Abstract:
Determining cumulative workload skew is described. Measurements for one or more logical devices are determined. The set of measurements include, for each of N storage tiers, a workload measurement identifying workload directed to the single tier, and a capacity measurement identifying an amount of data stored in the single tier. N points may be determined using the measurements. Each point corresponds to a different storage tier and has a first coordinate identifying a cumulative percentage of data portions stored in the storage tier and all other tiers having a higher performance ranking than the one storage tier, and a second coordinate denoting an aggregated percentage of total workload directed to the foregoing cumulative percentage of data portions. A curve representing a cumulative workload skew may be determined using these N points and a point of origin.
Abstract:
A method, computer program product, and computing system for defining one or more computing system requirements for desired data storage array. One or more design criteria is defined for the desired data storage array. At least one recommended data storage array is identified for the desired data storage array based, at least in part, upon the one or more computing system requirements and the one or more design criteria.
Abstract:
The contributions of a virtual storage unit to the utilization of a data storage system may be quantified. A utilization score may be determined for each virtual storage unit for one or more functional components of the data storage system, for example, a front-end adapter, back-end adapter or interface physical storage unit. A utilization score may be determined for the data storage system as a whole by combining the component utilization scores of the virtual storage unit. Component and/or system utilization scores may be visually presented to a user in a manner that enables the user to assess the relative contributions of the virtual storage units to utilization of the component or overall system, respectively. What-if scenarios may be considered using the utilization scores to determine the consequences of moving one or more virtual storage units from one data storage system to another, and a live migration may result.
Abstract:
Described are techniques for tracking activity for one or more devices. Each of the one or more devices is partitioned into one or more extents. Each of the one or more extents includes a plurality of sub extents. Each of the sub extents includes a plurality of chunks. For each of said one or more extents of each of said one or more devices, extent activity level information is determined including one or more metrics indicating an activity level for said each extent; and For each of said one or more extents of each of said one or more devices, an activity bitmap is determined. The activity bitmap includes an entry for each sub extent included in said each extent, said entry indicating an activity level for said each sub extent.
Abstract:
Described are techniques for partitioning resources. A plurality of resource limit ranges are specified for a plurality of tenants of a system. Each of the plurality of resource limit ranges have a lower bound and an upper bound. A plurality of current resource limits are determined. Each of the plurality of current resource limits indicate a current resource limit for one of the plurality of tenants. Each current resource limit for one of the tenants is a value included in one of the plurality of resource limit ranges specified for the one tenant. The plurality of current resource limits are dynamically determined in accordance with a current state of the system.
Abstract:
Described are techniques that identify problematic workloads. Measured response times for workloads associated applications are received. Each of the applications has one of the workloads resulting in one of the measured response times for the application. The applications share a set of one or more resources. In accordance with a first set of one or more criteria, it is determined whether there is an occurrence of abnormal performance with respect to performance of the applications. Responsive to determining the occurrence of abnormal performance with respect to performance of the applications, second processing is performed that includes determining, using the measured response times and in accordance with a second set of one or more criteria, an application set of one or more of the applications having an associated workload causing the occurrence of abnormal performance. A remediation may also be taken to address or alleviate the abnormal performance.
Abstract:
Described are techniques for processing data operations. A read request for first data is received at a data storage system. It is determined whether the read request results in a cache hit whereby the first data is stored in a cache of the data storage system, or whether the read request otherwise results in a cache miss. If the read request results in a cache miss, processing is performed to determine determining whether to perform cacheless read processing or deferred caching processing to service the read request. Determining whether to perform cacheless read processing or deferred caching processing is performed in accordance with criteria including a measurement indicating a level of busyness of a back-end component used to retrieve from physical storage any portion of the first data not currently stored in the cache.
Abstract:
Control over the overall data cache hit rate is obtained by managing partitioning caching responsibility by address space. Data caches determine whether to cache data by hashing the data address. Each data cache is assigned a range of hash values to serve. By choosing hash value ranges that do not overlap, data duplication can be eliminated if desired, or degrees of overlap can be allowed. Control over hit rate maximization of data caches having best hit response times is obtained by maintaining separate dedicated and undedicated partitions within each cache. The dedicated partition is only used for the assigned range of hash values.
Abstract:
For each storage array in a storage system, a single value score indicative of the overall health of the respective storage array is calculated. Storage array health score may be tracked over time and used to identify storage arrays in need of maintenance. The storage array health score may be calculated as a composite of four component scores: physical component health, logical component health, Service Level Objective compliance and Best Practice Configuration Compliance. The physical component and logical component scores may be based on multiple different category health scores, and each category health score may be based on multiple instance health scores. Health scores may be used to identify remedial actions and predict health score increase as a result of remedial actions.
Abstract:
An efficient linear technique is used to determine allocation of tiered storage resources among data extents based on system performance and SLOs. Efficiency is achieved by first determining a system performance boundary condition via hardware performance modeling under desirable system performance zones. SLOs are then balanced and SLO achievement improved by exchanging workload activities among SG donors and SG receivers while system performance boundary conditions are maintained. Remaining unutilized capacity is the uniformly distributed to further improve SLO achievement.