Combined data storage and computing appliance that provides scalable storage in a clustered computing environment
First Claim
1. A method comprising:
- Maintaining a data storage cluster of nodes wherein nodes among the data storage cluster of nodes are interconnected by a network backplane;
Monitoring a guest application executing on a physical machine that is not a part of the data storage cluster of nodes for compliance with a policy, wherein the policy is based at least in part on a front side bandwidth and a performance profile wherein the front side bandwidth indicates the amount of data the guest application is pulling from the data storage cluster of nodes;
In response to the guest application being non-compliant with the policy, wherein non-compliance is based at least in part on the front side bandwidth reaching an efficiency threshold;
Determining an application type for the guest application wherein types of applications include at least a compute intensive application, a data storage intensive application, and a hybrid application, wherein the computing resource utilization associated with the compute intensive application indicates high utilization of processors, high disk access, and a large memory footprint, wherein the computing resource utilization associated with the data storage intensive application indicates substantial non-local data storage access activity;
determining a target node among the data storage cluster of nodes based on at least one of the application type and the performance profile;
migrating the guest application to the target node;
enforcing the policy on the guest application on the target node;
determining if the guest application is in compliance with the policy on the target node; and
reporting at least one of the policy violation and a policy resolution.
9 Assignments
0 Petitions
Accused Products
Abstract
Various embodiments are directed toward improving computing performance for data intensive computing applications by arranging a physical machine into a single computing appliance that includes tightly coupled dedicated computation and storage resources that may scale to multiple peta-byte or greater storage in concert with providing a similarly scaling computing and data caching platform, monitoring co-resident guest applications, and data access applications. Generally, the computing appliance may be arranged to execute compute applications and data storage applications in a single self-contained computing device. The data storage applications may execute within virtual machines (VM'"'"'s) and the compute applications may execute in other co-resident VM'"'"'s residing one or more computing appliances.
27 Citations
15 Claims
-
1. A method comprising:
-
Maintaining a data storage cluster of nodes wherein nodes among the data storage cluster of nodes are interconnected by a network backplane; Monitoring a guest application executing on a physical machine that is not a part of the data storage cluster of nodes for compliance with a policy, wherein the policy is based at least in part on a front side bandwidth and a performance profile wherein the front side bandwidth indicates the amount of data the guest application is pulling from the data storage cluster of nodes; In response to the guest application being non-compliant with the policy, wherein non-compliance is based at least in part on the front side bandwidth reaching an efficiency threshold; Determining an application type for the guest application wherein types of applications include at least a compute intensive application, a data storage intensive application, and a hybrid application, wherein the computing resource utilization associated with the compute intensive application indicates high utilization of processors, high disk access, and a large memory footprint, wherein the computing resource utilization associated with the data storage intensive application indicates substantial non-local data storage access activity; determining a target node among the data storage cluster of nodes based on at least one of the application type and the performance profile; migrating the guest application to the target node; enforcing the policy on the guest application on the target node; determining if the guest application is in compliance with the policy on the target node; and reporting at least one of the policy violation and a policy resolution. - View Dependent Claims (2, 3, 4, 5)
-
-
6. An apparatus for improving computing resource utilization for a data storage cluster of nodes interconnected by a network backplane, comprising:
-
a memory device for storing data and instructions; a data storage device for storing data and instructions; and a processor for executing instructions that perform actions, including; Monitoring a guest application executing on a physical machine that is not a part of the data storage cluster of nodes for compliance with a policy, wherein the policy is based at least in part on a front side bandwidth and a performance profile wherein the front side bandwidth indicates the amount of data the guest application is pulling from the data storage cluster of nodes; In response to the guest application being non-compliant with the policy, wherein non-compliance is based at least in part on the front side bandwidth reaching an efficiency threshold; Determining an application type for the guest application wherein types of applications include at least a compute intensive application, a data storage intensive application, and a hybrid application, wherein the computing resource utilization associated with the compute intensive application indicates high utilization of processors, high disk access, and a large memory footprint, wherein the computing resource utilization associated with the data storage intensive application indicates substantial non-local data storage access activity; determining a target node among the data storage cluster of nodes based on at least one of the application type and the performance profile; migrating the guest application to the target node; enforcing the policy on the guest application on the target node; determining if the guest application is in compliance with the policy on the target node; and reporting at least one of the policy violation and a policy resolution. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A processor readable non-transitory storage media that includes instructions thereon wherein the execution of the instructions by a processor causes actions, comprising:
-
Maintaining a data storage cluster of nodes wherein nodes among the data storage cluster of nodes are interconnected by a network backplane; Monitoring a guest application executing on a physical machine that is not a part of the data storage cluster of nodes for compliance with a policy, wherein the policy is based at least in part on a front side bandwidth and a performance profile wherein the front side bandwidth indicates the amount of data the guest application is pulling from the data storage cluster of nodes; In response to the guest application being non-compliant with the policy, wherein non-compliance is based at least in part on the front side bandwidth reaching an efficiency threshold; Determining an application type for the guest application wherein types of applications include at least a compute intensive application, a data storage intensive application, and a hybrid application, wherein the computing resource utilization associated with the compute intensive application indicates high utilization of processors, high disk access, and a large memory footprint, wherein the computing resource utilization associated with the data storage intensive application indicates substantial non-local data storage access activity; determining a target node among the data storage cluster of nodes based on at least one of the application type and the performance profile; migrating the guest application to the target node; enforcing the policy on the guest application on the target node; determining if the guest application is in compliance with the policy on the target node; and reporting at least one of the policy violation and a policy resolution. - View Dependent Claims (12, 13, 14, 15)
-
Specification