Information system and data transfer method of information system

ABSTRACT

Availability of an information system including a storage apparatus and a host computer is improved. A host system includes a first storage apparatus provided with a first volume for storing data, and a second storage apparatus for storing the data sent from the first storage apparatus. In case of a failure occurring in the first storage apparatus, the host sends the data to be sent to the first storage apparatus to the second storage apparatus. The same identification number is used by the host computer for accessing data stored in the first volume via a first virtual volume and for accessing data stored in a second volume of the second storage system via a second virtual volume.

CROSS REFERENCE TO RELATED APPLICATIONS

The present application is a continuation of application Ser. No. 13/564,828, filed Aug. 2, 2012 which is a continuation of Ser. No. 11/850,925, filed Sep. 6, 2007; which relates to and claims priority from Japanese Patent Application No. 2007-85680, filed on Mar. 28, 2007 and Japanese Patent Application No. 2006-293485, filed on Oct. 30, 2006, the entire disclosures are hereby incorporated by reference.

BACKGROUND OF THE INVENTION

The present invention relates to a storage system comprising a plurality of storage areas, and a host computer coupled to the storage system.

Generally, an information system is equipped with a storage apparatus that uses an HDD (hard disk drive) as a storage device, and a storage system including this storage apparatus is accessed from a plurality of host systems (hosts, for example) via a storage area network (SAN: Storage Area Network). Generally, with a storage apparatus, a high-reliability method according to RAID (Redundant Array of Independent (or Inexpensive) Disks) technology is adopted to provide reliability to the storage apparatus beyond the reliability of a stand-alone HDD. Nevertheless, pursuant to the advancement of information society in recent years, the availability (service continuity) of information systems depending on reliability based on RAID is becoming inadequate.

Japanese Patent Laid-Open Publication No. H7-244597 (Patent Document 1) describes high-availability technology to deal with the foregoing situation. This technology prepares a production site and a backup site respectively including a host computer (hereinafter abbreviated as a “host”) and a storage apparatus, and mirrors data stored in the storage apparatus of the production site to the storage apparatus of the backup site. If the storage apparatus of the production site fails and shuts down, application processing that was suspended as a result of such storage apparatus failure is resumed using the storage apparatus and the host of the backup site. This technology is generally referred to as remote copy or remote mirroring.

SUMMARY OF THE INVENTION

With the technology of Patent Document 1, since the application is resumed with a different host when a storage apparatus fails and shuts down, re-boot processing of the application is required. Needless to say, there will be a problem concerning availability since the application will not be able to perform its normal operation from the time such application is suspended until the re-boot is complete. Thus, an object of the present invention is to improve the availability of an information system including a storage system that performs remote copy between two or more storage apparatuses, and a host that uses this storage system.

As one embodiment, a host computer is coupled to a first storage apparatus including a first volume for storing data, and a second storage apparatus including a second volume for storing the data sent from the first storage apparatus. When a failure occurs in the first storage apparatus, the host computer sends the data to be sent to the first storage apparatus to the second storage apparatus.

As another embodiment, a host computer (host) includes an operating system having a file system and an HBA device driver (host adapter management unit), and an application that sends a write request through the file system. The host computer is coupled to a first storage apparatus including a first volume, and a second storage apparatus coupled to the first storage apparatus and the host and including a second volume. The first storage apparatus and the second storage apparatus execute remote copy of copying data of the first volume to the second volume. In the host computer, when the file system performs write request processing, an I/O path manager managing information concerning the remote copy sends a write request from the application through the file system to the first storage apparatus in which the first volume exists through an HBA device driver based on information concerning the remote copy. Further, when a failure occurs in the first storage apparatus, the I/O path manager updates information concerning the remote copy and sends the write request to the second storage apparatus containing the second volume.

Further, as another embodiment, a host computer is coupled to a first storage apparatus including a first volume for storing data, and a second storage apparatus including a second volume for storing the data sent from the first storage apparatus. Here, the first and second volumes are pool volumes that dynamically allocate a storage area according to a write request from the host computer. When a failure occurs in the first storage apparatus, the host computer sends the data to be sent to the first storage apparatus to the second storage apparatus.

According to the present invention, it is possible to improve the availability of an information system including a storage system that performs remote copy between two or more storage apparatuses, and a host that uses this storage system.

DESCRIPTION OF DRAWINGS

FIG. 1 is a block diagram showing an example of the hardware constitution of an information system according to a first embodiment of the present invention;

FIG. 2 is a first conceptual diagram showing the overview of a first embodiment of the present invention;

FIG. 3 is a second conceptual diagram showing the overview of the first embodiment;

FIG. 4 is a third conceptual diagram showing the overview of the first embodiment;

FIG. 5 is a conceptual diagram representing the software constitution in a host;

FIG. 6 is a block diagram representing the software constitution in a virtual storage apparatus and a storage apparatus;

FIG. 7 is a conceptual diagram representing the pair status of remote copy and the transition of pair status;

FIG. 8 is a conceptual diagram showing a device relation table to be managed by an I/O path manager;

FIG. 9 is a flowchart showing the flow when the I/O path manager performs initialization processing;

FIG. 10 is a flowchart showing the flow when the I/O path manager performs write processing;

FIG. 11 is a flowchart showing the flow when the I/O path manager performs read processing;

FIG. 12 is a conceptual diagram showing the overview of a second embodiment of the present invention;

FIG. 13 is a conceptual diagram showing the overview of a third embodiment of the present invention;

FIG. 14 is a conceptual diagram showing the overview of a fourth embodiment of the present invention;

FIG. 15 is a conceptual diagram showing the overview of a fifth embodiment of the present invention;

FIG. 16 is a conceptual diagram showing the overview of a sixth embodiment of the present invention;

FIG. 17 is a conceptual diagram showing the overview of a seventh embodiment of the present invention;

FIG. 18 is a conceptual diagram showing the overview of a eighth embodiment of the present invention;

FIG. 19 is a conceptual diagram showing the overview of a ninth embodiment of the present invention;

FIG. 20 is a conceptual diagram showing the overview of a tenth embodiment of the present invention;

FIG. 21 is a conceptual diagram showing the overview of a eleventh embodiment of the present invention;

FIG. 22 is a conceptual diagram showing the overview of a twelfth embodiment of the present invention;

FIG. 23 is a conceptual diagram showing the overview of a thirteenth embodiment of the present invention;

FIG. 24 is a conceptual diagram showing the overview of a fourteenth embodiment of the present invention;

FIG. 25 is a flowchart showing a different flow when the I/O path manager performs write processing;

FIG. 26 is a flowchart showing a different flow when the I/O path manager performs read processing;

FIG. 27 is a flowchart showing a pair operation according to a write request to be performed by the storage apparatus when the I/O path manager is to perform the write processing of FIG. 25;

FIG. 28 is a conceptual diagram showing the overview of a fifteenth embodiment of the present invention;

FIG. 29 is a conceptual diagram showing the overview of a sixteenth embodiment of the present invention;

FIG. 30 is a conceptual diagram showing the overview of the sixteenth embodiment;

FIG. 31 is a block diagram representing the software constitution of the virtual storage apparatus and the storage apparatus according to an embodiment of the present invention;

FIG. 32 is a flowchart showing a different flow when the virtual storage apparatus performs write processing;

FIG. 33 is a flowchart showing a different flow when the virtual storage apparatus performs read processing;

FIG. 34 is a flowchart showing the flow of staging processing for AOU;

FIG. 35 is a conceptual diagram explaining the specific contents of the AOU address mapping information; and

FIG. 36 is a conceptual diagram explaining the specific contents of the AOU pool management information.

DETAILED DESCRIPTION

Embodiments of the present invention are now explained with reference to the attached drawings.

(1) First Embodiment 1. Constitution of Information System

FIG. 1 is a diagram showing an example of the hardware constitution (configuration) of an information system according to an embodiment of the present invention.

The information system, for example, comprises a storage apparatus 1500, a host computer (hereafter abbreviated as a “host”) 1100, a management host 1200, and two or more virtual storage apparatuses 1000. A plurality of storage apparatuses 1500, host computers (hereafter abbreviated as the “hosts”) 1100, and management hosts 1200 may be provided, respectively. The virtual storage apparatus 1000 and the host 1100 are mutually connected via an I/O network 1300. The virtual storage apparatus 1000 and the storage apparatus 1500 and the management host 1200 are mutually connected via a management network (not shown) or the I/O network 1300.

The host 1100 has a host internal network 1104, and coupled to this network 1104 are a processor (abbreviated as Proc in the diagrams) 1101, a memory (abbreviated as Mem in the diagrams) 1102, and an I/O port (abbreviated as I/O P in the diagrams) 1103. The management host 1200 may also have the same hardware constitution as the host 1100. Incidentally, an expansion card for adding an I/O port to the host 1100 is sometimes referred to as an HBA (Host Bus Adapter).

The management host 1200 has a display device, and this display device is able to display a screen for managing the virtual storage apparatus 1000 and the storage apparatus 1500. Further, the management host 1200 is able to receive a management operation request from a user (for instance, an operator of the management host 1200), and send the received management operation request to the virtual storage apparatus 1000 and the storage apparatus 1500. The management operation request is a request for operating the virtual storage apparatus 1000 and the storage apparatus 1500, and, for example, there are a parity group creation request, an internal LU (Logical Unit) creation request, a path definition request, and operations related to a virtualization function.

Connection via a fibre channel is foremost considered as the I/O network 1300, but in addition thereto, a combination of FICON (Fibre CONnection: registered trademark), or Ethernet (registered trademark) and TCP/IP (Transmission Control Protocol/Internet Protocol) and iSCSI (internet SCSI (Small Computer System Interface)), and a combination of network file systems such as Ethernet (registered trademark) and NFS (Network File System) of CIFS (Common Internet File System) may also be considered. Further, the I/O network 1300 may also be other than the above so as long as it is a communication device capable of transferring I/O requests. Further, the network that connects the virtual storage apparatus 1000 and the storage apparatus 1500 is also the same as the I/O network 1300.

The virtual storage apparatus 1000 comprises a controller (indicated as CTL in the diagrams) 1010, a cache memory (indicated as CM in the diagrams) 1020, and a plurality of HDDs 1030. As a preferred embodiment, the controller 1010 and the cache memory 1020 are respectively constituted of a plurality of components. The reason for this is because even if a failure occurs in a single component and such component is blocked, the remaining components can be used to continue receiving I/O requests as represented by read and write requests.

The controller 1010 is an apparatus (a circuit board, for example) for controlling the operation of the virtual storage apparatus 1000. The controller 1010 has an internal network 1017, and coupled to this internal network 1017 are an I/O port 1013, a cache port (abbreviated as CP in the diagrams) 1015, a management port (abbreviated as MP in the diagrams) 1016, a back-end port (abbreviated as B/E P in the diagrams) 1014, a processor (a CPU (Central Processing Unit), for instance) 1011, and a memory 1012. The controllers 1010 and the cache memories 1020 are mutually connected each other via a storage internal network 1050. Further, the controller 1010 and the respective HDDs 1030 are mutually connected via a plurality of back-end networks 1040.

The hardware constitution of the storage apparatus 1500 is constituted of similar components as those of the virtual storage apparatus 1000. Incidentally, when the virtual storage apparatus 1000 is a dedicated device or switch for virtualization without an HDD, the storage apparatus 1500 does not need to be constituted of similar components as those of the virtual storage apparatus 1000. Further, the internal network of the host 1100 and the virtual storage apparatus 1000 is preferably of a broader bandwidth than the transfer bandwidth of the I/O port 1013, and all or a part thereof may be substituted with a bus or switch-type network. Further, in FIG. 1, although only one I/O port 1013 is provided to the controller 1010, in reality, a plurality of I/O ports 1013 may exist in the controller 1010.

According to the foregoing hardware constitution, the host 1100 will be able to read or write all or a part of the data stored in the HDD of the virtual storage apparatus 1000 and the storage apparatus 1500. Incidentally, in the ensuing explanation, the system handling the storage of data is referred to as a storage cluster. Further, a subsystem that realizes high availability by including two subsystems inside the storage cluster and which includes the virtual storage apparatus 1000 and/or the storage apparatus 1500 is referred to as a storage subsystem.

2. Overview of Present Embodiment

In this embodiment, in order to improve the availability of a storage system including the virtual storage apparatus 1000 having a virtualization function for virtualizing a storage area such as a volume in another storage apparatus, a redundant constitution using another virtual storage apparatus 1000 is adopted. FIG. 2 is a diagram showing an overview of such a duplex constitution.

In this overview, the storage system includes a virtual storage apparatus 1000L, a virtual storage apparatus 1000R, a storage apparatus 1500L, and a storage apparatus 1500R. Incidentally, in order to simplify the following explanation, let it be assumed that the virtual storage apparatus 1000L and the storage apparatus 1500L serve as a primary system (production system), and the virtual storage apparatus 1000R and the storage apparatus 1500R serve as a secondary system (backup system). Nevertheless, when the number of volumes to be respectively provided by the virtual storage apparatuses 1000L, 1000R to the host 1100 is two or more volumes, in substitute for handling the primary system/secondary system in virtual storage apparatus units, only the virtual storage apparatuses 1000L, 1000R to serve as the primary system in volume units need to be defined.

The respective virtual storage apparatuses 1000L, 1000R provide partial or all areas of a parity group (configured based on RAID technology) with its own HDD 1030 as the constituent element as a volume 3000LA and a volume 3000RA to the host 1100 (corresponds to the portion in which ‘A’ is indicated in a cylinder in FIG. 2). Further, the virtual storage apparatus 1000 is also able to optionally provide, based on the virtualization function, virtual volumes 3000LB, 3000RB (volumes in which the nonvolatile storage areas of the corresponding HDD or the like exist outside the virtual storage apparatuses 1000L, 1000R). In this overview, a part or all of the volumes 3500LB, 3500RB provided by the storage apparatuses 1500L, 1500R are used as the corresponding nonvolatile storage areas. Incidentally, reference to “data of a volume” in the following explanation includes, in addition to the data stored in the HDD 1030, data that is temporarily stored in the cache memory 1020. Further, “data of a virtual volume” described later includes, in addition to the data stored in the volumes 3500LB, 3500RB of the storage apparatuses 1500L, 1500R, data that is temporarily stored in the cache memory 1020 of the virtual storage apparatuses 1000L, 1000R.

Meanwhile, an application program (hereinafter sometimes abbreviated as an “application”) 2010, an OS, and system programs as represented by daemon and management programs for assisting in the setting and processing of the OS are executed in the host 1100. The OS provides to the application 2010 an interface for I/O requests to data existing in the volumes 3000LA, 3000LB, 3000RA, 3000RB provided by the virtual storage apparatuses 1000L, 1000R, and sends I/O requests to the appropriate virtual storage apparatuses 1000L, 1000R and volumes 3000LA, 3000LB, 3000RA, 3000RB according to the request from the application 2010. In a normal status, the host 1100 issues an I/O request as represented by a read or write request to the volumes 3000LA, 3000LB of the virtual storage apparatus 1000L, and thereby sends and receives data. In other words, upon receiving a read request, the virtual storage apparatus 1000L reads data from the HDD 1030 and returns such data to the host 110 when the requested volumes 3000LA, 3000LB, 3500LB correspond to the HDD 1030 inside the virtual storage apparatus 1000L, or acquires the necessary data and returns such data (all or a part) to the host 1100 by issuing a read request to the storage apparatus 1500L.

In the case of a write request, in order to make the data redundant, the virtual storage apparatus 1000L that received the write data sends the write data to the virtual storage apparatus 1000R as the secondary system, and returns the write complete message to the host 1100 after the virtual storage apparatus 1000L receives a write data reception complete message from the virtual storage apparatus 1000R. Incidentally, write data to the virtual storage apparatus 1000L and write data received by the virtual storage apparatus 1000R via the virtual storage apparatus 1000L may also be temporarily retained in the cache memories 1020L, 1020R of the respective virtual storage apparatuses 1000L, 1000R. Incidentally, as one example of this embodiment, the transfer of this write data is conducted via storage remote copy.

FIG. 3 shows the processing overview of the information system after a failure occurred in the virtual storage apparatus 1000L under a normal status.

When the primary virtual storage apparatus 1000L fails and shuts down, the system program in the host 1100 detects this failure, and switches the destination of the I/O request from the primary virtual storage apparatus 1000L to the secondary virtual storage apparatus 1000R. Nevertheless, in this case also, the application 2010 is able to continue I/O without being aware that the destination of the I/O request has been switched. Thus, normally, as a volume identifier designated at the time of an I/O request from the application 2010 or the file system, the system program provides a virtual volume identifier (or a device file) at an OS layer (more specifically, a layer that is lower than the file system), and the lower layer of OS manages the correspondence of that identifier and the identifier (or device file) actually allocated to the volume. When switching the destination of the I/O request, the correspondence thereof is switched from the volume 3000LA and the volume 3000LB of the virtual storage apparatus 1000L to the volume 3000RA and the volume 3000RB of the virtual storage apparatus 1000R, so as to realize switching that will be transparent to the application 2010.

Further, the virtual storage apparatus 1000R is also able to process the write request, according to the arrival of such write request to the volumes 3000RA, 3000RB from the host 1100, or other express fail over requests. As an example of this change processing, in line with the data copy from the virtual storage apparatus 1000L to the virtual storage apparatus 1000R, when the setting is configured to deny the write request from the host 1100 to the volumes 3000RA, 3000RB of the virtual storage apparatus 1000R, such setting is cancelled. Further, when write data is being transferred using remote copy, the copy status of remote copy may also be changed.

FIG. 4 shows the processing overview of the information system after the occurrence of a failure in the network between the virtual storage apparatuses 1000L, 1000R.

The virtual storage apparatus 1000L that detected the network failure notifies this failure to the host 1100. The host 1100 that received the failure notice requests the secondary virtual storage apparatus 1000R to process the write request and issues subsequent write requests to both the primary virtual storage apparatus 1000L and the secondary virtual storage apparatus 1000R so as to make the data of the primary system and the data of the secondary system uniform.

3. Programs and Information to be Executed by Host 1100

FIG. 5 is a diagram illustrating the concept to be provided by the respective software programs in addition to the software programs to be executed in the host 1100 and information to be used by such software programs. Incidentally, although the software programs are retained in the memory 1102 (FIG. 1) and executed by the processor 1101 (FIG. 1), such software programs may be partially realized as hardware and executed.

In the host 1100, in addition to the application 2010 and the remote copy manager 5030, a file system 5020, an I/O path manager 5000 and an HBA device driver 5010 are executed as program modules inside the OS or Kernel (it is not necessary to execute all processing, for the file system 5020, the I/O path manager 5000 or the HBA device driver 5010, inside the Kernel.).

The HBA device driver 5010 is a program for sending and receiving I/O requests and incidental data through the I/O port 1103 (FIG. 1) mounted on the HBA, and controlling communication with the other virtual storage apparatuses 1000L, 1000R and the storage apparatuses 1500L, 1500R. The HBA device driver 5010 is also able to provide an identifier corresponding to the volumes 3000LA, 3000LB, 3000RA, 3000RB provided by the virtual storage apparatuses 1000L, 1000R to the upper layer, and receive an I/O request accompanied with such identifier. The volume 5040 illustrates this concept, and corresponds to the respective volumes 3000LA, 3000LB, 3000RA, 3000RB provided by the virtual storage apparatuses 1000L, 1000R.

The I/O path manager 5000 is a module for switching the I/O request destination of the application 2010. This module provides to the file system 5020 an I/O request interface and the identifier, which is the same type of identifier corresponding to the volume 5040 provided by the HBA device driver 5010 and corresponds to a virtual volume in the host 1100. The identifier corresponding to the virtual volume in the host 1100 corresponds to the identifier corresponding to the volume 5040 provided by the HBA device driver 5010 in the module, and the device relation table 5001 retains the correspondence thereof. The volume 5050 illustrates the concept of this virtual volume in the host 1100, and, in FIG. 5, an example of the correspondence thereof corresponds to the identifier corresponding to the volumes 3000LA, 3000LB of the virtual storage apparatus 1000L (to put it differently, it could be said that the entities of the virtual volume 5050 in the host 1100 are the volumes 3000LA, 3000LB of the virtual storage apparatus 1000L).

An I/O request up to this layer is usually designated in a fixed-length block access format. Nevertheless, the I/O request is not limited thereto when the host 1100 is a mainframe, and it may also be designated in a CKD (Count Key Data) format.

The file system 5020 is a module for sending an I/O request and sending and receiving data from/to the virtual storage apparatuses 1000L, 1000R, which is done through the identifier and the I/O interface corresponding to the volume 5040 provided by the HBA device driver 5010, and the identifier and the interface corresponding to the virtual volume 5050 in the host 1100 provided by the I/O path manager 5000. FIG. 5 illustrates as an example of the structure of a directory tree inside the file system 5020 in a state where a part of such tree structure 5052 is stored in the volume 5050 provided through virtualization in the host 1100 by the I/O path manager 5000 (as explained above, more precisely, provision of the virtual volume 5050 in the host 1100 of the I/O path manager 5000 is made through the identifier, and the data indicated as being stored in the volume 5050 is actually stored in the volumes 3000LA, 3000LB, 3000RA, 3000PB provided by the virtual storage apparatuses 1000L, 1000R shown in the device relation table 5001). The file system 5020 provides an interface of a file I/O to the application 2010. The file system 5020 called from the application 2010 through the file I/O interface converts the read or write request accompanied with a file name and data offset in the file into a read or write request of a block format while referring to structural information in the file system 5020 such as a directory file or an inode, and delivers the read or write request to the I/O path manager 5000 or the HBA device driver 5010.

Incidentally, with a Unix system or Windows (registered trademark) system OS, the file I/O interface is used to provide a function referred to as a device file system as the interface for directly operating the data of volumes. Normally, the device file system is deployed under the control of the ‘/dev’ directory of the file space, and the file name of the file of the foregoing directory and below (rsda and so on in the illustrated example) corresponds to the volumes 5040, 5050 provided by the lower layer (HBA device driver 5010 and I/O path manager 5000) of the file system 5020. Then, data stored in the volumes 5040, 5050 can be read and written with the file I/O interface as though such data is stored in the device files 5070, 5080. Incidentally, in the example shown in FIG. 5, the device file 5070 (rsda, rsdb, rsdc, rsdd) corresponds to the volume 5040 recognized and provided by the HBA device driver 5010, and the device file 5080 (vsda, vsdb) corresponds to the volume 5050 provided by the I/O path manager 5000. These device files 5070, 5080 may be used for the purpose of realizing independent data organization or buffer management when the application 2010 is a database.

The remote copy manager 5030 is a program for acquiring the status of remote copy for realizing the data transfer between the virtual storage apparatuses 1000L, 1000R, and for the host 1100 and the I/O path manager 5000 to perform the operation of remote copy, and communicates with the virtual storage apparatuses 1000L, 1000R according to the request of a program, a user or the I/O path manager 5000 using this program.

Incidentally, as explained above, it would be desirable if the functions of the HBA device driver 5010 and the I/O path manager 5000 could be partially or wholly installed and uninstalled as modules inside the Kernel. This is because, since the HBA device driver 5020 is a program for controlling the HBA, it is often provided by the manufacturer of the HBA. Similarly, since the processing of the I/O path manager 5000 is decided subject to the processing of the virtual storage apparatuses 1000L, 1000R, it is possible that some or all of the modules will be provided by the manufacturer of the virtual storage apparatuses 1000L, 1000R. Therefore, as a result of being able to install/uninstall this program, it will be possible to constitute an information system based on a broad range of combinations of HBA and virtual storage apparatuses 1000L, 1000R. Further, with the present invention, since the primary system and the secondary system are switched in a manner that is transparent to the application 2010, transparent switching that does not require the recompilation or the like of the application 2010 can be realized by executing processing inside the Kernel. Moreover, since the I/O path manager 5000 exists in the intermediate layer of the file system 5020 and the HBA device driver 5010, recompilation of the file system 5020 is no longer required, and transparency of the file system is also secured. In addition, the I/O path manager 5000 is able to use the functions of the HBA device driver 5010.

Further, the following two methods can be considered when the I/O path manager 5000 inside the Kernel calls the remote copy manager 5030 or performing the opposite communication method thereof.

(A) The I/O path manager 5000 creates a virtual volume for communication, and the file system 5020 creates this communication volume as a device file in the file space. The remote copy manager 5030 stands by in a state of periodically executing a read system call to the device file. The I/O path manager 5000 receives an I/O request from the remote copy manager 5030, but pends it internally. Then, when it becomes necessary for this module to send a message to the remote copy manager 5030, the I/O path manager 5000 returns the data containing the message defined as a return value of the I/O request to the remote copy manager 5030 through the file system 5020. Incidentally, the read system call issued by the remote copy manager thereupon will be forced to wait inside the Kernel for a long period of time. If this is not preferable, the I/O path manager 5000 should return data indicating that there is no message to the remote copy manager 5030 through the file system 5020 after the lapse of a prescribed period of time, and the remote copy manager 5030 that received this message should execute the read system call once again.

(B) Unix (registered trademark) domain socket is used and this is treated as a virtual network communication. Specifically, the remote copy manager 5030 operates one end of the socket, and the I/O path manager 5000 operates the remaining end.

Incidentally, in the following explanation, when the I/O path manager 5000 is to operate remote copy or refer to the status, let it be assumed that such operation is conducted by calling the remote copy manager 5030 through the foregoing communication.

4. Programs and Information to be Executed by Virtual Storage Apparatus 1000

FIG. 6 is a diagram showing the programs to be executed by the virtual storage apparatuses 1000 (1000L, 1000R) and the storage apparatuses 1500 (1500L, 1500R), and information to be managed by these programs. Incidentally, although the programs are retained in the memory 1102 (FIG. 1) and the cache memory 1020 and executed by the processor 1101 (FIG. 1), such programs may be partially constituted as hardware and executed.

<4.1. I/O Processing Program 6020, Parity Group Information 6060 and Volume Information 6050>

The parity group information 6060 contains information relating to the following configuration of each parity group.

(1) Identifier of HDD 1030 configuring the parity group. Since a plurality of HDDs 1030 are participating in the parity group, this information exists in a plurality for each parity group.

(2) RAID level

Further, the volume information 6050 contains information relating to the following configuration of each volume.

(1) Volume capacity

(2) Identifier of the parity group and areas (start address and/or end address) in the parity group storing data corresponding to the volume.

The I/O processing program 6020 executes the following processing relating to the I/O request received from the host 1100 by referring to the volume information 6050 and the parity group information 6060.

(A) Staging: Copying data stored in the HDD 1030 to the cache memory 1020.

(B) Destaging: Copying data stored in the cache memory 1020 to the HDD 1030. Incidentally, as the pre-processing thereof, redundant data based on RAID technology may also be created.

(C) Read processing: Determining whether data corresponding to the request exists in the cache memory 1020 in response to the read request received from the host 1100. In case of the data corresponding to the request not existing in the cache memory 1020, staging processing is executed to copy the data to the cache memory 1020, and such data is sent to the host 1100. Incidentally, in case of such data existing in the cache memory 1020, this data is sent to the host 1100.

(D) Write processing: Storing the write data received from the host 1100 in the cache memory 1020. Incidentally, in case of the free area in the cache memory 1020 not being enough during the processing, destaging processing is executed to copy appropriate data to the HDD 1030, and the area in the cache memory 1020 is thereafter reused. Further, in case of the address, of which data is previously stored in the cache memory 1020, is included in the target area of the write request, the data of the area may sometimes be directly overwritten in the cache memory 1020.

(E) Cache algorithm: Deciding the data in the HDD 1030 to be staged and the data in the cache memory 1020 to be destaged according to an LRU algorithm or the like based on the reference frequency or reference period of data in the cache memory 1020.

<4.2. Virtualization Program 6030 and Virtualization Information 6070>

The virtualization information 6070 contains information relating to the following configuration of each virtualization volume.

(1) Following information concerning areas in the volume of the storage apparatus 1500, and address space in the virtual volume as which the foregoing areas is provided to the host 1100. In case of the virtual volume constituting a plurality of volumes, the following information will also exist in a plurality.

(1-1) Identifier of the storage apparatus 1500 (or identifier of the port), identifier of the volume, and areas (start address and end address) in the volume, constituted of the virtual volume

(1-2) Areas (start address and end address) in the virtual volume

(2) Capacity of the virtual volume

The virtualization program 6030 is a program for the virtual storage apparatus 1000 to provide a volume to the host 1100 by using the volume provided by the storage apparatus 1500. Incidentally, there are the following patterns as the correspondence of the virtual volume provided by the virtualization program 6030 and the relating volume in the storage apparatus 1500.

(A) A case of using the overall volume in the storage apparatus 1500 as the storage area of the virtual volume. In this case, capacity of the virtual volume will be roughly the same capacity as the selected volume (‘roughly same’ is a case of storing the control information and redundant information in a volume of the storage apparatus 1500. When there is no such information, this will be the same capacity).

(B) A case of using a part of the volume in the storage apparatus 1500 as the storage area corresponding to the virtualization volume. Here, capacity of the virtual volume will be roughly the same as the area capacity to be used.

(C) A case of combining and using a plurality of volumes in a plurality of storage apparatuses 1500 as the storage area of the virtual volume. Here, capacity of the virtual volume will be roughly the same capacity as the total value of the capacity of the respective volumes. Incidentally, as this kind of combination method, there are striping, concatenate (method of linking a plurality of volumes and treating them as a single volume) and so on.

(D) In addition to pattern (C), further storing parity information or mirror data. Here, capacity of the virtual volume will be half of (C) when storing mirror data, or depend on the parity calculation method when storing parity. Reliability of data stored in the virtual volume can be improved through combination with high-reliability based on RAID inside the storage apparatus 1500.

Incidentally, regarding every pattern, the storage apparatus identifier (or port identifier) and the volume identifier (information for identifying volumes in the virtual storage apparatus or controlled by ports used in the I/O request, such as LUN (Logical Unit Number), CKD-format CU number, LDEV (Logical DEVice) number, and the like), designated in the I/O request, differ from the original volume.

The virtualization program 6030 is called by the I/O processing program 6020 when the data to be subject to staging or destaging corresponds to the virtual volume, and uses the virtualization information 6070 to execute the following processing.

(A) Staging: Deciding which data stored in the volume of which storage apparatus 1500 should be copied to the cache memory 1020 based on the correspondence of the virtualization volume and the volume of the storage apparatus 1500, and thereafter copying such data to the cache memory 1020.

(B) Destaging: Deciding which volume of the storage apparatus 1500 should be target to copy data in the cache memory 1020 to, based on the correspondence of the virtual volume and the volume of the storage apparatus 1500, and thereafter copying such data to the storage apparatus 1500. Incidentally, as the pre-processing thereof, redundant data based on RAID technology may also be created.

<4.3. Remote Copy Program 6010 and Copy Pair Information 6040>

The copy pair information 6040 possesses the following information for each copy pair (hereinafter sometimes abbreviated as a “pair”) of the copy source volume and the copy destination volume of remote copy. Incidentally, in this embodiment, volumes that are the target of high availability are designated as the copy source volume and the copy destination volume.

(1) Identifier of the virtual storage apparatus 1000 having the copy source volume, and identifier of the volume

(2) Identifier of the virtual storage apparatus 1000 having the copy destination volume, and identifier of the volume

(3) Status of the copy pair (details will be described later)

The remote copy program 6010 is a program for mirroring the data stored in the copy source volume to the copy destination volume, and refers to the copy pair information 6040 to perform the processing. The processing overview and pair status of remote copy (in particular synchronous remote copy) are explained below.

<4.3.1. Copy Processing Operation of Synchronous Remote Copy>

As the method of the synchronous remote copy described above, when the virtual storage apparatus 1000 of the copy source receives a write request for writing into the copy source volume from the host 1100, the virtual storage apparatus 1000 of the copy source sends write data to the virtual storage apparatus 1000 of the copy destination and thereafter returning a write request completion notice to the host 1100.

When synchronous remote copy is to be executed, the controller 1010 of the virtual storage apparatus 1000 manages information referred to as a copy pair status (Simplex, Initial-Copying, Duplex, Suspend and Duplex-Pending), in order to display the status of remote copy between the pair of copy source volume and copy destination volume on a management screen 1200 or operate the status of remote copy. FIG. 7 shows a status transition diagram relating to the pair status of synchronous remote copy. The respective pair statuses are explained below.

<4.3.1.1. Simplex Status>

The Simplex status is a status where copy between the copy source volume and the copy destination volume configuring a pair has not been started.

<4.3.1.2. Duplex Status>

The Duplex status is a status where synchronous remote copy has been started, the initialization copy described later is complete and the data contents of the copy source volume and the copy destination volume configuring a pair are the same. In this status, excluding the areas that are currently being written, data contents of the copy source volume and data contents of the copy destination volume will be the same. Incidentally, during the Duplex status and in the Duplex-Pending and Initial-Copying statuses, write requests from the host 1100 to the copy destination volume are denied.

<4.3.1.3. Initial-Copying Status>

The Initial-Copying status is an intermediate status during the transition from the Simplex status to the Duplex status, and initialization copy from the copy source volume to the copy destination volume (copy of data already stored in the copy source volume to the copy destination volume) is performed as required during this period. When initialization copy is complete and processing necessary for making the transition to the Duplex status is complete, the pair status becomes a Duplex status.

<4.3.1.4. Suspend Status>

The Suspend status is a status where the contents written into the copy source volume are not reflected in the copy destination volume. In this status, data contents of the copy source volume and the copy destination volume configuring a pair are not the same. Triggered by a command from the user or the host 1100, the pair status makes a transition from another status to the Suspend status. In addition, a case may be considered where, when it is no longer possible to perform synchronous remote copy due to a network failure or the like between the virtual storage apparatuses 1000, the pair status makes an automatic transition to the Suspend status.

In the following explanation, the latter case; that is, the Suspend status caused by a failure will be referred to as a Failure Suspend status. Representative examples that cause such Failure Suspend status are, in addition to a network failure, failures in the copy source volume and the copy destination volume, and failure of the controller 1010.

When entering the Suspend status, although the copy source storage 1000 receives write data according to a write request and stores it in the copy source volume when such write request is issued to the copy source volume subsequent to entering the Suspend status, the copy source storage 1000 does not send the write data to the virtual storage apparatus 1000 of the copy destination. Further, the virtual storage apparatus 1000 of the copy source stores the writing location of the written write data in the copy source volume as a differential bitmap or the like.

Incidentally, when a write request is issued to the copy source volume subsequent to entering the Suspend status, the virtual storage apparatus 1000 of the copy destination also performs the foregoing operation. Further, when a setting referred to as “fence” is configured in a pair before such pair enters the Failure Suspend status, writing of the copy source volume is denied after the pair status makes a transition to the Failure Suspend status. Incidentally, the virtual storage apparatus 1000 of the copy destination may also deny the write request to the copy destination volume during the Failure Suspend status.

<4.3.1.5. Duplex-Pending Status>

The Duplex-Pending status is the intermediate status during the transition from the Suspend status to the Duplex status. In this status, data copy from the copy source volume to the copy destination volume is executed in order to make the data contents of the copy source volume and the copy destination volume coincide. After the data contents of the copy source volume and the copy destination volume become identical, the pair status becomes a Duplex status.

Incidentally, data copy during the Duplex-Pending status is executed, via differential copy of copying only the portions that need to be updated (in other words, the inconsistent data between the copy source volume and the copy destination volume) by using the writing location (for instance, the foregoing differential bitmap or the like) recorded in the virtual storage apparatus 1000 of the copy source or the virtual storage apparatus 1000 of the copy destination during the Suspend status.

Further, although the Initial-Copying status and the Duplex-Pending status were explained above as being separate statuses, these may also be combined and displayed as one status on the screen of the management host 1200, or subject to transition as one status.

<4.3.1.6. Pair Operation Command>

The pair status makes a transition to another status based on the following commands from the host 1100 or the management host 1200.

(A) Initialization command: When this command is received during the Simplex status, transition is made to the Initial-Copying status.

(B) Resynchronization command: When this command is received during the Suspend status or the Failure Suspend status, transition is made to the Duplex-Pending status.

(C) Partition command: When this command is received during the Duplex status, transition is made to the Suspend status.

(D) Copy direction inversion command: When this command is received during the Duplex status, Suspend status or Failure Suspend status, relationship of the copy source and the copy destination is inverted. In the case of a Duplex status, the copy direction is also inverted when this command is received.

Incidentally, the initialization command is expected to designate the virtual storage apparatus 1000 of the copy source and the copy source volume, and the virtual storage apparatus 1000 of the copy destination and the copy destination volume, and the remaining commands merely need to designate identifiers showing the pair relationship since such pair relationship has already been formed (combination of the virtual storage apparatus 1000 of the copy source and the copy source volume, and the virtual storage apparatus 1000 of the copy destination and the copy destination volume is also one of such identifiers).

5. Programs and Information to be Executed by Storage Apparatus 1500

FIG. 6 illustrates the programs and information to be executed by the storage apparatus 1500, and the respective programs and information perform the same operation as the virtual storage apparatus 1000.

6. Device Relation Table 5001

FIG. 8 is a diagram showing the information contained in the device relation table 5001. The device relation table 5001 manages the following information for each virtual volume (more specifically, for each identifier corresponding to such volume) in the host 1100 provided by the I/O path manager 5000.

(A) Identifiers of the virtual volumes in the host 1100

(B) Related volume identifier list: Identifiers of volumes of the storage apparatus 1500 that may become the entity of virtual volumes in the host 1100 are included. Incidentally, as said individual identifiers, the identifiers allocated by the HBA device drivers 5010 as the lower layer of the I/O path manager 5000 are used. In this embodiment, identifiers of volumes in the primary virtual storage apparatus 1000 (1000L) and volumes in the secondary virtual storage apparatus 1000 (1000R) are listed (if a normal status).

(C) Primary volume: Shows which volume listed at (B) is a primary.

(D) Failure status

(E) Pair status

Incidentally, since the identifiers of (A) and the identifiers of (B) are handled the same from the perspective of the file system 5020, overlap of the identifiers of (A) and (B) is not allowed. Further, since overlap is also not allowed in the case of combining (A) and (B), the I/O path manager 5000 needs to create the identifiers of (A) while giving consideration to this point.

7. Initialization Processing

FIG. 9 is a flowchart illustrating the initialization processing of the I/O path manager 5000. This initialization processing is now explained with reference to the flowchart. Incidentally, although there are cases below where the processing subject of various processes is explained as the “I/O path manager 5000,” in reality, it goes without saying that the processor 1101 (FIG. 1) of the host 1100 executes the corresponding processing based on a program called the “I/O path manager 5000.”

(S9001) The I/O path manager 5000 receives an initialization command containing the following information from the user of the management host 1200 or the host 1100. Incidentally, as the initialization processing of a duplex system, this is also referred to as an HA (High Availability) initialization command.

(A) Primary virtual storage apparatus 1000 and its volumes

(B) Secondary virtual storage apparatus 1000 and its volumes

(S9002) The I/O path manager 5000 communicates with both virtual storage apparatuses 1000 commanded at S9001 and acquires the existence of volumes and the capacity thereof.

(S9003) The I/O path manager 5000 confirms that volumes commanded at S9001 exist and are of the same capacity. When this cannot be confirmed, the I/O path manager 5000 returns an error to the command source.

(S9004) The I/O path manager 5000 sends a remote copy initialization command to one or both virtual storage apparatuses 1000. This initialization command is commanded with the primary volume as the copy source volume and the secondary volume as the copy destination volume. Based on this command, the virtual storage apparatus 1000 starts remote copy.

(S9005) The I/O path manager 5000 registers the following information in the device relation table 5001, and thereafter returns an initialization start reply to the source of the initialization command.

(A) Identifiers of the virtual volumes in the host 1100 (=values created by the I/O path manager 5000)

(B) Related volume identifier list (=two identifiers corresponding to the virtual storage apparatus 1000 and the volume designated at S9001 (both the primary system and secondary system)).

(C) Identifier of the primary volume (=primary volume designated at S9001)

(D) Failure status (=secondary system in preparation)

(E) Pair status (=Initial-Copying)

(S9006) The I/O path manager 5000 monitors the pair status of remote copy, and updates the device relation table 50001 to the following information upon transition to the Duplex status.

(D) Failure status (=normal status)

(E) Pair status (=Duplex)

As a result of the foregoing processing, the I/O path manager 5000 is able to start the preparation for high availability including the setting of remote copy according to the user's command. Incidentally, in reality, since the I/O path manager 5000 is able to provide the virtual volume in the host 1100 immediately after S9005, users who wish to make access in a file format is able to start file I/O by issuing a mount command to the volume. Further, as a different method, the I/O path manager 5000 may define the virtual volume in the host 1100 corresponding to the volume to realize high availability before the setting of remote copy, and the file system 5020 may also start the foregoing processing from a state of mounting the volume by the user designating a volume to become a secondary system.

8. Write Request Processing Flow

FIG. 10 is a diagram showing the processing flow when the I/O path manager 5000 receives a write request from the file system 5020.

(S10001) From the file system 5020, the I/O path manager 5000 is called (or receives a message of) a write request function including the identifier of the virtual volume in the host 1100 to become the write destination, write location of the volume, and the write length.

(S10002) The I/O path manager 5000 confirms the failure status of the virtual volume and, if it is a remote copy failed status, transfers the control to the dual write processing at S10020, and otherwise executes S10003.

(S10003) The I/O path manager 5000 issues a write request to the primary volume. Incidentally, issuance of the write request is actually realized by calling the HBA device drive 5010 of the lower layer.

(S10004) The I/O path manager 5000 confirms the reply of the write request, returns a completion reply to the file system 5020 if it is a normal end or transfers the control to the dual write processing at S10020 if it is a remote copy failure or transfers the control to the switch processing at S10010 if it is a no reply or in other cases.

Incidentally, the dual write processing at S10020 is executed at the following steps.

(S10021) If the writing into the primary or secondary volume is denied due to the setting of remote copy, the I/O path manager 5000 cancels this setting.

(S10022) The I/O path manager 5000 issues a write request to the primary volume.

(S10023) The I/O path manager 5000 issues a write request to the secondary volume. The I/O path manager 5000 waits for the arrival of a write request reply from both the primary system and secondary system, and returns a completion reply to the file system 5020.

<8.1. Flow of Switch Processing>

The processing realized by the switch processing is further explained.

(S10011) The I/O path manager 5000 foremost confirms whether the secondary volume is available by referring to the failure status of the device relation table 5001, and returns an error reply to the file system 5020 if it determines that the secondary volume is unavailable, or executes S10012 if the secondary volume is available. Incidentally, a status where there is no secondary system (when the secondary virtual storage apparatus 1000 is not functioning due to a failure, or in a case of a volume in which the secondary virtual storage apparatus 1000 is not set to begin with), and the status of initialization in preparation described above may consider the status of unavailable.

(S10012) The I/O path manager 5000 issues a remote copy stop command to the secondary virtual storage apparatus 1000 and, after confirming that the copy status entered the Suspend status, issues a copy direction inversion command.

(S10013) The I/O path manager 5000 issues a remote copy resynchronization command to the secondary virtual storage apparatus 1000. Incidentally, there is no need to wait until the resynchronization is actually complete and the pair status enters the Duplex status.

(S10014) The I/O path manager 5000 updates the primary volume identifier of the device relation table 5001 to a volume identifier that was a secondary system theretofore, and switches the primary system and the secondary system. Then, the I/O path manager 5000 sends a write request to the new primary volume through the HBA device driver 5010.

(S10015) The I/O path manager 5000 confirms the reply of the write request, returns a completion reply to the file system 5020 if it is a normal end or returns an error reply if it is an error, and ends the processing.

<8.1.1. Countermeasures Against Write Request Failure During Dual Write Processing>

When the write request to the primary volume at S10022 ends in a failure during the dual write processing at S10020, control may be transferred to the switch processing at S10010. Further, when the write request to the secondary volume at S10023 ends in a failure, the failure status of the device relation table 5001 is changed to ‘no secondary system,’ and writing is thereby completed.

Further, since the pair status is a Failure Suspend status during the dual write processing, a write location is indicated in the volume of the virtual storage apparatus 1000 based on a differential bitmap of remote copy. Nevertheless, since the write data written in both volumes based on the dual write processing are the same, it is desirable to avoid recording in the differential bitmap while the dual write processing is being conducted normally, and to copy only the differential data during the resynchronization processing after recovery of the communication failure. As a solution for the above, while the dual write processing is being conducted normally, a case may be considered of periodically and repeatedly clearing the differential bitmap of the volume of both the primary and secondary virtual storage apparatuses 1000. With this method, there is no need to issue a clear command for each write request, and it is possible to avoid the copy of all areas of the target volume during the resynchronization of remote copy. This is because, although the write request of the dual write after the time of the nearest clearing process and the write request of the dual write during the failure of the dual write will be recorded as a write location in the differential bitmap, there will be no data inconsistency or copy omission area. Because, even when the data area recorded during the dual write is copied with resynchronization, the data contents of the copy destination will not change.

Incidentally, in the foregoing solution, processing of the write request may be temporarily stopped in order to clear the differential bitmap of both the primary and secondary system. As a method of stopping the processing, considered may be a method of the I/O path manager 5000 not transferring the write request received from the file system 5020 to the virtual storage apparatus 1000 until both differential bitmaps are cleared, or a method of pending the write request processing in the primary virtual storage apparatus 1000 until both differential bitmaps are cleared.

As a second solution, there is a method of allocating two differential bitmaps respectively to the primary and secondary volumes. The processing contents thereof are shown below.

(Initial status) The primary and secondary virtual storage apparatuses 1000 respectively record the location of the write request on one side of the two differential bitmaps. Thus, both virtual storage apparatuses 1000 will retain and manage information concerning an active side (this side refers to the side recording the write location when the write request arrives, and the other side of the differential bitmap is referred to as an inactive side).

Further, it is desirable that there is nothing recorded on the inactive side of the differential bitmap.

(Step 1) The primary virtual storage apparatus 1000 switches the differential bitmap to become the recording destination of the location of the write request and the subsequent write requests are recorded in the switched differential bitmap by updating the management information of the active side to an alternative differential bitmap that was an inactive side. The secondary virtual storage apparatus 1000 is similarly switched. Incidentally, the trigger for starting the switch processing is given from the I/O path manager 5000 to both virtual storage apparatuses 1000. Incidentally, the switch processing of the primary system and secondary system may be executed in any order, or may be executed in parallel.

(Step 2) The I/O path manager 5000 issues a differential bitmap clear command to both virtual storage apparatuses 1000 upon waiting for a switch completion reply from both virtual storage apparatuses 1000. The virtual storage apparatus 1000 that received the clear command clears the write location of the differential bitmap that is an inactive side, and returns a reply to the I/O path manager 5000. Similar to the switch processing, the clear processing of the primary system and secondary system may be executed in any order, or may be executed in parallel.

(Step 3) The I/O path manager 5000 waits for a clear completion reply from the both virtual storage apparatuses 1000, and re-executes the process from Step 1 after the lapse of a certain period of time.

In the case of this solution, with the resynchronization processing after recovery of the communication failure, the area to perform differential copy can be decided during the Duplex-Pending status by calculating the logical sum of four bitmaps of the primary system and secondary system. Further, although there are many bitmaps in this method, there is no need to pend the write request.

The following third solution is a modified example of the foregoing second solution.

(Initial status) The primary and secondary virtual storage apparatuses 1000 respectively record the location of the write request on both side of the differential bitmaps. Thus, both virtual storage apparatuses 1000 will retain and manage information concerning the differential bitmap side that was previously cleared.

(Step 1) The I/O path manager 5000 issues a differential bitmap clear command to both virtual storage apparatuses 1000. The virtual storage apparatus 1000 that received the clear command clears the write location of the alternative differential bitmap that is not the different bitmap that was cleared previously, and returns a reply to the I/O path manager 5000.

(Step 3) The I/O path manager 5000 waits for a clear completion reply from the both virtual storage apparatuses 1000, and re-executes the process from Step 1 after the lapse of a certain period of time.

9. Read Request Processing Flow

FIG. 11 is a flowchart showing the processing contents when the I/O path manager 5000 receives a read request from the file system 5020.

(S11001) From the file system 5020, the I/O path manager 5000 is called (or receives a message of) a read request function including the identifier of the virtual volume in the host 1100 to become the read destination, read location of the volume, and the read length.

(S11002) The I/O path manager 5000 confirms the failure status of the virtual volume, executes S11021 if it is a normal status and the I/O load against the primary volume is high (for instance, when a given IOPS is exceeded or a given bandwidth is exceeded) or otherwise executes S11003 (no secondary system, secondary system in preparation, normal status, etc.).

(S11003) The I/O path manager 5000 issues a read request to the primary volume.

(S11004) The I/O path manager 5000 confirms the reply of the read request, returns a completion reply to the file system 5020 if it is a normal end or transfers the control to the switch processing at S11010 in other cases.

(S11021) The I/O path manager 5000 issues a read request to the secondary volume.

(S11022) The I/O path manager 5000 confirms the reply of the read request, returns a completion reply to the file system 5020 if it is a normal end or executes S11023 in other cases.

(S11023) The I/O path manager 5000 updates a failure status of the device relation table 5001 to ‘no secondary system,’ and executes S11003.

<9.1. Flow of Switch Processing>

The processing realized by the switch processing is further explained.

(S11011) The I/O path manager 5000 foremost confirms whether the secondary volume is available by referring to the failure status of the device relation table 5001, and returns an error reply to the file system 5020 if it determines that the secondary volume is unavailable or executes S11012 if the secondary volume is available. Incidentally, as a status of being determined as being unavailable, considered may be a status where there is no secondary system (when the secondary virtual storage apparatus 1000 is not functioning due to a failure, or in a case of a volume in which the secondary virtual storage apparatus 1000 is not set to begin with), and the status of initialization in preparation described above.

(S10012) The I/O path manager 5000 issues a remote copy stop command to the secondary virtual storage apparatus 1000 and, after confirming that the copy status entered the Suspend status, issues a copy direction inversion command.

(S10013) The I/O path manager 5000 issues a remote copy resynchronization command to the secondary virtual storage apparatus 1000. Incidentally, there is no need to wait until the resynchronization is actually complete and the pair status enters the Duplex status.

(S10014) The I/O path manager 5000 updates the primary volume identifier of the device relation table 5001 to a volume identifier that was a secondary system theretofore, and switches the primary system and the secondary system. Then, the I/O path manager 5000 sends a read request to the new primary volume through the HBA device driver 5010.

(S10015) The I/O path manager 5000 confirms the reply of the read request, returns a completion reply to the file system 5020 if it is a normal end or returns an error reply if it is an error and ends the processing.

10. Failure Countermeasure Processing Flow

In this section, the flow of processing from the time the I/O path manager 5000 detects a failure until the recovery is complete is explained. Incidentally, this processing is periodically executed in the background.

<10.1. Network Failure between Virtual Storage Apparatuses 1000>

(Step 1) The I/O path manager 5000 monitors the pair status of remote copy and detects the occurrence of some kind of failure by discovering a Failure Suspend status.

(Step 2) The I/O path manager 5000 issues a remote copy stop command to the secondary virtual storage apparatus 1000, inverts the copy direction after confirming that the copy status entered a Suspend status, and inquires the status to the respective virtual storage apparatuses 1000. Then the I/O path manager 5000 updates the failure status of the device relation table 5001 to ‘remote copy failure’ after confirming that no failure has occurred to the self virtual storage apparatus 1000 and that the cause is a network failure. Incidentally, this processing may also utilize the work result of the work performed by the storage administrator.

(Step 3) Wait until the network recovers.

(Step 4) The I/O path manager 5000 issues a pair resynchronization command to the primary virtual storage apparatus 1000.

(Step 5) The I/O path manager 5000 updates the failure status of the device relation table 5001 to ‘secondary system in preparation.’

(Step 6) The I/O path manager 5000 waits for the pair status to become a Duplex status, and thereafter updates the failure status of the device relation table 5001 to ‘normal status.’

<10.2. Failure and Shutdown of Primary Virtual Storage Apparatus 1000>

(Step 1) The I/O path manager 5000 detects the occurrence of a failure by monitoring the status of the primary virtual storage apparatus 1000.

(Step 2) The I/O path manager 5000 switches the subsequent I/O request destination to the secondary virtual storage apparatus 1000 by changing the identifier of the primary volume of the device relation table 5001 to the identifier of the secondary volume, and further updates the failure status to ‘no secondary system.’

(Step 3) The I/O path manager 5000 waits until the old primary (currently secondary switched at Step 2) virtual storage apparatus 1000 recovers.

(Step 4) The I/O path manager 5000 issues a pair resynchronization command or initialization command to the primary virtual storage apparatus 1000.

(Step 5) The I/O path manager 5000 updates the failure status of the device relation table 5001 to ‘secondary system in preparation.’

(Step 6) The I/O path manager 5000 waits for the pair status to become a Duplex status, and then updates the failure status of the device relation table 5001 to ‘normal status.’

<10.3. Failure and Shutdown of Secondary Virtual Storage Apparatus 1000>

(Step 1) The I/O path manager 5000 detects the occurrence of a failure by monitoring the status of the secondary virtual storage apparatus 1000.

(Step 2) The I/O path manager 5000 updates the failure status of the device relation table 5001 to ‘no secondary system.’

(Step 3) The I/O path manager 5000 waits until the secondary virtual storage apparatus 1000 recovers.

(Step 4) The I/O path manager 5000 issues a pair resynchronization command or initialization command to the primary virtual storage apparatus 1000.

(Step 5) The I/O path manager 5000 updates the failure status of the device relation table 5001 to ‘secondary system in preparation.’

(Step 6) The I/O path manager 5000 waits for the pair status to become a Duplex status, and then updates the failure status of the device relation table 5001 to ‘normal status.’

11. Alternative Initialization Method

In the foregoing explanation, although remote copy was configured to the virtual storage apparatus 1000 according to an initialization request issued from the I/O path manager 5000, the opposite method described below can also be considered.

(Step 1) The management host 1200 starts remote copy by issuing a remote copy pair initialization command to the virtual storage apparatus 1000.

(Step 2) The I/O path manager 5000 receives a scanning request.

(Step 3) The I/O path manager 5000 acquires the configuration of remote copy in the respective volumes through the HBA device driver 5010 (status of remote copy configuration, whether it is a copy source or a copy destination, the virtual storage apparatus 1000 to become the other pair and its volume). Incidentally, as the foregoing acquisition method, a SCSI command can be used in the I/O network, or information can be acquired using other communication networks.

(Step 4) The I/O path manager 5000 creates a device relation table 5001 based on the information acquired at the previous step, and starts the processing described above. Incidentally, creation examples of the device relation table 5001 are shown below.

(A) Identifier of the virtual volume in the host 1100=value created by the I/O path manager 5000

(B) Related volume identifier list=identifiers of the copy source volume and the copy destination volume of remote copy

(C) Primary volume=copy source volume remote copy

(D) Failure status=‘normal status’ when the pair status acquired from the virtual storage apparatus 1000 is a Duplex status, ‘secondary system in preparation’ when it is an Initial-Copying status or a Duplex-Pending status, ‘remote copy failure’ when it is a Suspend status or a Failure Suspend status

(E) Pair status=pair status acquired from the virtual storage apparatus 1000

High availability is realized in this embodiment based on the operation of the hardware and programs described above. Incidentally, as countermeasures to be taken when much time is required for the switch processing illustrated in FIG. 10 and FIG. 11, a part of the foregoing switch processing can be executed as preliminary processing when it becomes necessary for the I/O path manager 5000 to re-send the I/O request. Here, the preliminarily performed switch processing can be restored if the re-sent I/O request is returned with a normal reply, and the remaining portions of the foregoing switch processing can be executed if the re-sent I/O request is returned with error reply, or there is no reply. Further, in this embodiment, all volumes may be virtualized with the virtual storage apparatus 1000, the entity may be a virtual volume in the storage apparatus 1500, and the virtual storage apparatus 1000 may be an apparatus dedicated to virtualization, or contrarily a constitution where the entity of all volumes is inside the virtual storage apparatus 1000 may be adopted. Moreover, in addition to the capacity, various other attributes may be configured to the volumes provided by the virtual storage apparatus 1000 (for instance, an emulation type or a volume identification number acquirable with an Inquiry command defined based on a SCSI standard).

Such attribute information and attribute change are also transferred from the primary virtual storage apparatus to the secondary virtual storage apparatus based on remote copy, and these may also be managed in both virtual storage apparatuses.

12. Alternative Read/Write Processing

In the write/read processing illustrated in FIG. 10 and FIG. 11, the I/O path manager 5000 specifically transfers the operation of remote copy to the virtual storage apparatus 1000. Nevertheless, since the operation of remote copy may differ for each vendor of the virtual storage apparatus 1000, there are cases when it would be more preferable not to include such operation in the write processing and read processing of the I/O path manager 5000. FIG. 25 to FIG. 27 show the processing contents of such a form. Incidentally, although there are cases below where the processing subject of various processes is explained as the “virtual storage apparatus 1000,” in reality, it goes without saying that the processor 1101 (FIG. 1) of the virtual storage apparatus 1000 executes the corresponding processing based on programs stored in the memory 1012 (FIG. 1).

<12.1. Write Processing of I/O Path Manager>

FIG. 25 is a flowchart showing the general processing contents of FIG. 10 to be executed by the I/O path manager 5000. FIG. 25 differs from the FIG. 10 in the following points.

(Difference 1) The operation of remote copy at steps S10012, S10013 and S10021 is skipped.

(Difference 2) The routine does not reach step S10020 of the flow during remote copy failure. Nevertheless, these differences only occur when it is not possible to identify an error message signifying remote copy failure in normal read/write processing.

FIG. 27 is a diagram showing the operation of remote copy to be performed when the virtual storage apparatus 1000 receives a write request.

(S27001) The virtual storage apparatus 1000 receives a write request.

(S27002) The virtual storage apparatus 1000 determines whether the target volume of the write request is related to remote copy, and executes S27003 when it is unrelated, and executes S27004 when it is related.

(S27003) The virtual storage apparatus 1000 performs normal write processing, returns a reply to the host 1100 and ends this processing.

(S27004) The virtual storage apparatus 1000 determines the remote copy attribute of the target volume of the write request, and executes S27005 when it is a copy source attribute, and executes S27011 when it is a copy destination attribute.

(S27005) The virtual storage apparatus 1000 executes synchronous remote copy processing, transfers write data to the secondary storage, and waits for a reply.

(S27006) The virtual storage apparatus 1000 determines whether the copy was successful, and executes S27008 if the copy was successful, and executes S27007 is the copy was unsuccessful.

(S27007) The virtual storage apparatus 1000 changes the status of the remote copy pair in which the target volume will become the copy source to a Failure Suspend status. However, writing to this volume is not prohibited.

(S27008) The virtual storage apparatus 1000 performs normal write processing, returns a reply to the host 1100, and ends this processing.

(S27011) The virtual storage apparatus 1000 stops remote copy, and inverts the relationship of the copy source and the copy destination.

(S27012) The virtual storage apparatus 1000 starts the resynchronization processing.

(S27013) The virtual storage apparatus 1000 performs normal write processing, returns a reply to the host 1100, and then ends this processing.

Incidentally, it is not necessary to wait until the resynchronization processing at S27012 is complete. This is because the virtual storage apparatus 1000 executing S27012 is a secondary system, the primary virtual storage apparatus 1000 is not necessarily operating normally, and much time may be required until the resynchronization processing is complete. Incidentally, the foregoing case is the same in that it can be recovered with the processing described in <10. Failure Measure Processing Flow>.

<12.3. Read Processing of I/O Path Manager>

FIG. 26 is a flowchart showing the general processing contents of FIG. 11 to be executed by the I/O path manager 5000. FIG. 26 differs from the FIG. 11 in the following point.

(Difference 1) The operation of remote copy at steps S11012 and S11013 is skipped.

Incidentally, although in FIG. 11 the direction of remote copy was inverted according to the read processing, the remote copy direction is not inverted in this processing. This is because, in addition to cases where the primary virtual storage apparatus 1000 will not return a reply to the read request to the secondary virtual storage apparatus 1000 (including cases caused by a communication failure between hosts=virtual storage apparatuses), there are cases where this is caused by the excess load of the primary virtual storage apparatus 1000. Thus, if the secondary virtual storage apparatus 1000 performs the pair inversion of remote copy triggered by the read request to the copy destination volume, the pair will be inverted with the read request that just happened to be issued to the secondary virtual storage apparatus 1000, and the pair will be inverted once again with the subsequent read request, and the read performance will deteriorate as a result.

Nevertheless, when the execution of S11021 is inhibited, the virtual storage apparatus 1000 may perform pair inversion of remote copy by performing the following processing upon read processing.

(Step 1) The virtual storage apparatus 1000 receives a read request.

(Step 2) The virtual storage apparatus 1000 performs normal read processing.

(Step 3) The virtual storage apparatus 1000 determines whether the read-target volume is the copy destination volume of remote copy, and executes subsequent Step 4 if so, and ends this processing if not.

(Step 4) The virtual storage apparatus 1000 stops remote copy, and inverts the relationship of the copy source and the copy destination.

(2) Second Embodiment

The second embodiment is now explained with reference to FIG. 12. The second embodiment differs from the first embodiment in that the storage apparatus 1500L is coupled to a plurality of virtual storage apparatuses 1000L, 1000R, and these virtual storage apparatuses 1000L, 1000R share the volumes in the storage apparatus 1500L to enable the continuation of service at a lower cost than the first embodiment even when one of the virtual storage apparatuses 1000L, 1000R shuts down.

Nevertheless, since the virtual storage apparatuses 1000L, 1000R include cache memories 1020L, 1020R, in preparation for a case when the primary virtual storage apparatus 1000L shuts down due to a disaster immediately after write data is written into the virtualization volume, it is necessary to also store the write data into the cache memory 1020R of the secondary virtual storage apparatus 1000R, and the destaging and staging of both virtual storage apparatuses 1000L, 1000R must be devised accordingly.

A write request in a normal status is processed according to the following steps.

(Step 1) The primary virtual storage apparatus 1000L that received a write request from the host 1100 determines whether the write request is addressed to the volume 3000LA corresponding to the HDD 1030 inside the virtual storage apparatus 1000L, addressed to the virtualization volume (hereinafter referred to as the “shared virtualization volume”) 3000LB provided by both virtual storage apparatuses 1000L, 1000R by sharing the volume 3500L of the storage apparatus 1500L, or addressed to the normal virtualization volume. Incidentally, processing other than the shared virtualization volume 3000LB is the same as the processing of the first embodiment.

(Step 2) The primary virtual storage apparatus 1000L stores the write data in its internal cache memory 1020L, stores the write data in the cache memory 1020R of the secondary virtual storage apparatus 1000R based on a remote copy program, and thereafter returns a normal reply to the host 1100.

(Step 3) The caching algorithm of the primary virtual storage apparatus 1000L decides the data in the cache memory 1020L to be destaged, and destages the data to the volume of the storage apparatus 1500L.

(Step 4) After destaging is complete, the primary virtual storage apparatus 1000L commands the secondary virtual storage apparatus 1000R to discard the address of data in the destaged cache memory 1020L. Incidentally, the secondary virtual storage apparatus 1000R that received the command discards the target data from the cache memory 1020R.

Incidentally, in this constitution, when switching of the I/O request is conducted to the secondary virtual storage apparatus 1000R in a state where the network between the virtual storage apparatuses 1000L, 1000R is disconnected, there are cases where the virtual storage apparatuses 1000L, 1000R will both autonomously perform destaging as primary systems. In order to avoid this kind of situation, when both virtual storage apparatuses 1000L, 1000R are to perform processing as primary systems, they may foremost perform exclusion control using a function such as SCSI Reserve or the like to the volume 3500L shared in the storage apparatus 1500L. Further, as another method, caching of virtual storage apparatus 1000L may be invalidated regarding the shared virtualization volume 3000LB, and, in such a case, when the access authority of the shared virtual volume 3000LB is changed to a read-only access authority, caching may be validated according to such change.

(3) Third Embodiment

The third embodiment is now explained with reference to FIG. 13. In this embodiment, the information system described in the foregoing embodiments is separately prepared at a remote site (backup site) that is different from the production site to perform remote copy, and the service can be resumed at the backup site when the production site is subject to a disaster.

Incidentally, in the following explanation, there are cases where the foregoing “virtual storage apparatus” is referred to as a storage apparatus, the “copy source volume” as a primary volume, the “copy destination volume” as a secondary volume, the “primary system” as an active side, and the “secondary system” as a standby side. Further, the information systems of the production site and the backup site may be collectively referred to as a remote copy system.

<1. Constitution of Remote Copy System>

In this embodiment, each site is constituted of hosts 13010, 13020 and a plurality of storage subsystems 13001, 13002, 13003, 13004. At the production site, the storage subsystems 13001, 13002 jointly adopt the high availability constitution described above. Moreover, at the backup site also, the storage subsystems 13003, 13004 jointly adopt the high availability constitution.

Further, in this embodiment, synchronous or asynchronous remote copy is performed from the active-side storage subsystem (with a copy source volume) 13001 of the production site to the active-side storage subsystem (with a copy destination volume) 13003 of the backup site. When the production site is subject to a disaster, the host 1310 of the backup site issues an I/O request to active side of the storage subsystems 13003, 13004 of a high availability constitution, and the re-booted application 2010 thereby resumes the processing.

Incidentally, as described above, a storage subsystem refers to both concepts including a constitution that does not use the virtualization function of the virtual storage apparatus 1000 (FIG. 1), as well as to a constitution where the virtual storage apparatus 1000 provides a virtualization volume using the virtualization function based on a combination of the virtual storage apparatus 1000 and the storage apparatus 1500 (FIG. 1). Further, in this embodiment, each storage subsystem 13001, 13002, 13003, 13004 may adopt separate internal constitutions (for instance, configuring only the storage subsystem 13001 with the virtual storage apparatus 1000 without using the virtualization function, or sharing the storage apparatus 1500 (FIG. 1) with the storage subsystems 13003 and 13004 of the backup site, but not sharing the same on the production site side).

Incidentally, although there are cases below where the processing subject of various processes is explained as the “storage subsystem,” in reality, it goes without saying that the processor of the storage subsystem executes the corresponding processing based on programs stored in the memory of the storage subsystem.

<2. Processing>

When the application 2010 of the host 1301 of the production site issues a write request, the OS determines the active-side storage subsystem in the production site, and transfers the write request thereto. Incidentally, the storage subsystem 13001 corresponds to this in FIG. 13.

The active-side storage subsystem 13001 of the production site transfers write data to the standby-side storage subsystem (13002 corresponds to this in FIG. 13) in the production site based on synchronous remote copy. Further, the active-side storage subsystem 13001 transfers write data to the active-side storage subsystem (13003 corresponds to this in FIG. 13) of the backup site as synchronous or asynchronous remote copy (since only the active side processes the write request in the high availability constitution in this embodiment, remote copy is also similarly processed on the active side). The active-side storage subsystem 13003 in the backup site that received the write data transfers the received write data to the standby-side storage subsystem 13004 in the site based on synchronous remote copy.

Thus, the storage subsystems 13001, 13002 of the production site are keeping track of the active-side storage subsystem of the backup site, and the storage subsystems 13003, 13004 of the backup site are also keeping track of the active storage subsystem (storage subsystem 1301) of the production site so that they will not accept remote copy from an unexpected storage subsystem.

As a result of the foregoing processing, high availability is realized in both the production site and the backup site. However, the backup site may be of a constitution that does not adopt the high availability constitution for reduction of costs.

<3. Asynchronous Remote Copy>

Unlike with synchronous remote copy described above, asynchronous remote copy does not transfer write data at the time a write request arrives from the host 13010, but rather transfers such write data after the request completion reply (to put it differently, asynchronous remote copy transfers write data in a timing independent from the request reply to the host 13010). Thus, with asynchronous remote copy, it is possible to perform remote copy without deteriorating the response time of the write request even when the communication delay is significant because the distance between the sites is long. Nevertheless, with asynchronous remote copy, it is necessary to buffer write data in the storage subsystem 13001 on the side of the production site. The following methods for buffering write data may be considered.

(1) The storage subsystem 13001 of the production site creates a journal containing write data to the copy source volume and sequence information of such write data, stores this in its own cache memory or a dedicated volume, transfers this journal to the storage subsystem 13003 of the backup site, and the storage subsystem 13003 of the backup site stores write data in the copy destination volume by referring to the sequence information of the journal. Thereby, when the production site is subject to a disaster, it is possible to provide data with a protected write sequence (more specifically, write data with dependence on the side of the backup site.

(2) The storage subsystem 13001 of the production site groups the data written into the copy source volume every given period and stores such group in its own cache memory or a dedicated volume, transfers this asynchronously to the storage subsystem 13003 of the backup site, and stores data in group units in the copy destination volume of the storage subsystem 13003 of the backup site.

Thus, unless the write data to be buffered for asynchronous remote copy is also retained in the standby-side storage subsystem 13002, it will not be possible to succeed the asynchronous remote copy when the active-side storage subsystem 13001 shuts down. Thus, the active-side storage subsystem 13001 of the production site conveys, in addition to write data, information of the copy destination volume, foregoing sequence information or timing of performing the grouping process to the standby-side storage subsystem 13002, and the standby-side storage subsystem 13002 creates buffering data for asynchronous remote copy as the same as the active side according to such information.

Incidentally, since the storage subsystem 13003 of the backup site buffers the write data received from the production site without immediately storing it in the copy destination volume, the standby side needs to similarly create buffering data according to commands from the active side as with the production site, and store the write data in the copy destination volume at the same timing.

(4) Fourth Embodiment

The fourth embodiment is now explained with reference to FIG. 14. This embodiment explains the constitution of an interface (function I/F) for controlling the function provided by a storage apparatus in an information system configured redundantly by two storage apparatuses using synchronous remote copy described above.

Incidentally, from this embodiment to the fourteenth embodiment, the components referred to as virtual storage apparatuses 1000L, 1000R and storage apparatuses 1500L, 1500R heretofore are respectively referred to as storage apparatuses 15000A, 15000B and external storage apparatuses 16000A, 16000B. Further, although there are cases below where the processing subject of various processes is explained as the “storage apparatuses 15000A, 15000B” or the “external storage apparatuses 16000A, 16000B,” in reality, it goes without saying that the processors (not shown) of the storage apparatuses 15000A, 15000B or the processors (not shown) of the external storage apparatuses 16000A, 16000B execute the corresponding processing based on programs stored in the memory of the storage apparatuses 15000A, 15000B or the external storage apparatuses 16000A, 16000B.

This embodiment illustrates an example where, after a function control request from the host 14000 is sent to the storage apparatus 15000A, the storage apparatus 15000A transfers the function control request to the storage apparatus 15000B, and both storage apparatuses 15000A, 15000B interpreting and executing such function control request.

The command device 15002A and the command device 15002B are respectively the logical volumes provided by the storage apparatus 15000A and the storage apparatus 15000B, and act as an interface with the host 1400 that controls the function. Incidentally, in this embodiment, it is hypothesized that the command device 15002A is the active side.

Further, based on synchronous remote copy, contents of the command device 15002A and contents of the command device 15002B will constantly coincide. The command device 15002A and the command device 15002B are provided to the function management program 14003 as one volume 14004 based on the path management function (corresponds to the function provided by the I/O path manager 5000 (FIG. 1)) provided by the operating system 14001.

The logical volume 15001A and the logical volume 15001B are respectively logical volumes provided by the storage apparatus 15000A and the storage apparatus 15000B, and logical volumes that are subject to the function control. Incidentally, in this embodiment, the logical volume 15001A is hypothesized as the active side.

Further, based on synchronous remote copy, contents of the logical volume 15001A and contents of the logical volume 15001B will constantly coincide. The logical volume 15001A and the logical volume 15001B are provided to the application program 14002 as one volume 14006 based on the path management function provided by the operating system 14001.

Incidentally, there may be a plurality of logical volumes to be subject to the function control described above.

The function control request processing unit 14005 of the function management program 14003 receives a function control request from the user or another program in the host 14000 or a program in a separate host (management host or the like) from the host 14000. The function control request processing unit 14005 that received the function control request reads/writes contents of the control request to the volume 14004 from and into the volume 14004. In this embodiment, since the command device 15002A is an active side, the write/read command is issued to the command device 15002A.

Writing into the command device 15002A is used to boot the function control, and reading from the command device 15002A is used to obtain the output value of the result of the function control.

The control request received by the function control request processing unit 14005 contains information (also referred to as “apparatus information”) for uniquely identifying the control-target storage apparatuses 15000A, 15000B, information (also referred to as “volume information”) for uniquely identifying the control-target logical volumes 15001A, 150001B, and information incidental to the function control.

The control I/F processing unit 15003A of the storage apparatus 15000A detects that a control request has been written into the command device 15002A. The control I/F processing unit 15003A determines whether the apparatus information of the control request coincides with the self-storage apparatus (storage apparatus 15000A) (determination 100). In this embodiment, since the command device 15002A is the active side, the determination result will be “Match.” In the case of a match, the control I/F processing unit 15003A calls the function processing unit 15004A to execute prescribed function control to the logical volume 15001A corresponding to the volume information. As a specific example, there is a referral operation of a pair status of a certain logical copy function (described later) as one function provided by the storage apparatus 15000A. When this operation is called to the logical volume 15001A, the function processing unit 15004A refers to the management information of the local copy function, and, after acquiring the pair status, sends the pair status to the function control request processing unit 14005 via the control I/F processing unit 15003A, the command device 15002A and the volume 14004.

Meanwhile, although the control I/F processing unit 15003B of the storage apparatus 15000B performs similar processing, in this embodiment, since the command device 15002B is the standby side, the result of determination 100 will be “No Match.” In this case, the control I/F processing unit 15003B refers to the pair management information of synchronous remote copy, and specifies the logical volume (corresponds to the logical volume 15001B) in the self-storage apparatus (storage apparatus 15000B) corresponding to the volume information (corresponds to the logical volume 15001A). Then, the control I/F processing unit 15003B calls the function processing unit 15004B to execute prescribed function control to the logical volume 15001B.

It is thereby possible to execute prescribed function control to the logical volume 15001A of the storage apparatus 15000A and the logical volume 15001B of the storage apparatus 15000B.

In this embodiment, although a case was explained relating to the referral operation of the pair status of the local copy function provided by the storage apparatuses 15000A, 15000B, this embodiment can be applied to the operation of various functions provided by the storage apparatuses 15000A, 15000B such as (1) other pair operations (pair creation, pair split, etc.) of the local copy function, (2) various pair operations of the local copy function provided by the storage apparatuses 15000A, 15000B, (3) operation of the security function (LDEV guard function described later) to the logical volumes 15001A, 15001B provided by the storage apparatuses 15000A, 15000B, (4) operation of the logical snapshot function (explained later) provided by the storage apparatuses 15000A, 15000B, and so on.

Incidentally, as a different mode of execution, upon receiving a command to be issued to both storage apparatuses 15000A, 15000B on the active side and standby side, a case may be considered where the active-side storage apparatus 15000A processes the received command and transfers it to the standby-side storage apparatus 15000B to perform the command processing, and start both storage processing with a single command from the host 14000. Further, in the case of a command concerning the acquisition of the program status, a case may also be considered where the active-side storage apparatus 15000A that received the command transfers the same command to the standby-side storage apparatus 15000B to acquire the status, and the active-side storage apparatus 15000A returning the status to the command source after comparing both statuses.

(5) Fifth Embodiment

This embodiment describes a separate constitution of the function I/F. The constitution of this embodiment is explained with reference to FIG. 15.

The constitution of this embodiment is roughly the same as the constitution illustrated in FIG. 14. The differences with FIG. 14 are as following three points:

(1) The command device 15002A and the command device 15002B are not a pair of synchronous remote copy;

(2) The function management program 14003 recognizes the command device 15002A and the command device 15002B as separate volumes 14004A, 14004B; and

(3) The function control request processing unit 14005 sends the function control request to the command device 15002A and the command device 15002B.

In this embodiment, as with the fourth embodiment, the control request received by the function control request processing unit 14005 contains information (also referred to as “apparatus information”) for uniquely identifying the control-target storage apparatuses 15000A, 15000B, information (also referred to as “volume information”) for uniquely identifying the control-target logical volumes 15001A, 150001B, and information incidental to the function control.

In this embodiment, unlike the fourth embodiment, as described above, the function control request processing unit 14005 that received the function control request from the user or another program in the host 14000 or a program in a separate host from the host 14000 sends a control request to both command devices 15002A, 15002B.

Incidentally, the control request may also be rewritten such that the function control request processing unit 14005 determines the apparatus information, designates the logical volume 15001A as the volume information to the command device 15002A, and designates the logical volume 15001B as the volume information to the command device 15002B.

Further, the user or another program in the host 14000 or a program in a separate host from the host 14000 may identify the storage apparatuses 15000A, 15000B, and issue different control requests in duplicate to the storage apparatuses 15000A, 15000B. In other words, a control request of the logical volume 15001A is issued to the command device 15002A, and a control request of the logical volume 15001B is issued to the command device 15002B.

(6) Sixth Embodiment

This embodiment describes a separate constitution of the function I/F. The constitution of this embodiment is explained with reference to FIG. 16.

The sixth embodiment is roughly the same as the fourth embodiment. The differences with the fourth embodiment are as follows.

(1) The host 14000, the storage apparatus 15000A, and the storage apparatus 15000B are mutually connected with an interconnection network such as a LAN (Local Area Network). Incidentally, these components may be directly connected via a LAN, or connected via a switch.

(2) The constitution does not include a command device, and the communication among the three components (host 14000, storage apparatus 15000A and storage apparatus 15000B) is conducted via the LAN.

(3) The function control request processing unit 14005 sends a control request to the control I/F processing unit 15003A via the LAN.

(4) The control I/F processing unit 15003A that received the control request sends a control request to the control I/F processing unit 15003B via the LAN.

The point of processing the control request received by the control I/F processing units 15003A, 15003B is the same as the fourth embodiment, and the sixth embodiment is able to provide an equivalent function I/F as the fourth embodiment.

(7) Seventh Embodiment

This embodiment describes a separate constitution of the function I/F. The constitution of this embodiment is explained with reference to FIG. 17.

The seventh embodiment is roughly the same as the sixth embodiment. The differences with the sixth embodiment are as follows.

(1) The function control request processing unit 14005 sends a control request to both control I/F processing units 15003A, 15003B via the LAN.

(2) The control I/F processing unit 15003A does not sends a control request to the control I/F processing unit 15003B.

The point of processing the control request received by the control I/F processing units 15003A, 15003B is the same as the sixth embodiment, and the seventh embodiment is able to provide an equivalent function I/F as the sixth embodiment.

(8) Eighth Embodiment

In this embodiment, a case is explained of applying a security function (LDEV security function) to the logical volumes in the storage apparatus.

FIG. 18 shows an embodiment of the LDEV security function. The constitution of this embodiment is roughly the same as FIG. 14. The difference with FIG. 14 is the addition of logical volume security information 15005A, 15005B. The logical volume security information 15005A, 15005B is used for access control from the host 14000 to the logical volumes 15001A, 15001B in the storage apparatuses 15000A, 15000B. As an example of access control, in order to inhibit the falsification of data in the logical volumes 15001A, 15001B, there is control for completely prohibiting the write access to the logical volumes 15001A, 15001B. Further, as a separate example, there is a function of prohibiting writing for a prescribed period to data obligated to be stored for a given period of time under laws and ordinances. Moreover, as another example, there is a function of prohibiting the read/write access from a specific host from the perspective of protecting confidential information.

Even in a constitution that seeks redundancy based on synchronous remote copy using the two storage apparatuses 15000A, 15000B as shown in FIG. 18, there are cases where it would be desirable to apply the LDEV security function. In this case also, it is possible to control the LDEV security function using the function I/F explained in the fourth embodiment. Specifically, it will suffice to set parameters concerning the LDEV security in the logical volume security information 15005A, 15005B storing security information of the target volume and referring to the same in the function processing unit 15004.

(9) Ninth Embodiment

In this embodiment, explained is a case of applying a logical copy function to the logical volumes in the storage apparatus.

A local copy function is the function of creating a replication of a volume designated by the user in the storage apparatus that is the same as the copy source volume. The replication of the volume created using this function is accessed by the host for data mining or tape backup, or stored for a long time as backup data. When using the local copy function, a volume in which a replication is to be created and the volume of the replication destination are designated as a pair (copy pair), and a replication can be created by the user operating the pair. In the following explanation, the replication-target volume is sometimes referred to as a primary volume, and the replication destination volume is sometimes referred to as a secondary volume. In this embodiment, the availability is improved by coordinating the local copy function with the active-side storage apparatus and the standby-side storage apparatus.

FIG. 19 shows an embodiment of the local copy function. In FIG. 19, the host 14000 is coupled to the storage apparatus 15000A and the storage apparatus 15000B. Further, the storage apparatus 15000A is coupled to the external storage apparatus 16000A, and the storage apparatus 15000B is coupled to the external storage apparatus 16000B. Moreover, the local copy function and the differential bitmap (information showing the differential status between the primary volumes 15006A, 15006B and the secondary volumes 15007A, 15007B) are executed and managed by the storage apparatus 15000A and the storage apparatus 15000B.

This embodiment shows a constitution example where the primary volumes 15006A, 15006B are in the storage apparatuses 15000A, 15000B, and the secondary volumes 15007A, 15007B are in the external storage apparatuses 16000A, 16000B. The primary volume 15006A and the secondary volume 15007A are a pair, and the entity of the secondary volume 15007A is in the external volume 16001A. Similarly, the primary volume 15006B and the secondary volume 15007B are a pair, and the entity of the secondary volume 15007B is in the external volume 16001B.

<Operation in Duplex Status>

The Duplex status is one of the pair statuses, and is a status where background copy described later is being performed from the primary volumes 15006A, 15006B to the secondary volumes 15007A, 15007B.

The read/write processing in the Duplex status is explained below. Incidentally, the following explanation of the read/write processing is subject to the active side of the target volumes (primary volumes 15006A, 15006B) of the read/write processing being the storage apparatus 15000A.

The read processing is foremost explained. The operating system 14001 that received the read request from the application program 14002 determines whether the active-side storage is the storage apparatus 15000A or the storage apparatus 15000B based on the path management function (in relation to the read-target primary volume), and issues a read request to the active-side storage apparatus 15000A. The active-side storage apparatus 15000A that received the read request sends read data to the host 14000. The application program 14002 receives the read-target data via the operating system 14001. This read processing is thereby complete.

Overview of the write processing is now explained. The operating system 14001 that received the write request from the application program 14002 determines whether the active-side storage apparatus is the storage apparatus 15000A or the storage apparatus 15000B based on the path management function (in relation to the write-target primary volume), and issues a write request to the active-side storage apparatus 15000A. The storage apparatus 15000A that received the write request receives the write data, stores the write data in the cache memory not shown, and sets the bit of the differential bit corresponding to the write data to 1 (ON).

Further, the write data is thereafter copied (synchronous remote copy) from the cache memory in the storage apparatus 15000A to the primary volume 150066 in the storage apparatus 15000B based on the remote copy function. Incidentally, the method of synchronous remote copy is as explained above. The storage apparatus 15000B that received the write data from the storage apparatus 15000A based on synchronous remote copy stores the write data in the cache memory not shown, and sets the bit of the differential bitmap corresponding to the write data to 1 (ON). Thereafter, the storage apparatus 15000B sends a write completion report to the storage apparatus 15000A, and the storage apparatus 15000A that received the write completion report sends a write completion report to the host 14000.

Incidentally, the write data written respectively in the primary volume 15006A of the storage apparatus 15000A and the primary volume 150066 of the storage apparatus 15000B is copied to the secondary volumes 15007A, 15007B in asynchronously with the writing in the primary volumes 15006A, 15006B (this processing is hereinafter referred to as “background copy processing”).

Background copy is performed by periodically monitoring the differential bitmap, copying data of the area recorded as having a differential (in other words, the bit is ON) from the primary volumes 15006A, 15006B to the secondary volumes 15007A, 15007B, and clearing the bit (OFF or 0) after the copy is complete.

Meanwhile, the standby-side storage apparatus 15000B also performs similar processing triggered at the time the write data arrived based on synchronous remote copy.

Incidentally, the present invention may adopt a constitution other those described above, and the primary volumes 15006A, 15006B may be in the external storage apparatus 16000A, or may be in the storage apparatuses 15000A, 15000B. The same applies to the secondary volumes 15007A, 15007B may also be in the external storage apparatus 16000A, or in the storage apparatuses 15000A, 15000B.

When some kind of failure occurs and the read/write request to the primary volume 15006A in the active-side storage apparatus 15000A can no longer be processed, as described above, the operating system 14001 continues access by switching the target of the read/write request to the primary volume 15006B. In this case also, since a local copy pair exists in the storage apparatus 15000B, backup processing and the like described above can be performed using the secondary volume 15007B.

<Operation of Pair Split and Suspend Status>

The Suspend status is one of the pair statuses, and indicates a status where the image of the secondary volumes is decided. In this status, contents of the primary volumes and contents of the secondary volumes do not coincide, and the differential between the primary volumes and the secondary volumes is managed with the differential bitmap. Further, in this status, since the secondary volumes are in a stationary status, the user is able to perform backup processing and the like described above.

The host 14000 stops the operation of background copy explained above when making the pair of the Duplex status of local copy to a Suspend status (this is referred to as a “Pair Split”). The Pair Split is implemented via the function I/F explained in the fourth to seventh embodiments.

(1) The host 14000 issues a stop command of local copy to the virtual storage apparatuses 15000A, 15000B via the function I/F. Normally, on the side of the host 14000, issuance of the I/O request is stopped immediately before the foregoing stop command.

(2) The active-side and standby-side virtual storage apparatuses 15000A, 15000B complete the background copy of areas that are turned ON in the differential bitmap. The host 14000 receives a message indicating that the background copy in both virtual storage apparatuses 15000A, 15000B is complete from the active-side storage apparatus 15000A or from both storage apparatuses 15000A, 15000B.

(3) The host 14000 receives the message, and thereafter resumes the I/O issuance.

As a result of the processing up (2) above, the volume pair existing respectively in the active-side and standby-side virtual storage apparatuses 15000A, 15000B becoming a Suspend status is confirmed. At this point, the pair status in both storage apparatuses 15000A, 15000B will be a Split status. Incidentally, the write location of the write request issued to the primary volume or the secondary volume during the Split is recorded in the differential bitmap for the pair resynchronization described later.

The subsequent read/write request processing is roughly the same as the Duplex status. The difference from the Duplex status is that the background copy processing is not operated.

<Pair Creation>

The status where the primary volume and the secondary volume are not of a pair relationship is referred to as a Simplex status. The processing for changing the Simplex status to the Duplex status is referred to as a pair creation. The transient state of changing the pair status from the Simplex status to the Duplex status is referred to as an Initial-Copying status.

The pair creation command is implemented via the function I/F explained with reference to fourth to seventh embodiment.

(1) The host 14000 issues a pair creation command to the virtual storage apparatus 15000A via the function I/F. As a result, the pair creation processing is started in both the active-side and standby-side storage apparatuses 15000A, 15000B.

(2) Both storage apparatuses 15000A, 15000B set the pair status to an Initial-Copying status, turns ON all differential bitmaps, and starts background copy.

(3) When the background copy is completed until the end of the differential bitmap, the virtual storage apparatuses 15000A, 15000B set the pair status to the Duplex status.

Incidentally, the read/write processing in the Initial-Copying status is the same as the read/write processing in the Duplex status.

<Pair Resynchronization>

The operation of changing the pair status from a Suspend status to a Duplex status is referred to as pair resynchronization. The transient status of changing the pair status from the Suspend status to the Duplex status is referred to as a Duplex-Pending status.

The pair resynchronization command is implemented via the function I/F explained in the fourth to seventh embodiments.

(1) The host 14000 issues a pair resynchronization command to the storage apparatus 15000A via the function I/F. As a result, the pair resynchronization processing is started at both the active-side and standby-side storage apparatuses 15000A, 15000B.

(2) The both storage apparatuses 15000A, 15000B set the pair status to Duplex-Pending, and starts background copy.

(3) When the background copy is completed until the end of the differential bitmap, the storage apparatuses 15000A, 15000B set the pair status to the Duplex status.

The read/write processing in the Duplex-Pending status is the same as the read/write processing in the Duplex status.

(10) Tenth Embodiment

This embodiment explains a local copy function that is different from the ninth embodiment. FIG. 20 shows a constitution example of the information system according to this embodiment.

Foremost, the difference in constitution between this embodiment and the ninth embodiment is that there is no external storage apparatus 16000B, the storage apparatus 15000B and the external storage apparatus 16000A are connected via an I/O network, and the entities of the secondary volumes 15007A, 15007B are all mapped to become the external volume 16001A in the external storage apparatus 16000A. The remaining constitution is the same as the ninth embodiment.

As a result of adopting the foregoing constitution, it is possible to eliminate the physical storage apparatus required by the secondary volumes 3000LB, 3000RB.

The major difference in the processing operation between this embodiment and the ninth embodiment is that the standby-side storage apparatus 15000B does not perform background copy to the external volume 16001A, and only operates the pair status and differential bitmap 15010B as control information concerning the pair through communication with the storage apparatus 15000A.

The details of this processing operation are explained below.

<Operation in Duplex Status>

The read/write processing in the Duplex status is explained below.

The read processing is the same as the read processing of the ninth embodiment.

The write processing is as follows. The operating system 14001 that received the write request from the application program 14002 determines whether the active side is the storage apparatus 15000A or the storage apparatus 15000B based on the path management function (in relation to the write-target primary volume), and issues a write request to the active-side storage apparatus 15000A. The storage apparatus 15000A that received the write request receives write data, stores the write data in the cache memory, and sets the bit of the corresponding differential bitmap 15010A to 1 (ON).

Thereafter, the write data is copied from the primary volume 15006A in the storage apparatus 15000A to the primary volume 150068 in the storage apparatus 15000B based on the synchronous remote copy function. Incidentally, the method of synchronous remote copy is as described above. The storage apparatus 15000B that received the write data from the storage apparatus 15000B based on the synchronous remote copy function stores the write data in the cache memory, and sets the bit of the differential bitmap 15010B corresponding to the write data to 1 (ON). The storage apparatus 15000B thereafter sends a write completion report to the storage apparatus 15000A, and the storage apparatus 15000A that received the write completion report sends a write completion report to the host 14000.

Incidentally, the data written into the primary volume 15006A of the storage apparatus 15000A is background-copied to the secondary volume 15007A asynchronously with the writing into the primary volume 15006A. Unlike the write processing in the ninth embodiment, the data written into the primary volume 150068 of the storage apparatus 15000B is not subject to background copy.

The background copy processing in the storage apparatus 15000A periodically monitors the differential bitmap 15010A, copies the data of areas recorded as having a differential (in other words, bit is ON) from the primary volume 15006A to the secondary volume 15007A, and clears the bit after the copy is complete (OFF or 0). Incidentally, this embodiment, unlike the write processing in the ninth embodiment, background copy is not performed on the side of the storage apparatus 15000B.

Subsequently, unlike the write processing in the ninth embodiment, the storage apparatus 15000A notifies the location information of the cleared bit to the storage apparatus 15000B. The storage apparatus 15000B that received the notice clears the bit (differential bit) in the storage apparatus 15000B corresponding to the foregoing bit. Incidentally, notification of the location information of the differential bit is conducted via a command device in the storage apparatus 15000B. Nevertheless, in a constitution where the storage apparatuses 1500A, 15000B are connected via a LAN, the notification may also be made through communication via the LAN. In the following explanation, let it be assumed that the communication concerning the control information of functions such as the differential bit and pair status between the storage apparatus 15000A and the storage apparatus 15000B is conducted via the command device or the LAN.

When some kind of failure occurs and the I/O request to the active-side primary volume 15006A can no longer be processed, the operating system 14001, as with the ninth embodiment, continues access by switching the target of the I/O request to the primary volume 15006B.

<Operation of Pair Split and Suspend Status>

When the host 14000 is to change the pair of the Duplex status of local copy to a Split status, it performs pair split as in the ninth embodiment. Incidentally, although stop processing of background copy is performed in pair split, in this embodiment, stop processing is not actually performed since background copy is not performed in the storage apparatus 15000B.

The subsequent I/O request processing is roughly the same as in the Duplex status. The difference with the Duplex status is that the background copy processing does not operate in the storage apparatus 15000B.

<Pair Creation>

The pair creation command is the same as the ninth embodiment in that it is implemented via the function I/F explained in the fourth to seventh embodiments.

(1) The host 14000 issues a pair creation command to the storage apparatus 15000A via the function I/F. As a result, the pair creation processing is started at both the active-side and standby-side storage apparatuses 15000A, 15000B.

(2) Both storage apparatuses 15000A, 15000B set the pair status to an Initial-Copying status. The storage apparatus 15000A turns ON all differential bitmaps 15010A and starts background copy. Unlike the ninth embodiment, the storage apparatus 15000B turns ON all differential bitmaps 15010B, but does not perform background copy.

(3) Operation for clearing the differential bit corresponding to areas to which background copy in the storage apparatus 15000A is complete, and the incidental operations (notification of the location information of the differential bit and clearing of the differential bit) are the same as the operations in the Duplex status.

(4) Unlike the ninth embodiment, when the background copy is completed until the end of the differential bitmap 15010A, the storage apparatus 15000A sets the pair status to a Duplex status, and notifies the storage apparatus 15000B that the pair status has changed to a Duplex status. The storage apparatus 15000B that received the notification sets the pair status to a Duplex status.

The read/write processing in the Initial-Copying status is the same as the read/write processing in the Duplex status.

<Pair Resynchronization>

The pair resynchronization command is the same as the ninth embodiment in that it is implemented via the function I/F described in the fourth to seventh embodiments.

(1) The host 14000 issues a pair resynchronization command to the storage apparatus 15000A via the function I/F. As a result, the pair resynchronization processing is started at both the active-side and standby-side storage apparatuses 15000A, 15000B.

(2) The storage apparatus 15000A sets the pair status to a Duplex-Pending status, and starts background copy. Unlike the ninth embodiment, the storage apparatus 15000B does not perform background copy.

(3) When the background copy is completed until the end of the differential bitmap 15010A, the storage apparatus 15000A sets the pair status to a Duplex status. Nevertheless, unlike the ninth embodiment, only the storage apparatus 15000A performs this processing. The storage apparatus 15000A thereafter notifies the storage apparatus 15000B that the pair status has changed to a Duplex status. The storage apparatus 15000B that received the notification sets the pair status to a Duplex status.

The read/write processing in the Duplex-Pending status is the same as the read/write processing in the Duplex status.

(11) Eleventh Embodiment

Constitution of an AOU (Allocation On Use) function is now explained. The AOU function is a function of allocating a real storage area only regarding the area used by (written from) the host.

The AOU function is constituted of a pool as an aggregate of real volumes that actually store data, and a virtual volume as a volume to be presented to the host. The virtual volume in this embodiment is virtual from the perspective that real data in which writing was performed is only allocated. Real data is not allocated to the entire address space of the volume presented to the host. Incidentally, the real volume may be in the external storage apparatus, or may be in the same storage apparatus as the virtual volume.

FIG. 21 shows an embodiment of the AOU function. In FIG. 21, the host 14000 is coupled to the storage apparatus 15000A and the storage apparatus 15000B. Further, the storage apparatus 15000A is coupled to the external storage apparatus 16000A, and the storage apparatus 15000B is coupled to the external storage apparatus 16000B.

This embodiment shows a constitution example where the real volume 16002A is in the external storage apparatuses 16000A, 16000B. Data in the virtual volume 15008A is associated with data in the real volume 16002A of the pool 16003A. Similarly, data in the virtual volume 15008B is associated with data in the real volume 16002B of the pool 16003B. Further, the virtual volume 15008A and the virtual volume 150086 are configured so that their contents coincide based on the synchronous remote copy function. The method of synchronous remote copy is as described above.

The read/write processing of this constitution is now described. Incidentally, the following explanation on the read/write processing is based on the premise that the active side of the target volume of the read/write processing is the storage apparatus 15000A.

Read processing is foremost explained. The operating system 14001 that received the read request from the application program 14002 determines whether the active-side storage is the storage apparatus 15000A or the storage apparatus 15000B based on the path management function, and issues a read request to the active-side storage apparatus 15000A. The storage apparatus 15000A that received the read request refers to the virtual address/real address mapping table 15009A, and determines whether a real area in the pool 16003A is allocated to the read data.

When real data is allocated in the foregoing determination, the storage apparatus 15000A reads the read data from the real area and sends it to the host 14000. The application 14002 receives the read data via the operating system 14001. The read processing is thereby complete.

Write processing is now explained. The operating system 14001 that received a write request from the application program 14002 decides whether the active-side storage apparatus is the storage apparatus 15000A or the storage apparatus 15000B based on the path management function, and issues a write request to the active-side storage apparatus 15000A. The storage apparatus 15000A that received the write request refers to the virtual address/real address mapping table 15009A, and determines whether a real area in the pool 16003A is allocated to the write-target data (determination 200).

If a real area is allocated in the foregoing determination, the storage apparatus 15000A receives write data from the host 14000, and stores the write data in the area in the cache memory not shown corresponding to the real area. The storage apparatus 15000A thereafter sends a write request for write data to the storage apparatus 15000B based on the synchronous remote copy function. The storage apparatus 15000B that received the write request from the storage apparatus 15000A determines whether a real area in the pool 16003A is allocated to the write data. Here, since contents of the virtual volume 15008A and contents of the virtual volume 15008B coincide based on the synchronous remote copy function, it is determined that the real area is allocated. Subsequently, the storage apparatus 15000B receives write data from the storage apparatus 15000A, and stores the write data in the area in the cache memory not shown corresponding to the real area, and issues a write completion report to the storage apparatus 15000A.

If a real area is not allocated in the foregoing determination (determination 200), the storage apparatus 15000A registers the address of write data in the virtual address/real address mapping table 15009A, and thereby allocates a real area. Subsequently, the storage apparatus 15000A receives write data from the host 14000, and stores the write data in the area in the cache memory not shown corresponding to the real area. The storage apparatus 15000A thereafter sends a write request for write data to the storage apparatus 15000B based on the synchronous remote copy function. The storage apparatus 15000B that received the write request from the storage apparatus 15000A determines whether a real area in the pool 16003B is allocated to the write data. Here, since contents of the virtual volume 15008A and contents of the virtual volume 150088 coincide based on the synchronous remote copy function, it is determined that the real area is allocated.

Subsequently, the storage apparatus 15000B receives write data from the storage apparatus 15000A, and stores the write data in the area in the cache memory not shown corresponding to the real area, and issues a write completion report to the storage apparatus 15000A. Subsequently, the storage apparatus 15000B registers the address of write data in the virtual address/real address mapping table 150098, and thereby allocates a real area. The storage apparatus 15000B receives write data from the storage apparatus 15000A, stores the write data in the area in the cache memory not shown corresponding to the real area, and thereafter issues a write completion report to the storage apparatus 15000A. The storage apparatus 15000A that received the write completion report issues a write completion report to the host 14000. The host 14000 receives the write completion report, and the write processing is thereby complete.

Incidentally, data stored in the cache memory is written into the real volumes 16002A, 16002B asynchronously with the storage of such data in the cache memory.

When some kind of failure occurs and the application 14002 is no longer able to perform the read/write processing via virtual volume 15008A in the storage apparatus 15000A, the path management function provided by the operating system 14001 detects a failure, and switches the access path of the read/write processing to go through the virtual volume 15008B in the storage apparatus 15000B. Since contents of the virtual volume 15008A and contents of the virtual volume 15008B coincide based on the synchronous remote function, even when the access path is switched, read/write processing can be ongoingly performed in a normal manner.

(12) Twelfth Embodiment

This embodiment describes an embodiment that is different from the AOL function of the eleventh embodiment. FIG. 22 shows a constitution example of this embodiment.

The difference in the constitution of this embodiment and the eleventh embodiment is that there is no external storage apparatus 16000B, and the real areas of the virtual volumes 15008A, 15008B are all allocated to areas in the pool 16003A in the external storage apparatus 16000A. The remaining constitution is the same as the eleventh embodiment.

Incidentally, in this embodiment, since the storage apparatus 15000A and the storage apparatus 15000B use the real volume 16002A in the common external storage apparatus 16000A as the common pool, unlike the eleventh embodiment, this embodiment is limited to a constitution where the real volume 16002A is in the external storage apparatus 16000A.

As a result of adopting the foregoing constitution, it is possible to eliminate the physical storage apparatus (HDD or the like) required by the pool.

The major difference in the processing operation between this embodiment and the eleventh embodiment is in that the standby-side storage apparatus 15000B does not perform writing from the cache memory into the real volume 16002A of the external storage apparatus 16000A, and that the storage apparatus 15000A notifies the storage apparatus 15000B of the update to the virtual address/real address mapping table 15009A, and the storage apparatus 15000B that received the notification updates the virtual address/real address mapping table 15009B.

Details of the processing operation are explained below.

Foremost, the read processing is the same as the read processing in the eleventh embodiment.

Write processing is now explained. The operating system 14001 that received a write request from the application program 14002 decides whether the active-side storage apparatus is the storage apparatus 15000A or the storage apparatus 15000B based on the path management function, and issues a write request to the active-side storage apparatus 15000A. The storage apparatus 15000A that received the write request refers to the virtual address/real address mapping table 15009A, and determines whether a real area in the pool 16003A is allocated to the write-target data (determination 300).

If a real area is allocated in the foregoing determination, the storage apparatus 15000A receives write data from the host 14000, and stores the write data in the area in the cache memory corresponding to the real area. The storage apparatus 15000A thereafter sends a write request for write data to the storage apparatus 15000B based on the synchronous remote copy function. In this embodiment, unlike the eleventh embodiment, the storage apparatus 15000B that received the write request from the storage apparatus 15000A instantaneously receives write data from the storage apparatus 15000A, stores such data in the cache memory, and thereafter issues a write completion report to the storage apparatus 15000A. The storage apparatus 15000A that received the write completion report from the storage apparatus 15000B sends a write completion report to the host 14000.

If a real area is not allocated in the foregoing determination (determination 300), the storage apparatus 15000A registers the address of write data in the virtual address/real address mapping table 15009A, and thereby allocates a real area. Subsequently, the storage apparatus 15000A receives write data from the host 14000, and stores the write data in the area in the cache memory not shown corresponding to the real area. The storage apparatus 15000A thereafter sends a write request for write data to the storage apparatus 15000B based on the synchronous remote copy function.

In this embodiment, unlike the eleventh embodiment, the storage apparatus 15000B that received the write request from the storage apparatus 15000A instantaneously receives write-target data from the storage apparatus 15000A, stores such data in the cache memory, and thereafter issues a write completion report to the storage apparatus 15000A. The storage apparatus 15000A receives the write completion report from the storage apparatus 15000B, and thereafter sends the contents of change in the virtual address/real address mapping table 15009A to the storage apparatus 15000B.

The storage apparatus 15000B that received the contents of change in the virtual address/real address mapping table 15009A makes similar changes to the virtual address/real address mapping table 15009B. Thereby, the real area of the write area in the virtual volume 15008B of the storage apparatus 15000B will be mapped to the real area (allocated by the storage apparatus 15000A) in the real volume 16002A of the common external storage apparatus 16000A. The storage apparatus 15000B notifies the storage apparatus 15000A of the update of the virtual address/real address mapping table 15009B. Subsequently, the storage apparatus 15000A that received the notification issues a write completion report to the host 14000. Incidentally, the storage apparatus 15000A simultaneously may perform (1) the data transmission of synchronous remote copy, and (2) the transmission of change of contents in the virtual address/real address mapping table 15009A, receive the completion report on the processing of (1) and (2), and thereafter issue a write completion report to the host 14000. Subsequently, the host 14000 receives the write completion report, and the write processing thereby complete.

Incidentally, data stored in the cache memory of the storage apparatus 15000A is written (destaged) into the real volume 16002A with the storage apparatus 15000A asynchronously with the storage in the cache memory. After destaging is complete, the storage apparatus 15000A notifies such completion to the storage apparatus 15000B. The storage apparatus 15000B that received the notification discards the area of the cache memory corresponding to the writing. Incidentally, instead of discarding the area, the area of the cache memory corresponding to the writing may be cleaned (a status where contents of the cache memory coincide with data in the storage apparatus (such as an HDD)).

When some kind of failure occurs and the application 14002 is no longer able to perform the read/write processing via virtual volume 15008A in the storage apparatus 15000A, the path management function provided by the operating system 14001 detects a failure, and switches the access path of the read/write processing to go through the virtual volume 15008B in the storage apparatus 15000B. Since contents of the virtual volume 15008A and contents of the virtual volume 15008B coincide based on the synchronous remote function, even when the access path is switched, read/write processing can be ongoingly performed in a normal manner.

(13) Thirteenth Embodiment

In this embodiment, an example is explained where the logical snapshot function is applied to the volumes in the storage apparatuses.

A logical snapshot function is a function that is similar to the local replication function, and a function for providing the user with replicated data at the point-in-time designated by the user. Nevertheless, the secondary volume having replicated data is a virtual volume provided using the write data subsequent to the replication creation command stored in the area of the real volume belonging to the pool, and data of the primary volume. The entity of the virtual secondary volume is retained in a pool that is an aggregate of real volumes. The relationship of the primary volume and the secondary volume may be referred to as a snapshot pair or simply as a pair. In the logical snapshot function, from the perspective that a logical volume having the same contents as the primary volume at the stationary point is not actually created, the secondary volume is virtual. The logical snapshot function, unlike the local copy function described above, does not need a secondary volume that is the same size as the size of the primary volume. Thereby, it is possible to eliminate storage apparatuses (HDDs and the like) required for retaining the contents of the secondary volume.

In this embodiment, the availability can also be improved by coordinating the active-side storage apparatus and the standby-side storage apparatus regarding this logical snapshot function.

FIG. 23 shows an embodiment of the snapshot function. In FIG. 23, the host 14000 is coupled to the storage apparatus 15000A and the storage apparatus 15000B. Further, the storage apparatus 15000A is coupled to the external storage apparatus 16000A, and the storage apparatus 15000B is coupled to the external storage apparatus 16000B. Further, the snapshot function and the differential bitmaps 15010A, 150106 (information showing the status of differential between the primary volumes 15006A, 15006B at the stationary point and the primary volumes 15006A, 15006B at the current time) and the virtual address/real address mapping tables 15009A, 15009B (tables for managing the location of the entity of the virtual secondary volumes 15007A, 15007B) are executed and managed by the storage apparatus 15000A and the storage apparatus 15000B. Further, the primary volume 15006A in the storage apparatus 15000A and the primary volume 150066 in the storage apparatus 15000B are configured to form a remote copy pair.

This embodiment shows a constitution example where the primary volumes 15006A, 15006B are in the storage apparatuses 15000A, 15000B and the pool 16003A, 16003B are in the external storage apparatus 16000A, 16000B. Incidentally, the pools 16003A, 16003B may also be in the storage apparatuses 15000A, 15000B.

<Logical Snapshot Creation Command>

When the user using the host 14000 issues a logical snapshot creation command, a creation command is issued to the active-side storage apparatus 15000A and the standby-side storage apparatus 15000B according to the methods described in the previous embodiments. The storage apparatuses 15000A, 15000B that received the creation command prepare virtual secondary volumes 15007A, 15007B, and allocate the differential bitmaps 15010A, 15010B that are all 0 (meaning no differential) and the virtual address/real address mapping tables 15009A, 15009B to the secondary volumes 15007A, 15007B.

<Read Processing to Primary Volume>

This is the same as the previous embodiments.

<Write Processing to Primary Volume>

The operating system 14001 that received the write request from the application program 14002 determines whether the active-side storage is the storage apparatus 15000A or the storage apparatus 15000B based on the path management function (in relation to the write-target primary volume), and issues a write request to the active-side storage apparatus 15000A. The storage apparatus 15000A that received the write request checks the differential bitmap 15010A of the write-target address. If the result is 1, data sent from the host 14000, together with the write request, is stored as write data of the primary volume in the cache memory. Meanwhile, if the result is 0, the following Copy-On-Write processing is performed for using the before-updated data of the primary volume 15006A as data for the secondary volume 15007A.

(Step 1) The storage area of the real volume 16002A belonging to the pool 16003A is allocated.

(Step 2) The before-updated data is copied from the primary volume 15006A to said storage area while using the cache memory.

(Step 3) The pool management information for managing the storage destination of the before-updated data to be saved is updated to indicate which area of the real volume 16002A in the pool 16003A that data has been stored.

(Step 4) The received write data is stored as data to the address of the primary volume 15006A in the cache memory, and a write completion reply is returned.

In parallel with this, the write data is copied from the primary volume 15006A in the storage apparatus 15000A to the primary volume 15006B in the storage apparatus 15000A based on the remote copy function, and similar processing is performed. Thus, the storage apparatuses 15000A, 15000B respectively manage the virtual address/real address mapping tables 15009A, 15009B and the differential bitmap s15010A, 15010B.

<Read Processing to Secondary Volume>

The operating system 14001 that received the write request from the application program 14002 determines whether the active side is the storage apparatus 15000A or the storage apparatus 15000B based on the path management function (in relation to the read-target secondary volume), and issues a read request to the active-side storage apparatus 15000A. The storage apparatus 15000A that received the read request checks the differential bitmap 15010A recorded in the primary volume 15006A. As a result, if the bit of the read-target address is 0, data stored in the same address of the primary volume 15006A is returned to the host 14000, and the operating system 14001 returns the data to the application 14002. Meanwhile, if the bit of the read-target address is 1, the operating system 14001 refers to the virtual address/real address mapping table 15009A, decides the location of the pre-updated data concerning the read-target address of the primary volume 15006A, and returns the data from the real volume belonging to the pool 16003A to the host 14000 (application program 14002).

<Write Processing to Secondary Volume>

In the host 14000, the operating system 14001 that received the write request from the application program 14002 determines whether the active side is the storage apparatus 15000A or the storage apparatus 15000B based on the path management function (in relation to the write-target secondary volume), and issues a write request to the active-side storage apparatus 15000A. The storage apparatus 15000A that received the write request checks the differential bitmap 15010A of the write-target address allocated to the primary volume 15006A. If the result is 1, by referring to the virtual address/real address mapping table 15009A, the operating system 14001 searches the storage area of a real volume 16002A in the pool 16003A storing the before-updated data of the address of the primary volume 15006A, and stores the write data in the area. Meanwhile, when the result is 0, the following processing is performed.

(A) An area of the real volume 16002A belonging to the pool 16003A is allocated.

(B) Write data is stored in the allocated area and the virtual address/real address mapping table 15009A is updated in order to indicate which area of the real volume 16002A in the pool 16003A that data has been stored.

(C) The bit corresponding to the address of the differential bitmap 15010A is updated to 1.

In parallel with this, the write data is copied from the primary volume 15006A in the storage apparatus 15000A to the primary volume 15006B in the storage apparatus 1000R based on the remote copy function, and similar processing is performed. Thus, the storage apparatuses 15000A, 15000B respectively manage the virtual address/real address mapping tables 15009A, 15009B and the differential bitmaps 15010A, 15010B.

<Copy-After-Write Processing>

The storage apparatuses 15000A, 15000B may execute the following Copy-After-Write processing in substitute for the Copy-On-Write processing to be executed upon writing into the primary volumes 15006A, 15006B.

(Step 1) The received write data is stored as data to the address of the primary volumes 15006A, 15006B in the cache memory, and a write completion reply is returned. However, destaging of the write data is inhibited.

(Step 2) Storage areas of the real volumes 16002A, 16002B belonging to the pools 16003A, 16003B are allocated.

(Step 3) The before-updated data is coped from the primary volumes 15006A, 15006B to said storage area while using the cache memory.

(Step 4) The pool management information for managing the storage destination of the saved before-updated data is updated to indicate which area of the real volumes 16002A, 160026 in the pools 16003A, 160036 that data has been stored.

(Step 5) Destaging of write data that was inhibited is permitted.

<Failure>

When some kind of failure occurs and the read/write request to the active-side primary volume 15006A and the secondary volume 15007A can no longer be processed, as described above, the operating system 14001 is able to continue access by switching the read/write request target to the standby-side primary volume 15006B or the secondary volume 15007B. Incidentally, as described above, in order to issue a write request to the same storage apparatuses 15000A, 15000B, preferably, the primary volumes 15006A, 150066 and the secondary volumes 15007A, 150076 of the snapshot function simultaneously switch the secondary volumes 15007A, 150076 when switching of the primary volumes 15006A, 15006B is required, and contrarily switch the primary volumes 15006A, 15006B as well when switching of the secondary volumes 15007A, 15007B is required.

(14) Fourteenth Embodiment

An embodiment of a logical snapshot function that is different from the thirteenth embodiment is now explained. FIG. 24 shows one constitution example of this embodiment.

Foremost, the difference in the constitution between this embodiment and the thirteenth embodiment is that the external storage apparatus 16000B does not exist, and the real area of the virtual secondary volumes 15007A, 15007B is allocated to the area in the pool 16003A of any external storage apparatus 16000A. The remaining constitution is the same as the thirteenth embodiment.

Incidentally, in this embodiment, since the storage apparatus 15000A and the storage apparatus 15000B use the real volume 16002A in the common external storage apparatus 16000A as the common pool 16003A, and, unlike the thirteenth embodiment, the real volume 16002A is limited to the constitution within the external storage apparatus 16000A.

As a result of adopting the foregoing constitution, it is possible to eliminate the physical storage apparatus (such as an HDD) required by the pool 16003A.

The major difference of the processing operation in this embodiment and the thirteenth embodiment is as follows.

(A) In normal situations, in substitute for the standby-side storage apparatus 15000B not performing writing from the cache memory into the real volume 16002A of the external storage apparatus 16000A, the timing that the active-side storage apparatus 15000A destages the data corresponding to the real volume 16002A in the primary volume 15006A, the secondary volume 15007A, and the pool 16003A is conveyed to the standby-side storage apparatus 15000B, and the standby-side storage apparatus 15000B thereby discards the data in the cache memory.

(B) The storage apparatus 15000A notifies the storage apparatus 15000B of the update to the virtual address/real address mapping table 15009A, and the storage apparatus 15000B that received the notification updates the virtual address/real address mapping table 15009B.

Further, in substitute of the processing of (A), caching of data corresponding to the real volume 16002A in the secondary volumes 15007A, 15007B or the pool 16003A can be invalidated. Here, since the saving of the before-updated data by the foregoing Copy-On-Write processing includes the storing of data in the real volume 16002A in the pool 16003A until the writing in the primary volumes 15006A, 15006B is complete, the performance will deteriorate. But since this does not occur in the Copy-After-Write mode, this is preferable.

Several embodiments of the present invention were described above, but these embodiments are merely illustrations for explain the present invention and are not intended to limit the scope of invention in any way. The present invention may be worked in various other modes without deviating from the gist of this invention. For example, a nonvolatile memory can be used in substitute for the HDD 1030 and the cache memory 1020. As the nonvolatile memory, for example, various types of nonvolatile memories such as a flash memory (specifically, for instance, a NAND-type flash memory), MRAM (Magnetoresistive Random Access Memory), and PRAM (Parameter Random Access Memory) can be used.

(15) Fifteenth Embodiment

FIG. 28, in which the same reference numeral is given to the components corresponding to those illustrated in FIG. 1, is a schematic diagram showing an embodiment of applying network switches (virtualization switches) 28000L, 28000R having a virtualization function.

1. Hardware Constitution of Present Embodiment

The virtualization switches 28000L, 28000R have a plurality of network ports, and processors for controlling the network ports control the transfer of the respective ports, detect failures, and perform virtualization described later. Incidentally, although not shown in this schematic diagram, as with the first embodiment explained with reference to FIG. 1, a management host is coupled to the virtualization switches 28000L, 28000R, and a user is able to configure settings in the virtualization switches 28000L, 28000R or perform setting copy between the virtualization switches 28000L, 28000R via this management host. Incidentally, the other components are the same as the first to fourteenth embodiments, and the explanation thereof is omitted.

2. Characteristics of Present Embodiment Employing Virtualization Switch

Virtualization provided by the virtualization switches 28000L, 28000R differ from the first to fourteenth embodiments by comprising the following characteristics.

(Characteristic 1) A virtual WWN (or port name) can be provided. The port of the fibre channel switch is referred to as an F port or an E port, and has an attribute that is different from the N port (meaning the start point or end point of communication) of the normal host or the storage. Thus, when performing virtualization in the virtualization switches 28000L, 28000R, if a virtual WWN, which is not actually connected internally, is created and provided to both virtualization switches 28000L, 28000R, software in the host 1100 will no longer have to explicitly switch the I/O path. Incidentally, more specifically, although communication of the fibre channel is conducted with the foregoing port name, this is an identifier allocated by the fibre channel switch, and the identifier internally contains information for identifying the switch to be used in the routine. Thus, both virtualization switches 28000L, 28000R perform the routine by allocating a port name so to simulate to the host 1100 as the N port having a virtual WWN is coupled to the both virtualization switches 28000L, 28000R via the virtual switch.

(Characteristic 2) Caching is not performed in the switches. The fibre channel switch normally decides the transfer destination by referring to only the control header and performs transfer control in a so-called cut-through method where data buffering is not performed, caching is often not performed even when providing a virtualization function. Incidentally, when performing caching, processing related to this characteristic is realized with the processing as with the embodiments described above. Further, the read/write processing of the virtualization switches 28000L, 28000R in a case of not performing caching can be considered to be similar to write-through-type control of transferring a request to the storage apparatus 1500L upon receiving an I/O request and returning a processing completion report to the host 1100 upon waiting for the processing to be complete.

(Characteristic 3) High availability in this embodiment is realized merely by setting the same virtualization in both virtualization switches 28000L, 28000R. This is possible because caching is not performed in the virtualization switches 28000L, 28000R. Incidentally, when the virtualization switches 28000L, 28000R are to perform remote copy or local copy, and there is information such as differential bitmaps in the switches, as with the previous embodiments, it is necessary to retain internal information in both the primary and secondary systems.

Incidentally, although the virtualization switches 28000L, 28000R were explained above as being fibre channel switches, the virtualization switches 28000L, 28000R may also be switches employing Ethernet (registered trademark), or iSCSI or TCP/IP. Here, the WWN may correspond to the MAC address and the port name may correspond to the IP address, but in cases of Ethernet (registered trademark) or TCP/IP, the routine may be performed to the IP address by directly providing the virtual port and the IP address allocated thereto externally without providing virtual switches.

(16) Sixteenth Embodiment

The sixteenth embodiment is now explained. This embodiment relates to an invention of providing a virtual storage apparatus of configuring the AOU function explained in the eleventh embodiment and twelfth embodiment in a high availability constitution. Incidentally, functions and the like that are not explained below are the same as the configuration/constitution of the information system explained in the first to fifteenth embodiments.

As described above, regarding the volume (hereinafter referred to as the “AOU volume”) to be provided by the virtual storage apparatus to the host 1100 based on the foregoing function, the AOU function is a function of allocating a storage area of a HDD (more specifically, a part or the whole of a storage area of a volume (hereinafter referred to as a “pool volume”) constituted to a HDD) to an address written into by the host 1100, instead of allocating the storage area of the HDD to all address of the AOU volume from the start of use. The AOU function is able to effectively use the HDD. This is because, it is not able to dynamically expand the data capacity during ongoing access with a certain type of file system operating in the host 1100, the administrator of the host 1100 sets the volume capacity by including the data capacity that may be used in the future. Thus, conventional technology had to be equipped with a HDD that will not be used at the time the volume capacity is set, even though it may not be used in the future.

Incidentally, from the perspective of effectively using the HDD capacity, it is preferable that the area of the pool volume is unallocated to the area of the AOU volume unwritten, but this embodiment is not limited thereto if there is another objective (realizing high performance, etc.).

1. Overview of Present Embodiment

FIG. 29, in which the same reference numeral is given to the components corresponding to those illustrated in FIG. 1, shows an overview of this embodiment. With the information system according to this embodiment, two virtual storage apparatuses 1000L, 1000R are coupled to the common storage apparatus 1500L. As a result of the two virtual storage apparatuses 1000L, 1000R of high availability having the AOU function, the service down time of the information system is shortened. Incidentally, unless specified herein, the storage apparatus 1500L is in an accessible state from both virtual storage apparatuses 1000L, 1000R; in other words, it is in a shared state, and with the existence of a storage apparatus that is not shared, the volume in the storage apparatus can be used as the storage area of AOU. Further, although not shown in FIG. 29, in the case of this embodiment, as with the first embodiment, a management host 1200 (FIG. 1) is coupled to the virtual storage apparatuses 1000L, 1000R.

Sections that are different from the foregoing embodiments are mainly explained below. The two virtual storage apparatuses 1000L, 1000R use the AOU address mapping information 31030L, 31030R to create the AOU volumes 29010L, 29010R, and provide these to the host 1100. The AOU address mapping information 31030L, 31030R contains the correspondence of the address space of the AOU volumes 29010L, 29010R and the area of the pool volume in the virtual storage apparatuses 1000L, 1000R or the area of the pool volume in the storage apparatus 1500L.

When a write request is issued from the host 1100 to the AOU volume 29010L, the primary virtual storage apparatus 1000L determines whether an area of the pool volume is allocated to the address range of the request target, and, if not allocated, it allocates the area of the pool volume of the virtual storage apparatus 1000L or the storage apparatus 1500L. Then, as a result of the write request being processed, write data is stored in the cache area of the primary virtual storage apparatus 1000L. Further, write data to the AOU volume 29010L is transferred to the secondary virtual storage apparatus 1000R based on the synchronous remote copy, and write data is stored in the cache area as with the primary system.

Subsequently, both virtual storage apparatuses 1000L, 1000R perform destaging processing, but only one of the virtual storage apparatuses 1000L, 1000R performs destaging to the write data corresponding to the storage apparatus 1500L. This is because if both virtual storage apparatuses 1000L, 1000R independently destage the write data, data stored in the storage apparatus 1500L will become inconsistent (for instance, data loss or inconsistency of write sequence such as the last written data being deleted and returning to the previous write data). Thus, it is necessary to decide in advance which one of the virtual storage apparatuses 1000L, 1000R will perform destaging before destaging becomes required. This embodiment explains an example of this where the primary virtual storage apparatus 1000L performs destaging, but destaging may also be performed by the secondary virtual storage apparatus 1000R, or the virtual storage apparatus 1000L, 1000R to perform such destaging may be decided based on the address space of the destaging target.

In the case of a read request also, the primary virtual storage apparatus 1000L foremost determines whether an area of the pool volume is allocated to the address range of the request target. When an area is allocated as a result of this determination, the virtual storage apparatus 1000L reads data from the area (including data in the cache memory not shown) of the corresponding pool volume and transfers this to the host 1100. When an area is not allocated, the virtual storage apparatus 1000L returns a predetermined value (zero, for instance).

FIG. 30 is a schematic diagram after switching the I/O request processing to the secondary virtual storage apparatus 1000R subsequent to the function of causing the primary virtual storage apparatus 1000L to stop. As illustrated in FIG. 30, the secondary virtual storage apparatus 1000R processes the I/O request based on the AOU address mapping information 31030R in the storage apparatus 1500L and the virtual storage apparatus 1000L. Thus, as a result of the primary and secondary virtual storage apparatuses 1000L, 1000R communicating on a regular basis, they maintain the contents of the AOU address mapping information 31030L, 31030R that are the same as the portions relating to the storage apparatus 1500L. Thereby, the secondary virtual storage apparatus 1000R is able to take over the allocation status of the storage apparatus 1500L. Further, the secondary virtual storage apparatus 1000R does not delete data stored in the cache memory from such cache memory unless it is data that has been destaged from the cache memory in the primary virtual storage apparatus 1000L. Thereby, it is possible to prevent data loss even if the data from the cache memory in the primary virtual storage apparatus 1000L is volatilized when the function is stopped.

2. Programs and Information to be Executed by Virtual Storage Apparatus

FIG. 31, in which the same reference numeral is given to the components corresponding to those illustrated in FIG. 6, show the software programs to be executed by the virtual storage apparatuses 1000L, 1000R, and information to be used by these programs.

In FIG. 31, the AOU I/O processing program 31010 is a program for processing I/O request received by the virtual storage apparatuses 1000L, 1000R, and contains a part of the functions of the I/O processing program 6020 (FIG. 6) in the first to fourteenth embodiments.

The AOU management program 31020 is a program for configuration concerning the AOU function and executing Deduplication processing described later. Further, the AOU address mapping information 31030 is information concerning the correspondence of the AOU volumes 29010L, 29010R and the pool volume areas. Further, the AOU pool management information 31040 is information for managing the aggregate of pool volumes (pool) to be used by the AOU function.

<2.1. AOU Address Mapping Information>

FIG. 35 shows the specific contents of the AOU address mapping information 31010. The virtual storage apparatuses 1000L, 1000R manage the storage area of data and the like, based on the identifier of the volume provided to the host 1100, and the address of the an area (segment) into which the address space of the AOU volume is divided from the top by a predetermined size (segment size). Incidentally, this segment size is a value to be configured at the time of defining the pool.

In FIG. 35, the “AOU volume identifier” and the “address space” respectively show the identifier of the AOU volumes 29010L, 29010R containing the corresponding segment, and the address of such segment in the AOU volumes 29010L, 29010R. Further, the pool ID shows the identifier of the pool to allocate an area to the AOU volume 29010L, 29010R.

The “COW (Copy On Write) flag” is a flag showing it is necessary to store the corresponding write data in a separately allocated pool volume area if a write request to such segment arrives. This flag is sometimes turned “ON” showing that the write data needs to be stored in another pool volume with different segments being associated to the area of the same pool volume.

The “pool volume area identifier” is identifying information showing the identifier of the pool volume area actually storing the data to be stored in the segment. This identifying information, for instance, is constituted of the following information.

(1) The identifier and address range of the internal volume when using an area of an internal volume of the virtual storage apparatuses 1000L, 1000R.

(2) Information for identifying the apparatus such as the port name or communication destination, information for identifying the volume inside an apparatus such as a LUN, and address range when including an area of a volume in the storage apparatus 1500L.

(3) NULL in the case of an unallocated area.

The “takeover area” is information showing whether the pool volumes, in which an identifier is indicated in the corresponding “pool volume area identifier” column, are being managed by both the primary and secondary virtual storage apparatuses 1000L, 1000R (“Yes” when managed by both and “No” when not managed by both).

The “pair AOU volume identifier” retains an identifier of the AOU volumes 29010L, 29010R forming a pair with the volume specified with the corresponding AOU volume identifier. As this identifier, a combination of an identifier of the corresponding virtual storage apparatuses 1000L, 1000R and an identifier of the corresponding AOU volumes 29010L, 29010R is used.

Incidentally, as described above, one reason that the AOU areas are managed in segment units is because the I/O performance will deteriorate since the management information of the AOU address mapping information 31030 will become too large when managed in block units.

<2.2. AOU Pool Management Information>

FIG. 36 shows the specific configuration of the AOU pool management information 31040. The AOU pool management information 31040 retains the following information for each pool.

(1) Segment size

(2) List of volumes (pool volumes) allocated to the pool

(3) List of unallocated areas among the pool volume areas

(4) Unused capacity

(5) Threshold value for issuing an alert that the capacity is insufficient

(6) Identifier of the virtual storage apparatus set as the opponent of the pool pair and pool ID in the apparatus. Incidentally, “pool pair” will be described later.

3. Initialization

Initialization of this embodiment is performed according to the following routine.

1. Initialization of pool

2. Creation of AOU volume

3. Association of AOU volumes

4. Configuration of synchronous remote copy

The details are now explained. Incidentally, although there are cases below where the processing subject of certain processes is explained as the “management host” or “program,” in reality, it goes without saying that the processor in the management host executes the corresponding processing based on a program stored in the corresponding memory of the management host, and the processor 1011 in the corresponding virtual storage apparatuses 1000L, 1000R executes the corresponding processing based on that program.

<3.1. Initialization of Pool>

Initialization is performed according to the following routine.

(Step 1) Based on a command from the management host 1200, the AOU management program 31020 to be executed by one of the virtual storage apparatuses 1000L and 1000R creates a pool. Here, this command contains a segment size. Further, during the process of creating the pool, the AOU management program 31020 creates an entry of the AOU pool management information 31040 containing the pool ID.

(Step 2) Based on processing similar to Step 1, the other virtual storage apparatus 1000R or 1000L also creates a pool.

(Step 3) The management host 1200 issues to both virtual storage apparatuses 1000L and 1000R commands for configuring the pairs created at Step 1 and Step 2 as a pool pair. This command contains a set of the ID of the pools to become a pool pair and the Identifier of the virtual storage apparatuses 1000L and 1000R to provide the pools. The AOU management program 31020 that received the command communicates with the AOU management program 31020 of the virtual storage apparatuses 1000L, 1000R of the opponent to become the pool pair, and configures these pools as a pool pair if it is confirmed that the segment size set to both pools is equal and that both pools have not yet been set as a pool pair. Incidentally, the AOU management program 31020 registers the identifier of opponent's pool ID in the AOU pool management information 31040 upon setting the foregoing pairs as a pool pair.

(Step 4) The management host 1200 issues a pool volume creation command to one of the virtual storages 1000L and 1000R. Incidentally, this command contains the identifier of the volume defined in the virtual storage apparatuses 1000L and 1000R. The AOU management program 31020 of the virtual storage apparatus 1000L, 1000R that received the command changes the attribute of the designated volume to a pool volume, and adds the identifier of the designated volume to the pool volume list of the AOU pool management information 31040.

(Step 5) The management host 1200 issues the same command as at Step 3 to the other virtual storage apparatus 1000R, 1000L. The other virtual storage apparatus 1000R, 1000L that received the command performs the same processing as at Step 3.

Incidentally, when the administrator determines that the internal volume of the virtual storage apparatus 1000 will not be used in the AOU, Step 4 and Step 5 may be omitted.

(Step 6) The management host 1200 issues to one of the virtual storage apparatuses 1000L, 1000R a command for configuring the volume of the storage apparatus 1500L as a pool volume. Incidentally, to facilitate understanding, in the ensuing explanation, let it be assumed that the command destination is the virtual storage apparatus 1000L, and the virtual storage apparatus 1000 forming a pair with the command destination is the virtual storage apparatus 1000R. Nevertheless, this may also be of the opposite relationship. Here, the command includes information for identifying the storage apparatus 1500L and the volume, and information showing that the volume the opponent's virtual storage apparatus 1000R in which the volumes are forming a pool pair will take over. The AOU management program 31020 of the virtual storage apparatus 1000L that received the command will perform the following coordination with the pair virtual storage apparatus 1000R.

(A) By issuing a read request (or a write request) to the volume of the storage apparatus 1500L contained in the command, the virtual storage apparatus 1000L that received the command confirms that both the storage apparatus 1500L and the volume exist, and whether such volume is accessible. If the storage apparatus 1500L or the volume does not exist, or if it is not possible to access the volume, the virtual storage apparatus 1000L returns an error to the management host 1200, and proceeds to the subsequent step if the volume is accessible. Incidentally, the error includes information showing that the storage apparatus 1500L was inaccessible, and this information may be displayed on the management host 1200.

(B) The virtual storage apparatus 1000L that received the command transfers the pool volume creation command to the paired virtual storage apparatus 1000R. Incidentally, this command contains information for identifying the target volume contained in the command from the management host 1200, and information showing that the volume is being managed by both pools belonging to the pool pair. Incidentally, the transfer destination of the pool volume creation command can be specified by referring to the “identifying information of pool pair” in the AOU pool management information 31040.

(C) When the virtual storage apparatus 1000R receives the command of (B), it confirms that the volume in the storage apparatus 1500L is accessible by performing the same processing as (A). If the volume is accessible, the virtual storage apparatus 1000R adds the volume to the pool volume list of the AOU pool management information 31040 together with the information showing that the volume is being commonly managed, and returns the result to the virtual storage apparatus 1000L that received the foregoing command. Meanwhile, if the volume was inaccessible as a result of the foregoing confirmation, the virtual storage apparatus 1000R adds information showing that the virtual storage apparatus 1000R could not access the storage apparatus 1500L and returns a result signifying the unsuccessful access.

(D) If the result of access to the volume was unsuccessful, the virtual storage apparatus 1000L that received the command that received the foregoing result transfers the reason as well as the result to the management host 1200, and ends the sequential processing. Meanwhile, if the result of access to the volume was successful, the virtual storage apparatus 1000L adds this result to the pool volume list of the AOU pool management information 31040 together with the information showing that the volume is a volume to be commonly managed, transfers a result signifying the successful access to the management host 1200, and thereby ends this processing.

Incidentally, when adding the volume to the pool volume list at (C) and (D), the AOU management program 21020 updates the unused capacity stored in the corresponding “unused capacity” column to a value obtained by adding the capacity of the added volume, and adds the area of this volume to the empty area list. Further, the processing at Step 5 may also issue commands separately from the management host 1200 to the virtual storage apparatuses 1000L and 1000R.

(Step 7) The management host 1200 transfers a command for configuring the value of a capacity warning to both virtual storage apparatuses 1000L, 1000R, and the virtual storage apparatuses 1000L, 1000R that received the command respectively set the value contained in the command in the AOU pool management information 31040.

<3.2. Creation of AOU Volume>

Creation of the AOU volumes 29010L, 29010R is conducted by issuing commands to the respective virtual storage apparatuses 1000L, 1000R. The routine is described below.

(Step 1) The management host 1200 transfers the AOU volume creation command accompanying the volume capacity and the pool ID to the respective virtual storage apparatuses 1000L, 1000R.

(Step 2) The virtual storage apparatus 1000L that received the command creates AOU address mapping information 31030L concerning a new AOU volume 29010L. Here, for all segments, “NO” is set in the corresponding “COW flag” and the “takeover area”, and “NULL” is set to the “pool volume area identifier.” The virtual storage apparatus 1000L thereafter returns a creation complete reply.

(Step 3) Similarly, the virtual storage apparatus 1000R that received the command creates AOU address mapping information 31030R concerning a new AOU volume 29010R. Details concerning the creation are the same as Step 2.

Incidentally, the AOU volumes 29010L, 29010R may be created by issuing a command to one of the virtual storage apparatuses 1000L, 1000R from the management host 1200, and the virtual storage apparatus 1000L, 1000R that received the command re-issuing the command to the paired virtual storage apparatus 1000R, 1000L. Incidentally, the port name and the LUN under the control of the port name, designated by the administrator, may be allocated to the AOU volumes 29010L, 29010R by including the port name and LUN in the volume creation command. Further, the port name and the LUN may be allocated after the creation command of the AOU volumes 29010L, 29010R.

<3.3. Association of AOU Volumes>

The AOU volumes 29010L and 29010R, each created in the respective virtual storage apparatuses 1000L, 1000R, are associated to each other. Thus, the management host 1200 transfers an association command containing the identifier of the two AOU volumes 29010L and 29010R to the virtual storage apparatus 1000L or 1000R. The virtual storage apparatus 1000L or 1000R that received the command register the AOU volumes 29010L and 29010R forming a pair in the corresponding “AOU volume identifier” column of the AOU address mapping information 31030. This command is given to the respective virtual storage apparatuses 1000L and 1000R in order to associate the AOU volumes 29010L and 29010R, as described in the other embodiments, this may also be realized by one of the virtual storage apparatus 1000L or 1000R transferring the command to the other virtual storage apparatus 1000R or 1000L.

Incidentally, upon sending the foregoing association command, by confirming the existence of the AOU volume 29010L and 29010R contained in the command, and that one of the AOU volumes 29010L and 29010R is created from one of the pools of the pool pair and the other AOU volume 29010R or 29010L is created from the other pool of the pool pair, implementation of the pool management can be simplified. Further, this association can be conducted pursuant to the creation of the AOU volumes 29010L, 29010R and setting of the synchronous remote copy.

<3.4. Setting of Synchronous Remote Copy>

In the synchronous remote copy expressed above, although it was necessary to copy all areas of the volume in the Initial-Copying status, in this embodiment, formation copy is performed according to the following routine. Further, in order to facilitate the understanding, in the ensuing explanation, let it be assumed that the primary virtual storage apparatus 1000 is the virtual storage apparatus 1000L, and the secondary virtual storage apparatus 1000 is the virtual storage apparatus 1000R.

(Step 1) The virtual storage apparatus 1000L to become the copy source (in other words, primary system for the volume) assigns the top segment of the AOU volume 29010L to the variable i.

(Step 2) The virtual storage apparatus 1000L of the copy source confirms the “takeover area” and “pool volume area identifier” of the segment i in the AOU address mapping information 31030, and performs the following processing.

(A) If the “takeover area” is “NO,” data of the segment i is copied according to the normal creation copy. This is because of the area of the pool volume in the virtual storage apparatus 1000L, copy must be performed to secure the redundancy.

(B) When the “takeover area” is “YES,” dirty data in the cache memory not shown in the virtual storage apparatus 1000L related to the segment i is destaged, or copied to the cache area of the virtual storage apparatus 1000R of the copy destination (in other words, the secondary system for the volume) in the creation copy. This is because, excluding the data in the cache memory, data is outside the primary virtual storage apparatus 1000L, or, by moving the data in the cache memory outside the virtual storage 1000L, no data will be lost even if the function of the primary virtual storage apparatus 1000L is stopped.

(C) When the “pool volume area identifier” is “NULL,” copy is not performed to the segment i since areas are not allocated to either the primary or secondary system.

(Step 3) When the segment i is the last segment, the virtual storage apparatus 1000L of the copy source ends the creation copy and changes the pair status to a Duplex status, and, when it is not the last segment, it sets the subsequent segment to the variable i and returns to Step 1.

Incidentally, the foregoing processing may be used in the resynchronization processing between the virtual storage apparatuses 1000L, 1000R, or may be used in the processing after the function of one of the virtual storage apparatuses 1000L, 1000R is stopped and recovered.

4. I/O Request Processing

The I/O request processing of this embodiment is explained below.

<4.1. Write Request Processing>

FIG. 32 is a flowchart showing the processing contents to be executed by the AOU I/O processing program 31010 upon receiving a write request. Incidentally, in the foregoing explanation, although an explanation was not provided using separate flowcharts regarding the command and write data configuring the write request, since there are cases in this processing were certain areas of the write request target are allocated while the other areas are unallocated, the processing is explained in detail with reference to the flowchart.

(S32001) The AOU I/O processing program 31010 receives a write command constituting the write request. This write command contains the address (location) and the data length.

(S32100) The AOU I/O processing program 31010 executes allocation processing based on the received write command. By executing this processing, the AOU I/O processing program 31010 checks whether an area of the pool volume is allocated for each segment, and allocates an area of the pool volume to segments to which an area of the pool volume is unallocated, or segments allocated with an area shared with other segments in which the “COW flag” is “ON” (segments that need to be written during writing other than the shared area). Further, the AOU I/O processing program 31010 reflects the allocation results of the pool volume area in the AOU address mapping information 31030.

(S32003) The AOU I/O processing program 31010 confirms the attribute of the AOU volume 29010R, 29010L, and executes S32004 if the AOU volume 29010R, 29010L is a copy source volume, or otherwise executes S32005.

(S32004) The AOU I/O processing program 31010 calls the remote copy program 6010 and thereby transfers the command of the synchronous remote copy to the virtual storage apparatus (secondary virtual storage apparatus) 1000R having the copy destination volume.

(S32005) The AOU I/O processing program 31010 receives the write data (whole or a part) constituting the write request corresponding to S32001.

(S32006) The AOU I/O processing program 31010 confirms the attribute of the AOU volume 29010R, 29010L, and executes S32007 if the AOU volume 29010R, 29010L is a copy source volume, and otherwise executes S32008.

(S32007) The AOU I/O processing program 31010 calls the remote copy program 6010 and thereby transfers the write data to the virtual storage apparatus (secondary virtual storage apparatus) 1000R having the copy destination volume.

(S32008) The AOU I/O processing program 31010 seeks the area of the pool volume actually storing the write data from the address in the AOU volumes 29010R, 29010L based on the AOU address mapping information 31030, and stores and manages the write data related to the sought area in the cache memory.

(S32009) The AOU I/O processing program 31010 determines whether there is a continuation of the write data reception, and re-executes S32005 when there is a continuation.

(S32010) The AOU I/O processing program 31010 transfers the write completion reply to the primary virtual storage apparatus 1000L or the host 1100, and ends this write request processing.

Incidentally, the secondary virtual storage apparatus 1000R handles the reception of the command of the synchronous remote copy as with the reception of the write command from the host 1100. Similarly, the virtual storage apparatus 1000R handles the reception of data based on the data transfer of the synchronous remote copy as with the reception of write data from the host 1100. This concludes the explanation on the write request processing in the secondary virtual storage apparatus 1000R.

<4.1.1. Allocation Processing>

The allocation processing illustrated in FIG. 32 is now explained.

(S32101) The AOU I/O processing program 31010 divides the write range (in other words, write address and data length) designated in the write command into segments.

(S32102) The AOU I/O processing program 31010 assigns the first segment among the plurality of segments, created by the divisioning, to the variable i.

(S32103) The AOU I/O processing program 31010 determines the allocation status of the segment i and whether COW (Copy On Write) is necessary. Incidentally, the AOU address mapping information 31030 is used in this determination. As a result of the foregoing determination, the AOU I/O processing program 31010 executes S32105 if the allocation of the pool volume area is not required, and executes S32104 if the pool volume area is unallocated or, if the COW flag is ON even if it is allocated (for instance, when the segment and area of other AOU volumes 29010R, 29010L are being shared).

(S32104) The AOU I/O processing program 31010 searches for an unused area from the pool volume areas to allocate such unused area to the segment i, and then registers the searched area in the “pool volume area identifier” of the AOU address mapping information 31030. Incidentally, if an unused area cannot be found, the AOU I/O processing program 31010 transfers a reply indicating that the write command was unsuccessful, and thereby ends this allocation processing.

Incidentally, upon transferring the failure reply, some kind of error message can be returned together with the failure reply, and information indicating that the cause of the failure reply is the insufficient pool capacity. Further, if allocating the area in a case where the “COW flag” is ON, the AOU I/O processing program 31010 may copy data from the old area (shared area) to the allocated area upon allocating such area. Nevertheless, when the overall segment i is a write target, this data copy can be omitted. Further, pursuant to this area allocation, the AOU I/O processing program 31010 may edit the empty area list of the AOU pool management information, and delete the unused capacity.

Further, the AOU I/O processing program 31010 transfers the area in the allocated pool volume and information of the segment of the AOU volume 29010L allocated with the area to the secondary virtual storage apparatus 1000R. Incidentally, the allocated information can also be transferred together with the synchronous remote copy command.

(S32105) The AOU I/O processing program 31010 confirms the existence of a subsequent segment, executes S32106 if such subsequent segment exists, or ends this processing if it does not exist and then returns to the write request processing.

(S32106) The AOU I/O processing program 31010 assigns the subsequent segment to the variable i.

With the foregoing processing, the virtual storage apparatus 1000L confirms the allocation status for each segment, and allocates the pool volume area to the segment if necessary.

<4.1.2. Allocation Method of Secondary Pool Volume Area>

The pool volume area allocation step (S32104) of the secondary virtual storage apparatus 1000R allocates an area to the segment according to the following method based on the allocation information received from the primary virtual storage apparatus 1000L.

(A) If the primary virtual storage apparatus 1000L allocated an area from the pool volume of the shared storage apparatus (in other words, the storage apparatus 1500L), the secondary virtual storage apparatus 1000R sets “YES” in the “takeover area” of the corresponding segment in the AOU address mapping information 31030, and sets the “pool volume area identifier” in the received area identifier. Thereby, allocation of the pool volume area concerning the shared storage apparatus 1500L will be handled the same in both the primary and secondary systems.

(B) If the primary virtual storage apparatus 1000L allocated an area from the volume in the virtual storage apparatus 1000R, the secondary virtual storage apparatus 1000R searches for an empty area of the internal volume to be allocated to the corresponding segment. As a result, the secondary virtual storage apparatus 1000R sets “NO” in the “takeover area” of the segment in the AOU address mapping information 31030, and sets an area of the internal volume in the “pool volume area identifier.” Thereby, the segment allocated with the area of the internal volume of the by the primary virtual storage apparatus 1000L can also be allocated with the internal volume in the secondary virtual storage apparatus 1000R.

<4.2. Read Request Processing>

FIG. 33 is a flowchart showing the processing contents to be executed by the AOU I/O processing program 31010 upon receiving a read request. The processing contents are now explained with reference to the flowchart.

(S33001) The AOU I/O processing program 31010 receives a read command constituting the read request. This received read command contains the address (location) and the data length.

(S33002) The AOU I/O processing program 31010 divides the read range (in other words, write address and data length) designated in the read command into segments.

(S33003) The AOU I/O processing program 31010 assigns the first segment among the plurality of segments, created by the divisioning, to the variable i.

(S33004) The AOU I/O processing program 31010 determines whether a pool volume area is allocated to the segment i. Incidentally, the AOU address mapping information 31030 is used in this determination. As a result of the foregoing determination, the AOU I/O processing program 31010 executes S33006 if the pool volume area is allocated, or executes S33005 if the pool volume area is unallocated.

(S33005) The AOU I/O processing program 31010 allocates a cache area for the segment in the cache memory of the virtual storage apparatus 1000L, 1000R, initializes the allocated cache area with zero, and transfers the zero data to the host 1100.

(S33006) The AOU I/O processing program 31010 transfers the data stored in the allocated pool volume area. Incidentally, if the pool volume area already exists in the cache area (staged), it transfers the data from the cache area, or performs staging and thereafter transfers such data if it does not exist in the cache area.

(S33008) The AOU I/O processing program 31010 determines whether there is a subsequent segment, executes S33009 if such a subsequent segment exists, or executes S33010 if it does not exist.

(S33009) The AOU I/O processing program 31010 sets the subsequent segment to the variable i, and executes S33004 once again.

(S33010) The AOU I/O processing program 31010 transfers the read completion reply to the host 1100, and thereby ends this processing.

Incidentally, in order to simplify the processing, the virtual storage apparatus 1000L may store a predetermined value (zero) in a certain area of the pool volume, and transfer the data stored in the area to the unallocated area of the AOU volumes 29010R, 29010L through reading.

<4.3. AOU Destaging Processing>

FIG. 34 is a flowchart showing the processing contents of destaging processing to be executed by the AOU I/O processing program 31010. The destaging processing is now explained with reference to the flowchart.

(S34001) The AOU I/O processing program 31010 decides the data in the cache memory to be destaged based on the cache algorithm. Incidentally, the cache algorithm generally uses LRU (Less Recently Used) algorithm to decide the target dirty data, but other algorithms may also be used.

(S34002) The AOU I/O processing program 31010 determines whether the destaging target data corresponds to the volume of the shared storage apparatus (in other words, the storage apparatus 1500L), executes S34003 if they correspond, or executes S34004 if they do not correspond.

(S34003) The AOU I/O processing program 31010 executes destaging processing, and thereafter ends the sequential processing.

Incidentally, destaging processing is performed as with the other embodiments.

(S34004) The AOU I/O processing program 31010 determines the volume attribute of the volume storing the destaging target data, executes S34005 if the volume is a copy source volume, executes S34007 if the volume is a copy destination volume, or otherwise executes S34003.

(S34005) The AOU I/O processing program 31010 executes destaging processing.

(S34006) The AOU I/O processing program 31010 transfers the RC destage permission command of the destaged data to the secondary virtual storage apparatus 1000R, and thereby ends this processing.

(S34007) The AOU I/O processing program 31010 confirms whether the RC destage permission flag is ON, re-executes S34001 to re-select separate destaging target data if it is OFF. Incidentally, the RC destage permission flag is set to OFF at the time the write data is stored or updated in the cache memory based on synchronous remote copy, and is set to ON upon receiving the command sent at S34006.

(S34008) The AOU I/O processing program 31010 executes destaging processing, and thereby ends this processing.

The following cache control is realized with this algorithm.

(A) Cache data that is not for the shared storage apparatus, i.e., in which destaging does not have to be coordinated in the primary and secondary virtual storage apparatuses 1000L, 1000R is destaged independently in both systems.

(B) Cache data of the secondary virtual storage apparatus 1000R is destaged based on a message sent after the destaging processing in the primary virtual storage apparatus 1000.

Incidentally, the staging processing is performed as in the first to fourteenth embodiments. Furthermore, Instead of the destaging at S34008, the AOU I/O processing program 31010 may discard the cache data without destaging.

<4.3.1. RC Destage Permission Command>

For the transfer of the RC destage permission command, the command may be sent asynchronously. Nevertheless, the primary and secondary virtual storage apparatuses 1000L, 1000R may invalidate the command unreflected in the RC destage flag by being triggered with remote copy.

<4.4. Monitoring of Empty Area of Pool>

The AOU management program 31020 periodically monitors the empty area of the respective pools, and sends a message to the management host 1200 if the value falls below the threshold value set by the user. Thereby, it is possible to avoid the failure of a write request from the host 1100 caused by insufficient capacity. Further, the AOU management program 31020 may manage the monitoring of the empty area of the shared storage apparatus 1500L and the unshared storage apparatus respectively, or change a the message to be transferred during such insufficient capacity respectively.

5. Switching When Failure in Primary Virtual Storage Apparatus

When the function of the primary virtual storage apparatus 1000L is stopped due to a failure or the like, the host 1100 is able to ongoingly operate the application by performing the processing as in the other embodiments.

Meanwhile, the host 1100 may also switch the I/O request destination to the secondary virtual storage apparatus 1000R if the write request to the copy source volume is unsuccessful due to insufficient capacity. This is because if the pool capacity of the secondary virtual storage apparatus 1000R is larger than the primary system, this switch will allow the ongoing processing of the application 2010 (FIG. 30) in which an I/O request is issued in the host 1100.

Incidentally, in the foregoing case, the direction of remote copy will be inverted as a result of switching the request destination, but the remote copy will be stopped. This is because, since the request was unsuccessful in the old primary virtual storage apparatus 1000L due to insufficient pool capacity during the write request, the attempt of writing write data into the new primary (old secondary) virtual storage apparatus 1000R based on synchronous remote copy will end in a failure.

Nevertheless, since a request (particularly read) to the old primary virtual storage apparatus 1000L can be continued, it is not possible to distinguish this failure from the communication path failure between the virtual storage apparatuses 1000L, 1000R, and the host 1100 may read old data of the old primary virtual storage 1000L.

In order to avoid this kind of situation, if the cause of the remote copy failure is insufficient pool capacity, the issuance of a read request from the host 1100 to the old primary virtual storage apparatus 1000L may be inhibited. Or, while it is not possible to limit the cause of the remote copy failure, it is also possible to inhibit the reading from the host 1100 to the secondary virtual storage apparatus 1000R or 1000L, and cancel such inhibition when it is discovered that the cause is a communication path failure.

Based on the foregoing processing, the storage system of this embodiment is able to provide a storage service having an AOU function with high service continuity. Further, the AOU function needs to refer to and change the AOU address mapping information 31030L, 31030R for each I/O request, and the controller load will be higher than a normal storage I/O. Therefore, regarding a part (or half) of the volumes required by the host 1100, one of the virtual storage apparatuses 1000L and 1000R may handle the reading and writing as a primary system, and, regarding the remaining volumes, the other virtual storage apparatus 1000R or 1000L may handle the reading and writing as a primary system. As a result of adopting this kind of constitution, the controller load of the AOU function can be equalized between the virtual storage apparatuses 1000L and 1000R while maintaining the availability of the storage system.

6. Allocation of Pool Volume Area and Data Migration

As described above, in this embodiment, the volume in the virtual storage apparatuses 1000L, 1000R and the volume of the storage apparatus 1500L can both be used as pool volumes. Thus, by allocating the volume in the virtual storage apparatuses 1000L, 1000R to the segment of high access frequency data that is already stored or will be stored, in addition to seeking improvement of the access performance, it is possible to avoid the bottleneck of the communication network between the virtual storage apparatuses 1000L, 1000R and the storage apparatus 1500L.

Nevertheless, since the pool volume area is allocated to the segment based on the first write request in AOU, it would be difficult to perform allocation with the virtual storage apparatuses 1000L, 1000R alone while giving consideration to the access frequency. The following methods can be considered to overcome the foregoing problem.

<6.1. Method of Adding Attribute to AOU Volume>

Consider to giving an attribute concerning the access frequency at the time of creating the AOU volumes 29010L and 29010R and then the AOU I/O processing program 31010 is to allocate a pool volume area to the segment. If the access frequency of such data to be written into the segment is known to a certain degree, the access frequency attribute is referred to, and the volume in the virtual storage apparatuses 1000L, 1000R is allocated to the segment of the high access frequency data, and an area of the volume in the storage apparatus 1500L is allocated to the segment of low access frequency data (backup data, for instance).

<6.2. Data Migration of Pool Volume Area>

The access frequency to the AOU volumes 29010L, 29010R is measured in segment units (or units of a plurality of segments), and data of a segment of high access frequency is migrated to the pool volume area in the virtual storage apparatuses 1000L, 1000R. Here, pursuant to the migration of data, it is necessary to change the correspondence of the AOU volume 29010L, 29010R's segment, that is the target of the migration, from a segment in the volume of the storage apparatus 1500L to a segment of the migration destination in the virtual storage apparatuses 1000L, 1000R. But in the AOU function, since address mapping has already been performed in the virtual storage apparatuses 1000L, 1000R, it is possible to migrate data transparently to the host 1100 by using it without additional mapping scheme.

Incidentally, if performing data migration as in this embodiment, it is desirable that the data of the target segment is in the pool volume of both the primary and secondary virtual storage apparatuses 1000L, 1000R. Nevertheless, if there are other effects (as listed below), data migration may also be performed into a state where only a segment of one side is allocated with the pool volume area in the virtual storage apparatuses 1000L, 1000R.

Example 1

If one of the virtual storage apparatuses 1000L, 1000R first exhausted the internal pool volume, and only the shared storage apparatus 1500L remains.

Example 2

If the load of the read request to the AOU volume 29010L of the copy source is large, and the network performance between the primary virtual storage apparatus 1000L and the storage apparatus 1500L is suppressed by it.

In the foregoing case, the primary virtual storage apparatus 1000L copies segment data from the pool volume area in the storage apparatus 1500L to the area of its own pool volume, and provides the AOU volume 29010L by using the area of the copy destination. The secondary virtual storage apparatuses 1000R may also provide the AOU volume 29010R using the pool volume area of the storage apparatus 1500L of the copy source. Here, the secondary virtual storage apparatus 1000R may reflect the write data to the pool volume area of the storage apparatus 1500L.

Further, as an intermediate status of segment data migration for improving the access performance including reading and writing, a configuration may also be adopted where only the primary virtual storage apparatus 1000L uses the internal pool volume area, and the secondary virtual storage apparatus 1000R uses the pool volume of the storage apparatus 1500L.

7. Variation of Present Embodiment

<7.1. Implementation of Address Mapping During Staging and Destaging Processing>

In this embodiment described above, address mapping is performed with the read request processing and the write request processing. While this method is able to return a failure reply triggered by the insufficient capacity of the pool volume at the time of receiving the write request, since address mapping is performed for each request, there is a problem from the perspective of performance. As a method of overcoming this problem, a method of performing address mapping with staging or destaging processing can be considered. However, in this method, since the pool volume area is allocated to the segment at the time of destaging, data loss similar to a case of the volume being blocked due to the double block of the HDD 1030 or the like will occur. Thus, in the latter method, processing of delaying or stopping the request processing may be performed from the time that the unused capacity starts falling low.

Incidentally, the specific processing can be realized by changing the processing contents explained in FIG. 32 and FIG. 33 as described below.

(Writing and Destaging) Allocation processing at S32100 of FIG. 32 is moved after the destaging processing at S34001.

(Reading and Staging) Determination of allocation and transfer of zero data in the case of unallocation pursuant to the address mapping performed at S33004 to S33006 of FIG. 33 are performed at staging.

Further, in order to combine both advantages, the AOU I/O processing program 31010 may perform mapping in the staging/destaging processing if the unused capacity of the pool volume is greater than the threshold value, or perform mapping in the I/O request processing if the unused capacity falls below the threshold value.

7.2. <De-Duplication>

The AOU management program 31010 may also perform the following processing referred to as De-duplication independent from the I/O request.

(Step 1) The AOU management program 31010 scans the data of the respective pool volume areas and searches for redundant segments.

(Step 2) When the AOU management program 31010 detects redundant data stored in the pool volume areas, it leaves one of the areas, and releases the other remaining areas as empty areas. Then, the “pool volume area identifier” of the segment corresponding to the area released in the AOU address mapping information 31030 is updated to the one remaining area, and the “COW flag” is set to “ON.”

Here, as the method of detecting redundancy, a two-step method of calculating the hash value of each pool volume, thereafter sequentially comparing such hash value with the hash value of the other areas, and comparing the actual data if the hash values are the same may be adopted. Further, since the calculation of the hash value and the comparison of data are high-load processing, the load can be balanced by performing processing in the secondary virtual storage apparatus 1000R. 

What is claimed is:
 1. A storage system comprising: a first storage device including a plurality of physical storage devices and a controller providing a first virtual volume, which corresponds to storage areas of a first logical volume configured on the physical storage devices; a second storage device including a plurality of physical storage devices and a controller providing a second virtual volume, which corresponds to storage areas of a second logical volume configured on the external physical storage devices, wherein data stored in the first logical volume is duplicated to the second logical volume, and wherein the same identification number is used by a computer for accessing data stored in the first logical volume via the first virtual volume and for accessing data stored in the second logical volume via the second virtual volume.
 2. A storage system according to claim 1, wherein the first storage device is further configured to: return a write complete message to the computer after receiving a write data reception message from the second storage device.
 3. A storage system according to claim 1, wherein data requested to be written to the first virtual volume is transferred to the second virtual volume via remote copy.
 4. A storage system according to claim 1, wherein the first virtual volume and the second virtual volume are access targets of the computer.
 5. A storage system according to the claim 1, wherein a host bus adapter in the computer manages a relationship between the identifier used by an application of the computer and an actual identifier of the first virtual volume and the second virtual volume.
 6. A storage system according to claim 1, wherein the computer is configured to switch a destination of a request from the first storage device to the second storage device in a case that the request to the first logical volume is not processed by the first storage device.
 7. A storage system according to claim 1, wherein a setting of the second virtual volume to deny a request from an application of the computer is canceled with the transferring of the data to be duplicated from the first logical volume to the second logical volume.
 8. A method in a storage system including a first storage device including a plurality of physical storage devices and a controller, and a second storage device including a plurality of physical storage devices and a controller, said method comprising the steps of: configuring, by the controller of the first storage device, a first logical volume on the physical storage devices of the first storage device; configuring, by the controller of the second storage device, a second logical volume on the physical storage devices of the second storage devices; providing, by the controller, a first virtual volume, which corresponds to the first logical volume; providing, by the controller, a second virtual volume, which corresponds to the second logical volume; storing data in the first logical volume and duplicating the data stored in the first logical volume to the second logical volume; and accessing, by the computer, the data stored in the first logical volume via the first virtual volume and the data stored in the second logical volume via the second virtual volume using the same identification number.
 9. A method according to claim 8, further comprising the step of: returning, by the first storage device, a write complete message to the computer after receiving a write data reception message from the second storage device.
 10. A method according to claim 8, further comprising the step of: transferring data requested to be written to the first virtual volume to the second virtual volume via remote copy.
 11. A method according to claim 8, wherein the first virtual volume and the second virtual volume are access targets of the computer.
 12. A method according to the claim 8, further comprising the step of: managing, by a host bus adapter of the computer, a relationship between the identifier used by an application of the computer and an actual identifier of the first virtual volume and the second virtual volume.
 13. A method according to claim 8, further comprising the step of: configuring the computer to switch a destination of a request from the first storage device to the second storage device in a case that the request to the first virtual volume is not processed by the first storage device.
 14. A method according to claim 8, further comprising the step of: canceling a setting of the second virtual volume to deny a request from an application of the computer with the transferring of the data to be duplicated from the first logical volume to the second logical volume. 