-
公开(公告)号:US11243692B2
公开(公告)日:2022-02-08
申请号:US16359658
申请日:2019-03-20
Applicant: NetApp, Inc.
Inventor: Raymond Yu Shun Mak , Aditya Kalyanakrishnan , Song Guen Yoon , Emalayan Vairavanathan , Dheeraj Sangamkar , Chia-Chen Chu
Abstract: A system, method, and machine-readable storage medium for analyzing a state of a data object are provided. In some embodiments, the method includes receiving, at a storage device, a metadata request for the data object from a client. The data object is composed of a plurality of segments. The method also includes selecting a subset of the plurality of segments and obtaining a segment state for each segment of the subset. Each segment state indicates whether the respective segment is accessible via a backing store. The method further includes determining a most restrictive state of the one or more segment states and sending state information to the client in response to the metadata request, the state information being derived from the most restrictive state.
-
公开(公告)号:US20220035524A1
公开(公告)日:2022-02-03
申请号:US16942398
申请日:2020-07-29
Applicant: NetApp Inc.
Inventor: Ananthan Subramanian , Matthew Fontaine Curtis-Maury , Ram Kesavan , Vinay Devadas
Abstract: Techniques are provided for data management across a persistent memory tier and a file system tier. A block within a persistent memory tier of a node is determined to have up-to-date data compared to a corresponding block within a file system tier of the node. The corresponding block may be marked as a dirty block within the file system tier. Location information of a location of the block within the persistent memory tier is encoded into a container associated with the corresponding block. In response to receiving a read operation, the location information is obtained from the container. The up-to-date data is retrieved from the block within the persistent memory tier using the location information for processing the read operation.
-
公开(公告)号:US20220027314A1
公开(公告)日:2022-01-27
申请号:US17498368
申请日:2021-10-11
Applicant: NetApp Inc.
Inventor: Tijin George , Jagavar Nehra , Roopesh Chuggani , Dnyaneshwar Nagorao Pawar , Atul Ramesh Pandit , Kiyoshi James Komatsu
IPC: G06F16/11 , G06F16/907 , G06F16/14
Abstract: Techniques are provided for managing objects within an object store. An object is maintained within an object store. The object comprises a plurality of slots. Each slot is used to store a unit of data accessible to applications hosted by remote computing devices. The object comprises an object header used to store metadata for each slot. A determination is made that the object is a fragmented object comprising an in-use slot of in-use data and a freed slot from which data was freed. The object is compacted to retain in-use data and exclude freed data as a rewritten object.
-
公开(公告)号:US20220027065A1
公开(公告)日:2022-01-27
申请号:US17498237
申请日:2021-10-11
Applicant: NetApp Inc.
Inventor: Akhil Kaushik , Ripulkumar Hemantbhai Patel , Vrishali Dattatray Hajare , Andrew Eric Dunn , Rithin Kumar Shetty
Abstract: One or more techniques and/or computing devices are provided for resynchronization. For example, a request may be received to create pseudo snapshots of a first consistency group, hosted by a first storage controller, and a second consistency group, hosted by a second storage controller, having a synchronous replication relationship with the first consistency group. Incoming client write requests are logged within an intercept tracking log at the first storage controller. After a first drain without hold of incoming write requests is performed, a first pseudo common snapshot of the second consistency group is created. After a second drain without hold of incoming write operations is performed, a second pseudo common snapshot of the first consistency group and the intercept tracking log is created. The pseudo snapshots and the intercept tracking log (e.g., indicating a delta between the pseudo snapshots) are used to resynchronize the first and second consistency groups.
-
公开(公告)号:US20220027048A1
公开(公告)日:2022-01-27
申请号:US17495626
申请日:2021-10-06
Applicant: NETAPP, INC.
Inventor: Joseph Blount
Abstract: A system and method for improving storage system performance by reducing or avoiding load spike amplification when performing garbage collection is disclosed. A storage controller in a storage system tracks system load including write load and read load, as well as available free segments. The storage controller uses these tracked values as inputs and, with these inputs, generates a garbage collection rate. Where read load is included, a scaled portion of the read load is taken into consideration so that, as the number of free segments nears the minimum amount desired and to prevent garbage collecting too slowly, the read load is gradually excluded from the garbage collection rate determination. The garbage collection rate is therefore responsive to system load so that, in times of high system load, the rate reduces as much as is safe so that the write load takes priority with computing resources of the storage controller.
-
公开(公告)号:US11226777B2
公开(公告)日:2022-01-18
申请号:US16896276
申请日:2020-06-09
Applicant: NetApp Inc.
Inventor: Gregory Buzzard , Justin Travis Cady , Thomas Gilbert Snyder , Satya R. Venneti , Sakir Yucel
IPC: G06F3/06
Abstract: One or more techniques and/or systems are provided for cluster configuration information replication, managing cluster-wide service agents, and/or for cluster-wide outage detection. In an example of cluster configuration information replication, a replication workflow corresponding to a storage operation implemented for a storage object (e.g., renaming of a volume) of a first cluster may be transferred to a second storage cluster for selectively implementation. In an example of managing cluster-wide service agents, cluster-wide service agents are deployed to nodes of a cluster storage environment, where a master agent actively processes cluster service calls and standby agents passively wait for reassignment as a failover master in the event the master agent fails. In an example of cluster-wide outage detection, a cluster-wide outage may be determined for a cluster storage environment based upon a number of inaccessible nodes satisfying a cluster outage detection metric.
-
187.
公开(公告)号:US20220004467A1
公开(公告)日:2022-01-06
申请号:US17479133
申请日:2021-09-20
Applicant: NetApp Inc.
Inventor: Priyanka Kasinath Surakanti , Pratik Murali , Ramanathan Padinjarel Somanathan , Vasantha Sadananda Prabhu
Abstract: Backup of application data associated with an application executing in a virtual machine managed by a hypervisor is performed. Backup of the application data includes retrieving a Logical Unit Number (LUN) identification (ID) used by the application to store the application data in a storage volume. Backup of the application data also includes performing a virtual storage resolution for the LUN ID to determine whether the application data is stored in the storage volume identified by the LUN ID based on a first virtual mapping or a physical mapping. Backup also includes storing in metadata for the backup the LUN ID and whether the LUN ID is based on the first virtual mapping or the physical mapping. Backup includes creating a backup of the application data stored in the storage volume. Application data can subsequently be restored based on the application data that is backed up.
-
公开(公告)号:US11210007B2
公开(公告)日:2021-12-28
申请号:US16386803
申请日:2019-04-17
Applicant: NetApp Inc.
Inventor: Srinivasan Narayanamurthy , Parag Deshmukh
IPC: G06F17/00 , G06F3/06 , H04L9/06 , G06F17/18 , H04L9/08 , G06F16/215 , G06F16/901 , G06F21/60
Abstract: Techniques are provided for deduplicating encrypted data. For example, a device has data to store in an encrypted state within a remote data store. A key is used to encrypt the data to create encrypted data. The data is hashed to create hashed data and the encrypted data is hashed to create hashed encrypted data. A probabilistic data structure of the data is generated. The key is encrypted based upon the data to create an encrypted key. The encrypted data is transmitted to the remote data store, along with metadata comprising the hashed data, the hashed encrypted data, the probabilistic data structure, and the encrypted key. The metadata may be used to implement deduplication for subsequent requests, to store data within the remote data store, with respect to the encrypted data.
-
189.
公开(公告)号:US11199979B2
公开(公告)日:2021-12-14
申请号:US16730832
申请日:2019-12-30
Applicant: NetApp Inc.
Inventor: Pranab Patnaik , Akhil Kaushik
Abstract: One or more techniques and/or computing devices are provided for utilizing snapshots for data integrity validation and/or faster application recovery. For example, a first storage controller, hosting first storage, has a synchronous replication relationship with a second storage controller hosting second storage. A snapshot replication policy rule is defined to specify that a replication label is to be used for snapshot create requests, targeting the first storage, that are to be replicated to the second storage. A snapshot creation policy is created to issue snapshot create requests comprising the replication label. Thus a snapshot of the first storage and a replication snapshot of the second storage are created based upon a snapshot create request comprising the replication label. The snapshot and the replication snapshot may be compared for data integrity validation (e.g., determine whether the snapshots comprise the same data) and/or quickly recovering an application after a disaster.
-
公开(公告)号:US11194677B2
公开(公告)日:2021-12-07
申请号:US16681947
申请日:2019-11-13
Applicant: NetApp Inc.
Inventor: Harsha Sridhara
Abstract: One or more techniques and/or systems are provided for identifying configuration inconsistencies between storage virtual machines across storage clusters. For example, a first storage cluster and a second storage cluster may be configured according to a disaster recovery relationship where user data and configuration data of the first storage cluster are replicated to the second storage cluster so that the second storage cluster can takeover for the first storage cluster in the event a disaster occurs at the first storage cluster. Because replication of configuration data (e.g., a name and size of a volume, a backup policy, etc.) may fail for various reasons, configuration of the first storage cluster is compared to configuration of the second storage cluster to identify a configuration difference (e.g., a new size of the volume at the first storage cluster may have failed to be replicated to a replicated volume at the second storage cluster).
-
-
-
-
-
-
-
-
-