摘要:
A method, system, and computer program product for coordinating the configuration of local and remote storage subsystems for a local client is provided. A command sender is configured on a local storage subsystem to create remote command objects based on commands received from the local client, and deliver the remote command objects to a remote storage subsystem for execution. A command receiver is configured on the remote storage subsystem, the command receiver service having an interface to receive the remote command objects. A remote connection bucket is configured to manage at least one connection between the local storage subsystem and the remote storage subsystem.
摘要:
In one aspect of the present description, a systems manager based upon a common model of information protocol or standard includes automated storage area network (SAN) expansion management which permits additional provider modules to be automatically installed if needed in response to devices being added to the SAN. In addition, the automated SAN expansion management permits installed provider modules to be automatically configured in response to devices being added to the SAN. Still further, in another aspect, the automated SAN expansion management can automatically determine if a suitable host processor exists to host installation of a new provider module and if not, the automated SAN expansion management 20 can automatically deploy a suitable host processor such as a virtual server to host installation of a new provider module. Other features and aspects may be realized, depending upon the particular application.
摘要:
A method for singleton process control in a computer environment is provided. A process identification (PID) for a background process is stored in a first temporary file. The PID is stored by a parent process and subsequently accessed by the background process. The background process is exited if an active PID is determined to exist in a second, global temporary file. The PID from the first temporary file is stored into the second, global temporary file. A singleton code block is then executed.
摘要:
An apparatus, system, and method are disclosed for visual log analysis. The apparatus for visual log analysis is provided with a plurality of modules configured to functionally execute the necessary steps of retrieving log entries from a plurality of devices on a network, parsing the log entries to determine an execution flow of commands executed of the network, and displaying a graphical representation of such execution on the network. These modules in the described embodiments include a log consolidation module, a parsing module, and a display module.
摘要:
A method for executing a software routine identified in a task object is provided. The method includes accessing a list of software routine identifiers associated with software routines that are executable on a computer server. The method further includes generating a task object generation command having at least a first software routine identifier, parameter data, and link task information and generating a second task object in response to the task object generation command. The second task object includes the first software routine identifier, the parameter data, and the link task information. The method further includes adding the second task object to a task execution queue on the computer server and executing the first software routine identified by the first software routine identifier in the second task object on the computer server to obtain at least a first result value, when the first flag value is a first predetermined value and the result parameter associated with the first task object corresponds to a second predetermined value.
摘要:
Methods and systems for verifying server-storage device connectivity in a storage area network (SAN) environment are provided. One system includes determining which of a plurality of storage devices a server is physically connected and determining which of the plurality of storage devices a zoning configuration in the SAN environment enables the server to access. The method further includes returning to a user an indication of each storage device in the plurality of storage devices that the server is both physically connected and includes zoning access. One system includes a server, a plurality of storage devices, a switch fabric coupling the server to the plurality of storage devices, and a processor coupled to the server, the plurality of storage devices, and each device in the switch fabric. In this system, the processor is configured to perform the method discussed above.
摘要:
A method, system, and computer program product for coordinating the configuration of local and remote storage subsystems for a local client is provided. A command sender is configured on a local storage subsystem to create remote command objects based on commands received from the local client, and deliver the remote command objects to a remote storage subsystem for execution. A command receiver is configured on the remote storage subsystem, the command receiver service having an interface to receive the remote command objects. A remote connection bucket is configured to manage at least one connection between the local storage subsystem and the remote storage subsystem.
摘要:
A method, system, and computer program product of configuring a virtual array site on a remote storage server is provided. The virtual array site provides on-demand storage capacity to a local storage server of a customer. The method includes creating a virtual array. The virtual array incorporates an attribute selectable by the customer. A virtual extent pool is created. The virtual extent pool is associated with the virtual array. A volume associated with the virtual extent pool is created. The volume comprises at least a portion of the virtual array site.
摘要:
A method to control access to logical volumes. The method provides a plurality of host computers and an information storage and retrieval system comprising a plurality of logical volumes. The method forms (N) host computer groups, assigns one or more of the host computers to the (i)th host computer group, such that each host computer assigned to (i)th host computer group is not assigned to any other of the (N) host computer groups. The method forms (N) logical volume groups, assigns one or more logical volumes to the (i)th logical volume group, such that each of the logical volumes assigned to the (i)th logical volume group is not assigned to any other of the (N) logical volume groups. The method maintains a database associating the (i)th host computer group with the (i)th logical volume group, and permits a host computer assigned to the (i)th host computer group to access a logical volume assigned to the (i)th logical volume group.
摘要:
A method to control access to logical volumes. The method provides a plurality of host computers and an information storage and retrieval system comprising a plurality of logical volumes. The method forms (N) host computer groups, assigns one or more of the host computers to the (i)th host computer group, such that each host computer assigned to (i)th host computer group is not assigned to any other of the (N) host computer groups. The method forms (N) logical volume groups, assigns one or more logical volumes to the (i)th logical volume group, such that each of the logical volumes assigned to the (i)th logical volume group is not assigned to any other of the (N) logical volume groups. The method maintains a database associating the (i)th host computer group with the (i)th logical volume group, and permits a host computer assigned to the (i)th host computer group to access a logical volume assigned to the (i)th logical volume group.