摘要:
A detectibility service for a storage infrastructure manager (SIM) operating on a storage area network (SAN) is disclosed directed to addressing a situation where there may be multiple sources of duplicate or contradictory information to the SIM about the presence and condition of an element in the SAN. The service can account for both authoritative as well as nonauthoritative sources of information in a SAN, which participate in the discovery process scanning for SAN elements. Both authoritative and nonauthoritative sources of information can be used to report a given SAN element during a probe, taking advantage of the more efficient processing of information from authoritative sources to override information from nonauthoritative sources regardless of the order in which the various scans may occur.
摘要:
An LUN/LBA interface is utilized to obtain the benefits of a content addressed storage (CAS) interface. Reference data is manipulated in a manner similar to a CAS system, where an object ID (OID) table is used to maintain OIDs generated for hashed LBAs. A first tier logic block is used to provide a LUN/LBA storage interface to application programs and to facilitate the writing of reference data. A second tier logic block hashes the content of reference data to be written and stores the OID generated to the first OID table. A third tier logic block facilitates writing the reference data to an LUN and to verify the accuracy of reference data to be read from the LUN. Reference data may be written to a storage area in accordance with a write-once, write-many, or write-many with versioning policy.
摘要:
A computer-implemented method for managing data snapshots among storage volumes to facilitate transitive, distributed snapshot operations such that a read request or write request can be made to any volume in a snapshot includes establishing respective snapshot tables for the volumes. Each table can correlate, for each chunk of data, a source volume and a target volume. In response to a read request for chunks in one the volumes, the respective snapshot table is accessed, and the read directed to the source volume indicated in the snapshot table. Likewise, in response to a write request for chunks in a storage volume, the table associated with the volume is accessed, and the write is directed to the target volume indicated in the table. For each chunk, the source volume is the same across all tables, such that a read or write involves no more than a single storage volume.
摘要:
An LUN/LBA interface is utilized to obtain the benefits of a content addressed storage (CAS) interface. Reference data is manipulated in a manner similar to a CAS system, where an object ID (OID) table is used to maintain OIDs generated for hashed LBAs. A first tier logic block is used to provide a LUN/LBA storage interface to application programs and to facilitate the writing of reference data. A second tier logic block hashes the content of reference data to be written and stores the OID generated to the first OID table. A third tier logic block facilitates writing the reference data to an LUN and to verify the accuracy of reference data to be read from the LUN. Reference data may be written to a storage area in accordance with a write-once, write-many, or write-many with versioning policy.
摘要:
Embodiments of the invention relate to a shared group of resource and efficient processing of one or more jobs in the share group of resources. Tools are provided in the shared group of resource to assess and organize a topology of the shared resources, including physical and virtual machines, as well as storage devices. The topology is stored in a known location and utilized for efficient assignment of one or more jobs responsive to the hierarchy.
摘要:
Policies are implemented in a managed systems. Virtual heterogeneous entities are organized into a system resource group (SRG) hosted on a virtual volume that is accessed via a virtualization machine. Each of the virtual heterogeneous entities are visible to an application operable on the managed systems environment. The system resource group is subject to at least one membership requirement, defines a relationship between at least two of the virtual heterogeneous entities, contains at least one policy defining an operation as to be performed on the system resource group for a domain of the managed systems environment, and defines at least a portion of a policy framework between the system resource group and an additional system resource group organized from additional virtual heterogeneous entities. The system resource group expands according to an action performed incorporating the relationship, policy, or policy framework.
摘要:
Embodiments of the invention relate to co-migration in a shared pool of resources with similarity across data sets of a migrating application. The data sets are processed and profiled. Metadata is reviewed to remove duplicate elements and to distribute the processing load across available nodes. At the same time, a ranking may be assigned to select metadata to support a prioritized migration. Non-duplicate data chunks are migrated across the shared pool of resources responsive to the assigned prioritization.
摘要:
Embodiments of the invention relate to handling failures in a cluster of computer resources. The resources are represented as nodes in a dependency graph in which some nodes are articulation points and the removal of any articulation point due to a resource failure results in a disconnected graph. The embodiments perform a failover when a resource corresponding to an articulation point fails. The failover is to a local resource if the failed resource does not affect all local resources. The failover is to a remote resource if no local resource can meet all resource requirements of the failed resource, and to a remote resource running in a degraded mode if the remote resource cannot meet all of the requirements.
摘要:
Embodiments of the invention are directed to streaming virtual machine boot services over a network. An aspect of the invention includes booting a first virtual machine and recording data and metadata from a virtual machine boot image into a virtual machine boot file. The data and metadata are accessed in the process of booting the first virtual machine. The virtual machine boot image has setup information of the virtual machine type of the first virtual machine. The virtual machine boot file is configured for the virtual machine type of the first virtual machine. A descriptor is added to metadata of the virtual machine boot image, which references a location of the virtual machine boot file for the virtual machine type of the first virtual machine. When subsequently booting a second virtual machine of the same type of virtual machine as the first virtual machine, data are streamed from the virtual machine boot file to a virtual machine monitor of a second virtual machine without the need to stream data from the virtual machine boot image.
摘要:
Embodiments are directed towards managing a display of search results by employing a query-classification for a search query to selectively display trust search results that are displayed distinct from non-trust search results. A search query is classified into a query-class. A search is then performed over non-trust sources, and selectively over trust data sources to obtain non-trust and trust search results, respectively. The trust search results are rank ordered based on various categories of search criteria, including, for example, explicit and implicit relationships. Based on the query-class, a different number of trust search results may be displayed. Further, a position for which the trust search results may be displayed may be based on the query-class. Moreover, the non-trust search results displayed distinct or separate from the trust search results to readily distinguish a type of source of the search results.