摘要:
Provided are a method, system, and article of manufacture for copying storage. Copy operations are performed on source storage units to copy to target storage units, wherein the copy operations create a consistent copy of the source storage units in the target storage units. While performing a copy operation to copy from one source storage unit to one target storage unit, a write operation is restricted from being performed on the one source storage unit, until the copy operations have been performed on the source storage units.
摘要:
A system for managing variable sized pages of possibly non contiguous blocks in a Non-Volatile-Storage (NVS) for attaining a consistent NVS that survives malfunction events. Each page includes a self describing block or linked list of self describing blocks. the system includes: Volatile Storage storing auxiliary modules, means for performing an atomic “create a new page” procedure. Means for performing an atomic write “add block” procedure for adding a possibly non contiguous block to a page. The newly added block has a back pointer to a previous block in the page. Means for performing a “delete page” procedure for deleting all blocks in a page. Means for performing a recovery procedure for rolling backward the add block procedure and rolling forward the delete page procedure, in case of malfunction event, thereby attaining consistent NVS.
摘要:
Provided are a system and article of manufacture for copying storage. Copy operations are performed on source storage units to copy to target storage units, wherein the copy operations create a consistent copy of the source storage units in the target storage units. While performing a copy operation to copy from one source storage unit to one target storage unit, a write operation is restricted from being performed on the one source storage unit, until the copy operations have been performed on the source storage units.
摘要:
A method for synchronizing between a primary control node of a storage system and a secondary control node of the storage system, the method may include performing a change in a key-value store that is stored in shared memory of the storage system and includes control metadata for controlling access to data stored in the storage system; the shared memory is accessible to the primary control node and to a secondary control node; generating a change indication that (i) is indicative of the change in the key-value store and (ii) requests the secondary control node to introduce changes in one or more additional data structures that are not stored in the shared memory; the change in the key-value store comprises replacing a previous given value with a current given value that is associated with a given key; sending the change indication to the secondary control node; receiving an acknowledgement from the secondary control node; wherein the acknowledgement indicates at least one of the following: (i) the secondary control node received the change indication and (ii) the secondary control node introduced the changes in the one or more additional data structures that are not stored in the shared memory; and deleting, by the primary control node, the previous given value from the shared memory.
摘要:
Managing a networked storage system having a host operable to connect through a network fabric to storage apparatus comprises: a configuration component for inputting a configuration change into the networked storage system responsive to change instructions; a monitoring component operable in communication with the host and the network fabric to monitor I/O activity associated with elements of the networked storage system; an activity data storage component responsive to the monitoring component for storing a record of a monitored I/O activity; an analysis component, responsive to the configuration component for inputting configuration changes, for analysing the record of a monitored I/O activity for a recent activity; and an alert component, responsive to the analysis component detecting a recent activity, for alerting the configuration component.
摘要:
According to the teaching disclosed herein there is provided at least a method, system and device for managing a cache memory of a storage system. The storage system is associated with at least one physical storage device and, responsive to a read request, comprising information indicative of a logical address of at least one requested data unit, to obtain a storage physical address associated with the logical address, search the cache memory for a data unit associated with the storage physical address and service the request from the cache in case the data unit is found in the cache memory.
摘要:
In accordance with one or more embodiments, an inode implemented file system may be utilized to support both offline and inline deduplication. When the first content is stored in the storage medium, one inode is used to associate a filename with the data blocks where the first content is stored. When a second content that is a duplicate of the first content is to be stored, then a parent inode is created to point to the data blocks in which a copy of the first content is stored. Further, two inodes are created, one representing the first content and the other representing the second content. Both inodes point to the same parent inode that points to the data blocks where the first content is stored.
摘要:
According to the teaching disclosed herein there is provided at least a method, system and device for managing a cache memory of a storage system. The storage system is associated with at least one physical storage device and, responsive to a read request, comprising information indicative of a logical address of at least one requested data unit, to obtain a storage physical address associated with the logical address, search the cache memory for a data unit associated with the storage physical address and service the request from the cache in case the data unit to is found in the cache memory.
摘要:
In accordance with one or more embodiments, an inode implemented file system may be utilized to support both offline and inline deduplication. When the first content is stored in the storage medium, one inode is used to associate a filename with the data blocks where the first content is stored. When a second content that is a duplicate of the first content is to be stored, then a parent inode is created to point to the data blocks in which a copy of the first content is stored. Further, two inodes are created, one representing the first content and the other representing the second content. Both inodes point to the same parent inode that points to the data blocks where the first content is stored.
摘要:
A shared key and a private key unique to one or more resource sets are generated. Each of the resource sets identifies the resource. The shared key and the private key are transmitted to a security access point. The security access point controls access to the resource. A resource key is generated. The resource key is a result of a cryptographic function of the private key and a resource identifier. The resource key and the shared key are transmitted to one or more local security managers. Each of the local security managers is assigned to manage one of the resource sets. In accordance with one or more policies, the local security managers generate a credential using the resource key and the shared key. The credential is distributed to one or more authenticated clients. Further, the credential is used to grant the one or more authenticated clients access to the resource sets through the security access point.