-
1.
公开(公告)号:US11372665B2
公开(公告)日:2022-06-28
申请号:US16530779
申请日:2019-08-02
摘要: A method, computer program product, and computer system for creating, with a first replication product, one or more groups of a plurality of groups that is empty in a storage array. A protection policy may be applied to the one or more groups on the first replication product, wherein the protection policy may include a replication rule. A policy profile may be created by the second replication product, wherein the replication rule may be included to the policy profile. The protection policy may be applied to a virtual machine (VM). The policy profile may be applied to the VM. The first replication product may replicate one or more virtual volumes of the VM on a remote system based upon, at least in part, the replication rule.
-
公开(公告)号:US20210034245A1
公开(公告)日:2021-02-04
申请号:US16525921
申请日:2019-07-30
发明人: Dmitry Tylik , Michael Zeldich , Nagasimha G. Haravu , William C. Whitney , Sergey Alexeev , Alexey Shusharin
摘要: Techniques for taking and managing snapshots comprise: capturing a first snapshot of a virtual machine (VM), wherein the first snapshot is a managed snapshot exposed to a virtualization environment and a data storage system environment providing physical storage for data of the VM; capturing a second snapshot of the VM, wherein the second snapshot of the VM is a managed snapshot of the VM is exposed to the virtualization environment and the data storage system environment; and converting the second snapshot of the VM from a managed snapshot of the VM to an unmanaged snapshot of the VM. Subsequent to completing the converting, the second snapshot of the VM that is an unmanaged snapshot is exposed to the data storage system environment and subsequent to completing the converting, the second snapshot of the VM that is an unmanaged snapshot is not exposed to the virtualization environment.
-
公开(公告)号:US10564885B1
公开(公告)日:2020-02-18
申请号:US15663195
申请日:2017-07-28
发明人: Nagasimha Haravu , Michael Zeldich
摘要: A set of one or more logical storage units is provisioned in a data storage system. Each logical storage unit is provisioned with a given storage capacity. A set of one or more object rules is applied to objects stored in the set of one or more logical storage units. The set of one or more object rules is configured to maintain available free storage space in each of the set of one or more logical storage units: (i) consistent with a desired free storage space level and an acceptable free storage space level; and (ii) consistent with an object retention policy comprising a desired retention time value and an acceptable retention time value for a given object.
-
公开(公告)号:US20200034051A1
公开(公告)日:2020-01-30
申请号:US16048486
申请日:2018-07-30
发明人: Tianming Zhang , Girish Sheelvant , Qi Jin , Nagasimha Haravu , Michael Zeldich , Sathish Janamanchi
IPC分类号: G06F3/06
摘要: A data protection technique involves, based on a first set of policies on a first array, generating a second set of policies on a second array to track the first set. The first array maintains a first storage object, and the second array maintains a second storage object as a replica of the first storage object. The technique further includes detecting assignment of the first set to the first storage object. The first array provides data protection to the first storage object in accordance with the first set in response to assignment of the first set to the first storage object. The technique further includes, in response to such detection, assigning the second set to the second storage object. The second array provides data protection to the second storage object in accordance with the second set in response to assignment of the second set to the second storage object.
-
5.
公开(公告)号:US20210034402A1
公开(公告)日:2021-02-04
申请号:US16530779
申请日:2019-08-02
摘要: A method, computer program product, and computer system for creating, with a first replication product, one or more groups of a plurality of groups that is empty in a storage array. A protection policy may be applied to the one or more groups on the first replication product, wherein the protection policy may include a replication rule. A policy profile may be created by the second replication product, wherein the replication rule may be included to the policy profile. The protection policy may be applied to a virtual machine (VM). The policy profile may be applied to the VM. The first replication product may replicate one or more virtual volumes of the VM on a remote system based upon, at least in part, the replication rule.
-
公开(公告)号:US20200034041A1
公开(公告)日:2020-01-30
申请号:US16048489
申请日:2018-07-30
发明人: Tianming Zhang , Girish Sheelvant , Qi Jin , Nagasimha Haravu , Michael Zeldich , Sathish Janamanchi
IPC分类号: G06F3/06
摘要: A technique utilizes a group of data protection policies within data storage equipment. The technique involves providing, by the data storage equipment, access to individually invocable data protection services. The data storage equipment is constructed and arranged to invoke each individually invocable data protection service in response to user entrance of a respective data protection rule to protect data within a storage object. The technique further involves forming, by the data storage equipment, a policy group from multiple data protection rules. The technique further involves assigning, by the data storage equipment, the policy group to a set of storage objects to protect data within the set of storage objects. Such a technique enables assignment of multiple and different data protection rules to a storage object all at once. Moreover, if the policy group is modified, the modification may be applied to all storage objects at the same time.
-
公开(公告)号:US20190132314A1
公开(公告)日:2019-05-02
申请号:US15797691
申请日:2017-10-30
摘要: Techniques for managing data mobility domains in storage system environments. The techniques employ a multiple master approach, in which each storage system in a storage system domain can function as an owner of the domain. Each domain owner has privileges pertaining to addition of new members to the domain, removal of members from the domain, and modification of domain credentials. When a new storage system is added as a member of the domain, the domain credentials are provided from the domain owner to the new storage system, resulting in the domain credentials being shared among all members of the domain. Domain membership information is also shared among all members of the domain. In this way, the management of storage system domains can be achieved without the need of a domain management server, avoiding a single point of failure or latency and reducing the complexity/cost associated with the domain management server.
-
公开(公告)号:US11841964B2
公开(公告)日:2023-12-12
申请号:US17508019
申请日:2021-10-22
CPC分类号: G06F21/6218 , G06F21/30 , H04L9/30
摘要: A method, computer program product, and computing system for receiving a selection of one or more secure snapshots to remove from a storage system. A snapshot deletion key may be received from the storage system. The selection of the one or more secure snapshots and the snapshot deletion key may be provided to a storage system support service. A snapshot deletion response may be received from the storage system support service. The snapshot deletion response and the selection of the one or more secure snapshots may be authenticated via the storage system. In response to authenticating the snapshot deletion response and the selection of the one or more secure snapshots, the one or more secure snapshots may be unlocked for deletion.
-
公开(公告)号:US20230131333A1
公开(公告)日:2023-04-27
申请号:US17508019
申请日:2021-10-22
摘要: A method, computer program product, and computing system for receiving a selection of one or more secure snapshots to remove from a storage system. A snapshot deletion key may be received from the storage system. The selection of the one or more secure snapshots and the snapshot deletion key may be provided to a storage system support service. A snapshot deletion response may be received from the storage system support service. The snapshot deletion response and the selection of the one or more secure snapshots may be authenticated via the storage system. In response to authenticating the snapshot deletion response and the selection of the one or more secure snapshots, the one or more secure snapshots may be unlocked for deletion.
-
公开(公告)号:US11073996B2
公开(公告)日:2021-07-27
申请号:US16398774
申请日:2019-04-30
摘要: During preparation for migration of a logical volume from a source data storage appliance to a destination data storage appliance, a determination is made as to whether at least one host that accesses a copy of the logical volume contained in the source data storage appliance is managed by a host administration server. In response to determining that at least one host that accesses the copy of the logical volume contained in the source data storage appliance is managed by the administration server, a rescan request is transmitted to the administration server. The rescan request causes the host administration server to instruct each host that is managed by the host administration server that accesses the copy of the logical volume contained in the source data storage appliance to perform a rescan operation to discover at least one new path to the logical volume.
-
-
-
-
-
-
-
-
-