Volume integrity in a shared-resource environment
Abstract:
A computer-implemented method includes receiving, by a storage controller from a first system, a fencing command that includes a parameter identifying a scope of an operation performed on a shared volume, utilizing a processor, setting, by the storage controller, a fencing indicator for at least a second system that is connected to the shared volume, utilizing the processor, where the fencing indicator limits access to the shared volume by the second system, sending, by the storage controller, a notification to the second system, utilizing the processor, where the notification includes the parameter and informs the second system that the access to the shared volume is limited, receiving, by the storage controller, an unfencing command from the second system, utilizing the processor, and resetting or removing the fencing indicator for the second system, utilizing the processor.
Public/Granted literature
Information query
Patent Agency Ranking
0/0