摘要:
Described are techniques for performing automated discovery processing in a network. A data storage system monitors transmissions sent over the network. The data storage system extracts one or more data elements from one or more messages included in the transmissions and determines at least one application executing on a component in the network in accordance with the one or more data elements.
摘要:
Described are techniques for processing a data storage configuration request for an application. The data storage configuration request is received from a requester. A first user level of a plurality of user levels at which the data storage configuration request is made by the requester is determined. Each user level is associated with a different level of abstraction with respect to processing performed in the data storage system for implementing the data storage configuration request. The data storage configuration request is serviced. Servicing the request includes determining whether to perform the data storage configuration request in accordance with security criteria defining, for each of the plurality of user levels, permitted operations that may be performed for different requesters in connection with the data storage configuration request.
摘要:
Software is supplied via data storage system. A software image is provided to the data storage system from an external website. It is determined that software needs to be installed on a host. The software image is retrieved from the data storage system. The software is installed on the host using the software image.
摘要:
Described are techniques for processing a data storage configuration request for an application A first user level of a plurality of user levels at which said data storage configuration request is made is determined. One or more rule sets defining mappings between different ones of said plurality of user levels are provided. Each of the different user levels is associated with a different level of abstraction with respect to processing performed in the data storage system for implementing the data storage configuration request. One of the rule sets is selected in accordance with the application, a data service requested in said data storage configuration request, and a user grouping including said plurality of user levels. The data storage configuration request is serviced using rules of the selected rule set.
摘要:
Described are techniques for performing automated discovery processing in a network. A data storage system monitors transmissions sent over the network. The data storage system extracts one or more data elements from one or more messages included in the transmissions and determines at least one application executing on a component in the network in accordance with the one or more data elements.
摘要:
Described are techniques for processing a data storage configuration request for an application A first user level of a plurality of user levels at which said data storage configuration request is made is determined. One or more rule sets defining mappings between different ones of said plurality of user levels are provided. Each of the different user levels is associated with a different level of abstraction with respect to processing performed in the data storage system for implementing the data storage configuration request. One of the rule sets is selected in accordance with the application, a data service requested in said data storage configuration request, and a user grouping including said plurality of user levels. The data storage configuration request is serviced using rules of the selected rule set.
摘要:
Described are techniques for use in controlling information about a data storage system returned to an end user. A first set of information is sent from a first recipient location included in a hierarchy to a second recipient location included in the hierarchy. At the second recipient location, a second set of information is produced using information control criteria of said second recipient location. The second set of information is sent from the second recipient location to a component used to manage the data storage system.
摘要:
A method is used in applying XAM processes. A set of content is received via any of a file system interface, a block based interface, an object based interface to an object addressable data storage system. An object derived from the set of content and having an object identifier is stored in the object addressable data storage system. The object is made available for retrieval via the object based interface using the object identifier.
摘要:
A method is used in managing metadata. Data of an object is stored in a magnetic hard disk set in an object addressable data storage system. Metadata for the object is stored in an SSD set in the object addressable data storage system. The metadata includes information necessary for determining the location of the data of the object in the magnetic hard disk set.
摘要:
An improved policy enforcement architecture includes several components that improve the performance of policy enforcement in a hierarchical storage environment. A File System Query instruction permits a richer set of queries to be expressed by a policy engine, thereby permitting more complex policies to be implemented with ease. The File System result is generated at the file server, and only files of interest are forwarded to the policy engine. The file system query advantageously may be applied against a pre-generated index having one more characterizing attributes to further reduce the processing required to retrieve policy data. An Index Build instruction, added to a programming interface, allows a policy engine generate the characterizing indices in advance of use. Index maintenance techniques maintain consistency between the index and the file system to ensure that the policy can be enforced using accurate file information.