User Manual
Table Of Contents
- Dell PowerVault MD 34XX/38XX Series Storage Arrays Administrator's Guide
- Introduction
- About Your MD Series Storage Array
- Physical Disks, Virtual Disks, And Disk Groups
- Disk Pools
- Thin Virtual Disks
- RAID Levels
- Segment Size
- Virtual Disk Operations
- Disk Group Operations
- RAID Background Operations Priority
- Virtual Disk Migration And Disk Roaming
- Advanced Features
- Multi-Path Software
- Load Balancing
- Monitoring System Performance
- Interpreting Performance Monitor Data
- Viewing Real-time Graphical Performance Monitor Data
- Customizing the Performance Monitor Dashboard
- Specifying Performance Metrics
- Viewing Real-time Textual Performance Monitor
- Saving Real-time Textual Performance Data
- Starting and Stopping Background Performance Monitor
- Viewing Information about the Current Background Performance Monitor Session
- Viewing Current Background Performance Monitor Data
- Saving the Current Background Performance Monitor Data
- Viewing Saved Background Performance Monitor Data
- What are invalid objects in the Performance Monitor?
- Discovering And Managing Your Storage Array
- Out-Of-Band Management
- In-Band Management
- Storage Arrays
- Setting Up Your Storage Array
- Locating Storage Arrays
- Naming Or Renaming Storage Arrays
- Setting A Password
- Adding Or Editing A Comment To An Existing Storage Array
- Removing Storage Arrays
- Enabling Premium Features
- Displaying Failover Alert
- Changing The Cache Settings On The Storage Array
- Changing Expansion Enclosure ID Numbers
- Changing The Enclosure Order
- Configuring Alert Notifications
- Battery Settings
- Setting The Storage Array RAID Controller Module Clocks
- Using iSCSI
- Changing The iSCSI Target Authentication
- Entering Mutual Authentication Permissions
- Creating CHAP Secrets
- Changing The iSCSI Target Identification
- Changing The iSCSI Target Discovery Settings
- Configuring The iSCSI Host Ports
- Advanced iSCSI Host Port Settings
- Viewing Or Ending An iSCSI Session
- Viewing iSCSI Statistics And Setting Baseline Statistics
- Edit, Remove, Or Rename Host Topology
- Event Monitor
- About Your Host
- Disk Groups, Standard Virtual Disks, And Thin Virtual Disks
- Creating Disk Groups And Virtual Disks
- Thin Virtual Disks
- Advantages Of Thin Virtual Disks
- Physical Vs Virtual Capacity On A Thin Virtual Disk
- Thin Virtual Disk Requirements And Limitations
- Thin Volume Attributes
- Thin Virtual Disk States
- Comparison—Types Of Virtual Disks And Copy Services
- Rollback On Thin Virtual Disks
- Initializing A Thin Virtual Disk
- Changing A Thin Virtual Disk To A Standard Virtual Disk
- Choosing An Appropriate Physical Disk Type
- Physical Disk Security With Self Encrypting Disk
- Configuring Hot Spare Physical Disks
- Enclosure Loss Protection
- Drawer Loss Protection
- Host-To-Virtual Disk Mapping
- Creating Host-To-Virtual Disk Mappings
- Modifying And Removing Host-To-Virtual Disk Mapping
- Changing Controller Ownership Of The Virtual Disk
- Removing Host-To-Virtual Disk Mapping
- Changing The RAID Controller Module Ownership Of A Disk Group
- Changing The RAID Level Of A Disk Group
- Removing A Host-To-Virtual Disk Mapping Using Linux DMMP
- Restricted Mappings
- Storage Partitioning
- Disk Group And Virtual Disk Expansion
- Disk Group Migration
- Storage Array Media Scan
- Disk Pools And Disk Pool Virtual Disks
- Difference Between Disk Groups And Disk Pools
- Disk Pool Restrictions
- Creating A Disk Pool Manually
- Automatically Managing The Unconfigured Capacity In Disk Pools
- Locating Physical Disks In A Disk Pool
- Renaming A Disk Pool
- Configuring Alert Notifications For A Disk Pool
- Adding Unassigned Physical Disks To A Disk Pool
- Configuring The Preservation Capacity Of A Disk Pool
- Changing The Modification Priority Of A Disk Pool
- Changing The RAID Controller Module Ownership Of A Disk Pool
- Checking Data Consistency
- Deleting A Disk Pool
- Viewing Storage Array Logical Components And Associated Physical Components
- Secure Disk Pools
- Changing Capacity On Existing Thin Virtual Disks
- Creating A Thin Virtual Disk From A Disk Pool
- Using SSD Cache
- How SSD Cache Works
- Benefits Of SSD Cache
- Choosing SSD Cache Parameters
- SSD Cache Restrictions
- Creating An SSD Cache
- Viewing Physical Components Associated With An SSD Cache
- Locating Physical Disks In An SSD Cache
- Adding Physical Disks To An SSD Cache
- Removing Physical Disks From An SSD Cache
- Suspending Or Resuming SSD Caching
- Changing I/O Type In An SSD Cache
- Renaming An SSD Cache
- Deleting An SSD Cache
- Using The Performance Modeling Tool
- Premium Feature—Snapshot Virtual Disk
- Snapshot Virtual Disk Vs. Snapshot Virtual Disk (Legacy)
- Snapshot Images And Groups
- Snapshot Virtual Disk Read/Write Properties
- Snapshot Groups And Consistency Groups
- Understanding Snapshot Repositories
- Creating Snapshot Images
- Scheduling Snapshot Images
- Performing Snapshot Rollbacks
- Creating A Snapshot Group
- Converting A Snapshot Virtual Disk To Read-Write
- Viewing Associated Physical Components Of An Individual Repository Virtual Disk
- Creating A Consistency Group
- Creating A Snapshot Virtual Disk Of A Snapshot Image
- Snapshot Virtual Disk Limitations
- Creating A Snapshot Virtual Disk
- Creating A Snapshot Virtual Disk Repository
- Changing The Settings Of A Snapshot Virtual Disk
- Disabling A Snapshot Virtual Disk Or Consistency Group Snapshot Virtual Disk
- Re-creating A Snapshot Virtual Disk Or Consistency Group Snapshot Virtual Disk
- Renaming A Snapshot Virtual Disk Or Consistency Group Snapshot Virtual Disk
- Deleting A Snapshot Virtual Disk Or Consistency Group Snapshot Virtual Disk
- Creating A Consistency Group Snapshot Virtual Disk
- Creating A Consistency Group Snapshot Virtual Disk Repository (Manually)
- Disabling A Snapshot Virtual Disk Or Consistency Group Snapshot Virtual Disk
- Re-creating A Snapshot Virtual Disk Or Consistency Group Snapshot Virtual Disk
- Changing The Modification Priority Of An Overall Repository Virtual Disk
- Changing The Media Scan Setting Of An Overall Repository Virtual Disk
- Changing The Pre-read Consistency Check Setting Of An Overall Repository Virtual Disk
- Increasing The Capacity Of An Overall Repository
- Decreasing The Capacity Of The Overall Repository
- Performing A Revive Operation
- Premium Feature—Snapshot Virtual Disks (Legacy)
- Scheduling A Snapshot Virtual Disk
- Creating A Snapshot Virtual Disk Using The Simple Path
- Creating A Snapshot Virtual Disk Using The Advanced Path
- Specifying Snapshot Virtual Disk Names
- Snapshot Repository Capacity
- Re-Creating Snapshot Virtual Disks
- Disabling A Snapshot Virtual Disk
- Re-Creating A Snapshot Virtual Disk
- Premium Feature—Virtual Disk Copy
- Using Virtual Disk Copy With Snapshot Or Snapshot (Legacy) Premium Feature
- Types Of Virtual Disk Copies
- Creating A Virtual Disk Copy For An MSCS Shared Disk
- Virtual Disk Read/Write Permissions
- Virtual Disk Copy Restrictions
- Creating A Virtual Disk Copy
- Preferred RAID Controller Module Ownership
- Failed RAID Controller Module
- Copy Manager
- Copying The Virtual Disk
- Storage Array Performance During Virtual Disk Copy
- Setting Copy Priority
- Stopping A Virtual Disk Copy
- Recopying A Virtual Disk
- Removing Copy Pairs
- Device Mapper Multipath For Linux
- Configuring Asymmetric Logical Unit Access
- Premium Feature—Remote Replication
- About Asynchronous Remote Replication
- Remote Replicated Pairs And Replication Repositories
- Types Of Remote Replication
- Remote Replication Requirements And Restrictions
- Setting Up Remote Replication
- Activating Remote Replication Premium Features
- Deactivating Remote Replication
- Remote Replication Groups
- Replicated Pairs
- Management Firmware Downloads
- Downloading RAID Controller And NVSRAM Packages
- Downloading Both RAID Controller And NVSRAM Firmware
- Downloading Only NVSRAM Firmware
- Downloading Physical Disk Firmware
- Downloading MD3060e Series Expansion Module EMM Firmware
- Self-Monitoring Analysis And Reporting Technology (SMART)
- Media Errors And Unreadable Sectors
- Firmware Inventory
- System Interfaces
- Storage Array Software
- Start-Up Routine
- Device Health Conditions
- Trace Buffers
- Collecting Physical Disk Data
- Event Log
- Recovery Guru
- Storage Array Profile
- Viewing The Physical Associations
- Recovering From An Unresponsive Storage Array Condition
- Locating A Physical Disk
- Locating An Expansion Enclosure
- Capturing The State Information
- SMrepassist Utility
- Unidentified Devices
- Recovering From An Unidentified Storage Array
- Starting Or Restarting The Host Context Agent Software
- Getting Help

Secure Disk Pools
You can create a secure disk pool from security capable physical disks. The physical disks in a secure disk
pool become security enabled. Read access from and write access to the physical disks is only available
through a RAID controller module that is configured with the correct security key.
CAUTION: Possible loss of data access – When a disk pool is secured, the only way to remove
security is to delete disk pool. Deleting the disk pool deletes all of the data in the virtual disks that
comprise the disk pool.
Whenever the power is turned off and turned on again, all of the security-enabled physical disks change
to Security Locked status. In this status, the data is inaccessible until the correct security key is provided
by a RAID controller module. You can view the Physical Disk Security status of any disk pool in the
storage array from the Disk Pool Properties dialog. The following status information is reported:
• Security Capable
• Secure
The following table provides a description of the security properties status of a disk pool.
Table 6. Security Properties Status of a Disk Pool
Security Capable – Yes Security Capable – No
Secure – Yes The disk pool is composed of all SED
physical disks and is in Secure status.
Not applicable. Only SED physical disks can
be in Secure status.
Secure – No The disk pool is composed of all SED
physical disks and is in Non-Secure
status.
The disk pool is not entirely composed of
SED physical disks.
The Secure Physical Disks option is displayed in the Disk Pool menu. The Secure Physical Disks option is
active if these conditions are true:
• The selected storage array is not security enabled but is comprised entirely of security capable
physical disks.
• The storage array contains no snapshot copy base virtual disks or snapshot repository virtual disks.
• The disk pool is in Optimal status.
• A security key is set up for the storage array.
The Secure Physical Disks option is inactive if the above conditions are not true. The Secure Physical
Disks option is inactive with a check mark to the left if the disk pool is already security enabled.
The Create a secure disk pool option is displayed in the Create Disk Pool - Disk Pool Name and Physical
Disk Selection dialog. The Create a secure disk pool option is active only when the following conditions
are met:
• The Physical Disk Security feature is activated.
• A security key is installed in the storage array.
• At least one security capable physical disk is installed in the storage array.
• All of the physical disks that you selected on the Hardware tab are security capable physical disks.
Changing Capacity On Existing Thin Virtual Disks
If the amount of space used by the host for read/write operations (sometimes called consumed capacity)
exceeds the amount of physical capacity allocated on a standard virtual disk, the storage array cannot
124