摘要:
Provided is a method for maintaining mirror and storage system copies of volumes at multiple remote sites. A first server maintains a mirror copy relationship between a first storage system at a first site and a second storage system at a second site. The first server performs a first point-in-time copy operation from the first storage system to a first storage system copy, wherein the data for the first storage system copy is consistent as of the determined point-in-time. The first server transmits a command to a second server to create a point-in-time copy of the second storage system. The second server processes mirror data transferred from the first server as part of the mirror copy relationship to determine when to create a second point-in-time copy. The second server performs the second point-in-time copy operation.
摘要:
A data storage system writes data supplied from a host to data storage in accordance with write I/O of an owning application. A workload manager directs the processing of the supplied data in accordance with the write I/O of the owning application, provides service workload identification describing the write I/O, a storage subsystem control adds the service workload identification to record set information for the data, and a journal management system stores the record set information in a journal. The journaled information, for example, may be employed for performing forensic analysis of data corruption events or to perform security audits, etc.
摘要:
Provided are a method, system, and article of manufacture, wherein a primary control unit sends a selected time to a plurality of secondary control units. Clocks are periodically synchronized at the primary control unit and the secondary control units with a time server. The primary control unit and the plurality of secondary control units consistently update secondary storage subsystems coupled to the plurality of secondary control units at the selected time.
摘要:
A data management system has at least one class distinction cue associated with a class of data entities. The class distinction cue comprises data management guidance information and priority information related to the associated class of data entities. For a data entity, at run-time, a data management allocation run-time system references the class distinction cue or cues prior to conducting data management allocation or access, and, based on the priority information as compared to other priority information related to the data storage resources, selectively allocates the data storage resources and provides the operations of the storage system in the data management allocation system for the data entity.
摘要:
A storage controller conditions host access to stored data objects upon host provision of a proposed key with matching or other prescribed relation to a security key stored in host-inaccessible metadata that is associated with the stored data object. The security key may be established upon writing the data or allocating storage space, for example. This enables the storage controller or device to be attached directly to a network without compromising security or having to add an intermediate server to perform security functions. Another implementation concerns sound recording playback devices that only play sound tracks for which the user has purchased an appropriate security key.
摘要:
A host-independent storage facility selectively provides data-dependent security by initially storing a security key in association with a storage region, where that key must be presented by any host seeking access to the region. The storage system includes a storage controller coupled to a digital data storage and one or more hosts. Initially, the controller receives a set-access-key command from one of the hosts, identifying a storage region, an operation parameter identifying prohibited types of storage operations, and a reference access key. The controller stores the access key and the operation parameter in a reference location associated with the identified storage region. Later, the controller may receive storage access requests from the hosts. Requests include an identification of a requested storage region, an access type, and an input access key. In response, the controller retrieves the reference access key and operation parameter associated with the requested storage region. If the requested access type is not prohibited by the operation parameter, the controller executes the storage access request. Also, if the requested access type is prohibited by the retrieved operation parameter, the controller nonetheless executes the storage access request if the input and reference access keys match.
摘要:
A storage-and-host-controller-managed outboard data management tool is described wherein the host controller defines logical paths between various storage controllers and data storage devices, and the storage controller manages the movement of data to and from the various data storage devices while only sending data to the host processor if necessary.
摘要:
A remote data shadowing system provides storage based, real time disaster recovery capability. Record updates at a primary site cause write I/O operations in a storage subsystem therein. The write I/O operations are time stamped and the time, sequence, and physical locations of the record updates are collected in a primary data mover. The primary data mover groups sets of the record updates and associated control information based upon a predetermined time interval, the primary data mover appending a prefix header to the record(updates thereby forming self describing record sets. The self describing record sets are transmitted to a remote secondary site wherein consistency groups are formed such that the record updates are ordered so that the record updates can be shadowed in an order consistent with the order the record updates cause write I/O operations at the primary site.
摘要:
Provided are a method, system and article of manufacture, wherein a request to access data is received from a requestor. A determination is made as to whether the requestor is authorized to access the data. In response to determining that the requestor is authorized to access the data, a determination is made as to whether the data is encrypted. An encryption key is requested from the requester, in response to determining that the data is not encrypted.
摘要:
Provided are a system and article of manufacture for mirroring data. A mirror policy indicating volumes in a first storage system is processed to mirror to volumes in a second storage system and volumes in the second storage system to mirror to volumes in a third storage system. The third storage system is at a first geographical location remote with respect to a second geographical location including the first and second storage systems. A command is transmitted to cause the copying of updates to the volumes in the first storage system to corresponding volumes in the second storage system indicated in the mirror policy. Upon an occurrence of an event, the causing the suspension of the copying of updates to the volumes in the first storage system indicated in the mirroring policy to the volumes in the second storage system. During the suspension of the copying of volumes between the first and second storage systems, causing the copying of updates to the volumes in the second storage system indicated in the mirroring policy to the volumes in the third storage system indicated in the mirroring policy.