Monitoring storage cluster elements
First Claim
1. A method comprising:
- monitoring clusters using rules within a synchronized database to determine whether conditions of the rules are violated by operational information of devices within the clusters, wherein a policy specifies that a notification is to be generated when a combination of a first rule being violated a first threshold number of times and a second rule being violated a second threshold number of times occurs within a threshold timespan;
performing a database update to the database using the operational information to trigger execution of the rules to evaluate the operational information against the conditions;
tracking a number of times each rule is violated; and
generating and sending the notification over a network to a computing device based upon the first rule being violated the first threshold number of times and the second rule being violated the second threshold number of times within the threshold timespan.
1 Assignment
0 Petitions
Accused Products
Abstract
Monitoring health of associated, but separated storage clusters can be done at both a node scope and a cluster scope. Monitoring the storage clusters at the cluster scope includes monitoring the network elements that support the storage clusters and connect the storage clusters. Initially, a fabric monitor in each cluster discovers cluster topology. This cluster topology is communicated and maintained throughout the managing storage elements of the storage clusters. After the storage cluster topologies have been discovered, the fabric monitors of each cluster can periodically determine status of network elements of the storage clusters. This allows the storage clusters to maintain awareness of interconnect status, and react to changes in status. In addition, each managing storage element monitors its own health. This information is aggregated to determine when to trigger corrective actions, alerts, and/or storage features in accordance with rules defined at the managing storage elements.
-
Citations
20 Claims
-
1. A method comprising:
-
monitoring clusters using rules within a synchronized database to determine whether conditions of the rules are violated by operational information of devices within the clusters, wherein a policy specifies that a notification is to be generated when a combination of a first rule being violated a first threshold number of times and a second rule being violated a second threshold number of times occurs within a threshold timespan; performing a database update to the database using the operational information to trigger execution of the rules to evaluate the operational information against the conditions; tracking a number of times each rule is violated; and generating and sending the notification over a network to a computing device based upon the first rule being violated the first threshold number of times and the second rule being violated the second threshold number of times within the threshold timespan. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A non-transitory machine readable medium comprising instructions for performing a method, which when executed by a machine, causes the machine to:
-
monitor clusters using rules within a synchronized database to determine whether conditions of the rules are violated by operational information of devices within the clusters, wherein a policy specifies that a notification is to be generated when a combination of a first rule being violated a first threshold number of times and a second rule being violated a second threshold number of times occurs within a threshold timespan; perform a database update to the database using the operational information to trigger execution of the rules to evaluate the operational information against the conditions; track number of times each rule is violated; and generate and send the notification over a network to a computing device based upon the first rule being violated the first threshold number of times and the second rule being violated the second threshold number of times within the threshold timespan. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A computing device comprising:
-
a memory containing machine readable medium comprising machine executable code having stored thereon instructions for performing a method; and a processor coupled to the memory, the processor configured to execute the machine executable code to cause the processor to; monitor clusters using rules within a synchronized database to determine whether conditions of the rules are violated by operational information of devices within the clusters, wherein a policy specifies that a notification is to be generated when a combination of a first rule being violated a first threshold number of times and a second rule being violated a second threshold number of times occurs within a threshold timespan; perform a database update to the database using the operational information to trigger execution of the rules to evaluate the operational information against the conditions; track number of times each rule is violated; and generate and send the notification over a network to a second computing device based upon the first rule being violated the first threshold number of times and the second rule being violated the second threshold number of times within the threshold timespan. - View Dependent Claims (18, 19, 20)
-
Specification