摘要:
Described is a storage system and method for managing and optimizing power consumption in a storage system. Logical devices are mapped to physical disk drives. A plurality of power profiles is defined. Each power profile is associated with a mode of operation for a physical disk drive. One of the power profiles is assigned to each logical device. One of the physical disk drives is identified for which every logical device mapped to that physical disk drive has been assigned the same power profile. The identified physical disk drive is operated in the mode of operation associated with said same power profile. The mapping of the logical devices to the physical disk drives may be changed in order to group logical devices assigned the same power profile onto the same physical disk drive.
摘要:
Disk drive power states are managed. Information is received for use in determining a desired power state of a disk drive that is not currently being accessed. The disk drive is caused to have a spun up power state before the disk drive is next accessed.
摘要:
A system is used in caching with flash-based memory. First and second controllers communicate with a flash-based cache. A magnetic disk array is in communication with the flash-based cache. The flash-based cache has a dual ported link to the first and second controllers. The flash-based cache has flash-based memory components arranged in a RAID data protection scheme.
摘要:
A method is used in managing storage operations in a data storage environment. An I/O request is received a server having a server cache where the server cache contains cached data previously supplied from a storage system in communication with the server. At the storage system, determine if the I/O request can be at least partially satisfied from the cached data.
摘要:
A system including an enterprise data storage system having a plurality of multi-level cell (MLC) flash devices configured as data storage drives. The enterprise data storage system is operated in such a way and the configuration of the MLC flash devices is such that the enterprise data storage system is able to maintain a performance level comparable to that of an enterprise data storage system utilizing single-level cell (SLC) flash devices.
摘要:
An electronic encryption endpoint device includes a management interface, a storage device interface and a controller. The management interface is capable of operating as a control interface (e.g., connecting to an array controller). The storage device interface is arranged to communicate with a set of storage devices. The controller is arranged to (i) receive a key encryption key through the management interface, (ii) decrypt a portion of a key table entry of a key table using the key encryption key to extract a data encryption key from the portion of the key table entry, the data encryption key being initially encrypted within the portion of the key table entry prior to decrypting the portion of the key table entry, and (iii) encrypt data using the data encryption key and store the encrypted data in the set of storage devices through the storage device interface.
摘要:
A disk drive management system includes a data storage device including an array of disk drives and a host computer for controlling the operation of the data storage device. The array of disk drives includes an operational drive pool including a number of online disk drives having data written to and read from by the host computer; a spares drive pool including a number of disk drives that are configured to be included in the operational drive group, but are offline while in the spares group; and a maintenance drive pool including a maintenance manager for testing faulty disk drives from the operational drive pool. When a faulty drive is transitioned from the operational drive pool upon the occurrence of a particular error, a disk drive from the spares drive pool is transitioned to the operational drive pool to take the place of the faulty drive.
摘要:
A method, computer program product, and computing system for comparing at least one performance benchmark to at least one performance indicator for a front end LUN. If the at least one performance indicator exceeds the at least one performance benchmark, the failure domain of the front end LUN is reduced. If the at least one performance indicator does not exceed the performance benchmark, the failure domain of the front end LUN is increased.
摘要:
A method is used in sizing volatile memory (VM) cache based on flash-based cache usage. A user selection for a flash-based cache is received. Based on the selection, configuration and sizing factors are provided, by a flash based cache driver, to VM cache size determination logic. Based on the configuration and sizing factors and a sizing formula and rules, a requested VM cache size is produced by the VM cache size determination logic. Based on the requested VM cache size, the VM cache is caused, via VM cache resizing logic, to be resized to the requested VM cache size.
摘要:
A data processing system stores encrypted data. Object identifiers are assigned to storage objects, and data encryption keys are assigned to the storage objects. When performing an operation upon a storage object, data encryption key failure may occur due to a corrupt or incorrect key. In this case, a copy of the data encryption key is fetched from a key server. It is possible for the association of the object identifiers with the data encryption keys to become lost or confused, so that the key server may fail to provide the correct key for a specified object identifier. Therefore, an absolute key identifier that is unique across the key server namespace also is stored in association with the object identifier in the storage system and in the key store of the key server, and the absolute key identifier is used as a failsafe for recovery of encrypted data.