Dell PowerVault MD3820f User Manual

Dell PowerVault MD 34XX/38XX Series Storage Arrays
Administrator's Guide
Notes, Cautions, and Warnings
NOTE: A NOTE indicates important information that helps you make better use of your computer.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
intellectual property laws. Dell™ and the Dell logo are trademarks of Dell Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies.
2014 - 02
Rev. A01
Contents
1 Introduction..............................................................................................................15
Dell PowerVault Modular Disk Storage Manager .............................................................................. 15
User Interface.......................................................................................................................................15
Enterprise Management Window....................................................................................................... 16
Inheriting The System Settings......................................................................................................17
Array Management Window................................................................................................................17
Dell PowerVault Modular Disk Configuration Utility..........................................................................18
Other Information You May Need...................................................................................................... 18
2 About Your MD Series Storage Array................................................................. 21
Physical Disks, Virtual Disks, And Disk Groups................................................................................... 21
Physical Disks.................................................................................................................................21
Physical Disk States........................................................................................................................21
Virtual Disks And Disk Groups.......................................................................................................22
Virtual Disk States.......................................................................................................................... 22
Disk Pools............................................................................................................................................ 23
Thin Virtual Disks.................................................................................................................................23
RAID Levels..........................................................................................................................................23
Maximum Physical Disk Support Limitations............................................................................... 23
RAID Level Usage.......................................................................................................................... 24
RAID 0............................................................................................................................................24
RAID 1.............................................................................................................................................24
RAID 5............................................................................................................................................ 24
RAID 6............................................................................................................................................ 24
RAID 10.......................................................................................................................................... 25
Segment Size.......................................................................................................................................25
Virtual Disk Operations....................................................................................................................... 25
Virtual Disk Initialization................................................................................................................ 25
Consistency Check........................................................................................................................25
Media Verification..........................................................................................................................26
Cycle Time.....................................................................................................................................26
Virtual Disk Operations Limit........................................................................................................ 26
Disk Group Operations....................................................................................................................... 26
RAID Level Migration.....................................................................................................................26
Segment Size Migration.................................................................................................................27
Virtual Disk Capacity Expansion....................................................................................................27
Disk Group Expansion................................................................................................................... 27
Disk Group Defragmentation........................................................................................................27
Disk Group Operations Limit.........................................................................................................27
RAID Background Operations Priority................................................................................................28
Virtual Disk Migration And Disk Roaming...........................................................................................28
Disk Migration................................................................................................................................28
Disk Roaming.................................................................................................................................29
Host Server-To-Virtual Disk Mapping.......................................................................................... 30
Host Types.....................................................................................................................................30
Advanced Features..............................................................................................................................30
Types Of Snapshot Functionality Supported............................................................................... 30
Snapshot Virtual Disks (Legacy).....................................................................................................31
Snapshot (Legacy) Repository Virtual Disk................................................................................... 31
Virtual Disk Copy............................................................................................................................31
Virtual Disk Recovery.....................................................................................................................32
Using Snapshot And Virtual Disk Copy Together.........................................................................32
Multi-Path Software............................................................................................................................ 33
Preferred And Alternate Controllers And Paths............................................................................33
Virtual Disk Ownership..................................................................................................................33
Load Balancing....................................................................................................................................34
Monitoring System Performance....................................................................................................... 34
Interpreting Performance Monitor Data.......................................................................................35
Viewing Real-time Graphical Performance Monitor Data...........................................................38
Customizing the Performance Monitor Dashboard.................................................................... 38
Specifying Performance Metrics...................................................................................................39
Viewing Real-time Textual Performance Monitor.......................................................................40
Saving Real-time Textual Performance Data............................................................................... 41
Starting and Stopping Background Performance Monitor.......................................................... 41
Viewing Information about the Current Background Performance Monitor Session................42
Viewing Current Background Performance Monitor Data..........................................................42
Saving the Current Background Performance Monitor Data......................................................43
Viewing Saved Background Performance Monitor Data.............................................................43
What are invalid objects in the Performance Monitor?...............................................................44
3 Discovering And Managing Your Storage Array............................................. 47
Out-Of-Band Management................................................................................................................47
In-Band Management......................................................................................................................... 47
Access Virtual Disk........................................................................................................................ 48
Storage Arrays..................................................................................................................................... 48
Automatic Discovery Of Storage Arrays.......................................................................................48
Manual Addition Of A Storage Array.............................................................................................48
Setting Up Your Storage Array............................................................................................................49
Locating Storage Arrays................................................................................................................50
Naming Or Renaming Storage Arrays.......................................................................................... 50
Setting A Password........................................................................................................................ 51
Adding Or Editing A Comment To An Existing Storage Array......................................................51
Removing Storage Arrays..............................................................................................................52
Enabling Premium Features.......................................................................................................... 52
Displaying Failover Alert................................................................................................................52
Changing The Cache Settings On The Storage Array..................................................................53
Changing Expansion Enclosure ID Numbers............................................................................... 53
Changing The Enclosure Order....................................................................................................53
Configuring Alert Notifications...........................................................................................................54
Configuring E-mail Alerts..............................................................................................................54
Configuring SNMP Alerts...............................................................................................................55
Battery Settings................................................................................................................................... 58
Changing The Battery Settings..................................................................................................... 59
Setting The Storage Array RAID Controller Module Clocks.............................................................. 59
4 Using iSCSI................................................................................................................61
Changing The iSCSI Target Authentication........................................................................................61
Entering Mutual Authentication Permissions..................................................................................... 61
Creating CHAP Secrets....................................................................................................................... 62
Initiator CHAP Secret.................................................................................................................... 62
Target CHAP Secret...................................................................................................................... 62
Valid Characters For CHAP Secrets.............................................................................................. 62
Changing The iSCSI Target Identification..........................................................................................63
Changing The iSCSI Target Discovery Settings................................................................................. 63
Configuring The iSCSI Host Ports...................................................................................................... 64
Advanced iSCSI Host Port Settings.....................................................................................................65
Viewing Or Ending An iSCSI Session.................................................................................................. 65
Viewing iSCSI Statistics And Setting Baseline Statistics.....................................................................66
Edit, Remove, Or Rename Host Topology.........................................................................................66
5 Event Monitor..........................................................................................................69
Enabling Or Disabling The Event Monitor..........................................................................................69
Windows........................................................................................................................................69
Linux...............................................................................................................................................70
6 About Your Host......................................................................................................71
Configuring Host Access.....................................................................................................................71
Using The Host Mappings Tab............................................................................................................72
Defining A Host..............................................................................................................................72
Removing Host Access....................................................................................................................... 73
Managing Host Groups....................................................................................................................... 73
Creating A Host Group........................................................................................................................73
Adding A Host To A Host Group...................................................................................................74
Removing A Host From A Host Group......................................................................................... 74
Moving A Host To A Different Host Group...................................................................................74
Removing A Host Group............................................................................................................... 75
Host Topology...............................................................................................................................75
Starting Or Stopping The Host Context Agent.............................................................................75
I/O Data Path Protection.................................................................................................................... 76
Managing Host Port Identifiers........................................................................................................... 76
7 Disk Groups, Standard Virtual Disks, And Thin Virtual Disks.......................79
Creating Disk Groups And Virtual Disks............................................................................................. 79
Creating Disk Groups....................................................................................................................80
Locating A Disk Group...................................................................................................................81
Creating Standard Virtual Disks.....................................................................................................81
Changing The Virtual Disk Modification Priority..........................................................................82
Changing The Virtual Disk Cache Settings...................................................................................83
Changing The Segment Size Of A Virtual Disk.............................................................................84
Changing The IO Type..................................................................................................................85
Thin Virtual Disks.................................................................................................................................86
Advantages Of Thin Virtual Disks..................................................................................................86
Physical Vs Virtual Capacity On A Thin Virtual Disk.....................................................................86
Thin Virtual Disk Requirements And Limitations.......................................................................... 87
Thin Volume Attributes................................................................................................................. 87
Thin Virtual Disk States..................................................................................................................88
Comparison—Types Of Virtual Disks And Copy Services............................................................88
Rollback On Thin Virtual Disks......................................................................................................89
Initializing A Thin Virtual Disk........................................................................................................89
Changing A Thin Virtual Disk To A Standard Virtual Disk............................................................ 92
Choosing An Appropriate Physical Disk Type....................................................................................92
Physical Disk Security With Self Encrypting Disk............................................................................... 92
Creating A Security Key.................................................................................................................94
Changing A Security Key...............................................................................................................96
Saving A Security Key.................................................................................................................... 96
Validate Security Key..................................................................................................................... 97
Unlocking Secure Physical Disks.................................................................................................. 97
Erasing Secure Physical Disks....................................................................................................... 97
Configuring Hot Spare Physical Disks................................................................................................98
Hot Spares And Rebuild................................................................................................................ 99
Global Hot Spares......................................................................................................................... 99
Hot Spare Operation.....................................................................................................................99
Hot Spare Drive Protection.........................................................................................................100
Enclosure Loss Protection................................................................................................................100
Drawer Loss Protection.....................................................................................................................101
Host-To-Virtual Disk Mapping..........................................................................................................102
Creating Host-To-Virtual Disk Mappings...................................................................................102
Modifying And Removing Host-To-Virtual Disk Mapping.........................................................103
Changing Controller Ownership Of The Virtual Disk................................................................ 104
Removing Host-To-Virtual Disk Mapping..................................................................................105
Changing The RAID Controller Module Ownership Of A Disk Group...................................... 105
Changing The RAID Level Of A Disk Group............................................................................... 105
Removing A Host-To-Virtual Disk Mapping Using Linux DMMP.............................................. 106
Restricted Mappings..........................................................................................................................107
Storage Partitioning.......................................................................................................................... 108
Disk Group And Virtual Disk Expansion............................................................................................109
Disk Group Expansion.................................................................................................................109
Virtual Disk Expansion.................................................................................................................109
Using Free Capacity.................................................................................................................... 109
Using Unconfigured Capacity..................................................................................................... 110
Disk Group Migration........................................................................................................................ 110
Export Disk Group....................................................................................................................... 110
Import Disk Group........................................................................................................................111
Storage Array Media Scan..................................................................................................................112
Changing Media Scan Settings....................................................................................................112
Suspending The Media Scan....................................................................................................... 113
8 Disk Pools And Disk Pool Virtual Disks............................................................115
Difference Between Disk Groups And Disk Pools............................................................................ 115
Disk Pool Restrictions........................................................................................................................115
Creating A Disk Pool Manually..........................................................................................................116
Automatically Managing The Unconfigured Capacity In Disk Pools............................................... 117
Locating Physical Disks In A Disk Pool............................................................................................. 118
Renaming A Disk Pool....................................................................................................................... 118
Configuring Alert Notifications For A Disk Pool............................................................................... 119
Adding Unassigned Physical Disks To A Disk Pool...........................................................................119
Configuring The Preservation Capacity Of A Disk Pool.................................................................. 120
Changing The Modification Priority Of A Disk Pool........................................................................ 120
Changing The RAID Controller Module Ownership Of A Disk Pool................................................121
Checking Data Consistency.............................................................................................................. 121
Deleting A Disk Pool..........................................................................................................................122
Viewing Storage Array Logical Components And Associated Physical Components ...................123
Secure Disk Pools..............................................................................................................................124
Changing Capacity On Existing Thin Virtual Disks...........................................................................124
Creating A Thin Virtual Disk From A Disk Pool.................................................................................125
9 Using SSD Cache...................................................................................................127
How SSD Cache Works..................................................................................................................... 127
Benefits Of SSD Cache......................................................................................................................127
Choosing SSD Cache Parameters.....................................................................................................127
SSD Cache Restrictions.....................................................................................................................128
Creating An SSD Cache.................................................................................................................... 128
Viewing Physical Components Associated With An SSD Cache.....................................................129
Locating Physical Disks In An SSD Cache........................................................................................ 129
Adding Physical Disks To An SSD Cache..........................................................................................129
Removing Physical Disks From An SSD Cache................................................................................ 130
Suspending Or Resuming SSD Caching...........................................................................................130
Changing I/O Type In An SSD Cache...............................................................................................130
Renaming An SSD Cache.................................................................................................................. 131
Deleting An SSD Cache..................................................................................................................... 131
Using The Performance Modeling Tool............................................................................................131
10 Premium Feature—Snapshot Virtual Disk.................................................... 133
Snapshot Virtual Disk Vs. Snapshot Virtual Disk (Legacy)................................................................ 133
Snapshot Images And Groups.......................................................................................................... 133
Snapshot Virtual Disk Read/Write Properties................................................................................... 134
Snapshot Groups And Consistency Groups.....................................................................................134
Snapshot Groups.........................................................................................................................134
Snapshot Consistency Groups....................................................................................................135
Understanding Snapshot Repositories............................................................................................. 135
Consistency Group Repositories................................................................................................ 135
Ranking Repository Candidates..................................................................................................136
Using Snapshot Consistency Groups With Remote Replication...............................................136
Creating Snapshot Images................................................................................................................136
Creating A Snapshot Image.........................................................................................................137
Canceling A Pending Snapshot Image....................................................................................... 138
Deleting A Snapshot Image.........................................................................................................138
Scheduling Snapshot Images............................................................................................................139
Creating A Snapshot Schedule................................................................................................... 139
Editing A Snapshot Schedule......................................................................................................140
Performing Snapshot Rollbacks........................................................................................................141
Snapshot Rollback Limitations.................................................................................................... 141
Starting A Snapshot Rollback......................................................................................................142
Resuming A Snapshot Image Rollback.......................................................................................142
Canceling A Snapshot Image Rollback.......................................................................................143
Viewing The Progress Of A Snapshot Rollback..........................................................................143
Changing Snapshot Rollback Priority.........................................................................................144
Creating A Snapshot Group..............................................................................................................144
Creating A Consistency Group Repository (Manually).............................................................. 146
Changing Snapshot Group Settings........................................................................................... 147
Renaming A Snapshot Group..................................................................................................... 148
Deleting A Snapshot Group........................................................................................................ 148
Converting A Snapshot Virtual Disk To Read-Write........................................................................ 148
Viewing Associated Physical Components Of An Individual Repository Virtual Disk.................... 149
Creating A Consistency Group.........................................................................................................149
Creating A Consistency Group Repository (Manually)...............................................................151
Renaming A Consistency Group.................................................................................................152
Deleting A Consistency Group....................................................................................................152
Changing The Settings Of A Consistency Group.......................................................................153
Adding A Member Virtual Disk To A Consistency Group...........................................................153
Removing A Member Virtual Disk From A Consistency Group................................................. 154
Creating A Snapshot Virtual Disk Of A Snapshot Image.................................................................. 155
Snapshot Virtual Disk Limitations................................................................................................155
Creating A Snapshot Virtual Disk................................................................................................ 156
Creating A Snapshot Virtual Disk Repository..............................................................................157
Changing The Settings Of A Snapshot Virtual Disk....................................................................158
Disabling A Snapshot Virtual Disk Or Consistency Group Snapshot Virtual Disk..................... 158
Re-creating A Snapshot Virtual Disk Or Consistency Group Snapshot Virtual Disk.................159
Renaming A Snapshot Virtual Disk Or Consistency Group Snapshot Virtual Disk................... 160
Deleting A Snapshot Virtual Disk Or Consistency Group Snapshot Virtual Disk.......................161
Creating A Consistency Group Snapshot Virtual Disk......................................................................161
Creating A Consistency Group Snapshot Virtual Disk Repository (Manually)...........................163
Disabling A Snapshot Virtual Disk Or Consistency Group Snapshot Virtual Disk..................... 165
Re-creating A Snapshot Virtual Disk Or Consistency Group Snapshot Virtual Disk.................166
Changing The Modification Priority Of An Overall Repository Virtual Disk.............................. 167
Changing The Media Scan Setting Of An Overall Repository Virtual Disk................................ 167
Changing The Pre-read Consistency Check Setting Of An Overall Repository Virtual Disk... 168
Increasing The Capacity Of An Overall Repository................................................................... 168
Decreasing The Capacity Of The Overall Repository................................................................ 170
Performing A Revive Operation...................................................................................................171
11 Premium Feature—Snapshot Virtual Disks (Legacy).................................. 173
Scheduling A Snapshot Virtual Disk..................................................................................................174
Common Reasons For Scheduling A Snapshot Virtual Disk......................................................174
Guidelines for Creating Snapshot Schedules.............................................................................174
Creating A Snapshot Virtual Disk Using The Simple Path................................................................ 175
About The Simple Path................................................................................................................175
Preparing Host Servers To Create The Snapshot Using The Simple Path.................................175
Creating A Snapshot Virtual Disk Using The Advanced Path........................................................... 177
About The Advanced Path...........................................................................................................177
Preparing Host Servers To Create The Snapshot Using The Advanced Path............................177
Creating The Snapshot Using The Advanced Path.................................................................... 179
Specifying Snapshot Virtual Disk Names..........................................................................................180
Snapshot Repository Capacity......................................................................................................... 180
Re-Creating Snapshot Virtual Disks..................................................................................................182
Disabling A Snapshot Virtual Disk.....................................................................................................182
Preparing Host Servers To Re-Create A Snapshot Virtual Disk................................................. 183
Re-Creating A Snapshot Virtual Disk................................................................................................184
12 Premium Feature—Virtual Disk Copy............................................................ 185
Using Virtual Disk Copy With Snapshot Or Snapshot (Legacy) Premium Feature......................... 186
Types Of Virtual Disk Copies............................................................................................................ 186
Offline Copy................................................................................................................................ 186
Online Copy................................................................................................................................ 186
Creating A Virtual Disk Copy For An MSCS Shared Disk..................................................................187
Virtual Disk Read/Write Permissions.................................................................................................187
Virtual Disk Copy Restrictions...........................................................................................................187
Creating A Virtual Disk Copy............................................................................................................ 188
Setting Read/Write Permissions On Target Virtual Disk............................................................ 188
Before You Begin........................................................................................................................ 189
Virtual Disk Copy And Modification Operations........................................................................ 189
Create Copy Wizard....................................................................................................................189
Failed Virtual Disk Copy.............................................................................................................. 189
Preferred RAID Controller Module Ownership................................................................................189
Failed RAID Controller Module.........................................................................................................190
Copy Manager...................................................................................................................................190
Copying The Virtual Disk.................................................................................................................. 190
Storage Array Performance During Virtual Disk Copy..................................................................... 191
Setting Copy Priority..........................................................................................................................191
Stopping A Virtual Disk Copy............................................................................................................192
Recopying A Virtual Disk...................................................................................................................192
Preparing Host Servers To Recopy A Virtual Disk...................................................................... 192
Recopying The Virtual Disk......................................................................................................... 193
Removing Copy Pairs........................................................................................................................194
13 Device Mapper Multipath For Linux...............................................................195
Overview............................................................................................................................................195
Using DM Multipathing Devices........................................................................................................195
Prerequisites................................................................................................................................ 196
Device Mapper Configuration Steps................................................................................................ 196
Scan For Newly Added Virtual Disks........................................................................................... 197
Display The Multipath Device Topology Using The Multipath Command................................197
Create A New fdisk Partition On A Multipath Device Node...................................................... 198
Add A New Partition To Device Mapper.....................................................................................198
Create A File System On A Device Mapper Partition................................................................. 198
Mount A Device Mapper Partition.............................................................................................. 199
Ready For Use..............................................................................................................................199
Linux Host Server Reboot Best Practices.........................................................................................199
Important Information About Special Partitions..............................................................................199
Limitations And Known Issues......................................................................................................... 200
Troubleshooting................................................................................................................................201
14 Configuring Asymmetric Logical Unit Access............................................ 203
ALUA Performance Considerations................................................................................................. 203
Automatic Transfer Of Ownership...................................................................................................203
Native ALUA Support On Microsoft Windows And Linux................................................................203
Enabling ALUA On VMware ESXi......................................................................................................204
Manually Adding SATP Rule In ESXi 5.x......................................................................................204
Verifying ALUA On VMware ESXi......................................................................................................204
Verifying If Host Server Is Using ALUA For MD Storage Array........................................................ 204
Setting Round-Robin Load Balancing Policy On ESXi-Based Storage Arrays................................205
15 Premium Feature—Remote Replication.......................................................207
About Asynchronous Remote Replication.......................................................................................207
Remote Replicated Pairs And Replication Repositories.................................................................. 207
Types Of Remote Replication.......................................................................................................... 208
Differences Between Remote Replication Features..................................................................208
Upgrading To Asynchronous Remote Replication From Remote Replication (Legacy)......... 208
Remote Replication Requirements And Restrictions......................................................................209
Restrictions On Using Remote Replication............................................................................... 209
Setting Up Remote Replication........................................................................................................209
Activating Remote Replication Premium Features..........................................................................209
Deactivating Remote Replication.....................................................................................................210
Remote Replication Groups..............................................................................................................211
Purpose Of A Remote Replication Group...................................................................................211
Remote Replication Group Requirements And Guidelines........................................................211
Creating A Remote Replication Group....................................................................................... 211
Replicated Pairs................................................................................................................................. 212
Guidelines for Choosing Virtual Disks in a Replicated Pair........................................................212
Guidelines For Choosing Virtual Disks In A Replicated Pair.......................................................212
Creating Replicated Pairs............................................................................................................ 213
Removing A Replicated Pair From A Remote Replication Group..............................................214
16 Management Firmware Downloads...............................................................215
Downloading RAID Controller And NVSRAM Packages.................................................................. 215
Downloading Both RAID Controller And NVSRAM Firmware..........................................................215
Downloading Only NVSRAM Firmware............................................................................................ 217
Downloading Physical Disk Firmware.............................................................................................. 218
Downloading MD3060e Series Expansion Module EMM Firmware............................................... 219
Self-Monitoring Analysis And Reporting Technology (SMART)...................................................... 220
Media Errors And Unreadable Sectors.............................................................................................220
17 Firmware Inventory............................................................................................223
Viewing The Firmware Inventory......................................................................................................223
18 System Interfaces............................................................................................... 225
Virtual Disk Service............................................................................................................................225
Volume Shadow-Copy Service........................................................................................................ 225
19 Storage Array Software..................................................................................... 227
Start-Up Routine............................................................................................................................... 227
Device Health Conditions.................................................................................................................227
Trace Buffers.....................................................................................................................................230
Retrieving Trace Buffers............................................................................................................. 230
Collecting Physical Disk Data........................................................................................................... 231
Creating A Support Data Collection Schedule...........................................................................231
Suspending Or Resuming A Support Data Collection Schedule...............................................231
Removing A Support Data Collection Schedule........................................................................232
Event Log...........................................................................................................................................232
Viewing The Event Log............................................................................................................... 233
Recovery Guru.................................................................................................................................. 233
Storage Array Profile......................................................................................................................... 233
Viewing The Physical Associations...................................................................................................235
Recovering From An Unresponsive Storage Array Condition.........................................................235
Locating A Physical Disk................................................................................................................... 237
Locating An Expansion Enclosure.................................................................................................... 237
Capturing The State Information..................................................................................................... 238
SMrepassist Utility............................................................................................................................. 238
Unidentified Devices.........................................................................................................................239
Recovering From An Unidentified Storage Array.............................................................................239
Starting Or Restarting The Host Context Agent Software.............................................................. 240
Starting The SMagent Software In Windows............................................................................. 240
Starting The SMagent Software In Linux.................................................................................... 241
20 Getting Help........................................................................................................243
Contacting Dell.................................................................................................................................243
14

Introduction

CAUTION: See the Safety, Environmental, and Regulatory Information document for important safety information before following any procedures listed in this document.
The following MD Series systems are supported by the latest version of Dell PowerVault Modular Disk Manager (MDSM):
2U MD Series systems:
– Dell PowerVault MD 3400/3420
– Dell PowerVault MD 3800i/3820i
– Dell PowerVault MD 3800f/3820f
4U (dense) MD Series systems:
– Dell PowerVault MD 3460
– Dell PowerVault MD 3860i
– Dell PowerVault MD 3860f
NOTE: Your Dell MD Series storage arrays supports two expansion enclosures (180 physical disks) after you install the Additional Physical Disk Support Premium Feature Key. To order the
Additional Physical Disk Support Premium Feature Key, contact Dell Support.
1

Dell PowerVault Modular Disk Storage Manager

Dell PowerVault Modular Disk Storage Manager (MD Storage Manager) is a graphical user interface (GUI) application used to configure and manage one or more MD Series storage arrays. The MD Storage Manager software is located on the MD Series resource DVD.

User Interface

The Storage Manager screen is divided into two primary windows:
Enterprise Management Window (EMW) — The EMW provides high-level management of multiple
storage arrays. You can launch the Array Management Windows for the storage arrays from the EMW.
Array Management Window (AMW) — The AMW provides management functions for a single storage
array.
The EMW and the AMW consist of the following:
The title bar at the top of the window — Shows the name of the application.
The menu bar, beneath the title bar — You can select menu options from the menu bar to perform
tasks on a storage array.
The toolbar, beneath the menu bar — You can select options in the toolbar to perform tasks on a
storage array.
15
NOTE: The toolbar is available only in the EMW.
The tabs, beneath the toolbar — Tabs are used to group the tasks that you can perform on a storage
array.
The status bar, beneath the tabs — The status bar shows status messages and status icons related to
the storage array.
NOTE: By default, the toolbar and status bar are not displayed. To view the toolbar or the status bar, select ViewToolbar or ViewStatus Bar.

Enterprise Management Window

The EMW provides high-level management of storage arrays. When you start the MD Storage Manager, the EMW is displayed. The EMW has the:
Devices tab — Provides information about discovered storage arrays.
Setup tab — Presents the initial setup tasks that guide you through adding storage arrays and
configuring alerts.
The Devices tab has a Tree view on the left side of the window that shows discovered storage arrays, unidentified storage arrays, and the status conditions for the storage arrays. Discovered storage arrays are managed by the MD Storage Manager. Unidentified storage arrays are available to the MD Storage Manager but not configured for management. The right side of the Devices tab has a Table view that shows detailed information for the selected storage array.
In the EMW, you can:
Discover hosts and managed storage arrays on the local sub-network.
Manually add and remove hosts and storage arrays.
Blink or locate the storage arrays.
Name or rename discovered storage arrays.
Add comments for a storage array in the Table view.
Schedule or automatically save a copy of the support data when the client monitor process detects an
event.
Store your EMW view preferences and configuration data in local configuration files. The next time
you open the EMW, data from the local configuration files is used to show customized view and
preferences.
Monitor the status of managed storage arrays and indicate status using appropriate icons.
Add or remove management connections.
Configure alert notifications for all selected storage arrays through e-mail or SNMP traps.
Report critical events to the configured alert destinations.
Launch the AMW for a selected storage array.
Run a script to perform batch management tasks on specific storage arrays.
Import the operating system theme settings into the MD Storage Manager.
Upgrade firmware on multiple storage arrays concurrently.
Obtain information about the firmware inventory including the version of the RAID controller
modules, physical disks, and the enclosure management modules (EMMs) in the storage array.
16

Inheriting The System Settings

Use the Inherit System Settings option to import the operating system theme settings into the MD Storage Manager. Importing system theme settings affects the font type, font size, color, and contrast in the MD Storage Manager.
1. From the EMW, open the Inherit System Settings window in one of these ways:
– Select ToolsInherit System Settings. – Select the Setup tab, and under Accessibility, click Inherit System Settings.
2. Select Inherit system settings for color and font.
3. Click OK.

Array Management Window

You can launch the AMW from the EMW. The AMW provides management functions for a single storage array. You can have multiple AMWs open simultaneously to manage different storage arrays.
In the AMW, you can:
Select storage array options — For example, renaming a storage array, changing a password, or
enabling a background media scan.
Configure virtual disks and disk pools from the storage array capacity, define hosts and host groups,
and grant host or host group access to sets of virtual disks called storage partitions.
Monitor the health of storage array components and report detailed status using applicable icons.
Perform recovery procedures for a failed logical component or a failed hardware component.
View the Event Log for a storage array.
View profile information about hardware components, such as RAID controller modules and physical
disks.
Manage RAID controller modules — For example, changing ownership of virtual disks or placing a
RAID controller module online or offline.
Manage physical disks — For example, assignment of hot spares and locating the physical disk.
Monitor storage array performance.
To launch the AMW:
1. In the EMW, on the Devices tab, right-click on the relevant storage array.
The context menu for the selected storage is displayed.
2. In the context menu, select Manage Storage Array.
The AMW for the selected storage array is displayed.
NOTE: You can also launch the AMW by:
– Double-clicking on a storage array displayed in the Devices tab of the EMW. – Selecting a storage array displayed in the Devices tab of the EMW, and then selecting Tools
Manage Storage Array.
The AMW has the following tabs:
Summary tab — You can view the following information about the storage array:
– Status
17
– Hardware
– Storage and copy services
– Hosts and mappings
– Information on storage capacity
– Premium features
Performance tab — You can track a storage array’s key performance data and identify performance
bottlenecks in your system. You can monitor the system performance in the following ways:
– Real-time graphical
– Real-time textual
– Background (historical)
Storage & Copy Services tab — You can view and manage the organization of the storage array by
virtual disks, disk groups, free capacity nodes, and any unconfigured capacity for the storage array.
Host Mappings tab — You can define the hosts, host groups, and host ports. You can change the
mappings to grant virtual disk access to host groups and hosts and create storage partitions.
Hardware tab — You can view and manage the physical components of the storage array.
Setup tab — Shows a list of initial setup tasks for the storage array.

Dell PowerVault Modular Disk Configuration Utility

NOTE: Dell PowerVault Modular Disk Configuration Utility (MDCU) is supported only on MD Series storage arrays that use the iSCSI protocol.
MDCU is an iSCSI Configuration Wizard that can be used in conjunction with MD Storage Manager to simplify the configuration of iSCSI connections. The MDCU software is available on the MD Series resource media.

Other Information You May Need

WARNING: See the safety and regulatory information that shipped with your system. Warranty information may be included within this document or as a separate document.
NOTE: All the documents, unless specified otherwise, are available at dell.com/support/manuals.
The Getting Started Guide provides an overview of setting up and cabling your storage array.
The Deployment Guide provides installation and configuration instructions for both software and
hardware.
The Owner’s Manual provides information about system features and describes how to troubleshoot
the system and install or replace system components.
The CLI Guide provides information about using the command line interface (CLI).
The MD Series resource media contains all system management tools.
The Dell PowerVault MD Series Support Matrix provides information on supported software and
hardware for MD systems.
Information Updates or readme files are included to provide last-minute updates to the enclosure or
documentation or advanced technical reference material intended for experienced users or
technicians.
For video resources on PowerVault MD storage arrays, go to dell.com/techcenter.
For the full name of an abbreviation or acronym used in this document, see the Glossary at dell.com/
support/manuals.
18
NOTE: Always check for updates on dell.com/support/manuals and read the updates first because they often supersede information in other documents.
19
20
2

About Your MD Series Storage Array

This chapter describes the storage array concepts, which help in configuring and operating the Dell MD Series storage arrays.

Physical Disks, Virtual Disks, And Disk Groups

Physical disks in your storage array provide the physical storage capacity for your data. Before you can begin writing data to the storage array, you must configure the physical storage capacity into logical components, called disk groups and virtual disks.
A disk group is a set of physical disks upon which multiple virtual disks are created. The maximum number of physical disks supported in a disk group is:
96 disks for RAID 0, RAID 1, and RAID 10
30 disks for RAID 5 and RAID 6
You can create disk groups from unconfigured capacity on your storage array. A virtual disk is a partition in a disk group that is made up of contiguous data segments of the physical
disks in the disk group. A virtual disk consists of data segments from all physical disks in the disk group. All virtual disks in a disk group support the same RAID level. The storage array supports up to 255 virtual
disks (minimum size of 10 MB each) that can be assigned to host servers. Each virtual disk is assigned a Logical Unit Number (LUN) that is recognized by the host operating system.
Virtual disks and disk groups are set up according to how you plan to organize your data. For example, you can have one virtual disk for inventory, a second virtual disk for financial and tax information, and so on.

Physical Disks

Only Dell supported physical disks are supported in the storage array. If the storage array detects unsupported physical disks, it marks the disk as unsupported and the physical disk becomes unavailable for all operations.
For the list of supported physical disks, see the Support Matrix at dell.com/support/manuals.

Physical Disk States

The following describes the various states of the physical disk, which are recognized by the storage array and reported in the MD Storage Manager.
Status Mode Description
Optimal Assigned The physical disk in the indicated slot is
configured as part of a disk group.
Optimal Unassigned The physical disk in the indicated slot is unused
and available to be configured.
21
Status Mode Description
Optimal Hot Spare Standby The physical disk in the indicated slot is
configured as a hot spare.
Optimal Hot Spare in use The physical disk in the indicated slot is in use as a
hot spare within a disk group.
Failed Assigned, Unassigned, Hot
Spare in use, or Hot Spare Standby
Replaced Assigned The physical disk in the indicated slot has been
Pending Failure Assigned, Unassigned, Hot
Spare in use, or Hot Spare Standby
Offline Not applicable The physical disk has either been spun down or
Identify Assigned, Unassigned, Hot
Spare in use, or Hot Spare Standby
The physical disk in the indicated slot has failed because of an unrecoverable error, an incorrect drive type or drive size, or by its operational state being set to failed.
replaced and is ready to be, or is actively being, configured into a disk group.
A Self-Monitoring Analysis and Reporting Technology (SMART) error has been detected on the physical disk in the indicated slot.
had a rebuild aborted by user request.
The physical disk is being identified.

Virtual Disks And Disk Groups

When configuring a storage array, you must:
Organize the physical disks into disk groups.
Create virtual disks within these disk groups.
Provide host server access.
Create mappings to associate the virtual disks with the host servers.
NOTE: Host server access must be created before mapping virtual disks.
Disk groups are always created in the unconfigured capacity of a storage array. Unconfigured capacity is the available physical disk space not already assigned in the storage array.
Virtual disks are created within the free capacity of a disk group. Free capacity is the space in a disk group that has not been assigned to a virtual disk.

Virtual Disk States

The following table describes the various states of the virtual disk, recognized by the storage array.
Table 1. RAID Controller Virtual Disk States
State Description
Optimal The virtual disk contains physical disks that are online.
Degraded The virtual disk with a redundant RAID level contains
an inaccessible physical disk. The system can still
22
State Description
function properly, but performance may be affected and additional disk failures may result in data loss.
Offline A virtual disk with one or more member disks in an
inaccessible (failed, missing, or offline) state. Data on the virtual disk is no longer accessible.
Force online The storage array forces a virtual disk that is in an
Offline state to an Optimal state. If all the member physical disks are not available, the storage array forces the virtual disk to a Degraded state. The storage array can force a virtual disk to an Online state only when a sufficient number of physical disks are available to support the virtual disk.

Disk Pools

Disk pooling allows you to distribute data from each virtual disk randomly across a set of physical disks. Although there is no limit on the maximum number of physical disks that can comprise a disk pool, each disk pool must have a minimum of 11 physical disks. Additionally, the disk pool cannot contain more physical disks than the maximum limit for each storage array.

Thin Virtual Disks

Thin virtual disks can be created from an existing disk pool. Creating thin virtual disks allows you to set up a large virtual space, but only use the actual physical space as you need it.

RAID Levels

RAID levels determine the way in which data is written to physical disks. Different RAID levels provide different levels of accessibility, redundancy, and capacity.
Using multiple physical disks has the following advantages over using a single physical disk:
Placing data on multiple physical disks (striping) allows input/output (I/O) operations to occur
simultaneously and improve performance.
Storing redundant data on multiple physical disks using mirroring or parity supports reconstruction of
lost data if an error occurs, even if that error is the failure of a physical disk.
Each RAID level provides different performance and protection. You must select a RAID level based on the type of application, access, fault tolerance, and data you are storing.
The storage array supports RAID levels 0, 1, 5, 6, and 10. The maximum and minimum number of physical disks that can be used in a disk group depends on the RAID level:
120 (180 with PFK) for RAID 0, 1, and 10
30 for RAID 5 and 6

Maximum Physical Disk Support Limitations

Although PowerVault MD Series storage arrays with premium feature kit can support up to 180 physical disks, RAID 0 and RAID 10 configurations with more than 120 physical disks are not supported. MD
23
Storage Manager does not enforce 120-physical disk limit when you setup a RAID 0 or RAID 10 configuration. Exceeding the 120-physical disk limit may cause your storage array to be unstable.

RAID Level Usage

To ensure best performance, you must select an optimal RAID level when you create a system physical disk. The optimal RAID level for your disk array depends on:
Number of physical disks in the disk array
Capacity of the physical disks in the disk array
Need for redundant access to the data (fault tolerance)
Disk performance requirements

RAID 0

CAUTION: Do not attempt to create virtual disk groups exceeding 120 physical disks in a RAID 0 configuration even if premium feature is activated on your storage array. Exceeding the 120­physical disk limit may cause your storage array to be unstable.
RAID 0 uses disk striping to provide high data throughput, especially for large files in an environment that requires no data redundancy. RAID 0 breaks the data down into segments and writes each segment to a separate physical disk. I/O performance is greatly improved by spreading the I/O load across many physical disks. Although it offers the best performance of any RAID level, RAID 0 lacks data redundancy. Choose this option only for non-critical data, because failure of one physical disk results in the loss of all data. Examples of RAID 0 applications include video editing, image editing, prepress applications, or any application that requires high bandwidth.

RAID 1

RAID 1 uses disk mirroring so that data written to one physical disk is simultaneously written to another physical disk. RAID 1 offers fast performance and the best data availability, but also the highest disk overhead. RAID 1 is recommended for small databases or other applications that do not require large capacity. For example, accounting, payroll, or financial applications. RAID 1 provides full data redundancy.

RAID 5

RAID 5 uses parity and striping data across all physical disks (distributed parity) to provide high data throughput and data redundancy, especially for small random access. RAID 5 is a versatile RAID level and is suited for multi-user environments where typical I/O size is small and there is a high proportion of read activity such as file, application, database, web, e-mail, news, and intranet servers.

RAID 6

RAID 6 is similar to RAID 5 but provides an additional parity disk for better redundancy. RAID 6 is the most versatile RAID level and is suited for multi-user environments where typical I/O size is small and there is a high proportion of read activity. RAID 6 is recommended when large size physical disks are used or large number of physical disks are used in a disk group.
24

RAID 10

CAUTION: Do not attempt to create virtual disk groups exceeding 120 physical disks in a RAID 10 configuration even if premium feature is activated on your storage array. Exceeding the 120­physical disk limit may cause your storage array to be unstable.
RAID 10, a combination of RAID 1 and RAID 0, uses disk striping across mirrored disks. It provides high data throughput and complete data redundancy. Utilizing an even number of physical disks (four or more) creates a RAID level 10 disk group and/or virtual disk. Because RAID levels 1 and 10 use disk mirroring, half of the capacity of the physical disks is utilized for mirroring. This leaves the remaining half of the physical disk capacity for actual storage. RAID 10 is automatically used when a RAID level of 1 is chosen with four or more physical disks. RAID 10 works well for medium-sized databases or any environment that requires high performance and fault tolerance and moderate-to-medium capacity.

Segment Size

Disk striping enables data to be written across multiple physical disks. Disk striping enhances performance because striped disks are accessed simultaneously.
The segment size or stripe element size specifies the size of data in a stripe written to a single disk. The storage array supports stripe element sizes of 8 KB, 16 KB, 32 KB, 64 KB, 128 KB, and 256 KB. The default stripe element size is 128 KB.
Stripe width, or depth, refers to the number of disks involved in an array where striping is implemented. For example, a four-disk group with disk striping has a stripe width of four.
NOTE: Although disk striping delivers excellent performance, striping alone does not provide data redundancy.

Virtual Disk Operations

Virtual Disk Initialization

Every virtual disk must be initialized. Initialization can be done in the foreground or the background. A maximum of four virtual disks can be initialized concurrently on each RAID controller module.
Background initialization — The storage array executes a background initialization when the virtual
disk is created to establish parity, while allowing full host server access to the virtual disks. Background
initialization does not run on RAID 0 virtual disks. The background initialization rate is controlled by
MD Storage Manager. To change the rate of background initialization, you must stop any existing
background initialization. The rate change is implemented when the background initialization restarts
automatically.
Foreground Initialization — The storage array executes a background initialization when the virtual
disk is created to establish parity, while allowing full host server access to the virtual disks. Background
initialization does not run on RAID 0 virtual disks. The background initialization rate is controlled by
MD Storage Manager. To change the rate of background initialization, you must stop any existing
background initialization. The rate change is implemented when the background initialization restarts
automatically.

Consistency Check

A consistency check verifies the correctness of data in a redundant array (RAID levels 1, 5, 6, and 10). For example, in a system with parity, checking consistency involves computing the data on one physical disk and comparing the results to the contents of the parity physical disk.
25
A consistency check is similar to a background initialization. The difference is that background initialization cannot be started or stopped manually, while consistency check can.
NOTE: It is recommended that you run data consistency checks on a redundant array at least once a month. This allows detection and automatic replacement of unreadable sectors. Finding an unreadable sector during a rebuild of a failed physical disk is a serious problem, because the system does not have the redundancy to recover the data.

Media Verification

Another background task performed by the storage array is media verification of all configured physical disks in a disk group. The storage array uses the Read operation to perform verification on the space configured in virtual disks and the space reserved for the metadata.

Cycle Time

The media verification operation runs only on selected disk groups, independent of other disk groups. Cycle time is the time taken to complete verification of the metadata region of the disk group and all virtual disks in the disk group for which media verification is configured. The next cycle for a disk group starts automatically when the current cycle completes. You can set the cycle time for a media verification operation between 1 and 30 days. The storage controller throttles the media verification I/O accesses to disks based on the cycle time.
The storage array tracks the cycle for each disk group independent of other disk groups on the controller and creates a checkpoint. If the media verification operation on a disk group is preempted or blocked by another operation on the disk group, the storage array resumes after the current cycle. If the media verification process on a disk group is stopped due to a RAID controller module restart, the storage array resumes the process from the last checkpoint.

Virtual Disk Operations Limit

The maximum number of active, concurrent virtual disk processes per RAID controller module installed in the storage array is four. This limit is applied to the following virtual disk processes:
Background initialization
Foreground initialization
Consistency check
Rebuild
Copy back
If a redundant RAID controller module fails with existing virtual disk processes, the processes on the failed controller are transferred to the peer controller. A transferred process is placed in a suspended state if there are four active processes on the peer controller. The suspended processes are resumed on the peer controller when the number of active processes falls below four.

Disk Group Operations

RAID Level Migration

You can migrate from one RAID level to another depending on your requirements. For example, fault­tolerant characteristics can be added to a stripe set (RAID 0) by converting it to a RAID 5 set. The MD Storage Manager provides information about RAID attributes to assist you in selecting the appropriate
26
RAID level. You can perform a RAID level migration while the system is still running and without rebooting, which maintains data availability.

Segment Size Migration

Segment size refers to the amount of data (in kilobytes) that the storage array writes on a physical disk in a virtual disk before writing data on the next physical disk. Valid values for the segment size are 8 KB, 16 KB, 32 KB, 64 KB, 128 KB, and 256 KB.
Dynamic segment size migration enables the segment size of a given virtual disk to be changed. A default segment size is set when the virtual disk is created, based on such factors as the RAID level and expected usage. You can change the default value if segment size usage does not match your needs.
When considering a segment size change, two scenarios illustrate different approaches to the limitations:
If I/O activity stretches beyond the segment size, you can increase it to reduce the number of disks
required for a single I/O. Using a single physical disk for a single request frees disks to service other
requests, especially when you have multiple users accessing a database or storage environment.
If you use the virtual disk in a single-user, large I/O environment (such as for multimedia application
storage), performance can be optimized when a single I/O request is serviced with a single data stripe
(the segment size multiplied by the number of physical disks in the disk group used for data storage).
In this case, multiple disks are used for the same request, but each disk is only accessed once.

Virtual Disk Capacity Expansion

When you configure a virtual disk, you select a capacity based on the amount of data you expect to store. However, you may need to increase the virtual disk capacity for a standard virtual disk by adding free capacity to the disk group. This creates more unused space for new virtual disks or to expand existing virtual disks.

Disk Group Expansion

Because the storage array supports hot-swappable physical disks, you can add two physical disks at a time for each disk group while the storage array remains online. Data remains accessible on virtual disk groups, virtual disks, and physical disks throughout the operation. The data and increased unused free space are dynamically redistributed across the disk group. RAID characteristics are also reapplied to the disk group as a whole.

Disk Group Defragmentation

Defragmenting consolidates the free capacity in the disk group into one contiguous area. Defragmentation does not change the way in which the data is stored on the virtual disks.

Disk Group Operations Limit

The maximum number of active, concurrent disk group processes per installed RAID controller module is one. This limit is applied to the following disk group processes:
Virtual disk RAID level migration
Segment size migration
Virtual disk capacity expansion
Disk group expansion
Disk group defragmentation
27
If a redundant RAID controller module fails with an existing disk group process, the process on the failed controller is transferred to the peer controller. A transferred process is placed in a suspended state if there is an active disk group process on the peer controller. The suspended processes are resumed when the active process on the peer controller completes or is stopped.
NOTE: If you try to start a disk group process on a controller that does not have an existing active process, the start attempt fails if the first virtual disk in the disk group is owned by the other controller and there is an active process on the other controller.

RAID Background Operations Priority

The storage array supports a common configurable priority for the following RAID operations:
Background initialization
Rebuild
Copy back
Virtual disk capacity expansion
Raid level migration
Segment size migration
Disk group expansion
Disk group defragmentation
The priority of each of these operations can be changed to address performance requirements of the environment in which the operations are to be executed.
NOTE: Setting a high priority level impacts storage array performance. It is not advisable to set priority levels at the maximum level. Priority must also be assessed in terms of impact to host server access and time to complete an operation. For example, the longer a rebuild of a degraded virtual disk takes, the greater the risk for potential secondary disk failure.

Virtual Disk Migration And Disk Roaming

Virtual disk migration is moving a virtual disk or a hot spare from one array to another by detaching the physical disks and re-attaching them to the new array. Disk roaming is moving a physical disk from one slot to another on the same array.

Disk Migration

You can move virtual disks from one array to another without taking the target array offline. However, the disk group being migrated must be offline prior to performing the disk migration. If the disk group is not offline prior to migration, the source array holding the physical and virtual disks within the disk group marks them as missing. However, the disk groups themselves migrate to the target array.
An array can import a virtual disk only if it is in an optimal state. You can move virtual disks that are part of a disk group only if all members of the disk group are being migrated. The virtual disks automatically become available after the target array has finished importing all the disks in the disk group.
When you migrate a physical disk or a disk group from:
One MD storage array to another MD storage array of the same type (for example, from an MD3460
storage array to another MD3460 storage array), the MD storage array you migrate to, recognizes any
data structures and/or metadata you had in place on the migrating MD storage array.
28
Any storage array different from the MD storage array you migrate to (for example, from an MD3460
storage array to an MD3860i storage array), the receiving storage array (MD3860i storage array in the
example) does not recognize the migrating metadata and that data is lost. In this case, the receiving
storage array initializes the physical disks and marks them as unconfigured capacity.
NOTE: Only disk groups and associated virtual disks with all member physical disks present can be migrated from one storage array to another. It is recommended that you only migrate disk groups that have all their associated member virtual disks in an optimal state.
NOTE: The number of physical disks and virtual disks that a storage array supports limits the scope of the migration.
Use either of the following methods to move disk groups and virtual disks:
Hot virtual disk migration — Disk migration with the destination storage array power turned on.
Cold virtual disk migration — Disk migration with the destination storage array power turned off.
NOTE: To ensure that the migrating disk groups and virtual disks are correctly recognized when the target storage array has an existing physical disk, use hot virtual disk migration.
When attempting virtual disk migration, follow these recommendations:
Moving physical disks to the destination array for migration — When inserting drives into the
destination storage array during hot virtual disk migration, wait for the inserted physical disk to be
displayed in the MD Storage Manager, or wait for 30 seconds (whichever occurs first), before inserting
the next physical disk.
WARNING: Without the interval between drive insertions, the storage array may become unstable and manageability may be temporarily lost.
Migrating virtual disks from multiple storage arrays into a single storage array — When migrating
virtual disks from multiple or different storage arrays into a single destination storage array, move all
of the physical disks from the same storage array as a set into the new destination storage array.
Ensure that all of the physical disks from a storage array are migrated to the destination storage array
before starting migration from the next storage array.
NOTE: If the drive modules are not moved as a set to the destination storage array, the newly relocated disk groups may not be accessible.
Migrating virtual disks to a storage array with no existing physical disks — Turn off the destination
storage array, when migrating disk groups or a complete set of physical disks from a storage array to
another storage array that has no existing physical disks. After the destination storage array has been
turned on and has successfully recognized the newly migrated physical disks, migration operations
can continue.
NOTE: Disk groups from multiple storage arrays must not be migrated at the same time to a storage array that has no existing physical disks. Use cold virtual disk migration for the disk groups from one storage array.
Enabling premium features before migration — Before migrating disk groups and virtual disks, enable
the required premium features on the destination storage array. If a disk group is migrated from a
storage array that has a premium feature enabled and the destination array does not have this feature
enabled, an Out of Compliance error message can be generated.

Disk Roaming

You can move physical disks within an array. The RAID controller module automatically recognizes the relocated physical disks and logically places them in the proper virtual disks that are part of the disk group. Disk roaming is permitted when the RAID controller module is either online or powered off.
NOTE: The disk group must be exported before moving the physical disks.
29

Host Server-To-Virtual Disk Mapping

The host server attached to a storage array accesses various virtual disks on the storage array through its host ports. Specific virtual disk-to-LUN mappings to an individual host server can be defined. In addition, the host server can be part of a host group that shares access to one or more virtual disks. You can manually configure a host server-to-virtual disk mapping. When you configure host server-to-virtual disk mapping, consider these guidelines:
You can define one host server-to-virtual disk mapping for each virtual disk in the storage array.
Host server-to-virtual disk mappings are shared between RAID controller modules in the storage
array.
A unique LUN must be used by a host group or host server to access a virtual disk.
Not every operating system has the same number of LUNs available for use.

Host Types

A host server is a server that accesses a storage array. Host servers are mapped to the virtual disks and use one or more iSCSI initiator ports. Host servers have the following attributes:
Host name — A name that uniquely identifies the host server.
Host group (used in Cluster solutions only) — Two or more host servers associated together to share
access to the same virtual disks.
NOTE: This host group is a logical entity you can create in the MD Storage Manager. All host servers in a host group must be running the same operating system.
Host type — The operating system running on the host server.

Advanced Features

The RAID enclosure supports several advanced features:
Virtual Disk Snapshots.
Virtual Disk Copy.
NOTE: The premium features listed above must be activated separately. If you have purchased these features, an activation card is supplied that contains instructions for enabling this functionality.

Types Of Snapshot Functionality Supported

The following types of virtual disk snapshot premium features are supported on the MD storage array:
Snapshot Virtual Disks using multiple point-in-time (PiT) groups — This feature also supports snapshot
groups, snapshot images, and consistency groups.
Snapshot Virtual Disks (Legacy) using a separate repository for each snapshot
For more information, see Premium Feature---Snapshot Virtual Disk and Premium Feature—Snapshot
Virtual Disks (Legacy).
Snapshot Virtual Disks, Snapshot Images, And Snapshot Groups
A snapshot image is a logical image of the content of an associated base virtual disk created at a specific point-in-time. This type of image is not directly readable or writable to a host since the snapshot image is used to save data from the base virtual disk only. To allow the host to access a copy of the data in a snapshot image, you must create a snapshot virtual disk. This snapshot virtual disk contains its own
30
Loading...
+ 213 hidden pages