摘要:
Described are techniques for caching. At a first point in time, a first set of data portions currently stored in a first cache of a first data storage system is determined. Each data portion of the first set is located on a first device of the first data storage system. Sent to a second data storage system is first information including information identifying a storage location on the first device for each data portion of the first set. The second data storage system includes a second device that is maintained as a mirror of the first device. The storage location for each data portion of the first set is used to identify a second storage location of the second device corresponding to the storage location. The first information is used to populate a second cache of the second data storage system.
摘要:
Described are techniques for storing first data to a logical data in accordance with a static policy to service reads using data stored in a first storage area. The logical device has its data stored on a first physical device that is mirrored on a second physical device. Each of the first and second physical devices include a first storage area and a second storage area. The first storage areas provide better performance than the second storage areas. The first data is stored at a first location in one of the first storage areas of one of the physical devices and at a second location in one of the second storage areas at the other of the first and the second physical devices. An operation to read the first data is serviced by accessing the first data stored in the first area of the one physical device.
摘要:
Techniques are described for processing a data operation that writes first data to a data portion currently stored on first physical storage of a first storage tier of a data storage system, including storage tiers each having a different performance ranking relative to other storage tiers. Second physical storage is allocated from one of the storage tiers for storing the first data written to the data portion. This one storage tier is selected independent of the first storage tier. The first data is stored in a cache and destaged from the cache to the second physical storage. A single merged copy of data for the data portion is formed. Based on an activity level of the data portion, a target tier is selected for storing the single merged copy of data for the data portion.
摘要:
A method, computer program product, and computing system for receiving an indication of a cold cache event within a storage system. The storage system includes a multi-tiered data array including at least a faster data tier and a slower data tier. A data list that identifies at least a portion of the data included within the faster data tier of the multi-tiered data array is obtained from the multi-tiered data array. At least a portion of the data identified within the data list is requested from the multi-tiered data array, thus defining the requested data. The requested data is received from the multi-tiered data array.
摘要:
Migrating data from an old storage device to a new storage device includes creating new paths to the new storage device, freezing old paths to the old storage device, transferring metadata corresponding to the old storage device to the new storage device, where state information is transferred from the old storage device to the new storage device, and thawing the new paths. Migrating data from an old storage device to a new storage device may also include creating new volumes on the new storage device and transferring data from the old storage device to the new storage device. Migrating data from an old storage device to a new storage device may also include dismantling the old paths.
摘要:
Methods and apparatus for eliminating the need for a complete synchronization due to failure of a data protection appliance in a continuous data protection system having a replication splitter. In one embodiment, a continuous data protection system includes a source side having a source side storage array with a splitter and a data protection appliance, where processing includes initiating a source side splitter session, initializing a first I/O tracking mechanism for the splitter session, and activating the splitter to a source side processing active state to continuously push I/O data from the source side to the target side.
摘要:
Described are techniques for storage configuration. Defined are one or more initiator groups each including one or more initiator ports, one or more target groups each including one or more target ports, and one or more storage groups each including one or more devices. A masking view is created where the masking view includes a first of the initiator groups, a first of the target groups, and a first of the storage groups. The masking view indicates which devices of the first storage group are accessible using one or more paths. Each of the one or more paths is specified using an initiator port from the first initiator group and a target port from the first target group.
摘要:
A method for processing a write instruction for writing data to a database stored on a logical device includes obtaining first and second addresses that specify the location of the data in respective first and second address spaces. A third address corresponding to an expected location of the data record in the first address space is then calculated. On the basis of a comparison between the first address and the third address, a determination is made as to whether to execute the write instruction.
摘要:
Described are techniques for verifying host path detection. First information from a first data storage system is received indicating a first set of one or more hosts and, for each host in the first set, which one or more devices of a first device set of the first data storage system are accessible to said each host in the first set over one or more associated paths to the first data storage system. Second information and the first information are received at a second data storage system. First processing is performed at the second data system to determine whether each host included in the first information has successfully completed path detection with respect to a second device set for the second data storage system.
摘要:
Described are techniques for indicating a state associated with a device. A request is received over a path for information about a device. A response to the request is sent. The response indicates a state regarding the device on the path. The response has a response status of good and a payload of a varying size. The payload is truncated at a location prior to that at which a device identifier for the device is expected. In accordance with the response, a state regarding the device on the path is determined.