Abstract:
The embodiments described herein are directed to the use of hashing in a file system metadata arrangement that reduces an amount of metadata stored in a memory of a node in a cluster and that reduces the amount of metadata needed to process an input/output (I/O) request at the node. Illustratively, the embodiments are directed to cuckoo hashing and, in particular, to a manner in which cuckoo hashing may be modified and applied to construct the file system metadata arrangement. In an embodiment, the file system metadata arrangement may be illustratively include a hash collision technique that employs a hash collision computation to determine a unique candidate extent key (having a candidate hash table index) in the event of a collision, i.e., a hash table index collides with a slot of a hash table matching a key found in the slot.
Abstract:
A computer cluster includes a group of connected computers that work together essentially as a single system. Each computer in the cluster is called a node. Each node has a boot device configured to load an image of an operating system into the node's main memory. Sometimes the boot device of a first node experiences a problem that prevents the operating system from loading. This can affect the entire cluster. Some aspects of the disclosure, however, are directed to operations that determine the problem with the first node's boot device based on a communication sent via a first communications network. Further, the operations can communicate to the first node a copy of boot data from a second node's boot device. The copy of the boot data is sent via a second communications network different from the first communications network. The copy of the boot data can solve the first boot device's problem.
Abstract:
A method for sharing data blocks in a hierarchical file system in a storage server includes allocating a plurality of data blocks in the file system, and sharing data blocks in the file system, without using a persistent point-in-time image, to avoid duplication of data blocks. A method for identifying data blocks that can be shared includes computing a fingerprint for each of multiple data blocks to be written to a storage facility and storing the fingerprint with information identifying the data block in an entry in a set of metadata. The set of metadata is used to identify data blocks which are duplicates.
Abstract:
A system can maintain multiple queues for deduplication requests of different priorities. The system can also designate priority of storage units. The scheduling priority of a deduplication request is based on the priority of the storage unit indicated in the deduplication request and a trigger for the deduplication request.
Abstract:
Methods and system for a storage environment are provided. The method generates a first discovery request for a first plug-in associated with a first application executed by a computing system having access to a networked storage system for a storage service operation; acquires metadata by the first plug-in for the storage service operation and storing the metadata at a first location and at a second location, where the second location is at a storage device managed by a storage interface module that co-ordinates completion of the storage service operation; generates a second discovery request for a second plug-in for a second application for the storage service operation; and acquires metadata by the second plug-in using the metadata acquired by the first plug-in for the storage service operation and updating metadata stored at the first location and the second location.
Abstract:
A method, non-transitory computer readable medium, and device that manages requests to list previous versions of an object includes receiving a previous version listing request including an object path for an object. The presence of the junction point within the received previous version listing request is determined. The junction point is resolved to identify a snapshot directory when the received previous version listing request is determined to include the junction point. A plurality of object entries present within the identified snapshot directory is provided as previous versions of the object to a requesting client computing device.
Abstract:
Aspects of the present invention provide a method of specifying a device driver design for a board device. The method includes receiving a board device with various functional elements and on-board storage to be operatively coupled to a computing device through an interconnect. The device driver design is specified through the identification of one or more device driver parameters. The device driver parameters are to be used subsequently to customize an adaptive device driver that interfaces with the board device and each of the one or more functional elements. Device driver parameters are stored in a predetermined storage construct allocated from the board device. These device driver parameters remain stored in the storage construct until there is a need for the board device and corresponding device driver. Customizing the adaptive device driver is done after the device driver parameters have been stored and typically when a computer device starts or ‘boots”. Initially, aspects of the present invention may receive an indication that a board device and one or more functional elements associated with the board device have been attached to an interconnect and requires a device driver. Next, aspect of the present invention retrieve device driver parameters from the storage constructs and customizes the adaptable device driver into a device driver for the board device in accordance with the device driver parameters.
Abstract:
A method, non-transitory computer readable medium, and provisioning advisor device that obtains an intensity and characteristics for each of a plurality of training workloads from storage device volumes. For each of the training workloads, at least first and second training workload parameters are generated, based on the training workload intensity, and an associated training workload signature is generated, based on the training workload characteristics. The first and second training workload parameters and associated training workload signatures are stored in a mapping table. A signature and an intensity for a query workload are obtained. First and second query workload parameters are determined based on a correlation of the query workload signature with the training workload signatures of the mapping table. An estimated latency for the query workload is determined, based on the first and second query workload parameters and the query workload intensity, and the estimated query workload latency is output.
Abstract:
A system and method for implementing a quota system in a distributed file system is provided. Each node manages a quota database tracking available quota for the node. Should additional quota be required, a node queries a remote node to obtain a lock over the remote quota database. The additional quota is shifted and remaining free quota is reallocated between the local and remote nodes.
Abstract:
Load-balancing techniques for auditing file accesses in a storage system are described. In one embodiment, for example, an apparatus may a processor circuit and a storage medium comprising instructions for execution by the processor circuit to receive a file access request notification identifying a stored file in a storage system, determine a destination volume for a file access record corresponding to an access of the stored file, the destination volume selected from among a plurality of candidate staging volumes of the storage system, and direct the file access record to the destination volume. Other embodiments are described and claimed.