摘要:
Provided are techniques for determining whether content of an object has changed. Under control of a backup system, opaque object attributes and a data identifier are received, wherein the data identifier is generated based on one or more relevant object attributes of the opaque object attributes that indicate whether at least one of the content of the object and one or more of the relevant object attributes has changed. The received data identifier is compared with a previously stored data identifier. In response to determining that the received data identifier and the previously stored data identifier do not match, it is determined that the content of the object has changed.
摘要:
File system objects of unknown type are backed up and restored. A list of file system objects is received from a file system. The file system objects are to be backed up. For each file system object that has a file type that is unknown, the following is performed. First, the file system is queried to obtain information regarding the file system object that is sufficient for the file system to later recreate the file system object if necessary. Second, the file system object and the information regarding the file system object are stored. Examples of file system object types of the file system that may be unknown to an application running on a Microsoft Windows® operating system include symbolic links, named pipes, and special device files.
摘要:
Techniques are provided for processing an Input/Output (I/O) request. At least one data block is allocated for use in completing the I/O request. A current operations record is stored for the I/O request. It is determined whether the I/0 request has been completed within a specified period of time. In response to determining that the I/O request has not been completed within the specified period of time, the allocated at least one data block is fenced. Also provided are techniques for processing an Input/Output (I/O) request in which an identification message is received from a client computer. It is determined whether the client computer is a rogue client based on whether a current operations record exists for the client computer.
摘要:
Techniques are provided for processing an Input/Output (I/O) request. At least one data block is allocated for use in completing the I/O request. A current operations record is stored for the I/O request. It is determined whether the I/O request has been completed within a specified period of time. In response to determining that the I/O request has not been completed within the specified period of time, the allocated at least one data block is fenced.
摘要:
Techniques are provided for processing an Input/Output (I/O) request in which an identification message is received from a client computer. It is determined whether the client computer is a rogue client based on whether a current operations record exists for the client computer.
摘要:
A method and system for managing availability of a dependent thread to service a nested request is provided. A plurality of reply threads are maintained in a single thread pool. In addition, a counter is provided to track availability of a reply thread from the thread pool. A service thread that requires at least one reply thread to complete execution of a request must check the counter to determine availability of the reply thread prior to execution of the request. The process of determining availability of a reply thread prior to execution of a service thread request avoids initiating execution of a request that cannot be completed in a timely manner, or at all.
摘要:
A method and system for conducting an integrity check of system and user metadata when the metadata is mounted. A filesystem reviewer is embedded within software of a server node. A mutual exclusion lock is obtained on the selected metadata. An automated verification of the locked metadata is conducted while the filesystem is mounted. In addition, an automated salvage of the locked metadata may be conducted while the filesystem is mounted. The verification and/or salvage of the locked metadata can be applied to system, user, and/or a portion of the user metadata.
摘要:
A technique for implementing policy-aware backup and restore capability in a tiered storage system. If a data set's contents are backed up from the tiered storage system to a backup storage system, metadata for the data set may also be backed up. Prior to the data set being restored from the backup storage system to the tiered storage system, the backed up metadata is restored and processed to determine a tier among the tiered storage pools to which the data set will be restored.
摘要:
Provided are a method, system, and program maintaining information on a namespace comprised of filesets shared by clients over a network. Zone information is maintained on at least one zone, wherein each zone associates at least one client system, at least one fileset, and at least one storage pool. For one zone, the associated at least one fileset and at least one storage pool are accessible to the at least one client system. Clients are provided information on filesets included in a namespace, wherein each of a plurality of clients receive information on the at least one fileset associated with the client in the at least one zone including the client.
摘要:
A method, apparatus and program storage device for providing real-time file system charge-back accounting with real time historical minimum and maximum usage per user or group during a report cycle. In a first storage area of file system memory, space allocation data for a current accounting period is monitored and persistently maintained. A minimum, maximum and average space allocation is calculated for the management object during the current accounting period. The calculated minimum, maximum and average space allocation for the management object may be moved to a second storage area of the file system memory while beginning to monitor and persistently maintain space allocation data of the management object in the first storage area of the file system memory during a subsequent accounting period.