Dell PowerVault MD3200i Owner's Manual

Dell PowerVault MD3200i Owner's Manual

Storage arrays
Hide thumbs Also See for PowerVault MD3200i:
Table of Contents

Advertisement

Dell PowerVault MD3200i
and MD3220i Storage Arrays
Owner's Manual
Regulatory Model: E03J Series and E04J Series
Regulatory Type: E03J001 and E04J001

Advertisement

Table of Contents
loading

Summary of Contents for Dell PowerVault MD3200i

  • Page 1 Dell PowerVault MD3200i and MD3220i Storage Arrays Owner’s Manual Regulatory Model: E03J Series and E04J Series Regulatory Type: E03J001 and E04J001...
  • Page 2 Other trademarks and trade names may be used in this publication to refer to either the entities claiming the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own.
  • Page 3: Table Of Contents

    Contents Introduction About This Document Inside the box of the Dell PowerVault MD3200i Series Storage Array MD3200i Series Storage Array Dell PowerVault Modular Disk Storage Manager Dell PowerVault Modular Disk Configuration Utility Other Information You May Need Planning: About Your Storage Array...
  • Page 4 Planning: RAID Controller Modules RAID Controller Modules RAID Controller Module Connectors and Features RAID Controller Module—Additional Features Battery Backup Unit Storage Array Thermal Shutdown System Password Reset Cache Functions and Features Cache Mirroring Write-Back Cache Write-Through Cache Planning: MD3200i Series Storage Array Terms and Concepts Physical Disks, Virtual Disks, and Disk Groups Physical Disks...
  • Page 5 Foreground Initialization Consistency Check ....Media Verification ....Cycle Time .
  • Page 6 Monitoring MD3200i Series System Performance Configuration: Overview User Interface Enterprise Management Window Array Management Window Configuration: About Your Storage Array Out-of-Band and In-Band Management Storage Arrays Adding Storage Arrays Setting Up Your Storage Array Locating Storage Arrays Naming or Renaming Storage Arrays Setting a Password Viewing Storage Array Connections Adding/Editing a Comment to an Existing...
  • Page 7 Configuring E-mail Alerts Configuring SNMP Alerts Battery Settings Setting the Storage Array RAID Controller Module Clocks Configuration: Using iSCSI Changing the iSCSI Target Authentication Entering Mutual Authentication Permissions Creating CHAP Secrets Initiator CHAP Secret Target CHAP Secret Valid Characters for CHAP Secrets Changing the iSCSI Target Identification Changing the iSCSI Target Discovery Settings Configuring the iSCSI Host Ports...
  • Page 8 Linux Configuration: About Your Host Configuring Host Access Using the Mappings Tab Defining a Host Removing Host Access Managing Host Groups Creating a Host Group Moving a Host to a Different Host Group Removing a Host Group Host Topology Starting or Stopping the Host Context Agent I/O Data Path Protection Managing Host Port Identifiers...
  • Page 9 Changing the I/O Type Choosing an Appropriate Physical Disk Type Physical Disk Security with Self Encrypting Disk ..... Creating a Security Key Changing a Security Key Saving a Security Key Validate Security Key...
  • Page 10 Changing the RAID Level of a Disk Group Storage Partitioning Disk Group and Virtual Disk Expansion Disk Group Migration Import Disk Group Storage Array Media Scan 11 Configuration: Premium Feature—Snapshot Virtual Disks Scheduling a Snapshot Virtual Disk Creating a Snapshot Virtual Disk Using the Simple Path Contents .
  • Page 11 Preparing Host Servers to Create the Snapshot Using the Simple Path Creating a Snapshot Virtual Disk Using the Advanced Path About the Advanced Path Preparing Host Servers to Create the Snapshot Using the Advanced Path Creating the Snapshot Using the Advanced Path Specifying Snapshot Virtual Disk Names Snapshot Repository Capacity...
  • Page 12 Creating a Virtual Disk Copy for an MSCS Shared Disk Virtual Disk Read/Write Permissions Virtual Disk Copy Restrictions Creating a Virtual Disk Copy Preferred RAID Controller Module Ownership Failed RAID Controller Module Copy Manager Copying the Virtual Disk Storage Array Performance During Virtual Disk Copy Setting Copy Priority Stopping a Virtual Disk Copy...
  • Page 13 13 Configuration: Premium Feature —Upgrading to High-Performance-Tier 14 Configuration: Device Mapper Multipath for Linux Overview ......Using DM Multipathing Devices Prerequisite Steps Device Mapper Configuration Steps...
  • Page 14 Media Errors and Unreadable Sectors 16 Management: Installing Array Components Recommended Tools Front Bezel (Optional) Hard Drives RAID Controller Module RAID Controller Module Backup Battery Unit Contents ..... . .
  • Page 15 Power Supply/Cooling Fan Module Removing a Power Supply/Cooling Fan Module Installing a Power Supply/Cooling Fan Module Control Panel ..... . . Removing the Control Panel Installing the Control Panel Backplane...
  • Page 16 Collecting the Physical Disk Data Event Log Recovery Guru Storage Array Profile Viewing the Logical Associations Viewing the Physical Associations Finding Nodes Using Go To Recovering From an Unresponsive Storage Array Condition Locating a Physical Disk Locating an Expansion Enclosure Capturing the State Information SMrepassist Utility Unidentified Devices...
  • Page 17 21 Getting Help ..... . Contacting Dell Index ......
  • Page 18 Contents...
  • Page 19: Introduction

    Troubleshooting—Tasks that you must complete to resolve problems that may occur with the storage array. Additional information on these and other topics can be found in the Dell PowerVault MD3200i and MD3220i Storage Array Deployment Guide at support.dell.com/manuals.
  • Page 20: Md3200I Series Storage Array

    MD3200i Series Storage Array The Dell PowerVault MD3200i Series is a 2U rack-mounted external redundant array of independent disks (RAID) storage array capable of accommodating up to twelve 3.5" or twenty four 2.5" 6.0-Gbps Serial- Attached SCSI (SAS) disks.
  • Page 21 • This document as well as Dell PowerVault MD 1200 Series Installation Guide is available at support.dell.com/manuals for users who incorporate MD1200 expansion enclosures.
  • Page 22 Introduction...
  • Page 23: Planning: About Your Storage Array

    It features support for both single and dual RAID controller configuration. The Dell PowerVault MD3200i storage array provides 1.0-Gbps 1000 BaseT connectivity to the host server and enables access to 32 physical hosts. The MD3200i Series storage array includes: •...
  • Page 24: Hardware Features

    Hardware Features Front-Panel Features and Indicators Figure 2-1. Front-Panel Features and Indicators—Dell PowerVault MD3200i Figure 2-2. Front-Panel Features and Indicators—Dell PowerVault MD3220i Planning: About Your Storage Array...
  • Page 25 Figure 2-3. Front-Bezel Features and Indicators Item Indicator, Button, or Connector Enclosure status LED Power LED Icon Description The enclosure status LED lights when the enclosure power is on. Lights blue during normal operation. Blinks blue when a host server is identifying the enclosure or when the system identification button is pressed.
  • Page 26 Item Indicator, Button, or Connector Split mode LED System identification button Hard drives Enclosure mode switch Planning: About Your Storage Array Icon Description This LED must be unlit as the split mode function is not supported by the MD3200i Series Storage Arrays.
  • Page 27: Back Panel Features And Indicators

    Back Panel Features and Indicators Figure 2-4. Back-Panel Features and Indicators—Dell PowerVault MD3200i Series 600 W power supply/cooling fan module RAID Controller Module 1 RAID Controller Module 0 600 W power supply/cooling fan module Planning: About Your Storage Array...
  • Page 28: Hard-Drive Indicator Patterns

    Hard-Drive Indicator Patterns Figure 2-5. Hard Drive Indicators hard-drive activity indicator (green) Planning: About Your Storage Array hard-drive status indicator (green and amber)
  • Page 29: Power Supply And Cooling Fan Features

    Drive-Status Indicator Pattern Steady green Green flashing (On 250 ms, Off 250 ms) Physical disk is being identified Green flashing (On 400 ms, Off 100 ms) Physical disk rebuilding Amber flashing (On 150 ms, Off 150 ms) Physical disk failed Flashing green, amber, and off (green On 500 ms, amber On 500 ms, Off 1000 ms) Flashing green, amber, and Off (green 3...
  • Page 30: Power Indicator Codes And Features

    Power Indicator Codes and Features Figure 2-6. Power Indicator Codes and Features Item LED Type DC power Power supply/cooling fan fault AC power Power connector Power switches (2) Planning: About Your Storage Array Icon Description The LED lights green when the DC output voltage is within the limit.
  • Page 31: Planning: Raid Controller Modules

    Various configurations can be utilized, in both single controller (simplex) and dual controller (duplex) modes, to connect the storage enclosure to hosts depending on specific redundancy needs. For information on cabling, see the MD3200i and MD3220i Series storage array’s Deployment Guide at support.dell.com/manuals. Planning: RAID Controller Modules...
  • Page 32: Raid Controller Module Connectors And Features

    Provides host-to-controller iSCSI 1Gbps Ethernet connection. Provides host-to-controller iSCSI 1Gbps Ethernet connection. Provides host-to-controller iSCSI 1Gbps Ethernet connection. Provides host-to-controller iSCSI 1Gbps Ethernet connection. Provides a 100/1000 Mbps Ethernet connection for out-of-band management of the enclosure. Dell support only. 18 19...
  • Page 33 Item Component SAS OUT port link/fault LED iSCSI IN port link Controller power LED Lights green when controller is turned on. iSCSI IN port activity Controller fault LED System identification Cache active or cache offload LED Battery fault Password reset switch MAC address label Function Lights green when all four links are connected.
  • Page 34: Raid Controller Module-Additional Features

    Item Component Management port speed LED Management port activity LED RAID Controller Module—Additional Features Battery Backup Unit Each RAID controller contains a two-cell Lithium ion nanopolymer battery backup unit (BBU). It provides power to the RAID controller module in the event of a power outage.
  • Page 35: System Password Reset

    Table 3-1. Shutdown Threshold Type Threshold Temperature Exceeding Event Description Nominal failure threshold Maximum failure threshold Shutdown threshold System Password Reset The storage array system password can be reset if it is forgotten. To reset the password, push and hold down the password reset switch for at least 5 seconds.
  • Page 36: Write-Through Cache

    mirrored to the cache of the second controller before completion status is issued to the host initiator. Write-Back Cache is enabled by default unless cache mirroring is disabled. Write-Through Cache In write-through cache, data is written to the physical disk before completion status is returned to the host operating system.
  • Page 37: Planning: Md3200I Series Storage

    Number (LUN) that is recognized by the host operating system. Physical Disks Only Dell supported 6.0-Gbps SAS physical disks are supported in the storage array. If the storage array detects unsupported physical disks, it marks the disk as unsupported and the physical disk becomes unavailable for all operations.
  • Page 38: Physical Disk States

    NOTE: The MD3200i Series storage enclosure must contain at least two physical disks for proper operation. This is necessary because the physical disks are used to store configuration information. Physical Disk States Table 4-1 describes the various states of the physical disk, which are recognized by the storage array and reported in the MDSM application.
  • Page 39: Self-Monitoring Analysis And Reporting Technology

    Table 4-1. RAID Controller Physical Disk States Status Mode Offline Not applicable The physical disk has either been spun Identify Assigned, Unassigned, Hot Spare in use, or Hot Spare standby If a disk drive rebuild fails because of a source drive failure or because the drive is too small, the MDSM reports a failure of the physical disk even though the LED state on the drive indicates the rebuild was aborted (green for 3 seconds, amber for 3 seconds, then off for 3 seconds).
  • Page 40: Virtual Disk States

    Disk groups are always created in the unconfigured capacity of a storage array. Unconfigured capacity is the available physical disk space not already assigned in the storage array. Virtual disks are created within the free capacity of a disk group. Free capacity is the space in a disk group that has not been assigned to a virtual disk.
  • Page 41: Raid Level Usage

    Each RAID level provides different performance and protection. You must select a RAID level based on the type of application, access, fault tolerance, and data you are storing. The storage array supports RAID levels 0, 1, 5, 6, and 10. The maximum number of physical disks that can be used in a disk group depends on the RAID level: •...
  • Page 42: Segment Size

    is recommended for small databases or other applications that do not require large capacity. RAID 1 provides full data redundancy. For example accounting, payroll, or financial applications. RAID 5 RAID 5 uses parity and striping data across all physical disks (distributed parity) to provide high data throughput and data redundancy, especially for small random access.
  • Page 43: Virtual Disk Operations

    The segment size or stripe element size specifies the size of data in a stripe written to a single disk. The storage array supports stripe element sizes of 8 KB, 16 KB, 32 KB, 64 KB, 128 KB, 256 KB, and 512 KB. The default stripe element size is 128 KB.
  • Page 44: Consistency Check

    NOTE: Dell recommends that you run data consistency checks on a redundant array at least once a month. This allows detection and automatic replacement of unreadable sectors. Finding an unreadable sector during a rebuild of a failed physical disk is a serious problem, because the system does not have the redundancy to recover the data.
  • Page 45: Virtual Disk Operations Limit

    Virtual Disk Operations Limit The maximum number of active, concurrent virtual disk processes per RAID controller module installed in the storage array is four. This limit is applied to the following virtual disk processes: • Background initialization • Foreground initialization •...
  • Page 46: Virtual Disk Capacity Expansion

    When considering a segment-size change, two scenarios illustrate different approaches to the limitations: • If I/O activity stretches beyond the segment size, you can increase it to reduce the number of disks required for a single I/O. Using a single physical disk for a single request frees disks to service other requests, especially when you have multiple users accessing a database or storage environment.
  • Page 47: Disk Group Operations Limit

    Disk Group Operations Limit The maximum number of active, concurrent disk group processes per installed RAID controller module is one. This limit is applied to the following disk group processes: • Virtual disk RAID level migration • Segment size migration •...
  • Page 48: Virtual Disk Migration And Disk Roaming

    The priority of each of these operations can be changed to address performance requirements of the environment in which the operations are to be executed. NOTE: Setting a high priority level impacts storage array performance. It is not advisable to set priority levels at the maximum level. Priority must also be assessed in terms of impact to host server access and time to complete an operation.
  • Page 49 NOTE: Only disk groups and associated virtual disks with all member physical disks present can be migrated from one storage array to another. It is recommended that you only migrate disk groups that have all their associated member virtual disks in an optimal state.
  • Page 50: Disk Roaming

    that has no existing physical disks. After the destination storage array is turned on and has successfully recognized the newly migrated physical disks, migration operations can continue. NOTE: Disk groups from multiple storage arrays must not be migrated at the same time to a storage array that has no existing physical disks.
  • Page 51: Host Server-To-Virtual Disk Mapping

    Host Server-to-Virtual Disk Mapping The host server attached to a storage array accesses various virtual disks on the storage array through its host ports. Specific virtual disk-to-LUN mappings to an individual host server can be defined. In addition, the host server can be part of a host group that shares access to one or more virtual disks.
  • Page 52: Snapshot Repository Virtual Disk

    For more information on mapping the snapshot virtual disk to the secondary node, see the Dell PowerVault MD3200i and MD3220i Storage Arrays With Microsoft Windows Server Failover Clusters on support.dell.com/manuals. Planning: MD3200i Series Storage Array Terms and Concepts...
  • Page 53: Virtual Disk Copy

    Virtual Disk Copy Virtual disk copy is a premium feature to: • Back up data • Copy data from disk groups that use smaller-capacity physical disks to disk groups using greater capacity physical disks • Restore snapshot virtual disk data to the source virtual disk. Virtual disk copy generates a full copy of data from the source virtual disk to the target virtual disk in a storage array and can be performed either online or offline.
  • Page 54: Virtual Disk Recovery

    Virtual Disk Recovery You can use the Edit host server-to-virtual disk mappings feature to recover data from the backup virtual disk. This functionality enables you to unmap the original source virtual disk from its host server, then map the backup virtual disk to the same host server.
  • Page 55: Preferred And Alternate Controllers And Paths

    The multi-path software identifies the existence of multiple paths to a virtual disk and establishes a preferred path to that disk. If any component in the preferred path fails, the multi-path software automatically re-routes I/O requests to the alternate path so that the storage array continues to operate without interruption.
  • Page 56: Load Balancing

    Ownership can later be modified to balance workload according to actual usage. If virtual disk ownership is not manually balanced, it is possible for one controller to have the majority of the work, while the other controller is idle. Limit the number of virtual disks in a disk group. If multiple virtual disks are in a disk group, consider: •...
  • Page 57: Monitoring Md3200I Series System Performance

    • Least path weight with subset (Windows operating systems only)—The least queue depth with subset policy is also known as the least I/Os or least requests policy. This policy routes the next I/O request to a data path that has the least outstanding I/O requests queued. For this policy, an I/O request is simply a command in the queue.
  • Page 58 • RAID Controller modules • Virtual disks • Storage array totals NOTE: By default, all items are selected. In Polling interval, select how often you want to update the performance statistics. NOTE: For an accurate elapsed time, do not use the Set RAID Controller Module Clocks option while using the Performance Monitor.
  • Page 59 The Performance Monitor data provides information about how your storage array is performing. The data is presented in eight columns, which are described in this table. Use this data to make performance tuning decisions for your storage array. Table 4-3. Performance Monitor Table Description Column Headings Devices Total IOs...
  • Page 60 Planning: MD3200i Series Storage Array Terms and Concepts...
  • Page 61: Configuration: Overview

    Configuration: Overview Dell PowerVault Modular Disk Storage Manager (MDSM) online help contains information on how to use the MDSM application to perform the configuration and management tasks described in this document. You can access online help by clicking Help located at the top right corner of MDSM interface.
  • Page 62: Enterprise Management Window

    Enterprise Management Window The EMW provides high-level management of storage arrays. When you start MDSM, the EMW is displayed. The EMW has these tabs: Devices tab—Provides information about the storage arrays. • • Setup tab—Presents the initial setup tasks that guide you through adding storage arrays and configuring alerts.
  • Page 63: Array Management Window

    Inheriting the System Settings Use the Inherit System Settings option to import the operating system theme settings into the MDSM. Importing system theme settings affects features like font type, font size, color, and contrast in the MDSM. 1 Open the Inherit System Settings window in one of these ways: •...
  • Page 64 • Logical tab—You can view the organization of the storage array by virtual disks, disk groups, free capacity nodes, and any unconfigured capacity for the storage array. • Physical tab—You can view the organization of the storage array by RAID controller modules, physical disks, and other hardware components.
  • Page 65: Configuration: About Your Storage Array

    Configuration: About Your Storage Array Out-of-Band and In-Band Management You can manage a storage array in two ways: • Out-of-band management • In-band management Out-of-Band Management Using the out-of-band management method, data is separate from commands and events. Data travels through the host-to-controller interface, while commands and events travel through the management port Ethernet cables.
  • Page 66: Storage Arrays

    Manually add storage arrays NOTE: Verify that your host or management station network configuration— including station IP address, subnet mask, and default gateway—is correct before adding a new storage array using the Automatic option. Configuration: About Your Storage Array at support.dell.com/manuals.
  • Page 67 NOTE: For Linux, set the default gateway so that broadcast packets are sent to 255.255.255.0. For Red Hat Enterprise Linux, if no gateway exists on the network, set the default gateway to the IP address of the NIC. NOTE: MDSM uses TCP/UDP port 2463 for communication to the MD Storage Array.
  • Page 68: Setting Up Your Storage Array

    NOTE: When adding a storage array using in-band management with iSCSI, a session must first be established between the initiator on the host server and the storage array. For more information, see "Configuration: Using iSCSI" on page 83. NOTE: The host agent must be restarted before in-band management communication can be established.
  • Page 69: Locating Storage Arrays

    • Configure the storage array—Create disk groups, virtual disks, and hot spare physical disks by using the Automatic configuration method or the Manual configuration method. For more information, see the PowerVault Modular Disk Storage Manager online help topics. • Map virtual disks—Map virtual disks to hosts or host groups. •...
  • Page 70: Naming Or Renaming Storage Arrays

    • In the AMW, select Storage ArrayBlinkStorage Array. The LEDs blink on the physical disks in the storage array. 2 After locating the storage array, click OK. The LEDs stop blinking. 3 If the LEDs do not stop blinking, select Storage ArrayBlink Stop All Indications.
  • Page 71: Setting A Password

    5 Click Yes. The new storage array name is displayed in the Select storage array table. 6 Repeat step 2 through step 4 to name or rename additional storage arrays. NOTE: Avoid arbitrary names or names that may lose meaning in the future. Setting a Password You can configure each storage array with a password to protect it from unauthorized access.
  • Page 72: Viewing Storage Array Connections

    6 Click OK. NOTE: You are not prompted for a password when you attempt to change the storage array configuration in the current management session. Password Guidelines Follow these guidelines when you create a password: • Use secure passwords for your storage array. A password must be easy for you to remember but difficult for others to determine.
  • Page 73: Adding/Editing A Comment To An Existing Storage Array

    Adding/Editing a Comment to an Existing Storage Array A descriptive comment, with an applicable storage array name, is a helpful identification tool. You can add or edit a comment for a storage array in the EMW only. To add or edit a comment: 1 In the EMW, select the Devices tab and select the relevant managed storage array.
  • Page 74: Enabling Premium Features

    Enabling Premium Features You can enable premium features on the storage array. To enable the premium features, you must obtain a feature key file specific to the premium feature that you want to enable from your storage supplier. To enable premium features: 1 From the toolbar in AMW, select Storage Array...
  • Page 75: Changing Expansion Enclosure Id Numbers

    2 Select or enter the percentage of unwritten data in the cache to trigger a cache flush in Start flushing. 3 Select or enter the percentage of unwritten data in the cache to stop a cache flush in progress in Stop flushing. 4 Select the appropriate Cache block size.
  • Page 76: Configuring Alert Notifications

    3 Click OK. If you have set a password for the selected storage array, the Enter Password dialog is displayed. 4 Type the current password for the storage array. 5 Click OK. Configuring Alert Notifications MDSM can send an alert for any condition on the storage array that requires your attention.
  • Page 77: Configuring E-Mail Alerts

    To configure e-mail alerts: 1 Open the Configure Alerts dialog by performing one of these actions: In the Tree view or the Table view on the Devices tab in the EMW, • select a node, and then select Edit Configure Alerts. Go to step 3. •...
  • Page 78: To Ensure E-Mail Is Sent Successfully

    • Adding an e-mail address—In Email address, type the e-mail address, and click Add. • Replacing an e-mail address—In the Configured email addresses area, select the e-mail address to be replaced, type the replacement e-mail address in Email address, and click Replace. •...
  • Page 79: Configuring Snmp Alerts

    • The e-mail addresses that you had previously configured are displayed in the Configured e-mail addresses area. • You must use fully qualified e-mail addresses, for example, name@mycompany.com. You can configure multiple e-mail addresses before you click OK. • Configuring SNMP Alerts To add a management console to the list of addresses configured to receive SNMP alerts: 1 Open the Configure Alerts dialog by performing one of these actions:...
  • Page 80: Battery Settings

    “public”. The trap destination is the IP address or the host name of a computer running an SNMP management application. An example of a SNMP enabled management application is the Dell Management Console. For more information on Dell Management Console, see dell.com.
  • Page 81: Setting The Storage Array Raid Controller Module Clocks

    The learn cycle completes the following operations: • Discharges the battery to a predetermined threshold • Charges the battery back to full capacity A learn cycle starts automatically when you install a new battery module. Learn cycles for batteries in both RAID controller modules in a duplex system occur simultaneously.
  • Page 82 written by the RAID controller modules to the Event Log match the event timestamps written to host log files. The RAID controller modules remain available during synchronization. To synchronize the RAID controller module clocks with the storage management station: 1 In the AMW, select Storage Array Synchronize RAID Controller Module Clocks.
  • Page 83: Configuration: Using Iscsi

    Configuration: Using iSCSI Changing the iSCSI Target Authentication 1 In the AMW, select the Setup tab. 2 Select Manage iSCSI Settings. The Manage iSCSI Settings window is displayed and by default, the Target Authentication tab is selected. To change the authentication settings, select: •...
  • Page 84: Entering Mutual Authentication Permissions

    Entering Mutual Authentication Permissions Mutual authentication or two-way authentication enables a client or a user to verify themselves to a host server and for the host server to validate itself to the user. This validation is accomplished in such a way that both parties are sure of the other’s identity.
  • Page 85: Initiator Chap Secret

    Initiator CHAP Secret The initiator CHAP secret is set on the host using the iSCSI initiator configuration program provided with the host operating system. If you are using the mutual authentication method, you must define the initiator CHAP secret when you set up the host. This must be the same CHAP secret that is defined for the target when defining mutual authentication settings.
  • Page 86: Changing The Iscsi Target Identification

    Changing the iSCSI Target Identification You cannot change the iSCSI target name, but you can associate an alias with the target for simpler identification. Aliases are useful because the iSCSI target names are not intuitive. Provide an iSCSI target alias that is meaningful and easy to remember.
  • Page 87: Configuring The Iscsi Host Ports

    • Select Specify Configuration, and type the IPv4 address to activate the target discovery. • Type the iSNS server IP address in the IPv6 settings area to activate the target discovery. After you manually enter an IP address, you can also click Advanced to configure the customized TCP listening ports.
  • Page 88 4 To use the IPv4 settings for the iSCSI host port, select Enable IPv4 and select the IPv4 Settings tab. 5 To use the IPv6 settings for the iSCSI host port, select Enable IPv6 and select the IPv6 Settings tab. 6 To configure the IPv4 and IPv6 settings: To automatically configure the settings, select Obtain configuration •...
  • Page 89: Advanced Iscsi Host Ports Settings

    Advanced iSCSI Host Ports Settings NOTE: Configuring the advanced iSCSI host ports settings is optional. Use the advanced settings for the individual iSCSI host ports to specify the TCP frame size, the virtual LAN, and the network priority. Table 7-2. Advanced iSCSI Host Port Settings Setting Description Virtual LAN (VLAN) A method of creating independent logical networks within a...
  • Page 90: Viewing Or Ending An Iscsi Session

    Viewing or Ending an iSCSI Session You may want to end an iSCSI session for the following reasons: • Unauthorized access—If an initiator whom you consider to not have access is logged on, you can end the iSCSI session. Ending the iSCSI session forces the initiator to log off the storage array.
  • Page 91: Viewing Iscsi Statistics And Setting Baseline Statistics

    Viewing iSCSI Statistics and Setting Baseline Statistics To view iSCSI statistics and set baseline statistics: 1 In the AMW toolbar, select Storage Array iSCSI Statistics. The View iSCSI Statistics window is displayed. 2 Select the iSCSI statistic type you want to view in the iSCSI Statistics Type area.
  • Page 92: Edit, Remove, Or Rename Host Topology

    Edit, Remove, or Rename Host Topology If you give access to the wrong host or the wrong host group, you can remove or edit the host topology. To correct the host topology: Table 7-3. Host Topology Actions Desired Action Move a host. Move a host group.
  • Page 93: Configuration: Event Monitor

    Configuration: Event Monitor An event monitor is provided with Dell PowerVault Modular Disk Storage Manager (MDSM). The event monitor runs continuously in the background and monitors activity on the managed storage arrays. If the event monitor detects any critical problems, it can notify a host or remote system using e- mail, Simple Network Management Protocol (SNMP) trap messages, or both.
  • Page 94: Windows

    Windows To enable or disable the event monitor: 1 Click Start Administrative Tools Services. Click Start Settings Control Panel Administrative Tools Services. 2 From the list of services, select Modular Disk Storage Manager Event Monitor. 3 Select Action Properties. 4 To enable the event monitor, in the Service Status area, click Start. 5 To disable the event monitor, in the Service Status area, click Stop.
  • Page 95: Configuration: About Your Host

    Configuration: About Your Host Configuring Host Access Modular Disk Storage Manager (MDSM) software is comprised of multiple modules. One of these modules is the Host Context Agent. The host context agent is installed as part of the MDSM installation and runs continuously in the background.
  • Page 96: Using The Mappings Tab

    • Create a host and assign an alias or user label. • Add or associate a new host port identifier to a particular host. • Change the host port identifier alias or user label. • Move or associate a host port identifier to a different host. •...
  • Page 97: Click Next

    • Select the Mappings tab. Right-click the root node (storage array name), Default Group node, or Host Group node in the Topology pane to which you want to add the host, and select Define Host from the pop-up menu. The Specify Host Name window is displayed. 3 In Host name, enter an up to 30 character alphanumeric name.
  • Page 98: Removing Host Access

    The Preview window is displayed. 11 Click Finish. Removing Host Access To remove host access: 1 In the AMW, select the Mappings tab, select the host node in the Topology pane. 2 Perform one of these actions: • Select Mappings Remove. •...
  • Page 99: Moving A Host To A Different Host Group

    • Right-click the storage array or the Default Group, and select Define Host Group from the pop-up menu. 4 Type the name of the new host group in Enter new host group name. 5 Select the appropriate hosts in the Select hosts to add area. 6 Click Add.
  • Page 100: Removing A Host Group

    4 Click Yes. The host is moved to the selected host group with the following mappings: • The host retains the specific virtual disk mappings assigned to it. • The host inherits the virtual disk mappings assigned to the host group to which it is moved.
  • Page 101: Starting Or Stopping The Host Context Agent

    • Changing a host type MDSM automatically detects these changes for any host running the host agent software. Starting or Stopping the Host Context Agent The host context agent discovers the host topology and starts and stops with the host. The topology discovered by the host context agent can be viewed by clicking Configure Host Access (Automatic) in the Configure tab in the MDSM.
  • Page 102: I/O Data Path Protection

    4 Click Action Start. I/O Data Path Protection You can have multiple host-to-array connections for a host. Ensure that you select all the connections to the array when configuring host access to the storage array. NOTE: See the Deployment Guide for more information on cabling configurations. NOTE: For more information on configuring hosts see "Configuration: About Your Host"...
  • Page 103: Managing Host Port Identifiers

    Managing Host Port Identifiers You can manage the host port identifiers that are added to the storage array. You can: • Add—Add or associate a new host port identifier to a particular host. • Edit—Change the host port identifier alias or user label. You can move (associate) the host port identifier to a new host.
  • Page 104 • Add by creating a new host port identifier—In New host port identifier, enter the name of the new host port identifier. 6 In User label, enter up to 30 character alphanumeric name. 7 In Associated with host, select the appropriate host or host group. 8 Select the host port identifier that you would like to manage from the list of host port identifiers in the Host port identifier information area.
  • Page 105: Configuration: Disk Groups And Virtual Disks

    Configuration: Disk Groups and Virtual Disks Creating Disk Groups and Virtual Disks Disk groups are created in the unconfigured capacity of a storage array, and virtual disks are created in the free capacity of a disk group. The maximum number of physical disks supported in a disk group is 30. The hosts attached to the storage array read and write data to the virtual disks.
  • Page 106: Creating Disk Groups

    A disk group must be organized according to its related tasks and subtasks. For example, if you create a disk group for the Accounting Department, you can create virtual disks that match the different types of accounting transactions performed in the department: Accounts Receivable (AR), Accounts Payable (AP), internal billing, and so forth.
  • Page 107 3 Type the name of the disk group (up to 30 characters) in Disk group name. 4 Select the appropriate Physical Disk selection choices, you can select: Automatic, see step 6 • Manual, see step 9 • 5 Click Next. 6 For Automatic configuration, the RAID Level and Capacity window is displayed.
  • Page 108: Locating A Disk Group

    Locating a Disk Group You can physically locate and identify all of the physical disks that comprise a selected disk group. An LED blinks on each physical disk in the disk group. To locate a disk group: 1 In the AMW, select the Logical tab. 2 Select the appropriate disk group and from the toolbar select Disk Group...
  • Page 109 NOTE: Ensure that you create disk groups before creating virtual disks. To create virtual disks: 1 Choose one of these methods to start the Create Virtual Disk Wizard: • To create a virtual disk from unconfigured capacity in the storage array—On the Logical tab, select an Unconfigured Capacity node, and select Virtual Disk...
  • Page 110: Changing The Virtual Disk Modification Priority

    • Use recommended settings. • Customize settings. 6 Click Next. 7 In the Customize Advanced Virtual Disk Parameters window, select the appropriate Virtual Disk I/O characteristics type. You can select: • File system (typical) • Database • Multimedia • Custom NOTE: If you select Custom, you must select an appropriate segment size.
  • Page 111: Changing The Virtual Disk Cache Settings

    2 Select a virtual disk. 3 In the toolbar, select Virtual Disk Change Modification Priority. The Change Modification Priority window is displayed. 4 Select one or more virtual disks. To select nonadjacent virtual disks, press <Ctrl> click. To select adjacent virtual disks, press <Shift>...
  • Page 112 2 In the toolbar, select Virtual Disk Change Cache Settings. The Change Cache Settings window is displayed. 3 Select one or more virtual disks. To select nonadjacent virtual disks, press <Ctrl> click. To select adjacent virtual disks, press <Shift> click. To select all of the available virtual disks, click Select All.
  • Page 113: Changing The Segment Size Of A Virtual Disk

    7 Click OK. Changing the Segment Size of a Virtual Disk You can change the segment size on a selected virtual disk. During this operation, I/O performance is affected, but your data remains available. Guidelines to proceed with changing the segment size: •...
  • Page 114: Changing The I/O Type

    The segment size modification operation begins. The virtual disk icon in the Logical pane shows an Operation in Progress status while the operation is taking place. NOTE: To view the progress or change the priority of the modification operation, select a virtual disk in the disk group, and select Virtual Disk Change Modification Priority.
  • Page 115: Choosing An Appropriate Physical Disk Type

    NOTE: If you selected the Custom option, select your preferred dynamic cache read prefetch setting (enabled/disabled) and segment size (8 KB to 512 KB). 2 Click OK. Choosing an Appropriate Physical Disk Type You can create disk groups and virtual disks in the storage array. You must select the capacity that you want to allocate for the virtual disk from either unconfigured capacity or free capacity available in the storage array.
  • Page 116 Whenever the power is turned off and turned on again, all of the security- enabled physical disks change to a security locked state. In this state, the data is inaccessible until the correct security key is provided by a RAID controller module.
  • Page 117 NOTE: If you have not created a security key for the storage array, the Create Security Key option is active. If you have created a security key for the storage array, the Create Security Key option is inactive with a check mark to the left. The Change Security Key option, the Save Security Key option, and the Validate Security Key option are now active.
  • Page 118: Creating A Security Key

    Creating a Security Key When you create a security key, it is generated by and securely stored by the array. You cannot read or view the security key. A copy of the security key must be kept on some other storage medium for backup in case of system failure or for transfer to another storage array.
  • Page 119: Changing A Security Key

    The pass phrase that you enter is masked. NOTE: Create Key is active only if the pass phrase meets the above mentioned criterion. 5 In Confirm pass phrase, re-enter the exact string that you entered in Pass phrase. Make a record of the pass phrase that you entered and the security key identifier that is associated with the pass phrase.
  • Page 120 To change the security key: 1 In the AMW toolbar, select Storage ArrayPhysical Disk Security Change Security Key. The Confirm Change Security Key window is displayed. 2 Type yes in the text field, and click OK. The Change Security Key window is displayed. 3 In Secure key identifier, enter a string that becomes part of the secure key identifier.
  • Page 121: Saving A Security Key

    Saving a Security Key You save an externally storable copy of the security key when the security key is first created and each time it is changed. You can create additional storable copies at any time. To save a new copy of the security key, you must provide a pass phrase.
  • Page 122: Validate Security Key

    Validate Security Key A file in which a security key is stored is validated through the Validate Security Key dialog. To transfer, archive, or back up the security key, the RAID controller module firmware encrypts (or wraps) the security key and stores it in a file.
  • Page 123: Configuring Hot Spare Physical Disks

    Before you complete this option, make sure that the physical disk that you have selected is the correct physical disk. You cannot recover any of the data that is currently on the physical disk. After you complete the secure erase procedure, the physical disk is available for use in another disk group or in another storage array.
  • Page 124 To assign or unassign hot spare physical disks: 1 In the AMW, select the Physical tab. 2 Select one or more physical disks. 3 Perform one of these actions: Select Physical disk Hot Spare Coverage. • • Right-click the physical disk and select Hot Spare Coverage from the pop-up menu.
  • Page 125: Hot Spares And Rebuild

    12 Type yes and click OK. Hot Spares and Rebuild A valuable strategy to protect data is to assign available physical disks in the storage array as hot spares. A hot spare adds another level of fault tolerance to the storage array. A hot spare is an idle, powered-on, stand-by physical disk ready for immediate use in case of disk failure.
  • Page 126: Hot Spare Drive Protection

    Hot Spare Drive Protection You can use a hot spare physical disk for additional data protection from physical disk failures that occur in a RAID level 1, or RAID level 5 disk group. If the hot spare physical disk is available when a physical disk fails, the RAID controller module uses redundancy data to reconstruct the data from the failed physical disk to the hot spare physical disk.
  • Page 127 CAUTION: Enclosure loss protection is not guaranteed if a physical disk has already failed in the disk group. In this situation, losing access to an expansion enclosure and consequently another physical disk in the disk group causes a double physical disk failure and loss of data. Enclosure loss protection is achieved when you create a disk group where all of the physical disks that comprise the disk group are located in different expansion enclosures.
  • Page 128: Host-To-Virtual Disk Mapping

    Table 10-2. Criteria for Enclosure Loss Protection RAID Level Criteria for Enclosure Loss Protection RAID level 1 Ensure that each physical disk in a mirrored pair is located in a different expansion enclosure. This enables you to have more than two physical disks in the disk group within the same expansion enclosure.
  • Page 129: Creating Host-To-Virtual Disk Mappings

    • Each host has its own LUN address space. MDSM permits the same LUN to be used by different hosts or host groups to access virtual disks in a storage array. • Not every operating system has the same number of LUNs available. You can define the mappings on the Mappings tab in the AMW.
  • Page 130: Modifying And Removing Host-To-Virtual Disk Mapping

    All defined hosts, host groups, and the default group is displayed in the list. NOTE: When configuring an iSCSI storage array, including the MD3200i or MD3220i, if a host or a host group is selected that does not have a SAS host bus adapter (SAS HBA) host port defined, a warning dialog is displayed.
  • Page 131: Changing Controller Ownership Of The Virtual Disk

    • Right-click the virtual disk, and select Change Mapping from the pop-up menu. 3 In Host group or host, select the appropriate host group or host. By default, the drop-down list shows the current host group or the host associated with the selected virtual disk. 4 In Logical unit number, select the appropriate LUN.
  • Page 132: Removing Host-To-Virtual Disk Mapping

    During a virtual disk copy, the same RAID controller module must own both the source virtual disk and the target virtual disk. Sometimes both virtual disks do not have the same preferred RAID controller module when the virtual disk copy starts. Therefore, the ownership of the target virtual disk is automatically transferred to the preferred RAID controller module of the source virtual disk.
  • Page 133: Changing The Raid Level Of A Disk Group

    associated source virtual disk. Changing the RAID controller module ownership of a virtual disk changes the preferred RAID controller module ownership of the virtual disk. During a virtual disk copy, the same RAID controller module must own both the source virtual disk and the target virtual disk. Sometimes both virtual disks do not have the same preferred RAID controller module when the virtual disk copy starts.
  • Page 134: Removing A Host-To-Virtual Disk Mapping Using Linux Dmmp

    # multipath -ll Note the virtual disk that you want to delete from the mapping. For example, the following information may be displayed: mpath6 (3600a0b80000fb6e50000000e487b02f5) dm-10 DELL, MD32xx [size=1.6T][features=3 queue_if_no_path pg_init_retries 50][hwhandler=1 rdac] \_ round-robin 0 [prio=6][active] \_ 1:0:0:2 sdf 8:80 [active][ready]...
  • Page 135 In this example, the mpath6 device contains two paths: -- /dev/sdf at Host 1, Channel 0, Target 0, LUN 2 --/dev/sde at Host 0, Channel 0, Target 0, LUN 2 3 Flush the multi-pathing device mapping using the following command: # multipath -f /dev/mapper/mapth_x where mapth_x is the device you want to delete.
  • Page 136: Restricted Mappings

    Restricted Mappings Many hosts are able to map up to 256 logical unit numbers (LUNs) (0 to 255) per storage partition. However, the maximum number of mappings differs because of operating system variables, failover driver issues, and potential data problems. The hosts listed in the table have these mapping restrictions. If you try to map a virtual disk to a LUN that exceeds the restriction on these operating systems, the host is unable to access the virtual disk.
  • Page 137: Changing The Raid Controller Module Ownership Of A Virtual Disk Or A Disk Group

    • You cannot move a host with a restricted host type into a storage partition that already has LUNs mapped that are greater than what is allowed by the restricted host type. For example, if you have a restricted host type that allows only LUNs up to 31, you cannot move that restricted host type into a storage partition that has LUNs greater than 31 already mapped.
  • Page 138 Change the RAID controller module ownership of a virtual disk—Go to step 2. Change the RAID controller module ownership of a disk group—Go to step 3. 2 To change the RAID controller module ownership of a virtual disk, perform these steps: Select the Logical tab.
  • Page 139: Changing The Raid Level Of A Disk Group

    Click Yes. The ownership of the disk group is changed. I/O to the disk group is now directed through this I/O path. You are finished with this procedure. NOTE: The disk group may not use the new I/O path until the multi-path driver reconfigures and recognizes the new path.
  • Page 140: Storage Partitioning

    Storage Partitioning A storage partition is a logical entity consisting of one or more virtual disks that can be accessed by a single host or shared among hosts that are part of a host group. The first time you map a virtual disk to a specific host or host group, a storage partition is created.
  • Page 141: Disk Group And Virtual Disk Expansion

    NOTE: You can include a secondary virtual disk in a storage partition. However, any hosts that are mapped to the secondary virtual disk has read-only access until the virtual disk is promoted to a primary virtual disk, or the mirror relationship is removed.
  • Page 142: Virtual Disk Expansion

    5 Click Add. A message prompts you to confirm your selection. 6 To add the capacity to the disk group, click Yes. You can also use the Command Line Interface (CLI) on both Windows and Linux hosts to add free capacity to a disk group. After the capacity expansion is completed, additional free capacity is available in the disk group for creation of new virtual disks or expansion of existing virtual disks.
  • Page 143: Disk Group Migration

    For more information, see the PowerVault Modular Disk Storage Manager online help topics. Disk Group Migration Disk group migration allows to you export a disk group so that you can import the disk group to a different storage array. You can also export a disk group so that you can store the data offline.
  • Page 144: Import Disk Group

    2 Stop all I/O and unmount or disconnect the file systems on the virtual disks in the disk group. 3 Back up the data on the virtual disks in the disk group. 4 Locate the disk group and label the physical disks. 5 Place the disk group offline.
  • Page 145: Storage Array Media Scan

    NOTE: Some settings cannot be imported during the import disk group procedure. The following settings are removed/cleared during the procedure: • Persistent reservations • Host-to-virtual disk mappings • Virtual disk copy pairs • Snapshot virtual disks and snapshot repository virtual disks •...
  • Page 146: Changing Media Scan Settings

    • Recovered media error—Data could not be read by the physical disk on the first attempt but was successfully read on a subsequent attempt. Data is rewritten to the physical disk and verified and the error is reported to the event log.
  • Page 147: Suspending The Media Scan

    8 Click OK. Suspending the Media Scan You cannot perform a media scan while performing another long-running operation on the disk drive such as reconstruction, copy-back, reconfiguration, virtual disk initialization, or immediate availability formatting. If you want to perform another long-running operation, you must suspend the media scan.
  • Page 148 Configuration: Disk Groups and Virtual Disks...
  • Page 149: Configuration: Premium Feature-Snapshot Virtual Disks

    If you ordered this feature, you received a Premium Feature Activation card shipped in the same box as your Dell PowerVault MD storage array. Follow the directions on the card to obtain a key file and to enable the feature.
  • Page 150: Scheduling A Snapshot Virtual Disk

    repository uses less disk space than a full physical copy, because the only data blocks that are stored in the snapshot repository virtual disk are those that have changed since the time of the snapshot. When you create a snapshot virtual disk, specify its location, capacity, schedule, and other parameters.
  • Page 151: Guidelines For Creating Snapshot Schedules

    To implement this backup, select the first virtual disk and create a backup schedule that runs once a day, Monday through Friday, at a time between the end of the work day and 11PM. Do not select an end date. Apply the same schedule to the second virtual disk, then map the two snapshot virtual disks to your backup host server and perform your regular backup procedures.
  • Page 152: Enabling And Disabling Snapshot Schedules

    Enabling and Disabling Snapshot Schedules A scheduled snapshot operation can be temporarily suspended by disabling the schedule. When a schedule is disabled, the schedule timer continues to run but any scheduled snapshot operation do not occur. Scheduled Snapshot Icons Scheduled snapshots are displayed in the AMW using the following icons. Icon Description The schedule is enabled.
  • Page 153: About The Simple Path

    About the Simple Path Using the simple path, you can specify: • Snapshot Virtual Disk Name—A user-specified name that helps you associate the snapshot virtual disk to its corresponding snapshot repository virtual disk and source virtual disk. • Snapshot Repository Virtual Disk Name—A user-specified name that helps you associate the snapshot repository virtual disk to its corresponding snapshot virtual disk and source virtual disk.
  • Page 154 NOTE: For fore information on mapping the snapshot virtual disk to the secondary node, see the Dell PowerVault MD3200i and MD3220i Storage Arrays With Microsoft Windows Server Failover Clusters at support.dell.com/manuals. NOTE: You can create concurrent snapshots of a source virtual disk on both the source disk group and on another disk group.
  • Page 155 2 In the AMW, select the Logical tab and select a valid source virtual disk. 3 Select Virtual Disk Snapshot Create. Alternatively, you can right- click the source virtual disk and select Create Snapshot Virtual Disk from the pop-up menu. The Create Snapshot Virtual Disk Wizard - Introduction dialog is displayed.
  • Page 156: Creating A Snapshot Virtual Disk Using The Advanced Path

    13 To associate the mapping between the storage array name and the virtual disk name, run the host-based SMdevices utility. NOTE: If your operating system requires additional instructions, you can find those instructions in your operating system documentation. Creating a Snapshot Virtual Disk Using the Advanced Path About the Advanced Path Use the advanced path to choose whether to place the snapshot repository...
  • Page 157: Preparing Host Servers To Create The Snapshot Using The Advanced Path

    NOTE: For more information on mapping the snapshot virtual disk to the secondary node, see the Dell PowerVault MD3200i and MD3220i Storage Arrays With Microsoft Windows Server Failover Clusters at support.dell.com/manuals. Configuration: Premium Feature—Snapshot Virtual Disks...
  • Page 158 The destination of a snapshot repository virtual disk is determined based on the free capacity available in the disk group. A snapshot repository virtual disk requires a minimum 8 MB of free capacity. You can choose your preferred creation path—simple or advanced—if the disk group of the source virtual disk has the required amount of free space.
  • Page 159: Creating The Snapshot Using The Advanced Path

    2 Using your Windows system, flush the cache to the source. At the host prompt, type SMrepassist -f <filename-identifier> and press <Enter>. For more information, see "SMrepassist Utility" on page 257. 3 Remove the drive letter(s) of the source in Windows or unmount the virtual drive(s) in Linux to help guarantee a stable copy of the drive for the Snapshot.
  • Page 160 3 Select Virtual Disk Snapshot Create. Alternatively, you can right- click the source virtual disk and select Create Snapshot Virtual Disk from the pop-up menu. The Create Snapshot Virtual Disk Wizard - Introduction dialog is displayed. 4 Select Advanced, and click Next. The Specify Names window is displayed.
  • Page 161: Specifying Snapshot Virtual Disk Names

    12 Click OK. 13 In the Mappings tab, assign mappings between the snapshot virtual disk and the host that accesses the snapshot virtual disk. 14 To register the snapshot virtual disk with the host operating system, run the host-based hot_add utility. 15 To associate the mapping between the storage array name and the virtual disk name, run the host-based SMdevices utility.
  • Page 162: Snapshot Repository Capacity

    • The next available sequence number is based on the number of existing snapshots of a source virtual disk. If you delete a snapshot virtual disk, its sequence number becomes available again. • You must choose a unique name for the snapshot virtual disk and the snapshot repository virtual disks, or an error message is displayed.
  • Page 163 NOTE: You can add a maximum of two physical disks at one time to increase snapshot repository virtual disk capacity. To expand the snapshot repository virtual disk from MDSM: 1 In the AMW, select the Logical tab. 2 Select the snapshot repository virtual disk for which you want to increase the capacity.
  • Page 164 7 If unassigned physical disks are not available, do you have empty slots in the expansion enclosures? • Yes, there are empty slots—Insert new physical disks by using the information in the initial setup guide for your expansion enclosure. Go to step 9.
  • Page 165: Disabling A Snapshot Virtual Disk

    • Not all of the capacity that is added is used to increase the capacity of the snapshot repository virtual disk. On the Physical tab, the unassigned physical disks or unconfigured capacity that you added to increase the capacity of the snapshot repository virtual disk change to assigned physical disks.
  • Page 166: Preparing Host Servers To Re-Create A Snapshot Virtual Disk

    Preparing Host Servers to Re-create a Snapshot Virtual Disk NOTE: Before you create a new snapshot of a source virtual disk, stop any data access (I/O) activity or suspend data transfer to the source virtual disk and snapshot virtual disk to ensure that you capture an accurate snapshot of the source virtual disk.
  • Page 167: Re-Creating Snapshot Virtual Disks

    Re-creating Snapshot Virtual Disks You can re-create a snapshot virtual disk that you have previously disabled. CAUTION: Possible loss of data redundancy – If the snapshot virtual disk is in Optimal status, it is first disabled prior to being re-created. This action invalidates the current snapshot.
  • Page 168: Rules And Guidelines For Performing A Snapshot Rollback

    The associated snapshot repository virtual disk must have sufficient capacity to process the rollback operation and the write operations from the host. At most, the snapshot repository virtual disk may need twice the size of the base disk, plus additional metadata space equaling approximately 1/1000th (that is, 0.1%) of the Base volume capacity.
  • Page 169: Protecting Against A Failed Snapshot Rollback

    If an error occurs during the rollback, the operation is paused and the base virtual disk and snapshot virtual disk displays Needs Attention icons. The RAID controller module also logs the event to the Major Event Log (MEL). Follow the Recovery Guru procedure to correct the error and repeat the rollback operation.
  • Page 170: Resuming A Snapshot Rollback

    2 Choose one: • Select the snapshot virtual disk, and select Virtual Disk Snapshot Rollback. • Right-click the snapshot virtual disk and select Rollback. The Confirm Rollback Snapshot Virtual Disk dialog is displayed. 3 In the Select rollback priority area, use the slider bar to set rollback priority. NOTE: If priority is set at the lowest rate, normal data write activity is highest priority and the rollback operation takes longer to complete.
  • Page 171: Canceling A Snapshot Rollback

    Canceling a Snapshot Rollback WARNING: Risk of data loss: If you cancel a snapshot rollback in progress, the base virtual disk may remain in an unusable state and the snapshot virtual disk is displayed as failed in the MD storage management software. Therefore, do not cancel a snapshot rollback unless reliable recovery options exist for restoring the content of the base virtual disk.
  • Page 172 Configuration: Premium Feature—Snapshot Virtual Disks...
  • Page 173: Configuration: Premium Feature-Virtual Disk Copy

    If you ordered this feature, you received a Premium Feature Activation card that shipped in the same box as your Dell PowerVault MD storage array. Follow the directions on the card to obtain a key file and to enable the feature.
  • Page 174: Types Of Virtual Disk Copies

    • Copying data for improved access—As your storage requirements for a virtual disk change, you can use a virtual disk copy to copy data to a virtual disk in a disk group that uses drives with larger capacity within the same storage array.
  • Page 175: Online Copy

    the source virtual disk may be rejected by the storage array RAID controller modules and result in an error message. Make sure that the Read-Only attribute for the target virtual disk is disabled after the virtual disk copy is complete to prevent error messages from being displayed. Online Copy An online copy creates a point-in-time snapshot copy of any virtual disk within a storage array, while still allowing writes to the virtual disk when the...
  • Page 176: Creating A Virtual Disk Copy For An Mscs Shared Disk

    Creating a Virtual Disk Copy for an MSCS Shared Disk To create a virtual disk copy for a Microsoft Cluster Server (MSCS) shared disk, create a snapshot of the virtual disk, and then use the snapshot virtual disk as the source for the virtual disk copy. NOTE: An attempt to directly create a virtual disk copy for an MSCS shared disk, rather than using a snapshot virtual disk, fails with the following error: The...
  • Page 177: Virtual Disk Copy Restrictions

    • To enable Read-Only permission, select Change Target Virtual Disk Permissions Enable Read-Only. NOTE: Write requests to the target virtual disk are rejected when the Read- Only permission is enabled on the target virtual disk. To disable Read-Only permission, select Change Target Virtual •...
  • Page 178: Creating A Virtual Disk Copy

    Creating a Virtual Disk Copy CAUTION: Possible loss of data – Source virtual disks that are participating in a virtual disk copy are available for read I/O activity only while a virtual disk copy has a status of In Progress or Pending. Write requests are allowed after the virtual disk copy has completed.
  • Page 179: Virtual Disk Copy And Modification Operations

    Virtual Disk Copy and Modification Operations If a modification operation is running on a source virtual disk or a target virtual disk, and the virtual disk copy has a status of In Progress, Pending, or Failed, the virtual disk copy does not take place. If a modification operation is running on a source virtual disk or a target virtual disk after a virtual disk copy is created, the modification operation must complete before the virtual disk copy can start.
  • Page 180: Preferred Raid Controller Module Ownership

    Preferred RAID Controller Module Ownership During a virtual disk copy, the same RAID controller module must own both the source virtual disk and the target virtual disk. If both virtual disks do not have the same preferred RAID controller module when the virtual disk copy starts, the ownership of the target virtual disk is automatically transferred to the preferred RAID controller module of the source virtual disk.
  • Page 181 A virtual disk copy automatically makes the target virtual disk read-only to hosts. You may want to keep this attribute enabled to preserve the data on the target virtual disk. CAUTION: If you decide not to preserve the data on the target virtual disk after the virtual disk copy has completed, disable the Read-Only attribute for the target virtual disk.
  • Page 182: Storage Array Performance During Virtual Disk Copy

    9 Type yes and click Finish. NOTE: Operation in Progress icons are displayed on the source virtual disk and the target virtual disk while the virtual disk copy has a status of In Progress or Pending. For more information, see the PowerVault Modular Disk Storage Manager online help topics.
  • Page 183: Stopping A Virtual Disk Copy

    2 In the table, select one or more copy pairs. 3 Select Change Copy Priority. The Change Copy Priority window is displayed. 4 In the Copy priority area, select the appropriate copy priority, depending on your system performance needs. NOTE: There are 5 copy priority rates available: lowest, low, medium, high, and highest.
  • Page 184: Preparing Host Servers To Recopy A Virtual Disk

    Preparing Host Servers to Recopy a Virtual Disk NOTE: Before you create a new copy of a source virtual disk, stop any data access (I/O) activity or suspend data transfer to the source virtual disk (and, if applicable, the target disk) to ensure that you capture an accurate point-in-time image of the source virtual disk.
  • Page 185: Re-Copying A Virtual Disk

    Re-Copying a Virtual Disk You can use the Copy Manager to create a new virtual disk copy for a selected source virtual disk and a target virtual disk. Use this option when you have stopped a virtual disk copy and want to start it again or when a virtual disk copy has failed or completed.
  • Page 186: Removing Copy Pairs

    Removing Copy Pairs You can remove one or more virtual disk copies by using the Copy Manager. Any virtual disk copy-related information for the source virtual disk and the target virtual disk is removed from the Virtual Disk Properties and the Storage Array Profile dialogs.
  • Page 187: Configuration: Premium Feature

    To upgrade from a standard-performance-tier storage array to a high- performance-tier storage array, you enable the high-performance-tier premium feature, using the Dell PowerVault Modular Disk Storage Management (MDSM) software. When the high performance tier feature is enabled or disabled the array restarts.
  • Page 188 Configuration: Premium Feature—Upgrading to High-Performance-Tier...
  • Page 189: Configuration: Device Mapper

    MD3200i Series resource media installation program on the server, and selecting either the Full or Host install option. For detailed installation procedures, see the Dell PowerVault MD3200i and MD3220i storage arrays Deployment Guide at support.dell.com/manuals.
  • Page 190: Using Dm Multipathing Devices

    The following tasks must be completed before proceeding. For more information about steps 1-3, see the MD3200i and MD3220i Storage Arrays Deployment Guide at support.dell.com/manuals. For more information about step 4, see "Creating Virtual Disks" on page 108. 1 Install the host software from the MD3200i Series resource media—...
  • Page 191: Device Mapper Configuration Steps

    NOTE: Any arrays configured with MDCU automatically adds to the list of Devices in the PowerVault Modular Disk Storage Manager Enterprise Management Window (EMW). Device Mapper Configuration Steps To complete the DM multipathing configuration and make storage available to the Linux host server: 1 Scan for virtual disks.
  • Page 192 It is located in the /dev/mapper directory. DELL is the vendor of the device MD3200i is the model of the device Sdc is the physical path to the owning controller for the device...
  • Page 193 It is located in the /dev/mapper directory. DELL is the vendor of the device MD3200i is the model of the device Sdx is the physical path to the owning controller for the device...
  • Page 194 # ls The following are some examples of the general mapping formats: On RHEL hosts ,a partition node has the format /dev/mapper/mpath<x>p<y>, where <x> is the alphabetic number for the multipathing device, <y> is the partition number for this device. On SLES 11.x hosts, a partition node has the format /dev/mapper/mpath<x>-part<y>, where <x>...
  • Page 195: Linux Host Server Reboot Best Practices

    Blacklist Local Drive in Multi-path Driver If your multipath drivers are connecting to storage area networks (SANs), it may be useful to be able to exclude or "blacklist" certain devices in your /etc/multipath.conf file. Blacklisting prevents the multipath driver from attempting to use those local devices.
  • Page 196: Important Information About Special Partitions

    2 Stop the Device Mapper multipath service # /etc/init.d/multipathd stop 3 Flush the Device Mapper multipath maps list to remove any old or modified mappings # multipath –F NOTE: The boot operating system drive may have an entry with the Device Mapper multipathing table.
  • Page 197: Limitations And Known Issues

    Used if the underlying physical devices are deleted/unmapped. Flushes out all unused multipathing device maps. Dell provided script. Forces a rescan of the host SCSI bus and aggregates multipathing devices as needed. For use when: • LUNs are dynamically mapped to the hosts.
  • Page 198: Troubleshooting

    • After a failed path is restored on an MD3600i Series array, failback does not occur automatically because the driver cannot auto-detect devices without a forced rescan. Run the command rescan_dm_devs to force a rescan of the host server. This restores the failed paths enabling failback to occur. •...
  • Page 199 Question I removed a LUN. But the multipathing mapping is still there. Failback does not happen as expected with the array. Answer The multipathing device is still there after you remove the LUNs. Run multipath –f <device node for the deleted LUN> to remove the multipathing mapping.
  • Page 200 Configuration: Device Mapper Multipath for Linux...
  • Page 201: Management: Firmware Downloads

    Management: Firmware Downloads Downloading RAID Controller and NVSRAM Packages A version number exists for each firmware file. The version number indicates whether the firmware is a major version or a minor version. You can use the Enterprise Management Window (EMW) to download and activate both the major firmware versions and the minor firmware versions.
  • Page 202: Downloading Both Raid Controller And Nvsram Firmware

    I/O to the array can continue while you are upgrading RAID controller and NVSRAM firmware. NOTE: Dell recommends that the firmware and NVSRAM be upgraded during a maintenance period when the array is not being used for I/O. NOTE: The RAID enclosure must contain at least two disk drives in order to update the firmware on the controller.
  • Page 203 7 Click Transfer. Keep these guidelines in mind: – If the Transfer button is inactive, ensure that you either select an NVSRAM file or cleared the Transfer NVSRAM file with RAID controller module firmware. – If the file selected is not valid or is not compatible with the current storage array configuration, the File Selection Error dialog is displayed.
  • Page 204: Downloading Only Nvsram Firmware

    The Select File dialog is displayed. 13 Select the file to download. 14 Click OK. 15 If you want to download the NVSRAM file with the RAID controller module firmware, select Download NVSRAM file with firmware in the Select files area. Attributes of the firmware file are displayed in the Firmware file information area.
  • Page 205 2 Select Advanced Maintenance Download RAID Controller Module NVSRAM Select the Support tab, and click Download Firmware. In Select download task, select Download RAID controller module NVSRAM and click OK. An error message is displayed. Click OK to close it and select a compatible file.
  • Page 206: Downloading Physical Disk Firmware

    NOTE: The Details pane shows the details of only one storage array at a time. If you select more than one storage array in the Storage array pane, the details of the storage arrays are not shown in the Details pane. 9 Click NVSRAM in the Download area.
  • Page 207: To Download Physical Disk Firmware

    disk called DACstore. DACstore and the physical disk firmware enable easier reconfiguration and migration of the physical disks. The physical disk firmware performs these functions: • The physical disk firmware records the location of the physical disk in an expansion enclosure. If you take a physical disk out of an expansion enclosure, you must insert it back into the same physical disk slot, or the physical disk firmware cannot communicate with the RAID controller module or other storage array components.
  • Page 208: Downloading Md1200 Series Expansion Module Emm Firmware

    4 Navigate to the location of the packages and click OK. The selected package is added to the Packages to be transferred area. 5 Click Next. The Download Physical Disk Firmware - Select Physical Disks window is displayed. 6 In the Compatible Physical Disks tab, select the appropriate physical disks or Select all the physical disks.
  • Page 209 • In the AMW, select Advanced Maintenance Download EMM Firmware. • Select the Support tab, and click Download Firmware. In the dialog that is displayed, select the EMM firmware, and click OK. The Download Environmental (EMM) Firmware dialog is displayed. 2 In the Select enclosures area, either select each expansion enclosure to which you want to download firmware, or select Select All to select all of the expansion enclosures in the storage array.
  • Page 210: Self-Monitoring Analysis And Reporting Technology (Smart)

    • The download failed—The status of one expansion enclosure shows Failed and the remainder of the expansion enclosures show Canceled. Make sure that the new firmware file is compatible before attempting another firmware download. Self-Monitoring Analysis and Reporting Technology (SMART) Self-Monitoring Analysis and Reporting Technology (SMART) monitors the internal performance of all physical disk components to detect faults indicating the potential for physical disk failure.
  • Page 211: Management: Installing Array

    Management: Installing Array Components Recommended Tools You may need the following items to perform the procedures in this section: • Key to the system keylock • #2 Phillips screwdriver • Wrist grounding strap Management: Installing Array Components...
  • Page 212: Front Bezel (Optional)

    Front Bezel (Optional) Removing the Front Bezel 1 Using the system key, unlock the front bezel (if locked). 2 Lift up the release latch next to the keylock. 3 Rotate the left end of the bezel away from the front panel. 4 Unhook the right end of the bezel and pull the bezel away from the system.
  • Page 213: Hard Drives

    212. 2 Press the release tab and slide the hard-drive blank out until it is free of the drive bay. See Figure 16-2 for PowerVault MD3200i and Figure 16-3 for PowerVault MD3220i. Figure 16-2. Removing and Installing a 3.5" Hard-Drive Blank (MD3200i Only)
  • Page 214: Installing A Hard-Drive Blank

    Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
  • Page 215 2 From the Modular Disk Storage Manager (MDSM) software, prepare the drive for removal. Wait until the hard-drive indicators on the drive carrier signal that the drive can be removed safely. For more information, see your controller documentation for information about hot-swap drive removal.
  • Page 216: Installing A Hard Drive

    You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
  • Page 217 Figure 16-5. Removing and Installing a Hard Drive Into a 3.5" Hard-Drive Carrier screws (4) SAS screw hole hard drive hard-drive carrier Management: Installing Array Components...
  • Page 218 Figure 16-6. Removing and Installing a Hard Drive Into a 2.5" Hard-Drive Carrier screws (4) SAS screw hole Management: Installing Array Components hard drive hard-drive carrier...
  • Page 219: Installing A Hard Drive Into A Hard-Drive Carrier

    Installing a Hard Drive Into a Hard-Drive Carrier 1 Insert the hard drive into the hard-drive carrier with the connector end of the drive at the back. See Figure 16-5. 2 Align the screw holes on the hard drive with the back set of holes on the hard-drive carrier.
  • Page 220: Installing A Raid Controller Module Blank

    5 Connect all the power cables to the array. 6 Turn on the array and the host server. Figure 16-7. Removing and Installing a RAID Controller Module Blank release latch Installing a RAID Controller Module Blank To install a RAID controller module blank: 1 Align the blank with the RAID controller module bay 2 Insert the blank into the chassis until it clicks into place.
  • Page 221: Removing A Raid Controller Module

    You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
  • Page 222: Installing A Raid Controller Module

    Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
  • Page 223: Closing The Raid Controller Module

    Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
  • Page 224: Raid Controller Module Backup Battery Unit

    Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
  • Page 225: Installing The Raid Controller Module Backup Battery Unit

    Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
  • Page 226 Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product. NOTE: If you remove a fully functioning power supply/cooling fan module, the fan speed in the remaining module increases significantly to provide adequate cooling.
  • Page 227 Figure 16-11. Removing and Installing a Power Supply/Cooling Fan Module release tab power supply handle power supply Management: Installing Array Components...
  • Page 228: Installing A Power Supply/Cooling Fan Module

    Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
  • Page 229: Control Panel

    Pushing the release tab toward the front of the array in PowerVault MD3200i. See Figure 16-13. – Pulling the release pin toward the front of the array in PowerVault MD3220i. See Figure 16-14. Figure 16-13. Removing and Installing the Control Panel-PowerVault MD3200i control panel release tab Management: Installing Array Components...
  • Page 230: Installing The Control Panel

    Installing the Control Panel 1 Align the control panel with the slot on the array. 2 Slide the control panel into the array until: The release tab clicks into place in PowerVault MD3200i. – See Figure 16-13. –...
  • Page 231: Backplane

    You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
  • Page 232 Figure 16-15. Removing and Installing the RAID Controller Module/Power Supply Cage screws (6) RAID controller module/power supply cage Management: Installing Array Components...
  • Page 233 Figure 16-16. Removing and Installing the Backplane-PowerVault MD3200i screws (5) captive screw Figure 16-17. Removing and Installing the Backplane-PowerVault MD3220i screws (4) captive screw backplane backplane Management: Installing Array Components...
  • Page 234: Installing The Backplane

    1 Align the holes on the backplane with the holes on the array. 2 Tighten the captive screw to secure the backplane to the chassis. See Figure 16-16 for PowerVault MD3200i or Figure 16-17 for PowerVault MD3220i. 3 Replace the screws that secure the backplane to the chassis.
  • Page 235: Management: Firmware Inventory

    Management: Firmware Inventory A storage array is made up of many components, which may include RAID controller modules, physical disks, and enclosure management modules (EMMs). Each of these components contains firmware. Some versions of firmware are dependent on other versions of firmware. To capture information about all of the firmware versions in the storage array, view the firmware inventory.
  • Page 236 Management: Firmware Inventory...
  • Page 237: Management: System Interfaces

    Management: System Interfaces Microsoft Services Virtual Disk Service The Microsoft Virtual Disk Service (VDS) is a component of the Windows operating system. The VDS component utilizes third-party vendor specific software modules, known as providers, to access and configure third-party storage resources, such as MD3200i storage arrays. The VDS component exposes a set of application programming interfaces (APIs) that provides a single interface for managing disks and other storage hardware.
  • Page 238 VSS attaches to the service and uses it to coordinate the creation of snapshot virtual disks on the storage array. VSS-initiated snapshot virtual disks can be triggered through backup tools, known as requestors. The VSS Provider Configuration Tool offers the following configuration options: •...
  • Page 239: Troubleshooting: Your Storage

    At least two physical disks must be installed in the array. Device Health Conditions When you open the Enterprise Management Window (EMW), the Dell PowerVault Modular Disk Storage Management software (MDSM) establishes communication with each managed storage array and determines the current storage array status.
  • Page 240 • On the Devices tab, in either the Tree view or the Table view, double-click a storage array. Alternatively, you can right-click a storage array and select Manage Storage Array from the pop-up menu. On the Setup tab, select Manage a Storage Array. •...
  • Page 241 In the Table view, every managed storage array is listed once, regardless of the number of attachments it has in the Tree view. After the storage array is contacted by MDSM, an icon representing its hardware status is displayed. Hardware status can be Optimal, Needs Attention, or Fixing. If, however, all of the network management connections from the storage management station to the storage array shown in the Tree view are Unresponsive, the storage array status is represented as Unresponsive.
  • Page 242: Storage Array Support Data

    Table 19-3. Additional Status Icons Status Icon Adding a Storage Array Adding a Storage Array OK Adding a Storage Array Error NOTE: MDSM may take a few minutes to update a status change to Unresponsive or from Unresponsive. A status change from or to Unresponsive depends on the network link to the storage array.
  • Page 243: Automatically Collect The Support Bundle Data

    2 Enter a name for the support data file in Specify filename or click Browse to navigate to a previously saved file to overwrite an existing file. The suffix .zip is added automatically to the file if you do not specify a suffix for the file.
  • Page 244: Collecting The Physical Disk Data

    Collecting the Physical Disk Data You can use the Collect Physical Disk Data option to collect log sense data from all the physical disks on your storage array. Log sense data consists of statistical information that is maintained by each of the physical disks in your storage array.
  • Page 245: Recovery Guru

    The event log window shows two types of event views: • Summary view—Shows an event summary in a table form. • Detail view—Shows details about a selected event. To view the event log: 1 In the AMW, select Advanced Troubleshooting View Event Log. The Event Log is displayed.
  • Page 246: Storage Array Profile

    • Alert notification messages that are sent to the appropriate destinations • Hardware indicator lights The status icons return to Optimal status as problems are resolved. Storage Array Profile The storage array profile provides a description of all of the components and properties of the storage array.
  • Page 247: Viewing The Logical Associations

    Type the term that you want to search for in the Find text box. If the term is located on the current tab, the term is highlighted in the storage array profile information. NOTE: The search is limited to the current tab. If you want to search for the term in other tabs, select the tab and click the Find button again.
  • Page 248: Viewing The Physical Associations

    2 Select View Associated Logical Elements. Alternatively, you can right- click the virtual disk to open a pop-up menu and select View Associated Logical Elements. If you select a virtual disk that does not have logical associations with other virtual disks, the Associated Logical Elements option is disabled. NOTE: The View Associated Logical Elements dialog is displayed, which indicates the logical associations for the selected virtual disk.
  • Page 249 • The node name and the RAID level • The node name and the virtual disk capacity To find nodes: 1 In the AMW, select View Find. 2 Based on the type of search, select one of these options, and go to the indicated step: •...
  • Page 250: Using Go To

    Type the capacity in the GB box. Specify that the free capacity to be matched is less than, equal to, or greater than the capacity entered in the GB box. Go to step 8. 8 Click Find Next. To see every node that matches the criteria, click Find Next repeatedly. If no matches are found, the Search Failed dialog is displayed.
  • Page 251: Recovering From An Unresponsive Storage Array Condition

    4 Select View Go To Source Virtual Disk. The selection jumps to the associated source virtual disk in the Logical pane. 5 Select View Go To Target Virtual Disk. NOTE: If the source virtual disk has more than one associated target virtual disk, select the target virtual disk that you want from the list, and click OK.
  • Page 252 • ping <host-name> • ping <RAID controller module-IP-address> 7 If the verification is successful, see step 8, if not, see step 9. 8 Remove the storage array with the Unresponsive status from the EMW, and select Add Storage Array to add the storage array again. 9 If the storage array does not return to Optimal status, check the Ethernet cables to make sure that there is no visible damage and that they are securely connected.
  • Page 253: Locating A Physical Disk

    19 If you have recently replaced or added the RAID controller module, restart the host context agent software so that the new RAID controller module is recognized. 20 If the problem still exists, make the appropriate host modifications, check with other administrators to see if a firmware upgrade was performed on the RAID controller module from another storage management station.
  • Page 254 To locate the physical disk: 1 Select the Physical tab. 2 Select the physical disks that you want to locate. 3 Select Physical Disk Blink Physical Disk. The LEDs on the selected physical disks blink. 4 When you have located the physical disks, click OK. The LEDs stop blinking.
  • Page 255: Locating An Expansion Enclosure

    Locating an Expansion Enclosure You can use the Blink option to physically locate and identify an expansion enclosure in the storage array. The LED activation varies according to the type of expansion enclosure that you have. • If you have an expansion enclosure with a white LED, the Blink Expansion Enclosure operation causes the white LED on the expansion enclosure to come on.
  • Page 256: Capturing The State Information

    Capturing the State Information Use the Troubleshooting Capture State Information option to capture information about the current state of your storage array and save the captured information to a text file. You can then send the captured information to your Technical Support representative for analysis. Potential to cause an unresponsive storage array –...
  • Page 257: Smrepassist Utility

    You can also use this utility to resolve duplicate signature problems for snapshot virtual disks. From a command prompt window on a host running Windows, navigate to: C:\Program Files\Dell\MD Storage Manager\util and run the following command: SMrepassist -f <filesystem-identifier> where -f flushes all the memory-resident data for the file system indicated by <filesystem-identifier>, and <filesystem-identifier>...
  • Page 258: Unidentified Devices

    Unidentified Devices An unidentified node or device occurs when MDSM cannot access a new storage array. Causes for this error include network connection problems, the storage array is turned off, or the storage array does not exist. NOTE: Before beginning any recovery procedure, make sure that the host context agent software is installed and running.
  • Page 259 ping <host-name-or-IP-address-of-the-host>. If the network can access the host, continue to step c. If the network cannot access the host, go to step d. Remove the host with the unresponsive status from the MDSM, and add that host again. If the host returns to optimal status, you have completed this procedure.
  • Page 260: Starting Or Restarting The Host Context Agent Software

    If this problem exists, see support.dell.com. 6 Look to see if there is too much network traffic to one or more controllers. This problem corrects itself because the MDSM tries to re-establish communication with the controllers in the storage array at regular times.
  • Page 261 Modular Disk Storage Manager Agent, Version 90.02.A6.14 Built Wed Feb 03 06:17:50 CST 2010 Copyright (C) 2009-2010 Dell, Inc. All rights reserved. Checking device <n/a> (/dev/sg10): Activating Checking device /dev/sdb (/dev/sg11): Skipping Checking device <n/a> (/dev/sg3): Activating Checking device <n/a>...
  • Page 262 Troubleshooting: Your Storage Array Software...
  • Page 263: Troubleshooting: Your Array

    You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
  • Page 264: Troubleshooting Power Supply/Cooling Fan Module

    You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
  • Page 265: Troubleshooting Array Cooling Problems

    You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
  • Page 266 Reseat the EMM module and wait for 30 seconds. See "Removing an EMM" in the MD1200 and MD1220 Storage Enclosures Hardware Owner's Manual. Turn on the server. Check the EMM status LED. If the LED does not turn Green, replace the EMM. If the problem is not resolved, see "Getting Help"...
  • Page 267: Troubleshooting Raid Controller Modules

    You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
  • Page 268: Troubleshooting Hard Drives

    You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
  • Page 269: Troubleshooting Array And Expansion Enclosure Connections

    You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
  • Page 270: Troubleshooting A Damaged Array

    You must only perform troubleshooting and simple repairs as authorized in your product documentation, or as directed by the online or telephone service and support team. Damage due to servicing that is not authorized by Dell is not covered by your warranty. Read and follow the safety instructions that came with the product.
  • Page 271: Troubleshooting Raid Controller Modules

    Typical hard controller failures are detailed in the following sections. Invalid Storage Array The RAID controller module is supported only in a Dell-supported storage array. Upon installation in the storage array, the controller performs a set of validation checks. The array status LED is lit with a steady amber color while the RAID controller module completes these initial tests and the controllers are booted successfully.
  • Page 272: Pci Errors

    PCI Errors The storage array firmware can detect and only recover from PCI errors when the RAID controller modules are configured for redundancy. If a virtual disk uses cache mirroring, it fails over to its peer RAID controller module, which initiates a flush of the dirty cache.
  • Page 273: Getting Help

    NOTE: If you do not have an active Internet connection, you can find contact information on your purchase invoice, packing slip, bill, or Dell product catalog. Dell provides several online and telephone-based support and service options. Availability varies by country and product, and some services may not be available in your area.
  • Page 274 Getting Help...
  • Page 275: Index

    Initiator CHAP Secret, 85 Target CHAP Secret, 85 Valid Characters, 85 Choosing an Appropriate Physical Disk Type, 115 Configuring Host Access, 95 Hot Spare Physical Disks, 123 the iSCSI Host Ports, 87 Configuring Alert Notifications SNMP , 79 Contacting Dell, 273 Index...
  • Page 276 Dell, 273 control panel installing, 230 removing, 229 Copy Manager, 180 Defining a Host, 96 Dell contacting, 273 Disk Group Creating, 106 Expansion, 141 Export, 143 Exporting, 143 Import, 144 Locating, 108 Migration, 143 Disk Group and Virtual Disk...
  • Page 277 Free Capacity, 142 front bezel installing, 212 removing, 212 hard drive drive carrier, 216 installing, 216 removing, 214 Hard-Drive Indicator Patterns, 28 Hardware Features Back panel features, 27 Front panel features, 24 Hard drive indicator patterns, 28 Power indicator codes, 30 Power supply and cooling fan features, 29 Host Group...
  • Page 278 Media Errors and Unreadable Sectors, 210 Media Scan Changing settings, 146 Suspending, 147 Microsoft Virtual Disk Service, 237 Volume Shadow-Copy Service, 237 Microsoft Services Virtual Disk Copy, 53 Monitoring Performance, 57 Multi-Path Preferred and Alternate Controllers and Paths, 55 Multi-Path Software, 54 Non-Exportable Components, 143 Other Information, 20...
  • Page 279 Clocks, 81 Storage Array Media Scan, 145 Storage Arrays, 66 Automatic Discovery, 67 Manual Addition, 67 Storage Partitioning, 140 support contacting Dell, 273 telephone numbers, 273 Troubleshooting Automatically Collect the Support Bundle Data, 243 Capturing the State Information, 256 Collecting the Physical Disk...
  • Page 280 Starting or Restarting the Host-Agent Software, 260 Start-Up Routine, 239 Storage Array Profile, 246 Storage Array Support Data, 242 Unidentified Devices, 258 Viewing the Logical Associations, 247 Viewing the Physical Associations, 248 troubleshooting, 263 connections, 269 cooling problems, 265 damaged enclosure, 270 external connections, 263 hard drives, 268 loss of communication, 263...
  • Page 281 Virtual Disk Operations Limit, 45 Virtual Disk Ownership, 55 Virtual Disk States, 40 Virtual DiskCopy Target, 53 Virtual Disks and Disk Groups, 39 Index...
  • Page 282 Index...

This manual is also suitable for:

Powervault md3220i

Table of Contents