Dell EMC PowerVault MD Series Administrator's Manual page 6

Storage arrays
Table of Contents

Advertisement

Changing the virtual disk modification priority.......................................................................................................66
Changing virtual disk cache settings.......................................................................................................................66
Changing segment size of virtual disk..................................................................................................................... 67
Changing the I/O type.............................................................................................................................................. 68
Thin virtual disks.............................................................................................................................................................. 68
Advantages of thin virtual disks............................................................................................................................... 68
Physical vs virtual capacity an a thin virtual disk................................................................................................... 69
Thin virtual disk requirements and limitations.........................................................................................................69
Thin virtual disk attributes.........................................................................................................................................70
Thin virtual disk states...............................................................................................................................................70
Comparison-Types of virtual disks and copy services........................................................................................ 70
Rollback on thin virtual disks..................................................................................................................................... 71
Initializing a thin virtual disk....................................................................................................................................... 71
Changing a thin virtual disk to a standard virtual disk........................................................................................... 74
Utilizing unmapping for thin virtual disk...................................................................................................................74
Enabling unmap thin provisioning for thin virtual disk............................................................................................74
Choosing an appropriate physical disk type..................................................................................................................75
Physical disk security with self encrypting disk............................................................................................................75
Creating a security key.............................................................................................................................................. 76
Changing security key................................................................................................................................................77
Saving a security key................................................................................................................................................. 78
Validate security key.................................................................................................................................................. 79
Unlocking secure physical disks............................................................................................................................... 79
Erasing secure physical disks....................................................................................................................................79
Configuring hot spare physical disks..............................................................................................................................79
Hot spares and rebuild...............................................................................................................................................80
Global hot spares....................................................................................................................................................... 80
Hot spare operation....................................................................................................................................................81
Hot spare physical disk protection............................................................................................................................81
Physical disk security........................................................................................................................................................81
Enclosure loss protection................................................................................................................................................ 82
Drawer loss protection.................................................................................................................................................... 83
Host-to-virtual disk mapping.......................................................................................................................................... 83
Creating host-to-virtual disk mappings................................................................................................................... 84
Modifying and removing host-to-virtual disk mapping..........................................................................................85
Changing RAID controller ownership of the virtual disk....................................................................................... 85
Removing host-to-virtual disk mapping.................................................................................................................. 86
Changing the RAID controller module ownership of a disk group....................................................................... 86
Changing the RAID level of a disk group.................................................................................................................86
Removing a host-to-virtual disk mapping using Linux DMMP..............................................................................87
Restricted mappings........................................................................................................................................................88
Storage partitioning......................................................................................................................................................... 88
Disk group and virtual disk expansion............................................................................................................................89
Disk group expansion.................................................................................................................................................89
Virtual disk expansion................................................................................................................................................ 90
6
Contents

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents