摘要:
A technique for performing configuration checking of a network is provided. A network data store is scanned for at least one transaction. At least one event is generated for the transaction. At least one configuration policy is associated with the event. The configuration policy is compared with configuration data associated with the event. It is determined whether the configuration policy has been violated based on the comparison.
摘要:
A data storage library utilizes library-local features to regulate access to shared read/write drives among multiple hosts, and thereby avoid the need for arbitrating host software. The library includes multiple data storage media, multiple data storage media slots, multiple read/write drives, and a library controller. The slots are originally partitioned into multiple logical libraries. Normally, the library shares the read/write drives among all hosts. However, when a host submits a request to unload a cartridge from a read/write drive, the library only honors that request if the host has access rights to the logical library from where the cartridge was originally loaded. Similarly, for each slot, the controller prevents a requesting host from loading a cartridge from that storage slot unless the requesting host has access rights to the logical library that includes that storage slot.
摘要:
Host port information is pulled directly from the switch before zoning is performed and is organized by chassis as an assist for mapping and masking an entire chassis. A graphical user interface allows a user to select storage by chassis to map and to select servers by chassis to map. The user then applies that mapping such that all servers selected are mapped to all storage selected. The user may repeat this mapping for another set of storage and servers. In a mixed environment, an icon may be shown in the graphical user interface to represent the mix. When the LUN mapping/masking is done, the LUN mapping/masking may be provided to the SAN manager to perform zoning. The LUN mapping/masking defines which host ports see which storage ports.
摘要:
Mechanisms for performing zoning of devices, such as Serial Attached SCSI (SAS) devices, for example, in a storage area network (SAN) in which all host systems of the SAN are automatically mapped to all of the storage systems are provided. Mechanisms for automatically mapping backend storage enclosures to appropriate storage system controllers on the SAN are provided. The zoning is automatically performed based on whether ports/phys are coupled to host systems, storage systems, and whether there are storage system controllers associated with the storage systems. Based on the automatic zoning, mapping of the storage devices of the storage systems to the host systems may be automatically performed via zone permission tables. By automating the zoning, users that do not necessarily have a detailed knowledge of the storage device communication protocol or SANs may configure the SAN even if it utilizes a complex and large architecture.
摘要:
A technique for performing configuration checking of a network is provided. A network data store is scanned for at least one transaction. At least one event is generated for the transaction. At least one configuration policy is associated with the event. The configuration policy is compared with configuration data associated with the event. It is determined whether the configuration policy has been violated based on the comparison.
摘要:
A common interface and communication methodology are provided for interaction between the components of a storage area network for them to activate “triggers” that cause actions to be taken by the devices to utilize copy service functions to create additional copies of data, and to potentially route load to other resources. The actions can be taken by any of the elements of the storage area network to mitigate the impact of the pending failure. The advantage of this system over current methods is that it can detect both failure and impending failure in any component in the system and use resources in any other component to mitigate the failure. This creates a much more comprehensive recovery strategy and the potential to save more data than in current systems.
摘要:
An automated data storage library includes a plurality of storage slots, a drive having a stacked connector system, and a library control manager configured to monitor usage data for the stacked connector system representative of the number of times the stacked connector system is mounted by a media connector from any of a plurality of media elements, and wherein the library manager is further configured to coordinate refreshment of the stacked connector system when the usage data reaches a predetermined usage level threshold. The stacked connector system may be refreshed by replacement or addition of a separate connector. Various methods of improving the long term performance of a drive in a media library by replacing or adding a connector to a stacked connector system of a drive are also provided.
摘要:
In a data storage subsystem, drive-level processing treats data storage media as WORM by automatically advancing a write append limiter as data is written, and preventing changes to data occurring before the write append limiter. Despite this media's WORM nature, the drive-level processing permits limited overwriting of data at the end of tape since the write append limiter lags the current write location by the margin of a write allowance index. Thus, despite the drive's treatment of the media as WORM, the drive permits overwriting of trailing metadata in order to facilitate write append operations.
摘要:
An improved and more efficient mapping scheme between a fiber channel (FC) interface and small computer system interface (SCSI) for multiple initiator support. In accordance with the method of the present invention an alternate mapping path is provided for processing commands from a FC host to a SCSI target while a single command is being processed therebetween through the normal mapping path. The alternate mapping path may be provided by designating another command pin(s) on the SCSI chip in the gateway or bridge box as an additional mapping address(es) or may be provided by using and coupling additional port(s) on each of the targets having multiple ports wherein the additional port(s) is/are associated with an additional mapping address(es).
摘要:
A technique for performing configuration checking of a network is provided. A network data store is scanned for at least one transaction. At least one event is generated for the transaction. At least one configuration policy is associated with the event. The configuration policy is compared with configuration data associated with the event. It is determined whether the configuration policy has been violated based on the comparison.