摘要:
In an embodiment, a method to provide data consistency in a storage system, includes: providing, by a server to a proxy cache, a lock associated with a delegated file in the server; in response to a write request from a client, modifying data in a cached copy of the delegated file in the proxy cache; revoking, by the server, the lock associated with the delegated file, in response to a request from another device to access the delegated file so that the delegated file is now a formerly delegated file; and writing the modified data to the formerly delegated file in the server to update the formerly delegated file; and permitting access to the formerly delegated file by the another device.
摘要:
Files or directories in a persistent image such as a file system backup structure are hidden from general access by establishing a data set used by the file system when accessing the persistent image. The data set indicates a visibility status of the files or directories in the persistent image. Requests to the file system for access to the image are filtered through the data set to prevent unintentionally revealed information in the image from being generally available. Commands to add and remove entries in the data set are provided. The data set may be composed of combinations of lists, in which list entries indicate a hidden file or directory, or indicate a visible file or directory. The data set is maintained in system memory and updated on disk to permit restoration of the data set when a volume is mounted or during recovery from a system crash. Information that was unintentionally revealed in the active file system while a backup was being made can be obscured retroactively to provide protection from general access to improve information security in the file system.
摘要:
Method and system for processing client provisioning and migration requests is provided. The process evaluates a provisioning request and selects a storage that best meets the client requirements. The process determines if non-disruptive migration is possible and if it is possible then the storage is automatically configured for non-disruptive migration. Once the storage is provisioned and configured, the process receives a migration request to migrate information from the storage. The process determines an access protocol used by the client to access the storage. The process determines if a storage system that manages the storage is capable of supporting non-disruptive migration of information from the storage. If the storage system is capable, then a migration technique is automatically selected for migrating the information from the storage.
摘要:
Files or directories in a persistent image such as a file system backup structure are hidden from general access by establishing a data set used by the file system when accessing the persistent image. The data set indicates a visibility status of the files or directories in the persistent image. Requests to the file system for access to the image are filtered through the data set to prevent unintentionally revealed information in the image from being generally available. Commands to add and remove entries in the data set are provided. The data set may be composed of combinations of lists, in which list entries indicate a hidden file or directory, or indicate a visible file or directory. The data set is maintained in system memory and updated on disk to permit restoration of the data set when a volume is mounted or during recovery from a system crash. Information that was unintentionally revealed in the active file system while a backup was being made can be obscured retroactively to provide protection from general access to improve information security in the file system.