-
公开(公告)号:US12105678B2
公开(公告)日:2024-10-01
申请号:US18335710
申请日:2023-06-15
Applicant: NetApp Inc.
Inventor: Rithin Kumar Shetty , Akhil Kaushik , Nagender Somavarapu , Yuedong Mu , Pranab Patnaik
IPC: G06F16/178 , G06F9/455 , G06F11/14 , G06F11/20 , G06F16/188 , H04L67/1095
CPC classification number: G06F16/178 , G06F9/45558 , G06F11/1464 , G06F11/1484 , G06F11/2076 , G06F11/2082 , G06F16/188 , H04L67/1095 , G06F2009/45562 , G06F2009/45583 , G06F2201/84
Abstract: One or more techniques and/or computing devices are provided for replicating virtual machine disk clones. For example, a first storage controller, hosting first storage, may have a synchronous replication relationship with a second storage controller hosting second storage. A virtual machine, within the first storage, may be specified as having synchronous replication protection. Accordingly, virtual machine disk clones of a virtual machine disk of the virtual machine may be replicated from the first storage to the second storage. For example, virtual machine disk clones may be synchronous replicated, replicated by a resync process invoked by a hypervisor agent, and/or stored and replicated from a clone backup directory.
-
公开(公告)号:US20240104061A1
公开(公告)日:2024-03-28
申请号:US18527634
申请日:2023-12-04
Applicant: NetApp Inc.
Inventor: Devang Kundanlal Shah , Dipankar Roy , Krishnaveni Budati , Kai Tan , Pranab Patnaik , Akhil Kaushik
IPC: G06F16/178 , G06F3/06 , G06F16/11
CPC classification number: G06F16/178 , G06F3/0604 , G06F3/0605 , G06F3/065 , G06F3/0655 , G06F3/0665 , G06F3/067 , G06F3/0679 , G06F16/122 , G06F16/128
Abstract: One or more techniques and/or computing devices are provided for managing an arbitrary set of storage items using a granset. For example, a storage controller may host a plurality of storage items and/or logical unit numbers (LUNs). A subset of the storage items are grouped into a consistency group. A granset is created for tracking, managing, and/or providing access to the storage items within the consistency group. For example, the granset comprises application programming interfaces (APIs) and/or properties used to provide certain levels of access to the storage items (e.g., read access, write access, no access), redirect operations to access either data of an active file system or to a snapshot, fence certain operations (e.g., rename and delete operations), and/or other properties that apply to each storage item within the consistency group. Thus, the granset provides a persistent on-disk layout used to manage an arbitrary set of storage items.
-
公开(公告)号:US11836115B2
公开(公告)日:2023-12-05
申请号:US17882713
申请日:2022-08-08
Applicant: NetApp Inc.
Inventor: Devang Kundanlal Shah , Dipankar Roy , Krishnaveni Budati , Kai Tan , Pranab Patnaik , Akhil Kaushik
IPC: G06F16/10 , G06F16/178 , G06F16/11 , G06F3/06
CPC classification number: G06F16/178 , G06F3/0604 , G06F3/0605 , G06F3/065 , G06F3/067 , G06F3/0655 , G06F3/0665 , G06F3/0679 , G06F16/122 , G06F16/128
Abstract: One or more techniques and/or computing devices are provided for managing an arbitrary set of storage items using a granset. For example, a storage controller may host a plurality of storage items and/or logical unit numbers (LUNs). A subset of the storage items are grouped into a consistency group. A granset is created for tracking, managing, and/or providing access to the storage items within the consistency group. For example, the granset comprises application programming interfaces (APIs) and/or properties used to provide certain levels of access to the storage items (e.g., read access, write access, no access), redirect operations to access either data of an active file system or to a snapshot, fence certain operations (e.g., rename and delete operations), and/or other properties that apply to each storage item within the consistency group. Thus, the granset provides a persistent on-disk layout used to manage an arbitrary set of storage items.
-
4.
公开(公告)号:US11829607B2
公开(公告)日:2023-11-28
申请号:US17548990
申请日:2021-12-13
Applicant: NetApp Inc.
Inventor: Pranab Patnaik , Akhil Kaushik
CPC classification number: G06F3/0619 , G06F3/065 , G06F3/067 , G06F11/1662 , G06F11/2076 , G06F11/2082 , G06F2201/82 , G06F2201/84
Abstract: One or more techniques and/or computing devices are provided for utilizing snapshots for data integrity validation and/or faster application recovery. For example, a first storage controller, hosting first storage, has a synchronous replication relationship with a second storage controller hosting second storage. A snapshot replication policy rule is defined to specify that a replication label is to be used for snapshot create requests, targeting the first storage, that are to be replicated to the second storage. A snapshot creation policy is created to issue snapshot create requests comprising the replication label. Thus a snapshot of the first storage and a replication snapshot of the second storage are created based upon a snapshot create request comprising the replication label. The snapshot and the replication snapshot may be compared for data integrity validation (e.g., determine whether the snapshots comprise the same data) and/or quickly recovering an application after a disaster.
-
公开(公告)号:US20190082013A1
公开(公告)日:2019-03-14
申请号:US16188794
申请日:2018-11-13
Applicant: NetApp Inc.
Inventor: Santosh Ananth Rao , Geoffrey Stewart Brown , Srikumar Natarajan , Pranab Patnaik , Kai Tan , Peter Frank Corbett , Vivek Venkatesan
Abstract: A storage area network (SAN)-attached storage system architecture is disclosed. The storage system provides strongly consistent distributed storage communication protocol semantics, such as SCSI target semantics. The system includes a mechanism for presenting a single distributed logical unit, comprising one or more logical sub-units, as a single logical unit of storage to a host system by associating each of the logical sub-units that make up the single distributed logical unit with a single host visible identifier that corresponds to the single distributed logical unit. The system further includes mechanisms to maintain consistent context information for each of the logical sub-units such that the logical sub-units are not visible to a host system as separate entities from the single distributed logical unit.
-
6.
公开(公告)号:US10228871B2
公开(公告)日:2019-03-12
申请号:US15049410
申请日:2016-02-22
Applicant: NetApp Inc.
Inventor: Pranab Patnaik , Akhil Kaushik
Abstract: One or more techniques and/or computing devices are provided for utilizing snapshots for data integrity validation and/or faster application recovery. For example, a first storage controller, hosting first storage, has a synchronous replication relationship with a second storage controller hosting second storage. A snapshot replication policy rule is defined to specify that a replication label is to be used for snapshot create requests, targeting the first storage, that are to be replicated to the second storage. A snapshot creation policy is created to issue snapshot create requests comprising the replication label. Thus a snapshot of the first storage and a replication snapshot of the second storage are created based upon a snapshot create request comprising the replication label. The snapshot and the replication snapshot may be compared for data integrity validation (e.g., determine whether the snapshots comprise the same data) and/or quickly recovering an application after a disaster.
-
公开(公告)号:US20180107727A1
公开(公告)日:2018-04-19
申请号:US15820979
申请日:2017-11-22
Applicant: NetApp Inc.
Inventor: Vijay M. Deshmukh , Pranab Patnaik , Uday Madhav Joshi , Kiyoshi James Komatsu
CPC classification number: G06F16/275 , G06F3/062 , G06F21/604 , G06F21/6236 , H04L63/08 , H04L63/10 , H04L63/102 , H04L63/20 , H04L67/1095 , H04L67/1097
Abstract: One or more techniques and/or computing devices are provided for secure data replication. For example, a first storage controller may host first storage within which storage resources (e.g., files, logical unit numbers (LUNs), volumes, etc.) are stored. The first storage controller may establish an access policy with a001 second storage controller to which data is to be replicated from the first storage. The access policy may define an authentication mechanism for the first storage controller to authenticate the second storage controller, an authorization mechanism specifying a type of access that the second storage controller has for a storage resource, and an access control mechanism specifying how the second storage controller's access to data of the storage resource is to be controlled. In this way, data replication requests may be authenticated and authorized so that data may be provided, according to the access control mechanism, in a secure manner.
-
公开(公告)号:US20170315874A1
公开(公告)日:2017-11-02
申请号:US15142186
申请日:2016-04-29
Applicant: NetApp Inc.
Inventor: Pranab Patnaik , Nagender Somavarapu , Yuedong Mu , Rithin Kumar Shetty , Devang Kundanlal Shah
CPC classification number: G06F11/2094 , G06F11/1441 , G06F11/2097
Abstract: One or more techniques and/or computing devices are provided for moving a consistency group having a replication relation. For example, a first consistency group of storage objects (e.g., files, logical unit numbers (LUNs), etc.) within first storage may have a replication relationship with a second consistency group within second storage (e.g., the second consistency group is maintained as a synchronously replicated copy of the first consistency group). A volume copy operation, a single file move on demand command, a single file restore command, or other functionality is used to move the first consistency group from the first storage to third storage, such as for load balancing, to create a moved first consistency group within the third storage. A new replication relationship is established between the moved first consistency group and the second consistency group, and the moved first consistency group and the second consistency group are resynchronized.
-
9.
公开(公告)号:US20170242599A1
公开(公告)日:2017-08-24
申请号:US15049410
申请日:2016-02-22
Applicant: NetApp Inc.
Inventor: Pranab Patnaik , Akhil Kaushik
IPC: G06F3/06
CPC classification number: G06F3/0619 , G06F3/065 , G06F3/067 , G06F11/2076 , G06F11/2082 , G06F2201/82 , G06F2201/84
Abstract: One or more techniques and/or computing devices are provided for utilizing snapshots for data integrity validation and/or faster application recovery. For example, a first storage controller, hosting first storage, has a synchronous replication relationship with a second storage controller hosting second storage. A snapshot replication policy rule is defined to specify that a replication label is to be used for snapshot create requests, targeting the first storage, that are to be replicated to the second storage. A snapshot creation policy is created to issue snapshot create requests comprising the replication label. Thus a snapshot of the first storage and a replication snapshot of the second storage are created based upon a snapshot create request comprising the replication label. The snapshot and the replication snapshot may be compared for data integrity validation (e.g., determine whether the snapshots comprise the same data) and/or quickly recovering an application after a disaster.
-
公开(公告)号:US20230325361A1
公开(公告)日:2023-10-12
申请号:US18335710
申请日:2023-06-15
Applicant: NetApp Inc.
Inventor: Rithin Kumar Shetty , Akhil Kaushik , Nagender Somavarapu , Yuedong Mu , Pranab Patnaik
IPC: G06F16/178 , G06F16/188 , G06F11/14 , G06F11/20 , G06F9/455 , H04L67/1095
CPC classification number: G06F16/178 , G06F16/188 , G06F11/1484 , G06F11/2076 , G06F11/2082 , G06F9/45558 , G06F11/1464 , H04L67/1095 , G06F2009/45562 , G06F2009/45583 , G06F2201/84
Abstract: One or more techniques and/or computing devices are provided for replicating virtual machine disk clones. For example, a first storage controller, hosting first storage, may have a synchronous replication relationship with a second storage controller hosting second storage. A virtual machine, within the first storage, may be specified as having synchronous replication protection. Accordingly, virtual machine disk clones of a virtual machine disk of the virtual machine may be replicated from the first storage to the second storage. For example, virtual machine disk clones may be synchronous replicated, replicated by a resync process invoked by a hypervisor agent, and/or stored and replicated from a clone backup directory.
-
-
-
-
-
-
-
-
-