Skip to main content
NetApp Knowledge Base

E-Series: How does the Thin Volume feature works?

Views:
1,290
Visibility:
Public
Votes:
0
Category:
e-series-systems
Specialty:
esg
Last Updated:

 

Applies to

  • NetApp E-Series
  • Thin Provisioning
  • Initiator side defragmentation / TRIM

Answer

  1. Host sends an UNMAP command to reclaim unused storage blocks on the E-series thin provisionned (TPV) volume.
  2. The 64KB clusters in the TPV are immediately marked as “free”. These free clusters in the index will be used first to prevent further repository growth on host writes.
  3. When there are “enough” free clusters -which is dependent on the repository size- periodic defrag scans will shift the free clusters together into contiguous 4GB C-stripes that can be freed and returned to the pool (min of 4GB at a time, but this varies depending on the size of repository and UNMAP operation).
  4. Depending on the number of unused storage blocks to be reclaimed and the size of repository,  different goals and thresholds for the defrag scans will be set.
  5. Data may not go back to the Dynamic Disk Pool (DDP) for a while since these scans are specifically throttled to maintain an acceptable performance penalty. When the scans reach their target based of the repository size, the number of blocks to be reclaimed, it will give the freed C-stripes back to the DDP. It’s also worth noting that the freed clusters can still be reused by the  TPV even though they haven’t been given back to the DDP via repository TRIM.

Additional Information

  • A point of confusion to users is that not all UNMAP operations issued on the initiator end will translate to space being returned to the DDP.
  • Maximum size for thin provisionned volume is 256 TiB.
  • More details about Dynamic Disk Pool and thin provisionning can be found in the SANtricity OS Dynamic Disk Pools technical report.

 

NetApp provides no representations or warranties regarding the accuracy or reliability or serviceability of any information or recommendations provided in this publication or with respect to any results that may be obtained by the use of the information or observance of any recommendations provided herein. The information in this document is distributed AS IS and the use of this information or the implementation of any recommendations or techniques herein is a customer's responsibility and depends on the customer's ability to evaluate and integrate them into the customer's operational environment. This document and the information contained herein may be used solely in connection with the NetApp products discussed in this document.