Abstract:
A system and method for signature based data container recognition is provided. When a new data container, such as a lun, is created, a security appliance generates a signature of the data container, by, e.g., examining the contents of one or more data blocks of the data container. The generated signature is then associated with the appropriate encryption key for the data container and is stored either within a configuration database of the security appliance or on a key management system operating within a security appliance environment. To identify the encryption key associated with a data container, the security appliance generates a signature of the data container and compares the generated signature with the stored signatures. Should there be a matching signature, the security appliance utilizes the encryption key associated with the matching signature to process data access requests to/from the data container.
Abstract:
An apparatus and a method to manage data using data sets are presented. In one aspect, the apparatus includes a conformance checker and a conformance engine to make data sets conform to data management policies. The conformance checker may be operable to compare a state of a data set against a data management policy associated with the data set. The conformance engine may then make the data set conform to the data management policy if the conformance checker determines that the data set currently violates the data management policy. In another aspect, the method includes allowing an administrator of a data storage system to define a data set having a plurality of storage objects and to associate the data set with a data management policy. The method may further include using a storage manager to manage the data set as a single unit according to the data management policy.
Abstract:
A system and method for referent-controlled location resolution of resources in a federated distributed system. When a client requests access to a data container from a storage system that is a member of a first federation, the storage system determines whether the requested data of the data container is locally stored. If the requested data is not locally stored, i.e., a junction exists in the local volume referencing a second volume serviced by a second federation member, the first federation member identifies the appropriate context identifier (CID) associated with the junction. The junction illustratively contains a remote volume locator and an object identifier. The CID identifies a VLDB that contains location information related to the desired data container. The first federation member resolves the CID to an appropriate VLDB service and sends a lookup request to the identified VLDB associated with the second federation member. The lookup request is processed by the VLDB and the VLDB responds with the one or more locations of the requested data container within the second federation member. The first federation member then responds to the client's original access request with a message indicating the current location(s) of the requested data container. The client then requests access to the desired data by redirecting the data access request to the identified second federation member.
Abstract:
A system and method for referent-controlled location resolution of resources in a federated distributed system. When a client requests access to a data container from a storage system that is a member of a first federation, the storage system determines whether the requested data of the data container is locally stored. If the requested data is not locally stored, i.e., a junction exists in the local volume referencing a second volume serviced by a second federation member, the first federation member identifies the ap¬ propriate context identifier (CID) associated with the junction. The junction illustratively contains a remote volume locator and an object identifier. The CID identifies a VLDB that contains location information related to the desired data container. The first federa¬ tion member resolves the CID to an appropriate VLDB service and sends a lookup re¬ quest to the identified VLDB associated with the second federation member. The lookup request is processed by the VLDB and the VLDB responds with the one or more loca¬ tions of the requested data container within the second federation member. The first fed- eration member then responds to the client's original access request with a message indi¬ cating the current location(s) of the requested data container. The client then requests access to the desired data by redirecting the data access request to the identified second federation member.
Abstract:
A field-upgradeable database that is separable from system software contains information about mass storage devices that may be present in a storage array. When an uninitialized device is detected in the array, the field-upgradeable database is consulted to discover which non-standard functions the device supports, and one of the non-standard functions is activated. Software and systems using the field-upgradeable database in a storage server configuration are also described and claimed.
Abstract:
A filesystem can be converted to a different version by creating a new data structure according to a new format of the different version and transforming the data from the filesystem to the new data structure. Transforming the data can include changing the format of the data in the filesystem to be compatible with the new data structure format. The data may be incorporated into the new data structure by copying the data, or creating indirect reference mechanisms to point to the original data.
Abstract:
Methods of obtaining and comparing data processing system configurations, and producing reports of differences between the configurations, where the configurations include elements to control access from a remote client to a storage facility of a data processing system, are described. Systems to receive and alter a configuration based on local conditions, and to use the altered configuration to control data exchange logic are also described. Software to display configuration elements, identify differences between configurations, and attach attributes to configuration elements is also described.
Abstract:
A system and method provides continuous data protection using checkpoints in a write anywhere file system. During a consistency point of a write anywhere file system, freed blocks are identified and are appended to a delete log for retention. A consistency point log is updated with a new entry associated with the consistency point. If the file system needs to retrieve its state at a particular point in time, the stored blocks of the delete log may be recovered.
Abstract:
A content addressable storage array element (CASAE) of a storage system is configured to eliminate duplicate data stored on its storage resources. The CASAE independently determines whether data associated with a write operation has already been written to a location on its storage resources. To that end, the CASAE performs a content addressable storage computation on each data block written to those resources in order to prevent storage of two or more blocks with the same data. If data of a block has been previously stored on the resources, the CASAE cooperates with a file system executing on the system to provide a reference (block pointer) to the same data block rather than duplicate the stored data. Otherwise, the CASAE stores the data block at a new location on the resources and provides a block pointer to that location.
Abstract:
A system and method are provided to manage different types of workload. The method comprises receiving a request, determining a class of the request, determining a priority level associated with the class of the request, and servicing the request utilizing the priority level of the class of the request. The class of the request may be associated with a target volume, as well as with a network protocol, or with a network port.