摘要:
Provided is a storage subsystem configuration management method for use in a computer system, comprising: obtaining storage configuration information and hardware resource use information; determining, based on the obtained hardware resource use information, a configuration of a storage subsystem so that a load is not concentrated on a specific hardware resource; transmitting a configuration change instruction to make a change to the determined configuration to the storage subsystem; and making a configuration change based on the configuration change instruction received from the management computer through the first interface.
摘要:
Provided is a storage subsystem configuration management method for use in a computer system, comprising: obtaining storage configuration information and hardware resource use information; determining, based on the obtained hardware resource use information, a configuration of a storage subsystem so that a load is not concentrated on a specific hardware resource; transmitting a configuration change instruction to make a change to the determined configuration to the storage subsystem; and making a configuration change based on the configuration change instruction received from the management computer through the first interface.
摘要:
Creating a plaintext index from a text that is extracted from a file presents the risk of a leak of confidential information from the created index. To address this problem, provided is a computer system which has a computer, a storage subsystem coupled to the computer, and a network coupling the computer and the storage subsystem. The computer has an interface coupled to the network, a first processor coupled to the interface, and a memory coupled to the first processor. The storage subsystem has a disk device which stores data. A storage area of the disk device is divided into a plurality of storage areas including, at least, a first storage area and a second storage area. The first processor reads a part of data stored in the first storage area, encrypts the part of data read from the first storage area when the data stored in the first storage area is judged as encrypted data, and writes the encrypted part of data in the second storage area.
摘要:
Creating a plaintext index from a text that is extracted from a file presents the risk of a leak of confidential information from the created index. To address this problem, provided is a computer system which has a computer, a storage subsystem coupled to the computer, and a network coupling the computer and the storage subsystem. The computer has an interface coupled to the network, a first processor coupled to the interface, and a memory coupled to the first processor. The storage subsystem has a disk device which stores data. A storage area of the disk device is divided into a plurality of storage areas including, at least, a first storage area and a second storage area. The first processor reads a part of data stored in the first storage area, encrypts the part of data read from the first storage area when the data stored in the first storage area is judged as encrypted data, and writes the encrypted part of data in the second storage area.
摘要:
A storage system includes physical memory devices, pool volumes, including real areas, an allocation-on-use (AOU) volume including virtual areas, and a controller allocating a non-allocated real area in a pool including the pool volumes to a virtual area corresponding to an address specified by a writing command when no real area is allocated to the virtual area, and writing data corresponding to the received writing command to the allocated real area. The controller moves data stored in all the real areas in a first pool volume allocated to the AOU volume to a second pool volume, and changes a power consuming status of the physical memory device constituting the first pool volume to a power saving mode after the data has been moved.
摘要:
A storage system has a pool which is made up of a plurality of storage regions supplied by physical disks, and allocates the storage regions within this pool to volumes supplied to host computers, and cancels such allocations. When a volume addition event has occurred, a management computer forecasts, for each volume, the capacity which is to be required at a certain time point in the future, based on usage capacities acquired for each volume, calculates a non-required capacity from this capacity which has been forecast and the capacities of the storage region groups which are already allocated to the volume, decides, based on one or more non-required capacities which have been calculated, whether or not there is a storage region enough to satisfy the capacity requested for a volume which is the object of addition, and, if a positive decision result is obtained, allocates storage regions equivalent to the non-required capacity to the volume which is the object of addition.
摘要:
Conventionally, no consideration was given to the control of the main power supply circuit in a storage apparatus. Thus, unnecessary electric power will be consumed because it is not possible to inhibit the power consumption of the main power supply circuit of the storage apparatus. With this storage system having a plurality of storage apparatuses, a storage apparatus internally has a power supply control program for controlling the respective components and the main power supply circuit, and the power supply control command program provided to the management computer migrates a storage extent to be used for business to another storage apparatus based on the operation schedule of business to use the storage extent of the storage apparatus, and commands the power supply control of the main power supply circuit in the storage apparatuses and the respective components.
摘要:
A computer system for preventing data loss that includes: a first storage system having a data storage extent for storing data sent from a host computer; a second storage system having at least one actual replicated data storage extent associated with the data storage extent; an archive appliance having a storage medium associated with the replicated data storage extent in the second storage system; and a data copy unit for controlling copy processing for reading data from the data storage extent in the first storage system and writing the read data to a first actual replicated data storage extent in the second storage system in accordance with specific configuration information. The system also has a connection switching unit for changing the specific configuration information so that a second actual replicated data storage extent, instead of the first actual replicated data storage extent, is associated with the data storage extent.
摘要:
The control device acquires the archive deadline of archive target data and acquires, for storage devices of a plurality of types, a warranty deadline for the quality of data stored by the storage device and the unit cost which is the cost for each predetermined storage size of the storage device. The storage control device is a storage device which acquires a data migration cost and which obtains a storage destination for the archive target data from storage devices of a plurality of types on the basis of the archive deadline, warranty deadline, unit cost and data migration cost thus acquired. The storage control device selects a storage device for which the total cost is minimum when the archive target data is archived until the archive deadline.
摘要:
A heterogeneous network includes network related hardware and software products from a plurality of vendors. The network includes a storage system configured to store data, a server configured to process requests, a switch coupling the storage system and the server for data communication, and a network manager including an event dictionary to interpret an event message received from a device experiencing failure.