-
公开(公告)号:US20240061603A1
公开(公告)日:2024-02-22
申请号:US18497925
申请日:2023-10-30
Applicant: NetApp, Inc.
Inventor: Kevin Daniel Varghese , Ananthan Subramanian , Parag Sarfare , Sandeep Yadav , Suhas Urkude , Rajesh Khandelwal
IPC: G06F3/06
CPC classification number: G06F3/0644 , G06F3/064 , G06F3/067 , G06F3/0613 , G06F3/0623 , G06F3/0659
Abstract: Methods and systems for co-locating journaling and data storage are provided. Separate journal and volume partitions may be maintained within each logical storage unit (e.g., Logical Unit Number (LUN)) of a distributed storage system. Journaling of metadata associated with write requests received from one or more clients may be distributed by identifying a destination logical storage unit to which data associated with a given write request is to be stored and causing the data and metadata to be persisted to disk by journaling the metadata and the data to respective portions of an active log within the journal partition of the destination logical storage unit. By using the same logical storage unit for both journaling of write requests and writing the data associated with such write requests, the bottleneck due to there being only a single device or storage unit handling all metadata for all write requests can be avoided.
-
62.
公开(公告)号:US11900160B2
公开(公告)日:2024-02-13
申请号:US17744056
申请日:2022-05-13
Applicant: NetApp, Inc.
Inventor: Xin Wang , Keith Allen Bare, II , Ying-Hao Wang , Jonathan Westley Moody , Bradley Raymond Lisson , Richard Wight , David Loren Rose , Richard P. Jernigan, IV , Daniel Tennant
CPC classification number: G06F9/5011 , G06F9/5077 , G06F13/282 , G06F2209/504
Abstract: Methods, non-transitory machine readable media, and computing devices that more efficiently and effectively manage storage quota enforcement are disclosed. With this technology, a quota ticket comprising a tally generation number (TGN) and a local allowed usage amount (AUA) are obtained. The local AUA comprises a portion of a global AUA associated with a quota rule. The local AUA is increased following receipt of another portion of the global AUA in a response from a cluster peer, when another TGN in the response matches the TGN and the local AUA is insufficient to execute a received storage operation associated with the quota rule. The local AUA is decreased by an amount corresponding to, and following execution of, the storage operation, when the increased local AUA is sufficient to execute the storage operation.
-
公开(公告)号:US20240045698A1
公开(公告)日:2024-02-08
申请号:US18115353
申请日:2023-02-28
Applicant: NetApp, Inc.
Inventor: Gregory Eugene Stabler , Edward John Barron, II , Chris Boyd Grindstaff , Michael James Rydeen
CPC classification number: G06F9/44505 , G06F1/26
Abstract: Various mechanisms and workflows are described that can utilize power and/or carbon footprint-based metrics to manage storage unit usage and/or configuration, which can provide a more efficient and environmentally friendly computing environment. In some example configurations, storage system management mechanisms collect power consumption for storage units (e.g., individual drives, storage shelfs, nodes, clusters) and can utilize the power consumption information with other storage unit characteristics to generate power and carbon footprint metrics.
-
公开(公告)号:US11893261B2
公开(公告)日:2024-02-06
申请号:US17510788
申请日:2021-10-26
Applicant: NetApp, Inc.
IPC: G06F3/06
CPC classification number: G06F3/065 , G06F3/067 , G06F3/0613 , G06F3/0619 , G06F3/0631 , G06F3/0653 , G06F3/0659
Abstract: In one embodiment, a method comprises maintaining state information regarding a data synchronous replication status for a storage object of a primary storage cluster and a replicated storage object of a secondary storage cluster. The method includes temporarily disallowing input/output (I/O) operations for the storage object when the storage object of the primary storage cluster has a failure, which causes an internal state as out of sync for the storage object while maintaining an external state as in sync for external entities. The method performs persistent inflight tracking and reconciliation of I/O operations with a first Op log of the primary storage cluster and a second Op log of the secondary storage cluster and performs a resynchronization between the storage object and the replicated storage object based on the persistent inflight tracking and reconciliation of I/O operations.
-
公开(公告)号:US11892929B2
公开(公告)日:2024-02-06
申请号:US17078804
申请日:2020-10-23
Applicant: NetApp, Inc.
Inventor: Charles Randall , Michael Keith Nunez
CPC classification number: G06F11/327 , G06F11/3034 , G06F11/325 , G06F11/328
Abstract: A management system is described. The management system includes an interface coupled to a plurality of infrastructure appliances and one or more processors to monitor each of the plurality of infrastructure appliances, detect a malfunction at a first of the infrastructure appliances, and transmit a display message to one or more of the plurality of infrastructure appliances that are adjacent to the first infrastructure appliance, wherein a display message indicates one or more activity light indicators to be activated at an adjacent infrastructure appliance.
-
公开(公告)号:US11886714B2
公开(公告)日:2024-01-30
申请号:US17990099
申请日:2022-11-18
Applicant: NETAPP, INC.
Inventor: Dean Alan Kalman , Srikumar Natarajan
CPC classification number: G06F3/0619 , G06F3/0605 , G06F3/065 , G06F3/067 , G06F3/0659 , G06F11/0772 , G06F11/1464 , G06F11/1469
Abstract: Methods and systems for using a hierarchical consistency group (CG) in a storage system are provided. A parent CG is associated with at least a first child CG having a plurality of storage volumes. An atomic application programming interface (API) provisions the parent CG and the first child CG by allocating storage and storing policies for the parent CG and the first CG. A storage service selected from a backup service, a replication service and a cloning service for the parent CG and the first CG is executed based on the stored policies.
-
公开(公告)号:US11886363B2
公开(公告)日:2024-01-30
申请号:US17739391
申请日:2022-05-09
Applicant: NetApp, Inc.
Inventor: Austino Longo , Jared Cantwell
CPC classification number: G06F13/1689 , G06F3/061 , G06F3/067 , G06F3/0659 , G06F11/3433 , G06F13/16 , G06F13/4068 , H04L67/00 , H04L67/10 , G06F11/3419 , G06F2206/1012
Abstract: Disclosed are systems, computer-readable mediums, and methods for managing client performance in a storage system. In one example, the storage system receives a request from a client to write data to the storage system. The storage system estimates, based on a system metric associated with the storage system reflecting usage of the storage system, a requested write QoS parameter for storing the data by the storage system during a first time period. The storage system further determines a target write QoS parameter for the client based on the estimated requested write QoS parameter and an allocated write QoS parameter for the client. Then, the storage system independently regulates read performance and write performance of the client using a controller to adjust the write performance toward the determined target write QoS parameter within the first time period based on feedback regarding the estimated requested write QoS parameter.
-
公开(公告)号:US11880605B2
公开(公告)日:2024-01-23
申请号:US17671775
申请日:2022-02-15
Applicant: NetApp, Inc.
Inventor: Mrinal K. Bhattacharjee , Shivali Gupta , Neha Saini
IPC: G06F3/06
CPC classification number: G06F3/0664 , G06F3/064 , G06F3/067 , G06F3/0613 , G06F3/0631
Abstract: Systems and methods are described for managing ephemeral storage of a virtual machine (VM) to provide victim caches for virtual storage appliances running on the VM. According to one embodiment, a central service may run within the VM and be responsible for managing allocation and reclamation of ephemeral storage space of the VM to/from the virtual storage appliances. Responsive to startup of a new virtual storage appliance on the VM, the new virtual storage appliance may request space from the central service to inform creation of its victim cache. In connection with servicing the request, the central service may take into consideration various factors including one or more of the total aggregate size of multiple local ephemeral drives associated with the VM, remaining available ephemeral storage space, the number of active virtual storage appliances, and the SLO of the virtual storage appliance seeking to establish its victim cache.
-
公开(公告)号:US11880280B2
公开(公告)日:2024-01-23
申请号:US17822629
申请日:2022-08-26
Applicant: NetApp, Inc.
CPC classification number: G06F11/1458 , G06F11/1446 , G06F16/113
Abstract: A plurality of data objects is generated from a data stream received for constructing a backup image. A stream size of the data stream is determined. For each multi-threaded put operation used to write a data object of the plurality of data objects to a cloud storage, a maximum number of threads is determined into which the data object can be separated into a number of parts for simultaneous transmission to the cloud storage. A part size of each part is determined. A number of multi-threaded put operations is determined for writing the plurality of data objects to the cloud storage based, at least in part, on the stream size, the maximum number of threads into which the data object can be separated, and the part size. The plurality of data objects is stored into the cloud storage using the number of multi-threaded put operations.
-
公开(公告)号:US20240022597A1
公开(公告)日:2024-01-18
申请号:US18477879
申请日:2023-09-29
Applicant: NetApp Inc.
Inventor: Prateeksha Varshney , Siddhartha Nandi , Jayanta Basak
CPC classification number: H04L63/145 , H04L63/1416 , G06F21/602
Abstract: A method, a computing device, and a non-transitory machine-readable medium for detecting malware attacks. In one example, an agent implemented in an operating system detects an overwrite in which an original data component is overwritten with a new data component. The agent computes a plurality of features associated with the overwrite, the plurality of features including an original entropy corresponding to the original data component, a new entropy corresponding to the new data component, an overwrite fraction, and a set of divergence features. The agent determines whether the new data component is encrypted using the plurality of features.
-
-
-
-
-
-
-
-
-