Solved

RAID 5 move

Posted on 2003-12-11
2
133 Views
Last Modified: 2010-04-14
I am about to remove a complete RAID 5 array from a server in order to raplace it with larger disks.  Besides my security backups that I'll perform beforehand, I was wondering something about the array as is before the removal.  Say I would want to put the removed disks of the array back into the server in the same locations and order, would the system be able to read the data again after I would recreate the array?  This is one of those things about which you wonder once in a while and it's been driving me crazy on occasions.  This is about knowing for the sake of it.

Thanks in advance.
0
Comment
Question by:TechnoBuzz
2 Comments
 
LVL 18

Accepted Solution

by:
JConchie earned 50 total points
ID: 9922505
When you remove the drives, all the data will be intact on them......unless something then subsequently damages the drives. .....you should be able to reinstall the drives, recreate the array......and read data.  This would probably work better if the original array was on a hardware raid controller and you were reinstalling the original controller.

Of course, the keywords above are "should be able to".........common sense, and good practices say that you do a good backup (and do a test restore on a file or two, to make sure it is a good backup) prior to making any significant changes to your system........as you are doing.
0
 
LVL 2

Expert Comment

by:PaulHieb
ID: 9923472
Yes assuming two things:

If using Hardware RAID, generally speaking, it must be the same type/model controller.

If using Windows 2000/2003 software RAID all should go smoothly, just follow any Microsoft recommendations that you can find on handling 2000 software RAID.
0

Featured Post

The Eight Noble Truths of Backup and Recovery

How can IT departments tackle the challenges of a Big Data world? This white paper provides a roadmap to success and helps companies ensure that all their data is safe and secure, no matter if it resides on-premise with physical or virtual machines or in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
This problem is more common than not and I will show you some things to check to solve this problem.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question