摘要:
A technique supports application operation. The technique involves discovering a set of applications running on an electronic system, and querying a user to identify which of the set of applications the user wishes to manage. The technique further involves, for each application identified by the user, providing an application service to that application to support operation of that application, the application service being separate from operating system services and security protection services provided by the electronic system.
摘要:
An application services platform includes a platform chassis, a network interface supported by the platform chassis, and a control circuit supported by the platform chassis and coupled to the network interface. The control circuit is arranged to connect to a network through the network interface, and receive an application service command from a user. The application service command gives the control circuit permission to provide an application service to an application running on a server on the network. The control circuit is further arranged to provide the application service to the application running on the server on the network in response to receipt of the application service command. The application services platform is capable of being provided in the form of an appliance-style device which is simply added as a new device on the network.
摘要:
Described are techniques for provisioning storage of a data storage system for use by an application. One or more application provision requirements associated with a provisioning request to provision storage for use by the application are received. The one or more application provision requirements are translated, in accordance with application best practices for the application included in a policy, to one or more generic storage resource requirements. The one or more generic storage resource requirements are translated, in accordance with data storage system best practices included in said policy, to one or more physical data storage requirements. The physical data storage requirements include identification of one or more physical storage devices in said data storage system used in allocating storage to service said provisioning request. Storage is allocated for use by said application in accordance with said physical data storage requirements.
摘要:
Described are techniques for processing a data storage configuration request for an application A first user level of a plurality of user levels at which said data storage configuration request is made is determined. One or more rule sets defining mappings between different ones of said plurality of user levels are provided. Each of the different user levels is associated with a different level of abstraction with respect to processing performed in the data storage system for implementing the data storage configuration request. One of the rule sets is selected in accordance with the application, a data service requested in said data storage configuration request, and a user grouping including said plurality of user levels. The data storage configuration request is serviced using rules of the selected rule set.
摘要:
Described are techniques for processing a data storage configuration request for an application A first user level of a plurality of user levels at which said data storage configuration request is made is determined. One or more rule sets defining mappings between different ones of said plurality of user levels are provided. Each of the different user levels is associated with a different level of abstraction with respect to processing performed in the data storage system for implementing the data storage configuration request. One of the rule sets is selected in accordance with the application, a data service requested in said data storage configuration request, and a user grouping including said plurality of user levels. The data storage configuration request is serviced using rules of the selected rule set.
摘要:
Described are techniques for performing automated discovery processing in a network. A data storage system monitors transmissions sent over the network. The data storage system extracts one or more data elements from one or more messages included in the transmissions and determines at least one application executing on a component in the network in accordance with the one or more data elements.
摘要:
A method is used in supplying data storage services. For a set of applications running on an electronic system, an application service is provided to each application in the set to support operation of that application. The application service is separate from operating system services and security protection services provided by the electronic system. A data storage service provider being separate from the electronic system is communicated with to use resources of the data storage service provider in providing the application service to each application in the set.
摘要:
Described are techniques for performing automated discovery processing in a network. A data storage system monitors transmissions sent over the network. The data storage system extracts one or more data elements from one or more messages included in the transmissions and determines at least one application executing on a component in the network in accordance with the one or more data elements.
摘要:
Described are techniques for configuring one or more physical devices of a data storage system for use in connection with provisioning storage for an application. A policy is received which includes one or more sets of data storage system best practices. Each of said one or more sets specifies data storage system best practices for a different type of data storage system including a first type associated with said data storage system. Configuration in connection with initialization of said data storage system is performed to configure a first portion of said one or more physical devices for use with one or more storage pools. The best practices for said first type of data storage system specified in said policy are used in performing said configuration processing.
摘要:
A translator-compiler for converting legacy architecture. In the area of management software or distributed management software, a standard architecture is evolving from legacy or proprietary architecture, and the standard embraces CIM/XML (Common Information Model/eXtensible Markup Language) computer language. Many vendors have developed proprietary languages for their respective management products that are incompatible with such standard. To accomplish compatibility between standard architecture and various different proprietary architectures, a substantial amount of code must be written at great effort and expense, unless an automatic, easily-applied and universal solution can be achieved. A translator-compiler is disclosed which meets these solution criteria and therefore solves this incompatibility problem. Flowcharts depicting algorithms along with sample input and output code in C++, as well as an example of the final XML result are also disclosed. Particular detail is disclosed with regard to storage management software aspects, although embodiments of the present invention are also operable with printer, server and other functional-component management software.