Pools

A pool or storage pool is an amount of capacity that is allocated to volumes that are created in that pool.

Use the Pools page in the management GUI to configure and manage storage pools, internal and external storage, MDisks, and to migrate existing storage to the system.

This figure shows a basic parent pool with associated child pools. In this graphic, the usable capacity for the parent group is divided between two child pools. Usable capacity is the amount of capacity that is available for storing data on a parent pool after formatting and RAID techniques are applied. Volumes can then be created by using either the capacity from the MDisks through the parent pool or from the child pool.
Figure 1. Storage pool
This figure shows a basic parent pool with associated child pools

Parent Pools

A parent pool is a collection of managed disks (MDisks). When the pool is created, the managed disks are split into extents. Volumes are created from those extents with the data striped across managed disks.

When you create or manage a parent pool, consider the following general guidelines:

  • You specify the extent size when you create a new parent pool. You cannot change the extent size later. The choice of extent size affects the total amount of storage that is managed by the system. Consider the following when determining the extent size for your pool:

    • A system can manage 2^22 extents. For example, with a 2048 MB extent size, the system can manage up to 2048 MB x 4,194,304 = 8 PB of storage.

    • When a volume is created, the storage capacity for the volume is rounded to a whole number of extents.

      Important: You can specify different extent sizes for different systems; however, you cannot migrate (volumes) between systems with different extent sizes. If possible, create all your systems with the same extent size.
  • You can add MDisks to a pool at any time either to increase the number of extents that are available for new volume copies or to expand existing volume copies.
    Attention: If you add an MDisk to a system as an MDisk, any data on the MDisk is lost. If you want to keep the data on an MDisk (for example, because you want to import storage that was previously not managed), you must create image mode volumes instead.
  • The Pools page in the management GUI displays the Usable Capacity and Capacity Details. Usable capacity indicates the amount of capacity that is available for volumes before any capacity savings methods are applied.
  • You can specify a warning threshold for a pool. A warning event is generated when the amount of used capacity in the pool exceeds the warning threshold. The warning threshold is especially useful with thin-provisioned volumes that are configured to automatically use capacity from the pool.
  • Volumes can have one or two volume copies. A volume copy is associated with just one pool, except when you migrate a volume copy between parent pools. A volume with two volume copies can have each volume copy in a different pool.
  • You can only add MDisks that are in unmanaged mode. When MDisks are added to a parent pool, their mode changes from unmanaged to managed.
  • You can remove MDisks from a parent pool if there are enough free extents are available elsewhere in the pool to move any extents that are in use from this MDisk. The system migrates all extents that are used by volumes in the pool to other MDisks in the parent pool to ensure that data is not lost.
  • If the parent pool is deleted, you cannot recover the mapping that existed between extents that are in the pool or the extents that the volumes use. If the parent pool has associated child pools, then you must delete the child pools first and return its extents to the parent pool. After the child pools are deleted, you can delete the parent pool. The MDisks that were in the parent pool are returned to unmanaged mode and can be added to other parent pools. Because the deletion of a parent pool can cause a loss of data, you must force the deletion if volumes are associated with it.
  • If the volume is mirrored and the synchronized copies of the volume are all in one pool, the mirrored volume is destroyed when the storage pool is deleted. If the volume is mirrored and there is a synchronized copy in another pool, the volume remains after the pool is deleted.

Child Pools

Child pools are created within parent pools. When a child pool is created without a quota, the child pool can access the entire usable capacity of the parent pool without limit. The usable capacity of the child pool and the usable capacity of the parent pool are reported as the same. Volumes created in the child pool reduce the usable capacity of both the parent pool and the child pool. Both standard child pools and data reduction child pools can be created without a quota

A standard child pool can be created with a quota by specifying its 'size'. When a child pool is created with a quota, the usable capacity for the child pool is reserved from the usable capacity of the parent pool. The usable capacity that is reserved for the child pool is no longer reported as usable capacity of the parent pool. Volumes created in the child pool reduce the usable capacity that is available to the child pool only. Data reduction child pools cannot be created with a quota.

When you create or work with a child pool, consider the following general guidelines:
  • You can create and manage child pools in the management GUI. Child pools that are used as Safeguarded backup locations are marked with a shield icon.
  • As with parent pools, you can specify a warning threshold that alerts you when the used capacity of the child pool is reaching its upper limit. Use this threshold to ensure that access is not lost when the used capacity of the child pool is close to its usable capacity.
  • You cannot shrink the usable capacity of a child pool below its used capacity. The system also resets the warning level when the child pool is shrunk and issues a warning if the level is reached when the usable capacity is shrunk.
  • On systems with encryption enabled, you can create the standard child pools to migrate existing volumes in a non-encrypted pool to encrypted child pools only when you virtualize external storage. When you create a standard child pool after encryption is enabled, an encryption key is created for the child pool even when the parent pool is not encrypted. You can then use volume mirroring to migrate the volumes from the non-encrypted parent pool to the encrypted child pool. Encrypted data reduction child pools can be created only if the parent pool is encrypted. The data reduction child pool inherits an encryption key from the parent pool.
  • The system supports migrating a copy of volumes between child pools within the same parent pool or migrating a copy of a volume between a child pool and its parent pool. Migrations between a source and target child pool with different parent pools are not supported. However, you can migrate a copy of the volume from the source child pool to its parent pool. The volume copy can then be migrated from the parent pool to the parent pool of the target child pool. Finally, the volume copy can be migrated from the target parent pool to the target child pool.

Child pools can also be assigned to an ownership group. An ownership group defines a subset of users and objects within the system.

Ownership can be defined explicitly or it can be inherited from the user, user group, or from other parent resources, depending on the type of resource. Ownership of child pools must be assigned explicitly, and they do not inherit ownership from other parent resources. New or existing volumes that are defined in the child pool inherit the ownership group that is assigned for the child pool.

Child pools can be created for various use cases, such as managing virtual volumes (VVols) or with Safeguarded Copy function.

With the Safeguarded Copy function, child pools provide a Safeguarded backup location for a group of volumes that are associated with the parent pool. The Safeguarded backup location can contain many snapshots of volume data, each created at a specific interval and with a defined retention period to satisfy your recovery point objective. After the Safeguarded backup location is created, you need to create a volume group and assign a Safeguarded backup policy to the volume group. For more information, see Creating Safeguarded backup locations.

Data Reduction Pools

To use data reduction technologies on the system, you need to create a data reduction pool, create volumes with the data reduction pool, and map these volumes to hosts that support SCSI unmap commands.

Data reduction is a set of techniques that can be used to reduce the amount of usable capacity that is required to store data. An example of data reduction includes data deduplication. Data reduction can increase storage efficiency and performance and reduce storage costs, especially for flash storage. Data reduction reduces the amount of data that is stored on external storage systems and internal drives by reclaiming previously used capacity that are no longer needed by host systems. To estimate potential capacity savings that data reduction can provide on the system, use the Data Reduction Estimation Tool (DRET). This tool analyzes existing user workloads that are being migrated to a new system. The tool scans target workloads on all attached storage arrays, consolidates these results, and generates an estimate of potential data reduction savings for the entire system.

For more information about DRET, see https://www.ibm.com/support/pages/node/6217841. For more information about Comprestimator, see https://www.ibm.com/support/pages/node/6209688.

The system supports data reduction pools which can use different capacity savings methods simultaneously, increasing the capacity savings across the entire pool. Data reduction pools also support deduplication. When deduplication is specified for a volume, duplicate versions of data are eliminated and not written to storage, thus saving more usable capacity. Some models or software versions require specific hardware or software to use this function.

Support for the host SCSI unmap command is enabled by default.

Verify whether the storage system supports data reduction technologies, like data deduplication. If you use storage systems that support data reduction technologies, you can also configure data reduction on the storage systems. The storage system can reclaim that freed storage and reorganize the data on other volumes to more efficiently use the capacity. For standard-provisioned volumes, the system fully controls storage on these storage systems. When a volume is deleted, capacity is freed on the system and can be reallocated; the storage system is not aware of this freed space. However, if the storage system uses compression, thin-provisioning, or deduplication, the storage system controls the use of the usable capacity. In this configuration, when capacity is freed, the system notifies the storage system that capacity is no longer needed. The storage system can then reuse that capacity or free it as reclaimable capacity. The system also supports reclaimable capacity from certain internal drives, such as the 15 TB tier 1 flash drives, which can improve performance on these types of drives.

When you create a data reduction pool, ensure that the usable capacity of the pool includes overhead capacity. Overhead capacity is an amount of usable capacity that contains the metadata for tracking unmap and reclaim operations within the pool. A general guideline is to ensure that the provisioned capacity with the data reduction pool does not exceed 85% of the total usable capacity of the data reduction pool. Table 1 includes the minimum data reduction pool capacity that is required to be able to create a volume within the pool.
Table 1. Minimum overhead capacity requirements for data reduction pools
Extent size (in gigabytes) Overhead capacity requirements (in terabytes)1
1 GB or smaller 1.1 TB
2 GB 2.1 TB
4 GB 4.2 TB
8 GB 8.5 TB
1Standard-provisioned volumes are not included into the minimum overhead capacity values. When you are planning usable capacity for data reduction pools, determine the usable capacity that is needed for any standard-provisioned volumes first, then ensure that the minimum usable capacity values for the data reduction pools are included.

Pool states

This table describes the operational states of a pool. Child pools adopt the state of the parent pool. States that indicate an error must be resolved on the parent pool.
Table 2. Pool states
State Description
Online The pool is online and available. All the MDisks in the pool are available.
Degraded paths This state indicates that one or more nodes in the system cannot access all the MDisks in the pool. A degraded path state is most likely the result of incorrect configuration of either the storage system or the Fibre Channel fabric. However, hardware failures in the storage system, Fibre Channel fabric, or node might also be a contributing factor to this state. To recover from this state, follow these steps:
  1. Verify that the fabric configuration rules for storage systems are correct.
  2. Ensure that you configured the storage system properly.
  3. Correct any errors in the event log.
Degraded ports This state indicates that one or more 1220 errors were logged against the MDisks in the pool. The 1220 error indicates that the remote Fibre Channel port was excluded from the MDisk. This error might cause reduced performance on the storage system and usually indicates a hardware problem with the storage system. To fix this problem, you must resolve any hardware problems on the storage system and fix the 1220 errors in the event log. To resolve these errors in the log, click Monitor > Events in the management GUI. This action displays a list of unfixed errors that are currently in the event log. For these unfixed errors, select the error name to begin a guided maintenance procedure to resolve them. Errors are listed in descending order with the highest priority error listed first. Resolve highest priority errors first.
Offline The pool is offline and unavailable. No nodes in the system can access the MDisks. The most likely cause is that one or more MDisks are offline or excluded.
Attention: If a single MDisk in a pool is offline and cannot be seen by any of the online nodes in the system, the pool of which this MDisk is a member goes offline. This causes all of the volume copies that are being presented by this pool to go offline. Take care when you create pools to ensure an optimal configuration.

Easy Tier

The system supports IBM® Easy Tier®, a function that responds to the presence of any combination of the drive types within the same pool. The system automatically and nondisruptively moves frequently accessed data on MDisks that use lower-performing drives to MDisks that use flash drives, thus placing such data in a faster tier of storage.

Easy Tier eliminates manual intervention when you assign highly active data on volumes to faster responding storage. In this dynamically tiered environment, data movement is seamless to the host application regardless of the storage tier in which the data belongs. However, you can manually change the default behavior. For example, you can turn off Easy Tier on pools that have any combination of the four types of MDisks.

For more information, see Easy Tier.

A provisioning policy defines a set of rules for allocating capacity from a pool. For more information, see Provisioning policy.