摘要:
To migrate a configuration that an old storage device has to a new storage device. A new storage device obtains a configuration of an old storage device, by using a migration manager, and prepares a logical volume definition of the new storage device based on a logical volume definition in the configuration. Also, based a cache allocation definition in the configuration and cache capacity of the new storage device, a cache allocation definition of the new storage device is prepared. Further, based on a port bandwidth allocation definition in the configuration and bandwidth capacity of a port of the new storage device, a port bandwidth allocation definition of the new storage device is prepared. The prepared logical volume definition, cache allocation definition and port bandwidth allocation definition are set up in a configuration of the new storage device.
摘要:
To migrate a configuration that an old storage device has to a new storage device. A new storage device obtains a configuration of an old storage device, by using a migration manager, and prepares a logical volume definition of the new storage device based on a logical volume definition in the configuration. Also, based a cache allocation definition in the configuration and cache capacity of the new storage device, a cache allocation definition of the new storage device is prepared. Further, based on a port bandwidth allocation definition in the configuration and bandwidth capacity of a port of the new storage device, a port bandwidth allocation definition of the new storage device is prepared. The prepared logical volume definition, cache allocation definition and port bandwidth allocation definition are set up in a configuration of the new storage device.
摘要:
The Computer System consists of components including more than one Computer and Storage Subsystem to which more than one Computer are connected. The Storage Subsystem is equipped with more than one Storage Unit, Management Table registering information to manage Storage Units accessible by each of the Computers and Controller to control accesses by more than one Computer to more than one Storage Unit. The controller controls the accesses according to the information set in the Management Table when the Storage Unit is accessed by the Computer.
摘要:
To migrate a configuration that an old storage device has to a new storage device.A new storage device 4000 obtains a configuration of an old storage device 5000, by using a migration manager PG 4345, and prepares a logical volume definition of the new storage device 4000 on the basis of a logical volume definition which is included in the configuration. Also, on the basis of a cache allocation definition included in the configuration of the old storage device 5000 and cache capacity of the new storage device 4000, a cache allocation definition of the new storage device 4000 is prepared. Also, on the basis of a port bandwidth allocation definition included in the configuration of the old storage device 5000 and bandwidth capacity of a port of the new storage device 4000, a port bandwidth allocation definition of the new storage device 4000 is prepared. And, the logical volume definition, the cache allocation definition and the port bandwidth allocation definition which were prepared as above are set up in a configuration of the new storage device 4000.
摘要:
The Computer System consists of components including more than one Computer and Storage Subsystem to which more than one Computer are connected. The Storage Subsystem is equipped with more than one Storage Unit, Management Table registering information to manage Storage Units accessible by each of the Computers and Controller to control accesses by more than one Computer to more than one Storage Unit. The controller controls the accesses according to the information set in the Management Table when the Storage Unit is accessed by the Computer.
摘要:
A management computer collects, from a storage subsystem via a management network, path definition information including the contents of a security setting made to a path accessible to a volume in the storage subsystem, and when the volume in the storage subsystem is an original volume having a replica volume, replica definition information of the original volume. Based on the replica configuration information thus collected from the storage subsystem, the replica relationship between the volumes is to be grasped. Then, based on the path definition information also collected from the storage subsystem, the contents of the path security setting are verified for the volumes under the same replica relationship, and the verification result is output. In such a structure, consistency verification can be easily done for the security setting of the original and replica volumes.
摘要:
The Computer System consists of components including more than one Computer and Storage Subsystem to which more than one Computer are connected. The Storage Subsystem is equipped with more than one Storage Unit, Management Table registering information to manage Storage Units accessible by each of the Computers and Controller to control accesses by more than one Computer to more than one Storage Unit. The controller controls the accesses according to the information set in the Management Table when the Storage Unit is accessed by the Computer.
摘要:
The Computer System consists of components including more than one Computer and Storage Subsystem to which more than one Computer are connected. The Storage Subsystem is equipped with more than one Storage Unit, Management Table registering information to manage Storage Units accessible by each of the Computers and Controller to control accesses by more than one Computer to more than one Storage Unit. The controller controls the accesses according to the information set in the Management Table when the Storage Unit is accessed by the Computer.
摘要:
A management computer collects, from a storage subsystem via a management network, path definition information including the contents of a security setting made to a path accessible to a volume in the storage subsystem, and when the volume in the storage subsystem is an original volume having a replica volume, replica definition information of the original volume. Based on the replica configuration information thus collected from the storage subsystem, the replica relationship between the volumes is to be grasped. Then, based on the path definition information also collected from the storage subsystem, the contents of the path security setting are verified for the volumes under the same replica relationship, and the verification result is output. In such a structure, consistency verification can be easily done for the security setting of the original and replica volumes.
摘要:
A management computer collects, from a storage subsystem via a management network, path definition information including the contents of a security setting made to a path accessible to a volume in the storage subsystem, and when the volume in the storage subsystem is an original volume having a replica volume, replica definition information of the original volume. Based on the replica configuration information thus collected from the storage subsystem, the replica relationship between the volumes is to be grasped. Then, based on the path definition information also collected from the storage subsystem, the contents of the path security setting are verified for the volumes under the same replica relationship, and the verification result is output. In such a structure, consistency verification can be easily done for the security setting of the original and replica volumes.