Abstract:
One or more techniques and/or systems are provided for managing configuration updates used to replicate configuration of a primary storage virtual machine to a partner storage virtual machine. For example, the partner storage virtual machine may be configured to provide failover operation in place of the primary storage virtual machine in the event the primary storage virtual machine fails. Configuration updates are queued and replayed on the partner storage virtual machine to replicate objects of the primary storage virtual machine to the partner storage virtual machine (e.g., replay of create, modify, or delete object commands for synchronizing volumes, logical unit numbers, and/or other configuration objects of the primary storage virtual machine to the partner storage virtual machine). Configuration updates may be retained, modified, or discarded/removed based upon consolidation rules, which improves computing resource utilization by consolidating configuration updates and/or removing stale configuration updates while achieving a similar replication consistency result.
Abstract:
One or more techniques and/or systems are provided for clone volume merging. For example, a parent volume may be exposed to users for read and write access to data stored within the parent volume. The parent volume may be cloned to create a cloned volume of the parent volume. The cloned volume may be exposed to users for data access. Responsive to receiving a clone volume merge command, data blocks within the cloned volume may be compared with data blocks within the parent volume to identify delta data blocks within the cloned volume that are not within the parent volume. The delta data blocks may be copied from the cloned volume to the parent volume, which may increase performance and/or decrease time taken to generate a volume with both common data blocks and the delta data blocks, as compared to copying data from the parent volume to the cloned volume.
Abstract:
A configuration for a component of a primary node is synchronized with a configuration for a component of a partner node in a different cluster by replicating the primary node configuration with the partner node. A baseline configuration replication comprises a snapshot of a component configuration on the primary. The baseline configuration can be generated by traversing through the configuration objects, capturing their attributes and encapsulating them in a package. The baseline package can then be transferred to the partner node. The configuration objects can be applied on the partner node in the order in which they were captured on the primary node. Attributes of the configuration objects are identified that are to be transformed. Values for the identified attributes are transformed from a name space in the primary node to a name space in the partner node.
Abstract:
Techniques are provided for neutralizing replication errors. An operation is executed upon a first storage object and is replicated as a replicated operation for execution upon a second storage object. A first error may be received for the replicated operation. Instead of transitioning to an out of sync state and aborting the operation, a wait is performed until a result of the attempted execution of the operation is received. If the first error is the same as a second error returned for the operation, then the operation and replicated operation are considered successful and a synchronous replication relationship is kept in sync. If the first error and the second error are different errors, then an error response is returned for the operation and the synchronous replication relationship is transitioned to out of sync.
Abstract:
Techniques are provided for handling misaligned holes and writes beyond end of files during a quick reconciliation process. During quick reconciliation, a read operation is performed to read data from a first storage object and is replicated to a second storage object. If the data read from the first storage object comprises misaligned holes, then a different range of data is read from the first storage object so that aligned holes are read and replicated to the second storage object. If the read operation targets a region beyond an end of the first storage object, then the second storage object is truncated to a size of the first storage object.
Abstract:
A configuration for a component of a primary node is synchronized with a configuration for a component of a partner node in a different cluster by replicating the primary node configuration with the partner node. A baseline configuration replication comprises a snapshot of a component configuration on the primary. The baseline configuration can be generated by traversing through the configuration objects, capturing their attributes and encapsulating them in a package. The baseline package can then be transferred to the partner node. The configuration objects can be applied on the partner node in the order in which they were captured on the primary node. Attributes of the configuration objects are identified that are to be transformed. Values for the identified attributes are transformed from a name space in the primary node to a name space in the partner node.
Abstract:
Techniques are provided for transitioning a first storage object and a second storage object from an asynchronous replication state to a synchronous replication state. Metadata operations are logged into a metadata log. Dirty data, modified by data operations executed upon the first storage object, are tracked using a dirty region log. Metadata operations are replicated from the metadata log to the second storage object during a metadata drain phase. During the metadata drain phase, incoming operations are logged into the metadata log when the metadata log has a non-zero size, otherwise, the metadata operations are replicated to the second storage object. After the metadata drain phase, a data drain phase is performed using the dirty region log.
Abstract:
Techniques are provided for transitioning a first storage object and a second storage object from an asynchronous replication state to a synchronous replication state. Metadata operations are logged into a metadata log. Dirty data, modified by data operations executed upon the first storage object, are tracked using a dirty region log. Metadata operations are replicated from the metadata log to the second storage object during a metadata drain phase. During the metadata drain phase, incoming operations are logged into the metadata log when the metadata log has a non-zero size, otherwise, the metadata operations are replicated to the second storage object. After the metadata drain phase, a data drain phase is performed using the dirty region log.
Abstract:
A method includes receiving a change in a primary configuration of a primary storage node while the primary storage node is operational, wherein primary data stored in the primary storage node is to be backed up as backup data in a backup storage node. The method includes locating at least one identifier in the change that identifies the primary storage node. The method includes replacing the at least one identifier in the change that identifies the primary storage node with an identification of the backup storage node to create an updated configuration change. The method includes updating a backup configuration of the backup storage node based on the updated configuration change.
Abstract:
A configuration for a component of a primary node is synchronized with a configuration for a component of a partner node in a different cluster by replicating the primary node configuration with the partner node. A baseline configuration replication comprises a snapshot of a component configuration on the primary. The baseline configuration can be generated by traversing through the configuration objects, capturing their attributes and encapsulating them in a package. The baseline package can then be transferred to the partner node. The configuration objects can be applied on the partner node in the order in which they were captured on the primary node. Attributes of the configuration objects are identified that are to be transformed. Values for the identified attributes are transformed from a name space in the primary node to a name space in the partner node.