Administrator Guide
Table Of Contents
- Dell EMC PowerVault ME4 Series Storage System Administrator’s Guide
- Contents
- Getting started
- New user setup
- Configure and provision a new storage system
- Using the PowerVault Manager interface
- System concepts
- About virtual and linear storage
- About disk groups
- About RAID levels
- About ADAPT
- About SSDs
- About SSD read cache
- About spares
- About pools
- About volumes and volume groups
- About volume cache options
- About thin provisioning
- About automated tiered storage
- About initiators, hosts, and host groups
- About volume mapping
- About operating with a single controller
- About snapshots
- About copying volumes
- About reconstruction
- About quick rebuild
- About performance statistics
- About firmware updates
- About managed logs
- About SupportAssist
- About CloudIQ
- About configuring DNS settings
- About replicating virtual volumes
- About the Full Disk Encryption feature
- About data protection with a single controller
- Working in the Home topic
- Guided setup
- Provisioning disk groups and pools
- Attaching hosts and volumes in the Host Setup wizard
- Overall system status
- Configuring system settings
- Managing scheduled tasks
- Working in the System topic
- Viewing system components
- Systems Settings panel
- Resetting host ports
- Rescanning disk channels
- Clearing disk metadata
- Updating firmware
- Changing FDE settings
- Configuring advanced settings
- Changing disk settings
- Changing system cache settings
- Configuring partner firmware update
- Configuring system utilities
- Using maintenance mode
- Restarting or shutting down controllers
- Working in the Hosts topic
- Working in the Pools topic
- Working in the Volumes topic
- Viewing volumes
- Creating a virtual volume
- Creating a linear volume
- Modifying a volume
- Copying a volume or snapshot
- Abort a volume copy
- Adding volumes to a volume group
- Removing volumes from a volume group
- Renaming a volume group
- Remove volume groups
- Rolling back a virtual volume
- Deleting volumes and snapshots
- Creating snapshots
- Resetting a snapshot
- Creating a replication set from the Volumes topic
- Initiating or scheduling a replication from the Volumes topic
- Manage replication schedules from the Volumes topic
- Working in the Mappings topic
- Working in the Replications topic
- About replicating virtual volumes in the Replications topic
- Replication prerequisites
- Replication process
- Creating a virtual pool for replication
- Setting up snapshot space management in the context of replication
- Replication and empty allocated pages
- Disaster recovery
- Accessing the data while keeping the replication set intact
- Accessing the data from the backup system as if it were the primary system
- Disaster recovery procedures
- Viewing replications
- Querying a peer connection
- Creating a peer connection
- Modifying a peer connection
- Deleting a peer connection
- Creating a replication set from the Replications topic
- Modifying a replication set
- Deleting a replication set
- Initiating or scheduling a replication from the Replications topic
- Stopping a replication
- Suspending a replication
- Resuming a replication
- Manage replication schedules from the Replications topic
- About replicating virtual volumes in the Replications topic
- Working in the Performance topic
- Working in the banner and footer
- Banner and footer overview
- Viewing system information
- Viewing certificate information
- Viewing connection information
- Viewing system date and time information
- Viewing user information
- Viewing health information
- Viewing event information
- Viewing capacity information
- Viewing host information
- Viewing tier information
- Viewing recent system activity
- Other management interfaces
- SNMP reference
- Using FTP and SFTP
- Using SMI-S
- Using SLP
- Administering a log-collection system
- Best practices
- System configuration limits
- Glossary of terms
Figure 2. Process for subsequent replications
A
User view 1 Step 1: User initiates replication after the first replication has completed.
B Internal view 2 Step 2: S1 contents replace S2 contents.
a Primary system 3 Step 3: Current primary volume contents replace S1 contents.
b Secondary system 4 Step 4: S1 contents replace the secondary volume contents.
c Peer connection 5 Step 5: Differences (delta) between S1 and S2 are identified and replicated over
the peer connection to counterpart S1.
d Primary volume 6 Step 6: S1 contents replace the secondary volume contents.
e Secondary volume
During the initial replication, the entire contents of the primary volume are replicated to the secondary volume. In subsequent
replications, only data that is new or modified since the last replication operation is replicated. This is accomplished by
comparing a snapshot of the primary volume data from the last replication with a current snapshot of the primary volume.
With the exception of this comparison, the process for both the initial and subsequent replications is similar.
During replications subsequent to the initial replication, the following sequence takes place. The user initiates replication on the
primary system (step 1). On the primary system, the S1 contents replace the S2 contents (step 2). (The S2 contents can then
be used for comparison during step 5.) The current primary volume contents replace the contents of S1 on the primary system
(step 3). On the secondary system, the S1 contents replace the S2 contents (step 4). The S1 contents on the primary system,
which match that of the primary volume at the time the replication was initiated, are compared to the S2 contents on the
primary system. Only the data that is the delta between S1 and S2 is replicated to its S1 counterpart on the secondary system,
which is updated with the delta data. The data comparison and replication occur together (step 5). The S1 contents on the
secondary system replace the contents of the secondary volume (step 6). The contents of the primary and secondary volumes
are now synchronized.
Internal snapshots
When first created from the primary volume, the internal snapshots consume very little space but will grow as data is written to
the volume. Just as with any virtual snapshot, the amount of disk space used by an internal snapshot depends on the difference
in the number of shared and unique pages between itself and the volume. The snapshot will not exceed the amount of disk
120
Working in the Replications topic