摘要:
This invention provides, when optimizing a configuration of a storage system using a pool, an optimal configuration while ensuring a policy set by an administrator, the policy concerning a power saving performance, a response performance, or the like. The management computer sets, according to the set policy, priorities to volumes held by a storage subsystem, and reserves volumes satisfying the capacity of the pool, in descending order of the priority. Only some of the reserved volumes are registered for the pool in descending order of the priority. At this time, it can be guaranteed that a host computer makes no access to the volumes which have not been registered for the pool, and therefore the sleep state is set to physical drives forming the volumes or to a controller controlling the physical drives.
摘要:
The respective data fragments stored in each page assigned to the respective virtual areas of the virtual volume are copied to the logical volume, and information representing the respective copy source pages corresponding with information representing the respective virtual areas in the mapping information that indicates which storage area corresponds with which virtual area is updated to information representing the respective copy destination storage areas of the data fragments stored in the respective copy source pages and copies the updated mapping information to the logical volume which constitutes the data fragment copy destination.
摘要:
A computer includes a management computer connected to a host computer, first and second primary storage systems, first and second secondary storage systems, a primary external storage system connected to the first and second primary storage systems and a secondary external storage system connected to the first and second secondary storage systems. The management computer controls to start copying as processing for storing copied data in the second storage area into a fourth storage area in response to a command for starting processing for storing copied data in the first storage area into a third storage area.
摘要:
A computer system including a first storage system connected to a first host computer, a second storage system connected to a second host computer and a third storage system connected to the first and second storage systems. The second storage system sets transfer setting before an occurrence of a failure, the transfer setting being provided with a dedicated storage area to be used for transferring data to the third storage system by asynchronous copy in response to a failure at the first host computer. Before the start of data transfer between the second storage system and third storage system to be executed after an occurrence of the failure, the second storage system checks the dedicated storage area, data transfer line and transfer setting information, and if an abnormal state is detected, this abnormal state is reported to the host computer as information attached to the transfer setting.
摘要:
A computing system and an exclusive access control method are provided for preventing degraded performance of a network caused by exclusive access control, and for permitting a computer to exclusively access a storage area irrespective of whether a storage has an exclusive access control function. In the computing system in which a plurality of computers and an external storage device storing shared data are connected through a relay, exclusive access control is executed by a device other than the storage. Specifically, the relay having a virtualizing function is instructed to execute exclusive access control. The relay has information indicating whether a storage area on the storage is an exclusive access area, so that the relay determines based on this information whether an access request received from a computer requests an access to an exclusive access area, and executes exclusive access control when it is an access request.
摘要:
Provided is a computer system management method capable of preventing a loop of pairs from being formed upon remote copy pair formation. The method of controlling formation of a remote copy pair of logical volumes in a computer system including a plurality of logical volumes includes: receiving a request to form a remote copy pair; judging whether or not a loop of remote copy pairs will be formed by executing the requested remote copy pair formation; and executing the requested remote copy pair formation when it is judged that no loop of copy pairs will be formed.
摘要:
Provided is a computer system capable of maintaining consistency of data stored in logical volumes. The computer system includes: a storage system including a disk controller which controls data read/write in a disk drive; and a host computer which transmits a request to the storage system, wherein the disk controller has a control unit and a storage unit, the disk drive has logical volumes which are data storing areas, the host computer sends a request directed to the logical volume and attribute information of the logical volume, the control unit wherein: executes the received request; the control unit stores, in the storage unit, the received attribute information in association with the logical volume; and decides to execute a following request which is made by the host computer to the logical volume in a case where the request meets the attribute information corresponding to the logical volume and is stored in the storage unit.
摘要:
In a computer system, to enable a second computer to take over control of copying of data within the computer system, from a first computer that normally controls copying of data. The second computer selects from a plurality of storage systems a storage system to be accessed in order to acquire sub system pair information, and acquires sub system pair information from the selected storage system. Based on the acquired sub system pair information, the second computer generates system pair information that includes copy pair information relating to a plurality of storage areas belonging to the plurality of storage systems. The second computer initially selects a storage system directly linked to the second computer, and subsequently sequentially selects a storage system based on the acquired sub system pair information.
摘要:
Transfer of data and replication of data among several storage devices are executed without imposing a load on the computer connected to the storage system. For example, a first host computer monitors usage rates of transfer groups TG11, TG12 and physical path usage rate on a storage device interconnect physical path 50, and when either a usage rate or physical path usage rate goes above a predetermined value, issues to the first storage device 20 an instruction to allocate a reserved volume R11, R12. The first host adaptor 21 receiving the reserved volume R11, R12 allocation request allocates reserved volume R11 to transfer group TG1, whereby a virtual transfer volume is formed by transfer volume T11 and the reserved volume R11 allocated thereto. As a result, capacity of the virtual transfer volume is increased by the equivalent of the reserved volume R11 capacity, so that additional transfer frames may be stored.
摘要:
To provide a computer system capable of detecting a failure at an early stage while keeping down an increase in I/O load due to failure monitoring. The computer system includes plural storage systems connected in stages between a first computer and a second computer. The first computer sends control I/O to the storage systems. The second computer monitors control I/O transferred through the storage systems; and when there is control I/O that has not been transferred successfully, requests state information of the storage systems to transfer the control I/O.