摘要:
A method for receiving a Mode Select command concerning a LUN from a host. The Mode Select command defines control information and host identifier information concerning the host associated with the Mode Select command. The Mode Select command is processed to determine if the control information included within the Mode Select command signifies an intent by the host to relinquish control of the LUN. If the control information signifies an intent to relinquish control of the LUN, the host identifier information included within the Mode Select command is processed to confirm that it matches LUN control identifier information that defines the host that currently controls the LUN. If the host identifier information matches the LUN control identifier information, at least the control information included within the Mode Select command is written to a buffer associated with the LUN. The buffer includes a control field and a GUID field.
摘要:
A technique automatically handles a failure during online data migration from a source array to a target array. While a host initially accesses data from the source array using multipath I/O software, the technique involves (i) transitioning the source array to a passive mode, and the target array to an active mode, and (ii) beginning a data transfer operation which transfers data from the source array to the target array. The technique further involves modifying the data on both the target array and the source array in response to modification commands sent to the target array from the host while the data transfer operation is ongoing. The technique further involves automatically failing back to providing access to the data from the source array in response to an event in which the target array loses communication with the source array for a predefined amount of time.
摘要:
A method, computer program product, and computing system for determining at least one LUN that was being controlled by a host prior to a crash event concerning the host, thus define at least one target LUN. A Mode Select command is prepared for the at least one target LUN, wherein the Mode Select command defines control information and host identifier information concerning the host. The Mode Select command is processed to determine if the control information and host identifier information included within the Mode Select command matches control information and host identifier information included within a buffer associated with the at least one target LUN. If the control information and host identifier information included within the Mode Select command matches the control information and host identifier information included within the buffer, control of the at least one target LUN is granted to the host.
摘要:
Methods and apparatus for storage snapshots for logged access replication using a data protection appliance in a continuous data protection system having a splitter. In one embodiment, out of band data transfer reduces disruption on the replica site while accessing an image.
摘要:
Described are techniques for indicating a state associated with a device. A request is received over a path for information about a device. A response to the request is sent. The response indicates a state regarding the device on the path. The response has a response status of good and a payload of a varying size. The payload is truncated at a location prior to that at which a device identifier for the device is expected. In accordance with the response, a state regarding the device on the path is determined.
摘要:
Methods and apparatus for a continuous data protection system having a protection agent and at least one data protection appliance that enables, in an image access mode, a rolling back of volumes in a highly available storage array on the target side so that the volumes contain data for a selected point in time, creation of a storage array snapshot of the volumes for the point in time, and user access to the storage array snapshot in the storage array.
摘要:
Controlling communication through a communication resource includes allocating a percentage of a maximum bandwidth of the communication resource to a subset of processes that communicate using the resource, determining a delay amount between I/O operations, where the delay amount corresponds to the percentage of bandwidth allocated to the subset of processes, and waiting an amount of time corresponding to the delay amount between I/O operations for the subset of processes. The delay amount may be increased in response to the actual I/O throughput being greater than an amount corresponding to the percentage of the maximum bandwidth allocated to the subset of processes. The delay amount may be decreased in response to the actual I/O throughput being less than an amount corresponding to the percentage of the maximum bandwidth allocated to the subset of processes.
摘要:
Described is a technique for initialization of a device in a data storage system. A status indicating completion of the initialization is returned after setting initialization indicators associated with tracks of the device. The indicators indicate that the tracks of the device are to be initialized. As subsequent I/O operations for the device are processed, the tracks associated with the subsequent I/O operations are initialized prior to performing the I/O operation if the initialization indicators associated with the tracks are set. A background initialization task scans the initialization indicators and initializes tracks in accordance with the initialization indicators. Once a track has been initialized, its associated initialization indicator is cleared.
摘要:
Methods and systems for preserving a disk geometry when relabeling a storage device containing data migrated from a previous data storage device having different disk geometry. Prior to relabeling, the label of the storage device includes information on the disk geometry of the previous data storage device. An exemplary method includes reading the label of the storage device in response to a request for information related to a disk geometry of the storage device, which is normally answered without reference to the label of the storage device, and reporting the information related to the disk geometry from the label if the label is associated with an operating system that considers a geometry of a storage device when partitioning.
摘要:
Described are techniques used in detection of a data corruption in a computer system in connection with read and write operations. For a write operation, a host issues a write request that includes a checksum value determined in accordance with data associated with the write request. The write request is received by a data storage system that performs data validation using the checksum. The host issues a vendor-defined write request operation that includes the checksum as a data field in the request packet sent to the data storage system. For a read operation, a host issues a read request and the data storage system determines a checksum value before servicing the read request. The checksum is validated at the top of the I/O stack on the host by the file system filter driver.