Dell PowerVault MD3260i Administrator's Manual

Dell PowerVault MD3260i Administrator's Manual

Md series storage arrays
Hide thumbs Also See for PowerVault MD3260i:
Table of Contents

Advertisement

Dell PowerVault MD3260/3260i/3660i/3660f/3060e
Storage Arrays
Administrator's Guide

Advertisement

Table of Contents
loading

Summary of Contents for Dell PowerVault MD3260i

  • Page 1 Dell PowerVault MD3260/3260i/3660i/3660f/3060e Storage Arrays Administrator's Guide...
  • Page 2: Notes, Cautions, And Warnings

    CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. © 2012 Dell Inc. Trademarks used in this text: Dell , the Dell logo, Dell Boomi , Dell Precision , OptiPlex...
  • Page 3: Table Of Contents

    Contents Notes, Cautions, and Warnings....................2 1 Introduction..........................13 ....................13 Dell PowerVault Modular Disk Storage Manager .................................13 User Interface ...........................14 Enterprise Management Window ........................14 Inheriting The System Settings ..........................15 Array Management Window ....................16 Dell PowerVault Modular Disk Configuration Utility ...........................16 Other Information You May Need 2 About Your MD Series Dense Storage Array...............17...
  • Page 4 ............................23 Disk Group Expansion ..........................23 Disk Group Defragmentation ..........................23 Disk Group Operations Limit ........................23 RAID Background Operations Priority .......................24 Virtual Disk Migration And Disk Roaming ..............................24 Disk Migration ..............................25 Disk Roaming ......................25 Host Server-To-Virtual Disk Mapping ................................26 Host Types ..............................26 Advanced Features .............................26 Snapshot Virtual Disks...
  • Page 5 ..........................40 Configuring E-mail Alerts ..........................41 Configuring SNMP Alerts ..............................42 Battery Settings ........................42 Changing The Battery Settings ...................42 Setting The Storage Array RAID Controller Module Clocks 4 Using iSCSI..........................45 ......................45 Changing The iSCSI Target Authentication ......................45 Entering Mutual Authentication Permissions ............................46 Creating CHAP Secrets ............................46 Initiator CHAP Secret...
  • Page 6 7 Disk Groups And Virtual Disks....................61 .........................61 Creating Disk Groups And Virtual Disks ............................61 Creating Disk Groups ............................62 Locating A Disk Group ............................63 Creating Virtual Disks ....................64 Changing The Virtual Disk Modification Priority .......................64 Changing The Virtual Disk Cache Settings ....................65 Changing The Segment Size Of A Virtual Disk ............................66...
  • Page 7 ............................84 Import Disk Group .............................85 Storage Array Media Scan ........................85 Changing Media Scan Settings ...........................86 Suspending The Media Scan 8 Disk Pools And Disk Pool Virtual Disks..................87 ....................87 Difference Between Disk Groups And Disk Pools .............................87 Disk Pool Restrictions ..........................88 Creating A Disk Pool Manually ..............89 Automatically Managing The Unconfigured Capacity In Disk Pools...
  • Page 8 ..............................110 Offline Copy ..............................110 Online Copy ..................110 Creating A Virtual Disk Copy For An MSCS Shared Disk ........................111 Virtual Disk Read/Write Permissions ..........................111 Virtual Disk Copy Restrictions ..........................112 Creating A Virtual Disk Copy ................112 Setting Read/Write Permissions On Target Virtual Disk ............................112 Before You Begin .....................112...
  • Page 9 13 Configuring Asymmetric Logical Unit Access..............127 ........................127 ALUA Performance Considerations ........................127 Automatic Transfer Of Ownership ..................127 Native ALUA Support On Microsoft Windows And Linux ........................127 Enabling ALUA On VMware ESX/ESXi ..............127 Manually Adding SATP Rule In ESX 4.1 (Update 1 And Update 2) ....................128 Manually Adding SATP Rule In ESX/ESXi 5.0 .........................128...
  • Page 10 ..........................140 Virtual Disk Status Icons ................141 Changing Write Mode And Consistency Group Membership ........................141 Resynchronizing Virtual Disks ......................142 Normally Synchronized Virtual Disks ....................142 Changing Synchronization Priority And Method ........................143 Unsynchronized Virtual Disks ....................144 Automatically Resynchronizing Virtual Disks ......................144 Manually Resynchronizing Virtual Disks ............144 Reversing Roles Between The Primary And Secondary Virtual Disks ..........144...
  • Page 11 SMrepassist Utility .............................172 Unidentified Devices ....................172 Recovering From An Unidentified Storage Array ..................173 Starting Or Restarting The Host Context Agent Software ....................173 Starting The SMagent Software In Windows .......................173 Starting The SMagent Software In Linux 19 Getting Help..........................175 ..............................175 Contacting Dell...
  • Page 13: Introduction

    MD3060e expansion enclosures. NOTE: Your Dell MD Series Dense storage array supports two expansion enclosures (180 physical disks) after you install the Additional Physical Disk Support Premium Feature Key. To order the Additional Physical Disk Support Premium Feature Key, contact Dell Support.
  • Page 14: Enterprise Management Window

    NOTE: By default, the toolbar and status bar are not displayed. To view the toolbar or the status bar, select View → Toolbar or View → Status Bar, respectively. Enterprise Management Window The EMW provides high-level management of storage arrays. When you start the MD Storage Manager, the EMW is displayed.
  • Page 15: Array Management Window

    Array Management Window You can launch the AMW from the EMW. The AMW provides management functions for a single storage array. You can have multiple AMWs open simultaneously to manage different storage arrays. To launch the AMW: In the EMW, on the Devices tab, right-click on the relevant storage array. The context menu for the selected storage is displayed.
  • Page 16: Dell Powervault Modular Disk Configuration Utility

    For video resources on PowerVault MD storage arrays, go to dell.com/techcenter. • For the full name of an abbreviation or acronym used in this document, see the Glossary at support.dell.com/ manuals. NOTE: Always check for updates on support.dell.com/manuals and read the updates first because they often...
  • Page 17: About Your Md Series Dense Storage Array

    About Your MD Series Dense Storage Array This chapter describes the storage array concepts, which help in configuring and operating the Dell MD Series Dense storage arrays. Physical Disks, Virtual Disks, And Disk Groups Physical disks in your storage array provide the physical storage capacity for your data. Before you can begin writing data to the storage array, you must configure the physical storage capacity into logical components, called disk groups and virtual disks.
  • Page 18: Self-Monitoring Analysis And Reporting Technology

    Status Mode Description Optimal Hot Spare in use The physical disk in the indicated slot is in use as a hot spare within a disk group. Failed Assigned, Unassigned, Hot Spare The physical disk in the indicated slot has failed because in use, or Hot Spare Standby of an unrecoverable error, an incorrect drive type or drive size, or by its operational state being set to failed.
  • Page 19: Raid Levels

    Table 1. RAID Controller Virtual Disk States State Description Optimal The virtual disk contains physical disks that are online. Degraded The virtual disk with a redundant RAID level contains an inaccessible physical disk. The system can still function properly, but performance may be affected and additional disk failures may result in data loss.
  • Page 20: Raid 0

    • Number of physical disks in the disk array • Capacity of the physical disks in the disk array • Need for redundant access to the data (fault tolerance) • Disk performance requirements RAID 0 CAUTION: Do not attempt to create virtual disk groups exceeding 120 physical disks in a RAID 0 configuration even if premium feature is activated on your storage array.
  • Page 21: Segment Size

    sized databases or any environment that requires high performance and fault tolerance and moderate-to-medium capacity. Segment Size Disk striping enables data to be written across multiple physical disks. Disk striping enhances performance because striped disks are accessed simultaneously. The segment size or stripe element size specifies the size of data in a stripe written to a single disk. The storage array supports stripe element sizes of 8 KB, 16 KB, 32 KB, 64 KB, 128 KB, and 256 KB.
  • Page 22: Cycle Time

    Cycle Time The media verification operation runs only on selected disk groups, independent of other disk groups. Cycle time is the time taken to complete verification of the metadata region of the disk group and all virtual disks in the disk group for which media verification is configured.
  • Page 23: Virtual Disk Capacity Expansion

    • If I/O activity stretches beyond the segment size, you can increase it to reduce the number of disks required for a single I/O. Using a single physical disk for a single request frees disks to service other requests, especially when you have multiple users accessing a database or storage environment.
  • Page 24: Virtual Disk Migration And Disk Roaming

    • Rebuild • Copy back • Virtual disk capacity expansion • Raid level migration • Segment size migration • Disk group expansion • Disk group defragmentation The priority of each of these operations can be changed to address performance requirements of the environment in which the operations are to be executed.
  • Page 25: Disk Roaming

    NOTE: To ensure that the migrating disk groups and virtual disks are correctly recognized when the target storage array has an existing physical disk, use hot virtual disk migration. When attempting virtual disk migration, follow these recommendations: • Moving physical disks to the destination array for migration — When inserting drives into the destination storage array during hot virtual disk migration, wait for the inserted physical disk to be displayed in the MD Storage Manager, or wait for 30 seconds (whichever occurs first), before inserting the next physical disk.
  • Page 26: Host Types

    High Performance Tier • Remote replication (applicable to Dell PowerVault MD3660f storage arrays that support the FC protocol.) NOTE: The premium features listed above must be activated separately. If you have purchased these features, an activation card is supplied that contains instructions for enabling this functionality.
  • Page 27: Virtual Disk Copy

    Mapping the snapshot virtual disk to the node that does not own the source virtual disk before the snapshot enabling process is completed can result in the operating system misidentifying the snapshot virtual disk. This can result in data loss or an inaccessible snapshot. Virtual Disk Copy Virtual disk copy is a premium feature you can use to: •...
  • Page 28: Multi-Path Software

    You cannot use a snapshot repository virtual disk as a source virtual disk or as a target virtual disk in a virtual disk copy. If you select the source virtual disk as the target virtual disk of a virtual disk copy, you must disable all snapshot virtual disks associated with the source virtual disk.
  • Page 29: Monitoring System Performance

    You can choose one of these load balance policies to optimize I/O performance: • Round-robin with subset — The round-robin with subset I/O load balance policy routes I/O requests, in rotation, to each available data path to the RAID controller module that owns the virtual disks. This policy treats all paths to the RAID controller module that owns the virtual disk equally for I/O activity.
  • Page 30: Monitoring Performance Using The Graphical View

    You can choose from the following: – RAID controller modules – Virtual disks – Storage array totals Adjust Polling interval to set how often you want to update the performance statistics. NOTE: For an accurate elapsed time, do not use the Synchronize RAID controller module Clocks option while using the Performance Monitor.
  • Page 31 3. In the Time list, select the start time and the end time for each day during the data collection period for which you want to view performance data. NOTE: The system uses the values you specify for the time interval to create the historical data graph.
  • Page 33: Discovering And Managing Your Storage Array

    NOTE: Some operating systems can be used only as storage management stations. For more information about the MD PowerVault Support Matrix at support.dell.com/manuals. operating system that you are using, see the For more information, see the online help topics.
  • Page 34: Storage Arrays

    information between the storage management station and the RAID controller module in an in-band-managed storage array and cannot be removed without deleting the entire virtual disk, virtual disk group or virtual disk pair. The access virtual disk is not available for application data storage and cannot be removed without deleting the entire virtual disk, virtual disk group, or virtual disk pair.
  • Page 35: Setting Up Your Storage Array

    NOTE: When adding a storage array using in-band management with iSCSI, a session must first be established between the initiator on the host server and the storage array. For more information, see Using iSCSI. NOTE: The host agent must be restarted before in-band management communication can be established.
  • Page 36: Naming Or Renaming Storage Arrays

    – In the AMW, select the Setup tab, and click Blink Storage Array. – In the AMW, select Hardware → Blink → Storage Array. The LEDs on the physical disks in the storage array blink. After locating the storage array, click OK. The LEDs stop blinking.
  • Page 37: Adding Or Editing A Comment To An Existing Storage Array

    Type the New password. NOTE: It is recommended that you use a long password with at least 15 alphanumeric characters to increase security. For more information on secure passwords, see Password Guidelines. Re-type the new password in Confirm new password. Click OK.
  • Page 38: Enabling Premium Features

    The storage array is removed from the list. Enabling Premium Features You can enable premium features on the storage array. To enable the premium features, you must obtain a feature key file specific to the premium feature that you want to enable from your storage supplier. To enable premium features: From the menu bar in the AMW, select Storage Array →...
  • Page 39: Changing Expansion Enclosure Id Numbers

    Changing Expansion Enclosure ID Numbers When an MD3060e Series expansion enclosure is connected to an MD Series Dense storage array for the first time, an enclosure ID number is assigned and maintained by the expansion enclosure. This enclosure ID number is also shown in the MD Storage Manager and can be changed if required.
  • Page 40: Configuring E-Mail Alerts

    Configuring E-mail Alerts Open the Configure Alerts dialog by performing one of these actions in the EMW: – On the Devices tab, select a node and then on the menu bar, select Edit → Configure Alerts. Go to step 3. NOTE: This option enables you to set up alerts for all the storage arrays connected to the host.
  • Page 41: Configuring Snmp Alerts

    The trap destination is the IP address or the host name of a computer running an SNMP management application. An example of an SNMP enabled management application is the Dell Management Console. For more information on the Dell Management Console, see dell.com .
  • Page 42: Battery Settings

    – The SNMP Community Name is determined by the system administrator and configured within the a management application, such as the Dell Management Console. More information about the Dell Management Console is available at dell.com. – You can configure multiple SNMP addresses before you click OK.
  • Page 43 to the Event Log match the event timestamps written to host log files. The RAID controller modules remain available during synchronization. To synchronize the RAID controller module clocks with the storage management station: In the AMW, on the menu bar, select Hardware → RAID Controller Module → Synchronize Clocks. If a password is set, in the Enter Password dialog, type the current password for the storage array, and click Synchronize.
  • Page 45: Using Iscsi

    Using iSCSI NOTE: The following sections are relevant only to MD3260i and MD3660i storage arrays that use the iSCSI protocol. Changing The iSCSI Target Authentication To change the iSCSI target authentication: In the AMW, select the Setup tab. Select Manage iSCSI Settings. The Manage iSCSI Settings window is displayed and by default, the Target Authentication tab is selected.
  • Page 46: Creating Chap Secrets

    The initiator details are displayed. Click CHAP Secret to enter the initiator CHAP permissions in the dialog that is displayed. Click OK. Click OK in the Manage iSCSI Settings window. For more information, see the online help topics. Creating CHAP Secrets When you set up an authentication method, you can choose to create a CHAP secret.
  • Page 47: Changing The Iscsi Target Identification

    Changing The iSCSI Target Identification You cannot change the iSCSI target name, but you can associate an alias with the target for simpler identification. Aliases are useful because the iSCSI target names are not intuitive. Provide an iSCSI target alias that is meaningful and easy to remember.
  • Page 48: Advanced Iscsi Host Port Settings

    continuous connectivity. For IPv6 addressing, the default method is Stateless auto-configuration. Always use this method for IPv6. To configure the iSCSI host ports: In the AMW, select the Setup tab. Select Configure iSCSI Host Ports. The Configure iSCSI Ports window is displayed. In the iSCSI port list, select an appropriate RAID controller module and an iSCSI host port.
  • Page 49: Viewing Or Ending An Iscsi Session

    Setting Description NOTE: For more information on creating and configuring a VLAN with MD Support Manager, in the AMW, click the Support tab, then click View Online Help. Ethernet Priority The network priority can be set from lowest to highest. Although network managers must determine these mappings, the IEEE has made broad recommendations: •...
  • Page 50: Edit, Remove, Or Rename Host Topology

    In the AMW menu bar, select Monitor → Health → iSCSI Statistics. The View iSCSI Statistics window is displayed. Select the iSCSI statistic type you want to view in the iSCSI Statistics Type area. You can select: – Ethernet MAC statistics –...
  • Page 51: Event Monitor

    Event Monitor An event monitor is provided with Dell PowerVault Modular Disk Storage Manager (MD Storage Manager). The event monitor runs continuously in the background and monitors activity on the managed storage arrays. If the event monitor detects any critical problems, it can notify a host or remote system using e-mail, Simple Network Management Protocol (SNMP) trap messages, or both.
  • Page 52 To disable the event monitor, start terminal emulation application (console ox xterm) and at the command prompt, type SMmonitor stop, and press <Enter>. When the program shutdown is complete, the following message is displayed: Stopping Monitor process.
  • Page 53: About Your Host

    About Your Host Configuring Host Access Dell PowerVault Modular Disk Storage Manager (MD Storage Manager) is comprised of multiple modules. One of these modules is the Host Context Agent, which is installed as part of the MD Storage Manager installation and runs continuously in the background.
  • Page 54: Defining A Host

    • Add mappings to the selected host groups For more information, see the online help topics. Defining A Host You can use the Define Host Wizard in the AMW to define a host for a storage array. Either a known unassociated host port identifier or a new host port identifier can be added.
  • Page 55: Removing Host Access

    13. Click Finish. The Creation Successful window is displayed confirming that the new host is created. 14. To create another host, click Yes on the Creation Successful window. Removing Host Access To remove host access: In the AMW, select the Host Mappings tab. Select the host node from the object tree on the left pane.
  • Page 56: Adding A Host To A Host Group

    Adding A Host To A Host Group You can add a host to an existing host group or a new host group using the Define Host Wizard. For more information, Defining A Host. You can also move a host to a different host group. For more information, see Moving A Host To A Different Host Group.
  • Page 57: Host Topology

    Host Topology Host topology is the organization of hosts, host groups, and host interfaces configured for a storage array. You can view the host topology in the Host Mappings tab of the AMW. For more information, see Using The Host Mappings Tab.
  • Page 58: Managing Host Port Identifiers

    NOTE: For more information on configuring hosts, see About Your Host. If a component such as a RAID controller module or a cable fails, or an error occurs on the data path to the preferred RAID controller module, virtual disk ownership is moved to the alternate non preferred RAID controller module for processing.
  • Page 59 The newly added host port identifier is added to the Host port identifier information area. 10. Select the host port identifier that you want to manage from the list of host port identifiers in the Host port identifier information area. 11.
  • Page 61: Disk Groups And Virtual Disks

    Disk Groups And Virtual Disks Creating Disk Groups And Virtual Disks Disk groups are created in the unconfigured capacity of a storage array, and virtual disks are created in the free capacity of a disk group. The maximum number of physical disks supported in a disk group is 120 (180 with the premium feature activated).
  • Page 62: Locating A Disk Group

    – To create a disk group from unconfigured capacity in the storage array, in the Storage & Copy Services tab, slect a storage array and right-click the Total Unconfigured Capacity node, and select Create Disk Group from the pop-up menu. –...
  • Page 63: Creating Virtual Disks

    The LEDs stop blinking. If the LEDs for the disk group do not stop blinking, from the toolbar in AMW, select Hardware → Blink → Stop All Indications. If the LEDs successfully stop blinking, a confirmation message is displayed. Click OK. Creating Virtual Disks Keep these important guidelines in mind when you create a virtual disk: •...
  • Page 64: Changing The Virtual Disk Modification Priority

    NOTE: Enable dynamic cache read prefetch must be disabled if the virtual disk is used for database applications or applications with a large percentage of random reads. From the Segment size list, select an appropriate segment size. 10. Click Finish. The virtual disks are created.
  • Page 65: Changing The Segment Size Of A Virtual Disk

    In the AMW, select the Storage & Copy Services tab and select a virtual disk. In the menu bar, select Storage → Virtual Disk → Change → Cache Settings. The Change Cache Settings window is displayed. Select one or more virtual disks. To select nonadjacent virtual disks, press <Ctrl>...
  • Page 66: Changing The Io Type

    • The I/O load from the host • The modification priority of the virtual disk • The number of physical disks in the disk group • The number of physical disk ports • The processing power of the storage array RAID controller modules If you want this operation to complete faster, you can change the modification priority to the highest level, although this may decrease system I/O performance.
  • Page 67: Choosing An Appropriate Physical Disk Type

    A progress dialog is displayed, which indicates the number of virtual disks being changed. Choosing An Appropriate Physical Disk Type You can create disk groups and virtual disks in the storage array. You must select the capacity that you want to allocate for the virtual disk from either unconfigured capacity or free capacity available in the storage array.
  • Page 68: Creating A Security Key

    • Create Key • Change Key • Save Key • Validate Key • Import Key • Unlock Drives NOTE: If you have not created a security key for the storage array, the Create Key option is active. If you have created a security key for the storage array, the Create Key option is inactive with a check mark to the left.
  • Page 69 – If the Create Security Key dialog is displayed, go to step 6. – If the Storage Array Password Not Set or Storage Array Password Too Weak dialog is displayed, go to step Choose whether to set (or change) the storage array password at this time. –...
  • Page 70: Changing A Security Key

    After you have created a security key, you can create secure disk groups from security capable physical disks. Creating a secure disk group makes the physical disks in the disk group security enabled. Security enabled physical disks enter Security Locked status whenever power is re-applied. They can be unlocked only by a RAID controller module that supplies the correct key during physical disk initialization.
  • Page 71: Saving A Security Key

    Saving A Security Key You save an externally storable copy of the security key when the security key is first created and each time it is changed. You can create additional storable copies at any time. To save a new copy of the security key, you must provide a pass phrase.
  • Page 72: Erasing Secure Physical Disks

    For more information, see the online help topics. Erasing Secure Physical Disks In the AMW, when you select a security enabled physical disk that is not part of a disk group, the Secure Erase menu item is enabled on the Physical Disk menu. You can use the secure erase procedure to re-provision a physical disk. You can use the Secure Erase option if you want to remove all of the data on the physical disk and reset the physical disk security attributes.
  • Page 73: Hot Spares And Rebuild

    – Automatically assign physical disks — to create hot spare physical disks automatically for the best hot spare coverage using available physical disks. – Manually assign individual physical disks — to create hot spare physical disks out of the selected physical disks on the Hardware tab.
  • Page 74: Hot Spare Drive Protection

    Hot Spare Drive Protection You can use a hot spare physical disk for additional data protection from physical disk failures that occur in a RAID Level 1, or RAID Level 5 disk group. If the hot spare physical disk is available when a physical disk fails, the RAID controller module uses redundancy data to reconstruct the data from the failed physical disk to the hot spare physical disk.
  • Page 75: Drawer Loss Protection

    RAID Level Criteria for Enclosure Loss Protection RAID level 1 Ensure that each physical disk in a mirrored pair is located in a different expansion enclosure. This enables you to have more than two physical disks in the disk group within the same expansion enclosure.
  • Page 76: Host-To-Virtual Disk Mapping

    RAID Level Drawer Loss Protection Requirements Replicated pair 1 = Physical disk located in enclosure 1, drawer 0, slot 0, and physical disk in enclosure 0, drawer 1, slot 0 Replicated pair 2 = Physical disk in enclosure 1, drawer 0, slot 1, and physical disk in enclosure 1, drawer 1, slot 1 Replicated pair 3 = Physical disk in enclosure 1, drawer 0, slot 2, and physical disk in enclosure 2, drawer 1, slot 2...
  • Page 77: Modifying And Removing Host-To-Virtual Disk Mapping

    – Undefined mappings node – Individual defined mapping – Host group – Host From the menu bar, select Host Mappings → LUN Mapping → Add. The Define Additional Mapping window is displayed. In Host group or host, select the appropriate host group or host. All defined hosts, host groups, and the default group are displayed in the list.
  • Page 78: Changing Controller Ownership Of The Virtual Disk

    In the Change Mapping dialog, click Yes to confirm the changes. The mapping is checked for validity and is saved. The Defined Mappings pane is updated to reflect the new mapping. The object tree is also updated to reflect any movement of host groups or hosts. If a password is set on the storage array, the Enter Password dialog is displayed.
  • Page 79: Changing The Raid Level Of A Disk Group

    module ownership of a snapshot virtual disk because the snapshot virtual disk inherits the RAID controller module owner of its associated source virtual disk. Changing the RAID controller module ownership of a virtual disk changes the preferred RAID controller module ownership of the virtual disk. During a virtual disk copy, the same RAID controller module must own both the source virtual disk and the target virtual disk.
  • Page 80: Restricted Mappings

    If you increased volume capacity, the new capacity is displayed. NOTE: The virtual disk that you want to delete from the mapping. For example, the following information may be displayed: mpath6 (3600a0b80000fb6e50000000e487b02f5) dm-10 DELL, MD32xx [size=1.6T][features=3 queue_if_no_path pg_init_retries 50][hwhandler=1 rdac] \_ round-robin 0 [prio=6][active]...
  • Page 81: Storage Partitioning

    Operating System Highest LUN Windows Server 2003 and Windows Server 2008 Linux Guidelines when you work with host types with LUN mapping restrictions: • You cannot change a host adapter port to a restricted host type if there are already mappings in the storage partition that would exceed the limit imposed by the restricted host type.
  • Page 82: Disk Group And Virtual Disk Expansion

    You can use the Storage Partitioning Wizard to define a single storage partition. The Storage Partitioning Wizard guides you through the major steps required to specify which host groups, hosts, virtual disks, and associated logical unit numbers (LUNs) are to be included in the storage partition. Storage partitioning fails when: •...
  • Page 83: Virtual Disk Expansion

    NOTE: You can also use the Command Line Interface (CLI) on both Windows and Linux hosts to add free capacity to a disk group. For more information, see the CLI Guide. NOTE: After the capacity expansion is completed, additional free capacity is available in the disk group for creation of new virtual disks or expansion of existing virtual disks.
  • Page 84: Import Disk Group

    Non-Exportable Components You must remove or clear any non-exportable settings before you can complete the export disk group procedure. Remove or clear the following settings: • Persistent reservations • Host-to-virtual disk mappings • Virtual disk copy pairs • Snapshot virtual disks and snapshot repository virtual disks •...
  • Page 85: Storage Array Media Scan

    • Mirror repositories On the target storage array: Insert the exported physical disks into the available physical disk slots. Review the Import Report for an overview of the disk group that you are importing. Check for non-importable components. Confirm that you want to proceed with the import procedure. NOTE: Some settings cannot be imported during the import disk group procedure.
  • Page 86: Suspending The Media Scan

    The media scan duration specifies the number of days for which the media scan runs on the selected virtual disks. To disable media scans on an individual virtual disk, select the virtual disk in the Select virtual disks to scan area, and deselect Scan selected virtual disks.
  • Page 87: Disk Pools And Disk Pool Virtual Disks

    Disk Pools And Disk Pool Virtual Disks Disk pooling allows you to distribute data from each virtual disk randomly across a set of physical disks. Disk pooling provides RAID protection and consistent performance across a set of physical disks logically grouped together in the storage array.
  • Page 88: Creating A Disk Pool Manually

    • You cannot change the RAID level of a disk pool. MD Storage Manager automatically configures disk pools as RAID level 6. • All physical disk types in a disk pool must be the same. • You can protect your disk pool with Self Encrypting Disk (SED), but the physical disk attributes must match. For example, SED-enabled physical disks cannot be mixed with SED-capable physical disks.
  • Page 89: Automatically Managing The Unconfigured Capacity In Disk Pools

    Automatically Managing The Unconfigured Capacity In Disk Pools The MD Storage Manager can detect the unconfigured capacity in a storage array. When the unconfigured capacity is detected, the MD Storage Manager prompts you to create one or more disk pools, or add the unconfigured capacity to an existing disk pool, or both.
  • Page 90: Renaming A Disk Pool

    Locate the physical disks in the disk pool, and click OK. The LEDs stop blinking. NOTE: If the LEDs for the disk pool do not stop blinking, from the AMW, select Hardware → Blink → Stop All Indications. Click OK. Renaming A Disk Pool Use the Rename option to change the name of a disk pool when the current name is no longer meaningful.
  • Page 91: Adding Unassigned Physical Disks To A Disk Pool

    Click OK. Adding Unassigned Physical Disks To A Disk Pool Use the Add Physical Disks (Capacity) option to increase the free capacity of an existing disk pool by adding unassigned physical disks. After you add unassigned physical disks to a disk pool, the data in each virtual disk of the disk pool is redistributed to include the additional physical disks.
  • Page 92: Changing The Modification Priority Of A Disk Pool

    Changing The Modification Priority Of A Disk Pool Use the Modification Priority option to specify the priority levels for modification operations in a disk pool relative to the system performance. NOTE: Selecting higher priority for modification operations in a disk pool can slow the system performance. The following are the priority levels to modify a disk pool: •...
  • Page 93: Checking Data Consistency

    To RAID controller module ownership of a disk pool: In AMW, select the Storage & Copy Services tab. Select the disk pool. From the menu bar, select Storage → Disk Pool → Change → Ownership/Preferred Path. Select the RAID controller module. Click Yes.
  • Page 94: Deleting A Disk Pool

    Deleting A Disk Pool Use the Delete option to delete a disk pool and all of the virtual disks in the disk pool. When a disk pool is deleted, the physical disks that were associated with the disk pool change to the Unassigned state. This process creates more unconfigured capacity in the storage array, which you can reconfigure to meet your storage needs.
  • Page 95: Secure Disk Pools

    – Right-click a component, and select View Associated Physical Components. – Select a component, and click View Associated Physical Components in the Properties pane. – Select a component, and from the menu bar, select Storage → Disk Pool → View Associated Physical Components.
  • Page 97: Premium Feature-Snapshot Virtual Disks

    NOTE: If you ordered this feature, you received a Premium Feature Activation card shipped in the same box as your Dell PowerVault MD storage array. Follow the directions on the card to obtain a key file and to enable the feature.
  • Page 98: Common Reasons For Scheduling A Snapshot Virtual Disk

    A schedule can be specified when a snapshot virtual disk is first created, or it can be added to an existing snapshot virtual disk at any time. One schedule per snapshot virtual disk is supported. Common Reasons For Scheduling A Snapshot Virtual Disk Scheduling a snapshot virtual disk can serve multiple purposes across a data storage environment.
  • Page 99: About The Simple Path

    • For details on mapping the snapshot virtual disk to the secondary node, see the documentation on storage arrays with Microsoft Windows Server Failover Clusters at support.dell.com/manuals. • You can create concurrent snapshots of a source virtual disk on both the source disk group and on another disk group.
  • Page 100: Creating A Snapshot Virtual Disk Using The Advanced Path

    NOTE: Removing the drive letter of the associated virtual disk(s) in Windows or unmounting the virtual drive in Linux helps to guarantee a stable copy of the drive for the Snapshot. Before creating a snapshot virtual disk, the host server has to be in the proper state. To ensure that the host server is properly prepared to create a snapshot virtual disk, you can either use an application to carry out this task, or you can perform the following steps: Stop all I/O activity to the source.
  • Page 101: Preparing Host Servers To Create The Snapshot Using The Advanced Path

    For details on mapping the snapshot virtual disk to the secondary node, see the documentation on storage arrays with Microsoft Windows Server Failover Clusters at support.dell.com/manuals. The destination of a snapshot repository virtual disk is determined based on the free capacity available in the disk group.
  • Page 102: Creating The Snapshot Using The Advanced Path

    NOTE: Before you create a new snapshot of a source virtual disk, stop any data access (I/O) activity or suspend data transfer to the source virtual disk to ensure that you capture an accurate snapshot of the source virtual disk. Close all applications, including Windows Internet Explorer, to make sure all I/O activity has stopped.
  • Page 103: Specifying Snapshot Virtual Disk Names

    – Free capacity on same disk group as base (recommended) – Free capacity on different disk group – Unconfigured capacity (create new disk group) Enter the snapshot repository virtual disks capacity as a percentage of the source virtual disks capacity and click Next.
  • Page 104: Snapshot Repository Capacity

    characters, the default names for the snapshot and its associated snapshot repository virtual disk use the source virtual disk name truncated enough to add the sequence string. For example, for Host Software Engineering Group GR-1, the default snapshot name is Host Software Engineering GR- 1, and the default repository name is Host Software Engineering GR-R1.
  • Page 105: Re-Creating Snapshot Virtual Disks

    capacity is used to increase the size of the virtual disk, the Free Capacity node involved is removed from the Storage & Copy Services tab. If unassigned physical disks are not available, do you have empty slots in the expansion enclosures? –...
  • Page 106: Disabling A Snapshot Virtual Disk

    In the AMW, select the Storage & Copy Services tab, select a snapshot virtual disk. Select Copy services → Virtual Disk → Snapshot → Re-create. Type yes, and click OK. Disabling A Snapshot Virtual Disk Disable a snapshot virtual disk if one of the following conditions exists: •...
  • Page 107: Re-Creating A Snapshot Virtual Disk

    Follow any additional instructions for your operating system. Failure to follow these additional instructions can create unusable snapshot virtual disks. NOTE: If your operating system requires additional instructions, you can find those instructions in your operating system documentation. Re-Creating A Snapshot Virtual Disk After first preparing the host server(s), re-create a snapshot virtual disk.
  • Page 109: Premium Feature-Virtual Disk Copy

    NOTE: If you ordered this feature, you received a Premium Feature Activation card that shipped in the same box as your Dell PowerVault MD Series Dense storage array. Follow the directions on the card to obtain a key file and to enable the feature.
  • Page 110: Types Of Virtual Disk Copies

    Types Of Virtual Disk Copies You can perform either offline or online virtual disk copies. To ensure data integrity, all I/O to the target virtual disk is suspended during either type of virtual disk copy operation. After the virtual disk copy is complete, the target virtual disk automatically becomes read-only to the hosts.
  • Page 111: Virtual Disk Read/Write Permissions

    Virtual Disk Read/Write Permissions After the virtual disk copy is complete, the target virtual disk automatically becomes read-only to the hosts. The target virtual disk rejects read and write requests while the virtual disk copy operation has a status of Pending or In Progress or if the operation fails before completing the copy.
  • Page 112: Creating A Virtual Disk Copy

    Creating A Virtual Disk Copy CAUTION: Possible loss of data—Source virtual disks that are participating in a virtual disk copy are available for read I/O activity only while a virtual disk copy has a status of In Progress or Pending. Write requests are allowed after the virtual disk copy has completed.
  • Page 113: Create Copy Wizard

    on a source virtual disk or a target virtual disk after a virtual disk copy has been created, the modification operation must complete before the virtual disk copy can start. If a virtual disk copy has a status of In Progress, any modification operation does not take place.
  • Page 114: Copy Manager

    Copy Manager After you create a virtual disk copy by using the Create Copy Wizard, you can monitor the virtual disk copy through the Copy Manager. From the Copy Manager, a virtual disk copy may be re-copied, stopped, or removed. You can also modify the attributes, such as the copy priority and the target virtual disk Read-Only attribute.
  • Page 115: Storage Array Performance During Virtual Disk Copy

    Storage Array Performance During Virtual Disk Copy The following factors contribute to the overall performance of the storage array: • I/O activity • Virtual disk RAID level • Virtual disk configuration — Number of drives in the virtual disk groups •...
  • Page 116: Recopying A Virtual Disk

    • When the virtual disk copy is stopped, all of the mapped hosts have write access to the source virtual disk. If data is written to the source virtual disk, the data on the target virtual disk no longer matches the data on the source virtual disk.
  • Page 117: Removing Copy Pairs

    • If hosts are mapped to the source virtual disk, the data that is copied to the target virtual disk when you perform the re-copy operation might have changed since the previous virtual disk copy was created. • Select only one virtual disk copy in the Copy Manager dialog. CAUTION: Possible loss of data—The re-copying operation overwrites existing data on the target virtual disk.
  • Page 119: Premium Feature-Upgrading To High-Performance-Tier

    Premium Feature—Upgrading To High- Performance-Tier The High Performance Tier premium feature on an MD Series Dense storage array increases the performance of the system beyond that of the array operating at the standard performance level. If this feature is ordered, a Premium Feature Activation card is placed in the box with the storage array. After reading the information below, follow the directions on the card to obtain a key file and to enable the feature.
  • Page 121: Device Mapper Multipath For Linux

    NOTE: The required Device Mapper software components are installed on a Linux host server by running the MD Series Dense storage arrays resource DVD installation program on the server, and selecting either the Full or Host install option. For detailed installation procedures, see the storage array’s Deployment Guide at support.dell.com/ manuals.
  • Page 122: Device Mapper Configuration Steps

    Configure using MDCU — After the host server has rebooted, the MDCU automatically starts and is present on the desktop. This utility allows for quick and easy configuration of new and or existing MD Series Dense storage arrays present on your network. It also provides a GUI Wizard for establishing the iSCSI sessions to the array. Create and map virtual disks using the MD Storage Manager —...
  • Page 123: Display The Multipath Device Topology Using The Multipath Command

    It is located in the /dev/mapper directory. DELL is the vendor of the device. MD3xxxx is the model of the device. Sdc is the physical path to the owning controller for the device.
  • Page 124: Add A New Partition To Device Mapper

    Add A New Partition To Device Mapper The kpartx command adds the new fdisk partition to the Device Mapper list of usable partitions. See examples below, where mpath<x> is the device node on which the partition was created. # kpartx –a /dev/mapper/mpath<x> If successful, the command does not display an output.
  • Page 125: Important Information About Special Partitions

    –F Flushes out all unused multipathing device maps. rescan_dm_devs Dell provided script. Forces a rescan of the host SCSI bus and aggregates multipathing devices as needed. Use this command when: • LUNs are dynamically mapped to the hosts.
  • Page 126: Troubleshooting

    • I/O may hang when a Device Mapper device is deleted before the volume is unmounted. • If the scsi_dh_rdac module is not included in initrd, slower device discovery may be seen and the syslog may become populated with buffer I/O error messages. •...
  • Page 127: Configuring Asymmetric Logical Unit Access

    Manually Adding SATP Rule In ESX 4.1 (Update 1 And Update 2) To manually add the SATP rule in ESX 4.1 (update 1 and update 2): Run the following commands to delete the old claim rule and set the Dell-required rule: array_PID –...
  • Page 128: Manually Adding Satp Rule In Esx/Esxi 5.0

    Run the following command for ESX/ESXi 5.0: # esxcli storage nmp satp rule list –s VMW_SATP_ALUA /array_PID shows the tpgs_on Verify that the claim rule for VMW_SATP_ALUA with the VID/PID = Dell flag specified. Verifying If Host Server Is Using ALUA For MD Storage Array To confirm that the host server is using the ALUA plugin: •...
  • Page 129: Setting Round-Robin Load Balancing Policy On Esx/Esxi-Based Storage Arrays

    Setting Round-Robin Load Balancing Policy On ESX/ESXi-Based Storage Arrays NOTE: Perform this procedure after you have enabled ALUA on VMware ESX/ESXi and verified if the host server is using ALUA for the MD storage array. For more information, see Enabling ALUA On VMware ESX/ESXi Verifying If Host Server Is Using ALUA For MD Storage Array.
  • Page 131: Premium Feature-Remote Replication

    Configurations. Activating Remote Replication NOTE: If you ordered the Remote Replication feature, you received a Premium Feature Activation card in the Dell PowerVault MD Series Dense storage array shipping box. Follow the directions on the card to install and enable this feature.
  • Page 132: Replication Repository Virtual Disks

    • Before establishing virtual disk replication pairs, the Remote Replication premium feature must be activated on each of the storage arrays participating in replication. Replication Repository Virtual Disks Using the Remote Replication premium feature on the storage array requires that two replication repository virtual disks be created on one of the disk groups on the storage array.
  • Page 133: Using Remote Replication With Other Features

    Using Remote Replication With Other Features Remote replication can be used with other disk utility features such as: • Storage Partitioning • Snapshot Virtual Disk Premium Feature • Virtual Disk Copy Premium Feature • Virtual Disk Expansion (VDE) Snapshot Virtual Disk and Virtual Disk Copy are premium features that must be enabled and activated on the primary storage array.
  • Page 134: Required Switch Zoning Configurations

    Performing a VDE operation does not interrupt access to data on disk groups, virtual disks or physical disks. A VDE operation can be performed on a primary virtual disk or a secondary virtual disk of a replicated pair. It cannot be performed on a replication repository virtual disk.
  • Page 135: Activating The Remote Replication Premium Feature And Creating Replication Virtual Disks

    – Both virtual disks are visible to a single management station; replicated disk pairs cannot be managed on separate instances of the MD Storage Manager. – The RAID level of the secondary virtual disk can be different than that of the primary virtual disk. –...
  • Page 136: Activating And Creating Replication Repository Virtual Disks From An Existing Disk Group

    Click OK. The Remote Replication premium feature is now active. The object tree displays the new disk group and the two replication repository virtual disks. Activating And Creating Replication Repository Virtual Disks From An Existing Disk Group Using this method for creating the replication repository virtual disks, free capacity in an existing disk group is used. By default, the replication repository virtual disks each have either 128 MB or 256 MB capacity.
  • Page 137: Selecting The Secondary Virtual Disk

    Selecting The Secondary Virtual Disk CAUTION: Creating a replicated virtual disk pair starts a process between the primary and secondary virtual disks that overwrites all existing data on the secondary virtual disk and set the disk to read-only access. If you have existing data on your secondary virtual disk stop all I/O to the disk, back up the data, and unmount any file systems mounted to the secondary virtual disk before creating the replicated virtual disk pair.
  • Page 138: Completing The Remote Replication

    To set Synchronization Priority and Synchronization Method: In the Select Synchronization Settings (Create Remote Replication) wizard, select the synchronization priority on the slide bar. Select either Manual or Automatic resynchronization. – Automatic resynchronization — Resynchronization starts immediately after communication is restored between unsynchronized replicated virtual disks.
  • Page 139: Viewing Information About A Remote Replication Or Replication Repository Virtual Disk

    • Transfer of ownership does not occur automatically during failover. CAUTION: To avoid possible loss of data, verify that either the virtual disks are not in use, or a multi-path driver is installed on the host. If you change the RAID controller module ownership/preferred path while an application is using one of the virtual disks, I/O activity is disrupted and I/O errors may occur.
  • Page 140: Viewing Logical Elements Of The Secondary Virtual Disk

    The Properties pane shows properties for the selected virtual disk. Under Replication properties, the Replication status displays the synchronization status of the replicated pair. When the primary and secondary virtual disks are synchronizing, the Replication status shows a synchronizing icon. For more information, see Virtual Disk Status Icons.
  • Page 141: Changing Write Mode And Consistency Group Membership

    Icon Status Secondary virtual disk, replication suspended Primary virtual disk, unsynchronized Secondary virtual disk, unsynchronized with communications loss Changing Write Mode And Consistency Group Membership The write mode of a remote replication is selected when it is created. However, you can change the write mode in a remote replication at a later time, as well as change the secondary virtual disk's membership in a write consistency group.
  • Page 142: Normally Synchronized Virtual Disks

    • Changing Synchronization Priority And Method. • Resynchronizing Virtual Disks. You may require to periodically test the communication between the primary virtual disk and the secondary virtual disk in a remote replication, especially after resynchronizing virtual disks. For information about testing the communication, go to Testing Communication Between The Primary And Secondary Virtual Disks.
  • Page 143: Unsynchronized Virtual Disks

    • Changing the segment size of a virtual disk • Defragmenting a disk group • Adding free capacity to a disk group • Changing the RAID level of a disk group To change the synchronization priority and method for an existing remote replication: In the AMW of the storage array containing the primary virtual disk of the replicated pair, right-click the Storage &...
  • Page 144: Automatically Resynchronizing Virtual Disks

    Automatically Resynchronizing Virtual Disks When automatic resynchronization is selected, the RAID controller module owning the primary virtual disk automatically starts resynchronizing the data on the remote replication pair immediately after communication is restored. NOTE: When choosing automatic resynchronization, a possible loss of data can occur if a resynchronization is interrupted in progress.
  • Page 145: Suspending A Remote Replication

    In the AMW of the storage array that contains the virtual disk you are changing, click the Storage & Copy Services tab. Right-click the virtual disk you want to change. – If you are promoting the secondary virtual disk to the role of primary virtual disk, select Change → Role to Primary.
  • Page 146: Testing Communication Between The Primary And Secondary Virtual Disks

    Depending on which resynchronization method you specify, the following occurs: • Automatic resynchronization — Data transfer automatically starts immediately after the virtual disks are resynchronized. • Manual resynchronization — You must manually resume the remote virtual disk replication to restart the data transfer.
  • Page 147 When a primary virtual disk is deleted from a remote virtual disk replication, the following occurs: • The primary virtual disk is deleted from the storage array. NOTE: The virtual disk is permanently deleted from the storage array and all data on the primary virtual disk is permanently lost.
  • Page 148 The replication relationship is removed and the remote virtual disk replication is destroyed. NOTE: The secondary virtual disk is deleted from the storage array and all data on the virtual disk is permanently lost. Removing A Remote Replication From A Storage Array Removing a remote virtual disk replication from a storage array returns both the primary virtual disk and the secondary virtual disk to regular standard virtual disks.
  • Page 149 NOTE: To re-enable the Remote Replication premium feature on a storage array after it has been disabled, you must either retrieve the premium feature key or obtain a new one from your Dell support representative. To disable the remote replication premium feature: In the AMW, select Storage Array →...
  • Page 151: Management Firmware Downloads

    Management Firmware Downloads Downloading RAID Controller And NVSRAM Packages A version number exists for each firmware file. The version number indicates whether the firmware is a major version or a minor version. You can use the Enterprise Management Window (EMW) to download and activate both the major firmware versions and the minor firmware versions.
  • Page 152 By default, only the downloadable files that are compatible with the current storage array configuration are displayed. When you select a file in the File Selection area of the dialog, applicable attributes (if any) of the file are displayed in the File Information area. The attributes indicate the version of the file. If you want to download an NVSRAM file with the firmware: a) Select Transfer NVSRAM file with RAID controller module firmware.
  • Page 153: Downloading Only Nvsram Firmware

    NOTE: If any of the selected storage arrays do not support downloading the files and activating the firmware or NVSRAM later, the Transfer files but don’t activate them (activate later) check box is disabled. 17. Click OK. The Confirm Download dialog is displayed. 18.
  • Page 154: Downloading Physical Disk Firmware

    The Download NVSRAM dialog is displayed. The current firmware version and the NVSRAM version of the selected storage arrays is displayed. NOTE: If you select the storage arrays with different RAID controller module types that cannot be updated with the same NVSRAM file and click NVSRAM, the Incompatible RAID Controller Modules dialog is displayed.
  • Page 155: Downloading Md3060E Series Expansion Module Emm Firmware

    The Download Physical Disk Firmware - Introduction window is displayed. Click Next. The Download Physical Disk Firmware - Add Package window is displayed. In the Selected Packages area, click Add. Navigate to the location of the packages and click OK. The selected package is added to the Packages to be transferred area.
  • Page 156: Self-Monitoring Analysis And Reporting Technology (Smart)

    Monitor the progress and completion status of the download to the expansion enclosures. The progress and status of each expansion enclosure that is participating in the download is displayed in the Status column of the Select enclosures table. NOTE: Each firmware download can take several minutes to complete. Perform one of these actions depending on whether the download succeeded: –...
  • Page 157: Firmware Inventory

    Firmware Inventory A storage array is made up of many components, which may include RAID controller modules, physical disks, and enclosure management modules (EMMs). Each of these components contains firmware. Some versions of the firmware are dependent on other versions of firmware. To capture information about all of the firmware versions in the storage array, view the firmware inventory.
  • Page 159: System Interfaces

    System Interfaces Virtual Disk Service The Microsoft Virtual Disk Service (VDS) is a component of the Windows operating system. The VDS component utilizes third-party vendor specific software modules, known as providers, to access and configure third-party storage resources, such as MD Series Dense storage arrays. The VDS component exposes a set of application programming interfaces (APIs) that provides a single interface for managing disks and other storage hardware.
  • Page 160 • Virtual disks to be used as source virtual disks for VSS snapshots must not have names longer than 16 characters. The VSS hardware provider uses the base virtual disk name as a prefix for the snapshot and repository virtual disk names. The resulting snapshot and repository names are too long if the source virtual disk name exceeds 16 characters.
  • Page 161: Storage Array Software

    Device Health Conditions When you open the Enterprise Management Window (EMW), the Dell PowerVault Modular Disk Storage Manager (MD Storage Manager) establishes communication with each managed storage array and determines the current storage array status. The current status is represented by icons next to the managed storage array.
  • Page 162 Status Icon Description Unresponsive The storage management station cannot communicate with the storage array or one RAID controller module or both RAID controller modules in the storage array. Fixing Status A Needs Attention status has been corrected and the managed storage array is currently transitioning to an Optimal state.
  • Page 163: Trace Buffers

    Status Icon Description Setting an Alert at the Parent Node You can set alerts at any of the nodes Level in the Tree view. Setting an alert at a parent node level, such as at a host level, sets alert for any child nodes. If you set an alert at a parent node level and any of the in-band storage array child nodes have a Needs Upgrade...
  • Page 164: Retrieving Trace Buffers

    A zip-compressed archive file is stored at the location you specify on the host. The archive contains trace files from one or both of the RAID controller modules in the storage array along with a descriptor file named trace_description.xml. Each trace file includes a header that identifies the file format to the analysis software used by the Technical Support representative.
  • Page 165: Creating A Support Data Collection Schedule

    – To collect data from a single physical disk that is selected in the Hardware tab, select Monitor → Health → Collect Physical Disk Data → Selected Physical Disks. The Collect Physical Disk Data window is displayed. Enter a name for the physical disk data filename in Specify filename or click Browse to navigate to a previously saved file to overwrite an existing file.
  • Page 166: Removing A Support Data Collection Schedule

    Removing A Support Data Collection Schedule To remove a support data collection schedule: From the EMW, select Tools → Collect Support Data → Create/Edit Schedule. The Schedule Support Data Collection dialog is displayed. In the Storage arrays table, select one or more storage arrays. Click Remove.
  • Page 167: Recovery Guru

    The Save Events dialog is displayed, navigate to the relevant folder, enter the relevant file name, and click Save. To erase all log entries from the event log, click Clear All. To exit the event log, click Close. For more information, see the online help topics. Recovery Guru The Recovery Guru is a component of MD Storage Manager that diagnoses critical events on the storage array and recommends step-by-step recovery procedures for problem resolution.
  • Page 168: Viewing The Physical Associations

    If the term is located on the current tab, the term is highlighted in the storage array profile information. NOTE: The search is limited to the current tab. If you want to search for the term in other tabs, select the tab and click the Find button again.
  • Page 169 For an out-of-band managed storage array, ensure that the RAID controller modules are network accessible by using the ping command to make sure that the RAID controller module can be reached. Type one of these commands, and press <Enter>. – ping <host-name>...
  • Page 170: Locating A Physical Disk

    Locating A Physical Disk You can physically locate and identify one or more of the physical disks in an expansion enclosure by activating physical disk LEDs. To locate the physical disk: Select the Hardware tab. Select the physical disks that you want to locate. Select Hardware →...
  • Page 171: Capturing The State Information

    You can also use this utility to resolve duplicate signature problems for snapshot virtual disks. From a command prompt window on a host running Windows, navigate to: C:\Program Files\Dell\MD Storage Manager \util and run the following command: SMrepassist -f <filesystem-identifier>...
  • Page 172: Unidentified Devices

    Unidentified Devices An unidentified node or device occurs when the MD Storage Manager cannot access a new storage array. Causes for this error include network connection problems, the storage array is turned off, or the storage array does not exist. NOTE: Before beginning any recovery procedure, make sure that the Host Context Agent software is installed and running.
  • Page 173: Starting Or Restarting The Host Context Agent Software

    c) Examine the Ethernet cables to make sure that you cannot see any damage and that they are tightly connected. d) Make sure that the applicable network configuration tasks have been done (for example, the IP addresses have been assigned to each controller). Make sure that the controller firmware is compatible with MD Storage Manager on your management station.
  • Page 174 Copyright (C) 2009-2010 Dell, Inc. All rights reserved. Checking device <n/a> (/dev/sg10): Activating Checking device /dev/sdb (/dev/sg11): Skipping Checking device <n/a> (/dev/sg3): Activating Checking device <n/a> (/dev/sg4): Activating Checking device <n/a> (/dev/sg5): Activating Checking device <n/a> (/dev/sg6): Activating Checking device <n/a> (/dev/sg7): Activating Checking device <n/a>...
  • Page 175: Getting Help

    Visit support.dell.com. Select your support category. If you are not a U.S. customer, select your country code at the bottom of the support.dell.com page, or select All to see more choices. Select the appropriate service or support link based on your need.

Table of Contents