摘要:
Two data centers located in the vicinity are connected using a synchronous transfer copy function, and one of the data centers is coupled with a third data center disposed at a remote location by an asynchronous remote copying function. The order whereat a storage sub-system located in the vicinity has received data from a host is consistently guaranteed, and the third data center holds the data. Further, each storage sub-system includes a function whereby, during normal operation, data can be exchanged and the data update state can be obtained by the storage sub-systems located in the two data centers that do not directly engage in data transmission.
摘要:
Two data centers located in the vicinity are connected using a synchronous transfer copy function, and one of the data centers is coupled with a third data center disposed at a remote location by an asynchronous remote copying function. The order whereat a storage sub-system located in the vicinity has received data from a host is consistently guaranteed, and the third data center holds the data. Further, each storage sub-system includes a function whereby, during normal operation, data can be exchanged and the data update state can be obtained by the storage sub-systems located in the two data centers that do not directly engage in data transmission.
摘要:
Two data centers located in the vicinity are connected using a synchronous transfer copy function, and one of the data centers is coupled with a third data center disposed at a remote location by an asynchronous remote copying function. The order whereat a storage sub-system located in the vicinity has received data from a host is consistently guaranteed, and the third data center holds the data. Further, each storage sub-system includes a function whereby, during normal operation, data can be exchanged and the data update state can be obtained by the storage sub-systems located in the two data centers that do not directly engage in data transmission.
摘要:
When an active data copy process relative to a logical storage device is performed without involving a computer, an access permission/rejection of the computer to the logical storage device is checked by referring to a correspondence between WWN of the computer and a logical storage device identifier LUN to thereby determine whether an access to a copy source logical storage device and a copy destination logical storage device is permitted or not. It is therefore possible to prevent an outflow of illegal data from a storage subsystem to be caused by an active copy instruction command.
摘要:
When an active data copy process relative to a logical storage device is performed without involving a computer, an access permission/rejection of the computer to the logical storage device is checked by referring to a correspondence between WWN of the computer and a logical storage device identifier LUN to thereby determine whether an access to a copy source logical storage device and a copy destination logical storage device is permitted or not. It is therefore possible to prevent an outflow of illegal data from a storage subsystem to be caused by an active copy instruction command.
摘要:
When an active data copy process relative to a logical storage device is performed without involving a computer, an access permission/rejection of the computer to the logical storage device is checked by referring to a correspondence between WWN of the computer and a logical storage device identifier LUN to thereby determine whether an access to a copy source logical storage device and a copy destination logical storage device is permitted or not. It is therefore possible to prevent an outflow of illegal data from a storage subsystem to be caused by an active copy instruction command.
摘要:
When migrating a virtual server between a plurality of physical servers, a pre-migration connection relationship between the virtual server and a storage area used by the virtual server is maintained after the migration of the virtual server by using a cooperative mechanism between a plurality of storage apparatuses even if the storage area used by the virtual server is migrated between the plurality of storage apparatuses. A computer system and virtual server migration control method for the computer system is described.
摘要:
A plurality of storage devices, provided in a storage system, comprise not less than two member storage devices, which are storage devices provided as members of a RAID group, and a spare storage device, which is not a member of the RAID group. A controller, provided in the storage system, uses the spare storage device to carry out the changing of the RAID level of the RAID group from a first RAID level to a second RAID level.
摘要:
A first storage control device is provided with a virtual LU for showing a logical volume possessed by a second storage control device as if it were its own volume. When data processing requested from a host device is, for example, a specific processing of large load (such as direct backup, logical volume copy, and so on), whether or not the requested processing can be executed by the second storage control device is judged. When it is executable, a command is transmitted to the second storage control device to make it take over the processing.
摘要:
A backup processing method for backing up data to be used by a data-processing computer system comprises selecting resources in a usable state from a plurality of resources necessary for the data to be used by the data-processing computer system, selecting switches in a usable state from a plurality of switches needed to form routes among said selected resources, and executing backup processing by using the secured resources and routes when the resources and routes necessary for backing up data to be used by the data processing computer system are secured to form multiple backup subsystems.