摘要:
An enhanced mechanism for providing data protection for variable length records utilizes high performance block storage metadata. In an embodiment, an emulated record that emulates a variable length record, such as a Count-Key-Data (CKD) record or an Extended-Count-Key-Data (ECKD) record, is generated by a Host Bus Adapter (HBA) of a mainframe system. The emulated record comprises a sequence of extended fixed-length blocks, each of which includes a data block and a footer. A confluence of the footers defines a high performance block storage metadata unit associated with the emulated record and includes a checksum that covers all data blocks and all footers of the entire emulated record. In one embodiment, the checksum is checked during transit of the emulated record between a HBA and a storage subsystem (e.g., by the HBA when the emulated record is received from the storage subsystem, and/or by a switch in the data transfer path), during a hardening step when writing the emulated record to a disk, and/or during a verification step when reading the emulated record from the disk.
摘要:
Providing extended or end-to-end data integrity through layers of a system. In one aspect, information is to be transmitted between an application end of the system and a physical storage medium that stores the information for a database of the system, the information to be transmitted via a database server in a database server layer of the system. At least a portion of data protection is provided for the information, the data protection causing the information to be protected from corruption between a system layer and the physical storage medium, where the system layer is a separate layer provided closer to the application end of the system than the database server layer.
摘要:
A data storage system writes data supplied from a host to data storage in accordance with write I/O of an owning application. A workload manager directs the processing of the supplied data in accordance with the write I/O of the owning application, provides service workload identification describing the write I/O, a storage subsystem control adds the service workload identification to record set information for the data, and a journal management system stores the record set information in a journal. The journaled information, for example, may be employed for performing forensic analysis of data corruption events or to perform security audits, etc.
摘要:
Provided are a method, system, and article of manufacture, wherein a controller receives a request from one of a plurality of hosts. The controller determines whether a primary storage control unit coupled to the controller is operational. A response is generated by accessing the primary storage control unit, in response to determining that the primary storage control unit is operational. The response is generated by accessing a secondary storage control unit, in response to determining that the primary storage control unit is not operational, wherein data is replicated synchronously from the primary storage control unit to the secondary storage control unit.
摘要:
Disclosed is a technique for transferring data using multiple backup components. Responsibility for a portion of data is assigned to a first backup component. When a data update for the portion of data is received at the first backup component from a primary source, the data update is mirrored to a second backup component that is not assigned responsibility for the portion of data.Also disclosed is a technique for processing data updates with a group of backup components. It is determined that a new backup component is active. Near an end of a consistent transactions set formation period, responsibility for one or more portions of data are assigned to each backup component in the group and to the new backup component. During a next consistent transactions set formation period, data updates are processed with each backup component in the group and the new backup component.Moreover, disclosed is a technique for processing data updates with a group of backup components. It is determined that a first backup component in the group is no longer available. Portions of data for which the first backup component had been assigned responsibility are reassigned to each of the other backup components in the group.
摘要:
Disclosed is a technique for data synchronization. A first identifier is determined for a portion of data at a first source. A second identifier is determined for a portion of corresponding data at a second source. The first and second identifiers are compared. When the first and second identifiers do not match, the portion of corresponding data at the second source is replaced with the portion of data at the first source.