摘要:
An apparatus, system, and method are disclosed for facilitating copy protection. The apparatus includes a definition module, a request module, and a determination module, each coupled to a first storage sub-system. The definition module is configured to define a protection definition for a plurality of electronic storage devices of the first storage sub-system. The request module is configured to receive a copy request from a second storage sub-system. The determination module is configured to determine at the first storage sub-system a copy protection status of a destination device. The copy protection status may be indicated by the protection definition, which includes a protection indicator and may include one or more restriction indicators. The apparatus advantageously allows a user to protect a selected destination device against accidental or otherwise detrimental copying.
摘要:
Provided are a computer program product, system and method for a redundant key server encryption environment. A key server receives from at least one remote key server public keys associated with the at least one remote key server. The key server receives a request for an encryption key from a requesting device and generates the encryption key for use by the requesting device to unlock a storage. The key server generates a first wrapped encryption key by encrypting the encryption key with a requesting device public key, a second wrapped encryption key by encrypting the encryption key with a public key associated with the key server, and at least one additional wrapped encryption key by encrypting the encryption key with the at least one public key provided by the at least one remote key server. The key server transmits the generated keys to the requesting device.
摘要:
A method to adjust a multi-path device reservation by supplying a computing device and a storage controller interconnected with a communication link. The method further reserves a data storage device in communication with the storage controller, where that data storage device reservation is held by a first communication path group comprising a first plurality of communication paths configured in the communication link. If the method detects a failed communication path configured in the first communication path group, the method configures a second communication path group by removing the failed communication path from the first communication path group, wherein the second communication path group maintains the data storage device reservation.
摘要:
A computational device receives input information on characteristics of customer data, critical metadata, and non-critical metadata, and characteristics of disk array configurations, wherein customer data is to be stored encrypted, wherein critical metadata is to be stored non-encrypted, and wherein non-critical metadata is to be stored encrypted or non-encrypted. The computational device determines band boundary information based on the received input information. Encrypting disks with pre-established bands are created based on the band boundary information and the encrypting disks are pre-initialized.
摘要:
A licensing application implemented in a computational device receives a request to enable a feature for a logical volume of a plurality of logical volumes controlled by the computational device, wherein each feature of a plurality of features is configurable to be enabled or disabled for one or more logical volumes of the plurality of logical volumes. The licensing application determines, whether enabling the feature for the logical volume causes a licensed capacity limit for the feature to be exceeded. Enabling the feature for the logical volume is avoided, in response to determining that enabling the feature for the logical volume causes the licensed capacity limit for the feature to be exceeded.
摘要:
Provided is a method for configuring volumes in a storage system. Information is provided on a plurality of storage device groups, wherein each storage group includes storage devices having common storage device attributes. Selection is received of at least one storage device group and an array type. An array is configured as the selected array type using storage devices included in the at least one selected storage group. Configured arrays are assigned to extent pools. A plurality of extents are configured in the extent pools, wherein each extent in one extent pool comprises a portion of one array assigned to the extent pool. A volume is configured to include at least one extent from one extent pool.
摘要:
Provided are a method, system, and program for reassigning storage volumes from a failed processing system to a surviving processing system. A first processing system detects a failure of a second processing system. The first processing system determines device groups of storage devices managed by the failed second processing system and determines for each determined device group, hosts that connect to storage devices in the device group. The first processing system sends, for each device group, a unit check to each determined host indicating failure of each device group through one storage device in the device group to which the determined host connects. The determined hosts execute instructions to terminate any I/O operations in progress on the storage devices in the device group in response to the unit check indicating failure of one storage device in the device group and issue, a command to one storage device for the device group to end the busy condition.
摘要:
Provided are a method, system, and program for reassigning storage volumes from a failed processing system to a surviving processing system. A first processing system detects a failure of a second processing system. The first processing system determines device groups of storage devices managed by the failed second processing system and determines for each determined device group, hosts that connect to storage devices in the device group. The first processing system sends, for each device group, a unit check to each determined host indicating failure of each device group through one storage device in the device group to which the determined host connects. The determined hosts execute instructions to terminate any I/O operations in progress on the storage devices in the device group in response to the unit check indicating failure of one storage device in the device group and issue, a command to one storage device for the device group to end the busy condition.
摘要:
Processor(s) operating a random access memory is subject to reboot processing which comprises clearing the random access memory. Registration is provided of a portion of the random access memory, the registration indicating that data stored in the registered portion of the random access memory is to be preserved during the reboot processing. In reboot processing, the processor responds to the registration, preventing data stored in the registered portion from clearing during the reboot processing.
摘要:
A method, system, and computer program product for safeguarding nonvolatile storage (NVS) data by a processor in communication with a memory device following a power loss event is provided. A first portion of the NVS data is encrypted using a first buffer module. Subsequently the first portion of the NVS data is transferred to at least one shared storage device, while a second portion of the NVS data is simultaneously encrypted using a second buffer module. The second portion of the NVS data is subsequently transferred to the at least one shared storage device.