Solved

MIRRORED DRIVE SERVER

Posted on 2004-04-15
5
203 Views
Last Modified: 2012-05-04
WE CURRENTLY HAVE A SERVER THAT HAS FOUR HARD DRIVES IN IT. THE SETUP IS THAT 2 ACT AS A MIRROR TO THE OTHER TWO. THE ISSUE IS THAT ONE OF THE HARD DRIVES KEEPS FAILING AND WOULD LIKE TO REPLACE WITH A NEW ONE. CAN THIS BE DONE WITHOUT AFFECTING THE MIRROR AND OR DATA.. EVERYTIME THE DRIVE FAILS I HAVE TO GO INTO THE BIOS AND REBUILD IT SO WOULD IT MATTER IF IT WERE A NEW DRIVE? OR DO WE HAVE TO FIRST BREAK THE MIRROR THEN SWAP THE BAD DRIVE OUT??
THANKS!!!
0
Comment
Question by:escme16
  • 3
  • 2
5 Comments
 
LVL 32

Expert Comment

by:Luc Franken
ID: 10834011
Hi escme16,

Normally you will just be able to put in a new drive and then rebuild the array. But if we know what raid controller you're using it will be much easier to know this for sure.

And please, don't use CAPS as it looks like shouting.

Greetings,

LucF
0
 

Author Comment

by:escme16
ID: 10834024
Sorry for the caps.. We have a Megaraid card in there..
0
 
LVL 32

Expert Comment

by:Luc Franken
ID: 10834080
Do you know exactly what model?
0
 

Author Comment

by:escme16
ID: 10834117
MEgaraid Express Plus V 1.48
0
 
LVL 32

Accepted Solution

by:
Luc Franken earned 250 total points
ID: 10834150
Assuming you mean this one:
http://www.lsilogic.com/products/ultra160_scsi_raid/4751010232a.html

It supports the rebuild, so you should be able to just replace the disk, if you have hot-swap bays, you don't even have to shut down the server.
0

Featured Post

Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
A clone is a duplicate copy. Sheep have been cloned and maybe someday even people will be cloned, but disk cloning (performed by the hard drive cloning software) is a vital tool used to manage and protect data. Let’s look at what hard drive cloning …
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
Along with being a a promotional video for my three-day Annielytics Dashboard Seminor, this Micro Tutorial is an intro to Google Analytics API data.

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question