WO2017088342A1 - 业务割接方法、存储控制装置及存储设备 - Google Patents

业务割接方法、存储控制装置及存储设备 Download PDF

Info

Publication number
WO2017088342A1
WO2017088342A1 PCT/CN2016/078464 CN2016078464W WO2017088342A1 WO 2017088342 A1 WO2017088342 A1 WO 2017088342A1 CN 2016078464 W CN2016078464 W CN 2016078464W WO 2017088342 A1 WO2017088342 A1 WO 2017088342A1
Authority
WO
WIPO (PCT)
Prior art keywords
host
storage device
lun
virtual
luns
Prior art date
Application number
PCT/CN2016/078464
Other languages
English (en)
French (fr)
Inventor
蒋洪斌
唐承文
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2017088342A1 publication Critical patent/WO2017088342A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0629Configuration or reconfiguration of storage systems
    • G06F3/0635Configuration or reconfiguration of storage systems by changing the path, e.g. traffic rerouting, path reconfiguration
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0646Horizontal data movement in storage systems, i.e. moving data in between storage devices or systems
    • G06F3/0647Migration mechanisms
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0655Vertical data movement, i.e. input-output transfer; data movement between one or more hosts and one or more storage devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0662Virtualisation aspects
    • G06F3/0664Virtualisation aspects at device level, e.g. emulation of a storage device or system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0668Interfaces specially adapted for storage systems adopting a particular infrastructure
    • G06F3/067Distributed or networked storage systems, e.g. storage area networks [SAN], network attached storage [NAS]

Definitions

  • the present invention relates to the field of computer technologies, and in particular, to a service cutover method, a storage control device, and a storage device.
  • the service cutover technology between the storage devices is used to switch the service system from the old storage device to the new storage device, and the storage device is replaced, and is applied to an application scenario such as expanding and updating the storage device.
  • a plurality of hosts are connected to the storage device A through a switch, the storage device A is an old storage device that needs to be replaced, and the storage device B is a new storage device.
  • Figure 1 shows a case where the storage device A includes four logical unit numbers (English name: Logical Unit Number, LUN for short). The four LUNs are mapped to one of the four host groups. One host group is connected. A host in which a host is identified by the port number of the host. Among them, port 1 corresponds to host 1, and so on.
  • the service cutover technology includes the offline service cutover and the online service cutover.
  • the offline service cutover process needs to interrupt the host service.
  • the host service does not need to be interrupted during the online service cutover process.
  • online service cutover has higher requirements for storage devices.
  • the existing online service cutover technology establishes a new host group and keeps all LUNs with the newly created host group under the condition that the existing mapping relationship between the LUN and the host group remains unchanged. A mapping is established, so a LUN needs to be mapped to more than one host group.
  • the new storage device is connected to the newly created host group, thereby establishing a connection with the new storage device while keeping the old storage device connected to the host. Then, the new storage device is connected to the host. When the host accesses the new storage device, the new storage device reads data from the old storage device through the connection with the old storage device, and completes the online cutover of the service. Finally, migrate the data on the old storage device to the new storage device to complete the replacement of the old and new storage devices.
  • a storage device usually only supports mapping a LUN to a host group.
  • the existing online cutover technology needs to map a LUN to more than one host group.
  • the compatibility with the storage device is poor and cannot be widely used.
  • the embodiments of the present invention provide a service cutover method, a storage control device, and a storage device, which can improve compatibility with a storage device.
  • the application provides a service cutover method, which is used to implement service cutover of a host network from a source storage device to a target storage device.
  • the source storage device Before the service is cut, the source storage device is connected to the H host through the switch.
  • the host accesses the source storage device.
  • the source storage device manages the H hosts by M host groups. One host is connected to one host group, one host group is connected to at least one host, and the M host groups are connected to N LUNs on the source storage device. Mapping relations.
  • the target storage device When the service cutover is required, the target storage device is first connected to the switch through its connection port, and the target storage device and the source storage device are connected through respective redundant connection ports. Further, the redundant connection port of the target storage device is virtualized into M virtual connection ports, and the M virtual connection ports are respectively connected with M host groups on the source storage device, so that the source is maintained.
  • the original storage device is connected to the source storage device and the H host in the original mapping relationship between the LUN and the host group.
  • N spoofed virtual LUNs are created on the target storage device, and the host is instructed to increase access to the spoofed virtual LUN.
  • the N spoofed virtual LUNs on the target storage device are in one-to-one correspondence with the N LUNs on the source storage device.
  • the host does not distinguish between the LUNs on the source storage device and the virtual LUNs on the corresponding target storage device.
  • the path of the LUN on the source storage device and the path of the corresponding virtual LUN on the target storage device are accessed as paths that access the same LUN.
  • the access operation is redirected to the corresponding LUN on the target storage device. That is to say, if the connection between the source storage device and the host is disconnected, the host can still access the virtual LUNs on the target storage device to ensure that the host services run normally.
  • the target storage device When the target storage device is connected to the source storage device, you do not need to change the original mapping between the LUN and the host group in the source storage device, and you do not need to create a new host group.
  • the host group When the host group establishes a mapping relationship, the online service cutover can also be implemented, thereby improving the compatibility of the online service cutover technology with the storage device.
  • the target storage device acquires the N on the source storage device Create the N virtual LUNs on the target storage device, and assign the N LUNs to the N virtual LUNs, and associate the virtual LUNs with the same LUNs.
  • the host manages the virtual LUNs and LUNs with the same ID information as the same LUN.
  • the N target LUNs are created on the target storage device, and the data of the N LUNs on the source storage device are migrated to the N created on the target storage device. Target LUNs. After the data migration is completed, the connection between the target storage device and the source storage can be disconnected.
  • the present application provides a storage control device, which is installed in a storage device and configured to perform the service cutover method provided by the first aspect of the present application.
  • the present application further provides a storage device including a memory and a processor, the memory being coupled to the processor, the memory for storing program code, when the processor is used to invoke the In the program code, the service cutover method provided by the first aspect of the application is executed.
  • FIG. 1 is a schematic structural diagram of a storage system in the prior art
  • FIG. 2 is a schematic diagram of an application scenario of a service cutover method according to an embodiment of the present invention
  • FIG. 3 is a schematic flowchart of a service cutover method according to an embodiment of the present invention.
  • FIG. 4 is a schematic diagram of connection of a target storage device, a source storage device, and a host network in an embodiment of the present invention
  • FIG. 5 is a schematic diagram of virtualizing a redundant connection port of a target storage device into M virtual connection ports according to an embodiment of the present invention
  • FIG. 6 is a schematic diagram of accessing a target storage device to M host groups through M virtual connection ports according to an embodiment of the present invention
  • FIG. 7 is a schematic diagram of creating a spoofed virtual LUN on a target storage device according to an embodiment of the present invention.
  • FIG. 8 is a schematic structural diagram of a storage control apparatus according to an embodiment of the present invention.
  • FIG. 9 is a schematic structural diagram of a storage device according to an embodiment of the present invention.
  • the embodiments of the present invention provide a service cutover method, a storage control device, and a storage device, which can improve compatibility with a storage device and implement online cutover from a source storage device to a target storage device. It can be understood by those skilled in the art that the method for implementing online cutover can also be used for offline cutover.
  • the service cutover method provided by the embodiment of the present invention can be used for online service cutover. It can also be used for offline service cutover.
  • the embodiment of the present invention is only described by taking the process of online service cutover as an example.
  • Embodiments of the present invention provide a service cutover method, a storage control device, and a storage device, which are applied to a storage system as shown in FIG. 2.
  • the storage system includes a host network, switches, and storage devices.
  • the host network includes H hosts, and H is an integer greater than 0.
  • the storage device includes a source storage device and a target storage device.
  • the source storage device and the target storage device may be homogeneous or heterogeneous storage devices.
  • the H host in the host network is connected to the switch. Before the service is cut, the source storage device establishes a connection with the switch through its connection port. During the service cutover process, the source storage device is the old storage device that needs to be replaced, and the target storage device is the new storage device used to replace the source storage device.
  • the source storage device performs group management on the H hosts through M host groups, and M is an integer greater than 0.
  • the different host groups are identified by the host group 1 and the host group 2
  • the H host is identified by the host 1 and host 2 characters.
  • one host is connected to a host group.
  • the M host groups one host group is connected to at least one host.
  • a host is identified by the port number of the host.
  • port 1 is used to identify host 1, indicating that host 1 is connected to host group 1 through port 1
  • port 2 is used to identify host 2, and so on.
  • the connection between the host group and the host is represented by the connection between the host group and the port number.
  • the source storage device includes N LUNs, and N is an integer greater than zero.
  • N is an integer greater than zero.
  • different LUNs are identified by the words LUN1 and LUN2.
  • a mapping relationship is established between the N LUNs and the M host groups.
  • a LUN is mapped to only one host group.
  • the service cutover method provided by the embodiment of the present invention is applicable to a one-to-one mapping between a LUN and a host group, and is also applicable to a multi-to-many mapping between a LUN and a host group.
  • a LUN is mapped to at least one host group, and a host group is mapped to at least one LUN.
  • the mapping between the LUN and the host group indicates that the mapping between LUN1 and host group 1 is established.
  • LUN2 is mapped to host group 2 and host group 3.
  • LUN3 and LUN4 are established with host group 4. Mapping relations.
  • a host in the H host performs the host service by accessing the at least one LUN that is mapped to the connected host group.
  • the host cannot access the LUN that does not have a mapping relationship with the connected host group.
  • host 1 (identified by port 1) is connected to host group 1.
  • Host 1 can access LUN1 through port 1, but cannot access LUN2, LUN3, or LUN4.
  • the embodiment of the present invention provides a service cutover method, which is used to implement service cutover of a host network from a source storage device to a target storage device. Referring to Figure 3, the following steps are included:
  • connection port Connect the target storage device to the switch through the connection port, and establish a connection between the target storage device and the source storage device through the respective redundant connection ports.
  • the source storage device Before the service is cut, the source storage device is connected to the H host through the switch.
  • the host accesses the source storage device.
  • the source storage device performs group management on the H hosts through M host groups.
  • One host is connected to one host group, one host group is connected to at least one host, and M host groups are connected to N LUNs on the source storage device. Establish a mapping relationship.
  • the first step in business cutover is to connect the target storage device to the host network and the source storage device.
  • the physical ports of the storage device include a connection port and a redundant connection port for connecting to the switch and to another storage device, respectively.
  • the physical port may be a small computer system interface (English full name: Internet Small Computer System Interface, English abbreviation: iSCSI), or a Fibre Channel (English full name: Fibre Channel, English abbreviation: FC) interface.
  • the physical port of the storage device is identified by the storage device port (English name: Storage Port, English abbreviation: SP).
  • Each storage device includes 4 SPs, denoted by SPxyz, respectively, where xyz is 3 as a binary code.
  • x stands for storage device, 0 is source storage device, and 1 is target storage device.
  • y represents the controller, and the controller on the storage device includes a read controller and a write controller, identified by 0 and 1, respectively.
  • Each controller includes two ports, and z represents the port number in the controller.
  • both controllers of the storage device have one port connected to the host network, and the other port of the controller. For redundant ports.
  • the source storage device's connection ports include SP000 and SP010, and the redundant connection ports include SP001 and SP011.
  • the source storage device connects to the switch through SP000 and SP010, and connects to the host network through the switch.
  • connection ports of the target storage device include SP100 and SP110, and the redundant connection ports include SP101 and SP111.
  • the source storage device and the target storage device need to perform service cutover, connect the target storage device to the switch through its connection port, that is, connect the switch through SP100 and SP110, and connect to the host network through the switch. Further, the target storage device and the source storage device are connected through respective redundant connection ports. As shown in FIG. 4, SP001 is connected to SP101, and SP011 is connected to SP111.
  • the redundant connection port of the target storage device includes two physical ports, SP101 and SP111, respectively, and virtualizes the redundant connection port of the target storage device into M virtual connection ports, that is, each physical port included in the connection port is virtualized. Turned into M virtual ports.
  • a virtual connection port includes two virtual ports, and two virtual ports respectively correspond to two physical ports included in the connection port.
  • the SP101 is virtualized into four virtual ports, which are SP101:0, SP101:1, SP101:2, and SP101:3. Virtualize SP111 into four virtual ports, SP111:0, SP111:1, SP111:2, and SP111:3.
  • a virtual connection port includes two virtual ports, namely virtual port 1 and virtual port 2, wherein virtual port 1 is one of 4 virtual ports obtained by SP101 virtualization, corresponding to SP101, and virtual port 2 is One of the four virtual ports obtained by the SP111 virtualization corresponds to the SP111.
  • Virtual connection port 1 SP101:0 SP111:0 Virtual connection port 2 SP101:1 SP111:1 Virtual connection port 3 SP101: 2 SP111: 2 Virtual connection port 4 SP101:3 SP111:3
  • the target storage device accesses the mth host group through the mth virtual connection port.
  • m 1...M. That is, the host group has a one-to-one correspondence with the virtual connection port.
  • host group 1 is used as an example. Host group 1 is mapped to LUN1, and the target storage device is connected to host group 1 through virtual connection port 1, that is, SP101:0 is established. SP111:0 is mapped to LUN1, so that the target storage device can access LUN1 on the source storage device through virtual connection port 1.
  • the redundant connection port of the target storage device can be connected to only one host group. Therefore, in the service cutover process, you need to delete the LUN between the source storage device and the existing host group. Mapping the relationship, then creating a new host group, and mapping the LUNs on the source storage device to the newly created host group. Further, the target storage device is connected to the newly created host group through the connection port to complete the target storage device and the source storage device. the connection between.
  • the source storage device can access the target storage devices through the M virtual connection ports to the M host groups, so there is no need to change
  • the mapping between the LUN on the source storage device and the existing host group does not require a new host group.
  • N spoofed virtual LUNs on the target storage device.
  • the N spoofed virtual LUNs correspond to the N LUNs on the source storage device.
  • the target storage device can scan the LUNs on the source storage device to obtain the identification information of the N LUNs on the source storage device.
  • the LUN identification information includes the serial number of the LUN (English name: Serial Number, SN for short) and the LUN ID.
  • N virtual LUNs are created on the target storage device, and the identification information of the N LUNs is assigned to N virtual LUNs.
  • LUN The identification information of one LUN is assigned to a virtual LUN.
  • the N virtual LUNs on the target storage device are associated with the N LUNs on the source storage device.
  • One virtual LUN is associated with a LUN with the same identification information.
  • a virtual LUN that is associated with a LUN on the target storage device is the spoofed virtual LUN corresponding to the LUN.
  • the N spoofed virtual LUNs on the target storage device are in one-to-one correspondence with the N LUNs on the source storage device.
  • vLUN1 and vLUN2 are used to identify different spoofed virtual LUNs.
  • the LUNs connected to the spoofed virtual LUNs on the target storage device are LUNs corresponding to the spoofed virtual LUNs.
  • the vLUN1 corresponds to LUN1, and so on.
  • the virtual LUN does not store data.
  • the spoofed virtual LUN reads data from the LUN on the corresponding source storage device (or writes data to the corresponding LUN).
  • the host returns the result.
  • the host identifies the LUNs by using the LUN identification information.
  • the LUNs of the LUNs on the target storage device are the same as the LUNs on the source storage device. Therefore, a LUN and corresponding targets on the host and source storage devices are used. If the virtual LUNs on the storage device are connected through the two paths, the host uses the LUNs on the source storage device and the spoofed virtual LUNs on the target storage device as the same LUN. Different paths are managed.
  • the host in the M host groups adds an alternate path.
  • the source storage device Before the service is cut, the source storage device is connected to the host network.
  • the H hosts in the host network access the active LUN to perform host services.
  • a valid LUN is a valid LUN that is mapped to a host group connected to a host by the host.
  • the path that the host accesses the valid LUN is the original path of the host.
  • the target storage device is connected to the source storage device and the host network
  • the service when the service is cut, after the N spoofed virtual LUNs are created, the user operates the hosts in the M host groups to instruct the host to perform the scan.
  • the hosts in the M host groups add an alternate path after the completion of the scan.
  • the alternate path corresponding to one host is the path for the host to access the substitute LUN.
  • An LUN is a spoofed virtual LUN corresponding to a valid LUN in the N spoofed virtual LUNs on the target storage device.
  • a valid LUN corresponding to a host includes at least one LUN, and the corresponding replacement LUN includes at least one spoofed virtual LUN.
  • the number of LUNs included in a valid LUN is equal to the number of spoofed virtual LUNs included in the replacement LUN.
  • the LUNs included in the effective LUN correspond to the spoofed virtual LUNs included in the replacement LUN.
  • the path management program of the host identifies different LUNs by using the LUN identification information.
  • the spoofed virtual LUNs have the same information. Therefore, the host uses the LUNs and the spoofed virtual LUNs of the LUN as the same LUN.
  • the original path and the alternate path are managed as different paths to the same LUN.
  • the path management program of the host accesses the alternate path of the substitute LUN and the original path of accessing the valid LUN as two paths for accessing the effective LUN.
  • LUN1 is taken as an example for description.
  • vLUN1 is a virtual LUN associated with LUN1 and is a spoofed virtual LUN corresponding to LUN1.
  • LUN1 belongs to a valid LUN of host 1
  • vLUN1 belongs to the replacement LUN.
  • Host 1 accesses LUN1 through the original path. After the host 1 identifies the vLUN1, the vLUN1 and the LUN1 have the same information. Therefore, the host 1 manages the alternate path, that is, the path to access the vLUN1.
  • the host can access the LUN to perform host services through the original path, or access the alternate LUN to perform host services through an alternate path.
  • Step 306 is the case when the host accesses the substitute LUN.
  • the access operation redirection means that when the host requests an operation (read or write operation) on the substitute LUN through the alternate path, the target storage device accesses the alternative LUN mapping on the source storage device through the connection with the source storage device.
  • the target storage device scans the source storage device to determine a mapping relationship between the N LUNs and the M host groups on the source storage device, and a host to which each host group is connected.
  • the target storage device receives an access request message sent by the host through an alternate path, and the access request message is used to request access to the substitute LUN.
  • the target storage device determines the host group to which the host that sends the access request message is connected according to the connection relationship between the host group and the host.
  • the M host groups are respectively connected to the M virtual connection ports, and the M host groups are respectively in one-to-one correspondence with the M virtual connection ports.
  • the virtual connection port to which a host group is connected is referred to as a target virtual connection port, and the target storage device can determine the target virtual connection port according to the host group to which the host that sends the access request message is connected. Further, the target storage device accesses the substitute LUN through the target virtual connection port, and operates the substitute LUN according to the access request message, and finally returns the operation result to the host that issues the access request message.
  • the target storage device receives the access request message sent by the host 1, and the substitute LUN is specifically vLUN1, and the corresponding effective LUN is LUN1.
  • the target storage device determines that the host group where the host 1 is located is the primary unit 1, and the target virtual connection port is the virtual connection port 1 (SP101:0 and SP111:0).
  • Target storage device through virtual connection port 1 Access LUN1 operate LUN1 according to the access request message, and return the operation result to host 1.
  • the target storage device may have the function of buffering the data read from the source storage device. To ensure that the host obtains data from the corresponding valid LUN for each access to the replacement LUN, you need to disable the data cache function of the virtual LUN on the target storage device.
  • the host can access the replacement LUN to obtain data from the valid LUN or write data to the effective LUN.
  • the connection between the source storage device and the host network is disconnected, and the host service can be executed normally.
  • the online service cutover, the cutover process does not affect the normal operation of the host service.
  • the hosts in the M host groups delete the original path.
  • the host can access the target storage device through the alternate path to ensure the normal execution of the host service.
  • the host's path management program deletes the original path.
  • the host uses the LUN as the bridge to access the valid LUN to operate the effective LUN.
  • the LUN is a virtual LUN that is spoofed.
  • the virtual LUN does not store data. Before disconnecting the source storage device from the target storage device, you need to migrate the data on the source storage device to the target storage device.
  • the N target LUNs are created on the target storage device, and the data of the N LUNs on the source storage device are migrated to the N target LUNs created on the target storage device.
  • the N target LUNs correspond to the N spoofed virtual LUNs.
  • the N spoofed virtual LUNs correspond to the N LUNs on the source storage device. Therefore, the target LUN, the spoofed virtual LUN, and the LUN on the source storage device. There is a one-to-one correspondence between the two.
  • the spoofed virtual LUN reads the data of the LUN on the source storage device and stores the read data to the corresponding target LUN to complete data migration from the N LUNs to the N target LUNs.
  • the association between the N spoofed virtual LUNs and the N LUNs is removed, and the association between the N spoofed virtual LUNs and the N target LUNs is established. Among them, a spoofed virtual LUN is managed by its corresponding target LUN.
  • the host After the spoofed virtual LUN is associated with the target LUN, the host obtains data from the corresponding target LUN when accessing the spoofed virtual LUN.
  • the source storage device is not required to obtain data from the LUN of the source storage device.
  • the connection between the host networks is broken, and the source storage device is completed. Replacement with the target storage device.
  • the spoofed virtual LUN is exchanged with the identification information of the corresponding target LUN, and the N spoofed virtual LUNs are deleted.
  • the host directly accesses the target LUN through an alternate path, and the data migration process is transparent to the host.
  • the service cutover method provided by the embodiment of the present invention connects the target storage device to the M host groups through the M virtual connection ports by virtualizing the redundant connection ports of the target storage device into M virtual connection ports. Creating N spoofed virtual LUNs on the target storage device, and after the host in the M host groups adds an alternate path, when the host accesses the substitute LUN, the access operation is redirected to the valid LUN to implement online Business cutover. You can connect the target storage device to the original host group of the source storage device through the virtual port. You do not need to create a new host group, regardless of homogeneous storage or heterogeneous storage.
  • the host can access the LUN on the source storage device through the original path before the host accesses the virtual LUN that is spoofed on the target storage device.
  • the host business was interrupted. Online cutover can be implemented even in an application scenario where a LUN can be mapped to only one host group. Therefore, the service cutover method provided by the embodiment of the present invention can implement online service cutover, thereby improving the online service tandem connection, whether the homogeneous storage device or the heterogeneous storage device is used, and whether the mapping between a LUN and a plurality of host groups is supported.
  • the compatibility of online business cutover technology for storage devices is provided.
  • an embodiment of the present invention further provides a storage control device, which is installed in a target storage device, and is configured to execute the service cutover method provided in the embodiment corresponding to FIG.
  • the host network includes H hosts. H is an integer greater than 0.
  • the H hosts are connected to the switch.
  • the source storage device establishes a connection with the switch through its connection port.
  • the source storage device includes M host groups, M is an integer greater than 0, the H hosts are connected to M host groups, and one host group is connected to at least one host.
  • the source storage device also includes N logical unit numbers LUNs, where N is an integer greater than 0, and a mapping relationship is established between the N LUNs and the M host groups, and a LUN is mapped to at least one host group, and a host group and at least one host group are configured.
  • a LUN establishes a mapping relationship.
  • a host performs host services by accessing a LUN that is mapped to the connected host group.
  • the storage control device 80 includes:
  • the connection control unit 801 is configured to establish a connection between the target storage device and the switch through the connection port of the target storage device, and establish a connection between the target storage device and the source storage device through the respective redundant connection ports.
  • connection control unit 801 is further configured to virtualize the redundant connection port of the target storage device into M virtual connection ports.
  • the connection control unit 801 is further configured to establish a connection between the M virtual connection ports and the M host groups. Among them, a virtual connection port is connected to a host group.
  • the LUN management unit 802 is configured to create N spoofed virtual LUNs on the target storage device, and the N spoofed virtual LUNs are in one-to-one correspondence with the N LUNs on the source storage device.
  • the access control unit 803 is configured to redirect the access operation to the effective LUN when the host accesses the substitute LUN after adding the alternate path to the host in the M host groups.
  • the LUN is the spoofed virtual LUN corresponding to the effective LUN in the virtual LUN of the spoofed virtual LUN on the target storage device, and the effective LUN is the N LUN and the host on the source storage device.
  • the connected host group establishes a mapped LUN.
  • the LUN management unit 802 is configured to obtain identification information of each of the N LUNs on the source storage device. Create N virtual LUNs on the target storage device and assign identification information of N LUNs to N virtual LUNs. The identification information of one LUN is assigned to a virtual LUN. Associate N virtual LUNs with N LUNs. One virtual LUN is associated with a LUN with the same identification information.
  • the access control unit 803 is specifically configured to receive an access request message sent by the host by using an alternate path.
  • An access request message is used to request access to an alternate LUN.
  • the substitute virtual LUN is accessed through the target virtual connection port, and the target virtual connection port is a virtual connection port in which M virtual connection ports are connected to the host group to which the host that issued the access request message is connected.
  • the replacement LUN is operated according to the access request message, and the operation result is returned to the host that issued the access request message.
  • the LUN management unit 802 is further configured to create N target LUNs on the target storage device. Migrate the data of the N LUNs on the source storage device to the N target LUNs created on the target storage device.
  • the embodiment of the present invention further provides a storage device 900, which corresponds to the target storage device in the embodiment corresponding to FIG. 3.
  • the storage device 90 includes a memory 902 and a processor 901, which is coupled to the processor 901.
  • the memory 902 may include a volatile memory (English: volatile memory) (English: random-access memory, abbreviation: RAM).
  • the memory may also include a non-volatile memory (English: non-volatile memory), such as a read-only memory (English) Text: read-only memory, abbreviation: ROM), flash memory (English: flash memory), hard disk (English: hard disk drive, abbreviation: HDD) or solid state drive (English: solid-state drive, abbreviation: SSD).
  • the memory 902 may also include a combination of the above types of memories.
  • the processor 901 may be a central processing unit (full name: Central Processing Unit, CPU for short), or a combination of a CPU and a hardware chip.
  • the above hardware chip may be a network processor (English: network processor, abbreviation: NP), an application-specific integrated circuit (ASIC), a programmable logic device (English: programmable logic device, abbreviation: PLD) ) or any combination thereof.
  • the above PLD can be a complex programmable logic device (English: complex programmable logic device, abbreviation: CPLD), field-programmable gate array (English: field-programmable gate array, abbreviation: FPGA), general array logic (English: generic array Logic, abbreviation: GAL) or any combination thereof.
  • the processor 901 is configured to call the program code in the memory 902. In a possible implementation manner, when the program is executed by the processor 901, the following functions are implemented:
  • the processor 901 is configured to invoke the program code in the memory 902 to perform the service cutover method described in the device embodiment corresponding to FIG. 3, and specifically describes the device embodiment corresponding to FIG. 3, and details are not described herein again.
  • bus 903 can include a path for communicating information between various components (e.g., processor 901 and memory 902) in storage device 900.
  • bus 903 connects processor 901 with memory 902, processor 901 accesses memory 902 via bus 903, including processor 901 writing data to memory 902, and processor 901 reading data from memory 902.
  • the storage device 900 further includes an input/output interface 905 for receiving input data and information, and outputting an operation result and the like.
  • communication interface 904 implements network communication between the storage device 900 and other devices or communication networks using transceivers such as, but not limited to, transceivers; alternatively, communication interface 904 can be used for Various interfaces of the access network, such as an Ethernet interface for accessing an Ethernet, including but not limited to an RJ-45 interface, an RJ-11 interface, an SC optical interface, an FDDI interface, an AUI interface, and a BNC interface. And the Console interface and so on.
  • the storage device 900 shown in FIG. 9 only shows the processor 901, the memory 902, and the bus 903, in the specific implementation process, those skilled in the art should White, the storage device 900 also contains other devices necessary to achieve normal operation. In the meantime, those skilled in the art will appreciate that the storage device 900 may also include hardware devices that implement other additional functions, depending on the particular needs. Moreover, those skilled in the art will appreciate that the memory device 900 may also only include the components necessary to implement the embodiments of the present invention, and does not necessarily include all of the devices shown in FIG.
  • the storage control device and the storage device provided by the embodiments of the present invention respectively virtualize the redundant connection ports of the target storage device into M virtual connection ports, and respectively use the M virtual connection ports to the M host groups.
  • the N spoofed virtual LUNs are created on the target storage device. After the host in the M host group is added to the LUN, the host is redirected to the effective LUN to implement the online service cutover. You can connect the target storage device to the original host group of the source storage device through the virtual port. You do not need to create a new host group, regardless of homogeneous storage or heterogeneous storage.
  • the host can access the LUN on the source storage device through the original path before the host accesses the virtual LUN that is spoofed on the target storage device.
  • the host business was interrupted. Online cutover can be implemented even in an application scenario where a LUN can be mapped to only one host group. Therefore, the service cutover method provided by the embodiment of the present invention can implement online service cutover, thereby improving the online service tandem connection, whether the homogeneous storage device or the heterogeneous storage device is used, and whether the mapping between a LUN and a plurality of host groups is supported.
  • the compatibility of online business cutover technology for storage devices is provided.
  • Computer readable media includes both computer storage media and communication media, which may be any available media that can be accessed by a computer.
  • the communication media includes any medium that facilitates transfer of the computer program from one location to another.
  • the computer readable medium includes but is not limited to a random access memory (English name: Random Access Memory, English abbreviation: RAM), a read only memory (English full name: Read Only Memory, English abbreviation: ROM), an electrically erasable programmable read only memory ( English full name: Electrically Erasable Programmable Read Only Memory, English abbreviation: EEPROM), CD-ROM (English full name: Compact Disc Read Only Memory, English abbreviation: CD-ROM) or His disc storage, disk storage media or other magnetic storage devices.
  • a random access memory English name: Random Access Memory, English abbreviation: RAM
  • a read only memory English full name: Read Only Memory, English abbreviation: ROM
  • an electrically erasable programmable read only memory English full name: Electrically Erasable Programmable Read Only Memory, English abbreviation: EEPROM
  • CD-ROM English full name: Compact Disc Read Only Memory, English abbreviation: CD-ROM
  • His disc storage disk storage media or other magnetic

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Computer Networks & Wireless Communication (AREA)

Abstract

一种业务割接方法、存储控制装置及存储设备,涉及计算机技术领域,能够提高对存储设备的兼容性。具体方案为:将目标存储设备通过其连接端口与交换机建立连接,将目标存储设备与源存储设备通过各自的冗余连接端口建立连接(301);将目标存储设备的冗余连接端口虚拟化为M个虚拟连接端口(302);将M个虚拟连接端口分别与M个主机组建立连接(303);在目标存储设备上创建N个伪装的虚拟LUN, N个伪装的虚拟LUN与源存储设备上的N个LUN一一对应(304);当主机访问替代LUN时,将访问操作重定向至有效LUN(306)。本方法用于存储设备的制造。

Description

业务割接方法、存储控制装置及存储设备 技术领域
本发明涉及计算机技术领域,尤其涉及一种业务割接方法、存储控制装置及存储设备。
背景技术
存储设备之间的业务割接技术,用于将业务系统从旧的存储设备上切换到新存储设备上,实现存储设备替换,应用于诸如对存储设备进行扩容、更新换代等应用场景中。结合图1所示的存储系统,多个主机通过交换机与存储设备A连接,存储设备A是需要被替换的旧存储设备,存储设备B为新存储设备。图1所示为存储设备A包括4个逻辑单元号(英文全称:Logical Unit Number,英文简称:LUN)的情况,4个LUN与4个主机组建立一对一的映射关系,一个主机组连接一台主机,主机组中通过主机的端口号标识一台主机。其中,端口1对应主机1,依次类推。
业务割接技术包括离线业务割接及在线业务割接两种技术,离线业务割接过程中需要中断主机业务,在线业务割接过程中主机业务无需中断。相对于离线业务割接,在线业务割接对于存储设备的要求更高。
现有的在线业务割接技术中,在保持旧存储设备中LUN与主机组之间已有的映射关系不变的条件下,建立新的主机组,并将所有的LUN都与新建的主机组建立映射,因此需要将一个LUN与一个以上主机组建立映射。
进一步地,将新存储设备与新建的主机组建立连接,从而在保持旧存储设备与主机连接的同时,与新存储设备建立连接。继而,将新存储设备与主机建立连接,当主机访问新存储设备时,新存储设备通过与旧存储设备之间的连接从旧存储设备读取数据,完成业务在线割接。最后,将旧存储设备上的数据迁移到新存储设备,完成新旧存储设备替换。
出于数据安全等方面的考虑,存储设备通常只支持将一个LUN与一个主机组建立映射。现有的在线割接技术需要将一个LUN与一个以上主机组建立映射,对存储设备的兼容性差,不能被广泛应用。
发明内容
本发明的实施例提供一种业务割接方法、存储控制装置及存储设备,能够提高对存储设备的兼容性。
第一方面,本申请提供一种业务割接方法,用于实现主机网络从源存储设备到目标存储设备的业务割接。
在进行业务割接之前,源存储设备与H台主机通过交换机连接,主机正常访问源存储设备。源存储设备通过M个主机组对H台主机进行分组管理,一台主机连接一个主机组,一个主机组连接至少一台主机,M个主机组与源存储设备上的N个LUN之间建立有映射关系。
当需要进行业务割接时,首先将目标存储设备通过其连接端口与所述交换机建立连接,并将所述目标存储设备与所述源存储设备通过各自的冗余连接端口建立连接。进一步地,将所述目标存储设备的冗余连接端口虚拟化为M个虚拟连接端口,并将所述M个虚拟连接端口分别与源存储设备上的M个主机组建立连接,这样在保持源存储设备内LUN与主机组之间原有映射关系的情况下,将目标存储设备分别与源存储设备以及H台主机建立了连接。接下来,在所述目标存储设备上创建N个伪装的虚拟LUN,并指示主机增加访问伪装的虚拟LUN的路径。目标存储设备上N个伪装的虚拟LUN与所述源存储设备上的所述N个LUN一一对应,主机对源存储设备上的LUN以及对应的目标存储设备上伪装的虚拟LUN不做区分,将访问源存储设备上一个的LUN的路径,以及访问目标存储设备上对应伪装的虚拟LUN的路径,作为访问同一LUN不同的路径。当主机访问所述目标存储设备上的伪装的虚拟LUN时,将访问操作重定向至目标存储设备上对应的LUN。也就是说,此时如果源存储设备与主机之间的连接断开,主机仍可以通过访问目标存储设备上的伪装的虚拟LUN,保证主机业务正常运行,即实现了在线割接。
在将目标存储设备与源存储设备建立连接时,无需改变源存储设备内LUN与主机组之间原有的映射关系,也无需新建主机组,即使在源存储设备不支持将一个LUN与多个主机组建立映射关系的情况下,也能够实现在线业务割接,从而提高了在线业务割接技术对存储设备的兼容性。
在一种可能的实现方式中,目标存储设备获取所述源存储设备上所述N 个LUN各自的标识信息,在目标存储设备上创建N个虚拟LUN,进一步将所述N个LUN的标识信息分配给所述N个虚拟LUN,并将标识信息相同的虚拟LUN和LUN建立关联,主机将标识信息相同的虚拟LUN和LUN作为同一LUN进行管理。
在另一种可能的实现方式中,在所述目标存储设备上创建N个目标LUN,将所述源存储设备上所述N个LUN的数据迁移至所述目标存储设备上创建的所述N个目标LUN。在完成数据迁移之后,就可以将目标存储设备分别与源存之间的连接断开。
第二方面,本申请提供一种存储控制装置,存储控制装置安装与于存储设备内,用于执行本申请第一方面所提供的业务割接方法。
第三方面,本申请还提供一种存储设备,包括存储器和处理器,所述存储器与所述处理器连接,所述存储器用于存储程序代码,当所述处理器用于调用所述存储器中的程序代码时,执行本申请第一方面所提供的业务割接方法。
附图说明
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1为现有技术中一种存储系统的结构示意图;
图2为本发明的实施例所提供的业务割接方法的应用场景说明示意图;
图3为本发明的实施例所提供的业务割接方法流程示意图;
图4为本发明的实施例中目标存储设备、源存储设备以及主机网络的连接示意图;
图5为本发明的实施例中将目标存储设备的冗余连接端口虚拟化为M个虚拟连接端口的示意图;
图6为本发明的实施例中将目标存储设备通过M个虚拟连接端口接入M个主机组的示意图;
图7为本发明的实施例中目标存储设备上创建伪装的虚拟LUN的示意图;
图8为本发明的实施例所提供的一种存储控制装置结构示意图;
图9为本发明的实施例所提供的一种存储设备的结构示意图。
具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
本发明的实施例提供一种业务割接方法、存储控制装置及存储设备,能够提高对存储设备的兼容性,实现从源存储设备到目标存储设备的在线割接。本领域的内的技术人员可以理解的是,实现在线割接的方法,也可以用于实现离线割接,本发明的实施例所提供的业务割接方法,既可以用于在线业务割接,也可以用于离线业务割接,本发明的实施例仅以在线业务割接的过程为例进行说明。
本发明的实施例提供一种业务割接方法、存储控制装置及存储设备,应用于如图2所示的存储系统。存储系统包括主机网络、交换机和存储设备。其中,主机网络包括H台主机,H为大于0的整数,存储设备包括源存储设备和目标存储设备,源存储设备和目标存储设备可以是同构或者异构存储设备。主机网络内的H台主机与交换机连接,在进行业务割接之前,源存储设备通过其连接端口与交换机建立连接。在业务割接过程中,源存储设备是需要被替换的旧存储设备,目标存储设备是用于替换源存储设备的新存储设备。
源存储设备通过M个主机组对H台主机进行分组管理,M为大于0的整数。图2中不同主机组分别通过主机组1、主机组2字样进行标识,H台主机通过主机1、主机2字样进行标识。H台主机中,一台主机连接一个主机组。M个主机组中,一个主机组连接至少一台主机。主机组中通过主机的端口号标识一台主机,图2中端口1用于标识主机1,表示主机1通过端口1接入主机组1,端口2用于标识主机2,依次类推。图2中通过主机组与端口号之间的连线表示主机组与主机之间的连接关系。
源存储设备包括N个LUN,N为大于0的整数。图2中不同LUN通过LUN1、LUN2字样进行标识。
N个LUN与M个主机组之间建立有映射关系。通常一个LUN仅与一个主机组建立映射关系,本发明的实施例所提供的业务割接方法,适用于LUN与主机组一对一映射的情况,也适用于LUN与主机组多对多映射的情况。即一个LUN与至少一个主机组建立映射关系,一个主机组与至少一个LUN建立映射关系。图2中通过LUN与主机组之间的连线表示映射关系,其中LUN1与主机组1建立映射关系,LUN2与主机组2和主机组3均建立映射关系,LUN3和LUN4均与主机组4建立映射关系。
H台主机中的一台主机,通过访问与所连接的主机组建立有映射关系的(至少一个)LUN执行主机业务,主机不能访问与所连接的主机组没有建立映射关系的LUN。结合图2所示,主机1(用端口1标识)与主机组1连接,则主机1可以通过端口1访问LUN1,而不能访问LUN2、LUN3或者LUN4。
以下结合具体实施例对本发明所提供的业务割接方法、存储控制装置及存储设备做详细说明。
实施例
本发明的实施例提供一种业务割接方法,用于实现主机网络从源存储设备到目标存储设备的业务割接。参照图3所示,包括以下步骤:
301、将目标存储设备通过其连接端口与交换机建立连接,将目标存储设备与源存储设备通过各自的冗余连接端口建立连接。
在进行业务割接之前,源存储设备与H台主机通过交换机连接,主机正常访问源存储设备。其中,源存储设备通过M个主机组对H台主机进行分组管理,一台主机连接一个主机组,一个主机组连接至少一台主机,M个主机组与源存储设备上的N个LUN之间建立有映射关系。
进行业务割接的第一步是将目标存储设备分别与主机网络和源存储设备连接。存储设备(包括源存储设备和目标存储设备)的物理端口包括连接端口和冗余连接端口,分别用于和交换机以及和另一存储设备连接。可选的,物理端口具体可以是小型计算机系统接口(英文全称:Internet Small Computer System Interface,英文简称:iSCSI),或者光纤通道(英文全称:Fibre Channel,英文简称:FC)接口。
结合图4所示,存储设备的物理端口用存储设备端口(英文全称:Storage Port,英文简称:SP)进行标识。每个存储设备包括4个SP,分别用SPxyz表示,其中xyz为3为二进制码。x代表存储设备,0为源存储设备,1为目标存储设备。y代表控制器,存储设备上的控制器包括读控制器和写控制器,分别用0和1标识。每个控制器包括两个端口,z代表控制器内端口编号,在存储设备正常工作无需进行业务割接时,存储设备的两个控制器均有一个端口与主机网络连接,控制器另一端口为冗余端口。
源存储设备的连接端口包括SP000和SP010,冗余连接端口包括SP001和SP011。在源存储设备正常工作无需进行业务割接时,源存储设备通过SP000和SP010,连接交换机,通过交换机与主机网络连接。
目标存储设备的连接端口包括SP100和SP110,冗余连接端口包括SP101和SP111。在源存储设备和目标存储设备需要进行业务割接时,将目标存储设备通过其连接端口与交换机建立连接,即通过SP100和SP110,连接交换机,通过交换机与主机网络连接。进一步地,将目标存储设备与源存储设备通过各自的冗余连接端口建立连接,如图4所示SP001与SP101连接,SP011与SP111连接。
302、将目标存储设备的冗余连接端口虚拟化为M个虚拟连接端口。
目标存储设备的冗余连接端口包括两个物理端口,分别为SP101和SP111,将目标存储设备的冗余连接端口虚拟化为M个虚拟连接端口,即将连接端口所包括的每一个物理端口均虚拟化为M个虚拟端口。一个虚拟连接端口包括2个虚拟端口,2个虚拟端口分别对应连接端口所包括的2个物理端口。
结合图5所示,以M为4的情况为例进行说明。将SP101虚拟化为4个虚拟端口,分别为SP101:0、SP101:1、SP101:2和SP101:3。将SP111虚拟化为4个虚拟端口,分别为SP111:0、SP111:1、SP111:2和SP111:3。
结合表一,一个虚拟连接端口所包括两个虚拟端口,分别为虚拟端口1和虚拟端口2,其中虚拟端口1为由SP101虚拟化所得的4个虚拟端口之一,对应SP101,虚拟端口2为由SP111虚拟化所得的4个虚拟端口之一,对应SP111。
  虚拟端口1 虚拟端口2
虚拟连接端口1 SP101:0 SP111:0
虚拟连接端口2 SP101:1 SP111:1
虚拟连接端口3 SP101:2 SP111:2
虚拟连接端口4 SP101:3 SP111:3
表一
303、将M个虚拟连接端口分别与M个主机组建立连接。其中,一个虚拟连接端口连接一个主机组。
指示源存储设备将目标存储设备接入M个主机组中的每一个主机组。其中,目标存储设备通过第m个虚拟连接端口接入第m个主机组。其中,m=1…M。即主机组与虚拟连接端口一一对应。
结合图6所示M等于4的情况,以主机组1为例,主机组1与LUN1建立有映射关系,将目标存储设备通过虚拟连接端口1,接入主机组1,即建立SP101:0和SP111:0与LUN1的映射关系,从而目标存储设备可以通过虚拟连接端口1访问源存储设备上的LUN1。
现有的业务割接技术中,由于目标存储设备的冗余连接端口只能接入一个主机组,因此在业务割接过程中,首先需要删除源存储设备上LUN与已有主机组之间的映射关系,然后新建主机组,并将源存储设备上LUN均与新建的主机组建立映射关系,进一步,将目标存储设备通过连接端口接入新建的主机组,从而完成目标存储设备与源存储设备之间的连接。
本发明的实施例中,通过将目标存储设备的冗余连接端口虚拟化为M个虚拟连接端口,源存储设备可以将目标存储设备通过M个虚拟连接端口接入M个主机组,因此无需改变源存储设备上LUN与已有主机组之间的映射关系,也无需新建主机组。
304、在目标存储设备上创建N个伪装的虚拟LUN,N个伪装的虚拟LUN与源存储设备上的N个LUN一一对应。
在目标存储设备与源存储设备连接建立,目标存储设备可以访问源存储设备的情况下,目标存储设备可以对源存储设备上的LUN进行扫描,以获取源存储设备上N个LUN各自的标识信息。LUN的标识信息包括LUN的序列号(英文全称:Serial Number,英文简称:SN)以及LUN ID。
获取源存储设备上N个LUN各自的标识信息之后,参照图7所示,在目标存储设备上创建N个虚拟LUN,并将N个LUN的标识信息分配给N个虚拟 LUN。其中一个LUN的标识信息分配给一个虚拟LUN。
进一步地,将目标存储设备上的N个的虚拟LUN,与源存储设备上的N个LUN建立关联。其中一个虚拟LUN与标识信息相同的一个LUN建立关联。与目标存储设备上的一个LUN建立关联的虚拟LUN,为该LUN所对应的伪装的虚拟LUN。目标存储设备上N个伪装的虚拟LUN与源存储设备上N个LUN一一对应。图7中用vLUN1、vLUN2字样标识不同的伪装的虚拟LUN,目标存储设备上与伪装的虚拟LUN连接的LUN为伪装的虚拟LUN所对应的LUN。其中vLUN1与LUN1对应,依次类推。
虚拟LUN本身并不存储数据,主机访问目标存储设备上的一个伪装的虚拟LUN时,该伪装的虚拟LUN从对应的源存储设备上的LUN读取数据(或者向对应LUN写入数据)并向主机返回结果。主机通过LUN的标识信息识别不同LUN,目标存储设备上伪装的虚拟LUN的标识信息与对应的源存储设备上的LUN的标识信息相同,因此在主机和源存储设备上的一个LUN以及对应的目标存储设备上伪装的虚拟LUN通过两条路径建立连接的情况下,主机将源存储设备上的LUN以及对应的目标存储设备上的伪装的虚拟LUN作为同一LUN,并将两条路径作为访问同一LUN的不同路径进行管理。
305、M个主机组内的主机增加替代路径。
在进行业务割接之前,源存储设备与主机网络连接,主机网络内的H台主机通过访问有效LUN执行主机业务。有效LUN是指,源存储设备上的N个LUN中,与一台主机所连接的主机组建立有映射关系的LUN,为该主机所对应的有效LUN。主机访问有效LUN的路径为主机的原始路径。
当目标存储设备与源存储设备以及主机网络建立连接后,当进行业务割接时,在创建N个伪装的虚拟LUN之后,用户对M个主机组内的主机进行操作,指示主机进行扫盘,M个主机组内的主机在完成扫盘之后增加替代路径,一个主机对应的替代路径,为主机访问替代LUN的路径。替代LUN是指,目标存储设备上的N个伪装的虚拟LUN中,与有效LUN所对应的伪装的虚拟LUN。
一台主机对应的有效LUN包括至少一个LUN,对应的替代LUN包括至少一个伪装的虚拟LUN。有效LUN内所包括的LUN的数量,与替代LUN所包括的伪装的虚拟LUN的数量相等。有效LUN内所包括的LUN,与替代LUN所包括的伪装的虚拟LUN一一对应。
主机的路径管理程序通过LUN的标识信息识别不同的LUN,由于LUN与 其伪装的虚拟LUN标识信息相同,因此主机将LUN以及LUN对应的伪装的虚拟LUN作为同一LUN,将原始路径和替代路径作为访问同一LUN的不同路径进行管理。针对一台主机,主机的路径管理程序将访问替代LUN的替代路径,与访问有效LUN的原始路径,作为访问有效LUN的两条路径。
结合图7,以LUN1为例进行说明。vLUN1为与LUN1关联的虚拟LUN,是LUN1对应的伪装的虚拟LUN。当LUN1属于主机1的有效LUN时,vLUN1属于替代LUN。主机1通过原始路径访问LUN1。当主机1识别vLUN1之后,由于vLUN1与LUN1标识信息相同,因此主机1将替代路径,即访问vLUN1的路径作为访问LUN1的另一条路径进行管理。
主机可以通过原始路径访问LUN执行主机业务,也可以通过替代路径访问替代LUN执行主机业务。步骤306为主机访问替代LUN时的情况。
306、当主机访问替代LUN时,将访问操作重定向至有效LUN。
访问操作重定向是指,当主机通过替代路径请求对替代LUN进行操作(读或者写操作)时,目标存储设备通过与源存储设备之间的连接,访问源存储设备上该替代LUN映射的有效LUN,并对有效LUN进行操作。
具体地,目标存储设备对源存储设备进行扫描,确定源存储设备上N个LUN与M个主机组之间的映射关系,以及各个主机组各自所连接的主机。
目标存储设备接收主机通过替代路径发送的访问请求消息,访问请求消息用于请求访问替代LUN。目标存储设备根据主机组与主机之间的连接关系确定发送访问请求消息的主机所连接的主机组。
结合步骤303,M个主机组分别与M个虚拟连接端口连接,M个主机组分别与M个虚拟连接端口一一对应。将一个主机组所连接的虚拟连接端口称为目标虚拟连接端口,则目标存储设备根据发送访问请求消息的主机所连接的主机组,即可确定目标虚拟连接端口。进一步地,目标存储设备通过目标虚拟连接端口访问替代LUN,并根据访问请求消息对替代LUN进行操作,最终向发出访问请求消息的主机返回操作结果。
例如,结合图7,目标存储设备接收主机1发送的访问请求消息,替代LUN具体为vLUN1,对应有效LUN为LUN1。目标存储设备根据主机组与主机之间的连接关系,确定主机1所在主机组为主机组1,目标虚拟连接端口为虚拟连接端口1(SP101:0和SP111:0)。目标存储设备通过虚拟连接端口1 访问LUN1,根据访问请求消息对LUN1进行操作,并向主机1返回操作结果。
目标存储设备可能有缓存从源存储设备读取的数据的功能,为保证主机每一次对替代LUN的访问都从对应的有效LUN获取数据,需要禁用目标存储设备上虚拟LUN的数据缓存功能。
通过将主机的访问操作重定向,主机访问替代LUN也能够从有效LUN获取数据,或者向有效LUN进行写入数据,此时断开源存储设备与主机网络的连接,主机业务能够正常执行,即完成了在线业务割接,割接过程对于主机业务的正常进行不会造成影响。
307、M个主机组内的主机删除原始路径。
在完成在线业务割接之后,主机通过替代路径访问目标存储设备就可以保证主机业务正常执行。当源存储设备断开与主机网络的连接时,主机的路径管理程序将原始路径删除。
308、将源存储设备的数据迁移至目标存储设备。
在完成在线业务割接之后,主机通过替代LUN作为访问有效LUN的桥梁,对有效LUN进行操作。替代LUN为伪装的虚拟LUN,虚拟LUN本身并不存储数据,在断开源存储设备与目标存储设备的连接之前,需要将源存储设备上的数据迁移至目标存储设备。
具体的,在目标存储设备上创建N个目标LUN,将源存储设备上N个LUN的数据迁移至目标存储设备上创建的N个目标LUN。
N个目标LUN与N个伪装的虚拟LUN一一对应,同时N个伪装的虚拟LUN与源存储设备上的N个LUN一一对应,因此目标LUN、伪装的虚拟LUN以及源存储设备上的LUN之间均是一一对应的关系。伪装的虚拟LUN读取对应的源存储设备上LUN的数据,并将读取的数据存储至对应的目标LUN,完成N个LUN向N个目标LUN的数据迁移。
数据迁移完成后,将N个伪装的虚拟LUN与N个LUN之间的关联解除,并建立N个伪装的虚拟LUN与N个目标LUN之间的关联。其中,一个伪装的虚拟LUN与其对应的一个目标LUN建立管理。
伪装的虚拟LUN与目标LUN之间的关联建立后,主机通过替代路径访问伪装的虚拟LUN时,从对应目标LUN获取数据,无需再从源存储设备的LUN获取数据,此时将源存储设备与主机网络之间的连接断开,完成源存储设备 向目标存储设备的替换。
进一步地,将伪装的虚拟LUN与对应目标LUN的标识信息互换,并删除N个伪装的虚拟LUN。主机通过替代路径直接访问目标LUN,数据迁移过程对主机透明。
本发明的实施例所提供的业务割接方法,通过将目标存储设备的冗余连接端口虚拟化为M个虚拟连接端口,将目标存储设备通过M个虚拟连接端口分别与M个主机组连接,在目标存储设备上创建N个伪装的虚拟LUN,在所述M个主机组内的主机增加替代路径之后,当主机访问所述替代LUN时,将访问操作重定向至所述有效LUN,实现在线业务割接。通过虚拟连接端口将目标存储设备接入源存储设备原有的主机组,无需创建新的主机组,不论同构存储或者异构存储均可实现。另外,由于无需改变源存储设备上原有LUN与主机组之间的映射关系,主机通过替代路径访问目标存储设备上伪装的虚拟LUN之前,能够通过原始路径正常访问源存储设备上LUN,不会造成主机业务中断。即使在一个LUN只能与一个主机组建立映射关系的应用场景中,也能够实现在线割接。因此不论同构存储设备或者异构存储设备,也不论是否支持将一个LUN与多个主机组建立映射关系,本发明的实施例所提供的业务割接方法均可以实现在线业务割接,从而提高了在线业务割接技术对存储设备的兼容性。
基于图3所对应的实施例,本发明的实施例还提供一种存储控制装置,安装于目标存储设备内,用于执行图3所对应的实施例中所提供的业务割接方法,实现主机网络从源存储设备到目标存储设备的业务割接。主机网络包括H台主机,H为大于0的整数,H台主机与交换机连接,源存储设备通过其连接端口与交换机建立连接。源存储设备包括M个主机组,M为大于0的整数,H台主机与M个主机组连接,一个主机组连接至少一台主机。源存储设备还包括N个逻辑单元号LUN,N为大于0的整数,N个LUN与M个主机组之间建立有映射关系,一个LUN与至少一个主机组建立映射关系,一个主机组与至少一个LUN建立映射关系,一台主机通过访问与所连接的主机组建立有映射关系的LUN执行主机业务。参照图8,存储控制装置80包括:
连接控制单元801,用于将目标存储设备通过其连接端口与交换机建立连接,将目标存储设备与源存储设备通过各自的冗余连接端口建立连接。
连接控制单元801,还用于将目标存储设备的冗余连接端口虚拟化为M个虚拟连接端口。
连接控制单元801,还用于将M个虚拟连接端口分别与M个主机组建立连接。其中,一个虚拟连接端口连接一个主机组。
LUN管理单元802,用于在目标存储设备上创建N个伪装的虚拟LUN,N个伪装的虚拟LUN与源存储设备上的N个LUN一一对应。
访问控制单元803,用于在M个主机组内的主机增加替代路径之后,当主机访问替代LUN时,将访问操作重定向至有效LUN。其中,替代路径为主机访问替代LUN的路径,替代LUN为目标存储设备上N个伪装的虚拟LUN中与有效LUN所对应的伪装的虚拟LUN,有效LUN为源存储设备上N个LUN中与主机所连接的主机组建立有映射关系的LUN。
可选的,LUN管理单元802,具体用于获取源存储设备上N个LUN各自的标识信息。在目标存储设备上创建N个虚拟LUN,并将N个LUN的标识信息分配给N个虚拟LUN。其中一个LUN的标识信息分配给一个虚拟LUN。将N个虚拟LUN与N个LUN建立关联。其中一个虚拟LUN与标识信息相同的一个LUN建立关联。
可选的,访问控制单元803,具体用于接收主机通过替代路径发送的访问请求消息。访问请求消息用于请求访问替代LUN。通过目标虚拟连接端口访问替代LUN,目标虚拟连接端口为M个虚拟连接端口中,与发出访问请求消息的主机所连接的主机组建立了连接的虚拟连接端口。根据访问请求消息对替代LUN进行操作,并向发出访问请求消息的主机返回操作结果。
可选的,LUN管理单元802,还用于在目标存储设备上创建N个目标LUN。将源存储设备上N个LUN的数据迁移至目标存储设备上创建的N个目标LUN。
本发明的实施例还提供一种存储设备900,该存储设备900对应图3所对应的实施例中的目标存储设备。参照图9所示,存储设备90包括存储器902和处理器901,所述存储器902与所述处理器901连接。
存储器902可以包括易失性存储器(英文:volatile memory),例如随机存取存储器(英文:random-access memory,缩写:RAM)。存储器也可以包括非易失性存储器(英文:non-volatile memory),例如只读存储器(英 文:read-only memory,缩写:ROM),快闪存储器(英文:flash memory),硬盘(英文:hard disk drive,缩写:HDD)或固态硬盘(英文:solid-state drive,缩写:SSD)。存储器902还可以包括上述种类的存储器的组合。
处理器901可以是中央处理器(全称:Central Processing Unit,简称:CPU),或者CPU和硬件芯片的组合。上述硬件芯片可以是网络处理器(英文:network processor,缩写:NP),专用集成电路(英文:application-specific integrated circuit,缩写:ASIC),可编程逻辑器件(英文:programmable logic device,缩写:PLD)或其任意组合。上述PLD可以是复杂可编程逻辑器件(英文:complex programmable logic device,缩写:CPLD),现场可编程逻辑门阵列(英文:field-programmable gate array,缩写:FPGA),通用阵列逻辑(英文:generic array logic,缩写:GAL)或其任意组合。
处理器901,用于调用存储器902中的程序代码,在一种可能的实施方式中,当上述程序被处理器901执行时,实现如下功能:
处理器901,用于调用存储器902中的程序代码,执行上述图3对应的设备实施例所描述的业务割接方法,具体描述参照图3对应的设备实施例,这里不再赘述。
其中,总线903可包括一通路,用于在所述存储设备900中各个部件(例如处理器901和存储器902)之间传送信息。例如,总线903将处理器901与存储器902连接,处理器901通过总线903访问存储器902,包括处理器901向存储器902写入数据,还包括处理器901从存储器902读取数据。
可选地,所述存储设备900还包括输入/输出接口905,输入/输出接口905用于接收输入的数据和信息,输出操作结果等数据。
可选地,通信接口904使用例如但不限于收发器一类的收发装置,来实现所述存储设备900与其他设备或通信网络之间的网络通信;可选地,通信接口904可以是用于接入网络的各种接口,如用于接入以太网的以太网接口,该以太网接口包括但不限于RJ-45接口、RJ-11接口、SC光纤接口、FDDI接口、AUI接口、BNC接口和Console接口等。
应注意,尽管图9所示的所述存储设备900仅仅示出了处理器901、存储器902以及总线903,但是在具体实现过程中,本领域的技术人员应当明 白,所述存储设备900还包含实现正常运行所必须的其他器件。同时,根据具体需要,本领域的技术人员应当明白,所述存储设备900还可包含实现其他附加功能的硬件器件。此外,本领域的技术人员应当明白,所述存储设备900也可仅仅包含实现本发明实施例所必须的器件,而不必包含图9中所示的全部器件。
本发明的实施例所提供的存储控制装置以及存储设备,通过将目标存储设备的冗余连接端口虚拟化为M个虚拟连接端口,将目标存储设备通过M个虚拟连接端口分别与M个主机组连接,在目标存储设备上创建N个伪装的虚拟LUN,在M个主机组内的主机增加替代路径之后,当主机访问替代LUN时,将访问操作重定向至有效LUN,实现在线业务割接。通过虚拟连接端口将目标存储设备接入源存储设备原有的主机组,无需创建新的主机组,不论同构存储或者异构存储均可实现。另外,由于无需改变源存储设备上原有LUN与主机组之间的映射关系,主机通过替代路径访问目标存储设备上伪装的虚拟LUN之前,能够通过原始路径正常访问源存储设备上LUN,不会造成主机业务中断。即使在一个LUN只能与一个主机组建立映射关系的应用场景中,也能够实现在线割接。因此不论同构存储设备或者异构存储设备,也不论是否支持将一个LUN与多个主机组建立映射关系,本发明的实施例所提供的业务割接方法均可以实现在线业务割接,从而提高了在线业务割接技术对存储设备的兼容性。
通过以上的实施方式的描述,所属领域的技术人员可以清楚地了解到,当使用软件实现本申请的方案时,可以将上述功能存储在计算机可读介质中或作为计算机可读介质上的一个或多个指令或代码进行传输。计算机可读介质包括计算机存储介质和通信介质,其中存储介质可以是计算机能够存取的任何可用介质,通信介质包括便于从一个地方向另一个地方传送计算机程序的任何介质。计算机可读介质包括但不限于随机存储器(英文全称:Random Access Memory,英文简称:RAM)、只读存储器(英文全称:Read Only Memory,英文简称:ROM)、电可擦可编程只读存储器(英文全称:Electrically Erasable Programmable Read Only Memory,英文简称:EEPROM)、只读光盘(英文全称:Compact Disc Read Only Memory,英文简称:CD-ROM)或其 他光盘存储、磁盘存储介质或者其他磁存储设备。
以上所述,仅为本发明的具体实施方式,但本发明的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本发明揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本发明的保护范围之内。因此,本发明的保护范围应所述以权利要求的保护范围为准。

Claims (9)

  1. 一种业务割接方法,用于实现主机网络从源存储设备到目标存储设备的业务割接;所述主机网络包括H台主机,H为大于0的整数,所述H台主机与交换机连接,所述源存储设备通过其连接端口与所述交换机建立连接;所述源存储设备包括M个主机组,M为大于0的整数,所述H台主机与所述M个主机组连接,一个主机组连接至少一台主机;所述源存储设备还包括N个逻辑单元号LUN,N为大于0的整数,所述N个LUN与所述M个主机组之间建立有映射关系,一个LUN与至少一个主机组建立映射关系,一个主机组与至少一个LUN建立映射关系,一台主机通过访问与所连接的主机组建立有映射关系的LUN执行主机业务;其特征在于,所述方法包括:
    将所述目标存储设备通过其连接端口与所述交换机建立连接,将所述目标存储设备与所述源存储设备通过各自的冗余连接端口建立连接;
    将所述目标存储设备的冗余连接端口虚拟化为M个虚拟连接端口;
    将所述M个虚拟连接端口分别与所述M个主机组建立连接;其中,一个虚拟连接端口连接一个主机组;
    在所述目标存储设备上创建N个伪装的虚拟LUN,所述N个伪装的虚拟LUN与所述源存储设备上的所述N个LUN一一对应;
    在所述M个主机组内的主机增加替代路径之后,当主机访问所述替代LUN时,将访问操作重定向至所述有效LUN;其中,所述替代路径为主机访问替代LUN的路径,所述替代LUN为所述目标存储设备上所述N个伪装的虚拟LUN中与有效LUN所对应的伪装的虚拟LUN,所述有效LUN为所述源存储设备上所述N个LUN中与主机所连接的主机组建立有映射关系的LUN。
  2. 根据权利要求1所述的方法,其特征在于,在所述目标存储设备上创建N个伪装的虚拟LUN,包括:
    获取所述源存储设备上所述N个LUN各自的标识信息;
    在所述目标存储设备上创建N个虚拟LUN,并将所述N个LUN的标识信息分配给所述N个虚拟LUN;其中一个LUN的标识信息分配给一个虚拟LUN;
    将所述N个虚拟LUN与所述N个LUN建立关联;其中一个虚拟LUN与标识信息相同的一个LUN建立关联。
  3. 根据权利要求1所述的方法,其特征在于,所述当主机访问所述替 代LUN时,将访问操作重定向至所述有效LUN,包括:
    接收主机通过所述替代路径发送的访问请求消息;所述访问请求消息用于请求访问所述替代LUN;
    通过目标虚拟连接端口访问所述替代LUN,所述目标虚拟连接端口为所述M个虚拟连接端口中,与发出所述访问请求消息的主机所连接的主机组建立了连接的虚拟连接端口;
    根据所述访问请求消息对所述替代LUN进行操作,并向发出所述访问请求消息的主机返回操作结果。
  4. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    在所述目标存储设备上创建N个目标LUN;
    将所述源存储设备上所述N个LUN的数据迁移至所述目标存储设备上创建的所述N个目标LUN。
  5. 一种存储控制装置,安装于目标存储设备内,用于实现主机网络从源存储设备到所述目标存储设备的业务割接;所述主机网络包括H台主机,H为大于0的整数,所述H台主机与交换机连接,所述源存储设备通过其连接端口与所述交换机建立连接;所述源存储设备包括M个主机组,M为大于0的整数,所述H台主机与所述M个主机组连接,一个主机组连接至少一台主机;所述源存储设备还包括N个逻辑单元号LUN,N为大于0的整数,所述N个LUN与所述M个主机组之间建立有映射关系,一个LUN与至少一个主机组建立映射关系,一个主机组与至少一个LUN建立映射关系,一台主机通过访问与所连接的主机组建立有映射关系的LUN执行主机业务;其特征在于,所述存储控制装置包括:
    连接控制单元,用于将所述目标存储设备通过其连接端口与所述交换机建立连接,将所述目标存储设备与所述源存储设备通过各自的冗余连接端口建立连接;
    所述连接控制单元,还用于将所述目标存储设备的冗余连接端口虚拟化为M个虚拟连接端口;
    所述连接控制单元,还用于将所述M个虚拟连接端口分别与所述M个主机组建立连接;其中,一个虚拟连接端口连接一个主机组;
    LUN管理单元,用于在所述目标存储设备上创建N个伪装的虚拟LUN, 所述N个伪装的虚拟LUN与所述源存储设备上的所述N个LUN一一对应;
    访问控制单元,用于在所述M个主机组内的主机增加替代路径之后,当主机访问所述替代LUN时,将访问操作重定向至所述有效LUN;其中,所述替代路径为主机访问替代LUN的路径,所述替代LUN为所述目标存储设备上所述N个伪装的虚拟LUN中与有效LUN所对应的伪装的虚拟LUN,所述有效LUN为所述源存储设备上所述N个LUN中与主机所连接的主机组建立有映射关系的LUN。
  6. 根据权利要求5所述的存储控制装置,其特征在于,
    所述LUN管理单元,具体用于获取所述源存储设备上所述N个LUN各自的标识信息;在所述目标存储设备上创建N个虚拟LUN,并将所述N个LUN的标识信息分配给所述N个虚拟LUN;其中一个LUN的标识信息分配给一个虚拟LUN;将所述N个虚拟LUN与所述N个LUN建立关联;其中一个虚拟LUN与标识信息相同的一个LUN建立关联。
  7. 根据权利要求5所述的存储控制装置,其特征在于,
    所述访问控制单元,具体用于接收主机通过所述替代路径发送的访问请求消息;所述访问请求消息用于请求访问所述替代LUN;通过目标虚拟连接端口访问所述替代LUN,所述目标虚拟连接端口为所述M个虚拟连接端口中,与发出所述访问请求消息的主机所连接的主机组建立了连接的虚拟连接端口;根据所述访问请求消息对所述替代LUN进行操作,并向发出所述访问请求消息的主机返回操作结果。
  8. 根据权利要求5所述的存储控制装置,其特征在于,
    所述LUN管理单元,还用于在所述目标存储设备上创建N个目标LUN;将所述源存储设备上所述N个LUN的数据迁移至所述目标存储设备上创建的所述N个目标LUN。
  9. 一种存储设备,其特征在于,包括存储器和处理器,所述存储器与所述处理器连接,所述存储器用于存储程序代码,所述处理器用于调用所述存储器中的程序代码,执行权利要求1-4任一项所描述的业务割接方法。
PCT/CN2016/078464 2015-11-24 2016-04-05 业务割接方法、存储控制装置及存储设备 WO2017088342A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510824080.7 2015-11-24
CN201510824080.7A CN105446662B (zh) 2015-11-24 2015-11-24 一种业务割接方法、存储控制装置及存储设备

Publications (1)

Publication Number Publication Date
WO2017088342A1 true WO2017088342A1 (zh) 2017-06-01

Family

ID=55556922

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/078464 WO2017088342A1 (zh) 2015-11-24 2016-04-05 业务割接方法、存储控制装置及存储设备

Country Status (2)

Country Link
CN (1) CN105446662B (zh)
WO (1) WO2017088342A1 (zh)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111314802A (zh) * 2018-12-12 2020-06-19 中兴通讯股份有限公司 光纤割接方法、装置、sdn控制器、系统及存储介质
CN112350843A (zh) * 2019-08-09 2021-02-09 烽火通信科技股份有限公司 一种基于虚拟组件的场景式割接方法和系统
CN112965659A (zh) * 2017-10-10 2021-06-15 华为技术有限公司 处理i/o请求的方法、存储阵列及主机

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105446662B (zh) * 2015-11-24 2018-09-21 华为技术有限公司 一种业务割接方法、存储控制装置及存储设备
CN106484327B (zh) 2016-09-20 2019-07-23 华为技术有限公司 一种数据处理方法及相关存储设备
CN108932105A (zh) * 2017-05-25 2018-12-04 中兴通讯股份有限公司 一种存储网关分级存储的配置方法及系统
CN107391047B (zh) * 2017-08-02 2021-05-28 郑州云海信息技术有限公司 一种存储系统管理的方法及装置
CN107656705B (zh) * 2017-10-25 2020-10-23 苏州浪潮智能科技有限公司 一种计算机存储介质和一种数据迁移方法、装置及系统
CN110413213B (zh) * 2018-04-28 2023-06-27 伊姆西Ip控股有限责任公司 存储卷在存储阵列之间的无缝迁移

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2163978A2 (en) * 2008-09-16 2010-03-17 Hitachi Ltd. Method and apparatus for storage migration
CN102387175A (zh) * 2010-08-31 2012-03-21 国际商业机器公司 一种存储系统迁移的方法和系统
CN102469025A (zh) * 2010-11-18 2012-05-23 株式会社日立制作所 多存储系统上的多路径交换
CN105446662A (zh) * 2015-11-24 2016-03-30 华为技术有限公司 一种业务割接方法、存储控制装置及存储设备

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2163978A2 (en) * 2008-09-16 2010-03-17 Hitachi Ltd. Method and apparatus for storage migration
CN102387175A (zh) * 2010-08-31 2012-03-21 国际商业机器公司 一种存储系统迁移的方法和系统
CN102469025A (zh) * 2010-11-18 2012-05-23 株式会社日立制作所 多存储系统上的多路径交换
CN105446662A (zh) * 2015-11-24 2016-03-30 华为技术有限公司 一种业务割接方法、存储控制装置及存储设备

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112965659A (zh) * 2017-10-10 2021-06-15 华为技术有限公司 处理i/o请求的方法、存储阵列及主机
US11762555B2 (en) 2017-10-10 2023-09-19 Huawei Technologies Co., Ltd. I/O request processing method, storage array, and host
CN111314802A (zh) * 2018-12-12 2020-06-19 中兴通讯股份有限公司 光纤割接方法、装置、sdn控制器、系统及存储介质
CN111314802B (zh) * 2018-12-12 2023-05-16 中兴通讯股份有限公司 光纤割接方法、装置、sdn控制器、系统及存储介质
CN112350843A (zh) * 2019-08-09 2021-02-09 烽火通信科技股份有限公司 一种基于虚拟组件的场景式割接方法和系统

Also Published As

Publication number Publication date
CN105446662B (zh) 2018-09-21
CN105446662A (zh) 2016-03-30

Similar Documents

Publication Publication Date Title
WO2017088342A1 (zh) 业务割接方法、存储控制装置及存储设备
US11126358B2 (en) Data migration agnostic of pathing software or underlying protocol
US20200278880A1 (en) Method, apparatus, and system for accessing storage device
US9766833B2 (en) Method and apparatus of storage volume migration in cooperation with takeover of storage area network configuration
US10423332B2 (en) Fibre channel storage array having standby controller with ALUA standby mode for forwarding SCSI commands
US8699322B1 (en) Port identifier management for path failover in cluster environments
JP6074056B2 (ja) 計算機システムおよびデータ制御方法
US10152281B2 (en) Systems, devices, apparatus, and methods for transparently inserting a virtual storage layer in a fibre channel based storage area network while maintaining continuous input/output operations
JP5461216B2 (ja) 論理ボリューム管理の為の方法と装置
CN111654519B (zh) 用于传输数据处理请求的方法和装置
US20060277361A1 (en) Online restriping technique for distributed network based virtualization
US8732381B2 (en) SAS expander for communication between drivers
US20080114961A1 (en) Transparent device switchover in a storage area network
US8762669B2 (en) Computer system and storage migration method utilizing acquired apparatus specific information as virtualization information
US20140195698A1 (en) Non-disruptive configuration of a virtualization cotroller in a data storage system
US11016817B2 (en) Multi root I/O virtualization system
WO2019080150A1 (zh) 一种双活存储系统和地址分配方法
JP2015532734A (ja) 物理ストレージシステムを管理する管理システム、物理ストレージシステムのリソース移行先を決定する方法及び記憶媒体
US9047122B2 (en) Integrating server and storage via integrated tenant in vertically integrated computer system
US10241950B2 (en) Multipath I/O proxy device-specific module
US8838768B2 (en) Computer system and disk sharing method used thereby
US20240028383A1 (en) Intelligent connection placements on sr-iov virtual functions
US20100235549A1 (en) Computer and input/output control method
US9164880B2 (en) Method and apparatus for offloading storage workload
US11693577B2 (en) Storage operation processing during data migration using migrated indicator from source storage

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16867571

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16867571

Country of ref document: EP

Kind code of ref document: A1