Assigning an access attribute to a volume
If you want to protect volumes against both read and write operations from hosts, change the
access attribute to protect. To protect volumes against write operations from hosts and allow read
operations, change the access attribute to read-only. In both ways, if you set the attribute to a
volume using the GUI, S-VOL Disable is automatically set to prevent data in a volume from being
overwritten by replication software. If you use RAID Manager to set the attribute to a volume, you
can select whether the S-VOL Disable is set or not. If you set the Protect attribute to the volume
when the Thin Provisioning pool is full, the S-VOL Disable is not set to the volume.
After you change an access attribute to read-only or protect, the access attribute cannot be changed
to read/write for a certain period of time. You can specify the length of this period (called Retention
Term) when changing the access attribute to read-only or protect. The retention term can be extended
but cannot be shortened.
During the retention term
•
Read-only access can be changed to protect or protect can be changed to read-only.
•
If you need to change an access attribute to read/write, you must ask the maintenance
personnel to do so.
After the retention term is over
•
The access attribute can be changed to read/write.
•
The access attribute remains read-only or protect until changed back to read/write.
Changing an access attribute to read-only or protect
When changing an access attribute to read-only or protect, observe the following:
•
Remote Web Console secondary windows must be defined for use in advance. Select
Modify
from the
Data Retention
secondary window to set access attributes and prevent other users or
programs from changing storage system settings. When you close the secondary window,
Modify
mode is released. For more information on Remote Web Console secondary windows
and
Modify
mode, see the HP XP7 Remote Web Console User Guide.
•
Do not assign an access attribute to a volume if any job is manipulating data on the volume.
If you assign an access attribute to such a volume, the job will possibly end abnormally.
•
The emulation type of the volume must be one of the following:
OPEN-3, OPEN-8, OPEN-9, OPEN-E, OPEN-K, OPEN-L, OPEN-V
•
The volume must not be one of the following:
Volumes that do not exist
◦
◦
Volumes that are configured as command devices
◦
Continuous Access Synchronous secondary volumes (*)
◦
Continuous Access Journal secondary volumes (*) or journal volumes
◦
Business Copy secondary volumes (*)
◦
Fast Snap secondary volumes (*)
◦
Pool volume
◦
Fast Snap virtual volume
*Note: The access attribute of secondary volumes may be changed depending on the pair
status.
Assigning an access attribute to a volume
161