-
公开(公告)号:US20220317882A1
公开(公告)日:2022-10-06
申请号:US17219816
申请日:2021-03-31
Applicant: NetApp, Inc.
Inventor: Anoop Vijayan , Akhil Kaushik , Sohan Shetty , Dhruvil Shah
IPC: G06F3/06
Abstract: Systems and methods are described for efficiently processing events related to a relationship between a primary copy of data at a primary storage system and a mirror copy of the data at a cross-site secondary storage system of a multi-site distributed storage system. According to an example, a mediator agent that is configured on both primary and secondary storage systems provides coordination and serialization for various events generated in the relationship. The multi-site distributed storage system performs actions based on the event processing such as performing a failover operation from the primary storage system to the secondary storage system or resynchronizing the relationship to ensure application protection and availability.
-
公开(公告)号:US11409622B1
公开(公告)日:2022-08-09
申请号:US17238829
申请日:2021-04-23
Applicant: NetApp, Inc.
Inventor: Akhil Kaushik , Anoop Vijayan
Abstract: Systems and methods are described for a non-disruptive planned failover from a primary copy of data at a primary storage cluster to a mirror copy of the data at a cross-site secondary storage cluster without using an external mediator. According to an example, a planned failover feature of a multi-site distributed storage system provides an order of operations such that a primary copy of a first data center continues to serve I/O operations until a mirror copy of a second data center is ready. This planned failover feature improves functionality and efficiency of the distributed storage system by providing non-disruptiveness during planned failover without using an external mediator based on a primary storage cluster being selected as an authority to implement a state machine with a persistent configuration database to track a planned failover state for the planned failover.
-
153.
公开(公告)号:US20220171544A1
公开(公告)日:2022-06-02
申请号:US17548990
申请日:2021-12-13
Applicant: NetApp Inc.
Inventor: Pranab Patnaik , Akhil Kaushik
Abstract: One or more techniques and/or computing devices are provided for utilizing snapshots for data integrity validation and/or faster application recovery. For example, a first storage controller, hosting first storage, has a synchronous replication relationship with a second storage controller hosting second storage. A snapshot replication policy rule is defined to specify that a replication label is to be used for snapshot create requests, targeting the first storage, that are to be replicated to the second storage. A snapshot creation policy is created to issue snapshot create requests comprising the replication label. Thus a snapshot of the first storage and a replication snapshot of the second storage are created based upon a snapshot create request comprising the replication label. The snapshot and the replication snapshot may be compared for data integrity validation (e.g., determine whether the snapshots comprise the same data) and/or quickly recovering an application after a disaster.
-
公开(公告)号:US11218539B2
公开(公告)日:2022-01-04
申请号:US16682056
申请日:2019-11-13
Applicant: NetApp Inc.
Inventor: Paul Anthony Powell , Akhil Kaushik , Srikumar Natarajan , Ching-Yuk Paul Ngan
IPC: G06F11/28 , H04L29/08 , G06F16/178 , G06F16/182 , G06F3/06 , G06F11/20
Abstract: One or more techniques and/or computing devices are provided for implementing synchronous replication. For example, a synchronous replication relationship may be established between a first storage controller hosting local storage and a second storage controller hosting remote storage (e.g., replication may be specified at a file, logical unit number (LUN), or any other level of granularity). Data operations and offloaded operations may be implemented in parallel upon the local storage and the remote storage. Error handling operations may be implemented upon the local storage and implement in parallel as a best effort on the remote storage, and a reconciliation may be performed to identify any data divergence from the best effort parallel implementation. Storage area network (SAN) operations may be implemented upon the local storage, and upon local completion may be remotely implemented upon the remote storage.
-
公开(公告)号:US11194500B2
公开(公告)日:2021-12-07
申请号:US15008724
申请日:2016-01-28
Applicant: NetApp Inc.
Inventor: Akhil Kaushik , Anil Kumar Ponnapur , Aravind Srinivasa Raghavan , Manoj Kumar V Sundararajan
IPC: G06F3/06
Abstract: One or more techniques and/or computing devices are provided for resilient replication of storage operations. For example, a first storage controller may host first storage having a replication relationship with second storage hosted by a second storage controller. To improve resiliency against transient network issues of a network between the storage controllers, the first storage controller may implement a queue and retry mechanism to retry replication operations not acknowledge back by the second storage controller within a threshold time. The second storage controller may maintain a cumulative sequence number of a latest replication operation performed in order, an operation response map of replication operations performed out of order, and an operation finder map identifying currently implemented replication operations, which may be used to process incoming replication operations. Single write semantics, write order consistency, and reduction of write amplification may be provided.
-
公开(公告)号:US11163729B2
公开(公告)日:2021-11-02
申请号:US16456775
申请日:2019-06-28
Applicant: NetApp Inc.
Inventor: Rithin Kumar Shetty , Akhil Kaushik , Nagender Somavarapu , Yuedong Mu , Pranab Patnaik
IPC: G06F16/178 , G06F16/188 , G06F11/14 , G06F11/20 , G06F9/455 , H04L29/08
Abstract: One or more techniques and/or computing devices are provided for replicating virtual machine disk clones. For example, a first storage controller, hosting first storage, may have a synchronous replication relationship with a second storage controller hosting second storage. A virtual machine, within the first storage, may be specified as having synchronous replication protection. Accordingly, virtual machine disk clones of a virtual machine disk of the virtual machine may be replicated from the first storage to the second storage. For example, virtual machine disk clones may be synchronous replicated, replicated by a resync process invoked by a hypervisor agent, and/or stored and replicated from a clone backup directory.
-
公开(公告)号:US11144211B2
公开(公告)日:2021-10-12
申请号:US16682099
申请日:2019-11-13
Applicant: NetApp Inc.
Inventor: Akhil Kaushik , Ripulkumar Hemantbhai Patel , Vrishali Dattatray Hajare , Andrew Eric Dunn , Rithin Kumar Shetty
Abstract: One or more techniques and/or computing devices are provided for resynchronization. For example, a request may be received to create pseudo snapshots of a first consistency group, hosted by a first storage controller, and a second consistency group, hosted by a second storage controller, having a synchronous replication relationship with the first consistency group. Incoming client write requests are logged within an intercept tracking log at the first storage controller. After a first drain without hold of incoming write requests is performed, a first pseudo common snapshot of the second consistency group is created. After a second drain without hold of incoming write operations is performed, a second pseudo common snapshot of the first consistency group and the intercept tracking log is created. The pseudo snapshots and the intercept tracking log (e.g., indicating a delta between the pseudo snapshots) are used to resynchronize the first and second consistency groups.
-
公开(公告)号:US20200278791A1
公开(公告)日:2020-09-03
申请号:US16288506
申请日:2019-02-28
Applicant: NetApp Inc.
Inventor: Akhil Kaushik , Anoop Chakkalakkal Vijayan , Krishna Murthy Chandraiah setty Narasingarayanapeta , Shrey Sengar
IPC: G06F3/06 , G06F16/901
Abstract: Techniques are provided for handling misaligned holes and writes beyond end of files during a quick reconciliation process. During quick reconciliation, a read operation is performed to read data from a first storage object and is replicated to a second storage object. If the data read from the first storage object comprises misaligned holes, then a different range of data is read from the first storage object so that aligned holes are read and replicated to the second storage object. If the read operation targets a region beyond an end of the first storage object, then the second storage object is truncated to a size of the first storage object.
-
公开(公告)号:US20200042536A1
公开(公告)日:2020-02-06
申请号:US16191582
申请日:2018-11-15
Applicant: NetApp Inc.
Inventor: Akhil Kaushik , Balaji Ramani
IPC: G06F16/27 , G06F16/11 , G06F16/176 , G06F11/14
Abstract: Techniques are provided for synchronous replication based cutover. An asynchronous replication process is executed to perform asynchronous incremental transfers of data of a storage object from a first computing environment to a replicated storage object at a second computing environment until a cutover criteria is met. A synchronous replication process is executed to synchronously replicate operations, targeting the storage object, to the replicated storage object based upon the cutover criteria being met. A cutover is performed to direct operations from targeting the storage object to targeting the replicated storage object based upon the synchronous replication process reaching a steady state of synchronous replication for sub-objects of the storage object, where operations are committed to both the storage object and the replicated storage object.
-
160.
公开(公告)号:US10552064B2
公开(公告)日:2020-02-04
申请号:US16265032
申请日:2019-02-01
Applicant: NetApp Inc.
Inventor: Pranab Patnaik , Akhil Kaushik
Abstract: One or more techniques and/or computing devices are provided for utilizing snapshots for data integrity validation and/or faster application recovery. For example, a first storage controller, hosting first storage, has a synchronous replication relationship with a second storage controller hosting second storage. A snapshot replication policy rule is defined to specify that a replication label is to be used for snapshot create requests, targeting the first storage, that are to be replicated to the second storage. A snapshot creation policy is created to issue snapshot create requests comprising the replication label. Thus a snapshot of the first storage and a replication snapshot of the second storage are created based upon a snapshot create request comprising the replication label. The snapshot and the replication snapshot may be compared for data integrity validation (e.g., determine whether the snapshots comprise the same data) and/or quickly recovering an application after a disaster.
-
-
-
-
-
-
-
-
-