HP XP P9500 Storage User Manual
Page 3

Contents
Disadvantages .............................................................................................................14
When to use fixed-sized provisioning...............................................................................15
Thin Provisioning................................................................................................................17
Thin Provisioning concepts .................................................................................................17
When to use Thin Provisioning.............................................................................................18
Thin Provisioning advantages..............................................................................................18
Thin Provisioning advantage example...................................................................................18
Thin Provisioning work flow.................................................................................................19
Thin Provisioning................................................................................................................19
Tiers concept ....................................................................................................................20
When to use Smart Tiers.....................................................................................................20
Data retention strategies..........................................................................................................20
Resource groups strategies.......................................................................................................20
Complimentary strategies........................................................................................................21
Key terms..............................................................................................................................21
Before you begin....................................................................................................................22
System requirements...........................................................................................................22
Shared memory requirements..............................................................................................22
Overall provisioning workflow.............................................................................................23
Example of resource groups sharing a port............................................................................24
Example of resource groups not sharing ports........................................................................26
Meta_resource.......................................................................................................................27
Resource lock.........................................................................................................................27
User groups...........................................................................................................................27
Resource group assignments.....................................................................................................27
Resource group license requirements.........................................................................................28
Resource group rules, restrictions, and guidelines........................................................................28
Creating a resource group.......................................................................................................28
Adding resources to a resource group.......................................................................................29
Removing resources from a resource group.................................................................................29
Managing Resource Groups.....................................................................................................30
Snapshot..........................................................................................................................31
Thin Provisioning................................................................................................................32
DKA Encryption.................................................................................................................32
External Storage Access Manager........................................................................................32
Contents
3