Presentation is loading. Please wait.

Presentation is loading. Please wait.

SGI Confidential 9 - 1 Revolution VTL. SGI Confidential 9 - 2 VTL Installation and Configuration Overview Upload the application AOR file Install the.

Similar presentations


Presentation on theme: "SGI Confidential 9 - 1 Revolution VTL. SGI Confidential 9 - 2 VTL Installation and Configuration Overview Upload the application AOR file Install the."— Presentation transcript:

1 SGI Confidential 9 - 1 Revolution VTL

2 SGI Confidential 9 - 2 VTL Installation and Configuration Overview Upload the application AOR file Install the VTL Software Gather HBA WWNs Create the COPAN Configuration File Perform the VTL Setup

3 SGI Confidential 9 - 3 VTL Software Installation ( 1 of 4) The VTL Software is not installed by manufacturing. 1. If not already logged in, log in to the Application Processor as user root. 2. Insert the DVD containing the VTL software into the DVD drive of the AP 3. Open a terminal window. 4. To run the installation, type:./revolutioninstall 5. The installation script will begin. 6. iSCSI Initiator - You will be given the option to stop the installation and install the iSCSI Initiator RPM. Select Y (yes) to continue with the installation.

4 SGI Confidential 9 - 4 VTL Software Installation (2 of 4) 7. Configure Maximum LUNs per Adapter - The installation will proceed. You will be asked to configure the maximum LUNs per adapter. It is recommended to select the default by selecting Enter 8. Configure Maximum SCSI Disk Scan - The max_scsi_disk_fs parameter will force the Linux operating system to scan a fixed number of SCSI devices on boot-up. Select Enter to accept the current value.

5 SGI Confidential 9 - 5 VTL Software Installation (3 of 4) 9. Enable NTP - To enable the use of NTP (Network Time Protocol). Type Y (yes) or N (no). 10. Confirmation Screen - Accept the configuration displayed on the confirmation screen. 11. Select HBA Family - Select the target mode HBA.Type 2400. Note: For a Failover system type: 2400mid.

6 SGI Confidential 9 - 6 VTL Software Installation (4 of 4) 12. Unmount the USB Flash drive and remove it from the USB drive. 13. You will find a log file, X-rays, and configuration backup in the /usr/local/revolutionT-archive directory

7 SGI Confidential 9 - 7 Gather Shelf Controller HBA WWNs from PSM The WWNs will be used in the Copan.conf file 1. From the KVM, log in to the PSM. 2. Gather the WWPN for each shelf connected to this Application Processor. Note that Shelf 0 is located on the bottom and Shelf 7 is located on the top of the cabinet. Use the following table to record this information:

8 SGI Confidential 9 - 8 Create the copan.conf File (1 of 2) Note: This file comes from FalconStor

9 SGI Confidential 9 - 9 Create the copan.conf File (2 of 2)

10 SGI Confidential 9 - 10 Start the Revolution VTL Console From the KVM or a remote client, connect to the Application Processor. You may have to set display environment variables to echo the GUI. To connect to the VTL Server: 1. Once started, choose Connect. 2. Log in using: User Name: root and password: CPN200t If the VTL server has not been configured yet, the Configuration wizard is launched. NOTE: If the VTL Console GUI does not start, then ensure that all revolution services/ processes are started by running the revolution status command at the Linux prompt, and if there are any processes that are not started, run the revolution start all command. 3. To launch the VTL Console, execute the following: /usr/local/sgi/vtlconsole/revolutionconsole & 4. Ensure the revolution processes are running

11 SGI Confidential 9 - 11 Revolution Processes

12 SGI Confidential 9 - 12 Logging onto the VTL

13 SGI Confidential 9 - 13 Configuration Wizard

14 SGI Confidential 9 - 14 Getting Started with Setup Access the Wizard 1. Connect to the VTL server 2. Select Next to enter the wizard.

15 SGI Confidential 9 - 15 VTL Setup Step 1 (Add License Keys) To enable features, click the Add button and enter a license keycode for all purchased features. Note: Each VTL option requires a keycode. NOTE: To add license key, without the wizard, right-click on the VTL server and select License.

16 SGI Confidential 9 - 16 VTL Setup Step 2 (Network setup)

17 SGI Confidential 9 - 17 VTL Setup Step 3 (Set Hostname) 1. Enter a hostname for the VTL server. Note: Valid characters are letters, numbers, underscore, or dash. 2. The Appliance Processor will restart automatically so that the change will take effect. 3. You must restart the VTL software. Type the following on the command line: revolution start all 4. Once the restart is complete, reconnect to the controller by right-clicking on the controller icon and selecting Connect.

18 SGI Confidential 9 - 18 VTL Setup Step 4 (Enable Fibre Channel) This step takes just a moment and there is no additional windows for this option.

19 SGI Confidential 9 - 19 VTL Setup Step 5 (Switch to Target Mode) By default, all Fibre Channel ports are set to Initiator mode, which means they will initiate requests rather than receive them. It is necessary to set the port(s) connected to the application servers to Target mode so that they can receive requests from the application servers.

20 SGI Confidential 9 - 20 VTL Setup Step 6 (Enable Virtual Libraries) The wizard will allow the operator to create the VirtualTape Library’s Database Resource as well as enable compression for the data stored in the VTL. The VirtualTape Library’s database resource requires 200 MB of disk space, and contains the VTL configuration.

21 SGI Confidential 9 - 21 VTL Setup Step 7 (Assign Physical Libraries) If importing data from physical tapes into the Virtual Tape Library or exporting Virtual Tapes to physical tapes, the physical tape libraries/drives must be assigned to the VTL. This step also inventories the physical tapes in the library/drive so that Virtual Tapes that match the physical tapes can be created.

22 SGI Confidential 9 - 22 VTL Setup Step 8 (Create Virtual Libraries) (1 of 11) Select the shelf on which to create the virtual library. You can select to create the library on a single shelf, or the VTL can be spanned across a maximum of seven shelves by selecting multiple shelves.

23 SGI Confidential 9 - 23 VTL Setup Step 8 (Create Virtual Libraries) (2 of 11) Select the tape library to be emulated.

24 SGI Confidential 9 - 24 VTL Setup Step 8 (Create Virtual Libraries) (3 of 11) Enter information about the tape drives in the library.

25 SGI Confidential 9 - 25 VTL Setup Step 8 (Create Virtual Libraries) (4 of 11) Enter Virtual Tape Library information.

26 SGI Confidential 9 - 26 VTL Setup Step 8 (Create Virtual Libraries) (5 of 11) Configure Auto Archive.

27 SGI Confidential 9 - 27 VTL Setup Step 8 (Create Virtual Libraries) (6 of 11) Define Tape Capacity. Note: Be sure to match the physical tapes.

28 SGI Confidential 9 - 28 VTL Setup Step 8 (Create Virtual Libraries) (7 of 11) Verify all information, and click Finish to create the Virtual Tape Library.

29 SGI Confidential 9 - 29 VTL Setup Step 8 (Create Virtual Libraries) (8 of 11) Select how to create a Virtual Tape(s).

30 SGI Confidential 9 - 30 Tape Cartridge Calculator

31 SGI Confidential 9 - 31 VTL Setup Step 8 (Create Virtual Libraries) (9 of 11) Select Virtualized Physical Devices and specify the Batch Mode information. Depending upon the method selected, specify name and number of tapes (referred to as resources) to create.

32 SGI Confidential 9 - 32 VTL Setup Step 8 (Create Virtual Libraries) (10 of 11) Set the Barcode range.

33 SGI Confidential 9 - 33 VTL Setup Step 8 (Create Virtual Libraries) (11 of 11) Verify all information, and click Finish to create the Virtual Tape(s).

34 SGI Confidential 9 - 34 VTL Setup Step 9 (Add SAN Clients 1 of 3) Select the type of clients (backup servers) to assign a tape library. Add your own SAN Clients - Complete the steps below to create SAN Clients. Use the EveryoneFC client - When Fibre Channel was enabled, an EveryoneFC client was created under SAN Clients. This is a generic client to which all (or some) of the SAN Resources may be assigned. It allows any WWPN not already associated with a Fibre Channel client to have read/write, non-exclusive access to any SAN Resources assigned to Everyone.

35 SGI Confidential 9 - 35 VTL Setup Step 9 (Add SAN Clients 2 of 3) Select the Fibre Channel protocol, and click Next then select the initiator WWPN that represents the client.

36 SGI Confidential 9 - 36 VTL Setup Step 9 (Add SAN Clients 3 of 3) Set the Fibre Channel options and click Next, then verify the information and click Finish.

37 SGI Confidential 9 - 37 VTL Setup Step 10 (Assign VTL to Clients) On the Select a Device Type window, select the Tape Libraries and Tape Drives option, and click Next. On the Select SAN Resource(s) window, select the VTL to be assigned to the client.

38 SGI Confidential 9 - 38 VTL Setup Step 10 (Assign VTL to Clients) On the Select a Fibre Channel Target window, select the WWPN for the Application Processor target port through which the client will access the COPAN 400T/TX. Click Next. Verify the information and click Finish.

39 SGI Confidential 9 - 39 Following the VTL Setup Mirror the VTL Repository To mirror the VTL database that was created during the wizard: 1. Expand the tree in the left pane. 2. Expand the VirtualTape Library System tree. 3. Right-click to select the Database option. Select Mirror -> Add. Change Default Password Once the VTL has been configured, change the default configuration password. 1. Right-click on the Application Processor and select Change Password. 2. Enter the original password, new password, and then confirm the new password. Note: Passwords are case-sensitive. Add an Administrator Account The first time the VTL Console is used after installation, at least one administrator account should be added. 1. Right-click on the Controller name 2. Select Administrators to add VTL Console administrators. Save the VTL System Configuration After the VTL configuration is complete, save the VTL system configuration to a secure location on another machine.

40 SGI Confidential 9 - 40 Revolutionconsole Graphical User Interface

41 SGI Confidential 9 - 41 Connecting to the Application Server The VTL Console can automatically discover all Application Processors on the local subnet. 1. Select Tools --> Discover Application Processors.

42 SGI Confidential 9 - 42 VTL Console Each Application Processor tree is comprised of the following: Physical Resources - Storage HBAs - Storage Devices - Storage Pools Logical Resources - SAN Resources - VirtualTape Libraries SAN Clients Reports Each object on the VTL Console tree has a corresponding display window. These windows show the current configuration of the object and can also show health and performance statistics.

43 SGI Confidential 9 - 43 Event Log

44 SGI Confidential 9 - 44 Performing an X-Ray

45 SGI Confidential 9 - 45 X-Ray (1 of 4) There are four main files in an X-Ray: Messages Info ipstor.conf ipstor.dat. messages This is the Linux system message file and is located in /var/log. All IPStor server messages, including status and error messages, are stored in this file Example:

46 SGI Confidential 9 - 46 X-Ray (2 of 4) The messages file requires some expertise to understand and to know what to look for It documents every event that happens on the system. You can track specific user actions in the file, for example:

47 SGI Confidential 9 - 47 X-Ray (3 of 4) info This file contains a wealth of information, including, but not limited to: IP, physical disk, modules, kernel, IPStor VID and memory information along with the current running processes It is worth scanning through an info file to become familiar with the contents. Example:

48 SGI Confidential 9 - 48 X-Ray (4 of 4) ipstor.conf This file contains information on all the physical devices, logical devices, and IPStor SAN clients, and xml information File closely maps what is seen in the GUI ipstor.dat This file contains the information that the Console uses to display current status For example, mirror progress, replication progress and failover status is stored within this file Similar in appearance to ipstor.conf Other files worth knowing include: nas.conf Contains NAS configuration information rpm Shows all the packages installed in Linux nasrsvdlist.conf Shows uid and gid range for NAS

49 SGI Confidential 9 - 49 Tape Loaded into Drive

50 SGI Confidential 9 - 50 Move Tape to Slot

51 SGI Confidential 9 - 51 Create a Tape (1 of 4)

52 SGI Confidential 9 - 52 Create a Tape (2 of 4)

53 SGI Confidential 9 - 53 Create a Tape (3 of 4)

54 SGI Confidential 9 - 54 Create a Tape (4 of 4)

55 SGI Confidential 9 - 55 Save/Restore the Configuration

56 SGI Confidential 9 - 56 Reports (1 of 2)

57 SGI Confidential 9 - 57 Reports (2 of 2)

58 SGI Confidential 9 - 58 Revolutionconsole Command line Interface

59 SGI Confidential 9 - 59 iscli Overview Type iscli at the command line to display a list of commands. Each command must be combined with the appropriate long or short arguments (ex. Long: --server-name Short: -s servername). With the command name (for example, iscli importtape), a list of arguments will be displayed for that command. Type each command on a single line, separating arguments with a space Use either the short or long arguments Variables are listed in <> after each argument Arguments listed in brackets [ ] are optional The order of the arguments is irrelevant Arguments separated by | are choices. Only one can be selected For a value entered as a literal, it is necessary to enclose the value in quotes (double or single) if it contains special characters such as *,, ?, |, %, $, or space. Otherwise, the system will interpret the characters with a special meaning before it is passed to the command. Literals cannot contain leading or trailing spaces. Leading or trailing spaces enclosed in quotes will be removed before the command is processed.

60 SGI Confidential 9 - 60 Logging into the VTL Server via the cli Log into the VTL Server Syntax: iscli login [-s -u -p |-e] [-X ] iscli login [--server-name= --server-username= --server-password= |--environment] [--rpc-timeout= ] In order to use the -e (--environment) parameter, you must set the following three environment variables: ISSERVERNAME ISUSERNAME ISPASSWORD After setting these variables, the environment parameter can be used in the login command in place of -s -u -p. Therefore, you could type the following to log in: iscli login -e

61 SGI Confidential 9 - 61 Miscellaneous AP and VTL Items

62 SGI Confidential 9 - 62 ismon command

63 SGI Confidential 9 - 63 fcmon command

64 SGI Confidential 9 - 64 VTL Message Log

65 SGI Confidential 9 - 65 Module Review Questions This completes the Revolution VTL module. Answer the review questions before proceeding. 01. What is the login and password for revolution? 02. How do you start the revolution GUI? 03. What is the command to start or stop revolution processes? 04. Where is the copan.conf located and describe how its edited ? 05. At a high level, describe how you configure a VTL. 06. Why should you care about creating a certain number of tapes of a certain size? 07. What component of revolution saves the current state of the VTL? 08. List some things you should do once you’ve configured a VTL. 09. Where is the VTL message log located? 10. List two AP commands that provide metrics of bandwidth and performance? 11. What must you do is there are no tapes after completing the VTL configuration wizard? 12. Where is the X-ray and configuration backup files located ? 13. Describe VTL licensing?

66 SGI Confidential 9 - 66 Lab Project You will be given 120 minutes to: Optionally install the Falconstor software Optionally install Falconstor client software Create the copan.conf file Configure a VTL using the revolutionconsole GUI Explore the various pages and panels of the GUI Optionally explore the CLI Load and unload tapes Save the configuration View VTL logs Run AP VTL commands Perform an X-ray

67 SGI Confidential 9 - 67 67


Download ppt "SGI Confidential 9 - 1 Revolution VTL. SGI Confidential 9 - 2 VTL Installation and Configuration Overview Upload the application AOR file Install the."

Similar presentations


Ads by Google