STORAGE VOLUME SYNCHRONIZATIONS RESPONSIVE TO COMMUNICATION LINK RECOVERIES

    公开(公告)号:US20230049823A1

    公开(公告)日:2023-02-16

    申请号:US17444776

    申请日:2021-08-10

    Inventor: Ayman Abouelwafa

    Abstract: In some examples, a system detects recovery, from an unavailable state, of a communication link between a first storage system that includes a first storage volume and a second storage system that includes a second storage volume that is to be a synchronized version of the first storage volume, where while the communication link is in the unavailable state the second storage volume is in an offline state and the first storage volume is in an online state. In response to detecting the recovery of the communication link, the system sends a first tracking metadata for the first storage volume from the first storage system to the second storage system, and in response to receipt of the first tracking metadata at the second storage system that maintains a second tracking metadata for the second storage volume, the system transitions the second storage volume from the offline state to a controlled online state, and initiates a synchronization process to synchronize the second storage volume with the first storage volume.

    Compressed extent versions
    3.
    发明授权

    公开(公告)号:US11119682B2

    公开(公告)日:2021-09-14

    申请号:US16526180

    申请日:2019-07-30

    Abstract: Examples include compressed extent versions. Examples may create an empty target virtual volume tree having a tree structure of a source virtual volume tree of a source storage system, the source virtual volume tree comprising source base and source snapshot virtual volumes, each representing respective versions of a plurality of extents, wherein each of the extents corresponds to a different portion of an address space of the source base virtual volume. Examples may include compressed extent collections, each comprising a compressed representation of multiple populated versions of a single extent from the source base and snapshot virtual volumes, the multiple populated versions compressed relative to one another.

    COMPRESSED EXTENT VERSIONS
    4.
    发明申请

    公开(公告)号:US20210034265A1

    公开(公告)日:2021-02-04

    申请号:US16526180

    申请日:2019-07-30

    Abstract: Examples include compressed extent versions. Examples may create an empty target virtual volume tree having a tree structure of a source virtual volume tree of a source storage system, the source virtual volume tree comprising source base and source snapshot virtual volumes, each representing respective versions of a plurality of extents, wherein each of the extents corresponds to a different portion of an address space of the source base virtual volume. Examples may include compressed extent collections, each comprising a compressed representation of multiple populated versions of a single extent from the source base and snapshot virtual volumes, the multiple populated versions compressed relative to one another.

    Storage controller sub-LUN ownership mapping and alignment

    公开(公告)号:US10585629B2

    公开(公告)日:2020-03-10

    申请号:US15964744

    申请日:2018-04-27

    Abstract: A sub-LUN ownership mapping for multiple storage controllers of a first storage array is generated. The sub-LUN ownership mapping indicates ownership of sub-LUNs by the multiple storage controllers of the first storage array. The sub-LUN ownership mapping is transmitted to a storage controller of a second storage array. A request to align sub-ownership is sent to the storage controller of the second storage array. Ownership is aligned for one or more sub-LUNS for multiple storage controllers of the second storage array.

    OBJECT ACCESS BASED ON TRACKING OF OBJECTS AND REPLICATION POLICIES

    公开(公告)号:US20240143620A1

    公开(公告)日:2024-05-02

    申请号:US18051046

    申请日:2022-10-31

    Inventor: Ayman Abouelwafa

    CPC classification number: G06F16/27

    Abstract: In some examples, a system tracks, in tracking information stored by the system, additions and deletions of objects in a plurality of object stores that are associated with respective control interfaces that control access of the objects in the plurality of object stores, the tracking information identifying a respective object store in which a respective object is stored, and a replication policy for the respective object, the replication policy defining how the respective object is replicated across the plurality of object stores. The system receives, from the control interfaces, indications of additions or deletions of objects in the plurality of object stores, and updates, at the system, the tracking information in response to the received indications.

    DATA MIGRATION USING CACHE STATE CHANGE

    公开(公告)号:US20220244876A1

    公开(公告)日:2022-08-04

    申请号:US17166009

    申请日:2021-02-03

    Abstract: In some examples, for migrating data from a first storage system to a second storage system, a system creates a proxy at the first storage system to direct write requests received at the first storage system to the second storage system, initially sets a cache in the first storage system to a first state in which the cache stores write data for first write requests, and changes a state of the cache from the first state to a second state in which write data for second write requests bypasses the cache and are directed by the proxy to the second storage system.

    Sub-LUN Ownership Alignment
    8.
    发明申请

    公开(公告)号:US20190332271A1

    公开(公告)日:2019-10-31

    申请号:US15964744

    申请日:2018-04-27

    Abstract: A sub-LUN ownership mapping for multiple storage controllers of a first storage array is generated. The sub-LUN ownership mapping indicates ownership of sub-LUNs by the multiple storage controllers of the first storage array. The sub-LUN ownership mapping is transmitted to a storage controller of a second storage array. A request to align sub-ownership is sent to the storage controller of the second storage array. Ownership is aligned for one or more sub-LUNS for multiple storage controllers of the second storage array.

    DATA ENCRYPTION DETECTION
    9.
    发明公开

    公开(公告)号:US20230306108A1

    公开(公告)日:2023-09-28

    申请号:US17700958

    申请日:2022-03-22

    CPC classification number: G06F21/552 G06F2221/034

    Abstract: In some examples, a system applies an inline detection of a write of data in a storage, the inline detection to detect potential data encryption of the data. In response to an indication of the potential data encryption, the system creates a first object that represents a first version of the data, and applies a further analysis to determine whether the potential data encryption constitutes unauthorized data encryption, the further analysis based on the first object and a second object that represents a second version of the data that is prior to the first version of the data.

    Tracking changes of storage volumes during data transfers

    公开(公告)号:US11755226B2

    公开(公告)日:2023-09-12

    申请号:US17025080

    申请日:2020-09-18

    CPC classification number: G06F3/0647 G06F3/065 G06F3/067 G06F3/0619

    Abstract: In some examples, a system transfers, in a first transfer operation, data of a first storage volume of a first storage location to a second storage volume for a second storage location. Responsive to a completion of the transfer of data of the first storage volume to the second storage volume, the system activates tracking information to track changes to data portions of the second storage volume, the tracking information comprising a plurality of indicators that map to respective different data portions of the second storage volume. As part of a second transfer operation following the first transfer operation, the system transfers changed data indicated by the tracking information from the second storage volume to the first storage volume, without transferring unchanged data in the second storage volume to the first storage volume.

Patent Agency Ranking