摘要:
A system and method for allocating resources on a shared storage system are disclosed. The system 10 can include a shared storage device 12 and a plurality of port schedulers 14 associated with a plurality of I/O ports 16 that are in communication with the shared storage device 12. Each port scheduler 14 is configured to enforce a concurrency level and a proportional share of storage resources of the shared storage device 12 for each application 18 utilizing the associated port. The system 10 can also include a resource controller 17 that is configured to both monitor performance characteristics of the applications 18 utilizing at least one of the I/O ports 16, and to adjust the concurrency level and the proportional share of storage resources parameters of the port schedulers 14 for at least a portion of the applications 18 in order to vary allocation of the resources of the shared storage device 12.
摘要:
Embodiments associate software applications with computing resource containers based on placement rules. A placement rule indicates that a first software application is to be co-located with a second software application during execution of the first and second software applications, or that the first software application is to be separated from the second software application during execution of the first and second software applications. A target computing resource container is selected based on the placement rule and a computing resource container that is associated with the first software application. The second software application is associated with the target computing resource container, and the placement rule may be provided to the target computing resource container.
摘要:
Systems, methods, and computer-readable and executable instructions are provided for selecting executing requests to preempt. Selecting executing requests to preempt can include determining whether an application is in an overload condition. Selecting executing requests can also include in response to determining the application is in an overload condition, identifying each request that is being executed by the application. Selecting executing requests can also include determining a value for each request that is executing. Furthermore, selecting executing requests can also include selecting executing requests to preempt based on the values for the requests.
摘要:
An embodiment of a method of forming a virtual computer cluster within a shared computing environment begins with a step of placing gatekeeper software on each of a plurality of particular host computers of the shared computing environment. The method continues with a step of assigning computing platforms located on the particular host computers to the virtual computer cluster. The gatekeeper software interposes between the computing platforms and hardware resources of the particular host computers. The method concludes with a step of isolating the virtual computer cluster from a remainder of the shared computing environment using the gatekeeper software. The gatekeeper software allows communication between the computing platforms while precluding communication with other computing platforms of the shared computing environment. The gatekeeper software controls input and output operations for the virtual computer cluster.
摘要:
A system includes disk storage to provide differentiated storage QoS for a plurality of IO classes. Each IO class has a plurality of applications to it. A QoS controller collects IO statistics for each application and each class. The QoS controller adaptively determines an IO class assignment for each application based at least in part on the collected IO statistics.
摘要:
Requests that are executing when an application is determined to be in an overload condition are preempted. To select the executing requests to preempt, a value for each executing request is determined. Then, executing requests are selected for preemption based on the values.
摘要:
An embodiment of a method of managing a computer system begins with a step of placing a virtual machine monitor on a computer. The virtual machine monitor includes an interface for a module. The method continues with a step of forming a computing platform on the computer. The virtual machine monitor provides access control to the hardware resources for software executing on the computing platform. The method concludes with a step of adding a module to the virtual machine monitor through the interface. The module modifies the access control provided by the virtual machine monitor.
摘要:
An automated system adaptation technique for computer systems, networks and subsystems generally and, more particularly, for data storage systems. The invention programmatically designs, configures and manages a system, such as a data storage system. This is accomplished by performing a sequence of steps in an iterative loop, including analyzing the operation of the system under a workload, generating a new design based on the analysis and migrating the existing system to the new design. By systematically exploring a large design space and developing designs based on analyses of the workload, the invention generates designs that are improved in comparison to conventional design techniques. By programmatically repeating these tasks, the invention causes the system to converge to one that supports the workload without being over-provisioned.
摘要:
A system comprises a processor and an alert module coupled to the processor. The processor the processor monitors performance data; determines a subset of the performance data, the subset correlated with a measure of underperformance; determines a trend of the subset, the trend correlated with the measure; and identifies an occurrence of the trend. The alert module outputs an alert based on the identification.
摘要:
A method and a system of improving recoverability of a dataset associated with a multi-tier storage system are provided. Updates to a dataset are stored in first storage. The dataset and a point-in-time copy of the dataset reside on second storage, and the first storage provides higher reliability than the second storage. The dataset is restored using at least a subset of the stored updates in combination with the point-in-time copy in the event that the dataset is lost.