摘要:
Described are techniques used in detection of a data corruption in a computer system in connection with read and write operations. For a write operation, a host issues a write request that includes a checksum value determined in accordance with data associated with the write request. The write request is received by a data storage system that performs data validation using the checksum. The host issues a vendor-defined write request operation that includes the checksum as a data field in the request packet sent to the data storage system. For a read operation, a host issues a read request and the data storage system determines a checksum value before servicing the read request. The checksum is validated at the top of the I/O stack on the host by the file system filter driver.
摘要:
Described are techniques in connection with restricting access to devices within a computer system. Access to a device may be restricted to one or more particular hosts within the computer system, and also further restricted to a particular software program executing within the particular hosts. The restricted access device (RAD) may be recognized by one or more hosts only having access to specific portions of the RAD unless special RAD I/O opcodes are used in connection with performing I/O operations. Access to a device may be obtained by enabling a particular use of the special RAD I/O opcodes. Subsequently, access to the same device may be disabled by stopping use of the special RAD I/O opcodes by a particular host and/or software executing in the host. RADs may be used in a variety of applications including, for example, restricting access to shared logs or journals and protecting a database.
摘要翻译:描述了与限制对计算机系统内的设备的访问有关的技术。 对设备的访问可以限于计算机系统内的一个或多个特定主机,并且还进一步限于在特定主机内执行的特定软件程序。 受限访问设备(RAD)可以被一个或多个仅能访问RAD的特定部分的主机识别,除非在执行I / O操作时使用特殊的RAD I / O操作码。 可以通过使用特殊的RAD I / O操作码来获得对设备的访问。 随后,可以通过由主机中执行的特定主机和/或软件停止使用特殊的RAD I / O操作码来禁用对同一设备的访问。 RAD可以用于各种应用,包括例如限制对共享日志或日志的访问和保护数据库。
摘要:
Described are techniques for servicing data requests in a data storage system. One or more data requests from an application executing on the host are received. The data storage system allocates a first amount of resources for use in servicing data requests from the application. Behavior of the host is monitored for occurrences of I/O failure. In accordance with criteria and the occurrences of I/O failure, it is determined whether at least one of the host or the application is in a state of pending failure. If it is determined that at least one of the host or the application is in a state of pending failure, a second amount of resources larger than the first amount are allocated for a time period when servicing data requests from the application. After the time period, data requests from the application are serviced in accordance with the first amount of resources.
摘要:
A system and method for providing continuous availability of information that is normally transported via a network is provided. The system and method uses a process that is used with each computer in a system to simulate the functionality of a network interface card wherein upon the unavailability of the network, transmission packets containing a unique header are send by one application in the system through the process, which stores the transmission packets in queue, and upon filling of the queue writes filled queue to a send volume contained on a storage system. The storage system then copies the data to a second volume, which can be read by a second application. The first and second volumes can either be remotely dispersed or local to one another.
摘要:
A system and method for providing continuous availability of information that is normally transported via a network is provided. The system and method uses a process that is used with each computer in a system to simulate the functionality of a network interface card wherein upon the unavailability of the network, transmission packets containing a unique header are send by one application in the system through the process, which stores the transmission packets in queue, and upon filling of the queue writes filled queue to a send volume contained on a storage system. The storage system then copies the data to a second volume, which can be read by a second application. The first and second volumes can either be remotely dispersed or local to one another.
摘要:
Described are techniques used in detection of a data corruption in a computer system. A host issues a write request that includes a checksum value determined in accordance with data associated with the write request. The write request is received by a data storage system that performs data validation using the checksum. If the data validation succeeds, the write operation proceeds. Otherwise, it is determined that the data is corrupt and a checksum error is returned to the issuing host. The host issues a vendor-defined write request operation that includes the checksum as a data field in the request packet sent to the data storage system. Filter drivers are used in obtaining the checksum and modifying the write request packet to specify a vendor-defined write operation if checksumming is enabled for the write operation.
摘要:
A method, computer program product, and computing system for receiving an indication of a cold cache event within a storage system. The storage system includes a multi-tiered data array including at least a faster data tier and a slower data tier. A data list that identifies at least a portion of the data included within the faster data tier of the multi-tiered data array is obtained from the multi-tiered data array. At least a portion of the data identified within the data list is requested from the multi-tiered data array, thus defining the requested data. The requested data is received from the multi-tiered data array.
摘要:
Methods and apparatus for eliminating the need for a complete synchronization due to failure of a data protection appliance in a continuous data protection system having a replication splitter. In one embodiment, a continuous data protection system includes a source side having a source side storage array with a splitter and a data protection appliance, where processing includes initiating a source side splitter session, initializing a first I/O tracking mechanism for the splitter session, and activating the splitter to a source side processing active state to continuously push I/O data from the source side to the target side.
摘要:
Migrating data from an old storage device to a new storage device includes creating new paths to the new storage device, freezing old paths to the old storage device, transferring metadata corresponding to the old storage device to the new storage device, where state information is transferred from the old storage device to the new storage device, and thawing the new paths. Migrating data from an old storage device to a new storage device may also include creating new volumes on the new storage device and transferring data from the old storage device to the new storage device. Migrating data from an old storage device to a new storage device may also include dismantling the old paths.
摘要:
Described are techniques for storage configuration. Defined are one or more initiator groups each including one or more initiator ports, one or more target groups each including one or more target ports, and one or more storage groups each including one or more devices. A masking view is created where the masking view includes a first of the initiator groups, a first of the target groups, and a first of the storage groups. The masking view indicates which devices of the first storage group are accessible using one or more paths. Each of the one or more paths is specified using an initiator port from the first initiator group and a target port from the first target group.