User Manual
Table Of Contents
- Dell PowerVault MD 34XX/38XX Series Storage Arrays Administrator's Guide
- Introduction
- About Your MD Series Storage Array
- Physical Disks, Virtual Disks, And Disk Groups
- Disk Pools
- Thin Virtual Disks
- RAID Levels
- Segment Size
- Virtual Disk Operations
- Disk Group Operations
- RAID Background Operations Priority
- Virtual Disk Migration And Disk Roaming
- Advanced Features
- Multi-Path Software
- Load Balancing
- Monitoring System Performance
- Interpreting Performance Monitor Data
- Viewing Real-time Graphical Performance Monitor Data
- Customizing the Performance Monitor Dashboard
- Specifying Performance Metrics
- Viewing Real-time Textual Performance Monitor
- Saving Real-time Textual Performance Data
- Starting and Stopping Background Performance Monitor
- Viewing Information about the Current Background Performance Monitor Session
- Viewing Current Background Performance Monitor Data
- Saving the Current Background Performance Monitor Data
- Viewing Saved Background Performance Monitor Data
- What are invalid objects in the Performance Monitor?
- Discovering And Managing Your Storage Array
- Out-Of-Band Management
- In-Band Management
- Storage Arrays
- Setting Up Your Storage Array
- Locating Storage Arrays
- Naming Or Renaming Storage Arrays
- Setting A Password
- Adding Or Editing A Comment To An Existing Storage Array
- Removing Storage Arrays
- Enabling Premium Features
- Displaying Failover Alert
- Changing The Cache Settings On The Storage Array
- Changing Expansion Enclosure ID Numbers
- Changing The Enclosure Order
- Configuring Alert Notifications
- Battery Settings
- Setting The Storage Array RAID Controller Module Clocks
- Using iSCSI
- Changing The iSCSI Target Authentication
- Entering Mutual Authentication Permissions
- Creating CHAP Secrets
- Changing The iSCSI Target Identification
- Changing The iSCSI Target Discovery Settings
- Configuring The iSCSI Host Ports
- Advanced iSCSI Host Port Settings
- Viewing Or Ending An iSCSI Session
- Viewing iSCSI Statistics And Setting Baseline Statistics
- Edit, Remove, Or Rename Host Topology
- Event Monitor
- About Your Host
- Disk Groups, Standard Virtual Disks, And Thin Virtual Disks
- Creating Disk Groups And Virtual Disks
- Thin Virtual Disks
- Advantages Of Thin Virtual Disks
- Physical Vs Virtual Capacity On A Thin Virtual Disk
- Thin Virtual Disk Requirements And Limitations
- Thin Volume Attributes
- Thin Virtual Disk States
- Comparison—Types Of Virtual Disks And Copy Services
- Rollback On Thin Virtual Disks
- Initializing A Thin Virtual Disk
- Changing A Thin Virtual Disk To A Standard Virtual Disk
- Choosing An Appropriate Physical Disk Type
- Physical Disk Security With Self Encrypting Disk
- Configuring Hot Spare Physical Disks
- Enclosure Loss Protection
- Drawer Loss Protection
- Host-To-Virtual Disk Mapping
- Creating Host-To-Virtual Disk Mappings
- Modifying And Removing Host-To-Virtual Disk Mapping
- Changing Controller Ownership Of The Virtual Disk
- Removing Host-To-Virtual Disk Mapping
- Changing The RAID Controller Module Ownership Of A Disk Group
- Changing The RAID Level Of A Disk Group
- Removing A Host-To-Virtual Disk Mapping Using Linux DMMP
- Restricted Mappings
- Storage Partitioning
- Disk Group And Virtual Disk Expansion
- Disk Group Migration
- Storage Array Media Scan
- Disk Pools And Disk Pool Virtual Disks
- Difference Between Disk Groups And Disk Pools
- Disk Pool Restrictions
- Creating A Disk Pool Manually
- Automatically Managing The Unconfigured Capacity In Disk Pools
- Locating Physical Disks In A Disk Pool
- Renaming A Disk Pool
- Configuring Alert Notifications For A Disk Pool
- Adding Unassigned Physical Disks To A Disk Pool
- Configuring The Preservation Capacity Of A Disk Pool
- Changing The Modification Priority Of A Disk Pool
- Changing The RAID Controller Module Ownership Of A Disk Pool
- Checking Data Consistency
- Deleting A Disk Pool
- Viewing Storage Array Logical Components And Associated Physical Components
- Secure Disk Pools
- Changing Capacity On Existing Thin Virtual Disks
- Creating A Thin Virtual Disk From A Disk Pool
- Using SSD Cache
- How SSD Cache Works
- Benefits Of SSD Cache
- Choosing SSD Cache Parameters
- SSD Cache Restrictions
- Creating An SSD Cache
- Viewing Physical Components Associated With An SSD Cache
- Locating Physical Disks In An SSD Cache
- Adding Physical Disks To An SSD Cache
- Removing Physical Disks From An SSD Cache
- Suspending Or Resuming SSD Caching
- Changing I/O Type In An SSD Cache
- Renaming An SSD Cache
- Deleting An SSD Cache
- Using The Performance Modeling Tool
- Premium Feature—Snapshot Virtual Disk
- Snapshot Virtual Disk Vs. Snapshot Virtual Disk (Legacy)
- Snapshot Images And Groups
- Snapshot Virtual Disk Read/Write Properties
- Snapshot Groups And Consistency Groups
- Understanding Snapshot Repositories
- Creating Snapshot Images
- Scheduling Snapshot Images
- Performing Snapshot Rollbacks
- Creating A Snapshot Group
- Converting A Snapshot Virtual Disk To Read-Write
- Viewing Associated Physical Components Of An Individual Repository Virtual Disk
- Creating A Consistency Group
- Creating A Snapshot Virtual Disk Of A Snapshot Image
- Snapshot Virtual Disk Limitations
- Creating A Snapshot Virtual Disk
- Creating A Snapshot Virtual Disk Repository
- Changing The Settings Of A Snapshot Virtual Disk
- Disabling A Snapshot Virtual Disk Or Consistency Group Snapshot Virtual Disk
- Re-creating A Snapshot Virtual Disk Or Consistency Group Snapshot Virtual Disk
- Renaming A Snapshot Virtual Disk Or Consistency Group Snapshot Virtual Disk
- Deleting A Snapshot Virtual Disk Or Consistency Group Snapshot Virtual Disk
- Creating A Consistency Group Snapshot Virtual Disk
- Creating A Consistency Group Snapshot Virtual Disk Repository (Manually)
- Disabling A Snapshot Virtual Disk Or Consistency Group Snapshot Virtual Disk
- Re-creating A Snapshot Virtual Disk Or Consistency Group Snapshot Virtual Disk
- Changing The Modification Priority Of An Overall Repository Virtual Disk
- Changing The Media Scan Setting Of An Overall Repository Virtual Disk
- Changing The Pre-read Consistency Check Setting Of An Overall Repository Virtual Disk
- Increasing The Capacity Of An Overall Repository
- Decreasing The Capacity Of The Overall Repository
- Performing A Revive Operation
- Premium Feature—Snapshot Virtual Disks (Legacy)
- Scheduling A Snapshot Virtual Disk
- Creating A Snapshot Virtual Disk Using The Simple Path
- Creating A Snapshot Virtual Disk Using The Advanced Path
- Specifying Snapshot Virtual Disk Names
- Snapshot Repository Capacity
- Re-Creating Snapshot Virtual Disks
- Disabling A Snapshot Virtual Disk
- Re-Creating A Snapshot Virtual Disk
- Premium Feature—Virtual Disk Copy
- Using Virtual Disk Copy With Snapshot Or Snapshot (Legacy) Premium Feature
- Types Of Virtual Disk Copies
- Creating A Virtual Disk Copy For An MSCS Shared Disk
- Virtual Disk Read/Write Permissions
- Virtual Disk Copy Restrictions
- Creating A Virtual Disk Copy
- Preferred RAID Controller Module Ownership
- Failed RAID Controller Module
- Copy Manager
- Copying The Virtual Disk
- Storage Array Performance During Virtual Disk Copy
- Setting Copy Priority
- Stopping A Virtual Disk Copy
- Recopying A Virtual Disk
- Removing Copy Pairs
- Device Mapper Multipath For Linux
- Configuring Asymmetric Logical Unit Access
- Premium Feature—Remote Replication
- About Asynchronous Remote Replication
- Remote Replicated Pairs And Replication Repositories
- Types Of Remote Replication
- Remote Replication Requirements And Restrictions
- Setting Up Remote Replication
- Activating Remote Replication Premium Features
- Deactivating Remote Replication
- Remote Replication Groups
- Replicated Pairs
- Management Firmware Downloads
- Downloading RAID Controller And NVSRAM Packages
- Downloading Both RAID Controller And NVSRAM Firmware
- Downloading Only NVSRAM Firmware
- Downloading Physical Disk Firmware
- Downloading MD3060e Series Expansion Module EMM Firmware
- Self-Monitoring Analysis And Reporting Technology (SMART)
- Media Errors And Unreadable Sectors
- Firmware Inventory
- System Interfaces
- Storage Array Software
- Start-Up Routine
- Device Health Conditions
- Trace Buffers
- Collecting Physical Disk Data
- Event Log
- Recovery Guru
- Storage Array Profile
- Viewing The Physical Associations
- Recovering From An Unresponsive Storage Array Condition
- Locating A Physical Disk
- Locating An Expansion Enclosure
- Capturing The State Information
- SMrepassist Utility
- Unidentified Devices
- Recovering From An Unidentified Storage Array
- Starting Or Restarting The Host Context Agent Software
- Getting Help

• A standby hot spare is a physical disk that has been assigned as a hot spare and is available to take
over for any failed physical disk.
• An in-use hot spare is a physical disk that has been assigned as a hot spare and is currently replacing a
failed physical disk.
Hot Spare Drive Protection
You can use a hot spare physical disk for additional data protection from physical disk failures that occur
in a RAID Level 1, or RAID Level 5 disk group. If the hot spare physical disk is available when a physical disk
fails, the RAID controller module uses redundancy data to reconstruct the data from the failed physical
disk to the hot spare physical disk. When you have physically replaced the failed physical disk, a copyback
operation occurs from the hot spare physical disk to the replaced physical disk. If there are secure disk
groups and security capable disk groups in the storage array, the hot spare physical disk must match the
security capability of the disk group. For example, a non-security capable physical disk cannot be used as
a hot spare for a secure disk group.
NOTE: For a security capable disk group, security capable hot spare physical disks are preferred. If
security capable physical disks are not available, non-security capable physical disks may be used as
hot spare physical disks. To ensure that the disk group is retained as security capable, the non-
security capable hot spare physical disk must be replaced with a security capable physical disk.
If you select a security capable physical disk as hot spare for a non-secure disk group, a dialog box is
displayed indicating that a security capable physical disk is being used as a hot spare for a non-secure
disk group.
The availability of enclosure loss protection for a disk group depends on the location of the physical disks
that comprise the disk group. The enclosure loss protection might be lost because of a failed physical
disk and location of the hot spare physical disk. To make sure that enclosure loss protection is not
affected, you must replace a failed physical disk to initiate the copyback process.
The virtual disk remains online and accessible while you are replacing the failed physical disk, because the
hot spare physical disk is automatically substituted for the failed physical disk.
Enclosure Loss Protection
Enclosure loss protection is an attribute of a disk group. Enclosure loss protection guarantees
accessibility to the data on the virtual disks in a disk group if a total loss of communication occurs with a
single expansion enclosure. An example of total loss of communication may be loss of power to the
expansion enclosure or failure of both RAID controller modules.
CAUTION: Enclosure loss protection is not guaranteed if a physical disk has already failed in the
disk group. In this situation, losing access to an expansion enclosure and consequently another
physical disk in the disk group causes a double physical disk failure and loss of data.
Enclosure loss protection is achieved when you create a disk group where all of the physical disks that
comprise the disk group are located in different expansion enclosures. This distinction depends on the
RAID level. If you choose to create a disk group by using the Automatic method, the software attempts to
choose physical disks that provide enclosure loss protection. If you choose to create a disk group by
using the Manual method, you must use the criteria specified below.
RAID Level Criteria for Enclosure Loss Protection
RAID level 5 or
RAID level 6
Ensure that all the physical disks in the disk group are located in different expansion
enclosures.
100