摘要:
A technique migrates data from source arrays to target arrays. The array devices operate in either active mode, passive mode, or stalled-active mode. The technique involves providing active-to-passive instructions to transition the source devices from active to passive while a host initially accesses host data from the source arrays using MPIO software (the target devices being in stalled-active mode), and monitoring whether the source devices successfully transition to passive during a predefined time period. If so, the technique involves operating the target devices in active mode and transferring data from the source devices to the target devices to enable the host to access the host data from the target arrays using the MPIO software. However, if a source device remains passive, the technique involves providing passive-to-active instructions to transition the source devices back to active to enable the host to access the host data from the source arrays.
摘要:
Methods and apparatus for a continuous data protection system having a protection agent and at least one data protection appliance that enables, in an image access mode, a rolling back of volumes in a highly available storage array on the target side so that the volumes contain data for a selected point in time, creation of a storage array snapshot of the volumes for the point in time, and user access to the storage array snapshot in the storage array.
摘要:
On-line storage devices are migrated to new storage devices in a non-disruptive manner. A host executing multipath I/O software is initially coupled to a source storage device via at least one active path. The target storage device is configured with the source device's device identification information. The target storage device is coupled to the host via a passive path so that the target storage device can return its device identification information to the host but cannot respond to I/O read or I/O write requests from the host. All paths between the host and the source storage device are then disconnected. An on-line data migration session between the source storage device and the target storage device is then activated. The path between the target storage device and the host is then re-configured from passive to active so that the target storage device can respond to I/O read and I/O write requests.
摘要:
Controlling communication through a communication resource includes allocating a percentage of a maximum bandwidth of the communication resource to a subset of processes that communicate using the resource, determining a delay amount between I/O operations, where the delay amount corresponds to the percentage of bandwidth allocated to the subset of processes, and waiting an amount of time corresponding to the delay amount between I/O operations for the subset of processes. The delay amount may be increased in response to the actual I/O throughput being greater than an amount corresponding to the percentage of the maximum bandwidth allocated to the subset of processes. The delay amount may be decreased in response to the actual I/O throughput being less than an amount corresponding to the percentage of the maximum bandwidth allocated to the subset of processes.
摘要:
Described is a technique for initialization of a device in a data storage system. A status indicating completion of the initialization is returned after setting initialization indicators associated with tracks of the device. The indicators indicate that the tracks of the device are to be initialized. As subsequent I/O operations for the device are processed, the tracks associated with the subsequent I/O operations are initialized prior to performing the I/O operation if the initialization indicators associated with the tracks are set. A background initialization task scans the initialization indicators and initializes tracks in accordance with the initialization indicators. Once a track has been initialized, its associated initialization indicator is cleared.
摘要:
Described are techniques for overriding an existing device reservation. Discovery processing is performed by a first data storage system to locate a specified device. The discovery processing includes determining whether there is a reservation conflict for said device of a second data storage system. If there is a reservation conflict for the device, a command is issued from the first data storage system to the second data storage system during said discovery processing to create an override for said reservation conflict. The override causes processing to be performed at a subsequent point in time so that an existing reservation associated with the reservation conflict is overridden in connection with performing a first process on said first data storage system.
摘要:
Described are techniques for use with online data copying or migration. Data is pushed from a source to a target device while one or both of the source and target devices are available for use by one or more host systems. The host systems may perform I/O operations to the source and/or target devices while the data migration is ongoing if a copy session is defined on the data storage system(s) of the source and/or target devices. A copying operation performs data migration from the source to the target device. A migration vector is used to indicate which portions of the source have been migrated. A change vector may be associated with each of the source and/or target devices to indicate portions that have been modified in order to perform a differential copy operation.
摘要:
Described are techniques for use with an error handling policy for a data storage system. Error handling criteria may be specified for controlling behavior of the data storage system upon the occurrence of an internal processing error occurring when performing an ancillary task associated with a data operation received by the data storage system. The error handling criteria may include a threshold counter value, and one or more of: a device, a specific device location or address, and a host. An error may be conditionally returned to the host upon the occurrence of an internal processing error in accordance with the error handling criteria.
摘要:
Methods and systems for preserving a disk geometry when relabeling a storage device containing data migrated from a previous data storage device having different disk geometry. Prior to relabeling, the label of the storage device includes information on the disk geometry of the previous data storage device. An exemplary method includes reading the label of the storage device in response to a request for information related to a disk geometry of the storage device, which is normally answered without reference to the label of the storage device, and reporting the information related to the disk geometry from the label if the label is associated with an operating system that considers a geometry of a storage device when partitioning.
摘要:
Described are techniques used in detection of a data corruption in a computer system in connection with read and write operations. For a write operation, a host issues a write request that includes a checksum value determined in accordance with data associated with the write request. The write request is received by a data storage system that performs data validation using the checksum. The host issues a vendor-defined write request operation that includes the checksum as a data field in the request packet sent to the data storage system. For a read operation, a host issues a read request and the data storage system determines a checksum value before servicing the read request. The checksum is validated at the top of the I/O stack on the host by the file system filter driver.