-
公开(公告)号:US11086522B1
公开(公告)日:2021-08-10
申请号:US15274671
申请日:2016-09-23
Applicant: EMC IP Holding Company LLC
Inventor: Xuedong Jiang , John Copley , Michael Specht
IPC: G06F3/06
Abstract: Automated port selection for data migration includes an algorithm that selects a set of SAN ports with the following properties: the selected ports have the least port utilization among all possible port selections; the number of independent data paths between the selected ports is no smaller than a user configurable minimum number; and the difference between the aggregate bandwidth of the ports on both arrays is minimized.
-
公开(公告)号:US11068502B1
公开(公告)日:2021-07-20
申请号:US16176060
申请日:2018-10-31
Applicant: EMC IP HOLDING COMPANY LLC
Inventor: Ajay Potnis , Adnan Sahin , Michael Specht , Bharadwaj Sathavalli , Shampavman Chenjeri Gururajarao , Maneesh Singhal
Abstract: Software Defined Network Attached Storage data backup is implemented using storage array synchronous data replication. A TLU is created for each user filesystem managed by a Virtual Data Mover (VDM). A VDM configuration filesystem is also created containing metadata describing a mapping of user file system TLU to physical storage resources on the storage array. Both the user filesystem TLUs and the VDM configuration filesystem are mapped to an asynchronous Remote Data Forwarding (RDF) group of the storage array, which is used by the storage array to replicate both the user filesystem TLUs and VDM configuration filesystem. Filesystem ID and export path information are reserved on the primary storage array and backup storage array when the RDF group is set up, to enable transparent failover from the primary to the backup node of selected VDMs.
-
公开(公告)号:US10007455B1
公开(公告)日:2018-06-26
申请号:US15392016
申请日:2016-12-28
Applicant: EMC IP Holding Company LLC
Inventor: Subin George , Violet S. Beckett , Arieh Don , Vinay Rao , Michael Specht
CPC classification number: G06F3/0689 , G06F3/0604 , G06F3/0632 , G06F3/0637
Abstract: Masking information may be automatically determined for a host after zoning between the host and data storage system is complete. Processing may include the host sending host registration commands from host initiators. From registration information provided with the host registration commands, an initiator group may be determined for the masking view as including the initiators identified as belonging to the host. A port group may be determined as those target ports at which the host registration commands are received. A default storage group with a default device may be created. A masking view for the host may be created that includes the initiator group, the target port group and the default storage group whereby the masking view indicates that the first device is accessible or exposed, through each target port of the target port group, to each initiator of the initiator group.
-
公开(公告)号:US10768851B2
公开(公告)日:2020-09-08
申请号:US16174369
申请日:2018-10-30
Applicant: EMC IP HOLDING COMPANY LLC
Inventor: Deepak Vokaliga , Michael Specht , Mohammed Asher
IPC: G06F3/06
Abstract: In a data storage system in which a first storage array and a second storage array maintain first and second replicas of a production volume, the replicas are made discoverable and accessible while inconsistent. Each storage array maintains an invalid track list of inconsistencies. Initially, all tracks are marked as invalid. While background synchronization is eliminating inconsistencies, accesses to invalid tracks are resolved by exchanging data associated with IOs and updating the invalid track lists based on IO bias and other factors.
-
公开(公告)号:US10102356B1
公开(公告)日:2018-10-16
申请号:US15064829
申请日:2016-03-09
Applicant: EMC IP Holding Company LLC
Inventor: Adnan Sahin , Michael Specht
Abstract: Techniques are described providing secure authentication of control commands executed on a data storage system. A pass code may be generated in accordance with criteria in response to successful two-factor authentication of a user identifier. Providing a valid generated passcode may be required with a control command in order for a data storage system to execute the control command. The control command may be one of a subset of possible control command that may be performed with respect to storage entities, such as logical devices and snapshots thereof. In another embodiment, rather than providing a pass code, the two factor authentication information and user identifier may be provided with the control command whereby successful completion of two-factor authentication of the user identifier and two factor authentication information may be required in order to execute the control command.
-
公开(公告)号:US12093576B2
公开(公告)日:2024-09-17
申请号:US17155381
申请日:2021-01-22
Applicant: EMC IP Holding Company LLC
Inventor: Dmitry Nikolayevich Tylik , Alexey Vladimirovich Shusharin , Mark J. Halstead , Michael Specht
IPC: G06F3/06
CPC classification number: G06F3/0665 , G06F3/0604 , G06F3/065 , G06F3/067 , G06F3/0689
Abstract: A technique for deploying virtual volumes in a metro cluster across first and second arrays includes impersonating a third array that purports to host single-site virtual volumes. The technique further includes mapping the single-site virtual volumes purportedly hosted by the third array to respective pairs of actual virtual volumes. Each pair includes a first virtual volume in the first array and a second virtual volume in the second array and realizes a stretched virtual volume, with writes being mirrored between the virtual volumes of each pair.
-
公开(公告)号:US20220236923A1
公开(公告)日:2022-07-28
申请号:US17155381
申请日:2021-01-22
Applicant: EMC IP Holding Company LLC
Inventor: Dmitry Nikolayevich Tylik , Alexey Vladimirovich Shusharin , Mark J. Halstead , Michael Specht
IPC: G06F3/06
Abstract: A technique for deploying virtual volumes in a metro cluster across first and second arrays includes impersonating a third array that purports to host single-site virtual volumes. The technique further includes mapping the single-site virtual volumes purportedly hosted by the third array to respective pairs of actual virtual volumes. Each pair includes a first virtual volume in the first array and a second virtual volume in the second array and realizes a stretched virtual volume, with writes being mirrored between the virtual volumes of each pair.
-
公开(公告)号:US20200133499A1
公开(公告)日:2020-04-30
申请号:US16174369
申请日:2018-10-30
Applicant: EMC IP HOLDING COMPANY LLC
Inventor: Deepak Vokaliga , Michael Specht , Mohammed Asher
IPC: G06F3/06
Abstract: In a data storage system in which a first storage array and a second storage array maintain first and second replicas of a production volume, the replicas are made discoverable and accessible while inconsistent. Each storage array maintains an invalid track list of inconsistencies. Initially, all tracks are marked as invalid. While background synchronization is eliminating inconsistencies, accesses to invalid tracks are resolved by exchanging data associated with IOs and updating the invalid track lists based on IO bias and other factors.
-
-
-
-
-
-
-