Abstract:
A method and system performs a fencing technique in a host cluster storage environment. The fence program executes on each cluster member in the cluster, and the cluster is coupled to a storage system by a network. When a cluster member fails or cluster membership changes, the fence program is invoked and a host fencing API message is sent via the network to the storage system. The storage system in turn modifies export lists to restrict further access by the failed cluster node to otherwise fence the failed cluster node off from that storage system or from certain directories within that storage system.
Abstract:
A system and method are provided to manage different types of workload. The method comprises receiving a request, determining a class of the request, determining a priority level associated with the class of the request, and servicing the request utilizing the priority level of the class of the request. The class of the request may be associated with a target volume, as well as with a network protocol, or with a network port.
Abstract:
A file system migrates a traditional volume to a virtual volume without data copying. In an embodiment, a traditional volume index node is selected for migration. The traditional volume index node is converted to a virtual volume index node. In one embodiment, the virtual volume index node provides both physical address information and virtual address information.
Abstract:
A network-accessible memory (NAM) element (1) comprises a substrate (2) , a memory (3) mounted to the substrate, network interface circuitry (4) and logic circuitry (5) . The network interface circuitry (4) implements a network physical layer (4) and is mounted to the substrate (2) . The logic circuitry (5) is mounted to the substrate (2) and is coupled to the network interface circuitry (4) and the memory (3) , and is configured to operate as a memory controller (5) to control access to the memory by a host processor which is external to the WAM element through the network interface circuitry. The KTAM element (l)can be interconnected with other WAM elements to form a larger WAM storage device.
Abstract:
A system and method efficiently generates a set of parallel persistent consistenc point images (PCPIs) of volumes configured as a SVS and served by a plurality of node interconnected as a cluster. A volume operations daemon (VOD) executing on a node o the cluster is configured to manage generation of the volume PCPIs. Notably, the set of PCPIs is generated substantially in parallel to thereby obtain a consistent and accurate point in time reference of the entire SVS.
Abstract:
A technique places content, such as data, of one or more data containers on volumes of a striped volume set (SVS). The placement of data across the volumes of the SVS allows specification of a deterministic pattern of fixed length. That is, the pattern determines a placement of data of a data container that is striped among the volumes of the SVS. The placement pattern is such that the stripes are distributed exactly or nearly equally among the volumes and that, within any local span of a small multiple of the number of volumes, the stripes are distributed nearly equally among the volumes. The placement pattern is also substantially similar for a plurality of SVSs having different numbers of volumes.
Abstract:
An architecture provides the ability to create and maintain multiple instances of virtual servers, such as virtual filers (vfilers), within a server, such as a storage appliance. A vfiler is a logical partitioning of network and storage resources of the storage appliance platform to establish an instance of a multi-protocol server. Each vfiler is allocated a subset of dedicated units of storage resources, such as volumes or logical sub-volumes (qtrees), and one or more network address resources. Each vfiler is also allowed shared access to a file system resource of a storage operating system. To ensure controlled access to the allocated and shared resources, each vfiler is further assigned its own security domain for each access protocol. A vfiler boundary check is performed by the file system to verify that a current vfiler is allowed to access certain storage resources for a requested file stored on the filer platform.
Abstract:
The present invention provides a novel coordinated shared storage architecture that permits the amortization of cost of the spares over any number of the storage systems and enables improvements to a number of storage system operations. The coordinated shared storage architecture comprises a plurality of storage systems disk shelves via a plurality of intermediate network devices, such as hubs. Each storage system includes a storage operating system having a target device driver module. The target device driver module permits the storage system to function as a SCSI target and thereby receive and process commands directed to it from other storage systems.
Abstract:
A network-accessible memory (NAM) element comprises a substrate, a memory mounted to the substrate, network interface circuitry and logic circuitry. The network interface circuitry implements a network physical layer and is mounted to the substrate. The logic circuitry is mounted to the substrate and is coupled to the network interface circuitry and the memory, and is configured to operate as a memory controller to control access to the memory by a host processor which is external to the NAM element through the network interface circuitry. The NAM element can be interconnected with other NAM elements to form a larger NAM storage device.
Abstract:
A system and method for reclaims unused space from a thinly provision data container served by a storage system. A host-side agent detects blocks of the data container that may be freed and sends a novel Punch Hole command to the storage system associated with the data container. The storage system allocates the appropriate blocks in response to the Punch Hole command.