LISA '07 – Abstract
Pp. 131–140 of the Proceedings
Policy-Driven Management of Data Sets
Jim Holl, Kostadis Roussos, and Jim Voll, Network Appliance, Inc.
Contemporary storage systems separate the management of data from
the management of the underlying physical storage media used to store
that data. This separation is artificial and increases the overall
burden of managing such systems. We propose a new management layer
that unifies data and storage management without any loss of control
over either the data or the storage.
The new management layer consists of three basic entities: data
sets, which describe the data managed by the system, policies that
specify rules for the management of data sets, and resource pools that
represent storage that can be used to implement the policies for the
data sets. Using data sets and policies, data administrators are able
to directly manage their data, even though that requires them to
indirectly manage the underlying storage infrastructure. The storage
administrator retains control over what the data administrator can do
to the storage.
This new management layer provides the infrastructure necessary to
build mechanisms that automate or simplify many administrative tasks,
including the necessary coordination between the data and storage
administrators. We describe Protection Manager, the first tool that
uses this management layer to present storage management in the
context of data management tasks that the data administrator wants to
perform, and evaluate the effectiveness of using this management layer
as a way to automate backups.
- View the full text of this paper in HTML and PDF.
Listen to the presentation in
Until November 2008, you will need your USENIX membership identification in order to access the full papers.
The Proceedings are published as a collective work, © 2007 by the USENIX Association. All Rights Reserved. Rights to individual papers remain with the author or the author's employer. Permission is granted for the noncommercial reproduction of the complete work for educational or research purposes. USENIX acknowledges all trademarks within this paper.