摘要:
In a storage subsystem which is connected to an IP network, by excluding an improper packet, security is heightened, and a performance of communication to a logical unit of storage subsystem is maintained and secured. In the storage subsystem, a function which carries out filtering of a packet other than an iSCSI packet is provided. With respect to only the packet passed through the function, its accessibility to the logical unit is filtered. Also, traffic of all received packets, and a traffic lob of a packet judged to be discarded by the above filtering is recorded. By using this information, controlling such as a cut-off process of improper communication, QoS securement for normal communication and so on, are carried out.
摘要:
In case a fault has occurred in a volume, it was so far difficult to correctly notify a fault by using a host computer which can access the volumes managed by a management computer that integrally manages a plurality of devices constituting a network. The management program of the invention is executed by the management computer connected to computers and to a plurality of storage devices for managing the volumes connected to the computers through a SAN (storage area network). The management program executes a procedure for receiving a notice of fault in the volume from the storage devices, a procedure for receiving volume access control information from a plurality of storage devices for specifying the computers that can access the volumes, and a procedure for notifying the fault in the volume to the computers that are permitted to access the volumes based on the volume access control information.
摘要:
A storage system according to an embodiment of the present invention has a storage and a controller. The storage has an interface for connecting it to a storage of another storage system via a communication line, and a remote copy module transferring predetermined data to the another storage system, not via the controller, based on a data transfer command from the controller. The controller has a remote copy control module transmitting to the remote copy module, at reception of a notification of account attribute movement from an account monitor module monitoring the account attribute movement, a data transfer command for transferring predetermined data to the other storage system, not via the controller.
摘要:
In a storage subsystem which is connected to an IP network, by excluding an improper packet, security is heightened, and a performance of communication to a logical unit of a storage subsystem is maintained and secured. In the storage subsystem according to one embodiment, a function which carries out filtering of a packet other than an iSCSI packet is provided. With respect to only the packet passed through the function, its accessibility to the logical unit is filtered. Also, traffic of all received packets, and traffic of each packet sorted out by the two filtering functions are measured, and a traffic log of a packet judged to be discarded by the above filtering is recorded. By using this information, controlling such as a cut-off process of improper communication, QoS securement for normal communication and so on, are carried out.
摘要:
In case a fault has occurred in a volume, it was so far difficult to correctly notify a fault by using a host computer which can access the volumes managed by a management computer that integrally manages a plurality of devices constituting a network. The management program of the invention is executed by the management computer connected to computers and to a plurality of storage devices for managing the volumes connected to the computers through a SAN (storage area network). The management program executes a procedure for receiving a notice of fault in the volume from the storage devices, a procedure for receiving volume access control information from a plurality of storage devices for specifying the computers that can access the volumes, and a procedure for notifying the fault in the volume to the computers that are permitted to access the volumes based on the volume access control information.
摘要:
When a file server migrates from an existing file server to a new file server, data is allowed to migrate and setting information for a file system can migrate, too. At this time, data migration timing can be arbitrarily designated while a file sharing service is executed without stop and while securing system performance. A file migration program of the new file server is connected in a block level to a volume of the existing file server to acquire file sharing configuration and volume setting information of the existing file server. During the migration of the file server, a file read/write request from the file sharing access program of the host computer is executed for the volume through the block access program of the existing file server on the basis of file sharing configuration and volume setting information of the existing file server so acquired.
摘要:
A file server stores the storage management information and migration policy information. The storage management information includes the information that indicates a storage attribute for each storage apparatus. The migration policy information includes a plurality of information sets. Each of the information sets includes the information that indicates a condition of a file attribute and the information that indicates a condition of a storage attribute of a storage apparatus that is a migration destination. The file server specifies a migration target file, specifies a storage apparatus that conforms to the storage attribute condition that is indicated by the information set that includes the information that indicates a condition of a file attribute that conforms to of a file attribute of a target file based on the storage management information, and migrates a target file from a storage apparatus that has stored the target file to the storage apparatus that has been specified.
摘要:
An interface for controlling an inhibition of a recall is prepared for an application, and a judgment of necessity of a recall is informed of to a hierarchical storage before the application executes an access to a file.
摘要:
The present invention provides a log management system which is devised so that improper behavior by managers with regard to the log information can easily be discovered. Virtual OS are respectively installed for respective users in a file server that can also be constructed as an NAS device. These virtual OS function as virtual NAS. The virtual OS and manager OS can exchange information relating to log information via an information exchange part constructed as a kernel. The log information produced in the virtual OS is transmitted to a first log management device via a first communications network, and is also transmitted to a second log management device via a second communications network. The respective networks are separated. As a result of the same log information being managed by multiplex management using separate management devices, it can be detected whether or not there has been any improper behavior with respect to the log information.
摘要:
The present invention provides a log management system which is devised so that improper behavior by managers with regard to the log information can easily be discovered. Virtual OS are respectively installed for respective users in a file server that can also be constructed as an NAS device. These virtual OS function as virtual NAS. The virtual OS and manager OS can exchange information relating to log information via an information exchange part constructed as a kernel. The log information produced in the virtual OS is transmitted to a first log management device via a first communications network, and is also transmitted to a second log management device via a second communications network. The respective networks are separated. As a result of the same log information being managed by multiplex management using separate management devices, it can be detected whether or not there has been any improper behavior with respect to the log information.