摘要:
In order to limit host computers permitted to control a storage area from host computers, provided is a storage management computer coupled to one or more host computers for providing services and one or more storage systems, in which the storage management computer judges whether the host computer is permitted to control the storage area based on data indicating the configuration information of the storage system and service management information for managing the services provided by the host computers, and in case of which it is judged that the host computer is permitted to control the storage area, the storage management computer sets access control data to permit the host computer to control the storage area.
摘要:
Provided is an access right managing method for a resource of a storage system, in which a management computer stores access right definition information of the resource, and resource correspondence information including information on a management program which manages another resource related to the resource managed by the management program. In case of which receiving an updating request of an access right of the resource, the management computer updates an access right based on the updating request of the access right, selects a management program of the resource whose access right is requested to be updated based on the resource correspondence information, transmits an updating request of an access right for a relative resource to a management computer which executes the selected management program, and in case of which the access right updating request of the related resource is received, updates the access right of the relative resource.
摘要:
Groups of volumes having a certain amount of commonality of data are identified within a storage system. For each group, the process defines a base volume, such as the volume containing the most commonality with the other volumes. For each volume in the group, the process extracts differential data between the base volume and each other volume, saves the differential data in a pool volume, and updates a mapping table. Commonality between volumes in the group is managed in the base volume, the pool volume, and the mapping table. Then the original volumes except the base volume and the pool volume may be deleted, and the original volumes are replaced with virtual volumes accessible through the mapping table. As a result, the amount of data in a storage system can be reduced while maintaining data integrity and accessibility.
摘要:
Provided is an access right managing method for a resource of a storage system, in which a management computer stores access right definition information of the resource, and resource correspondence information including information on a management program which manages another resource related to the resource managed by the management program. In case of which receiving an updating request of an access right of the resource, the management computer updates an access right based on the updating request of the access right, selects a management program of the resource whose access right is requested to be updated based on the resource correspondence information, transmits an updating request of an access right for a relative resource to a management computer which executes the selected management program, and in case of which the access right updating request of the related resource is received, updates the access right of the relative resource.
摘要:
A method for operating a storage system includes providing a primary storage device and a secondary storage device. Data from a first storage volume is copied to a second storage volume using an internal mirror operation, the first and second storage volumes being provided within the primary storage device. The data received from the first volume is copied from the second storage volume to a third storage volume using a remote copy operation, the third storage volume being provided in the secondary storage device. The second storage volume is used for the remote copying to reduce the IO impact on the first volume. The third storage volume copies the data received from the second volume to a fourth storage volume using an internal mirror operation, the fourth storage volume being provided within the secondary storage device. The secondary storage system includes a fifth storage volume that is made available to a secondary host while the data from the third storage volume is being copied to the fourth storage volume, the secondary host being associated with the secondary storage device.
摘要:
A virtualization system is introduced between a host and a storage system. An apparatus, system, and method of migrating replication includes stopping or making dormant applications on a host, or checking whether the applications are stopped or dormant. The statuses of a primary volume and a secondary volume that is a replica of the primary volume are checked to determine whether they have become identical. A primary virtual volume is defined to map to the primary volume and a secondary virtual volume is defined to map to the secondary volume. Replication is defined from the primary virtual volume to the secondary virtual volume. Replication is started with a NOCOPY option, and the applications may be restarted or a message is sent indicating that the applications can be restarted. There is no actual migration of application data, and as result, the time required for migrating replication can be eliminated.
摘要:
Aspects of the present invention provide integration of geographically distributed data. The data can be integrated in a single database. An illustrative embodiment of the invention comprises a tight combination between conventional ETL (extraction, translation, and loading) tools and conventional remote copy functionality used for data backup and recovery.
摘要:
A file to be written can be partitioned into one or more partitions. Each such input partition is identified with a hash code and a group ID. Replica(s) of an input partition can be created to ensure a certain number of identical partitions. When a file is accessed, each partition that is read out can be checked for corruption. Corrupted readout partitions are then replaced with a validated replacement partition, whether the replacement partition is from a replica or from another file.
摘要:
A system and method for automatic failure recovery in a storage system that includes replicating data stored in a first storage volume at a storage system into a second storage volume at the storage system, the first storage volume handling Input/Output (I/O) operations between the storage system and a host device. A failure is detected in the I/O operations with the first storage volume and a recovery process initiated that includes identifying a path from the host device to the second storage volume or a third storage volume to allow continuation of the I/O operations automatically. The third storage volume containing data recovered from the second storage volume.
摘要:
A definition tool of the present invention declares columns which are concealed in external tables to a multi-database server. The multi-database server controls a decomposition and an execution of query messages such that the multi-database server does not perform an arithmetic using the concealed columns. The external database server encrypts the data of concealed columns in tables of query result tables. The multi-database server designates a range to be decrypted at the time of acquiring and integrating respective result tables. A client program acquires an integrated result table and decrypts the designated range. Since the data encrypted by the external database server is decrypted by and is referred to the client program, it becomes difficult for the multi-database server to refer to a content of the concealed columns.