摘要:
The present invention provides a log management system which is devised so that improper behavior by managers with regard to the log information can easily be discovered. Virtual OS are respectively installed for respective users in a file server that can also be constructed as an NAS device. These virtual OS function as virtual NAS. The virtual OS and manager OS can exchange information relating to log information via an information exchange part constructed as a kernel. The log information produced in the virtual OS is transmitted to a first log management device via a first communications network, and is also transmitted to a second log management device via a second communications network. The respective networks are separated. As a result of the same log information being managed by multiplex management using separate management devices, it can be detected whether or not there has been any improper behavior with respect to the log information.
摘要:
This invention addresses to execute an emergency access interception in a widely distributed environment. An access controller 100 manages an access control list (ACL) 110 recording access right to each object, and a black list (BL) 120 recording user information corresponding to the emergency access interception. The access controller 100 receives a request for authentication to access right and judges whether or not the access right is proper, first according to the BL 120 then ACL110. In case where the user information corresponding to the request is recorded in the BL 120, the access controller 100 sends out the user information to other access controllers and instructs them to register it in the black list. This invention effectively actualizes the emergency access interception under the widely distributed environment in case where the interception is required for any user.
摘要:
The client computer which transmits an access request specifying an object existing in the first file system and the second computer which accesses the second file system are connected to the first computer which accesses the first file system. The second file system includes a shared directory. A specific object which is an object complying with the path name including the name determined in accordance with the type of the second computer is stored in the shared directory. The controller mounts the shared directory to the first file system. The controller creates a link which comprises a name determined in accordance with a certain naming regulation independent of the type of the computer and corresponds to the specific object in the first file system.
摘要:
A file server stores the storage management information and migration policy information. The storage management information includes the information that indicates a storage attribute for each storage apparatus. The migration policy information includes a plurality of information sets. Each of the information sets includes the information that indicates a condition of a file attribute and the information that indicates a condition of a storage attribute of a storage apparatus that is a migration destination. The file server specifies a migration target file, specifies a storage apparatus that conforms to the storage attribute condition that is indicated by the information set that includes the information that indicates a condition of a file attribute that conforms to of a file attribute of a target file based on the storage management information, and migrates a target file from a storage apparatus that has stored the target file to the storage apparatus that has been specified.
摘要:
The client computer which transmits an access request specifying an object existing in the first file system and the second computer which accesses the second file system are connected to the first computer which accesses the first file system. The second file system includes a shared directory. A specific object which is an object complying with the path name including the name determined in accordance with the type of the second computer is stored in the shared directory. The controller mounts the shared directory to the first file system. The controller creates a link which comprises a name determined in accordance with a certain naming regulation independent of the type of the computer and corresponds to the specific object in the first file system.
摘要:
An information processing service is allowed to be immediately recovered from failure without clustering information apparatuses that provide an information processing service. A failure recovery method for an information processing service provided by an information apparatus, the method includes: preparing a virtual machine image generation apparatus which generates a virtual machine image, and a virtual machine execution apparatus which runs a virtual machine based on the virtual machine image; generating and storing, by the virtual machine image generation apparatus, the virtual machine image based on system data and hardware configuration information which enable implementation of the information processing service at a time of normal operation of the information processing service; and running, by the virtual machine execution apparatus, a virtual machine which provides a function of the information processing service based on the virtual machine image when a failure occurs in the information processing service.
摘要:
Provided is a control computer coupled to a storage apparatus for storing a plurality of information resources and a search computer for receiving a search request containing a search condition and transmitting information resource list information containing at least one piece of information regarding an information resource corresponding to the search condition as a search result, the control computer includes a cache memory for storing at least one of the plurality of information resources, in which the control computer is configured to: receive the information resource list information from the search computer; calculate cache priority for each of the information resources based on the received information resource list information; decide at least one information resource to be stored in the cache memory based on the calculated cache priority; and store the decided at least one information resource in the cache memory.
摘要:
This invention addresses to execute an emergency access interception in a widely distributed environment.An access controller 100 manages an access control list (ACL) 110 recording access right to each object, and a black list (BL) 120 recording user information corresponding to the emergency access interception. The access controller 100 receives a request for authentication to access right and judges whether or not the access right is proper, first according to the BL 120 then ACL110. In case where the user information corresponding to the request is recorded in the BL 120, the access controller 100 sends out the user information to other access controllers and instructs them to register it in the black list. This invention effectively actualizes the emergency access interception under the widely distributed environment in case where the interception is required for any user.
摘要:
A storage system, including: a client that issues a file write request or a file read request; an archive server that is connected to the client via a network, and processes the request issued from the client; a storage device that is connected to the archive server, and records files; and a disk drive connected to the client. The arrangement utilizes an archived date management table and archive dates to conduct operations.
摘要:
A file system access control which carries WORM commitment for files in a single transaction is provided. The file system access control apparatus includes command files that support WORM commitment, interprets WORM commitment command which is registered in command files by means of a daemon process module and executes WORM commitment in a file. A plurality of files and those under management of directories are changed of the file access modes to meet WORM. In addition, a system that allows WRITE command for the command files by means of a standard interface of the file system. The results of WORM commitment is registered in the repository files under the system regarding the present invention.