Data object lockdown
    271.
    发明授权

    公开(公告)号:US10521401B2

    公开(公告)日:2019-12-31

    申请号:US14838776

    申请日:2015-08-28

    Applicant: NetApp Inc.

    Abstract: One or more techniques and/or computing devices are provided for data object retention. For example, a data retention policy may specify that files of a volume are to be locked down for a lockdown retention period (e.g., locked into a read only state for 4 months) when such files are not changed within an auto commit time period (e.g., files not changed within 13 hours). Waiting for a data scanner to evaluate files for lockdown may result in files violating the data retention policy until the data scanner evaluates such files. Accordingly, a file may be considered to be in the locked down state (e.g., instantaneous lockdown), such that commands to modify or delete the file are blocked, based upon a difference between a current time of an internal compliance clock and a current value of a data object change field exceeding the auto commit time period.

    Methods and systems for efficiently moving data between nodes in a cluster

    公开(公告)号:US10484472B2

    公开(公告)日:2019-11-19

    申请号:US14840512

    申请日:2015-08-31

    Applicant: NETAPP, INC.

    Abstract: Exemplary embodiments provide methods, mediums, and systems for efficiently moving data between cluster nodes. Upon receiving a request to read or write data at a first cluster node that is in communication with a client, the first node effects the transfer to or from a second cluster node. The transfer is carried out using a combination of remote data memory access (“RDMA”), or a similar technique that bypasses a part of the network stack, and transport control protocol (“TCP”), or a similar technique that does not bypass a part of the network stack. The data is transferred using RDMA, while certain control messages are sent using TCP. By combining RDMA content transfers and TCP control messages, data transfers can be carried out faster, more efficiently, and with less processing overhead. Other embodiments are described and claimed.

    AUTO-EXPIRING LOCKS BASED ON OBJECT STAMPING
    273.
    发明申请

    公开(公告)号:US20190340162A1

    公开(公告)日:2019-11-07

    申请号:US16513362

    申请日:2019-07-16

    Applicant: NETAPP, INC.

    Abstract: Presented herein are methods, non-transitory computer readable media, and devices for efficiently administering locks for shared resources, such as data blocks, stored on a storage system. Methods for stamping a plurality of computer data objects are disclosed which include: accessing at least one of the plurality of computer data objects by a first data thread; assigning, by the first data thread, a stamp to the at least one of the plurality of computer data objects, to signify the at least one of the plurality of computer data objects is associated with the first data thread; preventing subsequent access by a second data thread to the stamped at least one of the plurality of computer data objects; and determining the stamp is no longer active, upon an event, effectively releasing the at least one of the plurality of computer data objects.

    Methods for sharing NVM SSD across a cluster group and devices thereof

    公开(公告)号:US10466935B2

    公开(公告)日:2019-11-05

    申请号:US15628881

    申请日:2017-06-21

    Applicant: NetApp, Inc.

    Abstract: A method, non-transitory computer readable medium, and device that assists with sharing non-volatile memory solid state drives across a cluster group includes receiving a request for a block of storage in a non-volatile memory solid state drive in one of the plurality of non-volatile memory disk shelves. Information associated with each of a plurality of solid state drives in the plurality of non-volatile memory disk shelves associated with the received request is obtained. A namespace for each of the plurality of solid state drives in the plurality of non-volatile memory disk shelves using the obtained information is created. The requested block of storage in the non-volatile memory solid state drive associated with one of the created namespace is assigned to the requesting client computing device.

    VARIABLE NUMBER AND SIZE OF PUT OPERATIONS FOR STORAGE BACKUP

    公开(公告)号:US20190324864A1

    公开(公告)日:2019-10-24

    申请号:US16502870

    申请日:2019-07-03

    Applicant: NetApp, Inc.

    Abstract: A plurality of data objects is generated from a data stream received for constructing a backup image. A stream size of the data stream is determined. For each multi-threaded put operation used to write a data object of the plurality of data objects to a cloud storage, a maximum number of threads is determined into which the data object can be separated into a number of parts for simultaneous transmission to the cloud storage. A part size of each part is determined. A number of multi-threaded put operations is determined for writing the plurality of data objects to the cloud storage based, at least in part, on the stream size, the maximum number of threads into which the data object can be separated, and the part size. The plurality of data objects is stored into the cloud storage using the number of multi-threaded put operations.

    METHODS AND SYSTEMS FOR SELECTING COMPATIBLE RESOURCES IN NETWORKED STORAGE ENVIRONMENTS

    公开(公告)号:US20190288906A1

    公开(公告)日:2019-09-19

    申请号:US16430818

    申请日:2019-06-04

    Applicant: NetApp Inc.

    Abstract: Methods and systems for a networked storage environment are provided. One method includes storing at a storage device by a processor a data structure with information regarding a plurality of compatible software and hardware components configured to operate in a plurality of configurations as part of a storage solution for using resources at a networked storage environment for storing data; obtaining by a processor executable configuration advisor information regarding a plurality of deployed components of a deployed configuration from among the plurality of configurations; comparing the deployed configuration with a latest configuration having the plurality of deployed components from among the plurality of configurations stored at the data structure; and recommending a change in at least one of the plurality of deployed components to upgrade the deployed configuration, when the deployed configuration is not the latest configuration.

    Techniques for path optimization in storage networks

    公开(公告)号:US10402100B2

    公开(公告)日:2019-09-03

    申请号:US15078993

    申请日:2016-03-23

    Applicant: NetApp, Inc.

    Inventor: Dean Kalman

    Abstract: Disclosed are various embodiments for managing paths in a cluster environment. The cluster environment receives a request from a client to access a logical storage volume via a selected one of a plurality of paths defined for the logical storage volume. In response to an access of the logical storage volume via one of the paths, the cluster environment updates a timestamp for the respective path that corresponds to a time of the access via the respective path. Subsequently, the cluster environment determines a remote path defined for the logical storage volume that can be removed based upon comparing a timestamp for the selected path with a timestamp for the remote path.

    METHODS FOR ENABLING DIRECT MEMORY ACCESS (DMA) CAPABLE DEVICES FOR REMOTE DMA (RDMA) USAGE AND DEVICES THEREOF

    公开(公告)号:US20190266124A1

    公开(公告)日:2019-08-29

    申请号:US16412794

    申请日:2019-05-15

    Applicant: NetApp, Inc.

    Abstract: Methods, non-transitory computer readable media and computing device that enabling direct memory access (DMA) capable devices for remote DMA (RDMA) are illustrated. With this technology, a first network message is inserted into a first location of a remote memory region of a computing device via DMA. The remote memory region is defined in an anchor record retrieved from a shared memory of the computing device. A local head pointer is synchronized, via DMA, with a remote head pointer stored by the computing device. The local and remote head pointers correspond to the first location of the remote memory region of the computing device. Following receipt of a DMA completion message, a notification message is sent, via DMA, to the computing device indicating that the network message has been transferred.

Patent Agency Ranking