US20060155951A1 - Computer system, storage and storage utilization and monitoring method - Google Patents
Computer system, storage and storage utilization and monitoring method Download PDFInfo
- Publication number
- US20060155951A1 US20060155951A1 US11/374,768 US37476806A US2006155951A1 US 20060155951 A1 US20060155951 A1 US 20060155951A1 US 37476806 A US37476806 A US 37476806A US 2006155951 A1 US2006155951 A1 US 2006155951A1
- Authority
- US
- United States
- Prior art keywords
- storage
- volume
- data
- information
- computer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3442—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment for planning or managing the needed capacity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3409—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment for performance assessment
- G06F11/3433—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment for performance assessment for load management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/0604—Improving or facilitating administration, e.g. storage management
- G06F3/0605—Improving or facilitating administration, e.g. storage management by facilitating the interaction with a user or administrator
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0653—Monitoring storage devices or systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3466—Performance evaluation by tracing or monitoring
- G06F11/3485—Performance evaluation by tracing or monitoring for I/O devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2206/00—Indexing scheme related to dedicated interfaces for computers
- G06F2206/10—Indexing scheme related to storage interfaces for computers, indexing schema related to group G06F3/06
- G06F2206/1012—Load balancing
Definitions
- the present invention relates to a computer system, a storage apparatus and a storage apparatus utilization and monitoring method, and more particularly to a computer system connected with at least a storage apparatus, and a storage apparatus (hereafter also referred to as “storage”), as well as a storage utilization monitoring method, in which the storage itself can utilize and monitor the usage status of the storage.
- a storage apparatus hereafter also referred to as “storage”
- storage utilization monitoring method in which the storage itself can utilize and monitor the usage status of the storage.
- SSP storage service providers
- An SSP is a business that has a plurality of storages and divides the storages to provide them to a plurality of users. Users who let an SSP utilize the storage and entrust their data with the SSP can reduce the cost of utilizing and managing their data (see “SSPs That Support Service Enterprises.” Nikkei System Provider 16 Mar. 2001).
- utilizing and monitoring the usage status of the users' storages are useful in taking over the utilization and management of the storages for the users.
- utilizing and monitoring the usage status of storage are functions necessary not only for the SSP but in general, in order for a computer to operate normally within an area of storage allocated to that computer.
- the technology involves automatically monitoring the used capacity of disks that comprise a storage, where a computer that uses the storage automatically ascertains the used capacity on the disks, and when the used capacity exceeds a predetermined reference value a warning is given to an administrator of the computer via electronic mail.
- this technology entails the problems described below.
- the method employed in using the storage is determined by a file system that the computer uses. For this reason, although the storage can obtain information concerning volumes that the storage itself has created, it cannot ascertain how the computer is using the volumes. For example, the storage cannot ascertain how much of the volume capacity the computer is using.
- NAS network attached storage
- the present invention therefore relates to a computer system, a storage, and a storage utilization and management method that make it possible to utilize and manage storage, without having computers utilize and manage storage with regard to storage capacity.
- a storage itself monitors the usage status of an area used by a computer, monitors and retains read/write positions in the storage based on I/O data information from the computer, and thereby obtains the usage status of the area used by the computer.
- the storage has a device that obtains information concerning an area of the storage that each computer uses, a device that obtains information concerning the capacity of the area within its area that each computer uses to actually store data, and a device for the storage to notify the computer or the computer user of the status of the area.
- the storage also may have a device to create new areas within the storage when the used capacity of the area increases; a device to notify, after creating new areas, the user who will use the newly created areas of the fact that new areas have been created; and a device to notify, when the areas available for creating new areas within the storage decrease as a result of an increase in the areas created, the user who administers the storage of the necessity of a new disk device within the storage in order to be able to create new areas.
- the need is eliminated for the computer itself to have a function to utilize and manage the storage and any load on the computer used by the user uses can also be eliminated, according to the present invention.
- the administrator of the storage the only actual device that he or she has to manage is the storage, which allows him or her to manage intensively the usage status of the storage, which in turn reduces management costs.
- FIG. 1 shows a block diagram indicating the configuration of a computer system in accordance with one embodiment of the present invention.
- FIG. 2 shows a drawing illustrating an example of storage information.
- FIG. 3 shows a flowchart illustrating processing operations that take place to monitor the used capacity of volumes within a storage.
- FIG. 4 shows a table indicating the structure of a storage information change history table.
- FIG. 5 shows a flowchart illustrating the processing operations that take place to notify the user of information concerning data locations.
- FIG. 6 shows a block diagram indicating a configuration of a computer system according to another embodiment of the present invention.
- FIG. 7 shows a flowchart illustrating a data obtaining procedure concerning data access through sharing of volumes having different data management methods.
- FIG. 1 is a block diagram showing the configuration of a computer system according to one embodiment of the present invention
- FIG. 2 is a drawing that illustrates an example of storage information.
- 10 a - 10 n are each a computer
- 11 a - 11 n are each a storage
- 110 is a management module
- 111 is storage information
- 112 is a data management information obtaining function
- 113 is a storage management control function
- 114 is a communication function
- 12 a - 12 n are each a volume
- 120 is a group of volumes
- 130 is a communication path such as a cable
- 200 is a volume information table
- 210 is a volume management policy table
- 220 is a storage capacity table
- 230 is a user information table.
- the computer system includes a plurality of computers 10 a - 10 n and a plurality of storages 11 a - 11 n connected by the cable 130 .
- the plurality of storages 11 a - 11 n all may have the same configuration, and FIG. 1 shows the internal configuration only of the storage 11 a. By using the storage 11 a as a representative of the entire storages, its internal configuration will be described.
- the storage 11 a comprises the group of volumes 120 and the management module 110 that manages and controls the storage 11 a and that can communicate with each of the computers 10 via the cable 130 , which connects each computer 10 with the storage 11 a .
- the group of volumes 120 is a set of volumes, each of which is the minimum unit of storage available to be provided to each of the computers 10 a - 10 n in the area manage by the storage 11 a, and it comprises a plurality of volumes 12 a - 12 n that accepts, via the cable 130 , I/O requests from computers among the computers 10 a - 10 n that use the storage 11 a.
- the management module 110 comprises the storage information 111 that retains information concerning area available for use by each of the computers (not necessarily all) among the computers 10 a - 10 n that uses the group of volumes 120 and information concerning area actually used by those computers 10 ; the data management information obtaining function 112 , which is a function to obtain data management formats to use the volumes 12 ; the storage management control function 113 , which is a function to actually control the storage 11 a, such as setting the volumes 12 ; and the communication function 114 , which is a function to allow communication, via the cable 130 , between the storage 11 a and the computers 10 a - 10 n.
- the communication function 114 may be conventional electronic mail functions.
- the data management information obtaining function 112 is a function that, depending on the data management method (for example, FAT, NTFS) such as a file system that each computer 10 uses, is used to obtain data locations and locations on disks of data and files used by each of the computers 10 .
- the cable 130 can be a cable that uses a fibre channel or Ethernet (a registered trademark), and may in some cases be separate networks of fibre channel and Ethernet (a registered trademark). In the latter case, a plurality of communication devices may be located on the computers 10 a - 10 n and the storages 11 a - 11 n, depending on the type of the cable.
- the computers 10 a - 10 n besides computers 10 that actually use the storages 11 a - 11 n, there may be a computer that works in conjunction with the communication function 114 of the storage 11 a to obtain information concerning the storage 11 a, that does not use disks within the storage 11 a, and that register setting requests to the storage 11 a (hereinafter called a “management terminal”). Further, the functions of the management terminal may be incorporated into the computers 10 that use the storages 11 a - 11 n.
- the computer system according to the embodiment of the present invention that is comprised as described above may be a computer system utilized by a specific user or a computer system utilized by an SSP.
- the computers 10 a - 10 n issue requests concerning the storage from clients and clients' servers to the SSP, and are also the management terminals of the clients who obtain information from the storages 11 , as well as the management terminals through which the SSP administrator obtains storage information. Additionally in this case, the storages 11 a - 11 n are storages provided to clients by the SSP with a price attached to the volumes 12 of each storage 11 . Further, one or more volumes 12 a - 12 n becomes a unit of storage provided to the each client by the SSP.
- the storage information 111 that the management module 110 has comprises, as shown in FIG. 2 , the volume information table 200 , the volume management policy table 210 , the storage capacity table 220 and the user information table 230 .
- the storage information 111 is used to utilize and monitor the storage 11 on which the management module 110 is provided.
- the volume information table 200 is a table that manages information concerning the volumes 12 set within a storage (the storage 11 a in this case).
- the volume information table 200 stores, for each volume ID 201 assigned to identify each volume 12 defined within the storage 11 a, a computer name 202 for the computer 10 that uses the volume 12 , a data management method 203 in which the data management method used by the volume 12 is registered, a capacity 204 of the volume 12 available for use by the computer 10 , and a used capacity 205 that the computer 10 actually uses.
- Each of the values stored in the computer name 202 is an identifier for each of the computers 10 a - 10 n.
- the data management method 203 is an identifier for the data management method, such as a file system, that each computer 10 uses.
- the data management information obtaining function 112 refers to this value and obtains the status of data location on each computer 10 .
- each volume 12 is managed by one data management method. It is possible to divide one volume 12 into a plurality of partitions by a plurality of different data management methods, and to utilize the volume 12 in that manner. If this were the case, for each volume 12 , information for each partition should be managed under the same headings as in the volume information table 200 , so that the volume ID 201 heading becomes partition identifiers, and the capacity 204 and the used capacity 205 become information for each partition.
- the volume control policy table 210 stores a volume ID 211 , which is the same as the volume ID 201 described earlier; an addition warning policy 212 that designates, depending on the volume usage status, whether to give a warning when the utilization rate of the volume 12 increases; an addition policy 213 that designates whether to add volumes 12 depending on the volume usage status; and a notification destination 214 that designates the user that the communication function 114 notifies concerning warnings and additions.
- the volume management policy table 210 is set by the user of each volume 12 . Depending on the contents of these headings, the storage 11 a warns the appropriate user or adds the volumes 12 for the appropriate user.
- the storage capacity table 220 stores a storage capacity 221 , which is the capacity of each storage 11 that is actually available for use; a maximum storage capacity 222 that registers the maximum value of the storage capacity available for use as a result of adding disks; a warning policy 223 that designates whether to give a warning when the used capacity 221 of the storage approaches the value of the maximum storage capacity 222 , i.e., when there is a high possibility that the disks in the storage 11 a may become insufficient; and a notification destination 224 that designates the user that the communication function 114 notifies concerning warnings.
- the notification destination 224 is designated by the administrator of the storage 11 a.
- the storage capacity table 220 is used as information to determine when to add the volumes 12 and when to warn the storage administrator of the possibility of insufficient storage capacity.
- the warning policy 223 and the notification destination 224 are set by the storage administrator.
- a user name 231 which is a name of the user to whom the storage usage status is notified
- user information 232 which is information required for the communication function 114 to notify the user of information from the storage 11 a. If the communication function 114 uses electronic mail functions, an electronic mail address is set in the user information 232 , so that the communication function 114 can use the user information 232 to notify the user of storage information.
- FIG. 3 is a flowchart that describes the processing operations that take place to monitor the used capacity of one of the volumes 12 within the storage 11 a. This processing is executed by the management module 110 of the storage 11 a by using the functions and information that the former has.
- the data management information obtaining function 112 gains information concerning the change in the amount of used capacity of one of the volumes 12 in relation to the request to use the storage 11 a from the computer 10 .
- the data management information obtaining function 112 uses the information in the data management method 203 of the volume information table 200 to ascertain the used capacity of the volume 12 , in accordance with the data management method of the volume 12 (step 300 ).
- the management module 110 Based on the used capacity of the volume 12 as ascertained in the processing in step 300 , the management module 110 recognizes that a change has occurred in the used capacity of the volume 12 that it manages and makes changes through the volume information table 200 to the used capacity 205 for the volume 12 having the volume ID that is used by the computer 10 that made the request (step 301 ).
- the management module 110 uses the volume information table 200 and the volume management policy table 210 to check whether the used capacity of the volume 12 matches the status designated by the warning policy 212 .
- the management module 110 calculates the percentage is of the capacity 204 available for use in the volume information table 200 that the used capacity 205 , which is the actual used capacity, is at; and the management module 110 checks whether this value matches the status designated by the warning policy 212 of the volume management policy table 210 (step 302 ).
- the management module 110 uses the communication function 114 to notify the user in the notification destination 214 of the volume management policy table 210 of the warning concerning the usage status of the storage 11 a (step 303 ).
- step 302 If as a result of checking in step 302 the status is found not to be the status designated by the warning policy 212 , or if after the processing in step 303 the used capacity of the volume 12 is checked using information in the volume information table 200 to see whether its status is the status designated by the addition policy 213 of the volume information table 200 and found not to be the status designated by the addition policy 213 , the processing is terminated in this step since no additions are necessary yet (step 304 ).
- step 304 If as a result of checking in step 304 , the status is found to be the status designated by the addition policy 213 , e.g., the utilization rate of the volume 12 whose volume ID is 2 is 95% in the volume information table 200 , which matches the status designated by the addition policy 213 , whether an addition of a new volume 12 is possible is checked next using the storage capacity table 220 (step 305 ).
- the addition policy 213 e.g., the utilization rate of the volume 12 whose volume ID is 2 is 95% in the volume information table 200 , which matches the status designated by the addition policy 213 .
- the management module 110 uses the communication function 114 to notify the user in the notification destination 214 of the volume management policy table 210 of the fact that a new volume 12 cannot be added, and terminates the processing.
- the notification that an addition cannot be made can be sent to the administrator (step 307 ).
- step 305 If as a result of checking in step 305 an addition is possible, e.g., in FIG. 2 , if the storage capacity 221 is 1T and the maximum storage capacity is 2T in the storage capacity table 220 , this indicates that 1T may be added to the existing storage configuration.
- the volume 12 in question is the volume 12 whose volume ID is 2
- the request from the addition policy 213 of the volume management policy table 210 is a request for an addition of 100 GB, which is considered allowable, and the storage management control function 113 therefore adds a volume 12 in accordance with the addition policy 213 .
- the management module 110 uses the communication function 114 to notify the user in the notification destination 214 of the volume management policy table 210 of the fact that the volume 12 has been added.
- the storage capacity table 220 is updated. For example, if 100 GB were added in accordance with the addition policy 213 for the volume 12 whose volume ID is 2, the value in the storage capacity 221 is updated to a value of 1 T plus 100 GB.
- an ID is assigned to the newly added volume 12 in the volume information table 200 and the volume management policy table 210 , so that a new line is added to each of the tables, and an entry is added to each of the volume information table 200 and the volume management policy table 210 when setting the new volume 12 available for use by the computer 10 (step 306 ).
- the management module 110 checks whether the status is the status designated by the warning policy 223 of the storage capacity table 220 , and if the status is not the status designated by the warning policy 223 the processing is terminated in this step. For example, if the value of the storage capacity 221 is 1 T and the value of the maximum storage capacity 222 is 2 T in the storage capacity table 220 , the utilization rate is 50%, which does not satisfy the requirement for the warning policy 223 , and the processing is terminated (step 308 ).
- the management module 110 uses the communication function 114 to notify the user in the notification destination 224 of the storage capacity table 220 of the warning concerning the status of the storage capacity (step 309 ).
- the present embodiment according to the present invention makes it possible for the storage 11 a itself to monitor the usage status of the storage 11 a, to notify the user or the administrator, and to automatically add new volumes 12 , by having the processing described above executed in the storage 11 a itself, and without having to install monitoring software on any of the computers 10 .
- the storage administrator can respond flexibly to disk additions within the storage 11 a depending on the usage status of the storage 11 a.
- the present embodiment according to the present invention allows an exchange of information between the user and the storage 11 a without having to go through the administrator even when the storage 11 a is utilized by an SSP, the time it takes to make changes to the storage setting can be shortened.
- the storage is utilized in a manner that requires authorization in relation to storage settings, i.e., when no one other than the storage administrator is allowed to set or change the storage settings, the notification between the storage 11 a and the user described above can be made via the storage administrator.
- an existing volume 12 with an existing volume ID may be expanded in the storage 11 a.
- the need to provide extra software to the computers 10 of the SSP's clients is eliminated, and the volume usage status of the SSP's clients can be ascertained by the utilization of the storage 11 a.
- the SSP administrator can at any time monitor the SSP clients' volume usage status through the utilization of the storage 11 a, which would allow the administrator to give warnings early and to automatically add new volumes 12 ; as a result, the SSP can provide to its clients services that are equivalent to services that clients would have if software that monitors the usage status of the storage 11 a were installed on the clients' computers. From the SSP clients' perspective, this arrangement does not create any new load on their computers since the clients do not have to install extra software.
- a setting used to notify the storage administrator (or the SSP administrator) of any changes to any of the values in any of the tables in the storage information 111 whenever a change is made, can be included in the storage information 111 .
- the storage administrator can comprehensively ascertain changes to the usage status of the entire storage 11 a.
- the administrator can realize more reduction in the management cost.
- the management module 110 can be provided with a function to separately retain each of the tables in the storage information 111 periodically or a whenever a change is made to any of the tables, which makes it possible to ascertain the volume usage status for each period. Based on this information, the management module 110 can provide the user with the volume usage status, which can be used by the user to make his or her decision regarding his or her use of the volumes 12 .
- FIG. 4 is a table showing the structure of a storage information change history table. This table manages information retained for each of the tables managed by the storage information 111 when the tables are separately retained periodically or whenever a change is made to any of the tables.
- the storage information change history table 400 shown in FIG. 4 comprises time 401 , which is the time at which a table in the storage information 111 was retained; a table type 402 , which is the type of table in the storage information 111 ; and a table name 403 , which is the name of the table that was retained.
- time 401 which is the time at which a table in the storage information 111 was retained
- table type 402 which is the type of table in the storage information 111
- a table name 403 which is the name of the table that was retained.
- a change history of the volumes 12 can be obtained since the tables are separately retained, and the user can be notified of the trend in the volume usage status by providing this information to the user. Users whose utilization rate of the storage 11 a has not increased can be urged to change volume settings. By doing this, the operational rate of the storage 11 a can be increased, so that the storage 11 a can be used efficiently.
- the usage status of each user can be found from the content of the storage information change history table 400 ; users who are hardly using their volumes 12 can be urged to reduce the amount of the volumes 12 they have, and once the amount of their volumes 12 is reduced, new volumes 12 can be added for other users; in this way the storage resources can be used efficiently.
- the SSP can urge its clients to add or reduce their volumes 12 by a flexible pricing of such additions and reductions of the volumes 12 .
- the embodiment of present invention can notify the user of it and urge the user to optimize the data locations. The processing operations that take place in such a situation will be described next.
- FIG. 5 is a flowchart that describes the processing operations to notify the user of information concerning data locations.
- the relations between the data locations and disk locations within the storage 11 are obtained. For example, information concerning how consistent data (for example, one file) is located among various disks of the storage 11 is obtained.
- This processing is executed by the data management information obtaining function 112 that obtains the locations of a series of data in each of the volumes 12 in each of the storages 11 .
- the locations of each data in the group of volumes 120 of the storage 11 a are obtained.
- the disk configuration of each storage 11 is obtained from the storage management control 113 and where on the disks each data is located is retained. By doing this, the relations between the data locations and the disks can be obtained (step 501 ).
- step 501 whether the data is fragmented is determined based on the relations between the data locations and the disks that were obtained in step 501 . For example, when a file is located on disk 1 and disk 2 , this data is determined to be fragmented. If there are no fragmented data, the processing is terminated without any further steps (step 502 ).
- step 502 If in step 502 there is data that is determined to be fragmented, the communication function 114 is used to notify the fact that the data is fragmented to the user, who is designated to be notified of the status of the relevant volume 12 , and the processing is terminated.
- the user to be notified can be obtained from the value of the notification destination 214 of the volume management policy table 210 and from the user information table 230 that retains information concerning the notification destination user (step 503 ).
- a processing is activated to notify the user of the information concerning data locations every time there is an access to the storages 11 , but if the accesses are made frequently this processing will be activated many times, which can increase processing load on the storages 11 themselves.
- a means to activate the processing to periodically notify the user of information concerning data locations can be provided in the present invention, so that the processing begins with step 501 .
- step 503 if the data that is fragmented has fewer changes than other data, a processing to notify or not notify the user of this can be provided in step 503 .
- Changes to data can be determined from the storage information change history table 400 for the storage information 111 , which was described using FIG. 4 .
- each of the storages 11 itself can monitor the data locations and notify the user if it determines that the processing by the storage 11 would become slow due to the data locations, without having the computer monitor the data locations.
- the user can automatically obtain information from the storage 11 that the user can use to optimize the data locations.
- the storage 11 can still be utilized in the manner described and provide the monitoring services described; consequently, the SSP administrator can, without having to provide extra software on the clients' computers, monitor the data locations at all times through the utilization of the storage 11 and give warnings if any data is found to be fragmented. From the SSP clients' perspective, this arrangement does not create any new load on their computers since they do not have to install extra software.
- FIG. 6 is a block diagram indicating the configuration of a computer system in accordance with another embodiment of the present invention
- FIG. 7 is a flowchart illustrating a data obtaining procedure concerning data accesses performed when volumes 12 having different data management methods are shared.
- the embodiment of the present invention shown in FIG. 6 is an example that makes it possible for a plurality of computers 10 having different data management methods to share the volumes 12 and to operate data.
- 600 is a data conversion function, and other numbers are identical to those in FIG. 1 .
- the computer system in FIG. 6 includes the data conversion function 600 provided in a management module 110 within a storage 11 a of a computer system in FIG. 1 , and computer system in FIG. 6 is identical to the computer system in FIG. 1 in other respects.
- the data conversion function 600 may be provided with a function to manage all access rights to the volumes 12 by each computer 10 . Through this, unauthorized accesses to the volumes 12 can be blocked.
- the management module 110 determines which of the volumes 12 the I/O request's access is for (steps 700 and 701 ).
- the management module 110 determines whether the data management method currently designated for the volume 12 to be accessed is different from the actual data management method. This determination can be made using the information in a volume information table 200 . For example, if a computer A and a computer B share the volume 12 , whose volume ID is 2, of the computer B, it is possible to determine from the volume information table 200 that the data management methods of the computer A and the computer B are different (step 702 ).
- step 702 If the determination in step 702 shows that the data management methods are not different, the processing is terminated without any further steps. In this case, since the data management methods are the same, data can be obtained by the data management information obtaining function 112 using the same data management method.
- step 702 If the determination in step 702 shows that the data management methods are different and that data conversion is required, the data conversion is performed using the data conversion function 600 .
- the data conversion function 600 For example, in FIG. 2 , since the information from a data management method 203 shows that the data management method for the computer A is “1,” while the data management method for the computer B is “2,” an access with the data management method “1” from the computer A is converted to an access with the data management method “2.” In this way, data in the volume 12 whose volume ID is 2 and that is managed by the computer B can be obtained from the computer A as well. Consequently, once this processing is completed, the computer A can obtain the computer B's data, which is data in the data management method “ 2 ,” as data whose data management method is “1” (step 703 ).
- data managed under different data management methods can be shared and different computers 10 can obtain the data, without having to use data sharing software on the computers 10 .
- the SSP can provide a data sharing service by having the storage 11 perform the processing described above, without using storages such as NAS with a file server connected on a network, and even if the access method is a block I/O such as in fibre channel and SCSI connection.
- processing in the embodiments according to the present invention can be configured as a processing program, and such a processing program can be stored and provided in recording medium such as HD, DAT, FD, MO, DVD-ROM and CD-ROM.
- the management module 110 within each of the storages 11 can at all times monitor the usage status of the volumes 12 used by the computers 10 and have the storage 11 notify the user depending on the changes in the usage status, which makes it possible to notify the user of the usage status of the storage 11 without having to install monitoring software on the computer or server that the user uses.
- a plurality of computers 10 can obtain data in various volumes 12 , even if the data management methods of the various computers 10 are different, without having to install data conversion software on the computers 10 .
- the utilization and management of storage can be done without having the computer perform the utilization and management of storage with regard to storage capacity, as described above.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Quality & Reliability (AREA)
- Human Computer Interaction (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Debugging And Monitoring (AREA)
Abstract
A computer system includes a plurality of computers and at least one storage connected to the plurality of computers. The storage includes a device that obtains information concerning areas within the storage that are used by the respective plurality of computers, a device that obtains information concerning a capacity within each of the areas that is used by each of the plurality of computers to store data, and a device that notifies at least one of the plurality of computers of a status of the areas within the at least one storage. The computer system utilizes and manage the storage, without having each of the computers utilize and manage the storages with regard to storage capacity.
Description
- 1. Field of the Invention
- The present invention relates to a computer system, a storage apparatus and a storage apparatus utilization and monitoring method, and more particularly to a computer system connected with at least a storage apparatus, and a storage apparatus (hereafter also referred to as “storage”), as well as a storage utilization monitoring method, in which the storage itself can utilize and monitor the usage status of the storage.
- The amount of data in storage in computer systems that corporations utilize and manage has been increasing in recent years, which has caused the utilization and management of storage to become more complex and increased the costs for such utilization and management. One way to solve this problem is to have the utilization of storage in the computer systems of corporations handled by vendors called storage service providers (SSP), who utilize and manage storage for their clients.
- An SSP is a business that has a plurality of storages and divides the storages to provide them to a plurality of users. Users who let an SSP utilize the storage and entrust their data with the SSP can reduce the cost of utilizing and managing their data (see “SSPs That Support Service Enterprises.” Nikkei System Provider 16 Mar. 2001).
- As part of the SSP's services, utilizing and monitoring the usage status of the users' storages are useful in taking over the utilization and management of the storages for the users. In fact, utilizing and monitoring the usage status of storage are functions necessary not only for the SSP but in general, in order for a computer to operate normally within an area of storage allocated to that computer.
- There is a known technology regarding monitoring of storage capacity as part of usage status of storage. The technology involves automatically monitoring the used capacity of disks that comprise a storage, where a computer that uses the storage automatically ascertains the used capacity on the disks, and when the used capacity exceeds a predetermined reference value a warning is given to an administrator of the computer via electronic mail. However, this technology entails the problems described below.
- In general, when a computer uses a storage, the method employed in using the storage is determined by a file system that the computer uses. For this reason, although the storage can obtain information concerning volumes that the storage itself has created, it cannot ascertain how the computer is using the volumes. For example, the storage cannot ascertain how much of the volume capacity the computer is using.
- Although storages that actually have their own file systems, such as NAS (network attached storage), can ascertain information described above, due to the fact that the NAS must have network connections such as TCP/IP and requires file I/O in the network file system, it cannot work with SCSI, fibre channel connections, or block I/O access.
- In order to ascertain the capacity of storage used by the computer or a user in a storage that is compatible with SCSI, fibre channel storage connections, or block I/O access, a function that allows the computer to monitor the capacity of the storage must be adopted. However, this requires adopting a separate storage monitoring function into the computer in addition to the normal utilization of the computer, and this creates a load on the operations of the computer and increases load on the user with regard to utilization and management.
- In the meantime, due to the structure of the SSP, users who are clients of SSPs tend not to want utilization and monitoring services that SSPs offer for the reasons described above. On the SSP administrators' side, managing the computers themselves is not part of their business purposes and they tend to want to avoid an increase in the number of actual devices they utilize and manage. As a result, both the users who are the clients of the SSPs and the SSP administrators tend not to want to have storages utilized and managed through the use of utilization and management functions in the computers themselves.
- The present invention therefore relates to a computer system, a storage, and a storage utilization and management method that make it possible to utilize and manage storage, without having computers utilize and manage storage with regard to storage capacity.
- In accordance with one embodiment of the present invention, a storage itself monitors the usage status of an area used by a computer, monitors and retains read/write positions in the storage based on I/O data information from the computer, and thereby obtains the usage status of the area used by the computer.
- In accordance with an embodiment of the present invention, in a computer system having one or more computers and one or more storages connected to those computers, the storage has a device that obtains information concerning an area of the storage that each computer uses, a device that obtains information concerning the capacity of the area within its area that each computer uses to actually store data, and a device for the storage to notify the computer or the computer user of the status of the area.
- In addition, the storage also may have a device to create new areas within the storage when the used capacity of the area increases; a device to notify, after creating new areas, the user who will use the newly created areas of the fact that new areas have been created; and a device to notify, when the areas available for creating new areas within the storage decrease as a result of an increase in the areas created, the user who administers the storage of the necessity of a new disk device within the storage in order to be able to create new areas.
- By providing the storage with the devices described above, the need is eliminated for the computer itself to have a function to utilize and manage the storage and any load on the computer used by the user uses can also be eliminated, according to the present invention. For the administrator of the storage, the only actual device that he or she has to manage is the storage, which allows him or her to manage intensively the usage status of the storage, which in turn reduces management costs.
- Other features and advantages of the invention will be apparent from the following detailed description, taken in conjunction with the accompanying drawings that illustrate, by way of example, various features of embodiments of the invention.
-
FIG. 1 shows a block diagram indicating the configuration of a computer system in accordance with one embodiment of the present invention. -
FIG. 2 shows a drawing illustrating an example of storage information. -
FIG. 3 shows a flowchart illustrating processing operations that take place to monitor the used capacity of volumes within a storage. -
FIG. 4 shows a table indicating the structure of a storage information change history table. -
FIG. 5 shows a flowchart illustrating the processing operations that take place to notify the user of information concerning data locations. -
FIG. 6 shows a block diagram indicating a configuration of a computer system according to another embodiment of the present invention. -
FIG. 7 shows a flowchart illustrating a data obtaining procedure concerning data access through sharing of volumes having different data management methods. - A computer system, a storage and a storage utilization and management method in accordance with embodiments of the present invention are described below in detail with reference to the accompanying drawings.
-
FIG. 1 is a block diagram showing the configuration of a computer system according to one embodiment of the present invention, andFIG. 2 is a drawing that illustrates an example of storage information. InFIGS. 1 and 2 , 10 a-10 n are each a computer, 11 a-11 n are each a storage, 110 is a management module, 111 is storage information, 112 is a data management information obtaining function, 113 is a storage management control function, 114 is a communication function, 12 a-12 n are each a volume, 120 is a group of volumes, 130 is a communication path such as a cable, 200 is a volume information table, 210 is a volume management policy table, 220 is a storage capacity table, and 230 is a user information table. - The computer system according to the embodiment of the present invention includes a plurality of
computers 10 a-10 n and a plurality of storages 11 a-11 n connected by the cable 130. The plurality of storages 11 a-11 n all may have the same configuration, andFIG. 1 shows the internal configuration only of the storage 11 a. By using the storage 11 a as a representative of the entire storages, its internal configuration will be described. - The storage 11 a comprises the group of
volumes 120 and themanagement module 110 that manages and controls the storage 11 a and that can communicate with each of thecomputers 10 via the cable 130, which connects eachcomputer 10 with the storage 11 a. The group ofvolumes 120 is a set of volumes, each of which is the minimum unit of storage available to be provided to each of thecomputers 10 a-10 n in the area manage by the storage 11 a, and it comprises a plurality of volumes 12 a-12 n that accepts, via the cable 130, I/O requests from computers among thecomputers 10 a-10 n that use the storage 11 a. - The
management module 110 comprises thestorage information 111 that retains information concerning area available for use by each of the computers (not necessarily all) among thecomputers 10 a-10 n that uses the group ofvolumes 120 and information concerning area actually used by thosecomputers 10; the data managementinformation obtaining function 112, which is a function to obtain data management formats to use the volumes 12; the storage management control function 113, which is a function to actually control the storage 11 a, such as setting the volumes 12; and thecommunication function 114, which is a function to allow communication, via the cable 130, between the storage 11 a and thecomputers 10 a-10 n. - The
communication function 114 may be conventional electronic mail functions. The data managementinformation obtaining function 112 is a function that, depending on the data management method (for example, FAT, NTFS) such as a file system that eachcomputer 10 uses, is used to obtain data locations and locations on disks of data and files used by each of thecomputers 10. The cable 130 can be a cable that uses a fibre channel or Ethernet (a registered trademark), and may in some cases be separate networks of fibre channel and Ethernet (a registered trademark). In the latter case, a plurality of communication devices may be located on thecomputers 10 a-10 n and the storages 11 a-11 n, depending on the type of the cable. - Among the
computers 10 a-10 n, besidescomputers 10 that actually use the storages 11 a-11 n, there may be a computer that works in conjunction with thecommunication function 114 of the storage 11 a to obtain information concerning the storage 11 a, that does not use disks within the storage 11 a, and that register setting requests to the storage 11 a (hereinafter called a “management terminal”). Further, the functions of the management terminal may be incorporated into thecomputers 10 that use the storages 11 a-11 n. - The computer system according to the embodiment of the present invention that is comprised as described above may be a computer system utilized by a specific user or a computer system utilized by an SSP.
- If the computer system shown in
FIG. 1 is a computer system utilized by an SSP, thecomputers 10 a-10 n issue requests concerning the storage from clients and clients' servers to the SSP, and are also the management terminals of the clients who obtain information from the storages 11, as well as the management terminals through which the SSP administrator obtains storage information. Additionally in this case, the storages 11 a-11 n are storages provided to clients by the SSP with a price attached to the volumes 12 of each storage 11. Further, one or more volumes 12 a-12 n becomes a unit of storage provided to the each client by the SSP. - The
storage information 111 that themanagement module 110 has comprises, as shown inFIG. 2 , the volume information table 200, the volume management policy table 210, the storage capacity table 220 and the user information table 230. Thestorage information 111 is used to utilize and monitor the storage 11 on which themanagement module 110 is provided. - The volume information table 200 is a table that manages information concerning the volumes 12 set within a storage (the storage 11 a in this case). The volume information table 200 stores, for each
volume ID 201 assigned to identify each volume 12 defined within the storage 11 a, acomputer name 202 for thecomputer 10 that uses the volume 12, adata management method 203 in which the data management method used by the volume 12 is registered, acapacity 204 of the volume 12 available for use by thecomputer 10, and aused capacity 205 that thecomputer 10 actually uses. Each of the values stored in thecomputer name 202 is an identifier for each of thecomputers 10 a-10 n. Thedata management method 203 is an identifier for the data management method, such as a file system, that eachcomputer 10 uses. The data managementinformation obtaining function 112 refers to this value and obtains the status of data location on eachcomputer 10. Here, for the sake of simplification, we will assume that each volume 12 is managed by one data management method. It is possible to divide one volume 12 into a plurality of partitions by a plurality of different data management methods, and to utilize the volume 12 in that manner. If this were the case, for each volume 12, information for each partition should be managed under the same headings as in the volume information table 200, so that thevolume ID 201 heading becomes partition identifiers, and thecapacity 204 and theused capacity 205 become information for each partition. - The volume control policy table 210 stores a
volume ID 211, which is the same as thevolume ID 201 described earlier; anaddition warning policy 212 that designates, depending on the volume usage status, whether to give a warning when the utilization rate of the volume 12 increases; anaddition policy 213 that designates whether to add volumes 12 depending on the volume usage status; and anotification destination 214 that designates the user that thecommunication function 114 notifies concerning warnings and additions. The volume management policy table 210 is set by the user of each volume 12. Depending on the contents of these headings, the storage 11 a warns the appropriate user or adds the volumes 12 for the appropriate user. - The storage capacity table 220 stores a
storage capacity 221, which is the capacity of each storage 11 that is actually available for use; amaximum storage capacity 222 that registers the maximum value of the storage capacity available for use as a result of adding disks; awarning policy 223 that designates whether to give a warning when theused capacity 221 of the storage approaches the value of themaximum storage capacity 222, i.e., when there is a high possibility that the disks in the storage 11 a may become insufficient; and a notification destination 224 that designates the user that thecommunication function 114 notifies concerning warnings. The notification destination 224 is designated by the administrator of the storage 11 a. When a storage administrator is designated as a notification destination, the storage administrator can be urged through warnings to add new disks to the storage 11 a or to perform other designated tasks. The storage capacity table 220 is used as information to determine when to add the volumes 12 and when to warn the storage administrator of the possibility of insufficient storage capacity. Thewarning policy 223 and the notification destination 224 are set by the storage administrator. - In the user information table 230 are stored a user name 231, which is a name of the user to whom the storage usage status is notified; and
user information 232, which is information required for thecommunication function 114 to notify the user of information from the storage 11 a. If thecommunication function 114 uses electronic mail functions, an electronic mail address is set in theuser information 232, so that thecommunication function 114 can use theuser information 232 to notify the user of storage information. -
FIG. 3 is a flowchart that describes the processing operations that take place to monitor the used capacity of one of the volumes 12 within the storage 11 a. This processing is executed by themanagement module 110 of the storage 11 a by using the functions and information that the former has. - (1) When the
management module 110 receives a request directed to the storage 11 a from one of thecomputers 10, the data managementinformation obtaining function 112 gains information concerning the change in the amount of used capacity of one of the volumes 12 in relation to the request to use the storage 11 a from thecomputer 10. In addition, the data managementinformation obtaining function 112 uses the information in thedata management method 203 of the volume information table 200 to ascertain the used capacity of the volume 12, in accordance with the data management method of the volume 12 (step 300). - (2) Based on the used capacity of the volume 12 as ascertained in the processing in
step 300, themanagement module 110 recognizes that a change has occurred in the used capacity of the volume 12 that it manages and makes changes through the volume information table 200 to theused capacity 205 for the volume 12 having the volume ID that is used by thecomputer 10 that made the request (step 301). - (3) Next, the
management module 110 uses the volume information table 200 and the volume management policy table 210 to check whether the used capacity of the volume 12 matches the status designated by thewarning policy 212. In other words, themanagement module 110 calculates the percentage is of thecapacity 204 available for use in the volume information table 200 that theused capacity 205, which is the actual used capacity, is at; and themanagement module 110 checks whether this value matches the status designated by thewarning policy 212 of the volume management policy table 210 (step 302). - (4) If as a result of checking in
step 302, the status is found to be the status designated by thewarning policy 212, e.g., inFIG. 2 , if the utilization rate of the volume 12 whose volume ID is 2 in the volume information table 200 is found to be 95% upon calculation, which matches the status designated by thewarning policy 212 of the volume management policy table 210, themanagement module 110 uses thecommunication function 114 to notify the user in thenotification destination 214 of the volume management policy table 210 of the warning concerning the usage status of the storage 11 a (step 303). - (5) If as a result of checking in
step 302 the status is found not to be the status designated by thewarning policy 212, or if after the processing instep 303 the used capacity of the volume 12 is checked using information in the volume information table 200 to see whether its status is the status designated by theaddition policy 213 of the volume information table 200 and found not to be the status designated by theaddition policy 213, the processing is terminated in this step since no additions are necessary yet (step 304). - (6) If as a result of checking in
step 304, the status is found to be the status designated by theaddition policy 213, e.g., the utilization rate of the volume 12 whose volume ID is 2 is 95% in the volume information table 200, which matches the status designated by theaddition policy 213, whether an addition of a new volume 12 is possible is checked next using the storage capacity table 220 (step 305). - (7) If as a result of checking in
step 305, an addition cannot be made, themanagement module 110 uses thecommunication function 114 to notify the user in thenotification destination 214 of the volume management policy table 210 of the fact that a new volume 12 cannot be added, and terminates the processing. When there is a storage administrator in addition to the user, such as with SSPs, the notification that an addition cannot be made can be sent to the administrator (step 307). - (8) If as a result of checking in
step 305 an addition is possible, e.g., inFIG. 2 , if thestorage capacity 221 is 1T and the maximum storage capacity is 2T in the storage capacity table 220, this indicates that 1T may be added to the existing storage configuration. In the meantime, if the volume 12 in question is the volume 12 whose volume ID is 2, the request from theaddition policy 213 of the volume management policy table 210 is a request for an addition of 100 GB, which is considered allowable, and the storage management control function 113 therefore adds a volume 12 in accordance with theaddition policy 213. Themanagement module 110 uses thecommunication function 114 to notify the user in thenotification destination 214 of the volume management policy table 210 of the fact that the volume 12 has been added. Furthermore, with the addition of the volume 12, the storage capacity table 220 is updated. For example, if 100 GB were added in accordance with theaddition policy 213 for the volume 12 whose volume ID is 2, the value in thestorage capacity 221 is updated to a value of 1 T plus 100 GB. At the same time, an ID is assigned to the newly added volume 12 in the volume information table 200 and the volume management policy table 210, so that a new line is added to each of the tables, and an entry is added to each of the volume information table 200 and the volume management policy table 210 when setting the new volume 12 available for use by the computer 10 (step 306). - (9) After completing the processing in
step 306, themanagement module 110 checks whether the status is the status designated by thewarning policy 223 of the storage capacity table 220, and if the status is not the status designated by thewarning policy 223 the processing is terminated in this step. For example, if the value of thestorage capacity 221 is 1 T and the value of themaximum storage capacity 222 is 2 T in the storage capacity table 220, the utilization rate is 50%, which does not satisfy the requirement for thewarning policy 223, and the processing is terminated (step 308). - (10) If as a result of checking in
step 308, the status is found to be the status designated by thewarning policy 223, e.g., if the value of themaximum storage capacity 222 is 2 T and the value of thestorage capacity 221 is 1.9 T in the storage capacity table 220, the utilization rate is 95%, which matches the status designated by thewarning policy 223; consequently, themanagement module 110 uses thecommunication function 114 to notify the user in the notification destination 224 of the storage capacity table 220 of the warning concerning the status of the storage capacity (step 309). - The present embodiment according to the present invention makes it possible for the storage 11 a itself to monitor the usage status of the storage 11 a, to notify the user or the administrator, and to automatically add new volumes 12, by having the processing described above executed in the storage 11 a itself, and without having to install monitoring software on any of the
computers 10. In addition, since the used area of the storage 11 a itself can be monitored at all times, the storage administrator can respond flexibly to disk additions within the storage 11 a depending on the usage status of the storage 11 a. - Furthermore, since the present embodiment according to the present invention allows an exchange of information between the user and the storage 11 a without having to go through the administrator even when the storage 11 a is utilized by an SSP, the time it takes to make changes to the storage setting can be shortened. When the storage is utilized in a manner that requires authorization in relation to storage settings, i.e., when no one other than the storage administrator is allowed to set or change the storage settings, the notification between the storage 11 a and the user described above can be made via the storage administrator.
- When adding a new volume 12 in the processing in
step 306, if thecomputer 10 that is to use the new volume 12 has a volume expansion function, an existing volume 12 with an existing volume ID may be expanded in the storage 11 a. - By utilizing an SSP in the manner described above, the need to provide extra software to the
computers 10 of the SSP's clients is eliminated, and the volume usage status of the SSP's clients can be ascertained by the utilization of the storage 11 a. The SSP administrator can at any time monitor the SSP clients' volume usage status through the utilization of the storage 11 a, which would allow the administrator to give warnings early and to automatically add new volumes 12; as a result, the SSP can provide to its clients services that are equivalent to services that clients would have if software that monitors the usage status of the storage 11 a were installed on the clients' computers. From the SSP clients' perspective, this arrangement does not create any new load on their computers since the clients do not have to install extra software. - In accordance with the embodiment of the present invention, a setting, used to notify the storage administrator (or the SSP administrator) of any changes to any of the values in any of the tables in the
storage information 111 whenever a change is made, can be included in thestorage information 111. By doing this, the storage administrator can comprehensively ascertain changes to the usage status of the entire storage 11 a. Further, by installing on the storage 11 a software that comprehensively displays the information provided from the storage 11 a to the administrator, the administrator can realize more reduction in the management cost. - In accordance with the embodiment of the present invention, the
management module 110 can be provided with a function to separately retain each of the tables in thestorage information 111 periodically or a whenever a change is made to any of the tables, which makes it possible to ascertain the volume usage status for each period. Based on this information, themanagement module 110 can provide the user with the volume usage status, which can be used by the user to make his or her decision regarding his or her use of the volumes 12. -
FIG. 4 is a table showing the structure of a storage information change history table. This table manages information retained for each of the tables managed by thestorage information 111 when the tables are separately retained periodically or whenever a change is made to any of the tables. - The storage information change history table 400 shown in
FIG. 4 comprises time 401, which is the time at which a table in thestorage information 111 was retained; atable type 402, which is the type of table in thestorage information 111; and a table name 403, which is the name of the table that was retained. By referring to the table 400, it is possible to determine thatstorage information 111 was retained at the time indicated in the time 401. For example, if each of the tables in thestorage information 111 is retained periodically (for example, every hour), it becomes possible to notify the user of the volume usage status on an hourly basis and the user can check the volume usage status in a chronological order. - Or, for example, when there is a change made to the content of the
storage information 111, a change history of the volumes 12 can be obtained since the tables are separately retained, and the user can be notified of the trend in the volume usage status by providing this information to the user. Users whose utilization rate of the storage 11 a has not increased can be urged to change volume settings. By doing this, the operational rate of the storage 11 a can be increased, so that the storage 11 a can be used efficiently. - In other words, if a plurality of users is each using a separate volume 12, the usage status of each user can be found from the content of the storage information change history table 400; users who are hardly using their volumes 12 can be urged to reduce the amount of the volumes 12 they have, and once the amount of their volumes 12 is reduced, new volumes 12 can be added for other users; in this way the storage resources can be used efficiently. If the storage is utilized by an SSP, the SSP can urge its clients to add or reduce their volumes 12 by a flexible pricing of such additions and reductions of the volumes 12.
- If data locations within the volumes 12 are obtained and the data locations are found to be fragmented, the embodiment of present invention can notify the user of it and urge the user to optimize the data locations. The processing operations that take place in such a situation will be described next.
-
FIG. 5 is a flowchart that describes the processing operations to notify the user of information concerning data locations. - (1) First, the data monitoring processing that monitors the used capacity of the volumes 12, which was described using
FIG. 3 , is executed. By performing this monitoring processing, an opportunity to notify the user of information concerning data locations can be provided every time there is an access to the storage 11 (step 500). - (2) Next, the relations between the data locations and disk locations within the storage 11 are obtained. For example, information concerning how consistent data (for example, one file) is located among various disks of the storage 11 is obtained. This processing is executed by the data management
information obtaining function 112 that obtains the locations of a series of data in each of the volumes 12 in each of the storages 11. For example, the locations of each data in the group ofvolumes 120 of the storage 11 a are obtained. Further, the disk configuration of each storage 11 is obtained from the storage management control 113 and where on the disks each data is located is retained. By doing this, the relations between the data locations and the disks can be obtained (step 501). - (3) Next, whether the data is fragmented is determined based on the relations between the data locations and the disks that were obtained in
step 501. For example, when a file is located ondisk 1 anddisk 2, this data is determined to be fragmented. If there are no fragmented data, the processing is terminated without any further steps (step 502). - (4) If in
step 502 there is data that is determined to be fragmented, thecommunication function 114 is used to notify the fact that the data is fragmented to the user, who is designated to be notified of the status of the relevant volume 12, and the processing is terminated. The user to be notified can be obtained from the value of thenotification destination 214 of the volume management policy table 210 and from the user information table 230 that retains information concerning the notification destination user (step 503). - By providing
step 500, a processing is activated to notify the user of the information concerning data locations every time there is an access to the storages 11, but if the accesses are made frequently this processing will be activated many times, which can increase processing load on the storages 11 themselves. In consideration of such a situation, a means to activate the processing to periodically notify the user of information concerning data locations can be provided in the present invention, so that the processing begins withstep 501. - Additionally, in the processing that takes place in
step 503, if the data that is fragmented has fewer changes than other data, a processing to notify or not notify the user of this can be provided instep 503. Changes to data can be determined from the storage information change history table 400 for thestorage information 111, which was described usingFIG. 4 . - In the present embodiment according to the present invention, by performing the processing as described above, each of the storages 11 itself can monitor the data locations and notify the user if it determines that the processing by the storage 11 would become slow due to the data locations, without having the computer monitor the data locations. Upon receiving the notice, the user can automatically obtain information from the storage 11 that the user can use to optimize the data locations.
- If the storage 11 is utilized by an SSP, the storage 11 can still be utilized in the manner described and provide the monitoring services described; consequently, the SSP administrator can, without having to provide extra software on the clients' computers, monitor the data locations at all times through the utilization of the storage 11 and give warnings if any data is found to be fragmented. From the SSP clients' perspective, this arrangement does not create any new load on their computers since they do not have to install extra software.
-
FIG. 6 is a block diagram indicating the configuration of a computer system in accordance with another embodiment of the present invention, andFIG. 7 is a flowchart illustrating a data obtaining procedure concerning data accesses performed when volumes 12 having different data management methods are shared. The embodiment of the present invention shown inFIG. 6 is an example that makes it possible for a plurality ofcomputers 10 having different data management methods to share the volumes 12 and to operate data. InFIG. 6, 600 is a data conversion function, and other numbers are identical to those inFIG. 1 . - The computer system in
FIG. 6 includes the data conversion function 600 provided in amanagement module 110 within a storage 11 a of a computer system inFIG. 1 , and computer system inFIG. 6 is identical to the computer system inFIG. 1 in other respects. By providing the data conversion function 600, it becomes possible for the plurality ofcomputers 10 to obtain data in the volumes 12 having different data management methods. The data conversion function 600 may be provided with a function to manage all access rights to the volumes 12 by eachcomputer 10. Through this, unauthorized accesses to the volumes 12 can be blocked. - Next, referring to the flowchart in
FIG. 7 , descriptions are made as to the data obtaining procedure concerning data accesses performed when the volumes 12 having different data management methods are shared. This processing is executed by themanagement module 110 provided in each of the storages 11. - (1) When one of the storages 11 receives an I/O request from one of the
computers 10, themanagement module 110 determines which of the volumes 12 the I/O request's access is for (steps 700 and 701). - (2) Next, the
management module 110 determines whether the data management method currently designated for the volume 12 to be accessed is different from the actual data management method. This determination can be made using the information in a volume information table 200. For example, if a computer A and a computer B share the volume 12, whose volume ID is 2, of the computer B, it is possible to determine from the volume information table 200 that the data management methods of the computer A and the computer B are different (step 702). - (3) If the determination in
step 702 shows that the data management methods are not different, the processing is terminated without any further steps. In this case, since the data management methods are the same, data can be obtained by the data managementinformation obtaining function 112 using the same data management method. - (4) If the determination in
step 702 shows that the data management methods are different and that data conversion is required, the data conversion is performed using the data conversion function 600. For example, inFIG. 2 , since the information from adata management method 203 shows that the data management method for the computer A is “1,” while the data management method for the computer B is “2,” an access with the data management method “1” from the computer A is converted to an access with the data management method “2.” In this way, data in the volume 12 whose volume ID is 2 and that is managed by the computer B can be obtained from the computer A as well. Consequently, once this processing is completed, the computer A can obtain the computer B's data, which is data in the data management method “2,” as data whose data management method is “1” (step 703). - Through the processing described in
FIG. 7 , data managed under different data management methods can be shared anddifferent computers 10 can obtain the data, without having to use data sharing software on thecomputers 10. - When the storage 11 is managed by an SSP, the SSP can provide a data sharing service by having the storage 11 perform the processing described above, without using storages such as NAS with a file server connected on a network, and even if the access method is a block I/O such as in fibre channel and SCSI connection.
- Various processing in the embodiments according to the present invention can be configured as a processing program, and such a processing program can be stored and provided in recording medium such as HD, DAT, FD, MO, DVD-ROM and CD-ROM.
- According to the embodiment of the present invention, the
management module 110 within each of the storages 11 can at all times monitor the usage status of the volumes 12 used by thecomputers 10 and have the storage 11 notify the user depending on the changes in the usage status, which makes it possible to notify the user of the usage status of the storage 11 without having to install monitoring software on the computer or server that the user uses. - Further in accordance with the embodiment of the present invention, due to the fact that the data conversion function for the volumes 12 is provided in the
management module 110 of each of the storages 11, a plurality ofcomputers 10 can obtain data in various volumes 12, even if the data management methods of thevarious computers 10 are different, without having to install data conversion software on thecomputers 10. - According to the present invention, the utilization and management of storage can be done without having the computer perform the utilization and management of storage with regard to storage capacity, as described above.
- While the description above refers to particular embodiments of the present invention, it will be understood that many modifications may be made without departing from the spirit thereof. The accompanying claims are intended to cover such modifications as would fall within the true scope and spirit of the present invention.
- The presently disclosed embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims, rather than the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein.
Claims (2)
1-21. (canceled)
22. A storage to be coupled to at least one of computers via a network, comprising:
a storage controller to communicate with the computers via a network; and,
a first volume and a second volume which are connected to the storage controller and which are provided, to store data, with the host computer;
wherein the first volume is allocated to the first computer and is managed by a first user and the second volume is allocated to the second computer and is managed by a second user;
when an used capacity of the first volume is exceed in a first predetermined capacity, the storage controller checks an used capacity of the second volume and sends, to the second user via a network, a notification for reducing unused capacity of the second volume to the second user on the basis of results of check.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/374,768 US20060155951A1 (en) | 2002-04-08 | 2006-03-14 | Computer system, storage and storage utilization and monitoring method |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2002-105346 | 2002-04-08 | ||
JP2002105346A JP2003303054A (en) | 2002-04-08 | 2002-04-08 | Computer system, storage device, and storage device operation monitoring method |
US10/302,153 US7103733B2 (en) | 2002-04-08 | 2002-11-21 | Computer system obtaining information on capacity and usage of an area used by a computer and notifying the computer the status thereof |
US11/374,768 US20060155951A1 (en) | 2002-04-08 | 2006-03-14 | Computer system, storage and storage utilization and monitoring method |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/302,153 Continuation US7103733B2 (en) | 2002-04-08 | 2002-11-21 | Computer system obtaining information on capacity and usage of an area used by a computer and notifying the computer the status thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
US20060155951A1 true US20060155951A1 (en) | 2006-07-13 |
Family
ID=28672357
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/302,153 Expired - Lifetime US7103733B2 (en) | 2002-04-08 | 2002-11-21 | Computer system obtaining information on capacity and usage of an area used by a computer and notifying the computer the status thereof |
US11/374,768 Abandoned US20060155951A1 (en) | 2002-04-08 | 2006-03-14 | Computer system, storage and storage utilization and monitoring method |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/302,153 Expired - Lifetime US7103733B2 (en) | 2002-04-08 | 2002-11-21 | Computer system obtaining information on capacity and usage of an area used by a computer and notifying the computer the status thereof |
Country Status (2)
Country | Link |
---|---|
US (2) | US7103733B2 (en) |
JP (1) | JP2003303054A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080082769A1 (en) * | 2006-10-03 | 2008-04-03 | Bull S.A.S. | Mass storage system and method |
US20100082935A1 (en) * | 2008-09-30 | 2010-04-01 | Hitachi, Ltd. | Computer system and capacity management method of computer system |
Families Citing this family (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6968463B2 (en) * | 2001-01-17 | 2005-11-22 | Hewlett-Packard Development Company, L.P. | System for controlling access to resources in a storage area network |
US6915397B2 (en) * | 2001-06-01 | 2005-07-05 | Hewlett-Packard Development Company, L.P. | System and method for generating point in time storage copy |
US6931487B2 (en) | 2001-10-22 | 2005-08-16 | Hewlett-Packard Development Company L.P. | High performance multi-controller processing |
US6947981B2 (en) * | 2002-03-26 | 2005-09-20 | Hewlett-Packard Development Company, L.P. | Flexible data replication mechanism |
US7032131B2 (en) * | 2002-03-26 | 2006-04-18 | Hewlett-Packard Development Company, L.P. | System and method for ensuring merge completion in a storage area network |
US7007042B2 (en) * | 2002-03-28 | 2006-02-28 | Hewlett-Packard Development Company, L.P. | System and method for automatic site failover in a storage area network |
JP4330889B2 (en) | 2003-01-20 | 2009-09-16 | 株式会社日立製作所 | Method for installing software in storage device control apparatus, control method for storage device control apparatus, and storage device control apparatus |
US7895247B2 (en) * | 2003-10-29 | 2011-02-22 | Oracle International Corporation | Tracking space usage in a database |
US7412583B2 (en) * | 2003-11-14 | 2008-08-12 | International Business Machines Corporation | Virtual incremental storage method |
JP2005165441A (en) * | 2003-11-28 | 2005-06-23 | Hitachi Ltd | Storage control device and storage control device control method |
JP2005267501A (en) | 2004-03-22 | 2005-09-29 | Hitachi Ltd | Storage management method and system |
JP4455153B2 (en) * | 2004-05-14 | 2010-04-21 | 株式会社日立製作所 | Storage device management method and system |
US7694097B2 (en) * | 2004-11-15 | 2010-04-06 | International Business Machines Corporation | System and method for managing an electronic storage volume |
US8127088B2 (en) * | 2005-01-27 | 2012-02-28 | Hewlett-Packard Development Company, L.P. | Intelligent cache management |
US7301718B2 (en) * | 2005-01-31 | 2007-11-27 | Hewlett-Packard Development Company, L.P. | Recording errors in tape drives |
US20060230243A1 (en) * | 2005-04-06 | 2006-10-12 | Robert Cochran | Cascaded snapshots |
US7779218B2 (en) * | 2005-07-22 | 2010-08-17 | Hewlett-Packard Development Company, L.P. | Data synchronization management |
US7206156B2 (en) * | 2005-07-27 | 2007-04-17 | Hewlett-Packard Development Company, L.P. | Tape drive error management |
US7434011B2 (en) * | 2005-08-16 | 2008-10-07 | International Business Machines Corporation | Apparatus, system, and method for modifying data storage configuration |
JP2007065780A (en) * | 2005-08-29 | 2007-03-15 | Hitachi Ltd | Storage system and storage device |
JP4700459B2 (en) * | 2005-09-27 | 2011-06-15 | 株式会社日立製作所 | Data processing system, data management method, and storage system |
US7325078B2 (en) * | 2005-10-06 | 2008-01-29 | Hewlett-Packard Development Company, L.P. | Secure data scrubbing |
US7721053B2 (en) * | 2005-10-24 | 2010-05-18 | Hewlett-Packard Development Company, L.P. | Intelligent logical unit provisioning |
US7467268B2 (en) * | 2006-04-14 | 2008-12-16 | Hewlett-Packard Development Company, L.P. | Concurrent data restore and background copy operations in storage networks |
US7590666B2 (en) * | 2006-06-16 | 2009-09-15 | Microsoft Corporation | Predicting capacity consumption in a memory component |
US7934027B2 (en) * | 2007-01-19 | 2011-04-26 | Hewlett-Packard Development Company, L.P. | Critical resource management |
US8024514B2 (en) * | 2007-03-01 | 2011-09-20 | Hewlett-Packard Development Company, L.P. | Access control management |
US7861031B2 (en) * | 2007-03-01 | 2010-12-28 | Hewlett-Packard Development Company, L.P. | Access control management |
US7694079B2 (en) | 2007-04-04 | 2010-04-06 | Hewlett-Packard Development Company, L.P. | Tagged sequential read operations |
JP2010026933A (en) * | 2008-07-23 | 2010-02-04 | Toshiba Corp | Memory system and host device |
JP5427011B2 (en) | 2009-12-17 | 2014-02-26 | 株式会社日立製作所 | Virtual hard disk management server, management method, and management program |
IN2012DN03826A (en) * | 2010-01-28 | 2015-08-28 | Hitachi Ltd | |
WO2018167890A1 (en) * | 2017-03-15 | 2018-09-20 | 株式会社日立製作所 | Computer system and management method |
US11023133B2 (en) | 2018-08-16 | 2021-06-01 | Acronis International Gmbh | Systems and methods for modifying storage system configuration using artificial intelligence |
US11803773B2 (en) * | 2019-07-30 | 2023-10-31 | EMC IP Holding Company LLC | Machine learning-based anomaly detection using time series decomposition |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4607346A (en) * | 1983-03-28 | 1986-08-19 | International Business Machines Corporation | Apparatus and method for placing data on a partitioned direct access storage device |
US5819290A (en) * | 1995-04-10 | 1998-10-06 | Sony Corporation | Data recording and management system and method for detecting data file division based on quantitative number of blocks |
US20010014929A1 (en) * | 1998-05-22 | 2001-08-16 | Yuichi Taroda | Disk control device and method processing variable-block and fixed-block accesses from host devices |
US6404444B1 (en) * | 1999-05-13 | 2002-06-11 | International Business Machines Corporation | Method and apparatus for displaying and controlling allocation of resource in a data processing system |
US20020143942A1 (en) * | 2001-03-28 | 2002-10-03 | Hua Li | Storage area network resource management |
US20020156828A1 (en) * | 2001-04-24 | 2002-10-24 | Takeshi Ishizaki | Integrated service management system |
US20040073677A1 (en) * | 2000-06-29 | 2004-04-15 | Hitachi, Ltd, | Computer system using a storage area network and method of handling data in the computer system |
US6954831B2 (en) * | 2002-08-29 | 2005-10-11 | International Business Machines Corporation | Method, system, and article of manufacture for borrowing physical volumes |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH0377153A (en) * | 1989-08-21 | 1991-04-02 | Nec Corp | File space extension system |
JPH04243438A (en) * | 1991-01-18 | 1992-08-31 | Chubu Nippon Denki Software Kk | Management system for storage device |
JPH0512043A (en) * | 1991-07-08 | 1993-01-22 | Nec Corp | Unix system resource monitor system |
JPH05241918A (en) * | 1992-03-03 | 1993-09-21 | Nec Corp | Method for processing idle capacity monitor of data base file and device therefor |
JPH08263231A (en) * | 1995-03-22 | 1996-10-11 | Fujitsu Ltd | Semiconductor disk control device and control method thereof |
JP3421898B2 (en) * | 1995-04-10 | 2003-06-30 | ソニー株式会社 | Data recording device and data management method |
JP2001022616A (en) * | 1999-07-08 | 2001-01-26 | Nec Corp | Method and device for automatically monitoring used directory capacity |
JP2001256086A (en) * | 2000-03-10 | 2001-09-21 | Toshiba Corp | System and method for managing data base |
JP2002007304A (en) * | 2000-06-23 | 2002-01-11 | Hitachi Ltd | Computer system using storage area network and data handling method thereof |
-
2002
- 2002-04-08 JP JP2002105346A patent/JP2003303054A/en active Pending
- 2002-11-21 US US10/302,153 patent/US7103733B2/en not_active Expired - Lifetime
-
2006
- 2006-03-14 US US11/374,768 patent/US20060155951A1/en not_active Abandoned
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4607346A (en) * | 1983-03-28 | 1986-08-19 | International Business Machines Corporation | Apparatus and method for placing data on a partitioned direct access storage device |
US5819290A (en) * | 1995-04-10 | 1998-10-06 | Sony Corporation | Data recording and management system and method for detecting data file division based on quantitative number of blocks |
US20010014929A1 (en) * | 1998-05-22 | 2001-08-16 | Yuichi Taroda | Disk control device and method processing variable-block and fixed-block accesses from host devices |
US6404444B1 (en) * | 1999-05-13 | 2002-06-11 | International Business Machines Corporation | Method and apparatus for displaying and controlling allocation of resource in a data processing system |
US20040073677A1 (en) * | 2000-06-29 | 2004-04-15 | Hitachi, Ltd, | Computer system using a storage area network and method of handling data in the computer system |
US20020143942A1 (en) * | 2001-03-28 | 2002-10-03 | Hua Li | Storage area network resource management |
US20020156828A1 (en) * | 2001-04-24 | 2002-10-24 | Takeshi Ishizaki | Integrated service management system |
US6954831B2 (en) * | 2002-08-29 | 2005-10-11 | International Business Machines Corporation | Method, system, and article of manufacture for borrowing physical volumes |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080082769A1 (en) * | 2006-10-03 | 2008-04-03 | Bull S.A.S. | Mass storage system and method |
US7873790B2 (en) * | 2006-10-03 | 2011-01-18 | Bull S.A.S. | Mass storage system and method with emulation and management priorities |
US20100082935A1 (en) * | 2008-09-30 | 2010-04-01 | Hitachi, Ltd. | Computer system and capacity management method of computer system |
Also Published As
Publication number | Publication date |
---|---|
US20030191909A1 (en) | 2003-10-09 |
JP2003303054A (en) | 2003-10-24 |
US7103733B2 (en) | 2006-09-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7103733B2 (en) | Computer system obtaining information on capacity and usage of an area used by a computer and notifying the computer the status thereof | |
US7171459B2 (en) | Method and apparatus for handling policies in an enterprise | |
US7444395B2 (en) | Method and apparatus for event handling in an enterprise | |
US8131784B1 (en) | Multiple node quota filter | |
US7502902B2 (en) | Storage system and data movement method | |
US7174557B2 (en) | Method and apparatus for event distribution and event handling in an enterprise | |
US7761489B2 (en) | Storage managing computer and program recording medium therefor | |
JP5160408B2 (en) | Method, system, and computer program for selecting a resource manager to satisfy a service request | |
US8209495B2 (en) | Storage management method and storage management system | |
KR100974149B1 (en) | Method, system and computer readable storage media for maintaining information about namespaces | |
US8037246B2 (en) | Storage system and storage management system | |
US8281085B2 (en) | Storage system construction managing device and construction management method | |
US20030110263A1 (en) | Managing storage resources attached to a data network | |
CN104937584A (en) | Providing optimized quality of service to prioritized virtual machines and applications based on quality of shared resources | |
JP4232357B2 (en) | Computer system | |
EP1456766A1 (en) | Managing storage resources attached to a data network | |
US7337283B2 (en) | Method and system for managing storage reservation | |
US20070079062A1 (en) | Method and system for storage access management in IP network | |
US6266697B1 (en) | System automatically maintaining client under control of client, and a recording medium therefor | |
US20050044140A1 (en) | Information processing method, information processing system, information processing apparatus and computer readable information recording medium | |
US7366867B2 (en) | Computer system and storage area allocation method | |
AU2002348882A1 (en) | Managing storage resources attached to a data network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |