摘要:
After a host creates a memory area in an external storage device, a setting is made such that the host can manage the memory area in the external storage device, so as to prevent an access to the storage device by another host to protect data therein. A second storage device creates a memory area therein, an iSNS server registers a lower DD between first and second storage devices, the first storage device makes a mapping-setting registration for names of a memory area for use and an external memory area, and the iSNS server registers an upper DD between the host and the first storage device, and the host mounts a memory area of the first storage device.
摘要:
After a host creates a memory area in an external storage device, a setting is made such that the host can manage the memory area in the external storage device, so as to prevent an access to the storage device by another host to protect data therein. A second storage device creates a memory area therein, an iSNS server registers a lower DD between first and second storage devices, the first storage device makes a mapping-setting registration for names of a memory area for use and an external memory area, and the iSNS server registers an upper DD between the host and the first storage device, and the host mounts a memory area of the first storage device.
摘要:
To provide a data copy capability of copying data between storage devices while maintaining the data integrity even if the copy process is interrupted in a hierarchical connection arrangement of storage devices. A computer system includes a computer 100 and a plurality of storage devices 140, 160 connected to the computer 100 via a network, in which one storage device 140 has a first storage area 151, allows the computer 100 to access a second storage area 170 in one or more other storage devices 160 via the storage device 140, allocates the first storage area for copy of data from the second storage area 170 and copies data from the second storage area 170 into a first storage area 150.
摘要:
Creating a plaintext index from a text that is extracted from a file presents the risk of a leak of confidential information from the created index. To address this problem, provided is a computer system which has a computer, a storage subsystem coupled to the computer, and a network coupling the computer and the storage subsystem. The computer has an interface coupled to the network, a first processor coupled to the interface, and a memory coupled to the first processor. The storage subsystem has a disk device which stores data. A storage area of the disk device is divided into a plurality of storage areas including, at least, a first storage area and a second storage area. The first processor reads a part of data stored in the first storage area, encrypts the part of data read from the first storage area when the data stored in the first storage area is judged as encrypted data, and writes the encrypted part of data in the second storage area.
摘要:
Creating a plaintext index from a text that is extracted from a file presents the risk of a leak of confidential information from the created index. To address this problem, provided is a computer system which has a computer, a storage subsystem coupled to the computer, and a network coupling the computer and the storage subsystem. The computer has an interface coupled to the network, a first processor coupled to the interface, and a memory coupled to the first processor. The storage subsystem has a disk device which stores data. A storage area of the disk device is divided into a plurality of storage areas including, at least, a first storage area and a second storage area. The first processor reads a part of data stored in the first storage area, encrypts the part of data read from the first storage area when the data stored in the first storage area is judged as encrypted data, and writes the encrypted part of data in the second storage area.
摘要:
The load of managing a storage system is lessened. In a storage system where multiple logical volumes are included in a logical volume group and a copy of the logical volume group is made in a pool area different from the one to which the logical volume group belongs, a management computer adds to the pool area capacity when the capacity of a pool area exceeds a predetermined threshold. When the pool area includes multiple logical volume groups, the management computer requests the storage system to create a pool area for each of the logical volume groups and to create the logical volume groups respectively for the created pool areas. When the pool area includes one logical volume group, the management computer requests the storage system to make the capacity of the pool area coincide with the capacity of a pool area to which the logical volume group is copied.
摘要:
To manage the configuration of a data archiving system without increasing the load on the data archiving system while keeping the performance of computers and the load on storage subsystems balanced, there is provided a computer system, including: a plurality of data archiving servers; a storage subsystem which provides storage extents to the plurality of data archiving servers; and a management computer. The management computer manages data archiving server performance management information, which holds information about performance of the plurality of data archiving servers, and storage utilization information, which holds information about load on the storage extents. The management computer changes the association between the data archiving storage extents and the storage extents based on a data archiving server performance management information and a storage utilization information.
摘要:
The load of managing a storage system is lessened. In a storage system where multiple logical volumes are included in a logical volume group and a copy of the logical volume group is made in a pool area different from the one to which the logical volume group belongs, a management computer adds to the pool area capacity when the capacity of a pool area exceeds a predetermined threshold. When the pool area includes multiple logical volume groups, the management computer requests the storage system to create a pool area for each of the logical volume groups and to create the logical volume groups respectively for the created pool areas. When the pool area includes one logical volume group, the management computer requests the storage system to make the capacity of the pool area coincide with the capacity of a pool area to which the logical volume group is copied.
摘要:
According to this invention, a computer system has a host computer, a first storage subsystem providing a first volume, a second storage subsystem providing a second volume for storing a copy of data stored in the first volume. The computer system stores copy configuration information including correspondence between the first volume and the second volume. The management computer transmits the data erasure request to the first storage subsystem upon reception of a first data erasure request for erasing the first volume. The first storage subsystem stops a copying process of data stored in the first volume to the second volume, transmits a second data erasure request for erasing the second volume to the second storage subsystem, and erases the data stored in the first volume. Thus, in the case of erasing data stored in a storage area, corresponding data stored in a destination storage area is also erased so that security risks can be reduced.
摘要:
Provided is a computer system, including: a computer; and a storage system coupled to the computer via a network. The computer includes: an interface coupled to the network, a processor coupled to the interface and a memory coupled to the processor. The storage system includes a plurality of volumes in which files are stored. The processor is configured to: decide duplicating files from among the files stored in the plurality of volumes as files to be consolidated; identify a plurality of volumes in which the files to be consolidated are stored; select at least one volume from among the identified plurality of volumes as a consolidation volume based on loads imposed on the identified plurality of volumes; and delete the files to be consolidated stored in the volumes that are not selected. Accordingly, in data de-duplication, it is possible to avoid extra loads from centralizing in a high-load-bearing volume.