EasyManua.ls Logo

IBM Storwize V5030 User Manual

IBM Storwize V5030
864 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #315 background imageLoading...
Page #315 background image
Chapter 6. Volume configuration 293
Figure 6-4 provides an overview of volume mirroring.
Figure 6-4 Volume mirroring overview
A second copy can be added to a volume with a single copy or removed from a volume with
two copies. Checks prevent the accidental removal of the only remaining copy of a volume. A
newly created, unformatted volume with two copies initially has the two copies in an
out-of-synchronization state. The primary copy is defined as “fresh” and the secondary copy
is defined as “stale.
The synchronization process updates the secondary copy until it is fully synchronized. This
update is done at the default
synchronization rate or at a rate that is defined when the volume
is created or modified. The synchronization status for mirrored volumes is recorded on the
quorum disk.
If a two-copy mirrored volume is created with the format parameter, both copies are formatted
in parallel, and the volume comes online when both operations are complete with the copies
in sync.
If mirrored volumes are expanded or shrunk, all of their copies are also expanded or shrunk.
If it is known that MDisk space (which is used for creating copies) is already formatted or if the
user does not require read stability, a no synchronization option can be selected that
declares the copies as synchronized (even when they are not).
To minimize the time that is required to resynchronize a copy that is out of sync, only the
256 kibibyte (KiB) grains that were written to since the synchronization was lost are copied.
This approach is known as an
incremental synchronization. Only the changed grains must be
copied to restore synchronization.
Important: An unmirrored volume can be migrated from one location to another by adding
a second copy to the wanted destination, waiting for the two copies to synchronize, and
then removing the original copy 0. This operation can be stopped at any time. The two
copies can be in separate storage pools with separate extent sizes.

Table of Contents

Other manuals for IBM Storwize V5030

Question and Answer IconNeed help?

Do you have a question about the IBM Storwize V5030 and is the answer not in the manual?

IBM Storwize V5030 Specifications

General IconGeneral
ModelIBM Storwize V5030
CategoryStorage
Controller Enclosures1 or 2
Maximum Drives240
RAID Levels0, 1, 5, 6, 10
VirtualizationYes
Data CompressionYes
Maximum Hosts512
Form Factor2U
Drive TypesSAS, NL-SAS, SSD
Host Interface8 Gb FC, 16 Gb FC, 10 Gb iSCSI, 12 Gb SAS
Processor Cores8 per controller

Summary

Chapter 2. Initial configuration

Hardware installation planning

Details the planning steps and requirements for installing the IBM Storwize V5000 Gen2 hardware.

First-time setup

Details the initial setup process for a new IBM Storwize V5000 Gen2 service and system.

Initial configuration

Covers the tasks required to complete the initial configuration of the IBM Storwize V5000 Gen2 system.

Chapter 4. Storage pools

Working with storage pools

Details how to manage storage pools, including creating, actions on pools, and child storage pools.

Chapter 5. Host configuration

Preparing the host operating system

Details the steps required to prepare host operating systems for connecting to the Storwize V5000.

Creating hosts by using the GUI

Describes how to create Fibre Channel, iSCSI, and SAS hosts using the IBM Storwize V5000 GUI.

Chapter 6. Volume configuration

Create Volumes menu

Explains how to use the Create Volumes menu to create different types of volumes.

Creating volumes using the Volume Creation

Details the process of creating Basic, Mirrored, Custom, and HyperSwap volumes using the GUI.

Chapter 7. Storage migration

Storage migration wizard

Details the steps involved in the storage migration process using the wizard.

Avoiding data loss

Provides crucial advice on preventing data loss during storage migration.

Preparing the environment for migration

Describes the essential steps to prepare the environment before starting the storage migration wizard.

Chapter 8. Advanced host and volume administration

Mapping a volume to the host

Explains how to map created volumes to hosts, including system or manual SCSI ID assignment.

Chapter 9. Advanced features for storage efficiency

Easy Tier

Introduces IBM Easy Tier, its overview, process, and operating modes for performance optimization.

Thin provisioning

Explains thin provisioning, its concepts, performance considerations, and limitations.

Real-time Compression software

Describes IBM Real-time Compression software, its benefits, use cases, and concepts.

Chapter 10. Copy services

IBM FlashCopy

Details the IBM FlashCopy function, its business requirements, backup improvements, and restore options.

FlashCopy mappings

Explains FlashCopy mappings, their attributes, and interaction with multiple target mappings.

Remote Copy

Details Remote Copy services, including Metro Mirror, Global Mirror, and their configurations.

Chapter 11. External storage virtualization

Adding external storage

Provides steps for adding external storage systems to the Storwize V5030 virtualized environment.

Chapter 12. RAS, monitoring, and troubleshooting

Configuration backup

Explains how to perform configuration backups using the GUI and CLI for system restoration.

System update

Details the process of updating the IBM Storwize V5000 Gen2 system software and drive firmware.

Powering off the system and shutting down the infrastructure

Details the procedures for powering off the system and shutting down the entire infrastructure.

Chapter 13. Encryption

Planning for encryption

Covers planning considerations for data-at-rest encryption, including legal and security requirements.

Activating encryption

Describes the process of activating the encryption license, both automatically and manually.

Enabling encryption

Details the process of enabling encryption on the system using key servers or USB flash drives.

Enabling encryption using USB flash drives

Provides instructions on enabling encryption using USB flash drives as the key provider.

Enabling encryption using key servers

Details how to enable encryption using key servers as the primary or secondary key provider.

Appendix A. CLI setup and SAN Boot

Basic setup

Details the basic setup for enabling CLI access using SSH keys.

Related product manuals