Lenovo ThinkServer RD330 MegaRAID SAS Software User Guide - Page 371

Foreign, Configuration Preview, Import

Page 371 highlights

MegaRAID SAS Software User Guide Chapter 11: Using MegaRAID® Advanced Software | SafeStore Encryption Services 11.5.12.1 Foreign Configurations in Cable Pull and Drive Removal Scenarios 6. Repeat the import process for any remaining drives. Because locked drive can use different security key, you must verify whether there are any remaining drives to imported. NOTE: When you create a new configuration, MSM shows only the unconfigured drives. Drives that have existing configurations, including foreign configurations, will not appear. To use drives with existing configurations, you must first clear the configuration on those drives. If one or more drives are removed from a configuration, by a cable pull or drive removal, for example, the configuration on those drives is considered a foreign configuration by the RAID controller. The following scenarios can occur with cable pulls or drive removals. Use the Foreign Configuration Preview screen to import or clear the foreign configuration in each case. NOTE: If you want to import the foreign configuration in any of the following scenarios, you should have all of the drives in the enclosure before you perform the import operation.  Scenario #1: If all of the drives in a configuration are removed and re-inserted, the controller considers the drives to have foreign configurations. Import or clear the foreign configuration. If you select Import, automatic rebuilds will occur in redundant virtual drives. NOTE: Start a consistency check immediately after the rebuild is complete to ensure data integrity for the virtual drives. See Section 10.2, Running a Consistency Check for more information about checking data consistency.  Scenario #2: If some of the drives in a configuration are removed and re-inserted, the controller considers the drives to have foreign configurations. Import or clear the foreign configuration. If you select Import, automatic rebuilds will occur in redundant virtual drives. NOTE: Start a consistency check immediately after the rebuild is complete to ensure data integrity for the virtual drives. See Section 10.2, Running a Consistency Check for more information about checking data consistency.  Scenario #3: If all of the drives in a virtual drive are removed, but at different times, and re-inserted, the controller considers the drives to have foreign configurations. Page 371

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401

Page 371
MegaRAID SAS Software User Guide
Chapter 11: Using MegaRAID® Advanced Software
|
SafeStore Encryption Services
6.
Repeat the import process for any remaining drives.
Because locked drive can use different security key, you must verify whether there
are any remaining drives to imported.
NOTE:
When you create a new configuration, MSM shows only the unconfigured drives.
Drives that have existing configurations, including foreign configurations, will not
appear. To use drives with existing configurations, you must first clear the configuration
on those drives.
11.5.12.1
Foreign Configurations
in Cable Pull and Drive Removal
Scenarios
If one or more drives are removed from a configuration, by a cable pull or drive
removal, for example, the configuration on those drives is considered a foreign
configuration by the RAID controller.
The following scenarios can occur with cable pulls or drive removals. Use the
Foreign
Configuration Preview
screen to import or clear the foreign configuration in each
case.
NOTE:
If you want to import the foreign configuration in any of the following scenarios,
you should have all of the drives in the enclosure before you perform the import
operation.
Scenario #1: If all of the drives in a configuration are removed and re-inserted, the
controller considers the drives to have foreign configurations.
Import or clear the foreign configuration. If you select
Import
, automatic rebuilds
will occur in redundant virtual drives.
NOTE:
Start a consistency check immediately after the rebuild is complete to ensure
data integrity for the virtual drives.
See
Section 10.2,
Running a Consistency Check
for more information about checking data
consistency.
Scenario #2: If some of the drives in a configuration are removed and re-inserted,
the controller considers the drives to have foreign configurations.
Import or clear the foreign configuration. If you select
Import
, automatic rebuilds
will occur in redundant virtual drives.
NOTE:
Start a consistency check immediately after the rebuild is complete to ensure
data integrity for the virtual drives.
See
Section 10.2,
Running a Consistency Check
for more information about checking data
consistency.
Scenario #3: If all of the drives in a virtual drive are removed, but at different times,
and re-inserted, the controller considers the drives to have foreign configurations.