-
公开(公告)号:US20180302474A1
公开(公告)日:2018-10-18
申请号:US16015820
申请日:2018-06-22
Applicant: VMware, Inc.
Inventor: Yuehai Xu , Enning Xiang , Mukund Srinivasan , Jorge Guerra Delgado
Abstract: A distributed key-value storage system may include a master node. The key-value store may be distributed among first and second nodes. The master node may receive a publish request to publish one or more key-value pairs. Each key-value pair may be stored in a retransmit buffer and sent to all the first nodes using a communication protocol of a first kind that does not include a retransmit protocol mechanism. Some of the key-value pairs may be sent to one or more second node using a communication protocol of a second kind that includes a retransmit protocol mechanism.
-
公开(公告)号:US20180225171A1
公开(公告)日:2018-08-09
申请号:US15943293
申请日:2018-04-02
Applicant: VMware, Inc.
Inventor: Enning Xiang , Eric Knauft , Pascal Renauld , Xin Li
CPC classification number: G06F11/1004 , G06F3/0619 , G06F3/064 , G06F3/0683
Abstract: Systems and techniques are described for transferring data. A described technique includes receiving a request to transmit a data block from a first data storage device to a second data storage device. An attempt to read the data block from the first data storage device is made. A media error resulting from the attempt to read the data block from the first data storage device is detected. In response to detecting the media error, a new data block is generated and includes mismatched checksum data that causes a checksum mismatched error when the new data block is accessed. The new data block is transmitted for storage at the second data storage device in place of the data block.
-
公开(公告)号:US09952923B2
公开(公告)日:2018-04-24
申请号:US15199128
申请日:2016-06-30
Applicant: VMware, Inc.
Inventor: Enning Xiang , Eric Knauft , Pascal Renauld , Xin Li
CPC classification number: G06F11/1004 , G06F3/0619 , G06F3/064 , G06F3/0683
Abstract: Systems and techniques are described for transferring data. A described technique includes receiving a request to transmit a data block from a first data storage device to a second data storage device. An attempt to read the data block from the first data storage device is made. A media error resulting from the attempt to read the data block from the first data storage device is detected. In response to detecting the media error, a new data block is generated and includes mismatched checksum data that causes a checksum mismatched error when the new data block is accessed. The new data block is transmitted for storage at the second data storage device in place of the data block.
-
公开(公告)号:US11907161B2
公开(公告)日:2024-02-20
申请号:US17367233
申请日:2021-07-02
Applicant: VMware, Inc.
Inventor: Asit Desai , Abhay Kumar Jain , Wenguang Wang , Eric Knauft , Enning Xiang
CPC classification number: G06F16/122 , G06F3/0604 , G06F3/067 , G06F3/0659 , G06F3/0664 , G06F12/10 , G06F16/148
Abstract: An example method of upgrading a distributed storage object from a first version to a second version includes: querying metadata of a first component configured according to the first version of the distributed storage object, the metadata defining extents of data on a disk group of the first component; populating, for a second component configured according to the second version of the distributed storage object, logical and middle maps based on the metadata such that initial entries in the logical map point to initial entries in the middle map, and the initial entries in the middle map point to physical addresses of the disk group of the first component; and reading the data from the disk group of the first component and writing the data to a disk group of the second component while updating the initial entries in the middle map.
-
公开(公告)号:US11822804B2
公开(公告)日:2023-11-21
申请号:US17492950
申请日:2021-10-04
Applicant: VMware, Inc.
Inventor: Wenguang Wang , Enning Xiang , Pranay Singh , Subhradyuti Sarkar
CPC classification number: G06F3/0644 , G06F3/0619 , G06F3/0659 , G06F3/0673 , G06F12/0246 , G06F2212/7201
Abstract: The present disclosure is related to methods, systems, and machine-readable media for managing extent sharing between snapshots using mapping addresses. A first mapping address can be assigned to a first extent responsive to a request to write the first extent. A second mapping address can be assigned to a second extent responsive to a request to write the second extent. A snapshot can be created. A snapshot mapping address, that is monotonically increased from the second mapping address, can be assigned to the snapshot. A third mapping address, that is monotonically increased from the second mapping address, can be assigned to a third extent of the snapshot responsive to a request to write the third extent. An ownership status of each of the first extent, the second extent, and the third extent can be determined based respectively on: a comparison between the first mapping address and the snapshot mapping address, a comparison between the second mapping address and the snapshot mapping address, and a comparison between the third mapping address and the snapshot mapping address.
-
26.
公开(公告)号:US11782628B2
公开(公告)日:2023-10-10
申请号:US17684436
申请日:2022-03-02
Applicant: VMware, Inc.
Inventor: Banghui Luo , Tao Xie , Zhen Liu , Enning Xiang , YangYang Zhang , Wenguang Wang , Kiran Patil
IPC: G06F3/06
CPC classification number: G06F3/0647 , G06F3/067 , G06F3/0617 , G06F3/0619 , G06F3/0659 , G06F3/0664
Abstract: Example methods and systems to perform a migration of a virtualized computing instance and its first snapshot hierarchy from a first object store to a second object store have been disclosed. One example method includes identifying a first disk chain of the first snapshot hierarchy having an object running point, identifying a second disk chain of the first snapshot hierarchy different from the first disk chain, and migrating the second disk chain from the first object store to the second object store to form a first branch of a second snapshot hierarchy in the second object store. After the migrating, the example method includes instructing to take a first native snapshot on the object running point in the second object store, instructing to revert the object running point along the first branch and migrating the first disk chain from the first object store to the second object store.
-
27.
公开(公告)号:US20230169036A1
公开(公告)日:2023-06-01
申请号:US17522820
申请日:2021-11-09
Applicant: VMware, Inc.
Inventor: Enning Xiang , Wenguang Wang , Yiqi Xu
IPC: G06F16/11
CPC classification number: G06F16/128
Abstract: System and method for deleting parent snapshots of running points of storage objects stored in a storage system, in response to a request to delete a parent snapshot of a running point of a storage object stored in the storage system, changes the minimum extent ownership value of the running point to the minimum extent ownership value of the parent snapshot so that any physical extent with an extent ownership value equal to or greater than the changed minimum extent ownership value is deemed to be owned by the running point. For each logical block of the parent snapshot, depending on whether the physical extent corresponding to that logical block is determined to be exclusively accessible to the parent snapshot, the physical extent is removed or no action is taken on the physical extent so that the physical extent is used by the running point.
-
公开(公告)号:US11593399B2
公开(公告)日:2023-02-28
申请号:US17355125
申请日:2021-06-22
Applicant: VMware, Inc.
Inventor: Enning Xiang , Wenguang Wang , Pranay Singh , Subhradyuti Sarkar , Nitin Rastogi
Abstract: System and method for managing copy-on-write (COW) B tree structures for metadata of storage objects stored in a storage system determine, when a request to modify a target storage object stored in the storage system that requires a modification of a target leaf node in a B tree structure for metadata of the target storage object is received, whether an operation sequence number of the target leaf node is greater than a snapshot sequence number of a parent snapshot of a running point of the B tree structure. When the operation sequence number is greater than the snapshot sequence number, the target leaf mode is modified in place without copying the target leaf node. When the operation sequence number is not greater than the snapshot sequence number, the target leaf node is copied as a new leaf node for the B tree structure and the new leaf node is modified.
-
公开(公告)号:US20230028678A1
公开(公告)日:2023-01-26
申请号:US17383087
申请日:2021-07-22
Applicant: VMware, Inc.
Inventor: Nitin Rastogi , Wenguang Wang , Pranay Singh , Subhradyuti Sarkar , Enning Xiang
IPC: G06F16/11 , G06F16/16 , G06F16/188 , G06F16/13 , G06F16/901
Abstract: The present disclosure is related to methods, systems, and machine-readable media for determining shared nodes between snapshots using probabilistic data structures. A unique identifier can be assigned to each node of a first tree data structure corresponding to a first snapshot of a virtual computing instance (VCI). A first probabilistic data structure representing the first tree data structure can be created that includes hashes of the identifiers assigned to the nodes of the first tree data structure. A unique identifier can be assigned to each node of a second tree data structure corresponding to a second snapshot of the VCI. A second probabilistic data structure representing the second tree data structure can be created that includes hashes of the identifiers assigned to the nodes of the second tree data structure. A particular node of the second tree data structure can be determined to be shared by the first tree data structure responsive to a determination that the first probabilistic data structure includes a hash of an identifier assigned to the particular node.
-
公开(公告)号:US11327841B2
公开(公告)日:2022-05-10
申请号:US16875838
申请日:2020-05-15
Applicant: VMware, Inc.
Inventor: Enning Xiang , Ojan Thornycroft , Yiqi Xu , Zhihao Yao , Eric Knauft
Abstract: The disclosure herein describes placing a delta component of a base component in a target fault domain. A delta component associated with a base component is generated. The generation includes selecting a first fault domain as a target fault domain for the delta component based on the first fault domain including a witness component associated with the distributed data object of the base component. Otherwise, the generation includes selecting a second fault domain as the target fault domain based on the second fault domain including at least one data component that includes a different address space than the base component. Otherwise, the generation includes selecting a third fault domain as the target fault domain based on the third fault domain being unused. Then, the delta component is placed on the target fault domain, whereby data durability of the distributed data object is enhanced, and available fault domains are preserved.
-
-
-
-
-
-
-
-
-