摘要:
A method is used in managing data in a data storage system. A tiered storage pool is identified wherein the storage pool includes multiple tiers having multiple storage units. A wear indicator for each of the multiple storage units is monitored. A first storage unit having a wear indicator greater than a second storage unit is identified. High activity data on the first storage unit is also identified. The identified high activity data is migrated from the first storage unit to the second storage unit.
摘要:
A method is used in managing data placement in storage systems. A portion of an allocated storage space is identified in a data storage system for managing data placement. The allocated storage space includes first and second set of slices. The first set of slices associated with the portion of the allocated storage space in the data storage system is identified. Data of the first set of slices is transferred to the second set of slices of the allocated storage space in the data storage system. The first set of slice is removed from the allocated storage space in the data storage system.
摘要:
A method, computer program product, and computing system for comparing at least one performance benchmark to at least one performance indicator for a front end LUN. If the at least one performance indicator exceeds the at least one performance benchmark, the failure domain of the front end LUN is reduced. If the at least one performance indicator does not exceed the performance benchmark, the failure domain of the front end LUN is increased.
摘要:
A method, computer program product, and computing system for identifying at least one misassigned slice that is associated with a first data tier and is located in a first front end LUN. The at least one misassigned slice is being accessed contrary to the first data tier. The failure domain of the first front end LUN is determined. At least one replacement slice that is associated with a second data tier and is located in a second front end LUN is identified based, at least in part, upon the failure domain of the first front end LUN. The at least one misassigned slice is moved to the second front end LUN. The at least one replacement slice is moved to the first front end LUN.
摘要:
A method is used in managing storage operations in a data storage environment. An I/O request is received a server having a server cache where the server cache contains cached data previously supplied from a storage system in communication with the server. At the storage system, determine if the I/O request can be at least partially satisfied from the cached data.
摘要:
A system including an enterprise data storage system having a plurality of multi-level cell (MLC) flash devices configured as data storage drives. The enterprise data storage system is operated in such a way and the configuration of the MLC flash devices is such that the enterprise data storage system is able to maintain a performance level comparable to that of an enterprise data storage system utilizing single-level cell (SLC) flash devices.
摘要:
An electronic encryption endpoint device includes a management interface, a storage device interface and a controller. The management interface is capable of operating as a control interface (e.g., connecting to an array controller). The storage device interface is arranged to communicate with a set of storage devices. The controller is arranged to (i) receive a key encryption key through the management interface, (ii) decrypt a portion of a key table entry of a key table using the key encryption key to extract a data encryption key from the portion of the key table entry, the data encryption key being initially encrypted within the portion of the key table entry prior to decrypting the portion of the key table entry, and (iii) encrypt data using the data encryption key and store the encrypted data in the set of storage devices through the storage device interface.
摘要:
A disk drive management system includes a data storage device including an array of disk drives and a host computer for controlling the operation of the data storage device. The array of disk drives includes an operational drive pool including a number of online disk drives having data written to and read from by the host computer; a spares drive pool including a number of disk drives that are configured to be included in the operational drive group, but are offline while in the spares group; and a maintenance drive pool including a maintenance manager for testing faulty disk drives from the operational drive pool. When a faulty drive is transitioned from the operational drive pool upon the occurrence of a particular error, a disk drive from the spares drive pool is transitioned to the operational drive pool to take the place of the faulty drive.
摘要:
A method is used in sizing volatile memory (VM) cache based on flash-based cache usage. A user selection for a flash-based cache is received. Based on the selection, configuration and sizing factors are provided, by a flash based cache driver, to VM cache size determination logic. Based on the configuration and sizing factors and a sizing formula and rules, a requested VM cache size is produced by the VM cache size determination logic. Based on the requested VM cache size, the VM cache is caused, via VM cache resizing logic, to be resized to the requested VM cache size.
摘要:
A data processing system stores encrypted data. Object identifiers are assigned to storage objects, and data encryption keys are assigned to the storage objects. When performing an operation upon a storage object, data encryption key failure may occur due to a corrupt or incorrect key. In this case, a copy of the data encryption key is fetched from a key server. It is possible for the association of the object identifiers with the data encryption keys to become lost or confused, so that the key server may fail to provide the correct key for a specified object identifier. Therefore, an absolute key identifier that is unique across the key server namespace also is stored in association with the object identifier in the storage system and in the key store of the key server, and the absolute key identifier is used as a failsafe for recovery of encrypted data.