Administrator Guide
Table Of Contents
- Dell EMC PowerVault ME4 Series Storage System Administrator’s Guide
- Contents
- Getting started
- New user setup
- Configure and provision a new storage system
- Using the PowerVault Manager interface
- System concepts
- About virtual and linear storage
- About disk groups
- About RAID levels
- About ADAPT
- About SSDs
- About SSD read cache
- About spares
- About pools
- About volumes and volume groups
- About volume cache options
- About thin provisioning
- About automated tiered storage
- About initiators, hosts, and host groups
- About volume mapping
- About operating with a single controller
- About snapshots
- About copying volumes
- About reconstruction
- About quick rebuild
- About performance statistics
- About firmware updates
- About managed logs
- About SupportAssist
- About CloudIQ
- About configuring DNS settings
- About replicating virtual volumes
- About the Full Disk Encryption feature
- About data protection with a single controller
- Working in the Home topic
- Guided setup
- Provisioning disk groups and pools
- Attaching hosts and volumes in the Host Setup wizard
- Overall system status
- Configuring system settings
- Managing scheduled tasks
- Working in the System topic
- Viewing system components
- Systems Settings panel
- Resetting host ports
- Rescanning disk channels
- Clearing disk metadata
- Updating firmware
- Changing FDE settings
- Configuring advanced settings
- Changing disk settings
- Changing system cache settings
- Configuring partner firmware update
- Configuring system utilities
- Using maintenance mode
- Restarting or shutting down controllers
- Working in the Hosts topic
- Working in the Pools topic
- Working in the Volumes topic
- Viewing volumes
- Creating a virtual volume
- Creating a linear volume
- Modifying a volume
- Copying a volume or snapshot
- Abort a volume copy
- Adding volumes to a volume group
- Removing volumes from a volume group
- Renaming a volume group
- Remove volume groups
- Rolling back a virtual volume
- Deleting volumes and snapshots
- Creating snapshots
- Resetting a snapshot
- Creating a replication set from the Volumes topic
- Initiating or scheduling a replication from the Volumes topic
- Manage replication schedules from the Volumes topic
- Working in the Mappings topic
- Working in the Replications topic
- About replicating virtual volumes in the Replications topic
- Replication prerequisites
- Replication process
- Creating a virtual pool for replication
- Setting up snapshot space management in the context of replication
- Replication and empty allocated pages
- Disaster recovery
- Accessing the data while keeping the replication set intact
- Accessing the data from the backup system as if it were the primary system
- Disaster recovery procedures
- Viewing replications
- Querying a peer connection
- Creating a peer connection
- Modifying a peer connection
- Deleting a peer connection
- Creating a replication set from the Replications topic
- Modifying a replication set
- Deleting a replication set
- Initiating or scheduling a replication from the Replications topic
- Stopping a replication
- Suspending a replication
- Resuming a replication
- Manage replication schedules from the Replications topic
- About replicating virtual volumes in the Replications topic
- Working in the Performance topic
- Working in the banner and footer
- Banner and footer overview
- Viewing system information
- Viewing certificate information
- Viewing connection information
- Viewing system date and time information
- Viewing user information
- Viewing health information
- Viewing event information
- Viewing capacity information
- Viewing host information
- Viewing tier information
- Viewing recent system activity
- Other management interfaces
- SNMP reference
- Using FTP and SFTP
- Using SMI-S
- Using SLP
- Administering a log-collection system
- Best practices
- System configuration limits
- Glossary of terms
A system and the FDE-capable disks in the system are initially unsecured but can be secured at any point. Until the system is
secured, FDE-capable disks function exactly like disks that do not support FDE.
Enabling FDE protection involves setting a passphrase and securing the system. Data that was present on the system before
it was secured is accessible in the same way it was when it was unsecured. However, if a disk is transferred to an unsecured
system or a system with a different passphrase, the data is not accessible.
Secured disks and systems can be repurposed. Repurposing a disk changes the encryption key on the disk, effectively erasing all
data on the disk and unsecuring the system and disks. Repurpose a disk only if you no longer need the data on the disk.
FDE operates on a per-system basis, not a per-disk group basis. To use FDE, all disks in the system must be FDE-capable. For
information on setting up FDE and modifying FDE options, see Changing FDE settings.
NOTE: If you insert an FDE disk into a secured system and the disk does not come up in the expected state, perform a
manual rescan. See Rescanning disk channels.
About data protection with a single controller
The system can operate with a single controller if its partner has gone offline or has been removed. Because single-controller
operation is not a redundant configuration, this section presents some considerations concerning data protection.
The default caching mode for a volume is write back, as opposed to write through. In write-back mode, the host is notified
that the controller has received the write when the data is present in the controller cache. In write-through mode, the host is
notified that the controller has received the write when the data is written to disk. Therefore, in write-back mode, data is held in
the controller cache until it is written to disk.
If the controller fails while in write-back mode, unwritten cache data likely exists. The same is true if the controller enclosure
or the enclosure of the target volume is powered off without a proper shutdown. Data remains in the controller cache and
associated volumes will be missing that data on the disk.
If the controller can be brought back online long enough to perform a proper shutdown and the disk group is online, the
controller should be able to write its cache to disk without causing data loss.
If the controller cannot be brought back online long enough to write its cache data to disk, please contact technical support.
To help prevent data loss in case the controller fails, you can change the caching mode of a volume to write through. While
this will cause significant performance degradation, this configuration guards against data loss. While write-back mode is much
faster, this mode is not guaranteed against data loss in the case of a controller failure. If data protection is more important, use
write-through caching. If performance is more important, use write-back caching.
For more information about volume cache options, see About volume cache options. For more information about changing cache
settings for a volume, see Modifying a volume. For more information about changing system cache settings, see Changing
system cache settings.
Getting started
33