-
公开(公告)号:US11138061B2
公开(公告)日:2021-10-05
申请号:US16288469
申请日:2019-02-28
Applicant: NetApp Inc.
Inventor: Akhil Kaushik , Anoop Chakkalakkal Vijayan
Abstract: Techniques are provided for neutralizing replication errors. An operation is executed upon a first storage object and is replicated as a replicated operation for execution upon a second storage object. A first error may be received for the replicated operation. Instead of transitioning to an out of sync state and aborting the operation, a wait is performed until a result of the attempted execution of the operation is received. If the first error is the same as a second error returned for the operation, then the operation and replicated operation are considered successful and a synchronous replication relationship is kept in sync. If the first error and the second error are different errors, then an error response is returned for the operation and the synchronous replication relationship is transitioned to out of sync.
-
2.
公开(公告)号:US20180095990A1
公开(公告)日:2018-04-05
申请号:US15820743
申请日:2017-11-22
Applicant: NetApp Inc.
Inventor: Anoop Chakkalakkal Vijayan
CPC classification number: G06F16/178 , G06F3/0607 , G06F3/0665 , G06F3/0667 , G06F11/0712 , G06F11/1484 , G06F11/1658 , G06F11/20 , G06F11/2089 , G06F16/1827 , H04L67/1095 , H04L67/1097
Abstract: A configuration for a component of a primary node is synchronized with a configuration for a component of a partner node in a different cluster by replicating the primary node configuration with the partner node. A baseline configuration replication comprises a snapshot of a component configuration on the primary. The baseline configuration can be generated by traversing through the configuration objects, capturing their attributes and encapsulating them in a package. The baseline package can then be transferred to the partner node. The configuration objects can be applied on the partner node in the order in which they were captured on the primary node. Attributes of the configuration objects are identified that are to be transformed. Values for the identified attributes are transformed from a name space in the primary node to a name space in the partner node.
-
3.
公开(公告)号:US20160105313A1
公开(公告)日:2016-04-14
申请号:US14510300
申请日:2014-10-09
Applicant: NetApp, Inc.
Inventor: Sudhakar Jha , Reshmi G. , Ganesh Marappa , Vineeth Kumar T. , Balaji Ramani , Veena TS , Rakshit Karnawat , Prasad V. Srinivas , Harsha Handral Sridhara , Anoop Chakkalakkal Vijayan
CPC classification number: H04L41/0816 , G06F11/1451 , G06F11/2069 , G06F11/2071 , G06F11/2082 , G06F2201/84 , H04L67/1095 , H04L67/1097
Abstract: A method includes receiving a change in a primary configuration of a primary storage node while the primary storage node is operational, wherein primary data stored in the primary storage node is to be backed up as backup data in a backup storage node. The method includes locating at least one identifier in the change that identifies the primary storage node. The method includes replacing the at least one identifier in the change that identifies the primary storage node with an identification of the backup storage node to create an updated configuration change. The method includes updating a backup configuration of the backup storage node based on the updated configuration change.
Abstract translation: 一种方法包括在主存储节点可操作时接收主存储节点的主配置的改变,其中存储在主存储节点中的主数据将作为备份存储节点中的备份数据进行备份。 该方法包括在识别主存储节点的改变中定位至少一个标识符。 该方法包括用识别主存储节点的变化中的至少一个标识符替换备份存储节点的标识,以创建更新的配置更改。 该方法包括基于更新的配置更改来更新备份存储节点的备份配置。
-
公开(公告)号:US20200285655A1
公开(公告)日:2020-09-10
申请号:US16293807
申请日:2019-03-06
Applicant: NetApp Inc.
Inventor: Akhil Kaushik , Anoop Chakkalakkal Vijayan , Preetham Kudgi Shenoy
IPC: G06F16/27
Abstract: Techniques are provided for transitioning a first storage object and a second storage object from an asynchronous replication state to a synchronous replication state. Metadata operations are logged into a metadata log. Dirty data, modified by data operations executed upon the first storage object, are tracked using a dirty region log. Metadata operations are replicated from the metadata log to the second storage object during a metadata drain phase. During the metadata drain phase, incoming operations are logged into the metadata log when the metadata log has a non-zero size, otherwise, the metadata operations are replicated to the second storage object. After the metadata drain phase, a data drain phase is performed using the dirty region log.
-
公开(公告)号:US10761768B1
公开(公告)日:2020-09-01
申请号:US16288506
申请日:2019-02-28
Applicant: NetApp Inc.
Inventor: Akhil Kaushik , Anoop Chakkalakkal Vijayan , Krishna Murthy Chandraiah setty Narasingarayanapeta , Shrey Sengar
IPC: G06F13/00 , G06F3/06 , G06F16/901
Abstract: Techniques are provided for handling misaligned holes and writes beyond end of files during a quick reconciliation process. During quick reconciliation, a read operation is performed to read data from a first storage object and is replicated to a second storage object. If the data read from the first storage object comprises misaligned holes, then a different range of data is read from the first storage object so that aligned holes are read and replicated to the second storage object. If the read operation targets a region beyond an end of the first storage object, then the second storage object is truncated to a size of the first storage object.
-
公开(公告)号:US10725691B1
公开(公告)日:2020-07-28
申请号:US16288437
申请日:2019-02-28
Applicant: NetApp Inc.
Inventor: Akhil Kaushik , Anoop Chakkalakkal Vijayan
Abstract: Techniques are provided for overlapping write handling. Overlapping write managers are used to maintain the order that write operations are executed at a first computing environment and replicated to a second computing environment. Overlapping write managers are pre-allocated as available for managing overlapping write operations. A mapping is used to track what overlapping write managers are currently allocated for particular file handles of files. Thus, if an incoming write operation targets a file handle of an already allocated overlapping write manager, then that overlapping write manager is used to execute and replicate the incoming write operation so that the order of execution of overlapping writes by the second computing environment is the same as at the first computing environment. If there is no allocated overlapping write manager for the file handle, then a new overlapping write manager is allocated and utilized.
-
公开(公告)号:US10698607B2
公开(公告)日:2020-06-30
申请号:US14715745
申请日:2015-05-19
Applicant: NetApp Inc.
Inventor: Chinmoy Dey , Anoop Chakkalakkal Vijayan , Prasad Srinivas
Abstract: One or more techniques and/or systems are provided for managing configuration updates used to replicate configuration of a primary storage virtual machine to a partner storage virtual machine. For example, the partner storage virtual machine may be configured to provide failover operation in place of the primary storage virtual machine in the event the primary storage virtual machine fails. Configuration updates are queued and replayed on the partner storage virtual machine to replicate objects of the primary storage virtual machine to the partner storage virtual machine (e.g., replay of create, modify, or delete object commands for synchronizing volumes, logical unit numbers, and/or other configuration objects of the primary storage virtual machine to the partner storage virtual machine). Configuration updates may be retained, modified, or discarded/removed based upon consolidation rules, which improves computing resource utilization by consolidating configuration updates and/or removing stale configuration updates while achieving a similar replication consistency result.
-
公开(公告)号:US09836476B2
公开(公告)日:2017-12-05
申请号:US14496611
申请日:2014-09-25
Applicant: NetApp, Inc.
Inventor: Anoop Chakkalakkal Vijayan
CPC classification number: G06F17/30174 , G06F3/0607 , G06F3/0665 , G06F3/0667 , G06F11/0712 , G06F11/1484 , G06F11/1658 , G06F11/20 , G06F11/2089 , G06F17/302 , H04L67/1095 , H04L67/1097
Abstract: A configuration for a component of a primary node is synchronized with a configuration for a component of a partner node in a different cluster by replicating the primary node configuration with the partner node. A baseline configuration replication comprises a snapshot of a component configuration on the primary. The baseline configuration can be generated by traversing through the configuration objects, capturing their attributes and encapsulating them in a package. The baseline package can then be transferred to the partner node. The configuration objects can be applied on the partner node in the order in which they were captured on the primary node. Attributes of the configuration objects are identified that are to be transformed. Values for the identified attributes are transformed from a name space in the primary node to a name space in the partner node.
-
公开(公告)号:US11036423B2
公开(公告)日:2021-06-15
申请号:US16903518
申请日:2020-06-17
Applicant: NetApp Inc.
Inventor: Akhil Kaushik , Anoop Chakkalakkal Vijayan
Abstract: Techniques are provided for overlapping write handling. Overlapping write managers are used to maintain the order that write operations are executed at a first computing environment and replicated to a second computing environment. Overlapping write managers are pre-allocated as available for managing overlapping write operations. A mapping is used to track what overlapping write managers are currently allocated for particular file handles of files. Thus, if an incoming write operation targets a file handle of an already allocated overlapping write manager, then that overlapping write manager is used to execute and replicate the incoming write operation so that the order of execution of overlapping writes by the second computing environment is the same as at the first computing environment. If there is no allocated overlapping write manager for the file handle, then a new overlapping write manager is allocated and utilized.
-
公开(公告)号:US20200372046A1
公开(公告)日:2020-11-26
申请号:US16686686
申请日:2019-11-18
Applicant: NetApp Inc.
Inventor: Anoop Chakkalakkal Vijayan , Shrey Sengar
IPC: G06F16/27
Abstract: Techniques are provided for dependency aware parallel splitting of operations. For example, a count of pending data operations being executed by a first node and replicated in parallel to a second node are tracked. A metadata operation is executed at the first node based upon the count being less than a threshold (e.g., the count being zero). A first list of affected inodes modified by the metadata operation is identified. A dependency of the metadata operation with respect to pending metadata operations replicated to the second node is determined. The metadata operation is dispatched to the second node based upon the dependency indicating that the metadata operation is independent of the pending metadata operations.
-
-
-
-
-
-
-
-
-