摘要:
Techniques for data migration of a storage system are described herein. According to one embodiment, for at least one of segments of a file to be migrated from a source storage tier to a target storage tier, a fingerprint of the segment is transmitted to the target storage tier. In response to a response received from the target storage tier indicating that the segment has not been stored in the target tier based on the fingerprint, a storage space of the target tier estimated for migrating the file is incremented. One or more segments of the file that have not been stored in the target tier are migrated if the one or more segments of the file fit in the target storage tier based on the estimated storage space of the target tier.
摘要:
Techniques for data migration of a storage system are described herein. According to one embodiment, a candidate index is generated to store information identifying a plurality of segments associated with one or more candidate files of a source storage tier to be migrated to a target storage tier of a storage system. Segments of the one or more candidate files are then migrated from the source storage tier to the target storage tier according to a sequential order, and based on the candidate index.
摘要:
Techniques for data migration of a storage system are described herein. According to one embodiment, a list of files stored in a source storage tier is identified as candidate files to be migrated to a target storage tier based on a migration policy. One of a regular data movement method and a bulk data movement method is selected based on a characteristic of the candidate files. The candidate files are then migrated from the source storage tier to the target storage tier using the selected data movement method.
摘要:
A method, article of manufacture, and apparatus for transferring data from a source tier to a target tier. In some embodiments, this may include dividing an object stored in the source tier into a plurality of segments, determining if the target tier is missing at least one of the segments, writing the missing segments to the target tier, and deleting the object from the source tier. In some embodiments, the object's metadata is updated to indicate that the object is in the target tier.
摘要:
A method, article of manufacture, and apparatus for transferring data from a source tier to a target tier. In some embodiments, this may include applying a policy to an object in the source tier, determining the target tier based on the policy, and moving the object from the source tier to the target tier based on the policy. In some embodiments, determining the target tier based on the policy may include determining a higher target tier. In some embodiments, determining the target tier based on the policy may include determining a lower target tier.
摘要:
According to one embodiment, in response to a request for verifying a first prime representing a consistent point of a file system of a storage system having a plurality of storage units, each of a plurality of prime segments collectively representing the first prime is examined to determine whether the corresponding prime segment has been previously verified. Each of the prime segments is stored in one of the storage units, respectively. At least a first of the prime segments that has not been previously verified is verified, without verifying a second of the prime segments that has been previously verified. The first prime, when at least the first prime segment has been successfully verified, can be used to construct the consistent point of the file system.
摘要:
Techniques for managing data objects of a data storage system are described herein. According to one embodiment, a hash function is generated for a plurality of data objects by analyzing each of the data objects stored in the data storage system. For each of the data objects, a hash operation is performed on the data object using the hash function, generating a hash value. The hash value is associated with a predetermined attribute of the data object, such that the predetermined attribute of the data object is uniquely identified using the hash function subsequently in response to a request for accessing the predetermined attribute of the data object. The data object is then stored at a persistent storage location of the data storage system, wherein the persistent storage location is identifiable based on a hash value obtained from the hash function.
摘要:
According to one embodiment, a file system (FS) of a storage system is partitioned into a plurality of FS partitions, where each FS partition stores segments of data files. In response to an input and output (IO) request for accessing a first of the FS partitions, a second of the FS partitions is selected that is currently in a ready state for access. The second FS partition is then removed from the ready state for access. The first FS partition is brought into a ready state for access.
摘要:
Techniques for providing write-once-read-many (WORM) storage are described herein. According to one embodiment, a range of values is received to set an attribute of a file, where the received range of values is outside of an ordinary range of the attribute in accordance with a file system associated with the file. In addition, a management action is received to be associated with the received range of values of the attribute, where the management action is unrelated to an ordinary action associated with the attribute of the file in accordance with the file system. In response, the received management action is associated with the received range of values of the attribute. Other methods and apparatuses are also described.
摘要:
Techniques for providing write-once-read-many (WORM) storage are described herein. According to one embodiment, a range of values is received to set an attribute of a file, where the received range of values is outside of an ordinary range of the attribute in accordance with a file system associated with the file. In addition, a management action is received to be associated with the received range of values of the attribute, where the management action is unrelated to an ordinary action associated with the attribute of the file in accordance with the file system. In response, the received management action is associated with the received range of values of the attribute. Other methods and apparatuses are also described.