US20060253672A1 - Remote copy with worm guarantee - Google Patents
Remote copy with worm guarantee Download PDFInfo
- Publication number
- US20060253672A1 US20060253672A1 US11/474,359 US47435906A US2006253672A1 US 20060253672 A1 US20060253672 A1 US 20060253672A1 US 47435906 A US47435906 A US 47435906A US 2006253672 A1 US2006253672 A1 US 2006253672A1
- Authority
- US
- United States
- Prior art keywords
- volume
- attribute
- worm
- remote copy
- storage system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/16—Error detection or correction of the data by redundancy in hardware
- G06F11/20—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
- G06F11/2053—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where persistent mass storage functionality or persistent mass storage control functionality is redundant
- G06F11/2056—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where persistent mass storage functionality or persistent mass storage control functionality is redundant by mirroring
- G06F11/2069—Management of state, configuration or failover
Definitions
- the present invention relates to a storage system that constitutes a computer system, and in particular, to a remote copy function and a WORM function that the storage system has.
- the remote copy is a technique for mirroring data among plural storage systems (here, the storage system includes a storage that records data and a control apparatus that controls the storage; this applies in the following description) without the intervention of a host computer.
- the remote copy will be explained with a case in which a storage system A having a logical volume A( 1 ) and a storage system B having a logical volume B( 1 ) are connected by a network such as a Fibre Channel or an IP or a private line as an example.
- a host computer is connected to the storage system A, refers to or updates data recorded in the logical volume A( 1 ), and sets the logical volume A( 1 ) and the logical volume B( 1 ) as a pair for the remote copy.
- the storage system A updates the data recorded in the logical volume A( 1 ) and sends the updated data to the storage system B.
- the storage system B updates data recorded in the logical volume B( 1 ). In this way, the data recorded in the logical volume A( 1 ) and the data recorded in the logical volume B( 1 ) are kept identical.
- the plural storage systems are arranged remote from each other to perform the remote copy, whereby, when a disaster occurs, an operation of the computer system is continued and restored promptly. Moreover, by performing the remote copy, an operation of data recorded in a certain storage system can be transferred to another storage system.
- a method of transferring an operation of data recorded in a certain storage system to another storage system there are a method of stopping a storage system at time decided in advance to transfer an operation of data to another storage system and a method of transferring an operation of data to another storage system without stopping a storage system. Details of the remote copy are disclosed in U.S. Pat. No. 5,742,792.
- WORM is the abbreviation of Write Once Read Many, which means a characteristic of data, that is, data which is recorded once, cannot be updated and can only be referred to.
- Data having the nature of WORM is effective for proving that the data has not been falsified after the data was recorded and preventing deletion of data due to an operation mistake.
- the data having the nature of WORM will be hereinafter referred to as WORM data.
- As a method of realizing the WORM data there are a method of using a recording device having the nature of WORM as a physical nature like a Write Once CD and a method of adding a device or a program for prohibiting update of data to a storage incorporating a magnetic disk or the like that can be updated many times physically. The latter is disclosed in “Hitachi LDEV Guard”.
- the present invention discloses a system having a remote copy function for WORM data that can copy not only data but also the nature of WORM, that is, can impart the nature of WORM to copy destination data as in copy source data.
- a first control apparatus in the storage system A judges whether an attribute to the effect that data can be referred to and can be updated or an attribute to the effect that data can be referred to but cannot be updated is added to the volume in the storage system A. Then, if the volume is a volume to which the attribute to the effect that data can be referred to but cannot be updated is added, the first control apparatus instructs a second control apparatus in the storage system B to add the attribute to the effect that data can be referred to but cannot be updated to the volume in the storage system B.
- FIG. 1 is a block diagram showing an example of a structure of a system in accordance with the present invention
- FIG. 2 is a diagram showing an example of volume management information
- FIG. 3 is a diagram showing an example of a volume management table
- FIG. 4 is a diagram showing an example of a WORM attribute of a certain volume
- FIG. 5 is a diagram showing an example of a WORM attribute of a certain volume
- FIG. 6 is a flowchart showing an example of processing in which a configuration management program of a storage sets a remote copy pair
- FIG. 7 is a flowchart showing an example of processing in which a configuration management program of a storage sets an I/O control type of a volume as WORM;
- FIG. 8 is a flowchart showing an example of command processing
- FIG. 9 is a diagram showing an example of state transition in remote copy.
- FIG. 1 is a block diagram showing an example of a structure of a system to which the present invention is applied.
- the system to which the present invention is applied includes: a storage system A 110 , a storage system B 111 , a management terminal 101 ; clients 102 ; a LAN 103 that connects the management terminal 101 , the storage system A 110 , and the storage system B 111 ; and a SAN 104 that connects the clients 102 , the storage system A 110 , and the storage system B 111 .
- the storage system A 110 has a controller 126 and a disk driver group 127 .
- the storage system A 110 receives I/O requests for a logical volume in the storage system A 110 from the clients 102 connected to the SAN 104 .
- the storage system B 111 has the same structure as the storage system A 110 and receives I/O requests for a logical volume in the storage system B 111 from the clients 102 .
- the storage system B 111 is assumed to have the same structure as the storage system A 110 .
- the storage system B 111 does not have to be completely the same as the storage system A 110 .
- the disk driver group 127 has plural hard disks, and the plural hard disks are connected to an I/F 120 .
- a storage area in the disk driver group 127 is divided into plural logical volumes.
- a logical volume 122 is one of the plural logical volumes.
- Volume management information A 124 which indicates a correspondence relation and the like between the logical volumes and the hard disks, is recorded in a storage area 121 in the disk driver group 127 .
- the volume management information A 124 is assumed to be recorded in the storage area 121 in the disk driver group 127 .
- the volume management information A 124 may be recorded in flash memory or the like on the controller 126 other than the storage area 121 in the disk driver group 127 .
- the volume management information A 124 and the volume management information B 125 record that the logical volume 122 in the storage system A 110 and the logical volume 123 in the storage system B 111 form a remote copy pair, and the logical volume 122 is a primary volume and the logical volume 123 is a secondary volume.
- the remote copy pair is a set of a copy source and a copy destination of remote copy that are constituted by a primary volume and a secondary volume.
- the management terminal 101 connected to the LAN 103 designates logical volumes, which constitute the primary volume and the secondary volume, for the storage system A 110 and the storage system B 111 , whereby the remote copy pair is set.
- the controller 126 includes: a processing unit 114 ; a memory 115 in which a program to be executed by the processing unit 114 is stored; a cache 119 ; an I/F 112 that is connected to the SAN 104 ; an I/F 113 that is connected to the LAN 103 ; and an I/F 120 that is connected to the disk driver group 127 .
- An input/output processing program 116 , a remote copy program 117 , and a configuration management program 118 are stored in the memory 115 .
- the input/output processing program 116 is a program for executing processing for converting an I/O command for a logical volume received from the client 102 into an I/O command for the respective hard disks in the disk driver group 127 using the volume management information.
- the configuration management program 118 is a program for executing processing for receiving an instruction for setting of a remote copy pair from the management terminal 101 and setting the remote copy pair. Details of the remote copy pair will be described later.
- the remote copy program 117 is a program for executing processing for, when a remote copy pair is set, providing a remote copy function between the set remote copy pair.
- the remote copy function means a function for, when a remote copy pair is set, copying data stored in a primary volume to a secondary volume, and after the remote copy is set, copying data, which is written in the primary volume according to an instruction from the client 102 , to the secondary volume.
- a write request for the primary volume 122 from the client 102 is executed for the secondary volume 123 in the same manner according to the remote copy function. Therefore, the secondary volume 123 becomes a copy (mirror) of the primary volume 122 that forms the remote copy pair with the secondary volume 123 .
- FIG. 2 is a diagram showing an example of the volume management information A 124 .
- the volume management information A 124 stores and manages a volume management table A 224 and WORM attributes 300 and 400 that are prepared for each volume corresponding to volumes for which WORM is set. Details concerning the volume management table A 224 and the WORM attributes will be described later. Note that the volume management information A 124 is not limited to the volume management information of this embodiment but may include other information. In addition, in this embodiment, it is assumed that, when WORM is set for a volume, the WORM attribute 300 or 400 corresponding to the volume, for which WORM is set, is prepared according to the configuration management programs of the respective storage systems. However, the WORM attribute 300 or 400 corresponding to all volumes may be prepared in advance.
- FIG. 3 is a diagram showing an example of the volume management table A 224 .
- the volume management table A 224 stores and manages a volume number 201 , a capacity 202 , an I/O control type 203 , a WORM unit 204 , a remote copy attribute 205 , and a remote copy state 206 .
- the volume number 201 indicates the number of a logical volume.
- the capacity 202 indicates a storage capacity of a logical volume.
- An attribute of normal or WORM is set in the I/O control type 203 by the management terminal 101 or the client 102 .
- the client 102 is capable of referring to and updating all sectors concerning a logical volume for which normal is set in the I/O control type 203 .
- update of all sectors or specific sectors or files by the client 102 is restricted on the basis of the WORM unit 204 and conditions set in a WORM attribute shown in FIG. 4 or 5 .
- a unit for restricting update of a logical volume, for which WORM is set, is set in the WORM unit 204 by the management terminal 101 or the client 102 .
- a file, a sector, and a volume are described as examples of the unit.
- any unit can be applied as the WORM unit 204 as long as the unit designates a specific part of a logical volume.
- update for all sectors of the volume is prohibited.
- update for a sector which is set as an update prohibited area in the WORM attribute 300 , is prohibited.
- a file In the case in which a file is set as the WORM unit 204 , update for a file, which is set as an update prohibited file in the WORM attribute 400 , corresponding to the volume is prohibited.
- the storage system A 110 and the storage system B 111 in FIG. 1 should have a file server function, or a file server, which communicates with the storage system A 110 and the storage system B 111 , should be present on the SAN 104 .
- the remote copy attribute 205 indicates whether the logical volume constitutes a remote copy pair. If the logical volume constitutes a remote copy pair, it is recorded in the remote copy attribute 205 whether the logical volume is a primary volume or a secondary volume. Note that, although not shown in the figure, if the logical volume constitutes a remote copy pair, the remote copy attribute 205 also includes additional information such as a volume number of the other logical volume forming the remote copy pair and an identification (ID) of a storage including the logical volume. As the identification (ID) of the storage, there is, for example, a World Wide Name (WWN) or the like of the Fibre Channel standard.
- WWN World Wide Name
- a remote copy pair in which both a primary volume and a secondary volume have the attribute of WORM, is called a WORM remote copy pair.
- the attribute of WORM of the primary volume can be transferred to the secondary volume.
- a state of remote copy is recorded in the remote copy state 206 .
- a type and transition of a state will be described later in conjunction with an explanation of FIG. 7 .
- FIG. 4 is a diagram showing an example of a WORM attribute provided in the volume management information A 124 for each logical volume.
- the WORM attribute shown in FIG. 4 is attribute information of a volume, for which an I/O control type is WORM and a sector is designated as the WORM unit 204 , among the volumes in FIG. 3 .
- a WORM sector range 310 included in the WORM attribute 300 includes plural pieces of information indicating an update prohibited area.
- the information indicating the update prohibiting area is constituted by a set of a starting address 311 and an ending address 312 and ON or OFF of a write flag 313 . These pieces of information are designated by the management terminal 101 or the client 102 .
- the write flag 313 indicates whether data can be written or updated once in the update prohibited area. ON indicates that data can be written or updated once in the update prohibited area, and OFF indicates that data cannot be written and updated in the update prohibited area.
- the WORM attribute 300 has a write management bit map 314 corresponding to the update prohibited area and manages whether data is written or updated once in each sector in the update prohibited area using the write management bitmap 314 .
- the input/output processing program 116 switches the write flag to OFF.
- a log of events concerning remote copy is recorded in an event log 320 included in the WORM attribute 300 .
- the events concerning remote copy include, for example, transition of a remote copy state shown in FIG. 7 .
- the event log includes, for example, a sequence number 321 , an event occurrence time 322 , and an event content 323 .
- FIG. 5 is a diagram showing another example of the WORM attribute provided in the volume management information A 124 for each logical volume.
- the WORM attribute shown in FIG. 5 is attribute information of a volume, for which an I/O control type is WORM and a file is designated as the WORM unit 204 , among the volumes in FIG. 3 .
- a set of WORM files 410 included in the WORM attribute 400 includes plural pieces of information indicating update prohibited files.
- the information indicating update prohibited files is constituted by a pathname 411 and ON or OFF of the write flag 412 . These pieces of information are designated by the management terminal 101 or the client 102 .
- the write flag 412 indicates whether data can be written or updated once in the file. ON indicates that data can be written or updated once in the file, and OFF indicates that data cannot be written or updated in the file.
- the WORM attribute 400 has a write management bitmap 413 corresponding to a storage area, in which the file is stored, and manages whether data has been written or updated once in each sector in the storage area in which the file is stored.
- the input/output processing program 116 switches the write flag to OFF.
- a log of events concerning remote copy is recorded in an event log 420 as in the event log 320 in FIG. 4 .
- WORM is set for a storage area in which data has already been written. After WORM is set, writing and update of data in the storage area are prohibited.
- Whether WORM is set by a method of the type 1 or the type 2 is determined by an instruction of the configuration management program 118 from the management terminal 101 or the client 102 .
- FIG. 6 is a diagram showing an example of processing in which the management terminal 101 connected to the LAN 103 sets a remote copy pair for the storage system A 110 and the storage system B 111 in FIG. 1 . Respective steps of remote copy pair setting 500 will be hereinafter explained.
- step 501 a user instructs the storage system A 110 and the storage system B 111 to form a remote copy pair from the management terminal 101 .
- Designation by the user includes identification information for a volume in the storage system A 110 to be a primary volume and identification information for a volume in the storage system B 111 to be a secondary volume.
- step 502 the configuration management program 118 in the storage system B 111 judges whether the logical volume designated as the secondary volume has a WORM attribute with reference to the I/O control type 203 included in the volume management information B 124 . If the logical volume designated as the secondary volume has the WORM attribute, in step 504 , the configuration management program 118 informs the user of irregularity of the instruction, which leads to an abnormal end. This is because, if the secondary volume has the WORM attribute before remote copy is set, data copied from the primary volume may not be saved.
- the configuration management program 118 of the storage system B 111 informs the configuration management program 118 of the storage system A 110 that the logical volume designated as the secondary volume does not have the WORM attribute.
- step 503 the configuration management program 118 of the storage system A 110 judges whether the logical volume designated as the primary volume has the WORM attribute with reference to the I/O control type 203 included in the volume management information A 124 .
- the configuration management program 118 of the storage system A 110 sets the I/O control type 203 of the secondary volume to WORM.
- the configuration management program 118 of the storage system A 110 having the primary volume communicates with the configuration management program 118 of the storage system B 111 having the secondary volume through the LAN 103 or the SAN 104 and instructs the latter to set the secondary volume to WORM.
- the configuration management program of the storage system B 111 sets the I/O control type 203 of the secondary volume to WORM according to the instruction from the configuration management program 118 of the storage system A 110 .
- the configuration management program 118 of the storage system B 111 creates the WORM attribute 300 or 400 , which corresponds to the volume designated as the secondary volume, on the basis of the WORM unit 204 of the primary volume and sets the WORM unit 204 in the same manner as the primary volume.
- step 506 the respective configuration management programs 118 of the storage system A 110 and the storage system B 111 write IDs of the primary volume and the secondary volume, which are designated by the user in step 501 , in the remote copy attribute 205 .
- the respective configuration management programs 118 send completion of the remote copy pair setting to the management terminal, inform the user of the completion, and end the remote copy pair setting normally (step 507 ).
- the WORM attribute is automatically set for the secondary volume, whereby setting for a WORM remote copy pair can be performed automatically without drawing the user's attention.
- any one of the logical volumes in the storage system A 110 is designated as a primary volume and any one of the logical volumes in the storage system B 111 is designated as a secondary volume to set a remote copy pair.
- any one of the logical volumes in the storage system B 111 is set as a primary volume and any one of the logical volumes in the storage system A 110 is set as a secondary volume to set a remote copy pair in the same manner.
- FIG. 7 is a diagram showing an example of WORM setting processing in which the management terminal 101 connected to the LAN 103 changes an I/O control type of a logical volume in the storage system A 110 to WORM. Processing for changing an I/O control type of a logical volume in the storage system B 111 to WORM can be executed in the same manner. Respective steps of WORM setting processing 600 will be hereinafter explained.
- step 601 a user designates a logical volume, for which an I/O control type is set to WORM, from the management terminal 101 and informs the configuration management program 118 of the storage system A 110 of the logical volume.
- step 602 the configuration management program 118 of the storage system A 110 in FIG. 1 judges whether the logical volume designated by the user is a secondary volume with reference to the remote copy attribute 205 of FIG. 3 included in the volume management table A 124 . If a remote copy attribute of the logical volume is secondary, in step 604 , the configuration management program 118 of the storage system A informs irregularity of the designation to the user, which leads to abnormal end. This is because, when only the secondary volume has a WORM attribute, data copied from a primary volume to the secondary volume cannot be saved in some cases.
- step 605 the configuration management program 118 of the storage system A 110 sets the I/O control type 203 of the logical volume designated by the user to WORM and sets the I/O control type 203 of a secondary volume, which forms a remote copy pair with the logical volume designated by the user, to WORM in the same manner as step 505 in FIG. 6 . Consequently, the remote copy pair has been automatically changed to a WORM remote copy pair.
- step 6051 the configuration management program 118 of the storage system A 110 sets the I/O control type 203 of the logical volume designated by the user to WORM.
- the configuration management program 118 of the storage system create the WORM attribute 300 or 400 corresponding to the volume for which the I/O control type 203 is set to WORM.
- step 606 the control management program 118 of the storage system A 110 informs the user of completion of the WORM setting and normally ends the WORM setting (step 607 ).
- the WORM attribute is automatically set also in the secondary volume, whereby the remote copy pair is automatically changed to a WORM remote copy pair without drawing attention of the user.
- the configuration management program 118 creates an event log and records the event log in the WORM attribute.
- the configuration management program 118 of the storage system A 110 is instructed by the client 102 or the management terminal 101 to copy data of a primary volume to a secondary volume in the storage system B 111 and executes the instruction
- the configuration management program 118 of the storage system A 110 creates an event log to that effect and stores the event log in the volume management information A 124 .
- the configuration management program 118 of the storage system A 110 instructs the configuration management program 118 of the storage system B 111 to store the event log, which is created by the configuration management program 118 of the storage system A 110 , in the volume management information B.
- consistency of event logs stored in WORM attributes corresponding to the primary and secondary volumes, which form a remote copy pair, is kept.
- FIG. 8 is a flowchart showing an example of processing in the case in which the client 102 has issued a write request for a logical volume to the storage system A 110 .
- command processing 800 will be explained with a case in which a WORM unit is a sector as an example.
- the command processing 800 will be explained with a case in which WORM is set by the method of the type 1 as an example.
- step 801 the input/output processing program 116 extracts one command among commands, which are sent from the client 102 and stored in a command queue on the memory 115 , from the command queue.
- step 802 the input/output processing program 116 judges whether the command is a command for updating a sector on a basis of a field indicating the type of a command. If the command is a command for updating a sector, the input/output processing program 116 shifts to step 803 . If the command is a command not for updating a sector such as a command for reading, the input/output processing program 116 shifts to step 806 .
- step 803 the input/output processing program 116 judges whether a sector, which is an object of the command, is included in the WORM sector range 310 with reference to the WORM attribute 300 of FIG. 4 for a volume, which is an object of the command. If the sector is included in the WORM sector range 310 , the input/output processing program 116 shifts to step 804 . If the sector is not included in the WORM sector range 310 , the input/output processing program 116 shifts to step 806 .
- step 804 the input/output processing program 116 judges whether the volume is a secondary volume of a remote copy pair with reference to the remote copy attribute 205 of FIG. 2 for the volume, which is an object of the command. If the volume is a secondary volume of a remote copy pair, the input/output processing program 116 shifts to step 805 . If the volume is not a secondary volume of a remote copy pair, the input/output processing program 116 judges that the command is an irregular update command for an update prohibited sector and shifts to step 807 .
- step 805 the input/output processing program 116 judges whether the command is a command generated by remote copy from a primary volume forming the remote copy pair.
- each I/F has an identifier called a WWN (World Wide Name). Similar identifiers are present in the other network systems.
- the command includes an area in which the identifier of the SAN I/F of the apparatus that has issued the command.
- the configuration management program 118 of FIG. 1 records a WWN of the I/F 112 of the storage system A 110 having the primary volume 122 in the volume management information B 125 when the configuration management program 118 sets a remote copy pair.
- the input/output processing program 116 can compare the identifier stored in the command and the identifier recorded in the volume management information B 125 and judge whether the update command for the secondary volume is a command generated by remote copy from the primary volume.
- a method of adding a code indicating that a command is a regular remote copy command when the remote copy program 117 of a storage system having a primary volume sends the command to a remote copy program of a storage system having a secondary volume is possible.
- a message authentication code and the like are known.
- step 805 If it is judged in step 805 that the command is judged as a regular remote copy command, the input/output processing program 116 shifts to step 806 . If it is judged in step 805 that the command is not a regular remote copy command, the input/output processing program 116 shifts to step 807 . In step 806 , the input/output processing program 116 executes normal command processing. If there is no failure in the apparatus, abnormality of the command, or the like, the input/output processing program 116 executes step 809 to normally end the command processing ( 810 ). In step 807 , the command processing ends abnormally ( 808 ).
- step 804 the input/output processing program 116 judges whether a write flag of a sector, for which data is about to be updated, is ON with reference to the WORM attribute 300 . If the write flag is ON, the input/output processing program 116 judges whether data has been written once in the sector, for which data is about to be updated, with reference to a bitmap of the sector. If data has not been written in the sector once, the input/output processing program 116 shifts to step 806 .
- step 807 when input/output processing program 116 judges data has been written once in the sector, for which data is about to be updated, with reference to a bit map of the sector, the input/output processing program 116 proceeds to step 807 .
- a program for adding an electronic signature or a message authentication code which can be generated by only a storage system having a primary volume, to copy data to be sent from the primary volume to a secondary volume, a program for verifying the electronic signature or the message authentication code added to the copy data in a storage system having the secondary volume, and a program for prohibiting update of the secondary volume according to the copy data if authentication fails on the basis of the verification of the electronic signature or the message authentication code are added to the remote copy program 117 . Consequently, control can be performed surely such that data in the secondary volume of the WORM remote copy pair is not updated according to irregular data other than the copy data of the data stored in the primary volume from the storage system having the primary volume.
- FIG. 9 is a diagram showing an example of transition of the remote copy state 206 of the volume management table A 224 in FIG. 3 .
- No remote copy indicates a state in which a pertinent volume is a volume not forming a remote copy pair (state 701 ).
- Copying indicates a state in which data of a primary volume is being copied to a secondary volume in order to make data of the secondary volume identical with that in the primary volume (state 702 ).
- state 702 in the primary volume and the secondary volume, not only data but also WORM attributes of both the volumes are made identical.
- the WORM attribute 300 or 400 of the primary volume is sent from the storage system A 110 to the storage system B 111 by the remote copy program 117 and copied to the WORM attribute 300 or 400 of the secondary volume.
- Pair indicates a state in which update of data according to a write request for the primary volume from the client 102 is also executed for the secondary volume (state 703 ).
- state 703 not only the update of data according to the write request to the storage system A 110 from the client 102 but also the update of the WORM attribute for the primary volume is executed for the secondary volume.
- the management terminal 101 or the client 102 instructs the storage system A 110 , which has the primary volume, and the storage system B 111 , which has the secondary volume corresponding to the primary volume, to switch an operation of the primary and the secondary volumes, whereby an operation of a volume can be switched.
- Pair suspend indicates a state in which the update of data according to the write request for the primary volume from the client 102 is not executed for the secondary volume (state 704 ).
- Communication error indicates a state in which a communication failure or a failure in any one of storages forming a WORM remote copy pair has occurred (state 705 ).
- Pair deletion indicates a state in which a remote copy pair is deleted (state 706 ).
- Transition from the state 701 to the state 702 is performed by the remote copy pair setting 500 shown in FIG. 6 (transition 711 ).
- Copy of data from the primary volume to the secondary volume, which is executed for forming a remote copy pair in the transition 711 is referred to as initial copy.
- the remote copy state 206 transits to the state 703 (transition 712 ).
- the remote copy state 206 transits to the state 705 (transition 717 ).
- the management terminal 101 or the client 102 instructs the storage system A 110 not to execute update of data for the secondary volume, whereby the remote copy state 206 transits to the state 704 (transition 714 ).
- the remote copy state 206 transits to the state 705 (transition 715 ).
- the management terminal 101 or the client 102 instructs the storage system A 110 to copy data of the primary volume to the secondary volume, whereby the remote copy state 206 transits to the state 702 (transition 713 ).
- transition 713 in order to reflect the update of the data executed for the primary volume during the pair suspend (state 704 ) on the secondary volume, updated data stored in the primary volume during the pair suspend is copied to the secondary volume.
- Processing for making the data of the primary volume and the data of the secondary volume identical-through this copy processing is referred to as resynchronization.
- the resynchronization includes processing for making the WORM attribute 300 or 400 of the primary volume and that of the secondary volume identical.
- the management terminal 101 or the client 102 instructs the storage system A 110 to delete the remote copy pair, whereby the remote copy state 206 transits to the state 706 (transition 719 ).
- the remote copy state 206 transits to the state 702 (transition 716 ).
- transition 716 in order to reflect the update of the data executed for the primary volume during the communication error (state 705 ) on the secondary volume, updated data stored in the primary volume during the communication error is copied to the secondary volume.
- Processing for making the data of the primary volume and the data of the secondary volume identical through this copy processing is referred to as resynchronization.
- the resynchronization includes processing for making the WORM attribute 300 or 400 of the primary volume and that of the secondary volume identical.
- the management terminal 101 or the client 102 instructs the storage system A 110 to delete the remote copy pair, whereby the remote copy state 206 transits from the state 705 to the state 706 (transition 718 ).
- the remote copy attributes 205 and the remote copy states 206 corresponding to both the volumes forming the WORM remote copy pair change to “none”.
- the I/O control types 203 of both the volumes change to WORM.
- the data stored in the primary volume and the WORM attribute set in the primary volume at the point when the remote copy state 206 transited to the state 704 through the transition 714 finally or at the point when the remote copy state 206 transited to the state 705 through the transition 715 are transferred to the secondary volume.
- transfer of the data and the WORM attribute after that point is not guaranteed. It can be confirmed to which point the data and the WORM attribute have been transferred with reference to the event log 320 ( FIG. 4 ) or the event log 420 ( FIG. 5 ) of the volume that has been the secondary volume.
- the I/O control types of both the volumes after the pair deletion, which have been the primary volume and the secondary volume, are WORM.
- the WORM remote copy pair cannot be formed again according to the restriction described in the explanation of the remote copy pair setting 500 in FIG. 6 .
- the data to be stored in the volume designated as the primary volume, for which the I/O control type is WORM is initially copied in the state 702 , and the I/O control type of the volume designated as the secondary volume is set to WORM.
- update of data in the secondary volume by means other than the remote copy program is prohibited to prevent illegal falsification. This realizes the WORM remote copy that can impart the same character as in the primary volume, which makes it possible to prove that data recorded initially has not been falsified, to the secondary volume.
- the operation of the system can be continued using the logical volume, which was the secondary volume before the replacement, while maintaining a non-falsification proving capability equivalent to that of the logical volume which was the primary volume before the replacement.
- the configuration management program 118 in FIG. 1 judges whether the logical volume designated as the primary volume is WORM or not using the I/O control type of the volume for which remote copy pair formation is instructed, whereby a WORM remote copy pair can be formed automatically.
- the configuration management program 118 of FIG. 1 judges a remote copy attribute of a logical volume, for which the configuration management program 118 is instructed to change the I/O control type to WORM, whereby a WORM remote copy pair can be formed automatically.
- the logical volume is illustrated as an object of remote copy.
- the same method as this embodiment is applicable to remote copy targeting a physical volume, a directory or a file in a file system, and the like in order to realize WORM.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
- Techniques For Improving Reliability Of Storages (AREA)
Abstract
In the case in which data in a storage system A is remotely copied to a storage system B, it is not taken into account whether the data of the remote copy is WORM data. In the case in which a setting is made such that data stored in a volume in the storage system A is copied to a volume in the storage system B, storage system A judges whether an attribute to the effect that data can be referred to and can be updated or to the effect that data can be referred to but cannot be updated is added to the volume in the storage system A. Then, if the volume is a volume to which the attribute to the effect that data can be referred to but cannot be updated is added, such attribute is added to the volume in the storage system B.
Description
- This application relates to and claims priority from Japanese Patent Application No. 2004-157034, filed on May 27, 2004, the entire disclosure of which is incorporated herein by reference.
- 1. Field of the Invention
- The present invention relates to a storage system that constitutes a computer system, and in particular, to a remote copy function and a WORM function that the storage system has.
- 2. Description of the Related Art
- The remote copy is a technique for mirroring data among plural storage systems (here, the storage system includes a storage that records data and a control apparatus that controls the storage; this applies in the following description) without the intervention of a host computer. The remote copy will be explained with a case in which a storage system A having a logical volume A(1) and a storage system B having a logical volume B(1) are connected by a network such as a Fibre Channel or an IP or a private line as an example.
- By performing the remote copy, contents recorded in the logical volume A(1) and the logical volume B(1) are kept identical. A host computer is connected to the storage system A, refers to or updates data recorded in the logical volume A(1), and sets the logical volume A(1) and the logical volume B(1) as a pair for the remote copy. When the host computer issues a command for updating the data recorded in the logical volume A(1) to the storage system A, the storage system A updates the data recorded in the logical volume A(1) and sends the updated data to the storage system B. The storage system B updates data recorded in the logical volume B(1). In this way, the data recorded in the logical volume A(1) and the data recorded in the logical volume B(1) are kept identical.
- The plural storage systems are arranged remote from each other to perform the remote copy, whereby, when a disaster occurs, an operation of the computer system is continued and restored promptly. Moreover, by performing the remote copy, an operation of data recorded in a certain storage system can be transferred to another storage system. As a method of transferring an operation of data recorded in a certain storage system to another storage system, there are a method of stopping a storage system at time decided in advance to transfer an operation of data to another storage system and a method of transferring an operation of data to another storage system without stopping a storage system. Details of the remote copy are disclosed in U.S. Pat. No. 5,742,792.
- WORM is the abbreviation of Write Once Read Many, which means a characteristic of data, that is, data which is recorded once, cannot be updated and can only be referred to. Data having the nature of WORM is effective for proving that the data has not been falsified after the data was recorded and preventing deletion of data due to an operation mistake. The data having the nature of WORM will be hereinafter referred to as WORM data. As a method of realizing the WORM data, there are a method of using a recording device having the nature of WORM as a physical nature like a Write Once CD and a method of adding a device or a program for prohibiting update of data to a storage incorporating a magnetic disk or the like that can be updated many times physically. The latter is disclosed in “Hitachi LDEV Guard”.
- In a conventional technique, in the case in which the data in the storage system A is remotely copied to the storage system B, it is not taken into account whether data to be copied is WORM data. Therefore, for example, when the storage system A breaks down due to a disaster during the remote copy, and an operation of a system has to be continued using the data copied to the storage system B remotely, since the data recorded in the storage system B is not WORM data, falsification of the data is possible, and it cannot be proved that the data has not been falsified after the data was recorded. In addition, the same problem occurs when an operation of data in a storage system is transferred to another storage system in a planned manner.
- Thus, the present invention discloses a system having a remote copy function for WORM data that can copy not only data but also the nature of WORM, that is, can impart the nature of WORM to copy destination data as in copy source data.
- In the case in which setting is made such that data stored in a volume in the storage system A is copied to a volume in the storage system B, a first control apparatus in the storage system A judges whether an attribute to the effect that data can be referred to and can be updated or an attribute to the effect that data can be referred to but cannot be updated is added to the volume in the storage system A. Then, if the volume is a volume to which the attribute to the effect that data can be referred to but cannot be updated is added, the first control apparatus instructs a second control apparatus in the storage system B to add the attribute to the effect that data can be referred to but cannot be updated to the volume in the storage system B.
- When the remote copy is performed among plural storage systems, not only data but also the nature of WORM can be copied from one storage system to the other storage systems. In other words, the nature of WORM can be imparted to copy destination data as in copy source data.
- In the accompanying drawings:
-
FIG. 1 is a block diagram showing an example of a structure of a system in accordance with the present invention; -
FIG. 2 is a diagram showing an example of volume management information; -
FIG. 3 is a diagram showing an example of a volume management table; -
FIG. 4 is a diagram showing an example of a WORM attribute of a certain volume; -
FIG. 5 is a diagram showing an example of a WORM attribute of a certain volume; -
FIG. 6 is a flowchart showing an example of processing in which a configuration management program of a storage sets a remote copy pair; -
FIG. 7 is a flowchart showing an example of processing in which a configuration management program of a storage sets an I/O control type of a volume as WORM; -
FIG. 8 is a flowchart showing an example of command processing; and -
FIG. 9 is a diagram showing an example of state transition in remote copy. - An embodiment of the present invention will be hereinafter explained with reference to the accompanying drawings. Note that the present invention is not limited to this embodiment.
-
FIG. 1 is a block diagram showing an example of a structure of a system to which the present invention is applied. - The system to which the present invention is applied includes: a
storage system A 110, astorage system B 111, amanagement terminal 101;clients 102; aLAN 103 that connects themanagement terminal 101, thestorage system A 110, and thestorage system B 111; and a SAN 104 that connects theclients 102, thestorage system A 110, and thestorage system B 111. - The storage system A 110 has a
controller 126 and adisk driver group 127. Thestorage system A 110 receives I/O requests for a logical volume in thestorage system A 110 from theclients 102 connected to the SAN 104. - The
storage system B 111 has the same structure as thestorage system A 110 and receives I/O requests for a logical volume in thestorage system B 111 from theclients 102. In this embodiment, thestorage system B 111 is assumed to have the same structure as thestorage system A 110. However, thestorage system B 111 does not have to be completely the same as thestorage system A 110. - The
disk driver group 127 has plural hard disks, and the plural hard disks are connected to an I/F 120. A storage area in thedisk driver group 127 is divided into plural logical volumes. Alogical volume 122 is one of the plural logical volumes. Volumemanagement information A 124, which indicates a correspondence relation and the like between the logical volumes and the hard disks, is recorded in astorage area 121 in thedisk driver group 127. In this embodiment, the volumemanagement information A 124 is assumed to be recorded in thestorage area 121 in thedisk driver group 127. However, the volumemanagement information A 124 may be recorded in flash memory or the like on thecontroller 126 other than thestorage area 121 in thedisk driver group 127. - In this embodiment, it is assumed that the volume
management information A 124 and the volumemanagement information B 125 record that thelogical volume 122 in thestorage system A 110 and thelogical volume 123 in thestorage system B 111 form a remote copy pair, and thelogical volume 122 is a primary volume and thelogical volume 123 is a secondary volume. Here, the remote copy pair is a set of a copy source and a copy destination of remote copy that are constituted by a primary volume and a secondary volume. Themanagement terminal 101 connected to theLAN 103 designates logical volumes, which constitute the primary volume and the secondary volume, for thestorage system A 110 and thestorage system B 111, whereby the remote copy pair is set. - The
controller 126 includes: aprocessing unit 114; amemory 115 in which a program to be executed by theprocessing unit 114 is stored; acache 119; an I/F 112 that is connected to the SAN 104; an I/F 113 that is connected to theLAN 103; and an I/F 120 that is connected to thedisk driver group 127. An input/output processing program 116, aremote copy program 117, and aconfiguration management program 118 are stored in thememory 115. - The input/
output processing program 116 is a program for executing processing for converting an I/O command for a logical volume received from theclient 102 into an I/O command for the respective hard disks in thedisk driver group 127 using the volume management information. - The
configuration management program 118 is a program for executing processing for receiving an instruction for setting of a remote copy pair from themanagement terminal 101 and setting the remote copy pair. Details of the remote copy pair will be described later. - The
remote copy program 117 is a program for executing processing for, when a remote copy pair is set, providing a remote copy function between the set remote copy pair. Here, the remote copy function means a function for, when a remote copy pair is set, copying data stored in a primary volume to a secondary volume, and after the remote copy is set, copying data, which is written in the primary volume according to an instruction from theclient 102, to the secondary volume. A write request for theprimary volume 122 from theclient 102 is executed for thesecondary volume 123 in the same manner according to the remote copy function. Therefore, thesecondary volume 123 becomes a copy (mirror) of theprimary volume 122 that forms the remote copy pair with thesecondary volume 123. -
FIG. 2 is a diagram showing an example of the volumemanagement information A 124. The volume management information A 124 stores and manages a volumemanagement table A 224 and WORM attributes 300 and 400 that are prepared for each volume corresponding to volumes for which WORM is set. Details concerning the volumemanagement table A 224 and the WORM attributes will be described later. Note that the volumemanagement information A 124 is not limited to the volume management information of this embodiment but may include other information. In addition, in this embodiment, it is assumed that, when WORM is set for a volume, theWORM attribute WORM attribute -
FIG. 3 is a diagram showing an example of the volumemanagement table A 224. The volumemanagement table A 224 stores and manages avolume number 201, acapacity 202, an I/O control type 203, aWORM unit 204, aremote copy attribute 205, and aremote copy state 206. - The
volume number 201 indicates the number of a logical volume. - The
capacity 202 indicates a storage capacity of a logical volume. - An attribute of normal or WORM is set in the I/
O control type 203 by themanagement terminal 101 or theclient 102. Theclient 102 is capable of referring to and updating all sectors concerning a logical volume for which normal is set in the I/O control type 203. On the other hand, concerning a logical volume for which WORM is set in the I/O control type 203, update of all sectors or specific sectors or files by theclient 102 is restricted on the basis of theWORM unit 204 and conditions set in a WORM attribute shown inFIG. 4 or 5. - A unit for restricting update of a logical volume, for which WORM is set, is set in the
WORM unit 204 by themanagement terminal 101 or theclient 102. In this embodiment, a file, a sector, and a volume are described as examples of the unit. However, any unit can be applied as theWORM unit 204 as long as the unit designates a specific part of a logical volume. In the case in which a volume is set as theWORM unit 204, update for all sectors of the volume is prohibited. In the case in which a sector is set as theWORM unit 204, update for a sector, which is set as an update prohibited area in theWORM attribute 300, is prohibited. In the case in which a file is set as theWORM unit 204, update for a file, which is set as an update prohibited file in theWORM attribute 400, corresponding to the volume is prohibited. However, in the case in which a file is designated as theWORM unit 204, thestorage system A 110 and thestorage system B 111 inFIG. 1 should have a file server function, or a file server, which communicates with thestorage system A 110 and thestorage system B 111, should be present on theSAN 104. - The
remote copy attribute 205 indicates whether the logical volume constitutes a remote copy pair. If the logical volume constitutes a remote copy pair, it is recorded in theremote copy attribute 205 whether the logical volume is a primary volume or a secondary volume. Note that, although not shown in the figure, if the logical volume constitutes a remote copy pair, theremote copy attribute 205 also includes additional information such as a volume number of the other logical volume forming the remote copy pair and an identification (ID) of a storage including the logical volume. As the identification (ID) of the storage, there is, for example, a World Wide Name (WWN) or the like of the Fibre Channel standard. Here, a remote copy pair, in which both a primary volume and a secondary volume have the attribute of WORM, is called a WORM remote copy pair. By forming the WORM remote copy pair, the attribute of WORM of the primary volume can be transferred to the secondary volume. - If the logical volume constitutes a remote copy pair, a state of remote copy is recorded in the
remote copy state 206. A type and transition of a state will be described later in conjunction with an explanation ofFIG. 7 . -
FIG. 4 is a diagram showing an example of a WORM attribute provided in the volumemanagement information A 124 for each logical volume. The WORM attribute shown inFIG. 4 is attribute information of a volume, for which an I/O control type is WORM and a sector is designated as theWORM unit 204, among the volumes inFIG. 3 . - A
WORM sector range 310 included in theWORM attribute 300 includes plural pieces of information indicating an update prohibited area. The information indicating the update prohibiting area is constituted by a set of a startingaddress 311 and an endingaddress 312 and ON or OFF of awrite flag 313. These pieces of information are designated by themanagement terminal 101 or theclient 102. Thewrite flag 313 indicates whether data can be written or updated once in the update prohibited area. ON indicates that data can be written or updated once in the update prohibited area, and OFF indicates that data cannot be written and updated in the update prohibited area. Moreover, in the case in which thewrite flag 313 is ON, theWORM attribute 300 has a writemanagement bit map 314 corresponding to the update prohibited area and manages whether data is written or updated once in each sector in the update prohibited area using thewrite management bitmap 314. When data is written or updated once in all sectors in the update prohibited area designated by the startingaddress 311 and the endingaddress 312, the input/output processing program 116 switches the write flag to OFF. - Note that, in the case in which the I/O control type is WORM and a volume is designated as the
WORM unit 204 in a volume among the volumes inFIG. 3 , all storage areas of the volume are registered in theWORM sector range 310 inFIG. 4 . - A log of events concerning remote copy is recorded in an
event log 320 included in theWORM attribute 300. Here, the events concerning remote copy include, for example, transition of a remote copy state shown inFIG. 7 . In addition, the event log includes, for example, asequence number 321, anevent occurrence time 322, and anevent content 323. -
FIG. 5 is a diagram showing another example of the WORM attribute provided in the volumemanagement information A 124 for each logical volume. The WORM attribute shown inFIG. 5 is attribute information of a volume, for which an I/O control type is WORM and a file is designated as theWORM unit 204, among the volumes inFIG. 3 . - A set of WORM files 410 included in the
WORM attribute 400 includes plural pieces of information indicating update prohibited files. The information indicating update prohibited files is constituted by apathname 411 and ON or OFF of thewrite flag 412. These pieces of information are designated by themanagement terminal 101 or theclient 102. Thewrite flag 412 indicates whether data can be written or updated once in the file. ON indicates that data can be written or updated once in the file, and OFF indicates that data cannot be written or updated in the file. Moreover, in the case in which thewrite flag 412 is ON, theWORM attribute 400 has awrite management bitmap 413 corresponding to a storage area, in which the file is stored, and manages whether data has been written or updated once in each sector in the storage area in which the file is stored. When data is written or updated once in all the sectors in the storage area, in which the file is stored, designated by a pathname, the input/output processing program 116 switches the write flag to OFF. - A log of events concerning remote copy is recorded in an
event log 420 as in theevent log 320 inFIG. 4 . - Note that, in this embodiment, there are two type as a method of setting WORM for a volume.
- In the
type 1, WORM is set for a storage area in which data has already been written. After WORM is set, writing and update of data in the storage area are prohibited. - In the
type 2, after WORM is set for a storage area, writing or update of data is permitted only once. However, after data is written or updated once, both writing and update of data in the storage area are prohibited. - Whether WORM is set by a method of the
type 1 or thetype 2 is determined by an instruction of theconfiguration management program 118 from themanagement terminal 101 or theclient 102. - In the case in which WORM is set only by the method of the
type 1, in all cases in which theWORM unit 204 is a sector, a volume, a file, and the like, a write flag and a write management bitmap are unnecessary. -
FIG. 6 is a diagram showing an example of processing in which themanagement terminal 101 connected to theLAN 103 sets a remote copy pair for thestorage system A 110 and thestorage system B 111 inFIG. 1 . Respective steps of remote copy pair setting 500 will be hereinafter explained. - In
step 501, a user instructs thestorage system A 110 and thestorage system B 111 to form a remote copy pair from themanagement terminal 101. Designation by the user includes identification information for a volume in thestorage system A 110 to be a primary volume and identification information for a volume in thestorage system B 111 to be a secondary volume. - In
step 502, theconfiguration management program 118 in thestorage system B 111 judges whether the logical volume designated as the secondary volume has a WORM attribute with reference to the I/O control type 203 included in the volumemanagement information B 124. If the logical volume designated as the secondary volume has the WORM attribute, instep 504, theconfiguration management program 118 informs the user of irregularity of the instruction, which leads to an abnormal end. This is because, if the secondary volume has the WORM attribute before remote copy is set, data copied from the primary volume may not be saved. If the logical volume designated as the secondary volume does not have the WORM attribute, theconfiguration management program 118 of thestorage system B 111 informs theconfiguration management program 118 of thestorage system A 110 that the logical volume designated as the secondary volume does not have the WORM attribute. - In
step 503, theconfiguration management program 118 of thestorage system A 110 judges whether the logical volume designated as the primary volume has the WORM attribute with reference to the I/O control type 203 included in the volumemanagement information A 124. In the case in which the logical volume designated as the primary volume has the WORM attribute, instep 505, theconfiguration management program 118 of thestorage system A 110 sets the I/O control type 203 of the secondary volume to WORM. In this case, theconfiguration management program 118 of thestorage system A 110 having the primary volume communicates with theconfiguration management program 118 of thestorage system B 111 having the secondary volume through theLAN 103 or theSAN 104 and instructs the latter to set the secondary volume to WORM. The configuration management program of thestorage system B 111 sets the I/O control type 203 of the secondary volume to WORM according to the instruction from theconfiguration management program 118 of thestorage system A 110. Theconfiguration management program 118 of thestorage system B 111 creates theWORM attribute WORM unit 204 of the primary volume and sets theWORM unit 204 in the same manner as the primary volume. Concerning a volume which is set to the attribute of WORM and for which theremote copy attribute 205 is secondary, only update processing for copying data from the primary volume is permitted, and update from theclient 102 is prohibited. - In
step 506, the respectiveconfiguration management programs 118 of thestorage system A 110 and thestorage system B 111 write IDs of the primary volume and the secondary volume, which are designated by the user instep 501, in theremote copy attribute 205. The respectiveconfiguration management programs 118 send completion of the remote copy pair setting to the management terminal, inform the user of the completion, and end the remote copy pair setting normally (step 507). - As described above, in the case in which a volume for which the WORM attribute is set is designated as the primary volume in the remote copy pair setting 500, the WORM attribute is automatically set for the secondary volume, whereby setting for a WORM remote copy pair can be performed automatically without drawing the user's attention.
- In the above explanation, it is assumed that any one of the logical volumes in the
storage system A 110 is designated as a primary volume and any one of the logical volumes in thestorage system B 111 is designated as a secondary volume to set a remote copy pair. However, it is possible to assume that any one of the logical volumes in thestorage system B 111 is set as a primary volume and any one of the logical volumes in thestorage system A 110 is set as a secondary volume to set a remote copy pair in the same manner. -
FIG. 7 is a diagram showing an example of WORM setting processing in which themanagement terminal 101 connected to theLAN 103 changes an I/O control type of a logical volume in thestorage system A 110 to WORM. Processing for changing an I/O control type of a logical volume in thestorage system B 111 to WORM can be executed in the same manner. Respective steps ofWORM setting processing 600 will be hereinafter explained. - In
step 601, a user designates a logical volume, for which an I/O control type is set to WORM, from themanagement terminal 101 and informs theconfiguration management program 118 of thestorage system A 110 of the logical volume. - In
step 602, theconfiguration management program 118 of thestorage system A 110 inFIG. 1 judges whether the logical volume designated by the user is a secondary volume with reference to theremote copy attribute 205 ofFIG. 3 included in the volumemanagement table A 124. If a remote copy attribute of the logical volume is secondary, instep 604, theconfiguration management program 118 of the storage system A informs irregularity of the designation to the user, which leads to abnormal end. This is because, when only the secondary volume has a WORM attribute, data copied from a primary volume to the secondary volume cannot be saved in some cases. - If the remote copy attribute of the logical volume designated by the user is primary in
step 603, instep 605, theconfiguration management program 118 of thestorage system A 110 sets the I/O control type 203 of the logical volume designated by the user to WORM and sets the I/O control type 203 of a secondary volume, which forms a remote copy pair with the logical volume designated by the user, to WORM in the same manner asstep 505 inFIG. 6 . Consequently, the remote copy pair has been automatically changed to a WORM remote copy pair. - If the logical volume designated by the user does not form a remote copy pair in
step 603, instep 6051, theconfiguration management program 118 of thestorage system A 110 sets the I/O control type 203 of the logical volume designated by the user to WORM. - Note that, in the case in which the I/
O control type 203 of a volume of a storage system is set to WORM, theconfiguration management program 118 of the storage system create theWORM attribute O control type 203 is set to WORM. - In
step 606, thecontrol management program 118 of thestorage system A 110 informs the user of completion of the WORM setting and normally ends the WORM setting (step 607). - In the case in which the primary volume of the remote copy pair is set to WORM in the WORM setting 600, the WORM attribute is automatically set also in the secondary volume, whereby the remote copy pair is automatically changed to a WORM remote copy pair without drawing attention of the user.
- Next, an event log, which is recorded in the WORM attribute shown in
FIG. 4 or 5, will be explained. Concerning processing for setting WORM for a volume and processing for receiving instruction for setting a remote copy pair form theclient 102 or themanagement terminal 101 to execute the instruction, theconfiguration management program 118 creates an event log and records the event log in the WORM attribute. For example, when theconfiguration management program 118 of thestorage system A 110 is instructed by theclient 102 or themanagement terminal 101 to copy data of a primary volume to a secondary volume in thestorage system B 111 and executes the instruction, theconfiguration management program 118 of thestorage system A 110 creates an event log to that effect and stores the event log in the volumemanagement information A 124. - Moreover, in the case in which a volume, which is an object of recording of an event log, forms a pair, the
configuration management program 118 of thestorage system A 110 instructs theconfiguration management program 118 of thestorage system B 111 to store the event log, which is created by theconfiguration management program 118 of thestorage system A 110, in the volume management information B. By performing such processing, consistency of event logs stored in WORM attributes corresponding to the primary and secondary volumes, which form a remote copy pair, is kept. -
FIG. 8 is a flowchart showing an example of processing in the case in which theclient 102 has issued a write request for a logical volume to thestorage system A 110. Here,command processing 800 will be explained with a case in which a WORM unit is a sector as an example. First, thecommand processing 800 will be explained with a case in which WORM is set by the method of thetype 1 as an example. - In
step 801, the input/output processing program 116 extracts one command among commands, which are sent from theclient 102 and stored in a command queue on thememory 115, from the command queue. - In
step 802, the input/output processing program 116 judges whether the command is a command for updating a sector on a basis of a field indicating the type of a command. If the command is a command for updating a sector, the input/output processing program 116 shifts to step 803. If the command is a command not for updating a sector such as a command for reading, the input/output processing program 116 shifts to step 806. - In
step 803, the input/output processing program 116 judges whether a sector, which is an object of the command, is included in theWORM sector range 310 with reference to theWORM attribute 300 ofFIG. 4 for a volume, which is an object of the command. If the sector is included in theWORM sector range 310, the input/output processing program 116 shifts to step 804. If the sector is not included in theWORM sector range 310, the input/output processing program 116 shifts to step 806. - In
step 804, the input/output processing program 116 judges whether the volume is a secondary volume of a remote copy pair with reference to theremote copy attribute 205 ofFIG. 2 for the volume, which is an object of the command. If the volume is a secondary volume of a remote copy pair, the input/output processing program 116 shifts to step 805. If the volume is not a secondary volume of a remote copy pair, the input/output processing program 116 judges that the command is an irregular update command for an update prohibited sector and shifts to step 807. - In
step 805, the input/output processing program 116 judges whether the command is a command generated by remote copy from a primary volume forming the remote copy pair. - As a method for the judgment, there is a method of using an identifier of a SAN I/F of an apparatus that has issued the command. For example, in the case of the Fibre Channel, each I/F has an identifier called a WWN (World Wide Name). Similar identifiers are present in the other network systems. The command includes an area in which the identifier of the SAN I/F of the apparatus that has issued the command. The
configuration management program 118 ofFIG. 1 records a WWN of the I/F 112 of thestorage system A 110 having theprimary volume 122 in the volumemanagement information B 125 when theconfiguration management program 118 sets a remote copy pair.Instep 805, the input/output processing program 116 can compare the identifier stored in the command and the identifier recorded in the volumemanagement information B 125 and judge whether the update command for the secondary volume is a command generated by remote copy from the primary volume. - As another method, a method of adding a code indicating that a command is a regular remote copy command when the
remote copy program 117 of a storage system having a primary volume sends the command to a remote copy program of a storage system having a secondary volume is possible. As a technique for proving that data is sent from a correct sender, a message authentication code and the like are known. - If it is judged in
step 805 that the command is judged as a regular remote copy command, the input/output processing program 116 shifts to step 806. If it is judged instep 805 that the command is not a regular remote copy command, the input/output processing program 116 shifts to step 807. Instep 806, the input/output processing program 116 executes normal command processing. If there is no failure in the apparatus, abnormality of the command, or the like, the input/output processing program 116 executesstep 809 to normally end the command processing (810). Instep 807, the command processing ends abnormally (808). - Next, a difference between a case in which WORM is set by the method of the
type 1 and the case in which WORM is set by the method of thetype 2 will be explained. After it is judged instep 804 that the volume is not a secondary volume of a remote copy pair, the input/output processing program 116 judges whether a write flag of a sector, for which data is about to be updated, is ON with reference to theWORM attribute 300. If the write flag is ON, the input/output processing program 116 judges whether data has been written once in the sector, for which data is about to be updated, with reference to a bitmap of the sector. If data has not been written in the sector once, the input/output processing program 116 shifts to step 806. Regardless of the write flag being ON or OFF, when input/output processing program 116 judges data has been written once in the sector, for which data is about to be updated, with reference to a bit map of the sector, the input/output processing program 116 proceeds to step 807. - In addition, a program for adding an electronic signature or a message authentication code, which can be generated by only a storage system having a primary volume, to copy data to be sent from the primary volume to a secondary volume, a program for verifying the electronic signature or the message authentication code added to the copy data in a storage system having the secondary volume, and a program for prohibiting update of the secondary volume according to the copy data if authentication fails on the basis of the verification of the electronic signature or the message authentication code are added to the
remote copy program 117. Consequently, control can be performed surely such that data in the secondary volume of the WORM remote copy pair is not updated according to irregular data other than the copy data of the data stored in the primary volume from the storage system having the primary volume. -
FIG. 9 is a diagram showing an example of transition of theremote copy state 206 of the volumemanagement table A 224 inFIG. 3 . - In the
remote copy state 206, no remote copy, copying, pair, pair suspend, communication error, or pair deletion is set. - No remote copy indicates a state in which a pertinent volume is a volume not forming a remote copy pair (state 701).
- Copying indicates a state in which data of a primary volume is being copied to a secondary volume in order to make data of the secondary volume identical with that in the primary volume (state 702). In the
state 702, in the primary volume and the secondary volume, not only data but also WORM attributes of both the volumes are made identical. TheWORM attribute storage system A 110 to thestorage system B 111 by theremote copy program 117 and copied to theWORM attribute - Pair indicates a state in which update of data according to a write request for the primary volume from the
client 102 is also executed for the secondary volume (state 703). In addition, in thestate 703, not only the update of data according to the write request to the storage system A 110 from theclient 102 but also the update of the WORM attribute for the primary volume is executed for the secondary volume. Moreover, in this case, themanagement terminal 101 or theclient 102 instructs thestorage system A 110, which has the primary volume, and thestorage system B 111, which has the secondary volume corresponding to the primary volume, to switch an operation of the primary and the secondary volumes, whereby an operation of a volume can be switched. - Pair suspend indicates a state in which the update of data according to the write request for the primary volume from the
client 102 is not executed for the secondary volume (state 704). - Communication error indicates a state in which a communication failure or a failure in any one of storages forming a WORM remote copy pair has occurred (state 705).
- Pair deletion indicates a state in which a remote copy pair is deleted (state 706).
- Next, a transition process from one state to another will be explained.
- Transition from the
state 701 to thestate 702 is performed by the remote copy pair setting 500 shown inFIG. 6 (transition 711). Copy of data from the primary volume to the secondary volume, which is executed for forming a remote copy pair in thetransition 711, is referred to as initial copy. - When the copy from the primary volume to the secondary volume is completed in the
state 702, theremote copy state 206 transits to the state 703 (transition 712). When a communication failure or the like occurs while data is copied from the primary volume to the secondary volume and the copy cannot be continued in thestate 702, theremote copy state 206 transits to the state 705 (transition 717). - In the
state 703, themanagement terminal 101 or theclient 102 instructs thestorage system A 110 not to execute update of data for the secondary volume, whereby theremote copy state 206 transits to the state 704 (transition 714). In addition, in thestate 703, when a communication failure or the like occurs and the remote copy pair cannot be continued, theremote copy state 206 transits to the state 705 (transition 715). - In the
state 704, themanagement terminal 101 or theclient 102 instructs thestorage system A 110 to copy data of the primary volume to the secondary volume, whereby theremote copy state 206 transits to the state 702 (transition 713). In thetransition 713, in order to reflect the update of the data executed for the primary volume during the pair suspend (state 704) on the secondary volume, updated data stored in the primary volume during the pair suspend is copied to the secondary volume. Processing for making the data of the primary volume and the data of the secondary volume identical-through this copy processing is referred to as resynchronization. The resynchronization includes processing for making theWORM attribute management terminal 101 or theclient 102 instructs thestorage system A 110 to delete the remote copy pair, whereby theremote copy state 206 transits to the state 706 (transition 719). - When an error factor is eliminated in the
state 705, theremote copy state 206 transits to the state 702 (transition 716). In thetransition 716, in order to reflect the update of the data executed for the primary volume during the communication error (state 705) on the secondary volume, updated data stored in the primary volume during the communication error is copied to the secondary volume. Processing for making the data of the primary volume and the data of the secondary volume identical through this copy processing is referred to as resynchronization. The resynchronization includes processing for making theWORM attribute management terminal 101 or theclient 102 instructs thestorage system A 110 to delete the remote copy pair, whereby theremote copy state 206 transits from thestate 705 to the state 706 (transition 718). - When the
remote copy state 206 has transited to thestate 706, the remote copy attributes 205 and the remote copy states 206 corresponding to both the volumes forming the WORM remote copy pair change to “none”. In addition, the I/O control types 203 of both the volumes change to WORM. When theremote copy state 206 has transited to thestate 706, if theremote copy state 206 has transited to thestate 703 at least once to that point, the WORM attribute and the data of the primary volume have been transferred to the secondary volume, although not completely. The data stored in the primary volume and the WORM attribute set in the primary volume at the point when theremote copy state 206 transited to thestate 704 through thetransition 714 finally or at the point when theremote copy state 206 transited to thestate 705 through thetransition 715 are transferred to the secondary volume. However, transfer of the data and the WORM attribute after that point is not guaranteed. It can be confirmed to which point the data and the WORM attribute have been transferred with reference to the event log 320 (FIG. 4 ) or the event log 420 (FIG. 5 ) of the volume that has been the secondary volume. The I/O control types of both the volumes after the pair deletion, which have been the primary volume and the secondary volume, are WORM. Thus, the WORM remote copy pair cannot be formed again according to the restriction described in the explanation of the remote copy pair setting 500 inFIG. 6 . - In this embodiment, the data to be stored in the volume designated as the primary volume, for which the I/O control type is WORM, is initially copied in the
state 702, and the I/O control type of the volume designated as the secondary volume is set to WORM. In addition, in the mirror in thestate 703 and the resynchronization in thestate 702, update of data in the secondary volume by means other than the remote copy program is prohibited to prevent illegal falsification. This realizes the WORM remote copy that can impart the same character as in the primary volume, which makes it possible to prove that data recorded initially has not been falsified, to the secondary volume. - In addition, by replacing the secondary volume with the primary volume in the
state 703, the operation of the system can be continued using the logical volume, which was the secondary volume before the replacement, while maintaining a non-falsification proving capability equivalent to that of the logical volume which was the primary volume before the replacement. - Further, in the case in which identity of the primary volume and the secondary volume cannot be kept due to a failure in the storage having the primary volume or a failure in a communication path for performing remote copy, by recording state transition of the remote copy in the event log 320 or 420 (
FIG. 4 or 5) included in the WORM attribute, it can be proved that the data and the WORM attribute of the primary volume up to a certain point, for which a record remains in the log, are recorded in the secondary volume. Thus, the operation of the system can be continued using the secondary volume. As described in the explanation of the remote copy pair setting 500 inFIG. 6 , theconfiguration management program 118 inFIG. 1 judges whether the logical volume designated as the primary volume is WORM or not using the I/O control type of the volume for which remote copy pair formation is instructed, whereby a WORM remote copy pair can be formed automatically. - Moreover, as described in the explanation of the WORM setting 600 in
FIG. 7 , theconfiguration management program 118 ofFIG. 1 judges a remote copy attribute of a logical volume, for which theconfiguration management program 118 is instructed to change the I/O control type to WORM, whereby a WORM remote copy pair can be formed automatically. - In this embodiment, the logical volume is illustrated as an object of remote copy. However, the same method as this embodiment is applicable to remote copy targeting a physical volume, a directory or a file in a file system, and the like in order to realize WORM.
Claims (19)
1-20. (canceled)
21. A system comprising
a first storage system including at least one first disk drive and a first control apparatus for controlling to store data in the first disk drive, the first disk drive being related to a primary volume; and
a second storage system including at least one second disk drive and a second control apparatus for controlling to store data in the second disk drive, the second disk drive being related to a secondary volume;
wherein, if a remote copy process between the primary volume and the secondary volume is processed, an attribute of the primary volume is copied to an attribute of the secondary volume, and
wherein the attribute of the primary volume is an attribute to the effect that data can be referred to but cannot be updated.
22. The system according to claim 21 , wherein:
the attribute of the primary volume is stored in the first disk drive.
23. The system according to claim 21 , wherein:
the attribute of the secondary volume is stored in the second disk drive.
24. The system according to claim 21 , wherein:
if a pair status between the primary volume and the secondary volume is occurred, the attribute of the primary volume is copied to the attribute of the secondary volume.
25. The system according to claim 21 , wherein:
if the remote copy process is processed, the first control apparatus judge whether the attribute of the primary volume is an attribute to the effect that data can be referred to and can be updated or the attribute to the effect that data can be referred to but cannot be updated.
26. The system according to claim 21 , wherein:
the first control apparatus receives designation of a volume to which the attribute to the effect that data can be referred to but cannot be updated is added, an in the case in which the designated volume is set as the secondary volume, the first control apparatus outputs a notice to the effect that the designation cannot be accepted.
27. A system comprising:
a first storage system including at least one first disk drive and a first control apparatus for controlling to store data in the first disk drive, the first disk drive being related to a primary volume; and
a second storage system including at least one second disk drive and a second control apparatus for controlling to store data in the second disk drive, the second disk drive being related to a secondary volume;
wherein, if a remote copy process between the primary volume and the secondary volume is processed, an attribute of the primary volume is copied to an attribute of the secondary volume, and
wherein the attribute of the primary volume is Read Only.
28. The system according to claim 27 , wherein:
the attribute of the primary volume is stored in the first disk drive.
29. The system according to claim 27 , wherein:
the attribute of the secondary volume is stored in the second disk drive.
30. The system according to claim 27 , wherein:
if a pair status between the primary volume and the secondary volume is occurred, the attribute of the primary volume is copied to the attribute of the secondary volume.
31. The system according to claim 27 , wherein:
if the remote copy process is processed, the first control apparatus judge whether the attribute of the primary volume is Read/Write Enable or the Read Only.
32. The system according to claim 27 , wherein:
the first control apparatus receives designation of a volume to which the Read Only is added, an in the case in which the designated volume is set as the secondary volume, the first control apparatus outputs a notice to the effect that the designation cannot be accepted.
33. A system comprising:
a first storage system including at least one first disk drive and a first control apparatus for controlling to store data in the first disk drive, the first disk drive being related to a primary volume; and
a second storage system including at least one second disk drive and a second control apparatus for controlling to store data in the second disk drive, the second disk drive being related to a secondary volume;
wherein, if a remote copy process between the primary volume and the secondary volume is processed, an attribute of the primary volume is copied to an attribute of the secondary volume, and
wherein the attribute of the primary volume is Write Once Read Many (WORM).
34. The system according to claim 33 , wherein:
the attribute of the primary volume is stored in the first disk drive.
35. The system according to claim 33 , wherein:
the attribute of the secondary volume is stored in the second disk drive.
36. The system according to claim 33 , wherein:
if a pair status between the primary volume and the secondary volume is occurred, the attribute of the primary volume is copied to the attribute of the secondary volume.
37. The system according to claim 33 , wherein:
if the remote copy process is processed, the first control apparatus judge whether the attribute of the primary volume is the WORM or not.
38. The system according to claim 33 , wherein:
the first control apparatus receives designation of a volume to which the WORM is added, an in the case in which the designated volume is set as the secondary volume, the first control apparatus outputs a notice to the effect that the designation cannot be accepted.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/474,359 US20060253672A1 (en) | 2004-05-27 | 2006-06-26 | Remote copy with worm guarantee |
US12/330,933 US7991970B2 (en) | 2004-05-27 | 2008-12-09 | Remote copy with worm guarantee |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2004-157034 | 2004-05-27 | ||
JP2004157034A JP4452557B2 (en) | 2004-05-27 | 2004-05-27 | Remote copy with WORM guarantee |
US10/883,753 US7149860B2 (en) | 2004-05-27 | 2004-07-06 | Remote copy with WORM guarantee |
US11/474,359 US20060253672A1 (en) | 2004-05-27 | 2006-06-26 | Remote copy with worm guarantee |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/883,753 Continuation US7149860B2 (en) | 2004-05-27 | 2004-07-06 | Remote copy with WORM guarantee |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/330,933 Continuation US7991970B2 (en) | 2004-05-27 | 2008-12-09 | Remote copy with worm guarantee |
Publications (1)
Publication Number | Publication Date |
---|---|
US20060253672A1 true US20060253672A1 (en) | 2006-11-09 |
Family
ID=34927176
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/883,753 Expired - Fee Related US7149860B2 (en) | 2004-05-27 | 2004-07-06 | Remote copy with WORM guarantee |
US11/474,359 Abandoned US20060253672A1 (en) | 2004-05-27 | 2006-06-26 | Remote copy with worm guarantee |
US12/330,933 Expired - Fee Related US7991970B2 (en) | 2004-05-27 | 2008-12-09 | Remote copy with worm guarantee |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/883,753 Expired - Fee Related US7149860B2 (en) | 2004-05-27 | 2004-07-06 | Remote copy with WORM guarantee |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/330,933 Expired - Fee Related US7991970B2 (en) | 2004-05-27 | 2008-12-09 | Remote copy with worm guarantee |
Country Status (4)
Country | Link |
---|---|
US (3) | US7149860B2 (en) |
EP (1) | EP1600859B1 (en) |
JP (1) | JP4452557B2 (en) |
DE (1) | DE602004025554D1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120221516A1 (en) * | 2008-02-19 | 2012-08-30 | International Business Machines Corporation | Continuously available program replicas |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7165158B1 (en) * | 2005-08-17 | 2007-01-16 | Hitachi, Ltd. | System and method for migrating a replication system |
JP2008009485A (en) * | 2006-06-27 | 2008-01-17 | Fujitsu Ltd | Virtual storage controller and virtual storage control program |
US8260792B1 (en) * | 2008-08-29 | 2012-09-04 | Emc Corporation | System and method for committing data objects to be immutable |
WO2012143965A1 (en) * | 2011-04-18 | 2012-10-26 | Hitachi, Ltd. | Plurality of coupled storage subsystems and method for setting port access limitation in a storage subsystem when migrating a logical volume |
KR102196971B1 (en) | 2014-03-28 | 2020-12-31 | 삼성전자주식회사 | Storage system, and method for performing and authenticating write-protection thereof |
US9984007B2 (en) | 2014-03-28 | 2018-05-29 | Samsung Electronics Co., Ltd. | Storage system and method for performing and authenticating write-protection thereof |
Citations (34)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5592618A (en) * | 1994-10-03 | 1997-01-07 | International Business Machines Corporation | Remote copy secondary data copy validation-audit function |
US5680640A (en) * | 1995-09-01 | 1997-10-21 | Emc Corporation | System for migrating data by selecting a first or second transfer means based on the status of a data element map initialized to a predetermined state |
US5751997A (en) * | 1993-01-21 | 1998-05-12 | Apple Computer, Inc. | Method and apparatus for transferring archival data among an arbitrarily large number of computer devices in a networked computer environment |
US5787485A (en) * | 1996-09-17 | 1998-07-28 | Marathon Technologies Corporation | Producing a mirrored copy using reference labels |
US5889935A (en) * | 1996-05-28 | 1999-03-30 | Emc Corporation | Disaster control features for remote data mirroring |
US5940841A (en) * | 1997-07-11 | 1999-08-17 | International Business Machines Corporation | Parallel file system with extended file attributes |
US6145066A (en) * | 1997-11-14 | 2000-11-07 | Amdahl Corporation | Computer system with transparent data migration between storage volumes |
US6240494B1 (en) * | 1997-12-24 | 2001-05-29 | Hitachi, Ltd. | Subsystem replacement method |
US6289423B1 (en) * | 1996-12-09 | 2001-09-11 | Fujitsu Limited | Method and apparatus for providing selective write protect regions in a storage medium |
US20020016827A1 (en) * | 1999-11-11 | 2002-02-07 | Mccabe Ron | Flexible remote data mirroring |
US6434099B1 (en) * | 1992-10-05 | 2002-08-13 | Mitsubishi Denki Kabushiki Kaisha | Optical disk having an attribute which designates whether a recording area permits rewriting or not |
US6467034B1 (en) * | 1999-03-26 | 2002-10-15 | Nec Corporation | Data mirroring method and information processing system for mirroring data |
US20020152231A1 (en) * | 2001-04-13 | 2002-10-17 | Milton Silva-Craig | Application service provider based redundant archive services for medical archives and/or imaging systems |
US6526419B1 (en) * | 2000-06-09 | 2003-02-25 | International Business Machines Corporation | Method, system, and program for remote copy in an open systems environment |
US6530003B2 (en) * | 2001-07-26 | 2003-03-04 | International Business Machines Corporation | Method and system for maintaining data coherency in a dual input/output adapter utilizing clustered adapters |
US20030079083A1 (en) * | 2001-10-22 | 2003-04-24 | Lubbers Clark E. | High performance multi-controller processing |
US20030126359A1 (en) * | 2001-12-27 | 2003-07-03 | Jacques Debiez | Virtual worm method and system |
US20030126107A1 (en) * | 2001-12-27 | 2003-07-03 | Hitachi, Ltd. | Methods and apparatus for backup and restoring systems |
US20030159058A1 (en) * | 2002-02-20 | 2003-08-21 | Hitachi, Ltd. | Method of performing active data copying processing, and storage subsystem and storage control apparatus for performing active data copying processing |
US20030177321A1 (en) * | 2002-01-03 | 2003-09-18 | Hitachi, Ltd. | Data synchronization of multiple remote storage after remote copy suspension |
US20030212854A1 (en) * | 2000-05-18 | 2003-11-13 | Hitachi, Ltd. | Computer system |
US20030229764A1 (en) * | 2002-06-05 | 2003-12-11 | Hitachi, Ltd. | Data storage subsystem |
US6681303B1 (en) * | 1998-08-20 | 2004-01-20 | Hitachi, Ltd. | Storage system |
US20040049553A1 (en) * | 2002-09-05 | 2004-03-11 | Takashige Iwamura | Information processing system having data migration device |
US6728848B2 (en) * | 2001-06-11 | 2004-04-27 | Hitachi, Ltd. | Method and system for backing up storage system data |
US20040133756A1 (en) * | 2003-01-03 | 2004-07-08 | Shaw Mark E. | System and method for migrating data between memories |
US6766430B2 (en) * | 2000-07-06 | 2004-07-20 | Hitachi, Ltd. | Data reallocation among storage systems |
US20040143832A1 (en) * | 2003-01-16 | 2004-07-22 | Yasutomo Yamamoto | Storage unit, installation method thereof and installation program therefor |
US6772309B1 (en) * | 2001-08-07 | 2004-08-03 | Veritas Operating Corporation | System and method using locks for providing safe movement of data using third party copy techniques |
US6772306B2 (en) * | 1998-03-24 | 2004-08-03 | Hitachi, Ltd. | Data saving method and external storage device |
US20050010609A1 (en) * | 2003-06-12 | 2005-01-13 | International Business Machines Corporation | Migratable backup and restore |
US6889376B1 (en) * | 1999-05-12 | 2005-05-03 | Treetop Ventures, Llc | Method for migrating from one computer to another |
US7073090B2 (en) * | 1993-04-23 | 2006-07-04 | Emc Corporation | Remote data mirroring system having a remote link adapter |
US7107416B2 (en) * | 2003-09-08 | 2006-09-12 | International Business Machines Corporation | Method, system, and program for implementing retention policies to archive records |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH033159A (en) | 1989-05-31 | 1991-01-09 | Hitachi Ltd | Magnetic storage device and computer |
US5446871A (en) | 1993-03-23 | 1995-08-29 | International Business Machines Corporation | Method and arrangement for multi-system remote data duplexing and recovery |
US5799141A (en) * | 1995-06-09 | 1998-08-25 | Qualix Group, Inc. | Real-time data protection system and method |
US6304980B1 (en) | 1996-03-13 | 2001-10-16 | International Business Machines Corporation | Peer-to-peer backup system with failure-triggered device switching honoring reservation of primary device |
JPH11305947A (en) | 1998-04-17 | 1999-11-05 | Fujitsu Ltd | Remote transfer method for magnetic disk controller |
JP2000148404A (en) * | 1998-11-12 | 2000-05-30 | Hitachi Ltd | Computer system |
JP2000305856A (en) | 1999-04-26 | 2000-11-02 | Hitachi Ltd | Disk subsystems and integration system for them |
JP2001326766A (en) * | 2000-05-16 | 2001-11-22 | Canon Inc | Image processing system, image data processing method and storage medium |
US7068386B2 (en) * | 2000-05-16 | 2006-06-27 | Canon Kabushiki Kaisha | Image processing system, image data processing method, and storage medium |
JP2002041345A (en) * | 2000-07-27 | 2002-02-08 | Hitachi Ltd | Computer system and its data backup method |
JP2003044231A (en) * | 2001-07-31 | 2003-02-14 | Hitachi Communication Technologies Ltd | Storage medium exchange sector management system and storage device |
JP2003241905A (en) * | 2002-02-15 | 2003-08-29 | Hitachi Ltd | Storage device, data storing method and control device |
US20040143932A1 (en) * | 2003-01-29 | 2004-07-29 | Kavin Chen | Prop connector |
JP2005228170A (en) | 2004-02-16 | 2005-08-25 | Hitachi Ltd | Storage device system |
-
2004
- 2004-05-27 JP JP2004157034A patent/JP4452557B2/en not_active Expired - Fee Related
- 2004-07-06 US US10/883,753 patent/US7149860B2/en not_active Expired - Fee Related
- 2004-10-29 DE DE602004025554T patent/DE602004025554D1/en not_active Expired - Lifetime
- 2004-10-29 EP EP04025839A patent/EP1600859B1/en not_active Expired - Lifetime
-
2006
- 2006-06-26 US US11/474,359 patent/US20060253672A1/en not_active Abandoned
-
2008
- 2008-12-09 US US12/330,933 patent/US7991970B2/en not_active Expired - Fee Related
Patent Citations (34)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6434099B1 (en) * | 1992-10-05 | 2002-08-13 | Mitsubishi Denki Kabushiki Kaisha | Optical disk having an attribute which designates whether a recording area permits rewriting or not |
US5751997A (en) * | 1993-01-21 | 1998-05-12 | Apple Computer, Inc. | Method and apparatus for transferring archival data among an arbitrarily large number of computer devices in a networked computer environment |
US7073090B2 (en) * | 1993-04-23 | 2006-07-04 | Emc Corporation | Remote data mirroring system having a remote link adapter |
US5592618A (en) * | 1994-10-03 | 1997-01-07 | International Business Machines Corporation | Remote copy secondary data copy validation-audit function |
US5680640A (en) * | 1995-09-01 | 1997-10-21 | Emc Corporation | System for migrating data by selecting a first or second transfer means based on the status of a data element map initialized to a predetermined state |
US5889935A (en) * | 1996-05-28 | 1999-03-30 | Emc Corporation | Disaster control features for remote data mirroring |
US5787485A (en) * | 1996-09-17 | 1998-07-28 | Marathon Technologies Corporation | Producing a mirrored copy using reference labels |
US6289423B1 (en) * | 1996-12-09 | 2001-09-11 | Fujitsu Limited | Method and apparatus for providing selective write protect regions in a storage medium |
US5940841A (en) * | 1997-07-11 | 1999-08-17 | International Business Machines Corporation | Parallel file system with extended file attributes |
US6145066A (en) * | 1997-11-14 | 2000-11-07 | Amdahl Corporation | Computer system with transparent data migration between storage volumes |
US6240494B1 (en) * | 1997-12-24 | 2001-05-29 | Hitachi, Ltd. | Subsystem replacement method |
US6772306B2 (en) * | 1998-03-24 | 2004-08-03 | Hitachi, Ltd. | Data saving method and external storage device |
US6681303B1 (en) * | 1998-08-20 | 2004-01-20 | Hitachi, Ltd. | Storage system |
US6467034B1 (en) * | 1999-03-26 | 2002-10-15 | Nec Corporation | Data mirroring method and information processing system for mirroring data |
US6889376B1 (en) * | 1999-05-12 | 2005-05-03 | Treetop Ventures, Llc | Method for migrating from one computer to another |
US20020016827A1 (en) * | 1999-11-11 | 2002-02-07 | Mccabe Ron | Flexible remote data mirroring |
US20030212854A1 (en) * | 2000-05-18 | 2003-11-13 | Hitachi, Ltd. | Computer system |
US6526419B1 (en) * | 2000-06-09 | 2003-02-25 | International Business Machines Corporation | Method, system, and program for remote copy in an open systems environment |
US6766430B2 (en) * | 2000-07-06 | 2004-07-20 | Hitachi, Ltd. | Data reallocation among storage systems |
US20020152231A1 (en) * | 2001-04-13 | 2002-10-17 | Milton Silva-Craig | Application service provider based redundant archive services for medical archives and/or imaging systems |
US6728848B2 (en) * | 2001-06-11 | 2004-04-27 | Hitachi, Ltd. | Method and system for backing up storage system data |
US6530003B2 (en) * | 2001-07-26 | 2003-03-04 | International Business Machines Corporation | Method and system for maintaining data coherency in a dual input/output adapter utilizing clustered adapters |
US6772309B1 (en) * | 2001-08-07 | 2004-08-03 | Veritas Operating Corporation | System and method using locks for providing safe movement of data using third party copy techniques |
US20030079083A1 (en) * | 2001-10-22 | 2003-04-24 | Lubbers Clark E. | High performance multi-controller processing |
US20030126107A1 (en) * | 2001-12-27 | 2003-07-03 | Hitachi, Ltd. | Methods and apparatus for backup and restoring systems |
US20030126359A1 (en) * | 2001-12-27 | 2003-07-03 | Jacques Debiez | Virtual worm method and system |
US20030177321A1 (en) * | 2002-01-03 | 2003-09-18 | Hitachi, Ltd. | Data synchronization of multiple remote storage after remote copy suspension |
US20030159058A1 (en) * | 2002-02-20 | 2003-08-21 | Hitachi, Ltd. | Method of performing active data copying processing, and storage subsystem and storage control apparatus for performing active data copying processing |
US20030229764A1 (en) * | 2002-06-05 | 2003-12-11 | Hitachi, Ltd. | Data storage subsystem |
US20040049553A1 (en) * | 2002-09-05 | 2004-03-11 | Takashige Iwamura | Information processing system having data migration device |
US20040133756A1 (en) * | 2003-01-03 | 2004-07-08 | Shaw Mark E. | System and method for migrating data between memories |
US20040143832A1 (en) * | 2003-01-16 | 2004-07-22 | Yasutomo Yamamoto | Storage unit, installation method thereof and installation program therefor |
US20050010609A1 (en) * | 2003-06-12 | 2005-01-13 | International Business Machines Corporation | Migratable backup and restore |
US7107416B2 (en) * | 2003-09-08 | 2006-09-12 | International Business Machines Corporation | Method, system, and program for implementing retention policies to archive records |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120221516A1 (en) * | 2008-02-19 | 2012-08-30 | International Business Machines Corporation | Continuously available program replicas |
US10108510B2 (en) * | 2008-02-19 | 2018-10-23 | International Business Machines Corporation | Continuously available program replicas |
Also Published As
Publication number | Publication date |
---|---|
EP1600859A3 (en) | 2008-06-04 |
US7149860B2 (en) | 2006-12-12 |
EP1600859A2 (en) | 2005-11-30 |
DE602004025554D1 (en) | 2010-04-01 |
US7991970B2 (en) | 2011-08-02 |
US20090089525A1 (en) | 2009-04-02 |
EP1600859B1 (en) | 2010-02-17 |
JP2005339191A (en) | 2005-12-08 |
JP4452557B2 (en) | 2010-04-21 |
US20050268055A1 (en) | 2005-12-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7991970B2 (en) | Remote copy with worm guarantee | |
US7120768B2 (en) | Snapshot acquisition method, storage system and disk apparatus | |
EP1148416B1 (en) | Computer system and snapshot data management method | |
US7480779B2 (en) | Storage system, data restoring method, and data access method | |
US7028216B2 (en) | Disk array system and a method of avoiding failure of the disk array system | |
US7698518B2 (en) | Disk array with capacity management | |
US7900000B2 (en) | Computer system preventing storage of duplicate files | |
US7415586B2 (en) | Data backup method and system | |
JP4837378B2 (en) | Storage device to prevent data tampering | |
US20090055593A1 (en) | Storage system comprising function for changing data storage mode using logical volume pair | |
JP3938475B2 (en) | Backup processing method, its execution system, and its processing program | |
US20110167234A1 (en) | Backup system and its control method | |
JP2007133471A (en) | Storage device, and method for restoring snapshot | |
US20060236055A1 (en) | Storage system, data migration managing system, and data migration managing method | |
JP2006059347A (en) | Storage system using journaling | |
US7853769B2 (en) | Computer system for managing number of writes for storage medium and control method therefor | |
JP4937863B2 (en) | Computer system, management computer, and data management method | |
JP2006178849A (en) | Data processing system and method | |
JP2003015933A (en) | File level remote copy method for storage device | |
JP4575689B2 (en) | Storage system and computer system | |
CN100505751C (en) | Method for error management and target device of data storage system | |
JP4421999B2 (en) | Storage apparatus, storage system, and data migration method for executing data migration with WORM function | |
WO2016170619A1 (en) | Computer system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |