G06F3/0664

Dynamically modifying block-storage volumes using forecasted metrics

Features are disclosed for forecasting a usage of a block storage volume with a first configuration by a user. A computing device can forecast the usage of the block storage volume based on the historical usage of the block storage volume by the user. The computing device can determine additional potential configurations of the block storage volume. The computing device can further simulate the additional potential configurations of the block storage volume based on the forecasted usage of the block storage volume. The additional potential configurations may include a volume type, a volume size, or other volume characteristics. Based on the simulations of the additional potential configurations, the computing device may determine a recommended configuration. The computing device can dynamically modify the block storage volume based on the recommended configuration of the block storage volume.

Reducing write delays while taking snapshots
11709614 · 2023-07-25 · ·

Snapshots are processed without holding all write operations while the snapshots are being activated. Rather than holding all write operations until snapshots are activated, write operations may be allowed to proceed. Snapshot write processing may be temporarily suspended while the snapshots are being activated, including snapshot metadata being updated, while write operations received while the snapshots are being activated are logged. After snapshots have been activated for all logical LSUs for which snapshots were instructed to be activated, the logging of write operations may be stopped, and the logged write entries processed to determine whether any of the logged write operations require updating snapshot information of any logical storage elements (LSEs) of the LSUs. While the logged write operations are being processed, any write operations received from a host for an LSE having a logged write operation may be held until the held operation, or all held operations are processed.

RESTRICTED ADDRESS TRANSLATION TO PROTECT AGAINST DEVICE-TLB VULNERABILITIES

An apparatus includes an extended capability register and an input/output (I/O) memory management circuitry. The I/O memory management circuitry is to receive, from an I/O device, an address translation request referencing a guest virtual address associated with a guest virtual address space of a virtual machine. The I/O memory management circuitry may translate the guest virtual address to a guest physical address associated with a guest physical address space of the virtual machine, and, responsive to determining that a value stored by the extended capability register indicates a restrict-translation-request-response (RTRR) mode, transmit, to the I/O device, a translation response having the guest physical address.

EDGE ACCELERATOR CARD
20230236764 · 2023-07-27 ·

An edge accelerator card has a first interface, a second interface, a memory and a processor. The first interface is to couple to a server. The second interface is to couple to a storage system. The processor is to handle communication between the server and the storage system through the first interface and the second interface. The processor is to perform at least one task as directed by the storage system, using the memory and communication through at least the second interface.

CONTROLLED INPUT/OUTPUT IN PROGRESS STATE DURING TESTCASE PROCESSING

A transient input/output in progress state is established during processing of a testcase by a test infrastructure in a computing environment. The method includes obtaining the testcase for an object having one or more pages, and processing the testcase by the test infrastructure. Processing the testcase by the test infrastructure includes, for a page of the object, generating a delay in the processing of the testcase for the page of the object. The delay opens a transient input/output in progress state during which one or more test operations reference the page of the object.

Node regeneration in distributed storage systems

Systems, devices, and methods are disclosed herein for containerized scalable storage applications. Methods may include instantiating an application instance based on a plurality of application instance parameters, the application instance being configured to utilize a plurality of storage volumes implemented in a storage cluster. Methods may also include enumerating a plurality of unattached storage volumes included in the cluster associated with the application instance, the plurality of unattached storage volumes having a plurality of underlying physical storage devices, and the plurality of unattached storage volumes being identified based on a plurality of application instance parameters. The methods may further include attaching at least some of the plurality of unattached storage volumes to the application instance, wherein the attaching enables the application instance to access data stored in the attached storage volumes.

Detect and triage data integrity issue for virtual machine

One example method includes receiving an IO request that specifies an operation to be performed concerning a data block, determining if a policy exists for a device that made the IO request, when a policy is determined to exist for the device, comparing the IO request to the policy, recording the IO request, and passing the IO request to a disk driver regardless of whether the IO request is determined to violate the policy or not.

STORAGE VOLUME CREATION USING PERFORMANCE VOLUMES AND CAPACITY VOLUMES
20230236768 · 2023-07-27 ·

Methods, apparatus, and processor-readable storage media are provided herein for storage volume creation using performance volumes and capacity volumes. An example computer-implemented method includes configuring a storage system with at least first and second storage tiers each comprising a plurality of storage devices; creating a virtual storage volume having a first portion corresponding to at least a portion of the plurality of storage devices of the first storage tier and a second portion corresponding to at least a portion of the plurality of storage devices of the second storage tier; and processing input-output requests from one or more host devices associated with the virtual storage volume, wherein the processing comprises moving data between the first portion and the second portion of the virtual storage volume so that each of the input-output requests is processed using the first portion of the virtual storage volume.

On-demand restore of virtual machine data

An improved information management system is described herein that provides on-demand or live mount access to virtual machine data in a secondary copy format. For example, instead of restoring all of the virtual machine data in the secondary copy format to a virtual disk that is then mounted to a virtual machine, the improved information management system can, in response to request to access virtual machine data in a secondary copy format, create a virtual disk having a universal network component (UNC) path and create a virtual machine configured to access data via the UNC path. Once created and booted, the administrator or user can attempt to access the desired virtual machine data via the virtual machine.

AUTOMATED STORAGE ACCESS CONTROL FOR CLUSTERS

A method for dynamic access control in a virtual storage environment is provided. Embodiments include providing, by a component within a cluster of virtual computing instances (VCIs), one or more computing node identifiers associated with the cluster to a management entity associated with a file volume. Embodiments include modifying, by the management entity, an access control list associated with the file volume based on the one or more computing node identifiers. Embodiments include determining, by the component, a configuration change related to the cluster. Embodiments include providing, by the component, based on the configuration change, an updated one or more computing node identifiers associated with the cluster to the management entity. Embodiments include modifying, by the management entity, the access control list associated with the file volume based on the updated one or more computing node identifiers.