US20210209057A1 - File system quota versioning - Google Patents
File system quota versioning Download PDFInfo
- Publication number
- US20210209057A1 US20210209057A1 US17/210,239 US202117210239A US2021209057A1 US 20210209057 A1 US20210209057 A1 US 20210209057A1 US 202117210239 A US202117210239 A US 202117210239A US 2021209057 A1 US2021209057 A1 US 2021209057A1
- Authority
- US
- United States
- Prior art keywords
- quota
- attribute
- directory
- symbol
- capability
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 claims abstract description 32
- 230000004044 response Effects 0.000 claims abstract description 10
- 230000000977 initiatory effect Effects 0.000 claims description 2
- 230000015654 memory Effects 0.000 description 16
- 230000008569 process Effects 0.000 description 8
- 230000003287 optical effect Effects 0.000 description 7
- 238000005192 partition Methods 0.000 description 5
- 238000010586 diagram Methods 0.000 description 4
- VEMKTZHHVJILDY-UHFFFAOYSA-N resmethrin Chemical compound CC1(C)C(C=C(C)C)C1C(=O)OCC1=COC(CC=2C=CC=CC=2)=C1 VEMKTZHHVJILDY-UHFFFAOYSA-N 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 238000004422 calculation algorithm Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000004891 communication Methods 0.000 description 2
- 238000004590 computer program Methods 0.000 description 2
- 238000013500 data storage Methods 0.000 description 2
- 230000001934 delay Effects 0.000 description 2
- 238000013073 enabling process Methods 0.000 description 2
- 230000005055 memory storage Effects 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 101100226364 Arabidopsis thaliana EXT1 gene Proteins 0.000 description 1
- 101100226366 Arabidopsis thaliana EXT3 gene Proteins 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000007274 generation of a signal involved in cell-cell signaling Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 208000034420 multiple type III exostoses Diseases 0.000 description 1
- 230000000644 propagated effect Effects 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/11—File system administration, e.g. details of archiving or snapshots
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/11—File system administration, e.g. details of archiving or snapshots
- G06F16/122—File system administration, e.g. details of archiving or snapshots using management policies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/18—File system types
- G06F16/182—Distributed file systems
Definitions
- This disclosure relates to computer systems, and more particularly, to file system quotas.
- a file system quota (also referred to as a “disk quota” or “storage quota”) is a limit set by a system administrator that restricts certain aspects of file system usage on modern operating systems.
- a first type of quota known as a usage quota or block quota, limits the amount of storage space that can be used.
- a second type of quota known as a file quota or inode quota, limits the number of files and directories that can be created.
- File system quotas may be implemented on a per-directory basis.
- FIG. 1 depicts an illustrative computer system architecture, in accordance with an embodiment of the present disclosure.
- FIG. 2 depicts a flow diagram of one embodiment of a method by which a computer system handles disabling and enabling of file system quotas.
- FIG. 3 depicts a block diagram of an illustrative computer system operating in accordance with embodiments of the disclosure.
- a file system may be accessed simultaneously by a plurality of users. Similarly, a plurality of users may simultaneously access a quota capability of the file system. Such access may include enabling and disabling of the quota capability.
- Enabling a quota capability may involve establishing quota attributes for directories of the file system. Quota attributes can specify a maximum amount of storage space that is permitted to be used for a directory, a maximum number of files that is permitted to be included in a directory. Similarly, disabling the quota capability may involve removing the quota attributes from every directory in the file system. Such removal can take time, particularly in distributed file systems where network latency may introduce delays. Consequently, if a first user submits a first command to disable the quota capability, and a second user subsequently submits a second command to enable the quota capability before the attribute removal process of the disabling has completed, there may be a collision between the establishment of and removal of a quota attribute.
- an attribute may be removed by the first command after the attribute has been set by the second command. Accordingly, in conventional systems, a user or system administrator should wait until disabling has completed before the quota capability can be safely re-enabled.
- a processing device receives a first command to disable a quota capability of a file system, where the quota capability associates quota attributes with directories of the file system.
- the processing device In response to the first command, the processing device initiates execution of one or more instructions to delete a first association of a quota attribute with a directory, where the quota attribute has an attribute name, and where the first association assigns a first value of the quota attribute to a first string, and where the first string comprises a combination (e.g., a concatenation) of the attribute name and a first symbol.
- the processing device Prior to completion of the execution of the one or more instructions, receives one or more commands to enable the quota capability and assign a second value of the quota attribute to the directory.
- the processing device In response to the one or more commands, the processing device generates a second association of the quota attribute with the directory, where the second association assigns a second value of the quota attribute to a second string, and where the second string comprises a combination (e.g., a concatenation) of the attribute name and a second symbol.
- the first symbol comprises one or more characters representing an integer N
- the second symbol comprises one or more characters representing an integer N+1.
- the symbol may be combined with the attribute name in an alternative manner (e.g., by prepending the symbol rather than appending the symbol, by using a separator other than “.”, by concatenating without a separator, by embedding the symbol within the attribute name, etc.).
- a counter is incremented each time the quota capability is enabled, and the counter is used to generate successive versions of quota attributes.
- a character string corresponding to the current value of the counter is used as the symbol concatenated with the attribute name. For example, the first time the quota capability is enabled, quota attributes for a directory might be represented by the strings “ ⁇ attribute name>0.1”; the second time the quota capability is enabled the quota attributes for the directory might be represented by “ ⁇ attribute name>0.2”; the tenth time the quota capability is enabled the quota attribute for the directory might be represented by “ ⁇ attribute name>0.10”; and so on.
- disabling of the quota capability may involve removing quota attributes from every directory in the file system, which can take time, particularly in distributed file systems where network latency can introduce delays.
- the quota capability may be enabled following a disabling of the quota capability without having to wait for the disabling to complete.
- the disabling removes the existing versions of the quota attributes
- the enabling creates new versions of the quota attributes and therefore does not interfere with the removing of the existing versions. Accordingly, the disabling and enabling processes can be executed simultaneously. After the disabling and enabling processes have been completed, there will be exactly one version of each attribute/directory pair.
- the file system will be in a state that allows the versioning technique to be repeated for the next disabling and subsequent re-enabling of the quota capability. It should be noted that the versioning technique also works correctly in instances where the one or more commands to re-enable the quota capability are not submitted until after the disabling process has completed.
- the quota attributes for a directory may include a limit on the size of the directory e.g., 5.0 MB, etc.), the current size of the directory (e.g., 2.4 megabytes [MB], etc.), and the size of the directory's contribution to its parent directory.
- the attribute name for the limit is trusted.glusterfs.quota.limit-set, and the value of this attribute comprises a first 16-digit hexadecimal string representing a hard limit (e.g., a maximum that cannot be exceeded) followed by a second 16-digit hexadecimal string representing a soft limit (e.g., a limit that is less than the hard limit and that, when exceeded, results in a warning that the hard limit is close to being hit).
- a hard limit e.g., a maximum that cannot be exceeded
- a soft limit e.g., a limit that is less than the hard limit and that, when exceeded, results in a warning that the hard limit is close to being hit
- the attribute name for the current size is trusted.glusterfs.quota.size
- the value of this attribute comprises a 16-digit hexadecimal string representing the size in bytes and a 16-digit binary string representing a directory count (e.g., the number of subdirectories contained in the directory plus 1, where the plus 1 counts the directory itself in the directory count.
- the attribute name for the directory's contribution to its parent directory is trusted.glusterfs.quota. ⁇ parent dir ID>.contri, and the value of this attribute comprises a 16-digit hexadecimal string representing the contribution in bytes and a 16-digit binary string representing a directory count, as described above.
- FIG. 1 depicts an illustrative system architecture 100 for various implementations of the disclosure. It should be noted that other architectures are possible, and that the implementation of a system utilizing embodiments of the disclosure are not necessarily limited to the specific architecture depicted by FIG. 1 .
- the system architecture 100 may include a distributed file system 101 coupled to one or more client machines 102 via a network 108 .
- a distributed file system 101 is a client/server based system that allows clients to access and process data stored on storage servers as if it were on their own computer.
- the network 108 may be a public network (e.g., the Internet), a private network (e.g., a local area network (LAN) or wide area network (WAN)), or a combination thereof.
- Network 108 may include a wireless infrastructure, which may be provided by one or multiple wireless communications systems, such as a wireless fidelity (WiFi) hotspot connected with the network 108 and/or a wireless carrier system that can be implemented using various data processing equipment, communication towers, etc.
- WiFi wireless fidelity
- the distributed file system 101 may be a network attached storage file system that includes a logical volume 180 and one or more storage server machines 140 A-B, each of which may control and manage any number of storage resources 170 A-B. It should be noted that the fact that two server machines 140 and two storage resources 170 are depicted in FIG. 1 is merely illustrative; distributed file system 101 may have a fewer or greater number of storage server machines 140 , and a fewer or greater number of storage resources 170 .
- a storage server machine 140 A-B may include a network-accessible server-based functionality (e.g., storage server 143 A-B) or other data processing equipment.
- the storage server machines 140 A-B may include, but are not limited to, any data processing device, such as a desktop computer, a laptop computer, a mainframe computer, a personal digital assistant, a rack-mount server, a hand-held device or any other device configured to process data.
- the storage server machines 140 A-B of the distributed file system 101 may be grouped into one or more clusters.
- a cluster may be a group of linked storage servers 143 A-B working together closely.
- the storage resources 170 A-B may be mass storage devices, such as magnetic or optical storage based disks, solid-state drives (SSDs) or hard drives, coupled to the storage server machines 140 A-B (either directly or via the network 108 ).
- the storage resources 170 A-B may also include memory such as random access memory (RAM), Flash memory, and so forth.
- RAM random access memory
- Flash memory and so forth.
- Storage servers 143 A-B may each host a local file system that manages the storage of data on storage resources 170 A-B.
- Each of the storage resources 170 A-B may be formatted in accordance with a particular local file system (FS) 148 A-B.
- the local FS 148 A-B may create directories, partitions, logical volumes, and so forth on the storage resources 170 A-B as well as store data (e.g., files) thereon.
- Examples of local disk file systems that may be used on disk storage resources include, but are not limited to, EXT3, EXT4, XFS, NTFS, FAT16, FAT32, and so forth.
- Various flash file systems, tape file systems, optical disc file systems, memory files systems and so on may alternatively be used for other non-disk storage resources (e.g., for memory storage resources).
- Storage servers 143 A-B may each additionally include an instance of a distributed file system (FS) service 145 .
- the distributed FS service 145 interfaces with local file systems 148 A-B to store files on the storage resources 170 A-B, as well as allow retrieval of stored files to the client system 102 .
- the distributed file system service 145 instances additionally interface with one another to form the distributed file system 101 .
- the distributed file system services 145 may store data as files and may include directories, also referred to as folders, which are virtual containers within the distributed file system 101 , in which groups of computer files and possibly other directories may be kept and organized.
- the distributed file system 101 may organize data (e.g., files) in the disks 170 A-B using volumes.
- a volume may be a single accessible storage area of the distributed file system 101 that may be resident on a single partition or directory of a hardware resource 170 A-B (e.g., of a hard disk) of the file system 101 .
- a volume may be a representation of a logical location, rather than a physical location, of a storage area in the file system 101 .
- a physical hard disk-1 may have two partitions, partition-1 and partition-2.
- a volume label “C:” may be assigned to partition-1
- a volume label “D:” may be assigned to partition-2.
- Hard disk-1 is a physical disk
- “C:” and “D:” are volumes representing logical locations on physical hard disk-1.
- the volume may be a collection of multiple logical and/or physical locations.
- a volume of the distributed file system 101 may be associated with multiple storage servers and storage resources 170 A-B. Files of a volume may be stored across the storage resources 170 A-B. For example, a volume label “C:” may be assigned to a partition or portion of a first storage resource 170 A and a partition or portion of a second storage resource 170 B. As such, files of a single volume may be distributed between multiple storage resources 170 A-B that are managed by multiple storage servers 140 A-B. Thus, files of a volume may be stored across one or more storage servers. In some embodiments, the files of the volume may be distributed across multiple directories (e.g., a hierarchical path) that are associated with multiple storage servers.
- directories e.g., a hierarchical path
- distributed file system 145 may include a quota bookkeeper 146 and a quota enforcer 147 .
- the quota bookkeeper 146 may keep track of changes in the size of files, creation of new files, deletion of files, etc., and may propagate these changes up the directory hierarchy.
- the quota enforcer 147 may monitor distributed file system 145 for violations of soft or hard quotas and take appropriate action (e.g., notify the owner of a directory and/or a system administrator that the quota has been violated, etc.).
- client systems 102 may include a client file system 136 to communicate with the storage servers 143 A-B in the distributed file system 101 .
- the client system 102 may be a computing device such as a server computer, a desktop computer, a set-top box, a gaming console, a television, a portable computing device such as, and not limited to, mobile telephones, personal digital assistants (PDAs), portable media players, netbooks, laptop computers, electronic book reader, and the like.
- the client machines 102 may host one or more applications 134 .
- An application 134 may be any type of application including, but not limited to, a web application, a desktop application, a browser application, etc.
- An application 134 may request access (e.g., read, write, etc.) to the data in the distributed file system 101 .
- the application 134 may request to read or write files stored in a volume associated with storage resources 170 A-B.
- distributed file system 101 may include an admin daemon 190 (e.g., a background process, etc.) that is capable of receiving commands from a system administrator (e.g., via a shell command console window, via a graphical user interface (GUI) of an administration application, etc.).
- the commands may include creating directories, deleting files, navigating through the file system (e.g., via a change directory command), enabling and disabling a quota capability, setting values of quota attributes, and so forth.
- admin daemon 190 may include a quota versioning manager 195 that is capable of managing multiple versions of quota attributes. Some operations of quota versioning manager 195 are described in detail below with respect to FIG. 2 . It should be noted that although implementations of the present disclosure are described in the context of distributed file systems, implementations of the present disclosure may also be employed for other types of file systems (e.g., centralized file systems, etc.).
- FIG. 2 depicts a flow diagram of one embodiment of a method 200 by which a computer system handles disabling and enabling of file system quotas.
- the method is performed by processing logic that may comprise hardware (circuitry, dedicated logic, etc.), software (such as is run on a general purpose computer system or a dedicated machine), or a combination of both.
- the method is performed by the computer system 100 of FIG. 1 (e.g., by quota versioning manager 193 ), while in some other embodiments, some or all of the method might be performed by another machine. It should be noted that in some embodiments blocks depicted in FIG. 2 may be performed simultaneously or in a different order than that depicted.
- a counter V is initialized to zero, and a flag quota is initialized to the value off.
- Counter V may represent the current version of quota attributes.
- a command is received to enable a quota capability of a file system (e.g., of distributed filed system 101 of FIG. 1 , etc.). The command may be submitted by a system administrator, a user, an automated script that runs according to a schedule, etc.
- one or more commands are received to set one or more quota attributes of one or more directories of the file system. It should be noted that the one or more commands received at block 203 may be submitted by the same entity that submitted the command at block 202 , or may be received by some other entity.
- the quota capability may associate quota attributes with one or more volumes of a file system, either in addition to or instead of the directory quotas. Similarly, in some implementations, the quota capability may also associate quota attributes with individual files.
- counter V is incremented and flag quota is set to on.
- new version-V quota attributes are created by combining counter V with each attribute name (e.g., appending “.V” to the end of each quota attribute name, etc.), indicating that the quota attributes are version V.
- values of the new quota attributes are set in accordance with the command(s) received at block 203 .
- a command to disable the quota capability is subsequently received at block 207 (e.g., at some point while the quota capability is enabled, etc.).
- the command may be submitted by a system administrator, a user, an automated script, etc., and may be the same as, or different than, the entity (or entities) that submitted the enabling commands of blocks 202 and 203 .
- flag quota is set to off in response to the command.
- one or more instructions are initiated to remove the version-V quota attributes.
- a process may be spawned to execute the one or more instructions, while in some other examples a thread may be created to execute the one or more instructions.
- a flag may be toggled back and forth (e.g., the first version of an attribute name might be “ ⁇ attribute name>.0”, the second version of the attribute name might be “ ⁇ attribute name>.1”, the third version of the attribute name might be “ ⁇ attribute name>.0”, the fourth version of the attribute name might be “ ⁇ attribute name>.1”, and so on).
- the symbols used to modify the quota attribute names might be something other than numerals (e.g., “ ⁇ attribute name>.a”, “ ⁇ attribute name>.b”, etc.), whether used in a toggling fashion or in a sequential ordering.
- the naming scheme might combine attribute names with symbols in some fashion other than concatenation.
- FIG. 3 depicts an illustrative computer system within which a set of instructions, for causing the machine to perform any one or more of the methodologies discussed herein, may be executed.
- the machine may be connected (e.g., networked) to other machines in a LAN, an intranet, an extranet, or the Internet.
- the machine may operate in the capacity of a server machine in client-server network environment.
- the machine may be a personal computer (PC), a set-top box (STB), a server, a network router, switch or bridge, or any machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that machine.
- PC personal computer
- STB set-top box
- server a server
- network router switch or bridge
- the illustrative computer system 300 includes a processing system (processor) 302 , a main memory 304 (e.g., read-only memory (ROM), flash memory, dynamic random access memory (DRAM) such as synchronous DRAM (SDRAM)), a static memory 306 (e.g., flash memory, static random access memory (SRAM)), and a data storage device 316 , which communicate with each other via a bus 306 .
- processor processing system
- main memory 304 e.g., read-only memory (ROM), flash memory, dynamic random access memory (DRAM) such as synchronous DRAM (SDRAM)
- DRAM dynamic random access memory
- SDRAM synchronous DRAM
- static memory 306 e.g., flash memory, static random access memory (SRAM)
- SRAM static random access memory
- Processor 302 represents one or more general-purpose processing devices such as a microprocessor, central processing unit, or the like. More particularly, the processor 302 may be a complex instruction set computing (CISC) microprocessor, reduced instruction set computing (RISC) microprocessor, very long instruction word (VLIW) microprocessor, or a processor implementing other instruction sets or processors implementing a combination of instruction sets.
- the processor 302 may also be one or more special-purpose processing devices such as an application specific integrated circuit (ASIC), a field programmable gate array (FPGA), a digital signal processor (DSP), network processor, or the like.
- the processor 302 is configured to execute instructions 326 for performing the operations and steps discussed herein.
- the computer system 300 may further include a network interface device 322 .
- the computer system 300 also may include a video display unit 310 (e.g., a liquid crystal display (LCD) or a cathode ray tube (CRT)), an alphanumeric input device 312 (e.g., a keyboard), a cursor control device 314 (e.g., a mouse), and a signal generation device 320 (e.g., a speaker).
- a video display unit 310 e.g., a liquid crystal display (LCD) or a cathode ray tube (CRT)
- an alphanumeric input device 312 e.g., a keyboard
- a cursor control device 314 e.g., a mouse
- a signal generation device 320 e.g., a speaker
- the data storage device 316 may include a computer-readable medium 324 on which is stored one or more sets of instructions 326 (e.g., instructions corresponding to the method of FIG. 2 , etc.) embodying any one or more of the methodologies or functions described herein. Instructions 326 may also reside, completely or at least partially, within the main memory 304 and/or within the processor 302 during execution thereof by the computer system 300 , the main memory 304 and the processor 302 also constituting computer-readable media. Instructions 326 may further be transmitted or received over a network via the network interface device 322 .
- instructions 326 may also reside, completely or at least partially, within the main memory 304 and/or within the processor 302 during execution thereof by the computer system 300 , the main memory 304 and the processor 302 also constituting computer-readable media. Instructions 326 may further be transmitted or received over a network via the network interface device 322 .
- While the computer-readable storage medium 324 is shown in an illustrative embodiment to be a single medium, the term “computer-readable storage medium” should be taken to include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that store the one or more sets of instructions.
- the term “computer-readable storage medium” shall also be taken to include any medium that is capable of storing, encoding or carrying a set of instructions for execution by the machine and that cause the machine to perform any one or more of the methodologies of the present disclosure.
- the term “computer-readable storage medium” shall accordingly be taken to include, but not be limited to, solid-state memories, optical media, and magnetic media.
- Such a computer program may be stored in a computer readable storage medium, such as, but not limited to, any type of disk including floppy disks, optical disks, CD-ROMs, and magnetic-optical disks, read-only memories (ROMs), random access memories (RAMs), EPROMs, EEPROMs, magnetic or optical cards, or any type of media suitable for storing electronic instructions, each coupled to a computer system bus.
- ROMs read-only memories
- RAMs random access memories
- EPROMs EPROMs
- EEPROMs electrically erasable programmable read-only memory
- magnetic or optical cards or any type of media suitable for storing electronic instructions, each coupled to a computer system bus.
- Embodiments of the present disclosure may be provided as a computer program product, or software, that may include a machine-readable medium having stored thereon instructions, which may be used to program a computer system (or other electronic devices) to perform a process according to the present disclosure.
- a machine-readable medium includes any mechanism for storing or transmitting information in a form readable by a machine (e.g., a computer).
- a machine-readable (e.g., computer-readable) medium includes a machine (e.g., a computer) readable storage medium (e.g., read only memory (“ROM”), random access memory (“RAM”), magnetic disk storage media, optical storage media, flash memory devices, etc.), a machine (e.g., computer) readable transmission medium (electrical, optical, acoustical or other form of propagated signals (e.g., carrier waves, infrared signals, digital signals, etc.)), etc.
Abstract
Description
- This application is a continuation of U.S. patent application Ser. No. 15/056,772, filed Feb. 29, 2016, the entire contents of which are hereby incorporated by reference.
- This disclosure relates to computer systems, and more particularly, to file system quotas.
- A file system quota (also referred to as a “disk quota” or “storage quota”) is a limit set by a system administrator that restricts certain aspects of file system usage on modern operating systems. A first type of quota, known as a usage quota or block quota, limits the amount of storage space that can be used. A second type of quota, known as a file quota or inode quota, limits the number of files and directories that can be created. File system quotas may be implemented on a per-directory basis.
- The present disclosure is illustrated by way of example, and not by way of limitation, and can be more fully understood with reference to the following detailed description when considered in connection with the figures in which:
-
FIG. 1 depicts an illustrative computer system architecture, in accordance with an embodiment of the present disclosure. -
FIG. 2 depicts a flow diagram of one embodiment of a method by which a computer system handles disabling and enabling of file system quotas. -
FIG. 3 depicts a block diagram of an illustrative computer system operating in accordance with embodiments of the disclosure. - In multi-user computer systems, a file system may be accessed simultaneously by a plurality of users. Similarly, a plurality of users may simultaneously access a quota capability of the file system. Such access may include enabling and disabling of the quota capability.
- Enabling a quota capability may involve establishing quota attributes for directories of the file system. Quota attributes can specify a maximum amount of storage space that is permitted to be used for a directory, a maximum number of files that is permitted to be included in a directory. Similarly, disabling the quota capability may involve removing the quota attributes from every directory in the file system. Such removal can take time, particularly in distributed file systems where network latency may introduce delays. Consequently, if a first user submits a first command to disable the quota capability, and a second user subsequently submits a second command to enable the quota capability before the attribute removal process of the disabling has completed, there may be a collision between the establishment of and removal of a quota attribute. For example, even though the second command to enable the quota capability is submitted after the first command to disable the quota capability, an attribute may be removed by the first command after the attribute has been set by the second command. Accordingly, in conventional systems, a user or system administrator should wait until disabling has completed before the quota capability can be safely re-enabled.
- Aspects of the present disclosure address the above and other deficiencies of the conventional systems. Described herein is a system and method for handling the disabling and enabling of a file system's quota capability that do not suffer from the above problem. In accordance with one embodiment, a processing device receives a first command to disable a quota capability of a file system, where the quota capability associates quota attributes with directories of the file system. In response to the first command, the processing device initiates execution of one or more instructions to delete a first association of a quota attribute with a directory, where the quota attribute has an attribute name, and where the first association assigns a first value of the quota attribute to a first string, and where the first string comprises a combination (e.g., a concatenation) of the attribute name and a first symbol. Prior to completion of the execution of the one or more instructions, the processing device receives one or more commands to enable the quota capability and assign a second value of the quota attribute to the directory. In response to the one or more commands, the processing device generates a second association of the quota attribute with the directory, where the second association assigns a second value of the quota attribute to a second string, and where the second string comprises a combination (e.g., a concatenation) of the attribute name and a second symbol.
- In one example, the first symbol comprises one or more characters representing an integer N, and the second symbol comprises one or more characters representing an integer N+1. For example, the first association of the quota attribute with a directory might be represented by the string “<attribute name>0.1=<value1>”, where <attribute name> denotes the name of the quota attribute (e.g., not the literal string “<attribute name>”) and <value1> denotes a first value assigned to the quota attribute for the particular directory (e.g., not the literal string “<value1>”). Similarly, the second association of the quota attribute with the directory might be represented by the string “<attribute name>0.2=<value2>”, where <value2> denotes a second value assigned to the quota attribute for the particular directory (e.g., not the literal string “<value2>”). It should be noted that in some implementations, the symbol may be combined with the attribute name in an alternative manner (e.g., by prepending the symbol rather than appending the symbol, by using a separator other than “.”, by concatenating without a separator, by embedding the symbol within the attribute name, etc.).
- In one embodiment, a counter is incremented each time the quota capability is enabled, and the counter is used to generate successive versions of quota attributes. In some implementations, a character string corresponding to the current value of the counter is used as the symbol concatenated with the attribute name. For example, the first time the quota capability is enabled, quota attributes for a directory might be represented by the strings “<attribute name>0.1”; the second time the quota capability is enabled the quota attributes for the directory might be represented by “<attribute name>0.2”; the tenth time the quota capability is enabled the quota attribute for the directory might be represented by “<attribute name>0.10”; and so on.
- As noted above, disabling of the quota capability may involve removing quota attributes from every directory in the file system, which can take time, particularly in distributed file systems where network latency can introduce delays. By employing versioning of the quota attributes, the quota capability may be enabled following a disabling of the quota capability without having to wait for the disabling to complete. In particular, while the disabling removes the existing versions of the quota attributes, the enabling creates new versions of the quota attributes and therefore does not interfere with the removing of the existing versions. Accordingly, the disabling and enabling processes can be executed simultaneously. After the disabling and enabling processes have been completed, there will be exactly one version of each attribute/directory pair. Consequently, the file system will be in a state that allows the versioning technique to be repeated for the next disabling and subsequent re-enabling of the quota capability. It should be noted that the versioning technique also works correctly in instances where the one or more commands to re-enable the quota capability are not submitted until after the disabling process has completed.
- In one embodiment, the quota attributes for a directory may include a limit on the size of the directory e.g., 5.0 MB, etc.), the current size of the directory (e.g., 2.4 megabytes [MB], etc.), and the size of the directory's contribution to its parent directory. In one example, the attribute name for the limit is trusted.glusterfs.quota.limit-set, and the value of this attribute comprises a first 16-digit hexadecimal string representing a hard limit (e.g., a maximum that cannot be exceeded) followed by a second 16-digit hexadecimal string representing a soft limit (e.g., a limit that is less than the hard limit and that, when exceeded, results in a warning that the hard limit is close to being hit). In one example, the attribute name for the current size is trusted.glusterfs.quota.size, and the value of this attribute comprises a 16-digit hexadecimal string representing the size in bytes and a 16-digit binary string representing a directory count (e.g., the number of subdirectories contained in the
directory plus 1, where the plus 1 counts the directory itself in the directory count. In one example, the attribute name for the directory's contribution to its parent directory is trusted.glusterfs.quota.<parent dir ID>.contri, and the value of this attribute comprises a 16-digit hexadecimal string representing the contribution in bytes and a 16-digit binary string representing a directory count, as described above. -
FIG. 1 depicts anillustrative system architecture 100 for various implementations of the disclosure. It should be noted that other architectures are possible, and that the implementation of a system utilizing embodiments of the disclosure are not necessarily limited to the specific architecture depicted byFIG. 1 . - The
system architecture 100 may include adistributed file system 101 coupled to one ormore client machines 102 via anetwork 108. Adistributed file system 101 is a client/server based system that allows clients to access and process data stored on storage servers as if it were on their own computer. Thenetwork 108 may be a public network (e.g., the Internet), a private network (e.g., a local area network (LAN) or wide area network (WAN)), or a combination thereof. Network 108 may include a wireless infrastructure, which may be provided by one or multiple wireless communications systems, such as a wireless fidelity (WiFi) hotspot connected with thenetwork 108 and/or a wireless carrier system that can be implemented using various data processing equipment, communication towers, etc. - The
distributed file system 101 may be a network attached storage file system that includes alogical volume 180 and one or morestorage server machines 140A-B, each of which may control and manage any number ofstorage resources 170A-B. It should be noted that the fact that two server machines 140 and two storage resources 170 are depicted inFIG. 1 is merely illustrative;distributed file system 101 may have a fewer or greater number of storage server machines 140, and a fewer or greater number of storage resources 170. - A
storage server machine 140A-B may include a network-accessible server-based functionality (e.g.,storage server 143A-B) or other data processing equipment. Thestorage server machines 140A-B may include, but are not limited to, any data processing device, such as a desktop computer, a laptop computer, a mainframe computer, a personal digital assistant, a rack-mount server, a hand-held device or any other device configured to process data. Thestorage server machines 140A-B of thedistributed file system 101 may be grouped into one or more clusters. A cluster may be a group of linkedstorage servers 143A-B working together closely. - The
storage resources 170A-B may be mass storage devices, such as magnetic or optical storage based disks, solid-state drives (SSDs) or hard drives, coupled to thestorage server machines 140A-B (either directly or via the network 108). Thestorage resources 170A-B may also include memory such as random access memory (RAM), Flash memory, and so forth. For convenience, some embodiments provided herein may be described with reference to disks or other mass storage devices. However, it should be understood that such embodiments may also apply to memory storage resources. -
Storage servers 143A-B may each host a local file system that manages the storage of data onstorage resources 170A-B. Each of thestorage resources 170A-B may be formatted in accordance with a particular local file system (FS) 148A-B. Thelocal FS 148A-B may create directories, partitions, logical volumes, and so forth on thestorage resources 170A-B as well as store data (e.g., files) thereon. Examples of local disk file systems that may be used on disk storage resources include, but are not limited to, EXT3, EXT4, XFS, NTFS, FAT16, FAT32, and so forth. Various flash file systems, tape file systems, optical disc file systems, memory files systems and so on may alternatively be used for other non-disk storage resources (e.g., for memory storage resources). -
Storage servers 143A-B may each additionally include an instance of a distributed file system (FS)service 145. The distributedFS service 145 interfaces withlocal file systems 148A-B to store files on thestorage resources 170A-B, as well as allow retrieval of stored files to theclient system 102. The distributedfile system service 145 instances additionally interface with one another to form the distributedfile system 101. - The distributed
file system services 145, and thus the distributedfile system 101, may store data as files and may include directories, also referred to as folders, which are virtual containers within the distributedfile system 101, in which groups of computer files and possibly other directories may be kept and organized. The distributedfile system 101 may organize data (e.g., files) in thedisks 170A-B using volumes. A volume may be a single accessible storage area of the distributedfile system 101 that may be resident on a single partition or directory of ahardware resource 170A-B (e.g., of a hard disk) of thefile system 101. A volume may be a representation of a logical location, rather than a physical location, of a storage area in thefile system 101. For example, a physical hard disk-1 may have two partitions, partition-1 and partition-2. A volume label “C:” may be assigned to partition-1, and a volume label “D:” may be assigned to partition-2. Hard disk-1 is a physical disk, and “C:” and “D:” are volumes representing logical locations on physical hard disk-1. Additionally, the volume may be a collection of multiple logical and/or physical locations. - In some embodiments, a volume of the distributed
file system 101 may be associated with multiple storage servers andstorage resources 170A-B. Files of a volume may be stored across thestorage resources 170A-B. For example, a volume label “C:” may be assigned to a partition or portion of afirst storage resource 170A and a partition or portion of asecond storage resource 170B. As such, files of a single volume may be distributed betweenmultiple storage resources 170A-B that are managed bymultiple storage servers 140A-B. Thus, files of a volume may be stored across one or more storage servers. In some embodiments, the files of the volume may be distributed across multiple directories (e.g., a hierarchical path) that are associated with multiple storage servers. - In some embodiments, distributed
file system 145 may include aquota bookkeeper 146 and aquota enforcer 147. Thequota bookkeeper 146 may keep track of changes in the size of files, creation of new files, deletion of files, etc., and may propagate these changes up the directory hierarchy. Thequota enforcer 147 may monitor distributedfile system 145 for violations of soft or hard quotas and take appropriate action (e.g., notify the owner of a directory and/or a system administrator that the quota has been violated, etc.). - Any number of
client systems 102 may include aclient file system 136 to communicate with thestorage servers 143A-B in the distributedfile system 101. Theclient system 102 may be a computing device such as a server computer, a desktop computer, a set-top box, a gaming console, a television, a portable computing device such as, and not limited to, mobile telephones, personal digital assistants (PDAs), portable media players, netbooks, laptop computers, electronic book reader, and the like. Theclient machines 102 may host one ormore applications 134. Anapplication 134 may be any type of application including, but not limited to, a web application, a desktop application, a browser application, etc. Anapplication 134 may request access (e.g., read, write, etc.) to the data in the distributedfile system 101. For example, theapplication 134 may request to read or write files stored in a volume associated withstorage resources 170A-B. - In one embodiment, distributed
file system 101 may include an admin daemon 190 (e.g., a background process, etc.) that is capable of receiving commands from a system administrator (e.g., via a shell command console window, via a graphical user interface (GUI) of an administration application, etc.). The commands may include creating directories, deleting files, navigating through the file system (e.g., via a change directory command), enabling and disabling a quota capability, setting values of quota attributes, and so forth. In one implementation,admin daemon 190 may include a quota versioning manager 195 that is capable of managing multiple versions of quota attributes. Some operations of quota versioning manager 195 are described in detail below with respect toFIG. 2 . It should be noted that although implementations of the present disclosure are described in the context of distributed file systems, implementations of the present disclosure may also be employed for other types of file systems (e.g., centralized file systems, etc.). -
FIG. 2 depicts a flow diagram of one embodiment of amethod 200 by which a computer system handles disabling and enabling of file system quotas. The method is performed by processing logic that may comprise hardware (circuitry, dedicated logic, etc.), software (such as is run on a general purpose computer system or a dedicated machine), or a combination of both. In one embodiment, the method is performed by thecomputer system 100 ofFIG. 1 (e.g., by quota versioning manager 193), while in some other embodiments, some or all of the method might be performed by another machine. It should be noted that in some embodiments blocks depicted inFIG. 2 may be performed simultaneously or in a different order than that depicted. - At
block 201, a counter V is initialized to zero, and a flag quota is initialized to the value off. Counter V may represent the current version of quota attributes. Atblock 202, a command is received to enable a quota capability of a file system (e.g., of distributed filedsystem 101 ofFIG. 1 , etc.). The command may be submitted by a system administrator, a user, an automated script that runs according to a schedule, etc. Atblock 203, one or more commands are received to set one or more quota attributes of one or more directories of the file system. It should be noted that the one or more commands received atblock 203 may be submitted by the same entity that submitted the command atblock 202, or may be received by some other entity. It should be further noted that in some implementations, the quota capability may associate quota attributes with one or more volumes of a file system, either in addition to or instead of the directory quotas. Similarly, in some implementations, the quota capability may also associate quota attributes with individual files. - At
block 204, counter V is incremented and flag quota is set to on. Atblock 205, new version-V quota attributes are created by combining counter V with each attribute name (e.g., appending “.V” to the end of each quota attribute name, etc.), indicating that the quota attributes are version V. Atblock 206, values of the new quota attributes are set in accordance with the command(s) received atblock 203. - A command to disable the quota capability is subsequently received at block 207 (e.g., at some point while the quota capability is enabled, etc.). The command may be submitted by a system administrator, a user, an automated script, etc., and may be the same as, or different than, the entity (or entities) that submitted the enabling commands of
blocks - At
block 208, flag quota is set to off in response to the command. Atblock 209, one or more instructions are initiated to remove the version-V quota attributes. In some examples, a process may be spawned to execute the one or more instructions, while in some other examples a thread may be created to execute the one or more instructions. - As noted above, in some other implementations another type of naming scheme might be used for modifying quota attribute names. For example, rather than a counter, a flag may be toggled back and forth (e.g., the first version of an attribute name might be “<attribute name>.0”, the second version of the attribute name might be “<attribute name>.1”, the third version of the attribute name might be “<attribute name>.0”, the fourth version of the attribute name might be “<attribute name>.1”, and so on). Similarly, in some examples the symbols used to modify the quota attribute names might be something other than numerals (e.g., “<attribute name>.a”, “<attribute name>.b”, etc.), whether used in a toggling fashion or in a sequential ordering. As noted above, in some implementations the naming scheme might combine attribute names with symbols in some fashion other than concatenation.
-
FIG. 3 depicts an illustrative computer system within which a set of instructions, for causing the machine to perform any one or more of the methodologies discussed herein, may be executed. In alternative embodiments, the machine may be connected (e.g., networked) to other machines in a LAN, an intranet, an extranet, or the Internet. The machine may operate in the capacity of a server machine in client-server network environment. The machine may be a personal computer (PC), a set-top box (STB), a server, a network router, switch or bridge, or any machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that machine. Further, while only a single machine is illustrated, the term “machine” shall also be taken to include any collection of machines that individually or jointly execute a set (or multiple sets) of instructions to perform any one or more of the methodologies discussed herein. - The
illustrative computer system 300 includes a processing system (processor) 302, a main memory 304 (e.g., read-only memory (ROM), flash memory, dynamic random access memory (DRAM) such as synchronous DRAM (SDRAM)), a static memory 306 (e.g., flash memory, static random access memory (SRAM)), and adata storage device 316, which communicate with each other via abus 306. -
Processor 302 represents one or more general-purpose processing devices such as a microprocessor, central processing unit, or the like. More particularly, theprocessor 302 may be a complex instruction set computing (CISC) microprocessor, reduced instruction set computing (RISC) microprocessor, very long instruction word (VLIW) microprocessor, or a processor implementing other instruction sets or processors implementing a combination of instruction sets. Theprocessor 302 may also be one or more special-purpose processing devices such as an application specific integrated circuit (ASIC), a field programmable gate array (FPGA), a digital signal processor (DSP), network processor, or the like. Theprocessor 302 is configured to executeinstructions 326 for performing the operations and steps discussed herein. - The
computer system 300 may further include anetwork interface device 322. Thecomputer system 300 also may include a video display unit 310 (e.g., a liquid crystal display (LCD) or a cathode ray tube (CRT)), an alphanumeric input device 312 (e.g., a keyboard), a cursor control device 314 (e.g., a mouse), and a signal generation device 320 (e.g., a speaker). - The
data storage device 316 may include a computer-readable medium 324 on which is stored one or more sets of instructions 326 (e.g., instructions corresponding to the method ofFIG. 2 , etc.) embodying any one or more of the methodologies or functions described herein.Instructions 326 may also reside, completely or at least partially, within themain memory 304 and/or within theprocessor 302 during execution thereof by thecomputer system 300, themain memory 304 and theprocessor 302 also constituting computer-readable media.Instructions 326 may further be transmitted or received over a network via thenetwork interface device 322. - While the computer-
readable storage medium 324 is shown in an illustrative embodiment to be a single medium, the term “computer-readable storage medium” should be taken to include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that store the one or more sets of instructions. The term “computer-readable storage medium” shall also be taken to include any medium that is capable of storing, encoding or carrying a set of instructions for execution by the machine and that cause the machine to perform any one or more of the methodologies of the present disclosure. The term “computer-readable storage medium” shall accordingly be taken to include, but not be limited to, solid-state memories, optical media, and magnetic media. - Although the operations of the methods herein are shown and described in a particular order, the order of the operations of each method may be altered so that certain operations may be performed in an inverse order or so that certain operation may be performed, at least in part, concurrently with other operations. In another embodiment, instructions or sub-operations of distinct operations may be in an intermittent and/or alternating manner.
- In the foregoing description, numerous details have been set forth. It will be apparent, however, to one skilled in the art, that embodiments of the present disclosure may be practiced without these specific details. In some instances, well-known structures and devices are shown in block diagram form, rather than in detail, in order to avoid obscuring the present disclosure.
- Some portions of the detailed descriptions are presented in terms of algorithms and symbolic representations of operations on data bits within a computer memory. These algorithmic descriptions and representations are the means used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. An algorithm is here, and generally, conceived to be a self-consistent sequence of steps leading to a desired result. The steps are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.
- It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise, as apparent from the foregoing discussion, it is appreciated that throughout the description, discussions utilizing terms such as “receiving”, “initiating”, “generating”, or the like, refer to the action and processes of a computer system, or similar electronic computing device, that manipulates and transforms data represented as physical (electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission or display devices.
- The algorithms and displays presented herein are not inherently related to any particular computer or other apparatus. Various general purpose systems may be used with programs in accordance with the teachings herein, or it may prove convenient to construct more specialized apparatus to perform the required method steps. In addition, embodiments of the present disclosure are not described with reference to any particular programming language. It will be appreciated that a variety of programming languages may be used to implement the teachings of the disclosure as described herein.
- Such a computer program may be stored in a computer readable storage medium, such as, but not limited to, any type of disk including floppy disks, optical disks, CD-ROMs, and magnetic-optical disks, read-only memories (ROMs), random access memories (RAMs), EPROMs, EEPROMs, magnetic or optical cards, or any type of media suitable for storing electronic instructions, each coupled to a computer system bus. Embodiments of the present disclosure may be provided as a computer program product, or software, that may include a machine-readable medium having stored thereon instructions, which may be used to program a computer system (or other electronic devices) to perform a process according to the present disclosure. A machine-readable medium includes any mechanism for storing or transmitting information in a form readable by a machine (e.g., a computer). For example, a machine-readable (e.g., computer-readable) medium includes a machine (e.g., a computer) readable storage medium (e.g., read only memory (“ROM”), random access memory (“RAM”), magnetic disk storage media, optical storage media, flash memory devices, etc.), a machine (e.g., computer) readable transmission medium (electrical, optical, acoustical or other form of propagated signals (e.g., carrier waves, infrared signals, digital signals, etc.)), etc.
- It is to be understood that the above description is intended to be illustrative, and not restrictive. Many other embodiments will be apparent to those of skill in the art upon reading and understanding the above description. The scope of the disclosure should, therefore, be determined with reference to the appended claims, along with the full scope of equivalents to which such claims are entitled.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17/210,239 US20210209057A1 (en) | 2016-02-29 | 2021-03-23 | File system quota versioning |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/056,772 US10983949B2 (en) | 2016-02-29 | 2016-02-29 | File system quota versioning |
US17/210,239 US20210209057A1 (en) | 2016-02-29 | 2021-03-23 | File system quota versioning |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/056,772 Continuation US10983949B2 (en) | 2016-02-29 | 2016-02-29 | File system quota versioning |
Publications (1)
Publication Number | Publication Date |
---|---|
US20210209057A1 true US20210209057A1 (en) | 2021-07-08 |
Family
ID=59678945
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/056,772 Active 2038-12-13 US10983949B2 (en) | 2016-02-29 | 2016-02-29 | File system quota versioning |
US17/210,239 Pending US20210209057A1 (en) | 2016-02-29 | 2021-03-23 | File system quota versioning |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/056,772 Active 2038-12-13 US10983949B2 (en) | 2016-02-29 | 2016-02-29 | File system quota versioning |
Country Status (1)
Country | Link |
---|---|
US (2) | US10983949B2 (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10983949B2 (en) * | 2016-02-29 | 2021-04-20 | Red Hat, Inc. | File system quota versioning |
CN107908751A (en) * | 2017-11-17 | 2018-04-13 | 赛凡信息科技(厦门)有限公司 | A kind of optimization method of distributive catalogue of document system level quota |
CN108196787B (en) * | 2017-12-21 | 2021-04-13 | 北京鲸鲨软件科技有限公司 | Quota management method of cluster storage system and cluster storage system |
TWI715158B (en) * | 2018-10-08 | 2021-01-01 | 慧榮科技股份有限公司 | Mobile device and method capable of earlier determining that a number of files in a directory of an external connected storage device is about to full |
US11372812B2 (en) * | 2018-10-08 | 2022-06-28 | Silicon Motion, Inc. | Mobile device and method capable of earlier determining that a number of files in a directory of an external connected storage device is about to full |
Citations (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5897636A (en) * | 1996-07-11 | 1999-04-27 | Tandem Corporation Incorporated | Distributed object computer system with hierarchical name space versioning |
US5956734A (en) * | 1997-07-11 | 1999-09-21 | International Business Machines Corporation | Parallel file system with a quota check utility |
US20050193023A1 (en) * | 2004-02-26 | 2005-09-01 | Ismail Labeeb K. | Method and apparatus for allocating client resources to multiple applications |
US20050283645A1 (en) * | 2004-06-03 | 2005-12-22 | Turner Bryan C | Arrangement for recovery of data by network nodes based on retrieval of encoded data distributed among the network nodes |
US20060117135A1 (en) * | 2004-11-30 | 2006-06-01 | Microsoft Corporation | Method and system of computing quota usage |
US20060179037A1 (en) * | 2005-02-07 | 2006-08-10 | Turner Bryan C | Arrangement for a distributed file system having data objects mapped independent of any data object attribute |
US20070073741A1 (en) * | 2005-09-29 | 2007-03-29 | International Business Machines Corporation | Process contributions in a method architecture |
US20070266218A1 (en) * | 2006-05-10 | 2007-11-15 | Kyosuke Achiwa | Storage system and storage control method for the same |
US20090070620A1 (en) * | 2007-09-07 | 2009-03-12 | Quanta Computer Inc. | Method and system for detecting and recovering failure command |
US20090276470A1 (en) * | 2008-05-05 | 2009-11-05 | Vijayarajan Rajesh | Data Processing System And Method |
US7836230B1 (en) * | 2007-02-14 | 2010-11-16 | Marvell International Ltd. | Managing multiple host requests in queued commands that corresponds to receipt of stored acknowledgement commands from the host |
US7962532B1 (en) * | 2008-04-30 | 2011-06-14 | Netapp, Inc. | Management of directory quotas for file systems |
US8165994B2 (en) * | 2007-12-19 | 2012-04-24 | Microsoft Corporation | Integrated governance and version audit logging |
US20120136888A1 (en) * | 2010-11-29 | 2012-05-31 | Dell Products, Lp | System and Method for Mapping Platform Configuration Human Interface Infrastructure Data to System Attributes for Local and Remote System Management |
US8589336B1 (en) * | 2011-04-25 | 2013-11-19 | Netapp, Inc. | Framework for automated storage processes and flexible workflow |
US8635422B1 (en) * | 2009-10-29 | 2014-01-21 | Symantec Corporation | Systems and methods for reclaiming storage space from deleted volumes on thin-provisioned disks |
US8924364B1 (en) * | 2012-12-14 | 2014-12-30 | Emc Corporation | Efficient management of file system quota trees |
US20150347272A1 (en) * | 2014-06-02 | 2015-12-03 | Red Hat, Inc. | Native java backtracing from the c/c++ runtime |
US20160171055A1 (en) * | 2014-12-12 | 2016-06-16 | Invensys Systems, Inc. | Data query interface system in an event historian |
US20160226912A1 (en) * | 2015-02-04 | 2016-08-04 | Hewlett-Packard Development Company, L.P. | Endpoint policy change |
US20160242024A1 (en) * | 2013-03-15 | 2016-08-18 | Moki Mobility, Inc. | Purposed device management platform |
CN105938418A (en) * | 2015-03-06 | 2016-09-14 | 爱思开海力士有限公司 | Memory system and operation method thereof |
US20170249304A1 (en) * | 2016-02-29 | 2017-08-31 | Red Hat, Inc. | File system quota versioning |
US20180165321A1 (en) * | 2016-12-09 | 2018-06-14 | Qumulo, Inc. | Managing storage quotas in a shared storage system |
US20180322137A1 (en) * | 2015-12-15 | 2018-11-08 | Hitachi Vantara Corporation | Team folder conversion and management |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7406473B1 (en) | 2002-01-30 | 2008-07-29 | Red Hat, Inc. | Distributed file system using disk servers, lock servers and file servers |
WO2005017697A2 (en) | 2003-08-15 | 2005-02-24 | Blackboard Inc. | Content system and associated methods |
JP4281658B2 (en) * | 2004-09-24 | 2009-06-17 | 日本電気株式会社 | File access service system, switching device, quota management method and program |
US20080208926A1 (en) * | 2007-02-22 | 2008-08-28 | Smoot Peter L | Data management in a data storage system using data sets |
US7900015B2 (en) | 2007-04-13 | 2011-03-01 | Isilon Systems, Inc. | Systems and methods of quota accounting |
US8190583B1 (en) * | 2008-01-23 | 2012-05-29 | Netapp, Inc. | Chargeback in a data storage system using data sets |
US8700571B2 (en) | 2010-09-24 | 2014-04-15 | Hitachi Data Systems Corporation | System and method for optimizing protection levels when replicating data in an object storage system |
US8515904B1 (en) | 2012-03-29 | 2013-08-20 | Emc Corporation | Providing file sytem quota support for a file system having separated data and metadata |
US9201896B2 (en) | 2012-11-26 | 2015-12-01 | Red Hat, Inc. | Managing distributed storage quotas |
US10110506B2 (en) | 2013-09-20 | 2018-10-23 | Oracle International Corporation | System and method for quota management in a cloud platform environment |
US9355271B2 (en) * | 2013-10-18 | 2016-05-31 | Robert Bosch Gmbh | System and method for dynamic, non-interactive, and parallelizable searchable symmetric encryption |
-
2016
- 2016-02-29 US US15/056,772 patent/US10983949B2/en active Active
-
2021
- 2021-03-23 US US17/210,239 patent/US20210209057A1/en active Pending
Patent Citations (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5897636A (en) * | 1996-07-11 | 1999-04-27 | Tandem Corporation Incorporated | Distributed object computer system with hierarchical name space versioning |
US5956734A (en) * | 1997-07-11 | 1999-09-21 | International Business Machines Corporation | Parallel file system with a quota check utility |
US20050193023A1 (en) * | 2004-02-26 | 2005-09-01 | Ismail Labeeb K. | Method and apparatus for allocating client resources to multiple applications |
US20050283645A1 (en) * | 2004-06-03 | 2005-12-22 | Turner Bryan C | Arrangement for recovery of data by network nodes based on retrieval of encoded data distributed among the network nodes |
US20060117135A1 (en) * | 2004-11-30 | 2006-06-01 | Microsoft Corporation | Method and system of computing quota usage |
US20060179037A1 (en) * | 2005-02-07 | 2006-08-10 | Turner Bryan C | Arrangement for a distributed file system having data objects mapped independent of any data object attribute |
US20070073741A1 (en) * | 2005-09-29 | 2007-03-29 | International Business Machines Corporation | Process contributions in a method architecture |
US20070266218A1 (en) * | 2006-05-10 | 2007-11-15 | Kyosuke Achiwa | Storage system and storage control method for the same |
US7836230B1 (en) * | 2007-02-14 | 2010-11-16 | Marvell International Ltd. | Managing multiple host requests in queued commands that corresponds to receipt of stored acknowledgement commands from the host |
US20090070620A1 (en) * | 2007-09-07 | 2009-03-12 | Quanta Computer Inc. | Method and system for detecting and recovering failure command |
US8165994B2 (en) * | 2007-12-19 | 2012-04-24 | Microsoft Corporation | Integrated governance and version audit logging |
US7962532B1 (en) * | 2008-04-30 | 2011-06-14 | Netapp, Inc. | Management of directory quotas for file systems |
US20090276470A1 (en) * | 2008-05-05 | 2009-11-05 | Vijayarajan Rajesh | Data Processing System And Method |
US8635422B1 (en) * | 2009-10-29 | 2014-01-21 | Symantec Corporation | Systems and methods for reclaiming storage space from deleted volumes on thin-provisioned disks |
US20120136888A1 (en) * | 2010-11-29 | 2012-05-31 | Dell Products, Lp | System and Method for Mapping Platform Configuration Human Interface Infrastructure Data to System Attributes for Local and Remote System Management |
US8589336B1 (en) * | 2011-04-25 | 2013-11-19 | Netapp, Inc. | Framework for automated storage processes and flexible workflow |
US8924364B1 (en) * | 2012-12-14 | 2014-12-30 | Emc Corporation | Efficient management of file system quota trees |
US20160242024A1 (en) * | 2013-03-15 | 2016-08-18 | Moki Mobility, Inc. | Purposed device management platform |
US20150347272A1 (en) * | 2014-06-02 | 2015-12-03 | Red Hat, Inc. | Native java backtracing from the c/c++ runtime |
US20160171055A1 (en) * | 2014-12-12 | 2016-06-16 | Invensys Systems, Inc. | Data query interface system in an event historian |
US20160226912A1 (en) * | 2015-02-04 | 2016-08-04 | Hewlett-Packard Development Company, L.P. | Endpoint policy change |
CN105938418A (en) * | 2015-03-06 | 2016-09-14 | 爱思开海力士有限公司 | Memory system and operation method thereof |
US20180322137A1 (en) * | 2015-12-15 | 2018-11-08 | Hitachi Vantara Corporation | Team folder conversion and management |
US20170249304A1 (en) * | 2016-02-29 | 2017-08-31 | Red Hat, Inc. | File system quota versioning |
US20180165321A1 (en) * | 2016-12-09 | 2018-06-14 | Qumulo, Inc. | Managing storage quotas in a shared storage system |
Also Published As
Publication number | Publication date |
---|---|
US20170249304A1 (en) | 2017-08-31 |
US10983949B2 (en) | 2021-04-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109254733B (en) | Method, device and system for storing data | |
US20210209057A1 (en) | File system quota versioning | |
US11068441B2 (en) | Caseless file lookup in a distributed file system | |
US11296940B2 (en) | Centralized configuration data in a distributed file system | |
US10210191B2 (en) | Accelerated access to objects in an object store implemented utilizing a file storage system | |
US20160364424A1 (en) | Partition-based index management in hadoop-like data stores | |
WO2019166940A2 (en) | Transactional operations in multi-master distributed data management systems | |
US10909086B2 (en) | File lookup in a distributed file system | |
US10169348B2 (en) | Using a file path to determine file locality for applications | |
US11797494B2 (en) | Snapshot management in distributed file systems | |
US10956499B2 (en) | Efficient property graph storage for streaming/multi-versioning graphs | |
US9959281B2 (en) | Concurrent file and object protocol access using space-efficient cloning | |
US11157456B2 (en) | Replication of data in a distributed file system using an arbiter | |
JP7431490B2 (en) | Data migration in hierarchical storage management systems | |
US10831794B2 (en) | Dynamic alternate keys for use in file systems utilizing a keyed index | |
US10146791B2 (en) | Open file rebalance | |
US10509578B2 (en) | Logical address space for storage resource pools | |
US11341055B2 (en) | Method, electronic device, and computer program product for storage management | |
AU2019386603B2 (en) | Systems and methods for storing object state on hash chains |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: RED HAT, INC., NORTH CAROLINA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MALLIKARJUNA, VIJAIKUMAR;REEL/FRAME:055691/0853 Effective date: 20160301 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: APPLICATION DISPATCHED FROM PREEXAM, NOT YET DOCKETED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION COUNTED, NOT YET MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |