Abstract:
The present invention is directed to a method for providing data element placement in a storage system via a Dynamic Storage Tiering (DST) mechanism, such that improved system efficiency is promoted. For example, the DST mechanism may implement an algorithm for providing data element placement. The data elements (ex.—virtual volume hot-spots) may be placed into storage pools, such that usage of higher performing storage pools is maximized. Hot-spots may be detected by dynamically measuring load on LBA ranges. Performance of the storage pools may be measured on an ongoing basis. Further, the hot-spots may be ranked according to load, while storage pools may be ranked according to measured performance. If a hot-spot's load decreases, the hot-spot may be moved to a lower performing storage pool. If a hot-spot's load increases, the hot-spot may be moved to a higher performing storage pool.
Abstract:
Embodiments of the present invention are directed to an apparatus and methods for operating a storage system. The storage system incorporates a storage device associated with a client into a logical group of storage devices managed by the storage system. Thereafter, the storage system is capable of satisfying data access requests from an incorporated storage device managed by the storage system.
Abstract:
A method and system for generating authorization settings that indicate whether host administrators using a host-based storage-management application are authorized to perform provisioning operations on data storage entities residing on a data storage system are disclosed. Accordingly, a storage-management application receives from an administrator an authorization setting indicating on a per-user basis a set of provisioning operations which can be performed with a data storage entity via the storage-management application. The authorization settings are then communicated from the host-based storage-management application to the storage system where the data storage entity resides, and the authorization settings are stored. A storage-management application executing on any host can then utilize the authorization settings to control which users are allowed to interact with certain data storage entities, and what specific interactions (e.g., provisioning operations) are allowed.
Abstract:
Embodiments of the present invention provide a method and system, in a network storage system, for producing a balanced reconstruction load across storage devices (disks) in a storage array (array) using a scalable declustered layout. A scalable declustered layout is a logical configuration of parity groups across storage units (disk segments) which spread the chunk load and total share load of parity groups across disks in the array. Creation of a scalable declustered layout is achieved by sequentially selecting and allocating each chunk of a new (prospective) parity group according to the then-current load on each disk. The scalable declustered layout is then implemented on the disks to produce a balanced reconstruction load across disks when recovering from a disk failure.
Abstract:
A system and method for implementing storage management with threshold control is provided. A flexible storage manager associates storage devices having a similar performance characteristic into logical constructs called storage groups. Storage groups having the same performance characteristic from a plurality of storage systems are organized into storage pools. The flexible storage manager automatically provisions storage on a storage pool basis. Should a low threshold utilization be exceeded, the flexible storage manager performs a set of management policies to lower the utilization of a storage pool to the low threshold.
Abstract:
The invention provides a mechanism for selectively encrypting media within a consolidation of storage devices into a shared configuration, i.e. a media pool. The invention also provides a mechanism by which more than one key can be used for encrypting media. The invention accomplishes tape encryption by media parsing. An encryption key is determined based on the backup application's grouping of data sets. This is accomplished by examining the volume header of the tape and, from the header, deciding if pools are supported by the application. If they are, the invention auto-creates a pool key. In the case where the pools are known in advance, a user with appropriate administrative privileges can create the pools and assign keys to them. The invention thus allows mirroring of the logical groupings in the backup application with encryption keys.
Abstract:
A system and method efficiently conveys event notification using an event routing table. An event is detected and forwarded to an event management system (EMS) that determines if any thresholds have been exceeded. If a threshold has been exceeded, one or more destination names from a routing table are expanded using a destination table and appropriate event notifications are sent.
Abstract:
Methods and apparatuses are provided for active-active support of virtual storage management in a storage area network (“SAN”). When a storage manager (that manages virtual storage volumes) of the SAN receives data to be written to a virtual storage volume from a computer server, the storage manager determines whether the writing request may result in updating a mapping of the virtual storage volume to a storage system. When the writing request does not involve updating the mapping, which happens most of the time, the storage manager simply writes the data to the storage system based on the existing mapping. Otherwise, the storage manager sends an updating request to another storage manager for updating a mapping of the virtual storage volume to a storage volume. Subsequently, the storage manager writes the data to the corresponding storage system based on the mapping that has been updated by the another storage manager.
Abstract:
Disclosed is a power distribution module that is capable of providing power to rack mounted equipment modules in electronic equipment mounting racks. The power distribution module may comprise a series of individual modules that can be placed at strategic locations through the electronic equipment mounting rack to meet the specific power requirements of the rack mounted equipment modules, which may vary depending upon the type of module. In this manner, the expense of supplying power of a particular amount to a specific location can be reduced. In addition, power distribution modules are disclosed that are prefabricated in different versions to meet the power requirements of the design of the electronic equipment mounting rack.
Abstract:
According to one or more embodiments of the present invention, a network cache intercepts data requested by a client from a remote server interconnected with the cache through one or more wide area network (WAN) links (e.g., for Wide Area File Services, or “WAFS”). The network cache stores the data and sends the data to the client. The cache may then intercept a first write request for the data from the client to the remote server, and determine one or more portions of the data in the write request that changed from the data stored at the cache (e.g., according to one or more hashes created based on the data). The network cache then sends a second write request for only the changed portions of the data to the remote server.