G06F11/2056

Techniques for scalable storage without communication on the synchronous path
11397533 · 2022-07-26 · ·

A system and method for scalable storage. The method includes placing a lock on a portion of a storage node, wherein placing the lock further comprises replacing a first value stored in the storage node with a second value using an atomic operation, wherein the atomic operation replaces the first value with the second value when the first value indicates an empty lock status, wherein the second value indicates an active lock status; allocating a storage location in the storage node by updating metadata stored in the locked portion of the storage node when the lock has been placed; and releasing the lock, wherein releasing the lock further comprises replacing the second value with a third value, wherein the third value indicates the empty lock status.

System and Method for Parallel Journaling in a Storage Cluster

A method, computer program product, and computing system for receiving, via a first node of a plurality of nodes, data for storage in a storage system. The data may be written, via the first node, to one or more data pages of a log buffer of the first node. One or more page descriptors associated with the one or more data pages may be generated via the first node. The one or more page descriptors may be sent to a second node concurrently with the writing of the data to the one or more data pages of the log buffer of the first node.

APPLICATION-BASED STORAGE DEVICE CONFIGURATION SETTINGS
20210405893 · 2021-12-30 ·

Systems, storage devices, and methods for application-based storage device configuration settings are described. A storage device may receive a storage command and dynamically select an application set of configuration settings for processing the storage command, where the configuration settings include trim parameters for writing data units to the storage medium of the storage device.

DATA REBUILD INDEPENDENT OF ERROR DETECTION

A method for proactively rebuilding user data in a plurality of storage nodes of a storage cluster in a single chassis is provided. The method includes distributing user data and metadata throughout the plurality of storage nodes such that the plurality of storage nodes can read the user data, using erasure coding, despite loss of two of the plurality of storage nodes. The method includes determining to rebuild the user data for one of the plurality of storage nodes in the absences of an error condition. The method includes rebuilding the user data for the one of the plurality of storage nodes. A plurality of storage nodes within a single chassis that can proactively rebuild the user data stored within the storage nodes is also provided.

Workload coordination on disaster recovery site

Described are techniques for utilization of a disaster recovery site including a method comprising receiving a mirrored data stream at a disaster recovery site from a production site. The mirrored data stream includes a workload instruction stored in a reserved record set type. The workload instruction indicates an operation to perform on a set of data that is replicated between the production site and the disaster recovery site and a time indicator indicating a correct version of the set of data. The method further comprises generating a consistency point by retrieving replicated data from the disaster recovery site corresponding to the correct version of the set of data in the production site. The method further comprises performing the operation on the consistency point, generating an output, and transmitting the output to the production site.

Using mirror path statistics in recalling extents to a primary storage system and a secondary storage system from a third storage system

Provided are a computer program product, system, and method for using mirror path statistics in recalling extents to a primary storage system and a secondary storage system from a third storage system, A recall request is received to recall extents from the third storage that were migrated from the primary storage or the secondary storage to the third storage. A determination is made as to whether mirror paths used to migrate extents from the primary storage to the secondary storage exceed a degradation criteria. Commands are sent to cause the recall extents to be recalled from the third storage to both the primary storage and the secondary storage in response to determining that the mirror paths exceed the degradation criteria.

MEMORY ERROR PROCESSING METHOD AND APPARATUS
20210389956 · 2021-12-16 · ·

In a memory error processing method, a processor of a computer apparatus obtains from a basic input/output system (BIOS) first error description information that describes a type of a first error that has occurred in a first memory page. Based on the first error description information, the processing device identifies the type of the first error to be a first type, wherein an error of the first type is a corrected error and is not a mirror scrub success error. The processor then determines that a number of errors of the first type that occurred in the first memory page has reached a threshold. In response to the determining, the processing device takes the first memory page offline.

BALANCING RESILIENCY AND PERFORMANCE BY SELECTIVE USE OF DEGRADED WRITES AND SPARE CAPACITY IN STORAGE SYSTEMS
20210373796 · 2021-12-02 ·

Techniques are provided for processing user input/output (I/O) write requests in a fault-tolerant data storage system (e.g., a RAID storage system) by selecting between performing a degraded write operation or a write operation to spare capacity, when the fault-tolerant data storage system is operating in a degraded mode. A method includes receiving a user I/O write request comprising data to be written to a RAID array operating in a degraded mode, and determining whether spare capacity has been allocated for rebuilding missing data of an inaccessible storage device of the RAID array and whether a missing data block, which is associated with I/O write request, has been rebuilt to the spare capacity. A degraded write operation is performed without using the spare capacity, when the missing data block, which is associated with the data of the I/O write request, has not been rebuilt to the allocated spare capacity.

DYNAMIC BANDWIDTH MANAGEMENT ON A STORAGE SYSTEM
20210374078 · 2021-12-02 · ·

Bandwidth on a front-end port of a storage system may be managed. A plurality of logical storage units may be divided into a plurality of priority groups according to a predefined priority. For a first priority group of the plurality of priority groups having a highest priority, a first forecasted average amount of bandwidth of the first port to be consumed by the logical storage units of the first priority group during a first temporal interval may be determined. Based on the first forecasted average amount, a first reserve amount of bandwidth on the first port to be reserved for use by the logical storage units of the first priority group during the first temporal interval may be determined. The first reserve amount of bandwidth on the first port for use by the logical storage units of the first priority group during the first temporal interval may be reserved.

EXTERNAL DYNAMIC VIRTUAL MACHINE SYNCHRONIZATION

Embodiments disclosed herein include systems and processes for replicating one or more user computing systems of an information management system at an external resource system to create a backup or fallback of the user computing systems. Replicating the user computing systems may include replicating data as well as the applications, operating systems and configuration of the user computing systems. This replicated or fallback user computing system may be implemented on a virtual machine at the external resource system. Thus, if a user computing system becomes inaccessible, a new user computing system can be generated based on the backup copy of the user computing system at the external resource system. Further, in some embodiments, the copy of the user computing system may be interacted with at the external resource system. Thus, certain embodiments disclosed herein can be used to transition an information management system to an external resource system.