摘要:
Deduplication of data on disk devices based on a threshold number (THN) of sequential blocks is described herein, the threshold number being two or greater. Deduplication may be performed when a series of THN or more received blocks (THN series) match a sequence of THN or more stored blocks (THN sequence), whereby a sequence comprises blocks stored on the same track of a disk device. Deduplication may be performed using a block-comparison mechanism comprising metadata entries of stored blocks and a mapping mechanism containing mappings of deduplicated blocks to their matching blocks. The mapping mechanism may be used to perform later read requests received for the deduplicated blocks. The deduplication described herein may reduce the read latency as the number of seeks between tracks may be reduced. Also, when a seek to a different track is performed, the seek time cost is spread over THN or more blocks.
摘要:
Provided is an article of manufacture, system and method for a management system for using host and storage controller port information to configure paths between a host and storage controller in a network. The management system obtains information on ports on at least one host, at least one storage controller, and at least one fabric over which the host and storage controller ports connect. The management system gathers, for at least one host port and storage controller port, a connection metric and a traffic metric. The management system processes the connection and traffic metrics for the host and storage ports to select at least one host port and at least one storage controller port configures the port pair to provide at least one path enabling the access at least one storage volume managed by the selected storage controller.
摘要:
Example embodiments provide various techniques for modeling a storage environment at various times. A computer model can be composed to simulate a storage environment at various time periods. In an example, the computer model may simulate the storage environment in the past. As the storage environment is running, it continuously stores its existing state. This existing state can be accessed and a simulated workload may be applied to this previous state to identify an impact of the simulated workload on the existing state. A computer model may also simulate the storage environment in the future. Here, the future state of the storage environment may be projected from the existing state. Various extrapolation techniques may be used to project the future state of the storage environment.
摘要:
The embodiments of the invention provide a method of identifying a recovery point in a continuous data protection (CDP) log. More specifically, the method begins by detecting corrupted data in the CDP log and identifying the nature of corruption. Next, the nature of corruption is mapped to applications to identify components that may have caused the corrupted data. The method then finds a time instance of uncorrupted data in the components. Specifically, this can include searching CDP log entries in an order independent of log event age. Alternatively, the process of finding the time instance can include creating a data image of a first copy of uncorrupted data and sequentially apply entries of the CDP log until the corrupted data is reached.
摘要:
A mechanism is provided to automatically retrieve zoning best practices from a centralized repository and to ensure that automatically generated zones do not violate these best practices. A user selects a set of hosts and storage controllers. The user also selects a guidance policy for creating the zone, and also selects a set of validation policies that must be enforced on the zone. If the user selects a guidance policy and a validation policy combination that is incompatible, the mechanism allows the user to change either the selected guidance policy or the set of validation policies. If the user has selected consistent-zoning as a guidance policy, then the mechanism automatically selects a guidance policy that does not violate the known validation policies.
摘要:
When an alarm condition relating to a performance goal of a storage system is detected, a storage management system invokes an N-step lookahead engine for simulating operation of the storage system when there are multiple actions that could be taken by the storage system for eliminating the alarm condition. The N-step lookahead engine generates N possible system states based on a current state of the storage system. The N possible states are based on a cost model of each of the multiple actions. Each cost model is based on an action, a behavior implication of the action, a resource implication of the action and a transient cost of the action. An action is selected that generates a system state that optimizes the stability, a prerequisite and a transient cost of invoking the selected action.
摘要:
Provided is a method for using host and storage controller port information to configure paths between a host and storage controller. Information is gathered on ports on at least one host, ports on at least one storage controller managing access to storage volumes, and at least one fabric over which the at least one host and storage controller ports connect. For at least one host port and storage controller port, information is gathered on a connection metric related to a number of paths in which the port is configured and a traffic metric indicating Input/Output (I/O) traffic at the port. A determination is made of available ports for one host and storage controller that are available to provide paths between one host and storage controller. The connection and traffic metrics for the available host ports are processed to select at least one host port. The connection and traffic metrics for the available storage controller ports are processed to select at least one storage controller port. The at least one selected host and storage controller port pair are configured to provide at least one path enabling the host to communicate with the selected storage controller port to access at least one storage volume managed by the selected storage controller.
摘要:
A method and structure for managing resources in a storage system that is based on server resource usage is disclosed. The method allocates a command window to each of the servers accessing the resources, achieves an equilibrium state that balances the size of each server's command window and the amount of free resources, and maintains the equilibrium state by continually adjusting the size of each command window. The command window defines a limit on the number of outstanding storage requests that each server may maintain. The invention initially allocates a minimum sized command window.
摘要:
Goal-based availability and change management are handled over groups of heterogeneous storage controllers. Probabilistic and deterministic methods are employed to determine the allocation and placement of storage volumes to storage controllers, as well as the degree of data redundancy necessary to achieve data availability goals The probabilistic methods can take into account past observations of controller availability, and operator beliefs, as well as the state of storage controller configuration, in coming up with a probabilistic estimate of future availability.
摘要:
A method for storage provisioning planning including integrating capacity and provisioning planning operations. Afterwards, the method proceeds by switching via policy between integrated capacity and provisioning planning operations. The method further includes constructing an end-to-end resource model and selecting a plurality of pools based on the end-to-end resource model. Subsequently, the method includes filtering via policy between a plurality of heterogeneous controllers having resource graphs. The resource graphs contain various levels of detail. The resource graphs having hosts, switches, and storage controllers are dynamically pruned, such pruning being predicated upon the monitored performance characteristics.