HP P9000 Provisioning for Open Systems User Guide (AV400-96396, October 2011)

Contents
1 Introduction to provisioning........................................................................13
About provisioning.................................................................................................................13
Basic provisioning..................................................................................................................13
Fixed-sized provisioning......................................................................................................13
Disadvantages .............................................................................................................15
When to use fixed-sized provisioning...............................................................................15
Custom-sized provisioning...................................................................................................15
When to use custom-sized provisioning............................................................................16
Expanded LU provisioning...................................................................................................16
When to use expanded-LU provisioning............................................................................17
Basic provisioning workflow................................................................................................17
Thin provisioning....................................................................................................................18
Thin Provisioning................................................................................................................18
Thin Provisioning concepts .............................................................................................19
When to use Thin Provisioning........................................................................................19
Thin Provisioning advantages..........................................................................................19
Thin Provisioning advantage example..............................................................................20
Thin Provisioning example..............................................................................................20
Thin Provisioning work flow............................................................................................21
Smart Tiers........................................................................................................................22
Tiers concept ...............................................................................................................23
When to use Smart Tiers................................................................................................23
Data retention strategies..........................................................................................................24
Resource groups strategies.......................................................................................................24
Key terms..............................................................................................................................24
Before you begin....................................................................................................................25
System requirements...........................................................................................................25
Shared memory requirements..............................................................................................25
Overall provisioning workflow.............................................................................................26
2 Configuring resource groups......................................................................27
System configuration using resource groups................................................................................27
Resource groups examples.......................................................................................................27
Example of resource groups sharing a port............................................................................27
Example of resource groups not sharing ports........................................................................29
Meta_resource.......................................................................................................................30
Resource lock.........................................................................................................................30
User groups...........................................................................................................................30
Resource group assignments.....................................................................................................30
Resource group license requirements.........................................................................................31
Resource group rules, restrictions, and guidelines........................................................................31
Creating a resource group.......................................................................................................31
Adding resources to a resource group.......................................................................................32
Removing resources from a resource group.................................................................................32
Managing Resource Groups.....................................................................................................33
Changing the name of a resource group...............................................................................33
Deleting a resource group...................................................................................................33
Using Resource Partition and other HP P9500 products................................................................34
Snapshot..........................................................................................................................34
Thin Provisioning................................................................................................................35
DKA Encryption.................................................................................................................35
External Storage Access Manager........................................................................................35
Contents 3