The disk array can be generated before or after the system is installed, which is considered a (large) hard drive with fault tolerance and redundancy. The disk array can not only join a ready-made system, it can support capacity expansion, the method is very simple, only need to join a new hard drive and execute some simple instructions, the system can take advantage of this new capacity in real time.
· types and Applications of RAIDThe IDE and SCSI are two different interfaces for computers, w
kernel of the installed system is 2.6.18-53. el5pae. Note that you need to select the corresponding kernel for the Ko file. The kernel during installation is 2.6.18-53. EL5)
Bash3.2 # mkdir/MTN/tmpbash3.2 # Mount/dev/sdb1/mnt/tmpbash3.2 # cp/mnt/tmp megaraid_sas.ko/mnt/sysimage/lib/modules/2.6.18-53. el5pae/updates/bash3.2 # The chroot/mnt/sysimage generation module depends on bash3.2 # depmod-V 2.6.18-53. el5pae backup original ramdiskbash3.2 # mv/b
A few days ago, Huawei Server RH2288 H V2raid card has no battery, or no capacitance, will report the following error:650) this.width=650; "src=" Http://s1.51cto.com/wyfs02/M01/78/40/wKiom1Z46WjTU2sxAAT5wWzFfXo170.jpg "title=" 5a616ca422db75c19624825f914acfec.jpg "alt=" Wkiom1z46wjtu2sxaat5wwzffxo170.jpg "/>It's a little blurry, but you can see it.There are 2 ways to check if the server has batteries or capacitors:
There is a ESN on the server, there is a small label on the server, it s
Introduced?????? Often when discussing the performance of different RAID protection types, the conclusion will be that RAID-1 provides better read and write performance, RAID-5 read performance is good, but write performance is not as high as raid-1,raid-6 protection level,
NVRAM is a card and has no physical connection with Ram, although they all look like memory. the first type is used in low-end netapp products, and the second type is used in high-end netapp products.
Ram stores data caches, while NVRAM stores operation logs. Similar to the database's archive log. Think: NVRAM is protected by a battery, but what about Ram? Data cache is installed in Ram. If it loses power, it will lose data. I have consulted many people and cannot get a clear and detail reply..
When asked whether traditional raid can be built on SSD, the first response should be "yes, but trim command support is required ". On the Internet, we can also see that many people use SSD to create raid, but basically it is configured as RAID 0 or raid 1. Few people will build RAID5. Why?
The answer is very simple. I
Since 1988, when the University of Berkeley invented RAID (disk array) technology, RAID has been the core of the storage area, shouldering the responsibility of protecting data. But as disk capacity continues to grow, RAID technology is encountering unprecedented new problems. The biggest problem is that the data reconstruction time is too long, which prolongs th
1. See how many hard drives are available#fdisk-LWell, in general, leave the system disk, the other disks if the size of the same, all together to do a raid.2. Decide what type of RAID to do.raid-0, Raid-1, raid-5?If you have three disks (or more) of the same size, it is highly recommended to
comparison of RAID common levels
Characteristics
Hard disk and capacity
Performance and safety
Typical applications
RAID 0
Used for parallel storage, that is, strips. The principle is to divide the continuous data into several pieces and then distribute it to each hard disk in the array. Any one disk failure will result in data loss.
Number of hard disks: one
Can traditional RAID be built on SSD?
When asked whether traditional RAID can be built on SSD, the first response should be "yes, but Trim command support is required ". On the Internet, we can also see that many people use SSD to create RAID, but basically it is configured as RAID 0 or
Do you know the RAID initialization process?
The RAID system is an effective means to protect the stored data. During RAID creation, a very long system initialization process often exists. Why is there such an operation during RAID initialization? What is the impact of this operation on SSD? From the perspective of tec
Raid,redundant Arrays of the abbreviation for independent disks, redundant array of independent disks, referred to as disk array.
The disk array is actually divided into soft array (Software RAID) and hard array (hardware RAID).
Soft array: That is, through software programs and the computer's CPU to provide operational capabilities. Because the software progra
IBM_DS5020 disk array for raid, hot standby and attaching the disk array to the server, ibm_ds5020raid
During work, the hard disk in the server disk array is damaged and the new hard disk is replaced, but some sectors cannot be read. In this case, RAID 5 and hot backup are re-performed for the disk array and the disk array is mounted on the server.
I. Preparation
Aid DefinitionRAID (Redundant Array of independent disk independent redundant disk array) technology is the University of California, Berkeley, 1987It was initially proposed to combine small and low-cost disks to replace large and expensive disks. At the same time, it was hoped that access to data would not be damaged when the disk fails.Develop a certain level of data protection technology. Raid is a Redundant Array composed of multiple low-cost disk
Problem
In the case of power outages, the configuration of the already configured raid in the hard disk disk position swap, the power-on will not affect the integrity of the original storage data, will cause data disaster?
Answer
This depends on the RAID controller's firmware design, and one of the most important is, where is the raid information (
of the data stored in the disk will be invalid, its fault tolerance is zero, the raid array is only suitable for temporary data, not suitable for storing more important data. RAID1:650) this.width=650; "style=" width:300px;height:164px; "src=" http://s3.51cto.com/wyfs02/M02/7D/40/ Wkiol1bjyqixga-xaaabheen17m901.png "title=" qq20160312154934.png "vspace=" 0 "width=" height= "164" hspace= "0" Border= "0" alt= "wkiol1bjyqixga-xaaabheen17m901.png"/>RAID1
Name# lvcreate-l Size-n Name vg_nameSteps for Logical Volume expansion:1, first determine the size of the expansion, and ensure that the volume group belongs to sufficient space;2. Extend the physical boundary:# lvextend-l [+]size/path/to/lv_device3. Extend the logical boundary:# Resize2fs/path/to/lv_deviceSteps to reduce a logical volume:1. Unmount the volume and perform mandatory inspection# e2fsck-f/path/to/lv_device2. Reduce logical boundaries:# Resize2fs/path/to/lv_device SIZE3. Reduce phy
In linux, how does one perform soft raid? I hope the following introduction will help and inspire my friends!
Add a 10 Gb hard disk to the Virtual Machine System as sdb, divide the hard disk into five logical disks: sdb {5, 6, 7, 8, 9}, and the size of each disk is 1 GB.
First, use three of the hard drive sdb {5, 6, 7} to create raid5, and sdb8 as the hot backup disk.
Then, take sdb6 out as the faulty di
1. What is raid0?
Raid0, which divides data into several halves and writes data to multiple disks A: A1 A2 ...... Performance improvement. At least two disks are required.
Merge multiple disks into a large disk with no redundancy and parallel I/O, with the fastest speed. RAID 0 is also called a zone set. It associates multiple disks to form a large disk. When storing data, the data is segmented by the number of disks and written into these disks at t
CentOS6.5 create soft RAIDWhat is RAID?
RAID, Redundant Array of Independent Disks, formerly known as Redundant Array of Inexpensive Disks, is short for hard disk arrays. The basic idea is to combine multiple relatively inexpensive hard disks into a hard disk array group, so that the performance can reach or even exceed a hard disk with a high price and huge capacity. Depending on the selected version,
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.