SYSTEM FOR MAINTAINING COHERENCY DURING OFFLINE CHANGES TO STORAGE MEDIA
A proxy device monitors memory access operations between clients and a storage media. The proxy device stores at least some of the data from the storage media in a faster tiering media and provides the data from the faster tiering media to the clients for certain associated memory access operations. The proxy is also configured to monitor Small Computer System Interface (SCSI) communications between the clients and the storage media and invalidate at least some data in the tiering media when particular SCSI messages in the SCSI communications indicate the tiering media contains data that is out of sync with the data in the storage media.
This application is continuation of U.S. patent application Ser. No. 12/794,057 filed on Jun. 4, 2010 which is a continuation in part of U.S. patent application Ser. No. 12/619,609 filed Nov. 16, 2009 which claims priority to U.S. provisional patent application Ser. No. 61/115,426, filed Nov. 17,2008, and which are both herein incorporated by reference in their entirety. U.S. patent application Ser. No. 12/794,057, to which priority is claimed herein, is also a continuation in part of U.S. patent application Ser. No. 12/568,612 filed on Sep. 28, 2009, now U.S. Pat. No. 8,160,070, which claims priority to U.S. Provisional Application Ser. No. 61/101,645 filed Sep. 30, 2008, which are also incorporated by reference in their entirety.
BACKGROUNDFibre Channel (FC) provides practical and expandable means of transferring data between workstations, mainframes, supercomputers, desktop computers, and storage devices at fast data rates. Fibre Channel (FC) is especially suited for connecting computer servers to shared storage devices and for interconnecting storage controllers and drives.
A proxy device may be connected by a FC network between a client computer and a storage device. The proxy device may contain a tiering media that needs to maintain an identical state as the storage device, so that consistent and correct data can be provided to the client computer. However, the proxy device may not have access to all operations performed on the storage device. These “off line” operations may leave different versions of data in the tiering media and in the data storage device. When the client computer goes back “on line” and tries to access the storage device through the proxy device, the proxy device may provide incorrect data from the tiering media unless made aware of the offline activity.
Several preferred examples of the present application will now be described with reference to the accompanying drawings. Various other examples are also possible and practical. This application may be exemplified in many different forms and should not be construed as being limited to the examples set forth herein.
In one embodiment, the storage access system 100 and the storage media 114 are stand-alone appliances, devices, or blades. In one embodiment, the client devices 106, storage access system 100, and storage media 114 might be coupled to each other via wired or wireless connections 112 capable of transporting the storage operations 102 and any associated data between client devices 106 and storage media 114.
One example of a connection 112 is a Fibre Channel network that uses the Small Computer System Interface (SCSI) protocol for storage operations. Client devices 106, storage access system 100, and storage media 114 may use fibre channel interface cards or Host Bus Adapters (HBA) (not shown). The fibre channel HBAs allow the client devices 106 and storage media 114 to communicate over the fibre channel medium 112 using the SCSI protocol. Most FC networks utilize SCSI as the underlying storage protocol, and any non-SCSI disk, such as a Serial ATA (SATA) disk, within storage media 114 will typically be virtualized as a SCSI entity.
In another embodiment, the client devices 106 may access one or more of the media devices 120 in storage media 114 over an internal or external data bus. The storage media 114 in this embodiment could be located in personal computers or servers, or could also be a stand-alone device coupled to the client computer/server 106 via a fiber channel SCSI bus, Universal Serial Bus (USB), or packet switched network connections 112.
The storage access system 100 contains one or more processors or processing elements 105 that operate as a proxy for the storage operations 102 between the client devices 106 and storage media 114. Tiering media 110 in storage access system 100 includes different combinations of Flash memory and Dynamic Random Access Memory (DRAM) that typically provides faster access speeds than say disks that may be used in storage media 114.
The storage access system 100 receives the read and write operations 102 from the client devices 106 that are directed to the storage media 114. In one embodiment, the media devices 120 contain multiple storage blocks that have associated block addresses. To improve throughput and/or to reduce latency to the data in the storage media 114, some of the blocks of data from the storage media 114 are temporarily copied into the tiering media 110. The storage access system 100 then uses the data in the faster tiering media 110 to service certain storage access operations 102 from the client devices 106.
In order to maintain data coherency, storage access system 100 monitors all of the storage operations 102 performed in storage media 114 and maintains the same version of data in the tiering media 110 and storage media 114. Proxy 105 is responsible for maintaining this data coherency between the tiering media 110 and the storage media 114 and must see all write operations to storage media 114.
The client device 106 uses a storage controller 130 to capture a stable state or “snapshot” for the stock transactions from the previous trading day. The storage controller 130 copies a particular set of snapshot data from storage media 114 into other media devices 119 or to a different location in storage media 114. The storage media containing the snapshot data is referred to generally as snapshot storage media 118 and is shown separately from storage media 114 in
After the snapshot operation, real-time read and write data can continue to be accessed in storage media 114 while the stock transactions from the previous day are isolated as read only data in snapshot storage media 118. The client database application 116 is then free to generate reports for the stock transactions from the previous day from snapshot storage media 118. The advantage of this method is that snapshot storage media 118 will not be constantly updated with new transaction data and thus have superior performance from the perspective of client database application 116. Reports run against storage media 114 would generate the same result, but will include content with real-time updates and thus be slower.
The storage controller 130 needs to ensure that the data in snapshot storage media 118 is accurate with respect to a particular point in time. Data operations should not be in transit when the snapshot operations are performed. For example, the client application 116 should not be performing account balance updates for the stock transactions for the previous day while the storage controller 130 is generating the snapshot data in media 118. Otherwise, the account balance updates may be inconsistent with the stock transactions in snapshot media 18. Specifically, the snapshot operation may be performed within storage controller 130 and not be visible to Storage Access System 100 as no write operations are performed as the snapshot is created.
In block 306 the storage controller 130 is then free to perform the snapshot operations described above in
The client device 106 in block 310 remounts the media devices 120 for example by sending mount requests to the client operating system. The client application 116 is then restarted on the client device 106 in block 312. The client application 116 can then go back to performing real-time write and read operations 102 with the storage media 114. The client database application 106 can also start generating the stock transaction reports for the previous day from the data in snapshot storage media 118.
One of the problems with these snapshot operations or any other offline operations, is that data is changed or updated by the storage controller 130 offline from the read and write operations that normally pass through storage access system 100. Because the storage access system 100 cannot monitor these snapshot operations, the proxy device 105 cannot keep the data in tiering media 110 coherent with the data in storage media 114. Other than the rescan operation, client requests to its operating system to mount and unmount devices are not visible on the storage interface.
For example, the tiering media 110 may currently contain some of the snapshot data for stock transactions that happened two days ago. However, after the snapshot operations in
Table 1 below shows two control operations conducted using the Small Computer System Interface (SCSI) protocol. The proxy 105 uses these control operations to determine when to invalidate or clear data in tiering media 110. A first SCSI bus rescan operation enumerates all devices on the SCSI bus. The rescan operation references each device on the SCSI bus and is used for adding devices to the SCSI bus or to identity a removed device. The rescan operation is typically performed after a snapshot operation when the media devices 120 are remounted in block 310 in
A second SCSI device inquiry message obtains parameters for specified SCSI target devices that have already been scanned and applies to the SCSI devices specifically referenced in the device inquiry message. For example, the SCSI bus rescan indicates a particular number of media devices 120 in the storage media 114 and the SCSI device inquiry identifies the size and other parameters of the individual media devices 120.
The SCSI bus rescan is typically associated with a complete reconfiguration of a SCSI device. However, SCSI device inquiry can happen at any time and is not necessarily associated the reconfiguration of a SCSI device. For example, an initiator may issue a SCSI device inquiry to check the status of a target device. The exact cases during which rescan and inquiry operations occur depend on the operating system of the client and the exact configuration of the operating system and applications software.
The storage access system 100 includes registers, buffers, or memory that stores configuration data 107. The configuration data 107 is used by the proxy 105 to determine when to clear or invalidate data in tiering media 100. The configuration information 107 can be entered by a system administrator based on the type of control operations 103 performed in the system in
Referring to
If the control operation 103 is a bus rescan in block 704, the proxy 105 in block 706 invalidates all of the data in tiering media 706. The proxy 105 assumes that the bus rescan operation 103 followed some offline operation that possibly changed the data in storage media 114. For example, the bus rescan could have followed the snapshot operation described in
In some computer systems, client devices 106 may assume that the media devices 120 maintain the same configuration after a snapshot operation. Accordingly, the client devices 106 may not issue bus rescans after snapshot operations or after other offline operations. If there is no SCSI bus rescan, the proxy 105 will not clear the data in tiering media 110 and could supply out of date data to the client device 106.
The proxy device 105 could be programmed to clear the tiering media 110 after some other SCSI operation affiliated with an offline operation that changes data in storage media 114. For example, the proxy device 105 could be programmed to clear the tiering media 110 responsive to the SCSI device inquiry message described above in Table 1.0. Referring briefly back to
However, the client devices 106 may frequently issue SCSI device inquires to the media devices 120 to obtain device status information. Frequently clearing the tiering media 110 after each SCSI device query would substantially slow down the storage access system 100. If the data in tiering media 110 is frequently invalidated, the storage access system 100 could not provide as many hits from the faster memory devices contained in tiering media 110. The storage access system 100 could even slow memory access times below the typical speeds provided by storage media 114.
If the control operation 103 is not a SCSI bus rescan, proxy 105 in block 808 checks to see if the control operation 103 is a SCSI device inquiry. If the control operation 103 is not a SCSI device inquiry, the proxy 105 goes back to monitoring the control operations 103 in block 802. If the control operation 103 is a SCSI device inquiry, the proxy 105 in block 810 checks the configuration data 107 in block 810. Alternatively, the proxy 105 could have also checked the configuration data 107 earlier during initial device configuration.
As explained above, different computer systems may perform SCSI bus rescans and SCSI device inquires in different situations. For example, some computing systems may not perform snapshot operations. Other computer systems may decide to issue the SCSI device inquires in conjunction with the mounting of media devices after snapshot operations.
An administrator or client device 106 programs the configuration data 107 in a register or memory device. The configuration data 107 either enables or disables the proxy 105 to invalidate data in tiering media 110. The configuration data 107 may remain static during subsequent system operations or the administrator or client device 106 may dynamically set or change the configuration data 107 when a snapshot operation is performed.
The proxy device reads the configuration data 107 in block 810 to determine if SCSI device inquiries are associated with an operation, such as a snapshot operation, that requires invalidation of at least some data in tiering media 110. For example, the configuration data 107 may be a bit or flag that is set to notify the proxy 105 to clear data in the tiering media 110 whenever a SCSI device inquiry is detected. The configuration data 107 can be set via an administration script based on a time of day, initiation of a snapshot operation, or based on any other event that can change coherency between data in storage media 114 and data in tiering media 110.
If the configuration data 107 is not set in block 810, the proxy 105 moves back to block 802 and waits for the next control operation. Otherwise, the proxy 105 in block 812 invalidates the data in tiering media 110 associated with the particular media device 120 identified in the SCSI device inquiry.
For example, data in tiering media 110 is mapped to a particular media device 120 and to a particular address or block address in the media device 120. The proxy 105 searches for any data in tiering media 110 that maps to the media device 120 identified in the SCSI device inquiry. The proxy 105 then invalidates the identified data or blocks of data in operation 812. In another example, the device referenced in the SCSI device inquiry may represent multiple disks or a stripe of data across multiple disks in a device volume. The proxy 105 in operation 812 only invalidates the data in tiering media 110 associated with those particular disks or device volume.
Thus, outdated data is invalidated in the tiering media 110 even when the client device 106 fails to issue SCSI bus rescans after snapshot operations. Invalidation based on SCSI devices inquiries is programmable. Therefore, the proxy 105 will also not unnecessarily invalidate data in the tiering media 110 for SCSI device inquiries not associated with snapshot operations or for other operations that do not require invalidation of the data in tiering media 110.
Several preferred examples have been described above with reference to the accompanying drawings. Various other examples of the application are also possible and practical. The system may be exemplified in many different forms and should not be construed as being limited to the examples set forth above.
The figures listed above illustrate preferred examples of the application and the operation of such examples. In the figures, the size of the boxes is not intended to represent the size of the various physical components. Where the same element appears in multiple figures, the same reference numeral is used to denote the element in all of the figures where it appears.
Only those parts of the various units are shown and described which are necessary to convey an understanding of the examples to those skilled in the art. Those parts and elements not shown may be conventional and known in the art.
The system described above can use dedicated processor systems, micro controllers, programmable logic devices, or microprocessors that perform some or all of the operations. Some of the operations described above may be implemented in software and other operations may be implemented in hardware.
For the sake of convenience, the operations are described as various interconnected functional blocks or distinct software modules. This is not necessary, however, and there may be cases where these functional blocks or modules are equivalently aggregated into a single logic device, program or operation with unclear boundaries. In any event, the functional blocks and software modules or features of the flexible interface can be implemented by themselves, or in combination with other operations in either hardware or software.
Claims
1. A method, comprising:
- storing, by a computing device, at least some data from a storage media in a tiering media;
- monitoring, by the computing device, memory access requests from clients to the storage media;
- supplying, by the computing device, the data in the tiering media corresponding to the memory access requests to the clients;
- monitoring, by the computing device, control operations exchanged between the clients and the storage media;
- identifying, by the computing device, a device inquiry in the control operations; and
- selectively invalidating, by the computing device, at least some of the data in the tiering media responsive to identifying the device inquiry.
2. The method of claim 1, further comprising:
- identifying a media device in the storage media identified in the device inquiry; and
- invalidating only the data in the tiering media mapping to the media device in the storage media.
3. The method of claim 1, further comprising:
- referencing configuration information; and
- invalidating the data in the tiring media according to the configuration information.
4. The method of claim 3, wherein the configuration information programmably enables invalidation of data in the tiering media when the device inquiry is detected.
5. The method of claim 1, further comprising:
- monitoring Small Computer System Interface (SCSI) communications between the clients and the storage media to identify a SCSI device inquiry; and
- selectively invalidating at least some of the data in the tiering media when the SCSI device inquiry is detected.
6. The method of claim 1, further comprising:
- monitoring for a bus rescan message in the control operations; and
- invalidating all of the data in the tiering media when the bus rescan message is identified.
7. The method of claim 6, further comprising:
- monitoring Small Computer System Interface (SCSI) communications between the clients and the storage media; and
- invalidating all of the data in the tiering media when a SCSI bus rescan message is detected in the SCSI communications.
8. The method of claim 1, wherein the device inquiry is associated with a prior snapshot operation.
9. An apparatus, comprising:
- tiering media coupled between clients and storage media;
- a configuration device configured with a parameter; and
- a processor coupled between the clients and the storage media, the processor configured to monitor memory access operations by the clients, store at least some data associated with the memory access operations in both the storage media and the tiering media, and provide the data from the tiering media to the clients according to the memory access operations;
- the processor further configured to monitor Small Computer System Interface (SCSI) communications between the clients and the storage media and invalidate at least some of the data in the tiering media when a particular SCSI message in the SCSI communications is detected and the parameter in the configuration device associates the SCSI message with an invalidation condition for the tiering media.
10. The apparatus according to claim 9, wherein the processor is further configured not to invalidate data in the tiering media when the parameter in the configuration device does not associate the SCSI message with an invalidation condition.
11. The apparatus according to claim 9, wherein the SCSI message is a device inquiry.
12. The apparatus according to claim 9, wherein the configuration device is a buffer or memory in a proxy device.
13. The apparatus according to claim 12, wherein the processor is further configured to identify a disk device in the storage media referenced in the SCSI communications and only invalidate data in the tiering media that maps to the disk device.
14. The apparatus according to claim 11, wherein the processor is further configured to invalidate all of the data in the tiering media whenever a SCSI bus rescan is detected in the SCSI communications regardless of what parameter is configured in the configuration device.
15. The apparatus according to claim 9, further comprising a storage controller configured to operate independently from the processor and perform snapshot operations of the data in the storage media and wherein the snapshot operations are hidden from the processor, and wherein the processor is configured to invalidate data in the tiering media responsive to the snapshot operations by monitoring the SCSI communications between the clients and the storage media.
16. The apparatus according to claim 9, wherein the processor and the tiering media are both part of storage access system that operates as a proxy for the memory access operations from the clients to the storage media.
17. A storage access system, comprising:
- a proxy device configured to monitor memory access requests from clients to a disk array and selectively copy data into a tiering media for servicing some of the memory access requests, wherein the proxy device is further configured to monitor control operations between the clients and the disk array and selectively invalidate at least some data in the tiering media when the control operations indicate snapshot operations were performed.
18. The storage access system according to claim 17, wherein the proxy device is configured to invalidate at least some of the data in the tiering media responsive to a Small Computer System Interface (SCSI) message identified in the control operations.
19. The storage access system according to claim 18, further comprising a programmable configuration device configured to enable the proxy device to invalidate some of the data in the tiering media when a first SCSI device inquiry message is identified in the control operations.
20. The storage access system according to claim 19, wherein the proxy device is configured to:
- invalidate all data in the tiering media when a SCSI bus rescan is identified in the control operations; and
- invalidate only a portion of the data in the tiering media when the SCSI device inquiry is identified in the control operations, wherein the portion of the data invalidated maps to a disk device in the disk array identified in the SCSI device inquiry.
Type: Application
Filed: Apr 8, 2013
Publication Date: Sep 5, 2013
Applicant: Volin Memory Inc (Mountain View, CA)
Inventor: Erik de la Iglesia (Mountain View, CA)
Application Number: 13/858,533
International Classification: G06F 3/06 (20060101);