Abstract:
A system and method are provided for auto-committing files of a storage system to immutable status based on a change log of file system activity. The system is configured for producing and analyzing the change log. Producing the change log involves generating change log entries associated with changes made to files of the storage system and organizing the change log entries from the oldest to newest entries. Analyzing the change log involves processing the change log beginning with the oldest entry to determine whether any entries have met the auto-commit time period, and if so, to set the files associated with such entries to immutable status. If a change log entry is found not to have met the auto-commit time period, a resting time period is determined based on the oldest change log entry, and processing of the change log proceeds after expiration of the resting time period.
Abstract:
An architecture provides the ability to create and maintain multiple instances of virtual servers, such as virtual filers (vfilers), within a server, such as a storage appliance. A vfiler is a logical partitioning of network and storage resources of the storage appliance platform to establish an instance of a multi-protocol server. Each vfiler is allocated a subset of dedicated units of storage resources, such as volumes or logical sub-volumes (qtrees), and one or more network address resources. Each vfiler is also allowed shared access to a file system resource of a storage operating system. To ensure controlled access to the allocated and shared resources, each vfiler is further assigned its own security domain for each access protocol. A vfiler boundary check is performed by the file system to verify that a current vfiler is allowed to access certain storage resources for a requested file stored on the filer platform.
Abstract:
The present disclosure is directed to implementing power savings features on storage drives within a storage subsystem. A controller determines a drive is inactive and directs a power connector to prevent power from being provided to the drive. The controller may receive an input/output request for the inactive drive, direct the power connector to allow power to be provided, and provide the input/output request. When the controller receives an input/output request for the inactive drive, the controller sends a notification to the request's originator that the drive is unavailable and to retry after a fixed period of time. The controller performs maintenance on the drive when the drive is not inactive. The controller determines a maintenance time when the drive will be inactive and performs maintenance at an accelerated rate.
Abstract:
An apparatus and method for securing a baseline backup are disclosed. As part of an incremental backup process, a selected set of file system data, including directories and files, are identified. The selected set of file system data are compressed, and then encrypted. Based on the encrypted and compressed file system data, a data digest is generated that uniquely identifies the encrypted and compressed file system data. The compressed and encrypted file system data are written to a portable storage device along with the data digest, thereby enabling the safe, manual transport of the file system data to a secondary, or backup, computer system (e.g., at a remote data center).
Abstract:
The present invention is a method for providing multi-pathing via Small Computer System Interface Input/Output (SCSI I/O) referral between an initiator and a storage cluster which are communicatively coupled via a network, the storage cluster including at least a first target device and a second target device. The method includes receiving an input/output (I/O) at the first target device from the initiator via the network. The I/O includes a data request. The method further includes transmitting a SCSI I/O referral list to the initiator when data included in the data request is not stored on the first target device, but is stored on the second target device. The referral list includes first and second port identifiers for identifying first and second ports of the second target device respectively. The first and second ports of the target device are identified as access ports for accessing the data requested in the data request.
Abstract translation:本发明是一种通过小型计算机系统接口输入/输出(SCSI I / O)在通过网络通信耦合的发起者和存储集群之间的推荐来提供多路径的方法,所述存储集群至少包括第一目标 设备和第二目标设备。 该方法包括经由网络从发起者接收在第一目标设备处的输入/输出(I / O)。 I / O包括数据请求。 该方法还包括当包含在数据请求中的数据未被存储在第一目标设备上但存储在第二目标设备上时,向发起者发送SCSI I / O推荐列表。 推荐列表包括用于分别识别第二目标设备的第一和第二端口的第一和第二端口标识符。 目标设备的第一和第二端口被识别为用于访问数据请求中请求的数据的接入端口。
Abstract:
Automatic network configuration of cluster paths to access data within a cluster is described. Each node of the cluster presents to clients an image of the cluster as a single system. Each node also stores information regarding what node has particular data, as well as information about network addresses and corresponding network capabilities for the various network addresses for each node. When a node receives a request for data, the node determines a node where the request data can be accessed, determines network addresses and network capabilities for each network address of the node, and selects a path to access the node based on the determined information. The receiving node may select the path based on network type and capability, as well as load and performance of the network.
Abstract:
A network storage server restores a selected file or files from a block-level backup of a data set that contains multiple files, by using a client-server backup protocol, without restoring the entire data set. The backup can include at least one incremental backup image, in which case the file can be restored at least partially from the incremental backup image. A particular version of a file can also be restored, from a block-level backup image that includes multiple snapshots, by automatically selecting a particular snapshot associated with that version of the file, from the backup image, and using the selected snapshot to restore the file.
Abstract:
One or more aspects of the disclosure relate to techniques for accessing a file stored in a clustered computing network, where the file is stored in the clustered computing network in a plurality of related volumes that stem from a particular (e.g., parent) volume. In the method, a request to retrieve the file from the particular volume is received at the client. The client then determines whether the file is stored in a client memory so as to be identified with the particular volume. If the file is not stored in the client memory so as to be identified with the particular volume, then the file is retrieved from a different but related volume.
Abstract:
An apparatus and method for managing the distribution and expansion of public keys held by a group or array of systems in white lists. The addition of a new system to the array entails a manual input to authorize the introduction of the new system to one trusted system in the array. After the introduction the new system is trusted by the one member and the white list of the one member is loaded into the white list of the new system. The new system then requests joining each of the other systems in the array. For each system in the array asked by the new system, the systems in the array ask if any other systems in the array already trust the new member. In response, a system of the array that trusts the new system responds by sending its white list (containing the public key of the new system) to the requesting system. Eventually the public key of the new system is in the white lists of all the systems in the array. In practice this trusts expansion occurs in the background with respect to running applications.
Abstract:
Data is cached in a dual-controller storage array having a first cache controlled by a first controller, a second cache controlled by a second controller, and a shared array of persistent storage devices, such as disk drives. When one of the controllers receives a write request, it stores the data in persistent storage, stores a copy of that data in the first cache, and transmits identification data to the second controller that identifies the data written to persistent storage. Using the identification data, the second controller invalidates any data stored in the second cache that corresponds to the data that the first controller wrote to persistent storage. If a controller receives a read request, and the requested data is validly stored in its cache, the controller retrieves it from the cache; otherwise, the controller reads the requested data from persistent storage and caches a copy of the requested data.