Patent classifications
G06F11/3034
MANAGEMENT SYSTEM, QoS VIOLATION DETECTION METHOD, AND QoS VIOLATION DETECTION PROGRAM
It is possible to reduce analysis cost of a management system.
The management system includes a CPU and manages one or more storage devices that provide, to a higher-level device, one or more volumes for inputting and outputting data. The CPU is configured to collect performance information of the volume from the storage device at a predetermined first time interval and detect a QoS violation of the performance information of the volume at a second time interval longer than the first time interval.
Selecting paths between a host and a storage system
Managing input/output (‘I/O’) queues in a data storage system, including: receiving, by a host that is coupled to a plurality of storage devices via a storage network, a plurality of I/O operations to be serviced by a target storage device; determining, for each of a plurality of paths between the host and the target storage device, a data transfer maximum associated with the path; determining, for one or more of the plurality of paths, a cumulative amount of data to be transferred by I/O operations pending on the path; and selecting a target path for transmitting one or more of the plurality of I/O operations to the target storage device in dependence upon the cumulative amount of data to be transferred by I/O operations pending on the path and the data transfer maximum associated with the path.
Generation, validation and implementation of storage-orchestration strategies using virtual private array (VPA) in a dynamic manner
A data storage management layer comprises computing device(s), operatively connected to storage resources, which comprise data storage units and control units. The data storage management layer is operatively connected to the storage resources. They are operatively connected to host computers. A sub-set of the storage resources are assigned to each host, in order to provide storage services according to performance requirements predefined for the host, thereby generating Virtual Private Arrays (VPA). The computing device(s) are configured to perform a method of managing the data storage system comprising: (a) implement storage management strategies, comprising rules. The rules comprise conditions and actions. The actions are capable of improving VPA performance in a dynamic manner; (b) repetitively performing: (i) monitor VPA performance for detection of compliance of VPA with the condition(s); and (ii) responsive to detection of compliance of VPA with the condition(s), performing the action(s).
READ-DISTURB-BASED READ TEMPERATURE INFORMATION UTILIZATION SYSTEM
A read-disturb-based read temperature information utilization system includes a read-disturb-based read temperature information utilization subsystem coupled to a storage subsystem including storage devices that each generate local read-disturb-based read temperature information associated with that storage device. The read-disturb-based read temperature information utilization subsystem retrieves at least some of the local read-disturb-based read temperature information generated by each storage device and a number of reads associated with that storage device and, based on the number of reads associated with each of the storage devices, normalizes the at least some of the local read-disturb-based read temperature information retrieved from each of the storage devices to generate normalized local read-disturb-based read temperature information for each of the storage devices. The read-disturb-based read temperature information utilization subsystem then uses that normalized local read-disturb-based read temperature information for the storage devices to generate normalized global read-disturb-based read temperature information for the plurality of storage devices.
STORAGE DEVICE READ-DISTURB-BASED READ TEMPERATURE MAP UTILIZATION SYSTEM
A storage device read-disturb-based read temperature map utilization system includes a storage device chassis housing a storage subsystem. A local read temperature utilization subsystem in the storage device chassis determines read disturb information for a plurality of blocks in the storage subsystem, uses it to identify a subset of rows in block(s) in the storage subsystem that have a relatively higher read temperature and, based on those read temperature identifications, generates a local logical storage element read temperature map that identifies a subset of logical storage elements associated with the storage subsystem that have a relatively higher read temperature. The local read temperature utilization subsystem then moves data from first block(s) in the storage subsystem to second block(s) in the storage subsystem based on relative read temperatures identified in the local logical storage element read temperature map.
Methods and systems for adaptive memory-resource management
Described are self-learning systems and methods for adaptive management of memory resources within a memory hierarchy. Memory allocations associated with different active functions are organized into blocks for placement in alternative levels in a memory hierarchy optimized for different metrics of e.g. cost and performance. A host processor monitors a performance metric of the active functions, such as the number of instructions per clock cycle, and reorganizes the function-specific blocks among the levels of the hierarchy. Over time, this process tends toward block organizations that improve the performance metric.
Determining and implementing a feasible resource optimization plan for public cloud consumption
Example implementations relate to determining and implementing a feasible resource optimization plan for public cloud consumption. Telemetry data over a period of time is obtained for a current deployment of virtual infrastructure resources within a current data center of a cloud provider that supports an existing service and an application deployed on the virtual infrastructure resources. Information regarding a set of constraints to be imposed on a resource optimization plan is obtained. Indicators of resource consumption relating to the currently deployed virtual infrastructure resources during the period of time are identified by applying a deep learning algorithm to the telemetry data. A resource optimization plan is determined that is feasible within the set of constraints based on a costing model associated with resources of an alternative data center of the cloud provider, the indicators of resource consumption and costs associated with the current deployment.
Storage network with enhanced data access performance
A method for execution by a storage network begins by issuing a decode threshold number of read requests for a set of encoded data slices to a plurality of storage units of a set of storage units and continues by determining whether less than a decode threshold number of read requests has been received in a time window. The method continues by identifying one or more encoded data slices encoded data slices associated with read requests of the decode threshold number of read requests that have not been received and for an encoded data slice of the one or more encoded data slices, issuing a priority read request to a storage unit storing a copy of the encoded data slice. The method then continues by receiving a response from the storage unit storing the copy of the encoded data, where the storage unit storing the copy of the encoded data slice is adapted to delay one or more maintenance tasks in response to the priority read request.
Generation of host requests to a storage controller for read diagnostic parameters for a data mirroring configuration
A host is configured to communicate with a storage controller over a first storage area network. A request is transmitted from the host to the storage controller to provide read diagnostic parameters of a second storage area network that is used to mirror data controlled by the storage controller to another storage controller. The host receives the read diagnostic parameters of the second storage area network from the storage controller.
Tiering Valid Data after a Disaster Recovery Operation
Staging data on a storage element integrating fast durable storage and bulk durable storage, including: receiving, at a storage element integrating fast durable storage and bulk durable storage, a data storage operation from a host computer; storing data corresponding to the data storage operation within fast durable storage in accordance with a first data resiliency technique; and responsive to detecting a condition for transferring data between fast durable storage and bulk durable storage, transferring the data from fast durable storage to bulk durable storage in accordance with a second data resiliency technique.