摘要:
A technique supports application operation. The technique involves discovering a set of applications running on an electronic system, and querying a user to identify which of the set of applications the user wishes to manage. The technique further involves, for each application identified by the user, providing an application service to that application to support operation of that application, the application service being separate from operating system services and security protection services provided by the electronic system.
摘要:
Described are techniques for performing automated discovery processing in a network. A data storage system monitors transmissions sent over the network. The data storage system extracts one or more data elements from one or more messages included in the transmissions and determines at least one application executing on a component in the network in accordance with the one or more data elements.
摘要:
A method is used in supplying data storage services. For a set of applications running on an electronic system, an application service is provided to each application in the set to support operation of that application. The application service is separate from operating system services and security protection services provided by the electronic system. A data storage service provider being separate from the electronic system is communicated with to use resources of the data storage service provider in providing the application service to each application in the set.
摘要:
Described are techniques for performing automated discovery processing in a network. A data storage system monitors transmissions sent over the network. The data storage system extracts one or more data elements from one or more messages included in the transmissions and determines at least one application executing on a component in the network in accordance with the one or more data elements.
摘要:
Described are techniques for provisioning storage of a data storage system for use by an application. One or more application provision requirements associated with a provisioning request to provision storage for use by the application are received. The one or more application provision requirements are translated, in accordance with application best practices for the application included in a policy, to one or more generic storage resource requirements. The one or more generic storage resource requirements are translated, in accordance with data storage system best practices included in said policy, to one or more physical data storage requirements. The physical data storage requirements include identification of one or more physical storage devices in said data storage system used in allocating storage to service said provisioning request. Storage is allocated for use by said application in accordance with said physical data storage requirements.
摘要:
Described are techniques for processing a data storage configuration request for an application A first user level of a plurality of user levels at which said data storage configuration request is made is determined. One or more rule sets defining mappings between different ones of said plurality of user levels are provided. Each of the different user levels is associated with a different level of abstraction with respect to processing performed in the data storage system for implementing the data storage configuration request. One of the rule sets is selected in accordance with the application, a data service requested in said data storage configuration request, and a user grouping including said plurality of user levels. The data storage configuration request is serviced using rules of the selected rule set.
摘要:
Described are techniques for processing a data storage configuration request for an application A first user level of a plurality of user levels at which said data storage configuration request is made is determined. One or more rule sets defining mappings between different ones of said plurality of user levels are provided. Each of the different user levels is associated with a different level of abstraction with respect to processing performed in the data storage system for implementing the data storage configuration request. One of the rule sets is selected in accordance with the application, a data service requested in said data storage configuration request, and a user grouping including said plurality of user levels. The data storage configuration request is serviced using rules of the selected rule set.
摘要:
A method is used in controlling access to XAM metadata. An object derived from a set of content is stored in an object addressable data storage system. The object has an object identifier. Storage system specific metadata is added to the object. The storage system specific metadata is accessible when the object is retrieved using the object identifier. Based on sub-object access control, a retrieving application is allowed to have access to only a subset of the object.
摘要:
Described are techniques for use in controlling information about a data storage system returned to an end user. A first set of information is sent from a first recipient location included in a hierarchy to a second recipient location included in the hierarchy. At the second recipient location, a second set of information is produced using information control criteria of said second recipient location. The second set of information is sent from the second recipient location to a component used to manage the data storage system.
摘要:
Described are techniques for providing support in connection with a data storage system. An active element manager component is used to perform, a data storage system management operation. The active element manager component collects context information. The context information is transmitted from the data storage system to an external environment. User relevant information is received at the active element manager component from the external environment. The external environment determines the user relevant information in accordance with the context information and support information and services provided by the external environment. The user relevant information includes information about one or more types of support. The user relevant information is displayed via a user interface.