beautypg.com

Accusys ExaRAID GUI User Manual

Page 37

background image

Introduction

1-12

largely depend on the information you collect. It is advised to write down
the information of users’ needs and environments as well as the
configurations in your mind, which can be very helpful guidance through
the all the lifetime of the RAID systems.

Configuring the hardware settings and doing health check

After installing your RAID systems with necessary components, like hard
disks and transceivers, to your environment, enabling the user interfaces is
a prerequisite if you want to do anything useful to your RAID systems. The
only user interface that you can use without any tools is the LCD console,
by which the settings of the RS232 port and the management network
interface can be done to allow you to use the GUI and CLI (see 3.3 Menu
on page 3-6
).

Now, do a quick health check by examining the GUI monitoring page to
locate any mal-functioning components in the chassis or suspicious
events (section 2.2). Follow the hardware manual to do troubleshooting, if
needed, and contact your supplier if the problems still exist. Make sure
the links of the host interfaces are up and all installed hard disks are
detected. Since your hard disks will be the final data repository, largely
influencing the overall performance and reliability, it is advised to use the
embedded self-test utility and SMART functions to check the hard disks
(see 2.8 Hardware Configurations on page 2-57 ). A better approach
would be to use benchmark or stress testing tools.

You need also be sure that all the attached JBOD systems are detected
and no abnormal event reported for the expansion port hardware (see
2.3 SAS JBOD Enclosure Display (for SAS expansion controller only) on
page 2-13)
. Sometimes, you will need to adjust the hardware parameters,
under your supplier’s advices, to avoid potential interoperability issues.

Organizing and presenting the storage resources

The most essential configuration tasks of a RAID system are to organize
the hard disks using a variety of RAID settings and volume management
functions, and eventually to present them to host systems as LUNs (LUN
mapping). This is a process consisted of both top-down and bottom-up
methodology. You see from high-level and logical perspectives of each
host system to define the LUNs and their requirements. On the other hand,
you will do configuration starting from the low-level and physical objects,
like grouping the disk drives into disk groups.

Tradeoff analysis is required when choosing RAID levels, like using RAID 0
for good performance but losing reliability, or using RAID 6 for high
reliability but incurring performance penalty and capacity overhead. The
appendix provides information about the algorithms of each RAID level
and the corresponding applications. You can also use the embedded
volume management functions to build LUNs of higher performance and
larger capacity. The RAID system offers much flexibility in configurations,
like independently-configurable RAID attributes for each logical disk,