Data migration in storage system
A storage system and data technology, applied in the field of storage systems, can solve the problems of not showing the method of changing the access path between the host computer and the storage system, not showing the method of setting the access target of the host computer, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach 1
[0036] (1) Example of system configuration ( figure 1 )
[0037] figure 1 Shown is an example of the system configuration of this embodiment.
[0038] The computer system has a plurality of storage nodes (hereinafter referred to as SN) 1, a plurality of host computers (hereinafter referred to as host) 2, and a network 30, which are used to connect a plurality of network nodes (so-called network nodes are SN1, host 2, management device 4, Name server 5 and other devices connected to the network 30) are connected to the switch 3 on the network 30, the management device 4, the name server 5 that manages the names of the SN1 and the host 2 and manages the logical connection relationship. The management device 4 is a device that manages the storage system 1000 composed of a plurality of SN1. The network 30 is a general term for the switch 3 and the connection lines connecting the host 2, SN1, management device 4, name server 5, etc. to the switch 3, figure 1 It is represented b...
Embodiment approach 2
[0177] Next, a second embodiment will be described. In the first embodiment, an example of moving data stored in LU1a (121a) of SNa (1a) to newly added SNb (1b) was shown. Such as Figure 10 As shown, in this embodiment, an SNc (1c) is further added on the switch 3, and the remaining LU0a (120a) in the SNa (1a) is moved to the new SNc (1c).
[0178] LU0a (120a) of targ-a0 of SNa (1a) has a connection relationship with Init-a0 of Host a (2a). Therefore, in the second embodiment, the relationship between the boot program and the target is different from that in the first embodiment. Although Host a (2a) performs discovery and the like, the data stored in LU0a (120a) of SNa (1a) is Steps for migrating to LU0c (120c) of SNc (1c), migrating destination LU0c (120c) to take over targ-a0 of migrating source LU0a (120a), and changing the access path between Init-a0 and targ-a0 The first embodiment is the same.
[0179] At the end of the transfer, all LU12x accessed by host 2 in SNa...
Embodiment approach 3
[0183] Figure 11 Another example of the system configuration is shown, in which two controllers CTL0 and CTL1 are provided in the storage node 1, and the difference from the first and second embodiments is that the two controllers 10 can access each LU 120x. Two switches are also provided on the network 30 , that is, a switch 0 ( 3 ) and a switch 1 ( 31 ), and each host 2 and each storage node 1 are connected to the two switches. In this embodiment, the wiring between the LU120x and the CTL10, the wiring between the SN1 and the switch, and the wiring between the host computer 2 and the switch can all be duplicated, so that a more reliable storage system can be constructed. The load balancing method for the replacement of the storage node 1 or the movement of the LU is the same as that of the first and second embodiments.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 