Patent classifications
G06F2211/1088
Capturing compression efficiency metrics for processing data
Provided are techniques for capturing compression efficiency metrics for processing data. In response to retrieving native data for a first operation, perform the first operation; perform a second operation to generate a compression efficiency metric from the native data based on a ratio of the native data to compressed native data; and store the compression efficiency metric persistently for subsequent use in prioritizing compression of the native data.
Storage Systems with Peer Data Scrub
Example peer storage systems, storage devices, and methods provide data scrub using a peer communication channel. Peer storage devices establish peer communication channels that communicate data among the peer storage devices. A storage device may identify data segments from their storage medium for a data scrub process. A peer storage device may be identified that contains corresponding data segments to the data segment being scrubbed. A corresponding lock command may be sent over the peer communication channel to lock the corresponding data segments during the data scrub process. A data scrub error report may be generated from the data scrub process. If an error is discovered during the data scrub process the storage device may use the peer communication channel to retrieve recovery data from peer storage devices to rebuild the data segment with the error.
Distributed data method for encrypting data
Techniques for performing data encryption on data to be stored within a storage system are provided. A client application executing on a host machine may generate a data storage write request to write data to a storage system. A host-side module, executing on the host machine receives the write request. The host-side module is configured to generate one or more fingerprints for the data corresponding to the write request, where the one or more fingerprints are unique identifiers used to identify data blocks that make up the data. The host-side module generates encrypted data by encrypting the data blocks using an encryption technique. The encrypted data is then sent to a storage node within the storage system. Deduplication may be performed on the encrypted data using the one or more generated fingerprints.
Block priority information
Example implementations relate to a storage system. An example implementation includes a storage system including a controller coupled to a storage medium. The controller is to receive block priority information from a file system via a communication agent. The block priority information and the file system are associated with the storage medium. Based on the block priority information, the controller is to selectively perform an operation on the storage medium. The operation includes a reconstruction operation, a data scrubbing operation, and a data migration operation.
System and method for managing a non-volatile storage resource as a shared resource in a distributed system
A data storage system has a plurality of hosts that request writes of data to a relatively high-performance storage device (RHPSD) such as NVRAM, which may be one of a plurality of RHPSDs in a plurality of storage nodes. A storage management system receives the write requests and writes received data to the RHPSD. According to an allocation policy, the storage management system indicates to at least one of the hosts that it should limit its use of RHPSD and it then discards data upon indication from that host to do so. Before being discarded from the RHPSD, the data may be written to a persistent storage device.
DATA STORAGE WITH A DISTRIBUTED VIRTUAL ARRAY
A data storage system includes a plurality of hosts, each of which includes at least one processor and communicates over a network with a plurality of storage nodes, at least one of which has at least one storage device, at least one storage controller, and at least one non-volatile memory. At least one process within a host issues data storage read/write requests. At least one of the hosts has a cache for caching data stored in at least one of the plurality of storage nodes. The host writes data corresponding to a write request to at least one remote non-volatile memory and carries out at least one storage processing function; data in the written-to node may then be made available for subsequent reading by a different one of the hosts. Examples of the storage processing function include compression, ECC computation, deduplicating, garbage collection, write logging, reconstruction, rebalancing, and scrubbing.
Data storage with a distributed virtual array
A data storage system includes a plurality of hosts, each of which includes at least one processor and communicates over a network with a plurality of storage nodes, at least one of which has at least one storage device, at least one storage controller, and at least one non-volatile memory. At least one process within a host issues data storage read/write requests. At least one of the hosts has a cache for caching data stored in at least one of the storage nodes. The host writes data corresponding to a write request to at least one remote non-volatile memory and carries out at least one storage processing function; data in the written-to node may then be made available for subsequent reading by a different one of the hosts. Examples of the storage processing function include compression, ECC computation, deduplicating, garbage collection, write logging, reconstruction, rebalancing, and scrubbing.
SYSTEM AND METHOD FOR MANAGING A NON-VOLATILE STORAGE RESOURCE AS A SHARED RESOURCE IN A DISTRIBUTED SYSTEM
A data storage system has a plurality of hosts that request writes of data to a relatively high-performance storage device (RHPSD) such as NVRAM, which may be one of a plurality of RHPSDs in a plurality of storage nodes. A storage management system receives the write requests and writes received data to the RHPSD. According to an allocation policy, the storage management system indicates to at least one of the hosts that it should limit its use of RHPSD and it then discards data upon indication from that host to do so. Before being discarded from the RHPSD, the data may be written to a persistent storage device.
Antivirus scan during a data scrub operation
For an antivirus scan during a data scrub operation, the antivirus scan is concurrently performed as an overlap with the data scrub operation, wherein the data scrub operation periodically inspects and corrects memory errors. The antivirus scan concurrently performing as an overlap with the data scrub operation is increased if a reduction in disk access by a host application is detected.
System and method for managing a non-volatile storage resource as a shared resource in a distributed system
A data storage system has a plurality of hosts that request writes of data to a relatively high-performance storage device (RHPSD) such as NVRAM, which may be one of a plurality of RHPSDs in a plurality of storage nodes. A storage management system receives the write requests and writes received data to the RHPSD. According to an allocation policy, the storage management system indicates to at least one of the hosts that it should limit its use of RHPSD and it then discards data upon indication from that host to do so. Before being discarded from the RHPSD, the data may be written to a persistent storage device.