Administering Volumes
Administer volumes on HPE Ezmeral Data Fabric.
HPE Ezmeral Data Fabric provides volumes as a way to organize data and manage fabric performance.
A volume is a logical storage unit that allows you to apply policies to a set of files, directories, and sub-volumes. You can use volumes to enforce disk usage limits, establish ownership and accountability, and measure the cost generated by different projects or departments. For example, you could create a volume for each user, department, or project.
A volume consumes storage space only when data is written to the volume.
Volume Types
Volumes can be of the following types.
- Standard volume: A initial or original volume that contains data.
- Mirror volume: A replica of a standard volume that replicates the data present on a standard volume.
Volume Data Backup
Following are the ways in which data on volumes can be backed up for restoration purpose.
- Creating mirrors or mirror volumes: Data in a volume is replicated when you create mirror volumes. A volume that is mirrored is called a standard volume. The mirrored version of a volume is called a mirror volume. You can create mirrors of mirror volumes to replicate the data present on mirror volumes. Such volumes are called cascading mirrors.
- Creating volume snapshots: The state of data in a volume is recorded at the
point-in-time of the volume snapshot creation. A snapshot is a read-only image of a volume
at a specific point in time. Snapshots are useful any time you need to be able to roll
back to a known good data set at a specific point in time. For example, before performing
a risky operation on a volume, you can create a snapshot to enable rollback capability for
the entire volume.
A snapshot takes no time to create, and initially uses no disk space, because it stores only the incremental changes needed to roll the volume back to the state at the time the snapshot was created. The storage used by a volume's snapshots does not count against the volume's quota.
Security policies can be applied to volumes to control access to the volume data. See Administering Security Policies for more information.