Abstract:
A cloud asset manager can securely provide multi-tenant access to remote assets while preserving isolation across tenants. The remote asset manager defines various roles for legitimate users of the remote asset manager. The roles are associated with credentials that provide access to the remote assets and/or information about the remote assets maintained by a service provider. And the users map to roles based on attempted actions that access the service provider. Thus, a user's requested action is attempted with credentials associated with a role that maps to the requested action.
Abstract:
Methods and apparatuses for updating members of a data storage reliability group are provided. In one exemplary method, a reliability group includes a data zone in a first storage node and a checksum zone in a second data storage node. The method includes updating a version counter associated with the data zone in response to destaging a data object from a staging area of the data zone to a store area of the data zone without synchronizing the destaging with the state of the checksum zone. The method further includes transmitting, from the data zone to the checksum zone, an update message indicating completion of the destaging of the data object, wherein the update message includes a current value of the version counter.
Abstract:
In one embodiment, a node of a cluster is coupled to a storage array of storage devices. The node executes a storage input/output (I/O) stack having a redundant array of independent disks (RAID) layer that organizes the storage devices within the storage array as a plurality of RAID groups. Configuration information is stored as a cluster database. The configuration information identifies the RAID groups associated with the storage devices. Each RAID group is associated with a plurality of segments and each segment has a different RAID configuration.
Abstract:
The present invention is a method for accelerating proxy Input/Output (proxyI/O). The method includes the step of receiving a command at a primary target storage system. The primary target storage system may be part of a clustered storage array. The command may be a command which was transmitted by an initiator system via a storage area network, and may include a request for data. The method further includes the step of forwarding the command to a session layer of the primary target storage system. Further, when a virtualization layer of the primary target storage system determines that a portion of the data requested in the data request is not stored by the primary target storage system, but is stored by a proxy target storage system included in the plurality of storage systems, the method further includes providing a proxyIO request to a proxy initiator of the primary target storage system. Further, the method may further include, based on the proxyIO request, generating a proxyDataIn request and providing the proxyDataIn request to an I/O controller for the primary target storage system.
Abstract:
Systems and methods that allow operators to configure how files and directories are placed within file system views into a storage system, and how these configured file placements are performed by the distributed system. Possible features include a mechanism by which the desired placement of files and directories can be specified, a mechanism by which the placement goals can be realized in a given topology of a distributed system, and a mechanism by which changes to the placement of objects can applied retroactively. The disclosed embodiments may be able to scale to managing hundreds of billions of files spanning thousands of file system views, especially in the presence of disconnected operation.
Abstract:
One or more techniques and/or systems are provided for facilitating transactions across multiple transactional domains. For example, a first committer stores first data according to a first transactional domain (e.g., communication protocol data of a smart television) and a second committer stores second data according to a second transactional domain (e.g., communication protocol data of a mobile device). The first committer may commit to updating the first data from an old data state to a new data state (e.g., update from an unauthenticated protocol to an authenticated protocol). The first committer may instruct the second committer to perform a second commit of the second data to the new data state. If the second commit succeeds, then the first committer may utilize the new data state (e.g., utilize the authenticated protocol for communication) otherwise the first committer may utilize the old data state (e.g., utilize the unauthenticated protocol for communication).
Abstract:
Technology is disclosed for managing data in a distributed file system (“the technology”). The technology can gather metadata information associated with the data stored within the distributed file system, create a secondary namespace within a local file system of a local host using the gathered metadata information and store the gathered metadata information as files within the secondary namespace. Further, when a request to create a PPI of the distributed file system is received, the technology can create a PPI of the secondary namespace using a PPI creation feature of the local file system.
Abstract:
Various embodiments are generally directed an apparatus and method to receive client traffic comprising information at a primary cluster of a clustered system over a communications link, perform, a replication operation on the clustered system to replicate the information on a secondary cluster of the clustered system, and determine a client traffic throughput for the client traffic and a replication throughput for the replication operation. In some embodiments, the apparatus and method may include buffering one or more write operations to control the client traffic such that the client traffic throughput is less than or equal to the replication throughput for the replication operation.
Abstract:
A client system is provided for a test environment in which resources of a network file system are under test. A resource under test can correspond to an appliance (such as a cache or data migration appliance), or alternatively, to a file system. The client system can replicate operations specified for the file system on a control data set. The control data set can represent a copy of the file system that is handling the client specified file system operations during a test session. A comparison of the control data set to data stores which hold data for the resource under test can identify when temporary or permanent corruption issues occur.
Abstract:
A storage area network (SAN)-attached storage system architecture is disclosed. The storage system provides strongly consistent distributed storage communication protocol semantics, such as SCSI target semantics. The system includes a mechanism for presenting a single distributed logical unit, comprising one or more logical sub-units, as a single logical unit of storage to a host system by associating each of the logical sub-units that make up the single distributed logical unit with a single host visible identifier that corresponds to the single distributed logical unit. The system further includes mechanisms to maintain consistent context information for each of the logical sub-units such that the logical sub-units are not visible to a host system as separate entities from the single distributed logical unit.