摘要:
Described is a technique for gathering information about a property. A request is received at a first node of a plurality of nodes. The request requests information in accordance with the property for a set of one or more objects defined in a portion of the plurality of nodes. The first node determines information about said property for objects of said set which are defined at said first node. Each of the other nodes determines information about said property for objects of said set which are defined at said each node. Information is communicated to the first node from the other nodes about said property for objects of said set which are defined at each of said other nodes. The first node performs processing to produce final information representing information received from said other nodes and information determined by said first node regarding said property.
摘要:
Described is a technique for providing a host identifier for a host. A first portion associated with a characteristic of said host is received. A second portion including a non-deterministic component is received. The host identifier is formed using the first portion and the second portion. The host identifier is used to uniquely identify the host in a storage area network.
摘要:
Described are techniques for providing a host identifier for a host. A first portion including a first identifier associated with a system for the host is received. A second portion including a second identifier generated in accordance with a hardware property of the host is received. The host identifier is formed using the first and second portions. The host identifier is used to uniquely identify the host in a storage area network.
摘要:
A method is used in mapping data storage and virtual machines. A logical volume from a data storage system is provided for use by a hypervisor. The hypervisor is queried through a web service to identify a virtual machine of the hypervisor. It is determined that the virtual machine is using the logical volume.
摘要:
A method is used in controlling multi-step storage management operations. From a specification of a desired configuration of a data storage system, a description of a multi-step transaction for producing the desired configuration is derived. The description includes directions for reacting to results of an intermediate step within the multi-step transaction. Management operations are invoked based on the description.
摘要:
There is disclosed a system, method, apparatus and computer program product for managing a storage system including a SAN within a computer network. The storage system can be managed in object-oriented computer language. Object trees of each component in the storage system or SAN are obtained and combined on each storage processor in the storage system. The user interface (UI) can therefore select one storage processor within the storage system, and request such combined object tree information for the entire storage system or SAN from only that singular storage processor on which such combined information is stored. This eliminates a severe computational drain on the UI, which otherwise would be required to make these object tree combinations, and further allows a single point of storage management contact between UI and storage system or SAN by way of that singular storage or portal processor. Commands from the UI destined for any node within the storage system or SAN are thus always addressed to that same single point of contact or portal processor allowing for ease of use and other advantages.
摘要:
There is disclosed a system, method, apparatus and computer program product for managing a storage system including a SAN within a computer network. The storage system can be managed in object-oriented computer language. Object trees of each component in the storage system or SAN are obtained and combined on each storage processor in the storage system. The user interface (UI) can therefore select one storage processor within the storage system, and request such combined object tree information for the entire storage system or SAN from only that singular storage processor on which such combined information is stored. This eliminates a severe computational drain on the UI, which otherwise would be required to make these object tree combinations, and further allows a single point of storage management contact between UI and storage system or SAN by way of that singular storage or portal processor. Commands from the UI destined for any node within the storage system or SAN are thus always addressed to that same single point of contact or portal processor allowing for ease of use and other advantages.
摘要:
Described are techniques for configuring a target data store. Code written in a scripting language is provided. The scripting language includes environment blocks that retrieve data used in a subsequent block and execution blocks that execute an operation to configure said target data store. The retrieved data includes data from said target data store. The code is processed and includes retrieving data in accordance with environment blocks included in the code, and updating said target data store in accordance with execution blocks included in said code.
摘要:
A method is used in managing object deletion. Updated information about a system is repeatedly polled for. An information set is received identifying an object to be deleted from a system management model that is descriptive of the system. An iterative process is applied to determine other objects in the system management model that are unidentified in the information set and that are affected by deletion of the object. The object is deleted.
摘要:
A method for adding file based storage hardware to a block based storage system includes detecting, by the file based storage hardware, an electrical coupling between the file based storage hardware and the block based storage system, the block based storage system having a set of logical units (LUs) predefined as file based storage hardware specific LUs. The method includes forwarding, by the file based storage hardware, an initiator record to the block based storage system, the initiator record configured to control access by the file based storage hardware to data stored by the block based storage system and the initiator record having a file based storage hardware specific identifier. The method includes, following the block based storage system associating the initiator record having the file based storage hardware specific identifier with the predefined file based storage hardware specific LUs, establishing a communication path with the block based storage system.