Abstract:
A system, method, and machine-readable storage medium for resolving a candidate community are provided. In some embodiments, a method includes obtaining a candidate community and a neighbor set for the candidate community, the neighbor set including zero or more stable communities. The method also includes resolving the candidate community as being a new stable community if the neighbor set is empty. The method further includes resolving the candidate community as being part of a matching stable community if a hash value of the candidate community matches a hash value of one or more stable communities included in the neighbor set. The method also includes resolving the candidate community as being a new stable community if an entropy value is greater than a threshold, the entropy value being based on the candidate community and the neighbor set.
Abstract:
A system, method, and machine-readable storage medium for detecting an anomaly are provided. In some embodiments, the method includes computing an access rate of a set of entities for each user of a plurality of users. The access rate may refer to data operations for the set of entities stored by a storage system. The method also includes normalizing the access rates for a subset of the plurality of users, the subset belonging to a community. The method further includes determining whether a normalized access rate from among the access rates satisfies a threshold. The method also includes detecting an anomaly in response to a determination that the normalized access rate satisfies the threshold.
Abstract:
Methods and systems for a networked storage system are provided. One method includes predicting an IOPS limit for a plurality of storage pools based on a maximum allowed latency of each storage pool, the maximum allowed latency determined from a relationship between the retrieved latency and a total number of IOPS from a resource data structure; identifying a storage pool whose utilization has reached a threshold value, the utilization based on a total number of IOPS directed towards the storage pool and a predicted IOPS limit; detecting a bully workload based on a numerical value determined from a total number of IOPS issued by the bully workload for the storage pool and a rising step function; and implementing a corrective action to reduce an impact of the bully workload on a victim workload.
Abstract:
In a networked storage system, a request for placing a workload for is received by a management console that determines a plurality of subset of resources for responding to the workload. Each subset of resources includes at least two different but related resource types that can be used for processing the workload. A penalty index for each subset of resources is then determined. The penalty index of each resource is based on a supply parameter that indicates a maximum capability of the resource, a threshold value that indicates a capability level beyond which no load is added to the resource and a criticality factor that indicates an importance of each resource to the networked storage system. The workload is then assigned to a subset of resources with the least penalty index.
Abstract:
Methods and systems for a networked storage environment are provided. An application executed by a computing device using a plurality of resources in a networked storage environment for storing and retrieving application data is identified. Performance data of the plurality of resources is collected and historical performance data is retrieved. The collected and historical performance data for the plurality of resources is used to determine an overall anomaly score for the application indicating behavior of the application over time and individual anomaly scores for each resource with an indicator highlighting behavior of a resource that impacts the overall anomaly score for the application.
Abstract:
Systems and methods for analyzing the service and performance levels associated with virtual machines in a storage network environment for compliance with a resource capacity policy are provided. Component configuration and connectivity information from components in the network environment is collected without using host agents on the virtual machines. Access paths defining end-to-end access relationships between an application on a virtual machine and storage data objects associated with the virtual machine in the network environment are derived. Access paths comprise sequences of components configured to enable information flow between an application residing on a virtual machine and a data object on a respective storage device. Access path resource consumption is computed and virtual machines with resource consumptions that violate the resource capacity policy are identified.
Abstract:
An example system and method to provide a dashboard for users to analyze and review their hyper-scaler usage and spending and offer optimizations to predict optimal use of reserved and unreserved instances on various hyper-scaler platforms. While hyper-scaler platforms offer flexibility for users to scale their use on a platform, there is a potential risk of rapid cost overruns in large enterprise organizations that may be difficult to control and predict. In some examples, the system can determine an optimal number of reserved instances using past usage data and/or prediction data from a user may be used by the system to make forward predictions about reserving an optimal number of instances and minimizing hyper-scaler resource use.
Abstract:
Methods and systems for a networked storage environment are provided. One method includes mirroring a plurality of requests from a switch and transmitting the mirrored plurality of requests to a remote acquisition unit; extracting application layer protocol data units from assembled transport layer packets; parsing the application layer protocol data units to obtain file system requests; identifying storage volume identifiers from the parsed file system requests that are associated with a greatest number of operations; identifying network addresses for client systems initiating the greatest number of operations for the storage volumes and network addresses of target storage systems managing the storage volumes; and providing a total number of operations for the plurality of requests in a given time, the identified storage volume identifiers, the network addresses of the client systems and the network addresses of the target storage systems to a management console.
Abstract:
Methods and systems for a networked storage environment are provided. One method includes mirroring a plurality of requests from a switch and transmitting the mirrored plurality of requests to a remote acquisition unit; extracting application layer protocol data units from assembled transport layer packets; parsing the application layer protocol data units to obtain file system requests; identifying storage volume identifiers from the parsed file system requests that are associated with a greatest number of operations; identifying network addresses for client systems initiating the greatest number of operations for the storage volumes and network addresses of target storage systems managing the storage volumes; and providing a total number of operations for the plurality of requests in a given time, the identified storage volume identifiers, the network addresses of the client systems and the network addresses of the target storage systems to a management console.
Abstract:
An example method for providing contextual information of a computer system includes determining a current state of an attribute of one or more storage resources. The one or more storage resources is coupled to a computer system, and the current state of the storage resource attribute is monitored by a performance monitoring tool. The example method includes determining a target state of the attribute and displaying a user interface including contextual information regarding the attribute. The example method further includes rendering in the user interface a graph representative of the current state and the target state of the attribute o. In some examples, the method further includes determining a forecast for the attribute and rendering the forecast in the user interface. In some examples, the user interface may include a visual indication of whether the attribute is in violation of a policy.