CS 423 – Operating Systems Design Lecture 4

Total Page:16

File Type:pdf, Size:1020Kb

CS 423 – Operating Systems Design Lecture 4 CS 423 – Operating Systems Design Lecture 18 – File Systems and their Management and Optimization Klara Nahrstedt Fall 2011 Based on slides by YY Zhou and Andrew S. Tanenbaum CS 423 - Fall 2011 Overview Administrative announcements ◦ MP2 interviews today ◦ Homework 1 – posted today October 3 ◦ Homework 1 - deadline October 10 in class File Systems ◦ Log-Structured File Systems ◦ Journaling File Systems Disk Space Management File System Backups File System Consistency File System Performance Summary CS 423 - Fall 2011 Log-Structured File Systems CPUs getting faster + Disks getting bigger and cheaper Disk seek time is not improving => performance bottleneck Utilize fast CPU and large RAM/disk caches Satisfy all read requests directly from FS cache with no disk access needed. Deal with “small writes” because: ◦ Consider creating a new file To write this file, i-node for the directory, directory block, i-node for the file and the file itself must be written. While the writes can be delayed, doing so exposes the file system to serious consistency problems if a crash occurs before the writes are done Hence i-nodes writes are generally done immediately. CS 423 - Fall 2011 Log-structured FS Solution: ◦ LFS – Log-structured FS Idea: Structure whole disk as a log Process: ◦ All pending writes are buffered in memory and collected in a single segment ◦ Periodically (or when needed) they are written to the disk as a single contiguous segment at the end of the log. ◦ i-node map, indexed by i-number, is maintained Entry I in this map points to i-node I on the disk Map is kept on disk, but it is also cached Opening a file now consists of ◦ using the map to locate the i-node for the file ◦ Once the i-node has been located, the addresses of blocks can be found from it. LFS has cleaner thread that spends its time scanning log circularly to compact it since after some time not all blocks are used CS 423 - Fall 2011 Journaling File Systems Idea: ◦ keep log of what FS is going to do before it does it ◦ if the system crashes before it can do its planned work, upon rebooting the system can look in the log to see what was going on at the time of crash and finish the job. Solution: ◦ JFS – Journaling File Systems Linux Ext3 and Microsoft NTFS CS 423 - Fall 2011 JFS - Example Consider removing file operation 1. Remove file from its directory 2. Release i-node to the pool of free i-nodes 3. Return all disk blocks to the pool of free disk blocks Suppose the first step completes and then system crashes i-node and file blocks will not be accessible from any file, but will also not be available for reassignment – decrease of available resources If the crash occurs after the second step, only blocks are lost. JFS does: Write log entry of the three steps to be completed Write log entry to disk Only after the log entry has been written, do the individual steps JSF only works ◦ if the logged operations are idemponent CS 423 - Fall 2011 Disk Space Management (1) Disk Block Size Decision – Small Blocks or Large Blocks? Trade-offs between space efficiency on the disk and access time (data rates) CS 423 - Fall 2011 Disk Space Management (2) If we have small disk block sizes, we get high space efficiency (no wastage), But low performance (data rates); With large block sizes, we get high data rates (high performance) , but Low space utilization CS 423 - Fall 2011 Free Space Management Bit vector ◦ A bit map is kept of free blocks ◦ Each bit in a vector represents one block ◦ If the block is free, the bit is zero ◦ Simple to find n consecutive free blocks ◦ Overhead is bit map ◦ Example BSD file system CS 423 - Fall 2011 Free Space Management Free list ◦ Keep a linked list of free blocks ◦ Not very efficient because linked list needs traversal ◦ Example system V R1 CS 423 - Fall 2011 Free Space Management Linked list of indices ◦ A linked list of index blocks is kept ◦ Each index block contains addresses of free blocks and a ◦ Pointer to the next index block A large number of free blocks can be found quickly CS 423 - Fall 2011 Free Space Management Linked list of contiguous blocks that are free ◦ The free list node consists of a pointer and the number of free blocks starting from that address ◦ Blocks are joined together into larger blocks as necessary CS 423 - Fall 2011 Free Space Management (Example) CS 423 - Fall 2011 Free Space Management Issues (a) Almost-full block of pointers to free disk blocks in RAM - three blocks of pointers on disk (b) Result of freeing a 3-block file (c) Alternative strategy for handling 3 free blocks - shaded entries are pointers to free disk blocks CS 423 - Fall 2011 Disk Quota Management Quotas for keeping track of each user’s disk use CS 423 - Fall 2011 File System Reliability (1) File that has not changed A file system to be dumped (Logical Dump of directories/files) ◦ squares are directories, circles are files’ shaded items, modified since last dump; each directory & file labeled by i-node number Bit maps used by the logical dumping algorithm CS 423 - Fall 2011 File System Reliability (2) Dump Algorithm: ◦ Phase 1 – for each modified file, its i-node is marked in the bitmap and each directory is also marked (whether or not it has been modified) ◦ Phase 2 – recursively walk the tree again, unmarking any directories that have no modified files or directories in them or under them ◦ Phase 3 – scan i-nodes in numerical order and dump all directories that are marked for dumping ◦ Phase 4 – scan i-nodes in numerical order and dump files that are marked for dumping CS 423 - Fall 2011 File System Consistency fsck utility in UNIX Block Consistency – two tables ◦ 1 table – keep track of assigned blocks ◦ 2 table – keept track of free blocks CS 423 - Fall 2011 File System Consistency File system states ◦ (a) consistent ◦ After crash (b) missing block Cause no harm, but waste space and reduce capacity of disk Solution: just add missing block to the free list ◦ After crash (c) duplicate block in free list Happens only if we use list for free list (not bitmap) Solution: rebuild the free list ◦ After crash (d) duplicate data block Solution: allocate a free block, copy contents of block 5 and insert the copy into one of the files, error should be reported to allow user inspect the damage CS 423 - Fall 2011 File System Performance Access to disk – much slower than access to memory ◦ Read a memory word – 10 nsec ◦ Read from hard disk with 10MBps – 5-10 msec Methods to speed up ◦ Cache data in memory ◦ Use block read ahead method ◦ Reduce disk arm motion CS 423 - Fall 2011 File System Performance (Caching) If cache is full, use replacement techniques ◦ LRU – Least Recently Used ◦ FIFO Cache here is a collection of blocks Important method for multimedia playback CS 423 - Fall 2011 File System Performance (Block Read Ahead) Block read ahead method means ◦ Try to get blocks into the cache before they are needed ◦ Increase hit rate by prefetching anticipated blocks Approach: ◦ User requests ‘k’ block ◦ FS gets ‘k’ block ◦ FS checks of ‘k+1’ block is in cache, if not, FS will get ‘k+1’ block from disk anticipating that it will be needed in the future Advantage: if user needs ‘k+1’ block, the access is fast – great method for video playback Disadvantage: if user does not need ‘k+1’ block, extra unnecessary work has been done Recommendation: ◦ FS keeps track of access patterns to open files Sequential access mode Random access mode ◦ FS may use a bit associated with each file to keep track of access pattern (1 for sequential access, 0 for random access) CS 423 - Fall 2011 File System Performance (Reduce Disk Arm Motion) I-nodes placed at the start of the disk Disk divided into cylinder groups ◦ each with its own blocks and i-nodes CS 423 - Fall 2011 Questions Which of the following free space management schemes allows a large number of free blocks to be found quickly? ◦ Bit vector ◦ Free list ◦ Linked list with indices Consider a system in which free space is kept in a free space list. If the pointer to the free-space list is lost, the system cannot reconstruct the free space list: ◦ Is this true or false? CS 423 - Fall 2011 Conclusion Performance Optimization of File Systems is crucial Pay attention to ◦ Block sizes ◦ Placement of i-nodes ◦ Free space management ◦ File system reliability ◦ File system performance (caching, prefetching, ….) CS 423 - Fall 2011 .
Recommended publications
  • Filesystem Maintenance
    Filesystem Maintenance René Serral-Gracià Xavier Martorell-Bofill1 1Universitat Politècnica de Catalunya (UPC) May 26, 2014 Introduction Filesystems Disk verification LVM Backups Lectures 1 System administration introduction 2 Operating System installation 3 User management 4 Application management 5 System monitoring 6 Filesystem Maintenance 7 Local services 8 Network services 9 Security and Protection 10 Virtualization R. Serral-Gracià, et. al Filesystem 2 Introduction Filesystems Disk verification LVM Backups Outline 1 Introduction Goals 2 Filesystems 3 Disk verification 4 Logical Volume Manager (LVM) 5 Backups R. Serral-Gracià, et. al Filesystem 3 Introduction Filesystems Disk verification LVM Backups Goals Knowledge Filesystems Backup tools Backup media Abilities Filesystem ampliation Filesystem verification Perform and restore backups R. Serral-Gracià, et. al Filesystem 4 Introduction Filesystems Disk verification LVM Backups Outline 1 Introduction 2 Filesystems 3 Disk verification 4 Logical Volume Manager (LVM) 5 Backups R. Serral-Gracià, et. al Filesystem 5 Introduction Filesystems Disk verification LVM Backups Filesystems (I) FAT (FAT16) –> DOS Small disks (< 4GB) File names 8+3 FAT32 (VFAT) –> Win95 Larger disks Long filenames Partial definition of soft-links No owner or file access privileges exFAT FAT32 Extension Theoretical maximum capacity of 64ZiB (512TiB real) NTFS –> WinNT, XP, Vista, Windows 7 Integrates ownership and privileges (create, modify, access...) Maps to Windows NT security model R. Serral-Gracià, et. al Filesystem 6 Introduction Filesystems Disk verification LVM Backups Filesystems (II) ext2 UNIX Filesystem Soft/hard links Access privileges Long filenames ext3 Adds journaling (eases error recovery) reiserfs Files and directories organized similarly to a database Features journaling Very efficient in small files No internal block fragmentation R.
    [Show full text]
  • Oracle® Linux 7 Managing File Systems
    Oracle® Linux 7 Managing File Systems F32760-07 August 2021 Oracle Legal Notices Copyright © 2020, 2021, Oracle and/or its affiliates. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs) and Oracle computer documentation or other Oracle data delivered to or accessed by U.S. Government end users are "commercial computer software" or "commercial computer software documentation" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, reproduction, duplication, release, display, disclosure, modification, preparation of derivative works, and/or adaptation of i) Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs), ii) Oracle computer documentation and/or iii) other Oracle data, is subject to the rights and limitations specified in the license contained in the applicable contract.
    [Show full text]
  • Managing Network File Systems in Oracle® Solaris 11.4
    Managing Network File Systems in ® Oracle Solaris 11.4 Part No: E61004 August 2021 Managing Network File Systems in Oracle Solaris 11.4 Part No: E61004 Copyright © 2002, 2021, Oracle and/or its affiliates. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs) and Oracle computer documentation or other Oracle data delivered to or accessed by U.S. Government end users are "commercial computer software" or "commercial computer software documentation" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, reproduction, duplication, release, display, disclosure, modification, preparation of derivative works, and/or adaptation of i) Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs), ii) Oracle computer documentation and/or iii) other Oracle data, is subject to the rights and limitations specified in the license contained in the applicable contract.
    [Show full text]
  • Lustre 1.8 Operations Manual
    Lustre™ 1.8 Operations Manual Part No. 821-0035-12 Lustre manual version: Lustre_1.8_man_v1.4 June 2011 Copyright© 2007-2010 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, California 95054, U.S.A. All rights reserved. U.S. Government Rights - Commercial software. Government users are subject to the Sun Microsystems, Inc. standard license agreement and applicable provisions of the FAR and its supplements. Sun, Sun Microsystems, the Sun logo and Lustre are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. and other countries. UNIX is a registered trademark in the U.S. and other countries, exclusively licensed through X/Open Company, Ltd. Products covered by and information contained in this service manual are controlled by U.S. Export Control laws and may be subject to the export or import laws in other countries. Nuclear, missile, chemical biological weapons or nuclear maritime end uses or end users, whether direct or indirect, are strictly prohibited. Export or reexport to countries subject to U.S. embargo or to entities identified on U.S. export exclusion lists, including, but not limited to, the denied persons and specially designated nationals lists is strictly prohibited. DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. This work is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License. To view a copy of this license and obtain more information about Creative Commons licensing, visit Creative Commons Attribution-Share Alike 3.0 United States or send a letter to Creative Commons, 171 2nd Street, Suite 300, San Francisco, California 94105, USA.
    [Show full text]
  • DIGILIANT Windows Storage Server 2003 R2
    DIGILIANT Windows Storage Server 2003 R2 User’s Guide Copyright © 2003-2006 Digiliant, LLC. All rights reserved. The technical documentation is being delivered to you AS-IS, and Digiliant, LLC makes no warranty as to its accuracies or use. Any use of the technical documentation or the information contained therein is at the risk of the user. Documentation may include technical or other inaccuracies or typographical errors. Digiliant reserves the right to make changes without prior notice. Digiliant and the Digiliant Logo are registered trademarks of Digiliant, LLC and may not be used without written permission. Microsoft, Microsoft Windows Storage Server 2003 and all other trademarks are the property of their respective owners. No part of this documentation may be reproduced, transmitted, or translated in any form or by any means, electronic, mechanical, manual, optical, or otherwise, without the prior written permission of Digiliant, LLC. 1 OVERVIEW OF WINDOWS STORAGE SERVER 2003 R2 .......................................................................................... 1 NETWORKING ................................................................................................................................................................................. 1 Network Data Transmission Protocols ................................................................................................................................ 1 NETWORK SECURITY ....................................................................................................................................................................
    [Show full text]
  • [MS-FSCC]: File System Control Codes
    [MS-FSCC]: File System Control Codes Intellectual Property Rights Notice for Open Specifications Documentation . Technical Documentation. Microsoft publishes Open Specifications documentation for protocols, file formats, languages, standards as well as overviews of the interaction among each of these technologies. Copyrights. This documentation is covered by Microsoft copyrights. Regardless of any other terms that are contained in the terms of use for the Microsoft website that hosts this documentation, you may make copies of it in order to develop implementations of the technologies described in the Open Specifications and may distribute portions of it in your implementations using these technologies or your documentation as necessary to properly document the implementation. You may also distribute in your implementation, with or without modification, any schema, IDL's, or code samples that are included in the documentation. This permission also applies to any documents that are referenced in the Open Specifications. No Trade Secrets. Microsoft does not claim any trade secret rights in this documentation. Patents. Microsoft has patents that may cover your implementations of the technologies described in the Open Specifications. Neither this notice nor Microsoft's delivery of the documentation grants any licenses under those or any other Microsoft patents. However, a given Open Specification may be covered by Microsoft Open Specification Promise or the Community Promise. If you would prefer a written license, or if the technologies described in the Open Specifications are not covered by the Open Specifications Promise or Community Promise, as applicable, patent licenses are available by contacting [email protected]. Trademarks. The names of companies and products contained in this documentation may be covered by trademarks or similar intellectual property rights.
    [Show full text]
  • Ibm Linux Tutorials
    VISIT… LPI certification 101 (release 2) exam prep, Part 4 Presented by developerWorks, your source for great tutorials ibm.com/developerWorks Table of Contents If you're viewing this document online, you can click any of the topics below to link directly to that section. 1. Before you start......................................................... 2 2. Filesystems, partitions, and block devices ......................... 4 3. Booting the system..................................................... 21 4. Runlevels ................................................................ 25 5. Filesystem quotas...................................................... 28 6. System logs ............................................................. 34 7. Summary and resources .............................................. 38 LPI certification 101 (release 2) exam prep, Part 4 Page 1 of 40 ibm.com/developerWorks Presented by developerWorks, your source for great tutorials Section 1. Before you start About this tutorial Welcome to "Advanced administration," the last of four tutorials designed to prepare you for the Linux Professional Institute's 101 (release 2) exam. In this tutorial (Part 4), we'll bolster your knowledge of advanced Linux administration skills by covering a variety of topics including Linux filesystems, the Linux boot process, runlevels, filesystem quotas, and system logs. This tutorial is particularly appropriate for someone who may be serving as the primary sysadmin for the first time, since we cover a lot of low-level issues that all system administrators should know. If you are new to Linux, we recommend that you start with Part 1 and work through the series from there. For some, much of this material will be new, but more experienced Linux users may find this tutorial to be a great way of "rounding out" their foundational Linux system administration skills and preparing for the next LPI certification level.
    [Show full text]
  • Effective Resource Management Using Oracle Solaris and Oracle
    An Oracle White Paper June 2011 Effective Resource Management Using Oracle Solaris Resource Manager Effective Resource Management Using Oracle Solaris Resource Manager Introduction ........................................................................................... 3 Resource Management in Oracle Solaris .............................................. 4 Oracle Solaris Resource Manager ........................................................ 4 Building Blocks of Oracle Solaris Resource Manager ........................... 5 Basic Resource Management ............................................................... 5 Domain Resource Management ........................................................... 11 Fine-Grained Resource Management ................................................... 12 Memory Resource Management ........................................................... 20 Resource Management in Virtualized Environments ............................. 31 Resources ............................................................................................ 44 Effective Resource Management Using Oracle Solaris Resource Manager Introduction Application workloads on a server need to be balanced for the system efficiency. Granular resource management is a necessity to achieve the anticipated performance and service levels in any environment including virtual and consolidated environments. Without good resource management, faulty runaway workloads can bring progress to a halt causing unwanted delays to priority jobs. In addition, efficient
    [Show full text]
  • Managing Network File Systems in Oracle® Solaris 11.3
    Managing Network File Systems in ® Oracle Solaris 11.3 Part No: E54789 September 2018 Managing Network File Systems in Oracle Solaris 11.3 Part No: E54789 Copyright © 2002, 2018, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs.
    [Show full text]
  • Windows Server 2012 R2 Pocket Consultant Storage, Security, & Networking Pocket Consultant
    Windows Server 2012 R2 Consultant Pocket Storage, Security, & Networking Pocket Consultant The practical, portable guide for About the Author Windows Windows Server administrators! William R. Stanek is a Microsoft MVP with 20+ Portable and precise, this pocket-sized guide delivers years of experience in systems ready answers for administering storage, security, and management and advanced Server 2012 R2 networking features in Windows Server 2012 R2. Zero programming. He is an award- in on core procedures and operations through quick- winning author of more than reference tables, instructions, and lists. You’ll get the 150 books, including Windows focused information you need to save time and get the Server 2012 Inside Out and the & Networking Security, Storgae, Windows ServerR2 2012 job done—whether at your desk or in the field. Storage, Security, Pocket Consultants for Microsoft Exchange Server 2013, Windows Get fast facts to: 8.1, and SQL Server 2012. He is the series editor for the Pocket • Administer file systems and drives & Networking Consultant line of books. • Configure storage and implement RAID William R. Stanek • Configure file sharing and permissions Author and Series Editor • Audit system resources and implement quotas • Administer Group Policy and security settings • Install and configure DHCP servers Also Look For • Set up and optimize DNS on a network • Manage TCP/IP and network connections • Manage and troubleshoot print services • Encrypt, back up, and restore data Windows Server 2012 R2 Configuration, Storage, & Essentials Inside Out William Stanek Stanek ISBN 9780735682672 microsoft.com/mspress ISBN: 978-0-7356-8259-7 Pocket U.S.A. $39.99 Canada $41.99 [Recommended] Operating Systems/ Windows Server Celebrating 30 years! Consultant PUBLISHED BY Microsoft Press A Division of Microsoft Corporation One Microsoft Way Redmond, Washington 98052-6399 Copyright © 2014 by William R .
    [Show full text]
  • Oracle Solaris Tunable Parameters Reference Manual Provides Reference Information About Oracle Solaris OS Kernel and Network Tunable Parameters
    Oracle® SolarisTunable Parameters Reference Manual Part No: E37386–04 September S 2013 Copyright © 2000, 2013, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT END USERS. Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including anyoperating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. No other rights are granted to the U.S. Government. This software or hardware is developed for general use in a variety of information management applications.
    [Show full text]
  • Amazon Fsx for Lustre?
    FSx for Lustre Lustre User Guide FSx for Lustre Lustre User Guide FSx for Lustre: Lustre User Guide Copyright © Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not be used in connection with any product or service that is not Amazon's, in any manner that is likely to cause confusion among customers, or in any manner that disparages or discredits Amazon. All other trademarks not owned by Amazon are the property of their respective owners, who may or may not be affiliated with, connected to, or sponsored by Amazon. FSx for Lustre Lustre User Guide Table of Contents What is Amazon FSx for Lustre? ........................................................................................................... 1 Multiple deployment options ....................................................................................................... 1 Multiple storage options ............................................................................................................. 1 FSx for Lustre and data repositories ............................................................................................. 2 Amazon S3 integration ....................................................................................................... 2 On-premises data repositories ............................................................................................. 2 Accessing file systems ................................................................................................................
    [Show full text]