Changing the I/O type.............................................................................................................................................. 68
Thin virtual disks.............................................................................................................................................................. 68
Advantages of thin virtual disks............................................................................................................................... 68
Thin virtual disk attributes.........................................................................................................................................70
Thin virtual disk states...............................................................................................................................................70
Rollback on thin virtual disks..................................................................................................................................... 71
Initializing a thin virtual disk....................................................................................................................................... 71
Creating a security key.............................................................................................................................................. 76
Changing security key................................................................................................................................................77
Saving a security key................................................................................................................................................. 78
Validate security key.................................................................................................................................................. 79
Unlocking secure physical disks............................................................................................................................... 79
Erasing secure physical disks....................................................................................................................................79
Hot spares and rebuild...............................................................................................................................................80
Global hot spares....................................................................................................................................................... 80
Hot spare operation....................................................................................................................................................81
Physical disk security........................................................................................................................................................81
Enclosure loss protection................................................................................................................................................ 82
Drawer loss protection.................................................................................................................................................... 83
Host-to-virtual disk mapping.......................................................................................................................................... 83
Restricted mappings........................................................................................................................................................88
Storage partitioning......................................................................................................................................................... 88
Disk group expansion.................................................................................................................................................89
Virtual disk expansion................................................................................................................................................ 90
6
Contents