G06F11/2056

Anomaly detection in deduplication pruning operations

Described herein are techniques for better understanding problems arising in an illustrative information management system, such as a data storage management system, and for issuing appropriate alerts and reporting to data management professionals. The illustrative embodiments include a number of features that detect and raise awareness of anomalies in system operations, such as in deduplication pruning operations. Such anomalies can include delays in the processing of archive files to be deleted and/or delays in the generation of the list of archive files to delete. Anomalies are characterized by frequency anomalies and/or by occurrence counts. Utilization is also of interest for certain key system resources, such as deduplication databases, CPU and memory at the storage manager, etc., without limitation. Predicting low utilization periods for these and other key resources is useful for scheduling maintenance activities without interfering with ordinary deduplication pruning operations and/or other data protection jobs.

System and method for parallel journaling in a storage cluster

A method, computer program product, and computing system for receiving, via a first node of a plurality of nodes, data for storage in a storage system. The data may be written, via the first node, to one or more data pages of a log buffer of the first node. One or more page descriptors associated with the one or more data pages may be generated via the first node. The one or more page descriptors may be sent to a second node concurrently with the writing of the data to the one or more data pages of the log buffer of the first node.

Using mirror indicators to indicate whether to mirror tracks in a data set in a primary volume mirrored to a secondary volume

Provided are a computer program product, system, and method for using mirror indicators to indicate whether to mirror tracks in a data set in a primary volume mirrored to a secondary volume. A table includes a mirror indicator for each of a plurality of tracks in at least one data set in the primary volume indicating whether a track is to be mirrored to the secondary volume. In response to a write command of write data for one of the tracks in the primary volume, creating a record set in a cache for the primary volume including write data for the track to transfer to the secondary volume in response to the mirror indicator for the track indicating that the track is to be mirrored. The write data in the record set is transferred from the cache to the secondary volume.

Data storage system employing a hot spare to store and service accesses to data having lower associated wear

A controller monitors access frequencies of address ranges mapped to a data storage array. Based on the monitoring, the controller identifies frequently accessed ones of the address ranges that have lower associated wear, for example, those that are read more often than written. In response to the identifying, the controller initiates copying of a dataset associated with the identified address ranges from the data storage array to a spare storage device while refraining from copying other data from the data storage array onto the spare storage device. The controller directs read input/output operations (IOPs) targeting the identified address ranges to be serviced by access to the spare storage device. In response to a failure of a failed storage device among the plurality of primary storage devices, the controller rebuilds contents of the failed storage device on the spare storage device in place of the dataset associated with the identified address ranges.

Layered keys for storage volumes
09740583 · 2017-08-22 · ·

Techniques are described for managing data storage. Users may create data storage volumes that may each be stored by a data storage service. In an embodiment, chunks that differ between related volumes may be encrypted with different encryption keys. One or more of the encryption keys may be deleted in response to a request to delete a volume or a data chunk, rendering the volume and/or the data chunk unusable. Other techniques are described in the drawings, claims, and text of the disclosure.

Maintaining a memory replica of a primary computer system

A method for maintaining a memory replica of a primary computer system to be used by an alternate computer system is provided. Provided are detecting changes performed on a memory device of the primary computer system by software executed on the primary computer system. Also provided is monitoring at least one memory controller of the primary computer system; triggering, based on the monitoring, a snapshot creation procedure, the snapshot creation procedure comprising creating a memory snapshot that comprises the detected changes.

Data recovery mechanisms in deduplication-enabled storage facilities

A data recovery method recovers corrupted data after a disaster event in a storage facility operating with deduplication in which copies of data are maintained between volumes through a copy services relationship. The deduplication operates with referencing domains, each having a source grain containing a reference pointing to a location where data is stored and referrers pointing to the source. The data recovery method identifies any source that is pointing to data which is corrupt and then establishes whether a copy services relationship exists between the referencing domain of the source with corrupted data and another referencing domain, in which case the other referencing domain will have a copy of the corrupted data. Provided that the copy is valid, it is written across to replace the corrupted data. The method allows corrupted source data to be recovered without having to perform a full resync or restore.

METHOD, APPARATUS, AND SYSTEM FOR DEEP MIRRORING
20170230456 · 2017-08-10 · ·

A method, an apparatus, and a system for deep mirroring are disclosed. The method includes: obtaining file data, an application program, and operating system information that are of a first device (S101); storing the file data, the application program, and the operating system information in a memory cell (S103): if an operation change occurs on the first device, receiving an operation change instruction or operation change data of the first device (S105); and updating the stored file data, application program, and operating system information according to the operation change instruction or the operation change data of the first device (S107). By using the solutions provided, depth and real-time performance in object mirroring are enhanced.

Snapshot Processing Method and Related Device
20170228181 · 2017-08-10 ·

A snapshot processing method includes: receiving a snapshot request command, where the snapshot request command includes an ID of a primary LUN; determining the primary LUN according to the ID of the primary LUN, and setting a snapshot status of the primary LUN to a preparation state; sending a first snapshot command to a mirror storage device, where the first snapshot command includes the ID of the primary LUN, and the first snapshot command is used to notify the mirror storage device that the primary LUN is in the preparation state; receiving a response message, sent by the mirror storage device, of the first snapshot command, where the response message is used to notify the primary storage device that a mirrored LUN is in the preparation state; and performing snapshot processing on the primary LUN.

Raid Data Migration Through Stripe Swapping
20170220481 · 2017-08-03 ·

A system and method for improving storage system operation is disclosed. A storage system includes a first tier with high-performance redundancy and a second tier with capacity efficient redundancy. The first tier and the second tier are built from the same storage devices in a storage pool so each storage device includes both the first and second tiers. The storage system stores write data initially to the first tier. When demand for the data falls below a threshold, the storage system migrates the write data to the second tier. This is done by changing the mapping of underlying physical locations on the storage devices where the write data is stored so that the underlying physical locations are logically associated with the second tier instead of the first tier. After remapping, the storage system also computes parity information for the migrated write data and stores it in the second tier.