-
公开(公告)号:US10809922B2
公开(公告)日:2020-10-20
申请号:US16048486
申请日:2018-07-30
发明人: Tianming Zhang , Girish Sheelvant , Qi Jin , Nagasimha Haravu , Michael Zeldich , Sathish Janamanchi
IPC分类号: G06F3/06
摘要: A data protection technique involves, based on a first set of policies on a first storage array, generating a second set of policies on a second storage array to track the first set. The first array maintains a first storage object, and the second array maintains a second storage object as a replica of the first storage object. The technique further includes detecting assignment of the first set of policies to the first storage object and, in response to such detection, assigning the second set of policies to the second storage object. Application of a set of storage policies to a storage object may be delayed if the storage object is a replication destination. A policy group may identify multiple data protection rules or policies, which may include a snapshot rule and/or replication rule, and a user may be prevented from directly making a rule modification to a policy group. An orphan policy group cleanup operation may be performed to delete orphan policy groups.
-
公开(公告)号:US10089202B1
公开(公告)日:2018-10-02
申请号:US14982625
申请日:2015-12-29
摘要: A technique provides data high availability to a set of host computers. The technique involves, while a production array provides the set of host computers with access to a production logical unit of storage (LUN), replicating data from the production LUN to a replicated LUN on a replication array. The technique further involves, after replicating at least some of the data from the production LUN to the replicated LUN, electronically detecting a production array deficiency. The technique further involves, in response to electronically detecting the production array deficiency, automatically performing, by electronic circuitry, a failover operation which (i) terminates providing the set of host computers with access to the production LUN and (ii) provides the set of host computers with access to the replicated LUN on the replication array.
-
公开(公告)号:US11836352B2
公开(公告)日:2023-12-05
申请号:US16522974
申请日:2019-07-26
IPC分类号: G06F3/06 , H04W4/021 , B60L53/80 , H04W4/02 , G06Q10/0833 , G06Q10/0635
CPC分类号: G06F3/0619 , B60L53/80 , G06F3/0607 , G06F3/0625 , G06F3/0653 , G06Q10/0635 , G06Q10/0833 , H04W4/021 , H04W4/027
摘要: Techniques are directed to detecting an abnormal event while data storage equipment is in transit. Such techniques involve receiving a series of sensor signals from a set of sensors affixed to the data storage equipment. The series of sensor signals identifies a series of positional integrity measurements for the data storage equipment while the data storage equipment is in transit. Such techniques further involve performing a series of comparison operations that compares the series of positional integrity measurements to a set of range. Such techniques further involve, based on the series of comparison operations, providing an abnormal event signal in response to a particular positional integrity measurement falling outside a corresponding range of the set of ranges.
-
公开(公告)号:US20220291851A1
公开(公告)日:2022-09-15
申请号:US17197467
申请日:2021-03-10
IPC分类号: G06F3/06
摘要: Configuring systems to provide host access may include: configuring a stretched volume; and performing processing that allows the host access to the stretched volume. The processing may include: receiving a first command to create a first host object for access control for the host in the first data storage system; in response to receiving the first command, performing first processing including: creating the first host object that includes an initiator set of the host; and creating a second host object on the second data storage system, wherein the second host object includes the initiator set and specifies access control in the second data storage system for the host; receiving a second command to map the stretched volume to the first host object; and in response to receiving the second command, granting the host access to the stretched volume on the first data storage system and the second data storage system.
-
公开(公告)号:US20200034077A1
公开(公告)日:2020-01-30
申请号:US16049148
申请日:2018-07-30
IPC分类号: G06F3/06
摘要: Techniques for providing a unified approach to an orchestration of services for accomplishing data import tasks, data replication tasks, and/or data migration tasks in a clustered storage environment. The techniques are employed in a clustered storage environment that includes one or more storage domains, each of which includes, as members of the storage domain, a primary storage appliance and one or more secondary storage appliances. By providing, in a primary storage appliance of a storage domain within a clustered storage environment, an orchestrator for orchestrating a set of orchestration phases, which can be shared to perform data import tasks, data replication tasks, and/or data migration tasks involving a foreign storage system deployed outside of the clustered storage environment and/or one or more data storage appliance deployed within the clustered storage environment, enhanced efficiencies due to infrastructure sharing within the clustered storage environment can be achieved.
-
公开(公告)号:US20200034051A1
公开(公告)日:2020-01-30
申请号:US16048486
申请日:2018-07-30
发明人: Tianming Zhang , Girish Sheelvant , Qi Jin , Nagasimha Haravu , Michael Zeldich , Sathish Janamanchi
IPC分类号: G06F3/06
摘要: A data protection technique involves, based on a first set of policies on a first array, generating a second set of policies on a second array to track the first set. The first array maintains a first storage object, and the second array maintains a second storage object as a replica of the first storage object. The technique further includes detecting assignment of the first set to the first storage object. The first array provides data protection to the first storage object in accordance with the first set in response to assignment of the first set to the first storage object. The technique further includes, in response to such detection, assigning the second set to the second storage object. The second array provides data protection to the second storage object in accordance with the second set in response to assignment of the second set to the second storage object.
-
公开(公告)号:US11822801B2
公开(公告)日:2023-11-21
申请号:US17197467
申请日:2021-03-10
IPC分类号: G06F3/06
CPC分类号: G06F3/0635 , G06F3/0604 , G06F3/065 , G06F3/0644 , G06F3/0659 , G06F3/0683
摘要: Configuring systems to provide host access may include: configuring a stretched volume; and performing processing that allows the host access to the stretched volume. The processing may include: receiving a first command to create a first host object for access control for the host in the first data storage system; in response to receiving the first command, performing first processing including: creating the first host object that includes an initiator set of the host; and creating a second host object on the second data storage system, wherein the second host object includes the initiator set and specifies access control in the second data storage system for the host; receiving a second command to map the stretched volume to the first host object; and in response to receiving the second command, granting the host access to the stretched volume on the first data storage system and the second data storage system.
-
公开(公告)号:US11290546B1
公开(公告)日:2022-03-29
申请号:US17221327
申请日:2021-04-02
IPC分类号: H04L29/08 , H04L67/148 , H04L67/00 , H04L67/146 , H04L67/1097
摘要: Techniques for providing a common object model for storage systems that facilitates the performance of data mobility use cases. In the techniques, a plurality of storage system objects for a plurality of storage systems, respectively, are instantiated from a common object model, in which the respective storage system objects have unique identifiers. Further, one or more storage system objects involved in one or more data mobility use cases are determined from among the plurality of storage system objects using the unique identifiers. The determined storage system objects include capabilities of at least some of the plurality of storage systems. Based on the capabilities included in the determined storage system objects, operations of the data mobility use cases are initiated at a system level via a single user interface, thereby providing uniform management of data mobility sessions that increases the efficiency of storage administrators.
-
9.
公开(公告)号:US20210034402A1
公开(公告)日:2021-02-04
申请号:US16530779
申请日:2019-08-02
摘要: A method, computer program product, and computer system for creating, with a first replication product, one or more groups of a plurality of groups that is empty in a storage array. A protection policy may be applied to the one or more groups on the first replication product, wherein the protection policy may include a replication rule. A policy profile may be created by the second replication product, wherein the replication rule may be included to the policy profile. The protection policy may be applied to a virtual machine (VM). The policy profile may be applied to the VM. The first replication product may replicate one or more virtual volumes of the VM on a remote system based upon, at least in part, the replication rule.
-
公开(公告)号:US20200034041A1
公开(公告)日:2020-01-30
申请号:US16048489
申请日:2018-07-30
发明人: Tianming Zhang , Girish Sheelvant , Qi Jin , Nagasimha Haravu , Michael Zeldich , Sathish Janamanchi
IPC分类号: G06F3/06
摘要: A technique utilizes a group of data protection policies within data storage equipment. The technique involves providing, by the data storage equipment, access to individually invocable data protection services. The data storage equipment is constructed and arranged to invoke each individually invocable data protection service in response to user entrance of a respective data protection rule to protect data within a storage object. The technique further involves forming, by the data storage equipment, a policy group from multiple data protection rules. The technique further involves assigning, by the data storage equipment, the policy group to a set of storage objects to protect data within the set of storage objects. Such a technique enables assignment of multiple and different data protection rules to a storage object all at once. Moreover, if the policy group is modified, the modification may be applied to all storage objects at the same time.
-
-
-
-
-
-
-
-
-