摘要:
A method for processing a request from a host to write a database record to a target location on a logical device associated with a data-storage system in data communication with the host includes maintaining, at the data storage system, information identifying extents of the logical device that are designated for storage of database records, and, on the basis of the information, determining whether the target location is one on which a database record is permitted to be stored.
摘要:
A method for processing a write instruction for writing data to a database stored on a logical device includes obtaining first and second addresses that specify the location of the data in respective first and second address spaces. A third address corresponding to an expected location of the data record in the first address space is then calculated. On the basis of a comparison between the first address and the third address, a determination is made as to whether to execute the write instruction.
摘要:
Described are techniques for processing a data operation. A data operation is received at a data storage system. The data operation requests a modification of data stored in the data storage system. A first address is obtained that represents a starting address of the data operation. A calculation is performed representing a boundary condition of the starting address of the data operation. Based on the calculation, it is determined whether the data operation has a starting address which is properly aligned.
摘要:
In one aspect, a method includes receiving write I/Os for storage in a primary storage array, splitting the write I/Os to a replica site, storing the write I/Os for storage in the storage array in a cache, periodically de-staging the write I/Os in the cache to a volume and after a cache data loss, restoring lost write I/Os from the cache by using the write I/Os split to the replica site.
摘要:
Described are techniques for verifying host path detection. First information from a first data storage system is received indicating a first set of one or more hosts and, for each host in the first set, which one or more devices of a first device set of the first data storage system are accessible to said each host in the first set over one or more associated paths to the first data storage system. Second information and the first information are received at a second data storage system. First processing is performed at the second data system to determine whether each host included in the first information has successfully completed path detection with respect to a second device set for the second data storage system.
摘要:
Maintaining a set of extents corresponding to a portion of an initial logical volume that is to be copied includes initializing a table having entries corresponding to different portions of the initial logical volume, where each of the entries is initialized with a first value, following initializing the table, providing a second value different from the first value to an entry in the table corresponding to a portion of the initial logical volume to which a write operation is performed and establishing the set of extents, where the first value is provided to entries in the table that correspond to portions of the initial logical device indicated by the extents. Data of the initial logical volume corresponding to the set of extents may be copied to at least one other logical volume.
摘要:
In one aspect, a method includes providing a splitter at a first storage array, receiving data from a host, storing the data on the first storage array, using a data protection appliance (DPA) to expose a device, continuously copying data stored on the first storage array to the device using the splitter and replicating the data to a second storage array using the DPA.