Vous êtes sur la page 1sur 22

Q) 1.

What is the difference between symmask discover and symcfg discover symcfg :--it updates the local SYMAPI data base i.e.,SYMAPI_DB.bin file symmask:--Discovers the WWN or iSCSI names of the HBAs on the host and writes the ASCII names to the login history table(VCDB), if empty. Q) 2.What is gatekeeper device.What is recommended no. of gatekeeper deive on a signle host by emc. Gatekeeper devices are used to manage SYMAPI traffic between the host and the Symmetrix. Because SYMAPI operations can make extensive demands on a single Gatekeeper, some users prefer to associate a single Gatekeeper with each device group. 2 gatekeepers are required for simple solution enabler 1 GK is required for ECC Q) 3.What are the difference beween Timefinder mirror and clone. 1.TF/Mirror depends on Mirror positions,TF/clone not 2.TF/Mirror is a real copy of production LUN ,TF/clone is logical copy of the Production LUN 3.TF/Mirror target should be BCV device,TF/clone Target is any device 4.TF/Mirror does not support RAID-5,TF/clone supports.

Q) 4.What is VCMDB database. VolumeControlManagementDataBase(VCMDB) contains DMX configuration Info. It contains Masking information. Once you loose this database means you can't get DMX configuration back at any cost. Q)5.how vcmdb database different from the information contained in the symapi.db file on the host. Symapi_db.bin:--this file is a host database file it is created when ever you execute a sycfg discover commad. To reduce the number of inquiries from the host to the storage arrays, configuration and status information is maintained in a Symmetrix host database file. VCMDB:--resides on each and every director processor.

Q)6.What is the Size of the VCMDB database. minimum 96 cyleders from 5671 and later. Q)7.What are different type of vcmdb type and their significance. Type 3 - this can cater for 32 fibre or iSCSI initiators per port. Introduced with Enginuity 5669 and requires a 24 cylinder (minimum) VCMDB and Solutions Enabler v5.2. Type 4 - this can cater for 64 fibre or 128 iSCSI initiators per port. Introduced with Enginuity 5670 and requires a 48 cylinder (minimum) VCMDB and Solutions Enabler v5.3. Type 5 - this can support 64 fibre or 128 iSCSI initiators per port AND cater for 16,000 devices. Introduced with Enginuity 5671 and requires a 96 cylinder (minimum) VCMDB and Solutions Enabler v6.0. (Note: without a type 5 96cyl VCMDB and SE 6.0 you will be restricted to 8192 logical volumes as in 5670). Type 6 - this can support 128 fibre or 256 iSCSI initiators per port AND cater for 32,000 devices available on DMX-3 with Enginuity 5771 (at GA release). Currently the Type 6 database (at latest Enginuity 5771 with Solution Enabler 6.0 and above) will cater for 256 fibre or 512 iSCSI initiators and 64,000 logical devices. Q)8 What is the difference between Symmask refresh and symmask discover. refresh:--Updates the fiber and gige adapters with changes to the VCM database. discober:--Discovers the WWN or iSCSI names of the HBAs on the host and writes the ASCII names to the login history table, if empty. Q) 9.Command to do masking. #symmask sid xxxx wwn xxxxxxxxxx add devs xxxx:xxxx dir 08b -p 0

Q) 10.commands to see which HBAs were assigned to a set of devices. symmaskdb -sid xxxx -dev xxx list assignment

Q)11 To remove the entire set of devices that an HBA can access. #symmask sid xxxx wwn xxxxxxxxxx remove devs xxxx:xxxx dir 08b -p 0 Q)12 To display just those devices that an HBA can access. #symmaskdb -sid 4034 list devs -wwn 10000000c9766ed3 Q) 13.To display the entire contents of the VCMDB. #symmaskdb -sid xxxx list database Q) 14 .To display the detiled information about the Host HBA to FA entry in the vcmdb database of the particular FA. #symmask -sid xxxx list logins -dir xxx -p x Q)15.To display your backup file of the VCMDB. Q)16.to determine the capacity of all devices assigned to a specific host. #symmaskdb -sid xxx list capacity -host <hostname> Q)17.Command to display the HBA on the host. #symmaskdb -sid xxx list capacity -host <hostname> Q) 18.Command to take the backup of the vcmdb database. #symmaskdb -sid xxx backup -f <File Name> Q 19.Command to restore the VCMDB database. #symmaskdb -sid xxx restore -f <File Name> Q) 20 .To initilize the VCMDB database,

#symmaskdb -sid xxx init -f <File Name> //Dont run this Q) 21 .command allows you to examine AWWNs in the login history. symmaskdb -sid xxx list database Q) 22 .To assign an AWWN to the existing wwn in the vcmdb database. symmaskdb -sid xxx -wwn xxxxxx rename xxxxxxxxxxxxx Q)23 .Command to replace the old wwn with the new wwn. symmaskdb -sid xxxx -wwn xxxxxxxx replace xxxxxxxxxx Q) 24.What is the difference between DMX2 and DMX3.

Q) 25 .How do we map the devices in the DMX step by step process. a)find the available address on the required FA ports ymcfg -sid xxxx list -address -available -fa xx -p x b)create one command file. filename:map_devs.txt map dev 4C29:4C81 to dir 03D:0 vbus=0,target=00,lun=015; #symconfigure -sid xxxx -f map_devs.txt preview -v #symconfigure -sid xxxx -f map_devs.txt prepare -v #symconfigure -sid xxxx -f map_devs.txt commit v Q) 26.How can we check the vcmdb type configured for the symmetrix. #symmaskdb -sid xxx list -vcmdb_type Q) 27 .How do you ensure that the device which you are using for mapping and masking are not used anywhere.

symdev -sid xxx list -noport Q) 28 What is the process of creating devices from specific group of disk in dmx. filename:--Create_devs.txt create dev count=4 size=1100, emulation=FBA, config=2-Way-Mir, disk_group=3; #symconfigure -sid xxxx -f Create_devs.txt preview -v #symconfigure -sid xxxx -f Create_devs.txt prepare -v #symconfigure -sid xxxx -f Create_devs.txt commit v

Q) What is symetrix Logical Volume Logical Slice on Physical disk that are made available to applications and databases. Q) What does IMPL.Bin file contain. This contains the DMX configuration and scripts as well but it is on Storage level. Q) What are Symetrix Logical volume emulation type? Fixed Block Architecture (FBA) for Open system Each block is a fixed size of 512 bytes Count Key Data (CKD) for mainframes Q) What is Hyper Volume? A storage area of a physical disk which was sectioned into 2 or more logical volumes (hyper-volumes). The host views hyper-volumes as individual physical devices. The number of possible hyper-volumes per disk depends on disk capacity. single disk can be divided into 256 or 128 parts or hypervolumes depending upon engunity code

Q) What is Meta Volume? A group of hypervolumes of the same size grouped together, this is then presented to a server. Once part of a metavolume, only the whole meta can be presented to the server not single disks. Q) What is Meta Head and Meta Tail When hypervolumes are added to a metavolume they are given a sequence, the first hyper being the head and last being the tail. Data is written to Meta from head to tail. Q) What is Concatenated Metavolume Writes data to one hypervolume at time until it becomes full, then moves onto the next

Q) What is Striped Metavolume Data is written to metavolume in multiples of cylinder size. The first write will go to first meta (head), then the next write to the next meta and so on. Amount of data written to the hypervolume depends on the stripe size. The stripe size is based on being a minimum of 2 cylinders. A cylinder is 480K so minimium stripe size is 960K. it devides data in 16 KB and do stiping on all Meta Members.

Q) What is BCV A Symmetrix business continuance volume (BCV) that functions as a mirrored media to a standard device for a protected storage environment.A BCV (Business Continuity Volume) is a mirrored on demand set of disks. This is usually used for backup purposes to capture a copy of a database. With a cold BCV backup the Oracle database would be shutdown first. With a hot backup 2 disk volumes assocated with the BCV would be defined. The database would be put in backup mode the a snapshot of disk volume 1 would be taken that contained all the datafiles. After this a log switch would occur then a snap shot of the second disk volume that contained all the archive logs would be taken. Q) What is SRDF

This is a remote in sync/async copy of a servers disk, usually used for DR purposes, so if a production site was lost, the data would be upto data at another site (The emc version of dataguard/standby)

Q) How many maximum logical volume you in one symetrix configuration with Engunity 5671 16,384, it depends on VCMDB Q) How do different host See SLV Unix - /dev/rdsk/c1t1d2 IBM-AIX uses hdisks (/dev/hdisk2) NT accesses disk devices through a PHYSICALDRIVE name Solaries Before assigning SLV they will run Format command, at that time what all are the hard disk present then they will run devfsadm command newly added hard disk will show up

Q) What bare different dat protection scheme used in symterix Mirroring (RAID 1) Parity RAID Raid 3 Raid 5 Striped RAID volumes Raid 6 RAID 10 Mirrored Striped Mainframe Volumes Dynamic and Permanent Sparing SRDF (Symmetrix Remote Data Facility) Q) What is a concept of mirror position Mirroring provides the highest level of performance and availability for all applications. Mirroring maintains a duplicate copy of a logical volume on two physical drives. The Symmetrix maintains these copies internally by writing all modified data to both physical locations. The mirroring function is transparent to attached hosts, as the hosts view the mirrored pair of hypers as a single logical volume. Within the Symmetrix, each logical volume is represented by four mirror positions M1, M2, M3, and M4. For

example, an unprotected volume will only use the M1 position to point to the only data copy. A RAID-1 protected volume will use the M1 and M2 positions. If this volume was also protected with SRDF, three mirror positions would be used, and if we add a BCV to this SRDF protected RAID-1 volume, all four mirror positions would be used. Q) How does Symmetrix performance algorithms for read operations to choose the best hyper in the mirrored pair Based upon bolow three service policies it does it. Interleave Service Policy - Shares the read operations of the mirrored pair by reading tracks from both logical hypers in an alternating method: a number of tracks from the primary volume (M1) and a number of tracks from the secondary volume (M2). The interleave policy is designed to achieve maximum throughput. Split Service Policy - Differs from the interleave policy because read operations are assigned to either the M1 or the M2 logical volume, but not to both. Split is designed to minimize head movement. Dynamic Mirror Service policy (DMSP) - Utilizes both Interleave and split for maximum throughput and minimal head movement. Dynamic Mirror Service policy adjusts each logical volume dynamically, based on access patterns detected. This is the default mode within the Enginuity operating system. Q) Where we are applying raid level in Symetrix While we are creating Hyper Q) How is parity calculated XOR disk level Parity RAID employs the same technique for generating parity information as many other commercially available RAID solutions, that is, the Boolean operation EXCLUSIVE OR (XOR). However, EMCs Parity implementation reduces the overhead associated with parity computation by moving the operation from controller microcode to the hardware on the XOR-capable disk drives. Q) What is track size for Raid 5 for open and mainframe system 32KB for open system and 57KB for mainframes

Q) What is Dynamic Sparing A Symmetrix feature that automatically transfers data from a failing nonmirrored disk device to an available spare disk device without affecting data availability. Q) How we will use mirror position in case on Raid 5 7+1 M1 for 7 for Data and 1 for Parity which actually points towards the capacity of parity

Q) What is call home and dail feature do Using EMC Remote and SymmWin software on the service processor or server, the Symmetrix is configured to phone home and alert EMC Customer Support of a failure or potential failure. The authorized EMC Product Support Engineer is able to run system diagnostics remotely for further troubleshooting and resolution. Configuring the Symmetrix to allow inbound dial also enables EMC Customer Support to proactively dial into the Symmetrix system to gather needed diagnostic data or to attend to identified issues. When required, a Customer Engineer will be dispatched to the Symmetrix to replace hardware or perform other maintenance.

Q) What is Read hit. LRU Read Hit In a Read hit operation, the requested data resides in global memory. The channel director transfers the requested data through the channel interface to the host and updates the global memory directory. Since the data is in global memory, there are no mechanical delays due to seek and latency. Read Miss In a read miss operation the requested data is not in global memory and must be retrieved from a disk device. While the channel director creates space in the global memory, the disk director reads the data from the disk device. The disk director stores the data in global memory and updates the directory table. The channel director then reconnects with the host and transfers the data. Because the data is not in global memory, the Symmetrix

system must search for data on the disk and then transfer it to the channel, this adds seek and latency times to the operation. Fast Write A fast write occurs when the percentage of modified data in global memory is less than the fast write threshold. On a host write command, the channel director places the incoming block(s) directly into global memory. For fast write operations, the channel director stores the data in global memory and sends a channel end and device end to the host computer. The disk director then asynchronously destages the data from global memory to the disk device. Delayed fast Write A delayed fast write occurs only when the fast write threshold has been exceeded. That is, the percentage of global memory containing modified data is higher than the fast write threshold. If this situation occurs, the Symmetrix system disconnects the channel directors from the channels. The disk directors then destage the Least Recently Used data to disk. When sufficient global memory space is available, the channel directors reconnect to their channels and process the host I/O request as a fast write. The Symmetrix system continues to process read operations during delayed fast writes. The Symmetrix System supports two different mechanisms for Least Recently Used (LRU): the traditional double-linked list, and Tag Based Caching (TBC). The Least Recently Used is a data structure that keeps the slots in the order the system accesses them. The Least Recently Used algorithm determines which slot was least recently used. This slot looses its association with the track/data that is stored. Tag Based Caching is the default cache management algorithm used in Enginuity 5670 and higher, and divides global memory into groups of several hundred slots called Tag Based Cache groups. In the Tag Based Cache data structure, two bytes represent each slot. The two bytes contain information about the last time the system most recently accessed this slot, and whether the slot is write pending. The bytes that represent the slots of a Tag Based Cache group are contiguous in global memory. All the CPUs in a Symmetrix system access all the Tag Based Cache groups with each CPU accessing each Tag Based Cache group in a different order. The system manipulates the Tag Based Cache groups under lock. The diagram above represents data flow with the Least Recently Used algorithm. Each time a read hit or write hit occurs, the Symmetrix System marks that memory slot as most recently used and promotes it to the top of the Least Recently Used list. For each write, a written-to flag is set on the initial write to each global memory block and is cleared when the global memory block is destaged. The Least Recently

Used global memory slot appears at the bottom of the Least Recently Used list. Q) What is Gate keeper what is command to make Gate keeper A host accessible Symmetrix device, accessible by the host, through which SCSI commands executed by SYMAPI are routed to all Symmetrix devices. Symgate define hyper volume name 0012 like that Size shd be 3 MB. For ECC it is 1 minimum and for solution enable it is 2

Q) What is XCM It is basically a card used for monitoring environment as well as logs errors. Four battery backup unit RS232 connectors provide paths between battery backup units and the XCM to send commands and receive status. The DMX-3 has two XCM cards for redundancy and can run with one.. It has Ethernet connectivity to each and every director. Each Director has 2 Ethernet port one will be connect to XCM 0 and one to XCM 1. If some error occurs then it will inform to service process Laptop which will ultimate do call home feature Q) What is the configuration for DMX 3 1 System Bay and 4 Storage Bays. DMX-3 will support configurations of up to 960 drives, and 64 Disk Array Enclosures. Each Storage Bay may contain up to 16 Disk Array Enclosures with up to 15 drives each for a total of 240 drives per Storage Bay, and 960 drives in total. This configuration would involve daisy chaining Disk Array Enclosures. Each bay has two power zones which provide 2N redundancy. Power Zones A and B are provided and the bay can sustain itself on one power zone, A or B.

This slide shows the front view of DMX-3 System Bay. The System Bay contains a Keyboard Video Mouse, a 1U server with UPS, 3 cooling fan assemblies (each containing 3 fans), 24-slot card cage, and up to 8 power supplies, each of which is connected to dedicated battery backup units. Note that battery backup units come in pairs; 2 per tray. In this slide, 4 battery backup units trays are shown, giving us a total of 8 battery backup units. Air intake pulls air in from the front of the bay and vents it out the top. Disk Array Enclosures are numbered from 1 16 in each Storage Bay. Disk Array Enclosure 1 is on the bottom left, counting across, 2, 3 and 4. Disk Array Enclosure 16 is located on the top right. There are sixteen direct connect disk array enclosures in Storage Bay 1A and 1B, configured with a 15 Drive loop. There are sixteen daisy chained disk array enclosures in Storage Bay 2A and 2B, which will expand the 15 drive loops to 30 drive loops. There are eight battery backup units in each storage bay, 4 for power zone A and 4 for power zone B. The storage bays are color coded to match the directors used to configure them. Yellow represents directors 1 and 16, green represents directors 2 and 15, orange represents directors 5 and 12, while blue represents directors 6 and 11. Q) What does symapi_db.bin file contain It contains the DMX configuration information but it is on the management server that means on host side

Q) What is API Application programming interface (API) is an interface implemented by a software program to enable interaction with other software Q) How we manage DMX ECC Solution Enabler Symmetrix Management console( Web Tool) Replication manager only for local replication(Time Finder) Q) What is rule 17 Q) How many mirror postion Raid 6 will use 3 Q) Can we have different Raid group on one disk in DMX yes Q) What is a command to create Hyper Create dev count=5(number configuration-raid5; of hyper) size=10GB emulation=FBA

Q) What will powermt list diaply=all command do This is to know on ehost side which is a newley created LUN. We need to run this command on host side by going to power path directory as this is power path command if there is no power path software then there is no need to run it Q) What is difference between dynamic sparing and permananet sparing Q) What is CTD It is for controller(Host HBA) target (Link or wire b/w host and fabric) and device(Storage LUN)

Q) What is Vault save and Vault Restore

Q) What is Unified Director A unified director is used in the DMX-3. The protocol depends on the mezzanine cards placed on the unified director. The mezzanine cards determine the functionality of each slice. Each board has 4 slices; previous architectures identified these as processors a through d. Q) What is symmertix lock Q) What is Provisioning Q) DMX vs clarion Q symmetrix vs dmx
?

1.tell abt ur self 2.day 2 day 3.crirical task 4.arcitecture 5.global memory 6.symmetrix lock 7.provisioning 8.impl.bin 9.timefinder 10.srdf modes 11.dmx vs clariion 12.symmetrix vs dmx 13.BCV 12.RAID

Q) What is symmetrix Lock Whenever yo are doing any configuration changes, other user will not be able to make configuration changes to the same box as it will be locked for that use this is nothing but symmetrix Lock Q) Differnce bw Symmtrix and DMX

Symmetrix was version before DMX 800, DMX 1000 etc 1) Which disk are used in DMX Fc and SATA 2) You have worked on which DMX Box

3) Tell me about your environment

4) What are teh Key features of DMX

5) What is the Funtion of PBC card Prior to DMX 3 they were using PBC now LCC 6) What is engunity and what is its funtion and your environment consist of which engunity

7) What is time finder Q) What is the difference when you are dealing with HP host and solaried host In HP host while doing mapping we need to mention Vbus id , Target id and LUn id, but in case of solaried we have to mention just Target if and Lin id. Q) What do u do in daily health check Symdisk sid xxx list fail - For any disk failer Symcfg sid xxx list env_data - About batter and SPS information Symcfg sid xxx env_data showdiskbay number - According to Bay Symmask sid xxx list login - host that are currently logged into box

Q) Y we use syminq Command To issue just a SCSI INQUIRY Q) y we use Sympd Show Displays status information about a Symmetrix device that is visible to this host. Q) Y we use symdg The symdg command performs operations specific to device groups such as, creating new device groups Q) Y we use symld It is to perform operation on the devices related to Device Group

Q) Y we use symcfg The symcfg command is used to discover a Symmetrix configuration, refresh the Symmetrix configuration database file, and display configuration information about the Symmetrix arrays attached to the host and/or any of its directors Q) What is Symmetrix Lock The Symmetrix configuration server engages a configuration lock (known as lock 15 or lock F) on the Symmetrix during the change session, blocking others from attempting to change the configuration. The lock is released at the end of the session or if the session is aborted. The time held by the configuration lock and the lock itself can be viewed by entering the following command: symcfg list lockn

15 Symmetrix device locks are used to prevent other control operations (i.e., SRDF,
will session. Device locks are engaged by the SYMAPI during the preview stage. Device locks are retained until the configuration change session has completed and changes have been activated on the Symmetrix. To view a list of the locked devices on the Symmetrix, use the symdev list -lock command

Q) How we can abort a hung session or release the configuration session lock.
To abort a change session on Symmetrix 000000012345, enter: symconfigure sid 45 abort Q) What will preview prepare and commire command do Preview - The preview argument verifies the syntax and correctness of each individual change defined and then terminates the session without change execution. Prepare - The prepare argument will perform the preview checks and also verify the appropriateness of the resulting configuration definition against the current state of the Symmetrix; then terminates the session without change execution. Commite - The commit argument completes all stages and executes the changes in the specified Symmetrix array. Q) What is a command to check freespace symconfigure list -freespace The Unformatted column shows free disk space available for any emulation mode. It is a raw space. The Formatted column shows free space on disks that have been

partially used for devices configured with the same emulation mode. Hyper are already create but not used. The free space on formatted disks can be used only to create new devices of the same emulation mode. Q) After creating meta on the host side what command will show you newely created hyper Solaris: HP: AIX: Windows: devfsadm ioscan -FnC disk and insf e cfgmgr reboot or rescan

Q) How will you Unmap the devices from directors unmap dev 101 from dir 4a:0; before unmap we need to do write disable Q) How will remove devices from Device group symld -g dgname remove DEV001 DEV006 Q) If you need to add meta to exsting stripper meta what coomad you will use Add dev Met to be added to meta exsting meta protect_Data=True bcv_meta_head=new met to which data of existing meta will be copied Q) How will remove meta member fro meta remove dev SymDevName[:SymDevName] from meta SymDevName; Q) How will list all the meta Symdev list -meta Q) What is symapi The EMC Symmetrix (and now DMX) ranges of disk subsystems can be accessed via an Application Programming Interface (API) known as SYMAPI

1)How will you check failed disk and what it will show #symdisk -sid list -failed 2)How will you check the hyper avaiable symdev show <hyper-number> 3)Suppose you have created one BCV and splited it at 10 olock but at 11 olock data got corrupted now what will you do we have backup data upto 10 O clock,so we can restore the data upto 10 o clock #symmir -sid xxx restore DEV003 BCV dev 0b2 4)What is Strip size 1920 blocks or 2 cyl 5)How you will check what are all the front port directors avaiable #symcfg -sid xxxx list -fa all 6)Why we use rule of 17 it is used for redundancy ,availability purpose. It is optional for Front-end side. 7)For 3 meters of distance which port wil l you use in SRDF RA 8)How will you see all gige ports #symcfg -sid xxxx list -fe all 9)What is function of ECM Which is the control module to monitor the box environment and communication paths. which resides back side of the cache slots(2 XCM slots)

10)What the differnce b/w DMX 2 and DMX 3 did not support VAULT Supports vaulting No RAID-5 RAID-5 introduced 5568, 5669, 5670, 5671 5771, 5772 11)What is ISL and trunk Trunking is simply enabling two or more switches to communicate and send frames to each other for transmission to remote hosts. ISL is one of the protocol used for the trunking ISL is a Cisco-proprietary trunking protocol. On which clariion version you worked Cx 300, CX 500, CX 700 What was the flare code of its 24. RSL and Size of it Differncee b/w clone and Mirror The Main differnce b/w then is clone will be avaiable as soon as it is created . But in case of mirror till the time source and target are not syncronised date will be avaiable to host What is BCV volume how can we get the BCV volume

Can any volume be used as clone Same size and same raid type What will previe prepare and commite command do have you worked on host side

Can we create 9.5 Gb of Lun in Clariion Is clone dependent upon mirror position No In DMX last engunity supported is 5772 can we upgrade it to 5773 No Have you done brogade upgrade No What is latest FOS version that you support for 12000 Supporse we have standard volume with 3 mirror position and and can we have BVV with 2 mirror position onit Yes What is size of Hyper in your environment 12.5 Gb if one hyper is of 17.02 Gb can we have another hyper of 8 gb Yes If one meta is already stripper can we add more metas in it Yes but Q) Types of Zoning, types of it Hard and soft Q) Can we create 9.5 Gb of Lun in Clariion Q) Is clone dependent upon mirror position No Q) In DMX last engunity supported is 5772 can we upgrade it to 5773 No as maximum supported version in DMX 3 is 5772 Q) Have you done brogade upgrade Q) What is a command to create BCV

Create dev count=5(number of hyper) size=10GB emulation=FBA configuration-2-waybcv-mirr; Q) How will you convert and regular device gto BCV device Convert dev xxx to 2-way-bcv-mirror Q) Differnce b/w WWPn WWNN Q) What is SAn and its topoliges Q) what all the things considered while creating hypers Q) Any idea abt disk group and on what basis they are created Q) What is the version of solution enable and symcli Q) What all Front end director ports flag c bit - commen serial number to volume scsi persistantent seservations enabler for cluster environment VCM enabler Q) Differnce b/ dmx models DMX 3 and DMX 4 Q) DMC version microcodecurrently ad hardware details Q) how do u do the activities and perform through symcli and ECC Hyper mapping and masking Q ) Gatekeeper ? size & use & how much do u have in your environment for management server Q) VCMDB types &numbers & and why it is useid Q) On HP unis any differnce while doing maskin and mapping Q) Time finder ...not ready and RW Q) SRDF types and connectivity b/w 2 boxes Meta Q) Can you related LUn id used in mapping with ur host system

Q) One lun is mapped and masked but still not able to find on host? how can u confirm which disk is assinged With the help of LUN ID, it will convert the hexdecimal value into decimal value Q) Host software Have you worked on multipathing software 16 port or 32 port Q) What is a process to reclaim meta symmask -sid 1468 -wwn 10000000c9834bc3 -dir 7c -p 1 remove dev cee,2dc3,2e7d,2ead,2edd,2f22,2f52,2fb2,2fe2,3012,30f0 nop
symdev -sid xxxx write_disable xxxx -fa xx -p x noprompt

unmap dev 2572 to dir 8b:1


dissolve meta dev 152A

Vous aimerez peut-être aussi