摘要:
An apparatus, system, and method for preserving a deleted storage volume. One embodiment of the apparatus includes a receiving module, a reference module, and a preservation module. The receiving module receives a deletion command to delete a data volume managed by a storage controller. The data volume is associated with one or more deletion parameters specifying that data of the data volume is to be preserved upon deletion of the data volume. The reference module references the deletion parameters. The preservation module preserves the data of the data volume prior to the storage controller deleting the data volume. The preservation module preserves the data of the data volume according to the deletion parameters.
摘要:
Provided are a computer implemented method, computer program product, and system for creating a consistency group. For each source volume that has an instant virtual copy relationship with a target volume, an indicator for the source volume is set to true in a Fast Incremental with Freeze (FIF) map. The consistency group for each source volume whose indicator is set to true in the FIF map and each associated target volume is created by: performing a quick Instant Virtual Copy (IVC) freeze command to freeze each source volume whose indicator is set to true in the FIF map and performing a consistency group created command to thaw each source volume whose indicator is set to true in the FIF map.
摘要:
Exemplary methods, computer systems, and computer program products for fabricating key fields by a processor device in a computer environment are provided. In one embodiment, the computer environment is configured for, as an alternative to reading Count-Key-Data (CKD) data in order to change the key field, providing a hint to fabricate a new key field, thereby overwriting a previous key field and updating the CKD data.
摘要:
A primary storage controller is configured to communicate with a secondary storage controller via a system data mover. In response to receiving a command to perform a point in time copy of a source volume of the primary storage controller to a target volume of the primary storage controller, a determination is made as to whether the target volume of the primary storage controller is a source for an asynchronous data replication operation, initiated by the system data mover, between the primary storage controller and the secondary storage controller. In response to determining that the target volume of the primary storage controller is the source for the asynchronous data replication operation, initiated by the system data mover, the point in time copy of the source volume of the primary storage controller to the target volume of the primary storage controller is performed.
摘要:
Methods, computing environments, and computer program products are provided for replicating data. Point-in-time copy parameters are generated at a primary host site. A side file entry having the point-in-time copy parameters and a track information field (TIF) associated with the point-in-time copy parameters is generated. The side file entry is transferred to a secondary host site. A point-in-time copy process is performed at the secondary host site based on the point-in-time copy parameters and the TIF.
摘要:
A plurality of logical volumes are stored at a plurality of sites. A command to execute an operation on a logical volume is received. A determination is made as to whether a rule associated with the logical volume permits execution of the operation on the logical volume. In response to determining that the rule associated with the logical volume permits execution of the operation on the logical volume, the operation is executed on the logical volume.
摘要:
An apparatus, system, and method for advanced function usage-based billing. One embodiment of the apparatus includes a detection module, a monitoring module, and a billing report module. The detection module detects use of one or more advanced functions on a storage controller. Each advanced function includes a license-based storage function separate from a standard function set. The monitoring module monitors the detected use of the one or more advanced functions on the storage controller. The communication module communicates billable use information to a billing entity. The billable use information is based on the monitored detected use
摘要:
An initial program load (IPL) of a logical partition (LPAR) is managed by establishing a logical path to the LPAR from a storage controller. When a notice is received by the storage controller from the LPAR that the IPL has commenced, the LPAR address is stored in a data structure. After the storage controller initiates a pack change state interrupt, the stored address is compared with the addresses in a list of all LPARS to which the interrupt is directed. If the list of addresses includes the stored address, the stored address is removed from the list. Thus, the pack change state interrupt is transmitted only to the addresses in the list, leaving the LPAR to complete the IPL without interruption. After the storage controller receives a notice from the LPAR that the IPL has completed, the address of the LPAR is removed from the data structure.
摘要:
A method for operating a controller includes receiving a command associated with at least one operation, determining a CPU channel path based on the received command, determining a unique job identifier based on the received command, and determining a state based on the received command. In addition, the method includes updating at least one data matrix based on the determined state, unique job identifier and CPU channel path and operating the controller based on the updated data matrix.
摘要:
A logical partition (LPAR) is managed in a data processing system by performing an initial program load (IPL), commencing execution of an application on the LPAR and selecting from a plurality of unsolicited events of which the application is to receive notice. A command is transmitted to a storage controller indicating the identity of the selected unsolicited events, wherein the storage controller will store the information in a data structure. Upon the later occurrence of an unsolicited event, the storage controller will transmit to the LPAR only notices of the selected unsolicited events.