EasyManua.ls Logo

Dell PowerVault MD3620i User Manual

Dell PowerVault MD3620i
292 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #53 background imageLoading...
Page #53 background image
Planning: MD3600i Series Storage Array Terms and Concepts 53
Restore snapshot virtual disk data to the source virtual disk.
Virtual disk copy generates a full copy of data from the source virtual disk to
the target virtual disk in a storage array and can be performed either online or
offline.
Source Virtual Disk
When you create a virtual disk copy, a copy pair consisting of a source virtual
disk and a target virtual disk is created on the same storage array. When a
virtual disk copy is started, data from the source virtual disk is copied
completely to the target virtual disk.
Target Virtual Disk
When you start a virtual disk copy, the target virtual disk maintains a copy of
the data from the source virtual disk. You can choose whether to use an
existing virtual disk or create a new virtual disk as the target virtual disk. If
you choose an existing virtual disk as the target, all data on the target is
overwritten. A target virtual disk can be a standard virtual disk or the source
virtual disk of a failed or disabled snapshot virtual disk.
NOTE: The target virtual disk capacity must be equal to or greater than the source
virtual disk capacity.
When you begin the disk copy process, you must define the rate at which the
copy is completed. Giving the copy process top priority slightly impacts I/O
performance, while giving it lowest priority makes the copy process longer to
complete. You can modify the copy priority while the disk copy is in progress.
For more information, see the online help topics.
Virtual Disk Recovery
You can use the Edit host server-to-virtual disk mappings feature to recover
data from the backup virtual disk. This functionality enables you to unmap
the original source virtual disk from its host server, then map the backup
virtual disk to the same host server.
Ensure that you record the LUN used to provide access to the source virtual
disk. You need this information when you define a host server-to-virtual disk
mapping for the target (backup) virtual disk. Also, be sure to stop all I/O
activity to the source virtual disk before beginning the virtual disk recovery
procedure.
book.book Page 53 Tuesday, September 27, 2011 3:13 PM

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the Dell PowerVault MD3620i and is the answer not in the manual?

Dell PowerVault MD3620i Specifications

General IconGeneral
Form Factor2U
Host InterfacesiSCSI
Maximum Raw Capacity192 TB
Supported DrivesSAS, SATA
RAID Levels0, 1, 5, 6, 10, 50, 60
Host InterfaceiSCSI
ProcessorIntel Xeon
Drive Bays24 x 2.5-inch
CoolingRedundant, hot-swappable fans
ControllerDual controllers
Cache MemoryUp to 4 GB per controller
Host Ports4 x 1GbE iSCSI
Management InterfaceWeb GUI, CLI
Operating Temperature10° to 35°C (50° to 95°F)

Summary

1 Introduction

About This Document

Familiarizes you with the functions of the Dell PowerVault MD3600i Series storage array.

MD3600i Series Storage Array

Details the components and capabilities of the MD3600i Series storage array.

2 Planning: About Your Storage Array

Overview

Describes the design and capabilities of the Dell PowerVault MD3600i Series storage array.

Hardware Features

Details the physical components and indicators of the storage array.

3 Planning: RAID Controller Modules

RAID Controller Modules

Explains the function and features of RAID controller modules.

Cache Functions and Features

Details cache mirroring, write-back, and write-through cache functionalities.

4 Planning: MD3600i Series Storage Array Terms and Concepts

Physical Disks, Virtual Disks, and Disk Groups

Defines physical disks, virtual disks, and disk groups within the storage array.

RAID Levels

Explains different RAID levels, their usage, and disk group limitations.

Virtual Disk Operations

Covers virtual disk initialization, consistency checks, and media verification.

5 Configuration: Overview

User Interface

Describes the Storage Manager screen layout and its primary windows.

Enterprise Management Window (EMW)

Details the functionality and tasks performable within the EMW.

6 Configuration: About Your Storage Array

Out-of-Band and In-Band Management

Explains the two methods for managing the storage array.

Storage Arrays

Covers adding, naming, setting passwords, and removing storage arrays.

7 Configuration: Using iSCSI

Changing the iSCSI Target Authentication

Describes how to configure iSCSI target authentication settings.

Creating CHAP Secrets

Details the process of creating CHAP secrets for authentication.

8 Configuration: Event Monitor

Enabling or Disabling the Event Monitor

Instructions for enabling or disabling the event monitor on Windows and Linux.

9 Configuration: About Your Host

Configuring Host Access

Explains how to configure access for hosts to the storage array.

Managing Host Groups

Covers creating, moving, and removing host groups.

10 Configuration: Disk Groups and Virtual Disks

Creating Disk Groups and Virtual Disks

Details the process of creating disk groups and virtual disks.

Physical Disk Security with Self Encrypting Disk

Explains Self-Encrypting Disk technology and security features.

11 Configuration: Premium Feature—Snapshot Virtual Disks

Scheduling a Snapshot Virtual Disk

Covers scheduling snapshot creation for data backups and recovery.

Snapshot Rollback

Allows reverting virtual disk contents to a previous snapshot state.

12 Configuration: Premium Feature—Virtual Disk Copy

Types of Virtual Disk Copies

Explains offline and online copy types for virtual disks.

Creating a Virtual Disk Copy for an MSCS Shared Disk

Steps to create a virtual disk copy for Microsoft Cluster Server shared disks.

13 Configuration: Premium Feature—Upgrading to High-Performance-Tier

14 Configuration: Device Mapper Multipath for Linux

Overview

Introduces Device Mapper (DM) for multipath capabilities on Linux.

Device Mapper Configuration Steps

Provides steps for DM multipathing configuration on Linux hosts.

15 Management: Firmware Downloads

Downloading RAID Controller and NVSRAM Packages

Instructions for downloading and activating firmware for controllers and NVSRAM.

Self-Monitoring Analysis and Reporting Technology (SMART)

Explains SMART technology for monitoring disk health and predicting failure.

16 Management: Installing Array Components

Hard Drives

Covers removing and installing hard drives and drive blanks.

RAID Controller Module

Details removing and installing RAID controller modules and blanks.

17 Management: Firmware Inventory

Viewing the Firmware Inventory

Describes how to view and save firmware inventory information.

18 Management: System Interfaces

Microsoft Services

Explains Virtual Disk Service (VDS) and Volume Shadow-Copy Service (VSS).

19 Troubleshooting: Your Storage Array Software

Device Health Conditions

Explains status icons and how to interpret them.

Recovery Guru

Component of MDSM for diagnosing critical events and recovery procedures.

20 Troubleshooting: Your Array

Safety First—For you and Your Array

Emphasizes safety precautions for handling the array and its components.

Troubleshooting RAID Controller Modules

Guides on diagnosing and resolving issues with RAID controller modules.

21 Getting Help

Contacting Dell

Provides information on how to contact Dell for support and service.

Related product manuals