Dell POWERVAULT MD3620I Owner's Manual

Dell POWERVAULT MD3620I Owner's Manual

Storage arrays
Hide thumbs Also See for POWERVAULT MD3620I:
Table of Contents

Advertisement

Dell PowerVault MD3600i and
MD3620i Storage Arrays
Owner's Manual
Regulatory Model: E03J Series and E04J Series
Regulatory Type: E03J001 and E04J001

Advertisement

Table of Contents
loading

Summary of Contents for Dell POWERVAULT MD3620I

  • Page 1 Dell PowerVault MD3600i and MD3620i Storage Arrays Owner’s Manual Regulatory Model: E03J Series and E04J Series Regulatory Type: E03J001 and E04J001...
  • Page 2 Other trademarks and trade names may be used in this publication to refer to either the entities claiming the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own.
  • Page 3: Table Of Contents

    Contents Introduction About This Document Inside the Box of the Dell PowerVault MD3600i Series Storage Array MD3600i Series Storage Array Dell PowerVault Modular Disk Storage Manager Dell PowerVault Modular Disk Configuration Utility Other Information You May Need Planning: About Your Storage Array...
  • Page 4 Planning: RAID Controller Modules RAID Controller Modules RAID Controller Module Connectors and Features RAID Controller Module—Additional Features Battery Backup Unit Storage Array Thermal Shutdown System Password Reset Cache Functions and Features Cache Mirroring Write-Back Cache Write-Through Cache Planning: MD3600i Series Storage Array Terms and Concepts Physical Disks, Virtual Disks, and Disk Groups Physical Disks...
  • Page 5 Media Verification ....Cycle Time ..... Virtual Disk Operations Limit Disk Group Operations .
  • Page 6 Configuration: Overview User Interface Enterprise Management Window Array Management Window Configuration: About Your Storage Array Out-of-Band and In-Band Management Storage Arrays Adding Storage Arrays Setting Up Your Storage Array Locating Storage Arrays Naming or Renaming Storage Arrays Setting a Password Viewing Storage Array Connections Adding/Editing a Comment to an Existing Storage Array...
  • Page 7 Setting the Storage Array RAID Controller Module Clocks Configuration: Using iSCSI Changing the iSCSI Target Authentication Entering Mutual Authentication Permissions Creating CHAP Secrets Initiator CHAP Secret Target CHAP Secret Valid Characters for CHAP Secrets Changing the iSCSI Target Identification Changing the iSCSI Target Discovery Settings Configuring the iSCSI Host Ports Advanced iSCSI Host Ports Settings Viewing or Ending an iSCSI Session...
  • Page 8 Configuration: About Your Host Configuring Host Access Using the Mappings Tab Defining a Host Removing Host Access Managing Host Groups Creating a Host Group Moving a Host to a Different Host Group Removing a Host Group Host Topology Starting or Stopping the Host Context Agent I/O Data Path Protection Managing Host Port Identifiers...
  • Page 9 Choosing an Appropriate Physical Disk Type Physical Disk Security with Self Encrypting Disk ..... Creating a Security Key Changing a Security Key Saving a Security Key Validate Security Key Unlocking Secure Physical Disks...
  • Page 10 Storage Partitioning Disk Group and Virtual Disk Expansion Disk Group Migration Import Disk Group Storage Array Media Scan 11 Configuration: Premium Feature— Snapshot Virtual Disks Scheduling a Snapshot Virtual Disk Creating a Snapshot Virtual Disk Using the Simple Path Contents .
  • Page 11 Creating a Snapshot Virtual Disk Using the Advanced Path About the Advanced Path Preparing Host Servers to Create the Snapshot Using the Advanced Path Creating the Snapshot Using the Advanced Path Specifying Snapshot Virtual Disk Names Snapshot Repository Capacity Disabling a Snapshot Virtual Disk Preparing Host Servers to Re-Create a Snapshot Virtual Disk Re-creating Snapshot Virtual Disks...
  • Page 12 Virtual Disk Read/Write Permissions Virtual Disk Copy Restrictions Creating a Virtual Disk Copy Preferred RAID Controller Module Ownership Failed RAID Controller Module Copy Manager Copying the Virtual Disk Storage Array Performance During Virtual Disk Copy Setting Copy Priority Stopping a Virtual Disk Copy Recopying a Virtual Disk Removing Copy Pairs Contents...
  • Page 13 13 Configuration: Premium Feature— Upgrading to High-Performance-Tier 14 Configuration: Device Mapper Multipath for Linux Overview ......Using DM Multipathing Devices Prerequisites Device Mapper Configuration Steps...
  • Page 14 Media Errors and Unreadable Sectors 16 Management: Installing Array Components Recommended Tools Front Bezel (Optional) Hard Drives RAID Controller Module RAID Controller Module Backup Battery Unit Contents ....
  • Page 15 Power Supply/Cooling Fan Module Removing a Power Supply/Cooling Fan Module Installing a Power Supply/Cooling Fan Module Control Panel ..... . . Removing the Control Panel Installing the Control Panel Backplane...
  • Page 16 Retrieving Trace Buffers Collecting Physical Disk Data Event Log Recovery Guru Storage Array Profile Viewing the Logical Associations Viewing the Physical Associations Finding Nodes Using Go To Recovering From an Unresponsive Storage Array Condition Locating a Physical Disk Locating an Expansion Enclosure Capturing the State Information SMrepassist Utility Unidentified Devices...
  • Page 17 21 Getting Help ..... . Contacting Dell ....
  • Page 18 Index ......Contents...
  • Page 19: Introduction

    About This Document This document familiarizes you with the functions of the Dell PowerVault MD3600i Series storage array. The document is organized according to the tasks that you must complete after receiving your MD3600i Series storage array.
  • Page 20: Md3600I Series Storage Array

    CAT6 or higher Ethernet connection. Dell PowerVault Modular Disk Storage Manager Dell PowerVault Modular Disk Storage Manager (MDSM) is a graphical user interface (GUI) application, used to configure and manage one or more MD3600i Series storage arrays. The MDSM software is available on the MD3600i Series resource media.
  • Page 21: Other Information You May Need

    • Dell PowerVault MD 1200 Series Installation Guide provides information for users who incorporate MD1200 expansion enclosures. The Rack Installation Instructions included with your rack solution •...
  • Page 22 Introduction...
  • Page 23: Planning: About Your Storage Array

    Planning: About Your Storage Array Overview The Dell PowerVault MD3600i Series storage array is designed for high availability, offering redundant access to data storage. It supports single and dual RAID controller configuration. The MD3600i Series storage array provides 1 GBase-T or 10 GBase-T connectivity to the host server and enables access to 64 physical hosts.
  • Page 24: Hardware Features

    Hardware Features Front-Panel Features and Indicators Figure 2-1. Front-Panel Features and Indicators—Dell PowerVault MD3600i Figure 2-2. Front-Panel Features and Indicators—Dell PowerVault MD3620i Planning: About Your Storage Array...
  • Page 25 Figure 2-3. Front-Bezel Features and Indicators Item Indicator, Button, or Connector Enclosure status LED Power LED Icon Description The enclosure status LED lights when the enclosure power is on. Lights blue during normal operation. Blinks blue when a host server is identifying the enclosure or when the system identification button is pressed.
  • Page 26 Item Indicator, Button, or Connector Split mode LED System identification button Hard drives Enclosure mode switch Planning: About Your Storage Array Icon Description This LED must be unlit as the split mode function is not supported by the MD3600i Series storage arrays.
  • Page 27: Back-Panel Features And Indicators

    Back-Panel Features and Indicators Figure 2-4. Back-Panel Features and Indicators—Dell PowerVault MD3600i Series Storage Array 600 W power supply/cooling fan module RAID Controller Module 1 RAID Controller Module 0 600 W power supply/cooling fan module Planning: About Your Storage Array...
  • Page 28: Hard-Drive Indicator Patterns

    Hard-Drive Indicator Patterns Figure 2-5. Hard Drive Indicators hard-drive activity indicator (green) Planning: About Your Storage Array hard-drive status indicator (green and amber)
  • Page 29: Power Supply And Cooling Fan Features

    Hard-Drive Status Indicator Pattern Steady green Green flashing (On 250 ms, Off 250 ms) Physical disk is being identified Green flashing (On 400 ms, Off 100 ms) Physical disk rebuilding Amber flashing (On 150 ms, Off 150 ms) Physical disk failed Flashing green, amber, and Off (green On 500 ms, amber on 500 ms, Off 1000 ms) Flashing green, amber, and Off (green 3 s,...
  • Page 30: Power Indicator Codes And Features

    Power Indicator Codes and Features Figure 2-6. Power Indicator Codes and Features Item LED Type DC power Power supply/cooling fan fault AC power Power connector Power switches (2) Planning: About Your Storage Array Icon Description The LED lights green when the DC output voltage is within the limit.
  • Page 31: Planning: Raid Controller Modules

    Various configurations can be utilized, in both single controller (simplex) and dual controller (duplex) modes, to connect the storage enclosure to hosts depending on specific redundancy needs. For information on cabling, see the MD3600i and MD3620i Series Storage Array’s Deployment Guide at support.dell.com/manuals. Planning: RAID Controller Modules...
  • Page 32: Raid Controller Module Connectors And Features

    Provides a 100/1000 Mbps Ethernet connection for out-of-band management of the enclosure. Dell support only. Lights green when all four links are connected. Lights amber when one to 3 links are disconnected. Off when all links in the port are disconnected or cable is disconnected.
  • Page 33 Item Component Controller power LED Lights green when controller is turned on. Controller fault LED iSCSI IN port activity System identification Cache active or cache offload LED Battery fault Password reset switch MAC address label Management port speed LED Management port activity LED Function Off when controller is not turned on.
  • Page 34: Raid Controller Module-Additional Features

    RAID Controller Module—Additional Features Battery Backup Unit Each RAID controller contains a two-cell Lithium ion nanopolymer battery backup unit (BBU). It provides power to the RAID controller module in the event of a power outage. For information on removing and installing the BBU, see "RAID Controller Module Backup Battery Unit"...
  • Page 35: System Password Reset

    System Password Reset To reset a forgotten password, push and hold down the password reset switch for at least 5 seconds. The password is deleted. See Figure 3-1 to locate the password reset switch. The RAID controller module allows you to change the password. For more information about setting your password, see "Setting a Password"...
  • Page 36: Write-Through Cache

    Write-Through Cache In write-through cache, data is written to the physical disk before completion status is returned to the host operating system. Write-through cache is considered more robust than write-back cache, since a power failure is less likely to cause loss of data. The RAID controller automatically switches to write-through if either cache mirroring is disabled or the battery is missing or there is a fault condition.
  • Page 37: Planning: Md3600I Series Storage

    Array Terms and Concepts This chapter describes the storage array concepts, which help in configuring and operating the Dell PowerVault MD3600i Series storage arrays. Physical Disks, Virtual Disks, and Disk Groups Physical disks in your storage array provide the physical storage capacity for your data.
  • Page 38: Physical Disks

    Physical Disks Only Dell supported 6.0-Gbps SAS physical disks are supported in the storage array. If the storage array detects unsupported physical disks, it marks the disk as unsupported and the physical disk becomes unavailable for all operations. NOTE: The MD3600i Series storage enclosure must contain at least two physical disks for proper operation.
  • Page 39: Self-Monitoring Analysis And Reporting Technology

    Table 4-1. RAID Controller Physical Disk States Status Mode Pending Assigned, Failure Unassigned, Hot Spare in use, or Hot Spare Standby Offline Not applicable The physical disk has either been spun Identify Assigned, Unassigned, Hot Spare in use, or Hot Spare Standby If a disk drive rebuild fails because of a source drive failure or because the drive is too small, the MDSM reports a failure of the physical disk even...
  • Page 40: Virtual Disk States

    3 Provide host server access. 4 Create mappings to associate the virtual disks with the host servers. NOTE: Host server access must be created before mapping virtual disks. Disk groups are always created in the unconfigured capacity of a storage array. Unconfigured capacity is the available physical disk space not already assigned in the storage array.
  • Page 41: Raid Levels

    RAID Levels RAID levels determine the way in which data is written to physical disks. Different RAID levels provide different levels of accessibility, redundancy, and capacity. Using multiple physical disks has the following advantages over using a single physical disk: •...
  • Page 42 I/O performance is greatly improved by spreading the I/O load across many physical disks. Although it offers the best performance of any RAID level, RAID 0 lacks data redundancy. Select this option only for non-critical data, because failure of one physical disk results in the loss of all data. Examples of RAID 0 applications include video editing, image editing, prepress applications, or any application that requires high bandwidth.
  • Page 43: Segment Size

    actual storage. RAID 10 is automatically used when a RAID level of 1 is chosen with four or more physical disks. RAID 10 works well for medium- sized databases or any environment that requires high performance and fault tolerance and moderate-to-medium capacity. Segment Size Disk striping enables data to be written across multiple physical disks.
  • Page 44: Consistency Check

    Foreground Initialization The storage array supports foreground initialization for virtual disks. All access to the virtual disk is blocked during foreground initialization. During foreground initialization, zeros (0x00) are written to every sector of the virtual disk. The virtual disk is available after foreground initialization is completed. Consistency Check A consistency check verifies the correctness of data in a redundant array (RAID levels 1, 5, 6, and 10).
  • Page 45: Virtual Disk Operations Limit

    The storage array tracks the cycle for each disk group independent of other disk groups on the controller and creates a checkpoint. If the media verification operation on a disk group is preempted or blocked by another operation on the disk group, the storage array resumes after the current cycle. If the media verification process on a disk group is stopped due to a RAID controller module restart, the storage array resumes the process from the last checkpoint.
  • Page 46: Segment Size Migration

    Segment Size Migration Segment size refers to the amount of data (in KB) that the storage array writes on a physical disk in a virtual disk before writing data on the next physical disk. Valid values for the segment size are 8 KB, 16 KB, 32 KB, 64 KB, 128 KB, 256 KB, and 512 KB.
  • Page 47: Disk Group Defragmentation

    Disk Group Defragmentation Defragmenting consolidates the free capacity in the disk group into one contiguous area. Defragmentation does not change the way in which the data is stored on the virtual disks. Disk Group Operations Limit The maximum number of active, concurrent disk group processes per installed RAID controller module is one.
  • Page 48: Virtual Disk Migration And Disk Roaming

    • Segment size migration • Disk group expansion • Disk group defragmentation The priority of each of these operations can be changed to address performance requirements of the environment in which the operations are to be executed. NOTE: Setting a high priority level impacts storage array performance. It is not advisable to set priority levels at the maximum level.
  • Page 49 recognize the migrating metadata and that data is lost. In this case, MD3600i storage array initializes the physical disks and marks them as unconfigured capacity. NOTE: Only disk groups and associated virtual disks with all member physical disks present can be migrated from one storage array to another. It is recommended that you only migrate disk groups that have all their associated member virtual disks in an optimal state.
  • Page 50: Disk Roaming

    • Migrating virtual disks to a storage array with no existing physical disks— Turn off the destination storage array, when migrating disk groups or a complete set of physical disks from a storage array to another storage array that has no existing physical disks. After the destination storage array is turned on and has successfully recognized the newly migrated physical disks, migration operations can continue.
  • Page 51: Host Types

    Host Types A host server is a server that accesses a storage array. Host servers are mapped to the virtual disks and use one or more iSCSI initiator ports. Host servers have the following attributes: • Host name—A name that uniquely identifies the host server. •...
  • Page 52: Snapshot Repository Virtual Disk

    This can result in data loss or an inaccessible snapshot. For more information on mapping the snapshot virtual disk to the secondary node, see the Dell PowerVault MD3600i and MD3620i Storage Arrays With Microsoft Windows Server Failover Clusters on support.dell.com/manuals. Virtual Disk Copy Virtual disk copy is a premium feature to: •...
  • Page 53: Virtual Disk Recovery

    • Restore snapshot virtual disk data to the source virtual disk. Virtual disk copy generates a full copy of data from the source virtual disk to the target virtual disk in a storage array and can be performed either online or offline.
  • Page 54: Using Snapshot And Disk Copy Together

    Using Snapshot and Disk Copy Together You can use the Snapshot Virtual Disk and Virtual Disk Copy premium features together to back up data on the same storage array, or to restore the data on the snapshot virtual disk to its original source virtual disk. You can copy data from a virtual disk by: •...
  • Page 55: Virtual Disk Ownership

    controller module owner of a virtual disk after it is created. If a host is connected to only one RAID controller module, the preferred owner must manually be assigned to the RAID controller module that the host can access. Ownership of a virtual disk is moved from the preferred controller to the secondary controller (also called the alternate controller) when the preferred controller is: •...
  • Page 56: Load Balancing

    Load Balancing A load balance policy is used to determine which path is used to process I/O. Multiple options for setting the load balance policies let you optimize I/O performance when mixed host interfaces are configured. You can choose one of these load balance policies to optimize I/O performance: •...
  • Page 57: Monitoring Md3600I Series System Performance

    Monitoring MD3600i Series System Performance You can use the Performance Monitor to select virtual disks and RAID controller modules to monitor or to change the polling interval. Keep the following guidelines in mind when using the Performance Monitor: • The Performance Monitor does not dynamically update its display if any configuration changes occur while the window is open.
  • Page 58 Each time the polling interval elapses, the Performance Monitor queries the storage array again and updates the statistics in the table. 5 Click Start. Values are displayed for the selected storage arrays in the Performance Monitor data table. The table is updated at the interval specified in the Polling Interval setting.
  • Page 59 Table 4-3. Performance Monitor Table Description Column Headings Devices Total IOs Read Percentage Cache Hit Percentage Current KB/second Maximum KB/second Current IO/second Maximum IO/second For more information, see the online help topics. Planning: MD3600i Series Storage Array Terms and Concepts Description Controller, virtual disk or storage array total Cumulative IO’s per second from last start time...
  • Page 60 Planning: MD3600i Series Storage Array Terms and Concepts...
  • Page 61: Configuration: Overview

    Configuration: Overview Dell PowerVault Modular Disk Storage Manager (MDSM) online help contains information on how to use the MDSM application to perform the configuration and management tasks described in this document. You can access online help by clicking Help located at the top right corner of MDSM interface.
  • Page 62: Enterprise Management Window

    Enterprise Management Window The EMW provides high-level management of storage arrays. When you start MDSM, the EMW is displayed. The EMW has the: Devices tab—Provides information about the storage arrays. • • Setup tab—Presents the initial setup tasks that guide you through adding storage arrays and configuring alerts.
  • Page 63: Array Management Window

    • Obtain information about the firmware inventory including the version of the RAID controller modules, physical disks, and the enclosure management modules (EMMs) in the storage array. Inheriting the System Settings Use the Inherit System Settings option to import the operating system theme settings into the MDSM.
  • Page 64 • Disk groups and virtual disks • Logical tab—You can view the organization of the storage array by virtual disks, disk groups, free capacity nodes, and any unconfigured capacity for the storage array. Physical tab—You can view the organization of the storage array by RAID •...
  • Page 65 Configuration: Overview...
  • Page 66 Configuration: Overview...
  • Page 67: Configuration: About Your Storage Array

    Configuration: About Your Storage Array Out-of-Band and In-Band Management You can manage a storage array in two ways: • Out-of-band management • In-band management Out-of-Band Management In the out-of-band management method, data is separate from commands and events. Data travels through the host-to-controller interface, while commands and events travel through the management port Ethernet cables.
  • Page 68: Storage Arrays

    You must add the storage arrays to MDSM before you can set up the storage array for optimal use. Adding Storage Arrays You can add storage arrays only in the EMW. You can: • Automatically discover storage arrays. • Manually add storage arrays. Configuration: About Your Storage Array at support.dell.com/manuals.
  • Page 69 NOTE: Verify that your host or management station network configuration— including station IP address, subnet mask, and default gateway—is correct before adding a new storage array using the Automatic option. NOTE: For Linux, set the default gateway so that broadcast packets are sent to 255.255.255.0.
  • Page 70: Setting Up Your Storage Array

    • In-band management—Enter a name or an IP address for the Host through which the storage array is attached to the network. NOTE: When adding a storage array using in-band management with iSCSI, a session must first be established between the initiator on the host server and the storage array.
  • Page 71 • Configure iSCSI host ports—Configure network parameters for each iSCSI host port automatically or specify the configuration information for each iSCSI host port. • Configure the storage array—Create disk groups, virtual disks, and hot spare physical disks by using the Automatic configuration method or the Manual configuration method.
  • Page 72: Locating Storage Arrays

    Locating Storage Arrays You can use the Blink option to physically locate and identify a storage array. NOTE: If the LEDs from the Blink Storage Array operation do not stop blinking, select Stop All Indications to stop the process manually. To locate the storage array: 1 Select the relevant storage array and: •...
  • Page 73: Setting A Password

    The Name/Rename Storage Arrays dialog is displayed. 2 Select the relevant storage array from the Select storage array table. If you do not know the name or physical location of the storage array, click Blink. After locating the storage array, click OK to turn off the LEDs. The name of the storage array is displayed in the Storage array name.
  • Page 74 • Select the Setup tab, and then click Set a Storage Array Password. • In the AMW, select the Logical tab, right-click and select Set Password. The Set Password dialog is displayed. 3 If you are resetting the password, type the Current password. NOTE: If you are setting the password for the first time, leave the Current password blank.
  • Page 75: Viewing Storage Array Connections

    Viewing Storage Array Connections You can use the View Connections option to view the expansion enclosures connected to the RAID controller module. To view the storage array connections: 1 From the toolbar in AMW, select Storage Array View Connections. The <Storage Array>:Connections dialog is displayed. 2 Click the column name to sort the connections according to your preference.
  • Page 76: Removing Storage Arrays

    Removing Storage Arrays You can remove a storage array from the list of managed arrays if you no longer want to manage it from a specific storage management station. Removing a storage array does not affect the storage array or its data in any way.
  • Page 77: Displaying Failover Alert

    Displaying Failover Alert You can change the failover alert delay for a storage array. The failover alert delay lets you delay the logging of a critical event if the multi-path driver transfers virtual disks to the non-preferred controller. If the multi-path driver transfers the virtual disks back to the preferred controller within the specified delay period, a critical event is not logged.
  • Page 78: Changing Expansion Enclosure Id Numbers

    Changing Expansion Enclosure ID Numbers When an MD1200 series expansion enclosure is connected to an MD3600i Series storage array for the first time, an enclosure ID number is assigned and maintained by the expansion enclosure. This enclosure ID number is also shown in the MDSM and can be changed if required.
  • Page 79: Configuring Alert Notifications

    Configuring Alert Notifications MDSM can send an alert for any condition on the storage array that requires your attention. Alerts can be sent as e-mail messages or as Simple Network Management Protocol (SNMP) trap messages. You can configure alert notifications either for all the storage arrays or a single storage array.
  • Page 80 • All storage arrays—Select this option to send an e-mail alert about events on all storage arrays. • An individual storage array—Select this option to send an e-mail alert about events that occur on only a specified storage array. These results occur, depending on your selection: •...
  • Page 81 • Validating an e-mail address—Type the e-mail address in Email address or select the e-mail address in the Configured email addresses area, and click Test. A test e-mail is sent to the selected e-mail address. A dialog with the results of the test and any error is displayed. 8 For the selected e-mail address, in Information To Send, select: •...
  • Page 82: Configuring Snmp Alerts

    “public”. The trap destination is the IP address or the host name of a computer running an SNMP management application. An example of an SNMP enabled management application is the Dell Management Console. For more information on Dell Management Console, see dell.com.
  • Page 83: Battery Settings

    Configured SNMP addresses area. • The SNMP Community Name is determined by the system administrator and configured within the management application, such as the Dell Management Console. More information about the Dell Management Console is available at dell.com. •...
  • Page 84: Setting The Storage Array Raid Controller Module Clocks

    A learn cycle starts automatically when you install a new battery module. Learn cycles for batteries in both RAID controller modules in a duplex system occur simultaneously. Learn cycles are scheduled to start automatically at regular intervals, at the same time and on the same day of the week. The interval between cycles is described in weeks.
  • Page 85 1 In the AMW, select Storage Array Synchronize RAID Controller Module Clocks. 2 If a password is set, in the Enter Password dialog, type the current password for the storage array, and click Synchronize. The RAID controller module clocks are synchronized with the storage management station.
  • Page 86 Configuration: About Your Storage Array...
  • Page 87: Configuration: Using Iscsi

    Configuration: Using iSCSI Changing the iSCSI Target Authentication 1 In the AMW, select the Setup tab. 2 Select Manage iSCSI Settings. The Manage iSCSI Settings window is displayed and by default, the Target Authentication tab is selected. To change the authentication settings, select: •...
  • Page 88: Entering Mutual Authentication Permissions

    Entering Mutual Authentication Permissions Mutual authentication or two-way authentication enables a client or a user to verify themselves to a host server and for the host server to validate itself to the user. This validation is accomplished in such a way that both parties are sure of the other’s identity.
  • Page 89: Initiator Chap Secret

    Initiator CHAP Secret The initiator CHAP secret is set on the host using the iSCSI initiator configuration program provided with the host operating system. If you are using the mutual authentication method, you must define the initiator CHAP secret when you set up the host. This must be the same CHAP secret that is defined for the target when defining mutual authentication settings.
  • Page 90: Changing The Iscsi Target Identification

    Changing the iSCSI Target Identification You cannot change the iSCSI target name, but you can associate an alias with the target for simpler identification. Aliases are useful because the iSCSI target names are not intuitive. Provide an iSCSI target alias that is meaningful and easy to remember.
  • Page 91: Configuring The Iscsi Host Ports

    • Select Specify Configuration, and type the IPv4 address to activate the target discovery. • Type the iSNS server IP address in the IPv6 settings area to activate the target discovery. After you manually enter an IP address, you can also click Advanced to configure the customized TCP listening ports.
  • Page 92 4 In the Configured Ethernet port speed list, select a network speed for the iSCSI host port. The network speed values in the Configured Ethernet port speed list depend on the maximum speed that the network can support. Only the network speeds that are supported are displayed.
  • Page 93: Advanced Iscsi Host Ports Settings

    Advanced iSCSI Host Ports Settings NOTE: Configuring the advanced iSCSI host ports settings is optional. Use the advanced settings for the individual iSCSI host ports to specify the TCP frame size, the virtual LAN, and the network priority. Table 7-2. Advanced iSCSI Host Port Settings Setting Description Virtual LAN (VLAN) A method of creating independent logical networks within a...
  • Page 94: Viewing Or Ending An Iscsi Session

    Viewing or Ending an iSCSI Session You may want to end an iSCSI session for the following reasons: • Unauthorized access—If an initiator whom you consider to not have access is logged on, you can end the iSCSI session. Ending the iSCSI session forces the initiator to log off the storage array.
  • Page 95: Viewing Iscsi Statistics And Setting Baseline Statistics

    Viewing iSCSI Statistics and Setting Baseline Statistics To view iSCSI statistics and set baseline statistics: 1 In the AMW toolbar, select Storage Array iSCSI Statistics. The View iSCSI Statistics window is displayed. 2 Select the iSCSI statistic type you want to view in the iSCSI Statistics Type area.
  • Page 96: Edit, Remove, Or Rename Host Topology

    Edit, Remove, or Rename Host Topology If you give access to the wrong host or the wrong host group, you can remove or edit the host topology. Follow the appropriate procedures given in Table 7-3 to correct the host topology: Table 7-3.
  • Page 97: Configuration: Event Monitor

    Configuration: Event Monitor An event monitor is provided with Dell PowerVault Modular Disk Storage Manager (MDSM). The event monitor runs continuously in the background and monitors activity on the managed storage arrays. If the event monitor detects any critical problems, it can notify a host or remote system using e- mail, Simple Network Management Protocol (SNMP) trap messages, or both.
  • Page 98: Enabling Or Disabling The Event Monitor

    Enabling or Disabling the Event Monitor You can enable or disable the event monitor at any time. Disable the event monitor if you do not want the system to send alert notifications. If you are running the event monitor on multiple systems, disabling the event monitor on all but one system prevents the sending of duplicate messages.
  • Page 99: Configuration: About Your Host

    Configuration: About Your Host Configuring Host Access Dell PowerVault Modular Disk Storage Manager (MDSM) software is comprised of multiple modules. One of these modules is the Host Context Agent, which is installed as part of the MDSM installation and runs continuously in the background.
  • Page 100: Using The Mappings Tab

    The host topology is reconfigurable. You can perform the following tasks: • Create a host and assign an alias or user label. • Add or associate a new host port identifier to a particular host. • Change the host port identifier alias or user label. •...
  • Page 101: Defining A Host

    Defining a Host You can use the Define Host Wizard in the AMW to define a host for a storage array. Either a known unassociated host port identifier or a new host port identifier can be added. NOTE: A user label must be specified before the host port identifier may be added (the add button is disabled until one is entered).
  • Page 102: Removing Host Access

    The Specify Host Type window is displayed. 7 In Host type, select the relevant operating system for the host. The Host Group Question window is displayed. 8 In this window, you can select: • Yes—this host shares access to the same virtual disks with other hosts. •...
  • Page 103: Managing Host Groups

    Managing Host Groups A host group is a logical entity of two or more hosts that share access to specific virtual disks on the storage array. You create host groups with MDSM. All hosts in a host group must have the same host type (operating system). In addition, all hosts in the host group must have special software, such as clustering software, to manage virtual disk sharing and accessibility.
  • Page 104: Moving A Host To A Different Host Group

    Removing a Host From a Host Group You can remove a host from the Topology pane on the Mappings tab of the Array Management Window. For more information, see "Removing a Host Group" on page 105. Moving a Host to a Different Host Group To move a host to a different host group: 1 In the AMW, select the Mappings tab, select the host node in the Topology pane.
  • Page 105: Removing A Host Group

    Removing a Host Group To remove a host group: 1 In the AMW, select the Mappings tab, select the host node in the Topology pane. 2 Perform one of these actions: • Select Mappings Remove. • Right-click the host node, and select Remove from the pop-up menu. The Remove dialog is displayed.
  • Page 106: Starting Or Stopping The Host Context Agent

    Starting or Stopping the Host Context Agent The host context agent discovers the host topology and starts and stops with the host. The topology discovered by the Host Context Agent can be viewed by clicking Configure Host Access (Automatic) in the Configure tab in the MDSM.
  • Page 107: I/O Data Path Protection

    I/O Data Path Protection You can have multiple host-to-array connections for a host. Ensure that you select all the connections to the array when configuring host access to the storage array. NOTE: See the Deployment Guide for more information on cabling configurations. NOTE: For more information on configuring hosts see "Configuration: About Your Host"...
  • Page 108: Managing Host Port Identifiers

    Managing Host Port Identifiers You can manage the host port identifiers that are added to the storage array. You can: • Add—Add or associate a new host port identifier to a particular host. • Edit—Change the host port identifier alias or user label. You can move (associate) the host port identifier to a new host.
  • Page 109 5 Select the method to add a host port identifier to the host. You can select: • Add by selecting a known unassociated host port identifier—Select the appropriate host port identifier from the existing list of Known unassociated host port identifiers. Add by creating a new host port identifier—In New host port •...
  • Page 110 Configuration: About Your Host...
  • Page 111: Configuration: Disk Groups And Virtual Disks

    Configuration: Disk Groups and Virtual Disks Creating Disk Groups and Virtual Disks Disk groups are created in the unconfigured capacity of a storage array, and virtual disks are created in the free capacity of a disk group. The maximum number of physical disks supported in a disk group is 30. The hosts attached to the storage array read and write data to the virtual disks.
  • Page 112: Creating Disk Groups

    A disk group must be organized according to its related tasks and subtasks. For example, if you create a disk group for the Accounting Department, you can create virtual disks that match the different types of accounting transactions performed in the department: Accounts Receivable (AR), Accounts Payable (AP), internal billing, and so forth.
  • Page 113 3 Type the name of the disk group (up to 30 characters) in Disk group name. 4 Select the appropriate Physical Disk selection choices, you can select: Automatic, see step • Manual, see step • 5 Click Next. For automatic configuration, the RAID Level and Capacity window is displayed.
  • Page 114: Locating A Disk Group

    Locating a Disk Group You can physically locate and identify all of the physical disks that comprise a selected disk group. An LED blinks on each physical disk in the disk group. To locate a disk group: 1 In the AMW, select the Logical tab. 2 Select the appropriate disk group and from the toolbar select Disk Group...
  • Page 115 NOTE: Ensure that you create disk groups before creating virtual disks. To create virtual disks: 1 Choose one of these methods to start the Create Virtual Disk Wizard: • To create a virtual disk from unconfigured capacity in the storage array—On the Logical tab, select an Unconfigured Capacity node, and select Virtual Disk...
  • Page 116: Changing The Virtual Disk Modification Priority

    5 In Advanced virtual disk parameters, you can select: • Use recommended settings. Customize settings. • 6 If you select Use recommended settings in Advanced virtual disk parameters, click Finish. Otherwise, click Next. 7 In the Customize Advanced Virtual Disk Parameters window, select the appropriate Virtual Disk I/O characteristics type.
  • Page 117: Changing The Virtual Disk Cache Settings

    4 Select one or more virtual disks. Move the Select modification priority slider bar to the desired priority. NOTE: To select nonadjacent virtual disks, press <Ctrl> click. To select adjacent virtual disks, press <Shift> click. To select all of the available virtual disks, click Select All.
  • Page 118 To select nonadjacent virtual disks, press <Ctrl> click. To select adjacent virtual disks, press <Shift> click. To select all of the available virtual disks, click Select All. 4 In the Select cache properties area, you can select: • Enable read caching—to enable read caching. •...
  • Page 119: Changing The Segment Size Of A Virtual Disk

    Changing the Segment Size of a Virtual Disk You can change the segment size on a selected virtual disk. During this operation, I/O performance is affected, but your data remains available. Guidelines to proceed with changing the segment size: • You cannot cancel this operation after it starts.
  • Page 120: Changing The I/O Type

    The segment size modification operation begins. The virtual disk icon in the Logical pane shows an Operation in Progress status while the operation is taking place. NOTE: To view the progress or change the priority of the modification operation, select a virtual disk in the disk group, and select Virtual Disk Change Modification Priority.
  • Page 121: Choosing An Appropriate Physical Disk Type

    The corresponding dynamic cache read prefetch setting and segment size values that are typically well suited for the selected virtual disk I/O characteristic type are populated in the Dynamic cache read prefetch field and the Segment size field. NOTE: If you selected the Custom option, select your preferred dynamic cache read prefetch setting (enabled/disabled) and segment size (8 KB to 512 KB).
  • Page 122 the physical disks and RAID controller modules in a storage array share the same security key. The shared security key provides read and write access to the physical disks, while the physical disk encryption key on each physical disk is used to encrypt the data. A security capable physical disk works like any other physical disk until it is security enabled.
  • Page 123 • Save Security Key File • Validate Security Key • Unlock Drives NOTE: If you have not created a security key for the storage array, the Create Security Key option is active. If you have created a security key for the storage array, the Create Security Key option is inactive with a check mark to the left.
  • Page 124: Creating A Security Key

    The storage array password protects a storage array from potentially destructive operations by unauthorized users. The storage array password is independent from self encrypting disk and must not be confused with the pass phrase that is used to protect copies of a security key. It is recommended that you set a storage array password.
  • Page 125 4 In New password, enter a string for the storage array password. If you are creating the storage array password for the first time, leave Current password blank. Follow these guidelines for cryptographic strength when you create the storage array password: •...
  • Page 126: Changing A Security Key

    The pass phrase that you enter is masked. NOTE: Create Key is active only if the pass phrase meets the above mentioned criterion. 9 In the Confirm pass phrase dialog box, re-enter the exact string that you entered in the Pass phrase dialog box. Make a record of the pass phrase that you entered and the security key identifier that is associated with the pass phrase.
  • Page 127 for storage on other media. When you change a security key, you also provide information to create a security key identifier. Changing the security key does not destroy any data. You can change the security key at any time. Before you change the security key, ensure that: •...
  • Page 128: Saving A Security Key

    6 In Confirm pass phrase, re-enter the exact string you entered in Pass phrase. Make a record of the pass phrase you entered and the security key identifier it is associated with. You need this information for later secure operations. 7 Click Change Key.
  • Page 129: Validate Security Key

    4 In Confirm pass phrase, re-enter the exact string you entered in Pass phrase. Make a record of the pass phrase you entered. You need it for later secure operations. 5 Click Save. 6 Make a record of the security key identifier and the file name from the Save Security Key Complete dialog and click OK.
  • Page 130: Erasing Secure Physical Disks

    Erasing Secure Physical Disks In the AMW, when you select a security enabled physical disk that is not part of a disk group, the Secure Erase menu item is enabled on the Physical Disk menu. You can use the secure erase procedure to re-provision a physical disk. You can use the Secure Erase option if you want to remove all of the data on the physical disk and reset the physical disk security attributes.
  • Page 131 • The availability of enclosure loss protection for a disk group depends on the location of the physical disks that comprise the disk group. To make sure that enclosure loss protection is not affected, you must replace a failed physical disk to initiate the copyback process. See "Enclosure Loss Protection"...
  • Page 132: Hot Spares And Rebuild

    8 Select the relevant physical disks in the Unassigned physical disks area, as hot spares for the selected disk and click OK. 9 To unassign hot spares, in the Hot Spare Coverage window, select the physical disks in the Hot spare physical disks area. 10 Review the information about the hot spare coverage in the Details area.
  • Page 133: Hot Spare Operation

    Hot Spare Operation When a physical disk fails, the virtual disk automatically rebuilds using an available hot spare. When a replacement physical disk is installed, data from the hot spare is copied back to the replacement physical disk. This function is called copy back.
  • Page 134: Enclosure Loss Protection

    spare physical disk. To make sure that enclosure loss protection is not affected, you must replace a failed physical disk to initiate the copyback process. The virtual disk remains online and accessible while you are replacing the failed physical disk, because the hot spare physical disk is automatically substituted for the failed physical disk.
  • Page 135: Host-To-Virtual Disk Mapping

    Table 10-2. Criteria for Enclosure Loss Protection RAID Level Criteria for Enclosure Loss Protection RAID level 1 Ensure that each physical disk in a mirrored pair is located in a different expansion enclosure. This enables you to have more than two physical disks in the disk group within the same expansion enclosure.
  • Page 136: Creating Host-To-Virtual Disk Mappings

    • Each host has its own LUN address space. MDSM permits the same LUN to be used by different hosts or host groups to access virtual disks in a storage array. • Not every operating system has the same number of LUNs available. You can define the mappings on the Mappings tab in the AMW.
  • Page 137: Modifying And Removing Host-To-Virtual Disk Mapping

    4 In Host group or host, select the appropriate host group or host. All defined hosts, host groups, and the default group are displayed in the list. NOTE: When configuring an iSCSI storage array, including the MD3600i or MD3620i, if a host or a host group is selected that does not have a SAS host bus adapter (SAS HBA) host port defined, a warning dialog is displayed.
  • Page 138: Changing Controller Ownership Of The Virtual Disk

    • Select a single virtual disk, and select Mappings Change Mapping. • Right-click the virtual disk, and select Change Mapping from the pop-up menu. 3 In Host group or host, select the appropriate host group or host. By default, the drop-down list shows the current host group or the host associated with the selected virtual disk.
  • Page 139: Removing Host-To-Virtual Disk Mapping

    associated source virtual disk. Changing the RAID controller module ownership of a virtual disk changes the preferred RAID controller module ownership of the virtual disk. During a virtual disk copy, the same RAID controller module must own both the source virtual disk and the target virtual disk. Sometimes both virtual disks do not have the same preferred RAID controller module when the virtual disk copy starts.
  • Page 140 You can change the RAID controller module ownership of a standard virtual disk or a snapshot repository virtual disk. You cannot directly change the RAID controller module ownership of a snapshot virtual disk because the snapshot virtual disk inherits the RAID controller module owner of its associated source virtual disk.
  • Page 141: Changing The Raid Level Of A Disk Group

    2 Run the following command to display multi-pathing topology: # multipath -ll Note the virtual disk that you want to delete from the mapping. For example, the following information may be displayed: mpath6 (3600a0b80000fb6e50000000e487b02f5) dm-10 DELL, MD32xx Configuration: Disk Groups and Virtual Disks...
  • Page 142 [size=1.6T][features=3 queue_if_no_path pg_init_retries 50][hwhandler=1 rdac] \_ round-robin 0 [prio=6][active] \_ 1:0:0:2 sdf 8:80 [active][ready] \_ round-robin 0 [prio=1][enabled] \_ 0:0:0:2 sde 8:64 [active][ghost] In this example, the mpath6 device contains two paths: -- /dev/sdf at Host 1, Channel 0, Target 0, LUN 2 --/dev/sde at Host 0, Channel 0, Target 0, LUN 2 3 Flush the multi-pathing device mapping using the following command # multipath -f /dev/mapper/mapth_x...
  • Page 143: Restricted Mappings

    • If a new LUN is mapped, the new LUN is detected and given a multi- pathing device node • If you increased volume capacity, the new capacity is displayed. Restricted Mappings Many hosts are able to map up to 256 LUNs (0 to 255) per storage partition. However, the maximum number of mappings differs because of operating system variables, failover driver issues, and potential data problems.
  • Page 144: Changing The Raid Controller Module Ownership Of A Virtual Disk Or A Disk Group

    • If there is a host with a restricted host type that is part of a specific storage partition, all of the hosts in that storage partition are limited to the maximum number of LUNs allowed by the restricted host type. •...
  • Page 145 disk copy, ownership of the target virtual disk is also changed. Under certain operating system environments, it may be necessary to reconfigure the multi- path driver before an I/O path can be used. 1 To change: The RAID controller module ownership of a virtual disk—Go to step 2.
  • Page 146: Changing The Raid Level Of A Disk Group

    CAUTION: Possible loss of data access—Changing ownership at the disk group level causes every virtual disk in that disk group to transfer to the other RAID controller module and use the new I/O path. If you do not want to set every virtual disk to the new path, change ownership at the virtual disk level instead.
  • Page 147: Storage Partitioning

    Storage Partitioning A storage partition is a logical entity consisting of one or more virtual disks that can be accessed by a single host or shared among hosts that are part of a host group. The first time you map a virtual disk to a specific host or host group, a storage partition is created.
  • Page 148: Disk Group And Virtual Disk Expansion

    • All mappings are defined. NOTE: You can include a secondary virtual disk in a storage partition. However, any hosts that are mapped to the secondary virtual disk has read- only access until the virtual disk is promoted to a primary virtual disk, or the mirror relationship is removed.
  • Page 149: Virtual Disk Expansion

    NOTE: You cannot mix different media types or different interface types within a single disk group or virtual disk. 5 Click Add. A message prompts you to confirm your selection. 6 To add the capacity to the disk group, click Yes. You can also use the Command Line Interface (CLI) on both Windows and Linux hosts to add free capacity to a disk group.
  • Page 150: Disk Group Migration

    capacity, in the form of unassigned physical disks to the disk group of the standard virtual disk or the snapshot repository virtual disk. See "Disk Group Expansion" on page 148. For more information, see the PowerVault Modular Disk Storage Manager online help topics.
  • Page 151: Exporting A Disk Group

    Exporting a Disk Group On the source storage array: 1 Save the storage array configuration. 2 Stop all I/O and unmount or disconnect the file systems on the virtual disks in the disk group. 3 Back up the data on the virtual disks in the disk group. 4 Locate the disk group and label the physical disks.
  • Page 152: Storage Array Media Scan

    2 Review the Import Report for an overview of the disk group that you are importing. 3 Check for non-importable components. 4 Confirm that you want to proceed with the import procedure. NOTE: Some settings cannot be imported during the import disk group procedure.
  • Page 153: Changing Media Scan Settings

    error is reported to the event log. For virtual disks without redundancy protection (RAID level 1, RAID level 5, and RAID level 6 virtual disks), the error is not corrected but is reported to the event log. • Recovered media error—Data could not be read by the physical disk on the first attempt but was successfully read on a subsequent attempt.
  • Page 154: Suspending The Media Scan

    NOTE: A consistency check scans the data blocks in a RAID level 5 virtual disk, or a RAID level 6 virtual disk and checks the consistency information for each block. A consistency check compares data blocks on RAID level 1 mirrored physical disks.
  • Page 155: Configuration: Premium Feature

    If you ordered this feature, you received a Premium Feature Activation card shipped in the same box as your Dell PowerVault MD storage array. Follow the directions on the card to obtain a key file and to enable the feature.
  • Page 156 repository uses less disk space than a full physical copy, because the only data blocks that are stored in the snapshot repository virtual disk are those that have changed since the time of the snapshot. Source Virtual Disk When you create a snapshot virtual disk, specify its location, capacity, schedule, and other parameters.
  • Page 157: Scheduling A Snapshot Virtual Disk

    Scheduling a Snapshot Virtual Disk When you create a snapshot virtual disk, you can choose whether the snapshot is created immediately or is created according to a schedule that you determine. This schedule can be a one-time snapshot creation or an ongoing snapshot creation that occurs at regularly occurring intervals.
  • Page 158: Guidelines For Creating Snapshot Schedules

    For more information on creating snapshot virtual disk schedules, see the following sections on creating snapshots. Guidelines for Creating Snapshot Schedules Certain guidelines apply when creating snapshot virtual disk schedules: • Scheduled virtual disk snapshot operations do not occur if: –...
  • Page 159: Creating A Snapshot Virtual Disk Using The Simple Path

    For more information on scheduling snapshots virtual disks, see the PowerVault Modular Disk Storage Manager online help topics and the CLI Guide. Creating a Snapshot Virtual Disk Using the Simple Path You can choose the simple path to create a snapshot virtual disk if the disk group of the source virtual disk has the required amount of free space.
  • Page 160: Preparing Host Servers To Create The Snapshot Using The Simple Path

    NOTE: For more information on mapping the snapshot virtual disk to the secondary node, see the Dell PowerVault MD3600i and MD3620i Storage Arrays With Microsoft Windows Server Failover Clusters at support.dell.com/manuals. NOTE: You can create concurrent snapshots of a source virtual disk on both the source disk group and on another disk group.
  • Page 161 • You cannot create a snapshot of a virtual disk that contains unreadable sectors. • You must satisfy the requirements of your host operating system for creating snapshot virtual disks. Failure to meet the requirements of your host operating system results in an inaccurate snapshot of the source virtual disk or the target virtual disk in a virtual disk copy.
  • Page 162: Creating A Snapshot Virtual Disk Using The Advanced Path

    8 Enter the snapshot repository virtual disks capacity as a percentage of the source virtual disks capacity and click Next. The Preview window containing the summary of the snapshot virtual disk is displayed. 9 Click Finish. The Completed window is displayed. 10 Click OK.
  • Page 163 • Snapshot Virtual Disk Name—A user-specified name that helps you associate the snapshot virtual disk to its corresponding snapshot repository virtual disk and source virtual disk. • Snapshot Repository Virtual Disk Name—A user-specified name that helps you associate the snapshot repository virtual disk to its corresponding snapshot virtual disk and source virtual disk.
  • Page 164: Preparing Host Servers To Create The Snapshot Using The Advanced Path

    NOTE: For more information on mapping the snapshot virtual disk to the secondary node, see the Dell PowerVault MD3600i and MD3620i Storage Arrays With Microsoft Windows Server Failover Clusters at support.dell.com/manuals. The destination of a snapshot repository virtual disk is determined based on the free capacity available in the disk group.
  • Page 165 • You cannot create a snapshot of a virtual disk that contains unreadable sectors. • You must satisfy the requirements of your host operating system for creating snapshot virtual disks. Failure to meet the requirements of your host operating system results in an inaccurate snapshot of the source virtual disk or the target virtual disk in a virtual disk copy.
  • Page 166: Creating The Snapshot Using The Advanced Path

    If you want to use a snapshot regularly, such as for backups, use the Disable Snapshot and Re-create Snapshot options to reuse the snapshot. Disabling and re-creating snapshots preserves the existing virtual disk-to-host mappings to the snapshot virtual disk. Creating the Snapshot Using the Advanced Path NOTE: Removing the drive letter of the associated virtual disk in Windows or unmounting the virtual drive in Linux helps to guarantee a stable copy of the drive...
  • Page 167: Specifying Snapshot Virtual Disk Names

    8 In the Snapshot virtual disk parameters area, select the relevant mapping option, you can select: • Automatic • Map later 9 In the Snapshot repository virtual disk parameters area, enter the system behavior when: • The snapshot repository virtual disk is full to the selected percentage level.
  • Page 168 The default name for the associated snapshot repository virtual disk that is shown in the Snapshot repository virtual disk field is: <source-virtual disk-name>—R<sequence-number> For example, if you are creating the first snapshot virtual disk for a source virtual disk called Accounting, the default snapshot virtual disk is Accounting-1, and the associated snapshot repository virtual disk default name is Accounting-R1.
  • Page 169: Snapshot Repository Capacity

    Snapshot Repository Capacity If you receive a warning that the capacity for the snapshot repository virtual disk is approaching its threshold, you can increase the capacity of a snapshot repository virtual disk by using one of the following methods: • Use the free capacity available on the disk group of the snapshot repository virtual disk.
  • Page 170 free capacity is available, the maximum free space is displayed in the Increase capacity by field. If free capacity does not exist on the disk group, the free space that is displayed in the Increase capacity by spinner box is 0. You must add physical disks to create free capacity on the disk group.
  • Page 171 NOTE: The physical disks that are displayed have a capacity that is either the same size or larger than the capacity of the physical disks already being used by the disk group. 9 Select either a single physical disk to add or two physical disks to add. 10 Click Add.
  • Page 172: Disabling A Snapshot Virtual Disk

    Disabling a Snapshot Virtual Disk Disable a snapshot virtual disk if one of the following conditions exists: • You do not need the snapshot now. • You intend to re-create the snapshot at a later time and want to retain the associated snapshot repository virtual disk so that you do not need to create it again.
  • Page 173: Re-Creating Snapshot Virtual Disks

    Before re-creating a snapshot virtual disk, both the host server and the associated virtual disk you are re-creating have to be in the proper state. To prepare your host server and virtual disk: 1 Stop all I/O activity to the source and snapshot virtual disk (if mounted). 2 Using your Windows system, flush the cache to both the source and the snapshot virtual disk (if mounted).
  • Page 174: Snapshot Rollback

    NOTE: Failing to follow these additional instructions could create unusable snapshot virtual disks. For more information, see the PowerVault Modular Disk Storage Manager online help topics. • To use this option, the snapshot virtual disk must be either in an Optimal status or Disabled status.
  • Page 175 • Rolling back a base virtual disk to a snapshot virtual disk does not affect the contents of the snapshot virtual disks. • Only one snapshot rollback operation can be performed at a time. • While a base virtual disk that is undergoing a rollback, you cannot create a new snapshot virtual disks from that base virtual disk.
  • Page 176: Protecting Against A Failed Snapshot Rollback

    Protecting Against a Failed Snapshot Rollback To protect your base virtual disk data, it is recommended that you create a new snapshot virtual disk from the base virtual disk before beginning a rollback operation. If the snapshot rollback fails, use this new snapshot virtual disk to restore your base virtual disk.
  • Page 177: Resuming A Snapshot Rollback

    Resuming a Snapshot Rollback If an error occurs during the snapshot rollback and the operation is paused, you can resume the rollback using the following steps: 1 In the AMW, select the Logical tab. 2 Choose one: • Select the snapshot virtual disk, and select Virtual Disk Snapshot Resume Rollback.
  • Page 178 Configuration: Premium Feature—Snapshot Virtual Disks...
  • Page 179: Configuration: Premium Feature

    If you ordered this feature, you received a Premium Feature Activation card that shipped in the same box as your Dell PowerVault MD storage array. Follow the directions on the card to obtain a key file and to enable the feature.
  • Page 180: Types Of Virtual Disk Copies

    Reasons to use virtual disk copy include: • Copying data for improved access—As your storage requirements for a virtual disk change, you can use a virtual disk copy to copy data to a virtual disk in a disk group that uses drives with larger capacity within the same storage array.
  • Page 181: Online Copy

    formatted with a journaling file system, any attempt to issue a read request to the source virtual disk may be rejected by the storage array RAID controller modules and result in an error message. Make sure that the Read-Only attribute for the target virtual disk is disabled after the virtual disk copy is complete to prevent error messages from being displayed.
  • Page 182: Creating A Virtual Disk Copy For An Mscs Shared Disk

    Creating a Virtual Disk Copy for an MSCS Shared Disk To create a virtual disk copy for a Microsoft Cluster Server (MSCS) shared disk, create a snapshot of the virtual disk, and then use the snapshot virtual disk as the source for the virtual disk copy. NOTE: An attempt to directly create a virtual disk copy for an MSCS shared disk, rather than using a snapshot virtual disk, fails with the following error: The...
  • Page 183: Virtual Disk Copy Restrictions

    • To enable Read-Only permission, select Change Target Virtual Disk Permissions Enable Read-Only. NOTE: Write requests to the target virtual disk are rejected when the Read- Only permission is enabled on the target virtual disk. To disable Read-Only permission, select Change Target Virtual •...
  • Page 184: Creating A Virtual Disk Copy

    NOTE: The following host preparation sections also apply when using the virtual disk copy feature through the CLI interface. Creating a Virtual Disk Copy CAUTION: Possible loss of data—Source virtual disks that are participating in a virtual disk copy are available for read I/O activity only while a virtual disk copy has a status of In Progress or Pending.
  • Page 185: Virtual Disk Copy And Modification Operations

    Virtual Disk Copy and Modification Operations If a modification operation is running on a source virtual disk or a target virtual disk, and the virtual disk copy has a status of In Progress, Pending, or Failed, the virtual disk copy does not take place. If a modification operation is running on a source virtual disk or a target virtual disk after a virtual disk copy is created, the modification operation must complete before the virtual disk copy can start.
  • Page 186: Preferred Raid Controller Module Ownership

    Preferred RAID Controller Module Ownership During a virtual disk copy, the same RAID controller module must own both the source virtual disk and the target virtual disk. If both virtual disks do not have the same preferred RAID controller module when the virtual disk copy starts, the ownership of the target virtual disk is automatically transferred to the preferred RAID controller module of the source virtual disk.
  • Page 187 A virtual disk copy automatically makes the target virtual disk read-only to hosts. You may want to keep this attribute enabled to preserve the data on the target virtual disk. CAUTION: If you decide not to preserve the data on the target virtual disk after the virtual disk copy has completed, disable the Read-Only attribute for the target virtual disk.
  • Page 188: Storage Array Performance During Virtual Disk Copy

    9 Type yes and click Finish. NOTE: Operation in Progress icons are displayed on the source virtual disk and the target virtual disk while the virtual disk copy has a status of In Progress or Pending. For more information, see the PowerVault Modular Disk Storage Manager online help topics.
  • Page 189: Stopping A Virtual Disk Copy

    2 In the table, select one or more copy pairs. 3 Select Change Copy Priority. The Change Copy Priority window is displayed. 4 In the Copy Priority area, select the appropriate copy priority, depending on your system performance needs. NOTE: There are 5 copy priority rates available: lowest, low, medium, high, and highest.
  • Page 190: Recopying A Virtual Disk

    Recopying a Virtual Disk You can recopy a virtual disk when you have stopped a virtual disk copy and you want to start it again or when a virtual disk copy has failed. The Recopy option overwrites existing data on the target virtual disk and makes the target virtual disk read-only to hosts.
  • Page 191: Re-Copying The Virtual Disk

    4 Remove the drive letter(s) of the source and (if mounted) virtual disk in Windows or unmount the virtual drive(s) in Linux to help guarantee a stable copy of the drive for the virtual disk. If this is not done, the copy operation reports that it has completed successfully, but the copied data is not updated properly.
  • Page 192: Removing Copy Pairs

    5 Select Copy Re-Copy. The Re-Copy window is displayed. 6 Set the copy priority. NOTE: There are 5 copy priority rates available: lowest, low, medium, high, and highest. If the copy priority is set at the lowest rate, I/O activity is prioritized, and the virtual disk copy takes longer.
  • Page 193: Configuration: Premium Feature

    To upgrade from a standard-performance-tier storage array to a high- performance-tier storage array, you enable the high-performance-tier premium feature, using the Dell PowerVault Modular Disk Storage Management (MDSM) software. When the high performance tier feature is enabled or disabled the array restarts.
  • Page 194 Configuration: Premium Feature—Upgrading to High-Performance-Tier...
  • Page 195: Configuration: Device Mapper

    MD3600i Series resource media installation program on the server, and selecting either the Full or Host install option. For detailed installation procedures, see the Dell PowerVault MD3600i and MD3620i storage arrays Deployment Guide at support.dell.com/manuals.
  • Page 196: Using Dm Multipathing Devices

    The following tasks must be completed before proceeding. For more information about steps 1–3, see the MD3600i and MD3620i Storage Arrays Deployment Guide at support.dell.com/manuals. For more information about step 4, see "Creating Virtual Disks" on page 114. 1 Install the host software from the MD3600i Series resource media—...
  • Page 197: Device Mapper Configuration Steps

    Using the MDSM software: 1 Map the host server to the MD3600i Series storage array. 2 Create the Virtual Disks. 3 Map newly created arrays to your host server. NOTE: Any arrays configured with MDCU automatically get added to the list of Devices in the PowerVault Modular Disk Storage Manager Enterprise Management Window (EMW).
  • Page 198 It is located in the /dev/mapper directory. DELL is the vendor of the device. MD3600i is the model of the device. Sdc is the physical path to the owning controller for the device.
  • Page 199 It is located in the /dev/mapper directory. DELL is the vendor of the device. MD3600i is the model of the device. Sdx is the physical path to the owning controller for the device.
  • Page 200 Add a New Partition to Device Mapper The kpartx command adds the new fdisk partition to the Device Mapper list of usable partitions. See examples below, where mpath<x> is the device node on which the partition was created. # kpartx –a /dev/mapper/mpath<x> If successful, the command does not display an output.
  • Page 201 Create a File System on a Device Mapper Partition Use the standard mkfs command to create the file system on the newly created Device Mapper partition. For example: # mkfs –t <filesystem type> /dev/mapper/<partition node> where <partition node> is the partition on which the file system is created.
  • Page 202: Linux Host Server Reboot Best Practices

    blacklist { device { vendor model model_string NOTE: RedHat version 6.0 and 6.1 users must rebuild the initramfs root file image to include the updated configuration file by running the #dracut -force command. 3 Reboot the host. Linux Host Server Reboot Best Practices It is recommended that you follow the procedures given below while rebooting your Linux host server using Device Mapper multipathing with an MD3600i Series storage array.
  • Page 203: Important Information About Special Partitions

    3 Flush the Device Mapper multipath maps list to remove any old or modified mappings: # multipath –F NOTE: The boot operating system drive may have an entry with the Device Mapper multipathing table. This is not affected by the multipath –F command.
  • Page 204: Limitations And Known Issues

    This restores the failed paths enabling failback to occur. Configuration: Device Mapper Multipath for Linux (continued) Description Dell provided script. Forces a rescan of the host SCSI bus and aggregates multipathing devices as needed. For use when: • LUNs are dynamically mapped to the hosts.
  • Page 205: Troubleshooting

    • Failback can be slow when the host system is experiencing heavy I/O. The problem is exacerbated if the host server is also experiencing very high processor utilization. • The Device Mapper Multipath service can be slow when the host system is experiencing heavy I/O.
  • Page 206 Question I removed a LUN. But the multipathing mapping is still available. Failback does not happen as expected with the array. Configuration: Device Mapper Multipath for Linux Answer The multipathing device is still available after you remove the LUNs. Run multipath –f <device node for the deleted LUN>...
  • Page 207: Management: Firmware Downloads

    Management: Firmware Downloads Downloading RAID Controller and NVSRAM Packages A version number exists for each firmware file. The version number indicates whether the firmware is a major version or a minor version. You can use the Enterprise Management Window (EMW) to download and activate both the major firmware versions and the minor firmware versions.
  • Page 208: Downloading Both Raid Controller And Nvsram Firmware

    Downloading Both RAID Controller and NVSRAM Firmware NOTE: I/O to the array can continue while you are upgrading RAID controller and NVSRAM firmware. NOTE: It is recommended that the firmware and NVSRAM be upgraded during a maintenance period when the array is not being used for I/O. NOTE: The RAID enclosure must contain at least two disk drives in order to update the firmware on the controller.
  • Page 209 7 Click Transfer. Keep these guidelines in mind: – If the Transfer button is inactive, ensure that you either select an NVSRAM file or clear the Transfer NVSRAM file with RAID controller module firmware. – If the file selected is not valid or is not compatible with the current storage array configuration, the File Selection Error dialog is displayed.
  • Page 210 The Select File dialog is displayed. 13 Select the file to download. 14 Click OK. 15 If you want to download the NVSRAM file with the RAID controller module firmware, select Download NVSRAM file with firmware in the Select files area. Attributes of the firmware file are displayed in the Firmware file information area.
  • Page 211: Downloading Only Nvsram Firmware

    Downloading Only NVSRAM Firmware Use the command line interface (CLI) to download and activate NVSRAM to several storage arrays. For more information, see the PowerVault Modular Disk Storage Manager online help topics. To download only NVSRAM firmware: 1 To download the NVSRAM firmware from: •...
  • Page 212 7 Perform one of these actions: • Select Tools Upgrade RAID Controller Module Firmware. Select the Setup tab, and click Upgrade RAID Controller Module • Firmware. The Upgrade RAID Controller Module Firmware window is displayed. The Storage array pane lists the storage arrays. The Details pane shows the details of the storage array that is selected in the Storage array pane.
  • Page 213: Downloading Physical Disk Firmware

    12 Click OK. The Confirm Download dialog is displayed. 13 Click Yes. The download starts and a progress indicator is displayed in the Status column of the Upgrade RAID Controller Module Firmware window. Downloading Physical Disk Firmware CAUTION: When updating physical disk firmware, you must stop all I/O activity to the array to prevent data loss.
  • Page 214 • Make sure that the firmware that you download to the physical disks are compatible with the physical disks that you select. • Do not make any configuration changes to the storage array while downloading the firmware. NOTE: Downloads can take several minutes to complete. During a download, the Download Physical Disk - Progress dialog is displayed.
  • Page 215: Downloading Md1200 Series Expansion Module Emm Firmware

    Downloading MD1200 Series Expansion Module EMM Firmware NOTE: Due to a limitation with Linux, expansion enclosure EMM firmware updates must be performed using out-of-band management only. Failure to do so may result in the host server becoming unresponsive, and it may require a reboot. You can transfer a downloadable firmware file to the expansion enclosure EMM in the expansion enclosures attached to the storage array.
  • Page 216: Self-Monitoring Analysis And Reporting Technology (Smart)

    NOTE: If you click Stop while a firmware download is in progress, the download-in-progress finishes before the operation stops. The status for the remaining expansion enclosures changes to Canceled. 7 Monitor the progress and completion status of the download to the expansion enclosures.
  • Page 217 controller encounters an error while accessing a peer disk, it is unable to recover the data and affected sectors are added to the unreadable sector log maintained by the controller. Other conditions under which sectors are added to the unreadable sector log include: •...
  • Page 218 Management: Firmware Downloads...
  • Page 219: Management: Installing Array Components

    Management: Installing Array Components Recommended Tools You may need the following items to perform the procedures in this section: • Key to the system keylock • #2 Phillips screwdriver • Wrist grounding strap Management: Installing Array Components...
  • Page 220: Front Bezel (Optional)

    Front Bezel (Optional) Removing the Front Bezel 1 Using the system key, unlock the front bezel (if locked). 2 Lift up the release latch next to the keylock. 3 Rotate the left end of the bezel away from the front panel. 4 Unhook the right end of the bezel and pull the bezel away from the system.
  • Page 221: Hard Drives

    2 Press the release tab and slide the hard-drive blank out until it is free of the drive bay. See Figure 16-2 for PowerVault MD3600i and Figure 16-3 for PowerVault MD3620i. Figure 16-2. Removing and Installing a 3.5" Hard-Drive Blank (MD3600i Only)
  • Page 222: Installing A Hard-Drive Blank

    Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
  • Page 223 2 From the Modular Disk Storage Manager (MDSM) software, prepare the drive for removal. Wait until the hard-drive indicators on the drive carrier signal that the drive can be removed safely. For more information, see your controller documentation for information about hot-swap drive removal.
  • Page 224: Installing A Hard Drive

    You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
  • Page 225: Removing A Hard Drive From A Hard-Drive Carrier

    Remove the screws from the slide rails on the hard-drive carrier and separate the hard drive from the carrier. See Figure 16-5 for PowerVault MD3600i and Figure 16-6 for PowerVault MD3620i. Figure 16-5. Removing and Installing a Hard Drive Into a 3.5" Hard-Drive Carrier...
  • Page 226 Figure 16-6. Removing and Installing a Hard Drive Into a 2.5" Hard-Drive Carrier screws (4) SAS screw hole Management: Installing Array Components hard-drive carrier hard drive...
  • Page 227: Installing A Hard Drive Into A Hard-Drive Carrier

    Installing a Hard Drive Into a Hard-Drive Carrier 1 Insert the hard drive into the hard-drive carrier with the connector end of the drive at the back. See Figure 16-5. 2 Align the screw holes on the hard drive with the back set of holes on the hard-drive carrier.
  • Page 228: Installing A Raid Controller Module Blank

    5 Connect all the power cables to the array. 6 Turn on the array and the host server. Figure 16-7. Removing and Installing a RAID Controller Module Blank release latch Installing a RAID Controller Module Blank To install a RAID controller module blank: 1 Align the blank with the RAID controller module bay 2 Insert the blank into the chassis until it clicks into place.
  • Page 229: Removing A Raid Controller Module

    You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
  • Page 230: Installing A Raid Controller Module

    Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
  • Page 231: Closing The Raid Controller Module

    Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
  • Page 232: Raid Controller Module Backup Battery Unit

    Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
  • Page 233: Installing The Raid Controller Module Backup Battery Unit

    Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
  • Page 234: Power Supply/Cooling Fan Module

    Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
  • Page 235 Figure 16-11. Removing and Installing a Power Supply/Cooling Fan Module release tab power supply handle power supply Management: Installing Array Components...
  • Page 236: Installing A Power Supply/Cooling Fan Module

    Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
  • Page 237: Control Panel

    3 Remove the hard drives from: – slots 0 to 2 in PowerVault MD3600i – slots 0 to 5 in PowerVault MD3620i See "Removing a Hard Drive" on page 222. NOTE: Mark each hard drive with it’s slot position as you remove it.
  • Page 238: Installing The Control Panel

    Figure 16-14. Removing and Installing the Control Panel-PowerVault MD3620i release pin Installing the Control Panel 1 Align the control panel with the slot on the array. 2 Slide the control panel into the array until: The release tab clicks into place in PowerVault MD3600i.
  • Page 239: Backplane

    You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
  • Page 240 Figure 16-15. Removing and Installing the RAID Controller Module/Power Supply Cage screws (6) RAID controller module/power supply cage Management: Installing Array Components...
  • Page 241 Figure 16-16. Removing and Installing the Backplane-PowerVault MD3600i screws (5) captive screw Figure 16-17. Removing and Installing the Backplane-PowerVault MD3620i screws (4) captive screw backplane backplane Management: Installing Array Components...
  • Page 242: Installing The Backplane

    2 Tighten the captive screw to secure the backplane to the chassis. See Figure 16-16 for PowerVault MD3600i or Figure 16-17 for PowerVault MD3620i. 3 Replace the screws that secure the backplane to the chassis. See Figure 16-16 for PowerVault MD3600i or Figure 16-17 for PowerVault MD3620i.
  • Page 243: Management: Firmware Inventory

    Management: Firmware Inventory A storage array is made up of many components, which may include RAID controller modules, physical disks, and enclosure management modules (EMMs). Each of these components contains firmware. Some versions of the firmware are dependent on other versions of firmware. To capture information about all of the firmware versions in the storage array, view the firmware inventory.
  • Page 244 Management: Firmware Inventory...
  • Page 245: Management: System Interfaces

    Management: System Interfaces Microsoft Services Virtual Disk Service The Microsoft Virtual Disk Service (VDS) is a component of the Windows operating system. The VDS component utilizes third-party vendor specific software modules, known as providers, to access and configure third-party storage resources, such as MD3600i Series storage arrays. The VDS component exposes a set of application programming interfaces (APIs) that provides a single interface for managing disks and other storage hardware.
  • Page 246 VSS attaches to the service and uses it to coordinate the creation of snapshot virtual disks on the storage array. VSS-initiated snapshot virtual disks can be triggered through backup tools, known as requestors. The VSS Provider Configuration Tool offers the following configuration options: •...
  • Page 247: Troubleshooting: Your Storage

    At least two physical disks must be installed in the array. Device Health Conditions When you open the Enterprise Management Window (EMW), the Dell PowerVault Modular Disk Storage Management software (MDSM) establishes communication with each managed storage array and determines the current storage array status.
  • Page 248 To launch the AMW, perform one of these actions: • On the Devices tab, in either the Tree view or the Table view, double-click a storage array. Alternatively, you can right-click a storage array and select Manage Storage Array from the pop-up menu. On the Setup tab, select Manage a Storage Array.
  • Page 249 In the Table view, every managed storage array is listed once, regardless of the number of attachments it has in the Tree view. After the storage array is contacted by MDSM, an icon representing its hardware status is displayed. Hardware status can be Optimal, Needs Attention, or Fixing. If, however, all of the network management connections from the storage management station to the storage array shown in the Tree view are Unresponsive, the storage array status is represented as Unresponsive.
  • Page 250 Table 19-3. Additional Status Icons Status Icon Adding a Storage Array Adding a Storage Array OK Adding a Storage Array Error In the Tree view, icons can are displayed in a string to convey more information. For example, the following string means that the storage array is optimal, an alert is set for the storage array, and firmware is available for download.
  • Page 251: Storage Array Support Data

    Storage Array Support Data You can gather various types of inventory, status, and performance data that can help troubleshoot any problem with the storage array. All the files are compressed into a single archive in a zipped-file format. You can forward the archive file to your Technical Support representative for troubleshooting and further analysis.
  • Page 252: Retrieving Trace Buffers

    WARNING: Use this option only under the guidance of your Technical Support representative. NOTE: Enable only one collect support bundle data to a single client system. Setting multiple systems to collect data may potentially affect the storage array performance. To automatically collect the support bundle data: 1 In the AMW, select Advanced...
  • Page 253 • A time stamp. • The version number for the RAID controller module firmware. • The version number for the management application programming interface (API). • The model ID for the RAID controller module board. • The collection status for each RAID controller module. If the status is Failed, the reason for failure is noted, and there is no trace file for the failed RAID controller module.
  • Page 254: Collecting Physical Disk Data

    Collecting Physical Disk Data You can use the Collect Physical Disk Data option to collect log sense data from all the physical disks on your storage array. Log sense data consists of statistical information that is maintained by each of the physical disks in your storage array. Your Technical Support representative can use this information to analyze the performance of your physical disks and for troubleshooting problems that may exist.
  • Page 255: Event Log

    Event Log You can use the Event Log Viewer to view a detailed list of events that occur in a storage array. The event log is stored on reserved areas on the storage array disks. It records configuration events and storage array component failures. WARNING: Use this option only under the guidance of your Technical Support representative.
  • Page 256: Recovery Guru

    Recovery Guru The Recovery Guru is a component of MDSM that diagnoses critical events on the storage array and recommends step-by-step recovery procedures to resolve the problems. In the AMW, to display the Recovery Guru, perform one of these actions: •...
  • Page 257 2 Perform one of these actions in the Storage Array Profile dialog: • View detailed information—Go to step 3. • Search the storage array profile—Go to step 4. • Save the storage array profile—Go to step 5. • Close the storage array profile—Go to step 6. 3 Select one of the tabs, and use the horizontal scroll bar and the vertical scroll bar to view the storage array profile information.
  • Page 258: Viewing The Logical Associations

    Viewing the Logical Associations You can use the Associated Logical Elements option to view the logical associations among different virtual disks in a storage array. To view the associations for source virtual disks, snapshot virtual disks, and snapshot repository virtual disks: 1 In the AMW, select the Logical tab.
  • Page 259: Finding Nodes

    Finding Nodes You can use the Find option to search for a particular node on the Logical tab, the Physical tab, or the Mappings tab of the AMW. The search may be based on a particular node name, the RAID level, virtual disk capacity, or specific free capacity nodes.
  • Page 260: Using Go To

    7 To search for all Free Capacity nodes with a particular capacity, perform these steps: NOTE: This option is not available when the Search by name option is selected or from the Mappings tab. You must cancel the selection of the Search by name option to use this option.
  • Page 261: Recovering From An Unresponsive Storage Array Condition

    2 Select View Go To Snapshot Virtual Disk. The selection jumps to the associated snapshot virtual disk in the Logical pane. 3 Select View Go To Snapshot Repository Virtual Disk. The selection jumps to the associated snapshot repository virtual disk in the Logical pane.
  • Page 262 • Out-of-band managed storage array—Go to step 6. • In-band managed storage array—Go to step 12. 6 For an out-of-band managed storage array, ensure that the RAID controller modules are network accessible by using the ping command to make sure that the RAID controller module can be reached.
  • Page 263 If you started the host system before you were connected to the RAID controller module in the storage array, the Host Context Agent software is not able to detect the RAID controller modules. If this is the case, make sure that the connections are secure, and restart the Host Context Agent software.
  • Page 264: Locating A Physical Disk

    Locating a Physical Disk You can use the Locate Physical Disk option to physically locate and identify one or more of the physical disks in an expansion enclosure by activating physical disk LEDs. To locate the physical disk: 1 Select the Physical tab. 2 Select the physical disks that you want to locate.
  • Page 265: Locating An Expansion Enclosure

    Locating an Expansion Enclosure You can use the Blink option to physically locate and identify an expansion enclosure in the storage array. The LED activation varies according to the type of expansion enclosure that you have. • If you have an expansion enclosure with a white LED, the Blink Expansion Enclosure operation causes the white LED on the expansion enclosure to come on.
  • Page 266: Capturing The State Information

    Capturing the State Information Use the Troubleshooting Capture State Information option to capture information about the current state of your storage array and save the captured information to a text file. You can then send the captured information to your Technical Support representative for analysis. Potential to cause an unresponsive storage array –...
  • Page 267: Smrepassist Utility

    You can also use this utility to resolve duplicate signature problems for snapshot virtual disks. From a command prompt window on a host running Windows, navigate to: C:\Program Files\Dell\MD Storage Manager\util and run the following command: SMrepassist -f <filesystem-identifier> where, -f flushes all the memory-resident data for the file system indicated by <filesystem-identifier>, and <filesystem-identifier>...
  • Page 268: Unidentified Devices

    Unidentified Devices An unidentified node or device occurs when MDSM cannot access a new storage array. Causes for this error include network connection problems, the storage array is turned off, or the storage array does not exist. NOTE: Before beginning any recovery procedure, make sure that the Host Context Agent software is installed and running.
  • Page 269 Make sure that the network can access the host by using the ping command in the following syntax: ping <host-name-or-IP-address-of-the-host>. If the network can access the host, continue to step c. If the network cannot access the host, go to step d. Remove the host with the unresponsive status from the MDSM, and add that host again.
  • Page 270 If this problem exists, see support.dell.com. 6 Look to see if there is too much network traffic to one or more controllers. This problem corrects itself because the MDSM tries to re-establish communication with the controllers in the storage array at regular times.
  • Page 271: Starting Or Restarting The Host Context Agent Software

    After the program completes the startup process, text similar to the following messages is displayed: Modular Disk Storage Manager Agent, Version 90.02.A6.14 Built Wed Feb 03 06:17:50 CST 2010 Copyright (C) 2009-2010 Dell, Inc. All rights reserved. Troubleshooting: Your Storage Array Software...
  • Page 272 Troubleshooting: Your Storage Array Software...
  • Page 273: Troubleshooting: Your Array

    You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
  • Page 274: Troubleshooting Power Supply/Cooling Fan Module

    You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
  • Page 275: Troubleshooting Array Cooling Problems

    You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
  • Page 276: Troubleshooting Raid Controller Modules

    You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
  • Page 277 wait for up to 5 minutes to check if the LED has turned blue. See "Recovery Guru" on page 256. If following the recovery guru procedures does not solve the problem, complete the following procedure to further troubleshoot the array. Turn off the host server as appropriate.
  • Page 278: Troubleshooting Hard Drives

    You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
  • Page 279: Troubleshooting Array And Expansion Enclosure Connections

    You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
  • Page 280: Troubleshooting A Damaged Array

    You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
  • Page 281: Troubleshooting Raid Controller Modules

    Typical hard controller failures are detailed in the following sections. Invalid Storage Array The RAID controller module is supported only in a Dell-supported storage array. Upon installation in the storage array, the controller performs a set of validation checks. The array status LED is lit with a steady amber color while the RAID controller module completes these initial tests and the controllers are booted successfully.
  • Page 282: Pci Errors

    PCI Errors The storage array firmware can detect and only recover from PCI errors when the RAID controller modules are configured for redundancy. If a virtual disk uses cache mirroring, it fails over to its peer RAID controller module, which initiates a flush of the dirty cache.
  • Page 283: Getting Help

    NOTE: If you do not have an active Internet connection, you can find contact information on your purchase invoice, packing slip, bill, or Dell product catalog. Dell provides several online and telephone-based support and service options. Availability varies by country and product, and some services may not be available in your area.
  • Page 284 Getting Help...
  • Page 285 Initiator CHAP Secret, 89 Target CHAP Secret, 89 Valid Characters, 89 Choosing an Appropriate Physical Disk Type, 121 Configuring Host Access, 99 Hot Spare Physical Disks, 130 the iSCSI Host Ports, 91 Configuring Alert Notifications SNMP , 82 Contacting Dell, 283 Index...
  • Page 286 Dell, 283 control panel installing, 238 removing, 237 Copy Manager, 186 Defining a Host, 101 Dell contacting, 283 Disk Group Creating, 112 Expansion, 148 Export, 150 Exporting, 151 Import, 151 Locating, 114 Migration, 150 Disk Group and Virtual Disk...
  • Page 287 Free Capacity, 149 front bezel installing, 220 removing, 220 hard drive drive carrier, 225 installing, 224 removing, 222 Hard-Drive Indicator Patterns, 28 Hardware Features Back panel features, 27 Front panel features, 24 Hard drive indicator patterns, 28 Power indicator codes, 30 Power supply and cooling fan features, 29 Host Group...
  • Page 288 Media Errors and Unreadable Sectors, 216 Media Scan Changing settings, 153 Suspending, 154 Microsoft Virtual Disk Service, 245 Volume Shadow-Copy Service, 245 Microsoft Services Virtual Disk Copy, 52 Monitoring Performance, 57 Multi-Path Preferred and Alternate Controllers and Paths, 54 Multi-Path Software, 54 Non-Exportable Components, 150 Other Information, 21...
  • Page 289 Clocks, 84 Storage Array Media Scan, 152 Storage Arrays, 68 Automatic Discovery, 69 Manual Addition, 69 Storage Partitioning, 147 support contacting Dell, 283 telephone numbers, 283 Troubleshooting Automatically Collect the Support Bundle Data, 251 Capturing the State Information, 266 Collecting the Physical Disk...
  • Page 290 Recovery Guru, 256 Starting or Restarting the Host-Agent Software, 271 Start-Up Routine, 247 Storage Array Profile, 256 Storage Array Support Data, 251 Unidentified Devices, 268 Viewing the Logical Associations, 258 Viewing the Physical Associations, 258 troubleshooting, 273 connections, 279 cooling problems, 275 damaged enclosure, 280 external connections, 273 hard drives, 278...
  • Page 291 Virtual Disk Operations Limit, 45 Virtual Disk Ownership, 55 Virtual Disk States, 40 Virtual DiskCopy Target, 53 Virtual Disks and Disk Groups, 39 Index...
  • Page 292 Index...

This manual is also suitable for:

Powervault md3600i

Table of Contents