-
公开(公告)号:US11157455B2
公开(公告)日:2021-10-26
申请号:US16357387
申请日:2019-03-19
Applicant: NetApp Inc.
IPC: G06F16/178 , G06F21/62
Abstract: Techniques are provided for inofile management and access control list file handle parity. For example, operations targeting a first storage object of a first node are replicated to a second storage object of a second node. A size of an inofile maintained by the second node is increased if an inode number to be allocated by the replication operation is greater than a current size of the inofile. Access control list file handle parity is achieved by maintaining parity between inode number and generation number pairings of the first node and the second node.
-
公开(公告)号:US11138229B2
公开(公告)日:2021-10-05
申请号:US16577149
申请日:2019-09-20
Applicant: NetApp Inc.
Abstract: Techniques are provided for dependency aware parallel splitting of operations. For example, a first operation and a second operation may be replicated in parallel from a first device to a second device if the operations only target a single common inode that is an access control list inode referenced by the operations. An operation that dereferences the access control list inode can be replicated in parallel with other operations if the operation does not have the potential to delete the access control list inode from the second device. In another example, operations may be replicated to the second device in parallel if the operations only affect a single common parent directory inode and where timestamps are only moved forward in time at the second device.
-
公开(公告)号:US20190324862A1
公开(公告)日:2019-10-24
申请号:US16459917
申请日:2019-07-02
Applicant: NetApp Inc.
IPC: G06F11/14 , G06F16/901 , G06F3/06 , G06F16/27 , G06F16/22 , G06F16/21 , G06F11/07 , G06F16/335
Abstract: One or more techniques and/or systems are provided for profiling a dataset. For example, a snapshot of a volume may be evaluated to identify a set of data characteristics, such as file and directory size information. A baseline dataset profile of a dataset of data within the volume may be constructed based upon the set of data characteristics. Histograms and graphs of directory counts and file counts may be constructed based upon the baseline dataset profile. An incremental dataset profile may be constructed for the dataset based upon an evaluation of the snapshot and a subsequent snapshot of the volume. Histograms and graphs of directories and files that are modified, created, and/or deleted may be constructed based upon the incremental dataset profile. Performance predictions, analytics, field diagnostics of performance issues, and/or scheduling of service execution may be implemented for a storage network hosting the volume based upon dataset profiles.
-
公开(公告)号:US20170316025A1
公开(公告)日:2017-11-02
申请号:US15140657
申请日:2016-04-28
Applicant: NetApp, Inc.
IPC: G06F17/30
CPC classification number: G06F16/148 , G06F16/113 , G06F16/168
Abstract: A request is received to retrieve at least a portion of a file from a compressed data archived image stored in a backup storage device. The compressed data archived image comprises a backup of a file system having a number of directories and a number of files. The compressed data archived image comprises a file that includes a compression of the number of files. An address of the at least the portion of the file within the compressed data archived image is determined. The at least the portion of the file is retrieved at the address in the compressed data archived image, without decompressing the compressed data archived image.
-
公开(公告)号:US20170270008A1
公开(公告)日:2017-09-21
申请号:US15071282
申请日:2016-03-16
Applicant: NetApp Inc.
IPC: G06F11/14
Abstract: One or more techniques and/or computing devices are provided for restarting a dump backup. For example, a phase offset table is used to track a directory transfer phase offset and a file transfer phase offset of phases of a dump backup. An offset map is used to map inodes, of data being backed up, to offsets within a backup image within which the data is being backed up. The phase offset table and/or the offset map are evaluated using a bytes written value to identify a phase during which the dump backup aborted and to identify a restart point. Accordingly, the dump backup is restarted at the restart point. In this way, the dump backup may be restarted during any phase and/or at any point using the bytes written value, the phase offset table, and the offset map without the need for additional information such as a file history.
-
公开(公告)号:US12242513B2
公开(公告)日:2025-03-04
申请号:US18308737
申请日:2023-04-28
Applicant: NetApp Inc.
Abstract: Techniques are provided for selectively allowing or blocking services from utilizing snapshots. A splitter intercepts and assigns timestamps to operations for execution upon files of a file system. If a snapshot is created while there are no pending operation, then the snapshot is tagged to indicate that the snapshot was created while there were no pending operations, and the snapshot is considered a tagged snapshot. Otherwise, the snapshot is not tagged, and is considered an untagged snapshot. Storage services (e.g., backup applications, lifecycle management applications, applications that consider timestamps of files, etc.) are allowed to utilize tagged snapshots and are blocked from utilizes untagged snapshots in order to maintain consistency.
-
公开(公告)号:US11816348B2
公开(公告)日:2023-11-14
申请号:US17947429
申请日:2022-09-19
Applicant: NetApp Inc.
CPC classification number: G06F3/065 , G06F3/0604 , G06F3/067
Abstract: Techniques are provided for persistent hole reservation. For example, hole reservation flags of operations targeting a first storage object of a first node are replicated into replication operations targeting a second storage object of a second node during a transition operation to transition the first storage object and the second storage object from an asynchronous replication state to a synchronous replication state. In another example, the second storage object is grown to a size of a replication punch hole operation that failed due to targeting a file block number greater than an end of size of the second storage object.
-
公开(公告)号:US11593016B2
公开(公告)日:2023-02-28
申请号:US16940462
申请日:2020-07-28
Applicant: NetApp Inc.
Inventor: Akhil Kaushik , Anoop Chakkalakkal Vijayan , Krishna Murthy Chandraiah setty Narasingarayanapeta , Shrey Sengar
IPC: G06F3/06 , G06F16/901 , G06F11/20
Abstract: Techniques are provided for serializing replication operations. A plurality of operations are implemented upon a first storage object and are replicated as a plurality of replication operations. An order with which the plurality of replication operation are to be executed upon a second storage object is determined. Execution of the plurality of replication operations upon the second storage object is serialized according to the order.
-
公开(公告)号:US11507600B2
公开(公告)日:2022-11-22
申请号:US16686686
申请日:2019-11-18
Applicant: NetApp Inc.
Inventor: Anoop Chakkalakkal Vijayan , Shrey Sengar , Krishna Murthy Chandraiah setty Narasingarayanapeta , Akhil Kaushik
IPC: G06F16/27 , G06F16/182
Abstract: Techniques are provided for dependency aware parallel splitting of operations. For example, a count of pending data operations being executed by a first node and replicated in parallel to a second node are tracked. A metadata operation is executed at the first node based upon the count being less than a threshold (e.g., the count being zero). A first list of affected inodes modified by the metadata operation is identified. A dependency of the metadata operation with respect to pending metadata operations replicated to the second node is determined. The metadata operation is dispatched to the second node based upon the dependency indicating that the metadata operation is independent of the pending metadata operations.
-
公开(公告)号:US20220027321A1
公开(公告)日:2022-01-27
申请号:US17492728
申请日:2021-10-04
Applicant: NetApp Inc.
IPC: G06F16/174 , G06F16/27 , G06F9/48 , G06F9/445
Abstract: Techniques are provided for dependency aware parallel splitting of operations. For example, a first operation and a second operation may be replicated in parallel from a first device to a second device if the operations only target a single common inode that is an access control list inode referenced by the operations. An operation that dereferences the access control list inode can be replicated in parallel with other operations if the operation does not have the potential to delete the access control list inode from the second device. In another example, operations may be replicated to the second device in parallel if the operations only affect a single common parent directory inode and where timestamps are only moved forward in time at the second device.
-
-
-
-
-
-
-
-
-