摘要:
A technique supports application operation. The technique involves discovering a set of applications running on an electronic system, and querying a user to identify which of the set of applications the user wishes to manage. The technique further involves, for each application identified by the user, providing an application service to that application to support operation of that application, the application service being separate from operating system services and security protection services provided by the electronic system.
摘要:
An application services platform includes a platform chassis, a network interface supported by the platform chassis, and a control circuit supported by the platform chassis and coupled to the network interface. The control circuit is arranged to connect to a network through the network interface, and receive an application service command from a user. The application service command gives the control circuit permission to provide an application service to an application running on a server on the network. The control circuit is further arranged to provide the application service to the application running on the server on the network in response to receipt of the application service command. The application services platform is capable of being provided in the form of an appliance-style device which is simply added as a new device on the network.
摘要:
Described are techniques for performing automated discovery processing in a network. A data storage system monitors transmissions sent over the network. The data storage system extracts one or more data elements from one or more messages included in the transmissions and determines at least one application executing on a component in the network in accordance with the one or more data elements.
摘要:
Described are techniques for provisioning storage of a data storage system for use by an application. One or more application provision requirements associated with a provisioning request to provision storage for use by the application are received. The one or more application provision requirements are translated, in accordance with application best practices for the application included in a policy, to one or more generic storage resource requirements. The one or more generic storage resource requirements are translated, in accordance with data storage system best practices included in said policy, to one or more physical data storage requirements. The physical data storage requirements include identification of one or more physical storage devices in said data storage system used in allocating storage to service said provisioning request. Storage is allocated for use by said application in accordance with said physical data storage requirements.
摘要:
Described are techniques for processing a data storage configuration request for an application A first user level of a plurality of user levels at which said data storage configuration request is made is determined. One or more rule sets defining mappings between different ones of said plurality of user levels are provided. Each of the different user levels is associated with a different level of abstraction with respect to processing performed in the data storage system for implementing the data storage configuration request. One of the rule sets is selected in accordance with the application, a data service requested in said data storage configuration request, and a user grouping including said plurality of user levels. The data storage configuration request is serviced using rules of the selected rule set.
摘要:
A method is used in supplying data storage services. For a set of applications running on an electronic system, an application service is provided to each application in the set to support operation of that application. The application service is separate from operating system services and security protection services provided by the electronic system. A data storage service provider being separate from the electronic system is communicated with to use resources of the data storage service provider in providing the application service to each application in the set.
摘要:
Described are techniques for performing automated discovery processing in a network. A data storage system monitors transmissions sent over the network. The data storage system extracts one or more data elements from one or more messages included in the transmissions and determines at least one application executing on a component in the network in accordance with the one or more data elements.
摘要:
Described are techniques for processing a data storage configuration request for an application A first user level of a plurality of user levels at which said data storage configuration request is made is determined. One or more rule sets defining mappings between different ones of said plurality of user levels are provided. Each of the different user levels is associated with a different level of abstraction with respect to processing performed in the data storage system for implementing the data storage configuration request. One of the rule sets is selected in accordance with the application, a data service requested in said data storage configuration request, and a user grouping including said plurality of user levels. The data storage configuration request is serviced using rules of the selected rule set.
摘要:
Described are techniques for processing a data storage configuration request for an application. The data storage configuration request is received from a requester. A first user level of a plurality of user levels at which the data storage configuration request is made by the requester is determined. Each user level is associated with a different level of abstraction with respect to processing performed in the data storage system for implementing the data storage configuration request. The data storage configuration request is serviced. Servicing the request includes determining whether to perform the data storage configuration request in accordance with security criteria defining, for each of the plurality of user levels, permitted operations that may be performed for different requesters in connection with the data storage configuration request.
摘要:
Software is supplied via data storage system. A software image is provided to the data storage system from an external website. It is determined that software needs to be installed on a host. The software image is retrieved from the data storage system. The software is installed on the host using the software image.