EasyManua.ls Logo

IBM Storwize V5030 User Manual

IBM Storwize V5030
864 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #193 background imageLoading...
Page #193 background image
Chapter 4. Storage pools 171
4.3 Working with managed disks
A storage pool is created as an empty container, with no storage assigned to it. Storage is
then added in the form of MDisks. An MDisk can be either an array from internal storage or an
LU from an external storage system. The same storage pool can include both internal and
external MDisks.
Arrays are created from internal storage using RAID technology to provide redundancy and
increased performance. The system supports two types of RAID: traditional RAID and
distributed RAID. Arrays are assigned to storage pools at creation time and cannot be moved
between storage pools. It is not possible to have an array that does not belong to any storage
pool.
External MDisks can have one of the following modes:
򐂰 Unmanaged
External MDisks are discovered by the system as
unmanaged MDisks. An unmanaged
MDisk is not a member of any storage pool, is not associated with any volumes, and has
no metadata stored on it. The system does not write to an MDisk that is in unmanaged
mode, except when it attempts to change the mode of the MDisk to one of the other
modes.
򐂰 Managed
When unmanaged MDisks are added to storage pools, they become managed. Managed
mode MDisks are always members of a storage pool and provide extents to the storage
pool. This mode is the most common and normal mode for an MDisk.
򐂰 Image
Image mode provides a direct block-for-block translation from the MDisk to a volume. This
mode is provided to satisfy the following major usage scenarios:
Virtualization of external LUs that contain data not written through the IBM Storwize
V5000 Gen2
Exporting MDisks from the IBM Storwize V5000 Gen2 after volume migrations to
image mode MDisks.

Table of Contents

Other manuals for IBM Storwize V5030

Question and Answer IconNeed help?

Do you have a question about the IBM Storwize V5030 and is the answer not in the manual?

IBM Storwize V5030 Specifications

General IconGeneral
ModelIBM Storwize V5030
CategoryStorage
Controller Enclosures1 or 2
Maximum Drives240
RAID Levels0, 1, 5, 6, 10
VirtualizationYes
Data CompressionYes
Maximum Hosts512
Form Factor2U
Drive TypesSAS, NL-SAS, SSD
Host Interface8 Gb FC, 16 Gb FC, 10 Gb iSCSI, 12 Gb SAS
Processor Cores8 per controller

Summary

Chapter 2. Initial configuration

Hardware installation planning

Details the planning steps and requirements for installing the IBM Storwize V5000 Gen2 hardware.

First-time setup

Details the initial setup process for a new IBM Storwize V5000 Gen2 service and system.

Initial configuration

Covers the tasks required to complete the initial configuration of the IBM Storwize V5000 Gen2 system.

Chapter 4. Storage pools

Working with storage pools

Details how to manage storage pools, including creating, actions on pools, and child storage pools.

Chapter 5. Host configuration

Preparing the host operating system

Details the steps required to prepare host operating systems for connecting to the Storwize V5000.

Creating hosts by using the GUI

Describes how to create Fibre Channel, iSCSI, and SAS hosts using the IBM Storwize V5000 GUI.

Chapter 6. Volume configuration

Create Volumes menu

Explains how to use the Create Volumes menu to create different types of volumes.

Creating volumes using the Volume Creation

Details the process of creating Basic, Mirrored, Custom, and HyperSwap volumes using the GUI.

Chapter 7. Storage migration

Storage migration wizard

Details the steps involved in the storage migration process using the wizard.

Avoiding data loss

Provides crucial advice on preventing data loss during storage migration.

Preparing the environment for migration

Describes the essential steps to prepare the environment before starting the storage migration wizard.

Chapter 8. Advanced host and volume administration

Mapping a volume to the host

Explains how to map created volumes to hosts, including system or manual SCSI ID assignment.

Chapter 9. Advanced features for storage efficiency

Easy Tier

Introduces IBM Easy Tier, its overview, process, and operating modes for performance optimization.

Thin provisioning

Explains thin provisioning, its concepts, performance considerations, and limitations.

Real-time Compression software

Describes IBM Real-time Compression software, its benefits, use cases, and concepts.

Chapter 10. Copy services

IBM FlashCopy

Details the IBM FlashCopy function, its business requirements, backup improvements, and restore options.

FlashCopy mappings

Explains FlashCopy mappings, their attributes, and interaction with multiple target mappings.

Remote Copy

Details Remote Copy services, including Metro Mirror, Global Mirror, and their configurations.

Chapter 11. External storage virtualization

Adding external storage

Provides steps for adding external storage systems to the Storwize V5030 virtualized environment.

Chapter 12. RAS, monitoring, and troubleshooting

Configuration backup

Explains how to perform configuration backups using the GUI and CLI for system restoration.

System update

Details the process of updating the IBM Storwize V5000 Gen2 system software and drive firmware.

Powering off the system and shutting down the infrastructure

Details the procedures for powering off the system and shutting down the entire infrastructure.

Chapter 13. Encryption

Planning for encryption

Covers planning considerations for data-at-rest encryption, including legal and security requirements.

Activating encryption

Describes the process of activating the encryption license, both automatically and manually.

Enabling encryption

Details the process of enabling encryption on the system using key servers or USB flash drives.

Enabling encryption using USB flash drives

Provides instructions on enabling encryption using USB flash drives as the key provider.

Enabling encryption using key servers

Details how to enable encryption using key servers as the primary or secondary key provider.

Appendix A. CLI setup and SAN Boot

Basic setup

Details the basic setup for enabling CLI access using SSH keys.

Related product manuals