摘要:
A method, apparatus and computer program for implementing a storage management system for limiting management operation of a storage network element by determining whether the storage network element is related to a host computer and determining whether the management operation is restricted based on the host computer and the time at which the management operation is to be conducted. The invention is set forth in a system including a network, a plurality of storage network elements connected to the network, and the storage management system, connected to the network, for controlling storage management operation of the storage network elements in response to operation requests from users of the storage management system. Each of the storage network elements is related to at least one of a plurality of host computers and information of these relations is used to determine whether a management operation can be conducted on the storage network element.
摘要:
A storage system comprises a plurality of processors, a plurality of volumes, and interconnecting means to connect the plurality of processors and the plurality of volume to each other. The storage system detects and determines the cause of the performance bottleneck, wherein the cause may be one of plurality of reasons. The storage system applies an appropriate load balancing method according to the determined cause of the performance bottleneck.
摘要:
A volume provider unit in a computer system detects a logical block address of a read or write I/O accessing a logical volume of a storage device from a host. According to the logical block address fetched, a storage domain of the logical volume is dynamically expanded. Moreover, the storage domain of the logical volume is reduced or expanded according to an instruction of a logical volume capacity reduction or expansion from a host commander part to a volume server.
摘要:
A standard physical medium 1320 as loaded into library unit 1080 even in the absence of any load request from a host computer 1020 is regarded as a spare physical medium 1330 for use when the standard physical medium 1320 is under malfunction, and such medium is put in a spare media storage space 1340 while eliminating issuance of any notice to the host computer 1020. Whereby, in a computer system with redundancy configuration, it becomes possible to prevent the host computer from making use of any spare physical media.
摘要:
There is a journal area and one or more logical volumes comprising a first logical volume. The journal area is a storage area in which is stored a journal data element, which is a data element that is stored in any storage area of a plurality of storage areas configuring a logical volume, or a data element that is written to the storage area. A controller has a size receiver that receives a write unit size, which is the size of a write data element received from a computer, and a size setting unit that sets the received write unit size in a memory for one or more logical volumes. The size of a journal data element stored in a journal area based on the set write unit size is the write unit size.
摘要:
The storage system provides a logical volume and includes a plurality of disk devices and a controller, coupled to the plurality of disk devices, which manages a plurality of storage areas provided by the plurality of disk devices. The host includes an application which sends data to a logical volume and an operating system which manages a block position of the logical volume. If the operating system receives a request from the application to expand a first capacity of the logical volume, the operating system sends a write request to the logical volume. In response to the write request, the controller allocates at least one of the plurality of storage areas to the logical volume. The controller monitors a second capacity of storage areas allocated to the logical volume relative to a third capacity of the plurality of storage areas.
摘要:
Proposed is an apparatus and method of preventing the leakage of information from an external storage apparatus even when such external storage apparatus is stolen or accessed from an unauthorized host computer. This external storage apparatus accessible from a host computer or another external storage apparatus via a network encrypts or decrypts data written from a host computer to be stored in the storage area, sends a request for existence confirmation to the host computer or the other external storage apparatus every predetermined period of time, and zeroizes an encryption key to be used in the encryption calculation for encrypting or decrypting data to be performed by the encryption calculation unit based on the result of a response from the host computer or the other external storage apparatus in reply to the request.
摘要:
A system and method for object-level snapshot creation in an object-based storage system. The host device includes a first object management table (OMT) and a file system. The object-based storage system is connected to the host device and includes a controller and object-based storage devices (OSD). The controller includes a snapshot module, a second OMT. The snapshot module receives and processes OSD and other commands from the file system or a service processor, creates an original object and a mirror object in an OSD, and initiates a snapshot operation in an OSD. The first OMT may also reside at a metadata server. A snapshot operation may be a mirror operation or a copy on write operation. The first OMT and the second OMT maintain mapping information of a file identifier, a partition ID, and an object ID, and an object status and a generation number of snapshots.
摘要:
Techniques to assure genuineness of data stored on a storage device are provided. The storage device includes a storage controller that conducts I/O operations and management operations. A description of management operations and corresponding timestamps are recorded to an operation log stored in a memory. The memory additionally stores an attribute for each storage volume of the storage device. Write access to each of the storage volumes is dependent on the attribute.
摘要:
A method for write protection in a storage system using both the “file-level WORM function” and the “block-level WORM function”. The block-level WORM function has two modes: the first mode is to prohibit both file access and block access, and the second mode is to prohibit block access only. When a user uses the file-level WORM function to prohibit write access to a file in a volume, a file access invokes the first mode of the block-level WORM function to prohibit write access to the volume where the write prohibited file resides.