摘要:
A technique for implementing policy-aware backup and restore capability in a tiered storage system. If a data set's contents are backed up from the tiered storage system to a backup storage system, metadata for the data set may also be backed up. Prior to the data set being restored from the backup storage system to the tiered storage system, the backed up metadata is restored and processed to determine a tier among the tiered storage pools to which the data set will be restored.
摘要:
Provided are a method, system, and program maintaining information on a namespace comprised of filesets shared by clients over a network. Zone information is maintained on at least one zone, wherein each zone associates at least one client system, at least one fileset, and at least one storage pool. For one zone, the associated at least one fileset and at least one storage pool are accessible to the at least one client system. Clients are provided information on filesets included in a namespace, wherein each of a plurality of clients receive information on the at least one fileset associated with the client in the at least one zone including the client.
摘要:
Provided are a system and program maintaining information on a namespace comprised of filesets shared by clients over a network. Zone information is maintained on at least one zone, wherein each zone associates at least one client system, at least one fileset, and at least one storage pool. For one zone, the associated at least one fileset and at least one storage pool are accessible to the at least one client system. Clients are provided information on filesets included in a namespace, wherein each of a plurality of clients receive information on the at least one fileset associated with the client in the at least one zone including the client.
摘要:
A method and system for conducting an integrity check of system and user metadata when the metadata is mounted. A filesystem reviewer is embedded within software of a server node. A mutual exclusion lock is obtained on the selected metadata. An automated verification of the locked metadata is conducted while the filesystem is mounted. In addition, an automated salvage of the locked metadata may be conducted while the filesystem is mounted. The verification and/or salvage of the locked metadata can be applied to system, user, and/or a portion of the user metadata.
摘要:
Techniques are provided for processing an Input/Output (I/O) request. At least one data block is allocated for use in completing the I/O request. A current operations record is stored for the I/O request. It is determined whether the I/0 request has been completed within a specified period of time. In response to determining that the I/O request has not been completed within the specified period of time, the allocated at least one data block is fenced. Also provided are techniques for processing an Input/Output (I/O) request in which an identification message is received from a client computer. It is determined whether the client computer is a rogue client based on whether a current operations record exists for the client computer.
摘要:
Techniques are provided for processing an Input/Output (I/O) request in which an identification message is received from a client computer. It is determined whether the client computer is a rogue client based on whether a current operations record exists for the client computer.
摘要:
A method and system for conducting an integrity check of system and user metadata when the metadata is mounted. A filesystem reviewer is embedded within software of a server node. A mutual exclusion lock is obtained on the selected metadata. An automated verification of the locked metadata is conducted while the filesystem is mounted. In addition, an automated salvage of the locked metadata may be conducted while the filesystem is mounted. The verification and/or salvage of the locked metadata can be applied to system, user, and/or a portion of the user metadata.
摘要:
Techniques are provided for processing an Input/Output (I/O) request. At least one data block is allocated for use in completing the I/O request. A current operations record is stored for the I/O request. It is determined whether the I/O request has been completed within a specified period of time. In response to determining that the I/O request has not been completed within the specified period of time, the allocated at least one data block is fenced.
摘要:
Provided are techniques for determining whether content of an object has changed. Under control of a backup system, opaque object attributes and a data identifier are received, wherein the data identifier is generated based on one or more relevant object attributes of the opaque object attributes that indicate whether at least one of the content of the object and one or more of the relevant object attributes has changed. The received data identifier is compared with a previously stored data identifier. In response to determining that the received data identifier and the previously stored data identifier do not match, it is determined that the content of the object has changed.
摘要:
A method and system for allocating blocks of disk in persistent storage to requesting threads. A primary data structure is provided for organizing and categorizing blocks of disk space. In addition, a secondary data structure is provided for maintaining a list of all active file system processes and blocks of disk space used by those processes. Blocks of disk space are assigned to pages. At such time as a thread may request allocation of disk space, both data structures are reviewed to determine if the requested disk space is available and to limit access of available disk space to a single page of memory to a single thread at any one time.