Methods to identify, handle and recover from suspect SSDS in a clustered flash array

    公开(公告)号:US09710317B2

    公开(公告)日:2017-07-18

    申请号:US14673258

    申请日:2015-03-30

    Applicant: NetApp, Inc.

    Abstract: A technique predicts failure of one or more storage devices of a storage array serviced by a storage system and for establishes one or more threshold conditions for replacing the storage devices. The predictive technique periodically monitors soft and hard failures of the storage devices (e.g., from Self-Monitoring, Analysis and Reporting Technology), as well as various usage counters pertaining to input/output (I/O) workloads and response times of the storage devices. A heuristic procedure may be performed that combines the monitored results to calculate the predicted failure and recommend replacement of the storage devices, using one or more thresholds based on current usage and failure patterns of the storage devices. In addition, one or more policies may be provided for replacing the storage devices in a cost-effective manner that ensures non-disruptive operation and/or replacement of the SSDs, while obviating a potential catastrophic scenario based on the usage and failure patterns of the storage devices.

    STORAGE CLUSTER MANAGEMENT PROXY
    402.
    发明申请

    公开(公告)号:US20170187547A1

    公开(公告)日:2017-06-29

    申请号:US14979911

    申请日:2015-12-28

    Applicant: NetApp, Inc.

    Abstract: A request is received, from a tenant by a cluster management proxy, to perform a cluster management operation of a cluster that is storing data from multiple tenants that include the tenant. In response to determining that the request is within a group of admissible cluster management requests for the cluster, the request is modified, by the cluster management proxy, to restrict access of the cluster management operation based on an identity of the tenant. The cluster is accessed, by the cluster management proxy, based on the modified request that has restricted access of the cluster management operation. In response to determining that the request is not within the group, the request is tunneled to a Storage Virtual Machine (SVM) assigned to the tenant. The SVM is configured to access the cluster based on the request.

    Distributed control protocol for high availability in multi-node storage cluster

    公开(公告)号:US09692645B2

    公开(公告)日:2017-06-27

    申请号:US14244337

    申请日:2014-04-03

    Applicant: NetApp, Inc.

    Abstract: A distributed control protocol dynamically establishes high availability (HA) partner relationships for nodes in a cluster. A HA partner relationship may be established by copying (mirroring) information maintained in a non-volatile random access memory (NVRAM) of a node over a HA interconnect to the NVRAM of a partner node in the cluster. The distributed control protocol leverages a Cluster Liveliness and Availability Manager (CLAM) utility of a storage operating system executing on the nodes to rebalance NVRAM mirroring and alter HA partner relationships of the nodes in the cluster. The CLAM utility is configured to maintain various cluster related issues, such as CLAM quorum events, addition or subtraction of a node in the cluster and other changes in configuration of the cluster. Notably, the CLAM utility is an event based manager that implements the control protocol to keep the nodes informed of any cluster changes through event generation and propagation.

    Namespace mirroring in an expandable storage volume

    公开(公告)号:US09684571B2

    公开(公告)日:2017-06-20

    申请号:US13875236

    申请日:2013-05-01

    Applicant: NetApp, Inc.

    CPC classification number: G06F11/20 G06F11/00 G06F11/1435

    Abstract: Technology for maintaining a backup of namespace metadata of an expandable storage volume is disclosed. In various embodiments, the expandable storage volume backs up metadata of a namespace constituent volume of the expandable storage volume into a namespace mirror volume. The namespace constituent volume is responsible for storing the metadata for data objects stored in multiple data constituent volumes of the expandable storage volume. In response to a signal indicating that the namespace constituent volume is unavailable, the namespace mirror volume replaces the role of the namespace constituent volume. The new namespace constituent volume continues to provide metadata for a data object of the data objects in response to an operation request for the data object.

Patent Agency Ranking