US20150081893A1 - Fabric attached storage - Google Patents

Fabric attached storage Download PDF

Info

Publication number
US20150081893A1
US20150081893A1 US14/489,077 US201414489077A US2015081893A1 US 20150081893 A1 US20150081893 A1 US 20150081893A1 US 201414489077 A US201414489077 A US 201414489077A US 2015081893 A1 US2015081893 A1 US 2015081893A1
Authority
US
United States
Prior art keywords
data storage
storage
data
virtual
component
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/489,077
Inventor
Craig Chadwell
Ricardo Labiaga
Deepak Kenchammana-Hosekote
Swetha Krishnan
Gokul Soundararajan
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NetApp Inc
Original Assignee
NetApp Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NetApp Inc filed Critical NetApp Inc
Priority to PCT/US2014/056156 priority Critical patent/WO2015042185A1/en
Priority to US14/489,077 priority patent/US20150081893A1/en
Publication of US20150081893A1 publication Critical patent/US20150081893A1/en
Assigned to NETAPP, INC. reassignment NETAPP, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: LABIAGA, RICARDO, KRISHNAN, SWETHA, KENCHAMMANA-HOSEKOTE, DEEPAK, CHADWELL, Craig
Priority to US16/577,201 priority patent/US10895984B2/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/0604Improving or facilitating administration, e.g. storage management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0653Monitoring storage devices or systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0655Vertical data movement, i.e. input-output transfer; data movement between one or more hosts and one or more storage devices
    • G06F3/0659Command handling arrangements, e.g. command buffers, queues, command scheduling
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0662Virtualisation aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0662Virtualisation aspects
    • G06F3/0664Virtualisation aspects at device level, e.g. emulation of a storage device or system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0662Virtualisation aspects
    • G06F3/0665Virtualisation aspects at area level, e.g. provisioning of virtual or logical volumes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0668Interfaces specially adapted for storage systems adopting a particular infrastructure
    • G06F3/067Distributed or networked storage systems, e.g. storage area networks [SAN], network attached storage [NAS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5005Allocation of resources, e.g. of the central processing unit [CPU] to service a request
    • G06F9/5027Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5061Partitioning or combining of resources
    • G06F9/5072Grid computing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F2003/0697Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers device management, e.g. handlers, drivers, I/O schedulers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1004Server selection for load balancing
    • H04L67/1008Server selection for load balancing based on parameters of servers, e.g. available memory or workload

Definitions

  • Virtualization is a computing technique used for creating virtual instances of computing devices rather than physical instances of the computing devices.
  • a host computing device is a physical computing device that hosts virtual (or “guest”) computing devices. Virtualization has been applied not only to computing devices and operating systems, but also to networking and storage systems.
  • Cloud computing is a term used to refer to a model of computing in which multiple computing devices provide various computing services via a network, e.g., an Intranet or the Internet. Cloud computing commonly employs virtualization to provide “virtual servers.” Enterprises and other entities may use cloud computing instead of deploying data centers or may use cloud computing to provide supplementary “elastic” computing services. Elasticity is a benefit offered by cloud computing in that computing resources can be scaled up or down on the fly without affecting the end user.
  • Data storage servers e.g., devices that provide services offered by storage area networks
  • data storage servers are increasingly used in private data centers, cloud computing architectures.
  • enterprises may have multiple data storage servers (also referred to simply as “storage servers”) in their data center and even multiple data centers.
  • System administrators are commonly called on to provide improved storage services, e.g., by adding, maintaining, or retiring storage servers at appropriate times.
  • appropriate management at scale can be difficult. For example, it may be difficult to determine how to configure storage servers to respond to storage demands from users, applications, etc.
  • FIG. 1 is a block diagram illustrating various components in an environment in which the disclosed technology may operate in various embodiments.
  • FIG. 2 is a block diagram illustrating various components of a data storage server.
  • FIG. 3 is a flow diagram illustrating a routine invoked by the disclosed technology in various embodiments.
  • FIG. 4 is a block diagram illustrating various components of a data storage server.
  • FIG. 5 is a flow diagram illustrating a routine invoked by the disclosed technology in various embodiments.
  • FIG. 6 is a flow diagram illustrating a routine invoked by the disclosed technology in various embodiments.
  • FIG. 7 is a block diagram illustrating use of a policy manager to monitor and/or assert policies on network connections and data traffic between a network switch and a device, consistent with some embodiments.
  • FIG. 8 is a block diagram illustrating a virtualized data storage environment, consistent with some embodiments.
  • FIG. 9 is a block diagram illustrating a data storage environment, consistent with some embodiments.
  • FIG. 10 is a flow diagram illustrating a routine invoked by the disclosed technology in various embodiments.
  • FIG. 11 is a schematic diagram illustrating a fabric network topology, consistent with various embodiments.
  • a new class of storage devices is interconnected via very high bandwidth connections, e.g., in racks of storage devices, within a data center, or even across data centers.
  • These storage devices form part of a “fabric” and can be configured for use with other storage devices, e.g., in a “cluster” of storage servers or storage devices, to provide increased capacity, reduce latency, or respond to other storage-related needs.
  • administrators configure these storage devices manually, e.g., initially during deployment, during reallocation (e.g., to a different cluster), or during decommissioning.
  • This can be a time consuming, labor-intensive and error-prone process.
  • the disclosed technology can use profiles to facilitate configuration, reconfiguration, and decommissioning of storage devices.
  • profiles can be defined for applications, e.g., Microsoft Exchange mail servers, database servers, file servers, etc.
  • the profiles can specify conditions and actions.
  • a condition can indicate a target capacity, responsiveness, availability, age, version number, or other storage-related attributes.
  • An action indicates what to do when the condition is met.
  • a profile can specify that if the storage capacity of a server, e.g., an Exchange mail server, is 80% full (a condition), then an additional storage device should be assigned to a cluster and data is to be rebalanced across the augmented cluster (an action).
  • Administrators can install one or more profiles.
  • applications can have associated therewith suggested profiles for optimal performance, e.g., that are approved and installed into a profiles database by administrators.
  • a monitoring component executing at a computing device can monitor events to determine whether one or more conditions specified by the various profiles has been met.
  • This monitoring component can execute at one or more computing devices, e.g., a management console, a data storage server, or other computing device.
  • Various components of the data storage system can emit events to indicate status, e.g., capacity utilization, bandwidth utilization, errors, etc. alternatively, the monitoring component can query various components for this information.
  • the monitoring component can determine whether one or more conditions have been met.
  • the first condition that is met is selected.
  • the conditions may have a priority order and the condition with the highest priority is selected.
  • the monitoring component then triggers the action associated with the condition.
  • Some actions can be taken without human input or involvement.
  • associating a storage device with a particular cluster may not require human input or involvement.
  • Other actions may require human input or involvement.
  • permanently decommissioning an out of date storage device may require physically removing the storage device from the network.
  • the monitoring component may invoke one or more automation layers to cause the actions to occur.
  • the monitoring component may invoke an application program interface (API) provided by an automation layer executed by a storage device, a storage server, a network device, etc.
  • API application program interface
  • the API may be provided by a device driver or other software or hardware component.
  • the automation layer can translate invocations of the API to various commands that are issued to devices, e.g., to remove them from an inventory, configure them for a particular use, reset them, return them to the inventory, and so forth.
  • the disclosed technology recommends devices for adding to an inventory.
  • the technology may predict that one or more various devices may be needed in the future.
  • the technology may then alert a system administrator, e.g., to acquire additional devices and add them to the inventory.
  • the technology may indicate that an additional data storage server may be required to add capacity or reduce latency for a Exchange server installation.
  • the technology is capable of adapting hardware, installing software, downgrading software to prior versions, etc.
  • the lifetime of a data storage server has four stages: initialization and/or configuration (“day 0”); provisioning and/or usage (“day 1”); upgrading of hardware and/or software (“day 2”); and decommissioning (“day 3”).
  • the disclosed technology manages this lifetime, e.g., by implementing and managing an inventory of devices, e.g., data storage servers.
  • the technology implements methods and systems, comprising receiving a profile, wherein the received profile indicates a condition and an action corresponding to the condition; monitoring events emitted by devices of the data storage system; determining based on the monitored events that a device of the storage system matches the indicated condition; and performing the action corresponding to the indicated condition, wherein the action includes managing data stored by the data storage system.
  • the technology can further comprise receiving multiple profiles; identifying two or more profiles whose conditions are matched by the monitored events; and selecting one of the profiles whose action is to be performed.
  • the condition can specify one or more attributes of the storage system.
  • the specified one or more attributes can be one or more of capacity, performance, deployment time, age, power consumption, version, etc.
  • the method can comprise identifying a device from an inventory of available devices; assigning the identified device to a data storage server; and configuring the assigned device to operate with the data storage server.
  • the method can further comprise transferring, prior to the configuring, data stored at the device to a different device configured to operate with the different data storage server.
  • the action is to decommission a device, the method can trigger actions to transfer stored data to other devices of a data storage.
  • the method can further comprise deleting data stored at the device to be decommissioned.
  • the method can further comprise placing the decommissioned device into an inventory of available devices.
  • the method can further comprise configuring the device to be no longer assigned to a data storage server with which the device is presently associated.
  • Technology is disclosed for actively responding to data storage traffic (“the technology”).
  • System administrators commonly configure a data storage services infrastructure based on anticipated storage needs. Over time, however, those storage needs may change. For example, data storage traffic may change over a period of days, weeks, months, or even years to respond to different types of use. As these data storage traffic patterns change, the demands on various data storage devices also varies. In a conventional data storage system, it can be possible to determine where data storage demands are at a peak (“hotspot”). However, making the same determination in a virtualized environment can be difficult, e.g., because data traffic targeting various data storage devices may all originate from or target a particular virtual data storage component (collectively, “endpoints”). In such cases, system administrators may benefit from being able to determine how best to reallocate virtual data storage components, e.g., to different physical servers.
  • the various virtual data storage components can provide application program interfaces (APIs) that enable an application, e.g., a management console, to query for various information associated with the virtual data storage components.
  • APIs application program interfaces
  • a management console can query the various virtual data storage components to determine how much data (e.g., network traffic) the virtual data storage component is handling. This API thus enables “visibility” of data traffic flow at a highly granular level.
  • the technology can selectively “instrument” the various virtual data storage components to quickly determine where the hotspots lie.
  • the technology can first determine that a storage volume is hot and follow a path back to the source of the data being transmitted or requested from the storage volume, one storage component at a time. This can occur automatically, e.g., based on various events, crossing thresholds of performance (e.g., latency, capacity utilization, etc.), or manually, e.g., using a management console.
  • an application e.g., database server, web server, etc.
  • the technology can identify which users are using which volumes or portions of data.
  • the technology employs agents that either reside in data storage components or communicate with the storage components, e.g., via an API provided by the agents.
  • the data storage components can be volumes, server, networking components, servers, etc.
  • the technology can then selectively enable and disable the various agents to determine which data storage components, endpoints, and/or users are causing the hotspots, e.g., to perform an impact analysis.
  • the agents themselves may in turn employ APIs provided by the various data storage components, e.g., to receive data, turn instrumentation on or off, etc.
  • the technology can identify a hotspot at an application, an intermediary component, or a storage volume (whether physical or virtual) and selectively check data flows (e.g., each intermediary virtual or physical device) to diagnose the source of the data or network traffic. Once so determined, a system administrator can be alerted so that the system administrator can take various actions, e.g., to add capacity, solve problems, etc.
  • the technology enables analysis of storage level data flows at a higher, “logical” level to recommend a particular storage configuration, e.g., to satisfy “service level objectives.”
  • Storage operations transiting virtual data storage components can be mirrored or duplicated at a workload analyzer.
  • the workload analyzer can be a virtual data storage component that receives a duplicated copy of data storage operations, e.g., from a virtual storage appliance or from a different virtual data storage component.
  • the workload analyzer can review contents of network traffic, e.g., data indicating, at a storage layer level, a source, a destination, a type of data, and/or volume of data.
  • the workload analyzer can determine which application is sending or requesting data, which logical storage volumes are targeted, etc. The workload analyzer can then compare the actual workload to previously specified service level objectives. The workload analyzer can then determine, e.g., based on statistics or simulations, what storage configuration changes can be made to satisfy the service level objectives. As examples, the workload analyzer may recommend addition of a cache, volume, storage server, etc. In various embodiments, the workload analyzer can perform this analysis and recommendation dynamically, e.g., by alerting a system administrator of predicted performance or capacity issues.
  • the computing devices on which the described technology may be implemented may include one or more central processing units, memory, input devices (e.g., keyboard and pointing devices), output devices (e.g., display devices), storage devices (e.g., disk drives), and network devices (e.g., network interfaces).
  • the memory and storage devices are computer-readable storage media that may store instructions that implement at least portions of the described technology.
  • the data structures and message structures may be stored or transmitted via a data transmission medium, such as a signal on a communications link.
  • Various communications links may be used, such as the Internet, a local area network, a wide area network, or a point-to-point dial-up connection.
  • computer-readable media can comprise computer-readable storage media (e.g., “non-transitory” media) and computer-readable transmission media.
  • FIG. 1 is a block diagram illustrating various components 100 in an environment in which the disclosed technology may operate in various embodiments.
  • the components 100 can include one or more server computing devices, e.g., data storage server 102 a, data storage server (also, “storage server”) 102 b , and data storage server 102 n.
  • the server computing devices 102 are described in more detail below in relation to FIG. 2 .
  • the server computing devices 102 can communicate with one or more client computing devices 106 over a network 104 .
  • the network 104 can be an intranet, the Internet, or a special-purpose network.
  • Multiple client computing devices 106 e.g., client computing devices 106 a, 106 b, and 106 m ) can communicate with the server computing devices 102 , e.g., to store data.
  • FIG. 2 is a block diagram illustrating various components 200 of a data storage server 102 .
  • the data storage server 102 can be referred to as a network storage appliance or “filer” and can be a special-purpose computer that provides file service relating to the organization of information on data storage devices 242 , e.g., hard disk drives or solid state drives.
  • the illustrated storage server 102 comprises one or more processors 202 (e.g., single or multi-core processors), memory 206 , a network adapter 214 , and a storage adapter 216 interconnected by a system bus (not illustrated).
  • the storage server 102 also includes an operating system 204 that implements a file system to logically organize the information as a hierarchical structure of directories and files on data storage devices 242 .
  • a processor 202 can cause the storage adapter 216 to read and write data from/to data storage devices 242 .
  • the memory 206 has storage locations that are addressable by the processor and adapters, e.g., for storing software program code and/or data.
  • the processor and adapters may, in turn, comprise processing elements and/or logic circuitry configured to execute software code and manipulate data structures.
  • the operating system 204 portions of which are typically resident in memory 206 and/or storage devices, and executed by the processors 202 , functionally organizes stored data by, e.g., invoking storage operations in support of a file service implemented by the storage server 102 .
  • the network adapter 214 comprises mechanical, electrical, and signaling circuitry needed to connect the storage server 102 to a client computing device 106 over network 104 .
  • the client computing device 106 may be a general-purpose computer configured to execute applications, e.g., a database application.
  • the client computing device 106 may interact with the storage server 102 in accordance with a client/server model of information delivery. That is, the client may request the services of the filer, and the filer may return the results of the services requested by the client, e.g., by exchanging data communications packets encapsulating a data communications protocol, e.g., in a common Internet file system (CIFS) protocol or network file system (NFS) protocol format.
  • CIFS Internet file system
  • NFS network file system
  • the storage adapter 216 can cooperate with the operating system 204 executing on the storage server 102 to access information requested by a client computing device 106 .
  • the information may be stored on the data storage devices 242 , e.g., in logical “volumes.”
  • the storage adapter 216 includes input/output (I/O) interface circuitry that couples to the data storage devices 242 over an I/O interconnect arrangement, e.g., a conventional high-performance, Fibre Channel serial link topology, SAS, SCSI, SATA, etc.
  • the storage adapter 216 can communicate with the data storage devices 242 over a network (or switch) 230 .
  • the data storage devices 242 can be housed in an enclosure 240 , e.g., in the same rack as the storage server 102 or a different rack.
  • the data storage server 102 can include an inventory database 208 , a profiles database 210 , a monitoring component 218 , and a rule matcher component 220 .
  • the inventory database can store indications of devices, e.g., data storage servers and/or status of those data storage servers.
  • the inventory database 208 can store indications of data storage servers that are available to be assigned to a cluster.
  • the profiles database 210 can store one or more profiles. Profiles can be added by an administrator, e.g., when installing an application or manually.
  • components 202 are indicated to be associated with a data storage server, they may also or instead be associated with a different type of server, e.g., a management console server.
  • FIG. 3 is a flow diagram illustrating a routine 300 invoked by the disclosed technology in various embodiments.
  • the routine 300 can be either continuously executed by the rule matcher component 220 or on-demand by an administrator.
  • the routine 300 begins at block 302 .
  • the routine monitors events.
  • various components of storage servers may emit events at various times.
  • a monitoring component can trigger the components of the storage server to emit events. Examples of events can include, e.g., storage utilization, network bandwidth issues, latency issues, errors, etc.
  • the routine determines whether one or more of the events match conditions indicated by one or more profiles.
  • Each profile can be specified as a rule-action pair.
  • rules include:
  • Examples of actions can include:
  • FIG. 4 is a block diagram illustrating various components 400 of a data storage server 102 .
  • the data storage server 102 can be referred to as a network storage appliance or “filer” and can be a special-purpose computer that provides file service relating to the organization of information on data storage devices 442 , e.g., hard disk drives or solid state drives.
  • the illustrated storage server 102 comprises one or more processors 402 (e.g., single or multi-core processors), memory 406 , a network adapter 414 , and a storage adapter 416 interconnected by a system bus (not illustrated).
  • the storage server 102 also includes an operating system 404 that implements a file system to logically organize the information as a hierarchical structure of directories and files on data storage devices 442 .
  • a processor 402 can cause the storage adapter 416 to read and write data from/to data storage devices 442 .
  • the memory 406 has storage locations that are addressable by the processor and adapters, e.g., for storing software program code and/or data.
  • the processor and adapters may, in turn, comprise processing elements and/or logic circuitry configured to execute software code and manipulate data structures.
  • the operating system 404 portions of which are typically resident in memory 406 and/or storage devices, and executed by the processors 402 , functionally organizes stored data by, e.g., invoking storage operations in support of a file service implemented by the storage server 102 .
  • the network adapter 414 comprises mechanical, electrical, and signaling circuitry needed to connect the storage server 102 to a client computing device 106 over network 104 .
  • the client computing device 106 may be a general-purpose computer configured to execute applications, e.g., a database application.
  • the client computing device 106 may interact with the storage server 102 in accordance with a client/server model of information delivery. That is, the client may request the services of the filer, and the filer may return the results of the services requested by the client, e.g., by exchanging data communications packets encapsulating a data communications protocol, e.g., in a common Internet file system (CIFS) protocol or network file system (NFS) protocol format.
  • CIFS Internet file system
  • NFS network file system
  • the storage adapter 416 can cooperate with the operating system 404 executing on the storage server 102 to access information requested by a client computing device 106 .
  • the information may be stored on the data storage devices 442 , e.g., in logical “volumes.”
  • the storage adapter 416 includes input/output (I/O) interface circuitry that couples to the data storage devices 442 over an I/O interconnect arrangement, e.g., a conventional high-performance, Fibre Channel serial link topology, SAS, SCSI, SATA, etc.
  • the storage adapter 416 can communicate with the data storage devices 442 over a network (or switch) 430 .
  • the data storage devices 442 can be housed in an enclosure 440 , e.g., in the same rack as the storage server 102 or a different rack.
  • the storage server 102 can include an agent 408 that exposes an API and can employ APIs provided by other storage components, e.g., to retrieve and provide performance-related data, operational data, configuration data, etc.
  • the storage server 102 can include a workload analyzer 420 .
  • the workload analyzer can instead be a component completely separate from the server 102 .
  • the workload analyzer can receive data traffic, e.g., duplicated data traffic, to determine how to optimally configure the storage system or storage network, e.g., by adding or reconfiguring data storage devices, whether virtual or physical.
  • components 402 are indicated to be associated with a data storage server, they may also or instead be associated with a different type of server, e.g., a management console server.
  • FIG. 5 is a flow diagram illustrating a routine 500 invoked by the disclosed technology in various embodiments.
  • the routine 500 begins at block 502 .
  • the routine 500 identifies a next hotspot.
  • the routine 500 identifies a first hotspot, e.g., a storage component whose utilization or capacity exceeds a threshold value.
  • the routine 500 identifies a component in the data path that also has a hotspot, e.g., a different component from which data is received or to which data is sent.
  • the routine determines whether the hotspot can be reduced.
  • the hot spot may be capable of being reduced by adding hardware or an additional virtual component.
  • routine continues at block 510 to perform an action corresponding to the determination at decision block 508 on how to reduce the hotspot, and returns to block 504 . If false, the routine returns to block 504 .
  • the action can be to cause a reconfiguration, alert a system administrator, etc.
  • FIG. 6 is a flow diagram illustrating a routine 600 invoked by the disclosed technology in various embodiments, e.g., by a workflow analyzer component.
  • the routine 600 begins at block 602 .
  • the routine 600 analyzes data storage traffic, e.g., duplicated data storage traffic that is mirrored to the workflow analyzer.
  • the routine determines whether reconfiguration is warranted. As an example, the routine may determine whether the data storage traffic is not in conformance with one or more service level objectives. Various techniques exist on how to make this determination. If true, the routine continues at block 610 to perform an action corresponding to the determination at decision block 608 , and returns to block 604 . If false, the routine returns to block 604 .
  • the action at block 610 can be to reconfigure a component or suggest, e.g., to a system administrator, what components should be reconfigured.
  • the technology disclosed herein can employ (or work in conjunction with) a networked storage architecture, e.g., NetApp®'s Clustered Data ONTAP®, that is connected to servers that run virtual and/or physical instances of applications and/or Operating Systems using a switching fabric.
  • the networked storage architecture may provide, inter alia, some or all of the following properties:
  • a hotspot is a portion of a storage device or storage system that is accessed at a higher rate than other portions.
  • abnormal traffic from source(s) can be because:
  • identifying the source of the traffic is useful for formulating a remediation plan.
  • Source hotspot detection is made harder these days due to layers of virtualization in the server, storage and network.
  • instrumentation can be dynamically enabled at the end points that part of the virtual overlay that is the source of traffic to the hot file. Once the hottest sources in that group are identified, finer grain instrumentation is enabled only at the virtual switches that are part of those hot end points. That leads to hot/runaway VM identification. One can go a step further and use taps into the operating system (OS) to figure out which processes are generating hot traffic.
  • OS operating system
  • This approach can be used with storage systems serving virtualized clients or physically distributed clients.
  • the type of storage services that are useful are:
  • a workload analyzer may analyze storage traffic and predict that additional storage replicas may need to be brought online, e.g., to distribute storage traffic across multiple computing devices.
  • the workload analyzer may recommend that a reduction in deduplication may improve responsiveness or compliance with one or more SLOs.
  • the administer can deploy the workload analyzer service either “in-band” or “along-side” the flow of data.
  • an along-side deployment is acceptable albeit it can be lossy (e.g., SPAN).
  • Tuning recommendations resulting from such analyzers should be applicable despite modest packet capture loss.
  • the decision to use the results of the analyzer to tune storage can either be advisory or automated.
  • the technology may generally be applicable to policy based networks with service insertion capabilities in combination with any storage system.
  • an up-to-date copy of data is kept redundantly on one or more components or sites.
  • This continuous traffic between the primary and redundant (referred to as secondary) copies is the data protection traffic.
  • RPO Recovery Point Objective
  • RTO Recovery Time Objective
  • QoS quality of service
  • the change rate (or update frequency) at the primary can be used as the primary determinant of the bandwidth needed for protection traffic and can be left steady (e.g., constant) throughout the protection traffic.
  • variable scheme In order to react to network congestion, a variable scheme is used, including actions at the source and destination in case they turn out to be the bottleneck.
  • writes can be staged in a faster media e.g., solid state drives (SSDs) if available. At some later time this data can be moved to its intended location e.g., hard disk drive.
  • SSDs solid state drives
  • variable granularity e.g., some file based, some volume based
  • QoS can be applied to each protection traffic.
  • the technology is generally applicable to any network system with scalable isolation carrying data protection traffic between two storage systems.
  • Link aggregation or port trunking involves various methods of combining (aggregating) multiple physical network connections or ports in parallel to form a single logical link to increase throughput beyond what a single connection could sustain, and to provide redundancy in case one of the links fails.
  • Link aggregation can happen between ports of any two networking-capable end devices such as between two network switches, or between a switch and a server, or a switch and a network storage controller.
  • Each end device implements some method to balance the load across all the physical network links in an aggregation, to better utilize all the links and maximize throughput.
  • Such methods are typically based on computing a hash of one or more attributes of the network flow, such as source/destination IP addresses, source/destination ports or source/destination MAC addresses, and then mapping the hash uniquely to one physical link in the group.
  • the end device connected to the network switch lacks visibility on the network connectivity or characteristics, and so may choose a load-balancing method that does not align well with the network. For example, if a storage controller has programmed a MAC-address based load-balancing for a certain aggregation of ports, but it so happens that these ports are connected directly to a router and not to a switch (which means every outgoing frame gets the MAC address of the router as its destination MAC address). In this case, there will be no spraying and only one link of the aggregation keeps getting used. Thus, lack of visibility for the end device that it is in fact connected to a router causes its chosen load-balancing method to fail.
  • Each end device chooses the load-balancing method it uses independently of the other end to which its links are connected. For example, a network switch may pick an IP address based load-balancing for the outgoing packets on its trunked ports, whereas a storage controller connected at the other end of the trunked ports might pick a MAC address based load-balancing scheme.
  • the storage controller's load-balancing algorithm determines the member port of the trunk to use to transmit outgoing traffic, and does not control which link the inbound frames are received on.
  • the switch that the ports of the same trunk are connected to uses its own load-balancing algorithm to spray traffic within the trunk, and thus determines which member port of the storage controller will receive traffic.
  • a better approach to balance the load across the links in an aggregation would be to pick a load-balancing method based on the current network connectivity, traffic conditions and information from both end devices that are connected using the aggregation. This would enable an intelligent load-balancing scheme that utilizes all the links in the aggregation more effectively. Three methods are suggested here:
  • network entities e.g., switches and routers
  • end devices e.g., servers and storage controllers
  • the method uses such programmable interfaces to have the network switch and the other end device it is connected mutually communicate their load balancing rules and requirements to each other.
  • a software entity e.g., a “policy manager” that can program network devices, and exposes some programmable interfaces through which end points connected to the network devices can send and receive information. For example, as shown in FIG.
  • the end device (server, storage controller, etc.) could communicate its load-balancing schemes, as well as rules on when to apply which scheme, to the network switch.
  • the network switch could then dynamically pick a scheme during operation based on the rules received, its own load-balancing rules, and the current network state (connectivity information and traffic conditions), since the switch has visibility to the network state through its neighboring switches.
  • the network switch could also notify the end device about which load-balancing scheme it is currently using to spray traffic on the outgoing links of its aggregation, and what the current network state is (such as the congestion state as shown in FIG. 7 ).
  • the end device could then use this information to control which scheme it will use to load-balance across its outgoing links that are connected to the switch.
  • both the switch and the end device it is connected to work in a coordinated manner to exchange information and make a more informed decision on the load-balancing method at the current time for the current flows, solving Problem 3 (above).
  • the router could notify such connectivity information to the storage controller during operation, which will inform the storage controller to pick a load-balancing method other than destination MAC address-based method, solving Problem 2 (above).
  • This method addresses traffic flowing into and out of a storage controller.
  • Each exported volume or LUN on a storage controller is associated with a different Layer 3 (L3) address (e.g., IP address), but each such L3 interface does not map 1:1 with a Layer 2 address, which is especially a problem in case of traffic coming from different virtual machines that run on the same physical server.
  • L3 address e.g., IP address
  • SLO application service-level objectives
  • An SLO is a specification of objectives that the user/customer would like an application to meet. Meeting these objectives directly impacts the business objectives.
  • SLO monitoring and enforcement is typically handled by individual layers of the software stack such as enforcement of CPU resources by the hypervisor, network resources by the fabric, and storage bandwidth and latency by the storage controller.
  • Each layer in addition, has a static method for setting the quality-of-service (QoS) parameters—that is, a QoS value is set at resource creation and is rarely changed.
  • QoS quality-of-service
  • the technology combines the quality-of-service (QoS) mechanisms of a storage system along with the QoS mechanisms of the hypervisor and network to provide end-to-end QoS.
  • QoS quality-of-service
  • Our method is made possible by the emergence of software-defined infrastructures where the components can be monitored and controlled through a set of APIs; these APIs thus allow programmatic control (orchestration) of all resources.
  • the environment is setup as follows.
  • the application is provisioned in the software stack with a given SLO; the SLO specifies performance objectives, recovery objectives, protection, and security objectives.
  • the SLO specifies performance objectives, recovery objectives, protection, and security objectives.
  • the SLO may specify that the application wants to achieve 1000 transactions/sec and wants 99.99% availability.
  • This specification translates to a topology such as that illustrated in FIG. 8 . It contains an application running on a hypervisor using storage over a network; the storage itself is hosted by a set of controllers.
  • the hypervisor may have a local cache to offload disk IOs.
  • the first case is when two applications run on a shared infrastructure. Let us suppose that Application-A is a high-priority application and Application-B is a low priority application. Let us also assume that network priority fall into distinct levels: P1—highest priority, P2—normal priority, and P3—low priority. In this case, we mark the packets issued by Application-A to be P1 (highest priority) and Application-2 to be P3 (low priority). However, at some point in time, Application-B could be promoted to a higher priority (perhaps an end-of-moth report needs to be generated). In this case, we can dynamically mark the packets of Application-B to P1 temporarily.
  • FIG. 8 shows a cache at the hypervisor level and a cache at the storage level.
  • Application-A is a high-priority application and Application-B is a low priority application.
  • the hypervisor level cache absorbs most of the IOs issued by Application-A, we unnecessarily reserve fabric resources; Application-A only consumes fabric resources on cache misses hence it would be minimal.
  • a similar problem occurs at the storage level, if Application-A issues mostly read IOs then the backup traffic from controller-1 to controller-2 is minimal; thus the backup traffic generated on behalf of Application-A can be marked at a lower priority P3.
  • the algorithm determines the DSCP markings for all connections made through the fabric.
  • the algorithm is as follows:
  • the DSCP mechanism is limited to 64 priority levels. If DSCP (or another variant) is enhanced to respect a richer mechanism, e.g., enforcing throughput/latency in addition to priority levels then the algorithm can convey the specific throughput (packets/sec and the required latency) for each flow. We would use the priority levels only to break ties.
  • LIFs logical interface
  • Failover groups and failover policies are conventionally implemented in NetApp® Clustered Data OnTap® (cDOT) to provide additional LIF resiliency during outage conditions.
  • cDOT NetApp® Clustered Data OnTap®
  • the port with the lowest average throughput will be chosen as the LIF of preference.
  • the average throughput for a port is measured as the sum of the average throughputs of the LIFs assigned to the given port.
  • the process which manages failover policies and failover groups may collect and maintain the Leaf characteristic for each port within each failover group.
  • the process which manages failover policies and failover groups will also need access to the average throughput of LIFs in order to calculate the throughput for a given port.
  • FIG. 10 illustrates this process.
  • LIFs logical interfaces
  • Failover groups and failover policies are currently implemented in NetApp®'s Clustered Data OnTap® (cDOT) to provide additional LIF resiliency during outage conditions.
  • cDOT Clustered Data OnTap®
  • the a fabric controller In a fabric enabled network, the a fabric controller (IFC) has better insight into network traffic patterns than the end points. As a result, the fabric can better inform an end point as to which physical port should be used for a particular set of traffic. In a failover scenario, the IFC can tell a NetApp® cluster end point which node and port should be used to provide the best overall balance, security, or performance within the fabric.
  • IFC fabric controller
  • Fabric policies will contain ports and characteristics/thresholds. Ports in a cluster may belong to multiple policy groups. LIFs can be added to fabric policies rather than specific ports.
  • the IFC will negotiate with the cluster the port to which a LIF will belong at LIF creation time. The IFC will negotiate and update the failover port priority for a given LIF with the cluster.
  • the IFC can request that a cluster migrate a LIF from one port within a given policy to another port within a given policy given that an IFC can “know” a NetApp fabric policy, can create a relationship between the ports of a given end point group and the ports of a given NetApp fabric policy, “knows” about the existence of NetApp LIFs, and can knows about the relationship between a NetApp fabric policy and the LIFs controlled by that policy.
  • the fabric may choose a node and port which creates and indirect storage access path.
  • An indirect storage access path is defined as any path in which storage data access requests must traverse a cluster LIF.
  • logic illustrated in flow diagrams and described above may be altered in various ways. For example, the order of the logic may be rearranged, substeps may be performed in parallel, illustrated logic may be omitted, other logic may be included, etc.

Abstract

Technology is described for a profile-based lifecycle management for data storage servers. The technology can receive a profile, monitor events emitted by devices of the data storage system, determine based on the monitored events that a device of the storage system matches the indicated condition, and perform the action corresponding to the indicated condition, wherein the action includes managing data stored by the data storage system. The received profile can indicate a condition and an action corresponding to the condition.

Description

    CROSS-REFERENCE TO RELATED APPLICATION(S)
  • This application claims the benefit of commonly assigned U.S. Provisional Patent Application Ser. No. 61/878,972 (attorney docket no. 67272-8385.US00), filed on Sep. 17, 2013, and entitled “FABRIC-ATTACHED STORAGE SYSTEM”; U.S. Provisional Patent Application Ser. No. 62/018,497 (attorney docket no. 67272-8397.US00), filed on Jun. 27, 2014, and entitled “PROFILE-BASED LIFECYCLE MANAGEMENT FOR DATA STORAGE SERVERS”; and U.S. Provisional Patent Application Ser. No. 62/018,523 (attorney docket no. 67272-8398.US00), filed on Jun. 27, 2014, and entitled “ACTIVELY RESPONDING TO DATA STORAGE TRAFFIC,” the disclosures of which are incorporated herein in their entireties by reference.
  • BACKGROUND
  • Virtualization is a computing technique used for creating virtual instances of computing devices rather than physical instances of the computing devices. In hardware virtualization, a host computing device is a physical computing device that hosts virtual (or “guest”) computing devices. Virtualization has been applied not only to computing devices and operating systems, but also to networking and storage systems.
  • Cloud computing is a term used to refer to a model of computing in which multiple computing devices provide various computing services via a network, e.g., an Intranet or the Internet. Cloud computing commonly employs virtualization to provide “virtual servers.” Enterprises and other entities may use cloud computing instead of deploying data centers or may use cloud computing to provide supplementary “elastic” computing services. Elasticity is a benefit offered by cloud computing in that computing resources can be scaled up or down on the fly without affecting the end user.
  • Data storage servers, e.g., devices that provide services offered by storage area networks, are increasingly used in private data centers, cloud computing architectures. Moreover, enterprises may have multiple data storage servers (also referred to simply as “storage servers”) in their data center and even multiple data centers. System administrators are commonly called on to provide improved storage services, e.g., by adding, maintaining, or retiring storage servers at appropriate times. However, appropriate management at scale can be difficult. For example, it may be difficult to determine how to configure storage servers to respond to storage demands from users, applications, etc.
  • The sophistication of computing technology has evolved significantly over the last several decades. Various technology now exists for computing, networking, storage, etc. Configuring and managing this technology has also increased in complexity, and system administrators need increasingly sophisticated tools to manage these computing resources in a manner that is optimal for their organizations. These tools can manage device configuration, e.g., to reduce deployment and maintenance costs of data centers.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a block diagram illustrating various components in an environment in which the disclosed technology may operate in various embodiments.
  • FIG. 2 is a block diagram illustrating various components of a data storage server.
  • FIG. 3 is a flow diagram illustrating a routine invoked by the disclosed technology in various embodiments.
  • FIG. 4 is a block diagram illustrating various components of a data storage server.
  • FIG. 5 is a flow diagram illustrating a routine invoked by the disclosed technology in various embodiments.
  • FIG. 6 is a flow diagram illustrating a routine invoked by the disclosed technology in various embodiments.
  • FIG. 7 is a block diagram illustrating use of a policy manager to monitor and/or assert policies on network connections and data traffic between a network switch and a device, consistent with some embodiments.
  • FIG. 8 is a block diagram illustrating a virtualized data storage environment, consistent with some embodiments.
  • FIG. 9 is a block diagram illustrating a data storage environment, consistent with some embodiments.
  • FIG. 10 is a flow diagram illustrating a routine invoked by the disclosed technology in various embodiments.
  • FIG. 11 is a schematic diagram illustrating a fabric network topology, consistent with various embodiments.
  • DETAILED DESCRIPTION
  • Profile-based lifecycle management of storage servers and components thereof (“storage devices”) is disclosed. A new class of storage devices is interconnected via very high bandwidth connections, e.g., in racks of storage devices, within a data center, or even across data centers. These storage devices form part of a “fabric” and can be configured for use with other storage devices, e.g., in a “cluster” of storage servers or storage devices, to provide increased capacity, reduce latency, or respond to other storage-related needs. Commonly, administrators configure these storage devices manually, e.g., initially during deployment, during reallocation (e.g., to a different cluster), or during decommissioning. However, this can be a time consuming, labor-intensive and error-prone process. The disclosed technology can use profiles to facilitate configuration, reconfiguration, and decommissioning of storage devices.
  • Various profiles can be defined for applications, e.g., Microsoft Exchange mail servers, database servers, file servers, etc. The profiles can specify conditions and actions. A condition can indicate a target capacity, responsiveness, availability, age, version number, or other storage-related attributes. An action indicates what to do when the condition is met. For example, a profile can specify that if the storage capacity of a server, e.g., an Exchange mail server, is 80% full (a condition), then an additional storage device should be assigned to a cluster and data is to be rebalanced across the augmented cluster (an action). Administrators can install one or more profiles. Alternatively, in the infrequent yet possible case where applications desire bare metal resources (i.e., non-virtualized resources), applications can have associated therewith suggested profiles for optimal performance, e.g., that are approved and installed into a profiles database by administrators.
  • A monitoring component executing at a computing device can monitor events to determine whether one or more conditions specified by the various profiles has been met. This monitoring component can execute at one or more computing devices, e.g., a management console, a data storage server, or other computing device. Various components of the data storage system can emit events to indicate status, e.g., capacity utilization, bandwidth utilization, errors, etc. alternatively, the monitoring component can query various components for this information. Upon receiving this information, the monitoring component can determine whether one or more conditions have been met. In various embodiments, the first condition that is met is selected. In other embodiments, the conditions may have a priority order and the condition with the highest priority is selected. The monitoring component then triggers the action associated with the condition. Some actions can be taken without human input or involvement. As an example, associating a storage device with a particular cluster may not require human input or involvement. Other actions may require human input or involvement. As an example, permanently decommissioning an out of date storage device may require physically removing the storage device from the network.
  • The monitoring component may invoke one or more automation layers to cause the actions to occur. As an example, the monitoring component may invoke an application program interface (API) provided by an automation layer executed by a storage device, a storage server, a network device, etc. The API may be provided by a device driver or other software or hardware component. The automation layer can translate invocations of the API to various commands that are issued to devices, e.g., to remove them from an inventory, configure them for a particular use, reset them, return them to the inventory, and so forth.
  • In various embodiments, the disclosed technology recommends devices for adding to an inventory. As an example, upon receipt of multiple profiles and detection of various events, the technology may predict that one or more various devices may be needed in the future. The technology may then alert a system administrator, e.g., to acquire additional devices and add them to the inventory. As a particular example, the technology may indicate that an additional data storage server may be required to add capacity or reduce latency for a Exchange server installation.
  • In various embodiments the technology is capable of adapting hardware, installing software, downgrading software to prior versions, etc.
  • The lifetime of a data storage server has four stages: initialization and/or configuration (“day 0”); provisioning and/or usage (“day 1”); upgrading of hardware and/or software (“day 2”); and decommissioning (“day 3”). The disclosed technology manages this lifetime, e.g., by implementing and managing an inventory of devices, e.g., data storage servers.
  • In various embodiments, the technology implements methods and systems, comprising receiving a profile, wherein the received profile indicates a condition and an action corresponding to the condition; monitoring events emitted by devices of the data storage system; determining based on the monitored events that a device of the storage system matches the indicated condition; and performing the action corresponding to the indicated condition, wherein the action includes managing data stored by the data storage system. The technology can further comprise receiving multiple profiles; identifying two or more profiles whose conditions are matched by the monitored events; and selecting one of the profiles whose action is to be performed. The condition can specify one or more attributes of the storage system. The specified one or more attributes can be one or more of capacity, performance, deployment time, age, power consumption, version, etc. If the action is to add a device, the method can comprise identifying a device from an inventory of available devices; assigning the identified device to a data storage server; and configuring the assigned device to operate with the data storage server. The method can further comprise transferring, prior to the configuring, data stored at the device to a different device configured to operate with the different data storage server. If the action is to decommission a device, the method can trigger actions to transfer stored data to other devices of a data storage. The method can further comprise deleting data stored at the device to be decommissioned. The method can further comprise placing the decommissioned device into an inventory of available devices. The method can further comprise configuring the device to be no longer assigned to a data storage server with which the device is presently associated.
  • Technology is disclosed for actively responding to data storage traffic (“the technology”). System administrators commonly configure a data storage services infrastructure based on anticipated storage needs. Over time, however, those storage needs may change. For example, data storage traffic may change over a period of days, weeks, months, or even years to respond to different types of use. As these data storage traffic patterns change, the demands on various data storage devices also varies. In a conventional data storage system, it can be possible to determine where data storage demands are at a peak (“hotspot”). However, making the same determination in a virtualized environment can be difficult, e.g., because data traffic targeting various data storage devices may all originate from or target a particular virtual data storage component (collectively, “endpoints”). In such cases, system administrators may benefit from being able to determine how best to reallocate virtual data storage components, e.g., to different physical servers.
  • The various virtual data storage components can provide application program interfaces (APIs) that enable an application, e.g., a management console, to query for various information associated with the virtual data storage components. As an example, a management console can query the various virtual data storage components to determine how much data (e.g., network traffic) the virtual data storage component is handling. This API thus enables “visibility” of data traffic flow at a highly granular level.
  • In various embodiments, the technology can selectively “instrument” the various virtual data storage components to quickly determine where the hotspots lie. As an example, the technology can first determine that a storage volume is hot and follow a path back to the source of the data being transmitted or requested from the storage volume, one storage component at a time. This can occur automatically, e.g., based on various events, crossing thresholds of performance (e.g., latency, capacity utilization, etc.), or manually, e.g., using a management console. In various embodiments, an application (e.g., database server, web server, etc.) may also be instrumented so that the technology can determine which application or even which portion of the application is causing hotspots. In some embodiments, the technology can identify which users are using which volumes or portions of data.
  • Thus, the technology employs agents that either reside in data storage components or communicate with the storage components, e.g., via an API provided by the agents. The data storage components can be volumes, server, networking components, servers, etc. The technology can then selectively enable and disable the various agents to determine which data storage components, endpoints, and/or users are causing the hotspots, e.g., to perform an impact analysis. The agents themselves may in turn employ APIs provided by the various data storage components, e.g., to receive data, turn instrumentation on or off, etc.
  • The technology can identify a hotspot at an application, an intermediary component, or a storage volume (whether physical or virtual) and selectively check data flows (e.g., each intermediary virtual or physical device) to diagnose the source of the data or network traffic. Once so determined, a system administrator can be alerted so that the system administrator can take various actions, e.g., to add capacity, solve problems, etc.
  • In various embodiments, the technology enables analysis of storage level data flows at a higher, “logical” level to recommend a particular storage configuration, e.g., to satisfy “service level objectives.” Storage operations transiting virtual data storage components can be mirrored or duplicated at a workload analyzer. In various embodiments, the workload analyzer can be a virtual data storage component that receives a duplicated copy of data storage operations, e.g., from a virtual storage appliance or from a different virtual data storage component. The workload analyzer can review contents of network traffic, e.g., data indicating, at a storage layer level, a source, a destination, a type of data, and/or volume of data. As an example, the workload analyzer can determine which application is sending or requesting data, which logical storage volumes are targeted, etc. The workload analyzer can then compare the actual workload to previously specified service level objectives. The workload analyzer can then determine, e.g., based on statistics or simulations, what storage configuration changes can be made to satisfy the service level objectives. As examples, the workload analyzer may recommend addition of a cache, volume, storage server, etc. In various embodiments, the workload analyzer can perform this analysis and recommendation dynamically, e.g., by alerting a system administrator of predicted performance or capacity issues.
  • Several embodiments of the described technology are described in more detail in reference to the Figures. The computing devices on which the described technology may be implemented may include one or more central processing units, memory, input devices (e.g., keyboard and pointing devices), output devices (e.g., display devices), storage devices (e.g., disk drives), and network devices (e.g., network interfaces). The memory and storage devices are computer-readable storage media that may store instructions that implement at least portions of the described technology. In addition, the data structures and message structures may be stored or transmitted via a data transmission medium, such as a signal on a communications link. Various communications links may be used, such as the Internet, a local area network, a wide area network, or a point-to-point dial-up connection. Thus, computer-readable media can comprise computer-readable storage media (e.g., “non-transitory” media) and computer-readable transmission media.
  • Turning now to the figures, FIG. 1 is a block diagram illustrating various components 100 in an environment in which the disclosed technology may operate in various embodiments. The components 100 can include one or more server computing devices, e.g., data storage server 102 a, data storage server (also, “storage server”) 102 b, and data storage server 102 n. The server computing devices 102 are described in more detail below in relation to FIG. 2. The server computing devices 102 can communicate with one or more client computing devices 106 over a network 104. The network 104 can be an intranet, the Internet, or a special-purpose network. Multiple client computing devices 106 (e.g., client computing devices 106 a, 106 b, and 106 m) can communicate with the server computing devices 102, e.g., to store data.
  • FIG. 2 is a block diagram illustrating various components 200 of a data storage server 102. The data storage server 102 can be referred to as a network storage appliance or “filer” and can be a special-purpose computer that provides file service relating to the organization of information on data storage devices 242, e.g., hard disk drives or solid state drives. The illustrated storage server 102 comprises one or more processors 202 (e.g., single or multi-core processors), memory 206, a network adapter 214, and a storage adapter 216 interconnected by a system bus (not illustrated). The storage server 102 also includes an operating system 204 that implements a file system to logically organize the information as a hierarchical structure of directories and files on data storage devices 242. A processor 202 can cause the storage adapter 216 to read and write data from/to data storage devices 242.
  • In the illustrative embodiment, the memory 206 has storage locations that are addressable by the processor and adapters, e.g., for storing software program code and/or data. The processor and adapters may, in turn, comprise processing elements and/or logic circuitry configured to execute software code and manipulate data structures. The operating system 204, portions of which are typically resident in memory 206 and/or storage devices, and executed by the processors 202, functionally organizes stored data by, e.g., invoking storage operations in support of a file service implemented by the storage server 102.
  • The network adapter 214 comprises mechanical, electrical, and signaling circuitry needed to connect the storage server 102 to a client computing device 106 over network 104. The client computing device 106 may be a general-purpose computer configured to execute applications, e.g., a database application. Moreover, the client computing device 106 may interact with the storage server 102 in accordance with a client/server model of information delivery. That is, the client may request the services of the filer, and the filer may return the results of the services requested by the client, e.g., by exchanging data communications packets encapsulating a data communications protocol, e.g., in a common Internet file system (CIFS) protocol or network file system (NFS) protocol format.
  • The storage adapter 216 can cooperate with the operating system 204 executing on the storage server 102 to access information requested by a client computing device 106. The information may be stored on the data storage devices 242, e.g., in logical “volumes.” The storage adapter 216 includes input/output (I/O) interface circuitry that couples to the data storage devices 242 over an I/O interconnect arrangement, e.g., a conventional high-performance, Fibre Channel serial link topology, SAS, SCSI, SATA, etc. The storage adapter 216 can communicate with the data storage devices 242 over a network (or switch) 230. The data storage devices 242 can be housed in an enclosure 240, e.g., in the same rack as the storage server 102 or a different rack.
  • The data storage server 102 can include an inventory database 208, a profiles database 210, a monitoring component 218, and a rule matcher component 220. The inventory database can store indications of devices, e.g., data storage servers and/or status of those data storage servers. As an example, the inventory database 208 can store indications of data storage servers that are available to be assigned to a cluster. The profiles database 210 can store one or more profiles. Profiles can be added by an administrator, e.g., when installing an application or manually.
  • Although components 202 are indicated to be associated with a data storage server, they may also or instead be associated with a different type of server, e.g., a management console server.
  • FIG. 3 is a flow diagram illustrating a routine 300 invoked by the disclosed technology in various embodiments. In various embodiments, the routine 300 can be either continuously executed by the rule matcher component 220 or on-demand by an administrator. The routine 300 begins at block 302. At block 304, the routine monitors events. As an example, various components of storage servers may emit events at various times. Alternatively, a monitoring component can trigger the components of the storage server to emit events. Examples of events can include, e.g., storage utilization, network bandwidth issues, latency issues, errors, etc. At decision block 308, the routine determines whether one or more of the events match conditions indicated by one or more profiles. When more than one rule is matched for a given condition, either an additional priority field is used to decide which order the action(s) will be executed or, in its absence, the actions are executed in order in which it is declared in the profiles database. If true, the routine at block 310 performs an action corresponding to the matched event and returns to block 304. If false, the routine returns to block 304.
  • Each profile can be specified as a rule-action pair. Some example of rules include:
      • storage device age>X years
      • storage device age<X years
      • storage device hasSupportAgreement
      • storage device CPU=model X
      • storage device Memory>=X GB
      • storage device port type FCoE, 10 GigEthernet, . . .
      • number of storage device ports>=X
      • storage device CPU>X%
      • storage device CPU<X%
      • storage device to media type=HDD, or SSD, or NVMe, etc.
      • storage device is n-way HA=1, 2, 4, . . .
      • storage cluster capacity used>X%
      • storage cluster capacity used<X%
      • storage device capacity used>X%
      • storage device capacity used<X%
      • if storage device software version<X
      • if storage device software version>X
  • Examples of actions can include:
      • evacuate data stored in device
      • perform non-disruptive upgrade
      • perform disruptive upgrade
      • wipe clean
      • migrate storage device to new cluster
      • send warning email to administrator
      • send recommendation email to administrator
      • send [other] email to administrator
  • FIG. 4 is a block diagram illustrating various components 400 of a data storage server 102. The data storage server 102 can be referred to as a network storage appliance or “filer” and can be a special-purpose computer that provides file service relating to the organization of information on data storage devices 442, e.g., hard disk drives or solid state drives. The illustrated storage server 102 comprises one or more processors 402 (e.g., single or multi-core processors), memory 406, a network adapter 414, and a storage adapter 416 interconnected by a system bus (not illustrated). The storage server 102 also includes an operating system 404 that implements a file system to logically organize the information as a hierarchical structure of directories and files on data storage devices 442. A processor 402 can cause the storage adapter 416 to read and write data from/to data storage devices 442.
  • In the illustrative embodiment, the memory 406 has storage locations that are addressable by the processor and adapters, e.g., for storing software program code and/or data. The processor and adapters may, in turn, comprise processing elements and/or logic circuitry configured to execute software code and manipulate data structures. The operating system 404, portions of which are typically resident in memory 406 and/or storage devices, and executed by the processors 402, functionally organizes stored data by, e.g., invoking storage operations in support of a file service implemented by the storage server 102.
  • The network adapter 414 comprises mechanical, electrical, and signaling circuitry needed to connect the storage server 102 to a client computing device 106 over network 104. The client computing device 106 may be a general-purpose computer configured to execute applications, e.g., a database application. Moreover, the client computing device 106 may interact with the storage server 102 in accordance with a client/server model of information delivery. That is, the client may request the services of the filer, and the filer may return the results of the services requested by the client, e.g., by exchanging data communications packets encapsulating a data communications protocol, e.g., in a common Internet file system (CIFS) protocol or network file system (NFS) protocol format.
  • The storage adapter 416 can cooperate with the operating system 404 executing on the storage server 102 to access information requested by a client computing device 106. The information may be stored on the data storage devices 442, e.g., in logical “volumes.” The storage adapter 416 includes input/output (I/O) interface circuitry that couples to the data storage devices 442 over an I/O interconnect arrangement, e.g., a conventional high-performance, Fibre Channel serial link topology, SAS, SCSI, SATA, etc. The storage adapter 416 can communicate with the data storage devices 442 over a network (or switch) 430. The data storage devices 442 can be housed in an enclosure 440, e.g., in the same rack as the storage server 102 or a different rack.
  • The storage server 102 can include an agent 408 that exposes an API and can employ APIs provided by other storage components, e.g., to retrieve and provide performance-related data, operational data, configuration data, etc.
  • The storage server 102 can include a workload analyzer 420. The workload analyzer can instead be a component completely separate from the server 102. The workload analyzer can receive data traffic, e.g., duplicated data traffic, to determine how to optimally configure the storage system or storage network, e.g., by adding or reconfiguring data storage devices, whether virtual or physical.
  • Although components 402 are indicated to be associated with a data storage server, they may also or instead be associated with a different type of server, e.g., a management console server.
  • FIG. 5 is a flow diagram illustrating a routine 500 invoked by the disclosed technology in various embodiments. The routine 500 begins at block 502. At block 504, the routine 500 identifies a next hotspot. During a first iteration, the routine 500 identifies a first hotspot, e.g., a storage component whose utilization or capacity exceeds a threshold value. During a subsequent iteration, the routine 500 identifies a component in the data path that also has a hotspot, e.g., a different component from which data is received or to which data is sent. At decision block 508, the routine determines whether the hotspot can be reduced. As examples, the hot spot may be capable of being reduced by adding hardware or an additional virtual component. If true, the routine continues at block 510 to perform an action corresponding to the determination at decision block 508 on how to reduce the hotspot, and returns to block 504. If false, the routine returns to block 504. The action can be to cause a reconfiguration, alert a system administrator, etc.
  • FIG. 6 is a flow diagram illustrating a routine 600 invoked by the disclosed technology in various embodiments, e.g., by a workflow analyzer component. The routine 600 begins at block 602. At block 604, the routine 600 analyzes data storage traffic, e.g., duplicated data storage traffic that is mirrored to the workflow analyzer. At decision block 608, the routine determines whether reconfiguration is warranted. As an example, the routine may determine whether the data storage traffic is not in conformance with one or more service level objectives. Various techniques exist on how to make this determination. If true, the routine continues at block 610 to perform an action corresponding to the determination at decision block 608, and returns to block 604. If false, the routine returns to block 604. The action at block 610 can be to reconfigure a component or suggest, e.g., to a system administrator, what components should be reconfigured.
  • In various embodiments, the technology disclosed herein can employ (or work in conjunction with) a networked storage architecture, e.g., NetApp®'s Clustered Data ONTAP®, that is connected to servers that run virtual and/or physical instances of applications and/or Operating Systems using a switching fabric. The networked storage architecture may provide, inter alia, some or all of the following properties:
      • Flat: any to any latency and bandwidth is relatively constant,
      • Scalable isolation: Islands of communicating processes can be measured in millions, and
      • Policy enforcement at line speeds: Selective actions can be applied at line speeds to packets that match predicates. Actions like:
        • Deny
        • Permit
        • Redirect
        • Log
        • Copy
        • Mark
    Hotspot Source Detection Using Drill-Down Instrumentation.
  • Sometime after a storage system is provisioned (e.g., configured), it is likely that a storage hotspot will develop over time, thereby making the configuration sub-optimal. A hotspot is a portion of a storage device or storage system that is accessed at a higher rate than other portions. By analyzing statistics, it is possible to quickly identify hotspots (e.g., storage volumes, devices, etc.) To tackle this hotspot the administrator needs to figure out two things:
      • 1. Who is the source(s) of this heavy traffic, and
      • 2. How to remediate the problem (move storage to faster tier/freer controller, etc.)
  • Typically abnormal traffic from source(s) can be because:
      • 1. Violation of service level objectives (SLOs): Load exceeded expectations at the time of provisioning, or
      • 2. A runaway client: An operational singularity (e.g., bug).
  • Regardless of the case, identifying the source of the traffic is useful for formulating a remediation plan.
  • Source hotspot detection is made harder these days due to layers of virtualization in the server, storage and network.
  • The following information can be stitched together to identify the truant source:
      • From storage controller, identify hot file/volume and derive the network (or SAN) connection showing most traffic to hot file.
      • From network, find all end-points that use that storage connection.
      • From client machine, find virtual machines (VMs) using those end-points.
  • Once a potential victim has been identified, it can be remediated using one of these techniques:
      • Throttle the truant VM.
      • Apply back pressure using network.
      • Redirect traffic to a load-sharing mirror.
      • Drop connection.
  • Use network statistics to drive this first.
  • This=would have been easy if one could instrument all components at all times. However, in real systems, instrumentation is expensive and should be selectively enabled. The above methodology lends itself well to a “drill-down” approach.
  • When a hot volume/file is detected at the storage controller instrumentation can be dynamically enabled at the end points that part of the virtual overlay that is the source of traffic to the hot file. Once the hottest sources in that group are identified, finer grain instrumentation is enabled only at the virtual switches that are part of those hot end points. That leads to hot/runaway VM identification. One can go a step further and use taps into the operating system (OS) to figure out which processes are generating hot traffic.
  • This approach can be used with storage systems serving virtualized clients or physically distributed clients.
  • Dynamic Storage Service Insertion.
  • There are many ways to leverage the ability to dynamically insert services to existing flows that will be possible in switching fabrics. For example, use of “Redirect” and “Copy” actions may provide the ability to insert interesting capabilities inline or along-side flows.
  • The type of storage services that are useful are:
      • Caches: These are intermediaries that can offload some of the read/write traffic from high intensity at the source.
      • Workload analyzers: These are intermediaries that can do packet capture of short term traffic, extract workload characteristics.
  • By dynamically inserting workload analyzers, storage management decisions can be tuned dynamically, e.g., at runtime. For example, a workload analyzer may analyze storage traffic and predict that additional storage replicas may need to be brought online, e.g., to distribute storage traffic across multiple computing devices. As another example, the workload analyzer may recommend that a reduction in deduplication may improve responsiveness or compliance with one or more SLOs.
  • When an administrator detects sub-optimal usage of resources, the administer can deploy the workload analyzer service either “in-band” or “along-side” the flow of data. For most purposes an along-side deployment is acceptable albeit it can be lossy (e.g., SPAN). Tuning recommendations resulting from such analyzers should be applicable despite modest packet capture loss. The decision to use the results of the analyzer to tune storage can either be advisory or automated.
  • The technology may generally be applicable to policy based networks with service insertion capabilities in combination with any storage system.
  • Managing Data Protection Traffic
  • To achieve resilience to component and/or site failures, an up-to-date copy of data is kept redundantly on one or more components or sites. This continuous traffic between the primary and redundant (referred to as secondary) copies is the data protection traffic. To achieve aRecovery Point Objective (RPO) and a Recovery Time Objective (RTO), an appropriate quality of service (QoS) is specified starting at the source of updates (primary), through a network link between the primary and secondary, and at the destination (secondary). When multiple such protection streams compete for resources, their allocation of resources is apportioned.
  • There are multiple challenges in ensuring this apportioning:
      • 1. How to re-adjust allocations when any one of the three elements—primary, network, secondary—get congested and are not able to keep up.
      • 2. How to do this at large scale, e.g., when there are millions of such primary-secondary pairings (as would be the case when fine grain data protection is required e.g., at the virtual machine disk (VMDK) level.
  • The change rate (or update frequency) at the primary can be used as the primary determinant of the bandwidth needed for protection traffic and can be left steady (e.g., constant) throughout the protection traffic.
  • In order to react to network congestion, a variable scheme is used, including actions at the source and destination in case they turn out to be the bottleneck.
  • Depending on what element gets congested, various actions can be taken at the remaining elements.
  • If the destination is congested, then writes can be staged in a faster media e.g., solid state drives (SSDs) if available. At some later time this data can be moved to its intended location e.g., hard disk drive.
  • On the granularity issue, the ability to create data protection traffic between two storage systems on variable granularity, e.g., some file based, some volume based, is achieved by creating network overlays per traffic flow. This is possible when the underlying fabric supports scalable isolation. Once isolated, QoS can be applied to each protection traffic.
  • The technology is generally applicable to any network system with scalable isolation carrying data protection traffic between two storage systems.
  • Efficient Load Balancing in Trunked Ports
  • Link aggregation or port trunking involves various methods of combining (aggregating) multiple physical network connections or ports in parallel to form a single logical link to increase throughput beyond what a single connection could sustain, and to provide redundancy in case one of the links fails. Link aggregation can happen between ports of any two networking-capable end devices such as between two network switches, or between a switch and a server, or a switch and a network storage controller. Each end device implements some method to balance the load across all the physical network links in an aggregation, to better utilize all the links and maximize throughput. Such methods are typically based on computing a hash of one or more attributes of the network flow, such as source/destination IP addresses, source/destination ports or source/destination MAC addresses, and then mapping the hash uniquely to one physical link in the group.
  • 1) Choice of the load-balancing algorithm tends to be a static configuration at the server or storage controller, without sufficient run-time knowledge of the environment or the network flows that are passing in and out of it. With virtualization, this problem gets even worse especially for traffic between a virtual machine (VM) at one end and a storage controller at the other end. In such scenario, data stores on the storage controller are exported via NFS or CIFS with different interface addresses (IP addresses), and there is a single Ethernet interface on the hypervisor that carries traffic for all I/O going to these data stores for a certain storage protocol. Since the same ethernet interface carries traffic going to the data stores from all VMs, all the flows from different VMs end up getting the same destination MAC address for their flows, which leads to a poor balancing of flows from various VMs across different links in a port group if the destination MAC address is the attribute used for port selection.
  • 2) The end device connected to the network switch lacks visibility on the network connectivity or characteristics, and so may choose a load-balancing method that does not align well with the network. For example, if a storage controller has programmed a MAC-address based load-balancing for a certain aggregation of ports, but it so happens that these ports are connected directly to a router and not to a switch (which means every outgoing frame gets the MAC address of the router as its destination MAC address). In this case, there will be no spraying and only one link of the aggregation keeps getting used. Thus, lack of visibility for the end device that it is in fact connected to a router causes its chosen load-balancing method to fail.
  • 3) Each end device chooses the load-balancing method it uses independently of the other end to which its links are connected. For example, a network switch may pick an IP address based load-balancing for the outgoing packets on its trunked ports, whereas a storage controller connected at the other end of the trunked ports might pick a MAC address based load-balancing scheme. The storage controller's load-balancing algorithm determines the member port of the trunk to use to transmit outgoing traffic, and does not control which link the inbound frames are received on. The switch that the ports of the same trunk are connected to, uses its own load-balancing algorithm to spray traffic within the trunk, and thus determines which member port of the storage controller will receive traffic. In this model, both entities do not have any insight or visibility into each other's load-balancing rules. This could result in a case where, by coincidence, the load-balancing algorithm used by the network switch and the one used by the other end device happen to pick the same link for most of the flows, in which case that link gets overwhelmed and the other links in the aggregation go under-utilized.
  • A better approach to balance the load across the links in an aggregation would be to pick a load-balancing method based on the current network connectivity, traffic conditions and information from both end devices that are connected using the aggregation. This would enable an intelligent load-balancing scheme that utilizes all the links in the aggregation more effectively. Three methods are suggested here:
      • 1) Use programmable interfaces exposed by software-defined infrastructures to dynamically choose a load-balancing method depending upon the current flows, network state and requirements of both end devices connected via the trunked port.
      • 2) Use other attributes from higher layers as additional components to the tuple for hash computation, to get better granularity on the load distribution between the outgoing links of an aggregation.
      • 3) For traffic going in and out of a storage controller, associate different virtual MAC addresses with each L3 interface exposed by a storage controller, so that using MAC address based load balancing will still achieve good load distributions across different links of an aggregation, especially for virtualized environments.
    Method 1
  • With the advent of software-defined networking, it is possible to program network entities (e.g., switches and routers) from other end devices (e.g., servers and storage controllers) by using programmable interfaces exposed by a software controller that has visibility to the network fabric. The method uses such programmable interfaces to have the network switch and the other end device it is connected mutually communicate their load balancing rules and requirements to each other. As shown in FIG. 7, it is assumed that a software entity, e.g., a “policy manager” that can program network devices, and exposes some programmable interfaces through which end points connected to the network devices can send and receive information. For example, as shown in FIG. 7, the end device (server, storage controller, etc.) could communicate its load-balancing schemes, as well as rules on when to apply which scheme, to the network switch. The network switch could then dynamically pick a scheme during operation based on the rules received, its own load-balancing rules, and the current network state (connectivity information and traffic conditions), since the switch has visibility to the network state through its neighboring switches. The network switch could also notify the end device about which load-balancing scheme it is currently using to spray traffic on the outgoing links of its aggregation, and what the current network state is (such as the congestion state as shown in FIG. 7). The end device could then use this information to control which scheme it will use to load-balance across its outgoing links that are connected to the switch. Thus, both the switch and the end device it is connected to work in a coordinated manner to exchange information and make a more informed decision on the load-balancing method at the current time for the current flows, solving Problem 3 (above). With this approach, if a storage controller is directly connected to a router, the router could notify such connectivity information to the storage controller during operation, which will inform the storage controller to pick a load-balancing method other than destination MAC address-based method, solving Problem 2 (above).
  • Method 2:
  • In this method, we add other attributes to the tuple for the hash computation that decides the outgoing link of the aggregation to use for a certain flow. For example, using the unique identifier for each virtual machine (VM ID) as another field in the hash tuple might lead to better load balancing of traffic from different VMs on the same physical server. We could also add Layer-4 and Layer-5 attributes specific to different protocols. For example, in case of a storage controller, it might be relevant to add attributes such as a file identifier or LUN identifier which is carried in the protocol headers of NFS/CIFS/iSCSI and other storage protocols, so that different flows coming from the same client IP address and MAC address still get “sprayed” across different links based on the file or LUN being accessed. Using such additional fields for hashing would help solve Problem 1.
  • Method 3:
  • This method addresses traffic flowing into and out of a storage controller. Each exported volume or LUN on a storage controller is associated with a different Layer 3 (L3) address (e.g., IP address), but each such L3 interface does not map 1:1 with a Layer 2 address, which is especially a problem in case of traffic coming from different virtual machines that run on the same physical server. This results in the scenario explained in Problem 1 (above) if a MAC-address based load balancing scheme gets applied at the server. To mitigate this, we could assign different MAC addresses to different L3 interfaces, so that each L3 interface is associated with a distinct MAC address. With this solution, traffic from different VMs going to different exported volumes would not end up using the same destination MAC address and so, a destination MAC address-based load balancing method at the server would be still able to achieve effective distribution of traffic from different VMs across the links in a trunked port. This helps solve Problem 1 (above).
  • Using DSCP Marking for QoS
  • Technology is disclosed for enforcing end-to-end application service-level objectives (SLOs). An SLO is a specification of objectives that the user/customer would like an application to meet. Meeting these objectives directly impacts the business objectives. SLO monitoring and enforcement is typically handled by individual layers of the software stack such as enforcement of CPU resources by the hypervisor, network resources by the fabric, and storage bandwidth and latency by the storage controller. Each layer, in addition, has a static method for setting the quality-of-service (QoS) parameters—that is, a QoS value is set at resource creation and is rarely changed.
  • In contrast to the above approach, the technology combines the quality-of-service (QoS) mechanisms of a storage system along with the QoS mechanisms of the hypervisor and network to provide end-to-end QoS. Our method is made possible by the emergence of software-defined infrastructures where the components can be monitored and controlled through a set of APIs; these APIs thus allow programmatic control (orchestration) of all resources. The invention makes two claims:
      • 1. We provide a method to dynamically “marking” a network packet to enforce application level SLOs at the network level, and
      • 2. We provide a method for determining the appropriate network QoS level to mark each of the network flow.
  • These methods can be applied to both flows generated between (1) an application server and storage server, and (2) two or more controllers of a distributed system. The environment is setup as follows. The application is provisioned in the software stack with a given SLO; the SLO specifies performance objectives, recovery objectives, protection, and security objectives. For simpler discussion, we limit the SLO to performance and recovery objectives, e.g., the SLO may specify that the application wants to achieve 1000 transactions/sec and wants 99.99% availability. This specification translates to a topology such as that illustrated in FIG. 8. It contains an application running on a hypervisor using storage over a network; the storage itself is hosted by a set of controllers. The hypervisor may have a local cache to offload disk IOs.
  • Simple Case—Two Applications
  • The first case is when two applications run on a shared infrastructure. Let us suppose that Application-A is a high-priority application and Application-B is a low priority application. Let us also assume that network priority fall into distinct levels: P1—highest priority, P2—normal priority, and P3—low priority. In this case, we mark the packets issued by Application-A to be P1 (highest priority) and Application-2 to be P3 (low priority). However, at some point in time, Application-B could be promoted to a higher priority (perhaps an end-of-moth report needs to be generated). In this case, we can dynamically mark the packets of Application-B to P1 temporarily.
  • Complex Case—Intermediate Caches
  • The problem is more complicated when caches are introduced between the application and the storage server. For example, FIG. 8 shows a cache at the hypervisor level and a cache at the storage level. Let us again suppose that Application-A is a high-priority application and Application-B is a low priority application. In the simple case, we marked all messages sent by Application-A to be P1. However, if the hypervisor level cache absorbs most of the IOs issued by Application-A, we unnecessarily reserve fabric resources; Application-A only consumes fabric resources on cache misses hence it would be minimal. A similar problem occurs at the storage level, if Application-A issues mostly read IOs then the backup traffic from controller-1 to controller-2 is minimal; thus the backup traffic generated on behalf of Application-A can be marked at a lower priority P3.
  • Our algorithm assumes the following inputs:
      • A set of applications and its SLO; each application has one SLO.
      • Each application is provided with a workload profile that specifies the incoming traffic, the operation mix, and its cacheability.
      • A topology is specified per application; the topology includes the set of entities in the software stack.
  • Using these inputs, the algorithm determines the DSCP markings for all connections made through the fabric. The algorithm is as follows:
      • 1. The algorithm starts with the incoming traffic specification; the specification specified the rate of operations issued per type. For example, a NFS workload may be specified as 800 read IO/s and 200 write IO/s. For each workload, it computes the residual workload entering the fabric. If the workload is cacheable then the residual workload has a lower intensity. For the above workload, assume a cache hit-ratio of 0.8 for read IOs then, the residual workload has 160 read IO/s and 200 write IO/s.
      • 2. Then, it sums up all total traffic entering the fabric. FIG. 9 shows two applications using a shared network fabric. Application-A has [R′1,W′1] going into the fabric and Application-B has [R′2,W′2] going into the fabric. Furthermore, the algorithm is aware of the application priorities; for this example, let us assume Application-A is high priority and Application-B is low priority. These values are the intensity of the residual traffic. The sum of the total traffic is [R′1+R′2, W′1+W′2].
      • 3. Next, it sets the network DSCP markings. If the total traffic is less than the capacity of the network, i.e., the network has excess capacity, then all traffic flows are given equal priority. If the demand exceeds capacity then, DCSP is used to enforce application priorities. In the above example, if [R′1+R′2, W′1+W′2]>Capacity then Application-A would be marked as P1 (high priority) and Application-B would be marked as P3 (low priority).
  • Currently, the DSCP mechanism is limited to 64 priority levels. If DSCP (or another variant) is enhanced to respect a richer mechanism, e.g., enforcing throughput/latency in addition to priority levels then the algorithm can convey the specific throughput (packets/sec and the required latency) for each flow. We would use the priority levels only to break ties.
  • Intelligent Interface Failover
  • If a port hosting one or more LIFs (logical interface) experiences outage conditions, the LIF(s) on that port will also experience an outage.
  • Failover groups and failover policies are conventionally implemented in NetApp® Clustered Data OnTap® (cDOT) to provide additional LIF resiliency during outage conditions.
  • Currently in cDOT, the failover policies are: nextavail, priority, disabled.
      • Nextavail—Logical Interface (LIF) fails over to the next available port, preferring a port on the current node
      • Priority—LIF fails over to the next available port as specified in the user-defined failover group
      • Disabled—a LIF does not fail over
        Failover groups are lists of ports. A single failover group can be assigned to a LIF at any given time.
  • Failover occurs in the following scenarios:
      • Power failure
      • Automatic revert is enabled on a LIF and that LIFs home port reverts to the administrative up status
      • The port hosting a LIF changes to the administrative down status
      • Node reboot or node out of quorum
  • The technology presents a New failover policy: bestavailable
  • Bestavailable—LIF fails over to the best available port, where best available is defined as follows: the LIF prefers to move to a port on the same node as its current port. If no port exists as available on the same node, then the LIF prefers to move to a port on the same iLeaf as its current port. If no port exists as available on the same iLeaf, then the LIF will prefer any port in the failover group assigned to the LIF. If no port exists as available then the LIF status will change to down.
  • In cases where multiple ports will fulfill the preference of the given LIF, the port with the lowest average throughput will be chosen as the LIF of preference. The average throughput for a port is measured as the sum of the average throughputs of the LIFs assigned to the given port.
  • In this way when a port fails, the LIFs of that port have the opportunity to fail in a more balanced way across multiple ports which may be available to the given LIF.
  • To enable this, the process which manages failover policies and failover groups may collect and maintain the Leaf characteristic for each port within each failover group. The process which manages failover policies and failover groups will also need access to the average throughput of LIFs in order to calculate the throughput for a given port. FIG. 10 illustrates this process.
  • Potential for Further Enhancements
  • New failover conditions
      • Port exceeds load exceeds maximum load threshold AND other port available which would not exceed maximum load threshold if LIF migrated to it
        • Load measured by LIF throughput avg over some duration
    Policy-Based Failover Groups and Dynamic Failover and LIF Migration
  • If a port hosting one or more logical interfaces (LIFs) experiences outage conditions, the LIF(s) on that port will also experience an outage.
  • Failover groups and failover policies are currently implemented in NetApp®'s Clustered Data OnTap® (cDOT) to provide additional LIF resiliency during outage conditions.
  • Currently in cDOT, the failover policies are: nextavail, priority, disabled.
      • Nextavail—LIF fails over to the next available port, preferring a port on the current node
      • Priority—LIF fails over to the next available port as specified in the user-defined failover group
      • Disabled—a LIF does not fail over
        Failover groups are lists of ports. A single failover group can be assigned to a LIF at any given time.
  • Failover occurs in the following scenarios:
      • Power failure
      • Automatic revert is enabled on a LIF and that LIF's home port reverts to the administrative up status
      • The port hosting a LIF changes to the administrative down status
      • Node reboot or node out of quorum
  • In a fabric enabled network, the a fabric controller (IFC) has better insight into network traffic patterns than the end points. As a result, the fabric can better inform an end point as to which physical port should be used for a particular set of traffic. In a failover scenario, the IFC can tell a NetApp® cluster end point which node and port should be used to provide the best overall balance, security, or performance within the fabric.
  • The technology will enable this by establishing fabric policies. Fabric policies will contain ports and characteristics/thresholds. Ports in a cluster may belong to multiple policy groups. LIFs can be added to fabric policies rather than specific ports. The IFC will negotiate with the cluster the port to which a LIF will belong at LIF creation time. The IFC will negotiate and update the failover port priority for a given LIF with the cluster. The IFC can request that a cluster migrate a LIF from one port within a given policy to another port within a given policy given that an IFC can “know” a NetApp fabric policy, can create a relationship between the ports of a given end point group and the ports of a given NetApp fabric policy, “knows” about the existence of NetApp LIFs, and can knows about the relationship between a NetApp fabric policy and the LIFs controlled by that policy.
  • Traditional LIFs, failover groups, and failover policies can still exist. LIFs which belong to fabric policies cannot have traditional failover groups or failover policies
  • Concerns: the fabric may choose a node and port which creates and indirect storage access path. An indirect storage access path is defined as any path in which storage data access requests must traverse a cluster LIF.
  • Those skilled in the art will appreciate that logic illustrated in flow diagrams and described above may be altered in various ways. For example, the order of the logic may be rearranged, substeps may be performed in parallel, illustrated logic may be omitted, other logic may be included, etc.
  • Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims. Accordingly, the invention is not limited except as by the appended claims.

Claims (41)

I/we claim:
1. A method performed by a data storage system, comprising:
receiving a profile, wherein the received profile indicates a condition and an action corresponding to the condition;
monitoring events emitted' by devices of the data storage system;
determining based on the monitored events that a device of the storage system matches the indicated condition; and
performing the action corresponding to the indicated condition, wherein the action includes managing data stored by the data storage system.
2. The method of claim 1, further comprising:
receiving multiple profiles;
identifying two or more profiles whose conditions are matched by the monitored events; and
selecting one of the profiles whose action is to be performed.
3. The method of claim 1, wherein the condition specifies one or more attributes of the storage system.
4. The method of claim 3, wherein the specified one or more attributes is one or more of capacity, performance, or deployment time.
5. The method of claim 1, wherein in an event the action is to add a device, the method further comprising:
identifying a device from an inventory of available devices;
assigning the identified device to a data storage server; and
configuring the assigned device to operate with the data storage server.
6. The method of claim 5, further comprising:
in an event the identified device is operating with a different data storage server, transferring, prior to the configuring, data stored at the device to a different device configured to operate with the different data storage server.
7. The method of claim 1, wherein in an event the action is to decommission a device, the method further comprising:
causing data stored at the device to be transferred to other devices of a data storage server; and
disabling additional data from being stored at the device to be decommissioned.
8. The method of claim 7, further comprising deleting data stored at the device to be decommissioned.
9. The method of claim 7, further comprising placing the decommissioned device into an inventory of available devices.
10. The method of claim 7, further comprising configuring the device to be no longer assigned to a data storage server with which the device is presently associated.
11. A system, comprising:
a processor and memory;
a component configured to receive a profile, wherein the received profile indicates a condition and an action corresponding to the condition;
a monitoring component configured to monitor events emitted by devices of the data storage system, determine, based on the monitored events, that a device of the storage system matches the indicated condition; and perform the action corresponding to the indicated condition, wherein the action includes managing data stored by the data storage system.
12. The system of claim 11, further comprising:
an inventory of available devices, wherein when the monitoring component performs an action to add a device, the monitoring system selects a device indicated by the inventory as available.
13. The system of claim 1, wherein the condition specifies one or more attributes of the storage system.
14. The system of claim 13, wherein the specified one or more attributes is one or more of capacity, performance, or deployment time.
15. The system of claim 11, further comprising:
a component configured, in an event the action is to add a device, to identify a device from an inventory of available devices, assign the identified device to a data storage server, and configure the assigned device to operate with the data storage server.
16. The system of claim 15, further comprising:
a component configured to transfer, prior to configuring the assigned device, data stored at the device to a different device configured to operate with the different data storage server, in an event the identified device is operating with a different data storage server.
17. The system of claim 16, wherein in an event the action is to decommission a device, the system further comprising:
a component configured to cause data stored at the device to be transferred to other devices of a data storage server, and to disable additional data from being stored at the device to be decommissioned.
18. The system of claim 17, further comprising a component configured to delete data stored at the device to be decommissioned.
19. The system of claim 17, further comprising a component configured to place the decommissioned device into an inventory of available devices.
20. The system of claim 17, further comprising a component configured to remove the device from assignment to a data storage server with which the device is presently associated.
21. A computer-readable storage medium storing computer-executable instructions, comprising:
instructions for receiving a profile, wherein the received profile indicates a condition and an action corresponding to the condition;
instructions for monitoring events emitted by devices of the data storage system;
instructions for determining based on the monitored events that a device of the storage system matches the indicated condition; and
instructions for performing the action corresponding to the indicated condition, wherein the action includes managing data stored by the data storage system.
22. A method performed by a computing system, comprising:
providing an application program interface;
receiving, via the application program interface, from an application, a command to query a data storage attribute associated with a virtual data storage component;
querying the associated virtual data storage component; and
returning to the application a value for the data storage attribute.
23. The method of claim 22, wherein the data storage component is one or more of a virtual data storage volume, a virtual server, or a virtual networking component.
24. The method of claim 22, wherein the data storage attribute relates to network traffic.
25. The method of claim 22, wherein the data storage attribute relates to data storage commands.
26. The method of claim 22, further comprising identifying a hot spot, wherein the hot spot identifies a source or target of a large volume of data.
27. The method of claim 26, wherein the hot spot is at least one of an application, an intermediary component, or a virtual or physical storage volume.
28. The method of claim 26, further comprising, based on the identified hot spot, recommending a storage configuration.
29. The method of claim 22, further comprising mirroring storage operations transiting a virtual data storage component at a workload analyzer.
30. The method of claim 29, wherein the workload analyzer is a virtual data storage component.
31. A system, comprising:
a processor and memory;
an application program interface component;
one or more virtual data storage components;
one or more physical data storage components;
a workload analyzer component configured to, under control of the processor, mirror data commands transmitted to one or more virtual or physical data storage components, and analyze workload at the one or more virtual or physical data storage components;
32. The system of claim 31, further comprising a management console application.
33. The system of claim 32, wherein the management console application is configured to identify one or more hot spots based on output from the workload analyzer.
34. The system of claim 33, wherein the management console recommends a storage configuration to satisfy a service level objective.
35. The system of claim 31, wherein the workload analyzer is a virtual data storage component.
36. The system of claim 31, wherein the workload analyzer reviews network traffic between a specified virtual or physical computing device and the one or more virtual or physical data storage components.
37. The system of claim 32, wherein the workload analyzer recommends a storage configuration to satisfy a service level objective.
38. The system of claim 37, wherein the workload analyzer recommends addition of a cache, volume, or storage server.
39. A computer-readable storage medium storing instructions, comprising:
instructions for providing an application program interface;
instructions for receiving, via the application program interface, from an application, a command to query a data storage attribute associated with a virtual data storage component;
instructions for querying the associated virtual data storage component; and
instructions for returning to the application a value for the data storage attribute.
40. The computer-readable storage medium of claim 39, further comprising instructions for mirroring storage operations transiting a virtual data storage component at a workload analyzer.
41. The computer-readable storage medium of claim 39, further comprising instructions for identifying a hot spot, wherein the hot spot identifies a source or target of a large volume of data.
US14/489,077 2013-09-17 2014-09-17 Fabric attached storage Abandoned US20150081893A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
PCT/US2014/056156 WO2015042185A1 (en) 2013-09-17 2014-09-17 Fabric attached storage
US14/489,077 US20150081893A1 (en) 2013-09-17 2014-09-17 Fabric attached storage
US16/577,201 US10895984B2 (en) 2013-09-17 2019-09-20 Fabric attached storage

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US201361878972P 2013-09-17 2013-09-17
US201462018497P 2014-06-27 2014-06-27
US201462018523P 2014-06-27 2014-06-27
US14/489,077 US20150081893A1 (en) 2013-09-17 2014-09-17 Fabric attached storage

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/577,201 Continuation US10895984B2 (en) 2013-09-17 2019-09-20 Fabric attached storage

Publications (1)

Publication Number Publication Date
US20150081893A1 true US20150081893A1 (en) 2015-03-19

Family

ID=52669027

Family Applications (4)

Application Number Title Priority Date Filing Date
US14/489,253 Active 2035-04-12 US9864517B2 (en) 2013-09-17 2014-09-17 Actively responding to data storage traffic
US14/489,077 Abandoned US20150081893A1 (en) 2013-09-17 2014-09-17 Fabric attached storage
US14/489,212 Active US9684450B2 (en) 2013-09-17 2014-09-17 Profile-based lifecycle management for data storage servers
US16/577,201 Active US10895984B2 (en) 2013-09-17 2019-09-20 Fabric attached storage

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US14/489,253 Active 2035-04-12 US9864517B2 (en) 2013-09-17 2014-09-17 Actively responding to data storage traffic

Family Applications After (2)

Application Number Title Priority Date Filing Date
US14/489,212 Active US9684450B2 (en) 2013-09-17 2014-09-17 Profile-based lifecycle management for data storage servers
US16/577,201 Active US10895984B2 (en) 2013-09-17 2019-09-20 Fabric attached storage

Country Status (2)

Country Link
US (4) US9864517B2 (en)
WO (1) WO2015042185A1 (en)

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105068767A (en) * 2015-08-19 2015-11-18 山东超越数控电子有限公司 Full virtualization storage method based on consistency hash algorithm
US20150381439A1 (en) * 2014-06-25 2015-12-31 Unisys Corporation Virtual tape library (vtl) monitoring system
US20160065423A1 (en) * 2014-09-03 2016-03-03 Microsoft Corporation Collecting and Analyzing Selected Network Traffic
US20160110240A1 (en) * 2014-10-17 2016-04-21 Netapp Inc. Forensics collection for failed storage controllers
US20170093668A1 (en) * 2015-09-25 2017-03-30 International Business Machines Corporation Data traffic monitoring tool
US20170115878A1 (en) * 2015-10-23 2017-04-27 Pure Storage, Inc. Proactively tuning a storage array
US9684450B2 (en) 2013-09-17 2017-06-20 Netapp, Inc. Profile-based lifecycle management for data storage servers
US9798474B2 (en) 2015-09-25 2017-10-24 International Business Machines Corporation Software-defined storage system monitoring tool
US20180007134A1 (en) * 2016-06-30 2018-01-04 Intel Corporation Fabric encapsulated resilient storage
US9954751B2 (en) 2015-05-29 2018-04-24 Microsoft Technology Licensing, Llc Measuring performance of a network using mirrored probe packets
US9992276B2 (en) 2015-09-25 2018-06-05 International Business Machines Corporation Self-expanding software defined computing cluster
US10516583B1 (en) * 2017-03-28 2019-12-24 Veritas Technologies Llc Systems and methods for managing quality of service
US20200097060A1 (en) * 2018-09-26 2020-03-26 Facebook, Inc. Power loss siren
US10728288B2 (en) 2017-11-21 2020-07-28 Juniper Networks, Inc. Policy-driven workload launching based on software defined networking encryption policies
US10742690B2 (en) 2017-11-21 2020-08-11 Juniper Networks, Inc. Scalable policy management for virtual networks
US10742557B1 (en) * 2018-06-29 2020-08-11 Juniper Networks, Inc. Extending scalable policy management to supporting network devices
US10778724B1 (en) 2018-06-29 2020-09-15 Juniper Networks, Inc. Scalable port range management for security policies
US10929424B1 (en) * 2016-08-31 2021-02-23 Veritas Technologies Llc Cloud replication based on adaptive quality of service
US11146634B2 (en) * 2019-04-25 2021-10-12 International Business Machines Corporation Storage pool isolation
US11216309B2 (en) 2019-06-18 2022-01-04 Juniper Networks, Inc. Using multidimensional metadata tag sets to determine resource allocation in a distributed computing environment
US20220129173A1 (en) * 2020-10-22 2022-04-28 EMC IP Holding Company LLC Storage array resource control
US11700236B2 (en) 2020-02-27 2023-07-11 Juniper Networks, Inc. Packet steering to a host-based firewall in virtualized environments

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9612746B1 (en) * 2015-06-26 2017-04-04 EMC IP Holding Company LLC Allocation method for meeting system performance and application service level objective (SLO)
US11256716B2 (en) * 2019-06-19 2022-02-22 International Business Machines Corporation Verifying mirroring of source data units to target data units
CN111752713B (en) * 2020-06-28 2022-08-05 浪潮电子信息产业股份有限公司 Method, device and equipment for balancing load of model parallel training task and storage medium
US11294782B1 (en) * 2021-03-22 2022-04-05 EMC IP Holding Company LLC Failover affinity rule modification based on node health information
US11934893B2 (en) 2021-07-06 2024-03-19 Pure Storage, Inc. Storage system that drives an orchestrator based on events in the storage system
US11816356B2 (en) 2021-07-06 2023-11-14 Pure Storage, Inc. Container orchestrator-aware storage system

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040243699A1 (en) * 2003-05-29 2004-12-02 Mike Koclanes Policy based management of storage resources
US20060002705A1 (en) * 2004-06-30 2006-01-05 Linda Cline Decentralizing network management system tasks
US20100077078A1 (en) * 2007-06-22 2010-03-25 Fortisphere, Inc. Network traffic analysis using a dynamically updating ontological network description
US20100114889A1 (en) * 2008-10-30 2010-05-06 Netapp, Inc. Remote volume access and migration via a clustered server namespace
US20110134894A1 (en) * 2009-12-03 2011-06-09 Stacey Robert J Inverse multiplexing over 802.11 wireless interfaces
US20120054763A1 (en) * 2010-08-24 2012-03-01 Novell, Inc. System and method for structuring self-provisioning workloads deployed in virtualized data centers
US20120079097A1 (en) * 2010-09-29 2012-03-29 International Business Machines Corporation Proactive identification of hotspots in a cloud computing environment
US20130064096A1 (en) * 2011-03-08 2013-03-14 Riverbed Technology, Inc. Multilevel Monitoring System Architecture
US20130144594A1 (en) * 2011-12-06 2013-06-06 At&T Intellectual Property I, L.P. System and method for collaborative language translation

Family Cites Families (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7430164B2 (en) * 1998-05-04 2008-09-30 Hewlett-Packard Development Company, L.P. Path recovery on failure in load balancing switch protocols
US6975219B2 (en) 2001-03-01 2005-12-13 Fisher-Rosemount Systems, Inc. Enhanced hart device alerts in a process control system
US6557035B1 (en) * 1999-03-30 2003-04-29 International Business Machines Corporation Rules-based method of and system for optimizing server hardware capacity and performance
US6950871B1 (en) 2000-06-29 2005-09-27 Hitachi, Ltd. Computer system having a storage area network and method of handling data in the computer system
US20040054656A1 (en) 2001-08-31 2004-03-18 Arkivio, Inc. Techniques for balancing capacity utilization in a storage environment
US6920494B2 (en) * 2001-10-05 2005-07-19 International Business Machines Corporation Storage area network methods and apparatus with virtual SAN recognition
US7194538B1 (en) 2002-06-04 2007-03-20 Veritas Operating Corporation Storage area network (SAN) management system for discovering SAN components using a SAN management server
US7685269B1 (en) 2002-12-20 2010-03-23 Symantec Operating Corporation Service-level monitoring for storage applications
US20060029097A1 (en) 2004-06-07 2006-02-09 Mcgee Michael S Dynamic allocation and configuration of a computer system's network resources
JP2006301820A (en) 2005-04-19 2006-11-02 Hitachi Ltd Storage system and data migration method for storage system
JP4527642B2 (en) 2005-09-29 2010-08-18 富士通株式会社 Network failure diagnosis apparatus, network failure diagnosis method, and network failure diagnosis program
US9189640B2 (en) 2005-10-31 2015-11-17 Hewlett-Packard Development Company, L.P. Methods and apparatus for re-provisioning a server of a data center
GB2432992B (en) 2005-11-18 2008-09-10 Cramer Systems Ltd Network planning
US8244827B2 (en) 2007-12-19 2012-08-14 International Business Machines Corporation Transferring a logical partition (‘LPAR’) between two server computing devices based on LPAR customer requirements
JP2009223442A (en) * 2008-03-13 2009-10-01 Hitachi Ltd Storage system
US9489647B2 (en) * 2008-06-19 2016-11-08 Csc Agility Platform, Inc. System and method for a cloud computing abstraction with self-service portal for publishing resources
US8028196B2 (en) 2008-11-18 2011-09-27 Gtech Corporation Predictive diagnostics and fault management
US8138940B2 (en) * 2009-05-01 2012-03-20 Cathy Horton Municipal operations monitoring and alert system
US8224993B1 (en) 2009-12-07 2012-07-17 Amazon Technologies, Inc. Managing power consumption in a data center
WO2012047746A2 (en) * 2010-10-04 2012-04-12 Avocent System and method for monitoring and managing data center resources in real time
US8973018B2 (en) * 2011-08-23 2015-03-03 International Business Machines Corporation Configuring and relaying events from a storage controller to a host server
US8767529B2 (en) * 2011-09-12 2014-07-01 International Business Machines Corporation High availability distributed fabric protocol (DFP) switching network architecture
CN103036930B (en) 2011-09-30 2015-06-03 国际商业机器公司 Method and equipment used for managing storage devices
US9552231B2 (en) * 2012-09-27 2017-01-24 Adobe Systems Incorporated Client classification-based dynamic allocation of computing infrastructure resources
US8995277B2 (en) * 2012-10-30 2015-03-31 Telefonaktiebolaget L M Ericsson (Publ) Method for dynamic load balancing of network flows on LAG interfaces
WO2014086043A1 (en) 2012-12-07 2014-06-12 Hewlett-Packard Development Company, L.P. Network resource management
WO2014091580A1 (en) * 2012-12-12 2014-06-19 株式会社東芝 Cloud system management device, cloud system, reallocation method, and program
US20140280775A1 (en) * 2013-03-15 2014-09-18 Conrad N. Wood Network Stack and Related Techniques
EP3008861B1 (en) * 2013-06-14 2017-12-06 Microsoft Technology Licensing, LLC Fault tolerant and load balanced routing
US9864517B2 (en) 2013-09-17 2018-01-09 Netapp, Inc. Actively responding to data storage traffic

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040243699A1 (en) * 2003-05-29 2004-12-02 Mike Koclanes Policy based management of storage resources
US20060002705A1 (en) * 2004-06-30 2006-01-05 Linda Cline Decentralizing network management system tasks
US20100077078A1 (en) * 2007-06-22 2010-03-25 Fortisphere, Inc. Network traffic analysis using a dynamically updating ontological network description
US20100114889A1 (en) * 2008-10-30 2010-05-06 Netapp, Inc. Remote volume access and migration via a clustered server namespace
US20110134894A1 (en) * 2009-12-03 2011-06-09 Stacey Robert J Inverse multiplexing over 802.11 wireless interfaces
US20120054763A1 (en) * 2010-08-24 2012-03-01 Novell, Inc. System and method for structuring self-provisioning workloads deployed in virtualized data centers
US20120079097A1 (en) * 2010-09-29 2012-03-29 International Business Machines Corporation Proactive identification of hotspots in a cloud computing environment
US20130064096A1 (en) * 2011-03-08 2013-03-14 Riverbed Technology, Inc. Multilevel Monitoring System Architecture
US20130144594A1 (en) * 2011-12-06 2013-06-06 At&T Intellectual Property I, L.P. System and method for collaborative language translation

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Wikipedia, "In-band signaling"'; April 12 2018; https://en.wikipedia.org/wiki/In-band_signaling (Year: 2018) *

Cited By (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9864517B2 (en) 2013-09-17 2018-01-09 Netapp, Inc. Actively responding to data storage traffic
US9684450B2 (en) 2013-09-17 2017-06-20 Netapp, Inc. Profile-based lifecycle management for data storage servers
US20150381439A1 (en) * 2014-06-25 2015-12-31 Unisys Corporation Virtual tape library (vtl) monitoring system
US9942110B2 (en) * 2014-06-25 2018-04-10 Unisys Corporation Virtual tape library (VTL) monitoring system
US20160065423A1 (en) * 2014-09-03 2016-03-03 Microsoft Corporation Collecting and Analyzing Selected Network Traffic
US20160110240A1 (en) * 2014-10-17 2016-04-21 Netapp Inc. Forensics collection for failed storage controllers
US9836345B2 (en) * 2014-10-17 2017-12-05 Netapp, Inc. Forensics collection for failed storage controllers
US9954751B2 (en) 2015-05-29 2018-04-24 Microsoft Technology Licensing, Llc Measuring performance of a network using mirrored probe packets
CN105068767A (en) * 2015-08-19 2015-11-18 山东超越数控电子有限公司 Full virtualization storage method based on consistency hash algorithm
US10826785B2 (en) * 2015-09-25 2020-11-03 International Business Machines Corporation Data traffic monitoring tool
US20170093668A1 (en) * 2015-09-25 2017-03-30 International Business Machines Corporation Data traffic monitoring tool
US9798474B2 (en) 2015-09-25 2017-10-24 International Business Machines Corporation Software-defined storage system monitoring tool
US9992276B2 (en) 2015-09-25 2018-06-05 International Business Machines Corporation Self-expanding software defined computing cluster
US10637921B2 (en) 2015-09-25 2020-04-28 International Business Machines Corporation Self-expanding software defined computing cluster
US20170115878A1 (en) * 2015-10-23 2017-04-27 Pure Storage, Inc. Proactively tuning a storage array
EP3479256A4 (en) * 2016-06-30 2020-02-26 INTEL Corporation Fabric encapsulated resilient storage
CN109154882A (en) * 2016-06-30 2019-01-04 英特尔公司 The elastic storage of construction packages
US20180007134A1 (en) * 2016-06-30 2018-01-04 Intel Corporation Fabric encapsulated resilient storage
US10785295B2 (en) * 2016-06-30 2020-09-22 Intel Corporation Fabric encapsulated resilient storage
US10929424B1 (en) * 2016-08-31 2021-02-23 Veritas Technologies Llc Cloud replication based on adaptive quality of service
US10516583B1 (en) * 2017-03-28 2019-12-24 Veritas Technologies Llc Systems and methods for managing quality of service
US11323487B1 (en) 2017-11-21 2022-05-03 Juniper Networks, Inc. Scalable policy management for virtual networks
US10728288B2 (en) 2017-11-21 2020-07-28 Juniper Networks, Inc. Policy-driven workload launching based on software defined networking encryption policies
US10742690B2 (en) 2017-11-21 2020-08-11 Juniper Networks, Inc. Scalable policy management for virtual networks
US10778724B1 (en) 2018-06-29 2020-09-15 Juniper Networks, Inc. Scalable port range management for security policies
US10742557B1 (en) * 2018-06-29 2020-08-11 Juniper Networks, Inc. Extending scalable policy management to supporting network devices
US11418546B1 (en) 2018-06-29 2022-08-16 Juniper Networks, Inc. Scalable port range management for security policies
US10852803B2 (en) * 2018-09-26 2020-12-01 Facebook, Inc. Power loss siren
US20200097060A1 (en) * 2018-09-26 2020-03-26 Facebook, Inc. Power loss siren
US11334136B1 (en) 2018-09-26 2022-05-17 Meta Platforms, Inc. Power loss siren
US11146634B2 (en) * 2019-04-25 2021-10-12 International Business Machines Corporation Storage pool isolation
US11216309B2 (en) 2019-06-18 2022-01-04 Juniper Networks, Inc. Using multidimensional metadata tag sets to determine resource allocation in a distributed computing environment
US11700236B2 (en) 2020-02-27 2023-07-11 Juniper Networks, Inc. Packet steering to a host-based firewall in virtualized environments
US20220129173A1 (en) * 2020-10-22 2022-04-28 EMC IP Holding Company LLC Storage array resource control

Also Published As

Publication number Publication date
US9864517B2 (en) 2018-01-09
US20200019315A1 (en) 2020-01-16
WO2015042185A1 (en) 2015-03-26
US20150081871A1 (en) 2015-03-19
US9684450B2 (en) 2017-06-20
US10895984B2 (en) 2021-01-19
US20150081836A1 (en) 2015-03-19

Similar Documents

Publication Publication Date Title
US10895984B2 (en) Fabric attached storage
JP6199514B2 (en) Scheduling fabric distributed resources
US8595364B2 (en) System and method for automatic storage load balancing in virtual server environments
US9355036B2 (en) System and method for operating a system to cache a networked file system utilizing tiered storage and customizable eviction policies based on priority and tiers
US9992077B2 (en) Optimizing allocation of on-demand resources using performance zones
US8595346B2 (en) Collaborative management of shared resources selects corrective action based on normalized cost
US20150071123A1 (en) Integrating software defined storage and software defined networking
US20150263979A1 (en) Method and apparatus for a highly scalable, multi-cloud service deployment, orchestration and delivery
US11669360B2 (en) Seamless virtual standard switch to virtual distributed switch migration for hyper-converged infrastructure
US20150263906A1 (en) Method and apparatus for ensuring application and network service performance in an automated manner
US9998322B2 (en) Method and system for balancing storage data traffic in converged networks
US20150263960A1 (en) Method and apparatus for cloud bursting and cloud balancing of instances across clouds
US20170168866A1 (en) Method and apparatus for managing it infrastructure in cloud environments
US11500678B2 (en) Virtual fibre channel port migration
WO2016151584A2 (en) Distributed large scale storage system
AU2015202178A1 (en) Fabric distributed resource scheduling

Legal Events

Date Code Title Description
AS Assignment

Owner name: NETAPP, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CHADWELL, CRAIG;LABIAGA, RICARDO;KENCHAMMANA-HOSEKOTE, DEEPAK;AND OTHERS;SIGNING DATES FROM 20160712 TO 20160731;REEL/FRAME:040001/0084

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION