Abstract:
A method for operating a computer data storage system is described. A recoverable error in a data storage device in recognized in response to receiving a command for a write operation. It is determined whether the data storage system is in a degraded state. The write operation encountering the recoverable error is reassigned to a space on a spare data storage device if the data storage system is not in a degraded state. The write operation is stored to reassign to a spare data storage device at a future time if the data storage system is in a degraded state.
Abstract:
A system and method enables efficient transfer and cryptographic processing of data within a security appliance. A network adapter of the security appliance initiates a random access data transfer to a system memory that is illustratively organized into a plurality of blocks of predetermined size. Mapping circuitry of the appliance is configured to track the progress of the data transfer between the adapter and memory such that, once data is stored in a memory block, an encryption processor of the appliance may process the data or the network adapter may retrieve the processed data without having to wait for completion of the data transfer between the adapter and memory, thereby reducing processing latency in the security appliance.
Abstract:
The present invention overcomes the disadvantages of the prior art by providing a technique that stripes data containers across volumes of a striped volume set (SVS) using one of a plurality of different data placement patterns to thereby reduce the possibility of hotspots arising due to each data container using the same data placement pattern within the SVS. The technique is illustratively implemented by calculating a first index value, an intermediate index value and calculating a hash value of an mode associated with a data container to be accessed within the SVS. A final index value is calculated by multiplying the intermediate index value by the hash value, modulo the number of volumes of the SVS. Further, a Locate( ) function may be used to compute the location of data container content in the SVS to which a data access request is directed to ensure consistency of such content.
Abstract:
The invention provides an authentication scheme that allows networked devices to establish trust in connection with the exchange of keys pursuant to an asymmetrical cryptographic technique, such as Diffie-Hellman. The invention provides a technique, referred to as offline key establishment, that establishes a trust relationship between two networked devices that use Diffie-Helman. Offline key sharing provides for the exchange of authentication information using a separate channel which, in the preferred embodiment does not constitute an IP connection. Thus, while communications between networked devices may ultimately proceed via a network connection, trust between the networked devices is established via a separate, offline channel, such as a telephone call or email message. The use of offline key establishment allows for such features as one way key sharing; and addresses situations where one party to the exchange does not want to share all of his keys, but just one or two keys.
Abstract:
A storage management application is provided to manage and monitor virtual storage servers in a hosting storage server. In addition, in order to facilitate virtual storage server management and monitoring, a virtual storage server administrator role is provided. The role is allowed to access details of the virtual storage server assigned to the role, but not the details of the hosting server and other virtual servers.
Abstract:
A write allocation technique extends a conventional write allocation procedure employed by a write anywhere file system of a storage system. A write allocator of the file system implements the extended write allocation technique in response to an event in the file system. The extended write allocation technique efficiently allocates blocks, and frees blocks, to and from a virtual volume (vvol) of an aggregate. The aggregate is a physical volume comprising one or more groups of disks, such as RAID groups, underlying one or more vvols of the storage system. The aggregate has its own physical volume block number (pvbn) space and maintains metadata, such as block allocation structures, within that pvbn space. Each vvol also has its own virtual volume block number (vvbn) space and maintains metadata, such as block allocation structures, within that vvbn space. The inventive technique extends input/output efficiencies of the conventional write allocation procedure to comport with an extended file system layout of the storage system.
Abstract:
A user interface system simplifies management of a clustered storage system by a user or system administrator. The user interface system comprises a Command Line Interface (CLI) and/or a Graphical User Interface (GUI) that supports virtual ports associated with a single physical port and multi-mode operation of ports in the clustered storage system. Management of the clustered storage system is further simplified through the use of a novel command set used to, inter-alia, set a cluster mode and set a USE_PARTNER attribute of an initiator group (igroup).
Abstract:
This invention provides a system and method for managing backup and restore operations on a storage system, typically between source storage system and destination storage system using a backup management client that employs a version of the Network Data Management Protocol to interface with the destination file server and generate an “index” of data structures (such as directories and files) from directly from scanning the trees of PCPIs stored on the destination. The management client includes a command line interface for entry of instructions by a user or application and a web-based user interface and allows the index to be displayed as a series of web pages on a graphical user interface. The index can be browsed and selected data structures can be restored to a source filer/file server as desired. All back-ups/PCPIs can be contemporaneously browsed, allowing greater flexibility in selecting a best backup image to restore.
Abstract:
A hardware and/or software facility to enable emulated storage devices to share data stored on physical storage resources of a storage system. The facility may be implemented on a virtual tape library (VTL) system configured to back up data sets that have a high level of redundancy on multiple virtual tapes. The facility organizes all or a portion of the physical storage resources according to a common store data layout. By enabling emulated storage devices to share data stored on physical storage resources, the facility enables deduplication across the emulated storage devices irrespective of the emulated storage device to which the data is or was originally written, thereby eliminating duplicate data on the physical storage resources and improving the storage consumption of the emulated storage devices on the physical storage resources.
Abstract:
A method and an apparatus to automatically create storage resource management (SRM) paths has been presented. In one embodiment, the method includes monitoring a data storage system to collect configuration data of storage objects in the data storage system and automatically creating a storage resource management (SRM) path for a storage object in the data storage system using at least a portion of the configuration data in response to a user request to scan the storage object.