Dell PowerVault MD 34XX/38XX Series Storage Arrays
Administrator's Guide
Notes, Cautions, and Warnings
NOTE: A NOTE indicates important information that helps you make better use of your computer.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2014 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. Dell™ and the Dell logo are trademarks of Dell Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies.
2014 - 02
Rev. A01
Contents |
|
1 Introduction.............................................................................................................. |
15 |
Dell PowerVault Modular Disk Storage Manager .............................................................................. |
15 |
User Interface....................................................................................................................................... |
15 |
Enterprise Management Window....................................................................................................... |
16 |
Inheriting The System Settings...................................................................................................... |
17 |
Array Management Window................................................................................................................ |
17 |
Dell PowerVault Modular Disk Configuration Utility.......................................................................... |
18 |
Other Information You May Need...................................................................................................... |
18 |
2 About Your MD Series Storage Array................................................................. |
21 |
Physical Disks, Virtual Disks, And Disk Groups................................................................................... |
21 |
Physical Disks................................................................................................................................. |
21 |
Physical Disk States........................................................................................................................ |
21 |
Virtual Disks And Disk Groups....................................................................................................... |
22 |
Virtual Disk States.......................................................................................................................... |
22 |
Disk Pools............................................................................................................................................ |
23 |
Thin Virtual Disks................................................................................................................................. |
23 |
RAID Levels.......................................................................................................................................... |
23 |
Maximum Physical Disk Support Limitations............................................................................... |
23 |
RAID Level Usage.......................................................................................................................... |
24 |
RAID 0............................................................................................................................................ |
24 |
RAID 1............................................................................................................................................. |
24 |
RAID 5............................................................................................................................................ |
24 |
RAID 6............................................................................................................................................ |
24 |
RAID 10.......................................................................................................................................... |
25 |
Segment Size....................................................................................................................................... |
25 |
Virtual Disk Operations....................................................................................................................... |
25 |
Virtual Disk Initialization................................................................................................................ |
25 |
Consistency Check........................................................................................................................ |
25 |
Media Verification.......................................................................................................................... |
26 |
Cycle Time..................................................................................................................................... |
26 |
Virtual Disk Operations Limit........................................................................................................ |
26 |
Disk Group Operations....................................................................................................................... |
26 |
RAID Level Migration..................................................................................................................... |
26 |
Segment Size Migration................................................................................................................. |
27 |
Virtual Disk Capacity Expansion.................................................................................................... |
27 |
Disk Group Expansion................................................................................................................... |
27 |
Disk Group Defragmentation........................................................................................................ |
27 |
Disk Group Operations Limit......................................................................................................... |
27 |
RAID Background Operations Priority................................................................................................ |
28 |
Virtual Disk Migration And Disk Roaming........................................................................................... |
28 |
Disk Migration................................................................................................................................ |
28 |
Disk Roaming................................................................................................................................. |
29 |
Host Server-To-Virtual Disk Mapping.......................................................................................... |
30 |
Host Types..................................................................................................................................... |
30 |
Advanced Features.............................................................................................................................. |
30 |
Types Of Snapshot Functionality Supported............................................................................... |
30 |
Snapshot Virtual Disks (Legacy)..................................................................................................... |
31 |
Snapshot (Legacy) Repository Virtual Disk................................................................................... |
31 |
Virtual Disk Copy............................................................................................................................ |
31 |
Virtual Disk Recovery..................................................................................................................... |
32 |
Using Snapshot And Virtual Disk Copy Together......................................................................... |
32 |
Multi-Path Software............................................................................................................................ |
33 |
Preferred And Alternate Controllers And Paths............................................................................ |
33 |
Virtual Disk Ownership.................................................................................................................. |
33 |
Load Balancing.................................................................................................................................... |
34 |
Monitoring System Performance....................................................................................................... |
34 |
Interpreting Performance Monitor Data....................................................................................... |
35 |
Viewing Real-time Graphical Performance Monitor Data........................................................... |
38 |
Customizing the Performance Monitor Dashboard.................................................................... |
38 |
Specifying Performance Metrics................................................................................................... |
39 |
Viewing Real-time Textual Performance Monitor....................................................................... |
40 |
Saving Real-time Textual Performance Data............................................................................... |
41 |
Starting and Stopping Background Performance Monitor.......................................................... |
41 |
Viewing Information about the Current Background Performance Monitor Session................ |
42 |
Viewing Current Background Performance Monitor Data.......................................................... |
42 |
Saving the Current Background Performance Monitor Data...................................................... |
43 |
Viewing Saved Background Performance Monitor Data............................................................. |
43 |
What are invalid objects in the Performance Monitor?............................................................... |
44 |
3 Discovering And Managing Your Storage Array............................................. |
47 |
Out-Of-Band Management................................................................................................................ |
47 |
In-Band Management......................................................................................................................... |
47 |
Access Virtual Disk........................................................................................................................ |
48 |
Storage Arrays..................................................................................................................................... |
48 |
Automatic Discovery Of Storage Arrays....................................................................................... |
48 |
Manual Addition Of A Storage Array............................................................................................. |
48 |
Setting Up Your Storage Array............................................................................................................ |
49 |
Locating Storage Arrays................................................................................................................ |
50 |
Naming Or Renaming Storage Arrays.......................................................................................... |
50 |
Setting A Password........................................................................................................................ |
51 |
Adding Or Editing A Comment To An Existing Storage Array...................................................... |
51 |
Removing Storage Arrays.............................................................................................................. |
52 |
Enabling Premium Features.......................................................................................................... |
52 |
Displaying Failover Alert................................................................................................................ |
52 |
Changing The Cache Settings On The Storage Array.................................................................. |
53 |
Changing Expansion Enclosure ID Numbers............................................................................... |
53 |
Changing The Enclosure Order.................................................................................................... |
53 |
Configuring Alert Notifications........................................................................................................... |
54 |
Configuring E-mail Alerts.............................................................................................................. |
54 |
Configuring SNMP Alerts............................................................................................................... |
55 |
Battery Settings................................................................................................................................... |
58 |
Changing The Battery Settings..................................................................................................... |
59 |
Setting The Storage Array RAID Controller Module Clocks.............................................................. |
59 |
4 Using iSCSI................................................................................................................ |
61 |
Changing The iSCSI Target Authentication........................................................................................ |
61 |
Entering Mutual Authentication Permissions..................................................................................... |
61 |
Creating CHAP Secrets....................................................................................................................... |
62 |
Initiator CHAP Secret.................................................................................................................... |
62 |
Target CHAP Secret...................................................................................................................... |
62 |
Valid Characters For CHAP Secrets.............................................................................................. |
62 |
Changing The iSCSI Target Identification.......................................................................................... |
63 |
Changing The iSCSI Target Discovery Settings................................................................................. |
63 |
Configuring The iSCSI Host Ports...................................................................................................... |
64 |
Advanced iSCSI Host Port Settings..................................................................................................... |
65 |
Viewing Or Ending An iSCSI Session.................................................................................................. |
65 |
Viewing iSCSI Statistics And Setting Baseline Statistics..................................................................... |
66 |
Edit, Remove, Or Rename Host Topology......................................................................................... |
66 |
5 Event Monitor.......................................................................................................... |
69 |
Enabling Or Disabling The Event Monitor.......................................................................................... |
69 |
Windows........................................................................................................................................ |
69 |
Linux............................................................................................................................................... |
70 |
6 About Your Host...................................................................................................... |
71 |
Configuring Host Access..................................................................................................................... |
71 |
Using The Host Mappings Tab............................................................................................................ |
72 |
Defining A Host.............................................................................................................................. |
72 |
Removing Host Access....................................................................................................................... |
73 |
Managing Host Groups....................................................................................................................... |
73 |
Creating A Host Group........................................................................................................................ |
73 |
Adding A Host To A Host Group................................................................................................... |
74 |
Removing A Host From A Host Group......................................................................................... |
74 |
Moving A Host To A Different Host Group................................................................................... |
74 |
Removing A Host Group............................................................................................................... |
75 |
Host Topology............................................................................................................................... |
75 |
Starting Or Stopping The Host Context Agent............................................................................. |
75 |
I/O Data Path Protection.................................................................................................................... |
76 |
Managing Host Port Identifiers........................................................................................................... |
76 |
7 Disk Groups, Standard Virtual Disks, And Thin Virtual Disks....................... |
79 |
Creating Disk Groups And Virtual Disks............................................................................................. |
79 |
Creating Disk Groups.................................................................................................................... |
80 |
Locating A Disk Group................................................................................................................... |
81 |
Creating Standard Virtual Disks..................................................................................................... |
81 |
Changing The Virtual Disk Modification Priority.......................................................................... |
82 |
Changing The Virtual Disk Cache Settings................................................................................... |
83 |
Changing The Segment Size Of A Virtual Disk............................................................................. |
84 |
Changing The IO Type.................................................................................................................. |
85 |
Thin Virtual Disks................................................................................................................................. |
86 |
Advantages Of Thin Virtual Disks.................................................................................................. |
86 |
Physical Vs Virtual Capacity On A Thin Virtual Disk..................................................................... |
86 |
Thin Virtual Disk Requirements And Limitations.......................................................................... |
87 |
Thin Volume Attributes................................................................................................................. |
87 |
Thin Virtual Disk States.................................................................................................................. |
88 |
Comparison—Types Of Virtual Disks And Copy Services............................................................ |
88 |
Rollback On Thin Virtual Disks...................................................................................................... |
89 |
Initializing A Thin Virtual Disk........................................................................................................ |
89 |
Changing A Thin Virtual Disk To A Standard Virtual Disk............................................................ |
92 |
Choosing An Appropriate Physical Disk Type.................................................................................... |
92 |
Physical Disk Security With Self Encrypting Disk............................................................................... |
92 |
Creating A Security Key................................................................................................................. |
94 |
Changing A Security Key............................................................................................................... |
96 |
Saving A Security Key.................................................................................................................... |
96 |
Validate Security Key..................................................................................................................... |
97 |
Unlocking Secure Physical Disks.................................................................................................. |
97 |
Erasing Secure Physical Disks....................................................................................................... |
97 |
Configuring Hot Spare Physical Disks................................................................................................ |
98 |
Hot Spares And Rebuild................................................................................................................ |
99 |
Global Hot Spares......................................................................................................................... |
99 |
Hot Spare Operation..................................................................................................................... |
99 |
Hot Spare Drive Protection......................................................................................................... |
100 |
Enclosure Loss Protection................................................................................................................ |
100 |
Drawer Loss Protection..................................................................................................................... |
101 |
Host-To-Virtual Disk Mapping.......................................................................................................... |
102 |
Creating Host-To-Virtual Disk Mappings................................................................................... |
102 |
Modifying And Removing Host-To-Virtual Disk Mapping......................................................... |
103 |
Changing Controller Ownership Of The Virtual Disk................................................................ |
104 |
Removing Host-To-Virtual Disk Mapping.................................................................................. |
105 |
Changing The RAID Controller Module Ownership Of A Disk Group...................................... |
105 |
Changing The RAID Level Of A Disk Group............................................................................... |
105 |
Removing A Host-To-Virtual Disk Mapping Using Linux DMMP.............................................. |
106 |
Restricted Mappings.......................................................................................................................... |
107 |
Storage Partitioning.......................................................................................................................... |
108 |
Disk Group And Virtual Disk Expansion............................................................................................ |
109 |
Disk Group Expansion................................................................................................................. |
109 |
Virtual Disk Expansion................................................................................................................. |
109 |
Using Free Capacity.................................................................................................................... |
109 |
Using Unconfigured Capacity..................................................................................................... |
110 |
Disk Group Migration........................................................................................................................ |
110 |
Export Disk Group....................................................................................................................... |
110 |
Import Disk Group........................................................................................................................ |
111 |
Storage Array Media Scan.................................................................................................................. |
112 |
Changing Media Scan Settings.................................................................................................... |
112 |
Suspending The Media Scan....................................................................................................... |
113 |
8 Disk Pools And Disk Pool Virtual Disks............................................................ |
115 |
Difference Between Disk Groups And Disk Pools............................................................................ |
115 |
Disk Pool Restrictions........................................................................................................................ |
115 |
Creating A Disk Pool Manually.......................................................................................................... |
116 |
Automatically Managing The Unconfigured Capacity In Disk Pools............................................... |
117 |
Locating Physical Disks In A Disk Pool............................................................................................. |
118 |
Renaming A Disk Pool....................................................................................................................... |
118 |
Configuring Alert Notifications For A Disk Pool............................................................................... |
119 |
Adding Unassigned Physical Disks To A Disk Pool........................................................................... |
119 |
Configuring The Preservation Capacity Of A Disk Pool.................................................................. |
120 |
Changing The Modification Priority Of A Disk Pool........................................................................ |
120 |
Changing The RAID Controller Module Ownership Of A Disk Pool................................................ |
121 |
Checking Data Consistency.............................................................................................................. |
121 |
Deleting A Disk Pool.......................................................................................................................... |
122 |
Viewing Storage Array Logical Components And Associated Physical Components ................... |
123 |
Secure Disk Pools.............................................................................................................................. |
124 |
Changing Capacity On Existing Thin Virtual Disks........................................................................... |
124 |
Creating A Thin Virtual Disk From A Disk Pool................................................................................. |
125 |
9 Using SSD Cache................................................................................................... |
127 |
How SSD Cache Works..................................................................................................................... |
127 |
Benefits Of SSD Cache...................................................................................................................... |
127 |
Choosing SSD Cache Parameters..................................................................................................... |
127 |
SSD Cache Restrictions..................................................................................................................... |
128 |
Creating An SSD Cache.................................................................................................................... |
128 |
Viewing Physical Components Associated With An SSD Cache..................................................... |
129 |
Locating Physical Disks In An SSD Cache........................................................................................ |
129 |
Adding Physical Disks To An SSD Cache.......................................................................................... |
129 |
Removing Physical Disks From An SSD Cache................................................................................ |
130 |
Suspending Or Resuming SSD Caching........................................................................................... |
130 |
Changing I/O Type In An SSD Cache............................................................................................... |
130 |
Renaming An SSD Cache.................................................................................................................. |
131 |
Deleting An SSD Cache..................................................................................................................... |
131 |
Using The Performance Modeling Tool............................................................................................ |
131 |
10 Premium Feature—Snapshot Virtual Disk.................................................... |
133 |
Snapshot Virtual Disk Vs. Snapshot Virtual Disk (Legacy)................................................................ |
133 |
Snapshot Images And Groups.......................................................................................................... |
133 |
Snapshot Virtual Disk Read/Write Properties................................................................................... |
134 |
Snapshot Groups And Consistency Groups..................................................................................... |
134 |
Snapshot Groups......................................................................................................................... |
134 |
Snapshot Consistency Groups.................................................................................................... |
135 |
Understanding Snapshot Repositories............................................................................................. |
135 |
Consistency Group Repositories................................................................................................ |
135 |
Ranking Repository Candidates.................................................................................................. |
136 |
Using Snapshot Consistency Groups With Remote Replication............................................... |
136 |
Creating Snapshot Images................................................................................................................ |
136 |
Creating A Snapshot Image......................................................................................................... |
137 |
Canceling A Pending Snapshot Image....................................................................................... |
138 |
Deleting A Snapshot Image......................................................................................................... |
138 |
Scheduling Snapshot Images............................................................................................................ |
139 |
Creating A Snapshot Schedule................................................................................................... |
139 |
Editing A Snapshot Schedule...................................................................................................... |
140 |
Performing Snapshot Rollbacks........................................................................................................ |
141 |
Snapshot Rollback Limitations.................................................................................................... |
141 |
Starting A Snapshot Rollback...................................................................................................... |
142 |
Resuming A Snapshot Image Rollback....................................................................................... |
142 |
Canceling A Snapshot Image Rollback....................................................................................... |
143 |
Viewing The Progress Of A Snapshot Rollback.......................................................................... |
143 |
Changing Snapshot Rollback Priority......................................................................................... |
144 |
Creating A Snapshot Group.............................................................................................................. |
144 |
Creating A Consistency Group Repository (Manually).............................................................. |
146 |
Changing Snapshot Group Settings........................................................................................... |
147 |
Renaming A Snapshot Group..................................................................................................... |
148 |
Deleting A Snapshot Group........................................................................................................ |
148 |
Converting A Snapshot Virtual Disk To Read-Write........................................................................ |
148 |
Viewing Associated Physical Components Of An Individual Repository Virtual Disk.................... |
149 |
Creating A Consistency Group......................................................................................................... |
149 |
Creating A Consistency Group Repository (Manually)............................................................... |
151 |
Renaming A Consistency Group................................................................................................. |
152 |
Deleting A Consistency Group.................................................................................................... |
152 |
Changing The Settings Of A Consistency Group....................................................................... |
153 |
Adding A Member Virtual Disk To A Consistency Group........................................................... |
153 |
Removing A Member Virtual Disk From A Consistency Group................................................. |
154 |
Creating A Snapshot Virtual Disk Of A Snapshot Image.................................................................. |
155 |
Snapshot Virtual Disk Limitations................................................................................................ |
155 |
Creating A Snapshot Virtual Disk................................................................................................ |
156 |
Creating A Snapshot Virtual Disk Repository.............................................................................. |
157 |
Changing The Settings Of A Snapshot Virtual Disk.................................................................... |
158 |
Disabling A Snapshot Virtual Disk Or Consistency Group Snapshot Virtual Disk..................... |
158 |
Re-creating A Snapshot Virtual Disk Or Consistency Group Snapshot Virtual Disk................. |
159 |
Renaming A Snapshot Virtual Disk Or Consistency Group Snapshot Virtual Disk................... |
160 |
Deleting A Snapshot Virtual Disk Or Consistency Group Snapshot Virtual Disk....................... |
161 |
Creating A Consistency Group Snapshot Virtual Disk...................................................................... |
161 |
Creating A Consistency Group Snapshot Virtual Disk Repository (Manually)........................... |
163 |
Disabling A Snapshot Virtual Disk Or Consistency Group Snapshot Virtual Disk..................... |
165 |
Re-creating A Snapshot Virtual Disk Or Consistency Group Snapshot Virtual Disk................. |
166 |
Changing The Modification Priority Of An Overall Repository Virtual Disk.............................. |
167 |
Changing The Media Scan Setting Of An Overall Repository Virtual Disk................................ |
167 |
Changing The Pre-read Consistency Check Setting Of An Overall Repository Virtual Disk... |
168 |
Increasing The Capacity Of An Overall Repository................................................................... |
168 |
Decreasing The Capacity Of The Overall Repository................................................................ |
170 |
Performing A Revive Operation................................................................................................... |
171 |
11 Premium Feature—Snapshot Virtual Disks (Legacy).................................. |
173 |
Scheduling A Snapshot Virtual Disk.................................................................................................. |
174 |
Common Reasons For Scheduling A Snapshot Virtual Disk...................................................... |
174 |
Guidelines for Creating Snapshot Schedules............................................................................. |
174 |
Creating A Snapshot Virtual Disk Using The Simple Path................................................................ |
175 |
About The Simple Path................................................................................................................ |
175 |
Preparing Host Servers To Create The Snapshot Using The Simple Path................................. |
175 |
Creating A Snapshot Virtual Disk Using The Advanced Path........................................................... |
177 |
About The Advanced Path........................................................................................................... |
177 |
Preparing Host Servers To Create The Snapshot Using The Advanced Path............................ |
177 |
Creating The Snapshot Using The Advanced Path.................................................................... |
179 |
Specifying Snapshot Virtual Disk Names.......................................................................................... |
180 |
Snapshot Repository Capacity......................................................................................................... |
180 |
Re-Creating Snapshot Virtual Disks.................................................................................................. |
182 |
Disabling A Snapshot Virtual Disk..................................................................................................... |
182 |
Preparing Host Servers To Re-Create A Snapshot Virtual Disk................................................. |
183 |
Re-Creating A Snapshot Virtual Disk................................................................................................ |
184 |
12 Premium Feature—Virtual Disk Copy............................................................ |
185 |
Using Virtual Disk Copy With Snapshot Or Snapshot (Legacy) Premium Feature......................... |
186 |
Types Of Virtual Disk Copies............................................................................................................ |
186 |
Offline Copy................................................................................................................................ |
186 |
Online Copy................................................................................................................................ |
186 |
Creating A Virtual Disk Copy For An MSCS Shared Disk.................................................................. |
187 |
Virtual Disk Read/Write Permissions................................................................................................. |
187 |
Virtual Disk Copy Restrictions........................................................................................................... |
187 |
Creating A Virtual Disk Copy............................................................................................................ |
188 |
Setting Read/Write Permissions On Target Virtual Disk............................................................ |
188 |
Before You Begin........................................................................................................................ |
189 |
Virtual Disk Copy And Modification Operations........................................................................ |
189 |
Create Copy Wizard.................................................................................................................... |
189 |
Failed Virtual Disk Copy.............................................................................................................. |
189 |
Preferred RAID Controller Module Ownership................................................................................ |
189 |
Failed RAID Controller Module......................................................................................................... |
190 |
Copy Manager................................................................................................................................... |
190 |
Copying The Virtual Disk.................................................................................................................. |
190 |
Storage Array Performance During Virtual Disk Copy..................................................................... |
191 |
Setting Copy Priority.......................................................................................................................... |
191 |
Stopping A Virtual Disk Copy............................................................................................................ |
192 |
Recopying A Virtual Disk................................................................................................................... |
192 |
Preparing Host Servers To Recopy A Virtual Disk...................................................................... |
192 |
Recopying The Virtual Disk......................................................................................................... |
193 |
Removing Copy Pairs........................................................................................................................ |
194 |
13 Device Mapper Multipath For Linux............................................................... |
195 |
Overview............................................................................................................................................ |
195 |
Using DM Multipathing Devices........................................................................................................ |
195 |
Prerequisites................................................................................................................................ |
196 |
Device Mapper Configuration Steps................................................................................................ |
196 |
Scan For Newly Added Virtual Disks........................................................................................... |
197 |
Display The Multipath Device Topology Using The Multipath Command................................ |
197 |
Create A New fdisk Partition On A Multipath Device Node...................................................... |
198 |
Add A New Partition To Device Mapper..................................................................................... |
198 |
Create A File System On A Device Mapper Partition................................................................. |
198 |
Mount A Device Mapper Partition.............................................................................................. |
199 |
Ready For Use.............................................................................................................................. |
199 |
Linux Host Server Reboot Best Practices......................................................................................... |
199 |
Important Information About Special Partitions.............................................................................. |
199 |
Limitations And Known Issues......................................................................................................... |
200 |
Troubleshooting................................................................................................................................ |
201 |
14 Configuring Asymmetric Logical Unit Access............................................ |
203 |
ALUA Performance Considerations................................................................................................. |
203 |
Automatic Transfer Of Ownership................................................................................................... |
203 |
Native ALUA Support On Microsoft Windows And Linux................................................................ |
203 |
Enabling ALUA On VMware ESXi...................................................................................................... |
204 |
Manually Adding SATP Rule In ESXi 5.x...................................................................................... |
204 |
Verifying ALUA On VMware ESXi...................................................................................................... |
204 |
Verifying If Host Server Is Using ALUA For MD Storage Array........................................................ |
204 |
Setting Round-Robin Load Balancing Policy On ESXi-Based Storage Arrays................................ |
205 |
15 Premium Feature—Remote Replication....................................................... |
207 |
About Asynchronous Remote Replication....................................................................................... |
207 |
Remote Replicated Pairs And Replication Repositories.................................................................. |
207 |
Types Of Remote Replication.......................................................................................................... |
208 |
Differences Between Remote Replication Features.................................................................. |
208 |
Upgrading To Asynchronous Remote Replication From Remote Replication (Legacy)......... |
208 |
Remote Replication Requirements And Restrictions...................................................................... |
209 |
Restrictions On Using Remote Replication............................................................................... |
209 |
Setting Up Remote Replication........................................................................................................ |
209 |
Activating Remote Replication Premium Features.......................................................................... |
209 |
Deactivating Remote Replication..................................................................................................... |
210 |
Remote Replication Groups.............................................................................................................. |
211 |
Purpose Of A Remote Replication Group................................................................................... |
211 |
Remote Replication Group Requirements And Guidelines........................................................ |
211 |
Creating A Remote Replication Group....................................................................................... |
211 |
Replicated Pairs................................................................................................................................. |
212 |
Guidelines for Choosing Virtual Disks in a Replicated Pair........................................................ |
212 |
Guidelines For Choosing Virtual Disks In A Replicated Pair....................................................... |
212 |
Creating Replicated Pairs............................................................................................................ |
213 |
Removing A Replicated Pair From A Remote Replication Group.............................................. |
214 |
16 Management Firmware Downloads............................................................... |
215 |
Downloading RAID Controller And NVSRAM Packages.................................................................. |
215 |
Downloading Both RAID Controller And NVSRAM Firmware.......................................................... |
215 |
Downloading Only NVSRAM Firmware............................................................................................ |
217 |
Downloading Physical Disk Firmware.............................................................................................. |
218 |
Downloading MD3060e Series Expansion Module EMM Firmware............................................... |
219 |
Self-Monitoring Analysis And Reporting Technology (SMART)...................................................... |
220 |
Media Errors And Unreadable Sectors............................................................................................. |
220 |
17 Firmware Inventory............................................................................................ |
223 |
Viewing The Firmware Inventory...................................................................................................... |
223 |
18 System Interfaces............................................................................................... |
225 |
Virtual Disk Service............................................................................................................................ |
225 |
Volume Shadow-Copy Service........................................................................................................ |
225 |
19 Storage Array Software..................................................................................... |
227 |
Start-Up Routine............................................................................................................................... |
227 |
Device Health Conditions................................................................................................................. |
227 |
Trace Buffers..................................................................................................................................... |
230 |
Retrieving Trace Buffers............................................................................................................. |
230 |
Collecting Physical Disk Data........................................................................................................... |
231 |
Creating A Support Data Collection Schedule........................................................................... |
231 |
Suspending Or Resuming A Support Data Collection Schedule............................................... |
231 |
Removing A Support Data Collection Schedule........................................................................ |
232 |
Event Log........................................................................................................................................... |
232 |
Viewing The Event Log............................................................................................................... |
233 |
Recovery Guru.................................................................................................................................. |
233 |
Storage Array Profile......................................................................................................................... |
233 |
Viewing The Physical Associations................................................................................................... |
235 |
Recovering From An Unresponsive Storage Array Condition......................................................... |
235 |
Locating A Physical Disk................................................................................................................... |
237 |
Locating An Expansion Enclosure.................................................................................................... |
237 |
Capturing The State Information..................................................................................................... |
238 |
SMrepassist Utility............................................................................................................................. |
238 |
Unidentified Devices......................................................................................................................... |
239 |
Recovering From An Unidentified Storage Array............................................................................. |
239 |
Starting Or Restarting The Host Context Agent Software.............................................................. |
240 |
Starting The SMagent Software In Windows............................................................................. |
240 |
Starting The SMagent Software In Linux.................................................................................... |
241 |
20 Getting Help........................................................................................................ |
243 |
Contacting Dell................................................................................................................................. |
243 |
14
1
CAUTION: See the Safety, Environmental, and Regulatory Information document for important safety information before following any procedures listed in this document.
The following MD Series systems are supported by the latest version of Dell PowerVault Modular Disk Manager (MDSM):
•2U MD Series systems:
–Dell PowerVault MD 3400/3420
–Dell PowerVault MD 3800i/3820i
–Dell PowerVault MD 3800f/3820f
•4U (dense) MD Series systems:
–Dell PowerVault MD 3460
–Dell PowerVault MD 3860i
–Dell PowerVault MD 3860f
NOTE: Your Dell MD Series storage arrays supports two expansion enclosures (180 physical disks) after you install the Additional Physical Disk Support Premium Feature Key. To order the Additional Physical Disk Support Premium Feature Key, contact Dell Support.
Dell PowerVault Modular Disk Storage Manager (MD Storage Manager) is a graphical user interface (GUI) application used to configure and manage one or more MD Series storage arrays. The MD Storage Manager software is located on the MD Series resource DVD.
The Storage Manager screen is divided into two primary windows:
•Enterprise Management Window (EMW) — The EMW provides high-level management of multiple storage arrays. You can launch the Array Management Windows for the storage arrays from the EMW.
•Array Management Window (AMW) — The AMW provides management functions for a single storage array.
The EMW and the AMW consist of the following:
•The title bar at the top of the window — Shows the name of the application.
•The menu bar, beneath the title bar — You can select menu options from the menu bar to perform tasks on a storage array.
•The toolbar, beneath the menu bar — You can select options in the toolbar to perform tasks on a storage array.
15
NOTE: The toolbar is available only in the EMW.
•The tabs, beneath the toolbar — Tabs are used to group the tasks that you can perform on a storage array.
•The status bar, beneath the tabs — The status bar shows status messages and status icons related to the storage array.
NOTE: By default, the toolbar and status bar are not displayed. To view the toolbar or the status bar, select View → Toolbar or View → Status Bar.
The EMW provides high-level management of storage arrays. When you start the MD Storage Manager, the EMW is displayed. The EMW has the:
•Devices tab — Provides information about discovered storage arrays.
•Setup tab — Presents the initial setup tasks that guide you through adding storage arrays and configuring alerts.
The Devices tab has a Tree view on the left side of the window that shows discovered storage arrays, unidentified storage arrays, and the status conditions for the storage arrays. Discovered storage arrays are managed by the MD Storage Manager. Unidentified storage arrays are available to the MD Storage Manager but not configured for management. The right side of the Devices tab has a Table view that shows detailed information for the selected storage array.
In the EMW, you can:
•Discover hosts and managed storage arrays on the local sub-network.
•Manually add and remove hosts and storage arrays.
•Blink or locate the storage arrays.
•Name or rename discovered storage arrays.
•Add comments for a storage array in the Table view.
•Schedule or automatically save a copy of the support data when the client monitor process detects an event.
•Store your EMW view preferences and configuration data in local configuration files. The next time you open the EMW, data from the local configuration files is used to show customized view and preferences.
•Monitor the status of managed storage arrays and indicate status using appropriate icons.
•Add or remove management connections.
•Configure alert notifications for all selected storage arrays through e-mail or SNMP traps.
•Report critical events to the configured alert destinations.
•Launch the AMW for a selected storage array.
•Run a script to perform batch management tasks on specific storage arrays.
•Import the operating system theme settings into the MD Storage Manager.
•Upgrade firmware on multiple storage arrays concurrently.
•Obtain information about the firmware inventory including the version of the RAID controller modules, physical disks, and the enclosure management modules (EMMs) in the storage array.
16
Use the Inherit System Settings option to import the operating system theme settings into the MD Storage Manager. Importing system theme settings affects the font type, font size, color, and contrast in the MD Storage Manager.
1.From the EMW, open the Inherit System Settings window in one of these ways:
–Select Tools → Inherit System Settings.
–Select the Setup tab, and under Accessibility, click Inherit System Settings.
2.Select Inherit system settings for color and font.
3.Click OK.
You can launch the AMW from the EMW. The AMW provides management functions for a single storage array. You can have multiple AMWs open simultaneously to manage different storage arrays.
In the AMW, you can:
•Select storage array options — For example, renaming a storage array, changing a password, or enabling a background media scan.
•Configure virtual disks and disk pools from the storage array capacity, define hosts and host groups, and grant host or host group access to sets of virtual disks called storage partitions.
•Monitor the health of storage array components and report detailed status using applicable icons.
•Perform recovery procedures for a failed logical component or a failed hardware component.
•View the Event Log for a storage array.
•View profile information about hardware components, such as RAID controller modules and physical disks.
•Manage RAID controller modules — For example, changing ownership of virtual disks or placing a RAID controller module online or offline.
•Manage physical disks — For example, assignment of hot spares and locating the physical disk.
•Monitor storage array performance.
To launch the AMW:
1.In the EMW, on the Devices tab, right-click on the relevant storage array. The context menu for the selected storage is displayed.
2.In the context menu, select Manage Storage Array. The AMW for the selected storage array is displayed.
NOTE: You can also launch the AMW by:
–Double-clicking on a storage array displayed in the Devices tab of the EMW.
–Selecting a storage array displayed in the Devices tab of the EMW, and then selecting Tools
→ Manage Storage Array.
The AMW has the following tabs:
•Summary tab — You can view the following information about the storage array:
– Status
17
–Hardware
–Storage and copy services
–Hosts and mappings
–Information on storage capacity
–Premium features
•Performance tab — You can track a storage array’s key performance data and identify performance bottlenecks in your system. You can monitor the system performance in the following ways:
–Real-time graphical
–Real-time textual
–Background (historical)
•Storage & Copy Services tab — You can view and manage the organization of the storage array by virtual disks, disk groups, free capacity nodes, and any unconfigured capacity for the storage array.
•Host Mappings tab — You can define the hosts, host groups, and host ports. You can change the mappings to grant virtual disk access to host groups and hosts and create storage partitions.
•Hardware tab — You can view and manage the physical components of the storage array.
•Setup tab — Shows a list of initial setup tasks for the storage array.
NOTE: Dell PowerVault Modular Disk Configuration Utility (MDCU) is supported only on MD Series storage arrays that use the iSCSI protocol.
MDCU is an iSCSI Configuration Wizard that can be used in conjunction with MD Storage Manager to simplify the configuration of iSCSI connections. The MDCU software is available on the MD Series resource media.
WARNING: See the safety and regulatory information that shipped with your system. Warranty information may be included within this document or as a separate document.
NOTE: All the documents, unless specified otherwise, are available at dell.com/support/manuals.
•The Getting Started Guide provides an overview of setting up and cabling your storage array.
•The Deployment Guide provides installation and configuration instructions for both software and hardware.
•The Owner’s Manual provides information about system features and describes how to troubleshoot the system and install or replace system components.
•The CLI Guide provides information about using the command line interface (CLI).
•The MD Series resource media contains all system management tools.
•The Dell PowerVault MD Series Support Matrix provides information on supported software and hardware for MD systems.
•Information Updates or readme files are included to provide last-minute updates to the enclosure or documentation or advanced technical reference material intended for experienced users or technicians.
•For video resources on PowerVault MD storage arrays, go to dell.com/techcenter.
•For the full name of an abbreviation or acronym used in this document, see the Glossary at dell.com/ support/manuals.
18
NOTE: Always check for updates on dell.com/support/manuals and read the updates first because they often supersede information in other documents.
19
20
2
This chapter describes the storage array concepts, which help in configuring and operating the Dell MD Series storage arrays.
Physical disks in your storage array provide the physical storage capacity for your data. Before you can begin writing data to the storage array, you must configure the physical storage capacity into logical components, called disk groups and virtual disks.
A disk group is a set of physical disks upon which multiple virtual disks are created. The maximum number of physical disks supported in a disk group is:
•96 disks for RAID 0, RAID 1, and RAID 10
•30 disks for RAID 5 and RAID 6
You can create disk groups from unconfigured capacity on your storage array.
A virtual disk is a partition in a disk group that is made up of contiguous data segments of the physical disks in the disk group. A virtual disk consists of data segments from all physical disks in the disk group.
All virtual disks in a disk group support the same RAID level. The storage array supports up to 255 virtual disks (minimum size of 10 MB each) that can be assigned to host servers. Each virtual disk is assigned a Logical Unit Number (LUN) that is recognized by the host operating system.
Virtual disks and disk groups are set up according to how you plan to organize your data. For example, you can have one virtual disk for inventory, a second virtual disk for financial and tax information, and so on.
Only Dell supported physical disks are supported in the storage array. If the storage array detects unsupported physical disks, it marks the disk as unsupported and the physical disk becomes unavailable for all operations.
For the list of supported physical disks, see the Support Matrix at dell.com/support/manuals.
The following describes the various states of the physical disk, which are recognized by the storage array and reported in the MD Storage Manager.
Status |
Mode |
Description |
|
|
|
Optimal |
Assigned |
The physical disk in the indicated slot is |
|
|
configured as part of a disk group. |
Optimal |
Unassigned |
The physical disk in the indicated slot is unused |
|
|
and available to be configured. |
21
Status |
Mode |
Description |
|
|
|
Optimal |
Hot Spare Standby |
The physical disk in the indicated slot is |
|
|
configured as a hot spare. |
Optimal |
Hot Spare in use |
The physical disk in the indicated slot is in use as a |
|
|
hot spare within a disk group. |
Failed |
Assigned, Unassigned, Hot |
|
Spare in use, or Hot Spare |
|
Standby |
The physical disk in the indicated slot has failed because of an unrecoverable error, an incorrect drive type or drive size, or by its operational state being set to failed.
Replaced |
Assigned |
The physical disk in the indicated slot has been |
|
|
replaced and is ready to be, or is actively being, |
|
|
configured into a disk group. |
Pending Failure |
Assigned, Unassigned, Hot |
|
Spare in use, or Hot Spare |
|
Standby |
Offline |
Not applicable |
A Self-Monitoring Analysis and Reporting Technology (SMART) error has been detected on the physical disk in the indicated slot.
The physical disk has either been spun down or had a rebuild aborted by user request.
Identify |
Assigned, Unassigned, Hot |
|
Spare in use, or Hot Spare |
|
Standby |
The physical disk is being identified.
When configuring a storage array, you must:
•Organize the physical disks into disk groups.
•Create virtual disks within these disk groups.
•Provide host server access.
•Create mappings to associate the virtual disks with the host servers.
NOTE: Host server access must be created before mapping virtual disks.
Disk groups are always created in the unconfigured capacity of a storage array. Unconfigured capacity is the available physical disk space not already assigned in the storage array.
Virtual disks are created within the free capacity of a disk group. Free capacity is the space in a disk group that has not been assigned to a virtual disk.
The following table describes the various states of the virtual disk, recognized by the storage array.
Table 1. RAID Controller Virtual Disk States
State |
Description |
|
|
Optimal |
The virtual disk contains physical disks that are online. |
Degraded |
The virtual disk with a redundant RAID level contains |
|
an inaccessible physical disk. The system can still |
22
State |
Description |
|
|
|
function properly, but performance may be affected |
|
and additional disk failures may result in data loss. |
Offline |
A virtual disk with one or more member disks in an |
|
inaccessible (failed, missing, or offline) state. Data on |
|
the virtual disk is no longer accessible. |
Force online |
The storage array forces a virtual disk that is in an |
|
Offline state to an Optimal state. If all the member |
|
physical disks are not available, the storage array |
|
forces the virtual disk to a Degraded state. The |
|
storage array can force a virtual disk to an Online |
|
state only when a sufficient number of physical disks |
|
are available to support the virtual disk. |
Disk pooling allows you to distribute data from each virtual disk randomly across a set of physical disks. Although there is no limit on the maximum number of physical disks that can comprise a disk pool, each disk pool must have a minimum of 11 physical disks. Additionally, the disk pool cannot contain more physical disks than the maximum limit for each storage array.
Thin virtual disks can be created from an existing disk pool. Creating thin virtual disks allows you to set up a large virtual space, but only use the actual physical space as you need it.
RAID levels determine the way in which data is written to physical disks. Different RAID levels provide different levels of accessibility, redundancy, and capacity.
Using multiple physical disks has the following advantages over using a single physical disk:
•Placing data on multiple physical disks (striping) allows input/output (I/O) operations to occur simultaneously and improve performance.
•Storing redundant data on multiple physical disks using mirroring or parity supports reconstruction of lost data if an error occurs, even if that error is the failure of a physical disk.
Each RAID level provides different performance and protection. You must select a RAID level based on the type of application, access, fault tolerance, and data you are storing.
The storage array supports RAID levels 0, 1, 5, 6, and 10. The maximum and minimum number of physical disks that can be used in a disk group depends on the RAID level:
•120 (180 with PFK) for RAID 0, 1, and 10
•30 for RAID 5 and 6
Although PowerVault MD Series storage arrays with premium feature kit can support up to 180 physical disks, RAID 0 and RAID 10 configurations with more than 120 physical disks are not supported. MD
23
Storage Manager does not enforce 120-physical disk limit when you setup a RAID 0 or RAID 10 configuration. Exceeding the 120-physical disk limit may cause your storage array to be unstable.
To ensure best performance, you must select an optimal RAID level when you create a system physical disk. The optimal RAID level for your disk array depends on:
•Number of physical disks in the disk array
•Capacity of the physical disks in the disk array
•Need for redundant access to the data (fault tolerance)
•Disk performance requirements
CAUTION: Do not attempt to create virtual disk groups exceeding 120 physical disks in a RAID 0 configuration even if premium feature is activated on your storage array. Exceeding the 120physical disk limit may cause your storage array to be unstable.
RAID 0 uses disk striping to provide high data throughput, especially for large files in an environment that requires no data redundancy. RAID 0 breaks the data down into segments and writes each segment to a separate physical disk. I/O performance is greatly improved by spreading the I/O load across many physical disks. Although it offers the best performance of any RAID level, RAID 0 lacks data redundancy. Choose this option only for non-critical data, because failure of one physical disk results in the loss of all data. Examples of RAID 0 applications include video editing, image editing, prepress applications, or any application that requires high bandwidth.
RAID 1 uses disk mirroring so that data written to one physical disk is simultaneously written to another physical disk. RAID 1 offers fast performance and the best data availability, but also the highest disk overhead. RAID 1 is recommended for small databases or other applications that do not require large capacity. For example, accounting, payroll, or financial applications. RAID 1 provides full data redundancy.
RAID 5 uses parity and striping data across all physical disks (distributed parity) to provide high data throughput and data redundancy, especially for small random access. RAID 5 is a versatile RAID level and is suited for multi-user environments where typical I/O size is small and there is a high proportion of read activity such as file, application, database, web, e-mail, news, and intranet servers.
RAID 6 is similar to RAID 5 but provides an additional parity disk for better redundancy. RAID 6 is the most versatile RAID level and is suited for multi-user environments where typical I/O size is small and there is a high proportion of read activity. RAID 6 is recommended when large size physical disks are used or large number of physical disks are used in a disk group.
24
CAUTION: Do not attempt to create virtual disk groups exceeding 120 physical disks in a RAID 10 configuration even if premium feature is activated on your storage array. Exceeding the 120physical disk limit may cause your storage array to be unstable.
RAID 10, a combination of RAID 1 and RAID 0, uses disk striping across mirrored disks. It provides high data throughput and complete data redundancy. Utilizing an even number of physical disks (four or more) creates a RAID level 10 disk group and/or virtual disk. Because RAID levels 1 and 10 use disk mirroring, half of the capacity of the physical disks is utilized for mirroring. This leaves the remaining half of the physical disk capacity for actual storage. RAID 10 is automatically used when a RAID level of 1 is chosen with four or more physical disks. RAID 10 works well for medium-sized databases or any environment that requires high performance and fault tolerance and moderate-to-medium capacity.
Disk striping enables data to be written across multiple physical disks. Disk striping enhances performance because striped disks are accessed simultaneously.
The segment size or stripe element size specifies the size of data in a stripe written to a single disk. The storage array supports stripe element sizes of 8 KB, 16 KB, 32 KB, 64 KB, 128 KB, and 256 KB. The default stripe element size is 128 KB.
Stripe width, or depth, refers to the number of disks involved in an array where striping is implemented. For example, a four-disk group with disk striping has a stripe width of four.
NOTE: Although disk striping delivers excellent performance, striping alone does not provide data redundancy.
Every virtual disk must be initialized. Initialization can be done in the foreground or the background. A maximum of four virtual disks can be initialized concurrently on each RAID controller module.
•Background initialization — The storage array executes a background initialization when the virtual disk is created to establish parity, while allowing full host server access to the virtual disks. Background initialization does not run on RAID 0 virtual disks. The background initialization rate is controlled by MD Storage Manager. To change the rate of background initialization, you must stop any existing background initialization. The rate change is implemented when the background initialization restarts automatically.
•Foreground Initialization — The storage array executes a background initialization when the virtual disk is created to establish parity, while allowing full host server access to the virtual disks. Background initialization does not run on RAID 0 virtual disks. The background initialization rate is controlled by MD Storage Manager. To change the rate of background initialization, you must stop any existing background initialization. The rate change is implemented when the background initialization restarts automatically.
A consistency check verifies the correctness of data in a redundant array (RAID levels 1, 5, 6, and 10). For example, in a system with parity, checking consistency involves computing the data on one physical disk and comparing the results to the contents of the parity physical disk.
25
A consistency check is similar to a background initialization. The difference is that background initialization cannot be started or stopped manually, while consistency check can.
NOTE: It is recommended that you run data consistency checks on a redundant array at least once a month. This allows detection and automatic replacement of unreadable sectors. Finding an unreadable sector during a rebuild of a failed physical disk is a serious problem, because the system does not have the redundancy to recover the data.
Another background task performed by the storage array is media verification of all configured physical disks in a disk group. The storage array uses the Read operation to perform verification on the space configured in virtual disks and the space reserved for the metadata.
The media verification operation runs only on selected disk groups, independent of other disk groups. Cycle time is the time taken to complete verification of the metadata region of the disk group and all virtual disks in the disk group for which media verification is configured. The next cycle for a disk group starts automatically when the current cycle completes. You can set the cycle time for a media verification operation between 1 and 30 days. The storage controller throttles the media verification I/O accesses to disks based on the cycle time.
The storage array tracks the cycle for each disk group independent of other disk groups on the controller and creates a checkpoint. If the media verification operation on a disk group is preempted or blocked by another operation on the disk group, the storage array resumes after the current cycle. If the media verification process on a disk group is stopped due to a RAID controller module restart, the storage array resumes the process from the last checkpoint.
The maximum number of active, concurrent virtual disk processes per RAID controller module installed in the storage array is four. This limit is applied to the following virtual disk processes:
•Background initialization
•Foreground initialization
•Consistency check
•Rebuild
•Copy back
If a redundant RAID controller module fails with existing virtual disk processes, the processes on the failed controller are transferred to the peer controller. A transferred process is placed in a suspended state if there are four active processes on the peer controller. The suspended processes are resumed on the peer controller when the number of active processes falls below four.
You can migrate from one RAID level to another depending on your requirements. For example, faulttolerant characteristics can be added to a stripe set (RAID 0) by converting it to a RAID 5 set. The MD Storage Manager provides information about RAID attributes to assist you in selecting the appropriate
26
RAID level. You can perform a RAID level migration while the system is still running and without rebooting, which maintains data availability.
Segment size refers to the amount of data (in kilobytes) that the storage array writes on a physical disk in a virtual disk before writing data on the next physical disk. Valid values for the segment size are 8 KB, 16 KB, 32 KB, 64 KB, 128 KB, and 256 KB.
Dynamic segment size migration enables the segment size of a given virtual disk to be changed. A default segment size is set when the virtual disk is created, based on such factors as the RAID level and expected usage. You can change the default value if segment size usage does not match your needs.
When considering a segment size change, two scenarios illustrate different approaches to the limitations:
•If I/O activity stretches beyond the segment size, you can increase it to reduce the number of disks required for a single I/O. Using a single physical disk for a single request frees disks to service other requests, especially when you have multiple users accessing a database or storage environment.
•If you use the virtual disk in a single-user, large I/O environment (such as for multimedia application storage), performance can be optimized when a single I/O request is serviced with a single data stripe (the segment size multiplied by the number of physical disks in the disk group used for data storage). In this case, multiple disks are used for the same request, but each disk is only accessed once.
When you configure a virtual disk, you select a capacity based on the amount of data you expect to store. However, you may need to increase the virtual disk capacity for a standard virtual disk by adding free capacity to the disk group. This creates more unused space for new virtual disks or to expand existing virtual disks.
Because the storage array supports hot-swappable physical disks, you can add two physical disks at a time for each disk group while the storage array remains online. Data remains accessible on virtual disk groups, virtual disks, and physical disks throughout the operation. The data and increased unused free space are dynamically redistributed across the disk group. RAID characteristics are also reapplied to the disk group as a whole.
Defragmenting consolidates the free capacity in the disk group into one contiguous area. Defragmentation does not change the way in which the data is stored on the virtual disks.
The maximum number of active, concurrent disk group processes per installed RAID controller module is one. This limit is applied to the following disk group processes:
•Virtual disk RAID level migration
•Segment size migration
•Virtual disk capacity expansion
•Disk group expansion
•Disk group defragmentation
27
If a redundant RAID controller module fails with an existing disk group process, the process on the failed controller is transferred to the peer controller. A transferred process is placed in a suspended state if there is an active disk group process on the peer controller. The suspended processes are resumed when the active process on the peer controller completes or is stopped.
NOTE: If you try to start a disk group process on a controller that does not have an existing active process, the start attempt fails if the first virtual disk in the disk group is owned by the other controller and there is an active process on the other controller.
The storage array supports a common configurable priority for the following RAID operations:
•Background initialization
•Rebuild
•Copy back
•Virtual disk capacity expansion
•Raid level migration
•Segment size migration
•Disk group expansion
•Disk group defragmentation
The priority of each of these operations can be changed to address performance requirements of the environment in which the operations are to be executed.
NOTE: Setting a high priority level impacts storage array performance. It is not advisable to set priority levels at the maximum level. Priority must also be assessed in terms of impact to host server access and time to complete an operation. For example, the longer a rebuild of a degraded virtual disk takes, the greater the risk for potential secondary disk failure.
Virtual disk migration is moving a virtual disk or a hot spare from one array to another by detaching the physical disks and re-attaching them to the new array. Disk roaming is moving a physical disk from one slot to another on the same array.
You can move virtual disks from one array to another without taking the target array offline. However, the disk group being migrated must be offline prior to performing the disk migration. If the disk group is not offline prior to migration, the source array holding the physical and virtual disks within the disk group marks them as missing. However, the disk groups themselves migrate to the target array.
An array can import a virtual disk only if it is in an optimal state. You can move virtual disks that are part of a disk group only if all members of the disk group are being migrated. The virtual disks automatically become available after the target array has finished importing all the disks in the disk group.
When you migrate a physical disk or a disk group from:
•One MD storage array to another MD storage array of the same type (for example, from an MD3460 storage array to another MD3460 storage array), the MD storage array you migrate to, recognizes any data structures and/or metadata you had in place on the migrating MD storage array.
28
•Any storage array different from the MD storage array you migrate to (for example, from an MD3460 storage array to an MD3860i storage array), the receiving storage array (MD3860i storage array in the example) does not recognize the migrating metadata and that data is lost. In this case, the receiving storage array initializes the physical disks and marks them as unconfigured capacity.
NOTE: Only disk groups and associated virtual disks with all member physical disks present can be migrated from one storage array to another. It is recommended that you only migrate disk groups that have all their associated member virtual disks in an optimal state.
NOTE: The number of physical disks and virtual disks that a storage array supports limits the scope of the migration.
Use either of the following methods to move disk groups and virtual disks:
•Hot virtual disk migration — Disk migration with the destination storage array power turned on.
•Cold virtual disk migration — Disk migration with the destination storage array power turned off.
NOTE: To ensure that the migrating disk groups and virtual disks are correctly recognized when the target storage array has an existing physical disk, use hot virtual disk migration.
When attempting virtual disk migration, follow these recommendations:
•Moving physical disks to the destination array for migration — When inserting drives into the destination storage array during hot virtual disk migration, wait for the inserted physical disk to be displayed in the MD Storage Manager, or wait for 30 seconds (whichever occurs first), before inserting the next physical disk.
WARNING: Without the interval between drive insertions, the storage array may become unstable and manageability may be temporarily lost.
•Migrating virtual disks from multiple storage arrays into a single storage array — When migrating virtual disks from multiple or different storage arrays into a single destination storage array, move all of the physical disks from the same storage array as a set into the new destination storage array. Ensure that all of the physical disks from a storage array are migrated to the destination storage array before starting migration from the next storage array.
NOTE: If the drive modules are not moved as a set to the destination storage array, the newly relocated disk groups may not be accessible.
•Migrating virtual disks to a storage array with no existing physical disks — Turn off the destination storage array, when migrating disk groups or a complete set of physical disks from a storage array to another storage array that has no existing physical disks. After the destination storage array has been turned on and has successfully recognized the newly migrated physical disks, migration operations can continue.
NOTE: Disk groups from multiple storage arrays must not be migrated at the same time to a storage array that has no existing physical disks. Use cold virtual disk migration for the disk groups from one storage array.
•Enabling premium features before migration — Before migrating disk groups and virtual disks, enable the required premium features on the destination storage array. If a disk group is migrated from a storage array that has a premium feature enabled and the destination array does not have this feature enabled, an Out of Compliance error message can be generated.
You can move physical disks within an array. The RAID controller module automatically recognizes the relocated physical disks and logically places them in the proper virtual disks that are part of the disk group. Disk roaming is permitted when the RAID controller module is either online or powered off.
NOTE: The disk group must be exported before moving the physical disks.
29
The host server attached to a storage array accesses various virtual disks on the storage array through its host ports. Specific virtual disk-to-LUN mappings to an individual host server can be defined. In addition, the host server can be part of a host group that shares access to one or more virtual disks. You can manually configure a host server-to-virtual disk mapping. When you configure host server-to-virtual disk mapping, consider these guidelines:
•You can define one host server-to-virtual disk mapping for each virtual disk in the storage array.
•Host server-to-virtual disk mappings are shared between RAID controller modules in the storage array.
•A unique LUN must be used by a host group or host server to access a virtual disk.
•Not every operating system has the same number of LUNs available for use.
A host server is a server that accesses a storage array. Host servers are mapped to the virtual disks and use one or more iSCSI initiator ports. Host servers have the following attributes:
•Host name — A name that uniquely identifies the host server.
•Host group (used in Cluster solutions only) — Two or more host servers associated together to share access to the same virtual disks.
NOTE: This host group is a logical entity you can create in the MD Storage Manager. All host servers in a host group must be running the same operating system.
•Host type — The operating system running on the host server.
The RAID enclosure supports several advanced features:
•Virtual Disk Snapshots.
•Virtual Disk Copy.
NOTE: The premium features listed above must be activated separately. If you have purchased these features, an activation card is supplied that contains instructions for enabling this functionality.
The following types of virtual disk snapshot premium features are supported on the MD storage array:
•Snapshot Virtual Disks using multiple point-in-time (PiT) groups — This feature also supports snapshot groups, snapshot images, and consistency groups.
•Snapshot Virtual Disks (Legacy) using a separate repository for each snapshot
For more information, see Premium Feature---Snapshot Virtual Disk and Premium Feature—Snapshot Virtual Disks (Legacy).
Snapshot Virtual Disks, Snapshot Images, And Snapshot Groups
A snapshot image is a logical image of the content of an associated base virtual disk created at a specific point-in-time. This type of image is not directly readable or writable to a host since the snapshot image is used to save data from the base virtual disk only. To allow the host to access a copy of the data in a snapshot image, you must create a snapshot virtual disk. This snapshot virtual disk contains its own
30