-
公开(公告)号:US20200349004A1
公开(公告)日:2020-11-05
申请号:US16824016
申请日:2020-03-19
Applicant: EMC IP Holding Company LLC
Inventor: Chun Ma , Lifeng Yang
Abstract: Techniques for storage management involve: detecting a trigger for an adjustment of a redundant level for a set of RAIDs. Each of the set of RAIDs includes one or more RAID extents. Each RAID extent is formed by a plurality of storage extents from a set of storage extents. The set of storage extents is obtained by dividing a plurality of storage disks into storage extents. The plurality of storage extents are located in different storage disks of the plurality of storage disks. The techniques further involve: in response to detecting the trigger, selecting, from the set of RAIDs, a target RAID for which the redundant level is to be adjusted. The techniques further involve: adjusting the redundant level of the target RAID from a first redundant level to a second redundant level. Such techniques can improve the performance of a RAID storage system.
-
12.
公开(公告)号:US20190332455A1
公开(公告)日:2019-10-31
申请号:US16367368
申请日:2019-03-28
Applicant: EMC IP Holding Company LLC
Inventor: Chun Ma , Geng Han , Hongpo Gao , Jianbin Kang , Lifeng Yang
Abstract: Techniques involve: in response to a number of errors of an error type in a storage disk increasing, determining an adjustment rate for a health value of the storage disk based on a total usage time length of the storage disk, where a longer total usage time length corresponds to a higher adjustment rate, and the health value indicates a health condition of the storage disk with respect to the error type. The techniques further involve increasing the adjustment rate based on a total input/output (I/O) number of the storage disk, where a greater total number of I/Os corresponds to a greater increment. The techniques further involve adjusting the health value with the adjustment rate. Such techniques can improve the accuracy of evaluating the health condition of the storage disk.
-
公开(公告)号:US11366719B1
公开(公告)日:2022-06-21
申请号:US17204216
申请日:2021-03-17
Applicant: EMC IP Holding Company LLC
Inventor: Chun Ma , Geng Han , Baote Zhuo , Hongpo Gao
Abstract: A storage management technique involves: receiving from a requesting node a write request for writing target data into a first target storage space in a redundant array of independent disks (RAID); if a storage device associated with the first target storage space does not fail, acquiring first data stored in the first target storage space and a first parity value corresponding to the requesting node and stored in a parity storage space; determining a target parity value based on the target data, the first data, and the first parity value; and updating a stripe with the target data and the target parity value. Accordingly, locks caused by updating the parity value can be avoided, so that different nodes can perform parallel write to different storage spaces in the same stripe in the RAID.
-
公开(公告)号:US20220179743A1
公开(公告)日:2022-06-09
申请号:US17204216
申请日:2021-03-17
Applicant: EMC IP Holding Company LLC
Inventor: Chun Ma , Geng Han , Baote Zhuo , Hongpo Gao
Abstract: A storage management technique involves: receiving from a requesting node a write request for writing target data into a first target storage space in a redundant array of independent disks (RAID); if a storage device associated with the first target storage space does not fail, acquiring first data stored in the first target storage space and a first parity value corresponding to the requesting node and stored in a parity storage space; determining a target parity value based on the target data, the first data, and the first parity value; and updating a stripe with the target data and the target parity value. Accordingly, locks caused by updating the parity value can be avoided, so that different nodes can perform parallel write to different storage spaces in the same stripe in the RAID.
-
公开(公告)号:US11157198B2
公开(公告)日:2021-10-26
申请号:US16817207
申请日:2020-03-12
Applicant: EMC IP Holding Company LLC
Inventor: Chun Ma , Socheavy Heng , Geng Han , Hongpo Gao , Shaoqin Gong , Jian Gao
IPC: G06F3/06
Abstract: Techniques for generating merge-friendly sequential IO patterns in shared logger page descriptor (PD) tiers. The techniques can be employed in an active-active clustered system that includes a primary storage node, a secondary storage node, a logger shared between the primary and secondary storage nodes, and a storage device such as a non-volatile memory (NVM) device. The techniques can include allocating at least a first trunk and a second trunk in a shared PD tier of the logger, sequentially writing PD metadata and/or data by the primary storage node and the secondary storage node to the first trunk and the second trunk, respectively, merging the PD metadata/data units sequentially written to each respective trunk together to obtain PD metadata/data having an increased size up to the size of the respective trunks, and storing the merged PD metadata/data to the NVM device.
-
公开(公告)号:US11003556B2
公开(公告)日:2021-05-11
申请号:US16216344
申请日:2018-12-11
Applicant: EMC IP Holding Company LLC
Inventor: Chun Ma , Geng Han , Jibing Dong , Hongpo Gao , Jian Gao , Xinlei Xu
Abstract: State information of one or more extents in a stripe in a storage system is obtained, the state information indicating whether the extents comprise at least one of a failed extent and an end-of-life extent. A risk level for the stripe is determined based on the state information, the risk level indicating a possibility that data stored in the stripe is lost. In response to the risk level exceeding a first threshold, the storage system is caused to: rebuild data corresponding to the failed extent, and write the data to a sparing extent in a second storage device different from a first storage device where the failed extent resides; and write data corresponding to the end-of-life extent to a swapped extent in a fourth storage device different from a third storage device where the end-of-life extent resides, the fourth storage device being used to replace the third storage device.
-
公开(公告)号:US20200341911A1
公开(公告)日:2020-10-29
申请号:US16790380
申请日:2020-02-13
Applicant: EMC IP Holding Company LLC
Inventor: Chun Ma , Baote Zhuo , Haiying Tang , Zhihui Qiu , Sihang Xia
IPC: G06F12/12
Abstract: Techniques involve managing a storage system. In accordance with the techniques, a plurality of copies of metadata of the storage system are read from a plurality of storage devices in a resource pool of the storage system. The resource pool includes a first number of storage devices, and the metadata describes configuration information of the storage system. A second number of copies are selected from the plurality of copies based on version information in the plurality of copies, where the second number of copies comprises the metadata in the same version. It is determined whether a relation between the first number and the second number satisfies a predetermined condition. The second number of copies are identified as trusted metadata based on determining the relation satisfies the predetermined condition. With the foregoing example implementation, the metadata in the storage system may be managed with higher reliability.
-
公开(公告)号:US20190332502A1
公开(公告)日:2019-10-31
申请号:US16216344
申请日:2018-12-11
Applicant: EMC IP Holding Company LLC
Inventor: Chun Ma , Geng Han , Jibing Dong , Hongpo Gao , Jian Gao , Xinlei Xu
Abstract: State information of one or more extents in a stripe in a storage system is obtained, the state information indicating whether the extents comprise at least one of a failed extent and an end-of-life extent. A risk level for the stripe is determined based on the state information, the risk level indicating a possibility that data stored in the stripe is lost. In response to the risk level exceeding a first threshold, the storage system is caused to: rebuild data corresponding to the failed extent, and write the data to a sparing extent in a second storage device different from a first storage device where the failed extent resides; and write data corresponding to the end-of-life extent to a swapped extent in a fourth storage device different from a third storage device where the end-of-life extent resides, the fourth storage device being used to replace the third storage device.
-
19.
公开(公告)号:US11709595B2
公开(公告)日:2023-07-25
申请号:US16993623
申请日:2020-08-14
Applicant: EMC IP Holding Company LLC
Inventor: Yuetao Ma , Changrui Shao , Haiying Tang , Xiaobo Zhang , Chun Ma
CPC classification number: G06F3/0604 , G06F3/0647 , G06F3/0689 , G06F9/542
Abstract: A technique for storage management involves: determining multiple source disk slices from a storage array that provides redundant storage, a current disk group where each of the multiple source disk slices is located being different from a target disk group where the source disk slice is specified to be located; determining multiple destination disk slices from the target disk group based on the multiple source disk slices, the multiple destination disk slices being used to replace the multiple source disk slices; and causing data to be moved to the multiple destination disk slices from the multiple source disk slices. Accordingly, such a technique may improve the reliability of a storage system.
-
公开(公告)号:US11429537B2
公开(公告)日:2022-08-30
申请号:US16790380
申请日:2020-02-13
Applicant: EMC IP Holding Company LLC
Inventor: Chun Ma , Baote Zhuo , Haiying Tang , Zhihui Qiu , Sihang Xia
Abstract: Techniques involve managing a storage system. In accordance with the techniques, a plurality of copies of metadata of the storage system are read from a plurality of storage devices in a resource pool of the storage system. The resource pool includes a first number of storage devices, and the metadata describes configuration information of the storage system. A second number of copies are selected from the plurality of copies based on version information in the plurality of copies, where the second number of copies comprises the metadata in the same version. It is determined whether a relation between the first number and the second number satisfies a predetermined condition. The second number of copies are identified as trusted metadata based on determining the relation satisfies the predetermined condition. With the foregoing example implementation, the metadata in the storage system may be managed with higher reliability.
-
-
-
-
-
-
-
-
-