摘要:
An improved technique for processing IO requests has been described that distinguishes bogus IOs from genuine IO request failures by accessing a hardware configuration record that associates available paths with hardware components at different hardware layers traversed by the paths. When an IO request fails down a first path, a second path is selected for retrying the IO request by accessing the hardware configuration record and identifying a path that the record indicates traverses hardware components that are different from those traversed by the first path at multiple hardware layers. The chance that an IO request will fail due to faulty hardware over both the first path and the second path is thus low, such that IO failures down both the first path and the second path provide a clear indication that the IO request is bogus.
摘要:
Described are techniques for upgrading a driver. A driver is installed which includes an upgrade facility, a base driver and a first set of one or more driver extension modules for processing input/output operations for one or more devices. Processing is performed to upgrade the driver using the upgrade facility. The processing includes loading one or more upgrade modules associated with a second version of said driver and performing cutover processing for each of the one or more devices.
摘要:
A data migration operation uses an error flag to protect against data corruption. During write cloning states, the error flag is set and only allowed state transitions are performed, including a non-error transition to a committed state when no device fault is recorded for a target storage device and an error transition to a setup state when a device fault is recorded for the target storage device. In a clean system shutdown, a shutdown procedure records a detected target storage device fault and clears the error flag; the recorded device fault later forces the error transition of the migration operation. During the system startup, if the error flag is set then a target storage device fault is recorded to likewise later force the error transition of the migration operation, on the assumption that a detected fault may exist but be unrecorded because the shutdown procedure did not complete during shutdown.
摘要:
Embodiments of the present disclosure relate to a system, a computer program product and a method for synchronizing data between a source disk and a target disk in a cluster by performing synchronization between a source disk and a target disk, the synchronization being performed while a plurality of application I/Os on a plurality of nodes in a cluster are configured to access the source disk; and wherein a coordinator and a plurality of workers in the cluster are configured to manage copying data from the source disk to the target disk.
摘要:
A computer implemented method for creating an encrypted logical unit is provided. A first identification number is received, the first identification number associated with a first encryption key used to encrypt a first logical unit. The first identification number and the first encryption key are stored at a first secure location, where the first secure location provides the first encryption key to a requester in response to receiving the first identification number from the requester, assuming the requester provides security credentials. A first metadata storage space is defined on the first logical unit, the first metadata storage space comprising a region on the first logical unit that remains unencrypted. The first identification number is stored in the first metadata storage space on the first logical unit.