摘要:
A management server includes the user management segment information having stored therein a volume managed by a user, a receiving unit for receiving a volume allocation request from a management computer, a sending unit for sending the volume allocation request to a storage system and an updating unit for updating the user management segment information based on the information on the allocated volume received from the storage system. The storage system includes a unit for receiving the volume allocation request from the management server, and based on the volume allocation request, allocating the volume from the unallocated volume that can be allocated by all the users.
摘要:
Provided is a computer system including a storage subsystem, a host computer, and a management computer for managing the storage subsystem and the host computer. The storage subsystem manages a storage extent by a group unit and creates storage extent configuration information. The management computer stores group management information, obtains the storage extent configuration information, calculates an assigned capacity for each group based on the obtained storage extent configuration information, forecasts a capacity to be assigned in the future for each group based on the calculated assigned capacity, calculates a protection term expired capacity for each group based on the group management information and the storage extent configuration information, and outputs the assigned capacity, the capacity to be assigned in the future, and the protection term expired capacity. Thus, the storage extent of the storage subsystem can easily be managed.
摘要:
A management server includes the user management segment information having stored therein a volume managed by a user, a receiving unit for receiving a volume allocation request from a management computer, a sending unit for sending the volume allocation request to a storage system and an updating unit for updating the user management segment information based on the information on the allocated volume received from the storage system. The storage system includes a unit for receiving the volume allocation request from the management server, and based on the volume allocation request, allocating the volume from the unallocated volume that can be allocated by all the users.
摘要:
When a computer system including a data storage apparatus having a data storage area storing encrypted data is modified to have plural encryption/decryption units, a computer cannot appropriately use the encrypted data storage area if a path including the encryption/decryption means is not adequately determined.In a computer system having a computer 10, two or more data storage apparatuses 100 and 200 arranged hierarchically, plural encryption/decryption modules 199 and 299 on a path between the computer 10 and a data storage area 101, and a management computer 500 for managing the data storage apparatuses and the like, if there is an interoperability between the encryption/decryption modules 199 and 299 and the data storage area 101 is encrypted by the first encryption/decryption module 199, the computer 10 accesses the data storage area 101 using the second encryption/decryption module 299 (or an n-th encryption/decryption module closer to the computer than the second encryption/decryption module), rather than the first encryption/decryption module.
摘要:
At the time of migrating encrypted data into another storage apparatus, decrypt this data after migration is simplified, and security against tapping, falsification and the like is maintained when a calculation method of encrypted data is re-written into another calculation method, and also access performance is improved. In a storage system 100 which is provided with a storage apparatus having a volume 120 and which is accessible from a host computer, it is made possible to execute the data migration when a storage apparatus provided with a mechanism capable of decrypting the encrypted data is chosen as a migration destination of this data, and also to keep holding surely the encrypted data by updating and saving again an encryption method applied to a encryption of the encrypted data into another method by internal processing of the apparatus even when the apparatus and the encryption method become obsolete.
摘要:
A management apparatus, a management method, and a storage management system that more specifically manage power consumption, making it easy to analyze problems relating to power consumption or properly relocate data are provided.A power consumption for each of a plurality of memory apparatus groups each consisting of a plurality of memory apparatuses in a storage system is computed based on a performance for each of a plurality of logical storage extents defined in a plurality of storage extents provided by each of the memory apparatus groups, and a value of the power consumption for each of one or more of the memory apparatus groups obtained by the computation is output together with information on an access status of each of the corresponding logical storage extents.
摘要:
A first storage system includes a first storage area for storing data written by a computer. A second storage system includes a second storage area to which the data stored in the first storage area migrates. A third storage system includes a virtual storage area corresponding to the second storage area. An access request to the virtual storage area is converted into an access request to the second storage area to be issued. A management computer transmits, to the third storage system, an instruction to migrate the data of the second storage area to a third storage area of the third storage system based on a determination result between a value of the data migrated to the second storage area and a predetermined threshold value.
摘要:
At the time of migrating encrypted data into another storage apparatus, it is made easy to decrypt this data after migration, the security against tapping, falsification and the like is maintained when a calculation method of encrypted data is re-written into another calculation method, and also access performance is improved. In a storage system 100 which is provided with a storage apparatus having a volume 120 and which is accessible from a host computer, it is made possible to execute the data migration when a storage apparatus provided with a mechanism capable of decrypting the encrypted data is chosen as a migration destination of this data, and also to keep holding surely the encrypted data by updating and saving again a encryption method applied to a encryption of the encrypted data into another method by internal processing of the apparatus even when the apparatus and the encryption method become obsolete.
摘要:
In order to store data in disk drives securely in an environment with a mixture of disk drives having write protection mechanisms and disk drives without write protection mechanisms, a different write protection mechanism must be checked for each of the disk drives, and write protection must be defined for each of the disk drives storing data to be saved, which may impose a large load on system administrators. There is provided a storage controller for performing data input/output processing from a computer by managing volumes of multiple storage subsystems as external volumes and by using these external volumes as virtual volumes. In the data input/output processing, write protection is achieved based on an access attribute set for each of the virtual volumes. When an access attribute is set for a virtual volume, the same access attribute is set for an external volume corresponding to the virtual volume. Thus, the write protection is achieved for the external volume corresponding to the virtual volume.
摘要:
A first storage system includes a first storage area for storing data written by a computer. A second storage system includes a second storage area to which the data stored in the first storage area migrates. A third storage system includes a virtual storage area corresponding to the second storage area. An access request to the virtual storage area is converted into an access request to the second storage area to be issued. A management computer transmits, to the third storage system, an instruction to migrate the data of the second storage area to a third storage area of the third storage system based on a determination result between a value of the data migrated to the second storage area and a predetermined threshold value.