
Contents
iv Quantum DXi6900 G1 Field Service Manual
Supported Browsers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Logging On to the DXi6900 G1 . . . . . . . . . . . . . . . . . . . . . . . 26
Logging Off of the DXi6900 G1 . . . . . . . . . . . . . . . . . . . . . . . 29
Locating DXi6900 G1 Serial Numbers . . . . . . . . . . . . . . . . . . . . . . . . . 29
Chapter 2 Service Menus 31
Connecting to the DXi6900 G1 Node . . . . . . . . . . . . . . . . . . . . . . . . . 32
DXi6900 G1 Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Connecting to the System Node Using the Service Port . . . . . 33
Connecting to the System Node Using the iDRAC Port . . . . . . 34
Connecting to the System Node Using the Serial Port. . . . . . . 37
Connecting to the System Node Using Santricity . . . . . . . . . . 37
Accessing the DXi6900 G1 Service Menu. . . . . . . . . . . . . . . . . . . . . . . 38
Hardware Configuration Menu . . . . . . . . . . . . . . . . . . . . . . . . 39
Serial Number Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Install Application Software Menu . . . . . . . . . . . . . . . . . . . . . 48
More Tools Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Pick to Order (PTO) Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Gathering Collect Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Collect Log: Remote Management Console. . . . . . . . . . . . . . . 50
Collect Log: Command Line . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Collect Log: Syscli . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Collect Log: Service Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Blockpool Verify and Blockpool Corruption Actions . . . . . . . . . . . . . . 52
Determining the Status of a Blockpool Verify . . . . . . . . . . . . . 53
Running the Blockpool Verification Script. . . . . . . . . . . . . . . . 55
Detecting Blob Corruption . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Repairing a Blocklet Corruption . . . . . . . . . . . . . . . . . . . . . . . 57
Verifying the Repair of Blocklet Corruption. . . . . . . . . . . . . . . 57
Verifying the Repair of BLOB Corruption. . . . . . . . . . . . . . . . . 57
Configuring the Number of Allowed Sources and Replication Streams 59
Configuring the Source and Target Systems . . . . . . . . . . . . . . 60
Configuring the Number of OST Replication Streams . . . . . . . . . . . . . 61
Configuring the Number of Traditional and OST Replication
Streams. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Configuring Tag Retention and Continuous Replication . . . . . . . . . . . 63
Configuring the Tag Retention Period. . . . . . . . . . . . . . . . . . . 64
Configuring Continuous Replication . . . . . . . . . . . . . . . . . . . . 64