Providing data high availability to a set of host computers via automatic failover

    公开(公告)号:US10089202B1

    公开(公告)日:2018-10-02

    申请号:US14982625

    申请日:2015-12-29

    摘要: A technique provides data high availability to a set of host computers. The technique involves, while a production array provides the set of host computers with access to a production logical unit of storage (LUN), replicating data from the production LUN to a replicated LUN on a replication array. The technique further involves, after replicating at least some of the data from the production LUN to the replicated LUN, electronically detecting a production array deficiency. The technique further involves, in response to electronically detecting the production array deficiency, automatically performing, by electronic circuitry, a failover operation which (i) terminates providing the set of host computers with access to the production LUN and (ii) provides the set of host computers with access to the replicated LUN on the replication array.

    AUTOMATED UNIFORM HOST ATTACHMENT

    公开(公告)号:US20220291851A1

    公开(公告)日:2022-09-15

    申请号:US17197467

    申请日:2021-03-10

    IPC分类号: G06F3/06

    摘要: Configuring systems to provide host access may include: configuring a stretched volume; and performing processing that allows the host access to the stretched volume. The processing may include: receiving a first command to create a first host object for access control for the host in the first data storage system; in response to receiving the first command, performing first processing including: creating the first host object that includes an initiator set of the host; and creating a second host object on the second data storage system, wherein the second host object includes the initiator set and specifies access control in the second data storage system for the host; receiving a second command to map the stretched volume to the first host object; and in response to receiving the second command, granting the host access to the stretched volume on the first data storage system and the second data storage system.

    UNIFIED APPROACH TO IMPORT, REPLICATION, AND MIGRATION OF A STORAGE VOLUME

    公开(公告)号:US20200034077A1

    公开(公告)日:2020-01-30

    申请号:US16049148

    申请日:2018-07-30

    IPC分类号: G06F3/06

    摘要: Techniques for providing a unified approach to an orchestration of services for accomplishing data import tasks, data replication tasks, and/or data migration tasks in a clustered storage environment. The techniques are employed in a clustered storage environment that includes one or more storage domains, each of which includes, as members of the storage domain, a primary storage appliance and one or more secondary storage appliances. By providing, in a primary storage appliance of a storage domain within a clustered storage environment, an orchestrator for orchestrating a set of orchestration phases, which can be shared to perform data import tasks, data replication tasks, and/or data migration tasks involving a foreign storage system deployed outside of the clustered storage environment and/or one or more data storage appliance deployed within the clustered storage environment, enhanced efficiencies due to infrastructure sharing within the clustered storage environment can be achieved.

    Automated uniform host attachment

    公开(公告)号:US11822801B2

    公开(公告)日:2023-11-21

    申请号:US17197467

    申请日:2021-03-10

    IPC分类号: G06F3/06

    摘要: Configuring systems to provide host access may include: configuring a stretched volume; and performing processing that allows the host access to the stretched volume. The processing may include: receiving a first command to create a first host object for access control for the host in the first data storage system; in response to receiving the first command, performing first processing including: creating the first host object that includes an initiator set of the host; and creating a second host object on the second data storage system, wherein the second host object includes the initiator set and specifies access control in the second data storage system for the host; receiving a second command to map the stretched volume to the first host object; and in response to receiving the second command, granting the host access to the stretched volume on the first data storage system and the second data storage system.

    Common model for pairing physical and/or cloud-based storage systems for data mobility

    公开(公告)号:US11290546B1

    公开(公告)日:2022-03-29

    申请号:US17221327

    申请日:2021-04-02

    摘要: Techniques for providing a common object model for storage systems that facilitates the performance of data mobility use cases. In the techniques, a plurality of storage system objects for a plurality of storage systems, respectively, are instantiated from a common object model, in which the respective storage system objects have unique identifiers. Further, one or more storage system objects involved in one or more data mobility use cases are determined from among the plurality of storage system objects using the unique identifiers. The determined storage system objects include capabilities of at least some of the plurality of storage systems. Based on the capabilities included in the determined storage system objects, operations of the data mobility use cases are initiated at a system level via a single user interface, thereby providing uniform management of data mobility sessions that increases the efficiency of storage administrators.

    UTILIZING GROUPS OF DATA PROTECTION POLICIES THAT ARE ASSIGNABLE TO STORAGE OBJECTS

    公开(公告)号:US20200034041A1

    公开(公告)日:2020-01-30

    申请号:US16048489

    申请日:2018-07-30

    IPC分类号: G06F3/06

    摘要: A technique utilizes a group of data protection policies within data storage equipment. The technique involves providing, by the data storage equipment, access to individually invocable data protection services. The data storage equipment is constructed and arranged to invoke each individually invocable data protection service in response to user entrance of a respective data protection rule to protect data within a storage object. The technique further involves forming, by the data storage equipment, a policy group from multiple data protection rules. The technique further involves assigning, by the data storage equipment, the policy group to a set of storage objects to protect data within the set of storage objects. Such a technique enables assignment of multiple and different data protection rules to a storage object all at once. Moreover, if the policy group is modified, the modification may be applied to all storage objects at the same time.