摘要:
A method to control access to logical volumes. The method provides a plurality of host computers and an information storage and retrieval system comprising a plurality of logical volumes. The method forms (N) host computer groups, assigns one or more of the host computers to the (i)th host computer group, such that each host computer assigned to (i)th host computer group is not assigned to any other of the (N) host computer groups. The method forms (N) logical volume groups, assigns one or more logical volumes to the (i)th logical volume group, such that each of the logical volumes assigned to the (i)th logical volume group is not assigned to any other of the (N) logical volume groups. The method maintains a database associating the (i)th host computer group with the (i)th logical volume group, and permits a host computer assigned to the (i)th host computer group to access a logical volume assigned to the (i)th logical volume group.
摘要:
A method, system, and computer program product for coordinating the configuration of local and remote storage subsystems for a local client is provided. A command sender is configured on a local storage subsystem to create remote command objects based on commands received from the local client, and deliver the remote command objects to a remote storage subsystem for execution. A command receiver is configured on the remote storage subsystem, the command receiver service having an interface to receive the remote command objects. A remote connection bucket is configured to manage at least one connection between the local storage subsystem and the remote storage subsystem.
摘要:
In one aspect of the present description, a systems manager based upon a common model of information protocol or standard includes automated storage area network (SAN) expansion management which permits additional provider modules to be automatically installed if needed in response to devices being added to the SAN. In addition, the automated SAN expansion management permits installed provider modules to be automatically configured in response to devices being added to the SAN. Still further, in another aspect, the automated SAN expansion management can automatically determine if a suitable host processor exists to host installation of a new provider module and if not, the automated SAN expansion management 20 can automatically deploy a suitable host processor such as a virtual server to host installation of a new provider module. Other features and aspects may be realized, depending upon the particular application.
摘要:
A method for singleton process control in a computer environment is provided. A process identification (PID) for a background process is stored in a first temporary file. The PID is stored by a parent process and subsequently accessed by the background process. The background process is exited if an active PID is determined to exist in a second, global temporary file. The PID from the first temporary file is stored into the second, global temporary file. A singleton code block is then executed.
摘要:
An apparatus, system, and method are disclosed for visual log analysis. The apparatus for visual log analysis is provided with a plurality of modules configured to functionally execute the necessary steps of retrieving log entries from a plurality of devices on a network, parsing the log entries to determine an execution flow of commands executed of the network, and displaying a graphical representation of such execution on the network. These modules in the described embodiments include a log consolidation module, a parsing module, and a display module.
摘要:
A method for executing a software routine identified in a task object is provided. The method includes accessing a list of software routine identifiers associated with software routines that are executable on a computer server. The method further includes generating a task object generation command having at least a first software routine identifier, parameter data, and link task information and generating a second task object in response to the task object generation command. The second task object includes the first software routine identifier, the parameter data, and the link task information. The method further includes adding the second task object to a task execution queue on the computer server and executing the first software routine identified by the first software routine identifier in the second task object on the computer server to obtain at least a first result value, when the first flag value is a first predetermined value and the result parameter associated with the first task object corresponds to a second predetermined value.
摘要:
A method to control access to logical volumes. The method provides a plurality of host computers and an information storage and retrieval system comprising a plurality of logical volumes. The method forms (N) host computer groups, assigns one or more of the host computers to the (i)th host computer group, such that each host computer assigned to (i)th host computer group is not assigned to any other of the (N) host computer groups. The method forms (N) logical volume groups, assigns one or more logical volumes to the (i)th logical volume group, such that each of the logical volumes assigned to the (i)th logical volume group is not assigned to any other of the (N) logical volume groups. The method maintains a database associating the (i)th host computer group with the (i)th logical volume group, and permits a host computer assigned to the (i)th host computer group to access a logical volume assigned to the (i)th logical volume group.
摘要:
A method to configure a storage library, comprising the steps of establishing a logical configuration for said storage library comprising a plurality of physical objects, by configuring a plurality of logical objects using a plurality of logical configuration commands, and adding that plurality of logical objects to the logical configuration. The method further adds the plurality of logical configuration commands to a Configuration Library, and saves that Configuration Library for later use.
摘要:
An apparatus for predicting a command in a command line interface includes a template command module, a parameter derivation module, and a parameter substitution module. The template command module is configured to determine a template command based on a command line history. The template command includes a command name and a parameter and the command line history includes two or more previously entered commands. The parameter derivation module is configured to determine a parameter derivation rule for deriving the parameter in the template command based on the command line history. The parameter substitution module is configured to substitute a substitute parameter for the parameter of the template command according to the parameter derivation rule.
摘要:
Methods, computer systems, and physical computer storage medium for organizing data are provided. A method includes monitoring usage of the data, detecting a pattern in the usage of the data, and assigning a first concrete implementation associated with a first data structure to the data, based, in part, on the detected pattern of usage of the data. The method also includes identifying a change in the pattern of usage of the data, after the step of assigning and switching the first concrete implementation associated with the first data structure to a second concrete implementation, based, in part, on the change in the pattern of usage.