摘要:
A method, computer program product, and computing system for comparing at least one performance benchmark to at least one performance indicator for a front end LUN. If the at least one performance indicator exceeds the at least one performance benchmark, the failure domain of the front end LUN is reduced. If the at least one performance indicator does not exceed the performance benchmark, the failure domain of the front end LUN is increased.
摘要:
A method is used in sizing volatile memory (VM) cache based on flash-based cache usage. A user selection for a flash-based cache is received. Based on the selection, configuration and sizing factors are provided, by a flash based cache driver, to VM cache size determination logic. Based on the configuration and sizing factors and a sizing formula and rules, a requested VM cache size is produced by the VM cache size determination logic. Based on the requested VM cache size, the VM cache is caused, via VM cache resizing logic, to be resized to the requested VM cache size.
摘要:
A data processing system stores encrypted data. Object identifiers are assigned to storage objects, and data encryption keys are assigned to the storage objects. When performing an operation upon a storage object, data encryption key failure may occur due to a corrupt or incorrect key. In this case, a copy of the data encryption key is fetched from a key server. It is possible for the association of the object identifiers with the data encryption keys to become lost or confused, so that the key server may fail to provide the correct key for a specified object identifier. Therefore, an absolute key identifier that is unique across the key server namespace also is stored in association with the object identifier in the storage system and in the key store of the key server, and the absolute key identifier is used as a failsafe for recovery of encrypted data.
摘要:
A method is provided for effectively managing encryption keys. A storage processor requests a key associated with a particular object ID associated with a particular device address range from a key server. The key server provides a unique key associated with the object ID. Old keys may be deleted either upon a determination by the storage processor that the key is no longer needed, or upon a signal from the key server indicating that the key is to be deleted. In either case, the storage processor deletes the key from all locations in memory and sends a confirmation signal to the key server. The key server then lists the key as disabled for possible future re-use. Embodiments are also directed to apparatus for use in practicing the method.
摘要:
An arrangement of a plurality of disk drives having a interconnect control card and a plurality of disk drive carriers. The interconnect control card includes a plurality of serial interconnects; each one of the serial interconnects comprising a plurality of serially connected switches. Each one of such disk drive carriers has thereon a different portion of the plurality disk drives. The disk drives on each one of the carriers are connected to the switches in a different one of the plurality of serial interconnects. The disk drives on different ones of the carriers provide a RAID group.
摘要:
A method is used in managing storage operations in a data storage environment. An I/O request is received a server having a server cache where the server cache contains cached data previously supplied from a storage system in communication with the server. At the storage system, determine if the I/O request can be at least partially satisfied from the cached data.
摘要:
A system including an enterprise data storage system having a plurality of multi-level cell (MLC) flash devices configured as data storage drives. The enterprise data storage system is operated in such a way and the configuration of the MLC flash devices is such that the enterprise data storage system is able to maintain a performance level comparable to that of an enterprise data storage system utilizing single-level cell (SLC) flash devices.
摘要:
An electronic encryption endpoint device includes a management interface, a storage device interface and a controller. The management interface is capable of operating as a control interface (e.g., connecting to an array controller). The storage device interface is arranged to communicate with a set of storage devices. The controller is arranged to (i) receive a key encryption key through the management interface, (ii) decrypt a portion of a key table entry of a key table using the key encryption key to extract a data encryption key from the portion of the key table entry, the data encryption key being initially encrypted within the portion of the key table entry prior to decrypting the portion of the key table entry, and (iii) encrypt data using the data encryption key and store the encrypted data in the set of storage devices through the storage device interface.
摘要:
A disk drive management system includes a data storage device including an array of disk drives and a host computer for controlling the operation of the data storage device. The array of disk drives includes an operational drive pool including a number of online disk drives having data written to and read from by the host computer; a spares drive pool including a number of disk drives that are configured to be included in the operational drive group, but are offline while in the spares group; and a maintenance drive pool including a maintenance manager for testing faulty disk drives from the operational drive pool. When a faulty drive is transitioned from the operational drive pool upon the occurrence of a particular error, a disk drive from the spares drive pool is transitioned to the operational drive pool to take the place of the faulty drive.
摘要:
By placing an encryption function below a RAID function and requiring independence of encryption functionality along the same boundaries of data member independence of the RAID function, failures of the encryption and key management for individual encryption functions can be recovered with the same data rebuild mechanism as the RAID function. For example, in a RAID set of disk drives, each data partition and each parity partition has a respective data encryption key for storing encrypted data or encrypted parity in the partition, and a LUN or logical volume is mapped to a stripe of data partitions and an associated parity partition across the RAID set so that the data rebuild mechanism of the RAID function may recover from a loss of a single data encryption key without compromising security of the LUN or logical volume.