Abstract:
A system, method, and machine-readable storage medium for providing a set of recommended quality of service (QoS) settings are provided. In some embodiments, providing the recommendation includes receiving a set of QoS settings of a volume for a client, a set of measured QoS metrics of the volume for the client, and a measure of load for a slice service corresponding to the volume. Providing the recommendation further includes determining a predicted QoS metric of the volume and a predicted load of the slice service. Providing the recommendation also includes determining, based on the predicted QoS metric, the predicted load, and the set of QoS settings, a set of recommended QoS settings to the client. The set of QoS settings of the volume for the client is then updated with the set of recommended QoS settings.
Abstract:
Computing technology for managing support requests are provided. The technology includes a processor executable application programming interface (API) that receives a support case indicating a problem associated with a device. The API utilizes a training model to predict a problem category for the support case. The training model predicts the problem category based on a feature extracted from information included in the support case. The training model further identifies a plurality of proximate support cases based on a distance between the support case and the proximate support cases within a virtual space assigned to the predicted problem category; determines relevance of each proximate support case to the support case; and outputs a resolution code for the support case based on the determined relevance of each proximate support case.
Abstract:
Techniques are provided for orchestrating operations between a storage environment and a computing environment hosting virtual machines. A virtual machine proxy, associated with a computing environment hosting a virtual machine, is accessed by an orchestrator to identify the virtual machine and properties of the virtual machine. A storage proxy, associated with a storage environment comprising a volume within which snapshots of the virtual machine are to be stored, is accessed by the orchestrator to initialize a backup procedure. The orchestrator utilizes the virtual machine proxy to create a snapshot of the virtual machine. The orchestrator utilizes the storage proxy to back up the snapshot to the volume using the backup procedure.
Abstract:
A technique is configured to log and update metadata in a log-structured file system to facilitate recovery and restart in response to failure of a storage node of a cluster. A block identifier (ID) is used to identify a block of data serviced by the storage node. Metadata embodied as mappings between block IDs and locations of data blocks in the cluster are illustratively maintained in "active" and "frozen" map fragments. An active map fragment refers to a map fragment that has space available to store a mapping, whereas a frozen map fragment refers to a map fragment that no available space for storing a mapping. The active map fragments are maintained in memory as "in-core" data structures, whereas the frozen map fragments are paged-out and stored on storage devices of the cluster as "on-disk" map fragment structures. Each frozen map fragment written to a segment includes a pointer to a last written frozen map fragment to form a chain (e.g., linked-list) of on-disk frozen map fragments. Each time a data block is persisted on a segment of the storage devices, an active map fragment is populated in-core and a metadata write marker is recorded on the segment (on-disk) indicating the location of the data block that was written to the segment. If a storage node crashes when the active map fragment is only partially populated, the metadata write markers facilitate rebuild of the active map fragment upon recovery and restart of a storage service of the node.
Abstract:
The present technology relates to managing workload within a storage system. A quality of service parameter proposal associated with managing incoming network traffic is generated and provided to a plurality of nodes. The generated quality of service parameter proposal to manage the incoming network traffic is modified based on a response received from the nodes. The incoming network traffic is serviced using the data from the modified quality of service parameter proposal.
Abstract:
Methods, non-transitory computer readable media, and computing devices that group objects with different service level objectives for an application includes receiving a request including a service level data to provision a volume. One or more aggregates for the received service level is identified, a resource pool including the identified one or more aggregates is generated. The volume including the generated resource pool with the identified one or more aggregates for the received service level is provisioned.
Abstract:
A storage appliance arranges snapshot data and snapshot metadata into different structures, and arranges the snapshot metadata to facilitate efficient snapshot manipulation, which may be for snapshot management or snapshot restore. The storage appliance receives snapshots according to a forever incremental configuration and arranges snapshot metadata into different types of records. The storage appliance stores these records in key-value stores maintained for each defined data collection (e.g., volume). The storage appliance arranges the snapshot metadata into records for inode information, records for directory information, and records that map source descriptors of data blocks to snapshot file descriptors. The storage appliance uses a locally generated snapshot identifier as a key prefix for the records to conform to a sort constrain of the key-value store, which allows the efficiency of the key-value store to be leveraged. The snapshot metadata arrangement facilitates efficient snapshot restore, file restore, and snapshot reclamation.
Abstract:
A method, non-transitory computer readable medium, and device that assists with reducing memory fragmentation in solid state devices includes identifying an allocation area within an address range to write data from a cache. Next, the identified allocation area is determined for including previously stored data. The previously stored data is read from the identified allocation area when it is determined that the identified allocation area comprises previously stored data. Next, both the write data from the cache and the read previously stored data are written back into the identified allocation area sequentially through the address range.
Abstract:
To leverage the attributes of object storage for applications/systems created to interface with a network files system, an object storage backed file system can accept the defined file system commands from the applications/systems and transform the file system commands into requests that target object storage. The file system is "backed" by object storage because attributes and content of file system entities are stored in objects. For instance, content data and metadata of a file are stored in objects in object storage. This object storage backed file system can be considered a bridge between a client perceived hierarchical file system namespace and a flat namespace of an object storage.
Abstract:
In some embodiments, a cluster computing system notifies a host system that a first path to a resource in the cluster computing system is optimized and that a second path to the resource is non-optimized. The resource is owned or managed by a first computing node of the cluster computing system. The first path includes the first computing node. The second path includes a second computing node and an intra-cluster connection between the second computing node and the first computing node. A disruption in the intra-cluster connection, which prevents communication between the first and second computing nodes via the intra- cluster connection, is identified. During a time period in which the disruption exists, the host system is notified that the first path is optimized and that the second path is unavailable, and input/output operations between the host system and the resource via the first path are continued.