-
公开(公告)号:US20210271642A1
公开(公告)日:2021-09-02
申请号:US17321546
申请日:2021-05-17
Applicant: NetApp Inc.
Inventor: Tijin George , Jagavar Nehra , Roopesh Chuggani , Dnyaneshwar Nagorao Pawar , Atul Ramesh Pandit , Kiyoshi James Komatsu
IPC: G06F16/178 , G06F16/16 , G06F16/11
Abstract: Techniques are provided for managing objects within an object store. An object is maintained within an object store. The object is used to store data of a snapshot of a file system hosted by a remote computing device. A determination is made that the snapshot was deleted by the remote computing device. Bitmaps describing objects within the object store that are related to snapshots of the file system are evaluated to determine that the object is unique to the deleted snapshot. The object is freed from storage within the object store.
-
公开(公告)号:US10587685B2
公开(公告)日:2020-03-10
申请号:US15582561
申请日:2017-04-28
Applicant: NetApp, Inc.
Inventor: Ravindra Kuramkote , Kiyoshi James Komatsu , Ling Na Zheng , Rachita Kothiyal , Michael Lee Federwisch , Vijay Mohan Deshmukh
Abstract: To replicate a source LUN to a different storage system platform, a first storage system transmits a request to replicate a LUN along with attributes for the LUN to a second storage system. The second storage system maps the attributes to attributes used and understood by the platform of the second storage system. The second storage system then creates a destination LUN based on the mapped attributes. Since the destination LUN is created with similar attributes as the source LUN, the destination LUN can store the replicated data of the source LUN while still being accessed and recognized as a LUN by the second storage system. The second storage system also stores any proprietary attributes received from the first storage system so that the proprietary attributes can be supplied to the first storage system to recover the source LUN after a data loss event.
-
公开(公告)号:US20180316756A1
公开(公告)日:2018-11-01
申请号:US15582561
申请日:2017-04-28
Applicant: NetApp, Inc.
Inventor: Ravindra Kuramkote , Kiyoshi James Komatsu , Ling Na Zheng , Rachita Kothiyal , Michael Lee Federwisch , Vijay Mohan Deshmukh
IPC: H04L29/08
CPC classification number: H04L67/1095 , H04L67/1097
Abstract: To replicate a source LUN to a different storage system platform, a first storage system transmits a request to replicate a LUN along with attributes for the LUN to a second storage system. The second storage system maps the attributes to attributes used and understood by the platform of the second storage system. The second storage system then creates a destination LUN based on the mapped attributes. Since the destination LUN is created with similar attributes as the source LUN, the destination LUN can store the replicated data of the source LUN while still being accessed and recognized as a LUN by the second storage system. The second storage system also stores any proprietary attributes received from the first storage system so that the proprietary attributes can be supplied to the first storage system to recover the source LUN after a data loss event.
-
公开(公告)号:US20180107727A1
公开(公告)日:2018-04-19
申请号:US15820979
申请日:2017-11-22
Applicant: NetApp Inc.
Inventor: Vijay M. Deshmukh , Pranab Patnaik , Uday Madhav Joshi , Kiyoshi James Komatsu
CPC classification number: G06F16/275 , G06F3/062 , G06F21/604 , G06F21/6236 , H04L63/08 , H04L63/10 , H04L63/102 , H04L63/20 , H04L67/1095 , H04L67/1097
Abstract: One or more techniques and/or computing devices are provided for secure data replication. For example, a first storage controller may host first storage within which storage resources (e.g., files, logical unit numbers (LUNs), volumes, etc.) are stored. The first storage controller may establish an access policy with a001 second storage controller to which data is to be replicated from the first storage. The access policy may define an authentication mechanism for the first storage controller to authenticate the second storage controller, an authorization mechanism specifying a type of access that the second storage controller has for a storage resource, and an access control mechanism specifying how the second storage controller's access to data of the storage resource is to be controlled. In this way, data replication requests may be authenticated and authorized so that data may be provided, according to the access control mechanism, in a secure manner.
-
公开(公告)号:US20210232317A1
公开(公告)日:2021-07-29
申请号:US16774199
申请日:2020-01-28
Applicant: NetApp Inc.
Inventor: Ravindra Kuramkote , Kiyoshi James Komatsu , Ling na Zheng , Rachita Kothiyal , Michael Lee Federwisch , Vijay Mohan Deshmukh
IPC: G06F3/06
Abstract: To replicate a source LUN to a different storage system platform, a first storage system transmits a request to replicate a LUN along with attributes for the LUN to a second storage system. The second storage system maps the attributes to attributes used and understood by the platform of the second storage system. The second storage system then creates a destination LUN based on the mapped attributes. Since the destination LUN is created with similar attributes as the source LUN, the destination LUN can store the replicated data of the source LUN while still being accessed and recognized as a LUN by the second storage system. The second storage system also stores any proprietary attributes received from the first storage system so that the proprietary attributes can be supplied to the first storage system to recover the source LUN after a data loss event.
-
公开(公告)号:US11016943B2
公开(公告)日:2021-05-25
申请号:US16296442
申请日:2019-03-08
Applicant: NetApp Inc.
Inventor: Tijin George , Jagavar Nehra , Roopesh Chuggani , Dnyaneshwar Nagorao Pawar , Atul Ramesh Pandit , Kiyoshi James Komatsu
IPC: G06F16/178 , G06F16/11 , G06F16/16
Abstract: Techniques are provided for managing objects within an object store. An object is maintained within an object store. The object is used to store data of a snapshot of a file system hosted by a remote computing device. A determination is made that the snapshot was deleted by the remote computing device. Bitmaps describing objects within the object store that are related to snapshots of the file system are evaluated to determine that the object is unique to the deleted snapshot. The object is freed from storage within the object store.
-
公开(公告)号:US20200285611A1
公开(公告)日:2020-09-10
申请号:US16296427
申请日:2019-03-08
Applicant: NetApp Inc.
Inventor: Tijin George , Jagavar Nehra , Roopesh Chuggani , Dnyaneshwar Nagorao Pawar , Atul Ramesh Pandit , Kiyoshi James Komatsu
IPC: G06F16/11 , G06F16/907 , G06F16/9035 , G06F16/901 , G06F16/13
Abstract: Techniques are provided for managing objects within an object store. An object is maintained within an object store. In an embodiment, a rule is enforced for the object that in-use slots of the object are non-modifiable and unused slots of the object are modifiable. Metadata of additional information for a slot within the object is attached to the object header. A first application allowed to access user data within the slot is provided access to the user data without being provided access to the metadata. A second application allowed access to the user data and the additional information is provided with access to the user data and the metadata for identifying a location of additional information within the object.
-
公开(公告)号:US10585768B2
公开(公告)日:2020-03-10
申请号:US15995607
申请日:2018-06-01
Applicant: NetApp Inc.
Inventor: Atul Ramesh Pandit , Vijay M. Deshmukh , Michael Lee Federwisch , Ling Zheng , Kiyoshi James Komatsu , Rachita Kothiyal
Abstract: One or more techniques and/or computing devices are provided for cross-platform replication. For example, a replication relationship may be established between a first storage endpoint and a second storage endpoint, where at least one of the storage endpoints, such as the first storage endpoint, lacks or has incompatible functionality to perform and manage replication because the storage endpoints have different storage platforms that store data differently, use different control operations and interfaces, etc. Accordingly, replication destination workflow, replication source workflow, and/or a proxy representing the first storage endpoint may be implemented at the second storage endpoint comprising the replication functionality. In this way, replication, such as snapshot replication, may be implemented between the storage endpoints by the second storage endpoint using the replication destination workflow, the replication source workflow, and/or the proxy that either locally executes tasks or routes tasks to the first storage endpoint such as for data access.
-
公开(公告)号:US09990260B2
公开(公告)日:2018-06-05
申请号:US15142126
申请日:2016-04-29
Applicant: NetApp Inc.
Inventor: Atul Ramesh Pandit , Vijay M. Deshmukh , Michael Lee Federwisch , Ling Zheng , Kiyoshi James Komatsu , Rachita Kothiyal
CPC classification number: G06F11/2069 , G06F11/2071 , G06F11/2092 , G06F2201/805 , H04L67/1095 , H04L67/1097
Abstract: One or more techniques and/or computing devices are provided for cross-platform replication. For example, a replication relationship may be established between a first storage endpoint and a second storage endpoint, where at least one of the storage endpoints, such as the first storage endpoint, lacks or has incompatible functionality to perform and manage replication because the storage endpoints have different storage platforms that store data differently, use different control operations and interfaces, etc. Accordingly, replication destination workflow, replication source workflow, and/or a proxy representing the first storage endpoint may be implemented at the second storage endpoint comprising the replication functionality. In this way, replication, such as snapshot replication, may be implemented between the storage endpoints by the second storage endpoint using the replication destination workflow, the replication source workflow, and/or the proxy that either locally executes tasks or routes tasks to the first storage endpoint such as for data access.
-
公开(公告)号:US09842154B2
公开(公告)日:2017-12-12
申请号:US15142016
申请日:2016-04-29
Applicant: NetApp Inc.
Inventor: Vijay M. Deshmukh , Pranab Patnaik , Uday Madhav Joshi , Kiyoshi James Komatsu
CPC classification number: G06F17/30581 , G06F3/062 , G06F21/604 , G06F21/6236 , H04L63/08 , H04L63/10 , H04L63/102 , H04L63/20 , H04L67/1095 , H04L67/1097
Abstract: One or more techniques and/or computing devices are provided for secure data replication. For example, a first storage controller may host first storage within which storage resources (e.g., files, logical unit numbers (LUNs), volumes, etc.) are stored. The first storage controller may establish an access policy with a001 second storage controller to which data is to be replicated from the first storage. The access policy may define an authentication mechanism for the first storage controller to authenticate the second storage controller, an authorization mechanism specifying a type of access that the second storage controller has for a storage resource, and an access control mechanism specifying how the second storage controller's access to data of the storage resource is to be controlled. In this way, data replication requests may be authenticated and authorized so that data may be provided, according to the access control mechanism, in a secure manner.
-
-
-
-
-
-
-
-
-