Systems and methods for physical storage resource migration discovery

ABSTRACT

In accordance with embodiments of the present disclosure, a system may include a storage controller for managing virtual storage resources and physical storage resources of one or more information handling systems. The storage controller may be configured to, responsive to removal of a physical storage resource owned by the storage controller from a first information handling system broadcast a request to one or more other information handling systems to determine if the physical storage resource has been relocated to a second information handling system. The storage controller may also be configured to, responsive to receiving a reply from the second information handling system indicating that the physical storage resource has been relocated to the second information handling system, operate in concert with a second storage controller of the second information handling system to use the data of the physical storage resource.

TECHNICAL FIELD

The present disclosure relates in general to information handlingsystems, and more particularly to discovery of storage resourcesmigrated from one information handling system to another.

BACKGROUND

As the value and use of information continues to increase, individualsand businesses seek additional ways to process and store information.One option available to users is information handling systems. Aninformation handling system generally processes, compiles, stores,and/or communicates information or data for business, personal, or otherpurposes thereby allowing users to take advantage of the value of theinformation. Because technology and information handling needs andrequirements vary between different users or applications, informationhandling systems may also vary regarding what information is handled,how the information is handled, how much information is processed,stored, or communicated, and how quickly and efficiently the informationmay be processed, stored, or communicated. The variations in informationhandling systems allow for information handling systems to be general orconfigured for a specific user or specific use such as financialtransaction processing, airline reservations, enterprise data storage,or global communications. In addition, information handling systems mayinclude a variety of hardware and software components that may beconfigured to process, store, and communicate information and mayinclude one or more computer systems, data storage systems, andnetworking systems.

Information handling systems often use an array of storage resources,such as a Redundant Array of Independent Disks (RAID), for example, forstoring information. Arrays of storage resources typically utilizemultiple disks to perform input and output operations and can bestructured to provide redundancy which may increase fault tolerance.Other advantages of arrays of storage resources may be increased dataintegrity, throughput and/or capacity. In operation, one or more storageresources disposed in an array of storage resources may appear to anoperating system as a single logical storage unit or “virtual storageresource.” Implementations of storage resource arrays can range from afew storage resources disposed in a server chassis, to hundreds ofstorage resources disposed in one or more separate storage enclosures.

In some storage architectures, such as a Software Defined Storage (SDS)architecture, virtual storage resources may be created using physicalstorage resources that may be located among disparate servers. Forexample, a virtual storage resource may utilize storage resourceslocally or in remote servers. Disk misplacement and movement amongservers is a common problem in storage environments. When a storageresource of a virtual storage resource is unexpectedly removed from anarray, the virtual resource may run in a degraded state (e.g., withoutredundancy). A rebuild of lost data to resume to a non-degraded statemay take long periods. In addition, in many current systems, when aphysical storage resource is installed in a server, such server mayimmediately overwrite the previous data on the physical storage resourcefor incorporation into a new storage array.

SUMMARY

In accordance with the teachings of the present disclosure, thedisadvantages and problems associated with relocation of physicalstorage resources may be reduced or eliminated.

In accordance with embodiments of the present disclosure, a system mayinclude a storage controller for managing virtual storage resources andphysical storage resources of one or more information handling systems.The storage controller may be configured to, responsive to removal of aphysical storage resource owned by the storage controller from a firstinformation handling system broadcast a request to one or more otherinformation handling systems to determine if the physical storageresource has been relocated to a second information handling system. Thestorage controller may also be configured to, responsive to receiving areply from the second information handling system indicating that thephysical storage resource has been relocated to the second informationhandling system, operate in concert with a second storage controller ofthe second information handling system to use the data of the physicalstorage resource.

In accordance with these and other embodiments of the presentdisclosure, a method may include, responsive to removal of a physicalstorage resource owned by a storage controller from a first informationhandling system broadcasting a request to one or more other informationhandling systems to determine if the physical storage resource has beenrelocated to a second information handling system. The method may alsoinclude, responsive to receiving a reply from the second informationhandling system indicating that the physical storage resource has beenrelocated to the second information handling system, operating inconcert with a second storage controller of the second informationhandling system to use the data of the physical storage resource.

In accordance with these and other embodiments of the presentdisclosure, a system comprising may include a storage controller formanaging virtual storage resources and physical storage resources of oneor more information handling systems, the storage controller configuredto, responsive to insertion of a physical storage resource into a firstinformation handling system determine whether an unexpired requestassociated with the physical storage resource has been received from asecond information handling system and communicate a reply to the secondinformation handling system responsive to determining that the unexpiredrequest associated with the physical storage resource has been received.

In accordance with these and other embodiments of the presentdisclosure, a method may include, responsive to insertion of a physicalstorage resource into a first information handling system determiningwhether an unexpired request associated with the physical storageresource has been received from a second information handling system andcommunicating a reply to the second information handling systemresponsive to determining that the unexpired request associated with thephysical storage resource has been received.

Technical advantages of the present disclosure may be readily apparentto one skilled in the art from the figures, description and claimsincluded herein. The objects and advantages of the embodiments will berealized and achieved at least by the elements, features, andcombinations particularly pointed out in the claims.

It is to be understood that both the foregoing general description andthe following detailed description are examples and explanatory and arenot restrictive of the claims set forth in this disclosure.

BRIEF DESCRIPTION OF THE DRAWINGS

A more complete understanding of the present embodiments and advantagesthereof may be acquired by referring to the following description takenin conjunction with the accompanying drawings, in which like referencenumbers indicate like features, and wherein:

FIG. 1 illustrates a block diagram of an example system for physicalstorage migration discovery, in accordance with embodiments of thepresent disclosure;

FIG. 2 illustrates a flow chart of an example method for physicalstorage migration discovery performed in response to removal of astorage resource, in accordance with embodiments of the presentdisclosure; and

FIG. 3 illustrates a flow chart of an example method for physicalstorage migration discovery performed in response to insertion of astorage resource, in accordance with embodiments of the presentdisclosure.

DETAILED DESCRIPTION

Preferred embodiments and their advantages are best understood byreference to FIGS. 1 through 3, wherein like numbers are used toindicate like and corresponding parts.

For the purposes of this disclosure, an information handling system mayinclude any instrumentality or aggregate of instrumentalities operableto compute, classify, process, transmit, receive, retrieve, originate,switch, store, display, manifest, detect, record, reproduce, handle, orutilize any form of information, intelligence, or data for business,scientific, control, entertainment, or other purposes. For example, aninformation handling system may be a personal computer, a PDA, aconsumer electronic device, a network storage device, or any othersuitable device and may vary in size, shape, performance, functionality,and price. The information handling system may include memory, one ormore processing resources such as a central processing unit (“CPU”) orhardware or software control logic. Additional components of theinformation handling system may include one or more storage devices, oneor more communications ports for communicating with external devices aswell as various input and output (“I/O”) devices, such as a keyboard, amouse, and a video display. The information handling system may alsoinclude one or more buses operable to transmit communication between thevarious hardware components.

For the purposes of this disclosure, information handling resources maybroadly refer to any component system, device or apparatus of aninformation handling system, including without limitation processors,buses, memories, input-output devices and/or interfaces, storageresources, network interfaces, motherboards, electro-mechanical devices(e.g., fans), displays, and power supplies.

For the purposes of this disclosure, computer-readable media may includeany instrumentality or aggregation of instrumentalities that may retaindata and/or instructions for a period of time. Computer-readable mediamay include, without limitation, storage media such as a direct accessstorage device (e.g., a hard disk drive or floppy disk), a sequentialaccess storage device (e.g., a tape disk drive), compact disk, CD-ROM,DVD, random access memory (“RAM”), read-only memory (“ROM”),electrically erasable programmable read-only memory (“EEPROM”), and/orflash memory; as well as communications media such as wires, opticalfibers, microwaves, radio waves, and other electromagnetic and/oroptical carriers; and/or any combination of the foregoing.

Information handling systems often use an array of physical storageresources (e.g., disk drives), such as a Redundant Array of IndependentDisks (“RAID”), for example, for storing information. Arrays of physicalstorage resources typically utilize multiple disks to perform input andoutput operations and can be structured to provide redundancy which mayincrease fault tolerance. Other advantages of arrays of physical storageresources may be increased data integrity, throughput and/or capacity.In operation, one or more physical storage resources disposed in anarray of physical storage resources may appear to an operating system asa single logical storage unit or “logical unit.” Implementations ofphysical storage resource arrays can range from a few physical storageresources disposed in a chassis, to hundreds of physical storageresources disposed in one or more separate storage enclosures.

FIG. 1 illustrates a block diagram of an example system 100 for physicalstorage migration discovery, in accordance with embodiments of thepresent disclosure. As shown in FIG. 1, system 100 may comprise aplurality of information handling systems 102 coupled to one another vianetwork 110.

In some embodiments, information handling system 102 may comprise aserver. In these and other embodiments, information handling system 102may comprise a personal computer. As depicted in FIG. 1, informationhandling system 102 may include a processor 103, a memory 104communicatively coupled to processor 103, a storage controller 106communicatively coupled to processor 103, a network interface 108coupled to processor 103, and one or more storage resources 112communicatively coupled to storage controller 106.

Processor 103 may include any system, device, or apparatus configured tointerpret and/or execute program instructions and/or process data, andmay include, without limitation, a microprocessor, microcontroller,digital signal processor (DSP), application specific integrated circuit(ASIC), or any other digital or analog circuitry configured to interpretand/or execute program instructions and/or process data. In someembodiments, processor 103 may interpret and/or execute programinstructions and/or process data stored in memory 104, storage resources112, and/or another component of information handling system 102.

Memory 104 may be communicatively coupled to processor 103 and mayinclude any system, device, or apparatus configured to retain programinstructions and/or data for a period of time (e.g., computer-readablemedia). Memory 104 may include RAM, EEPROM, a PCMCIA card, flash memory,magnetic storage, opto-magnetic storage, or any suitable selectionand/or array of volatile or non-volatile memory that retains data afterpower to information handling system 102 is turned off.

Storage controller 106 may be communicatively coupled to processor 103and may include any system, device, or apparatus configured to serve asan interface between processor 103 and storage resources 112 of aninformation handling system 102 to facilitate communication of databetween processor 103 and storage resources 112 in accordance with anysuitable standard or protocol. In addition, storage controller 106 maybe configured to manage physical storage resource migration discoveroperations, as described in greater detail in this disclosure withrespect to FIGS. 2 and 3. In some embodiments, storage controller 106may comprise a RAID controller. Although storage controller 106 isdepicted as comprising a component independent of processor 106, in someembodiments, storage controller 106 may be embodied as a program ofinstructions stored on computer-readable media accessible by andexecutable on processor 103.

A network interface 108 may include any suitable system, apparatus, ordevice operable to serve as an interface between an associatedinformation handling system 102 and network 110. Network interface 108may enable its associated information handling system 102 to communicatewith the external network using any suitable transmission protocol(e.g., TCP/IP) and/or standard (e.g., IEEE 802.11, Wi-Fi). In certainembodiments, network interface 108 may include a physical NIC. In thesame or alternative embodiments, network interface 108 may be configuredto communicate via wireless transmissions. In the same or alternativeembodiments, network interface 108 may provide physical access to anetworking medium and/or provide a low-level addressing system (e.g.,through the use of Media Access Control addresses). In some embodiments,network interface 108 may be implemented as a local area network (“LAN”)on motherboard (“LOM”) interface. Network interface 108 may comprise oneor more suitable network interface cards, including without limitation,mezzanine cards, network daughter cards, etc.

Network 110 may be a network and/or fabric configured to communicativelycouple information handling systems to each other. In certainembodiments, network 110 may include a communication infrastructure,which provides physical connections, and a management layer, whichorganizes the physical connections of information handling systems 102and other devices coupled to network 110. Network 110 may be implementedas, or may be a part of, a storage area network (SAN), personal areanetwork (PAN), local area network (LAN), a metropolitan area network(MAN), a wide area network (WAN), a wireless local area network (WLAN),a virtual private network (VPN), an intranet, the Internet or any otherappropriate architecture or system that facilitates the communication ofsignals, data and/or messages (generally referred to as data). Network110 may transmit data using any storage and/or communication protocol,including without limitation, Fibre Channel, Fibre Channel over Ethernet(FCoE), Small Computer System Interface (SCSI), Internet SCSI (iSCSI),Frame Relay, Ethernet Asynchronous Transfer Mode (ATM), Internetprotocol (IP), or other packet-based protocol, and/or any combinationthereof. Network 110 and its various components may be implemented usinghardware, software, or any combination thereof.

Physical storage resources 112 may be disposed in one or more storageenclosures configured to hold and power storage resources 112. Storageresources 112 may include hard disk drives, magnetic tape libraries,optical disk drives, magneto-optical disk drives, compact disk drives,compact disk arrays, disk array controllers, and/or any other system,apparatus or device operable to store media.

In operation, one or more storage resources 112 may appear to anoperating system or virtual machine executing on information handlingsystem 102 as a single logical storage unit or virtual storage resource118. For example, each such virtual storage resource 118 may comprise aRAID. Thus, in some embodiments, a virtual storage resource 118 maycomprise a redundant array of storage resources 112, wherein at leastone of the storage resources 112 making up the virtual storage resource118 enables data redundancy in order to avoid loss of data in the eventof failure and/or removal of one of the storage resources making up thevirtual storage resource. In the same or alternative embodiments,virtual storage resource 118 may be implemented using a RAID standard.

Although FIG. 1 depicts each virtual storage resource 118 as includingfour storage resources 112, it is understood that a virtual storageresource 118 may comprise any number of storage resources 112. Also,although FIG. 1 depicts each virtual storage resource 118 having memberstorage resources 112 all located locally within the same informationhandling system 102, in some embodiments, member storage resources 112of a single virtual storage resource 118 may be spread out acrossmultiple information handling systems 102.

As shown in FIG. 1, each storage resource 112 may store metadataincluding a current unique identifier 114 (UID_CURRENT) and a pastunique identifier 116 (UID_PAST). A unique identifier may comprise analphabetic, numeric, or alphanumeric string uniquely identifying astorage resource 112 from other storage resources 112. For example, aunique identifier may include the name/number of an information handlingsystem 102 or chassis in which it is installed, a name/number of virtualstorage resource 118 in which it is a member, and a name/numberidentifying the storage resource 112 within its virtual storage resource118. Current unique identifier 114 may comprise the most recent uniqueidentifier for a storage resource 112, while past unique identifier 116may comprise the second-most recent unique identifier for the storageresource 112.

In addition to processor 103, memory 104, storage controller 106,network interface 108, and storage resources 112, information handlingsystem 102 may include one or more other information handling resources.

FIG. 2 illustrates a flow chart of an example method 200 for physicalstorage migration discovery performed in response to removal of astorage resource 112, in accordance with embodiments of the presentdisclosure. According to certain embodiments, method 200 may begin atstep 202. As noted above, teachings of the present disclosure may beimplemented in a variety of configurations of system 100 as shown inFIG. 1. As such, the preferred initialization point for method 200 andthe order of the steps comprising method 200 may depend on theimplementation chosen.

At step 202, in response to a removal of a storage resource 112 from aninformation handling system 102, a storage controller 106 controllingthe virtual storage resource 118 for which the removed storage resource112 was a member may calculate an estimated rebuild time to rebuild dataof the removed storage resource 112 in order to return the virtualstorage resource 118 to a non-degraded state.

At step 204, the storage controller 106 may determine whether theestimated rebuild time is greater than a threshold amount of time,wherein the threshold amount of time may be that deemed significantenough to be worth delaying a rebuild operation in hope of discoveringthe removed storage resource 112 in another information handling system102. In some embodiments, the threshold amount of time may beuser-configurable. In other embodiments, the threshold amount of timemay be automatically configured by a vendor, manufacturer, or otherprovider of an information handling system 102 or a component thereof.If the estimated rebuild time is less than the threshold amount of time,method 200 may proceed to step 216. Otherwise, if the estimated rebuildtime exceeds the threshold amount of time, method 200 may proceed tostep 206.

At step 206, the storage controller 106 may determine a timeout periodbefore beginning the rebuild process for data of the removed storageresource 112. In some embodiments, the timeout period may beuser-configurable. In these and other embodiments, the timeout periodmay be a particular fraction or percentage (e.g., 10%) of the estimatedrebuild time.

At step 208, the storage controller 106 may broadcast a request to otherinformation handling systems 102, wherein the request may include thetimeout period and/or the current unique identifier 114 of the removedstorage resource 112 at the time it was removed. As described below withrespect to FIG. 3, the request may cause other information handlingsystems 102 to refrain from using a storage resource 112 having theunique identifier of the removed storage resource or refrain from usingany newly-installed storage resource for the timeout period.

At step 210, the storage controller 106 may determine if a reply hasbeen received from another information handling system 102 indicatingthat the removed storage resource 112 has been relocated to such otherinformation handling system 102. If such a reply is received, method 200may proceed to step 214. Otherwise, method 200 may proceed to step 212.

At step 212, the storage controller 106 may determine if the timeoutperiod has expired. If the timeout period has expired, method 200 mayproceed to step 216. Otherwise, method 200 may proceed again to step210.

At step 214, in response to receiving a reply indicating that theremoved storage resource 112 has been relocated to another informationhandling system 102, the storage controller 106 and the otherinformation handling system 102 may operate in concert such that thevirtual storage resource 118 from which the removed and relocatedstorage resource 112 was removed may use the data of the removed andrelocated storage resource 112 in accordance with a policy. Examples ofsuch policies are discussed in greater detail below. After completion ofstep 214, method 200 may end.

At step 216, the storage controller 106 may rebuild the virtual storageresource 118 from which the removed storage resource 112 was removed.After completion of step 216, method 200 may end.

Although FIG. 2 discloses a particular number of steps to be taken withrespect to method 200, it may be executed with greater or lesser stepsthan those depicted in FIG. 2. In addition, although FIG. 2 discloses acertain order of steps to be taken with respect to method 200, the stepscomprising method 200 may be completed in any suitable order.

Method 200 may be implemented using system 100, components thereof orany other system such as those shown in FIG. 1 operable to implementmethod 200. In certain embodiments, method 200 may be implementedpartially or fully in software and/or firmware embodied incomputer-readable media.

FIG. 3 illustrates a flow chart of an example method 300 for physicalstorage migration discovery performed in response to insertion of astorage resource 112, in accordance with embodiments of the presentdisclosure. According to certain embodiments, method 300 may begin atstep 302. As noted above, teachings of the present disclosure may beimplemented in a variety of configurations of system 100 as shown inFIG. 1. As such, the preferred initialization point for method 300 andthe order of the steps comprising method 300 may depend on theimplementation chosen.

At step 302, in response to insertion of a storage resource 112 into aninformation handling system 102, a storage controller 106 associatedwith the information handling system 102 may transfer the current uniqueidentifier 114 for the storage resource 112 to the past uniqueidentifier 116 for the storage resource 112, and then assign a newcurrent unique identifier 114 for the storage resource 112.

At step 304, the storage controller 106 may determine if there exists anunexpired timeout period in connection with a request (e.g., a requestsuch as that made in step 208 of method 200) from another informationhandling system 102. If no unexpired timeout period exists, method 300may proceed to step 314. Otherwise, method 300 may proceed to step 306.

At step 306, storage controller 106 may prevent the newly-insertedstorage resource 112 from being used by the information handling system102. At step 308, storage controller 106 may determine if thenewly-inserted storage resource 112 has a past unique identifier 116equal to a unique identifier associated with a request (e.g., a requestsuch as that made in step 208 of method 200) received by the storagecontroller 106 having an unexpired timeout period. If the newly-insertedstorage resource 112 has a past unique identifier 116 equal to a uniqueidentifier associated with a request received by the storage controller106 having an unexpired timeout period, method 300 may proceed to step310. Otherwise, method 300 may proceed to step 314.

At step 310, the storage controller 112 may communicate a reply to theinformation handling system 102 that sent the request, indicating thatthe past unique identifier 116 of storage resource 112 matches that setforth in the request. At step 312, the storage controller 106 and theother information handling system 102 may operate in concert such thatthe virtual storage resource 118 from which the storage resource 112 wasremoved may use the data of the removed and relocated storage resource112 in accordance with a policy. Examples of such policies are discussedin greater detail below. After completion of step 312, method 300 mayend.

At step 314, storage controller 106 may use the newly-inserted storageresource 112. After completion of step 312, method 300 may end.

Although FIG. 3 discloses a particular number of steps to be taken withrespect to method 300, it may be executed with greater or lesser stepsthan those depicted in FIG. 3. In addition, although FIG. 3 discloses acertain order of steps to be taken with respect to method 300, the stepscomprising method 300 may be completed in any suitable order.

Method 300 may be implemented using system 100, components thereof orany other system such as those shown in FIG. 1 operable to implementmethod 300. In certain embodiments, method 300 may be implementedpartially or fully in software and/or firmware embodied incomputer-readable media.

As discussed above, when a storage resource 112 removed from oneinformation handling system 102 is discovered as being inserted intoanother information handling system 102, the storage controllers 106 ofthe source and recipient information handling systems 102 may act inconcert to apply a policy. One policy that may be implemented is aremote ownership policy, in which the storage controller 106 of thesource information handling system 102 takes ownership of the relocatedstorage resource 112 and continues I/O operations with the relocatedstorage resource 112 as a member of the virtual storage resource 118from which it was removed. Thus, the virtual storage resource 118 may bereturned to a non-degraded state within the timeout duration, thuscompletely avoiding rebuild.

A second policy that may be implemented is a cloning and release policy,in which the storage controller 106 of the source information handlingresource 102 clones the data from the relocated storage resource 112 atthe recipient information handling system 102 to a storage resource 112local to the source information handling system 102, returning a virtualstorage resource 118 from which the relocated storage resource 112 wasremoved to a non-degraded state. After cloning is complete, the storagecontroller 106 of the source information handling resource 102 mayrelease ownership of the relocated storage resource 112 to the recipientinformation handling system 102.

A third policy that may be implemented is a release policy, in which thesource information handling system 102 may discover the recipientinformation handling system 102 to which a storage resource 112 isrelocated, but then not use the data. At that time, the sourceinformation handling system 102 may release the ownership of therelocated storage resource 112 to the recipient information handlingsystem 102. Thus, the recipient information handling system 102 need notwait for the timeout period, thereby saving significant time beforestarting to use the relocated storage resource 112.

A fourth policy that may be implemented is a release with arraymigration from the source information handling system 102 to therecipient information handling system 102. Under this policy, thestorage controller 106 of the source information handling system 102 maydiscover member storage resources 112 of a virtual storage resource 118relocated to a recipient information handling system 102. In such case,the storage controller 106 of the source information handling system 102may release ownership of the relocated storage resources 112 to therecipient information handling system, and communicate the virtualstorage resource 118 configuration to the storage controller 106 of therecipient information handling system 102 so that the recipientinformation handling system 102 can locally utilize the relocatedvirtual storage resource.

As used herein, when two or more elements are referred to as “coupled”to one another, such term indicates that such two or more elements arein electronic communication or mechanical communication, as applicable,whether connected indirectly or directly, with or without interveningelements.

This disclosure encompasses all changes, substitutions, variations,alterations, and modifications to the example embodiments herein that aperson having ordinary skill in the art would comprehend. Similarly,where appropriate, the appended claims encompass all changes,substitutions, variations, alterations, and modifications to the exampleembodiments herein that a person having ordinary skill in the art wouldcomprehend. Moreover, reference in the appended claims to an apparatusor system or a component of an apparatus or system being adapted to,arranged to, capable of, configured to, enabled to, operable to, oroperative to perform a particular function encompasses that apparatus,system, or component, whether or not it or that particular function isactivated, turned on, or unlocked, as long as that apparatus, system, orcomponent is so adapted, arranged, capable, configured, enabled,operable, or operative.

All examples and conditional language recited herein are intended forpedagogical objects to aid the reader in understanding the disclosureand the concepts contributed by the inventor to furthering the art, andare construed as being without limitation to such specifically recitedexamples and conditions. Although embodiments of the present disclosurehave been described in detail, it should be understood that variouschanges, substitutions, and alterations could be made hereto withoutdeparting from the spirit and scope of the disclosure.

What is claimed is:
 1. A system comprising: a storage controller formanaging virtual storage resources and physical storage resources of oneor more information handling systems, the storage controller configuredto, responsive to removal of a physical storage resource owned by thestorage controller from a first information handling system: broadcast arequest to one or more other information handling systems to determineif the physical storage resource has been relocated to a secondinformation handling system; responsive to receiving a reply from thesecond information handling system indicating that the physical storageresource has been relocated to the second information handling system,operate in concert with a second storage controller of the secondinformation handling system to use data of the physical storageresource; determine a timeout period before beginning a rebuild processfor data of the physical storage resource; and rebuild the virtualstorage resource using a second physical storage resource responsive toexpiration of the timeout period before receiving a reply from thesecond information handling system indicating that the physical storageresource has been relocated to the second information handling system.2. The system of claim 1, wherein using the data of the physical storageresource comprises the storage controller assuming remote ownership ofthe physical storage resource and managing the physical storage resourceas a member of a virtual storage resource from which the physicalstorage resource was removed.
 3. The system of claim 1, wherein usingthe data of the physical storage resource comprises the storagecontroller cloning data of the physical storage resource to a secondphysical storage resource owned by the storage controller and managingthe second physical storage resource as a member of a virtual storageresource from which the physical storage resource was removed.
 4. Thesystem of claim 1, wherein the storage controller is configured to,responsive to receiving a reply from the second information handlingsystem indicating that the physical storage resource has been relocatedto the second information handling system, release the physical storageresource to the second information handling system.
 5. The system ofclaim 1, wherein the storage controller is configured to, responsive toreceiving a reply from the second information handling system indicatingthat the physical storage resource has been relocated to the secondinformation handling system, communicate configuration information for avirtual storage resource from which the physical storage resource wasremoved to the second information handling system such that theownership of the virtual storage resource is transferred to the secondinformation handling system.
 6. The system of claim 1, the storagecontroller further configured to, responsive to removal of the physicalstorage resource: calculate an estimated rebuild time to rebuild avirtual storage resource from which the physical storage resource wasremoved to a non-degraded state; determine the estimated rebuild time isgreater than a threshold amount of time; and broadcast the requestresponsive to a determination that the estimated rebuild time is greaterthan the threshold amount of time.
 7. The system of claim 6, the storagecontroller configured to rebuild the virtual storage resource using asecond physical storage resource responsive to a determination that theestimated rebuild time is lesser than the threshold amount of time.
 8. Amethod comprising, responsive to removal of a physical storage resourceowned by a storage controller from a first information handling system:broadcasting a request to one or more other information handling systemsto determine if the physical storage resource has been relocated to asecond information handling system; responsive to receiving a reply fromthe second information handling system indicating that the physicalstorage resource has been relocated to the second information handlingsystem, operating in concert with a second storage controller of thesecond information handling system to use data of the physical storageresource; determining a timeout period before beginning a rebuildprocess for data of the physical storage resource; and rebuilding avirtual storage resource using a second physical storage resourceresponsive to expiration of the timeout period before receiving a replyfrom the second information handling system indicating that the physicalstorage resource has been relocated to the second information handlingsystem.
 9. The method of claim 8, wherein using the data of the physicalstorage resource comprises the storage controller assuming remoteownership of the physical storage resource and managing the physicalstorage resource as a member of a virtual storage resource from whichthe physical storage resource was removed.
 10. The method of claim 8,wherein using the data of the physical storage resource comprises thestorage controller cloning data of the physical storage resource to asecond physical storage resource owned by the storage controller andmanaging the second physical storage resource as a member of a virtualstorage resource from which the physical storage resource was removed.11. The method of claim 8, further comprising, responsive to receiving areply from the second information handling system indicating that thephysical storage resource has been relocated to the second informationhandling system, releasing the physical storage resource to the secondinformation handling system.
 12. The method of claim 11, furthercomprising, responsive to receiving a reply from the second informationhandling system indicating that the physical storage resource has beenrelocated to the second information handling system, communicatingconfiguration information for a virtual storage resource from which thephysical storage resource was removed to the second information handlingsystem such that the ownership of the virtual storage resource istransferred to the second information handling system.
 13. The method ofclaim 8, further comprising, responsive to removal of the physicalstorage resource: calculating an estimated rebuild time to rebuild avirtual storage resource from which the physical storage resource wasremoved to a non-degraded state; determining the estimated rebuild timeis greater than a threshold amount of time; and broadcasting the requestresponsive to a determination that the estimated rebuild time is greaterthan the threshold amount of time.
 14. The method of claim 13, furthercomprising rebuilding the virtual storage resource using a secondphysical storage resource responsive to a determination that theestimated rebuild time is lesser than the threshold amount of time.