Administrator Guide
Table Of Contents
- Dell EMC PowerVault ME4 Series Storage System Administrator’s Guide
- Contents
- Getting started
- New user setup
- Configure and provision a new storage system
- Using the PowerVault Manager interface
- System concepts
- About virtual and linear storage
- About disk groups
- About RAID levels
- About ADAPT
- About SSDs
- About SSD read cache
- About spares
- About pools
- About volumes and volume groups
- About volume cache options
- About thin provisioning
- About automated tiered storage
- About initiators, hosts, and host groups
- About volume mapping
- About operating with a single controller
- About snapshots
- About copying volumes
- About reconstruction
- About quick rebuild
- About performance statistics
- About firmware updates
- About managed logs
- About SupportAssist
- About CloudIQ
- About configuring DNS settings
- About replicating virtual volumes
- About the Full Disk Encryption feature
- About data protection with a single controller
- Working in the Home topic
- Guided setup
- Provisioning disk groups and pools
- Attaching hosts and volumes in the Host Setup wizard
- Overall system status
- Configuring system settings
- Managing scheduled tasks
- Working in the System topic
- Viewing system components
- Systems Settings panel
- Resetting host ports
- Rescanning disk channels
- Clearing disk metadata
- Updating firmware
- Changing FDE settings
- Configuring advanced settings
- Changing disk settings
- Changing system cache settings
- Configuring partner firmware update
- Configuring system utilities
- Using maintenance mode
- Restarting or shutting down controllers
- Working in the Hosts topic
- Working in the Pools topic
- Working in the Volumes topic
- Viewing volumes
- Creating a virtual volume
- Creating a linear volume
- Modifying a volume
- Copying a volume or snapshot
- Abort a volume copy
- Adding volumes to a volume group
- Removing volumes from a volume group
- Renaming a volume group
- Remove volume groups
- Rolling back a virtual volume
- Deleting volumes and snapshots
- Creating snapshots
- Resetting a snapshot
- Creating a replication set from the Volumes topic
- Initiating or scheduling a replication from the Volumes topic
- Manage replication schedules from the Volumes topic
- Working in the Mappings topic
- Working in the Replications topic
- About replicating virtual volumes in the Replications topic
- Replication prerequisites
- Replication process
- Creating a virtual pool for replication
- Setting up snapshot space management in the context of replication
- Replication and empty allocated pages
- Disaster recovery
- Accessing the data while keeping the replication set intact
- Accessing the data from the backup system as if it were the primary system
- Disaster recovery procedures
- Viewing replications
- Querying a peer connection
- Creating a peer connection
- Modifying a peer connection
- Deleting a peer connection
- Creating a replication set from the Replications topic
- Modifying a replication set
- Deleting a replication set
- Initiating or scheduling a replication from the Replications topic
- Stopping a replication
- Suspending a replication
- Resuming a replication
- Manage replication schedules from the Replications topic
- About replicating virtual volumes in the Replications topic
- Working in the Performance topic
- Working in the banner and footer
- Banner and footer overview
- Viewing system information
- Viewing certificate information
- Viewing connection information
- Viewing system date and time information
- Viewing user information
- Viewing health information
- Viewing event information
- Viewing capacity information
- Viewing host information
- Viewing tier information
- Viewing recent system activity
- Other management interfaces
- SNMP reference
- Using FTP and SFTP
- Using SMI-S
- Using SLP
- Administering a log-collection system
- Best practices
- System configuration limits
- Glossary of terms
Repurposing the system
You can repurpose a system to erase all data on the system and return its FDE state to unsecure.
CAUTION: Repurposing a system erases all disks in the system and restores the FDE state to unsecure.
Repurposing disks
You can repurpose a disk that is no longer part of a disk group.
Repurposing a disk resets the encryption key on the disk, deleting all data on the disk. After a disk is repurposed in a secured
system, the disk is secured using the system lock key ID and the new encryption key on the disk, making the disk usable to the
system.
Repurposing a disk in an unsecured system removes all associated lock keys and makes that disk available to any system.
CAUTION: Repurposing a disk changes the encryption key on the disk and deletes all data on the disk.
Repurpose a disk only if you no longer need the data on the disk.
Setting import lock key IDs
You can set the passphrase associated with an import lock key to unlock FDE-secured disks that are inserted into the system
from a different secure system. If the correct passphrase is not entered, the system cannot access data on the disk.
After importing disks into the system, the disks will now be associated with the system lock key ID and data will no longer be
accessible using the import lock key. This effectively transfers security to the local system passphrase.
Set or change the import passphrase
1. In the System topic, select Action > Full Disk Encryption.
The Full Disk Encryption panel opens with the FDE General Configuration tab selected.
2. Select the Set Import Lock Key ID tab.
3. In the Passphrase field, enter the passphrase associated with the displayed lock key.
4. Re-enter the passphrase.
5. Click Set. A dialog box will confirm the passphrase was changed successfully.
Configuring advanced settings
Use the Advanced Settings panel to change disk settings, cache settings, partner firmware update settings, and system utility
settings.
Changing disk settings
The Disk tab provides options to change disk settings, including SMART configuration, EMP polling rate, dynamic spares, and
drive spin down options.
Configuring SMART
Self-Monitoring Analysis and Reporting Technology (SMART) provides data that enables you to monitor disks and analyze why
a disk failed. When SMART is enabled, the system checks for SMART events one minute after a restart and every five minutes
thereafter. SMART events are recorded in the event log.
68
Working in the System topic