Patent classifications
G06F3/0664
UPGRADING THE FILE SYSTEM OF OBJECTS IN A DISTRIBUTED STORAGE SYSTEM
An example method of upgrading a distributed storage object from a first version to a second version includes: querying metadata of a first component configured according to the first version of the distributed storage object, the metadata defining extents of data on a disk group of the first component; populating, for a second component configured according to the second version of the distributed storage object, logical and middle maps based on the metadata such that initial entries in the logical map point to initial entries in the middle map, and the initial entries in the middle map point to physical addresses of the disk group of the first component; and reading the data from the disk group of the first component and writing the data to a disk group of the second component while updating the initial entries in the middle map.
Managed switching between one or more hosts and solid state drives (SSDs) based on the NVMe protocol to provide host storage services
A non-volatile memory express (NVMe) switch is located in between a host and storage. A first storage access command is received from a host via a peripheral computer interface express (PCIe) interface to access the storage. The first storage access command conforms to NVMe and the storage comprises two or more solid-state drives (SSDs). A respective second storage access command is sent to the two or more SSDs based on the first storage access command. A respective completion is received from each of the two or more SSDs based on the respective second storage access command. A completion is sent to the host via the PCIe interface based on the received completions from each of the two or more SSDs.
Encapsulated FICON communication
Using an alternative communication protocol between a first system and a second system that are otherwise configured to communicate using a FICON protocol includes the first system determining if the alternative communication protocol is handled by the second system, the first system providing encapsulated data by encapsulating FICON data if the alternative communication protocol is handled at the second system, and the first system transmitting the encapsulated data directly to the second system using the alternative communication protocol if the alternative communication protocol is handled at the second system. The alternative communication protocol may be TCP/IP. At least one of the systems is a host computing system, an array storage system, and/or a tape emulation system. At least one of the systems may be a simulation of a host computing system, an array storage system, and/or a tape emulation system.
Power Limits for Virtual Partitions in a Processor
In an embodiment, a processor includes multiple processing engines and a power control unit. The power control unit is to receive a mapping of multiple virtual partitions to sets of the processing engines, and in response to a receipt of the mapping of multiple of virtual partitions: access a power limit table for the processor, and generate multiple virtual partition power limit tables based on the power limit table for the processor, where each virtual partition power limit table is associated with a different virtual partition. Other embodiments are described and claimed.
KEY VALUE STORE WITH DISTRIBUTED SHARED ACCESS BY CLIENTS
Techniques are provided for hosting a key value store. A persistent storage backend is used to centrally host a key value store as disaggregated storage shared with a plurality of clients over a network fabric. A network storage appliance is connected to the plurality of clients over the network fabric, and is configured with a key value store interface. The key value store interface is configured to receive a key value command from a client. The key value store interface parses the key value command to identify a translation layer binding for a key value store targeted by the key value command. The key value store interface translates the key value command into a key value operation using the translation layer binding, and executes the key value operation upon the key value store.
Encrypted cross-zone replication for cross-zone replicated block storage devices
The present disclosure generally relates to creating virtualized block storage devices whose data is replicated across isolated computing systems to lower risk of data loss even in wide-scale events, such as natural disasters. The virtualized device can include at least two volumes, each of which is implemented in a distinct computing system. Each volume can be encrypted with a distinct key, and an encryption service can operate to transform data “in-flight” on the replication path between the volumes, reencrypting data according to the key appropriate for each volume.
Emulation test system for flash translation layer and method thereof
The present disclosure relates to an emulation test system for flash translation layer and a method thereof, the system comprising a network block device, a virtual hardware accelerator, a flash translation layer module, and a virtual flash memory based on the network block device, wherein the network block device is configured to receive and forward test information, the test information including a read instruction and/or a write instruction and data to be written; the virtual hardware accelerator is configured to allocate the test information to each thread of the virtual hardware accelerator and perform virtual hardware acceleration on the flash translation layer module; and the flash translation layer module is configured to operate the virtual flash memory based on the test information to obtain an operation result.
APPARATUS AND METHOD FOR MANAGING INTEGRATED STORAGE BASED ON MEMORY
Disclosed herein are an apparatus and method for managing memory-based integrated storage. The apparatus includes one or more processors and executable memory for storing at least one program executed by the one or more processors. The at least one program converts data operation tasks in response to a request for access to memory-based integrated storage from a user, a single virtual disk of a virtual storage pool of the memory-based integrated storage converts a disk access command into a command for connecting to a storage backend depending on the data operation tasks, and conversion of the data operation tasks into the command includes target identification indicating which local storage of the memory-based integrated storage is to be used.
DATA AND CONFIGURATION INTEGRITY CHECKING POST-ROLLBACK USING BACKUPS IN VIRTUALIZED COMPUTING ENVIRONMENTS
A rollback can be performed after completing an upgrade to components of a virtualized computing environment. When the upgrade is performed, an upgrade bundle having rollback scripts is provided to edges, hosts, and managers in the virtualized computing environment that are to be upgraded. When a rollback is to be performed, the rollback scripts are executed, and the components are rolled back in a reverse order relative to their upgrade order. Data and configuration checking are performed to validate the results of the rollback.
Saving virtual memory space in a clone environment
Virtual memory space may be saved in a clone environment by leveraging the similarity of the data signatures in swap files when a chain of virtual machines (VMs) includes clones spawned from a common parent and executing common applications. Deduplication is performed across the chain, rather than merely within each VM. Examples include generating a common deduplication identifier (ID) for the chain; generating a logical addressing table linked to the deduplication ID, for each of the VMs in the chain; and generating a hash table for the chain. Examples further include, based at least on a swap out request, generating a hash value for a block of memory to be written to a storage medium; and based at least on finding the hash value within the hash table, updating the logical addressing table to indicate a location of a prior-existing duplicate of the block on the storage medium.