×

Data storage system binding virtual volumes to host-specific protocol endpoints

  • US 10,891,060 B2
  • Filed: 10/31/2018
  • Issued: 01/12/2021
  • Est. Priority Date: 10/31/2018
  • Status: Active Grant
First Claim
Patent Images

1. A method of operating a data storage system in a cluster of storage systems to provide virtual-volume data storage to a plurality of virtual-computing (VC) hosts, the data storage system including first and second processing nodes paired in an active-active manner to provide for (a) shared processing of a workload in a non-failure operating condition, and (b) single-node processing of the workload in a failover operating condition, the method comprising:

  • organizing physical storage as a plurality of virtual volumes (VVols) each being a virtualized unit of storage for a corresponding virtual machine hosted by a respective VC host;

    creating protocol endpoints (PEs) and organizing the PEs into host-specific initiator groups (IGs), each PE being a conglomerate storage device to which a respective set of VVols of the plurality of VVols are to be bound for access by a respective VC host, each IG containing a pair of the PEs for a corresponding VC host, one PE of the pair being advertised to the corresponding VC host as optimized on the first processing node and being advertised to the corresponding VC host as non-optimized on the second processing node, the other PE of the pair being advertised to the corresponding VC host as optimized on the second processing node and being advertised to the corresponding VC host as non-optimized on the first processing node;

    binding the sets of VVols to the respective PEs, each VVol of a given set being bound to a corresponding one of the pair of PEs of the corresponding host-specific IG; and

    subsequently providing data access to the plurality of VVols from each of the given VC hosts via the respective PEs,wherein the providing of the data access via the respective PEs includes use of two asymmetric logical unit access (ALUA) paths from each VC host to the PEs of the respective IG, a first ALUA path being a primary access path to the optimized PE on the first processing node, a second ALUA path being a secondary access path to the non-optimized PE on the second processing node, the secondary access path being used when the first processing node for the optimized PE has failed.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×