Patent application number | Description | Published |
20090070383 | IDEMPOTENT STORAGE REPLICATION MANAGEMENT - A method for managing operations in a data storage system comprising at least a first storage controller operating according to a plurality of operation states set by a managing entity is provided. The method comprises the first storage controller performing a first operation associated with a first operation state, in response to the managing entity updating state information stored in a data structure readable by the first storage controller. | 03-12-2009 |
20090300430 | HISTORY-BASED PRIORITIZING OF SUSPECTED COMPONENTS - A method for servicing a computerized system includes detecting a failure of a given type in the computerized system, and generating a list of corrective actions in response to the failure, using an automated maintenance program. A record of one or more previous failures of the given type in the computerized system is retrieved, indicating at least one previous corrective action taken in response to the previous failures. The method prioritizes the list of corrective actions responsively to the record, using the automated maintenance program, so as to adjust a priority of the at least one previous corrective action in the list. The prioritized list from the automated maintenance program is provided to a repair function for use in servicing the computerized system. | 12-03-2009 |
20110138138 | WRITE SET BOUNDARY MANAGEMENT FOR HETEROGENEOUS STORAGE CONTROLLERS IN SUPPORT OF ASYNCHRONOUS UPDATE OF SECONDARY STORAGE - A data storage system including at least one storage controller having a first color policy and operative to store data onto a first data storage unit at a primary site as part of a current color of the primary site, at least one storage controller having a second color policy and operative to store data onto a second data storage unit at the primary site as part of the current color, and a color control node operative to provide each of the controllers with new color information while maintaining the integrity of dependent writes across color boundaries. | 06-09-2011 |
20120278280 | TRANSPARENT INPUT / OUTPUT SWITCHING BETWEEN SYNCHRONOUSLY MIRRORED STORAGE VOLUMES - A method for configuring transparent synchronous mirroring volume switching for a first volume and a second volume that are coupled, via a storage area network, to a host computer, with the first volume mapped to the host computer, by. The method includes initiating synchronization of status data between the first volume and the second volume, and setting the first volume to an active state. The second volume is set to an inactive state, and an identifier associated with the active first volume is copied to a memory coupled to the inactive second volume. The copied identifier is retrieved from the memory by the host computer, and the inactive second volume is then mapped to the host computer. | 11-01-2012 |
20120278567 | ONLINE VOLUME MIGRATION USING MULTI-PATH INPUT / OUTPUT MASQUERADING - An apparatus for configuring data migration comprises a host computer, a first volume, a second volume, a storage area network (SAN) configured to couple the host computer, the first volume, and the second volume, a memory coupled to the second volume, and a processor configured to map the first volume to the host computer; to copy a volume identifier associated with the mapped first volume to the memory, to retrieve, by the host computer, the copied volume identifier from the memory, to set a state of the second volume to inactive, to map the inactive second volume to the host computer, to set a state of the mapped first volume to inactive, to synchronize status data between the inactive first volume and the inactive second volume, after the copying, to start data migration from the inactive first volume to the inactive second volume, and after the starting, to set the state of the second volume to active. | 11-01-2012 |
20120278568 | TRANSPARENT INPUT / OUTPUT SWITCHING BETWEEN SYNCHRONOUSLY MIRRORED STORAGE VOLUMES - An apparatus for configuring transparent synchronous mirroring volume switching comprises a first volume, a second volume, a storage area network (SAN) configured to couple the host computer, the first volume and the second volume, a memory coupled to the second volume, and a processor configured to map the first volume to the host computer, to initiate synchronization of status data between the mapped first volume and the second volume, to set the mapped first volume to an active state and the second volume to an inactive state, to copy an identifier associated with the active first volume to a memory coupled to the inactive second volume, to retrieve, by the host computer, the copied identifier from the memory, and after the retrieving, to map the inactive second volume to the host computer. | 11-01-2012 |
20120278572 | ONLINE VOLUME MIGRATION USING MULTI-PATH INPUT / OUTPUT MASQUERADING - A method, including configuring data migration from a first volume to a second volume, which are coupled via a storage area network (SAN) to a host computer, with the first volume mapped to the host computer. A volume identifier associated with the first volume is copied to a memory coupled to the second volume, and the copied volume identifier is retrieved from the memory by the host computer. A state of the second volume is to inactive, and the inactive second volume is mapped to the host computer. A state of the first volume is set to inactive, and the status is data from the inactive first volume to the inactive second volume. After the copying, data migration is started from the inactive first volume to the inactive second volume, and after the starting, the state of the second volume is set to active. | 11-01-2012 |
20130054911 | FAST SNAPSHOTS - Exemplary method, system, and computer program product embodiments for performing a snapshot for monitoring usage of one or more data units are provided. In one embodiment, by way of example only, a fast snapshot is configured to store a state of a computing environment at a point in time. The fast snapshot operation is performed by avoiding reference counts of one or more data units associated with the snapshot from being updated at a creation and a deletion time. Additional system and computer program product embodiments are disclosed and provide related advantages. | 02-28-2013 |
20130173551 | FAST SNAPSHOTS - A fast snapshot is configured to store a state of a computing environment at a point in time. The fast snapshot operation is performed by avoiding reference counts of one or more data units associated with the snapshot from being updated at a creation and a deletion time. | 07-04-2013 |
20140372549 | LOAD BALANCING INPUT/OUTPUT OPERATIONS BETWEEN TWO COMPUTERS - Methods, apparatus and computer program products implement embodiments of the present invention that include identifying, by a first computer, multiple network paths to a second computer, and splitting an input/output (I/O) request for a logical volume stored on the second computer into sub-requests. A probe request defining an association between the I/O request and the sub-requests is conveyed to the second computer, and each of the sub-requests is assigned to a respective one of the multiple network paths. Each of the sub-requests are conveyed to the second computer via the assigned respective one of the multiple network paths, and the sub-requests are received by the second computer via the multiple network paths. The second computer performs the sub-requests in response to the association, and a result of each of the sub-requests is conveyed to the first computer via the assigned respective one of the multiple network paths. | 12-18-2014 |
20140372632 | IMPERSONATING SCSI PORTS THROUGH AN INTERMEDIATE PROXY - Methods, apparatus and computer program products implement embodiments of the present invention that include ascertaining, by a first storage system, a respective port identifier for each of one or more host ports defined to the first storage system for a logical volume stored on a second storage system. Examples of the port identifiers include WWPN and iSCSI iQN identifiers. A respective unique identifier is assigned to each of the ascertained one or more host ports, and for each of the one or more host ports, the respective port identifier and the assigned respective unique identifier are conveyed to the second storage system. Upon receiving, from one of the one or more host ports, an input/output (I/O) request for the logical volume, I/O request with the respective unique identifier of the one of the one or more host ports is conveyed to the second storage system. | 12-18-2014 |
20140372635 | UNIT ATTENTION PROCESSING IN PROXY AND OWNER STORAGE SYSTEMS - Methods, apparatus and computer program products implement embodiments of the present invention that include a storage device configured to store a logical volume mapped between a host computer and a computer having multiple initiator ports, and a processor configured to detect a unit attention condition for the logical volume. Examples of unit attention conditions for the logical volume include management operations on the logical volume and host requests for the logical volume. Upon detecting a unit attention condition, the processor can to generate a unit attention code and a respective unique serial number in response to detecting the unit attention condition, and upon receiving an input/output (I/O) request for the logical volume from a given initiator port, the processor can convey, to the given initiator port, the unit attention code and the respective unique serial number in response to the I/O request. | 12-18-2014 |
20140372636 | SAFELY MAPPING AND UNMAPPING HOST SCSI VOLUMES - Methods, apparatus and computer program products implement embodiments of the present invention that include detecting, by a storage system, a change in a mapping of a logical volume to one or more host ports of a host computer communicating with the storage system via a storage area network (SAN). Subsequent to detecting the change, first and second input/output (I/O) requests for the logical volume are received from a given host port, and a first unit attention message is conveyed to the given host port in response to the first I/O request. A second unit attention message is conveyed to the given host port upon determining that the storage system received the second I/O request within a specific time period commencing upon receiving the first I/O request. However, the second I/O request can be performed if the storage system received the second I/O request subsequent to the specific time period. | 12-18-2014 |
20140372639 | ONLINE MIGRATION OF A LOGICAL VOLUME BETWEEN STORAGE SYSTEMS - Methods, apparatus and computer program products implement embodiments of the present invention that include configuring, by a source storage system, a logical volume to comprise source regions of the source storage system that have a mapping between a host computer and the source storage system, the source regions storing source data. The source data is copied from the source regions to target data in target regions of a target storage system, the target regions being in a one-to-one correspondence with the source regions, and the volume is reconfigured so that the target regions have the mapping between the host computer and the source storage system. In some embodiments, the mapping between the host computer and the source storage system comprises a first mapping, and upon reconfiguring the volume, a second mapping can be added between the host computer and the target storage system, and the first mapping can be deleted. | 12-18-2014 |
20140372640 | PROCESSING INPUT/OUTPUT REQUESTS USING PROXY AND OWNER STORAGE SYSTEMS - A first storage system is configured as a proxy for a logical volume stored on a second storage system. The first computer system receives an I/O request from a host computer for the logical volume, the host computer, and identifies a port on the second storage system for the I/O request. In some embodiments, the second storage system has multiple SCSI ports, and the identified port comprises a least busy SCSI port. A probe request verifying availability of the logical volume is conveyed to the identified port, and upon receiving a response from the second storage system verifying the availability of the logical volume for the I/O request, the I/O request is conveyed to the identified port, a result of the I/O request is received from the identified port, the result is conveyed to the host computer. | 12-18-2014 |