Patent application number | Description | Published |
20080276255 | Alternate Communication Path Between ESSNI Server and CEC - An enterprise network interface client application and a local, central electronic complex (CEC) in a dual CEC environment implement an alternative method of communication. Upon a send failure of a command to a first CEC in the environment, the command is sent to a second CEC using a CEC to CEC message mechanism. A method of communicating an asynchronous event is implemented between a microcode layer and an enterprise network interface client application in a dual central electronic complex (CEC) environment. A copy of the event is retained. Upon a send failure of the event to a first CEC in the environment, the copy of the event is sent to a second CEC in the environment. | 11-06-2008 |
20090049227 | AVOIDING FAILURE OF AN INITIAL PROGRAM LOAD IN A LOGICAL PARTITION OF A DATA STORAGE SYSTEM - An initial program load (IPL) of a logical partition (LPAR) is managed by establishing a logical path to the LPAR from a storage controller. When a notice is received by the storage controller from the LPAR that the IPL has commenced, the LPAR address is stored in a data structure. After the storage controller initiates a pack change state interrupt, the stored address is compared with the addresses in a list of all LPARS to which the interrupt is directed. If the list of addresses includes the stored address, the stored address is removed from the list. Thus, the pack change state interrupt is transmitted only to the addresses in the list, leaving the LPAR to complete the IPL without interruption. After the storage controller receives a notice from the LPAR that the IPL has completed, the address of the LPAR is removed from the data structure. | 02-19-2009 |
20090049228 | AVOIDING FAILURE OF AN INITIAL PROGRAM LOAD IN A LOGICAL PARTITION OF A DATA STORAGE SYSTEM - An initial program load (IPL) of a logical partition (LPAR) is managed by establishing a logical path to the LPAR from a storage controller. When a notice is received by the storage controller from the LPAR that the IPL has commenced, the LPAR address is stored in a data structure. After the storage controller initiates a pack change state interrupt, the stored address is compared with the addresses in a list of all LPARS to which the interrupt is directed. If the list of addresses includes the stored address, the stored address is removed from the list. Thus, the pack change state interrupt is transmitted only to the addresses in the list, leaving the LPAR to complete the IPL without interruption. After the storage controller receives a notice from the LPAR that the IPL has completed, the address of the LPAR is removed from the data structure. | 02-19-2009 |
20090049456 | LIMITING RECEIPT OF UNSOLICITED EVENTS BY A LOGICAL PARTITION IN A DATA STORAGE SYSTEM - A logical partition (LPAR) is managed in a data processing system by performing an initial program load (IPL), commencing execution of an application on the LPAR and selecting from a plurality of unsolicited events of which the application is to receive notice. A command is transmitted to a storage controller indicating the identity of the selected unsolicited events, wherein the storage controller will store the information in a data structure. Upon the later occurrence of an unsolicited event, the storage controller will transmit to the LPAR only notices of the selected unsolicited events. | 02-19-2009 |
20090049457 | LIMITING RECEIPT OF UNSOLICITED EVENTS BY A LOGICAL PARTITION IN A DATA STORAGE SYSTEM - A logical partition (LPAR) is managed in a data processing system by performing an initial program load (IPL), commencing execution of an application on the LPAR and selecting from a plurality of unsolicited events of which the application is to receive notice. A command is transmitted to a storage controller indicating the identity of the selected unsolicited events, wherein the storage controller will store the information in a data structure. Upon the later occurrence of an unsolicited event, the storage controller will transmit to the LPAR only notices of the selected unsolicited events. | 02-19-2009 |
20090193142 | Method to Allow a Host to Replace Logical Path Resources it Owns - A method for replacing logical path resources, a host is able to replace a logical path it owns with a new logical path. Such a system is especially applicable when the condition of “out of resources” has been reached for a port. With this system, a host is guaranteed that it can replace a logical path it owns with a new logical path. It is not necessary for a control unit to have reached its maximum number of logical paths per port. A host is able to replace one logical path with a new logical path any time. | 07-30-2009 |
20090193145 | METHOD, APPARATUS AND SYSTEM TO DYNAMICALLY MANAGE LOGICAL PATH RESOURCES - A system, apparatus, and method dynamically manages logical path resources by adding, removing, and establishing logic paths based on specified priority schemes associated with the logical path resources. Information associated with the logical path resources is updated in a logical path resource table. | 07-30-2009 |
20090193429 | METHOD TO IDENTIFY UNIQUE HOST APPLICATIONS RUNNING WITHIN A STORAGE CONTROLLER - A method for operating a controller includes receiving a command associated with at least one operation, determining a CPU channel path based on the received command, determining a unique job identifier based on the received command, and determining a state based on the received command. In addition, the method includes updating at least one data matrix based on the determined state, unique job identifier and CPU channel path and operating the controller based on the updated data matrix. | 07-30-2009 |
20090199187 | CONCURRENT EXECUTION OF MULTIPLE PRIMITIVE COMMANDS IN COMMAND LINE INTERFACE - A method to concurrently execute multiple primitive commands in a command line interface (CLI) is provided. Each of a plurality of signal parameters is designated for each of a plurality of primitive commands. The plurality of primitive commands is encapsulated into a header CLI command. The CLI command is executed. | 08-06-2009 |
20090241136 | Method to Precondition a Storage Controller for Automated Data Collection Based on Host Input - An FTDC interface with the host or user. The interface can include a command application programming interface (API) or a data storage Command-Line Interface (DS CLI)/Graphical User Interface (GUI). In certain embodiments, the FTDC interface allows a host or user to customize a desired FTDC on a two-tiered system. The first tier is one in which a host/user selects, from a list of conditions, which ones, upon occurrence of those conditions, they would like the controller to perform FTDC. The second tier a second selection such that for each first tier item, the host/user will select the level of FTDC (collection and offloading of logs and/or the forcing and offloading of a statesave). | 09-24-2009 |
20090327813 | METHOD TO RECOVER FROM A BOOT DEVICE FAILURE DURING REBOOT OR SYSTEM IPL - A method of automatic recovery from a boot device failure and an initial program load (IPL) failure of an operating system (OS) comprises: receiving and complying with a user selected option of an action upon an event of a boot device failure and an IPL failure. The user selected option may consist of taking the action of attempting an auto reboot of the server with the selected boot device and continuing the reboot attempts using the reduced priority boot devices from the bootlist until detection of a boot success, or taking no action allowing for manual user intervention. | 12-31-2009 |
20100023801 | Method to recover from ungrouped logical path failures - A system and method for recovering from a single logical path failure. More specifically, although a host has not grouped its logical paths, the host knows which logical paths it has available. When a host detects a logical path failure, the host enters a path discovery mode of operation. If the host continues to detect a logical path failure while operating in the logical path discovery mode of operation, the host removes the logical path from a logical path mask, and the host does not use the removed logical path again. In the case of ungrouped logical paths, the host aborts its process because it does not have more paths available to continue its process. Additionally, in certain embodiments, a pseudo path group for ungrouped logical paths is created. | 01-28-2010 |
20100080117 | Method to Manage Path Failure Threshold Consensus - A system for providing hosts with a capability to determine which threshold rule of a plurality of threshold rules to use based upon threshold consensus. For example, the system would address a configuration case of several hosts sharing an output port of a fabric via zoning and that port being connected to a single port of a storage controller. If one host is executing lower priority jobs and its threshold is much higher than another host with higher priority jobs and a lower threshold, and the storage controller recognizes that several hosts are sharing the same storage controller port, the consensus will be to ignore the threshold of the first host and to use the threshold of the second host to prevent performance degradation in the system. | 04-01-2010 |
20100083061 | Method to Manage Path Failure Thresholds - A failure threshold host command that provides a host with the capability to tune a storage controller path failure threshold based on the host application performance requirements. The failure threshold host command comprises path failure threshold rules that the storage controller uses to determine when a CHPid has reached a failed state condition. | 04-01-2010 |
20100185895 | FAILURE-SPECIFIC DATA COLLECTION AND RECOVERY FOR ENTERPRISE STORAGE CONTROLLERS - A method, apparatus, and computer program product for handling a failure condition in a storage controller is disclosed. In certain embodiments, a method may include initially detecting a failure condition in a storage controller. The failure condition may be associated with a specific host and a specific storage device connected to the storage controller. The method may further include determining a failure ID associated with the failure condition. Using the failure ID, en entry may be located in a data collection and recovery table. This entry may indicate one or more data collection and/or recovery processes to execute in response to the failure condition. The method may then execute the data collection and/or recovery processes indicated in the entry. While executing the data collection and/or recovery processes, connectivity may be maintained between hosts and storage devices not associated with the failure condition. | 07-22-2010 |
20110173350 | USING A STORAGE CONTROLLER TO DETERMINE THE CAUSE OF DEGRADED I/O PERFORMANCE - A method for identifying the cause of degraded I/O performance between a host system and a storage controller includes initially monitoring I/O performance between the host system and the storage controller. The method further detects degraded I/O performance between the host system and the storage controller using any suitable technique. Once degraded I/O performance is detected, the method determines the cause of the degraded I/O performance by analyzing historical configuration records in the storage controller. These historical configuration records enable the storage controller to correlate the degraded I/O performance with configuration changes in the storage controller and/or the connected host systems. The method then notifies one or more host systems of the cause of the degraded I/O performance. A corresponding apparatus and computer program product are also disclosed herein. | 07-14-2011 |
20110173639 | STORAGE-SYSTEM-BASED DRIVER DISTRIBUTION APPARATUS AND METHOD - A method for distributing drivers from a storage system to one or more host systems includes maintaining, in a storage system, a driver database containing drivers for different host systems. The drivers enable the different host systems to effectively communicate with the storage system. The method further determines whether a specific host system is configured with an appropriate driver. In the event the specific host system is not configured with the appropriate driver, the method retrieves the appropriate driver from the driver database. The method then transmits the appropriate driver from the storage system to the specific host system for installation thereon. By using the storage system as a central repository for the latest device drivers, the method ensures that connected host systems are always configured with the latest drivers. A corresponding apparatus, system, and computer program product are also disclosed herein. | 07-14-2011 |
20110208922 | POOL OF DEVICES PROVIDING OPERATING SYSTEM REDUNDANCY - Systems, methods, and computer program products for providing operating system (O/S) redundancy in a computing system are provided. One system includes a host computing device, a plurality of memory devices, and a sub-loader coupled between the host computing device and the plurality of memory devices. Each memory device stores a respective O/S and the sub-loader is configured such that the plurality of memory devices appear transparent to the host computing device. One method includes designating, a first logical unit device as a primary logical unit device and subsequently determining that the first logical unit device is unresponsive. The designation is removed from the first logical unit device and a second logical unit device is designated as a new primary logical unit device. One computer program product includes instructions for performing the above method. | 08-25-2011 |
20120011036 | ADVANCED FUNCTION USAGE-BASED BILLING - An apparatus, system, and method for advanced function usage-based billing. One embodiment of the apparatus includes a detection module, a monitoring module, and a billing report module. The detection module detects use of one or more advanced functions on a storage controller. Each advanced function includes a license-based storage function separate from a standard function set. The monitoring module monitors the detected use of the one or more advanced functions on the storage controller. The communication module communicates billable use information to a billing entity. The billable use information is based on the monitored detected use | 01-12-2012 |
20120011328 | ADVANCED FUNCTION MONITORING ON A STORAGE CONTROLLER - An apparatus, system, and method for advanced function monitoring. One embodiment of the apparatus includes an identification module, a detection module, and a monitoring module. The identification module identifies one or more advanced functions for a storage controller. The one or more advanced functions include optional storage functions beyond a standard function set. The detection module detects use of a particular advanced function of the one or more identified advanced functions. The monitoring module monitors the detected use of the particular advanced function on the storage controller according to a monitoring routine. | 01-12-2012 |
20120011514 | GENERATING AN ADVANCED FUNCTION USAGE PLANNING REPORT - An apparatus, system, and method for generating an advanced function usage planning report. One embodiment of the apparatus includes a detection module, a monitoring module, and a planning report module. The detection module detects use of an advanced function on a storage controller. The advanced function includes an optional storage function beyond a standard function set. The monitoring module monitors the use of the advanced function on the storage controller. The planning report module generates a planning report based at least in part on use information from the monitored use of the advanced function. | 01-12-2012 |
20120042139 | MAINTAINING ASYNCHRONOUS MIRRORING - An apparatus, system, and method are disclosed for maintaining asynchronous mirroring. A detection module detects insufficient storage space to store a snapshot of a logical volume in at least one of a primary storage system and a secondary storage system. The primary storage system comprises the logical volume. A write from a host to the logical volume is acknowledged, maintaining asynchronous mode mirroring between the primary storage system and the host. The mirror module mirrors the write to the logical volume at the secondary storage system using a backup synchronous mode in response to detecting the insufficient storage space. Under the backup synchronous mode, the primary storage system acknowledges the write to the host while concurrently mirroring the write to the secondary storage system. The secondary storage system acknowledges the mirrored write to the primary storage system. | 02-16-2012 |
20120096304 | Providing Unsolicited Global Disconnect Requests to Users of Storage - A mechanism is provided in a storage control unit in a data processing system for providing unsolicited global disconnect requests to users. The mechanism stores lock control data in the storage control unit. The storage control unit allocates its resources into a plurality of clusters. Responsive to a given user connecting to a given partition that is for a logical subsystem resident on a first cluster within the plurality of clusters, the mechanism sends reflected partition information from the first cluster to a second cluster within the plurality of clusters. Responsive to the first cluster experiencing a failure condition, the mechanism moves control data from one or more logical subsystems from the first cluster to the second cluster and for each logical subsystem that moved from the first logical subsystem to the second logical subsystem and that has reflected partition information, presents unsolicited status to one or more users. | 04-19-2012 |
20120102279 | PRESERVING A DELETED DATA VOLUME - An apparatus, system, and method for preserving a deleted storage volume. One embodiment of the apparatus includes a receiving module, a reference module, and a preservation module. The receiving module receives a deletion command to delete a data volume managed by a storage controller. The data volume is associated with one or more deletion parameters specifying that data of the data volume is to be preserved upon deletion of the data volume. The reference module references the deletion parameters. The preservation module preserves the data of the data volume prior to the storage controller deleting the data volume. The preservation module preserves the data of the data volume according to the deletion parameters. | 04-26-2012 |
20120198188 | REGENERATION OF DELETED DATA - To prevent loss of a data volume by unintended deletion, including various versions of the data volume, the data is preserved, and, when needed, is regenerated at a different volume address than that of the deleted volume. In a computer-implemented data storage system, a method responds to a received command to delete a volume of data identified by a volume address, preserving data of the volume prior to deletion, and generates a unique token associated with the volume and version of the volume as of the deletion. The unique token is communicated as associated with the received delete command. The method responds to a received command to regenerate the data of the deleted volume, generating a command to find the data identified by the unique token, and creating a new, different, volume address for the data of the preserved deleted volume, thereby keeping both volume versions. | 08-02-2012 |
20120210064 | EXTENDER STORAGE POOL SYSTEM - Various embodiments for managing data in a computing storage environment by a processor device are provided. In one such embodiment, by way of example only, an extender storage pool system is configured for at least one of a source and a target storage pool to expand an available storage capacity for the at least one of the source and the target storage pool. A most recent snapshot of the data is sent to the extender storage pool system. The most recent snapshot of the data is stored on the extender storage pool system as a last replicated snapshot of the data. | 08-16-2012 |
20130024586 | VERIFICATION OF HARDWARE CONFIGURATION - A method for verifying an input/output (I/O) hardware configuration is provided. Data from an input/output data set (IOCDS) is extracted for building a verification command. The IOCDS contains hardware requirements that define at least software devices associated with a logical control unit (LCU). The verification command is processed. The verification command includes a software device address range associated with a logical control unit (LCU) of the I/O hardware. The LCU utilizes a first logical path. The software device address range utilizing the first logical path is compared with an existing software device address range utilizing at least one additional logical path. The verification command is accepted if the software device address range and the existing software device address range match. | 01-24-2013 |
20130046950 | PRIORITY BASED DEPOPULATION OF STORAGE RANKS - Exemplary method, system, and computer program product embodiments for priority based depopulation of ranks in a computing storage environment are provided. In one embodiment, by way of example only, multiple ranks selected for depopulation are prioritized. The highest priority rank of the multiple ranks is depopulated to a target rank. Additional system and computer program product embodiments are disclosed and provide related advantages. | 02-21-2013 |
20130086351 | OBTAINING ADDITIONAL DATA STORAGE FROM ANOTHER DATA STORAGE SYSTEM - A main data storage system has a main storage control and data storage, and a user interface, the main storage control in communication with a local storage control of a local data storage system with local data storage. In response to a request to increase data storage from the user interface, the main control determines whether the main data storage is out of space. If so, the main control sends a command to the local control to create data space in local data storage. The local control creates the data space and associates the data space with the main control; and, in response to the local control creating data space in the local data storage and notifying the main control, the main control updates its metadata with respect to the data space, creating the impression that all the data is stored in the main data storage. | 04-04-2013 |
20130138833 | METHOD, APPARATUS AND SYSTEM TO DYNAMICALLY MANAGE LOGICAL PATH RESOURCES - System, apparatus, and methods for dynamically managing logical path resources are provided. The logical path resources are managed by adding, removing, and establishing logic paths based on specified priority schemes associated with the logical path resources. Information associated with the logical path resources is updated in a logical path resource table. | 05-30-2013 |
20130179972 | STORAGE DEVICE WITH INTERNALIZED ANTI-VIRUS PROTECTION - An approach to handling connection errors between an external antivirus server and a storage device is disclosed. The storage device is equipped with an internal antivirus server. Antivirus metadata that describes the antivirus scan is stored in an antivirus metadata repository on the storage device. The connection between the external antivirus server and the storage device is monitored. The external antivirus server executes the antivirus scan on the storage device. If the connection fails, control of the antivirus scan is passed from the external antivirus server to the internal antivirus server. The internal antivirus server determines where to begin based on the antivirus metadata. When the connection is restored, control is passed back to the external antivirus server. | 07-11-2013 |
20140059687 | FILE SCANNING - For file scanning, a division module divides a file into plurality of subfiles. An access module maintains a status of each subfile and scans each subfile with a separate server. | 02-27-2014 |
20140068566 | MICROCODE UPGRADE IN A STORAGE SYSTEM - A method for upgrading microcode in a multi-module storage system may include selecting a first module from two or more modules and operating the first module using an upgraded microcode. The method may include monitoring the performance of the first module by a second module of the two or more modules and rendering an indication of performance of the first module. Further, the method may include determining whether the indication of performance of the first module is greater than or equal to a performance metric. | 03-06-2014 |
20140208028 | EXTENDER STORAGE POOL SYSTEM - Various embodiments for managing data in a computing storage environment by a processor device are provided. In one such embodiment, by way of example only, an extender storage pool system is configured for at least one of a source and a target storage pool to expand an available storage capacity for the at least one of the source and the target storage pool. A most recent snapshot of the data is sent to the extender storage pool system. The most recent snapshot of the data is stored on the extender storage pool system as a last replicated snapshot of the data. | 07-24-2014 |
20140379766 | DISTRIBUTED HIGH PERFORMANCE POOL - For a distributed high performance pool, the distributed high performance pool is provided with a fast rank. A management module promotes an extent from a storage pool to the distributed high performance pool in response to the extent satisfying promotion criteria. The distributed high performance pool and the storage pool are logically and physically distinct. | 12-25-2014 |
20150058589 | OBTAINING ADDITIONAL DATA STORAGE FROM ANOTHER DATA STORAGE SYSTEM - A main data storage system has a main computer-implemented storage control and data storage, and a user interface, the main storage control in communication with a local computer-implemented storage control of a local data storage system with local data storage. In response to a request to increase data storage from the user interface, the main storage control determines whether the main data storage is out of space. If so, the main storage control sends a command to the local storage control to create data space in local data storage. The local storage control creates the data space and associates the data space with the main storage control; and, in response to the local storage control creating data space in the local data storage and notifying the main storage control, the main storage control updates its metadata with respect to the data space. | 02-26-2015 |