-
公开(公告)号:US20200319912A1
公开(公告)日:2020-10-08
申请号:US16908909
申请日:2020-06-23
Applicant: NetApp Inc.
Inventor: Vani Vully , Avishek Chowdhury , Balaji Ramani
IPC: G06F9/455 , G06F16/182 , G06F16/188 , G06F3/06
Abstract: A volume rehost tool migrates a storage volume from a source virtual server within a distributed storage system to a destination storage server within the distributed storage system. The volume rehost tool can prevent client access to data on the volume through the source virtual server until the volume has been migrated to the destination virtual server. The tool identifies a set of storage objects associated with the volume, removes configuration information for the set of storage objects, and removes a volume record associated with the source virtual server for the volume. The tool can then create a new volume record associated with the destination virtual server, apply the configuration information for the set of storage objects to the destination virtual server, and allow client access to the data on the volume through the destination virtual server.
-
公开(公告)号:US10789134B2
公开(公告)日:2020-09-29
申请号:US15130280
申请日:2016-04-15
Applicant: NetApp, Inc.
Inventor: Ling Zheng , Jeffrey S. Kimmel
IPC: G06F11/14
Abstract: A technique restores a file system of a storage input/output (I/O) stack to a deterministic point-in-time state in the event of failure (loss) of non-volatile random access memory (NVRAM) of a node. The technique enables restoration of the file system to a safepoint stored on storage devices, such solid state drives (SSD), of the node with minimum data and metadata loss. The safepoint is a point-in-time during execution of I/O requests (e.g., write operations) at which data and related metadata of the write operations prior to the point-in-time are safely persisted on SSD such that the metadata relating to an image of the file system on SSD (on-disk) is consistent and complete. Upon reboot after NVRAM loss, the technique identifies (i) the most recent safepoint, as well as (ii) the inflight writes that were persistently stored on disk after the most recent safepoint. The data and metadata of those inflight writes are then deleted to place the on-disk file system to its state at the most recent safepoint.
-
公开(公告)号:US20200301589A1
公开(公告)日:2020-09-24
申请号:US16896276
申请日:2020-06-09
Applicant: NetApp Inc.
Inventor: Gregory Buzzard , Justin Travis Cady , Thomas Gilbert Snyder , Satya R. Venneti , Sakir Yucel
IPC: G06F3/06
Abstract: One or more techniques and/or systems are provided for cluster configuration information replication, managing cluster-wide service agents, and/or for cluster-wide outage detection. In an example of cluster configuration information replication, a replication workflow corresponding to a storage operation implemented for a storage object (e.g., renaming of a volume) of a first cluster may be transferred to a second storage cluster for selectively implementation. In an example of managing cluster-wide service agents, cluster-wide service agents are deployed to nodes of a cluster storage environment, where a master agent actively processes cluster service calls and standby agents passively wait for reassignment as a failover master in the event the master agent fails. In an example of cluster-wide outage detection, a cluster-wide outage may be determined for a cluster storage environment based upon a number of inaccessible nodes satisfying a cluster outage detection metric.
-
公开(公告)号:US20200285655A1
公开(公告)日:2020-09-10
申请号:US16293807
申请日:2019-03-06
Applicant: NetApp Inc.
Inventor: Akhil Kaushik , Anoop Chakkalakkal Vijayan , Preetham Kudgi Shenoy
IPC: G06F16/27
Abstract: Techniques are provided for transitioning a first storage object and a second storage object from an asynchronous replication state to a synchronous replication state. Metadata operations are logged into a metadata log. Dirty data, modified by data operations executed upon the first storage object, are tracked using a dirty region log. Metadata operations are replicated from the metadata log to the second storage object during a metadata drain phase. During the metadata drain phase, incoming operations are logged into the metadata log when the metadata log has a non-zero size, otherwise, the metadata operations are replicated to the second storage object. After the metadata drain phase, a data drain phase is performed using the dirty region log.
-
公开(公告)号:US20200285616A1
公开(公告)日:2020-09-10
申请号:US16296442
申请日:2019-03-08
Applicant: NetApp Inc.
Inventor: Tijin George , Jagavar Nehra , Roopesh Chuggani , Dnyaneshwar Nagorao Pawar , Atul Ramesh Pandit , Kiyoshi James Komatsu
IPC: G06F16/178 , G06F16/16 , G06F16/11
Abstract: Techniques are provided for managing objects within an object store. An object is maintained within an object store. The object is used to store data of a snapshot of a file system hosted by a remote computing device. A determination is made that the snapshot was deleted by the remote computing device. Bitmaps describing objects within the object store that are related to snapshots of the file system are evaluated to determine that the object is unique to the deleted snapshot. The object is freed from storage within the object store.
-
公开(公告)号:US10762041B2
公开(公告)日:2020-09-01
申请号:US14840775
申请日:2015-08-31
Applicant: NetApp, Inc.
Inventor: Akshatha Gangadharaiah , Balamurugan Ramajeyam , Raman Madaan , Subhash A. Sankuratripati , Aftab Ahmad Ansari , Vaiapuri Ramasubramaniam
IPC: G06F16/00 , G06F16/11 , G06F16/13 , G06F16/182
Abstract: Systems and methods are disclosed for implementing an event based retention schedule for a read only file. When a regular file is to be converted to an event based retention read only file, an “event-retain” property may be enabled on the file allowing the feature to be implemented. Then, that file may have its permissions changed to read only. This will allow the file to be changed to a read only file without using a default retention time. Then, once the event is triggered, the retention time may be set so the file can be scheduled for automatic deletion.
-
公开(公告)号:US10761768B1
公开(公告)日:2020-09-01
申请号:US16288506
申请日:2019-02-28
Applicant: NetApp Inc.
Inventor: Akhil Kaushik , Anoop Chakkalakkal Vijayan , Krishna Murthy Chandraiah setty Narasingarayanapeta , Shrey Sengar
IPC: G06F13/00 , G06F3/06 , G06F16/901
Abstract: Techniques are provided for handling misaligned holes and writes beyond end of files during a quick reconciliation process. During quick reconciliation, a read operation is performed to read data from a first storage object and is replicated to a second storage object. If the data read from the first storage object comprises misaligned holes, then a different range of data is read from the first storage object so that aligned holes are read and replicated to the second storage object. If the read operation targets a region beyond an end of the first storage object, then the second storage object is truncated to a size of the first storage object.
-
公开(公告)号:US20200265018A1
公开(公告)日:2020-08-20
申请号:US16868671
申请日:2020-05-07
Applicant: NetApp Inc.
Inventor: Ching-Yuk Paul Ngan , Kanwaldeep Singh , Yuedong Mu , Manoj Kumar V Sundararajan
IPC: G06F16/178 , G06F11/20 , G06F11/14
Abstract: One or more techniques and/or computing devices are provided for data synchronization. For example, an in-flight log may be maintained to track storage operations that are received by a first storage node, but have not been committed to both first storage of the first storage node and second storage of a second storage node that has a replication relationship, such as a disaster recovery relationship, with the first storage node. A dirty region log may be maintained to track regions within the first storage that have been modified by storage operations that have not been replicated to the second storage. Accordingly, a catchup synchronization phase (e.g., asynchronous replication by a resync scanner) may be performed to replicate storage operations (e.g., replicate data within dirty regions of the first storage that were modified by such storage operations) to the second storage until the first storage and the second storage are synchronized.
-
公开(公告)号:US10725691B1
公开(公告)日:2020-07-28
申请号:US16288437
申请日:2019-02-28
Applicant: NetApp Inc.
Inventor: Akhil Kaushik , Anoop Chakkalakkal Vijayan
Abstract: Techniques are provided for overlapping write handling. Overlapping write managers are used to maintain the order that write operations are executed at a first computing environment and replicated to a second computing environment. Overlapping write managers are pre-allocated as available for managing overlapping write operations. A mapping is used to track what overlapping write managers are currently allocated for particular file handles of files. Thus, if an incoming write operation targets a file handle of an already allocated overlapping write manager, then that overlapping write manager is used to execute and replicate the incoming write operation so that the order of execution of overlapping writes by the second computing environment is the same as at the first computing environment. If there is no allocated overlapping write manager for the file handle, then a new overlapping write manager is allocated and utilized.
-
公开(公告)号:US20200233906A1
公开(公告)日:2020-07-23
申请号:US16297527
申请日:2019-03-08
Applicant: NETAPP, INC.
Inventor: Omri Kessel , Shailaja Kamila , Pratyush Uppuluri , Jayanta Basak
IPC: G06F16/906
Abstract: A system, method, and machine-readable storage medium for forming a community based on a common set of attributes are provided. In some embodiments, the method includes creating a list of entities associated with a plurality of users, each entity included in the list of entities being accessed by a user of the plurality of users. The method also includes identifying a first entity accessed by a group of users of the plurality of users. The method further includes determining a first set of entities accessed by each user of the group of users, the first set of entities being included in the list of entities. The method also includes removing the first entity and the first set of entities from the list of entities. The method further includes forming a first community including the group of users, the first entity, and the first set of entities.
-
-
-
-
-
-
-
-
-