-
公开(公告)号:US10523786B2
公开(公告)日:2019-12-31
申请号:US16016455
申请日:2018-06-22
Applicant: NetApp Inc.
Inventor: Deepak Raghu Kenchammana-Hosekote , Michael R. Eisler , Arthur F. Lent , Rahul Iyer , Shravan Gaonkar
Abstract: I/O bandwidth reduction using storage-level common page information is implemented by a storage server, in response to receiving a request from a client for a page stored at a first virtual address, determining that the first virtual address maps to a page that is a duplicate of a page stored at a second virtual address or that the first and second virtual addresses map to a deduplicated page within a storage system, and transmitting metadata to the client mapping the first virtual address to a second virtual address that also maps to the deduplicated page. For one embodiment, the metadata is transmitted in anticipation of a request for the redundant/deduplicated page via the second virtual address. For an alternate embodiment, the metadata is sent in response to a determination that a page that maps to the second virtual address was previously sent to the client.
-
公开(公告)号:US10521401B2
公开(公告)日:2019-12-31
申请号:US14838776
申请日:2015-08-28
Applicant: NetApp Inc.
Inventor: Raman Madaan , Akshatha Gangadharaiah , Vaiapuri Ramasubramaniam , Balamurugan Ramajeyam , Aftab Ahman Ansari
IPC: G06F16/176 , H04L29/06
Abstract: One or more techniques and/or computing devices are provided for data object retention. For example, a data retention policy may specify that files of a volume are to be locked down for a lockdown retention period (e.g., locked into a read only state for 4 months) when such files are not changed within an auto commit time period (e.g., files not changed within 13 hours). Waiting for a data scanner to evaluate files for lockdown may result in files violating the data retention policy until the data scanner evaluates such files. Accordingly, a file may be considered to be in the locked down state (e.g., instantaneous lockdown), such that commands to modify or delete the file are blocked, based upon a difference between a current time of an internal compliance clock and a current value of a data object change field exceeding the auto commit time period.
-
公开(公告)号:US10484472B2
公开(公告)日:2019-11-19
申请号:US14840512
申请日:2015-08-31
Applicant: NETAPP, INC.
Inventor: Balajee Nagasubramaniam , Subin Govind , Vijay Singh , Jeff Prem
Abstract: Exemplary embodiments provide methods, mediums, and systems for efficiently moving data between cluster nodes. Upon receiving a request to read or write data at a first cluster node that is in communication with a client, the first node effects the transfer to or from a second cluster node. The transfer is carried out using a combination of remote data memory access (“RDMA”), or a similar technique that bypasses a part of the network stack, and transport control protocol (“TCP”), or a similar technique that does not bypass a part of the network stack. The data is transferred using RDMA, while certain control messages are sent using TCP. By combining RDMA content transfers and TCP control messages, data transfers can be carried out faster, more efficiently, and with less processing overhead. Other embodiments are described and claimed.
-
公开(公告)号:US20190340162A1
公开(公告)日:2019-11-07
申请号:US16513362
申请日:2019-07-16
Applicant: NETAPP, INC.
Inventor: Matthew Curtis-Maury , Aditya Kulkarni , Vinay Devadas
IPC: G06F16/23
Abstract: Presented herein are methods, non-transitory computer readable media, and devices for efficiently administering locks for shared resources, such as data blocks, stored on a storage system. Methods for stamping a plurality of computer data objects are disclosed which include: accessing at least one of the plurality of computer data objects by a first data thread; assigning, by the first data thread, a stamp to the at least one of the plurality of computer data objects, to signify the at least one of the plurality of computer data objects is associated with the first data thread; preventing subsequent access by a second data thread to the stamped at least one of the plurality of computer data objects; and determining the stamp is no longer active, upon an event, effectively releasing the at least one of the plurality of computer data objects.
-
公开(公告)号:US10466935B2
公开(公告)日:2019-11-05
申请号:US15628881
申请日:2017-06-21
Applicant: NetApp, Inc.
Inventor: George Totolos , Steve Miller , Michael Hordijk
Abstract: A method, non-transitory computer readable medium, and device that assists with sharing non-volatile memory solid state drives across a cluster group includes receiving a request for a block of storage in a non-volatile memory solid state drive in one of the plurality of non-volatile memory disk shelves. Information associated with each of a plurality of solid state drives in the plurality of non-volatile memory disk shelves associated with the received request is obtained. A namespace for each of the plurality of solid state drives in the plurality of non-volatile memory disk shelves using the obtained information is created. The requested block of storage in the non-volatile memory solid state drive associated with one of the created namespace is assigned to the requesting client computing device.
-
公开(公告)号:US10402100B2
公开(公告)日:2019-09-03
申请号:US15078993
申请日:2016-03-23
Applicant: NetApp, Inc.
Inventor: Dean Kalman
IPC: G06F3/06
Abstract: Disclosed are various embodiments for managing paths in a cluster environment. The cluster environment receives a request from a client to access a logical storage volume via a selected one of a plurality of paths defined for the logical storage volume. In response to an access of the logical storage volume via one of the paths, the cluster environment updates a timestamp for the respective path that corresponds to a time of the access via the respective path. Subsequently, the cluster environment determines a remote path defined for the logical storage volume that can be removed based upon comparing a timestamp for the selected path with a timestamp for the remote path.
-
公开(公告)号:US10389809B2
公开(公告)日:2019-08-20
申请号:US15056058
申请日:2016-02-29
Applicant: NETAPP, INC.
Inventor: Omri Kessel , Keren Dagan , Michael Edward Stapp , Aashay Yogesh Joshi , Daniel Nuriyev , John Jason Sprague
Abstract: Methods and systems for a networked storage environment are provided. An application executed by a computing device using a plurality of resources in a networked storage environment for storing and retrieving application data is identified. Performance data of the plurality of resources is collected and historical performance data is retrieved. The collected and historical performance data for the plurality of resources is used to determine an overall anomaly score for the application indicating behavior of the application over time and individual anomaly scores for each resource with an indicator highlighting behavior of a resource that impacts the overall anomaly score for the application.
-
公开(公告)号:US10365838B2
公开(公告)日:2019-07-30
申请号:US15820004
申请日:2017-11-21
Applicant: NetApp, Inc.
Inventor: Janice D'Sa , Ling Zheng , Blake H. Lewis
Abstract: A N-way merge technique efficiently updates metadata in accordance with a N-way merge operation managed by a volume layer of a storage input/output (I/O) stack executing on one or more nodes of a cluster. The metadata is embodied as mappings from logical block addresses (LBAs) of a logical unit (LUN) accessible by a host to durable extent keys, and is organized as a multi-level dense tree. The mappings are organized such that a higher level of the dense tree contains more recent mappings than a next lower level, i.e., the level immediately below. The N-way merge operation is an efficient (i.e., optimized) way of updating the volume metadata mappings of the dense tree by merging the mapping content of all three levels in a single iteration, as opposed to merging the content of the first level with the content of the second level in a first iteration of a two-way merge operation and then merging the results of the first iteration with the content of the third level in a second iteration of the operation.
-
公开(公告)号:US10360237B2
公开(公告)日:2019-07-23
申请号:US15820979
申请日:2017-11-22
Applicant: NetApp Inc.
Inventor: Vijay M. Deshmukh , Pranab Patnaik , Uday Madhav Joshi , Kiyoshi James Komatsu
Abstract: One or more techniques and/or computing devices are provided for secure data replication. For example, a first storage controller may host first storage within which storage resources (e.g., files, logical unit numbers (LUNs), volumes, etc.) are stored. The first storage controller may establish an access policy with a001 second storage controller to which data is to be replicated from the first storage. The access policy may define an authentication mechanism for the first storage controller to authenticate the second storage controller, an authorization mechanism specifying a type of access that the second storage controller has for a storage resource, and an access control mechanism specifying how the second storage controller's access to data of the storage resource is to be controlled. In this way, data replication requests may be authenticated and authorized so that data may be provided, according to the access control mechanism, in a secure manner.
-
公开(公告)号:US10360119B2
公开(公告)日:2019-07-23
申请号:US14876063
申请日:2015-10-06
Applicant: NetApp, Inc.
Inventor: Martin Jess , Joseph Moore , Ziling Huang
Abstract: A system, method, and machine-readable storage medium for recovering data in a distributed storage system are provided. In some embodiments, the method includes identifying a failing storage device of a first storage node having an inaccessible data segment. When it is determined that the inaccessible data segment cannot be recovered using a first data protection scheme, a first chunk of data associated with the inaccessible data segment is identified and a group associated with the first chunk of data is identified. A second chunk of data associated with the group is selectively retrieved from a second storage node such that data associated with an accessible data segment of the first storage node is not retrieved. The inaccessible data segment is recovered by recovering the first chunk of data using a second data protection scheme and the second chunk of data.
-
-
-
-
-
-
-
-
-