following command. vi /etc/inetd.conf b. Search for ssh in the file. By default, the line that contains ssh has comments. c. Remove the comment by deleting the symbol # in front of the line. d. Save the file and exit. 3. Restart the inetd daemon for the changes to take effect. a. Type the following command to get the pid for inetd: ps | grep inetd b. Type the following command to kill the inetd process: Kill -9 c. Type the following command to restart the inetd daemon: #inetd LSI Corporation Confidential | August 2009 Page 159 Chapter 6: MegaRAID Storage Manager Overview and Installation | Installing and Configur- MegaRaid SAS Software User Guide ing a CIM Provider 4. Type the following command to use scp to copy storelib from a remote machine to the following path. /lib dir scp /libstorelib.so.2.53 /lib/libstorelib.so 5. Restart SFCB and check its status. a. Type the following command to restart SFCB. /etc/init.d/sfcbd restart b. Type the following command to check the status of SFCB. /etc/init.d/sfcbd status NOTE: The updated Storelib library in the /lib directory does not persist across reboots. Each time you restart the VMWare host, you have to follow this procedure to replace the Storelib library. 6.5 Installing and This section describes the installation and configuration of the LSI MegaRAID Common Configuring a CIM Provider Information Model (CIM) provider. The Common Information Model offers common definitions of management information for networks, applications, and services, and allows you to exchange management information across systems throughout a network. On a VMWare ESX3i system, management is possible only through a CIM provider and it is performed through MSM installed on a remote machine running a Linux or Windows operating system. VMWare ESX3i comes with the Small Footprint CIM Broker (SFCB) CIM Object Manager (or CIMOM). A CIMOM manages communication between providers, which interact with the hardware, and a CIM client, where the administrator manages the system. SFCB supports Common Manageablity Programming Interface (CMPI)-style providers. CMPI defines a common standard used to interface Manageability Instrumentation (providers, instrumentation) to Management Brokers (CIM Object Manager). CMPI standardizes Manageability Instrumentation, which allows you to write and build instrumentation once and run it in different CIM environments (on one platform). 6.5.1 Installing a CIM SAS Storage The following procedure documents how to install and un-install the LSI CIM SAS Provider on Linux Storage Provider on a system running on the Linux operating system. NOTE: Uninstall all the previous versions of LsiSASProvider before you install this version. You can check all of the installed versions of LsiSASProvider by using the command rpm -qa | grep LsiSASProvider . Perform the following step to install a CIM SAS Storage Provider on a Linux system. Install the SAS Provider using the Red Hat Package Manager (RPM) by entering the following command: rpm -ivh Page 160 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 6: MegaRAID Storage Manager Overview and Installation | Installing and Configur- ing a CIM Provider The RPM installs all of the neccessary files and the Managed Object Format (MOF), and it registers the libraries. The Provider is now ready to use. NOTE: After you install LSI CIM SAS Provider, the MOF file LSI_SASRaid.mof is available under the /etc/lsi_cimprov/sas/pegasus/common directory. Perform the following step to un- install a CIM SAS Storage Provider on a Linux system. Remove LSI CIM SAS Provider by entering the command: rpm ivh LsiSASProvider-..rpm" This removes all of the necessary files, uninstalls the MOF, and unregisters the libraries. The SAS Provider is no longer on the system. NOTE: tog-pegasus binaries, such as cimmof, cimprovider, and wbemexec, should be in PATH variable of /etc/profile, and hence, should be defined in all environments of the system. For Pegasus version 2.5.x, perform the following steps: 1. After you install the LSI SAS Pegasus provider, verify that libLsiSASProvider.so and libLsiSASProvider.so.1 are in /usr/lib/Pegasus/providers directory. If these files are not present, copy libLsiSASProvider.so.1 from /opt/tog-pegasus/providers/lib to /usr/lib/Pegasus/providers and create a symbolic link libLsiSASProvider.so to /usr/lib/Pegasus/providers/libLsiSASProvider.so.1 at /usr/bin/Pegasus/providers. 2. Restart Pegasus CIM Server and LsiServer by performing the following steps: — To start the tog-pegasus server, execute the following command: # /etc/init.d/tog-pegasus restart — To start LsiSASSever, execute the following command: # /etc/init.d/LsiSASd restart 6.5.2 Installing a CIM SAS Storage The following procedure describes how to install and un-install the LSI CIM SAS Storage Provider on Windows Provider on a system running on a Windows operating system. Perform the following steps to install a CIM SAS Storage Provider on a Windows system. 1. Go To DISK1. 2. Run setup.exe. The installer installs all of the necessary files and the MOF, and registers the COM dll. The Provider is now ready to use. Perform the following steps to uninstall a CIM SAS Storage Provider on a Windows system. 1. Go to Control Panel > Add/Remove Program. 2. Remove the LSI WMI SAS Provider Package. LSI Corporation Confidential | August 2009 Page 161 Chapter 6: MegaRAID Storage Manager Overview and Installation | Installing and Configur- MegaRaid SAS Software User Guide ing an SNMP Agent This step removes all of the necessary files, uninstalls the MOF, and unregisters the COM dll. The SAS Provider is no longer on the system. 6.6 Installing and A Simple Network Management Protocol (SNMP)-based management application can Configuring an SNMP Agent monitor and manage devices through SNMP extension agents. The MegaRAID SNMP subagent reports the information about the RAID controller, virtual drives, physical devices, enclosures, and other items per SNMP request. The SNMP application monitors these devices for issues that might require administrative attention. This section describes the installation and configuration of the LSI MegaRAID SNMP agent on Linux, Solaris, and Windows operating systems. 6.6.1 Installing and Configuring an This section explains how to install and configure SAS SNMP Agent for the SUSE Linux SNMP Agent on Linux and Red Hat Linux operating systems. To do this, perform the following steps. NOTE: This procedure requires that you have Net-SNMP agent installed on the Linux machine. NOTE: The RPM has not been created to support -U version. The RPM -U will probably fail with this RPM. 1. Install LSI SAS SNMP Agent using rpm -ivh NOTE: After installation, find the SAS MIB file LSI-AdapterSAS.mib under the /etc/lsi_mrdsnmp/sas directory. RPM makes the necessary modification needed in the snmpd.conf file to run the agent. NOTE: Before installation, check whether there is any pass command that starts with 1.3.6.1.4.1.3582 OID in snmpd.conf. If so, delete all of the old pass commands that start with 1.3.6.1.4.1.3582 OID. (This situation could occur if an earlier version of LSI SNMP Agent was installed in the system.) The snmpd.conf file structure should be the same as lsi_mrdsnmpd.conf. For reference, a sample conf file (lsi_mrdsnmpd.conf) is in the /etc/lsi_mrdsnmp directory. 2. To run an SNMP query from a remote machine, add the IP address of that machine in the snmpd.conf file, as in this example: com2sec snmpclient 172.28.136.112 public Here, the IP address of the remote machine is 172.28.136.112. Page 162 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 6: MegaRAID Storage Manager Overview and Installation | Installing and Configur- ing an SNMP Agent 3. To receive an SNMP trap to a particular machine, add the IP address of that machine in the com2sec section of the snmpd.conf file. For example, to get a trap in 10.0.0.144, add the following to snmpd.conf. # sec.name source community com2sec snmpclient 10.0.0.144 public 4. To run/stop the snmpd daemon, enter the following command: /etc/init.d/snmpd start/stop 5. To start/stop the SAS SNMP Agent daemon before issuing a SNMP query, enter the following command: /etc/init.d/lsi_mrdsnmpd start/stop You can check the status of the SAS SNMP Agent daemon by checked by issuing the following command: /etc/init.d/lsi_mrdsnmpd status 6. Issue an SNMP query in this format: snmpwalk -v1 -c public localhost .1.3.6.1.4.1.3582 7. You can get the SNMP trap from local machine by issuing the following command: snmptrapd -P -F "%02.2h:%02.2j TRAP%w.%q from %A %v\n" NOTE: To receive a trap in a local machine with Net-SNMP version 5.3, you must modify the snmptrapd.conf file (generally located at /var/net-snmp/snmptrapd.conf). Add "disableAuthorization yes" in snmptrapd.conf and then execute "sudo snmptrapd -P -F "%02.2h:%02.2j TRAP%w.%q from %A %v\n". NOTE: It is assumed that snmpd.conf is located at /etc/snmp for Red Hat and /etc for SLES. You can change the file location from /etc/init.d/lsi_mrdsnmpd file. You can install SNMP without the trap functionality. To do so, set the "TRAPIND" environment variable to "N" before running RPM. Before you install a new version, you must uninstall all previous versions. For SLES 10, perform the following steps to run SNMP: 1. Copy /etc/snmp/snmpd.conf to /etc/snmpd.conf. 2. Modify the /etc/init.d/snmpd file and change SNMPDCONF=/etc/snmp/snmpd.conf entry to SNMPDCONF=/etc/snmpd.conf. 3. Run LSI SNMP rpm. 6.6.2 Installing and Configuring an This section explains how to install and configure SAS SNMP Agent for the Solaris SNMP Agent on Solaris operating system. 6.6.2.1 Prerequisites This package requires that you have Solaris System Management Agent installed on the Solaris machine. LSI Corporation Confidential | August 2009 Page 163 Chapter 6: MegaRAID Storage Manager Overview and Installation | Installing and Configur- MegaRaid SAS Software User Guide ing an SNMP Agent 6.6.2.2 Installation SNMP on To install SNMP for Solaris, perform the following procedure: Solaris 1. Unzip the LSI SAS SNMP Agent package. 2. Run the install script by executing the following command: # ./install.sh NOTE: The installation will exit if there are any existing versions of storelib and sassnmp installed on the Solaris machine. Uninstall the existing version by using the following commands: # pkgrm storelib (to uninstall storelib library) # pkgrm sassnmp (to uninstall LSI SAS SNMP Agent) 6.6.2.3 LSI SAS SNMP MIB After you install the LSI SAS SNMP Agent package, the MIB file Location LSI-AdapterSAS.mib is installed under /etc/lsi_mrdsnmp/sas directory. 6.6.2.4 Starting, Stopping, and The following commands are used to start, stop, restart, and check the status of the Checking the Status of the LSI SAS Solaris System Managment Agent (net snmpd) daemon: SNMP Agent Start: # svcadm enable svc:/application/management/sma:default Stop: # svcadm disable svc:/application/management/sma:default Restart: # svcadm restart svc:/application/management/sma:default Status: # svcs svc:/application/management/sma:default NOTE: Online indicates that the SMA is started. Disabled indicates that the SMA is stopped. The following commands are used to start, stop, restart, and check the status of the SAS SNMP Agent daemon: Start: #/etc/init.d/lsi_mrdsnmpd start Stop: #/etc/init.d/lsi_mrdsnmpd stop Restart: #/etc/init.d/lsi_mrdsnmpd restart Status: #/etc/init.d/lsi_mrdsnmpd status 6.6.2.5 Configuring snmpd.conf By default, SNMP queries (walk, get) can be executed from any remote machine without any changes to the snmpd.conf file. To quickly add a new community and client access, perform the following steps: 1. Stop the SMA service by executing the following command: # svcadm disable svc:/application/management/sma:default 2. Add read-only and read-write community names. a. Add a read-only community name and client/hostname/ipaddress under "SECTION: Access Control Setup" in the /etc/sma/snmp/snmpd.conf file, as shown in the following excerpt: Page 164 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 6: MegaRAID Storage Manager Overview and Installation | Installing and Configur- ing an SNMP Agent ################################################# # SECTION: Access Control Setup # This section defines who is allowed to talk to your # running SNMP Agent. # rocommunity: a SNMPv1/SNMPv2c read-only access # community name # arguments: community # [default|hostname|network/bits] [oid] # rocommunity snmpclient 172.28.157.149 ################################################# b. Add a readwrite community name and client/hostname/ipaddress under "SECTION: Access Control Setup" in /etc/sma/snmp/snmpd.conf file, as shown in the following excerpt: ################################################# # SECTION: Access Control Setup # This section defines who is allowed to talk to your # running # snmp agent. # rocommunity: a SNMPv1/SNMPv2c read-only access # community name # arguments: community # [default|hostname|network/bits] [oid] # rwcommunity snmpclient 172.28.157.149 ################################################# 3. Start the SMA service by using the following command: # svcadm enable svc:/application/management/sma:default NOTE: Refer to the command man snmpd.conf for more information about configuring the snmpd.conf file. 6.6.2.6 Configuring SNMP Traps To receive SNMP traps, perform the following steps: 1. Stop the LSI SAS SNMP Agent by using the following command: #/etc/init.d/lsi_mrdsnmpd stop 2. Edit the /etc/lsi_mrdsnmp/sas/sas_TrapDestination.conf file and add the ipaddress as shown in the following excerpt: LSI Corporation Confidential | August 2009 Page 165 Chapter 6: MegaRAID Storage Manager Overview and Installation | Installing and Configur- MegaRaid SAS Software User Guide ing an SNMP Agent ################################################# # Agent Service needs the IP addresses to sent trap # The trap destination may be specified in this file # or using snmpd.conf file. Following indicators can # be set on "TrapDestInd" to instruct the agent to # pick the IPs as the destination. # 1 - IPs only from snmpd.conf # 2 - IPs from this file only # 3 - IPs from both the files ################################################# TrapDestInd 2 #############Trap Destination IP################## 127.0.0.1 public 172.28.157.149 public ################################################# 3. Start the LSI SAS SNMP Agent by entering the following command: #/etc/init.d/lsi_mrdsnmpd start 6.6.2.7 Uninstalling the SNMP The uninstall.sh script is located under the /etc/lsi_mrdsnmp/sas directory. Use Package the following command to uninstall the package: # cd /etc/lsi_mrdsnmp/sas # ./uninstall.sh 6.6.3 Installing an SNMP Agent on This section explains how to install and configure SAS SNMP Agent for the Windows Windows operating system. 6.6.3.1 Installing SNMP Agent Perform the following steps to install SNMP Agent: 1. Run setup.exe from DISK1. 2. Use SNMP Manager to retrieve the SAS data (it is assumed that you have compiled LSI-AdapterSAS.mib file already). The LSI-AdapterSAS.mib file is available under %ProgramFiles%\LSI Corporation\SNMPAgent\SAS directory. 3. Use a trap utility to get the traps. NOTE: Before you install the Agent, make sure that SNMP Service is already installed in the system. 6.6.3.2 Installing SNMP Service If you do not have SNMP Service installed on your system, perform the following steps for Windows to install SNMP Service for a Windows system: 1. Select Add/Remove Programs from Control Panel. 2. Select Add/Remove Windows Components in the left side of the Add/Remove Programs window. 3. Select Management and Monitoring Tools. 4. Click Next and follow any prompts to complete the installation procedure. Page 166 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 6: MegaRAID Storage Manager Overview and Installation | MegaRAID Storage Man- ager Support and Installation on Solaris 10 6.6.3.3 Configuring SNMP Perform the following steps to configure SNMP Service on the server side. Service on the Server Side 1. Select Administrative Tools from Control Panel. 2. Select Services from the Administrative Tools window. 3. Select SNMP Service in the Services window. 4. Open SNMP Service. 5. Click the Security tab and make sure that Accept SNMP Packets from any host is selected. 6. Click the Traps tab and select the list of host IPs to which you want the traps to be sent with the community name. 6.7 MegaRAID Storage This section documents the installation of MegaRAID Storage Manager on the Solaris Manager Support and 10U5 and U6 (both x86 and x64) operating system. Installation on Solaris 10 6.7.1 Installing MegaRAID Storage Follow these steps to install MegaRAID Storage Manager software on a system running Manager Software for Solaris 10 Solaris 10, update 5: 1. Copy the MSM_linux_installer...tar.gz file to a temporary folder. 2. Untar the MSM_linux_installer...tar.gz file using the following command: tar -zxvf MSM_linux_installer...tar.gz This step creates a new disk directory. 3. Go to the new disk directory, and find and read the readme.txt file. 4. Enter the Bash shell. 5. Execute the command ./install.sh present in the disk directory. 6. When prompted by the installation scripts, select Y to complete the installation. 6.7.2 Uninstalling MegaRAID Follow these steps to uninstall MegaRAID Storage Manager software on a system Storage Manager Software for Solaris 10 running Solaris 10, update 5: 1. Execute the Uninstaller.sh file located in /opt/MegaRaidStorageManager directory. 2. When prompted by the uninstallation scripts, select Y to complete the installation. NOTE: To shut down MSM Framework service, run svcadm disable -t MSMFramework. It is advisable to stop Monitor service before stopping MSM Framework service. To stop Monitor service, run svcadm disable -t MSMMonitor. NOTE: To start the Framework service, run svcadm enable MSMFramework. To start the monitor service run svcadm enable MSMMonitor. NOTE: To check the status of MSM services execute the command svcs -a | grep -i msm. LSI Corporation Confidential | August 2009 Page 167 Chapter 6: MegaRAID Storage Manager Overview and Installation | MegaRAID Storage Man- MegaRaid SAS Software User Guide ager Support and Installation on Solaris 10 Page 168 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 7: MegaRAID Storage Manager Window and Menus | Starting MegaRAID Storage Manager Software Chapter 7 MegaRAID Storage Manager Window and Menus This chapter explains how to start MegaRAID Storage Manager software and describes the MegaRAID Storage Manager window and menus. 7.1 Starting MegaRAID Follow these steps to start MegaRAID Storage Manager software and view the main Storage Manager Software window: 1. Start the program using the method required for your operating system environment: — To start MegaRAID Storage Manager software on a Microsoft Windows system, select Start->Programs->MegaRAID Storage Manager->StartupUI, or double-click the MegaRAID Storage Manager shortcut on the desktop. NOTE: If a warning appears stating that Windows Firewall has blocked some features of the program, click Unblock to allow MegaRAID Storage Manager software to start. (The Windows Firewall sometimes blocks the operation of programs that use Java.) — To start MegaRAID Storage Manager software on a Red Hat Linux system, select Applications->System Tools->MegaRAID Storage Manager StartupUI. — To start MegaRAID Storage Manager software on a SUSE Linux/SLES system, select Start->System->More Programs ->MegaRAID Storage Manager. LSI Corporation Confidential | August 2009 Page 169 Chapter 7: MegaRAID Storage Manager Window and Menus | Starting MegaRAID Storage MegaRaid SAS Software User Guide Manager Software 2. When the program starts, the Select Server window appears, as shown in Figure 81. Figure 81: Select Server Window If the circle in the server icon is orange instead of green, it means that the server is running in a degraded state—for example, because a drive used in a virtual drive has failed. If the circle is red, the storage configuration in the server has failed. NOTE: To access servers on a different subnet, type in the box at the bottom of the screen the IP address of a server in the desired subnet where the MegaRAID Storage Manager software is running, and click Update. If you check the Connect to remote server at: IP address box, you can also access a standalone (remote) installation of MegaRAID Storage Manager software, if it has a network connection. NOTE: For the VMWare CIMOM, the server button does not denote the health of the server. The button is always green regardless of the health of the system. NOTE: The VMWare server does not show the system health and the operating system labels. It shows only the Hostname and the IP address of the server. NOTE: When connecting to a VMWare server on a different subnet, one or more Frameworks have to be running in the subnet in order to connect to the CIMOM. Page 170 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 7: MegaRAID Storage Manager Window and Menus | MegaRAID Storage Manager Window 3. Double-click the icon of the server that you want to access. The Server Login window appears, as shown in Figure 82. Figure 82: Server Login Window 4. Select an access mode from the drop-down menu. — Select Full Access if you need to both view the current configuration and change the configuration. — Select View Only if you need to only view and monitor the configuration. NOTE: When connected to VMWare system, the Server Login screen shows only one label for access. "Full Access". Multiple users can have full access to the VMWare server. 5. Enter your user name and password, and click Login. NOTE: If the computer is networked, this is the login to the computer itself, not the network login. Enter the root/administrator user name and password to use Full Access mode. NOTE: In Linux, users belonging to the root group can log in. You do not have to be the user “root”. If your user name and password are correct for the Login mode you have chosen, the main MegaRAID Storage Manager window appears. 7.2 MegaRAID Storage This section describes the MegaRAID Storage Manager window, which is shown in Manager Window Figure 83. LSI Corporation Confidential | August 2009 Page 171 Chapter 7: MegaRAID Storage Manager Window and Menus | MegaRAID Storage Manager MegaRaid SAS Software User Guide Window Figure 83: Main MegaRAID Storage Manager Window The following topics describe the panels and menu options that appear on this screen. 7.2.1 Physical/Logical View Panel The left panel of the MegaRAID Storage Manager window displays either the Physical view or the Logical view of the system and the devices in it, depending on which tab is selected. The Physical view shows the hierarchy of physical devices in the system. At the top of the hierarchy is the system itself. One or more controllers are installed in the system. The controller label identifies the MegaRAID controller, such as the MegaRAID SAS 8708ELP controller, so that you can easily differentiate between multiple controllers. Each controller has one or more ports. Drives and other devices are attached to the ports. The Logical view shows the hierarchy of controllers, virtual drives, and drive groups that are defined on the system. (Drives also appear in the Logical view, so you can see which drives are used by each virtual drive.) Page 172 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 7: MegaRAID Storage Manager Window and Menus | MegaRAID Storage Manager Window The following icons in the left panel represent the controllers, drives, and other devices: System Controller Backplan Enclosure Port Drive group Virtual drive Slot Dedicated hot spare Global hot spare Battery backup unit (BBU) Tape drive CD-ROM NOTE: MegaRAID Storage Manager shows the icons for tape drive devices; however, no tape-related operations are supported by the utility. If these operations are required, use a separate backup application. A red circle to the right of an icon indicates that the device has failed. For example, this icon indicates that a drive has failed: . A yellow circle to the right of an icon indicates that a device is running in a partially degraded state. For example, this icon indicates that a virtual drive is running in a degraded state because a drive has failed: . 7.2.2 Properties/Operations Panels The right panel of the MegaRAID Storage Manager window has either two tabs or three tabs, depending on which kind of device you select in the left panel. The Properties tab displays information about the selected device. For example, if you select a controller icon in the left panel, the Properties tab lists information about the controller, such as the controller name, NVRAM size, and device port count. For more information, see Section 9.3, Monitoring Controllers Section 9.4, Monitoring Drives and Section 9.6, Monitoring Virtual Drives LSI Corporation Confidential | August 2009 Page 173 Chapter 7: MegaRAID Storage Manager Window and Menus | MegaRAID Storage Manager MegaRaid SAS Software User Guide Window The Operations tab lists the operations that can be performed on the device that you select in the left panel. For example, Figure 84 shows the options that are available when you select a controller. These include enabling or silencing the alarm and running a Patrol Read. Some types of devices, such as drive groups and ports, do not have operations associated with them. For more information, see Chapter 7, MegaRAID Storage Manager Window and Menus Figure 84: Operations Tab 7.2.3 Event Log Panel The lower part of the MegaRAID Storage Manager window displays the system event log entries, as shown in Figure 83. New event log entries appear during the session. Each entry has an ID, an error level indicating the severity of the event, the timestamp and date, and a brief description of the event. For more information about the event log, see Section 9.1, Monitoring System Events For more information about the event log entries, see Appendix A, Events and Messages 7.2.4 Menu Bar Here are brief descriptions of the main selections on the MegaRAID Storage Manager menu bar. Specific menu options are described in more detail in Chapter 8, Chapter 9, and Chapter 10 of this manual. 7.2.4.1 File Menu The File menu has an Exit option for exiting from the MegaRAID Storage Manager software. It also has a Rescan option for updating the display in the MegaRAID Storage Manager window. (Rescan is seldom required; the display normally updates automatically.) Page 174 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 7: MegaRAID Storage Manager Window and Menus | MegaRAID Storage Manager Window 7.2.4.2 Operations Menu The Operations menu is available when a controller, drive, virtual drive, or battery backup unit is selected in the MegaRAID Storage Manager window. The Operations menu options vary depending on the type of device selected in the left panel of the MegaRAID Storage Manager window. For example, the Scan for Foreign Config option is available only when a controller is selected. The options also vary depending on the current state of the selected device. For example, if you select an offline drive, the Make Drive Online option appears in the Operations menu. You can view the Operations selections on the main window on the Operations tab in the right panel. If an operation requires user inputs before it can be executed, it appears in the Operations tab but not in the Operations menu. A device-specific Operations menu pops up if you right-click a device icon in the left panel. Configuration options are also available. This is where you access the Configuration Wizard and other configuration-related commands. To access the other configuration commands, select the controller in the left panel, and then select Operations-> Configuration. 7.2.4.3 Group Operations Menu The Group Operations menu options include Check Consistency, Show Progress, and Initialize. 7.2.4.4 Tools Menu On the Tools menu you can select Tools->Configure->Configure Alerts to access the Event Configuration Notification screen, which you can use to set the alert delivery rules, event severity levels, exceptions, and email settings. For more information, see Section 9.2, Configuring Alert Notifications 7.2.4.5 Log Menu The Log menu includes options for saving and clearing the message log. For more information, see Appendix A, Events and Messages 7.2.4.6 Help Menu On the Help menu you can select Help->Help to view the MegaRAID Storage Manager online help file. You can select Help->About to view version information for the MegaRAID Storage Manager software. NOTE: When you use the MegaRAID Storage Manager online help, you may see a warning message that Internet Explorer has restricted the file from showing active content. If this warning appears, click on the active content warning bar and enable the active content. NOTE: If you are using the Linux operating system, you must install Firefox® or Mozilla® for the MegaRAID Storage Manager online help to display. NOTE: When connected to the VMWare server, only the IP address and the hostname information display. The other information, such as the operating system name, version, and architecture do not display. LSI Corporation Confidential | August 2009 Page 175 Chapter 7: MegaRAID Storage Manager Window and Menus | MegaRAID Storage Manager MegaRaid SAS Software User Guide Window Page 176 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 8: Configuration | Creating a New Storage Configuration Chapter 8 Configuration This chapter explains how to use MegaRAID Storage Manager software to create and modify storage configurations on LSI SAS controllers. The LSI SAS controllers support RAID 0, RAID 1, RAID 5, RAID 6, RAID 10, RAID 50, and RAID 60 storage configurations. To learn more about RAID and RAID levels, see Chapter 2, Introduction to RAID. The Modify Drive Group Wizard allows you to easily change RAID levels or to expand the capacity of existing virtual drives. NOTE: You cannot create or modify a storage configuration unless you are logged on to a server with administrator privileges. 8.1 Creating a New Storage You can use the MegaRAID Storage Manager to create new storage configurations on Configuration systems with LSI SAS controllers. You can create the following types of configurations: Simple configuration specifies a limited number of settings and has the system select drives for you. This option is the easiest way to create a virtual drive. Advanced configuration lets you choose additional settings and customize virtual drive creation. This option provides greater flexibility when creating virtual drives for your specific requirements. This section describes the virtual drive parameters and explain how to create simple and advanced storage configurations. 8.1.1 Selecting Virtual Drive Settings This section describes the virtual drive settings that you can select when you use the advanced configuration procedure to create virtual drives. You should change these parameters only if you have a specific reason for doing so. It is usually best to leave them at their default settings. Initialization state: Initialization prepares the storage medium for use. Specify the initialization status: — No Initialization: (the default) The new configuration is not initialized and the existing data on the drives is not overwritten. — Fast Initialization: The firmware quickly writes zeroes to the first and last 8-Mbyte regions of the new virtual drive and then completes the initialization in the background. This allows you to start writing data to the virtual drive immediately. — Full Initialization: A complete initialization is done on the new configuration. You cannot write data to the new virtual drive until the initialization is complete. This can take a long time if the drives are large. LSI Corporation Confidential | August 2009 Page 177 Chapter 8: Configuration | Creating a New Storage Configuration MegaRaid SAS Software User Guide Stripe size: Stripe sizes of 8, 16, 32, 64, 128, 256, 512, and 1024 Kbytes are supported. The default is 64 Kbytes. For more information, see the striping Glossary entry. Read policy: Specify the read policy for this virtual drive: — Always read ahead: Read ahead capability allows the controller to read sequentially ahead of requested data and to store the additional data in cache memory, anticipating that the data will be needed soon. This speeds up reads for sequential data, but there is little improvement when accessing random data. — No read ahead: (the default) Disables the read ahead capability. — Adaptive read ahead: When selected, the controller begins using read ahead if the two most recent drive accesses occurred in sequential sectors. If the read requests are random, the controller reverts to No read ahead. Write policy: Specify the write policy for this virtual drive: — Write back: In this mode the controller sends a data transfer completion signal to the host when the controller cache has received all of the data in a transaction. — Write through: (the default) In this mode the controller sends a data transfer completion signal to the host when the drive subsystem has received all of the data in a transaction. NOTE: The Write Policy depends on the status of the battery backup unit (BBU). If the BBU is not present, is bad, or is being charged, the default Write Policy will be Write through. This provides better data protection. I/O policy: The IO policy applies to reads on a specific virtual drive. It does not affect the read ahead cache. — Cached IO: In this mode, all reads are buffered in cache memory. — Direct IO: (the default) In this mode, reads are not buffered in cache memory. Data is transferred to the cache and the host concurrently. If the same data block is read again, it comes from cache memory. Cached IO provides faster processing, and Direct IO ensures that the cache and the host contain the same data. Access policy: Select the type of data access that is allowed for this virtual drive. — Read/Write: (the default) Allow read/write access. This is the default. — Read Only: Allow read-only access. — Blocked: Do not allow access. Disk cache policy: Select a cache setting for this drive: — Enable: Enable the disk cache. — Disable: Disable the disk cache. — Unchanged: (the default) Leave the current disk cache policy unchanged. 8.1.2 Creating a Virtual Drive Using Simple configuration is the quickest and easiest way to create a new storage Simple Configuration configuration. When you select simple configuration mode, the system creates the best configuration possible using the available drives. Page 178 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 8: Configuration | Creating a New Storage Configuration NOTE: You cannot created spanned drives using the simple configuration procedure. To create spanned drives, use the advanced configuration procedure described in Section 8.1.3, Creating a Virtual Drive Using Advanced Configuration. Follow these steps to create a new storage configuration in simple configuration mode. 1. Perform either of the following steps: — Right-click the controller node in the device tree in the left frame of the MegaRAID Storage Manager window and select Create Virtual Drive — Select the controller node and select Operations->Create Virtual Drive in the menu bar, as shown in Figure 85. Figure 85: Virtual Drive Creation Menu LSI Corporation Confidential | August 2009 Page 179 Chapter 8: Configuration | Creating a New Storage Configuration MegaRaid SAS Software User Guide The dialog box for the configuration mode (simple or advanced) appears, as shown in Figure 86. Figure 86: Virtual Drive Creation Mode 2. Click Simple and press Next. The Create Virtual Drive screen appears, as shown in Figure 87. Page 180 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 8: Configuration | Creating a New Storage Configuration Figure 87: Create Virtual Drive Screen 3. Select the RAID level desired for the virtual drive. When you use simple configuration, the RAID controller supports RAID levels 1, 5, and 6. In addition, it supports independent drives (configured as RAID 0). The screen text gives a brief description of the RAID level that you select. The RAID levels that you can choose depend on the number of drives available. To learn more about RAID levels, see Chapter 2, Introduction to RAID. 4. Click the box next to Assign a hot spare if you want to assign a hot spare drive to the virtual drive. Hot spares are drives that are available to replace failed drives automatically in a redundant virtual drive (RAID 1, RAID 5, or RAID 6). 5. Click the box next to the text Use drive security if you want to set a drive security method. The Full Disk Encryption (FDE) feature provides the ability to encrypt data and use disk-based key management for your data security solution. This solution provides protection to the data in the event of theft or loss of drives. 6. Select the number of virtual drives that you want to create. 7. Select the capacity for the virtual drives. Each virtual drive has the same capacity. LSI Corporation Confidential | August 2009 Page 181 Chapter 8: Configuration | Creating a New Storage Configuration MegaRaid SAS Software User Guide 8. Click Next. The Create Virtual Drive - Summary window appears, as shown in Figure 88. This window shows the selections you made for simple configuration. Figure 88: Create Virtual Drive - Summary Window 9. Click Back to return to the previous screen to change any selections or click Finish to accept and complete the configuration. The new storage configuration will be created and initialized. NOTE: If you create a large configuration using drives that are in powersave mode, it could take several minutes to spin up the drives. A progress bar appears as the drives spin up. If any of the selected unconfigured drives fail to spin up, a box appears to identify the drive or drives. After the configuration is completed, a dialog box notifies you that the virtual drives were created successfully. 8.1.3 Creating a Virtual Drive Using The advanced configuration procedure provides an easy way to create a new storage Advanced Configuration configuration. Advanced configuration gives you greater flexibility than simple configuration because you can select the drives and the virtual drive parameters when you create a virtual drive. In addition, you can use the advanced configuration procedure to create spanned drive groups. Follow these steps to create a new storage configuration in the advanced configuration mode. This example shows the configuration of a spanned drive group. Perform either of the following steps: Right click on the controller node in the device tree in the left frame of the MegaRAID Storage Manager window and select Create Virtual Drive Page 182 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 8: Configuration | Creating a New Storage Configuration Select the controller node and select Operations->Create Virtual Drive in the menu bar, as shown in Figure 89 Figure 89: Virtual Drive Creation Menu The dialog box shown in Figure 90 appears. LSI Corporation Confidential | August 2009 Page 183 Chapter 8: Configuration | Creating a New Storage Configuration MegaRaid SAS Software User Guide Figure 90: Virtual Drive Creation Mode 10. Click Advanced and press Next. The Create Drive Group Settings screen appears, as shown in Figure 91. Figure 91: Create Drive Group Settings Screen 11. Select the following items on the Create Drive Group Settings screen: a. Select the RAID level desired for the drive group from the drop-down menu. To make a spanned drive, select RAID 10, RAID 50, or RAID 60 in the RAID level field. Page 184 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 8: Configuration | Creating a New Storage Configuration Drive Group 0 and Span 0 appear in the Drive groups field when you select RAID 10, 50, or 60. The RAID controller supports RAID levels 1, 5, 6, 10, 50, and 60. In addition, it supports independent drives (configured as RAID 0 and RAID 00). The screen text gives a brief description of the RAID level you select. RAID levels you can choose depend on the number of drives available. To learn more about RAID levels, see Chapter 2, Introduction to RAID. b. Scroll down the menu for the Drive security method field if you want to set a drive security method. The FDE feature provides the ability to encrypt data and use disk-based key management for your data security solution. This solution provides protection to the data in the event of theft or loss of drives. c. Select unconfigured drives from the list of drives and click Add> to add them to the drive group. The selected drives appear under Span 0 below Drive Group 0, as shown in Figure 92. Figure 92: Span 0 of Drive Group 0 d. Click Create Span to create a second span in the drive group. e. Select unconfigured drives from the list of drives and click Add> to add them to the drive group. f. The selected drives appear under Span 1 below Drive Group 0, as shown in Figure 93. LSI Corporation Confidential | August 2009 Page 185 Chapter 8: Configuration | Creating a New Storage Configuration MegaRaid SAS Software User Guide Figure 93: Span 0 and Span 1 of Drive Group 0 g. Click Create Drive Group to make a drive group with the spans. h. Click Next to complete this step. The Virtual drive settings window appears, as shown in Figure 94. The drive group and the default virtual drive settings appear. The options to update the virtual drive or remove the virtual drive are grayed out until you create the virtual drive. NOTE: The parameters in the Virtual drive settings window display in disabled mode (grayed out) for SAS-Integrated RAID (IR) controllers because these parameters do not apply to SAS-IR controllers. Page 186 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 8: Configuration | Creating a New Storage Configuration Figure 94: Virtual Drive Settings Window 12. Change any virtual drive settings, if desired. See Section 8.1.1, Selecting Virtual Drive Settings for more information about the virtual drive settings. 13. Click Create Virtual Drive. The new virtual drive appears under the drive group, as shown in Figure 95. The options Update Virtual Drive and Remove Virtual Drive are now available. Update Virtual Drive allows you to change the virtual drive settings and Remove Virtual Drive allows you to delete the virtual drive. LSI Corporation Confidential | August 2009 Page 187 Chapter 8: Configuration | Creating a New Storage Configuration MegaRaid SAS Software User Guide Figure 95: New Virtual Drive 0 14. Click Next. The Create Virtual Drive - Summary window appears, as shown in Figure 96. This window shows the selections you made for advanced configuration. Figure 96: Create Virtual Drive Summary Window 15. Click Back to return to the previous screen to change any selections or click Finish to accept and complete the configuration. The new storage configuration will be created and initialized. Page 188 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 8: Configuration | Selecting Full Disk Encryption Security Options NOTE: If you create a large configuration using drives that are in powersave mode, it could take several minutes to spin up the drives. A progress bar appears as the drives spin up. If any of the selected unconfigured drives fail to spin up, a box appears to identify the drive or drives. After the configuration is completed, a dialog box notifies you that the virtual drives were created successfully. If more drive capacity exists, the dialog box asks whether you want to create more virtual drives. If no more drive capacity exists, you are prompted to close the configuration session. 16. Select Yes or No to indicate whether you want to create additional virtual drives. If you select Yes, the system takes you to the Create Virtual Drive screen, as shown in Figure 87. If you select No, the utility asks whether you want to close the wizard. 17. If you selected No in the previous step, select Yes or No to indicate whether you want to close the wizard. If you select Yes, the configuration procedure closes. If you select No, the dialog box closes and you remain on the same page. 8.2 Selecting Full Disk The Full Disk Encryption feature provides the ability to encrypt data and use disk-based Encryption Security Options key management for your data security solution. This solution provides protection to the data in the event of theft or loss of physical drives. This section describes how to enable, change, or disable drive security, and how to import a foreign configuration. 8.2.1 Enabling Drive Security Perform the following steps to enable drive security. To do this, you create a security key identifier, security key, and (optional) passphrase. 1. Select the Physical View tab in the left panel of the MegaRAID Storage Manager window, and click a controller icon. 2. Right-click on the controller icon to display the menu of operations available. 3. Select Change Drive Security->Enable, as shown in Figure 97. NOTE: You can also access the drive security settings menu by clicking the Operations menu on the menu bar and selecting Change Drive Security->Enable. LSI Corporation Confidential | August 2009 Page 189 Chapter 8: Configuration | Selecting Full Disk Encryption Security Options MegaRaid SAS Software User Guide Figure 97: Drive Security Settings Menu The Enable Drive Security – Introduction screen appears as shown in Figure 98. This screen describes how the wizard will help you create a security on the controller. After you create a security key, you have the option to create secure virtual drives using the security key. First, create the security key identifier. The identifier appears whenever you have to enter the security key. If you have more than one security key, the identifier helps you determine which security key to enter. Next, create a security key. You need the security key to perform certain operations. Finally, you have the option to create a passphrase for additonal security. If you create a passphrase, you must enter it whenever you boot your server. Page 190 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 8: Configuration | Selecting Full Disk Encryption Security Options Figure 98: Enable Drive Security - Introduction Screen 4. On the introduction screen, click Next. The Enter Security Key ID screen appears, as shown in Figure 99. LSI Corporation Confidential | August 2009 Page 191 Chapter 8: Configuration | Selecting Full Disk Encryption Security Options MegaRaid SAS Software User Guide Figure 99: Enter Security Key ID Screen 5. Use the default security key identifier or enter a new security key identifier. NOTE: If you create more than one security key, it is highly recommended that you change the security key identifier. Otherwise, you cannot differentiate between the security keys. 6. Click Next. The Enable Security Key ID screen appears as shown in Figure 100. Page 192 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 8: Configuration | Selecting Full Disk Encryption Security Options Figure 100: Enter Security Key Screen 7. Click Suggest Security Key to have the systems create the security key or enter a new security key. Enter the new security key again to confirm. NOTE: If you forget the security key, you will lose access to your data. Be sure to record your security key information. You might need to enter the security key to perform certain operations. The security key is case-sensitive. It must be between eight and thirty-two characters and contain at least one number, one lowercase letter, one uppercase letter, and one non-alphanumeric character (e.g. < > @ +). The space character is not permitted. NOTE: Non-US keyboard users must be careful not to enter DBCS characters in the security key field. Firmware works with the ASCII character set only. 8. Click Next. The Enter Pass Phrase screen appears, as shown in Figure 101. LSI Corporation Confidential | August 2009 Page 193 Chapter 8: Configuration | Selecting Full Disk Encryption Security Options MegaRaid SAS Software User Guide Figure 101: Enable Drive Security - Enter Pass Phrase Screen 9. Click Use a pass phrase in addition to the security key if you want to use the pass phrase for additional security. 10. Enter a passphrase in the Pass phrase field and then enter the passphrase in the Confirm field. The passphrase is case-sensitive. It must be between eight and thirty-two characters and contain at least one number, one lowercase letter, one uppercase letter, and one non-alphanumeric character (e.g. < > @ +). The space character is not permitted. Warning messages appear if there is a mismatch between the characters entered in the Passphrase field and the Confirm field, or if there is an invalid character entered. CAUTION: Be sure to record the passphrase. If you lose the passphrase, you could lose access to your data. 11. Click Next. The Confirm Enable Drive Security screen appears, as shown in Figure 102, to show the changes requested to the drive security settings. CAUTION: If you forget the security key, you will lose access to your data. Be sure to record your security key. You might need to enter the security key to perform certain operations. Page 194 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 8: Configuration | Selecting Full Disk Encryption Security Options Figure 102: Confirm Create Security Key Screen 12. Confirm that you want to enable drive security on this controller and have recorded the security settings for future reference. MSM enables drive security and and returns you to the main menu. 8.2.2 Changing the Security Key Perform the following steps to change the encryption settings for the security key Identifier, Security Key, and Pass Phrase identifier, security key, and pass phrase. 1. Select the Physical View tab in the left panel of the MegaRAID Storage Manager window, and click a controller icon. 2. Right-click on the controller icon to display the menu of operations available. 3. Select Change Drive Security->Change Security Settings, as shown in Figure 103. NOTE: You can also access the drive security settings menu by clicking the Operations menu on the menu bar and selecting Change Drive Security->Change Security Settings. LSI Corporation Confidential | August 2009 Page 195 Chapter 8: Configuration | Selecting Full Disk Encryption Security Options MegaRaid SAS Software User Guide Figure 103: Change Drive Security Menu The Change Security Settings – Introduction screen appears as shown in Figure 104. This screen lists the actions you can perform, which include editing the security key identifier, security key, and the passphrase. Page 196 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 8: Configuration | Selecting Full Disk Encryption Security Options Figure 104: Change Security Settings - Introduction Screen 4. On the introduction screen, click Next. The Change Security Settings - Security Key ID screen appears, as shown in Figure 105. Figure 105: Change Security Settings - Security Key ID Screen 5. Keep the exisiting security key identifier or enter a new security key identifier. LSI Corporation Confidential | August 2009 Page 197 Chapter 8: Configuration | Selecting Full Disk Encryption Security Options MegaRaid SAS Software User Guide NOTE: If you change the security key, it is highly recommended that you change the security key identifier. Otherwise, you will not be able to differentiate between the security keys. 6. Click Next. The Change Security Settings - Security Key screen appears as shown in Figure 106. Figure 106: Change Security Settings - Security Key Screen 7. Click Use the existing drive security key to use the existing drive security key or enter a new security key and then enter the new security key again to confirm. CAUTION: If you forget the security key, you will lose access to your data. Be sure to record your security key information. You might need to enter the security key to perform certain operations. The security key is case-sensitive. It must be between eight and thirty-two characters and contain at least one number, one lowercase letter, one uppercase letter, and one non-alphanumeric character (e.g. < > @ +). The space character is not permitted. NOTE: Non-US keyboard users must be careful not to enter DBCS characters in the security key field. Firmware works with the ASCII character set only. 8. Click Next. The Authenticate Drive Security Settings Screen appears, as shown in Figure 107. Authentification is required for the changes that you requested to the drive security settings. Page 198 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 8: Configuration | Selecting Full Disk Encryption Security Options Figure 107: Authenticate Drive Security Settings Screen 9. Enter the current security key to authenticate the changes. The Change Security Settings - Pass Phrase screen appears, as shown in Figure 108. Figure 108: Change Security Settings - Pass Phrase Screen 10. If you choose to, click the option to use a passphrase in addition to the security key. 11. If you chose to use a passphrase, either enter the existing passphrase or enter a new passphrase, and enter the passphrase again to confirm. The text box for the passphrase can hold up to 32 characters. The key must be at least eight characters. The next screen that appears describes the changes you made and asks you whether you want to confirm these changes. 12. Click the checkbox to confirm that you have recorded the security settings for future reference and then click Yes to confirm that you want to change the drive security settings. MSM updates the existing configuration on the controller to use the new security settings and returns you to the main menu. LSI Corporation Confidential | August 2009 Page 199 Chapter 8: Configuration | Selecting Full Disk Encryption Security Options MegaRaid SAS Software User Guide 8.2.3 Disabling Drive Security NOTE: If you disable drive security, your existing data will not be secure and you cannot create any new secure virtual drives. Disabling drive security does not affect the security of data on foreign drives. If you removed any drives that were previously secured, you will still need to enter the passphrase when you import them. Otherwise, you will not be able to access the data on those drives. NOTE: If there are any secure drive groups on the controller, you cannot delete the security key and a warning screen appears. In order to delete the security key, you must first delete the virtual drives on all of the secure drive groups. Perform the following steps to disable drive security. 1. Select the Physical View tab in the left panel of the MegaRAID Storage Manager window, and click a controller icon. 2. Right-click on the controller icon to display the menu of operations available. 3. Select Change Drive Security->Disable, as shown in Figure 109. NOTE: You can also access the drive security settings menu by clicking the Operations menu on the menu bar and selecting Change Drive Security->Disable. Page 200 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 8: Configuration | Selecting Full Disk Encryption Security Options Figure 109: Change Drive Security Menu The Confirm Disable Drive Security screen appears as shown in Figure 110. Figure 110: Confirm Disable Drive Security Screen 4. To disable drive security, click Yes. MSM disables drive security and returns you to the main menu. LSI Corporation Confidential | August 2009 Page 201 Chapter 8: Configuration | Selecting Full Disk Encryption Security Options MegaRaid SAS Software User Guide 8.2.4 Importing or Clearing a A foreign configuration is a RAID configuration that already exists on a replacement set Foreign Configuration of drives that you install in a computer system. After you create a security key, you can run a scan for a foreign configuration. (You can import unsecured or unlocked configurations when security is disabled.) If locked drives are present and security is enabled, the you can use the “Unlock foreign drives” dialog to enter the security key and unlock the configuration. The import dialog appears next for you to select to import a foreign drive. In addition, if one or more drives are removed from a configuration, by a cable pull or drive removal, for example, the configuration on those drives is considered a foreign configuration by the RAID controller. You can use the MegaRAID Storage Manager to import the foreign configuration to the RAID controller or to clear the configuration so you can create a new configuration using these drives. To import a foreign configuration, you must first enable security to allow importation of locked foreign drives. After you create a security key, you can run a scan for a foreign configuration and import the configuration. If MSM detects a foreign configuration, the import screen appears. To import the drives, you must provide the security key used to secure them. If the drives are locked and the controller security is disabled, you cannot import the foreign drives. Only unlocked drives can be imported. Verify whether any drives are left to import as the locked drives can use different security keys. If there are any drives left, repeat the import process for the remaining drives. Once all the drives are imported, there is no configuration to import. NOTE: When you create a new configuration, MSM shows only the unconfigured drives. Drives that have existing configurations, including foreign configurations, will not appear. To use drives with existing configurations, you must first clear the configuration on those drives. Perform the following steps to import or clear a configuration. 1. Enable drive security to allow importation of locked foreign drives. See Section 8.2.1, Enabling Drive Security for the procedure used to enable drive security. 2. After you create a security key, right-click on the controller and click Scan for Foreign Configuration. If there are locked drives (security is enabled), the Unlock foreign drives dialog box appears. 3. Enter the security key and unlock the configuration. The The Foreign Configuration Detected screen appears, as shown in Figure 111. Page 202 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 8: Configuration | Selecting Full Disk Encryption Security Options Figure 111: Foreign Configuration Detected Screen 4. Click Import to import the foreign configuration from all of the foreign drives, Clear to remove the configuration from all foreign drives, or Advanced to preview and import specific foreign configurations. 5. Click OK. The operation cannot be reversed after it is started. Imported drives display as Online in the MegaRAID Storage Manager menu. 8.2.4.1 Foreign Configurations If one or more drives are removed from a configuration, by a cable pull or drive in Cable Pull and Drive Removal removal, for example, the configuration on those drives is considered a foreign Scenarios configuration by the RAID controller. The following scenarios can occur with cable pulls or drive removals. Use the Foreign Configuration Preview screen to import or clear the foreign configuration in each case. NOTE: If you want to import the foreign configuration in any of the following scenarios, you should have all of the drives in the enclosure before you perform the import operation. Scenario #1: If all of the drives in a configuration are removed and re-inserted, the controller considers the drives to have foreign configurations. Import or clear the foreign configuration. If you select Import, automatic rebuilds will occur in redundant virtual drives. NOTE: Start a consistency check immediately after the rebuild is complete to ensure data integrity for the virtual drives. See Section 10.2, Running a Consistency Check for more information about checking data consistency. Scenario #2: If some of the drives in a configuration are removed and re-inserted, the controller considers the drives to have foreign configurations. LSI Corporation Confidential | August 2009 Page 203 Chapter 8: Configuration | Adding Hot Spare Drives MegaRaid SAS Software User Guide Import or clear the foreign configuration. If you select Import, automatic rebuilds will occur in redundant virtual drives. NOTE: Start a consistency check immediately after the rebuild is complete to ensure data integrity for the virtual drives. See Section 10.2, Running a Consistency Check for more information about checking data consistency. Scenario #3: If all of the drives in a virtual drive are removed, but at different times, and re-inserted, the controller considers the drives to have foreign configurations. Import or clear the foreign configuration. If you select Import, all drives that were pulled before the virtual drive became offline will be imported and then automatically rebuilt. Automatic rebuilds will occur in redundant virtual drives. Scenario #4: If the drives in a non-redundant virtual drive are removed, the controller considers the drives to have foreign configurations. Import or clear the foreign configuration. No rebuilds will occur after the import operation because there is no redundant data to rebuild the drives with. 8.3 Adding Hot Spare Drives Hot spares are drives that are available to automatically replace failed drives in a RAID 1, RAID 5, RAID 6, RAID 10, RAID 50, or RAID 60 virtual drive. Dedicated hot spares can be used to replace failed drives in a selected drive group only. Global hot spares are available to any virtual drive on a specific controller. To add a dedicated or global hot spare drive, follow these steps: 1. Select the Physical View tab in the left panel of the MegaRAID Storage Manager window, and select the icon of an unused drive. For each drive, the screen displays the port number, enclosure number, slot number, drive state, drive capacity, and drive manufacturer. 2. In the right panel of the MegaRAID Storage Manager window, select the Operations tab. 3. Select Make Dedicated Hotspare or Make Global Hotspare, as shown in Figure 112. Page 204 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 8: Configuration | Changing Adjustable Task Rates Figure 112: Creating a Global Hot Spare 1. If you selected Make Dedicated Hotspare, select a drive group from the list that appears in the right frame. The hot spare will be dedicated to the drive group that you select. If you selected Make Global Hotspare, skip this step and go to the next step. The hot spare will be available to any virtual drive on a specific controller. 2. Click Go to create the hot spare. The drive state for the drive changes to hot spare. 8.4 Changing Adjustable Follow these steps if you need to change the adjustable rates for rebuilds, and other Task Rates system tasks that run in the background: LSI Corporation Confidential | August 2009 Page 205 Chapter 8: Configuration | Changing Adjustable Task Rates MegaRaid SAS Software User Guide NOTE: LSI recommends that you leave the adjustable task rates at their default settings to achieve the best system performance. If you raise the task rates above the defaults, foreground tasks will run more slowly and it may seem that the system is not responding. If you lower the task rates below the defaults, rebuilds and other background tasks may run very slowly and may not complete within a reasonable time. If you decide to change the values, record the original default value here so you can restore them later, if necessary: Rebuild Rate: ____________ Background Initialization (BGI) Rate: ____________ Check Consistency Rate: ____________ 1. Select the Physical View tab in the left panel of the MegaRAID Storage Manager window, and select a controller icon. 2. In the right panel of the MegaRAID Storage Manager window, select the Operations tab, and select Set Adjustable Task Rates. The default task rates appear in the right panel, as shown in Figure 113. Figure 113: Set Adjustable Task Rates Page 206 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 8: Configuration | Changing Power Settings 3. Enter changes, as needed, to the task rates for Rebuild Rate, Background Initialization (BGI) Rate (for fast initialization), and Check Consistency Rate (for consistency checks). Each task rate can be set from 0 to 100. The higher the number, the faster the activity will run in the background, possibly impacting other system tasks. 4. Click Go to accept the new task rates. 5. When the warning message appears, click OK to confirm that you want to change the task rates. 8.5 Changing Power Settings The RAID controller includes Dimmer Switch™ technology that conserves energy by placing certain unused drives into powersave mode. You can use the Power Settings field to choose whether to allow unconfigured drives to enter powersave mode. When this option is selected, unconfigured drives may be spun down. When not selected, these drives are not spun down. The controller will automatically spin up drives from powersave mode whenever necessary. The powersave option is not selected by default. You have to select it to enable spin-down of drives. NOTE: If your controller does not support this option, the Power Settings field does not display. Follow these steps if you need to change the powersave setting. 1. Select the Physical View tab in the left panel of the MegaRAID Storage Manager window, and select a controller icon. 2. In the right panel of the MegaRAID Storage Manager window, select the Operations tab, and select Power Settings. Figure 113 displays the Operations menu and the Power Settings field. 3. Click Go to allow unconfigured drives to enter powersave mode. Your power settings are saved and the screen is refreshed so that the Operations tab is selected, but no operations are selected. On the device menu in the left panel of the physical view screen, the nodes for the unconfigured good drives that are spun down appear - Powersave after their status. If you go back to the Power Settings operation, the checkbox displays the saved setting. 8.6 Changing Virtual Drive You can change a virtual drive’s Read Policy, Write Policy, and other properties at any Properties time after the virtual drive is created. To do this, follow these steps: 1. Click the Logical view tab in the left panel of the MegaRAID Storage Manager window. 2. Select a virtual drive icon in the left panel of the MegaRAID Storage Manager window. 3. In the right panel, select the Operations tab, and then select Set Virtual Drive Properties. LSI Corporation Confidential | August 2009 Page 207 Chapter 8: Configuration | Changing a Virtual Drive Configuration MegaRaid SAS Software User Guide A list of Virtual Drive Properties appears in the right panel, as shown in Figure 114. Figure 114: Set Virtual Drive Properties 4. Change the virtual drive properties as needed in the right panel. For information about these properties, see Section 8.1.1, Selecting Virtual Drive Settings. 5. Click Go to accept the changes. 8.7 Changing a Virtual Drive You can use the Modify Drive Group Wizard in MSM to change the configuration of a Configuration virtual drive by adding drives to the virtual drive, removing drives from it, or changing its RAID level. CAUTION: Be sure to back up the data on the virtual drive before you change its configuration. NOTE: You cannot change the configuration of a RAID 10, or RAID 50, or RAID 60 virtual drive. You cannot change a RAID 0, RAID 1, RAID 5, or RAID 6 configuration if two or more virtual drives are defined on a single drive group. (The Logical view tab shows which drive groups and drives are used by each virtual drive.) 8.7.1 Accessing the Modify Drive NOTE: The Modify Drive Group Wizard was previously known as the Reconstruction Group Wizard Wizard. Page 208 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 8: Configuration | Changing a Virtual Drive Configuration Perform the following steps to access the Modify Drive Group Wizard options: 1. Click the Logical view tab in the left panel of the MegaRAID Storage Manager window. 2. Select a drive goup in the left panel of the window. 3. Select Operations->Modify Drive Group from the menu bar, or right-click the virtual drive icon to access the Modify Drive Group Wizard. A warning to back up your data appears, as shown in Figure 115. Figure 115: Data Backup Warning 4. Select Confirm at the warning and click Yes. The Modify Drive Group Wizard screen appears, as shown in Figure 116. LSI Corporation Confidential | August 2009 Page 209 Chapter 8: Configuration | Changing a Virtual Drive Configuration MegaRaid SAS Software User Guide Figure 116: Modify Drive Group Wizard The following sections explain the Modify Drive Group Wizard options. 8.7.2 Adding a Drive or Drives to a CAUTION: Be sure to back up the data on the virtual drive before you add a drive to it. Configuration Follow these steps to add a drive or drives to a configuration with the Modify Drive Group Wizard: 1. Access the Modify Drive Group Wizard screen, as shown in Section 8.7.1, Accessing the Modify Drive Group Wizard. 2. Select the RAID level that you want to change the drive group to. This screen states the number of drives that you have to add to change the RAID level from the current level to the new RAID level. 3. Click Next on the Modify Drive Group Wizard menu, as shown in Figure 116. 4. When the next screen appears, select the Unconfigured Good drive(s) to add from the list of drives, and click Next. NOTE: The drive(s) you add must have the same capacity as or greater capacity than the drives already in the drive group, or you cannot change the RAID level. The Summary screen appears. This screen shows the current settings and the settings after the drives are added. 5. Review the configuration information. 6. Click Finish. Page 210 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 8: Configuration | Changing a Virtual Drive Configuration A confirmation message appears. The message states that this operation cannot be aborted and asks whether you want to continue. 7. Click Yes to accept and complete the addition of the drives to the drive group. 8.7.3 Removing a Drive from a CAUTION: Be sure to back up the data on the virtual drive before you remove a drive Configuration from it. Follow these steps to remove a drive from a RAID 1, RAID 5, or RAID 6 configuration with the Modify Drive Group Wizard. NOTE: This option is not available for RAID 0 configurations. 1. Access the Modify Drive Group Wizard screen, as shown in Section 8.7.1, Accessing the Modify Drive Group Wizard. 2. Select the RAID level that you want to change the drive group to. 3. Click Next on the Modify Drive Group Wizard menu, as shown in Figure 116. 4. When the next screen appears, select the Online drive(s) to remove from the list of drives, and click Next. The Summary screen appears. This screen shows the current settings and the settings after the drives are removed. 5. Review the configuration information. 6. Click Finish. A confirmation message appears. The message states that this operation cannot be aborted and asks whether you want to continue. 7. Click Yes to accept and complete the deletion of the drive(s) from the drive group. 8.7.4 Changing the RAID Level of a CAUTION: Be sure to back up the data on the virtual drive before you change the RAID Virtual Drive level. Follow these steps to change the RAID level of the virtual drive with the Modify Drive Group Wizard: 1. Access the Modify Drive Group Wizard screen, as shown in Section 8.7.1, Accessing the Modify Drive Group Wizard. 2. On the Modify Drive Group Wizard screen, select the RAID level that you want to change the drive group to. 3. Click Next on the Modify Drive Group Wizard menu, as shown in Figure 116. The Summary screen appears. This screen displays the current settings and the settings after the RAID level is changed. 4. Review the configuration information. 5. Click Finish. A confirmation message appears. It states that this operation cannot be aborted and asks whether you want to continue. LSI Corporation Confidential | August 2009 Page 211 Chapter 8: Configuration | Deleting a Virtual Drive MegaRaid SAS Software User Guide 6. Click Yes to accept and complete the change of the RAID level. 8.8 Deleting a Virtual Drive CAUTION: Be sure to back up the data on the virtual drive before you delete it. Be sure that the operating system is not installed on this virtual drive. You can delete virtual drives to rearrange the storage space. To delete a virtual drive, follow these steps: 1. Back up all user data on the virtual drive you intend to delete. 2. In the left panel of the MegaRAID Storage Manager window, select the Logical tab, and click the icon of the virtual drive you want to delete. 3. In the right panel, select the Operations tab, and select Delete Virtual Drive. 4. When the warning messages appear, click Yes to confirm that you want to delete the virtual drive. 8.9 Saving a Storage You can save an existing controller configuration to a file so you can apply it to another Configuration to Drive controller. To save a configuration file, follow these steps: 1. Select a controller icon in the left panel of the MegaRAID Storage Manager window. 2. On the menu bar, select Operations->Configuration->Save Configuration to file. The Save dialog box appears. 3. In the Save dialog box, type a name for the configuration file, or accept the default name (hostname.cfg). 4. Click Save to save the configuration file. 8.10 Clearing a Storage You must clear a storage configuration from a controller before you can create a new Configuration from a Controller configuration on the controller or load a previously saved configuration file. CAUTION: Before you clear a configuration, be sure to save any data that you want to keep. Clearing a configuration deletes all data from the drives of the existing configuration. Be sure that the operating system is not installed on this configuration. To clear a configuration from a controller, follow these steps: 1. Select a controller icon in the left panel of the MegaRAID Storage Manager window. 2. On the menu bar, select Operations->Configuration->Clear Configuration. A warning message appears that states that clearing the configuration will destroy the virtual drives and result in data loss on the selected controller. 3. Click Yes to clear the configuration or No to cancel the operation. 8.11 Adding a Saved Storage When you replace a controller, or when you want to duplicate an existing storage Configuration configuration on a new controller, you can add a saved configuration to the controller. Page 212 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 8: Configuration | Adding a Saved Storage Configuration CAUTION: When you add a saved configuration to a replacement controller, be sure that the number and capacity of the drives connected to the controller are exactly the same as when the configuration was saved. To add a saved configuration, follow these steps: 1. Select a controller icon in the left panel of the MegaRAID Storage Manager window. 2. On the menu bar, select Operations->Configuration->Add Configuration from file. A warning message appears that states that this operation may cause an unstable condition because of differences in the two configurations. 3. Click Yes. 4. When the Open dialog box appears, select the configuration file, and lick Open. 5. View the configuration detail, and then select Apply. 6. Confirm the new configuration when prompted. LSI Corporation Confidential | August 2009 Page 213 Chapter 8: Configuration | Adding a Saved Storage Configuration MegaRaid SAS Software User Guide Page 214 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 9: Monitoring System Events and Storage Devices | Monitoring System Events Chapter 9 Monitoring System Events and Storage Devices This chapter explains how to use MegaRAID Storage Manager software to monitor the status of drives, virtual drives, and other storage devices. 9.1 Monitoring System MegaRAID Storage Manager software monitors the activity and performance of all Events controllers in the system and the storage devices connected to them. When an event occurs (such as the creation of a new virtual drive or the removal of a drive) an event message appears in the log displayed at the bottom of the MegaRAID Storage Manager window, as shown in Figure 117. You can use MegaRAID Storage Manager to alert you about events. There are settings are for the delivery of alerts, the severity level of events, exceptions, and email settings. Figure 117: Event Information Window LSI Corporation Confidential | August 2009 Page 215 Chapter 9: Monitoring System Events and Storage Devices | Configuring Alert Notifications MegaRaid SAS Software User Guide Each message that appears in the event log has a severity level that indicates the importance of the event, as shown in Table 90, a date and timestamp, and a brief description. You can click an event to display the same information in a window. (For a list of all events, see Appendix A, Events and Messages) Table 90: Event Severity Levels Severity Level Meaning Information Informational message. No user action is necessary. Warning Some component might be close to a failure point. Critical A component has failed, but the system has not lost data. Fatal A component has failed, and data loss has occurred or will occur. The Log menu has four options: Save Log: Saves the current log to a .log file. Save Log Text: Saves the current log in .txt format. View Saved Log: Enables you to load a local .log file. Clear Log: Clears the current log information. You have the option of saving the log first. 9.2 Configuring Alert The Alert Notification Configuration feature allows you to control and configure the Notifications alerts that MegaRAID Storage Manager software sends when various system events occur. To access this screen, select Tools->Configure->Configure Alerts on the main menu screen, as shown in Figure 118. Page 216 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 9: Monitoring System Events and Storage Devices | Configuring Alert Notifications Figure 118: Alert Notification Configuration Menu The Alerts Notification Configuration screen appears, as shown in Figure 119. The screen contains three tabs: Alert Settings, Mail Server, and Email. You can use each tab to perform tasks for that topic. Figure 119: Alerts Notification Configuration Screen You can select the Alert Settings tab to perform the following actions: Select the methods for the delivery of alerts. Change the severity level of events. Save an .xml backup file of the entire alert configuration. LSI Corporation Confidential | August 2009 Page 217 Chapter 9: Monitoring System Events and Storage Devices | Configuring Alert Notifications MegaRaid SAS Software User Guide Load all of the values from a previously saved backup into the dialog to edit or send to the monitor. NOTE: When you load a saved backup file, all unsaved changes made in the current session will be lost. You can select the Mail Server tab to perform the following actions: Enter or edit the sender e-mail address. Enter the SMTP server. Require authentification of the email server. Save an .xml backup file of the entire alert configuration. Load all of the values from a previously saved backup into the dialog to edit or send to the monitor. NOTE: When you load a saved backup file, all unsaved changes made in the current session will be lost. You can select the Email tab to perform the following actions: Add new email addresses for recipients of alert notifications. Send test messages to the recipient email addresses. Remove email addresses of recipients of alert notifications. Save an .xml backup file of the entire alert configuration. Load all of the values from a previously saved backup into the dialog to edit or send to the monitor. NOTE: When you load a saved backup file, all unsaved changes made in the current session will be lost. 9.2.1 Setting Alert Delivery Methods You can select the methods used to send alert deliveries, such as by popup, email, system log, or MSM log. You can select the alert delivery methods for each event severity level (Information, Warning, Critical and Fatal). Perform the following steps to select the alert delivery methods: 1. On the Alerts Notification Configuration screen, click the Alerts Setting tab. 2. Under the Alerts Delivery Methods heading, select one of the severity levels. 3. Click Edit. The Alert Notification Delivery Methods dialog box appears, as shown in Figure 120. Page 218 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 9: Monitoring System Events and Storage Devices | Configuring Alert Notifications Figure 120: Alert Notification Delivery Methods Dialog Box 4. Select the desired alert delivery methods for alert notifications at the event severity level. 5. Click OK to set the delivery methods used for the severity level that you selected. 9.2.2 Changing Alert Delivery You can change the alert delivery options for an event without changing the severity Methods for Individual Events level. 1. On the Alerts Notification Configuration screen, click the Alerts Setting tab. The the Alerts Setting portion of the screen appears, as shown in Figure 119. 2. Click Change Individual Events. The Change Individual Events dialog box appears, as shown in Figure 121. The dialog box shows the events by their ID number, description, and severity level. Figure 121: Change Individual Events Dialog Box LSI Corporation Confidential | August 2009 Page 219 Chapter 9: Monitoring System Events and Storage Devices | Configuring Alert Notifications MegaRaid SAS Software User Guide 3. Click an event in the list to select it. The current alert delivery methods appear for the selected event under the Alert Delivery Methods heading. 4. Select the desired alert delivery methods for the event. 5. Press ESC to return to the Alerts Notification Configuration screen. 6. Click OK. This saves all of the changes made to the event. 9.2.3 Changing the Severity Level for To change the event severity level for a specific event, perform the following steps: Individual Events NOTE: See Table 90 for details about the severity levels. 1. On the Alerts Notification Configuration screen, click the Alerts Setting tab. The Alerts Setting portion of the screen appears. 2. Click Change Individual Events. The Change Individual Events dialog box appears, as shown in Figure 121. The dialog box shows the events by their ID number, description, and severity level. 3. Click an event in the list to select it. The current alert delivery methods appear for the selected event. 4. Click the Severity cell for the event. The Event Severity drop-down menu appears for that event, as shown in Figure 122. Page 220 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 9: Monitoring System Events and Storage Devices | Configuring Alert Notifications Figure 122: Change Individual Events Severity Level Menu 5. Select a different severity level for the event from the menu. 6. Press ESC to return to the Alerts Notification Configuration screen. 7. Click OK. This saves all of the changes made to the events. 9.2.4 Entering or Editing the Sender You can use the Alerts Notification Configuration screen to enter or edit the sender Email Address and SMTP Server e-mail address and the SMTP server. 1. On the Alerts Notification Configuration screen, click the Mail Server tab. The Mail Server options appear, as shown in Figure 123. LSI Corporation Confidential | August 2009 Page 221 Chapter 9: Monitoring System Events and Storage Devices | Configuring Alert Notifications MegaRaid SAS Software User Guide Figure 123: Mail Server Options 2. Enter a new sender email address in the Sender email address field or edit the existing sender email address. 3. Click OK. 9.2.5 Authenticating a Server You can use the Alerts Notification Configuration screen to authenticate the SMTP server, providing an extra level of security. The authentication check box enables the User name and Password fields when selected by default. Clearing the check box disables these fields. Perform the following steps to enter or edit the address: 1. On the Alerts Notification Configuration screen, click the Mail Server tab. The Mail Server options appears, as shown in Figure 123. The authentication check box is selected by default. 2. Enter a user name in the User name field. 3. Enter the password in the Password field. 4. Click OK. 9.2.6 Saving Backup Configurations You can save an .xml backup file of the entire alert configuration. This includes all the settings on the three tabs. 1. On the Alerts Notification Configuration screen, click the Alert Setting tab, Mail Server tab, or Email tab. 2. Click Save Backup. The drive directory appears. 3. Enter a filename with an .xml extension for the backup configuration (in the format filename.xml). Page 222 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 9: Monitoring System Events and Storage Devices | Configuring Alert Notifications 4. Click Save. The drive directory disappears. 5. Click OK. The backup configuration is saved and the Alert Notification Configuration screen closes. 9.2.7 Loading Backup You can load all of the values from a previously saved backup into the dialog (all tabs) Configurations to edit or send to the monitor. NOTE: If you choose to load a backup configuration and the Configure Alerts dialog currently contains changes that have not yet been sent to the monitor, the changes will be lost. You are prompted to confirm your choice. 1. On the Alerts Notification Configuration screen, click the Alert Setting tab, Mail Server tab, or Email tab. 2. Click Load Backup. You are prompted to confirm your choice. Then the drive directory appears from which you can select a backup configuration to load. 3. Select the backup configuration file (it should be in .xml format). 4. Click Open. The drive directory disappears. 5. Click OK. The backup configuration is saved and the Alerts Notification Configuration screen closes. 9.2.8 Adding Email Addresses of The Email tab portion of the Alerts Notification Configuration screen shows the email Recipients of Alert Notifications addresses of recipients of the alert notifications. MegaRAID Storage Manager sends alert notifications to those email addresses. Use the screen to add or remove email addresses of recipients, and to send test messages to recipients that you add. To add email addresses of recipients of the alert notifications, perform the following steps: 1. Click the E-mail tab on the Event Notification Configuration screen. The E-mail section of the screen appears, as shown in Figure 124. LSI Corporation Confidential | August 2009 Page 223 Chapter 9: Monitoring System Events and Storage Devices | Configuring Alert Notifications MegaRaid SAS Software User Guide Figure 124: Email Settings 2. Enter the email address you want to add in the New recipient email address field. 3. Click Add. The new email address appears in the Recipient email addresses field. 9.2.9 Testing Email Addresses of Use the Email tab portion of the Alerts Notification Configuration screen to send test Recipients of Alert Notifications messages to the email addresses that you added for the recipients of alert notifications. 1. Click the E-mail tab on the Event Notification Configuration screen. The E-mail section of the screen appears, as shown in Figure 124. 2. Click an email address in the Recipient email addresses field. 3. Click Test. 4. Confirm whether the test message was sent to the email address. If MegaRAID Storage Manager cannot send an email message to the email address, an error message appears. 9.2.10 Removing Email Addresses of Use the Email tab portion of the Alerts Notification Configuration screen to remove Recipients of Alert Notifications email addresses of the recipients of alert notifications. 1. Click the E-mail tab on the Event Notification Configuration screen. The E-mail section of the screen appears, as shown in Figure 124. 2. Click an email address in the Recipient email addresses field. The Remove button, which was grayed out, is now active. 3. Click Remove. The email address is deleted from the list. Page 224 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 9: Monitoring System Events and Storage Devices | Monitoring Controllers 9.3 Monitoring Controllers When MegaRAID Storage Manager software is running, you can see the status of all controllers in the left panel of the MegaRAID Storage Manager window. If the controller is operating normally, the controller icon looks like this: . If the controller has failed, a small red circle appears to the right of the icon. (See Section 7.2.1, Physical/Logical View Panel for a complete list of device icons.) To display complete controller information, click a controller icon in the left panel of the MegaRAID Storage Manager window, and click the Properties tab in the right panel. Figure 125 shows the Controller Information window. Figure 125: Controller Information Most of the information on this screen is self-explanatory. Note: The Rebuild Rate, Patrol Read Rate, Reconstruction Rate, Consistency Check Rate, and BGI Rate (background initialization) are all user selectable. For more information, see Changing Adjustable Task Rates on page 205. The BBU Present field indicates whether a battery backup unit is installed. The Alarm Present and Alarm Enabled fields indicate whether the controller has an alarm to alert the user with an audible tone when there is an error or problem on the controller. There are options on the controller Properties tab for silencing or disabling the alarm. All controller properties are defined in the Appendix B, Glossary LSI Corporation Confidential | August 2009 Page 225 Chapter 9: Monitoring System Events and Storage Devices | Monitoring Drives MegaRaid SAS Software User Guide 9.4 Monitoring Drives When MegaRAID Storage Manager software is running, you can see the status of all drives in the left panel of the MegaRAID Storage Manager window. If the drive is operating normally, its icon looks like this: . If the drive has failed, a small red circle appears to the right of the icon, like this: . (See Section 7.2.1, Physical/Logical View Panel for a complete list of device icons.) To display complete drive information, click a drive icon in the left panel of the MegaRAID Storage Manager window, and click the Properties tab in the right panel. Figure 126 shows the Properties panel for a drive. Figure 126: Drive Information The information on this panel is self-explanatory. There are no user-selectable properties for physical devices. Icons for other storage devices such as CD-ROM drives and DAT drives can also appear in the left panel. The Power Status property shows On when a drive is spun up and Powersave when a drive is spun down. Note that SSD drives and other drives that never spin down still show On. If the drives are in a drive enclosure, you can identify which drive is represented by a drive icon on the left. To do this, follow these steps: 1. Click the drive icon in the left panel. 2. Click the Operations tab in the right panel. 3. Select Locate Physical Drive, and click Go. Page 226 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 9: Monitoring System Events and Storage Devices | Running a Patrol Read The LED on the drive in the enclosure starts blinking to show its location. NOTE: LEDs on drives that are global hot spares do not blink. 4. To stop the drive light from blinking, select Stop Locating Physical Drive, and click Go. All of the drive properties are defined in the Glossary. To display a graphical view of a drive, click a drive icon in the left panel of the MegaRAID Storage Manager window, and click the Graphical View tab. In Graphical View, the drive’s storage capacity is color coded according to the legend shown on the screen: configured space is blue, available space is white, and reserved space is red. When you select a virtual drive from the drop-down menu, the drive space used by that virtual drive is displayed in green. 9.5 Running a Patrol Read A patrol read periodically verifies all sectors of drives connected to a controller, including the system reserved area in the RAID configured drives. A patrol read can be used for all RAID levels and for all hot spare drives. A patrol read is initiated only when the controller is idle for a defined time period and has no other background activities. To start a patrol read, follow these steps: 1. Click a controller icon in the left panel of the MegaRAID Storage Manager window. 2. Select Operations->Start Patrol Read. To change the patrol read settings, follow these steps: 3. Click the Logical tab. 4. Click a controller icon in the left panel of the MegaRAID Storage Manager window. 5. Select the Operations tab in the right panel, and select Set Patrol Read Properties, as shown in Figure 127. LSI Corporation Confidential | August 2009 Page 227 Chapter 9: Monitoring System Events and Storage Devices | Running a Patrol Read MegaRaid SAS Software User Guide Figure 127: Patrol Read Configuration 6. Select an Operation Mode for a patrol read. The options are: — Auto: Patrol read runs automatically at the time interval you specify on this screen. — Manual: Patrol read runs only when you manually start it by selecting Start Patrol Read from the controller Options panel. — Disabled: Patrol read does not run. 7. (Optional) Specify a maximum count of drives to include in the patrol read. The count must be between 0 and 255. 8. (Optional) Select virtual drives on this controller to exclude from the patrol read. The existing virtual drives are listed in the gray box. To exclude a virtual drive, check the box next to it. 9. (Optional) Change the frequency at which the patrol read will run. The default frequency is 7 days (168 hours), which is suitable for most configurations. (You can select second, minute, or hour as the unit of measurement.) Page 228 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 9: Monitoring System Events and Storage Devices | Monitoring Virtual Drives NOTE: LSI recommends that you leave the patrol read frequency and other patrol read settings at the default values to achieve the best system performance. If you decide to change the values, record the original default value here so you can restore them later, if necessary: Patrol Read Frequency: ___________________ Continuous Patrolling: Enabled/Disabled Patrol Read Task Rate: ___________________ 10. (Optional) Select Continuous Patrolling if you want patrol read to run continuously in the background instead of running at periodic intervals. If you select Continuous Patrolling, the time interval field is grayed out. 11. Click Go to enable these patrol read options. NOTE: Patrol read does not report on its progress while it is running. The patrol read status is reported in the event log only. You can also (optionally) change the patrol read task rate. The task rate determines the amount of system resources that are dedicated to a patrol read when it is running. LSI recommends, however, that you leave the patrol read task rate at its default setting. If you raise the task rate above the default, foreground tasks will run more slowly and it may seem that the system is not responding. If you lower the task rate below the default, rebuilds and other background tasks might run very slowly and might not complete within a reasonable time. For more information, about the patrol read task rate, see Section 8.4, Changing Adjustable Task Rates 9.6 Monitoring Virtual Drives When MegaRAID Storage Manager software is running, you can see the status of all virtual drives. If a virtual drive is operating normally, the icon looks like this: . If the virtual drive is running in Degraded mode (for example, if a drive has failed), a small yellow circle appears to the right of the icon: . A red circle indicates that the Virtual Drive has failed and data has been lost. When the Logical tab is selected, the left panel of the MegaRAID Storage Manager window shows which drives are used by each virtual drive. The same drive can be used by multiple virtual drives. To display complete virtual drive information, click the Logical tab in the left panel, click a virtual drive icon in the left panel, and click the Properties tab in the right panel. All virtual drive properties are defined in the Glossary. Figure 128 shows the Properties panel for a virtual drive. LSI Corporation Confidential | August 2009 Page 229 Chapter 9: Monitoring System Events and Storage Devices | Monitoring Virtual Drives MegaRaid SAS Software User Guide Figure 128: Virtual Drive Properties The RAID level, stripe size, and access policy of the virtual drive are set when it is configured. NOTE: You can change the read policy, write policy, and other virtual drive properties by selecting Operations->Set Virtual Drive Properties. If the drives in the virtual drive are in an enclosure, you can identify them by making their LEDs blink. To do this, follow these steps: 1. Click the virtual drive icon in the left panel. 2. Click the Operations tab in the right panel. 3. Select Locate Virtual Drive and click Go. The LEDs on the drives in the virtual drive start blinking (except for hot spare drives). 4. To stop the LEDs from blinking, select Stop Locating Virtual Drive, and click Go. Page 230 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 9: Monitoring System Events and Storage Devices | Monitoring Enclosures To show a graphical view of a virtual drive, click a virtual drive icon in the left panel of the MegaRAID Storage Manager window, and click the Graphical View tab. In Graphical View, the drive group used for this virtual drive is shaded blue to show how much of the drive group capacity is used by this virtual drive. If part of the drive group is shaded white, this indicates that some of the capacity is used by another virtual drive. In a RAID 10, RAID 50, or RAID 60 configuration, two drive groups are used by one virtual drive. 9.7 Monitoring Enclosures When MegaRAID Storage Manager software is running, you can see the status of all enclosures connected to the server by selecting the Physical tab in the left panel. If an enclosure is operating normally, the icon looks like this: . If the enclosure is not functioning normally—for example, if a fan has failed—a small yellow or red circle appears to the right of the icon. Information about the enclosure appears in the right panel when you select the Properties tab. Figure 129 shows the more complete enclosure information that is displayed when you select the Graphical View tab. Figure 129: Enclosure Information – Graphical View The display in the center of the screen shows how many slots of the enclosure are actually populated by drives, and the lights on the drives show the drive status. The information on the right shows you the status of the temperature sensors, fans, and power supplies in the enclosure. LSI Corporation Confidential | August 2009 Page 231 Chapter 9: Monitoring System Events and Storage Devices | Monitoring Battery Backup MegaRaid SAS Software User Guide Units 9.8 Monitoring Battery When MegaRAID Storage Manager software is running, you can monitor the status of Backup Units all of the BBUs connected to controllers in the server. If a BBU is operating normally, the icon looks like this: . If it has failed, a red dot appears next to the icon. To show the properties for a BBU, perform the following steps: 1. Click the Physical tab on the main menu to open the physical view. 2. Select the BBU icon in the left panel. 3. Click the Properties tab. The BBU properties, such as the battery type, temperature, and voltage, appear, as shown in Figure 130. Figure 130: Battery Backup Unit Information The BBU properties include the following: The number of times the BBU has been recharged (Cycle Count) The full capacity of the BBU, plus the percentage of its current state of charge, and the estimated time until it will be depleted The current BBU temperature, voltage, current, and remaining capacity If the battery is charging, the estimated time until it is fully charged Page 232 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 9: Monitoring System Events and Storage Devices | Monitoring Battery Backup Units 9.8.1 Battery Learn Cycle Learn Cycle is a battery calibration operation performed by the controller periodically to determine the condition of the battery. You can start battery learn cycles manually or automatically. To choose automatic battery learn cycles, enable automatic learn cycles. To choose manual battery learn cycles, disable automatic learn cycles. If you enable automatic learn cyles, you can delay the start of the learn cycles for up to 168 hours (7 days). If you disable automatic learn cycles, you can start the learn cycles manually, and you can choose to receive a reminder to start a manual learn cycle. 9.8.1.1 Setting Learn Cycle To set the learn cycle properties, perform the following steps: Properties 1. Click the Physical tab to open the physical view. 2. Select the BBU icon in the left panel. 3. Click the Operations tab. The BBU operations appear, as shown in Figure 131. Figure 131: Battery Backup Unit Operations 4. Select Set Learn Cycle Properties. The options appear in the right frame. 5. To enable automatic learn cycles, click Enable automatic learn cycles and click Go. You can delay the start of the next learn cycle by up to 7 days (168 hours) using the Delay next learn cycle field. 6. To disable automatic learn cycles, click Disable automatic learn cycles and click Go. LSI Corporation Confidential | August 2009 Page 233 Chapter 9: Monitoring System Events and Storage Devices | Monitoring Rebuilds and Other MegaRaid SAS Software User Guide Processes You can start the learn cycles manually. In addition, you can check the box next to the field Remind me when to start a learn cycle to receive a reminder to start a manual learn cycle. 9.8.1.2 Starting a Learn Cycle To start the learn cycle properties manually, perform the following steps: Manually 1. Click the Physical tab to open the physical view. 2. Select the BBU icon in the left panel. 3. Click the Operations tab. The BBU operations appear, as shown in Figure 131. 4. Click Start Learn Cycle and click Go. Another method to use the BBU operations is to right-click the BBU icon to open the operations menu and select Start Learn Cycle. 9.9 Monitoring Rebuilds and MegaRAID Storage Manager software allows you to monitor the progress of rebuilds Other Processes and other lengthy processes in the Group Show Progress window. Open this window, shown in Figure 132, by selecting Group Operations->Show Progress on the menu bar. Figure 132: Group Show Progress Window Operations on virtual drives appear in the left panel of the Group Show Progress window, and operations on drives appear in the right panel. The following operations appear in this window: Background or foreground initialization of a virtual drive Rebuild (see Section 10.4, Rebuilding a Drive) Modify Drive Group (see Section 8.7, Changing a Virtual Drive Configuration) Consistency check (see Section 9.2, Configuring Alert Notifications) The drive group modification process cannot be aborted. To abort any other ongoing process, click the Abort button next to the status indicator. Click Abort All to abort all ongoing processes. Click Close to close the window. Page 234 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 10: Maintaining and Managing Storage Configurations | Initializing a Virtual Drive Chapter 10 Maintaining and Managing Storage Configurations This chapter explains how to use MegaRAID Storage Manager software to maintain and manage storage configurations. 10.1 Initializing a Virtual Drive To initialize a virtual drive after completing the configuration process, follow these steps: 1. Select the Logical tab in the left panel of the MegaRAID Storage Manager window, and click the icon of the virtual drive that you want to initialize. 2. Select Group Operations->Initialize. The Group Initialize dialog box appears. 3. Select the virtual drive(s) to initialize. CAUTION: Initialization erases all data on the virtual drive. Be sure to back up any data you want to keep before you initialize. Be sure the operating system is not installed on the virtual drive you are initializing. 4. Select the Fast Initialization check box if you want to use this option. If you leave the box unchecked, MegaRAID Storage Manager software will run a Full Initialization on the virtual drive. (For more information, see Section 8.1.1, Selecting Virtual Drive Settings) 5. Click Start to begin the initialization. You can monitor the progress of the initialization. See Section 9.9, Monitoring Rebuilds and Other Processes for more information. 10.2 Running a Consistency You should periodically run a consistency check on fault-tolerant virtual drives. It is Check especially important to do this if you suspect that the virtual drive data might be corrupted. Be sure to back up the data before running a consistency check if you think the data might be corrupted. To run a consistency check, follow these steps: 1. Select Group Operations->Check Consistency. The Group Consistency Check window appears. 2. Select the virtual drives that you want to check, or click Select All to select all virtual drives. 3. Click Start to begin. LSI Corporation Confidential | August 2009 Page 235 Chapter 10: Maintaining and Managing Storage Configurations | Scanning for New Drives MegaRaid SAS Software User Guide You can monitor the progress of the consistency check. See Section 9.9, Monitoring Rebuilds and Other Processes for more information. NOTE: You can also run a consistency check by selecting the virtual drive icon in the left panel of the MegaRAID Storage Manager window and selecting the option on the Operation tab in the right panel. 10.3 Scanning for New Drives MegaRAID Storage Manager software normally detects newly installed drives and displays icons for them in the MegaRAID Storage Manager window. If for some reason MegaRAID Storage Manager software does not detect a new drive (or drives), you can use the Scan for Foreign Config command to find it. To do this, follow these steps: 1. Select a controller icon in the left panel of the MegaRAID Storage Manager window. 2. Select Operations->Scan for Foreign Configuration. If MegaRAID Storage Manager software detects any new drives, it displays a list of them on the screen. 3. Follow the instructions on the screen to complete the drive detection. 10.4 Rebuilding a Drive If a single drive in a RAID 1, RAID 5, RAID 10, or RAID 50 virtual drive fails, the system is protected from data loss. A RAID 6 virtual drive can survive two failed drives. A failed drive must be replaced, and the data on the drive must be rebuilt on a new drive to restore the system to fault tolerance. (You can choose to rebuild the data on the failed drive if the drive is still operational.) If hot spare drives are available, the failed drive is rebuilt automatically without any user intervention. If a drive has failed, a red circle appears to the right of the drive icon: . A small yellow circle appears to the right of the icon of the virtual drive that uses this drive: . This indicates that the virtual drive is in a degraded state; the data is still safe, but data could be lost if another drive fails. Follow these steps if you need to rebuild a drive: 1. Right-click the icon of the failed drive, and select Rebuild. 2. Click Yes when the warning message appears. If the drive is still good, a rebuild will start. You can monitor the progress of the rebuild in the Group Show Progress window by selecting Group Operations->Show Progress. If the drive cannot be rebuilt, an error message appears. Continue with the next step. 3. Shut down the system, disconnect the power cord, and open the computer case. 4. Replace the failed drive with a new drive of equal capacity. 5. Close the computer case, reconnect the power cord, and restart the computer. 6. Restart the MegaRAID Storage Manager software. When the new drive spins up, the drive icon changes back to normal status, and the rebuild process begins automatically. You can monitor the progress of the rebuild in the Group Show Progress window by selecting Group Operations->Show Progress. Page 236 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Chapter 10: Maintaining and Managing Storage Configurations | Making a Drive Offline or Missing 10.5 Making a Drive Offline or If a drive is currently part of a redundant configuration and you want to use it in Missing another configuration, you can use MegaRAID Storage Manager commands to remove the drive from the first configuration. When you do this, all data on that drive is lost. To remove the drive from the configuration without harming the data on the virtual drive, follow these steps: 1. In the left panel of the MegaRAID Storage Manager window, right-click the icon of a drive in a redundant virtual drive. 2. Select Make drive offline from the pop-up menu. The drive status changes to Offline. 3. Right-click the drive icon again, and select Mark physical disk as missing. 4. Select File->Rescan. The drive status changes to Unconfigured Good. At this point, the data on this drive is no longer valid. 5. If necessary, create a hot spare drive for the virtual drive from which you have removed the drive. (See Section 8.3, Adding Hot Spare Drives) When a hot spare is available, the data on the virtual drive will be rebuilt. You can now use the removed drive for another configuration. CAUTION: If MegaRAID Storage Manager software detects that a drive in a virtual drive has failed, it makes the drive offline. If this happens, you must remove the drive and replace it. You cannot make the drive usable for another configuration by using the Mark physical disk as missing and Rescan commands. 10.6 Upgrading the Firmware MegaRAID Storage Manager software enables you to easily upgrade the controller firmware. To do this, follow these steps: 1. In the left panel of the MegaRAID Storage Manager window, click the icon of the controller you need to upgrade. 2. In the right panel, click the Operations tab, and select Flash Firmware. 3. In the right panel, click Browse to locate for the .rom update file. 4. After you locate the file, click OK. MegaRAID Storage Manager software displays the version of the existing firmware and the version of the new firmware file. 5. When you are prompted to indicate whether you want to upgrade the firmware, click Yes. The controller is updated with the new firmware code contained in the .rom file. 6. Reboot the system after the new firmware is flashed. The new firmware does not take effect until reboot. LSI Corporation Confidential | August 2009 Page 237 Chapter 10: Maintaining and Managing Storage Configurations | Upgrading the Firmware MegaRaid SAS Software User Guide Page 238 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Appendix A: Events and Messages | Error Levels Appendix A Events and Messages This appendix lists the MegaRAID Storage Manager events that may appear in the event log. MegaRAID Storage Manager software monitors the activity and performance of all controllers in the workstation and the devices attached to them. When an event occurs, such as the start of an initialization, an event message appears in the log at the bottom of the MegaRAID Storage Manager window. A.1 Error Levels Each message that appears in the event log has an error level that indicates the severity of the event, as shown in Table 91. Table 91: Event Error Levels Error Level Meaning Information Informational message. No user action is necessary. Warning Some component may be close to a failure point. Critical A component has failed, but the system has not lost data. Fatal A component has failed, and data loss has occurred or will occur. A.2 Event Messages Table 92 lists all of the MegaRAID Storage Manager event messages. The event message descriptions include placeholders for specific values that are determined when the event is generated. For example, in message No. 1 in the Event Messages table, “%s” is replaced by the firmware version, which is read from the firmware when the event is generated.w Table 92: Event Messages Number Type Event Text 0x0000 Information MegaRAID firmware initialization started (PCI ID %04x/%04x/%04x/%04x) 0x0001 Information MegaRAID firmware version %s 0x0002 Fatal Unable to recover cache data from TBBU 0x0003 Information Cache data recovered from TBBU successfully 0x0004 Information Configuration cleared 0x0005 Warning Cluster down; communication with peer lost 0x0006 Information Virtual drive %s ownership changed from %02x to %02x 0x0007 Information Alarm disabled by user LSI Corporation Confidential | August 2009 Page 239 Appendix A: Events and Messages | Event Messages MegaRaid SAS Software User Guide Table 92: Event Messages (Continued) Number Type Event Text 0x0008 Information Alarm enabled by user 0x0009 Information Background initialization rate changed to %d%% 0x000a Fatal Controller cache discarded due to memory/battery problems 0x000b Fatal Unable to recover cache data due to configuration mismatch 0x000c Information Cache data recovered successfully 0x000d Fatal Controller cache discarded due to firmware version incompatibility 0x000e Information Consistency Check rate changed to %d%% 0x000f Fatal Fatal firmware error: %s 0x0010 Information Factory defaults restored 0x0011 Information Flash downloaded image corrupt 0x0012 Critical Flash erase error 0x0013 Critical Flash timeout during erase 0x0014 Critical Flash error 0x0015 Information Flashing image: %s 0x0016 Information Flash of new firmware image(s) complete 0x0017 Critical Flash programming error 0x0018 Critical Flash timeout during programming 0x0019 Critical Flash chip type unknown 0x001a Critical Flash command set unknown 0x001b Critical Flash verify failure 0x001c Information Flush rate changed to %d seconds 0x001d Information Hibernate command received from host 0x001e Information Event log cleared 0x001f Information Event log wrapped 0x0020 Fatal Multi-bit ECC error: ECAR=%x, ELOG=%x, (%s) 0x0021 Warning Single-bit ECC error: ECAR=%x, ELOG=%x, (%s) 0x0022 Fatal Not enough controller memory 0x0023 Information Patrol Read complete 0x0024 Information Patrol Read paused 0x0025 Information Patrol Read Rate changed to %d%% 0x0026 Information Patrol Read resumed 0x0027 Information Patrol Read started 0x0028 Information Rebuild rate changed to %d%% 0x0029 Information Drive group modification rate changed to %d%% 0x002a Information Shutdown command received from host 0x002b Information Test event: %s 0x002c Information Time established as %s; (%d seconds since power on) Page 240 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Appendix A: Events and Messages | Event Messages Table 92: Event Messages (Continued) Number Type Event Text 0x002d Information User entered firmware debugger 0x002e Warning Background Initialization aborted on %s 0x002f Warning Background Initialization corrected medium error (%s at %lx 0x0030 Information Background Initialization completed on %s 0x0031 Fatal Background Initialization completed with uncorrectable errors on %s 0x0032 Fatal Background Initialization detected uncorrectable double medium errors (%s at %lx on %s) 0x0033 Critical Background Initialization failed on %s 0x0034 Progress Background Initialization progress on %s is %s 0x0035 Information Background Initialization started on %s 0x0036 Information Policy change on %s from %s to %s 0x0038 Warning Consistency Check aborted on %s 0x0039 Warning Consistency Check corrected medium error (%s at %lx 0x003a Information Consistency Check done on %s 0x003b Information Consistency Check done with corrections on %s 0x003c Fatal Consistency Check detected uncorrectable double medium errors (%s at %lx on %s) 0x003d Critical Consistency Check failed on %s 0x003e Fatal Consistency Check completed with uncorrectable data on %s 0x003f Warning Consistency Check found inconsistent parity on %s at strip %lx 0x0040 Warning Consistency Check inconsistency logging disabled on %s (too many inconsistencies) 0x0041 Progress Consistency Check progress on %s is %s 0x0042 Information Consistency Check started on %s 0x0043 Warning Initialization aborted on %s 0x0044 Critical Initialization failed on %s 0x0045 Progress Initialization progress on %s is %s 0x0046 Information Fast initialization started on %s 0x0047 Information Full initialization started on %s 0x0048 Information Initialization complete on %s 0x0049 Information LD Properties updated to %s (from %s) 0x004a Information Drive group modification complete on %s 0x004b Fatal Drive group modification of %s stopped due to unrecoverable errors 0x004c Fatal Reconstruct detected uncorrectable double medium errors (%s at %lx on %s at %lx) 0x004d Progress Drive group modification progress on %s is %s 0x004e Information Drive group modification resumed on %s LSI Corporation Confidential | August 2009 Page 241 Appendix A: Events and Messages | Event Messages MegaRaid SAS Software User Guide Table 92: Event Messages (Continued) Number Type Event Text 0x004f Fatal Drive group modification resume of %s failed due to configuration mismatch 0x0050 Information Modifying drive group started on %s 0x0051 Information State change on %s from %s to %s 0x0052 Information Drive Clear aborted on %s 0x0053 Critical Drive Clear failed on %s (Error %02x) 0x0054 Progress Drive Clear progress on %s is %s 0x0055 Information Drive Clear started on %s 0x0056 Information Drive Clear completed on %s 0x0057 Warning Error on %s (Error %02x) 0x0058 Information Format complete on %s 0x0059 Information Format started on %s 0x005a Critical Hot Spare SMART polling failed on %s (Error %02x) 0x005b Information Drive inserted: %s 0x005c Warning Drive %s is not supported 0x005d Warning Patrol Read corrected medium error on %s at %lx 0x005e Progress Patrol Read progress on %s is %s 0x005f Fatal Patrol Read found an uncorrectable medium error on %s at %lx 0x0060 Critical Predictive failure: CDB: %s 0x0061 Fatal Patrol Read puncturing bad block on %s at %lx 0x0062 Information Rebuild aborted by user on %s 0x0063 Information Rebuild complete on %s 0x0064 Information Rebuild complete on %s 0x0065 Critical Rebuild failed on %s due to source drive error 0x0066 Critical Rebuild failed on %s due to target drive error 0x0067 Progress Rebuild progress on %s is %s 0x0068 Information Rebuild resumed on %s 0x0069 Information Rebuild started on %s 0x006a Information Rebuild automatically started on %s 0x006b Critical Rebuild stopped on %s due to loss of cluster ownership 0x006c Fatal Reassign write operation failed on %s at %lx 0x006d Fatal Unrecoverable medium error during rebuild on %s at %lx 0x006e Information Corrected medium error during recovery on %s at %lx 0x006f Fatal Unrecoverable medium error during recovery on %s at %lx 0x0070 Information Drive removed: %s 0x0071 Warning Unexpected sense: %s, CDB%s, Sense: %s 0x0072 Information State change on %s from %s to %s 0x0073 Information State change by user on %s from %s to %s Page 242 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Appendix A: Events and Messages | Event Messages Table 92: Event Messages (Continued) Number Type Event Text 0x0074 Warning Redundant path to %s broken 0x0075 Information Redundant path to %s restored 0x0076 Information Dedicated Hot Spare Drive %s no longer useful due to deleted drive group 0x0077 Critical SAS topology error: Loop detected 0x0078 Critical SAS topology error: Unaddressable device 0x0079 Critical SAS topology error: Multiple ports to the same SAS address 0x007a Critical SAS topology error: Expander error 0x007b Critical SAS topology error: SMP timeout 0x007c Critical SAS topology error: Out of route entries 0x007d Critical SAS topology error: Index not found 0x007e Critical SAS topology error: SMP function failed 0x007f Critical SAS topology error: SMP CRC error 0x0080 Critical SAS topology error: Multiple subtractive 0x0081 Critical SAS topology error: Table to table 0x0082 Critical SAS topology error: Multiple paths 0x0083 Fatal Unable to access device %s 0x0084 Information Dedicated Hot Spare created on %s (%s) 0x0085 Information Dedicated Hot Spare %s disabled 0x0086 Critical Dedicated Hot Spare %s no longer useful for all drive groups 0x0087 Information Global Hot Spare created on %s (%s) 0x0088 Information Global Hot Spare %s disabled 0x0089 Critical Global Hot Spare does not cover all drive groups 0x008a Information Created %s} 0x008b Information Deleted %s} 0x008c Information Marking LD %s inconsistent due to active writes at shutdown 0x008d Information Battery Present 0x008e Warning Battery Not Present 0x008f Information New Battery Detected 0x0090 Information Battery has been replaced 0x0091 Critical Battery temperature is high 0x0092 Warning Battery voltage low 0x0093 Information Battery started charging 0x0094 Information Battery is discharging 0x0095 Information Battery temperature is normal 0x0096 Fatal Battery needs to be replacement, SOH Bad 0x0097 Information Battery relearn started 0x0098 Information Battery relearn in progress LSI Corporation Confidential | August 2009 Page 243 Appendix A: Events and Messages | Event Messages MegaRaid SAS Software User Guide Table 92: Event Messages (Continued) Number Type Event Text 0x0099 Information Battery relearn completed 0x009a Critical Battery relearn timed out 0x009b Information Battery relearn pending: Battery is under charge 0x009c Information Battery relearn postponed 0x009d Information Battery relearn will start in 4 days 0x009e Information Battery relearn will start in 2 day 0x009f Information Battery relearn will start in 1 day 0x00a0 Information Battery relearn will start in 5 hours 0x00a1 Information Battery removed 0x00a2 Information Current capacity of the battery is below threshold 0x00a3 Information Current capacity of the battery is above threshold 0x00a4 Information Enclosure (SES) discovered on %s 0x00a5 Information Enclosure (SAFTE) discovered on %s 0x00a6 Critical Enclosure %s communication lost 0x00a7 Information Enclosure %s communication restored 0x00a8 Critical Enclosure %s fan %d failed 0x00a9 Information Enclosure %s fan %d inserted 0x00aa Critical Enclosure %s fan %d removed 0x00ab Critical Enclosure %s power supply %d failed 0x00ac Information Enclosure %s power supply %d inserted 0x00ad Critical Enclosure %s power supply %d removed 0x00ae Critical Enclosure %s SIM %d failed 0x00af Information Enclosure %s SIM %d inserted 0x00b0 Critical Enclosure %s SIM %d removed 0x00b1 Warning Enclosure %s temperature sensor %d below warning threshold 0x00b2 Critical Enclosure %s temperature sensor %d below error threshold 0x00b3 Warning Enclosure %s temperature sensor %d above warning threshold 0x00b4 Critical Enclosure %s temperature sensor %d above error threshold 0x00b5 Critical Enclosure %s shutdown 0x00b6 Warning Enclosure %s not supported; too many enclosures connected to port 0x00b7 Critical Enclosure %s firmware mismatch 0x00b8 Warning Enclosure %s sensor %d bad 0x00b9 Critical Enclosure %s phy %d bad 0x00ba Critical Enclosure %s is unstable 0x00bb Critical Enclosure %s hardware error 0x00bc Critical Enclosure %s not responding Page 244 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Appendix A: Events and Messages | Event Messages Table 92: Event Messages (Continued) Number Type Event Text 0x00bd Information SAS/SATA mixing not supported in enclosure; Drive %s disabled 0x00be Information Enclosure (SES) hotplug on %s was detected, but is not supported 0x00bf Information Clustering enabled 0x00c0 Information Clustering disabled 0x00c1 Information Drive too small to be used for auto-rebuild on %s 0x00c2 Information BBU enabled; changing WT virtual drives to WB 0x00c3 Warning BBU disabled; changing WB virtual drives to WT 0x00c4 Warning Bad block table on drive %s is 80% full 0x00c5 Fatal Bad block table on drive %s is full; unable to log block %lx 0x00c6 Information Consistency Check Aborted due to ownership loss on %s 0x00c7 Information Background Initialization (BGI) Aborted Due to Ownership Loss on %s 0x00c8 Critical Battery/charger problems detected; SOH Bad 0x00c9 Warning Single-bit ECC error: ECAR=%x, ELOG=%x, (%s); warning threshold exceeded 0x00ca Critical Single-bit ECC error: ECAR=%x, ELOG=%x, (%s); critical threshold exceeded 0x00cb Critical Single-bit ECC error: ECAR=%x, ELOG=%x, (%s); further reporting disabled 0x00cc Critical Enclosure %s Power supply %d switched off 0x00cd Information Enclosure %s Power supply %d switched on 0x00ce Critical Enclosure %s Power supply %d cable removed 0x00cf Information Enclosure %s Power supply %d cable inserted 0x00d0 Information Enclosure %s Fan %d returned to normal 0x00d1 Information BBU Retention test was initiated on previous boot 0x00d2 Information BBU Retention test passed 0x00d3 Critical BBU Retention test failed! 0x00d4 Information NVRAM Retention test was initiated on previous boot 0x00d5 Information NVRAM Retention test passed 0x00d6 Critical NVRAM Retention test failed! 0x00d7 Information %s test completed %d passes successfully 0x00d8 Critical %s test FAILED on %d pass. Fail data: errorOffset=%x goodData=%x badData=%x 0x00d9 Information Self check diagnostics completed 0x00da Information Foreign Configuration detected 0x00db Information Foreign Configuration imported 0x00dc Information Foreign Configuration cleared 0x00dd Warning NVRAM is corrupt; reinitializing LSI Corporation Confidential | August 2009 Page 245 Appendix A: Events and Messages | Event Messages MegaRaid SAS Software User Guide Table 92: Event Messages (Continued) Number Type Event Text 0x00de Warning NVRAM mismatch occurred 0x00df Warning SAS wide port %d lost link on PHY %d 0x00e0 Information SAS wide port %d restored link on PHY %d 0x00e1 Warning SAS port %d, PHY %d has exceeded the allowed error rate 0x00e2 Warning Bad block reassigned on %s at %lx to %lx 0x00e3 Information Controller Hot Plug detected 0x00e4 Warning Enclosure %s temperature sensor %d differential detected 0x00e5 Information Drive test cannot start. No qualifying drives found 0x00e6 Information Time duration provided by host is not sufficient for self check 0x00e7 Information Marked Missing for %s on drive group %d row %d 0x00e8 Information Replaced Missing as %s on drive group %d row %d 0x00e9 Information Enclosure %s Temperature %d returned to normal 0x00ea Information Enclosure %s Firmware download in progress 0x00eb Warning Enclosure %s Firmware download failed 0x00ec Warning %s is not a certified drive 0x00ed Information Dirty cache data discarded by user 0x00ee Information Drives missing from configuration at boot 0x00ef Information Virtual drives (VDs) missing drives and will go offline at boot: %s 0x00f0 Information VDs missing at boot: %s 0x00f1 Information Previous configuration completely missing at boot 0x00f2 Information Battery charge complete 0x00f3 Information Enclosure %s fan %d speed changed 0x00f4 Information Dedicated spare %s imported as global due to missing arrays 0x00f5 Information %s rebuild not possible as SAS/SATA is not supported in an array 0x00f6 Information SEP %s has been rebooted as a part of enclosure firmware download. SEP will be unavailable until this process completes. 0x00f7 Information Inserted PD: %s Info: %s 0x00f8 Information Removed PD: %s Info: %s 0x00f9 Information VD %s is now OPTIMAL 0x00fa Warning VD %s is now PARTIALLY DEGRADED 0x00fb Critical VD %s is now DEGRADED 0x00fc Fatal VD %s is now OFFLINE 0x00fd Warning Battery requires reconditioning; please initiate a LEARN cycle 0x00fe Warning VD %s disabled because RAID-5 is not supported by this RAID key 0x00ff Warning VD %s disabled because RAID-6 is not supported by this controller Page 246 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Appendix A: Events and Messages | Event Messages Table 92: Event Messages (Continued) Number Type Event Text 0x0100 Warning VD %s disabled because SAS drives are not supported by this RAID key 0x0101 Warning PD missing: %s 0x0102 Warning Puncturing of LBAs enabled 0x0103 Warning Puncturing of LBAs disabled 0x0104 Critical Enclosure %s EMM %d not installed 0x0105 Information Package version %s 0x0106 Warning Global affinity Hot Spare %s commissioned in a different enclosure 0x0107 Warning Foreign configuration table overflow 0x0108 Warning Partial foreign configuration imported, PDs not imported:%s 0x0109 Information Connector %s is active 0x010a Information Board Revision %s 0x010b Warning Command timeout on PD %s, CDB:%s 0x010c Warning PD %s reset (Type %02x) 0x010d Warning VD bad block table on %s is 80% full 0x010e Fatal VD bad block table on %s is full; unable to log block %lx (on %s at %lx) 0x010f Fatal Uncorrectable medium error logged for %s at %lx (on %s at %lx) 0x0110 Information VD medium error corrected on %s at %lx 0x0111 Warning Bad block table on PD %s is 100% full 0x0112 Warning VD bad block table on PD %s is 100% full 0x0113 Fatal Controller needs replacement, IOP is faulty 0x0114 Information CopyBack started on PD %s from PD %s 0x0115 Information CopyBack aborted on PD %s and src is PD %s 0x0116 Information CopyBack complete on PD %s from PD %s 0x0117 Progress CopyBack progress on PD %s is %s 0x0118 Information CopyBack resumed on PD %s from %s 0x0119 Information CopyBack automatically started on PD %s from %s 0x011a Critical CopyBack failed on PD %s due to source %s error 0x011b Warning Early Power off warning was unsuccessful 0x011c Information BBU FRU is %s 0x011d Information %s FRU is %s 0x011e Information Controller hardware revision ID %s 0x011f Warning Foreign import shall result in a backward incompatible upgrade of configuration metadata 0x0120 Information Redundant path restored for PD %s 0x0121 Warning Redundant path broken for PD %s 0x0122 Information Redundant enclosure EMM %s inserted for EMM %s LSI Corporation Confidential | August 2009 Page 247 Appendix A: Events and Messages | Event Messages MegaRaid SAS Software User Guide Table 92: Event Messages (Continued) Number Type Event Text 0x0123 Information Redundant enclosure EMM %s removed for EMM %s 0x0124 Warning Patrol Read can't be started, as PDs are either not ONLINE, or are in a VD with an active process, or are in an excluded VD 0x0125 Information Copyback aborted by user on PD %s and src is PD %s 0x0126 Critical Copyback aborted on hot spare %s from %s, as hot spare needed for rebuild 0x0127 Warning Copyback aborted on PD %s from PD %s, as rebuild required in the array 0x0128 Fatal Controller cache discarded for missing or offline VD %s When a VD with cached data goes offline or missing during runtime, the cache for the VD is discarded. Because the VD is offline, the cache cannot be saved. 0x0129 Information Copyback cannot be started as PD %s is too small for src PD %s 0x012a Information Copyback cannot be started on PD %s from PD %s, as SAS/SATA is not supported in an array 0x012b Information Microcode update started on PD %s 0x012c Information Microcode update completed on PD %s 0x012d Warning Microcode update timeout on PD %s 0x012e Warning Microcode update failed on PD %s 0x012f Information Controller properties changed 0x0130 Information Patrol Read properties changed 0x0131 Information CC Schedule properties changed 0x0132 Information Battery properties changed 0x0133 Warning Periodic Battery Relearn is pending. Please initiate manual learn cycle as Automatic learn is not enabled 0x0134 Information Drive security key created 0x0135 Information Drive security key backed up 0x0136 Information Drive security key from escrow, verified 0x0137 Information Drive security key changed 0x0138 Warning Drive security key, re-key operation failed 0x0139 Warning Drive security key is invalid 0x013a Information Drive security key destroyed 0x013b Warning Drive security key from escrow is invalid 0x013c Information VD %s is now secured 0x013d Warning VD %s is partially secured 0x013e Information PD %s security activated 0x013f Information PD %s security disabled 0x0140 Information PD %s is reprovisioned 0x0141 Information PD %s security key changed 0x0142 Fatal Security subsystem problems detected for PD %s Page 248 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Appendix A: Events and Messages | Event Messages Table 92: Event Messages (Continued) Number Type Event Text 0x0143 Fatal Controller cache pinned for missing or offline VD %s 0x0144 Fatal Controller cache pinned for missing or offline VDs: %s 0x0145 Information Controller cache discarded by user for VDs: %s 0x0146 Information Controller cache destaged for VD %s 0x0147 Warning Consistency Check started on an inconsistent VD %s 0x0148 Warning Drive security key failure, cannot access secured configuration 0x0149 Warning Drive security pass phrase from user is invalid 0x014a Warning Detected error with the remote battery connector cable 0x014b Information Power state change on PD %s from %s to %s 0x014c Information Enclosure %s element (SES code 0x%x) status changed 0x014d Information PD %s rebuild not possible as HDD/SSD mix is not supported in a drive group 0x014e Information Copyback cannot be started on PD %s from %s, as HDD/SSD mix is not supported in a drive group 0x014f Information VD bad block table on %s is cleared 0x0150 Caution SAS topology error: 0x%lx LSI Corporation Confidential | August 2009 Page 249 Appendix A: Events and Messages | Event Messages MegaRaid SAS Software User Guide Page 250 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Appendix B: Glossary | Appendix B Glossary This appendix provides a glossary for terms used in this document. access policy A virtual drive property indicating what kind of access is allowed for a particular virtual drive. The possible values are Read/Write, Read Only, or Blocked. alarm enabled A controller property that indicates whether the controller’s onboard alarm is enabled. alarm present A controller property that indicates whether the controller has an onboard alarm. If present and enabled, the alarm is sounded for certain error conditions. array See drive group. BBU present A controller property that indicates whether the controller has an onboard battery backup unit to provide power in case of a power failure. BGI rate A controller property indicating the rate at which the background initialization of virtual drives will be carried out. BIOS Basic Input/Output System. The computer BIOS is stored on a flash memory chip. The BIOS controls communications between the microprocessor and peripheral devices, such as the keyboard and the video controller, and miscellaneous functions, such as system messages. cache Fast memory that holds recently accessed data. Use of cache memory speeds subsequent access to the same data. When data is read from or written to main memory, a copy is also saved in cache memory with the associated main memory address. The cache memory software monitors the addresses of subsequent reads to see if the required data is already stored in cache memory. If it is already in cache memory (a cache hit), it is read from cache memory immediately and the main memory read is aborted (or not started). If the data is not cached (a cache miss), it is fetched from main memory and saved in cache memory. cache flush interval A controller property that indicates how often the data cache is flushed. caching The process of using a high speed memory buffer to speed up a computer system’s overall read/write performance. The cache can be accessed at a higher speed than a drive subsystem. To improve read performance, the cache usually contains the most recently accessed data, as well as data from adjacent drive sectors. To improve write performance, the cache may temporarily store data in accordance with its write back policies. capacity A property that indicates the amount of storage space on a drive or virtual drive. coerced capacity A drive property indicating the capacity to which a drive has been coerced (forced) to make it compatible with other drives that are nominally the same capacity. For example, a 4 Gbyte drive from one manufacturer may be 4,196 Mbytes, and a 4 Gbyte from another manufacturer may be 4,128 Mbytes. These drives could be coerced to a usable capacity of 4,088 Mbytes each for use in a drive group in a storage configuration. LSI Corporation Confidential | August 2009 Page 251 Appendix B: Glossary | MegaRaid SAS Software User Guide coercion mode A controller property indicating the capacity to which drives of nominally identical capacity are coerced (forced) to make them usable in a storage configuration. consistency check An operation that verifies that all stripes in a virtual drive with a redundant RAID level are consistent and that automatically fixes any errors. For RAID 1 drive groups, this operation verifies correct mirrored data for each stripe. consistency check rate The rate at which consistency check operations are run on a computer system. controller A chip that controls the transfer of data between the microprocessor and memory or between the microprocessor and a peripheral device such as a drive. RAID controllers perform RAID functions such as striping and mirroring to provide data protection. MegaRAID Storage Manager software runs on LSI SAS controllers. copyback The procedure used to copy data from a source drive of a virtual drive to a destination drive that is not a part of the virtual drive. The copyback operation is often used to create or restore a specific physical configuration for a drive group (for example, a specific arrangement of drive group members on the device I/O buses). The copyback operation can be run automatically or manually. Typically, a drive fails or is expected to fail, and the data is rebuilt on a hot spare. The failed drive is replaced with a new drive. Then the data is copied from the hot spare to the new drive, and the hot spare reverts from a rebuild drive to its original hot spare status. The copyback operation runs as a background activity, and the virtual drive is still available online to the host. current write policy A virtual drive property that indicates whether the virtual drive currently supports Write Back mode or Write Through mode. In Write Back mode the controller sends a data transfer completion signal to the host when the controller cache has received all of the data in a transaction. In Write Through mode the controller sends a data transfer completion signal to the host when the drive subsystem has received all of the data in a transaction. default write policy A virtual drive property indicating whether the default write policy is Write Through or Write Back. In Write Back mode the controller sends a data transfer completion signal to the host when the controller cache has received all of the data in a transaction. In Write Through mode the controller sends a data transfer completion signal to the host when the drive subsystem has received all of the data in a transaction. device ID A controller or drive property indicating the manufacturer-assigned device ID. device port count A controller property indicating the number of ports on the controller. drive cache policy A virtual drive property indicating whether the virtual drive cache is enabled, disabled, or unchanged from its previous setting. drive group A group of drives attached to a RAID controller on which one or more virtual drives can be created. All virtual drives in the drive group use all of the drives in the drive group. drive state A drive property indicating the status of the drive. A drive can be in one of the following states: Unconfigured Good: A drive accessible to the RAID controller but not configured as a part of a virtual drive or as a hot spare. Hot Spare: A drive that is configured as a hot spare. Online: A drive that can be accessed by the RAID controller and will be part of the virtual drive. Rebuild: A drive to which data is being written to restore full redundancy for a virtual drive. Page 252 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Appendix B: Glossary | Failed: A drive that was originally configured as Online or Hot Spare, but on which the firmware detects an unrecoverable error. Unconfigured Bad: A drive on which the firmware detects an unrecoverable error; the drive was Unconfigured Good or the drive could not be initialized. Missing: A drive that was Online, but which has been removed from its location. Offline: A drive that is part of a virtual drive but which has invalid data as far as the RAID configuration is concerned. None: A drive with an unsupported flag set. An Unconfigured Good or Offline drive that has completed the prepare for removal operation. drive subsystem A collection of drives and the hardware that controls them and connects them to one or more controllers. The hardware can include an intelligent controller, or the drives can attach directly to a system I/O bus controller. drive type A drive property indicating the characteristics of the drive. fast initialization A mode of initialization that quickly writes zeroes to the first and last sectors of the virtual drive. This allows you to immediately start writing data to the virtual drive while the initialization is running in the background. fault tolerance The capability of the drive subsystem to undergo a single drive failure per drive group without compromising data integrity and processing capability. LSI SAS RAID controllers provides fault tolerance through redundant drive groups in RAID levels 1, 5, 6, 10, 50, and 60. They also support hot spare drives and the auto-rebuild feature. firmware Software stored in read-only memory (ROM) or programmable ROM (PROM). Firmware is often responsible for the behavior of a system when it is first turned on. A typical example would be a monitor program in a system that loads the full operating system from drive or from a network and then passes control to the operating system. foreign configuration A RAID configuration that already exists on a replacement set of drives that you install in a computer system. MegaRAID Storage Manager software allows you to import the existing configuration to the RAID controller, or you can clear the configuration so you can create a new one. formatting The process of writing a specific value to all data fields on a drive, to map out unreadable or bad sectors. Because most drives are formatted when manufactured, formatting is usually done only if a drive generates many media errors. hole In MegaRAID Storage Manager, a hole is a block of empty space in a drive group that can be used to define a virtual drive. host interface A controller property indicating the type of interface used by the computer host system: for example, PCIX. host port count A controller property indicating the number of host data ports currently in use. host system Any computer system on which the controller is installed. Mainframes, workstations, and standalone desktop systems can all be considered host systems. hot spare A standby drive that can automatically replace a failed drive in a virtual drive and prevent data from being lost. A hot spare can be dedicated to a single redundant drive group or it can be part of the global hot spare pool for all drive groups controlled by the controller. When a drive fails, MegaRAID Storage Manager software automatically uses a hot spare to replace it and then rebuilds the data from the failed drive to the hot spare. Hot spares can be used in RAID 1, 5, 6, 10, 50, and 60 storage configurations. LSI Corporation Confidential | August 2009 Page 253 Appendix B: Glossary | MegaRaid SAS Software User Guide initialization The process of writing zeros to the data fields of a virtual drive and, in fault-tolerant RAID levels, generating the corresponding parity to put the virtual drive in a Ready state. Initialization erases all previous data on the drives. Drive groups will work without initializing, but they can fail a consistency check because the parity fields have not been generated. IO policy A virtual drive property indicating whether Cached I/O or Direct I/O is being used. In Cached I/O mode, all reads are buffered in cache memory. In Direct I/O mode, reads are not buffered in cache memory. Data is transferred to cache and the host concurrently. If the same data block is read again, it comes from cache memory. (The IO Policy applies to reads on a specific virtual drive. It does not affect the read ahead cache.) learning cycle A battery calibration operation performed by a RAID controller periodically to determine the condition of the battery. load-balancing A method of spreading work between two or more computers, network links, CPUs, drives, or other resources. Load balancing is used to maximize resource use, throughput, or response time. media error count A drive property indicating the number of errors that have been detected on the drive media. migration The process of moving virtual drives and hot spare drives from one controller to another by disconnecting the drives from one controller and attaching them to another one. The firmware on the new controller will detect and retain the virtual drive information on the drives. mirroring The process of providing complete data redundancy with two drives by maintaining an exact copy of one drive’s data on the second drive. If one drive fails, the contents of the other drive can be used to maintain the integrity of the system and to rebuild the failed drive. multipathing The firmware provides support for detecting and using multiple paths from the RAID controllers to the SAS devices that are in enclosures. Devices connected to enclosures have multiple paths to them. With redundant paths to the same port of a device, if one path fails, another path can be used to communicate between the controller and the device. Using multiple paths with load balancing, instead of a single path, can increase reliability through redundancy. name A virtual drive property indicating the user-assigned name of the virtual drive. non-redundant configuration A RAID 0 virtual drive with data striped across two or more drives but without drive mirroring or parity. This provides for high data throughput but offers no protection in case of a drive failure. NVRAM Acronym for non-volatile random access memory. A storage system that does not lose the data stored on it when power is removed. NVRAM is used to store firmware and configuration data on the RAID controller. NVRAM present A controller property indicating whether an NVRAM is present on the controller. NVRAM size A controller property indicating the capacity of the controller’s NVRAM. offline A drive is offline when it is part of a virtual drive but its data is not accessible to the virtual drive. patrol read A process that checks the drives in a storage configuration for drive errors that could lead to drive failure and lost data. The patrol read operation can find and sometimes fix any potential problem with drives prior to host access. This enhances overall system performance because error recovery during a normal I/O operation may not be necessary. Page 254 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Appendix B: Glossary | patrol read rate The user-defined rate at which patrol read operations are run on a computer system. product info A drive property indicating the vendor-assigned model number of the drive. product name A controller property indicating the manufacturing name of the controller. RAID A group of multiple, independent drives that provide high performance by increasing the number of drives used for saving and accessing data. A RAID drive group improves input/output (I/O) performance and data availability. The group of drives appears to the host system as a single storage unit or as multiple virtual drives. Data throughput improves because several drives can be accessed simultaneously. RAID configurations also improve data storage availability and fault tolerance. Redundant RAID levels (RAID levels 1, 5, 6, 10, 50, and 60) provide data protection. RAID 0 Uses data striping on two or more drives to provide high data throughput, especially for large files in an environment that requires no data redundancy. RAID 00 Uses data striping on two or more drives in a spanned drive group to provide high data throughput, especially for large files in an environment that requires no data redundancy. RAID 1 Uses data mirroring on pairs of drives so that data written to one drive is simultaneously written to the other drive. RAID 1 works well for small databases or other small applications that require complete data redundancy. RAID 5 Uses data striping and parity data across three or more drives (distributed parity) to provide high data throughput and data redundancy, especially for applications that require random access. RAID 6 Uses data striping and parity data across three or more drives (distributed parity) to provide high data throughput and data redundancy, especially for applications that require random access. RAID 6 can survive the failure of two drives. RAID 10 A combination of RAID 0 and RAID 1 that uses data striping across two mirrored drive groups. It provides high data throughput and complete data redundancy. RAID 50 A combination of RAID 0 and RAID 5 that uses data striping across two drive groups with parity data. It provides high data throughput and complete data redundancy. RAID 60 A combination of RAID 0 and RAID 6 that uses data striping across two drive groups with parity data. It provides high data throughput and complete data redundancy. RAID 60 can survive the failure of two drives in each RAID set in the spanned drive group. RAID level A virtual drive property indicating the RAID level of the virtual drive. LSI SAS controllers support RAID levels 0, 1, 5, 6, 10, 50, and 60. raw capacity A drive property indicating the actual full capacity of the drive before any coercion mode is applied to reduce the capacity. read policy A controller attribute indicating the current Read Policy mode. In Always Read Ahead mode, the controller reads sequentially ahead of requested data and stores the additional data in cache memory, anticipating that the data will be needed soon. This speeds up reads for sequential data, but there is little improvement when accessing random data. In No Read Ahead mode, read ahead capability is disabled. In Adaptive Read Ahead mode, the controller begins using read ahead if the two most recent drive accesses occurred in sequential sectors. If the read requests are random, the controller reverts to No Read Ahead mode. LSI Corporation Confidential | August 2009 Page 255 Appendix B: Glossary | MegaRaid SAS Software User Guide rebuild The regeneration of all data to a replacement drive in a redundant virtual drive after a drive failure. A drive rebuild normally occurs without interrupting normal operations on the affected virtual drive, though some degradation of performance of the drive subsystem can occur. rebuild rate The percentage of central processing unit (CPU) resources devoted to rebuilding data onto a new drive after a drive in a storage configuration has failed. reclaim virtual drive A method of undoing the configuration of a new virtual drive. If you highlight the virtual drive in the Configuration Wizard and click the Reclaim button, the individual drives are removed from the virtual drive configuration. reconstruction rate The user-defined rate at which a drive group modification operation is carried out. redundancy A property of a storage configuration that prevents data from being lost when one drive fails in the configuration. redundant configuration A virtual drive that has redundant data on drives in the drive group that can be used to rebuild a failed drive. The redundant data can be parity data striped across multiple drives in a drive group, or it can be a complete mirrored copy of the data stored on a second drive. A redundant configuration protects the data in case a drive fails in the configuration. revertible hot spare When you use the Replace Member procedure, after data is copied from a hot spare to a new drive, the hot spare reverts from a rebuild drive to its original hot spare status. revision level A drive property that indicates the revision level of the drive’s firmware. SAS Acronym for Serial Attached SCSI. SAS is a serial, point-to-point, enterprise-level device interface that leverages the Small Computer System Interface (SCSI) protocol set. The SAS interface provides improved performance, simplified cabling, smaller connectors, lower pin count, and lower power requirements when compared to parallel SCSI. SATA Acronym for Serial Advanced Technology Attachment. A physical storage interface standard. SATA is a serial link that provides point-to-point connections between devices. The thinner serial cables allow for better airflow within the system and permit smaller chassis designs. SCSI device type A drive property indicating the type of the device, such as drive. serial no. A controller property indicating the manufacturer-assigned serial number. strip size The portion of a stripe that resides on a single drive in the drive group. stripe size A virtual drive property indicating the length of the interleaved data segments that the RAID controller writes across multiple drives, not including parity drives. For example, consider a stripe that contains 64 KB of drive space and has 16 KB of data residing on each drive in the stripe. In this case, the stripe size is 64 KB and the strip size is 16 KB. The user can select the stripe size. striping A technique used to write data across all drives in a virtual drive. Each stripe consists of consecutive virtual drive data addresses that are mapped in fixed-size units to each drive in the virtual drive using a sequential pattern. For example, if the virtual drive includes five drives, the stripe writes data to drives one through five without repeating any of the drives. The amount of space consumed by a stripe is the same on each drive. Striping by itself does not provide data redundancy. Striping in combination with parity does provide data redundancy. subvendor ID A controller property that lists additional vendor ID information about the controller. Page 256 LSI Corporation Confidential | August 2009 MegaRaid SAS Software User Guide Appendix B: Glossary | uncorrectable error count A controller property that lists the number of uncorrectable errors detected on drives connected to the controller. If the error count reaches a certain level, a drive will be marked as failed. vendor ID A controller property indicating the vendor-assigned ID number of the controller. vendor info A drive property listing the name of the vendor of the drive. virtual drive A storage unit created by a RAID controller from one or more drives. Although a virtual drive may be created from several drives, it is seen by the operating system as a single drive. Depending on the RAID level used, the virtual drive may retain redundant data in case of a drive failure. virtual drive state A virtual drive property indicating the condition of the virtual drive. Examples include Optimal and Degraded. write-back In Write-Back Caching mode, the controller sends a data transfer completion signal to the host when the controller cache has received all of the data in a drive write transaction. Data is written to the drive subsystem in accordance with policies set up by the controller. These policies include the amount of dirty/clean cache lines, the number of cache lines available, and elapsed time from the last cache flush. write policy See Default Write Policy. write-through In Write-Through Caching mode, the controller sends a data transfer completion signal to the host when the drive subsystem has received all of the data and has completed the write transaction to the drive. LSI Corporation Confidential | August 2009 Page 257