摘要:
A system for injecting I/O faults into a closed system, for example, the injection of link level I/O faults, involves the use of a simulated computing environment. In an embodiment, the system provides for fault injection using an emulated IBM System z environment and including the use of FICON and/or other suitable communication channel protocols. The emulated System z environment may include a simulated z/OS and/or emulated System z hardware and software components.
摘要:
Described are techniques for providing access to storage devices. An I/O request directed to a storage device is sent over a network connection from a first computer system to a second computer system. The second computer system includes a simulated computing environment simulating aspects of the first computer system. The I/O request is received at the second computer system. The data storage system is connected to the second computer system over a first connection operating in accordance with a first protocol thereby providing the second computer system access to the storage device of the data storage system. The simulated computing environment of the second computer system may, for example, include emulation capabilities in accordance with the first protocol thereby allowing the second computer system to issue the first I/O request to the first storage device on behalf of the first computer system.
摘要:
A method and apparatus for migrating one or more data sets each having one or more extents from one or more source logical devices to one or more target logical devices concurrently with interaction between the application and the data being migrated. A background operation copies each extent from the source logical device to the target logical device in a copy state. When a certain level of data has been copied, the extent is locked to assure synchronization of the data in the target logical device to the corresponding data in the source logical device. The status is changed to a mirrored state. When the extents for a data set in a source logical device or in a group of data sets have been mirrored, all the extents are changed to a diverted state. I/O requests to the diverted extents thereafter are intercepted and processed according to whether they access an extent that is in the copy, mirrored, or diverted state.
摘要:
Determining when to migrate a data set includes providing performance criteria for the data set, measuring performance of the data set to provide a measured performance of the data set, and, if the measured performance indicates that the data set is not performing according to the performance criteria, choosing a new location for migrating the data set and migrating the data set to the new location. Migrating the data set may include moving the data set to a new location irrespective of whether other applications are accessing the data set. Choosing a new location may include analyzing each of a plurality of locations to determine if a projected performance thereof is according to the performance criteria. Determining when to migrate a data set may include adjusting the performance criteria after the data set has been made operational.
摘要:
Transferring storage device functionality includes providing a device coupled to the storage device, where the device is separate from the storage device, having the device handle I/O requests between an application and the storage device, and, in response to the application issuing an I/O request, having the device determine if the request corresponds to functionality being transferred and, if so, having the device provide the functionality. The device may be a host computer. The application may run on the host computer. A driver on the host computer may provide the functionality. The functionality may include read only functionality, data compression, data encryption, mirroring, and/or status reporting.
摘要:
Maintaining continuous availability of tape data includes providing a first storage space that contains the tape data, where metadata for the tape data points to the first storage space, creating a data mirroring relationship between the first storage space and a second, separate, storage space, where tape data written to the first storage space is copied to the second storage space, and adjusting the metadata for the tape data to reference the second storage space in response to the first storage space becoming inaccessible. Maintaining continuous availability of tape data may also include suspending access to the tape data prior to adjusting the metadata. Maintaining continuous availability of tape data may also include resuming access to the tape data after adjusting the metadata.
摘要:
Described are techniques used in defining and maintaining group data used by multiple host systems. Group data is stored in a distributed fashion on one or more data storage systems. If a device of a data storage system belongs to a group, group data for that group is stored on that data storage system. Group data changes made by one host are communicated to the other hosts by accessing a common data area on each data storage system using a daemon executing on each host. Remotely mirrored groups may be defined on a remote data storage system. A remote mirror of a group includes group data modified in accordance with a point of view of the remote data storage system and a remote host.
摘要:
Handling data includes providing a first storage area of a first type that contains sections of data, providing a second storage area of the first type that contains sections of data, providing a third storage area of a second type where the second type has, for each section thereof, a pointer to one of: a corresponding section of data of the first storage area and a corresponding section of data of the second storage area, causing the third storage area to be not available for accessing, and after causing the third storage area to not be available for accessing, providing data from the second storage area corresponding to pointers of the third storage area that point to sections of the second storage area.
摘要:
Data is copied from a source storage device to a destination storage device in a differential mode. An extents track defines all tracks to be transferred during a first copying operation. Complementary track tables for source and destination storage devices establishing the totality of changes in data since a previous copying program to limit subsequent copying to data on changed tracks only.
摘要:
Managing data on a storage device includes intercepting unencrypted data to be stored on the storage device, where intercepting unencrypted data is transparent to an application storing the data on the storage device and encrypting the data prior to storage on the storage device. The storage device may include a tape drive and/or a disk drive. Managing data on a storage device may also include migrating data from a first storage location to a second storage location. The first storage location may be the same as the second storage location or the first storage location may be different from the second storage location. The unencrypted data may be intercepted during migration. Managing data on a storage device may also include decrypting data read from the storage device.