摘要:
A computer-implemented method for natural batching of I/O operations on a replication log may include: 1) identifying a replication log that records the order of writes within a cluster replication system, 2) determining that the replication log is unavailable, 3) queuing incoming I/O operations for the replication log in a single batch while the replication log is unavailable, 4) determining that the replication log has become available, 5) ceasing queuing of incoming I/O operations for the replication log based on the determination that the replication log has become available, and 6) grouping a plurality of I/O operations in the single batch for processing in parallel by assigning a same generation number to the plurality of I/O operations. Various other methods, systems, and computer-readable media are also disclosed.
摘要:
A host-based replication snapshot method. The method includes synchronizing a set of data objects stored at both a replication source node and a secondary node. The method further includes identifying changed data objects out of the set of data objects from the replication source node that have been modified during a time period between a first time and a subsequent second time. Metadata indicating the changed data objects from the replication source node is transmitted to the secondary node. A snapshot is then generated at the second time on the secondary node by using the metadata.
摘要:
A computer-implemented method for migrating files to tiered storage systems may include 1) identifying at least one file to migrate from a first file system to a second file system, where the second file system may include a plurality of storage tiers, 2) identifying file metadata associated with the file as stored on the first file system, 3) before writing the file to the second storage system, selecting a storage tier from the plurality of storage tiers based at least in part on the file metadata, and 4) writing the file directly to the selected storage tier within the second file system to avoid moving the file to the selected storage tier after writing the file to the second file system. Various other methods, systems, and computer-readable media are also disclosed.
摘要:
A method, in one embodiment, can include receiving a key and associated data via a computing device. Furthermore, the method can include searching a B+ tree data structure using the key to find a leaf node. The B+ tree data structure is stored by a persistent storage coupled to the computing device. The B+ tree data structure can include a first plurality of nodes that each contains a key-value entry that is not maintained in a sorted order based on its key. In addition, the key and associated data are appended to the leaf node. A sector that includes the leaf node and the key and associated data can be flushed to the persistent storage.
摘要翻译:在一个实施例中,一种方法可以包括经由计算设备接收密钥和相关联的数据。 此外,该方法可以包括使用密钥搜索B +树数据结构以找到叶节点。 B +树数据结构由耦合到计算设备的持久存储器存储。 B +树数据结构可以包括第一多个节点,每个节点包含基于其密钥不按排序顺序维护的键值条目。 此外,密钥和关联数据附加到叶节点。 包括叶节点,密钥和关联数据的扇区可以刷新到持久存储器。
摘要:
A computer-implemented method for facilitating access to shared resources within computer clusters may include (1) identifying a computer cluster, (2) identifying at least one node within the computer cluster that has been selected to execute an application, (3) identifying at least one different node within the computer cluster that has not yet been selected to execute the application, (4) importing a read-write configuration of at least one shared resource to the node, (5) importing a read-only configuration of the shared resource to the different node, (6) determining, after importing the read-only configuration of the shared resource to the different node, that the different node has been selected to execute the application, and then (7) converting, in response to this determination, the different node's read-only configuration of the shared resource to the read-write configuration of the shared resource. Various other systems, methods, and computer-readable media are also disclosed.
摘要:
A host-based replication snapshot method. The method includes synchronizing a set of data objects stored at both a replication source node and a secondary node. The method further includes identifying changed data objects out of the set of data objects from the replication source node that have been modified during a time period between a first time and a subsequent second time. Metadata indicating the changed data objects from the replication source node is transmitted to the secondary node. A snapshot is then generated at the second time on the secondary node by using the metadata.
摘要:
When a loss of connectivity between a first node in a cluster of nodes and a data store is detected, an input/output (I/O) request associated with an application that was executing on the first node is shipped to a second node in the cluster that is in communication with the data store. The application can be gracefully shut down on the first node, and the second node can execute the application and satisfy the I/O request.
摘要:
When a loss of connectivity between a first node in a cluster of nodes and a data store is detected, an input/output (I/O) request associated with an application that was executing on the first node is shipped to a second node in the cluster that is in communication with the data store. The application can be gracefully shut down on the first node, and the second node can execute the application and satisfy the I/O request.
摘要:
A computer-implemented method for efficient sequential logging on caching-enabled storage devices may include 1) identifying a storage device with a cache, 2) allocating space on the storage device for a sequential log, 3) calculating a target size for the sequential log based at least in part on an input/output load directed to the sequential log, and then 4) restricting the sequential log to a portion of the allocated space corresponding to the target size. Various other methods, systems, and computer-readable media are also disclosed.
摘要:
A computer-implemented method for efficient sequential logging on caching-enabled storage devices may include 1) identifying a storage device with a cache, 2) allocating space on the storage device for a sequential log, 3) calculating a target size for the sequential log based at least in part on an input/output load directed to the sequential log, and then 4) restricting the sequential log to a portion of the allocated space corresponding to the target size. Various other methods, systems, and computer-readable media are also disclosed.