摘要:
A method for automatically identifying available storage components within a storage system, which are appropriate for storing consumer data in compliance with specified service level objectives (SLOs), including discovering available storage components; identifying and assigning service levels provided by each available storage component, wherein identifying and assigning service levels provided by each available storage component, includes classifying the available storage components based on their type of technology, and determining the SLO relevant capabilities of the available storage components; and storing resultant mapping of service levels to available storage components in a metadata repository.
摘要:
A method for automatically identifying available storage components within a storage system, which are appropriate for storing consumer data in compliance with specified service level objectives (SLOs), including discovering available storage components; identifying and assigning service levels provided by each available storage component, wherein identifying and assigning service levels provided by each available storage component, includes classifying the available storage components based on their type of technology, and determining the SLO relevant capabilities of the available storage components; and storing resultant mapping of service levels to available storage components in a metadata repository.
摘要:
With the present invention means are provided for automatically managing a storage infrastructure with a plurality of storage components in compliance with consumer service level objectives (SLOs). Therefore, the claimed method comprises: automated identification of available storage components, which are appropriate for storing consumer data under consideration of specified service level objectives (SLOs); automated mapping of said consumer SLO policies to said available storage components to select available storage components for specified data classes; and automated configuration of said selected storage components according to said mapping of consumer SLO policies.
摘要:
A method, computer readable storage medium and computer system for controlling the allocation of data to one of a plurality of storage units of a storage system, the method comprising: accessing a source storage unit comprising the data; gathering file system level (FS-level) metadata from the source storage unit; analyzing the gathered FS-level metadata for determining if the data should be moved to one of the other storage units, said other storage unit acting as a destination storage unit; and in case the data should be moved, displaying an indication of the destination storage unit and/or automatically moving the data to the determined destination storage unit.
摘要:
A method, computer readable storage medium and computer system for controlling the allocation of data to one of a plurality of storage units of a storage system, the method comprising: accessing a source storage unit comprising the data; gathering file system level (FS-level) metadata from the source storage unit; analyzing the gathered FS-level metadata for determining if the data should be moved to one of the other storage units, said other storage unit acting as a destination storage unit; and in case the data should be moved, displaying an indication of the destination storage unit and/or automatically moving the data to the determined destination storage unit.
摘要:
One disclosed aspect of the present invention includes authentication and user account automation within a compute cluster for each cluster node that requires password or other credential administration. For example, a storage appliance computing system may rely on a plurality of subsystems (such as databases, storage management software, and application servers) that each have internal user accounts with associated passwords and credential keys that need to be changed at frequent intervals. Rather than requiring an administrator to manually manage all of these accounts, the presently described invention includes techniques and an authentication manager component to automatically manage, update, and refresh authentication information as required. Further, the authentication manager component may be used to perform and propagate automatic credential changes such as new sets of SSH keys or updated passwords as required within a computing system, and respond to new nodes or out-of-sync credentialing scenarios.
摘要:
Provided are a system, method, and program for grouping backup objects stored in backup storage. A backup group is created and a plurality of backup objects are added as members of the backup group in separate backup transactions. The backup objects added to the backup group are stored to backup storage.
摘要:
An identity of a user performing an operation with respect to an application is propagated, from a point at which the user authenticates, to one or more other applications in a multi-product environment. The application may be a management console associated with an information cluster. In an embodiment, an administrator logs on to a management console (using an identity) and invokes a management operation. The management console then performs a programmatic remote access login (e.g., using SSH/RXA) to one or more nodes using a system account, invokes an application, and passes in the identity. As the application performs one or more management operations, audit events are logged, and these events each contain the identity that has been passed in by the management console during the SSH/RXA login. The technique thus provides a method for identity-based auditing in an environment having a plurality of applications, where each application typically has a respective authentication process or mechanism and distinct identity registries.
摘要:
An identity of a user performing an operation with respect to an application is propagated, from a point at which the user authenticates, to one or more other applications in a multi-product environment. The application may be a management console associated with an information cluster. In an embodiment, an administrator logs on to a management console (using an identity) and invokes a management operation. The management console then performs a programmatic remote access login (e.g., using SSH/RXA) to one or more nodes using a system account, invokes an application, and passes in the identity. As the application performs one or more management operations, audit events are logged, and these events each contain the identity that has been passed in by the management console during the SSH/RXA login. The technique thus provides a method for identity-based auditing in an environment having a plurality of applications, where each application typically has a respective authentication process or mechanism and distinct identity registries.
摘要:
An apparatus, system, and method are disclosed for analyzing a file system. A record module records file parameters comprising a file size, a file age, a time of last access, a file type, a recovery time objective, and an initial access time service level objective for each file in the file system. A file score module calculates a file score for each file using the file parameters. A system score module calculates the file system score as the sum of the normalized file scores. A process module processes the file system if the file system score exceeds a specified threshold.