-
公开(公告)号:US20170139640A1
公开(公告)日:2017-05-18
申请号:US15412821
申请日:2017-01-23
Applicant: NetApp, Inc.
Inventor: Ajay Bakre , Vishnu Vardhan Chandra Kumaran , Alvin Lam , Emalayan Vairavanathan , Viswanath Chandrasekara Bharathi , Vladimir Avram , Dheeraj Raghavender Sangamkar , Oliver Seiler , Carmen Lum
CPC classification number: G06F3/0649 , G06F3/0616 , G06F3/0619 , G06F3/064 , G06F3/065 , G06F3/067 , G06F3/0689 , G06F11/1076 , G06F11/1092
Abstract: A storage management computing device obtains an information lifecycle management (ILM) policy. A data protection scheme to be applied at a storage node computing device level is determined and a plurality of storage node computing devices are identified based on an application of the ILM policy to metadata received from one of the storage node computing devices and associated with an object ingested by the one of the storage node computing devices. The one of the storage node computing devices is instructed to generate one or more copies of the object or fragments of the object according to the data protection scheme and to distribute the object copies or one of the object fragments to one or more other of the storage node computing devices to be stored by at least the one or more other storage node computing devices on one or more disk storage devices.
-
公开(公告)号:US09626245B2
公开(公告)日:2017-04-18
申请号:US14627769
申请日:2015-02-20
Applicant: NetApp, Inc.
Inventor: Ajay Bakre , Vishnu Vardhan Chandra Kumaran , Alvin Lam , Emalayan Vairavanathan , Viswanath Chandrasekara Bharathi , Vladimir Avram , Dheeraj Raghavender Sangamkar , Oliver Seiler , Carmen Lum
CPC classification number: G06F3/0649 , G06F3/0616 , G06F3/0619 , G06F3/064 , G06F3/065 , G06F3/067 , G06F3/0689 , G06F11/1076 , G06F11/1092
Abstract: A method, non-transitory computer readable medium, and storage management computing device that obtains an information lifecycle management (ILM) policy. A data protection scheme to be applied at a storage node computing device level is determined and a plurality of storage node computing devices are identified based on an application of the ILM policy to metadata received from one of the storage node computing devices and associated with an object ingested by the one of the storage node computing devices. The one of the storage node computing devices is instructed to generate one or more copies of the object or fragments of the object according to the data protection scheme and to distribute the object copies or one of the object fragments to one or more other of the storage node computing devices to be stored by at least the one or more other storage node computing devices on one or more disk storage devices.
-