-
公开(公告)号:US20220058159A1
公开(公告)日:2022-02-24
申请号:US17516343
申请日:2021-11-01
Applicant: NetApp Inc.
Inventor: Rithin Kumar Shetty , Akhil Kaushik , Nagender Somavarapu , Yuedong Mu , Pranab Patnaik
IPC: G06F16/178 , G06F16/188 , G06F11/14 , G06F11/20 , G06F9/455 , H04L29/08
Abstract: One or more techniques and/or computing devices are provided for replicating virtual machine disk clones. For example, a first storage controller, hosting first storage, may have a synchronous replication relationship with a second storage controller hosting second storage. A virtual machine, within the first storage, may be specified as having synchronous replication protection. Accordingly, virtual machine disk clones of a virtual machine disk of the virtual machine may be replicated from the first storage to the second storage. For example, virtual machine disk clones may be synchronous replicated, replicated by a resync process invoked by a hypervisor agent, and/or stored and replicated from a clone backup directory.
-
公开(公告)号:US20220027065A1
公开(公告)日:2022-01-27
申请号:US17498237
申请日:2021-10-11
Applicant: NetApp Inc.
Inventor: Akhil Kaushik , Ripulkumar Hemantbhai Patel , Vrishali Dattatray Hajare , Andrew Eric Dunn , Rithin Kumar Shetty
Abstract: One or more techniques and/or computing devices are provided for resynchronization. For example, a request may be received to create pseudo snapshots of a first consistency group, hosted by a first storage controller, and a second consistency group, hosted by a second storage controller, having a synchronous replication relationship with the first consistency group. Incoming client write requests are logged within an intercept tracking log at the first storage controller. After a first drain without hold of incoming write requests is performed, a first pseudo common snapshot of the second consistency group is created. After a second drain without hold of incoming write operations is performed, a second pseudo common snapshot of the first consistency group and the intercept tracking log is created. The pseudo snapshots and the intercept tracking log (e.g., indicating a delta between the pseudo snapshots) are used to resynchronize the first and second consistency groups.
-
103.
公开(公告)号:US11199979B2
公开(公告)日:2021-12-14
申请号:US16730832
申请日:2019-12-30
Applicant: NetApp Inc.
Inventor: Pranab Patnaik , Akhil Kaushik
Abstract: One or more techniques and/or computing devices are provided for utilizing snapshots for data integrity validation and/or faster application recovery. For example, a first storage controller, hosting first storage, has a synchronous replication relationship with a second storage controller hosting second storage. A snapshot replication policy rule is defined to specify that a replication label is to be used for snapshot create requests, targeting the first storage, that are to be replicated to the second storage. A snapshot creation policy is created to issue snapshot create requests comprising the replication label. Thus a snapshot of the first storage and a replication snapshot of the second storage are created based upon a snapshot create request comprising the replication label. The snapshot and the replication snapshot may be compared for data integrity validation (e.g., determine whether the snapshots comprise the same data) and/or quickly recovering an application after a disaster.
-
公开(公告)号:US20210303165A1
公开(公告)日:2021-09-30
申请号:US17344805
申请日:2021-06-10
Applicant: NetApp Inc.
Inventor: Akhil Kaushik , Anoop Chakkalakkal VIJAYAN
IPC: G06F3/06
Abstract: Techniques are provided for overlapping write handling. Overlapping write managers are used to maintain the order that write operations are executed at a first computing environment and replicated to a second computing environment. Overlapping write managers are pre-allocated as available for managing overlapping write operations. A mapping is used to track what overlapping write managers are currently allocated for particular file handles of files. Thus, if an incoming write operation targets a file handle of an already allocated overlapping write manager, then that overlapping write manager is used to execute and replicate the incoming write operation so that the order of execution of overlapping writes by the second computing environment is the same as at the first computing environment. If there is no allocated overlapping write manager for the file handle, then a new overlapping write manager is allocated and utilized.
-
公开(公告)号:US20210224293A1
公开(公告)日:2021-07-22
申请号:US17221043
申请日:2021-04-02
Applicant: NetApp Inc.
Inventor: Akhil Kaushik , Balaji Ramani
IPC: G06F16/27 , G06F16/11 , G06F11/14 , G06F16/176
Abstract: Techniques are provided for synchronous replication based cutover. An asynchronous replication process is executed to perform asynchronous incremental transfers of data of a storage object from a first computing environment to a replicated storage object at a second computing environment until a cutover criteria is met. A synchronous replication process is executed to synchronously replicate operations, targeting the storage object, to the replicated storage object based upon the cutover criteria being met. A cutover is performed to direct operations from targeting the storage object to targeting the replicated storage object based upon the synchronous replication process reaching a steady state of synchronous replication for sub-objects of the storage object, where operations are committed to both the storage object and the replicated storage object.
-
公开(公告)号:US11068503B2
公开(公告)日:2021-07-20
申请号:US16401224
申请日:2019-05-02
Applicant: NetApp Inc.
Inventor: Akhil Kaushik , Balaji Ramani
IPC: G06F16/00 , G06F16/27 , G06F16/11 , G06F11/14 , G06F16/176
Abstract: Techniques are provided for synchronous replication based cutover. An asynchronous replication process is executed to perform asynchronous incremental transfers of data of a storage object from a first computing environment to a replicated storage object at a second computing environment until a cutover criteria is met. A synchronous replication process is executed to synchronously replicate operations, targeting the storage object, to the replicated storage object based upon the cutover criteria being met. A cutover is performed to direct operations from targeting the storage object to targeting the replicated storage object based upon the synchronous replication process reaching a steady state of synchronous replication for sub-objects of the storage object, where operations are committed to both the storage object and the replicated storage object.
-
公开(公告)号:US10970310B2
公开(公告)日:2021-04-06
申请号:US16191582
申请日:2018-11-15
Applicant: NetApp Inc.
Inventor: Akhil Kaushik , Balaji Ramani
IPC: G06F16/00 , G06F16/27 , G06F16/11 , G06F11/14 , G06F16/176
Abstract: Techniques are provided for synchronous replication based cutover. An asynchronous replication process is executed to perform asynchronous incremental transfers of data of a storage object from a first computing environment to a replicated storage object at a second computing environment until a cutover criteria is met. A synchronous replication process is executed to synchronously replicate operations, targeting the storage object, to the replicated storage object based upon the cutover criteria being met. A cutover is performed to direct operations from targeting the storage object to targeting the replicated storage object based upon the synchronous replication process reaching a steady state of synchronous replication for sub-objects of the storage object, where operations are committed to both the storage object and the replicated storage object.
-
公开(公告)号:US20210004353A1
公开(公告)日:2021-01-07
申请号:US17029920
申请日:2020-09-23
Applicant: NetApp, Inc.
Inventor: Sharad Jain , Hrishikesh Ashok Tapaswi , Ling Zheng , Onkar Bhat , Akhil Kaushik
Abstract: A storage appliance arranges snapshot data and snapshot metadata into different structures, and arranges the snapshot metadata to facilitate efficient snapshot manipulation, which may be for snapshot management or snapshot restore. The storage appliance receives snapshots according to a forever incremental configuration and arranges snapshot metadata into different types of records. The storage appliance stores these records in key-value stores maintained for each defined data collection (e.g., volume). The storage appliance arranges the snapshot metadata into records for inode information, records for directory information, and records that map source descriptors of data blocks to snapshot file descriptors. The storage appliance uses a locally generated snapshot identifier as a key prefix for the records to conform to a sort constrain of the key-value store, which allows the efficiency of the key-value store to be leveraged. The snapshot metadata arrangement facilitates efficient snapshot restore, file restore, and snapshot reclamation.
-
公开(公告)号:US20200285655A1
公开(公告)日:2020-09-10
申请号:US16293807
申请日:2019-03-06
Applicant: NetApp Inc.
Inventor: Akhil Kaushik , Anoop Chakkalakkal Vijayan , Preetham Kudgi Shenoy
IPC: G06F16/27
Abstract: Techniques are provided for transitioning a first storage object and a second storage object from an asynchronous replication state to a synchronous replication state. Metadata operations are logged into a metadata log. Dirty data, modified by data operations executed upon the first storage object, are tracked using a dirty region log. Metadata operations are replicated from the metadata log to the second storage object during a metadata drain phase. During the metadata drain phase, incoming operations are logged into the metadata log when the metadata log has a non-zero size, otherwise, the metadata operations are replicated to the second storage object. After the metadata drain phase, a data drain phase is performed using the dirty region log.
-
公开(公告)号:US10761768B1
公开(公告)日:2020-09-01
申请号:US16288506
申请日:2019-02-28
Applicant: NetApp Inc.
Inventor: Akhil Kaushik , Anoop Chakkalakkal Vijayan , Krishna Murthy Chandraiah setty Narasingarayanapeta , Shrey Sengar
IPC: G06F13/00 , G06F3/06 , G06F16/901
Abstract: Techniques are provided for handling misaligned holes and writes beyond end of files during a quick reconciliation process. During quick reconciliation, a read operation is performed to read data from a first storage object and is replicated to a second storage object. If the data read from the first storage object comprises misaligned holes, then a different range of data is read from the first storage object so that aligned holes are read and replicated to the second storage object. If the read operation targets a region beyond an end of the first storage object, then the second storage object is truncated to a size of the first storage object.
-
-
-
-
-
-
-
-
-