Application-storage discovery

Nikolai Joukov, Birgit Pfitzmann, Hari Govind V. Ramasamy, Murthy V. Devarakonda

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations

Abstract

Discovering application dependency on data and storage is a key prerequisite for many storage optimization tasks such as data assignment to storage tiers, storage consolidation, virtualization, and handling unused data. However, in the real world these dependencies are rarely known, and discovering them is a challenge because of virtualization at various levels and the need for discovery methods to be non-intrusive. As a result, many optimization tasks are performed, if at all, without the full knowledge of application-to-storage dependencies. This paper presents a non-intrusive applicationto-storage discovery method, and while it is built on our prior work, the storage discovery described here is entirely new. We used this discovery method in two production enterprise environments, consisting of about 323 servers, and we show how the discovered data enables three optimization tasks. First, we relate application criticality with storage tiers. Second, we find unused storage devices and we show how this information together with storage consolidation can be used to achieve power savings of up to two orders of magnitude. Third, we identify opportunities for database storage optimization.

Original languageEnglish (US)
Title of host publicationProceedings of SYSTOR 2010 - The 3rd Annual Haifa Experimental Systems Conference
DOIs
StatePublished - 2010
Externally publishedYes
Event3rd Annual Haifa Experimental Systems Conference, SYSTOR 2010 - Haifa, Israel
Duration: May 24 2010May 26 2010

Publication series

NameACM International Conference Proceeding Series

Other

Other3rd Annual Haifa Experimental Systems Conference, SYSTOR 2010
Country/TerritoryIsrael
CityHaifa
Period5/24/105/26/10

Keywords

  • Enterprise storage
  • Experimental evaluation
  • Storage discovery

ASJC Scopus subject areas

  • Software
  • Human-Computer Interaction
  • Computer Vision and Pattern Recognition
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Application-storage discovery'. Together they form a unique fingerprint.

Cite this