background image

Manually using external software (without Global Mirror)

You can use Metro Mirror, Global Copy, and FlashCopy functions to create
a consistent and restartable copy at your recovery site. These functions
require a manual and periodic suspend operation at the local site. For
instance, you can enter the 

freeze

and 

run

commands with external

automated software. Then, you can initiate a FlashCopy function to make a
consistent copy of the target volume for backup or recovery purposes.
Automation software is not provided with the storage system; it must be
supplied by the user.

Note:

The 

freeze

operation occurs at the same point-in-time across all

links and all storage systems.

Automatically (with Global Mirror and FlashCopy)

You can automatically create a consistent and restartable copy at your
intermediate or remote site with minimal or no interruption of
applications. This automated process is available for two-site Global Mirror
or three-site Metro / Global Mirror configurations. Global Mirror
operations automate the process of continually forming consistency groups.
It combines Global Copy and FlashCopy operations to provide consistent
data at the remote site. A master storage unit (along with subordinate
storage units) internally manages data consistency through consistency
groups within a Global Mirror configuration. Consistency groups can be
created many times per hour to increase the currency of data that is
captured in the consistency groups at the remote site.

Note:

A consistency group is a collection of session-grouped volumes

across multiple storage systems. Consistency groups are managed together
in a session during the creation of consistent copies of data. The formation
of these consistency groups is coordinated by the master storage unit,
which sends commands over remote mirror and copy links to its
subordinate storage units.

If a disaster occurs at a local site with a two or three-site configuration,
you can continue production on the remote (or intermediate) site. The
consistent point-in-time data from the remote site consistency group
enables recovery at the local site when it becomes operational.

Resource groups for Copy Services scope limiting

Resource groups are used to define a collection of resources and associate a set of
policies relative to how the resources are configured and managed. You can define
a network user account so that it has authority to manage a specific set of
resources groups.

Copy Services scope limiting overview

Copy services scope limiting is the ability to specify policy-based limitations on
Copy Services requests. With the combination of policy-based limitations and other
inherent volume-addressing limitations, you can control which volumes can be in a
Copy Services relationship, which network users or host LPARs issue Copy
Services requests on which resources, and other Copy Services operations.

Use these capabilities to separate and protect volumes in a Copy Services
relationship from each other. This can assist you with multitenancy support by
assigning specific resources to specific tenants, limiting Copy Services relationships

Chapter 3. Data management features

55

Summary of Contents for DS8882F

Page 1: ...IBM DS8882F Rack Mounted storage system Version 8 Release 5 Introduction and Planning Guide GC27 9259 00 IBM...

Page 2: ...environmental notices on page 133 and Notices on page 131 This edition applies to version 8 release 5 of the DS8882F Rack Mounted storage system Copyright IBM Corporation 2018 US Government Users Rest...

Page 3: ...ata and fixed block volume deletion prevention 39 Thin provisioning 39 Extent Space Efficient ESE capacity controls for thin provisioning 40 IBM Easy Tier 41 VMware vStorage API for Array Integration...

Page 4: ...05 Power control settings 105 Control switch settings 105 Chapter 8 Planning data migration 107 Selecting a data migration method 108 Chapter 9 Planning for security 111 Planning for data encryption 1...

Page 5: ...it is used for variables for which you supply actual values such as a default directory or the name of a system Monospace Text in monospace identifies the data or commands that you type samples of co...

Page 6: ...9259 00 DS8880 Introduction and Planning Guide This publication provides an overview of the product and technical concepts for DS8880 It also describes the ordering features and how to plan for an ins...

Page 7: ...ge System Multipath Subsystem Device Driver User s Guide This publication provides information regarding the installation and use of the Subsystem Device Driver SDD Subsystem Device Driver Path Contro...

Page 8: ...ore information about DS8000 series Table 3 DS8000 series related websites Title Description IBM website ibm com Find more information about IBM products and services IBM Support Portal website www ib...

Page 9: ...including DS8000 storage systems and other components of your data storage infrastructure DS8700 Code Bundle Information website www ibm com support docview wss uid ssg1S1003593 Find information abou...

Page 10: ...te and highest quality information Procedure To submit any comments about this publication or any other IBM storage product documentation Send your comments by email to ibmkc us ibm com Be sure to inc...

Page 11: ...e in four groups Base Function The Base Function license is required for each DS8882F storage system The licensed functions include Database Protection Encryption Authorization Easy Tier I O Priority...

Page 12: ...ic equipment It has been demonstrated that the requirements specified in Article 4 are met v EN 50581 2012 technical documentation for the assessment of electrical and electronic products regarding th...

Page 13: ...ent checking when notifications for service are called home The model 983 reports 2107 as the machine type to attached host systems Hardware The architecture of the DS8882F is based on three major ele...

Page 14: ...del LR1 or other standard 19 inch wide rack that conforms to EIA 310D specifications to take advantage of the DS8880 advanced features while limiting datacenter footprint and power infrastructure requ...

Page 15: ...tem memory Maximum 2 5 in Flash Tier 0 Flash Tier 1 or Flash Tier 2 drives Maximum storage capacity for 2 5 in Flash Tier 0 Flash Tier 1 or Flash Tier 2 drives 6 core 64 GB 48 365 TB 6 core 128 GB 48...

Page 16: ...ormance Flash Enclosure Gen2 pair contains the following hardware components v Two 2U 24 slot SAS flash drive enclosures Each of the two enclosures contains the following components Two power supplies...

Page 17: ...Management GUI DS command line interface DS CLI or other storage management software that supports the storage system Ethernet switches The Ethernet switches provide internal communication between the...

Page 18: ...the features that are associated with DS8882F Note Some storage system functions are not available or are not supported in all environments See the IBM System Storage Interoperation Center SSIC websit...

Page 19: ...problems When performance administration is required it is applied more precisely You can configure and manage storage pool striping by using the DS8000 Storage Management GUI DS CLI and DS Open API T...

Page 20: ...Time functions The following includes key Copy Service functions v FlashCopy v Remote Pair FlashCopy Preserve Mirror v Safeguarded Copy v Remote Mirror and Copy Metro Mirror Global Copy Global Mirror...

Page 21: ...esources are aligned to match the priority of your applications The default setting for this feature is disabled Note If the I O Priority Manager LIC key is activated you can enable I O Priority Manag...

Page 22: ...cognize and interact with the host Only hosts that are mapped to volumes can access those volumes Logical configuration of the storage system begins with managed arrays When you create storage pools y...

Page 23: ...ain I O ports on the storage system Zoning is configured either within the storage system by using I O port masking or on the switch Zoning ensures that the workload is spread properly over I O ports...

Page 24: ...sentation of the logical configuration sequence When volumes are created you must initialize logical tracks from the host before the host is allowed read and write access to the logical tracks on the...

Page 25: ...two or more drives presents the image of a single drive to the system If a single device failure occurs data can be read or regenerated from the other drives in the array Disk Array Site Array Rank E...

Page 26: ...quires a request for price quote RPQ For information contact your sales representative Note RAID 6 is the recommended and default RAID type for all drives over 1 TB RAID 6 and RAID 10 are the only sup...

Page 27: ...E The LSS identifiers are important for Copy Services operations For example for FlashCopy operations you specify the LSS identifier when choosing source and target volumes because the volumes can spa...

Page 28: ...arted The allocation of a first extent for the next volume starts from the next array in that sequence The next extent for that volume is taken from the next rank in sequence and so on The system rota...

Page 29: ...must be installed on all systems that run the DS8000 Storage Management GUI For more information about security requirements see information about configuring your environment for NIST SP 800 131A com...

Page 30: ...management SRM applications which help you to use existing SRM applications and infrastructures The DS Open API can also be used to automate configuration management through customer written applicat...

Page 31: ...t applications that provide higher level functions For more information see IBM Spectrum Control online product documentation in IBM Knowledge Center www ibm com support knowledgecenter IBM Copy Servi...

Page 32: ...s of the browsers as long as the vendors do not remove or disable functionality that the product relies upon For browser levels higher than the versions that are certified with the product customer su...

Page 33: ...ve scripting Configuring Internet Explorer to access the DS8000 Storage Management GUI If DS8000 Storage Management GUI is accessed through IBM Spectrum Control with Internet Explorer complete the fol...

Page 34: ...24 DS8882F Introduction and Planning Guide...

Page 35: ...9 inch wide rack that conforms to EIA 310D specifications 1021 Single phase power cord 250 V 20 A NEMA L6 20P 1022 Single phase power cord 250 V 16 A CEE 7 VII 1023 Single phase power cord 250 V 16 A...

Page 36: ...SC 1422 Fibre Channel cable 2 m 6 5 ft 9 micron OS1 or higher single mode LC SC Jumper 1423 Fibre Channel cable 2 m 6 5 ft 9 micron OS1 or higher single mode LC 1603 High Performance Flash Enclosure G...

Page 37: ...s A storage complex is a set of storage units that are managed by management console units You can associate one or two management console units with a storage complex Each storage complex must use at...

Page 38: ...el 983 cards are located in the Management enclosure coordinate the power management within the storage unit The power control cards are attached to the service processors in each processor complex Fl...

Page 39: ...ports SAN speeds of up to 16 Gbps with the current 16 Gbps host adapters The storage system detects and operates at the greatest available link speed that is shared by both sides of the system Fibre C...

Page 40: ...in the storage system During an attempt to balance the load within the storage system placement of application data is the determining factor The following resources are the most important to balance...

Page 41: ...acks that exists under the disk heads at one point in time without performing a seek operation T10 DIF support American National Standards Institute ANSI T10 Data Integrity Field DIF standard is suppo...

Page 42: ...extent pool are independently available for allocation to logical volumes The extents for a LUN or volume are logically ordered but they do not have to come from one rank and the extents do not have t...

Page 43: ...ier however by putting all the volumes data onto just one rank you might introduce a bottleneck depending on your actual workload LUN calculation The storage system uses a volume capacity algorithm ca...

Page 44: ...ents which is 1113 cylinders The unit of storage allocation for CKD volumes is one CKD extent The extent size for a CKD volume is either exactly a Mod 1 equivalent which is 1113 cylinders or it is 21...

Page 45: ...06 cylinders you are not wasting cylinders because it is an exact multiple of 1113 1 182 006 divided by 1113 is exactly 1062 This size is also an even multiple 354 of 3339 a model 3 size Quick initial...

Page 46: ...36 DS8882F Introduction and Planning Guide...

Page 47: ...for tape being the medium in which the data is transferred and archived Due to this architectural design point there are inherent inefficiencies that consume host CPU cycles including the following ex...

Page 48: ...account credentials If the system is authenticated it can then access cloud storage to either copy data to the cloud storage or restore data that is copied to cloud storage back to the system The sys...

Page 49: ...xed block volume deletion prevention By default DS8000 attempts to prevent volumes that are online and in use from being deleted The DS CLI and DS Storage Manager provides an option to force the delet...

Page 50: ...storage capacity for ESE user data usage as well as limit the ESE user data usage within the extent pool Another thing that is needed is the ability to detect when the available storage space within t...

Page 51: ...sis with warm demotion to achieve effective overall system health Simultaneously data promotion and auto rebalancing address performance while cold demotion works to address capacity Easy Tier data in...

Page 52: ...es The use of TSE volumes FB and CKD is not supported Easy Tier provides a performance monitoring capability regardless of whether the Easy Tier feature is activated Easy Tier uses the monitoring proc...

Page 53: ...documentation http www ibm com support knowledgecenter ST5GLJ_8 1 0 com ibm storage ssic help doc f2c_securitybp html and select Attaching and configuring hosts VMware ESX Server host attachment VMwar...

Page 54: ...rom three 3390 Model 3 volumes with no PAV support With one base it also reduces storage management costs that are associated with maintaining large numbers of volumes The alias provides an alternate...

Page 55: ...uplication functions The storage system supports Copy Service functions that contribute to the protection of your data These functions are also supported on the IBM TotalStorage Enterprise Storage Ser...

Page 56: ...cation to mirror data from an intermediate site to a remote site Multiple Target PPRC Multiple Target PPRC builds and extends the capabilities of Metro Mirror and Global Mirror It allows data to be mi...

Page 57: ...rget volume The amount of time that it takes to complete the background copy depends on the following criteria v The amount of data to be copied v The number of background copy processes that are occu...

Page 58: ...shCopy The Remote Pair FlashCopy function prevents the Metro Mirror relationship from changing states and the resulting momentary period where Remote A is out of synchronization with Remote B This fea...

Page 59: ...production environment you can use the backups to restore your environment back to a specified point in time You can also extract and restore specific data from the backup or use the backup to diagno...

Page 60: ...ses a master storage system along with optional subordinate storage systems to internally without external automation software manage data consistency across volumes by using consistency groups Consis...

Page 61: ...end Metro Mirror Global Mirror or Global Copy processing on specific volume pairs during the duration of the outage During this time data is no longer copied to the target volumes Because the primary...

Page 62: ...each session The DS CLI and DS Storage Manager display information about the sessions including the copy state of the sessions Practice copying and consistency groups To get a consistent copy of your...

Page 63: ...on loss with the primary storage subsystems This enables the Global Mirror to stay active despite transient channel path recovery events In addition this enhancement can provide fail safe protection a...

Page 64: ...ng a disaster recovery plan can ensure that critical data is recoverable at the time of a disaster Because most disasters are unplanned your disaster recovery plan must provide a way to recover your a...

Page 65: ...e Note A consistency group is a collection of session grouped volumes across multiple storage systems Consistency groups are managed together in a session during the creation of consistent copies of d...

Page 66: ...volumes on the storage systems For example a user cannot copy a Client A volume to a Client B volume Resource groups are configured to ensure that one tenant cannot cause any Copy Services relationshi...

Page 67: ...Synchronous and asynchronous replication Mirrors data from a single primary site to two secondary sites simultaneously Disaster recovery scenarios depend on support from controlling software such as...

Page 68: ...he set of logical volumes in each performance group that can be queried If management is performed for the performance policy the I O Priority Manager controls the I O operations of all managed perfor...

Page 69: ...d configured to protect data in your environment Encryption also requires access to at least two external key servers It is important to understand how to manage IBM encrypted storage and comply with...

Page 70: ...60 DS8882F Introduction and Planning Guide...

Page 71: ...hment v IBM systems including System p and IBM Z v Lenovo System x and BladeCenter v IBM storage systems including IBM System Storage ProtecTIER IBM Storwize V7000 and IBM System Storage N series v IB...

Page 72: ...d inside the Management enclosure It can proactively monitor the state of your storage system and notifying you and IBM when service is required It also can be connected to your network for centralize...

Page 73: ...lash Tier 0 drives 16 N A Yes 6 101 2 1613 3 2 TB 2 5 in Flash Tier 0 drives 16 N A Yes 6 101 2 1623 3 8 TB 2 5 in Flash Tier 1 drives 16 N A Yes 6 101 2 1624 7 6 TB 2 5 in Flash Tier 2 drives 16 N A...

Page 74: ...h Enclosures Gen2 there are 16 identical flash drives per drive set up to three drive sets per enclosure pair The logical configuration of your storage affects the effective capacity of the drive set...

Page 75: ...B FB volume takes 14 metadata extents A simple way of estimating the maximum space that might be used by volume metadata is to use the following calculations FB Pool Overhead volumes 2 total volume ex...

Page 76: ...Sm Ext 663766 885747 n a n a 1107725 1329703 CKD Lg Ext 11632 15522 n a n a 19412 23302 CKD Sm Ext 616506 822682 n a n a 1028848 1235028 7 6 TB 123 TB FB Lg Ext n a n a n a n a 34650 41587 FB Sm Ext...

Page 77: ...ents They are also used for remote mirror and copy control paths between DS8000 series storage systems Fibre Channel host adapters are installed in the I O enclosure Adapters are 4 port 16 Gbps Suppor...

Page 78: ...ature code 3454 1421 9 micron OS1 or higher Fibre Channel cable single mode 31 m 102 ft 1422 9 micron OS1 or higher Fibre Channel conversion cable single mode 2 m 6 5 ft 1423 9 micron OS1 or higher Fi...

Page 79: ...ore processors in the processor complex The DS8882F contains two processor enclosures POWER8 servers that contain the processors and memory that drives all functions in the storage system Feature code...

Page 80: ...core 42351 256 GB system memory 983 6 core Notes 1 Feature codes 4233 4234 and 4235 require 6 core processor license feature code 4421 Power features You must specify the power features to include on...

Page 81: ...wer cord 200 240 V 16A CEI 23 16 1025 Single phase power cord 250 V 20 A RS 3720DP E L1 L2 1026 Single phase power cord 250 V 16 A IEC 309 1027 Single phase power cord 250 V 15 A AS NZS 3112 E L N 102...

Page 82: ...gle phase power cord 250 V 16 A KSC 8305 E N L 1032 Single phase power cord 250 V 16 A IS 6538 N L E 1033 Single phase power cord 250 V 16 A GB 2099 1 1002 L N 1034 Single phase power cord 250 V 20 A...

Page 83: ...c of Madagascar Mali Martinique Mauritania Mauritius Mayotte Moldova Republic of Monaco Mongolia Morocco Mozambique Netherlands New Caledonia Niger Norway Poland Portugal Reunion Romania Russian Feder...

Page 84: ...rules for power features Ensure that you are familiar with the configuration rules and feature codes before you order power features When you order power cord features the following rules apply v You...

Page 85: ...e code Description 0400 BSMI certification documents Non encryption certification key China and Russia The encryption not capable feature for China and Russia disables the encryption capabilities of t...

Page 86: ...76 DS8882F Introduction and Planning Guide...

Page 87: ...y Services Manager to run on the Hardware Management Console which eliminates the need to maintain a separate server for Copy Services functions Licensed function indicators Each licensed function ind...

Page 88: ...icense scope options you must select a license scope when you initially retrieve the feature activation codes for your storage system This activity is performed by using the IBM Data storage feature a...

Page 89: ...l licensed functions you can combine feature codes to order the exact capacity that you need For example if you require 160 TB of Base Function license capacity order 10 of feature code 8151 10 TB eac...

Page 90: ...e The Base Function license provides essential functions for your storage system A Base Function license is required for each storage system The Base Function license is available for the following li...

Page 91: ...hardware layers on its way to storage It is possible for the data to become corrupted on a rare occasion caused by a malfunction in an intermediate layer With the IBM Database Protection feature an I...

Page 92: ...capacity installed on the system The volume allocates capacity on an as needed basis as a result of host write actions The thin provisioning feature enables the creation of extent space efficient log...

Page 93: ...tch support for IBM DB2 and utility operations and zHPF support for sequential access methods All of DB2 I O is now zHPF capable IBM HyperPAV IBM HyperPAV associates the volumes with either an alias a...

Page 94: ...ccess to all FB logical volumes that are configured in addition to all CKD volumes specified in the volume group Then with appropriate software a z OS host can complete backup and restore functions fo...

Page 95: ...et PPRC FlashCopy function point in time copy FlashCopy creates a copy of a source volume on the target volume This copy is called a point in time copy When you initiate a FlashCopy operation a FlashC...

Page 96: ...site z OS Global Mirror configurations The storage system supports z OS Global Mirror that is a 3 site mirroring solution that uses IBM System Storage Metro Mirror and z OS Global Mirror XRC The z OS...

Page 97: ...Feature Code Feature code for licensed function indicator 8450 CSM on HMC inactive 8451 CSM on HMC 10 TB up to 100 TB capacity 8452 CSM on HMC 15 TB from 100 1 TB to 250 TB capacity 8453 CSM on HMC 25...

Page 98: ...88 DS8882F Introduction and Planning Guide...

Page 99: ...adually reach thermal equilibrium with the indoor environment before you remove the shipping bag and energize the equipment Follow these guidelines to properly acclimate your equipment v Leave the sys...

Page 100: ...ommodate the delivery of your storage system Procedure 1 Find out the packaged weight and dimensions of the shipping containers in your shipment 2 Ensure that your loading dock receiving area and elev...

Page 101: ...code 0939 supports an optional 1U keyboard and display feature code 1765 The 16U contiguous space requirement does not include space for the optional keyboard and display but they are not required to...

Page 102: ...nal weight of the DS8882F model 983 v Can the installation site accommodate the amount of space that is required by the storage system and does the space meet the following criteria Weight distributio...

Page 103: ...ments Attention Implementation of surge protection for electronic devices as described in the EN 62305 standard or IEEE Emerald Book is recommended If a lightning surge or other facility transient vol...

Page 104: ...inal input voltages 200 240 RMS V AC Minimum tolerated input voltage 180 RMS V AC Maximum tolerated input voltage 256 RMS V AC System maximum current rating 14 4 Amps Recommended wall breaker rating 1...

Page 105: ...onmental information for the DS8882F model 983 Measurement Unit of measure Model 983 Peak electric power 1 2 kilovolt amperes kVA 3 0 Thermal load British thermal units BTU per hour 7236 Capacity of e...

Page 106: ...000 ft Dry bulb temperature 16 32 C 60 90 F Relative humidity 20 80 Wet bulb temperature maximum 23 C 73 F Table 40 provides the optimum operating points for your storage system with its power on Tabl...

Page 107: ...ity controls and also operates with G1 specifications for corrosive gases and P1 specifications for particulates Operating vibration and shock requirements The vibration levels that are designed for t...

Page 108: ...levels of particulates or gases in your environment damaged the storage system the warranty is void Implementation of correctional measures is a customer responsibility The following criteria must be...

Page 109: ...ider v Fire suppression v Service navigation Providing a fire suppression system Set up an environment that supports the temperature cooling and operating requirements of your storage system You are r...

Page 110: ...system can report failures transmit pertinent debugging data to IBM and use remote code load as the delivery method for code upgrades When call home is used your technical support representative can q...

Page 111: ...cture is referred to as a node and each host is also a node Each node corresponds to one or more ports In the case of Fibre Channel I O adapters these ports are Fibre Channel ports Each port attaches...

Page 112: ...tting See the IBM DS8000 Host Systems Attachment Guide for more information about Fibre Channel access modes v Storage systems can connect to IBM SAN Volume Controller host systems See the IBM DS8000...

Page 113: ...ization worksheets Company information Specify on the company information worksheet any information that technical service personnel or your service provider can use to contact you as quickly as possi...

Page 114: ...r security guidelines allow it can run directly on the storage system In addition to AOS you can also use rsc remote support center It is a simple SSH proxy based remote service solution which can be...

Page 115: ...ting 2 If you plan to use advanced functions SNMP messaging you must set those functions by using DS CLI When you choose to enable email notifications email messages are sent to all the email addresse...

Page 116: ...operator console for device related errors Device threshold levels are the same type and severity as control unit threshold settings Lights on fast load for the 16 Gb s host adapters 16 Gb Fibre Chan...

Page 117: ...nsure that the new configuration is large enough to accommodate the existing data You also want to ensure that the virtual disks are similar in configuration to the disk drives that they are replacing...

Page 118: ...t software provides simple robust methods that you can use during production without disturbing users v The AIX logical volume manager LVM provides methods that you can use at any time without disrupt...

Page 119: ...opy Operating system independent Like storage device types needed Third party software packages Data Migration XoSoft Backup Restore Tivoli Legato Veritas Some have little application service interrup...

Page 120: ...110 DS8882F Introduction and Planning Guide...

Page 121: ...n and its associated software stack This server is attached directly to dedicated non encrypting storage resources containing only key server code and data objects The remaining key servers can be of...

Page 122: ...your storage system select the appropriate encryption key manager for your encryption key server host v If your encryption key server runs on an open system host install IBM Security Key Lifecycle Man...

Page 123: ...t security practices Managing secure user accounts Follow these recommended practices for managing secure user accounts Procedure Complete the following steps to achieve the level of secure access for...

Page 124: ...twork connection to IBM over the internet with SSL encryption It can be configured so that the service administrator must approve remote service access and can monitor remote service activity Planning...

Page 125: ...ies It might not be feasible to update all of these entities at the same time because of various dependencies Therefore you can upgrade them for NIST SP 800 131A security conformance independently of...

Page 126: ...116 DS8882F Introduction and Planning Guide...

Page 127: ...s information either by clicking Need Help in the Activate Licensed Functions page or by selecting Properties on the System page of the DS8000 Storage Management GUI Planning your licensed functions A...

Page 128: ...ion is a concurrent activity assuming that the appropriate level of microcode is installed on the storage system for the function Note Removal of a DS8000 licensed function to deactivate the function...

Page 129: ...es c Enter the machine type serial number and machine signature of your DS8000 system You can find this information either by clicking Need Help in the Activate Licensed Functions window or by selecti...

Page 130: ...btain the feature activation code for the licensed feature enter it into the DS8000 Storage Management GUI You replace the existing feature activation code with the new feature activation code 6 After...

Page 131: ...evices ports and connectors v The attachment of alternative input and output devices The DS8000 online product documentation and its related publications are accessibility enabled The accessibility fe...

Page 132: ...122 DS8882F Introduction and Planning Guide...

Page 133: ...rmation The statement of limited warranty specifies the warranty period type of warranty service and service level See IBM Warranty Information for information on machine type models 283x or 533x Copy...

Page 134: ...124 DS8882F Introduction and Planning Guide...

Page 135: ...talled in a conforming 19 inch rack in a 16U contiguous space in the specified sequence rack layout When the modules arrive they contain any ordered I O enclosures device adapters storage enclosures d...

Page 136: ...ervice related media and documents with your storage system Keep the following components with your storage system so that technical service representatives can use them when they service your storage...

Page 137: ...http www ibm com support techdocs atsmastr nsf WebIndex PRS4743 Use the worksheets to specify the initial settings for your storage system You can customize settings for company information the manag...

Page 138: ...128 DS8882F Introduction and Planning Guide...

Page 139: ...regional publication compliance standardized requirements Regulatory Model ID RMID for control system base platform AP2 DS8882F AP2 indicates the 2U Management Enclosure chassis only for regulatory c...

Page 140: ...130 DS8882F Introduction and Planning Guide...

Page 141: ...of Licensing IBM Corporation North Castle Drive MD NC119 Armonk NY 10504 1785 US For license inquiries regarding double byte character set DBCS information contact the IBM Intellectual Property Depar...

Page 142: ...ples of data and reports used in daily business operations To illustrate them as completely as possible the examples include the names of individuals companies brands and products All of these names a...

Page 143: ...work IBM Systems Safety Notices www ibm com shop publications order G229 9054 The publication is organized into three sections Safety notices Lists the danger and caution notices without labels organi...

Page 144: ...at you understand the caution notices Caution notices Use the reference numbers in parentheses at the end of each notice such as C001 to find the matching translated notice in IBM Systems Safety Notic...

Page 145: ...ct could result in exposure to hazardous laser radiation There are no serviceable parts inside the device Use of the controls or adjustments or performance of the procedures other than those specified...

Page 146: ...n working on or around your IT rack system Heavy equipment personal injury or equipment damage might result if mishandled Always lower the leveling pads on the rack cabinet Always install stabilizer b...

Page 147: ...otection To provide the correct power connection to a rack refer to the rating labels located on the equipment in the rack to determine the total power requirement of the supply circuit For sliding dr...

Page 148: ...with your rack cabinet for the weight of a loaded rack cabinet Verify that all door openings are at least 760 x 230 mm 30 x 80 in Ensure that all devices shelves drawers doors and cables are secure E...

Page 149: ...ld be free of any non conductive material to allow for metal to metal contact All PROTECTIVE BONDING CONDUCTORS should terminate at this main protective earthing terminal or at points marked with R010...

Page 150: ...ssible unsafe conditions are corrected Assume that an electrical safety hazard is present Perform all continuity grounding and power checks specified during the subsystem installation procedures to en...

Page 151: ...ing the UPS from the shipping carton or installing or removing the UPS in the rack D007 DANGER Professional movers are to be used for all relocation activities Serious injury or death may occur if sys...

Page 152: ...a temperature and humidity controlled indoor area free of conductive contaminants Refer servicing to qualified service personnel only Intended for installation in a controlled environment CAUTION Risk...

Page 153: ...or mutilate the battery or batteries The released electrolyte is harmful to the skin and eyes It may be toxic CAUTION A battery can present a risk of electrical shock and high short circuit current Th...

Page 154: ...dio interference Germany Notice Deutschsprachiger EU Hinweis Hinweis f r Ger te der Klasse A EU Richtlinie zur Elektromagnetischen Vertr glichkeit Dieses Produkt entspricht den Schutzanforderungen der...

Page 155: ...914 499 1900 Der verantwortliche Ansprechpartner des Herstellers in der EU ist IBM Deutschland GmbH Technical Relations Europe Abteilung M456 IBM Allee 1 71139 Ehningen Germany Tel 49 800 225 5426 e m...

Page 156: ...Japan Voluntary Control Council for Interference VCCI Notice Korea Notice People s Republic of China Notice Russia Notice 0 12345 67 0 48 9 4 ABCD rusemi 146 DS8882F Introduction and Planning Guide...

Page 157: ...to cause harmful interference in which case the user will be required to correct the interference at his own expense Properly shielded and grounded cables and connectors must be used in order to meet...

Page 158: ...148 DS8882F Introduction and Planning Guide...

Page 159: ...es 66 consolidating storage 30 containers shipping 90 contamination information 98 control switch settings 105 control unit threshold 105 conventions terminology v typefaces v cooling 96 Copy Services...

Page 160: ...ttachment overview 29 host systems communication requirements 101 hot spot management 41 how to order using feature codes 61 HyperPAV 83 I I O adapter features 66 I O enclosure 29 feature codes 66 I O...

Page 161: ...mirror and copy 85 remote mirror for z Systems see z OS Global Mirror 86 remote power control 101 remote support connections 100 settings 104 replication copy services functions 21 requirements floor...

Page 162: ...tion force option 39 safe option 39 volume migration 41 volume rebalancing 41 volumes allocation 18 32 deletion 32 force option 32 modification 32 W warranty 123 websites v weight storage system insta...

Page 163: ......

Page 164: ...IBM Printed in USA GC27 9259 00...

Reviews: