G06F11/2066

BUCKET VIEWS

A method of operating an object-based storage system, practiced by the storage system, is provided. The method includes establishing a plurality of buckets for objects, in the storage system and establishing a plurality of bucket views in the storage system, each bucket view supporting access to objects of one of the plurality of buckets. The method includes accessing an object of a bucket through one of the plurality of bucket views.

SYSTEMS AND METHODS FOR MANAGING REPLICATION OF DATA TO A REMOTE STORAGE DEVICE
20200167239 · 2020-05-28 ·

The disclosed computer-implemented method for managing replication of data to a remote storage device may include (1) maintaining a first bitmap and a second bitmap storing data acknowledging persistence of target data, respectively, at source and target gateways, where the target gateway serves the remote storage device, (2) sending replication data from a computing device to the source gateway, (3) setting a bit in the first bitmap, where the set bit corresponds to the replication data sent to the source gateway, (4) receiving a first acknowledgement indicating the source gateway received the replication data, (5) copying, in response to the first acknowledgement, the bit to the second bitmap, (6) clearing, in response to the first acknowledgement, the bit in the first bitmap, and (7) receiving a second acknowledgement indicating the target gateway received the replication data. Various other methods, systems, and computer-readable media are also disclosed.

Multi-RPO data protection
10657006 · 2020-05-19 · ·

A system for disaster recovery including a controller (i) for controlling bandwidth usage of a disaster recovery system in accordance with a plurality of recovery point objectives (RPOs), each RPO designating a maximal time loss constraint for data recovery for an enterprise production system, and a corresponding bandwidth allocation for the disaster recovery system to use in replicating data for the enterprise production system, wherein the RPOs are applied in accordance with a calendar-based schedule of dates and times, and (ii) for issuing an RPO alert when the RPO maximal time loss constraint for a current date and time is not satisfied.

Service state preservation across nodes

According to examples, an apparatus may include a processor and a memory on which is stored machine readable instructions that are to cause the processor to receive, from a first node, a client request and a response corresponding to the processed client request, in which the first node is configured to generate the response by processing the client request on a service and processed client request is configured to change a state of the service. The instructions are also to cause the processor to receive, from the first node, a response corresponding to the received request, generate an entry including the received request and response, commit the generated entry into a journal, and send an acknowledgement of the received request and response to the first node after the generated entry is committed into the journal.

Configuring a secondary storage system for data mirroring

A method for configuring a storage system. The method includes a computer processor receiving at a storage system, an indication to initiate data mirroring for an application. The method further includes determining a set of information associated with a network-accessible computing system that hosts the application. The method further includes identifying an analysis of historic performance data associated with data mirroring to the storage system with respect to the application. The method further includes identifying a set configuration information associated with data mirroring from among a plurality of sets of configuration information associated with data mirroring based, at least in part, on the determined set of information associated with the network-accessible computing system and the identified analysis of performance data associated with data mirroring with respect to the application. The method further includes applying the identified set configuration information associated with data mirroring for the application to the storage system.

METHOD, DEVICE, AND PROGRAM PRODUCT FOR REDUCING DELAY IN I/O PROCESSING DUE TO MIRRORING OF CACHE DATA
20200133507 · 2020-04-30 ·

Techniques perform storage management. Such techniques involve: in response to receiving, at a first processor of a storage system, a write request from a host for writing user data, caching the user data in a first cache of the first processor, and generating cache metadata in the first cache, the cache metadata including information associated with writing the user data; sending the user data and the cache metadata to a second cache of a second processor, for the second processor to perform, in the second cache, data processing related to cache mirroring by the second processor; and sending, to the host, an indication of completion of the write request, without waiting for the second processor to complete the data processing. Such techniques can improve system performance such as reducing latency, and shortening length of the I/O handling path of write request.

MAINTAINING STORAGE ARRAY ONLINE
20200117556 · 2020-04-16 ·

Embodiments of the present disclosure relate to a method, system and computer program product for maintaining a storage array online. According to the method, an unrecoverable error is detected by one or more processors as having occurred in a failed disk of a storage array in first storage. The failed disk is replaced with a spare disk in the first storage. Data is retrieved from a second storage for storing into a stripe of the first storage based on address information of a data block of the failed disk. The second storage stores mirrored data of data stored in the first storage. The stripe includes data blocks distributed across all disks in the storage array of the first storage. The retrieved data is caused to be written into the stripe of the storage array of the first storage. In other embodiments, a system and a computer program product are disclosed.

Memory mirror invocation upon detecting a correctable error

Aspects of the invention include fetching data requested by a requestor from a primary memory in a memory system that includes the primary memory and a secondary memory mirroring the primary memory. An error status of the data fetched from the primary memory is determined. The error status is one of correctable error (CE), uncorrectable error (UE), and no error. Based at least in part on determining that the data fetched from the primary memory has the error status of no error, the data fetched from the primary memory is output to the requestor. Based at least in part on determining that the data fetched from the primary memory has the error status of UE or CE, the data requested by the requestor is fetched from the secondary memory.

Meta-copysets for fault-tolerant data storage

A system includes determination of a plurality of meta-copysets of a plurality of storage devices, each of the meta-copysets including a first number of storage devices, determination of a first copyset of a second number of storage devices from a first one of the meta-copysets, where the second number is less than the first number, storage of first data in a fault-tolerant format using the first copyset, determination to migrate the first data from a first storage device of the first copyset, and, in response to the determination to migrate the first data, determine a second copyset of the second number of storage devices including a storage device from the first meta-copyset which is not in the first copyset, and the storage devices of the first copyset except for the first storage device of the first copyset and storage of the first data in a fault-tolerant format using the second copyset.

Optimized sequential writes on mirrored disks

Embodiments for optimizing sequential write operations in a data deduplication environment by one or more processors. Similar data deduplication signatures for stored data at all storage devices in one or more storage systems may be maintained. A deduplication signature associated with a write operation at a storage device may be compared to the similar data deduplication signatures. Results of the comparison with each of the other storage devices may be shared prior to performing the write operation.