摘要:
Provided are a method, system, and article of manufacture, wherein a plurality of processing nodes in a storage system are partitioned into a plurality of logical processing units, and wherein the plurality of logical processing units can respond to I/O requests from a host coupled to the storage system. At least two logical processing units are grouped, wherein data in a first storage coupled to a first logical processing unit of the least two logical processing units is mirrored by data in a second storage coupled to the second logical processing unit of the at least two logical processing units. In response to a failure of the first logical processing unit, an I/O request from the host is responded to via the second logical processing unit.
摘要:
Provided are a method, system, and program for storing and using metadata in multiple storage location. Signature data is stored in a system storage indicating a plurality of metadata copy locations, each locating identifying a storage device and a copy location within the storage device. Each location contains one copy of the metadata, wherein the metadata includes system configuration information. A copy of the signature data is stored with each copy of the metadata.
摘要:
A method to control access to logical volumes disposed in an information storage and retrieval system using parallel access volumes. The method provides an information storage and retrieval system comprising a plurality of logical volumes, and a plurality of host computers, where each host computers is capable of communicating with the information storage and retrieval system. The method creates a parallel access volume having an alias, and persistently associates that parallel access volume with an original base logical volume, where the original base logical volume may be assigned to one of (N) logical volume groups. If the original base logical volume is assigned to the (i)th logical volume group, the method permits each host computers assigned to the (i)th host computer group to access the original base logical volume, or the current base logical volume, associated with the parallel access volume.
摘要:
An apparatus, system, and method are disclosed for concurrently relocating a RAID array. The apparatus includes an identification module, a designation module, and an implementation module. The identification module identifies an availability of a physical device within a donor arrayed storage device to offload a source drive of a relocation enclosure. The designation module designates an available physical device as a target drive and thereby designate the target drive and the source drive as a linked pair;. The implementation module implements a mirroring relationship between the target drive and the source drive. The apparatus, system, and method provide a dynamic relocation of the raid array, minimizing system downtime and maximizing efficient utilization of system resources.
摘要:
A feature key is provided to enable a specific feature in a target system, such as an IBM® Enterprise Storage Server®. The key includes fields identifying at least a portion of a serial number of the target system, identifying the feature on the target system to be enabled, and identifying a quantity associated with the feature to be enabled. Including the serial number ensures that the feature key will enable the feature on only the designated system and including the quantity ensures that only the quantity (of storage space, for example) paid for by the customer will be enabled. Additional fields may also be included identifying a storage architecture on which the feature is to be enabled, identifying a machine on which the feature is to be enabled, and identifying a sequence of prior feature keys generated for the feature on the target system. Preferably, the key is encrypted with an algorithm which uses at least a portion of the serial number of the target system, thereby ensuring that the feature key may be decrypted only by the target system.
摘要:
A RAID system employs a storage controller, a primary storage array having a plurality of primary storage units, and a spare storage pool having one or more spare storage units. A method of operating the storage controller in managing the primary storage array and the spare storage pool involves a testing by the storage controller of at least one repair service threshold representative of one or more operational conditions indicative of a necessity to repair at least one of the primary storage array and the spare storage unit, and a selective initiation by the storage controller of a repair service action for repairing one of the primary storage array and the spare storage unit based on the testing of the at least one repair service threshold.
摘要:
Provided are a method, system, and program for copying tracks between a primary controller and secondary controller. A track is received from the primary controller that is part of a copy job comprising a sequence of tracks to copy along with a sequence number of the received track and a context number identifying computational resources in the primary controller used to transmit the track, sequence number, and context number. The context number and sequence number transmitted with the track are used to determine if a track preceding the received track was written to storage. The secondary-controller writes the received track to storage if the track preceding the received track was written to storage.
摘要:
A method to control access to logical volumes disposed in one or more information storage and retrieval systems when using copy service relationships. The method provides a first information storage and retrieval system, a second information storage and retrieval system, and a plurality of host computers capable of communicating with the first information storage and retrieval system. The method forms (N) host computer group, and assigns each of the plurality of host computers to the a host computer group. The method forms (N) logical volume groups, and assigns one or more of the plurality of first logical volumes to a logical volume group. The method receives a request from a host computer assigned to the (i)th host computer group to establish a copy service relationship between a source logical volume and a target logical volume. The method determines if both the source and target logical volumes are assigned to the (i)th logical volume group. If both the source and target logical volumes are assigned to the (i)th logical volume group, then the method establishes the requested copy service relationship.
摘要:
A log-in resource release system includes a set of lists for managing log-in requests to a processing cluster input/output port from host server input/output ports. Host servers that have been granted memory structures within a memory storage device (“configured hosts”) are granted priority access to a storage processing device's input/output port (“cluster port”). If the cluster port has exhausted its log-in resources, log-on requests from non-configured hosts will be not be accepted. New log-in requests from configured hosts will cause a host connected at a link or transport layer but not an upper layer to be logged off. If no hosts are connected only at the link or transport layer, a non-configured host connected at an upper layer will be logged off. If only configured hosts are connected and only at the upper layer, the log-on request by the configured host will be denied.
摘要:
When data is stored in many storage subsystems, metadata, such as a sequence number, is also generated and stored with the data. When the data is accessed, the metadata is checked to ensure that the desired data element has been accessed. In conventional storage subsystems, data elements, such as logical blocks, are stored sequentially in logical pages of each logical volume. Consequently, sequence numbers closely correlate with block positions within the physical pages and sequence number/position patterns tend to repeat frequently and access errors may not be detected. Algorithms are provided to calculate new, offset, physical block positions which reduce the close association of sequence numbers and physical positions, thereby reducing such aliasing. The algorithms incorporate the logical volume number, the logical page number, or both, in addition to the logical block number. As a result, detection of access errors becomes more likely.