Synchronizing configuration of partner objects across distributed storage systems using transformations
First Claim
1. A method comprising:
- evaluating a first configuration object for a first storage virtual machine to identify a first identifier used to identify the first storage virtual machine, wherein the first configuration object is specified in a first identifier space of a first node hosting the first storage virtual machine;
determining that the use of the first identifier by both the first storage virtual machine and a second storage virtual machine of a second node for identification creates a naming conflict where the first storage virtual machine and the second storage virtual machine operate in conflicting operation based upon the first storage virtual machine and the second storage virtual machine using the same identifier for identification node, wherein the second storage virtual machine is a partner of the first storage virtual machine;
transforming, based upon the determination of the naming conflict, the first identifier into a second identifier to use for identifying the second storage virtual machine, wherein the second identifier is transformed into a second identifier space for the second node, wherein use of the second identifier by the second storage virtual machine for identification does not cause the naming conflict;
replicating the first configuration object, with the second identifier replacing the first identifier, from the first node to the second node as a second configuration object, wherein the second identifier and attributes of the first configuration object are populated within the second configuration object for use by the second storage virtual machine; and
executing the second storage virtual machine to utilize the second identifier from the second configuration object for non-conflicting operation with the first storage virtual machine, wherein the non-conflicting operation results from the first storage virtual machine and the second storage virtual machine using different identifiers for identification.
1 Assignment
0 Petitions
Accused Products
Abstract
A configuration for a component of a primary node is synchronized with a configuration for a component of a partner node in a different cluster by replicating the primary node configuration with the partner node. A baseline configuration replication comprises a snapshot of a component configuration on the primary. The baseline configuration can be generated by traversing through the configuration objects, capturing their attributes and encapsulating them in a package. The baseline package can then be transferred to the partner node. The configuration objects can be applied on the partner node in the order in which they were captured on the primary node. Attributes of the configuration objects are identified that are to be transformed. Values for the identified attributes are transformed from a name space in the primary node to a name space in the partner node.
26 Citations
20 Claims
-
1. A method comprising:
-
evaluating a first configuration object for a first storage virtual machine to identify a first identifier used to identify the first storage virtual machine, wherein the first configuration object is specified in a first identifier space of a first node hosting the first storage virtual machine; determining that the use of the first identifier by both the first storage virtual machine and a second storage virtual machine of a second node for identification creates a naming conflict where the first storage virtual machine and the second storage virtual machine operate in conflicting operation based upon the first storage virtual machine and the second storage virtual machine using the same identifier for identification node, wherein the second storage virtual machine is a partner of the first storage virtual machine; transforming, based upon the determination of the naming conflict, the first identifier into a second identifier to use for identifying the second storage virtual machine, wherein the second identifier is transformed into a second identifier space for the second node, wherein use of the second identifier by the second storage virtual machine for identification does not cause the naming conflict; replicating the first configuration object, with the second identifier replacing the first identifier, from the first node to the second node as a second configuration object, wherein the second identifier and attributes of the first configuration object are populated within the second configuration object for use by the second storage virtual machine; and executing the second storage virtual machine to utilize the second identifier from the second configuration object for non-conflicting operation with the first storage virtual machine, wherein the non-conflicting operation results from the first storage virtual machine and the second storage virtual machine using different identifiers for identification. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory machine readable medium having stored thereon instructions comprising machine executable code that when executed by a machine, causes the machine to:
-
evaluate a first configuration object for a first storage virtual machine to identify a first identifier used to identify the first storage virtual machine, wherein the first configuration object is specified in a first identifier space of a first node hosting the first storage virtual machine; determine that the use of the first identifier by both the first storage virtual machine and a second storage virtual machine of a second node for identification creates a naming conflict where the first storage virtual machine and the second storage virtual machine operate in conflicting operation based upon the first storage virtual machine and the second storage virtual machine using the same identifier for identification, wherein the second storage virtual machine is a partner of the first storage virtual machine; transform, based upon the determination of the naming conflict, the first identifier into a second identifier to use for identifying the second storage virtual machine, wherein the second identifier is transformed into a second identifier space for the second node, wherein use of the second identifier by the second storage virtual machine for identification does not cause the naming conflict; replicate the first configuration object, with the second identifier replacing the first identifier, from the first node to the second node as a second configuration object, wherein the second identifier and attributes of the first configuration object are populated within the second configuration object for use by the second storage virtual machine; and execute the second storage virtual machine to utilize the second identifier from the second configuration object for non-conflicting operation with the first storage virtual machine, wherein the non-conflicting operation results from the first storage virtual machine and the second storage virtual machine using different identifiers for identification. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computing device comprising:
-
a processor; and memory having stored thereon instructions comprising processor executable code that when executed by the processor, causes the processor to; evaluate a first configuration object for a first storage virtual machine to identify a first identifier used to identify the first storage virtual machine, wherein the first configuration object is specified in a first identifier space of a first node hosting the first storage virtual machine; determine that the use of the first identifier by both the first storage virtual machine and a second storage virtual machine of a second node for identification creates a naming conflict where the first storage virtual machine and the second storage virtual machine operate in conflicting operation based upon the first storage virtual machine and the second storage virtual machine using the same identifier for identification, wherein the second storage virtual machine is a partner of the first storage virtual machine; transform, based upon the determination of the naming conflict, the first identifier into a second identifier to use for identifying the second storage virtual machine, wherein the second identifier is transformed into a second identifier space for the second node, wherein use of the second identifier by the second storage virtual machine for identification does not cause the naming conflict; replicate the first configuration object, with the second identifier replacing the first identifier, from the first node to the second node as a second configuration object, wherein the second identifier and attributes of the first configuration object are populated within the second configuration object for use by the second storage virtual machine; and execute the second storage virtual machine to utilize the second identifier from the second configuration object for non-conflicting operation with the first storage virtual machine, wherein the non-conflicting operation results from the first storage virtual machine and the second storage virtual machine using different identifiers for identification. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification