MONITORING INPUT/OUTPUT AND PERSISTENT RESERVATION ACTIVITY PATTERNS TO DETECT DEGRADED PERFORMANCE OF A HIGH AVAILABILITY AND FAULT TOLERANT APPLICATION

    公开(公告)号:US20250117299A1

    公开(公告)日:2025-04-10

    申请号:US18982992

    申请日:2024-12-16

    Applicant: Nutanix, Inc.

    Abstract: A technique monitors input/output (I/O) and storage ownership takeover activity patterns to detect degraded performance of a highly available and fault tolerant application executing in a multi-site environment. Multiple instances of the application execute in different containers or pods running on virtual machines (VMs) of a compute layer within a containerized (e.g., Kubernetes) clustering configuration that extends across clusters of the sites. A storage layer of the clusters provides shared storage to the pods running on the VMs across the multiple sites. One of the sites is configured as an active storage site configured to receive and service I/O requests from the compute layer. A single instance of the application is active at a time and configured as a “compute owner” of the shared storage to issue the I/O requests to the shared storage. The compute owner and active storage site may not be co-located on the same site, leading to excessive I/O and storage ownership takeover activity patterns indicative of degraded performance. Upon detecting such patterns, the technique automatically triggers a storage failover to ensure that compute owner and active storage site are co-located at the same site.

    Virtual disk grafting and differential based data pulling from external repository

    公开(公告)号:US12141042B2

    公开(公告)日:2024-11-12

    申请号:US18116413

    申请日:2023-03-02

    Applicant: Nutanix, Inc.

    Abstract: A technique utilizes grafting and differential based (diff-based) data seeding to hydrate a special virtual disk (vdisk) on a multi-node cluster with data changes (differences) between a reference vdisk stored on the cluster and a snapshot stored in an external repository to enable failover (including failback) recovery of an application workload in a disaster recovery environment. The application workload is stored as a workload vdisk on local storage of the cluster and snapshots of the workload vdisk are generated and organized as a vdisk chain on the cluster. One or more snapshots of the vdisk chain may be replicated to the external repository using a long-term snapshot service. Each replicated snapshot may be backed up from the cluster to the external repository at the granularity of a vdisk, referred to herein as an external datasource disk. The special vdisk is a thinly provisioned, datasource-backed vdisk that is grafted onto the vdisk chain, e.g., as a child vdisk of the reference vdisk. The differences between the reference vdisk and datasource disk are seeded from the datasource disk to hydrate the datasource-backed vdisk.

    TECHNIQUE FOR EFFICIENTLY INDEXING DATA OF AN ARCHIVAL STORAGE SYSTEM

    公开(公告)号:US20230029677A1

    公开(公告)日:2023-02-02

    申请号:US17487935

    申请日:2021-09-28

    Applicant: Nutanix, Inc.

    Abstract: An indexing technique provides an index data structure for efficient retrieval of a snapshot from a long-term storage service (LTSS) of an archival storage system. The snapshot is generated from typed data of a logical entity, such as a virtual disk (vdisk). The data of the snapshot is replicated to a frontend data service of the LTSS sequentially and organized as one or more data objects for storage by a backend data service of LTSS in an object store of the archival storage system. Metadata associated with the snapshot (i.e., snapshot metadata) is recorded as a log and persistently stored on storage media local to the frontend data service. The snapshot metadata includes information describing the snapshot data, e.g., a logical offset range of a snapshot of the vdisk and, thus, is used to construct the index data structure. Notably, construction of the index data structure is deferred until after the entirety of the snapshot data has been replicated and received by the frontend data service.

    INSTANT RECOVERY AS AN ENABLER FOR UNINHIBITED MOBILITY BETWEEN PRIMARY STORAGE AND SECONDARY STORAGE

    公开(公告)号:US20220309010A1

    公开(公告)日:2022-09-29

    申请号:US17676013

    申请日:2022-02-18

    Applicant: Nutanix, Inc.

    Abstract: In accordance with some aspects of the present disclosure, a non-transitory computer readable medium is disclosed. In some embodiments, the non-transitory computer readable medium includes instructions that, when executed by a processor, cause the processor to receive, from a workload hosted on a host of a cluster, first I/O traffic programmed according to a first I/O traffic protocol supported by a cluster-wide storage fabric exposed to the workload as being hosted on the same host. In some embodiments, the workload is recovered by a hypervisor hosted on the same host. In some embodiments, the non-transitory computer readable medium includes the instructions that, when executed by the processor, cause the processor to adapt the first I/O traffic to generate second I/O traffic programmed according to a second I/O traffic protocol supported by a repository external to the storage fabric and forward the second I/O traffic to the repository.

    GARBAGE COLLECTION FROM ARCHIVAL OF STORAGE SNAPSHOTS

    公开(公告)号:US20230079621A1

    公开(公告)日:2023-03-16

    申请号:US17514603

    申请日:2021-10-29

    Applicant: Nutanix, Inc.

    Abstract: A technique improves storage efficiency of an object store configured to maintain numerous snapshots for long-term storage in an archival storage system by efficiently determining data that is exclusively owned by an expiring snapshot to allow deletion of the expiring snapshot from the object store. The technique involves managing index data structures to enable efficient garbage collection across a very large number of data objects. When a snapshot expires, the technique obviates the need to scan the numerous snapshot data objects to determine which index structures are no longer needed and can be reclaimed (garbage collected). The technique is directed to management of underlying storage based on different sets of policies. When certain snapshots expire and are ready for deletion, the technique is directed to finding those data blocks that are no longer referenced (used) by any valid snapshots.

Patent Agency Ranking