Abstract:
Methods and systems for a networked storage system are provided. One method includes filtering performance data associated with a resource used in a networked storage environment for reading and writing data at a storage device; and determining available performance capacity of the resource using the filtered performance data. The available performance capacity is based on optimum utilization of the resource and actual utilization of the resource, where utilization of the resource is an indicator of an extent the resource is being used at any given time, the optimum utilization is an indicator of resource utilization beyond which throughput gains for a workload is smaller than increase in latency and latency is an indicator of delay at the resource in processing the workload.
Abstract:
Methods and systems for a networked storage system are provided. One method includes filtering performance data associated with a resource used in a networked storage environment for reading and writing data at a storage device; and determining available performance capacity of the resource using the filtered performance data. The available performance capacity is based on optimum utilization of the resource and actual utilization of the resource, where utilization of the resource is an indicator of an extent the resource is being used at any given time, the optimum utilization is an indicator of resource utilization beyond which throughput gains for a workload is smaller than increase in latency and latency is an indicator of delay at the resource in processing the workload.
Abstract:
Methods and systems for managing resources in a storage system are provided. The methods include tracking performance of a plurality of resources used for reading and writing information at storage devices in a networked storage system, each resource represented by a logical object in a hierarchical structure and performance data associated with each logical object is maintained by a processor executing a management application out of a memory device; identifying a root object associated with a resource having a performance issue as indicated by a threshold violation for the resource; selecting a related object associated with a resource similar to the resource of the root object by the management application for comparing performance data of the root object with the related object; and using the comparison to verify that the root object is a root cause of the performance issue.
Abstract:
Methods and systems for managing resources in a storage system are provided. The methods include tracking performance of a plurality of resources used for reading and writing information at storage devices in a networked storage system, each resource represented by a logical object in a hierarchical structure and performance data associated with each logical object is maintained by a processor executing a management application out of a memory device; identifying a root object associated with a resource having a performance issue as indicated by a threshold violation for the resource; selecting a related object associated with a resource similar to the resource of the root object by the management application for comparing performance data of the root object with the related object; and using the comparison to verify that the root object is a root cause of the performance issue.
Abstract:
Methods and systems for managing resources in a networked storage environment are provided. One method includes using a queuing model for a resource that processes a plurality of requests at a networked storage environment for predicting a relationship between latency and utilization of the resource. The queueing model uses inter-arrival time and service time to determine latency, where inter-arrival time is a duration that tracks when requests arrive at the resource and the service time tracks a duration for servicing the requests by the resource. The method further includes identifying optimum utilization of the resource using the predicted relationship between latency and utilization, where the optimum utilization is an indicator of resource utilization beyond which throughput gains for a workload is smaller than increase in latency; and determining available performance capacity for the resource using the optimum utilization and actual utilization of the resource.
Abstract:
Methods and systems for presenting a plurality of options to a client for using storage space in a cloud computing environment are provided. Each option is associated with a latency target and/or a throughput target. The latency target provides a delay in processing input/output (I/O) requests and the throughput target provides a number of I/O requests that are processed within a unit of time. An existing volume is assigned to the client when the existing volume meets a guaranteed latency target and/or a guaranteed throughput target for an option selected from the plurality of options, otherwise a new volume is allocated.
Abstract:
Methods and systems for a networked storage system are provided. One method includes receiving a resource identifier identifying a resource of a network storage environment as an input to a processor executable application programming interface (API); and predicting available performance capacity of the resource by using an optimum utilization of the resource, a current utilization and a predicted utilization based on impact of a workload change at the resource, where the optimum utilization is an indicator of resource utilization beyond which throughput gains for a workload is smaller than increase in latency in processing the workload.
Abstract:
Various embodiments are generally directed to techniques for determining whether one node of a HA group is able to take over for another. An apparatus includes a model derivation component to derive a model correlating node usage level to node data propagation latency through and to node resource utilization from a first model of a first node of a storage cluster system and a second model of a second node of the storage cluster system, the first model based on a first usage level of the first node under a first usage type, and the second model based on a second usage level of the second node under a second usage type; and an analysis component to determine whether the first node is able to take over for the second node based on applying to the derived model a total usage level derived from the first and second usage levels.
Abstract:
Methods and systems for a networked storage system are provided. One method includes filtering performance data associated with a resource used in a networked storage environment for reading and writing data at a storage device; and determining available performance capacity of the resource using the filtered performance data. The available performance capacity is based on optimum utilization of the resource and actual utilization of the resource, where utilization of the resource is an indicator of an extent the resource is being used at any given time, the optimum utilization is an indicator of resource utilization beyond which throughput gains for a workload is smaller than increase in latency and latency is an indicator of delay at the resource in processing the workload.
Abstract:
Methods and systems for identifying a victim storage volume from among a plurality of storage volumes based on a comparison of current Quality of Service (QOS) data with a dynamic threshold value that is based on historical QOS collected data for the plurality of storage volumes are provided. A performance manager collects the current and historical QOS data from a storage operating system of the storage system, which includes a response time in which each of the plurality of storage volumes respond to an input/output (I/O) request. The current and historical QOS data for the resources used by the victim storage volume are retrieved and compared with the current QOS data of each resource to an expected range based on the historical QOS data. Another storage volume is identified as a bully when its usage of a resource in contention contributes to creating the victim storage volume.