Performing a Break-Mirror Operation Using
Lifecycle Controller
This Dell Technical White Paper provides the procedure to perform Break-Mirror
operation using Lifecycle Controller on the 12th Generation servers and later of
Dell.
Dell Engineering
November 2013
Aruna Jayaprakash
Balaji K
Bala Gupta
Vinod P S
Sheshadri P.R. Rao
A Dell Technical White Paper
Revisions
Date Description
Nov 2013 Initial release
THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND
TECHNICAL INACCURACIES. THE CONTENT IS PROVIDED AS IS, WITHOUT EXPRESS OR IMPLIED WARRANTIES OF
ANY KIND.
© 2013 Dell Inc. All rights reserved. Reproduction of this material in any manner whatsoever without the express
written permission of Dell Inc. is strictly forbidden. For more information, contact Dell.
Dell, the DELL logo, and the DELL badge are trademarks of Dell Inc. Symantec, NetBackup, and Backup Exec are
trademarks of Symantec Corporation in the U.S. and other countries. Microsoft, Windows, and Windows Server are
registered trademarks of Microsoft Corporation in the United States and/or other countries. Other trademarks and
trade names may be used in this document to refer to either the entities claiming the marks and names or their
products. Dell disclaims any proprietary interest in the marks and names of others.
Trademarks used in this text:
Dell™, the Dell logo, Dell Boomi™, Dell Precision™ ,OptiPlex™, Latitude™, PowerEdge™, PowerVault™,
PowerConnect™, OpenManage™, EqualLogic™, Compellent™, KACE™, FlexAddress™, Force10™ and Vostro™ are
trademarks of Dell Inc. Other Dell trademarks may be used in this document. Cisco Nexus®, Cisco MDS
®
0S
, and other Cisco Catalyst® are registered trademarks of Cisco System Inc. EMC VNX®, and EMC Unisphere® are
registered trademarks of EMC Corporation. Intel
Intel Corporation in the U.S. and other countries. AMD
Phenom™ and AMD Sempron™ are trademarks of Advanced Micro Devices, Inc. Microsoft
®
Server
, Internet Explorer®, MS-DOS®, Windows Vista® and Active Directory® are either trademarks or registered
trademarks of Microsoft Corporation in the United States and/or other countries. Red Hat
®
Linux
are registered trademarks of Red Hat, Inc. in the United States and/or other countries. Novell® and SUSE® are
registered trademarks of Novell Inc. in the United States and other countries. Oracle
Oracle Corporation and/or its affiliates. Citrix
trademarks of Citrix Systems, Inc. in the United States and/or other countries. VMware
®
, Pentium®, Xeon®, Core® and Celeron® are registered trademarks of
®
is a registered trademark and AMD Opteron™, AMD
®
, Xen®, XenServer® and XenMotion® are either registered trademarks or
®
, Windows®, Windows
®
and Red Hat® Enterprise
®
is a registered trademark of
®
, Virtual SMP®, vMotion®,
®
, Cisco NX-
2 Performing a Break-Mirror Operation Using Lifecycle Controller
vCenter® and vSphere® are registered trademarks or trademarks of VMware, Inc. in the United States or other
®
countries. IBM
NetXtreme
is a registered trademark of International Business Machines Corporation. Broadcom® and
®
are registered trademarks of Broadcom Corporation. Qlogic is a registered trademark of QLogic
Corporation. Other trademarks and trade names may be used in this document to refer to either the entities claiming
the marks and/or names or their products and are the property of their respective owners. Dell disclaims proprietary
interest in the marks and names of others.
3 Performing a Break-Mirror Operation Using Lifecycle Controller
Contents
Revisions .................................................................................................................................................................................................. 2
Executive Summary ............................................................................................................................................................................... 5
Introduction ............................................................................................................................................................................................ 5
Performing Break-Mirror Operation Using Lifecycle Controller ................................................................................................ 6
Pre-requisites........................................................................................................................................................................................14
4 Performing a Break-Mirror Operation Using Lifecycle Controller
Executive Summary
This whitepaper provides the procedure to perform Break-Mirror operation using Lifecycle Controller on
the 12th generation servers and later of Dell.
Introduction
Break-Mirror is a feature in the Lifecycle Controller of the 12th generation servers and later of Dell that is
used to replicate the data from one server to another by safely breaking or isolating a RAID1 virtual disk.
This feature enables easy operation by providing an intuitive, user-friendly graphical user interface (GUI).
Figure 1 The Break-Mirror Page
5 Performing a Break-Mirror Operation Using Lifecycle Controller