摘要:
When configuring volume allocation on a storage device, it is confirmed that design information on the volume allocation is in compliance with an operational policy of a system and there is no mistake in design so as to configure the volume allocation on the storage device in the case where there is no problem. A computer system including: a host computer 2; a storage device 3 for providing a volume to the host computer 2 via a one network 5; and a management computer 1 connected to the storage device 3 via a network 6, wherein when a storage manager configures volume allocation of the storage device 3, the management computer 1 gathers configuration information on the volume allocation from the storage device 3 and makes a comparison between design information on the volume allocation to be configured on the storage device 3 inputted by the storage manager and the gathered configuration information on the volume allocation so as to identify changes.
摘要:
A computer system to prevent intervention and falsification by setting encrypted transfer between a host computer and a first storage device that provides a virtual volume and between the first storage device and second and third storage devices that provide a real volume corresponding to the virtual volume. A management computer specifies the second and third storage device that provide the real volume corresponding to the virtual volume by providing a volume corresponding to the virtual volume used by a host computer in which encrypted transfer becomes necessary, and setting the encrypted transfer to communication between the first storage device and the second and third storage devices, makes a reconnection thereof, and also sets the encrypted transfer to an I/O port used for the communication with the host computer in the first storage device.
摘要:
A computer system to prevent intervention and falsification by setting encrypted transfer between a host computer and a first storage device that provides a virtual volume and between the first storage device and second and third storage devices that provide a real volume corresponding to the virtual volume. A management computer specifies the second and third storage device that provide the real volume corresponding to the virtual volume by providing a volume corresponding to the virtual volume used by a host computer in which encrypted transfer becomes necessary, and setting the encrypted transfer to communication between the first storage device and the second and third storage devices, makes a reconnection thereof, and also sets the encrypted transfer to an I/O port used for the communication with the host computer in the first storage device.
摘要:
Disclosed is to prevent an intervention and falsification by setting encrypted transfer between a host computer and a storage device that provides a virtual volume and between the storage device that provides the virtual volume and a storage device that provides a real volume corresponding to the virtual volume. A management computer 1 specifies storage devices 3b and 3c that provide a real volume corresponding to a virtual volume by providing a volume corresponding to the virtual volume used by a host computer 3 in which encrypted transfer becomes necessary, sets the encrypted transfer to communication between a storage device 3a that provides the virtual volume and the specified storage devices 3b and 3c that provide the real volume corresponding to the virtual volume, makes a reconnection thereof, and also sets the encrypted transfer to an I/O port used for the communication with the host computer 2 in the storage device 3a that provides the virtual volume.
摘要:
Before transferring a file, a CPU executes the following processing based on a transfer processing program: obtaining the directory tree structure of a transfer-source storage device; dividing the directory tree into directory trees so that each divided directory tree is structured within the full path length of a directory tree that can be handled by a transfer-destination storage device; associating the divided directory trees with each other; and then storing the associated directory trees in a volume of the transfer-destination storage device.
摘要:
Either a controller in a storage system, or a management computer monitors a bandwidth used in each I/O port in the storage system, and a bandwidth used by each host computer connected to each I/O port, and redirects a host computer using a bandwidth close to a difference in bandwidth used in the I/O ports, from the I/O port where a maximum bandwidth is used to the I/O port where a minimum bandwidth is used.
摘要:
Before transferring a file, a CPU executes the following processing based on a transfer processing program: obtaining the directory tree structure of a transfer-source storage device; dividing the directory tree into directory trees so that each divided directory tree is structured within the full path length of a directory tree that can be handled by a transfer-destination storage device; associating the divided directory trees with each other; and then storing the associated directory trees in a volume of the transfer-destination storage device.
摘要:
Either a controller in a storage system, or a management computer monitors a bandwidth used in each I/O port in the storage system, and a bandwidth used by each host computer connected to each I/O port, and redirects a host computer using a bandwidth close to a difference in bandwidth used in the I/O ports, from the I/O port where a maximum bandwidth is used to the I/O port where a minimum bandwidth is used.
摘要:
Provided is a priority control method for controlling a priority of data transmission in a computer system including a storage system that has a plurality of volumes, a host computer that uses the volumes, a management computer that sets a priority of data transmission between each volume and the host computer, and a network that is composed of a network device controls the priority of data transmission and provides a connection path between the storage system and the host computer. Executed in the method are a first step of obtaining from the storage system information on a first priority assigned to each volume in the storage system and a capacity of a cache memory allocated to each volume, a second step of determining a second priority of the volume on the connection path through the network by referring the obtained information, a third step of notifying the host computer of the determined second priority, a fourth step of obtaining identification of the connection path corresponding to the determined second priority of the volume, and a fifth step of setting the obtained identification to the network device.
摘要:
Storage groups are generated using group information previously set to a switch 3. In a group information acquisition step, group information, which is previously set to the switch 3 and relates to computers 4 and storage devices 5, is acquired from the switch 3, and the acquired group information is stored in a storing means 16. In a node information acquisition step, node information required for connecting to a network is acquired from each of the computers 4 and the storage devices 5, and acquired node information is stored in the storing means 16. In a group generation step, the storage groups are generated based on the group information stored in the storing means 16. And, in a registration step, the generated storage groups and the node information stored in the storing means 16 are registered at a storage name solving server 2.