User Manual
Table Of Contents
- Dell PowerVault MD 34XX/38XX Series Storage Arrays Administrator's Guide
- Introduction
- About Your MD Series Storage Array
- Physical Disks, Virtual Disks, And Disk Groups
- Disk Pools
- Thin Virtual Disks
- RAID Levels
- Segment Size
- Virtual Disk Operations
- Disk Group Operations
- RAID Background Operations Priority
- Virtual Disk Migration And Disk Roaming
- Advanced Features
- Multi-Path Software
- Load Balancing
- Monitoring System Performance
- Interpreting Performance Monitor Data
- Viewing Real-time Graphical Performance Monitor Data
- Customizing the Performance Monitor Dashboard
- Specifying Performance Metrics
- Viewing Real-time Textual Performance Monitor
- Saving Real-time Textual Performance Data
- Starting and Stopping Background Performance Monitor
- Viewing Information about the Current Background Performance Monitor Session
- Viewing Current Background Performance Monitor Data
- Saving the Current Background Performance Monitor Data
- Viewing Saved Background Performance Monitor Data
- What are invalid objects in the Performance Monitor?
- Discovering And Managing Your Storage Array
- Out-Of-Band Management
- In-Band Management
- Storage Arrays
- Setting Up Your Storage Array
- Locating Storage Arrays
- Naming Or Renaming Storage Arrays
- Setting A Password
- Adding Or Editing A Comment To An Existing Storage Array
- Removing Storage Arrays
- Enabling Premium Features
- Displaying Failover Alert
- Changing The Cache Settings On The Storage Array
- Changing Expansion Enclosure ID Numbers
- Changing The Enclosure Order
- Configuring Alert Notifications
- Battery Settings
- Setting The Storage Array RAID Controller Module Clocks
- Using iSCSI
- Changing The iSCSI Target Authentication
- Entering Mutual Authentication Permissions
- Creating CHAP Secrets
- Changing The iSCSI Target Identification
- Changing The iSCSI Target Discovery Settings
- Configuring The iSCSI Host Ports
- Advanced iSCSI Host Port Settings
- Viewing Or Ending An iSCSI Session
- Viewing iSCSI Statistics And Setting Baseline Statistics
- Edit, Remove, Or Rename Host Topology
- Event Monitor
- About Your Host
- Disk Groups, Standard Virtual Disks, And Thin Virtual Disks
- Creating Disk Groups And Virtual Disks
- Thin Virtual Disks
- Advantages Of Thin Virtual Disks
- Physical Vs Virtual Capacity On A Thin Virtual Disk
- Thin Virtual Disk Requirements And Limitations
- Thin Volume Attributes
- Thin Virtual Disk States
- Comparison—Types Of Virtual Disks And Copy Services
- Rollback On Thin Virtual Disks
- Initializing A Thin Virtual Disk
- Changing A Thin Virtual Disk To A Standard Virtual Disk
- Choosing An Appropriate Physical Disk Type
- Physical Disk Security With Self Encrypting Disk
- Configuring Hot Spare Physical Disks
- Enclosure Loss Protection
- Drawer Loss Protection
- Host-To-Virtual Disk Mapping
- Creating Host-To-Virtual Disk Mappings
- Modifying And Removing Host-To-Virtual Disk Mapping
- Changing Controller Ownership Of The Virtual Disk
- Removing Host-To-Virtual Disk Mapping
- Changing The RAID Controller Module Ownership Of A Disk Group
- Changing The RAID Level Of A Disk Group
- Removing A Host-To-Virtual Disk Mapping Using Linux DMMP
- Restricted Mappings
- Storage Partitioning
- Disk Group And Virtual Disk Expansion
- Disk Group Migration
- Storage Array Media Scan
- Disk Pools And Disk Pool Virtual Disks
- Difference Between Disk Groups And Disk Pools
- Disk Pool Restrictions
- Creating A Disk Pool Manually
- Automatically Managing The Unconfigured Capacity In Disk Pools
- Locating Physical Disks In A Disk Pool
- Renaming A Disk Pool
- Configuring Alert Notifications For A Disk Pool
- Adding Unassigned Physical Disks To A Disk Pool
- Configuring The Preservation Capacity Of A Disk Pool
- Changing The Modification Priority Of A Disk Pool
- Changing The RAID Controller Module Ownership Of A Disk Pool
- Checking Data Consistency
- Deleting A Disk Pool
- Viewing Storage Array Logical Components And Associated Physical Components
- Secure Disk Pools
- Changing Capacity On Existing Thin Virtual Disks
- Creating A Thin Virtual Disk From A Disk Pool
- Using SSD Cache
- How SSD Cache Works
- Benefits Of SSD Cache
- Choosing SSD Cache Parameters
- SSD Cache Restrictions
- Creating An SSD Cache
- Viewing Physical Components Associated With An SSD Cache
- Locating Physical Disks In An SSD Cache
- Adding Physical Disks To An SSD Cache
- Removing Physical Disks From An SSD Cache
- Suspending Or Resuming SSD Caching
- Changing I/O Type In An SSD Cache
- Renaming An SSD Cache
- Deleting An SSD Cache
- Using The Performance Modeling Tool
- Premium Feature—Snapshot Virtual Disk
- Snapshot Virtual Disk Vs. Snapshot Virtual Disk (Legacy)
- Snapshot Images And Groups
- Snapshot Virtual Disk Read/Write Properties
- Snapshot Groups And Consistency Groups
- Understanding Snapshot Repositories
- Creating Snapshot Images
- Scheduling Snapshot Images
- Performing Snapshot Rollbacks
- Creating A Snapshot Group
- Converting A Snapshot Virtual Disk To Read-Write
- Viewing Associated Physical Components Of An Individual Repository Virtual Disk
- Creating A Consistency Group
- Creating A Snapshot Virtual Disk Of A Snapshot Image
- Snapshot Virtual Disk Limitations
- Creating A Snapshot Virtual Disk
- Creating A Snapshot Virtual Disk Repository
- Changing The Settings Of A Snapshot Virtual Disk
- Disabling A Snapshot Virtual Disk Or Consistency Group Snapshot Virtual Disk
- Re-creating A Snapshot Virtual Disk Or Consistency Group Snapshot Virtual Disk
- Renaming A Snapshot Virtual Disk Or Consistency Group Snapshot Virtual Disk
- Deleting A Snapshot Virtual Disk Or Consistency Group Snapshot Virtual Disk
- Creating A Consistency Group Snapshot Virtual Disk
- Creating A Consistency Group Snapshot Virtual Disk Repository (Manually)
- Disabling A Snapshot Virtual Disk Or Consistency Group Snapshot Virtual Disk
- Re-creating A Snapshot Virtual Disk Or Consistency Group Snapshot Virtual Disk
- Changing The Modification Priority Of An Overall Repository Virtual Disk
- Changing The Media Scan Setting Of An Overall Repository Virtual Disk
- Changing The Pre-read Consistency Check Setting Of An Overall Repository Virtual Disk
- Increasing The Capacity Of An Overall Repository
- Decreasing The Capacity Of The Overall Repository
- Performing A Revive Operation
- Premium Feature—Snapshot Virtual Disks (Legacy)
- Scheduling A Snapshot Virtual Disk
- Creating A Snapshot Virtual Disk Using The Simple Path
- Creating A Snapshot Virtual Disk Using The Advanced Path
- Specifying Snapshot Virtual Disk Names
- Snapshot Repository Capacity
- Re-Creating Snapshot Virtual Disks
- Disabling A Snapshot Virtual Disk
- Re-Creating A Snapshot Virtual Disk
- Premium Feature—Virtual Disk Copy
- Using Virtual Disk Copy With Snapshot Or Snapshot (Legacy) Premium Feature
- Types Of Virtual Disk Copies
- Creating A Virtual Disk Copy For An MSCS Shared Disk
- Virtual Disk Read/Write Permissions
- Virtual Disk Copy Restrictions
- Creating A Virtual Disk Copy
- Preferred RAID Controller Module Ownership
- Failed RAID Controller Module
- Copy Manager
- Copying The Virtual Disk
- Storage Array Performance During Virtual Disk Copy
- Setting Copy Priority
- Stopping A Virtual Disk Copy
- Recopying A Virtual Disk
- Removing Copy Pairs
- Device Mapper Multipath For Linux
- Configuring Asymmetric Logical Unit Access
- Premium Feature—Remote Replication
- About Asynchronous Remote Replication
- Remote Replicated Pairs And Replication Repositories
- Types Of Remote Replication
- Remote Replication Requirements And Restrictions
- Setting Up Remote Replication
- Activating Remote Replication Premium Features
- Deactivating Remote Replication
- Remote Replication Groups
- Replicated Pairs
- Management Firmware Downloads
- Downloading RAID Controller And NVSRAM Packages
- Downloading Both RAID Controller And NVSRAM Firmware
- Downloading Only NVSRAM Firmware
- Downloading Physical Disk Firmware
- Downloading MD3060e Series Expansion Module EMM Firmware
- Self-Monitoring Analysis And Reporting Technology (SMART)
- Media Errors And Unreadable Sectors
- Firmware Inventory
- System Interfaces
- Storage Array Software
- Start-Up Routine
- Device Health Conditions
- Trace Buffers
- Collecting Physical Disk Data
- Event Log
- Recovery Guru
- Storage Array Profile
- Viewing The Physical Associations
- Recovering From An Unresponsive Storage Array Condition
- Locating A Physical Disk
- Locating An Expansion Enclosure
- Capturing The State Information
- SMrepassist Utility
- Unidentified Devices
- Recovering From An Unidentified Storage Array
- Starting Or Restarting The Host Context Agent Software
- Getting Help

6
About Your Host
Configuring Host Access
Dell PowerVault Modular Disk Storage Manager (MD Storage Manager) is comprised of multiple modules.
One of these modules is the Host Context Agent, which is installed as part of the MD Storage Manager
installation and runs continuously in the background.
If the Host Context Agent is running on a host, that host and the host ports connected from it to the
storage array are automatically detected by the MD Storage Manager. The host ports are displayed in the
Host Mappings tab in the Array Management Window (AMW). The host must be manually added under
the Default Host Group in the Host Mappings tab.
NOTE: On MD3800i, MD3820i, and MD3860i storage arrays that use the iSCSI protocol, the Host
Context Agent is not dynamic and must be restarted after establishing iSCSI sessions to
automatically detect them.
Use the Define Host Wizard to define the hosts that access the virtual disks in the storage array. Defining
a host is one of the steps required to let the storage array know which hosts are attached to it and to
allow access to the virtual disks. For more information on defining the hosts, see Defining A Host.
To enable the host to write to the storage array, you must map the host to the virtual disk. This mapping
grants a host or a host group access to a particular virtual disk or to a number of virtual disks in a storage
array. You can define the mappings on the Host Mappings tab in the AMW.
On the Summary tab in the AMW, the Host Mappings area indicates how many hosts are configured to
access the storage array. Click Configured Hosts in the Host Mappings area to see the names of the
hosts.
A collection of elements, such as default host groups, hosts, and host ports, are displayed as nodes in the
object tree on the left pane of the Host Mappings tab.
The host topology is reconfigurable. You can perform the following tasks:
• Create a host and assign an alias or user label.
• Add or associate a new host port identifier to a particular host.
• Change the host port identifier alias or user label.
• Move or associate a host port identifier to a different host.
• Replace a host port identifier with a new host port identifier.
• Manually activate an inactive host port so that the port can gain access to host specific or host group
specific LUN mappings.
• Set the host port type to another type.
• Move a host from one host group to another host group.
• Remove a host group, a host, or a host port identifier.
• Rename a host group, or a host.
71