-
公开(公告)号:US11838363B2
公开(公告)日:2023-12-05
申请号:US16364384
申请日:2019-03-26
Applicant: NetApp Inc.
Inventor: David Slik , Keith Arnold Smith
IPC: H04L67/565 , H04L67/5682 , G06F11/10 , G06F3/06 , H04L67/1095 , H04L67/63 , H04L67/563 , H04L67/12
CPC classification number: H04L67/12 , G06F3/0604 , G06F3/065 , G06F3/067 , G06F3/0619 , G06F3/0641 , G06F3/0683 , G06F11/1004 , H04L67/1095 , H04L67/563 , H04L67/565 , H04L67/5682 , H04L67/63
Abstract: Techniques are provided for offloading the management of sensor data and generating custom views of sensor data. Sensor data received from a data network through a message is stored within storage managed by a computing device. A handle is generated to identify the sensor data. The sensor data within the message is replaced with the handle, and the message is transmitted to a device within the data network. The device may use handles of sensor data to request custom views of sensor data.
-
公开(公告)号:US11836513B2
公开(公告)日:2023-12-05
申请号:US16908909
申请日:2020-06-23
Applicant: NetApp Inc.
Inventor: Vani Vully , Avishek Chowdhury , Balaji Ramani , Vasudev Mulchandani
IPC: G06F3/06 , G06F9/455 , G06F16/182 , G06F16/188
CPC classification number: G06F9/45558 , G06F3/067 , G06F3/0619 , G06F3/0647 , G06F16/183 , G06F16/188 , G06F2009/4557 , G06F2009/45579 , G06F2009/45595
Abstract: A volume rehost tool migrates a storage volume from a source virtual server within a distributed storage system to a destination storage server within the distributed storage system. The volume rehost tool can prevent client access to data on the volume through the source virtual server until the volume has been migrated to the destination virtual server. The tool identifies a set of storage objects associated with the volume, removes configuration information for the set of storage objects, and removes a volume record associated with the source virtual server for the volume. The tool can then create a new volume record associated with the destination virtual server, apply the configuration information for the set of storage objects to the destination virtual server, and allow client access to the data on the volume through the destination virtual server.
-
公开(公告)号:US11835990B2
公开(公告)日:2023-12-05
申请号:US17680653
申请日:2022-02-25
Applicant: NetApp, Inc.
Inventor: Wei Sun , Anil Paul Thoppil , Anne Maria Vasu
CPC classification number: G06F11/1662 , G06F3/064 , G06F3/0622 , G06F3/0679 , G06F11/1088 , G06F11/3034 , G06F16/27
Abstract: Systems and methods that make use of cluster-level redundancy within a distributed storage management system to address various node-level error scenarios are provided. According to one embodiment, a KV store of a node of a cluster of a distributed storage management system manages storage of data blocks as values and corresponding block IDs as keys. Data integrity errors are reported to the first node in the form of a list of missing block IDs that are in use but missing from the KV store. A metadata resynchronization process may then be caused to be performed, including for each block ID in the list of missing block IDs: (i) reading a data block corresponding to the block ID from another node of the cluster that maintains redundant information relating to the block ID; and (ii) restoring the block ID within the KV store by writing the data block to the node.
-
84.
公开(公告)号:US11829803B2
公开(公告)日:2023-11-28
申请号:US17715569
申请日:2022-04-07
Applicant: NetApp, Inc.
Inventor: Ranjit Nandagopal , Yasutaka Hirasawa , Chandan Hoode
CPC classification number: G06F9/5083 , G06F9/4881 , G06F9/4887 , G06F2209/5022
Abstract: Methods, non-transitory machine readable media, and computing devices that dynamically throttle non-priority workloads to satisfy minimum throughput service level objectives (SLOs) are disclosed. With this technology, a determination is made when a number of detection intervals with a violation within a detection window exceeds a threshold, when a current one of the detection intervals is outside an observation area. The detection intervals are identified a violated based on an average throughput for priority workloads within the detection intervals exceeding a minimum throughput SLO. A throttle is then set to rate-limit non-priority workloads, when the number of violated detection intervals within the detection window exceeds the threshold. Advantageously, throughput for priority workloads is more effectively managed and utilized with this technology such that throttling oscillations are reduced, throttling is not deployed in conditions in which it would not improve throughput, and throttling is minimally deployed to maximize throughput.
-
85.
公开(公告)号:US20230367677A1
公开(公告)日:2023-11-16
申请号:US18360221
申请日:2023-07-27
Applicant: NetApp, Inc.
Inventor: Sangramsinh Pandurang Pawar , Per Olov Wahlstrom , William Derby Dallas , Joseph Brown, JR. , Houze Xu , John David McA'Nulty
IPC: G06F11/14 , G06F9/4401
CPC classification number: G06F11/1451 , G06F9/4411 , G06F11/1471 , G06F11/1456
Abstract: Systems and methods for making use of non-persistent storage as the journaling storage media for a virtual storage system are provided. According to one embodiment, in order to meet the needs of Extreme Low Latency Workloads while also seeking to provide predictable performance and the lowest possible latency, ephemeral storage of the virtual storage system is used to preserve state information (e.g., in the form of boot arguments and an operation log journal) across a host failure recovery scenario in which the virtual storage system is expected to be redeployed within a compute instance brought up by a cloud environment of a hyperscaler on the same host, thereby providing improved data durability (fewer host failure scenarios that result in lost data) as compared to the use of ephemeral memory of the compute instance and lower write latency than the use of persistent storage provided by the cloud environment.
-
公开(公告)号:US11816093B2
公开(公告)日:2023-11-14
申请号:US17536363
申请日:2021-11-29
Applicant: NetApp Inc.
Inventor: Kayuri Hasmukh Patel , Qinghua Zheng , Sumith Makam , Kevin Daniel Varghese , Yuvraj Ajaykumar Patel , Sateesh Kumar Pola , Sharmi Suresh Kumar Nair , Mihir Gorecha
CPC classification number: G06F16/2365 , G06F16/13 , G06F16/148
Abstract: Techniques are provided for storage tier verification checks. A determination is made that a mount operation of an aggregate of a set of volumes stored within a multi-tier storage environment has completed. A first metafile and a second metafile are maintained to track information related to the storage of objects of a volume of the aggregate within a remote object store that is a tier of the multi-tier storage environment. A distributed verification is performed between the first metafile and the second metafile to identify an inconsistency. Accordingly, the first metafile and the second metafile are reconciled to address the inconsistency so that storage information within the first metafile and the second metafile are consistent.
-
87.
公开(公告)号:US20230359585A1
公开(公告)日:2023-11-09
申请号:US18193838
申请日:2023-03-31
Applicant: NetApp Inc.
Inventor: Tijin George , Sharankumar Yelheri
CPC classification number: G06F16/125 , G06F11/1451 , G06F11/1469 , G06F2201/84
Abstract: Techniques are provided for a snapshot difference interface integrated into an object store data management container. The snapshot difference interface is capable of interpreting an object format and snapshot file system format of snapshots backed up to an object store within objects formatted according to the object format. The snapshot difference interface can identify differences between snapshots, such as files that changed between the snapshots, while the snapshots are still resident within the object store. Because the snapshot difference interface does not retrieve the snapshots from the object store, security is improved, resource and network consumption is reduced, and there is less of an impact upon client I/O processing. Also, a compliance scan for the snapshots can be performed much quicker by skipping already scanned snapshot data from a prior compliance scan.
-
公开(公告)号:US20230359493A1
公开(公告)日:2023-11-09
申请号:US18314971
申请日:2023-05-10
Applicant: NetApp, Inc.
Inventor: Tal ZUR , Ori YEMINI
IPC: G06F9/50
CPC classification number: G06F9/5011 , G06F2209/5019
Abstract: A method, system and computer program product, the method comprising: determining properties of a set of containers that are deployed over a computer infrastructure, wherein the computer infrastructure is provisioned via an infrastructure management service; determining properties of one or more headroom containers, wherein the one or more headroom containers are not deployed over the computer infrastructure; simulating the container orchestrator using the properties of the set of container and the properties of the headroom containers, for obtaining an expected deployment of the set of containers together with the one or more headroom containers; based on the expected deployment, determining whether the computer infrastructure is sufficient for deploying the set of containers together with the one or more headroom containers; and subject to the computer infrastructure being insufficient, issuing a request to the infrastructure management service to allocate additional computer infrastructure.
-
公开(公告)号:US11809402B2
公开(公告)日:2023-11-07
申请号:US17892179
申请日:2022-08-22
Applicant: NetApp Inc.
Inventor: Vijay Mohan Deshmukh , Atul Ramesh Pandit , Pawan Saxena
IPC: G06F16/23 , G06F16/27 , G06F16/245
CPC classification number: G06F16/2358 , G06F16/245 , G06F16/27
Abstract: Data is replicated on a backup node, where the granularity of the replication can be less than a full volume. A data consistency group comprising a subset of data for a volume is defined for a primary node. A set of differences for the data consistency group is sent to a backup node. The backup node creates change logs in response to receiving the set of differences. In response to receiving a request to access a file having data in the data consistency group, the backup node creates a clone of the file. The backup node determines whether an update to a data block of the file exists in the change logs. In response to determining that the update to the data block exists in the change logs, the backup node updates a copy of the data block for the cloned file with data in the change logs.
-
90.
公开(公告)号:US20230350810A1
公开(公告)日:2023-11-02
申请号:US17732098
申请日:2022-04-28
Applicant: NetApp Inc.
Inventor: Anil Paul Thoppil , Wei Sun , Meera Odugoudar , Szu-Wen Kuo , Santhosh Selvaraj
IPC: G06F12/1018
CPC classification number: G06F12/1018
Abstract: Techniques are provided for implementing a hash building process and an append hash building process. The hash building process builds in-memory hash entries for bins of keys stored within sorted logs of a log structured merge tree used to store keys of a key-value store. The in-memory hash entries can be used to identify the starting locations of bins of keys within the log structured merge tree so that a key within a bin can be searched for from the starting location of the bin as opposed to having to search the entire log structured merge tree. The append hash building process builds two hashes that can be used to more efficiently locate keys and/or ranges of keys within an unsorted append log that would otherwise require a time consuming binary search of the entire append log.
-
-
-
-
-
-
-
-
-