Solved

SOFTWARE RAID

Posted on 2004-04-22
2
234 Views
Last Modified: 2013-12-16
RAID 1 (Linux software raid)

If my first drive is going bad (bad writes), will the second drive (mirror) also get the bad writes.
What happens in this kind of situation?

How well protected am I with a mirror?
0
Comment
Question by:Ted22
2 Comments
 
LVL 40

Accepted Solution

by:
jlevie earned 125 total points
ID: 10890694
> If my first drive is going bad (bad writes), will the second drive (mirror) also get the bad writes.

No, assuming that the problem is a disk issue with the first drive. With RAID 1 the system simply writes the same data to both drives. Even if a write fails on one drive the original (correct) data will still be writtern to the second. Assuming only a single drive failure, the only case where the other drive will receive bad data is if the OS has a fault that causes it to send bogus data to the RAID volume.
0
 
LVL 1

Author Comment

by:Ted22
ID: 10890761
That's exactly what I needed to know.
0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Xymon customize http timeout 2 86
installing docker on ubuntu 6 29
open source backup solution 1 29
linux - yum package installation issue 2 12
I am a long time windows user and for me it is normal to have spaces in directory and file names. Changing to Linux I found myself frustrated when I moved my windows data over to my new Linux computer. The problem occurs when at the command line.…
It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question