摘要:
Described are techniques for upgrading a driver. A driver is installed which includes an upgrade facility, a base driver and a first set of one or more driver extension modules for processing input/output operations for one or more devices. Processing is performed to upgrade the driver using the upgrade facility. The processing includes loading one or more upgrade modules associated with a second version of said driver and performing cutover processing for each of the one or more devices.
摘要:
Systems and methods are provided for disabling an array port in an enterprise storage system. In one embodiment, a system comprises a storage area network (SAN), a plurality of hosts, an array controller comprising a plurality of array ports, and a management server. The management server receives a request to disable an identified one of the plurality of array ports and identifies, from a configuration table stored in the management system server, one or more of the plurality of hosts having at least one path to the identified array port. The management server transmits an instruction to the one or more of the plurality of hosts to disable paths to the identified array port.
摘要:
A technique oversees a path between a multipathing driver of a host computer and a volume of a data storage array. The technique involves, while the multipathing driver of the host computer sends input/output requests (IOs) to the volume of the data storage array on the path, generating an IOs-Over-Period metric based on outcomes of the IOs, the IOs-Over-Period metric providing a measure of IOs per failure over a period of path operation. The technique further involves performing a comparison operation which compares the IOs-Over-Period metric to a predefined flaky path range having a predefined lower limit and a predefined upper limit. The technique further involves, after performing the comparison operation, outputting a detection signal indicating that the path is (i) flaky when the IOs-Over-Period metric falls within the predefined flaky path range and (ii) non-flaky when the IOs-Over-Period metric falls outside of the predefined flaky path range.
摘要:
Systems and methods are provided for selecting a path for an I/O in a storage area network. In one embodiment, a method comprises receiving path configuration information for paths associated with a host device connected to the storage area network, a listing of components within the storage area network, and a notification of a component failure within the storage area network. The method may also comprise correlating the received path configuration information, the received listing of components, and the received notification of component failure to determine one determine one or more paths associated with the host device affected by the component failure. The method may further comprise transmitting to the host device an alert for the one or more affected paths.
摘要:
Systems and methods are provided for selecting a path for an I/O in a storage area network. In one embodiment, a method comprises receiving path configuration information for paths associated with a host device connected to the storage area network, a listing of components within the storage area network, and a notification of a component failure within the storage area network. The method may also comprise correlating the received path configuration information, the received listing of components, and the received notification of component failure to determine one determine one or more paths associated with the host device affected by the component failure. The method may further comprise transmitting to the host device an alert for the one or more affected paths.
摘要:
Systems and methods are provided for selecting a path through which to send data in a host-based multi-path system. In one embodiment, a system includes a management server that determines a topology of the network and analyzes a plurality of paths for sending data through the network. The management server may also create a path quality index based on the topology and the analysis, the path quality index indicating a quality of individual paths within the plurality of paths. The system further includes a host that receives the path quality index from the management server and automatically selects, based on the path quality index, a path from the plurality of paths through which to send data.
摘要:
Systems and methods are provided for selecting a path for an I/O in a storage area network. In one embodiment, a method comprises receiving path configuration information for paths associated with a host device connected to the storage area network, a listing of components within the storage area network, and a notification of a component failure within the storage area network. The method may also comprise correlating the received path configuration information, the received listing of components, and the received notification of component failure to determine one or more paths associated with the host device affected by the component failure. The method may further comprise transmitting to the host device an alert for the one or more affected paths.
摘要:
Systems and methods are provided for disabling a device in an enterprise storage system. In one embodiment, a method comprises receiving information identifying a device in a storage area network that is scheduled for an outage. The method further determines one or more paths impacted by the outage of the device, generates a notification identifying the determined one or more paths, and transmits the notification to one or more hosts having paths to the device.
摘要:
Methods and apparatus for non-disruptive upgrade by redirecting I/O operations. With this arrangement, a driver upgrade does not require restarting an application. In one embodiment, a method includes installing on a computer a legacy upgrade module in a kernel having a legacy driver with first and second loadable extensions for handling input/output operations for applications to and from devices, retrieving and storing static configuration data from the legacy driver, transferring the stored static configuration data to a new driver, obtaining runtime device configuration data from the devices and transferring the runtime device configuration data to the new driver, and filtering device input/output operations such that prior to cutover input/output operations are directed by the LUM through device stacks for the legacy driver and after cutover input/output operations are directed to the new driver.
摘要:
A system shares encryption-related metadata between layers of a storage I/O stack. Additionally, a detection mechanism ensures that certain layers within the storage I/O stack are present and cooperate with a particular protocol. Along these lines, functional components engage in an in-band communications protocol, such as a data encryption key (DEK) management protocol. The in-band communications protocol employs protocol commands and responses carried along the data path as contents of in-band transport messages and responses, such as special SCSI read commands and their responses. The protocol commands and responses include a handshake command and a handshake response used during an initial handshake operation. Each protocol command and response has a protocol signature field carrying one of distinct first and second signature values which are used to identify the presence of the protocol command or response in the transport messages and responses at different locations along the data path.