Multi-tenant throttling approaches
    6.
    发明授权
    Multi-tenant throttling approaches 有权
    多租户节流方式

    公开(公告)号:US09413680B1

    公开(公告)日:2016-08-09

    申请号:US13627278

    申请日:2012-09-26

    Abstract: An opportunistic throttling approach can be used for customers of shared resources in a multi-tenant environment. Each customer can have a respective token bucket with a guaranteed fill rate. When a request is received for an amount of work to be performed by a resource, the corresponding number of tokens are obtained from, or charged against, a global token bucket. If the global bucket has enough tokens, and if the customer has not exceeded a maximum work rate or other such metric, the customer can charge less than the full number of tokens against the customer's token bucket, in order to reduce the number of tokens that need to be taken from the customer bucket. Such an approach can enable the customer to do more work and enable the customer's bucket to fill more quickly as fewer tokens are charged against the customer bucket for the same amount of work.

    Abstract translation: 可以在多租户环境中为共享资源的客户使用机会主义的节制方法。 每个客户可以有一个具有保证填充率的相应令牌桶。 当接收到要由资源执行的工作量的请求时,相应数量的令牌从全局令牌桶中获取或收取。 如果全局桶具有足够的令牌,并且如果客户没有超过最大工作率或其他此类度量,则客户可以针对客户的令牌桶收取少于令牌的全部令牌,以便减少令牌数量 需要从客户桶中取出。 这样一种方法可以使客户能够进行更多的工作,并使得客户的桶可以更快地填充,因为对于相同数量的工作,较少的令牌被针对客户桶收取。

    DATA STORAGE SYSTEM WITH ENFORCED FENCING
    8.
    发明申请

    公开(公告)号:US20200083909A1

    公开(公告)日:2020-03-12

    申请号:US16684992

    申请日:2019-11-15

    Abstract: A data storage system includes multiple head nodes and data storage sleds. The data storage sleds include multiple mass storage devices and a sled controller. Respective ones of the head nodes are configured to obtain credentials for accessing particular portions of the mass storage devices of the data storage sleds. A sled controller of a data storage sled determines whether a head node attempting to perform a write on a mass storage device of a data storage sled that includes the sled controller is presenting with the write request a valid credential for accessing the mass storage devices of the data storage sled. If the credentials are valid, the sled controller causes the write to be performed and if the credentials are invalid, the sled controller returns a message to the head node indicating that it has been fenced off from the mass storage device.

Patent Agency Ranking