摘要:
Software is supplied via data storage system. A software image is provided to the data storage system from an external website. It is determined that software needs to be installed on a host. The software image is retrieved from the data storage system. The software is installed on the host using the software image.
摘要:
Described are techniques for use in controlling information about a data storage system returned to an end user. A first set of information is sent from a first recipient location included in a hierarchy to a second recipient location included in the hierarchy. At the second recipient location, a second set of information is produced using information control criteria of said second recipient location. The second set of information is sent from the second recipient location to a component used to manage the data storage system.
摘要:
A method is used in managing metadata. Data of an object is stored in a magnetic hard disk set in an object addressable data storage system. Metadata for the object is stored in an SSD set in the object addressable data storage system. The metadata includes information necessary for determining the location of the data of the object in the magnetic hard disk set.
摘要:
An improved policy enforcement architecture includes several components that improve the performance of policy enforcement in a hierarchical storage environment. A File System Query instruction permits a richer set of queries to be expressed by a policy engine, thereby permitting more complex policies to be implemented with ease. The File System result is generated at the file server, and only files of interest are forwarded to the policy engine. The file system query advantageously may be applied against a pre-generated index having one more characterizing attributes to further reduce the processing required to retrieve policy data. An Index Build instruction, added to a programming interface, allows a policy engine generate the characterizing indices in advance of use. Index maintenance techniques maintain consistency between the index and the file system to ensure that the policy can be enforced using accurate file information.
摘要:
Methods, systems, and computer program products for providing access to shared storage by a plurality of nodes are disclosed. According to one method, at a node of a plurality of nodes sharing access to a disk array, an application input/output (I/O) operation and whether sufficient space in the disk array has been mapped at the node for the I/O operation are detected. In response to detecting that sufficient space in the disk array has not been mapped at the node for the I/O operation, a map for the I/O operation including physical disk access information is requested and obtained from a server. The physical disk access information included within the map for the application I/O operation obtained from the server is used to perform the I/O operation by accessing the disk array without intervention by the server.
摘要:
File system cells are linked together to form a meta file system that appears to a user or application program to be a single file system. The meta file system permits concurrent access by multiple processors in a file server wherein each file system cell is managed by a respective one of the processors. The file server responds to a directory access request by returning a file handle containing a file system cell ID and a pointer to a file in the file system cell. The file server responds to a subsequent file access request including the file handle by extracting the file system cell ID and the pointer to the file, searching a routing table for an entry having a file system cell ID matching the file system cell ID extracted from the file handle, and routing the request to the processor managing the file system cell.
摘要:
A method is used in applying XAM processes. A set of content is received via any of a file system interface, a block based interface, an object based interface to an object addressable data storage system. An object derived from the set of content and having an object identifier is stored in the object addressable data storage system. The object is made available for retrieval via the object based interface using the object identifier.
摘要:
A method is used in managing data on data storage systems. Rules are defined for candidate data unit selection. The rules are automatically executed on a primary data storage system to examine data units on the primary data storage system. The rules are applied to the data units. A data unit is identified that matches the rules and the identified data unit is migrated. The identified data unit is copied from the primary storage system to a secondary storage system. The identified data unit on the primary storage system is replaced with metadata. the data storage space in the primary storage system corresponding to the identified data unit is freed up.
摘要:
Servers in a storage system store a nested multilayer directory structure, and a global index that is an abstract of the directory structure. The global index identifies respective portions of the directory structure that are stored in respective ones of the servers, and the global index identifies paths through the directory structure linking the respective portions. Upon performing a top-down search of the directory structure in response to a client request and finding that a portion of it is offline, the global index is searched to discover portions of the directory structure that are located below the offline portion. The global index may also identify the respective server storing each of the respective portions of the directory structure, and may indicate whether or not each of the respective portions of the directory structure is known to be offline.
摘要:
Described are techniques for processing a data storage configuration request for an application A first user level of a plurality of user levels at which said data storage configuration request is made is determined. One or more rule sets defining mappings between different ones of said plurality of user levels are provided. Each of the different user levels is associated with a different level of abstraction with respect to processing performed in the data storage system for implementing the data storage configuration request. One of the rule sets is selected in accordance with the application, a data service requested in said data storage configuration request, and a user grouping including said plurality of user levels. The data storage configuration request is serviced using rules of the selected rule set.