摘要:
An aspect of this invention is a computer system, including: a storage apparatus for allocating real storage areas of a plurality of tiers of a tiered real storage area pool to a volume, and migrating and relocating data within the volume between the plurality of tiers; and a host apparatus that accesses the volume provided by the storage apparatus. The host apparatus is configured to refer to tier information including information on a corresponding one of the plurality of tiers to which an access destination address within the volume belongs to identify the corresponding one of the plurality of tiers to which the access destination address belongs and refer to settings predetermined for the plurality of tiers to perform I/O control for the access destination address based on settings of the identified corresponding one of the plurality of tiers.
摘要:
In the prior art clone creating technique of a file, a management table of a snapshot and the file was created when creating the clone file, so that a considerable amount of creation time for creating the clone file and storage capacity was required. In order to solve the problems of the prior art, the present invention provides a system wherein if a request to create a clone of a file is received, a differential file is created while inhibiting update of the file, and update data is written to the differential file. Further, when a first update request is received to the differential file after creating the differential file, a management table is created. According to the invention, a large amount of clone files can be created speedily.
摘要:
Difference information between two snapshots from a first point-in-time snapshot, which has been copied, to an N.sup.th point-in-time snapshot, which constitutes the latest point-in-time snapshot, is acquired to a memory module. The memory module stores two or more pieces of difference information. The two or more pieces of difference information comprise difference information that shows the difference between a first point-in-time snapshot and any snapshot other than the first point-in-time snapshot of N snapshots. Copy difference information, which is information that shows the difference between the first point-in-time snapshot and a specified snapshot from among N snapshots, and which is used in copying the specified snapshot, is created on the basis of the two or more pieces of difference information.
摘要:
Files stored in a storage system are grouped in a metadata server, and storage servers discretely storing these files are instructed to detect file duplication and to remove duplicate data. The storage servers detect duplicate data by comparing file fragments stored by the storage servers themselves with each other. In a case where duplicate data is detected, the storage servers delete the duplicate data.
摘要:
Each time the file access request is received, it is discriminated whether there is an ACL which corresponds with the file system of the type following the switching in the file designated by the file access request. In cases where the judgment result is that there is no such ACL, an ACL which corresponds with the file system of the type following the switching is generated on the basis of an ACL which corresponds with the file system of the type prior to the switching which is associated with the designated file, and the ACL thus generated is used to control access in accordance with the received file access request.
摘要:
Problem: Providing a storage system which can be applied to a broad range of access forms to the file and, at the same time, in which the performance of file access control processing is improved. Solution: The storage system stores a part of the access control information of a variable size in the basic attribute area of the file, and stores the storage format information in the basic attribute area of the file or in the file system metadata area. At the time of processing the access to the file, with reference to the storage format information, the storage system decodes a part of the access control information into an access mask bit string as needed, and performs the preceding access control processing. If whether access is permitted or not can be determined through the preceding access control processing, the access control processing is performed while, whether access is permitted or not cannot be determined, performs the access control processing based on the extended attribute information.FigureFIG. 7
摘要:
A file, for which writing has been reserved, in a file-sharing system can be efficiently read. A check-in file agent is provided in a computer that executes check-in of a file as the file-write reserving processing, a file manager is provided in a file-sharing computer, and a check-out file agent is provided in a computer that executes check-out of a file as the file reading processing. Upon request for check-in of a file, the check-in file agent divides the file into divided files and generates metadata that indicates the order of division of the file, and transmits them to the file-sharing computer for storage therein. Upon request for check-out of the file, the check-out file agent receives the metadata from the file-sharing computer, and based on the metadata, sequentially receives the divided files to generate a file to be checked out.
摘要:
First, a duplicate elimination process based on a first duplicate elimination process, in which both a duplicate elimination effect and a processing load are low, is executed. Information related to a processing result of the duplicate elimination process based on the first duplicate elimination process is acquired prior to execution of a second duplicate elimination process, in which both the duplicate elimination effect and the processing load are high. Target data of the second duplicate elimination process is narrowed down based on the acquired information. The second duplicate elimination process is applied only to the narrowed down target data. As a result, an integrated duplicate elimination system with a lower processing load than in a conventional system is realized while attaining a high duplicate elimination effect.
摘要:
A storage system 103 carries out first and second de-duplication processes in response to receiving a write request from a client. First, a determination is made as to whether a write target data item overlaps with any of the stored data items of a part of a stored data item group, which is a user data item group stored in a storage device 209, and if so, the write target data item is prevented from being stored in the storage device. Second, a determination is made as to whether a target stored data item, which is not finished being evaluated as to whether it overlaps with the stored data item in the first de-duplication process, overlaps with another stored data item, and if so, the target stored data item or the same data item overlapping with the target stored data item is deleted from the storage device 209.
摘要:
Files stored in a storage system are grouped in a metadata server, and storage servers discretely storing these files are instructed to detect file duplication and to remove duplicate data. The storage servers detect duplicate data by comparing file fragments stored by the storage servers themselves with each other. In a case where duplicate data is detected, the storage servers delete the duplicate data.