摘要:
A method, computer program product, and computing system for receiving an indication of a cold cache event within a storage system. The storage system includes a multi-tiered data array including at least a faster data tier and a slower data tier. A data list that identifies at least a portion of the data included within the faster data tier of the multi-tiered data array is obtained from the multi-tiered data array. At least a portion of the data identified within the data list is requested from the multi-tiered data array, thus defining the requested data. The requested data is received from the multi-tiered data array.
摘要:
Methods and apparatus for eliminating the need for a complete synchronization due to failure of a data protection appliance in a continuous data protection system having a replication splitter. In one embodiment, a continuous data protection system includes a source side having a source side storage array with a splitter and a data protection appliance, where processing includes initiating a source side splitter session, initializing a first I/O tracking mechanism for the splitter session, and activating the splitter to a source side processing active state to continuously push I/O data from the source side to the target side.
摘要:
Described are techniques for storage configuration. Defined are one or more initiator groups each including one or more initiator ports, one or more target groups each including one or more target ports, and one or more storage groups each including one or more devices. A masking view is created where the masking view includes a first of the initiator groups, a first of the target groups, and a first of the storage groups. The masking view indicates which devices of the first storage group are accessible using one or more paths. Each of the one or more paths is specified using an initiator port from the first initiator group and a target port from the first target group.
摘要:
Described are techniques for verifying host path detection. First information from a first data storage system is received indicating a first set of one or more hosts and, for each host in the first set, which one or more devices of a first device set of the first data storage system are accessible to said each host in the first set over one or more associated paths to the first data storage system. Second information and the first information are received at a second data storage system. First processing is performed at the second data system to determine whether each host included in the first information has successfully completed path detection with respect to a second device set for the second data storage system.
摘要:
Described are techniques for indicating a state associated with a device. A request is received over a path for information about a device. A response to the request is sent. The response indicates a state regarding the device on the path. The response has a response status of good and a payload of a varying size. The payload is truncated at a location prior to that at which a device identifier for the device is expected. In accordance with the response, a state regarding the device on the path is determined.
摘要:
Described are techniques for storage configuration. Defined are one or more initiator groups each including one or more initiator ports, one or more target groups each including one or more target ports, and one or more storage groups each including one or more devices. A masking view is created where the masking view includes a first of the initiator groups, a first of the target groups, and a first of the storage groups. The masking view indicates which devices of the first storage group are accessible using one or more paths. Each of the one or more paths is specified using an initiator port from the first initiator group and a target port from the first target group.
摘要:
Described is a distributed copying technique that may be used in migrating large amounts of data from one or more source devices to one or more destination devices. The data source is divided into partitions. As Fibre Channel adapters (FAs) become available, each of the FAs may copy a partition of the data. In connection with specifying paths used for the distributed copying technique, a preferred path selection (source port-target port mapping) may be made by executing code in a controlling data storage system to perform discovery processing. The preferred path selection is used for the duration of the distributed copying unless the preferred path is unable to transmit data. A target port of the preferred path may be randomly selected from all accessible target ports, and/or in accordance with a specified portion of the target ports. Preferred paths may also be specified using an API (application programming interface).
摘要:
A system and method for providing continuous availability of information that is normally transported via a network is provided. The system and method uses a process that is used with each computer in a system to simulate the functionality of a network interface card wherein upon the unavailability of the network, transmission packets containing a unique header are send by one application in the system through the process, which stores the transmission packets in queue, and upon filling of the queue writes filled queue to a send volume contained on a storage system. The storage system then copies the data to a second volume, which can be read by a second application. The first and second volumes can either be remotely dispersed or local to one another.
摘要:
A method and apparatus for enabling an on-line reconfiguration of striped data in a disk array storage device. A replicated copy of the striped logical device is made in parallel with host operations. A logical device with a new configuration is then substituted for access by the host application even before any data is transferred to locations within the newly configured logical device. Independent processes operating in this disk array storage device reconfigure the data transparently to any host operations while accommodating host I/O requests directed to locations in the new configuration.
摘要:
This invention is configured to create and use a special data structure containing a data storage device's identification information for a storage device that will be duplicated. Upon such duplication, the special data is stored in a predetermined location on another device receiving the copied data and a flag bit is set to indicate whether or not the information in the data structure should be used to respond to a host inquiry regarding the identification of the storage device. Without reconfiguring the host's operating software, the system employs a method to respond to and satisfy a host inquiry for the storage device's identification information by employing the special data structure. This is done to avoid host conflict errors that might result from a conflict between identification information being replicated from the storage device and the other storage device to where its data is copied.