Abstract:
Embodiments perform capability discovery, policy management, and policy enforcement to provide data in-flight (DIF) services to virtual machines (VMs) without requiring modification to established storage protocols. In exemplary embodiments, a management device receives advertisements of DIF services supported by network nodes. The management device groups the advertised DIF services into a DIF services policy. The management device associates a host and a communication path. The management device enforces the DIF services policy by storing a unique number that causes transmission of data along the communication path.
Abstract:
Exemplary methods, apparatuses, and systems include a management server receiving, from each of a plurality of switches, physical topology data of network nodes. The physical topology data includes identifiers of hosts connected to each of the switches and identifiers of storage connected to each of the switches. The management server transmits a query to each of the network nodes and receives, in response to each query, the capabilities of each network node. In response to receiving a request to create a cluster of the hosts, the management server selects hosts and storage from the physical topology data to create the cluster. The hosts and storage are selected based upon the capabilities received from each network node. The management server determines transport protocol login service parameters based upon the received storage capabilities and transmits the parameters to one or more of the plurality of switches, hosts, and storage.
Abstract:
The storage system exports logical storage volumes that are provisioned as storage objects. These storage objects are accessed on demand by connected computer systems using standard protocols, such as SCSI and NFS, through logical endpoints for the protocol traffic that are configured in the storage system. Logical storage volumes are created from a logical storage container having an address space that maps to storage locations of the physical data storage units. Each of the logical storage volumes so created has an address space that maps to the address space of the logical storage container. A logical storage container may span more than one storage system and logical storage volumes of different customers can be provisioned from the same logical storage container with appropriate security settings.
Abstract:
Exemplary methods, apparatuses, and systems a management server receiving, from a switch, an indication of network congestion at the switch. The indication includes one or more contributors to the network congestion. In response to the indication of network congestion, the management server identifies one or more hosts running the identified contributor(s) and transmits an instruction to the host(s) to restrict network traffic originated by the contributor(s). For example, the restriction may include a reduction in the contributor's I/O queue depth. If the reduction in traffic does not remedy the congestion, the management server may receive a further indication of congestion and further instruct the host(s) to restrict identified contributor network traffic. For example, the contributors may have their I/O queue depth reduced exponentially until congestion is relieved. Upon receiving an indication that the congestion is relieved, the management server instructs the host(s) to remove the restriction on network traffic.
Abstract:
Embodiments provide data in-flight (DIF) services to software applications such as virtual machines (VMs) at an application level without requiring modification to established storage protocols. In exemplary embodiments, a software application is associated with a DIF services policy indicating one or more DIF services to apply to the software application. Data transmitted by the software application to a destination is tagged based on the DIF services policy associated with the software application and transmitted to the destination.
Abstract:
Embodiments provide data in-flight (DIF) services to software applications such as virtual machines (VMs) at an application level without requiring modification to established storage protocols. In exemplary embodiments, a software application is associated with a DIF services policy indicating one or more DIF services to apply to the software application. Data transmitted by the software application to a destination is tagged based on the DIF services policy associated with the software application and transmitted to the destination.