NetApp | Date: 2016-12-04
Methods and systems for tracking information that is transferred from a source to a destination storage system are provided. The source storage system maintains a first data structure for indicating that a storage block has been transferred. The destination storage system receives the storage block and updates a second data structure to indicate that the storage block has been received. The first data structure and the second data structure are compared to determine that the storage block was successfully transferred from the source storage system and received by the destination storage system.
NetApp | Date: 2016-12-04
One or more techniques and/or systems are provided for cluster configuration information replication, managing cluster-wide service agents, and/or for cluster-wide outage detection. In an example of cluster configuration information replication, a replication workflow corresponding to a storage operation implemented for a storage object (e.g., renaming of a volume) of a first cluster may be transferred to a second storage cluster for selectively implementation. In an example of managing cluster-wide service agents, cluster-wide service agents are deployed to nodes of a cluster storage environment, where a master agent actively processes cluster service calls and standby agents passively wait for reassignment as a failover master in the event the master agent fails. In an example of cluster-wide outage detection, a cluster-wide outage may be determined for a cluster storage environment based upon a number of inaccessible nodes satisfying a cluster outage detection metric.
NetApp | Date: 2017-01-23
A storage management computing device obtains an information lifecycle management (ILM) policy. A data protection scheme to be applied at a storage node computing device level is determined and a plurality of storage node computing devices are identified based on an application of the ILM policy to metadata received from one of the storage node computing devices and associated with an object ingested by the one of the storage node computing devices. The one of the storage node computing devices is instructed to generate one or more copies of the object or fragments of the object according to the data protection scheme and to distribute the object copies or one of the object fragments to one or more other of the storage node computing devices to be stored by at least the one or more other storage node computing devices on one or more disk storage devices.
NetApp | Date: 2017-02-13
Data consistency and availability can be provided at the granularity of logical storage objects in storage solutions that use storage virtualization in clustered storage environments. To ensure consistency of data across different storage elements, synchronization is performed across the different storage elements. Changes to data are synchronized across storage elements in different clusters by propagating the changes from a primary logical storage object to a secondary logical storage object. To satisfy the strictest RPOs while maintaining performance, change requests are intercepted prior to being sent to a filesystem that hosts the primary logical storage object and propagated to a different managing storage element associated with the secondary logical storage object.
NetApp | Date: 2017-05-17
A method, non-transitory computer readable medium, and apparatus that monitors an active virtual storage controller. A determination of when a failure of the active virtual storage controller has occurred is made based on the monitoring. When the failure of the active virtual storage controller is determined to have occurred, storage devices previously assigned to the active virtual storage controller are remapped to a passive virtual storage controller and transactions in a transaction log are replayed. In another example, active storage controllers are monitored with a passive storage controller. When a failure of one of the active storage controllers has occurred based on the monitoring is determined, storage devices previously assigned to the active storage controller are remapped, a transaction log associated with the active storage controller is retrieved from a transaction log database, and transactions in the transaction log are replayed.
NetApp | Date: 2017-01-04
A system and computer-based method for performing a data transaction in a network storage system is provided. In an embodiment, the method includes receiving, from a client, a first data transaction request including a first data identifier associated with a first namespace protocol; determining a storage system associated with the first data identifier and associated with a second namespace protocol; determining a second data identifier associated with the first data identifier, wherein the second data identifier conforms to the second namespace protocol; and forwarding a second data transaction request including the second data identifier to the storage system based on determining an association between the second data identifier and the first data identifier, wherein the first namespace protocol and the second namespace protocol are different.
NetApp | Date: 2017-01-25
Technology is disclosed for backing up data to and recovering data from a destination storage system that stores data in a format different form that of a primary storage system (the technology). A replication stream having the data of multiple files, metadata of the files, and reference maps including a mapping of the corresponding file to a portion of the data of the corresponding file is generated at the primary storage system. The replication stream is sent to a parser to map or convert the data, the files, and the reference maps to multiple storage objects in a format the destination storage system is configured to store. Various types of storage objects are generated, including a first type of the storage objects having the data, a second type of storage objects storing the reference maps, and a third type of the storage objects storing metadata of the files.
NetApp | Date: 2017-02-15
A system and method for connectivity-aware assignment of volumes among the storage controllers of a storage system is provided. In some embodiments, during a discovery phase, a connectivity metric is determined from a device discovery command. The connectivity metric is recorded into a data structure that identifies a plurality of hosts and a plurality of storage controllers of a storage system. In response to the determining of the connectivity metric, a storage controller ownership of a first volume is changed to improve connectivity between a host of the plurality of hosts and the first volume. In some such embodiments, a storage controller ownership of a second volume is changed to balance load among the plurality of storage controllers, and the discovery phase is, in part, a response to the change in the storage controller ownership of the second volume.
NetApp | Date: 2017-01-20
A system can maintain multiple queues for deduplication requests of different priorities. The system can also designate priority of storage units. The scheduling priority of a deduplication request is based on the priority of the storage unit indicated in the deduplication request and a trigger for the deduplication request.
Agency: European Commission | Branch: H2020 | Program: RIA | Phase: ICT-07-2014 | Award Amount: 6.94M | Year: 2015
The SSICLOPS project will focus on techniques for the management of federated private cloud infrastructures, in particular cloud networking techniques (within software-defined data centres and across wide-area networks). Key deliverables from the project will include a meta data description language for workloads, resources and policies, a flexible scheduling system using meta data, workload-specific adaptations to TCP/IP stacks, and data center performance analysis tools. Addressing topics, such as dynamic configuration, automated provisioning and orchestration of cloud resources the SSICLOPS projects will investigate high-performance, vertically integrated network stacks for intra/inter-cloud communication and efficient, scalable, and secure intra/inter-DC and client-facing transport mechanisms. The project will design, implement, demonstrate, and evaluate three specific use cases, namely a cloud-based in-memory database, the analysis of physics experiment data, and the prototypical extension of network stacks for a telecom provider in the SSICLOPS testbed.