
Note:
The default setting for this feature is “disabled” and must be enabled for
use through either the DS8000 Storage Management GUI or the DS CLI. If I/O
Priority Manager is enabled on your storage system, you cannot use a zHyperLink
connection.
The I/O Priority Manager maintains statistics for the set of logical volumes in each
performance group that can be queried. If management is performed for the
performance policy, the I/O Priority Manager controls the I/O operations of all
managed performance groups to achieve the goals of the associated performance
policies. The performance group defaults to 0 if not specified. Table 29 lists
performance groups that are predefined and have the associated performance
policies:
Table 29. Performance groups and policies
Performance group
1
Performance policy
Performance policy
description
0
0
No management
1-5
1
Fixed block high priority
6-10
2
Fixed block medium priority
11-15
3
Fixed block low priority
16-18
0
No management
19
19
CKD high priority 1
20
20
CKD high priority 2
21
21
CKD high priority 3
22
22
CKD medium priority 1
23
23
CKD medium priority 2
24
24
CKD medium priority 3
25
25
CKD medium priority 4
26
26
CKD low priority 1
27
27
CKD low priority 2
28
28
CKD low priority 3
29
29
CKD low priority 4
30
30
CKD low priority 5
31
31
CKD low priority 6
Note:
1
Performance group settings can be managed using DS CLI.
Securing data
You can secure data with the encryption features that are supported by the storage
system.
Encryption technology has a number of considerations that are critical to
understand to maintain the security and accessibility of encrypted data. For
example, encryption must be enabled by feature code and configured to protect
data in your environment. Encryption also requires access to at least two external
key servers.
It is important to understand how to manage IBM encrypted storage and comply
with IBM encryption requirements. Failure to follow these requirements might
Chapter 3. Data management features
81
Содержание DS8880 Series
Страница 1: ...IBM DS8880 Version 8 Release 5 Introduction and Planning Guide GC27 8525 16 IBM...
Страница 12: ...xii DS8880 Introduction and Planning Guide...
Страница 52: ...40 DS8880 Introduction and Planning Guide...
Страница 68: ...56 DS8880 Introduction and Planning Guide...
Страница 138: ...126 DS8880 Introduction and Planning Guide...
Страница 184: ...172 DS8880 Introduction and Planning Guide...
Страница 190: ...178 DS8880 Introduction and Planning Guide...
Страница 194: ...182 DS8880 Introduction and Planning Guide...
Страница 200: ...188 DS8880 Introduction and Planning Guide...
Страница 206: ...194 DS8880 Introduction and Planning Guide...
Страница 208: ...196 DS8880 Introduction and Planning Guide...
Страница 216: ...204 DS8880 Introduction and Planning Guide...
Страница 220: ...208 DS8880 Introduction and Planning Guide...
Страница 222: ...210 DS8880 Introduction and Planning Guide...
Страница 243: ......
Страница 244: ...IBM Printed in USA GC27 8525 16...