Abstract:
A method includes exposing an application programming interface (API) at a manager application, the manager application running on a server in a computing cluster, wherein the API specifies input identifying nodes and connections between the nodes to implement storage protection policies in the computing cluster; receiving user input to the manager application according to the API, where the user input includes instructions to implement a secondary node and a connection between a primary node and the secondary node, the user input received at the manager application at a level of specificity that includes the secondary node and the connection between the primary node and the secondary node, thereby defining arbitrary protection topologies.
Abstract:
Methods and systems for a computing cluster are provided. An application programming interface (API) at a manager application is exposed. The API specifies input identifying nodes and connections between the nodes to implement storage protection policies in the computing cluster. A user input that includes instructions to implement multiple destination nodes and respective connections between a source node and the destination nodes is received. A topology that includes the source node, the destination nodes, and the connections between the source node and the destination nodes is traversed. Based on traversing the topology, commands are sent to a storage system of the cluster to implement a destination volume corresponding to the destination node and multiple protection configurations. Each of the protection configurations corresponds to a respective one of the connections.