Solved

Proliant ML310 Raid 1

Posted on 2006-11-18
2
615 Views
Last Modified: 2012-05-05
The box come with a Raid controller built on the motherboard, however I cannot figure out how to configure it for Raid 1.

1) I have two 40 gig IDE drives that are working fine.   There are two controllers in the box.  Should both of these drives be on the same controller to support Raid 1?  Or can I have on each controller to improve redunancy?

2) When I configure it, it seems to be OK, but when I install windows 2003 it sees the second drive but as a seperate drive vs. a Raid 1 array?

Help?

Anyway instructions for the proper way to set this up would be great. thanks
0
Comment
Question by:CTCknows
2 Comments
 
LVL 3

Accepted Solution

by:
Skyccord earned 500 total points
ID: 17977259
CTCknows,
You have to reconfigure everything from scratch.  You have to have both hard drives on the same controller.  In HP's only one of the controllers is the Raid controller as long as you selected that option upon ordering.  Since you didn't specify, I don't know if your utilizing SATA or SCSI drives.  

The first cd that you need to run in the HP SmartStart CD.  It has everything from start to finishing to configuring your system properly.  The first thing that it is going to do is select your bootup controller and if you have an array controller it will select that one.  Following step is to build the array.  The wizard walks you through all of this step by step but you have to know what to look for.  Next step will ask you to select your operating system that you will install.  Final step will ask you to enter your serial key and the CD.

Thank you,
Stanley Louissaint
0

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
A clone is a duplicate copy. Sheep have been cloned and maybe someday even people will be cloned, but disk cloning (performed by the hard drive cloning software) is a vital tool used to manage and protect data. Let’s look at what hard drive cloning …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

838 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question