Dell PowerEdge R830 Integrated Remote Access Controller 8 Version 2.70.70.70 U - Page 175

Configuring persistence policy settings using iDRAC web interface, A/C Power Loss

Page 175 highlights

You can configure the following persistence policies: • Virtual Address: Auxiliary powered devices • Virtual Address: Non-Auxiliary powered devices • Initiator • Storage target Before applying the persistence policy, make sure to: • Inventory the network hardware at least once, that is, enabled Collect System Inventory On Restart. • Enable I/O Identity Optimization. Events are logged to the Lifecycle Controller log when: • I/O Identity Optimization is enabled or disabled. • Persistence policy is changed. • Virtual address, initiator and target values are set based on the policy. A single log entry is logged for the configured devices and the values that are set for those devices when the policy is applied. Event actions are enabled for SNMP, email, or WS-eventing notifications. Logs are also included in the remote syslogs. Table 33. Default values for persistence policy Persistence Policy Virtual Address: Auxiliary Powered Devices Virtual Address: Non-Auxiliary Powered Devices Initiator Storage Target AC Power Loss Not selected Not selected Selected Selected Cold Boot Selected Not selected Selected Selected Warm Boot Selected Selected Selected Selected NOTE: When a persistent policy is disabled and when you perform the action to lose the virtual address, re-enabling the persistent policy does not retrieve the virtual address. You must set the virtual address again after you enable the persistent policy. NOTE: If there is a persistence policy in effect and the virtual addresses, initiator, or storage targets are set on a CNAdevice partition, do not reset or clear the values configured for virtual addresses, initiator, and storage targets before changing the VirtualizationMode or the personality of the partition. The action is performed automatically when you disable the persistence policy. You can also use a configuration job to explicitly set the virtual address attributes to 0s and the initiator and storage targets values as defined in iSCSI initiator and storage target default values. Related concepts Enabling or disabling IO Identity Optimization Configuring persistence policy settings using iDRAC web interface To configure the persistence policy: 1. In the iDRAC Web interface, go to Overview > Hardware > Network Devices. The Network Devices page is displayed. 2. Click I/O Identity Optimization tab. 3. In the Persistence Policy section, select one or more of the following for each persistence policy: • A/C Power Loss - The virtual address or target settings persist when AC power loss conditions occur. • Cold Boot - The virtual address or target settings persist when cold reset conditions occur. • Warm Boot - The virtual address or target settings persist when warm reset condition occurs. 4. Click Apply. The persistence policies are configured. Configuring persistence policy settings using RACADM To set persistence policy, use the following racadm object with the set sub command: Inventorying, monitoring, and configuring network devices 175

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298

You can configure the following persistence policies:
Virtual Address: Auxiliary powered devices
Virtual Address: Non-Auxiliary powered devices
Initiator
Storage target
Before applying the persistence policy, make sure to:
Inventory the network hardware at least once, that is, enabled Collect System Inventory On Restart.
Enable I/O Identity Optimization.
Events are logged to the Lifecycle Controller log when:
I/O Identity Optimization is enabled or disabled.
Persistence policy is changed.
Virtual address, initiator and target values are set based on the policy. A single log entry is logged for the configured devices and the
values that are set for those devices when the policy is applied.
Event actions are enabled for SNMP, email, or WS-eventing notifications. Logs are also included in the remote syslogs.
Table 33. Default values for persistence policy
Persistence Policy
AC Power Loss
Cold Boot
Warm Boot
Virtual Address: Auxiliary
Powered Devices
Not selected
Selected
Selected
Virtual Address: Non-Auxiliary
Powered Devices
Not selected
Not selected
Selected
Initiator
Selected
Selected
Selected
Storage Target
Selected
Selected
Selected
NOTE:
When a persistent policy is disabled and when you perform the action to lose the virtual address, re-enabling the
persistent policy does not retrieve the virtual address. You must set the virtual address again after you enable the
persistent policy.
NOTE:
If there is a persistence policy in effect and the virtual addresses, initiator, or storage targets are set on a CNA-
device partition, do not reset or clear the values configured for virtual addresses, initiator, and storage targets before
changing the VirtualizationMode or the personality of the partition. The action is performed automatically when you
disable the persistence policy. You can also use a configuration job to explicitly set the virtual address attributes to 0s
and the initiator and storage targets values as defined in
iSCSI initiator and storage target default values
.
Related concepts
Enabling or disabling IO Identity Optimization
Configuring persistence policy settings using iDRAC web interface
To configure the persistence policy:
1.
In the iDRAC Web interface, go to
Overview
>
Hardware
>
Network Devices
.
The
Network Devices
page is displayed.
2.
Click
I/O Identity Optimization
tab.
3.
In the
Persistence Policy
section, select one or more of the following for each persistence policy:
A/C Power Loss
- The virtual address or target settings persist when AC power loss conditions occur.
Cold Boot
- The virtual address or target settings persist when cold reset conditions occur.
Warm Boot
- The virtual address or target settings persist when warm reset condition occurs.
4.
Click
Apply
.
The persistence policies are configured.
Configuring persistence policy settings using RACADM
To set persistence policy, use the following racadm object with the
set
sub command:
Inventorying, monitoring, and configuring network devices
175