Solved

Buffalo Terastation - Drive and Raid configuration

Posted on 2016-11-18
5
52 Views
Last Modified: 2016-11-21
We had a drive go down in our Buffalo Terastation the other day and ordered the "same" drive from amazon. When we installed the drive it's appearing a bit too small to allow us to do a raid recovery.

Can someone suggest what we should do to ensure we get the exact same drive as the ones we have? Even though we ordered a drive that was ST4000DM000 we couldn't specify the 1F21 portion of it...and the new drive is a little too small.

Here's a screen shot of the other drives plus the new drive.
Raid config
0
Comment
Question by:Andrew Derse
  • 3
  • 2
5 Comments
 
LVL 55

Accepted Solution

by:
andyalder earned 500 total points
ID: 41893538
Short of sending it back and buying a 6TB one instead I don't think there's much you can do unless you want to delete the data and array and create a new one with the slightly smaller drive as part pf it to start with.
0
 
LVL 2

Author Comment

by:Andrew Derse
ID: 41893542
Adding a drive that is larger will not affect the array negatively? Don't they all need to be the same size?
0
 
LVL 2

Author Comment

by:Andrew Derse
ID: 41893563
If I added a larger drive this time, would I also need to match that size in the future?
0
 
LVL 55

Expert Comment

by:andyalder
ID: 41893774
http://en.faq.buffalo-global.com/app/answers/detail/a_id/14105/p/0,31,32,7000,7002 says it will use the larger disk but ignore the extra space, that's pretty standard with any RAID system. If that disk fails then one of the original size should work as a replacement since it's only used 4GB of the 6GB disk.

Buffalo seem to use "higher capacity" as the key phrase in their documentation so search on you specific model plus "higher capacity" should give confirmation from their FAQs.
0
 
LVL 2

Author Closing Comment

by:Andrew Derse
ID: 41896149
Thanks for your assistance with this.
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Backup and host a VM 6 30
Disk Configuration - Dell R620 6 112
Does Robocopy do a Delta copy of a file (Remote copy) ? 2 41
Synology and UPS monitoring 2 23
Bellevue, WA, USA; Late December, 1980 "OK, folks, we nailed the IBM contract. We're going to have many meetings like this to discuss features and functions...and how to move from 86-DOS, the CP/M clone we just purchased, to our baby, MS-DOS. Thi…
This article is an update and follow-up of my previous article:   Storage 101: common concepts in the IT enterprise storage This time, I expand on more frequently used storage concepts.
This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question