摘要:
Described are techniques for verifying host path detection. First information from a first data storage system is received indicating a first set of one or more hosts and, for each host in the first set, which one or more devices of a first device set of the first data storage system are accessible to said each host in the first set over one or more associated paths to the first data storage system. Second information and the first information are received at a second data storage system. First processing is performed at the second data system to determine whether each host included in the first information has successfully completed path detection with respect to a second device set for the second data storage system.
摘要:
Migrating data from an old storage device to a new storage device includes creating new paths to the new storage device, freezing old paths to the old storage device, transferring metadata corresponding to the old storage device to the new storage device, where state information is transferred from the old storage device to the new storage device, and thawing the new paths. Migrating data from an old storage device to a new storage device may also include creating new volumes on the new storage device and transferring data from the old storage device to the new storage device. Migrating data from an old storage device to a new storage device may also include dismantling the old paths.
摘要:
Described are techniques for migrating data from a source device of a source data storage system to a target device of a target data storage system. The target data storage system is configured to operate in accordance with a spoofing mode and a pass-through mode. A first set of commands from the host are processed for the target device when in the pass-through mode and the spoofing mode with respect to the target device. Data is migrated from the source device to the target device. The target data storage system is configured to operate in an echo mode for the target device and processes a second set of commands from the host when in the echo mode for the target device using information stored in the cache from processing the first set of commands.
摘要:
A system creates a storage area network (SAN) centric storage virtualization layer in front of storage devices. The system allows data mobility and migration without disruption to the one or more host servers attached to the SAN. Specifically, the host servers are not disrupted when switching I/Os between physical and virtual storage, for example, by taking advantage of WWPN spoofing and Fibre Channel VSAN technology. The use of VSANs effectively allow multiple virtual directors and/or switches to be created within a physical director and/or switches, each with their own separate name server, thereby providing complete isolation from one another. The host-storage pathing information is unchanged as the original physical storage port's WWPNs are spoofed by the virtual storage port. The result is two identical WWPNs within the SAN which is normally disallowed; however, by separating the physical port WWPN into one VSAN and the virtual port WWPN into another, the restriction may be circumvented.
摘要:
A technique migrates data from a source array to a target array while preserving SCSI reservation compliance. The technique involves providing an active-to-passive instruction to the source array while a first SCSI reservation enables hosts to access data on the source array using MPIO software. The active-to-passive instruction directs the source array to transition devices from active mode to passive mode and, upon receipt of a next SCSI instruction, output an indicator indicating that the first SCSI reservation has been cleared. The technique further involves transitioning devices of the target array from passive mode to active mode and beginning a data transfer operation which transfers data from the source array to the target array. The technique further involves automatically effectuating formation of a second SCSI reservation in place of the first SCSI reservation, the second SCSI reservation providing host access to the data on the target array using MPIO software.
摘要:
A technique migrates data from source arrays to target arrays. The array devices operate in either active mode, passive mode, or stalled-active mode. The technique involves providing active-to-passive instructions to transition the source devices from active to passive while a host initially accesses host data from the source arrays using MPIO software (the target devices being in stalled-active mode), and monitoring whether the source devices successfully transition to passive during a predefined time period. If so, the technique involves operating the target devices in active mode and transferring data from the source devices to the target devices to enable the host to access the host data from the target arrays using the MPIO software. However, if a source device remains passive, the technique involves providing passive-to-active instructions to transition the source devices back to active to enable the host to access the host data from the source arrays.
摘要:
On-line storage devices are migrated to new storage devices in a non-disruptive manner. A host executing multipath I/O software is initially coupled to a source storage device via at least one active path. The target storage device is configured with the source device's device identification information. The target storage device is coupled to the host via a passive path so that the target storage device can return its device identification information to the host but cannot respond to I/O read or I/O write requests from the host. All paths between the host and the source storage device are then disconnected. An on-line data migration session between the source storage device and the target storage device is then activated. The path between the target storage device and the host is then re-configured from passive to active so that the target storage device can respond to I/O read and I/O write requests.
摘要:
A method for processing a request from a host to write a database record to a target location on a logical device associated with a data-storage system in data communication with the host includes maintaining, at the data storage system, information identifying extents of the logical device that are designated for storage of database records, and, on the basis of the information, determining whether the target location is one on which a database record is permitted to be stored.
摘要:
Described are techniques for processing a data operation. A data operation is received at a data storage system. The data operation requests a modification of data stored in the data storage system. A first address is obtained that represents a starting address of the data operation. A calculation is performed representing a boundary condition of the starting address of the data operation. Based on the calculation, it is determined whether the data operation has a starting address which is properly aligned.
摘要:
Described are techniques for storage configuration. Defined are one or more initiator groups each including one or more initiator ports, one or more target groups each including one or more target ports, and one or more storage groups each including one or more devices. A masking view is created where the masking view includes a first of the initiator groups, a first of the target groups, and a first of the storage groups. The masking view indicates which devices of the first storage group are accessible using one or more paths. Each of the one or more paths is specified using an initiator port from the first initiator group and a target port from the first target group.