-
公开(公告)号:US11144211B2
公开(公告)日:2021-10-12
申请号:US16682099
申请日:2019-11-13
Applicant: NetApp Inc.
Inventor: Akhil Kaushik , Ripulkumar Hemantbhai Patel , Vrishali Dattatray Hajare , Andrew Eric Dunn , Rithin Kumar Shetty
Abstract: One or more techniques and/or computing devices are provided for resynchronization. For example, a request may be received to create pseudo snapshots of a first consistency group, hosted by a first storage controller, and a second consistency group, hosted by a second storage controller, having a synchronous replication relationship with the first consistency group. Incoming client write requests are logged within an intercept tracking log at the first storage controller. After a first drain without hold of incoming write requests is performed, a first pseudo common snapshot of the second consistency group is created. After a second drain without hold of incoming write operations is performed, a second pseudo common snapshot of the first consistency group and the intercept tracking log is created. The pseudo snapshots and the intercept tracking log (e.g., indicating a delta between the pseudo snapshots) are used to resynchronize the first and second consistency groups.
-
公开(公告)号:US20200278791A1
公开(公告)日:2020-09-03
申请号:US16288506
申请日:2019-02-28
Applicant: NetApp Inc.
Inventor: Akhil Kaushik , Anoop Chakkalakkal Vijayan , Krishna Murthy Chandraiah setty Narasingarayanapeta , Shrey Sengar
IPC: G06F3/06 , G06F16/901
Abstract: Techniques are provided for handling misaligned holes and writes beyond end of files during a quick reconciliation process. During quick reconciliation, a read operation is performed to read data from a first storage object and is replicated to a second storage object. If the data read from the first storage object comprises misaligned holes, then a different range of data is read from the first storage object so that aligned holes are read and replicated to the second storage object. If the read operation targets a region beyond an end of the first storage object, then the second storage object is truncated to a size of the first storage object.
-
公开(公告)号:US20200042536A1
公开(公告)日:2020-02-06
申请号:US16191582
申请日:2018-11-15
Applicant: NetApp Inc.
Inventor: Akhil Kaushik , Balaji Ramani
IPC: G06F16/27 , G06F16/11 , G06F16/176 , G06F11/14
Abstract: Techniques are provided for synchronous replication based cutover. An asynchronous replication process is executed to perform asynchronous incremental transfers of data of a storage object from a first computing environment to a replicated storage object at a second computing environment until a cutover criteria is met. A synchronous replication process is executed to synchronously replicate operations, targeting the storage object, to the replicated storage object based upon the cutover criteria being met. A cutover is performed to direct operations from targeting the storage object to targeting the replicated storage object based upon the synchronous replication process reaching a steady state of synchronous replication for sub-objects of the storage object, where operations are committed to both the storage object and the replicated storage object.
-
154.
公开(公告)号:US10552064B2
公开(公告)日:2020-02-04
申请号:US16265032
申请日:2019-02-01
Applicant: NetApp Inc.
Inventor: Pranab Patnaik , Akhil Kaushik
Abstract: One or more techniques and/or computing devices are provided for utilizing snapshots for data integrity validation and/or faster application recovery. For example, a first storage controller, hosting first storage, has a synchronous replication relationship with a second storage controller hosting second storage. A snapshot replication policy rule is defined to specify that a replication label is to be used for snapshot create requests, targeting the first storage, that are to be replicated to the second storage. A snapshot creation policy is created to issue snapshot create requests comprising the replication label. Thus a snapshot of the first storage and a replication snapshot of the second storage are created based upon a snapshot create request comprising the replication label. The snapshot and the replication snapshot may be compared for data integrity validation (e.g., determine whether the snapshots comprise the same data) and/or quickly recovering an application after a disaster.
-
公开(公告)号:US10482066B2
公开(公告)日:2019-11-19
申请号:US15140992
申请日:2016-04-28
Applicant: NetApp Inc.
Inventor: Devang Kundanlal Shah , Dipankar Roy , Krishnaveni Budati , Kai Tan , Pranab Patnaik , Akhil Kaushik
IPC: G06F16/20 , G06F16/178 , G06F16/11 , G06F3/06
Abstract: One or more techniques and/or computing devices are provided for managing an arbitrary set of storage items using a granset. For example, a storage controller may host a plurality of storage items and/or logical unit numbers (LUNs). A subset of the storage items are grouped into a consistency group. A granset is created for tracking, managing, and/or providing access to the storage items within the consistency group. For example, the granset comprises application programming interfaces (APIs) and/or properties used to provide certain levels of access to the storage items (e.g., read access, write access, no access), redirect operations to access either data of an active file system or to a snapshot, fence certain operations (e.g., rename and delete operations), and/or other properties that apply to each storage item within the consistency group. Thus, the granset provides a persistent on-disk layout used to manage an arbitrary set of storage items.
-
公开(公告)号:US10339111B2
公开(公告)日:2019-07-02
申请号:US15141988
申请日:2016-04-29
Applicant: NetApp Inc.
Inventor: Rithin Kumar Shetty , Akhil Kaushik , Nagender Somavarapu , Yuedong Mu , Pranab Patnaik
IPC: G06F16/178 , G06F16/188 , G06F9/455 , G06F11/14 , H04L29/08 , G06F11/20
Abstract: One or more techniques and/or computing devices are provided for replicating virtual machine disk clones. For example, a first storage controller, hosting first storage, may have a synchronous replication relationship with a second storage controller hosting second storage. A virtual machine, within the first storage, may be specified as having synchronous replication protection. Accordingly, virtual machine disk clones of a virtual machine disk of the virtual machine may be replicated from the first storage to the second storage. For example, virtual machine disk clones may be synchronous replicated, replicated by a resync process invoked by a hypervisor agent, and/or stored and replicated from a clone backup directory.
-
公开(公告)号:US20170185323A1
公开(公告)日:2017-06-29
申请号:US14980345
申请日:2015-12-28
Applicant: NetApp Inc.
Inventor: Akhil Kaushik , Ripulkumar Hemantbhai Patel , Vrishali Dattatray Hajare , Andrew Eric Dunn , Rithin Kumar Shetty
CPC classification number: G06F3/0619 , G06F3/065 , G06F3/0683 , G06F11/1451 , G06F11/1469 , G06F11/1471 , G06F11/2064 , G06F11/2076 , G06F11/2082 , G06F2201/805 , G06F2201/84
Abstract: One or more techniques and/or computing devices are provided for resynchronization. For example, a request may be received to create pseudo snapshots of a first consistency group, hosted by a first storage controller, and a second consistency group, hosted by a second storage controller, having a synchronous replication relationship with the first consistency group. Incoming client write requests are logged within an intercept tracking log at the first storage controller. After a first drain without hold of incoming write requests is performed, a first pseudo common snapshot of the second consistency group is created. After a second drain without hold of incoming write operations is performed, a second pseudo common snapshot of the first consistency group and the intercept tracking log is created. The pseudo snapshots and the intercept tracking log (e.g., indicating a delta between the pseudo snapshots) are used to resynchronize the first and second consistency groups.
-
公开(公告)号:US20170185306A1
公开(公告)日:2017-06-29
申请号:US14980526
申请日:2015-12-28
Applicant: NetApp Inc.
Inventor: Michael Robin Eisler , Santosh Ananth Rao , Akhil Kaushik , Yuedong Mu
CPC classification number: G06F3/065 , G06F3/0619 , G06F3/067 , G06F11/2058 , G06F11/2064 , G06F11/2069 , G06F11/2076 , G06F11/2082
Abstract: One or more techniques and/or computing devices are provided for synchronous replication. For example, synchronous replication relationships are established between a first storage object (e.g., a file, a logical unit number (LUN), a consistency group, etc.), hosted by a first storage controller, and a plurality of replication storage objects hosted by other storage controllers. In this way, a write operation to the first storage object is implemented in parallel upon the first storage object and the replication storage objects in a synchronous manner, such as using a zero-copy operation to reduce overhead otherwise introduced by performing copy operations. Reconciliation is performed in response to a failure so that the first storage object and the replication storage objects comprise consistent data. Failed write operations and replication write operations are retried, while enforcing a single write semantic. Dependent write order consistency is enforced for dependent write operations, such as overlapping write operations.
-
-
-
-
-
-
-