System and Method for Providing Arbitrary Protection Topologies in a Computing Cluster
    1.
    发明申请
    System and Method for Providing Arbitrary Protection Topologies in a Computing Cluster 有权
    在计算集群中提供任意保护拓扑的系统和方法

    公开(公告)号:US20150033133A1

    公开(公告)日:2015-01-29

    申请号:US13951546

    申请日:2013-07-26

    Applicant: NetApp, Inc.

    Abstract: A method includes exposing an application programming interface (API) at a manager application, the manager application running on a server in a computing cluster, wherein the API specifies input identifying nodes and connections between the nodes to implement storage protection policies in the computing cluster; receiving user input to the manager application according to the API, where the user input includes instructions to implement a secondary node and a connection between a primary node and the secondary node, the user input received at the manager application at a level of specificity that includes the secondary node and the connection between the primary node and the secondary node, thereby defining arbitrary protection topologies.

    Abstract translation: 一种方法包括在管理员应用程序上暴露应用程序编程接口(API),运行在计算集群中的服务器上的管理器应用程序,其中API指定输入标识节点和节点之间的连接以在计算集群中实现存储保护策略; 根据API向管理者应用程序接收用户输入,其中用户输入包括实现辅助节点的指令和主节点与辅助节点之间的连接,在管理员应用程序处以包括以下特征的级别接收的用户输入: 辅助节点和主节点与辅助节点之间的连接,从而定义任意保护拓扑。

    System and method for providing arbitrary protection topologies in a computing cluster
    2.
    发明授权
    System and method for providing arbitrary protection topologies in a computing cluster 有权
    在计算集群中提供任意保护拓扑的系统和方法

    公开(公告)号:US09389797B2

    公开(公告)日:2016-07-12

    申请号:US13951546

    申请日:2013-07-26

    Applicant: NetApp, Inc.

    Abstract: Methods and systems for a computing cluster are provided. An application programming interface (API) at a manager application is exposed. The API specifies input identifying nodes and connections between the nodes to implement storage protection policies in the computing cluster. A user input that includes instructions to implement multiple destination nodes and respective connections between a source node and the destination nodes is received. A topology that includes the source node, the destination nodes, and the connections between the source node and the destination nodes is traversed. Based on traversing the topology, commands are sent to a storage system of the cluster to implement a destination volume corresponding to the destination node and multiple protection configurations. Each of the protection configurations corresponds to a respective one of the connections.

    Abstract translation: 提供了计算集群的方法和系统。 暴露管理应用程序中的应用程序编程接口(API)。 API指定输入标识节点和节点之间的连接,以在计算集群中实现存储保护策略。 接收包括实现多个目的地节点和在源节点与目的地节点之间的相应连接的指令的用户输入。 遍历包含源节点,目标节点以及源节点和目标节点之间的连接的拓扑。 基于遍历拓扑,将命令发送到集群的存储系统,以实现与目标节点对应的目标卷和多个保护配置。 每个保护配置对应于相应的一个连接。

Patent Agency Ranking