Page 1
Dell PowerVault MD3600i and MD3620i Storage Arrays Owner’s Manual Regulatory Model: E03J Series and E04J Series Regulatory Type: E03J001 and E04J001...
Page 2
Other trademarks and trade names may be used in this publication to refer to either the entities claiming the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own.
Contents Introduction About This Document Inside the Box of the Dell PowerVault MD3600i Series Storage Array MD3600i Series Storage Array Dell PowerVault Modular Disk Storage Manager Dell PowerVault Modular Disk Configuration Utility Other Information You May Need Planning: About Your Storage Array...
Page 4
Planning: RAID Controller Modules RAID Controller Modules RAID Controller Module Connectors and Features RAID Controller Module—Additional Features Battery Backup Unit Storage Array Thermal Shutdown System Password Reset Cache Functions and Features Cache Mirroring Write-Back Cache Write-Through Cache Planning: MD3600i Series Storage Array Terms and Concepts Physical Disks, Virtual Disks, and Disk Groups Physical Disks...
Page 5
Media Verification ....Cycle Time ..... Virtual Disk Operations Limit Disk Group Operations .
Page 6
Configuration: Overview User Interface Enterprise Management Window Array Management Window Configuration: About Your Storage Array Out-of-Band and In-Band Management Storage Arrays Adding Storage Arrays Setting Up Your Storage Array Locating Storage Arrays Naming or Renaming Storage Arrays Setting a Password Viewing Storage Array Connections Adding/Editing a Comment to an Existing Storage Array...
Page 7
Setting the Storage Array RAID Controller Module Clocks Configuration: Using iSCSI Changing the iSCSI Target Authentication Entering Mutual Authentication Permissions Creating CHAP Secrets Initiator CHAP Secret Target CHAP Secret Valid Characters for CHAP Secrets Changing the iSCSI Target Identification Changing the iSCSI Target Discovery Settings Configuring the iSCSI Host Ports Advanced iSCSI Host Ports Settings Viewing or Ending an iSCSI Session...
Page 8
Configuration: About Your Host Configuring Host Access Using the Mappings Tab Defining a Host Removing Host Access Managing Host Groups Creating a Host Group Moving a Host to a Different Host Group Removing a Host Group Host Topology Starting or Stopping the Host Context Agent I/O Data Path Protection Managing Host Port Identifiers...
Page 9
Choosing an Appropriate Physical Disk Type Physical Disk Security with Self Encrypting Disk ..... Creating a Security Key Changing a Security Key Saving a Security Key Validate Security Key Unlocking Secure Physical Disks...
Page 10
Storage Partitioning Disk Group and Virtual Disk Expansion Disk Group Migration Import Disk Group Storage Array Media Scan 11 Configuration: Premium Feature— Snapshot Virtual Disks Scheduling a Snapshot Virtual Disk Creating a Snapshot Virtual Disk Using the Simple Path Contents .
Page 11
Creating a Snapshot Virtual Disk Using the Advanced Path About the Advanced Path Preparing Host Servers to Create the Snapshot Using the Advanced Path Creating the Snapshot Using the Advanced Path Specifying Snapshot Virtual Disk Names Snapshot Repository Capacity Disabling a Snapshot Virtual Disk Preparing Host Servers to Re-Create a Snapshot Virtual Disk Re-creating Snapshot Virtual Disks...
Page 12
Virtual Disk Read/Write Permissions Virtual Disk Copy Restrictions Creating a Virtual Disk Copy Preferred RAID Controller Module Ownership Failed RAID Controller Module Copy Manager Copying the Virtual Disk Storage Array Performance During Virtual Disk Copy Setting Copy Priority Stopping a Virtual Disk Copy Recopying a Virtual Disk Removing Copy Pairs Contents...
Page 13
13 Configuration: Premium Feature— Upgrading to High-Performance-Tier 14 Configuration: Device Mapper Multipath for Linux Overview ......Using DM Multipathing Devices Prerequisites Device Mapper Configuration Steps...
Page 14
Media Errors and Unreadable Sectors 16 Management: Installing Array Components Recommended Tools Front Bezel (Optional) Hard Drives RAID Controller Module RAID Controller Module Backup Battery Unit Contents ....
Page 15
Power Supply/Cooling Fan Module Removing a Power Supply/Cooling Fan Module Installing a Power Supply/Cooling Fan Module Control Panel ..... . . Removing the Control Panel Installing the Control Panel Backplane...
Page 16
Retrieving Trace Buffers Collecting Physical Disk Data Event Log Recovery Guru Storage Array Profile Viewing the Logical Associations Viewing the Physical Associations Finding Nodes Using Go To Recovering From an Unresponsive Storage Array Condition Locating a Physical Disk Locating an Expansion Enclosure Capturing the State Information SMrepassist Utility Unidentified Devices...
Page 17
21 Getting Help ..... . Contacting Dell ....
About This Document This document familiarizes you with the functions of the Dell PowerVault MD3600i Series storage array. The document is organized according to the tasks that you must complete after receiving your MD3600i Series storage array.
CAT6 or higher Ethernet connection. Dell PowerVault Modular Disk Storage Manager Dell PowerVault Modular Disk Storage Manager (MDSM) is a graphical user interface (GUI) application, used to configure and manage one or more MD3600i Series storage arrays. The MDSM software is available on the MD3600i Series resource media.
• Dell PowerVault MD 1200 Series Installation Guide provides information for users who incorporate MD1200 expansion enclosures. The Rack Installation Instructions included with your rack solution •...
Planning: About Your Storage Array Overview The Dell PowerVault MD3600i Series storage array is designed for high availability, offering redundant access to data storage. It supports single and dual RAID controller configuration. The MD3600i Series storage array provides 1 GBase-T or 10 GBase-T connectivity to the host server and enables access to 64 physical hosts.
Hardware Features Front-Panel Features and Indicators Figure 2-1. Front-Panel Features and Indicators—Dell PowerVault MD3600i Figure 2-2. Front-Panel Features and Indicators—Dell PowerVault MD3620i Planning: About Your Storage Array...
Page 25
Figure 2-3. Front-Bezel Features and Indicators Item Indicator, Button, or Connector Enclosure status LED Power LED Icon Description The enclosure status LED lights when the enclosure power is on. Lights blue during normal operation. Blinks blue when a host server is identifying the enclosure or when the system identification button is pressed.
Page 26
Item Indicator, Button, or Connector Split mode LED System identification button Hard drives Enclosure mode switch Planning: About Your Storage Array Icon Description This LED must be unlit as the split mode function is not supported by the MD3600i Series storage arrays.
Back-Panel Features and Indicators Figure 2-4. Back-Panel Features and Indicators—Dell PowerVault MD3600i Series Storage Array 600 W power supply/cooling fan module RAID Controller Module 1 RAID Controller Module 0 600 W power supply/cooling fan module Planning: About Your Storage Array...
Hard-Drive Indicator Patterns Figure 2-5. Hard Drive Indicators hard-drive activity indicator (green) Planning: About Your Storage Array hard-drive status indicator (green and amber)
Hard-Drive Status Indicator Pattern Steady green Green flashing (On 250 ms, Off 250 ms) Physical disk is being identified Green flashing (On 400 ms, Off 100 ms) Physical disk rebuilding Amber flashing (On 150 ms, Off 150 ms) Physical disk failed Flashing green, amber, and Off (green On 500 ms, amber on 500 ms, Off 1000 ms) Flashing green, amber, and Off (green 3 s,...
Power Indicator Codes and Features Figure 2-6. Power Indicator Codes and Features Item LED Type DC power Power supply/cooling fan fault AC power Power connector Power switches (2) Planning: About Your Storage Array Icon Description The LED lights green when the DC output voltage is within the limit.
Various configurations can be utilized, in both single controller (simplex) and dual controller (duplex) modes, to connect the storage enclosure to hosts depending on specific redundancy needs. For information on cabling, see the MD3600i and MD3620i Series Storage Array’s Deployment Guide at support.dell.com/manuals. Planning: RAID Controller Modules...
Provides a 100/1000 Mbps Ethernet connection for out-of-band management of the enclosure. Dell support only. Lights green when all four links are connected. Lights amber when one to 3 links are disconnected. Off when all links in the port are disconnected or cable is disconnected.
Page 33
Item Component Controller power LED Lights green when controller is turned on. Controller fault LED iSCSI IN port activity System identification Cache active or cache offload LED Battery fault Password reset switch MAC address label Management port speed LED Management port activity LED Function Off when controller is not turned on.
RAID Controller Module—Additional Features Battery Backup Unit Each RAID controller contains a two-cell Lithium ion nanopolymer battery backup unit (BBU). It provides power to the RAID controller module in the event of a power outage. For information on removing and installing the BBU, see "RAID Controller Module Backup Battery Unit"...
System Password Reset To reset a forgotten password, push and hold down the password reset switch for at least 5 seconds. The password is deleted. See Figure 3-1 to locate the password reset switch. The RAID controller module allows you to change the password. For more information about setting your password, see "Setting a Password"...
Write-Through Cache In write-through cache, data is written to the physical disk before completion status is returned to the host operating system. Write-through cache is considered more robust than write-back cache, since a power failure is less likely to cause loss of data. The RAID controller automatically switches to write-through if either cache mirroring is disabled or the battery is missing or there is a fault condition.
Array Terms and Concepts This chapter describes the storage array concepts, which help in configuring and operating the Dell PowerVault MD3600i Series storage arrays. Physical Disks, Virtual Disks, and Disk Groups Physical disks in your storage array provide the physical storage capacity for your data.
Physical Disks Only Dell supported 6.0-Gbps SAS physical disks are supported in the storage array. If the storage array detects unsupported physical disks, it marks the disk as unsupported and the physical disk becomes unavailable for all operations. NOTE: The MD3600i Series storage enclosure must contain at least two physical disks for proper operation.
Table 4-1. RAID Controller Physical Disk States Status Mode Pending Assigned, Failure Unassigned, Hot Spare in use, or Hot Spare Standby Offline Not applicable The physical disk has either been spun Identify Assigned, Unassigned, Hot Spare in use, or Hot Spare Standby If a disk drive rebuild fails because of a source drive failure or because the drive is too small, the MDSM reports a failure of the physical disk even...
3 Provide host server access. 4 Create mappings to associate the virtual disks with the host servers. NOTE: Host server access must be created before mapping virtual disks. Disk groups are always created in the unconfigured capacity of a storage array. Unconfigured capacity is the available physical disk space not already assigned in the storage array.
RAID Levels RAID levels determine the way in which data is written to physical disks. Different RAID levels provide different levels of accessibility, redundancy, and capacity. Using multiple physical disks has the following advantages over using a single physical disk: •...
Page 42
I/O performance is greatly improved by spreading the I/O load across many physical disks. Although it offers the best performance of any RAID level, RAID 0 lacks data redundancy. Select this option only for non-critical data, because failure of one physical disk results in the loss of all data. Examples of RAID 0 applications include video editing, image editing, prepress applications, or any application that requires high bandwidth.
actual storage. RAID 10 is automatically used when a RAID level of 1 is chosen with four or more physical disks. RAID 10 works well for medium- sized databases or any environment that requires high performance and fault tolerance and moderate-to-medium capacity. Segment Size Disk striping enables data to be written across multiple physical disks.
Foreground Initialization The storage array supports foreground initialization for virtual disks. All access to the virtual disk is blocked during foreground initialization. During foreground initialization, zeros (0x00) are written to every sector of the virtual disk. The virtual disk is available after foreground initialization is completed. Consistency Check A consistency check verifies the correctness of data in a redundant array (RAID levels 1, 5, 6, and 10).
The storage array tracks the cycle for each disk group independent of other disk groups on the controller and creates a checkpoint. If the media verification operation on a disk group is preempted or blocked by another operation on the disk group, the storage array resumes after the current cycle. If the media verification process on a disk group is stopped due to a RAID controller module restart, the storage array resumes the process from the last checkpoint.
Segment Size Migration Segment size refers to the amount of data (in KB) that the storage array writes on a physical disk in a virtual disk before writing data on the next physical disk. Valid values for the segment size are 8 KB, 16 KB, 32 KB, 64 KB, 128 KB, 256 KB, and 512 KB.
Disk Group Defragmentation Defragmenting consolidates the free capacity in the disk group into one contiguous area. Defragmentation does not change the way in which the data is stored on the virtual disks. Disk Group Operations Limit The maximum number of active, concurrent disk group processes per installed RAID controller module is one.
• Segment size migration • Disk group expansion • Disk group defragmentation The priority of each of these operations can be changed to address performance requirements of the environment in which the operations are to be executed. NOTE: Setting a high priority level impacts storage array performance. It is not advisable to set priority levels at the maximum level.
Page 49
recognize the migrating metadata and that data is lost. In this case, MD3600i storage array initializes the physical disks and marks them as unconfigured capacity. NOTE: Only disk groups and associated virtual disks with all member physical disks present can be migrated from one storage array to another. It is recommended that you only migrate disk groups that have all their associated member virtual disks in an optimal state.
• Migrating virtual disks to a storage array with no existing physical disks— Turn off the destination storage array, when migrating disk groups or a complete set of physical disks from a storage array to another storage array that has no existing physical disks. After the destination storage array is turned on and has successfully recognized the newly migrated physical disks, migration operations can continue.
Host Types A host server is a server that accesses a storage array. Host servers are mapped to the virtual disks and use one or more iSCSI initiator ports. Host servers have the following attributes: • Host name—A name that uniquely identifies the host server. •...
This can result in data loss or an inaccessible snapshot. For more information on mapping the snapshot virtual disk to the secondary node, see the Dell PowerVault MD3600i and MD3620i Storage Arrays With Microsoft Windows Server Failover Clusters on support.dell.com/manuals. Virtual Disk Copy Virtual disk copy is a premium feature to: •...
• Restore snapshot virtual disk data to the source virtual disk. Virtual disk copy generates a full copy of data from the source virtual disk to the target virtual disk in a storage array and can be performed either online or offline.
Using Snapshot and Disk Copy Together You can use the Snapshot Virtual Disk and Virtual Disk Copy premium features together to back up data on the same storage array, or to restore the data on the snapshot virtual disk to its original source virtual disk. You can copy data from a virtual disk by: •...
controller module owner of a virtual disk after it is created. If a host is connected to only one RAID controller module, the preferred owner must manually be assigned to the RAID controller module that the host can access. Ownership of a virtual disk is moved from the preferred controller to the secondary controller (also called the alternate controller) when the preferred controller is: •...
Load Balancing A load balance policy is used to determine which path is used to process I/O. Multiple options for setting the load balance policies let you optimize I/O performance when mixed host interfaces are configured. You can choose one of these load balance policies to optimize I/O performance: •...
Monitoring MD3600i Series System Performance You can use the Performance Monitor to select virtual disks and RAID controller modules to monitor or to change the polling interval. Keep the following guidelines in mind when using the Performance Monitor: • The Performance Monitor does not dynamically update its display if any configuration changes occur while the window is open.
Page 58
Each time the polling interval elapses, the Performance Monitor queries the storage array again and updates the statistics in the table. 5 Click Start. Values are displayed for the selected storage arrays in the Performance Monitor data table. The table is updated at the interval specified in the Polling Interval setting.
Page 59
Table 4-3. Performance Monitor Table Description Column Headings Devices Total IOs Read Percentage Cache Hit Percentage Current KB/second Maximum KB/second Current IO/second Maximum IO/second For more information, see the online help topics. Planning: MD3600i Series Storage Array Terms and Concepts Description Controller, virtual disk or storage array total Cumulative IO’s per second from last start time...
Page 60
Planning: MD3600i Series Storage Array Terms and Concepts...
Configuration: Overview Dell PowerVault Modular Disk Storage Manager (MDSM) online help contains information on how to use the MDSM application to perform the configuration and management tasks described in this document. You can access online help by clicking Help located at the top right corner of MDSM interface.
Enterprise Management Window The EMW provides high-level management of storage arrays. When you start MDSM, the EMW is displayed. The EMW has the: Devices tab—Provides information about the storage arrays. • • Setup tab—Presents the initial setup tasks that guide you through adding storage arrays and configuring alerts.
• Obtain information about the firmware inventory including the version of the RAID controller modules, physical disks, and the enclosure management modules (EMMs) in the storage array. Inheriting the System Settings Use the Inherit System Settings option to import the operating system theme settings into the MDSM.
Page 64
• Disk groups and virtual disks • Logical tab—You can view the organization of the storage array by virtual disks, disk groups, free capacity nodes, and any unconfigured capacity for the storage array. Physical tab—You can view the organization of the storage array by RAID •...
Configuration: About Your Storage Array Out-of-Band and In-Band Management You can manage a storage array in two ways: • Out-of-band management • In-band management Out-of-Band Management In the out-of-band management method, data is separate from commands and events. Data travels through the host-to-controller interface, while commands and events travel through the management port Ethernet cables.
You must add the storage arrays to MDSM before you can set up the storage array for optimal use. Adding Storage Arrays You can add storage arrays only in the EMW. You can: • Automatically discover storage arrays. • Manually add storage arrays. Configuration: About Your Storage Array at support.dell.com/manuals.
Page 69
NOTE: Verify that your host or management station network configuration— including station IP address, subnet mask, and default gateway—is correct before adding a new storage array using the Automatic option. NOTE: For Linux, set the default gateway so that broadcast packets are sent to 255.255.255.0.
• In-band management—Enter a name or an IP address for the Host through which the storage array is attached to the network. NOTE: When adding a storage array using in-band management with iSCSI, a session must first be established between the initiator on the host server and the storage array.
Page 71
• Configure iSCSI host ports—Configure network parameters for each iSCSI host port automatically or specify the configuration information for each iSCSI host port. • Configure the storage array—Create disk groups, virtual disks, and hot spare physical disks by using the Automatic configuration method or the Manual configuration method.
Locating Storage Arrays You can use the Blink option to physically locate and identify a storage array. NOTE: If the LEDs from the Blink Storage Array operation do not stop blinking, select Stop All Indications to stop the process manually. To locate the storage array: 1 Select the relevant storage array and: •...
The Name/Rename Storage Arrays dialog is displayed. 2 Select the relevant storage array from the Select storage array table. If you do not know the name or physical location of the storage array, click Blink. After locating the storage array, click OK to turn off the LEDs. The name of the storage array is displayed in the Storage array name.
Page 74
• Select the Setup tab, and then click Set a Storage Array Password. • In the AMW, select the Logical tab, right-click and select Set Password. The Set Password dialog is displayed. 3 If you are resetting the password, type the Current password. NOTE: If you are setting the password for the first time, leave the Current password blank.
Viewing Storage Array Connections You can use the View Connections option to view the expansion enclosures connected to the RAID controller module. To view the storage array connections: 1 From the toolbar in AMW, select Storage Array View Connections. The <Storage Array>:Connections dialog is displayed. 2 Click the column name to sort the connections according to your preference.
Removing Storage Arrays You can remove a storage array from the list of managed arrays if you no longer want to manage it from a specific storage management station. Removing a storage array does not affect the storage array or its data in any way.
Displaying Failover Alert You can change the failover alert delay for a storage array. The failover alert delay lets you delay the logging of a critical event if the multi-path driver transfers virtual disks to the non-preferred controller. If the multi-path driver transfers the virtual disks back to the preferred controller within the specified delay period, a critical event is not logged.
Changing Expansion Enclosure ID Numbers When an MD1200 series expansion enclosure is connected to an MD3600i Series storage array for the first time, an enclosure ID number is assigned and maintained by the expansion enclosure. This enclosure ID number is also shown in the MDSM and can be changed if required.
Configuring Alert Notifications MDSM can send an alert for any condition on the storage array that requires your attention. Alerts can be sent as e-mail messages or as Simple Network Management Protocol (SNMP) trap messages. You can configure alert notifications either for all the storage arrays or a single storage array.
Page 80
• All storage arrays—Select this option to send an e-mail alert about events on all storage arrays. • An individual storage array—Select this option to send an e-mail alert about events that occur on only a specified storage array. These results occur, depending on your selection: •...
Page 81
• Validating an e-mail address—Type the e-mail address in Email address or select the e-mail address in the Configured email addresses area, and click Test. A test e-mail is sent to the selected e-mail address. A dialog with the results of the test and any error is displayed. 8 For the selected e-mail address, in Information To Send, select: •...
“public”. The trap destination is the IP address or the host name of a computer running an SNMP management application. An example of an SNMP enabled management application is the Dell Management Console. For more information on Dell Management Console, see dell.com.
Configured SNMP addresses area. • The SNMP Community Name is determined by the system administrator and configured within the management application, such as the Dell Management Console. More information about the Dell Management Console is available at dell.com. •...
A learn cycle starts automatically when you install a new battery module. Learn cycles for batteries in both RAID controller modules in a duplex system occur simultaneously. Learn cycles are scheduled to start automatically at regular intervals, at the same time and on the same day of the week. The interval between cycles is described in weeks.
Page 85
1 In the AMW, select Storage Array Synchronize RAID Controller Module Clocks. 2 If a password is set, in the Enter Password dialog, type the current password for the storage array, and click Synchronize. The RAID controller module clocks are synchronized with the storage management station.
Page 86
Configuration: About Your Storage Array...
Configuration: Using iSCSI Changing the iSCSI Target Authentication 1 In the AMW, select the Setup tab. 2 Select Manage iSCSI Settings. The Manage iSCSI Settings window is displayed and by default, the Target Authentication tab is selected. To change the authentication settings, select: •...
Entering Mutual Authentication Permissions Mutual authentication or two-way authentication enables a client or a user to verify themselves to a host server and for the host server to validate itself to the user. This validation is accomplished in such a way that both parties are sure of the other’s identity.
Initiator CHAP Secret The initiator CHAP secret is set on the host using the iSCSI initiator configuration program provided with the host operating system. If you are using the mutual authentication method, you must define the initiator CHAP secret when you set up the host. This must be the same CHAP secret that is defined for the target when defining mutual authentication settings.
Changing the iSCSI Target Identification You cannot change the iSCSI target name, but you can associate an alias with the target for simpler identification. Aliases are useful because the iSCSI target names are not intuitive. Provide an iSCSI target alias that is meaningful and easy to remember.
• Select Specify Configuration, and type the IPv4 address to activate the target discovery. • Type the iSNS server IP address in the IPv6 settings area to activate the target discovery. After you manually enter an IP address, you can also click Advanced to configure the customized TCP listening ports.
Page 92
4 In the Configured Ethernet port speed list, select a network speed for the iSCSI host port. The network speed values in the Configured Ethernet port speed list depend on the maximum speed that the network can support. Only the network speeds that are supported are displayed.
Advanced iSCSI Host Ports Settings NOTE: Configuring the advanced iSCSI host ports settings is optional. Use the advanced settings for the individual iSCSI host ports to specify the TCP frame size, the virtual LAN, and the network priority. Table 7-2. Advanced iSCSI Host Port Settings Setting Description Virtual LAN (VLAN) A method of creating independent logical networks within a...
Viewing or Ending an iSCSI Session You may want to end an iSCSI session for the following reasons: • Unauthorized access—If an initiator whom you consider to not have access is logged on, you can end the iSCSI session. Ending the iSCSI session forces the initiator to log off the storage array.
Viewing iSCSI Statistics and Setting Baseline Statistics To view iSCSI statistics and set baseline statistics: 1 In the AMW toolbar, select Storage Array iSCSI Statistics. The View iSCSI Statistics window is displayed. 2 Select the iSCSI statistic type you want to view in the iSCSI Statistics Type area.
Edit, Remove, or Rename Host Topology If you give access to the wrong host or the wrong host group, you can remove or edit the host topology. Follow the appropriate procedures given in Table 7-3 to correct the host topology: Table 7-3.
Configuration: Event Monitor An event monitor is provided with Dell PowerVault Modular Disk Storage Manager (MDSM). The event monitor runs continuously in the background and monitors activity on the managed storage arrays. If the event monitor detects any critical problems, it can notify a host or remote system using e- mail, Simple Network Management Protocol (SNMP) trap messages, or both.
Enabling or Disabling the Event Monitor You can enable or disable the event monitor at any time. Disable the event monitor if you do not want the system to send alert notifications. If you are running the event monitor on multiple systems, disabling the event monitor on all but one system prevents the sending of duplicate messages.
Configuration: About Your Host Configuring Host Access Dell PowerVault Modular Disk Storage Manager (MDSM) software is comprised of multiple modules. One of these modules is the Host Context Agent, which is installed as part of the MDSM installation and runs continuously in the background.
The host topology is reconfigurable. You can perform the following tasks: • Create a host and assign an alias or user label. • Add or associate a new host port identifier to a particular host. • Change the host port identifier alias or user label. •...
Defining a Host You can use the Define Host Wizard in the AMW to define a host for a storage array. Either a known unassociated host port identifier or a new host port identifier can be added. NOTE: A user label must be specified before the host port identifier may be added (the add button is disabled until one is entered).
The Specify Host Type window is displayed. 7 In Host type, select the relevant operating system for the host. The Host Group Question window is displayed. 8 In this window, you can select: • Yes—this host shares access to the same virtual disks with other hosts. •...
Managing Host Groups A host group is a logical entity of two or more hosts that share access to specific virtual disks on the storage array. You create host groups with MDSM. All hosts in a host group must have the same host type (operating system). In addition, all hosts in the host group must have special software, such as clustering software, to manage virtual disk sharing and accessibility.
Removing a Host From a Host Group You can remove a host from the Topology pane on the Mappings tab of the Array Management Window. For more information, see "Removing a Host Group" on page 105. Moving a Host to a Different Host Group To move a host to a different host group: 1 In the AMW, select the Mappings tab, select the host node in the Topology pane.
Removing a Host Group To remove a host group: 1 In the AMW, select the Mappings tab, select the host node in the Topology pane. 2 Perform one of these actions: • Select Mappings Remove. • Right-click the host node, and select Remove from the pop-up menu. The Remove dialog is displayed.
Starting or Stopping the Host Context Agent The host context agent discovers the host topology and starts and stops with the host. The topology discovered by the Host Context Agent can be viewed by clicking Configure Host Access (Automatic) in the Configure tab in the MDSM.
I/O Data Path Protection You can have multiple host-to-array connections for a host. Ensure that you select all the connections to the array when configuring host access to the storage array. NOTE: See the Deployment Guide for more information on cabling configurations. NOTE: For more information on configuring hosts see "Configuration: About Your Host"...
Managing Host Port Identifiers You can manage the host port identifiers that are added to the storage array. You can: • Add—Add or associate a new host port identifier to a particular host. • Edit—Change the host port identifier alias or user label. You can move (associate) the host port identifier to a new host.
Page 109
5 Select the method to add a host port identifier to the host. You can select: • Add by selecting a known unassociated host port identifier—Select the appropriate host port identifier from the existing list of Known unassociated host port identifiers. Add by creating a new host port identifier—In New host port •...
Configuration: Disk Groups and Virtual Disks Creating Disk Groups and Virtual Disks Disk groups are created in the unconfigured capacity of a storage array, and virtual disks are created in the free capacity of a disk group. The maximum number of physical disks supported in a disk group is 30. The hosts attached to the storage array read and write data to the virtual disks.
A disk group must be organized according to its related tasks and subtasks. For example, if you create a disk group for the Accounting Department, you can create virtual disks that match the different types of accounting transactions performed in the department: Accounts Receivable (AR), Accounts Payable (AP), internal billing, and so forth.
Page 113
3 Type the name of the disk group (up to 30 characters) in Disk group name. 4 Select the appropriate Physical Disk selection choices, you can select: Automatic, see step • Manual, see step • 5 Click Next. For automatic configuration, the RAID Level and Capacity window is displayed.
Locating a Disk Group You can physically locate and identify all of the physical disks that comprise a selected disk group. An LED blinks on each physical disk in the disk group. To locate a disk group: 1 In the AMW, select the Logical tab. 2 Select the appropriate disk group and from the toolbar select Disk Group...
Page 115
NOTE: Ensure that you create disk groups before creating virtual disks. To create virtual disks: 1 Choose one of these methods to start the Create Virtual Disk Wizard: • To create a virtual disk from unconfigured capacity in the storage array—On the Logical tab, select an Unconfigured Capacity node, and select Virtual Disk...
5 In Advanced virtual disk parameters, you can select: • Use recommended settings. Customize settings. • 6 If you select Use recommended settings in Advanced virtual disk parameters, click Finish. Otherwise, click Next. 7 In the Customize Advanced Virtual Disk Parameters window, select the appropriate Virtual Disk I/O characteristics type.
4 Select one or more virtual disks. Move the Select modification priority slider bar to the desired priority. NOTE: To select nonadjacent virtual disks, press <Ctrl> click. To select adjacent virtual disks, press <Shift> click. To select all of the available virtual disks, click Select All.
Page 118
To select nonadjacent virtual disks, press <Ctrl> click. To select adjacent virtual disks, press <Shift> click. To select all of the available virtual disks, click Select All. 4 In the Select cache properties area, you can select: • Enable read caching—to enable read caching. •...
Changing the Segment Size of a Virtual Disk You can change the segment size on a selected virtual disk. During this operation, I/O performance is affected, but your data remains available. Guidelines to proceed with changing the segment size: • You cannot cancel this operation after it starts.
The segment size modification operation begins. The virtual disk icon in the Logical pane shows an Operation in Progress status while the operation is taking place. NOTE: To view the progress or change the priority of the modification operation, select a virtual disk in the disk group, and select Virtual Disk Change Modification Priority.
The corresponding dynamic cache read prefetch setting and segment size values that are typically well suited for the selected virtual disk I/O characteristic type are populated in the Dynamic cache read prefetch field and the Segment size field. NOTE: If you selected the Custom option, select your preferred dynamic cache read prefetch setting (enabled/disabled) and segment size (8 KB to 512 KB).
Page 122
the physical disks and RAID controller modules in a storage array share the same security key. The shared security key provides read and write access to the physical disks, while the physical disk encryption key on each physical disk is used to encrypt the data. A security capable physical disk works like any other physical disk until it is security enabled.
Page 123
• Save Security Key File • Validate Security Key • Unlock Drives NOTE: If you have not created a security key for the storage array, the Create Security Key option is active. If you have created a security key for the storage array, the Create Security Key option is inactive with a check mark to the left.
The storage array password protects a storage array from potentially destructive operations by unauthorized users. The storage array password is independent from self encrypting disk and must not be confused with the pass phrase that is used to protect copies of a security key. It is recommended that you set a storage array password.
Page 125
4 In New password, enter a string for the storage array password. If you are creating the storage array password for the first time, leave Current password blank. Follow these guidelines for cryptographic strength when you create the storage array password: •...
The pass phrase that you enter is masked. NOTE: Create Key is active only if the pass phrase meets the above mentioned criterion. 9 In the Confirm pass phrase dialog box, re-enter the exact string that you entered in the Pass phrase dialog box. Make a record of the pass phrase that you entered and the security key identifier that is associated with the pass phrase.
Page 127
for storage on other media. When you change a security key, you also provide information to create a security key identifier. Changing the security key does not destroy any data. You can change the security key at any time. Before you change the security key, ensure that: •...
6 In Confirm pass phrase, re-enter the exact string you entered in Pass phrase. Make a record of the pass phrase you entered and the security key identifier it is associated with. You need this information for later secure operations. 7 Click Change Key.
4 In Confirm pass phrase, re-enter the exact string you entered in Pass phrase. Make a record of the pass phrase you entered. You need it for later secure operations. 5 Click Save. 6 Make a record of the security key identifier and the file name from the Save Security Key Complete dialog and click OK.
Erasing Secure Physical Disks In the AMW, when you select a security enabled physical disk that is not part of a disk group, the Secure Erase menu item is enabled on the Physical Disk menu. You can use the secure erase procedure to re-provision a physical disk. You can use the Secure Erase option if you want to remove all of the data on the physical disk and reset the physical disk security attributes.
Page 131
• The availability of enclosure loss protection for a disk group depends on the location of the physical disks that comprise the disk group. To make sure that enclosure loss protection is not affected, you must replace a failed physical disk to initiate the copyback process. See "Enclosure Loss Protection"...
8 Select the relevant physical disks in the Unassigned physical disks area, as hot spares for the selected disk and click OK. 9 To unassign hot spares, in the Hot Spare Coverage window, select the physical disks in the Hot spare physical disks area. 10 Review the information about the hot spare coverage in the Details area.
Hot Spare Operation When a physical disk fails, the virtual disk automatically rebuilds using an available hot spare. When a replacement physical disk is installed, data from the hot spare is copied back to the replacement physical disk. This function is called copy back.
spare physical disk. To make sure that enclosure loss protection is not affected, you must replace a failed physical disk to initiate the copyback process. The virtual disk remains online and accessible while you are replacing the failed physical disk, because the hot spare physical disk is automatically substituted for the failed physical disk.
Table 10-2. Criteria for Enclosure Loss Protection RAID Level Criteria for Enclosure Loss Protection RAID level 1 Ensure that each physical disk in a mirrored pair is located in a different expansion enclosure. This enables you to have more than two physical disks in the disk group within the same expansion enclosure.
• Each host has its own LUN address space. MDSM permits the same LUN to be used by different hosts or host groups to access virtual disks in a storage array. • Not every operating system has the same number of LUNs available. You can define the mappings on the Mappings tab in the AMW.
4 In Host group or host, select the appropriate host group or host. All defined hosts, host groups, and the default group are displayed in the list. NOTE: When configuring an iSCSI storage array, including the MD3600i or MD3620i, if a host or a host group is selected that does not have a SAS host bus adapter (SAS HBA) host port defined, a warning dialog is displayed.
• Select a single virtual disk, and select Mappings Change Mapping. • Right-click the virtual disk, and select Change Mapping from the pop-up menu. 3 In Host group or host, select the appropriate host group or host. By default, the drop-down list shows the current host group or the host associated with the selected virtual disk.
associated source virtual disk. Changing the RAID controller module ownership of a virtual disk changes the preferred RAID controller module ownership of the virtual disk. During a virtual disk copy, the same RAID controller module must own both the source virtual disk and the target virtual disk. Sometimes both virtual disks do not have the same preferred RAID controller module when the virtual disk copy starts.
Page 140
You can change the RAID controller module ownership of a standard virtual disk or a snapshot repository virtual disk. You cannot directly change the RAID controller module ownership of a snapshot virtual disk because the snapshot virtual disk inherits the RAID controller module owner of its associated source virtual disk.
2 Run the following command to display multi-pathing topology: # multipath -ll Note the virtual disk that you want to delete from the mapping. For example, the following information may be displayed: mpath6 (3600a0b80000fb6e50000000e487b02f5) dm-10 DELL, MD32xx Configuration: Disk Groups and Virtual Disks...
Page 142
[size=1.6T][features=3 queue_if_no_path pg_init_retries 50][hwhandler=1 rdac] \_ round-robin 0 [prio=6][active] \_ 1:0:0:2 sdf 8:80 [active][ready] \_ round-robin 0 [prio=1][enabled] \_ 0:0:0:2 sde 8:64 [active][ghost] In this example, the mpath6 device contains two paths: -- /dev/sdf at Host 1, Channel 0, Target 0, LUN 2 --/dev/sde at Host 0, Channel 0, Target 0, LUN 2 3 Flush the multi-pathing device mapping using the following command # multipath -f /dev/mapper/mapth_x...
• If a new LUN is mapped, the new LUN is detected and given a multi- pathing device node • If you increased volume capacity, the new capacity is displayed. Restricted Mappings Many hosts are able to map up to 256 LUNs (0 to 255) per storage partition. However, the maximum number of mappings differs because of operating system variables, failover driver issues, and potential data problems.
• If there is a host with a restricted host type that is part of a specific storage partition, all of the hosts in that storage partition are limited to the maximum number of LUNs allowed by the restricted host type. •...
Page 145
disk copy, ownership of the target virtual disk is also changed. Under certain operating system environments, it may be necessary to reconfigure the multi- path driver before an I/O path can be used. 1 To change: The RAID controller module ownership of a virtual disk—Go to step 2.
CAUTION: Possible loss of data access—Changing ownership at the disk group level causes every virtual disk in that disk group to transfer to the other RAID controller module and use the new I/O path. If you do not want to set every virtual disk to the new path, change ownership at the virtual disk level instead.
Storage Partitioning A storage partition is a logical entity consisting of one or more virtual disks that can be accessed by a single host or shared among hosts that are part of a host group. The first time you map a virtual disk to a specific host or host group, a storage partition is created.
• All mappings are defined. NOTE: You can include a secondary virtual disk in a storage partition. However, any hosts that are mapped to the secondary virtual disk has read- only access until the virtual disk is promoted to a primary virtual disk, or the mirror relationship is removed.
NOTE: You cannot mix different media types or different interface types within a single disk group or virtual disk. 5 Click Add. A message prompts you to confirm your selection. 6 To add the capacity to the disk group, click Yes. You can also use the Command Line Interface (CLI) on both Windows and Linux hosts to add free capacity to a disk group.
capacity, in the form of unassigned physical disks to the disk group of the standard virtual disk or the snapshot repository virtual disk. See "Disk Group Expansion" on page 148. For more information, see the PowerVault Modular Disk Storage Manager online help topics.
Exporting a Disk Group On the source storage array: 1 Save the storage array configuration. 2 Stop all I/O and unmount or disconnect the file systems on the virtual disks in the disk group. 3 Back up the data on the virtual disks in the disk group. 4 Locate the disk group and label the physical disks.
2 Review the Import Report for an overview of the disk group that you are importing. 3 Check for non-importable components. 4 Confirm that you want to proceed with the import procedure. NOTE: Some settings cannot be imported during the import disk group procedure.
error is reported to the event log. For virtual disks without redundancy protection (RAID level 1, RAID level 5, and RAID level 6 virtual disks), the error is not corrected but is reported to the event log. • Recovered media error—Data could not be read by the physical disk on the first attempt but was successfully read on a subsequent attempt.
NOTE: A consistency check scans the data blocks in a RAID level 5 virtual disk, or a RAID level 6 virtual disk and checks the consistency information for each block. A consistency check compares data blocks on RAID level 1 mirrored physical disks.
If you ordered this feature, you received a Premium Feature Activation card shipped in the same box as your Dell PowerVault MD storage array. Follow the directions on the card to obtain a key file and to enable the feature.
Page 156
repository uses less disk space than a full physical copy, because the only data blocks that are stored in the snapshot repository virtual disk are those that have changed since the time of the snapshot. Source Virtual Disk When you create a snapshot virtual disk, specify its location, capacity, schedule, and other parameters.
Scheduling a Snapshot Virtual Disk When you create a snapshot virtual disk, you can choose whether the snapshot is created immediately or is created according to a schedule that you determine. This schedule can be a one-time snapshot creation or an ongoing snapshot creation that occurs at regularly occurring intervals.
For more information on creating snapshot virtual disk schedules, see the following sections on creating snapshots. Guidelines for Creating Snapshot Schedules Certain guidelines apply when creating snapshot virtual disk schedules: • Scheduled virtual disk snapshot operations do not occur if: –...
For more information on scheduling snapshots virtual disks, see the PowerVault Modular Disk Storage Manager online help topics and the CLI Guide. Creating a Snapshot Virtual Disk Using the Simple Path You can choose the simple path to create a snapshot virtual disk if the disk group of the source virtual disk has the required amount of free space.
NOTE: For more information on mapping the snapshot virtual disk to the secondary node, see the Dell PowerVault MD3600i and MD3620i Storage Arrays With Microsoft Windows Server Failover Clusters at support.dell.com/manuals. NOTE: You can create concurrent snapshots of a source virtual disk on both the source disk group and on another disk group.
Page 161
• You cannot create a snapshot of a virtual disk that contains unreadable sectors. • You must satisfy the requirements of your host operating system for creating snapshot virtual disks. Failure to meet the requirements of your host operating system results in an inaccurate snapshot of the source virtual disk or the target virtual disk in a virtual disk copy.
8 Enter the snapshot repository virtual disks capacity as a percentage of the source virtual disks capacity and click Next. The Preview window containing the summary of the snapshot virtual disk is displayed. 9 Click Finish. The Completed window is displayed. 10 Click OK.
Page 163
• Snapshot Virtual Disk Name—A user-specified name that helps you associate the snapshot virtual disk to its corresponding snapshot repository virtual disk and source virtual disk. • Snapshot Repository Virtual Disk Name—A user-specified name that helps you associate the snapshot repository virtual disk to its corresponding snapshot virtual disk and source virtual disk.
NOTE: For more information on mapping the snapshot virtual disk to the secondary node, see the Dell PowerVault MD3600i and MD3620i Storage Arrays With Microsoft Windows Server Failover Clusters at support.dell.com/manuals. The destination of a snapshot repository virtual disk is determined based on the free capacity available in the disk group.
Page 165
• You cannot create a snapshot of a virtual disk that contains unreadable sectors. • You must satisfy the requirements of your host operating system for creating snapshot virtual disks. Failure to meet the requirements of your host operating system results in an inaccurate snapshot of the source virtual disk or the target virtual disk in a virtual disk copy.
If you want to use a snapshot regularly, such as for backups, use the Disable Snapshot and Re-create Snapshot options to reuse the snapshot. Disabling and re-creating snapshots preserves the existing virtual disk-to-host mappings to the snapshot virtual disk. Creating the Snapshot Using the Advanced Path NOTE: Removing the drive letter of the associated virtual disk in Windows or unmounting the virtual drive in Linux helps to guarantee a stable copy of the drive...
8 In the Snapshot virtual disk parameters area, select the relevant mapping option, you can select: • Automatic • Map later 9 In the Snapshot repository virtual disk parameters area, enter the system behavior when: • The snapshot repository virtual disk is full to the selected percentage level.
Page 168
The default name for the associated snapshot repository virtual disk that is shown in the Snapshot repository virtual disk field is: <source-virtual disk-name>—R<sequence-number> For example, if you are creating the first snapshot virtual disk for a source virtual disk called Accounting, the default snapshot virtual disk is Accounting-1, and the associated snapshot repository virtual disk default name is Accounting-R1.
Snapshot Repository Capacity If you receive a warning that the capacity for the snapshot repository virtual disk is approaching its threshold, you can increase the capacity of a snapshot repository virtual disk by using one of the following methods: • Use the free capacity available on the disk group of the snapshot repository virtual disk.
Page 170
free capacity is available, the maximum free space is displayed in the Increase capacity by field. If free capacity does not exist on the disk group, the free space that is displayed in the Increase capacity by spinner box is 0. You must add physical disks to create free capacity on the disk group.
Page 171
NOTE: The physical disks that are displayed have a capacity that is either the same size or larger than the capacity of the physical disks already being used by the disk group. 9 Select either a single physical disk to add or two physical disks to add. 10 Click Add.
Disabling a Snapshot Virtual Disk Disable a snapshot virtual disk if one of the following conditions exists: • You do not need the snapshot now. • You intend to re-create the snapshot at a later time and want to retain the associated snapshot repository virtual disk so that you do not need to create it again.
Before re-creating a snapshot virtual disk, both the host server and the associated virtual disk you are re-creating have to be in the proper state. To prepare your host server and virtual disk: 1 Stop all I/O activity to the source and snapshot virtual disk (if mounted). 2 Using your Windows system, flush the cache to both the source and the snapshot virtual disk (if mounted).
NOTE: Failing to follow these additional instructions could create unusable snapshot virtual disks. For more information, see the PowerVault Modular Disk Storage Manager online help topics. • To use this option, the snapshot virtual disk must be either in an Optimal status or Disabled status.
Page 175
• Rolling back a base virtual disk to a snapshot virtual disk does not affect the contents of the snapshot virtual disks. • Only one snapshot rollback operation can be performed at a time. • While a base virtual disk that is undergoing a rollback, you cannot create a new snapshot virtual disks from that base virtual disk.
Protecting Against a Failed Snapshot Rollback To protect your base virtual disk data, it is recommended that you create a new snapshot virtual disk from the base virtual disk before beginning a rollback operation. If the snapshot rollback fails, use this new snapshot virtual disk to restore your base virtual disk.
Resuming a Snapshot Rollback If an error occurs during the snapshot rollback and the operation is paused, you can resume the rollback using the following steps: 1 In the AMW, select the Logical tab. 2 Choose one: • Select the snapshot virtual disk, and select Virtual Disk Snapshot Resume Rollback.
If you ordered this feature, you received a Premium Feature Activation card that shipped in the same box as your Dell PowerVault MD storage array. Follow the directions on the card to obtain a key file and to enable the feature.
Reasons to use virtual disk copy include: • Copying data for improved access—As your storage requirements for a virtual disk change, you can use a virtual disk copy to copy data to a virtual disk in a disk group that uses drives with larger capacity within the same storage array.
formatted with a journaling file system, any attempt to issue a read request to the source virtual disk may be rejected by the storage array RAID controller modules and result in an error message. Make sure that the Read-Only attribute for the target virtual disk is disabled after the virtual disk copy is complete to prevent error messages from being displayed.
Creating a Virtual Disk Copy for an MSCS Shared Disk To create a virtual disk copy for a Microsoft Cluster Server (MSCS) shared disk, create a snapshot of the virtual disk, and then use the snapshot virtual disk as the source for the virtual disk copy. NOTE: An attempt to directly create a virtual disk copy for an MSCS shared disk, rather than using a snapshot virtual disk, fails with the following error: The...
• To enable Read-Only permission, select Change Target Virtual Disk Permissions Enable Read-Only. NOTE: Write requests to the target virtual disk are rejected when the Read- Only permission is enabled on the target virtual disk. To disable Read-Only permission, select Change Target Virtual •...
NOTE: The following host preparation sections also apply when using the virtual disk copy feature through the CLI interface. Creating a Virtual Disk Copy CAUTION: Possible loss of data—Source virtual disks that are participating in a virtual disk copy are available for read I/O activity only while a virtual disk copy has a status of In Progress or Pending.
Virtual Disk Copy and Modification Operations If a modification operation is running on a source virtual disk or a target virtual disk, and the virtual disk copy has a status of In Progress, Pending, or Failed, the virtual disk copy does not take place. If a modification operation is running on a source virtual disk or a target virtual disk after a virtual disk copy is created, the modification operation must complete before the virtual disk copy can start.
Preferred RAID Controller Module Ownership During a virtual disk copy, the same RAID controller module must own both the source virtual disk and the target virtual disk. If both virtual disks do not have the same preferred RAID controller module when the virtual disk copy starts, the ownership of the target virtual disk is automatically transferred to the preferred RAID controller module of the source virtual disk.
Page 187
A virtual disk copy automatically makes the target virtual disk read-only to hosts. You may want to keep this attribute enabled to preserve the data on the target virtual disk. CAUTION: If you decide not to preserve the data on the target virtual disk after the virtual disk copy has completed, disable the Read-Only attribute for the target virtual disk.
9 Type yes and click Finish. NOTE: Operation in Progress icons are displayed on the source virtual disk and the target virtual disk while the virtual disk copy has a status of In Progress or Pending. For more information, see the PowerVault Modular Disk Storage Manager online help topics.
2 In the table, select one or more copy pairs. 3 Select Change Copy Priority. The Change Copy Priority window is displayed. 4 In the Copy Priority area, select the appropriate copy priority, depending on your system performance needs. NOTE: There are 5 copy priority rates available: lowest, low, medium, high, and highest.
Recopying a Virtual Disk You can recopy a virtual disk when you have stopped a virtual disk copy and you want to start it again or when a virtual disk copy has failed. The Recopy option overwrites existing data on the target virtual disk and makes the target virtual disk read-only to hosts.
4 Remove the drive letter(s) of the source and (if mounted) virtual disk in Windows or unmount the virtual drive(s) in Linux to help guarantee a stable copy of the drive for the virtual disk. If this is not done, the copy operation reports that it has completed successfully, but the copied data is not updated properly.
5 Select Copy Re-Copy. The Re-Copy window is displayed. 6 Set the copy priority. NOTE: There are 5 copy priority rates available: lowest, low, medium, high, and highest. If the copy priority is set at the lowest rate, I/O activity is prioritized, and the virtual disk copy takes longer.
To upgrade from a standard-performance-tier storage array to a high- performance-tier storage array, you enable the high-performance-tier premium feature, using the Dell PowerVault Modular Disk Storage Management (MDSM) software. When the high performance tier feature is enabled or disabled the array restarts.
Page 194
Configuration: Premium Feature—Upgrading to High-Performance-Tier...
MD3600i Series resource media installation program on the server, and selecting either the Full or Host install option. For detailed installation procedures, see the Dell PowerVault MD3600i and MD3620i storage arrays Deployment Guide at support.dell.com/manuals.
The following tasks must be completed before proceeding. For more information about steps 1–3, see the MD3600i and MD3620i Storage Arrays Deployment Guide at support.dell.com/manuals. For more information about step 4, see "Creating Virtual Disks" on page 114. 1 Install the host software from the MD3600i Series resource media—...
Using the MDSM software: 1 Map the host server to the MD3600i Series storage array. 2 Create the Virtual Disks. 3 Map newly created arrays to your host server. NOTE: Any arrays configured with MDCU automatically get added to the list of Devices in the PowerVault Modular Disk Storage Manager Enterprise Management Window (EMW).
Page 198
It is located in the /dev/mapper directory. DELL is the vendor of the device. MD3600i is the model of the device. Sdc is the physical path to the owning controller for the device.
Page 199
It is located in the /dev/mapper directory. DELL is the vendor of the device. MD3600i is the model of the device. Sdx is the physical path to the owning controller for the device.
Page 200
Add a New Partition to Device Mapper The kpartx command adds the new fdisk partition to the Device Mapper list of usable partitions. See examples below, where mpath<x> is the device node on which the partition was created. # kpartx –a /dev/mapper/mpath<x> If successful, the command does not display an output.
Page 201
Create a File System on a Device Mapper Partition Use the standard mkfs command to create the file system on the newly created Device Mapper partition. For example: # mkfs –t <filesystem type> /dev/mapper/<partition node> where <partition node> is the partition on which the file system is created.
blacklist { device { vendor model model_string NOTE: RedHat version 6.0 and 6.1 users must rebuild the initramfs root file image to include the updated configuration file by running the #dracut -force command. 3 Reboot the host. Linux Host Server Reboot Best Practices It is recommended that you follow the procedures given below while rebooting your Linux host server using Device Mapper multipathing with an MD3600i Series storage array.
3 Flush the Device Mapper multipath maps list to remove any old or modified mappings: # multipath –F NOTE: The boot operating system drive may have an entry with the Device Mapper multipathing table. This is not affected by the multipath –F command.
This restores the failed paths enabling failback to occur. Configuration: Device Mapper Multipath for Linux (continued) Description Dell provided script. Forces a rescan of the host SCSI bus and aggregates multipathing devices as needed. For use when: • LUNs are dynamically mapped to the hosts.
• Failback can be slow when the host system is experiencing heavy I/O. The problem is exacerbated if the host server is also experiencing very high processor utilization. • The Device Mapper Multipath service can be slow when the host system is experiencing heavy I/O.
Page 206
Question I removed a LUN. But the multipathing mapping is still available. Failback does not happen as expected with the array. Configuration: Device Mapper Multipath for Linux Answer The multipathing device is still available after you remove the LUNs. Run multipath –f <device node for the deleted LUN>...
Management: Firmware Downloads Downloading RAID Controller and NVSRAM Packages A version number exists for each firmware file. The version number indicates whether the firmware is a major version or a minor version. You can use the Enterprise Management Window (EMW) to download and activate both the major firmware versions and the minor firmware versions.
Downloading Both RAID Controller and NVSRAM Firmware NOTE: I/O to the array can continue while you are upgrading RAID controller and NVSRAM firmware. NOTE: It is recommended that the firmware and NVSRAM be upgraded during a maintenance period when the array is not being used for I/O. NOTE: The RAID enclosure must contain at least two disk drives in order to update the firmware on the controller.
Page 209
7 Click Transfer. Keep these guidelines in mind: – If the Transfer button is inactive, ensure that you either select an NVSRAM file or clear the Transfer NVSRAM file with RAID controller module firmware. – If the file selected is not valid or is not compatible with the current storage array configuration, the File Selection Error dialog is displayed.
Page 210
The Select File dialog is displayed. 13 Select the file to download. 14 Click OK. 15 If you want to download the NVSRAM file with the RAID controller module firmware, select Download NVSRAM file with firmware in the Select files area. Attributes of the firmware file are displayed in the Firmware file information area.
Downloading Only NVSRAM Firmware Use the command line interface (CLI) to download and activate NVSRAM to several storage arrays. For more information, see the PowerVault Modular Disk Storage Manager online help topics. To download only NVSRAM firmware: 1 To download the NVSRAM firmware from: •...
Page 212
7 Perform one of these actions: • Select Tools Upgrade RAID Controller Module Firmware. Select the Setup tab, and click Upgrade RAID Controller Module • Firmware. The Upgrade RAID Controller Module Firmware window is displayed. The Storage array pane lists the storage arrays. The Details pane shows the details of the storage array that is selected in the Storage array pane.
12 Click OK. The Confirm Download dialog is displayed. 13 Click Yes. The download starts and a progress indicator is displayed in the Status column of the Upgrade RAID Controller Module Firmware window. Downloading Physical Disk Firmware CAUTION: When updating physical disk firmware, you must stop all I/O activity to the array to prevent data loss.
Page 214
• Make sure that the firmware that you download to the physical disks are compatible with the physical disks that you select. • Do not make any configuration changes to the storage array while downloading the firmware. NOTE: Downloads can take several minutes to complete. During a download, the Download Physical Disk - Progress dialog is displayed.
Downloading MD1200 Series Expansion Module EMM Firmware NOTE: Due to a limitation with Linux, expansion enclosure EMM firmware updates must be performed using out-of-band management only. Failure to do so may result in the host server becoming unresponsive, and it may require a reboot. You can transfer a downloadable firmware file to the expansion enclosure EMM in the expansion enclosures attached to the storage array.
NOTE: If you click Stop while a firmware download is in progress, the download-in-progress finishes before the operation stops. The status for the remaining expansion enclosures changes to Canceled. 7 Monitor the progress and completion status of the download to the expansion enclosures.
Page 217
controller encounters an error while accessing a peer disk, it is unable to recover the data and affected sectors are added to the unreadable sector log maintained by the controller. Other conditions under which sectors are added to the unreadable sector log include: •...
Management: Installing Array Components Recommended Tools You may need the following items to perform the procedures in this section: • Key to the system keylock • #2 Phillips screwdriver • Wrist grounding strap Management: Installing Array Components...
Front Bezel (Optional) Removing the Front Bezel 1 Using the system key, unlock the front bezel (if locked). 2 Lift up the release latch next to the keylock. 3 Rotate the left end of the bezel away from the front panel. 4 Unhook the right end of the bezel and pull the bezel away from the system.
2 Press the release tab and slide the hard-drive blank out until it is free of the drive bay. See Figure 16-2 for PowerVault MD3600i and Figure 16-3 for PowerVault MD3620i. Figure 16-2. Removing and Installing a 3.5" Hard-Drive Blank (MD3600i Only)
Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
Page 223
2 From the Modular Disk Storage Manager (MDSM) software, prepare the drive for removal. Wait until the hard-drive indicators on the drive carrier signal that the drive can be removed safely. For more information, see your controller documentation for information about hot-swap drive removal.
You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
Remove the screws from the slide rails on the hard-drive carrier and separate the hard drive from the carrier. See Figure 16-5 for PowerVault MD3600i and Figure 16-6 for PowerVault MD3620i. Figure 16-5. Removing and Installing a Hard Drive Into a 3.5" Hard-Drive Carrier...
Page 226
Figure 16-6. Removing and Installing a Hard Drive Into a 2.5" Hard-Drive Carrier screws (4) SAS screw hole Management: Installing Array Components hard-drive carrier hard drive...
Installing a Hard Drive Into a Hard-Drive Carrier 1 Insert the hard drive into the hard-drive carrier with the connector end of the drive at the back. See Figure 16-5. 2 Align the screw holes on the hard drive with the back set of holes on the hard-drive carrier.
5 Connect all the power cables to the array. 6 Turn on the array and the host server. Figure 16-7. Removing and Installing a RAID Controller Module Blank release latch Installing a RAID Controller Module Blank To install a RAID controller module blank: 1 Align the blank with the RAID controller module bay 2 Insert the blank into the chassis until it clicks into place.
You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
Page 235
Figure 16-11. Removing and Installing a Power Supply/Cooling Fan Module release tab power supply handle power supply Management: Installing Array Components...
Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
3 Remove the hard drives from: – slots 0 to 2 in PowerVault MD3600i – slots 0 to 5 in PowerVault MD3620i See "Removing a Hard Drive" on page 222. NOTE: Mark each hard drive with it’s slot position as you remove it.
Figure 16-14. Removing and Installing the Control Panel-PowerVault MD3620i release pin Installing the Control Panel 1 Align the control panel with the slot on the array. 2 Slide the control panel into the array until: The release tab clicks into place in PowerVault MD3600i.
You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
2 Tighten the captive screw to secure the backplane to the chassis. See Figure 16-16 for PowerVault MD3600i or Figure 16-17 for PowerVault MD3620i. 3 Replace the screws that secure the backplane to the chassis. See Figure 16-16 for PowerVault MD3600i or Figure 16-17 for PowerVault MD3620i.
Management: Firmware Inventory A storage array is made up of many components, which may include RAID controller modules, physical disks, and enclosure management modules (EMMs). Each of these components contains firmware. Some versions of the firmware are dependent on other versions of firmware. To capture information about all of the firmware versions in the storage array, view the firmware inventory.
Management: System Interfaces Microsoft Services Virtual Disk Service The Microsoft Virtual Disk Service (VDS) is a component of the Windows operating system. The VDS component utilizes third-party vendor specific software modules, known as providers, to access and configure third-party storage resources, such as MD3600i Series storage arrays. The VDS component exposes a set of application programming interfaces (APIs) that provides a single interface for managing disks and other storage hardware.
Page 246
VSS attaches to the service and uses it to coordinate the creation of snapshot virtual disks on the storage array. VSS-initiated snapshot virtual disks can be triggered through backup tools, known as requestors. The VSS Provider Configuration Tool offers the following configuration options: •...
At least two physical disks must be installed in the array. Device Health Conditions When you open the Enterprise Management Window (EMW), the Dell PowerVault Modular Disk Storage Management software (MDSM) establishes communication with each managed storage array and determines the current storage array status.
Page 248
To launch the AMW, perform one of these actions: • On the Devices tab, in either the Tree view or the Table view, double-click a storage array. Alternatively, you can right-click a storage array and select Manage Storage Array from the pop-up menu. On the Setup tab, select Manage a Storage Array.
Page 249
In the Table view, every managed storage array is listed once, regardless of the number of attachments it has in the Tree view. After the storage array is contacted by MDSM, an icon representing its hardware status is displayed. Hardware status can be Optimal, Needs Attention, or Fixing. If, however, all of the network management connections from the storage management station to the storage array shown in the Tree view are Unresponsive, the storage array status is represented as Unresponsive.
Page 250
Table 19-3. Additional Status Icons Status Icon Adding a Storage Array Adding a Storage Array OK Adding a Storage Array Error In the Tree view, icons can are displayed in a string to convey more information. For example, the following string means that the storage array is optimal, an alert is set for the storage array, and firmware is available for download.
Storage Array Support Data You can gather various types of inventory, status, and performance data that can help troubleshoot any problem with the storage array. All the files are compressed into a single archive in a zipped-file format. You can forward the archive file to your Technical Support representative for troubleshooting and further analysis.
WARNING: Use this option only under the guidance of your Technical Support representative. NOTE: Enable only one collect support bundle data to a single client system. Setting multiple systems to collect data may potentially affect the storage array performance. To automatically collect the support bundle data: 1 In the AMW, select Advanced...
Page 253
• A time stamp. • The version number for the RAID controller module firmware. • The version number for the management application programming interface (API). • The model ID for the RAID controller module board. • The collection status for each RAID controller module. If the status is Failed, the reason for failure is noted, and there is no trace file for the failed RAID controller module.
Collecting Physical Disk Data You can use the Collect Physical Disk Data option to collect log sense data from all the physical disks on your storage array. Log sense data consists of statistical information that is maintained by each of the physical disks in your storage array. Your Technical Support representative can use this information to analyze the performance of your physical disks and for troubleshooting problems that may exist.
Event Log You can use the Event Log Viewer to view a detailed list of events that occur in a storage array. The event log is stored on reserved areas on the storage array disks. It records configuration events and storage array component failures. WARNING: Use this option only under the guidance of your Technical Support representative.
Recovery Guru The Recovery Guru is a component of MDSM that diagnoses critical events on the storage array and recommends step-by-step recovery procedures to resolve the problems. In the AMW, to display the Recovery Guru, perform one of these actions: •...
Page 257
2 Perform one of these actions in the Storage Array Profile dialog: • View detailed information—Go to step 3. • Search the storage array profile—Go to step 4. • Save the storage array profile—Go to step 5. • Close the storage array profile—Go to step 6. 3 Select one of the tabs, and use the horizontal scroll bar and the vertical scroll bar to view the storage array profile information.
Viewing the Logical Associations You can use the Associated Logical Elements option to view the logical associations among different virtual disks in a storage array. To view the associations for source virtual disks, snapshot virtual disks, and snapshot repository virtual disks: 1 In the AMW, select the Logical tab.
Finding Nodes You can use the Find option to search for a particular node on the Logical tab, the Physical tab, or the Mappings tab of the AMW. The search may be based on a particular node name, the RAID level, virtual disk capacity, or specific free capacity nodes.
7 To search for all Free Capacity nodes with a particular capacity, perform these steps: NOTE: This option is not available when the Search by name option is selected or from the Mappings tab. You must cancel the selection of the Search by name option to use this option.
2 Select View Go To Snapshot Virtual Disk. The selection jumps to the associated snapshot virtual disk in the Logical pane. 3 Select View Go To Snapshot Repository Virtual Disk. The selection jumps to the associated snapshot repository virtual disk in the Logical pane.
Page 262
• Out-of-band managed storage array—Go to step 6. • In-band managed storage array—Go to step 12. 6 For an out-of-band managed storage array, ensure that the RAID controller modules are network accessible by using the ping command to make sure that the RAID controller module can be reached.
Page 263
If you started the host system before you were connected to the RAID controller module in the storage array, the Host Context Agent software is not able to detect the RAID controller modules. If this is the case, make sure that the connections are secure, and restart the Host Context Agent software.
Locating a Physical Disk You can use the Locate Physical Disk option to physically locate and identify one or more of the physical disks in an expansion enclosure by activating physical disk LEDs. To locate the physical disk: 1 Select the Physical tab. 2 Select the physical disks that you want to locate.
Locating an Expansion Enclosure You can use the Blink option to physically locate and identify an expansion enclosure in the storage array. The LED activation varies according to the type of expansion enclosure that you have. • If you have an expansion enclosure with a white LED, the Blink Expansion Enclosure operation causes the white LED on the expansion enclosure to come on.
Capturing the State Information Use the Troubleshooting Capture State Information option to capture information about the current state of your storage array and save the captured information to a text file. You can then send the captured information to your Technical Support representative for analysis. Potential to cause an unresponsive storage array –...
You can also use this utility to resolve duplicate signature problems for snapshot virtual disks. From a command prompt window on a host running Windows, navigate to: C:\Program Files\Dell\MD Storage Manager\util and run the following command: SMrepassist -f <filesystem-identifier> where, -f flushes all the memory-resident data for the file system indicated by <filesystem-identifier>, and <filesystem-identifier>...
Unidentified Devices An unidentified node or device occurs when MDSM cannot access a new storage array. Causes for this error include network connection problems, the storage array is turned off, or the storage array does not exist. NOTE: Before beginning any recovery procedure, make sure that the Host Context Agent software is installed and running.
Page 269
Make sure that the network can access the host by using the ping command in the following syntax: ping <host-name-or-IP-address-of-the-host>. If the network can access the host, continue to step c. If the network cannot access the host, go to step d. Remove the host with the unresponsive status from the MDSM, and add that host again.
Page 270
If this problem exists, see support.dell.com. 6 Look to see if there is too much network traffic to one or more controllers. This problem corrects itself because the MDSM tries to re-establish communication with the controllers in the storage array at regular times.
After the program completes the startup process, text similar to the following messages is displayed: Modular Disk Storage Manager Agent, Version 90.02.A6.14 Built Wed Feb 03 06:17:50 CST 2010 Copyright (C) 2009-2010 Dell, Inc. All rights reserved. Troubleshooting: Your Storage Array Software...
Page 272
Troubleshooting: Your Storage Array Software...
You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
Page 277
wait for up to 5 minutes to check if the LED has turned blue. See "Recovery Guru" on page 256. If following the recovery guru procedures does not solve the problem, complete the following procedure to further troubleshoot the array. Turn off the host server as appropriate.
You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
Typical hard controller failures are detailed in the following sections. Invalid Storage Array The RAID controller module is supported only in a Dell-supported storage array. Upon installation in the storage array, the controller performs a set of validation checks. The array status LED is lit with a steady amber color while the RAID controller module completes these initial tests and the controllers are booted successfully.
PCI Errors The storage array firmware can detect and only recover from PCI errors when the RAID controller modules are configured for redundancy. If a virtual disk uses cache mirroring, it fails over to its peer RAID controller module, which initiates a flush of the dirty cache.
NOTE: If you do not have an active Internet connection, you can find contact information on your purchase invoice, packing slip, bill, or Dell product catalog. Dell provides several online and telephone-based support and service options. Availability varies by country and product, and some services may not be available in your area.
Page 285
Initiator CHAP Secret, 89 Target CHAP Secret, 89 Valid Characters, 89 Choosing an Appropriate Physical Disk Type, 121 Configuring Host Access, 99 Hot Spare Physical Disks, 130 the iSCSI Host Ports, 91 Configuring Alert Notifications SNMP , 82 Contacting Dell, 283 Index...
Page 286
Dell, 283 control panel installing, 238 removing, 237 Copy Manager, 186 Defining a Host, 101 Dell contacting, 283 Disk Group Creating, 112 Expansion, 148 Export, 150 Exporting, 151 Import, 151 Locating, 114 Migration, 150 Disk Group and Virtual Disk...
Page 287
Free Capacity, 149 front bezel installing, 220 removing, 220 hard drive drive carrier, 225 installing, 224 removing, 222 Hard-Drive Indicator Patterns, 28 Hardware Features Back panel features, 27 Front panel features, 24 Hard drive indicator patterns, 28 Power indicator codes, 30 Power supply and cooling fan features, 29 Host Group...
Page 288
Media Errors and Unreadable Sectors, 216 Media Scan Changing settings, 153 Suspending, 154 Microsoft Virtual Disk Service, 245 Volume Shadow-Copy Service, 245 Microsoft Services Virtual Disk Copy, 52 Monitoring Performance, 57 Multi-Path Preferred and Alternate Controllers and Paths, 54 Multi-Path Software, 54 Non-Exportable Components, 150 Other Information, 21...
Page 289
Clocks, 84 Storage Array Media Scan, 152 Storage Arrays, 68 Automatic Discovery, 69 Manual Addition, 69 Storage Partitioning, 147 support contacting Dell, 283 telephone numbers, 283 Troubleshooting Automatically Collect the Support Bundle Data, 251 Capturing the State Information, 266 Collecting the Physical Disk...
Page 290
Recovery Guru, 256 Starting or Restarting the Host-Agent Software, 271 Start-Up Routine, 247 Storage Array Profile, 256 Storage Array Support Data, 251 Unidentified Devices, 268 Viewing the Logical Associations, 258 Viewing the Physical Associations, 258 troubleshooting, 273 connections, 279 cooling problems, 275 damaged enclosure, 280 external connections, 273 hard drives, 278...
Page 291
Virtual Disk Operations Limit, 45 Virtual Disk Ownership, 55 Virtual Disk States, 40 Virtual DiskCopy Target, 53 Virtual Disks and Disk Groups, 39 Index...
Need help?
Do you have a question about the POWERVAULT MD3620I and is the answer not in the manual?
Questions and answers