Nothing Special   »   [go: up one dir, main page]

WO2017039579A1 - Recovering from an origination node failure during an asynchronous replication - Google Patents

Recovering from an origination node failure during an asynchronous replication Download PDF

Info

Publication number
WO2017039579A1
WO2017039579A1 PCT/US2015/047388 US2015047388W WO2017039579A1 WO 2017039579 A1 WO2017039579 A1 WO 2017039579A1 US 2015047388 W US2015047388 W US 2015047388W WO 2017039579 A1 WO2017039579 A1 WO 2017039579A1
Authority
WO
WIPO (PCT)
Prior art keywords
transactions
node
replication
mirror nodes
origination
Prior art date
Application number
PCT/US2015/047388
Other languages
French (fr)
Inventor
Mark Doherty
Siamak Nazari
Paul Kinnaird
Fabrice SCOUPE
Jonathan Stewart
Edel MARTIN
Original Assignee
Hewlett Packard Enterprise Development Lp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hewlett Packard Enterprise Development Lp filed Critical Hewlett Packard Enterprise Development Lp
Priority to PCT/US2015/047388 priority Critical patent/WO2017039579A1/en
Publication of WO2017039579A1 publication Critical patent/WO2017039579A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/16Error detection or correction of the data by redundancy in hardware
    • G06F11/1666Error detection or correction of the data by redundancy in hardware where the redundant component is memory or memory area
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/16Error detection or correction of the data by redundancy in hardware
    • G06F11/20Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
    • G06F11/2053Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where persistent mass storage functionality or persistent mass storage control functionality is redundant
    • G06F11/2094Redundant storage or storage space
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/16Error detection or correction of the data by redundancy in hardware
    • G06F11/20Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
    • G06F11/2097Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements maintaining the standby controller/processing unit updated
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/16Error detection or correction of the data by redundancy in hardware
    • G06F11/20Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/16Error detection or correction of the data by redundancy in hardware
    • G06F11/20Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
    • G06F11/2002Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where interconnections or communication control functionality are redundant
    • G06F11/2007Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where interconnections or communication control functionality are redundant using redundant communication media

Definitions

  • Replication is a data backup or mirroring technique in which identical data is saved to two or more arrays.
  • a host such as a server, writes the data to a first storage system. The data is then written from the first storage system to a second storage system.
  • Fig. 1 is a block diagram of an example of a node that may be used in a storage system or array;
  • FIG. 2 is a block diagram of an example storage system, or array, formed from a cluster of nodes that are in communication with each other;
  • FIG. 3 is a block diagram of an example of a replication system showing a source array in communication with a destination array;
  • FIG. 4 is a process flow diagram of an example of a synchronous replication process
  • FIG. 5 is a schematic example of blocks being scrambled during an asynchronous replication
  • FIG. 6 is a schematic example of a cluster wide correlator used to correct write ordering in asynchronous streaming replication
  • Fig. 7 is a schematic example of a set manager for an array working with secondary set managers on each node to build manifests for transactions written to the nodes;
  • Fig. 8 is a schematic example of manifests from origination nodes in a source array being transferred to target nodes in a destination array;
  • FIG. 9 is a sequence diagram of an example replication transactions from a source array being applied by a target node in an asynchronous replication process;
  • Fig. 10 is a schematic example of an origination node creating a subset of transactions for a single replication ticket;
  • Fig. 1 1 is a process flow diagram of an example method for
  • Fig. 12 is a process flow diagram of an example method for managing sets of transactions for replication
  • Fig. 13 is a process flow diagram of an example method for managing manifests for replication
  • Fig. 14 is a process flow diagram of an example method for recovering from an origination node failure during an asynchronous replication
  • FIG. 15 is a process flow diagram of an example method for collision handling during an asynchronous replication
  • Fig. 1 6 is a schematic example diagram of illustrating the transfer of a cache memory page from an origination node to a target node in the absence of any collisions;
  • Fig. 17 is a schematic example diagram of two pages with the same cluster sequence number that have a collision being merged into a single page with a single assigned replication ticket;
  • Fig. 18 is a schematic example diagram of a revision page created to protect a named page from being overwritten by a named page created from data in a different sequence number;
  • Fig. 19 is a schematic example of a coordinated snapshot (CSS) used to provide a restart point for synching a source array with a destination array;
  • SCS coordinated snapshot
  • Fig. 20 is a schematic example of replication transactions being transferred from an origination node to a target node after a failure of a direct link between the nodes;
  • Fig. 21 is a schematic example of replication transactions being recovered after a node failure
  • Fig. 22 is an example non-transitory machine readable medium that contains code for managing sets of transactions for replication
  • Fig. 23 is an example non-transitory machine readable medium that contains code to managing manifests for replication
  • Fig. 24 is an example non-transitory machine readable medium that contains code to recover from an origination node failure during an asynchronous replication
  • Fig. 25 is an example non-transitory machine readable medium that contains code to handle collisions during an asynchronous replication.
  • transactions from a source array to a destination array is often performed synchronously, with each transaction acknowledged before another transaction is sent.
  • transactions will generally refer to write transactions from a host to a source array or from a source array to a destination array, which may also be termed lOs (input-outputs).
  • Synchronous replication requires an acknowledgement from the destination array which means that the host IO is exposed to the latency of the link between the source and destination arrays. This adds significant overhead that may slow the number of transactions that can be completed in a time period and may limit the number of different arrays that may be used.
  • Methods and systems described herein use an asynchronous streaming process to replication transactions from a source array to a destination array.
  • asynchronous operations may be vulnerable to issues such as scrambled data from link latency, overwriting of data in collisions, and lost transactions due to link or node failures.
  • asynchronous streaming replication should avoid write ordering issues whereby transactions are applied in different orders on the source and destination arrays. If the stream is interrupted the data on the destination should be in a time consistent state, in other words that the transactions are applied in the same order on both source and target arrays.
  • the techniques described herein may help mitigate these issues by associating the transactions using a common property. This allows the creation of a set of transactions that may be transferred between systems and processed with a significantly lower overhead than attempting to manage each independent transaction.
  • the design of the solution has a number of components operating on each origination node of the source array which combine to create a set.
  • Transactions are tagged using a cluster wide correlator and added into a subset using the same correlator.
  • a set is defined as a number of transactions which share a common property for processing purposes, for example, the interval of time in which the transaction were received.
  • the problem becomes more complex when applied to a distributed system with a number of nodes all operating independently.
  • each origination node in the source array will create a subset using the same common property.
  • the subset will be tagged with an origination node identifier and a target node identifier such that all transactions in the subset relate to a single node, the origination node, and may be processed by a single node, the target node. Therefore, each set will comprise of a number of subsets, one for each origination node in the source array.
  • each origination node When a new cluster wide correlator is provided, the subsets relating to the preceding cluster wide correlator are considered complete, and each origination node will report the number of transactions in its subset to a central control point which will accumulate this meta-data from all origination nodes. The central control point will then respond to the origination nodes with a total number of transactions for the complete set along with any dependency data to ensure sets are applied in a strict sequence. Each origination node will then generate a subset manifest which contains the number of transactions in the local subset, the number of transactions in the complete set and the previous set that must be processed before this set can be processed.
  • the distributed manifest management design keeps track of a sequence of transactions on a distributed system by providing a mechanism for associating independent transactions with a common property across a distributed platform. Further, by sequencing sets of transactions rather than each individual transaction solutions can be scaled much larger. These transaction sets can be used for the purposes of transmission and processing across a number of distributed platforms.
  • the use of the distributed set management also allows a number of transactions to be in progress at the same time, and for all transactions to be recovered in the correct order. Signals are sent between the origination nodes in the source array related to the sequence of transactions both on creation of sets and subsets and also when replication operations are completed. As transactions are completed on all origination nodes of the source array, the last completed
  • the data required to generate this meta-data for the subset accountancy may be spread across the surviving origination nodes in the cluster.
  • Other origination nodes in the cluster may recover the failed transactions and continue the sequence from the last completed transaction seamlessly.
  • the sequence of transactions may be replayed from the oldest transaction found on all remaining origination nodes in the source array. This allows for the tracking a sequence of transactions across a distributed cluster of nodes and recovering the sequence in the event of a node failure in the distributed system.
  • a partial manifest recovery mechanism allows the recovery of data sets from across a distributed system after a node failure during asynchronous streaming replication.
  • Each surviving origination node may generate a partial manifest for the recovered subset meta-data which will be forwarded to the target node along with a unique sender node identifier which represents the origination node which recovered that part of the subset.
  • the logged transactions and partial subset manifests are transferred to the target node which determines if the subset is complete by comparing the number of unique transactions received with the contents of the manifest.
  • the partial manifest design allows each origination node to account only for transactions it has tracked and send a partial manifest for the transactions recovered by that origination node.
  • the target node should have received, or be in the process of receiving, all of the transactions.
  • the target node will then receive a number of unique partial manifests for this subset, which it can then accumulate to complete the set.
  • the target node has received all of the transactions for this subset as indicated by the accumulated partial manifests then the subset is complete and can be processed when the dependent set is complete.
  • a log entry that describes the revision page may be created between the origination node and the target node to protect against node failure.
  • the advantage of using revision pages is to hold collisions without resorting to a journal to track every transaction.
  • journal based design host write transactions are written to the source array and logged to a transaction journal, which is used to hold these transactions until they can be replicated to the destination array.
  • a large journal may be used to hold many minutes of backlog data, making the system resistant to failures.
  • the use of a journal to store write ordered transactions across a cluster of nodes may become very complex as the number of arrays increases and the backlog introduces some latency into the system, which may slow the replication process.
  • the techniques described herein use a page cache memory to enhance the speed and scalability of the replication process.
  • host write transactions are written to the source array and held in cache memory for replication to the destination array.
  • the speed of the cache memory provides fast access to the transaction data being held in cache memory.
  • a smaller number of transactions are backlogged waiting for a response from a journal.
  • Fig. 1 is a block diagram of an example of a node 1 00 that may be used in a storage system or array.
  • the node 100 may be part of either a source array, e.g., coupled to a host, or a destination array, e.g., storing replicated transactions.
  • the node 100 may include one or more processors 102.
  • the processors 102 can include a single core processor, a dual-core processor, a multi- core processor, a computing cluster, a virtual processor in a cloud computing arrangement, or the like.
  • a chip set 104 may provide interconnects 106 between the processors 102 and other units in the node 100.
  • the interconnects 106 may include Peripheral Component Interconnect Express (PCIe), Fibre Channel, Quick Path interconnect (QPI) from Intel, Hypertransport® f rom AMD, Ethernet, and the like.
  • PCIe Peripheral Component Interconnect Express
  • QPI Quick Path interconnect
  • a bus may be used instead of, or in addition to, the interconnects 106.
  • the interconnects 106 may couple input/output chips 1 08 to the chip set 104.
  • the input/output (I/O) chips 1 08 may control communications with other nodes 100 in a cluster, for example, through a router or switch 1 1 0.
  • the I/O chips 108 may include, for example, an I/O controller hub (ICH) from Intel or a fusion controller hub (FCH) from AMD, among others.
  • the switch 1 1 0 may provide PCIe, or other links, between the node and every other node in an array.
  • the switch 1 10 may be combined with other chips, such as the I/O chip 108.
  • the switch 1 10 may be an independent chip, such as a PCIe switch from Integrated Device Technology.
  • Cache memory 1 1 2 may be coupled to the processors 1 02 through the chip set 104.
  • Other cache memory 1 14 may be used by the I/O chips 1 08 to provide buffers during data transfer.
  • the cache memory 1 12 or 1 14 may include paged cache memory, for example, storing data in blocks.
  • the cache memory 1 12 or 1 14 may be integrated with the processors 102 or the I/O chips 108, respectively, or may be separate RAM that is coupled to the processors 1 02 or the I/O chips 108 through interconnects 106.
  • the interconnects 106 may couple to a number of interface slots 1 1 6.
  • the interface slots 1 16 may provide an interface to additional units, such as hosts, drives, solid state drives, nodes 100 on other arrays, and the like.
  • solid state drives may be directly plugged into the interface slots 1 16 to provide storage volumes.
  • external disk arrays may interface to the node 100 through cards seated in the interface slots 1 16.
  • a storage device 1 18, functioning as a non-transitory, machine readable medium, may be used to hold code modules to instruct the processors 102 to perform the functions described herein.
  • the storage device 1 18 may include memory closely coupled to the processors, as indicated in Fig. 1 , or may include drives or other longer term storage devices.
  • the code modules may include, for example, a sequence number generator 120 to provide a replication ticket for a transaction to be replicated to a destination array, as discussed further herein.
  • a transaction communicator 122 may send transactions to a target node in a destination array.
  • Sets may be managed by a subset manager 124 and a set manager 126.
  • the subset manager 1 24 may group the transactions into sets, based in part on a time interval in which the transaction occurred, and then build a subset manifest for transactions to the node 100, based on a total count of transactions received from the set manager 1 26.
  • the set manager 1 26 may receive the transaction count from the subset manager on each of a number of nodes and create a total count of all transactions that occurred within the time interval. While the set manager 126 may be present on every node 100 in an array, it may only be active on one on the nodes at any one time.
  • a remote copy ticket dispenser 1 28 may provide a replication ticket for a transaction to be replicated to a destination array.
  • a detector 1 30 may identify link failures and determine reasons for the link failure, for example, if a communications link has failed or if a node has failed.
  • a failure handler 132 may determine actions needed to communicate transactions to a target node.
  • a replayer 1 34 may play back logged, or mirrored, transactions for a failed origination node so that the accounting for the transactions may be performed to create the manifests.
  • a collision detector 136 may detect when a host is attempting to overwrite a cache memory page that has not been completely replicated.
  • a revision page tagger 138 may mark a cache memory page as protected.
  • a page merger 140 may combine pages that have detected collisions and have the same sequence number.
  • a snapshot system 142 may capture a snapshot of the source array at a point in time to enable resynching of the source array and destination array.
  • a synching system 144 may use the snapshot to resynchronize the source array and the target array, for example, after a restart.
  • Fig. 1 The items shown in Fig. 1 are not to imply that every item is present in every example.
  • a smaller system that only has a single node in a source array may not include one or both of the I/O chips 108.
  • other items may be present, such as modules to control the basic operations of the system.
  • Fig. 2 is a block diagram of an example storage system, or array 200, formed from a cluster of nodes 202-216 that are in communication with each other. Like numbered items as described with respect to Fig. 1 .
  • the array 200 may include interconnects 218 that allow each node 202-216 to access every other node 202-216 in the cluster. Communications with nodes in other arrays, such as a destination array, may be taken care of by interface cards in the interface slots 1 16.
  • each of the nodes 202-21 6 may have associated drives or volumes 220. Although these are shown as external units for two nodes in Fig. 2, as described with respect to Fig. 1 , in some examples, the volumes may be installed in cards mounted in the slots of a node 202-216.
  • the array 200 includes eight nodes in every case.
  • the array 200 may have four nodes, two nodes, or may be a single node.
  • larger clusters may be possible, including, for example, 16 nodes, 32 nodes, or more.
  • Fig. 3 is a block diagram of an example of a replication system 300 showing a source array 302 in communication with a destination array 304.
  • One or more hosts 306 may be in communication with the source array 302.
  • the links 308 from the hosts 306 to the source array 302 may be through interface cards installed in the interface slots 1 16 (Fig.1 ) in the nodes.
  • the links 310 from the source array 302 to the destination array 304 may also be through interface cards installed in the interface slots 1 16.
  • the hosts 306 may provide write transactions to source nodes 302A- 302H in the source array 302 to be saved to a volume.
  • the transactions may be copied to the destination array 304 for replication.
  • a transaction provided to an origination node 302A-302H in the source array 302, such as node 302A, may be replicated in a target node 304A-304H in the destination array 304.
  • Specific nodes, such as 302A and 304A may be paired, but this may not be present in every example.
  • Fig. 4 is a process flow diagram of an example of a synchronous replication process 400.
  • the synchronous replication process 400 starts at block 402 with a source array receiving a write transaction from a host.
  • the source array may request a replication ticket for replicating the transaction to the destination array.
  • the transaction is written to a local volume in the source array.
  • processing of the transaction is paused to wait for an acknowledgment from the destination array.
  • the source array sends the transaction to the destination array.
  • the destination array receives the transaction from the origination node.
  • the transaction is written to a local volume local in the destination array.
  • the destination array returns an
  • acknowledgment may then be returned to the host at block 420.
  • the host application uses read and write transactions to the storage array to access data. Although many different transactions may be issued concurrently, dependent ordering is protected as the transaction will be issued serially from the host application. The transactions are ordered correctly as they are synchronous, and, thus, the host will not receive an acknowledgement until the transaction is complete. Further, any dependent requests will be delayed until the current transaction is complete. Accordingly, using synchronous replication the order of the write transactions is naturally preserved.
  • asynchronous replication does not necessarily maintain the order of the write transactions.
  • the host application will receive a write acknowledgement before the transaction has been replicated. This may allow a new write transaction to be applied to the source volume before the old transaction has been replicated to the target volume. Thus, the transactions may be reordered on the target array, scrambling the data.
  • Fig. 5 is a schematic example of blocks 500 being scrambled during an asynchronous replication.
  • a host I/O sequence 502 four write transactions A, B, C, and D have been sent to a source array.
  • the four transactions are written to an asynchronous replication cache 504 to wait transfer to a destination array.
  • a latency 506 in the connection slows the transfer of the B block, causing it to arrive after the C block, causing it to arrive at the target.
  • the C and B blocks are reversed during the application 508, e.g., during storage on a volume on the destination array.
  • This problem may be compounded by the clustered architecture of the storage array. Attempting to provide dependencies between individual transactions across the nodes of the storage array would be difficult or impossible. To simplify the problem transactions are grouped into sets of transactions and applied in blocks on the target array. Until a complete set is applied the group will not be in a consistent state. If the set cannot be fully applied then the replication group will be inconsistent. This is further discussed with respect to Fig. 6.
  • Fig. 6 is a schematic example of a cluster wide correlator used to correct write ordering in asynchronous streaming replication.
  • Each cluster wide correlator may, for example, cover a time interval that is shared across all nodes on the source array.
  • the cluster wide correlator may be used to tag replication transactions across all nodes for the purposes of providing a dependency.
  • the cluster wide correlator may be a sequence number mapped from the time intervals during which transactions arrive.
  • a host writes a series of transactions 602, e.g., A-D, to a source array.
  • the transactions being written in a first time interval 604 are assigned a first sequence number, e.g., 1 01
  • transactions being written in a second time interval are assigned a second sequence number, e.g., 102.
  • This sequence number remains with the transactions as they are written to a replication cache 606 on the primary or source array.
  • transactions B and C are again reversed due to a latency 610 in the transfer.
  • the sequence number which is associated with each transaction, may be used to correct the order of the transactions, ensuring that they are applied 610 to the volume associated with the destination array in the correct order.
  • sequence number may be combined with other identification to generate a replication ticket, for example, in a remote copy ticket dispenser.
  • Transactions that require synchronous or asynchronous periodic replication each request a ticket from the remote copy ticket dispenser.
  • the ticket is used to track the replication transactions and may provide a simple level of collision handling when multiple transactions wish to access the same region of a volume concurrently.
  • the tickets are associated into sets, which may be used to provide dependencies between each set to ensure that the sets of lOs are applied in the correct sequence.
  • a set is cluster wide, e.g., across a source array, and includes a number of subsets, one subset per replication group per node.
  • a set is a collection of transactions that have replication tickets that are created by cluster sequence number and replication group id:
  • a subset is a subcomponent of a set which covers only those transactions local to a single origination node, for example, 0 to 7:
  • the sequence number may represent sequential 100 ms intervals during which the associated transactions arrived.
  • the replication group identification may represent all of the transactions for writing an object, such as a particular command, directory, or file.
  • a target node is selected to which all transactions within this subset will be transmitted.
  • the replication ticket is logged to mirror memory for node down handling, e.g., to protect from node failures.
  • the subset count of the number of transactions is incremented to include this transaction.
  • the replication transaction is transmitted to the remote array with a subset tag containing the set details, e.g., a subset manifest.
  • Fig. 7 is a schematic example of a source array 700 including a set manager 702 working with subset managers 704 on each origination node 706-712 to build subset manifests for transactions written to the origination nodes 706-712.
  • the set manager 702 runs on a single origination node 706, 708, 710, or 712 as a highly available process.
  • each of the origination nodes 706-712 will be interrogated for their subset totals 714 for the previous cluster sequence number by the set manager 702.
  • Each subset manager 704 will send 716 the subset totals 714 for each asynchronous streaming replication group to the set manager 702.
  • the set manager 702 combines the subset totals 714 into a set total and inform each of the subset managers 704 of this total which the subset managers 704 will use to create a subset manifest 718 that includes at least these totals. It will also resolve the dependency between this set and any predecessors.
  • Each subset manager 704 will then transmit a manifest message to the destination array which contains both the set and subset totals and the dependent sequence number.
  • Fig. 8 is a schematic example of manifests from origination nodes 706- 712 in a source array 700 being transferred to target nodes in a destination array 800. Like numbers are as described with respect to Fig. 7. A mirror image of the set and subset management system is also present on the destination array 800.
  • Each target node 802-808 has a subset manager 810 and a set manager 812. As described with respect to the source array 700, the set manager 812 is present on each target node each target node 802-808 for failover purposes, but is only active on one of the target node 802, 804, 806, or 808 at any time.
  • replication transactions are received from the replication links 814 they are stored in cache memory, duplicated to a target node each target node 802-808 and logged to the cluster mirror memory for node down protection.
  • Each of the origination nodes 706-712 may send a subset manifest 718 to a corresponding target node 802-808.
  • the subset manager 810 sends
  • the subset manager 810 in each target node 802-808 may confirm to a set manager 720 when all transactions are received in each subset.
  • Fig. 9 is a sequence diagram 900 of an example of replication transactions from a source array being applied by a target node in an asynchronous replication process.
  • the process starts with a replication copy 902 wherein the transactions 904 are sent to a target node where a subset manager 906 adds the transactions to a subset.
  • a subset manager 906 adds the transactions to a subset.
  • an acknowledgement 910 is returned to confirm receipt.
  • the subset manifest 912 is sent and an acknowledgment 914 is returned.
  • the subset manifest 91 2 is added to the subset.
  • the subset manager 912 confirms that all transactions in the set have been received and a message 916 is sent to the set manager 918 to inform it that the subset has been received.
  • the set manager 918 returns a message 920 instructing the subset manager 906 to apply the subset, e.g., send them to a volume 922 for storage.
  • the subset manager 906 then applies the transactions 924 to the volume 922, which returns acknowledgements 926 indicating that the subset has been applied.
  • the subset manager 906 then sends a message 928 to the set manager 918 to inform it that the subset has been applied.
  • the set manager 918 replies with a set complete message 930. Once all subsets in a set are completed, the set manager 918 may send a message to the set manager of the source array informing it that the set is completed.
  • Fig. 10 is a schematic example of an origination node 1000 creating a subset 1002 of transactions 1004 for a single replication ticket. If a subset 1002 does not exist for a replication ticket, it is created and a target node (dnid) 1006 will be chosen for the entire subset 1002. Each subset 1002 is uniquely identified by the replication ticket 1 008 that includes the sequence number (seqno), replication group identification (grpid), and the node identification (nid).
  • Fig. 1 1 is a process flow diagram of an example method 1 100 for asynchronously replicating transactions from a source array to a destination array.
  • the method 1 100 may be implemented by the origination nodes of the source array and destination nodes of the target array.
  • the method 1 1 00 begins at block 1 102, when a host write transaction is received in an origination node in the source array.
  • a replication ticket is requested for the transaction.
  • the cluster sequence number 1 108 is read in order to create the replication ticket at block 1 1 04.
  • the transaction is added to a subset by the origination node.
  • a collision check is performed by the origination node to determine if the transaction will overwrite data that is still being replicated.
  • a revision page may be created by copying the data to a free cache memory page, as described further with respect to Fig. 18.
  • the origination node writes the data to the local volume.
  • a write acknowledgement is returned to the host, which is then free to send another transaction.
  • the transaction is sent to the target node on the destination array, e.g., the remote array, for replication.
  • the origination node waits for an acknowledgement from the target node.
  • the target node on the remote array receives the transaction from the origination node of the source array.
  • the target node adds the transaction to a local subset, and, at block 1 128, returns an acknowledgement to the origination node.
  • the origination node receives the acknowledgement at block 1 122 and proceeds to block 1 130 to determine if the subset is complete. A number of transactions may be sent following the method 1 100 from block 1 1 02 to block 1 130. Further, it may be noted that a number of other origination nodes in the source array are also following this procedure to send transactions in the set to various target nodes on the destination array. [0082] At block 1 132, the cluster sequence number 1 108 is updated, for example, when the time interval ends and a new interval begins. At this point, the origination node sends a count of the transactions in the subset to the set manager, which returns the total count of transactions to the origination node.
  • the origination node creates the subset manifest at block 1 1 34, which is added to the subset 1 136 and, at block 1 1 38, transferred to the target node, for example, by the procedure of steps 1 124-1 130. At this point, the origination node determines that the subset is complete, and releases the replication ticket at block 1 140.
  • the target node confirms that the subset is received, for example, by comparing the subset manifest received to the manifest it has created as transactions were received. As noted with respect to Fig. 9, it may also inform the set manager for the destination array that the subset is complete and get instructions to apply the data to the local volume.
  • the set manager instructs the target node to apply the data.
  • the set manager writes the data to the local volume.
  • the method 1 100 provides an overview of the steps taking place, but not every step needs to be present in every example. Further, steps may be included in more detailed views of particular parts of the method. Examples of these are described further with respect to Figs. 1 2-15.
  • Fig. 12 is a process flow diagram of an example method 1200 for managing sets of transactions for replication.
  • the method begins at block 1202, when a transaction is received in a source array, for example, at an origination node, that is to be replicated to a destination array, for example, in a target node.
  • the transaction is associated with a cluster wide correlator.
  • the cluster wide correlator may be created from a time interval during which the transaction is received.
  • the transaction is grouped into a set, for example, based on the cluster wide correlator. Each set may corresponds to transactions received during an interval in time.
  • Fig. 13 is a process flow diagram of an example method 1300 for managing manifests for replication.
  • the method 1300 begins at block 1302, with the tagging of each of a number of transactions from a host to an origination node in a source array with a replication ticket.
  • the replication ticket may be used to group the transactions into a subset.
  • each of the transactions may be tagged with an index number to correlate transactions within the subset.
  • a target node in a destination array is selected for the transactions.
  • the transactions are transmitted to the target node.
  • a subset manifest is created for the transactions and, at block 131 2, the subset manifest is sent to the target node.
  • Fig. 14 is a process flow diagram of an example method 1400 for recovering from an origination node failure during an asynchronous replication.
  • the method 1400 begins at block 1402 with the logging a portion of the replication transactions to the origination node in each of a number of mirror nodes.
  • the mirror nodes are origination nodes that share a logging function for another origination node between them.
  • a determination is made if the origination node has failed.
  • mirrored replication transactions logged by each of the mirror nodes are replayed. Each of the mirror nodes then recreates a corresponding partial subset of the recovered transactions.
  • a total for the replication transactions sent from each of the mirror nodes is requested, for example, by the set manager in the source array.
  • the totals from each of the mirror nodes are summed to create a transaction total.
  • the transaction total is provided to each of the mirror nodes.
  • Fig. 15 is a process flow diagram of an example method 1500 for collision handling during an asynchronous replication.
  • the host application is free to send another write transaction to the same volume at the same offset and length.
  • the nature of asynchronous streaming replication means that the previous write transaction may not have been transmitted to the target array yet. This is an IO collision, the data at that specific volume, offset and length needs to be preserved for transmission, however the host cannot be prevented from overwriting this region of the volume.
  • a mechanism that may preserve the data between sets is creating revision pages.
  • the method 1 500 begins at block 1502, when a first write transaction is received in an origination node from a host.
  • the transaction is saved to a cache memory page.
  • a replication of the transaction to a target node in a destination array is initiated.
  • the storage of the transaction on a volume coupled to the node is completed and, at block 1510, the transaction is acknowledged to the host.
  • a second write transaction is received from the host that overlaps the first write transaction.
  • a collision between the first write transaction and the second write transaction is detected.
  • the second write transaction is prevented from overwriting the first write transaction. This may be performed by merging transactions onto a single page, for example, if a collision happens in a single sequence number, or by creating revision pages, for example, if a collision happens between sequence numbers. This is discussed further with respect to Figs. 16-18.
  • Fig. 16 is a schematic example diagram of illustrating the transfer 1600 of a cache memory page from an origination node to a target node in the absence of any collisions. Transactions arrive in the origination node and are stored in a cache memory page 1602 that is an anonymous page 1604, e.g., a buffer page. The transactions in the cache memory page have an associated cluster wide correlator, such as a cluster sequence number 1606.
  • the data in the cache memory page 1602 is in cluster sequence number 1606 when it is first received.
  • the cache memory page 1602 is transferred to a cache memory page 1608 that is a named page 1 610, for example, using the cluster sequence number 1 01 .
  • a cache memory page 1608 that is a named page 1 610, for example, using the cluster sequence number 1 01 .
  • the cache memory page 1608 in the named page 1 61 0 is provided a ticket number 1614 to form a transport page 1 61 6.
  • the transport page 1616 is then sent to the remote cache memory, for example, in the target node.
  • the remote page 1 618 can then be added to the remote subset and processed.
  • the transactions for the second page may overwrite the first page. This can be handled by merging the transactions into a single page before transferring the merged page under a single ticket number.
  • Fig. 17 is a schematic example diagram of two pages with the same cluster sequence number that have a collision being merged into a single page with a single assigned replication ticket. Like numbered items are as described with respect to Fig. 1 6. Transactions forming a first page 1702 are received in the origination node and may be named using the cluster sequence number to form a named page 1704. Transactions forming a second page 1 706 are received and may form a second named page 1708. However, if the transactions forming the second page were written into a second named page 1708, the first named page may be overwritten. The potential collision 1710 may be detected and prevented by merging the transaction data to form a single named page 1712. The named page 171 2 is issued a replication ticket number 1714, forming a transport page 161 6, which is sent on to the target node, forming a remote page 1716. The remote page 171 6 can be processed normally by the target node.
  • Fig. 18 is a schematic example diagram of a revision page created to protect a named page from being overwritten by a named page created from data in a different sequence number. Like numbered items are as described with respect to Fig. 16.
  • revision pages 1 612 are cache memory pages that are copied to free cache memory pages. The revision pages 1 612 may be tagged with a replication ticket, indicating that the page is being used for replication and should be protected.
  • a revision page 1612 can have several references from different requests covering either the same or different regions of the cache memory page. Reference counts are used to track how many outstanding remote copy requests need the revision page. Once the reference count drops to zero, the revision page 1612 is released. In the example of Fig.
  • transaction data forming cache memory page 1802 is received under a first sequence number 1804.
  • the cache memory page 1802 is moved to a named page 161 0.
  • the cluster sequence number increments to form a new sequence number 1806 another cache memory page 1808 is received.
  • the cache memory page 1802 may still be in the process of transferring. In this case, a potential collision is detected.
  • the cache memory page 1802 is copied to a free page, creating a revision page 1810.
  • the duplicate of the cache memory page 1802 may be made on a different node with a log entry created between these nodes to indicate the details of the revision page 1810.
  • the instantiation of the revision page 1810 in a new location allows the named page 1610 to be released for the host to update as usual.
  • the revision page 1810 may be given a ticket number, forming a first transport page 1812, which is copied to a remote page 181 8 and processed by the target array.
  • the second page 1 820 may then be given a subsequent ticket number to form another transport page 1 822, before being sent on to a remote page 1824 for processing by the target node.
  • Fig. 19 is a schematic example of a coordinated snapshot (CSS) used to provide a restart point for synching a source array with a destination array.
  • CCS coordinated snapshot
  • a snapshot is required.
  • Periodically a coordinated snapshot (CSS) 1906 may be taken on both the source and destination volumes.
  • the snapshot request will be inserted into the data stream 1908.
  • the CSS 1906 may provide a group consistent restart point between source and target arrays.
  • Fault tolerance may also be an issue for asynchronous streaming replication.
  • the main concerns for fault tolerance are a failed link and a failed node.
  • Link failures may cause the system to become unbalanced with respect to replication link capacity, which may lead to some or all replication groups to stop.
  • a group policy can be defined which will allow the user to prioritize which groups to stop if the solution become unsustainable. This policy monitors the utilization of source array cache and may be triggered when the acceptable usage limits are breached.
  • Failed nodes may also cause problems for the replication solution, and may be handled using the same policy. Techniques for providing fault tolerance for link failures and node failures are described with respect to Figs. 20 and 21 .
  • Fig. 20 is a schematic example of replication transactions being transferred 2000 from an origination node 2002 to a target node 2004 after a failure of a link 2006 between the nodes 2002 and 2004.
  • a first transaction 2008 is successfully transferred from the origination node 2002 over the link 2006 to the target node 2004.
  • succeeding transactions 2010 can be transferred, the link fails 2012.
  • the succeeding transactions 2010 are transferred to a second origination node 2014 that has an operational link 2016 to a second target node 201 8. From the second origination node 2014, the transactions are transferred to the second target node 2018 over the operational link 2016. Once at the second target node 2018, the transactions may be transferred to the target node 2004.
  • Fig. 21 is a schematic example of replication transactions being recovered after a node failure. All replication transactions are logged to mirror memory, e.g., in other origination nodes in the source array, which are termed mirror nodes herein. In addition to the transactions, the log includes the identifying details such as the sequence number, replication group id and target node id. For example, transactions (A, B, and C) in an origination node 1 2102 may be logged in origination node 0 2104 (A), origination node 2 2106 (B), and origination node 3 2108 (C).
  • origination node 1 2102 fails, the transactions may be recovered and sent by the mirror nodes 2104, 2106, and 21 08. The transactions may also be replayed and relogged by the mirror nodes 2104, 21 06, and 2108. However, the subset for origination node 1 2102 will have become fragmented across the source array 21 10.
  • each mirror node 2104, 2106, and 2108 may replay the transactions it has recovered, and create a partial subset to log the details for the transaction counts.
  • the set manager for the source array may request set totals for any inflight sets.
  • Each mirror node will respond with subset totals for the failed node.
  • the set manager will reconstruct the total transaction count for the failed node, e.g., origination node 1 2102, from the partial counts from each mirror node 2104, 2106, and 2108 and return a set total to each mirror node 2104, 2106, and 21 08.
  • the mirror nodes 21 04, 2106, and 2108 Once the mirror nodes 21 04, 2106, and 2108 have the set totals, they can rebuild a partial subset manifest 21 12 for the transaction they have recovered.
  • the partial manifests may each be sent to the target node by operational links between the mirror nodes and other target nodes, for example, as discussed with respect to Fig. 20.
  • the partial set manifests are accumulated to create a set manifest for the failed node. This can be used to confirm that the set is complete.
  • a link failure a node failure may lead to replication failure due to the extra loading. Accordingly, as for the link failure, policies may be defined to prioritize the transactions for replication.
  • Fig. 22 is an example non-transitory machine readable medium 2200 that contains code for managing sets of transactions for replication.
  • the machine readable medium 2200 is linked to one or more processors 2202, for example, by a high speed interconnect 2204.
  • the machine readable medium 2200 contains code 2206 to direct the processors 2202 to issue a cluster wide correlator. This may be based, for example, on a time interval.
  • Code 2208 may be included to direct the processors 2202 to receive a transaction in a source array that is to be replicated to a destination array.
  • Code 2210 may be included to assign the cluster wide correlator to the transaction.
  • code 221 2 may be included to associate a number of transactions into sets. For example, this may be based on the cluster wide correlator assigned to each of the transactions.
  • Fig. 23 is an example non-transitory machine readable medium 2300 that contains code to managing manifests for replication.
  • the machine readable medium 2300 is linked to one or more processors 2302, for example, by a high speed interconnect 2304.
  • the machine readable medium 2300 may include code 2306 to direct the processors 2302 to receive a transaction in a source array that is to be replicated to a destination array.
  • Code 2308 may be included to request a replication ticket for the transaction from a remote copy ticket dispenser.
  • the replication ticket may include a sequence number and replication group for the transaction.
  • code 2310 may be included to associate the transactions into sets. This may be based, for example, on the ticket number.
  • Fig. 24 is an example non-transitory machine readable medium 2400 that contains code to recover from an origination node failure during an
  • the machine readable medium 2400 is linked to one or more processors 2402, for example, by a high speed interconnect 2404.
  • the machine readable medium 2400 includes code 2406 to direct the processors to log at least a portion of the replication transactions to the origination node in each of a number of mirror nodes.
  • Code 2408 is included to determine a failure of the origination node.
  • the machine readable medium 2400 also includes code 241 0 to send the logged replication transactions from each of the plurality of mirror nodes to a corresponding node in the destination array for transfer to the target node.
  • Fig. 25 is an example non-transitory machine readable medium 2500 that contains code to handle collisions during an asynchronous replication.
  • the machine readable medium 2500 is linked to one or more processors 2502, for example, by a high speed interconnect 2504.
  • the machine readable medium 2500 includes code 2506 to direct the processors 2502 to detect an attempted overwrite of a cache memory page that is being replicated from a source node to a destination node.
  • Code 2508 is also included to prevent the cache memory page from being overwritten before the replication is completed.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

Methods and systems for recovering from an origination node failure during an asynchronous replication are provided. A system includes an origination node in a source array from which transaction are being replicated. The system includes a number of mirror nodes each logging a portion of the transactions from the origination node. A link is included between each of the mirror nodes and a node in a destination array. A detector identifies a link failure and determines a reason for the link failure, and a failure handler determines actions needed to communicate transactions to a target node.

Description

RECOVERING FROM AN ORIGINATION NODE FAILURE DURING AN
ASYNCHRONOUS REPLICATION
BACKGROUND
[0001] Replication is a data backup or mirroring technique in which identical data is saved to two or more arrays. A host, such as a server, writes the data to a first storage system. The data is then written from the first storage system to a second storage system.
BRIEF DESCRIPTION OF THE DRAWINGS
[0002] Fig. 1 is a block diagram of an example of a node that may be used in a storage system or array;
[0003] Fig. 2 is a block diagram of an example storage system, or array, formed from a cluster of nodes that are in communication with each other;
[0004] Fig. 3 is a block diagram of an example of a replication system showing a source array in communication with a destination array;
[0005] Fig. 4 is a process flow diagram of an example of a synchronous replication process;
[0006] Fig. 5 is a schematic example of blocks being scrambled during an asynchronous replication;
[0007] Fig. 6 is a schematic example of a cluster wide correlator used to correct write ordering in asynchronous streaming replication;
[0008] Fig. 7 is a schematic example of a set manager for an array working with secondary set managers on each node to build manifests for transactions written to the nodes;
[0009] Fig. 8 is a schematic example of manifests from origination nodes in a source array being transferred to target nodes in a destination array;
[0010] Fig. 9 is a sequence diagram of an example replication transactions from a source array being applied by a target node in an asynchronous replication process; [0011] Fig. 10 is a schematic example of an origination node creating a subset of transactions for a single replication ticket;
[0012] Fig. 1 1 is a process flow diagram of an example method for
asynchronously replicating transactions from a source array to a destination array;
[0013] Fig. 12 is a process flow diagram of an example method for managing sets of transactions for replication;
[0014] Fig. 13 is a process flow diagram of an example method for managing manifests for replication;
[0015] Fig. 14 is a process flow diagram of an example method for recovering from an origination node failure during an asynchronous replication;
[0016] Fig. 15 is a process flow diagram of an example method for collision handling during an asynchronous replication;
[0017] Fig. 1 6 is a schematic example diagram of illustrating the transfer of a cache memory page from an origination node to a target node in the absence of any collisions;
[0018] Fig. 17 is a schematic example diagram of two pages with the same cluster sequence number that have a collision being merged into a single page with a single assigned replication ticket;
[0019] Fig. 18 is a schematic example diagram of a revision page created to protect a named page from being overwritten by a named page created from data in a different sequence number;
[0020] Fig. 19 is a schematic example of a coordinated snapshot (CSS) used to provide a restart point for synching a source array with a destination array;
[0021] Fig. 20 is a schematic example of replication transactions being transferred from an origination node to a target node after a failure of a direct link between the nodes;
[0022] Fig. 21 is a schematic example of replication transactions being recovered after a node failure;
[0023] Fig. 22 is an example non-transitory machine readable medium that contains code for managing sets of transactions for replication; [0024] Fig. 23 is an example non-transitory machine readable medium that contains code to managing manifests for replication;
[0025] Fig. 24 is an example non-transitory machine readable medium that contains code to recover from an origination node failure during an asynchronous replication; and
[0026] Fig. 25 is an example non-transitory machine readable medium that contains code to handle collisions during an asynchronous replication.
DETAILED DESCRIPTION
[0027] The replication of transactions from a source array to a destination array is often performed synchronously, with each transaction acknowledged before another transaction is sent. As used herein, transactions will generally refer to write transactions from a host to a source array or from a source array to a destination array, which may also be termed lOs (input-outputs).
[0028] However, in synchronous replication, individual transactions may need to have cross reference dependencies supplied by a central source on each distributed system. Synchronous replication requires an acknowledgement from the destination array which means that the host IO is exposed to the latency of the link between the source and destination arrays. This adds significant overhead that may slow the number of transactions that can be completed in a time period and may limit the number of different arrays that may be used.
[0029] Methods and systems described herein use an asynchronous streaming process to replication transactions from a source array to a destination array. However, asynchronous operations may be vulnerable to issues such as scrambled data from link latency, overwriting of data in collisions, and lost transactions due to link or node failures. Further, asynchronous streaming replication should avoid write ordering issues whereby transactions are applied in different orders on the source and destination arrays. If the stream is interrupted the data on the destination should be in a time consistent state, in other words that the transactions are applied in the same order on both source and target arrays.
[0030] The techniques described herein may help mitigate these issues by associating the transactions using a common property. This allows the creation of a set of transactions that may be transferred between systems and processed with a significantly lower overhead than attempting to manage each independent transaction. The design of the solution has a number of components operating on each origination node of the source array which combine to create a set.
Transactions are tagged using a cluster wide correlator and added into a subset using the same correlator.
[0031] A set is defined as a number of transactions which share a common property for processing purposes, for example, the interval of time in which the transaction were received. The problem becomes more complex when applied to a distributed system with a number of nodes all operating independently. To solve this problem in clustered processing environment, each origination node in the source array will create a subset using the same common property. The subset will be tagged with an origination node identifier and a target node identifier such that all transactions in the subset relate to a single node, the origination node, and may be processed by a single node, the target node. Therefore, each set will comprise of a number of subsets, one for each origination node in the source array.
[0032] When a new cluster wide correlator is provided, the subsets relating to the preceding cluster wide correlator are considered complete, and each origination node will report the number of transactions in its subset to a central control point which will accumulate this meta-data from all origination nodes. The central control point will then respond to the origination nodes with a total number of transactions for the complete set along with any dependency data to ensure sets are applied in a strict sequence. Each origination node will then generate a subset manifest which contains the number of transactions in the local subset, the number of transactions in the complete set and the previous set that must be processed before this set can be processed.
[0033] The distributed manifest management design keeps track of a sequence of transactions on a distributed system by providing a mechanism for associating independent transactions with a common property across a distributed platform. Further, by sequencing sets of transactions rather than each individual transaction solutions can be scaled much larger. These transaction sets can be used for the purposes of transmission and processing across a number of distributed platforms.
[0034] The use of the distributed set management also allows a number of transactions to be in progress at the same time, and for all transactions to be recovered in the correct order. Signals are sent between the origination nodes in the source array related to the sequence of transactions both on creation of sets and subsets and also when replication operations are completed. As transactions are completed on all origination nodes of the source array, the last completed
transaction is circulated to all origination nodes in the source array which then ratchet to that particular transaction number.
[0035] In the event of a node failure in the cluster the data required to generate this meta-data for the subset accountancy may be spread across the surviving origination nodes in the cluster. Other origination nodes in the cluster may recover the failed transactions and continue the sequence from the last completed transaction seamlessly. The sequence of transactions may be replayed from the oldest transaction found on all remaining origination nodes in the source array. This allows for the tracking a sequence of transactions across a distributed cluster of nodes and recovering the sequence in the event of a node failure in the distributed system.
[0036] A partial manifest recovery mechanism allows the recovery of data sets from across a distributed system after a node failure during asynchronous streaming replication. Each surviving origination node may generate a partial manifest for the recovered subset meta-data which will be forwarded to the target node along with a unique sender node identifier which represents the origination node which recovered that part of the subset.
[0037] The logged transactions and partial subset manifests are transferred to the target node which determines if the subset is complete by comparing the number of unique transactions received with the contents of the manifest. The partial manifest design allows each origination node to account only for transactions it has tracked and send a partial manifest for the transactions recovered by that origination node. The target node should have received, or be in the process of receiving, all of the transactions. The target node will then receive a number of unique partial manifests for this subset, which it can then accumulate to complete the set. When the target node has received all of the transactions for this subset as indicated by the accumulated partial manifests then the subset is complete and can be processed when the dependent set is complete.
[0038] During synchronous replication any write transactions are replicated to the destination array while retaining exclusive access to the region of the storage volume. Only when the destination array has responded will the next write transaction to that region of the storage volume be permitted.
[0039] During asynchronous replication write transactions are written to the source array and acknowledged back to the connected host server before being replicated to the remote storage array. To maintain data integrity, the order of write transactions that are applied on the source array is retained on the target array, therefore the previous data cannot be overwritten until it has been replicated to the destination array. However access to the local volume must be permitted.
[0040] In the event of a collision, e.g., wherein a connected host server attempts to write to a region of the storage volume before the previous data in that region has been replicated, techniques described herein preserve this data without resorting to logging the data to a journal. To perform this function, all write transactions that are being replicated are tracking during asynchronous streaming replication using a revision request that tracks pages in a page cache memory. In the event of a collision the revision request detects this collision and may create a duplicate of the affected pages on two nodes of the cluster for redundancy purposes.
[0041] A log entry that describes the revision page may be created between the origination node and the target node to protect against node failure. The advantage of using revision pages is to hold collisions without resorting to a journal to track every transaction.
[0042] In a journal based design, host write transactions are written to the source array and logged to a transaction journal, which is used to hold these transactions until they can be replicated to the destination array. A large journal may be used to hold many minutes of backlog data, making the system resistant to failures. However, the use of a journal to store write ordered transactions across a cluster of nodes may become very complex as the number of arrays increases and the backlog introduces some latency into the system, which may slow the replication process.
[0043] The techniques described herein, use a page cache memory to enhance the speed and scalability of the replication process. In a cache memory design, host write transactions are written to the source array and held in cache memory for replication to the destination array. The speed of the cache memory provides fast access to the transaction data being held in cache memory. Further, in comparison to a journal based design, a smaller number of transactions are backlogged waiting for a response from a journal.
[0044] Fig. 1 is a block diagram of an example of a node 1 00 that may be used in a storage system or array. The node 100 may be part of either a source array, e.g., coupled to a host, or a destination array, e.g., storing replicated transactions. The node 100 may include one or more processors 102. The processors 102 can include a single core processor, a dual-core processor, a multi- core processor, a computing cluster, a virtual processor in a cloud computing arrangement, or the like.
[0045] A chip set 104 may provide interconnects 106 between the processors 102 and other units in the node 100. The interconnects 106 may include Peripheral Component Interconnect Express (PCIe), Fibre Channel, Quick Path interconnect (QPI) from Intel, Hypertransport® f rom AMD, Ethernet, and the like. In some examples, a bus may be used instead of, or in addition to, the interconnects 106.
[0046] The interconnects 106 may couple input/output chips 1 08 to the chip set 104. The input/output (I/O) chips 1 08 may control communications with other nodes 100 in a cluster, for example, through a router or switch 1 1 0. The I/O chips 108 may include, for example, an I/O controller hub (ICH) from Intel or a fusion controller hub (FCH) from AMD, among others. The switch 1 1 0 may provide PCIe, or other links, between the node and every other node in an array. The switch 1 10 may be combined with other chips, such as the I/O chip 108. In some examples, the switch 1 10 may be an independent chip, such as a PCIe switch from Integrated Device Technology.
[0047] Cache memory 1 1 2 may be coupled to the processors 1 02 through the chip set 104. Other cache memory 1 14 may be used by the I/O chips 1 08 to provide buffers during data transfer. The cache memory 1 12 or 1 14 may include paged cache memory, for example, storing data in blocks. The cache memory 1 12 or 1 14 may be integrated with the processors 102 or the I/O chips 108, respectively, or may be separate RAM that is coupled to the processors 1 02 or the I/O chips 108 through interconnects 106.
[0048] The interconnects 106 may couple to a number of interface slots 1 1 6. The interface slots 1 16 may provide an interface to additional units, such as hosts, drives, solid state drives, nodes 100 on other arrays, and the like. In some examples, solid state drives may be directly plugged into the interface slots 1 16 to provide storage volumes. In other examples, external disk arrays may interface to the node 100 through cards seated in the interface slots 1 16.
[0049] A storage device 1 18, functioning as a non-transitory, machine readable medium, may be used to hold code modules to instruct the processors 102 to perform the functions described herein. The storage device 1 18 may include memory closely coupled to the processors, as indicated in Fig. 1 , or may include drives or other longer term storage devices. The code modules may include, for example, a sequence number generator 120 to provide a replication ticket for a transaction to be replicated to a destination array, as discussed further herein. A transaction communicator 122 may send transactions to a target node in a destination array.
[0050] Sets may be managed by a subset manager 124 and a set manager 126. The subset manager 1 24 may group the transactions into sets, based in part on a time interval in which the transaction occurred, and then build a subset manifest for transactions to the node 100, based on a total count of transactions received from the set manager 1 26. The set manager 1 26 may receive the transaction count from the subset manager on each of a number of nodes and create a total count of all transactions that occurred within the time interval. While the set manager 126 may be present on every node 100 in an array, it may only be active on one on the nodes at any one time.
[0051] A remote copy ticket dispenser 1 28 may provide a replication ticket for a transaction to be replicated to a destination array. A detector 1 30 may identify link failures and determine reasons for the link failure, for example, if a communications link has failed or if a node has failed. A failure handler 132 may determine actions needed to communicate transactions to a target node. A replayer 1 34 may play back logged, or mirrored, transactions for a failed origination node so that the accounting for the transactions may be performed to create the manifests. A collision detector 136 may detect when a host is attempting to overwrite a cache memory page that has not been completely replicated. A revision page tagger 138 may mark a cache memory page as protected. A page merger 140 may combine pages that have detected collisions and have the same sequence number. A snapshot system 142 may capture a snapshot of the source array at a point in time to enable resynching of the source array and destination array. A synching system 144 may use the snapshot to resynchronize the source array and the target array, for example, after a restart.
[0052] The items shown in Fig. 1 are not to imply that every item is present in every example. For example, a smaller system that only has a single node in a source array may not include one or both of the I/O chips 108. Further, other items may be present, such as modules to control the basic operations of the system.
[0053] Fig. 2 is a block diagram of an example storage system, or array 200, formed from a cluster of nodes 202-216 that are in communication with each other. Like numbered items as described with respect to Fig. 1 . The array 200 may include interconnects 218 that allow each node 202-216 to access every other node 202-216 in the cluster. Communications with nodes in other arrays, such as a destination array, may be taken care of by interface cards in the interface slots 1 16. Further, each of the nodes 202-21 6 may have associated drives or volumes 220. Although these are shown as external units for two nodes in Fig. 2, as described with respect to Fig. 1 , in some examples, the volumes may be installed in cards mounted in the slots of a node 202-216. [0054] This example in Fig. 2 is not to imply that the array 200 includes eight nodes in every case. In some examples, the array 200 may have four nodes, two nodes, or may be a single node. In other examples, larger clusters may be possible, including, for example, 16 nodes, 32 nodes, or more.
[0055] Fig. 3 is a block diagram of an example of a replication system 300 showing a source array 302 in communication with a destination array 304. One or more hosts 306 may be in communication with the source array 302. The links 308 from the hosts 306 to the source array 302 may be through interface cards installed in the interface slots 1 16 (Fig.1 ) in the nodes. The links 310 from the source array 302 to the destination array 304 may also be through interface cards installed in the interface slots 1 16.
[0056] The hosts 306 may provide write transactions to source nodes 302A- 302H in the source array 302 to be saved to a volume. The transactions may be copied to the destination array 304 for replication. A transaction provided to an origination node 302A-302H in the source array 302, such as node 302A, may be replicated in a target node 304A-304H in the destination array 304. Specific nodes, such as 302A and 304A may be paired, but this may not be present in every example.
[0057] Fig. 4 is a process flow diagram of an example of a synchronous replication process 400. The synchronous replication process 400 starts at block 402 with a source array receiving a write transaction from a host. At block 404, the source array may request a replication ticket for replicating the transaction to the destination array. At block 406, the transaction is written to a local volume in the source array. At block 408, processing of the transaction is paused to wait for an acknowledgment from the destination array. At the same time as writing the data to the local volume, at block 410 the source array sends the transaction to the destination array. At block 412, the destination array receives the transaction from the origination node. At block 414, the transaction is written to a local volume local in the destination array. At block 416, the destination array returns an
acknowledgment to the source array. Once the source array receives the acknowledgment, at block 418, the replication ticket is released. A write
acknowledgment may then be returned to the host at block 420.
[0058] The host application uses read and write transactions to the storage array to access data. Although many different transactions may be issued concurrently, dependent ordering is protected as the transaction will be issued serially from the host application. The transactions are ordered correctly as they are synchronous, and, thus, the host will not receive an acknowledgement until the transaction is complete. Further, any dependent requests will be delayed until the current transaction is complete. Accordingly, using synchronous replication the order of the write transactions is naturally preserved.
[0059] In contrast to synchronous replication, asynchronous replication does not necessarily maintain the order of the write transactions. In asynchronous replication, the host application will receive a write acknowledgement before the transaction has been replicated. This may allow a new write transaction to be applied to the source volume before the old transaction has been replicated to the target volume. Thus, the transactions may be reordered on the target array, scrambling the data.
[0060] Fig. 5 is a schematic example of blocks 500 being scrambled during an asynchronous replication. In the example, in a host I/O sequence 502, four write transactions A, B, C, and D have been sent to a source array. The four transactions are written to an asynchronous replication cache 504 to wait transfer to a destination array. However, during the transfer, a latency 506 in the connection slows the transfer of the B block, causing it to arrive after the C block, causing it to arrive at the target. As a result, the C and B blocks are reversed during the application 508, e.g., during storage on a volume on the destination array.
[0061] This problem may be compounded by the clustered architecture of the storage array. Attempting to provide dependencies between individual transactions across the nodes of the storage array would be difficult or impossible. To simplify the problem transactions are grouped into sets of transactions and applied in blocks on the target array. Until a complete set is applied the group will not be in a consistent state. If the set cannot be fully applied then the replication group will be inconsistent. This is further discussed with respect to Fig. 6.
[0062] Fig. 6 is a schematic example of a cluster wide correlator used to correct write ordering in asynchronous streaming replication. Each cluster wide correlator may, for example, cover a time interval that is shared across all nodes on the source array. The cluster wide correlator may be used to tag replication transactions across all nodes for the purposes of providing a dependency. The cluster wide correlator may be a sequence number mapped from the time intervals during which transactions arrive.
[0063] As for the example of Fig. 5, a host writes a series of transactions 602, e.g., A-D, to a source array. In this example, the transactions being written in a first time interval 604 are assigned a first sequence number, e.g., 1 01 , and transactions being written in a second time interval are assigned a second sequence number, e.g., 102. This sequence number remains with the transactions as they are written to a replication cache 606 on the primary or source array. When the transactions are written to the secondary or destination array 608, transactions B and C are again reversed due to a latency 610 in the transfer. In this example, the sequence number, which is associated with each transaction, may be used to correct the order of the transactions, ensuring that they are applied 610 to the volume associated with the destination array in the correct order.
[0064] The sequence number may be combined with other identification to generate a replication ticket, for example, in a remote copy ticket dispenser.
Transactions that require synchronous or asynchronous periodic replication each request a ticket from the remote copy ticket dispenser. The ticket is used to track the replication transactions and may provide a simple level of collision handling when multiple transactions wish to access the same region of a volume concurrently. In asynchronous streaming, the tickets are associated into sets, which may be used to provide dependencies between each set to ensure that the sets of lOs are applied in the correct sequence.
[0065] A set is cluster wide, e.g., across a source array, and includes a number of subsets, one subset per replication group per node. A set is a collection of transactions that have replication tickets that are created by cluster sequence number and replication group id:
<seqno>.<grpid>
[0066] A subset is a subcomponent of a set which covers only those transactions local to a single origination node, for example, 0 to 7:
<seqno>.<grpid>.<nid>
[0067] For example, the sequence number may represent sequential 100 ms intervals during which the associated transactions arrived. The replication group identification may represent all of the transactions for writing an object, such as a particular command, directory, or file. As host write transactions are received they request a replication ticket which is associated with a set and subset. During subset creation a target node is selected to which all transactions within this subset will be transmitted.
[0068] The replication ticket is logged to mirror memory for node down handling, e.g., to protect from node failures. The subset count of the number of transactions is incremented to include this transaction. The replication transaction is transmitted to the remote array with a subset tag containing the set details, e.g., a subset manifest.
[0069] Fig. 7 is a schematic example of a source array 700 including a set manager 702 working with subset managers 704 on each origination node 706-712 to build subset manifests for transactions written to the origination nodes 706-712. As described herein, the set manager 702 runs on a single origination node 706, 708, 710, or 712 as a highly available process. Other instances of the set manager 702, although inactive, exist as failovers on each of the nodes 706-712.
[0070] When the cluster sequencer increments each of the origination nodes 706-712 will be interrogated for their subset totals 714 for the previous cluster sequence number by the set manager 702. Each subset manager 704 will send 716 the subset totals 714 for each asynchronous streaming replication group to the set manager 702. The set manager 702 combines the subset totals 714 into a set total and inform each of the subset managers 704 of this total which the subset managers 704 will use to create a subset manifest 718 that includes at least these totals. It will also resolve the dependency between this set and any predecessors. Each subset manager 704 will then transmit a manifest message to the destination array which contains both the set and subset totals and the dependent sequence number.
[0071] Fig. 8 is a schematic example of manifests from origination nodes 706- 712 in a source array 700 being transferred to target nodes in a destination array 800. Like numbers are as described with respect to Fig. 7. A mirror image of the set and subset management system is also present on the destination array 800. Each target node 802-808 has a subset manager 810 and a set manager 812. As described with respect to the source array 700, the set manager 812 is present on each target node each target node 802-808 for failover purposes, but is only active on one of the target node 802, 804, 806, or 808 at any time. As replication transactions are received from the replication links 814 they are stored in cache memory, duplicated to a target node each target node 802-808 and logged to the cluster mirror memory for node down protection.
[0072] Each of the origination nodes 706-712 may send a subset manifest 718 to a corresponding target node 802-808. The subset manager 810 sends
acknowledgements to the source array as it receives and protects the transactions prior to being processed by the set manager. The subset manager 810 in each target node 802-808 may confirm to a set manager 720 when all transactions are received in each subset.
[0073] As described with respect to Fig. 9, once each subset manager 810 has acknowledged their respective subsets back to the source array 700 the set is deemed complete on the source array 700. The set manager 812 may then send an acknowledgement to the source array 700, informing it that the replication has been successfully completed. The source array 700 may then release any data pages and cleanup. The destination array 800 may not have applied the set yet, but there are multiple copies/logs of the data to protect in the event of a node failure. [0074] Fig. 9 is a sequence diagram 900 of an example of replication transactions from a source array being applied by a target node in an asynchronous replication process. The process starts with a replication copy 902 wherein the transactions 904 are sent to a target node where a subset manager 906 adds the transactions to a subset. As each individual transaction 908 is received, an acknowledgement 910 is returned to confirm receipt. The subset manifest 912 is sent and an acknowledgment 914 is returned. The subset manifest 91 2 is added to the subset. The subset manager 912 confirms that all transactions in the set have been received and a message 916 is sent to the set manager 918 to inform it that the subset has been received.
[0075] The set manager 918 returns a message 920 instructing the subset manager 906 to apply the subset, e.g., send them to a volume 922 for storage. The subset manager 906 then applies the transactions 924 to the volume 922, which returns acknowledgements 926 indicating that the subset has been applied. The subset manager 906 then sends a message 928 to the set manager 918 to inform it that the subset has been applied. The set manager 918 replies with a set complete message 930. Once all subsets in a set are completed, the set manager 918 may send a message to the set manager of the source array informing it that the set is completed.
[0076] Fig. 10 is a schematic example of an origination node 1000 creating a subset 1002 of transactions 1004 for a single replication ticket. If a subset 1002 does not exist for a replication ticket, it is created and a target node (dnid) 1006 will be chosen for the entire subset 1002. Each subset 1002 is uniquely identified by the replication ticket 1 008 that includes the sequence number (seqno), replication group identification (grpid), and the node identification (nid).
[0077] As transactions 1004 are added to the subset 1002 they are issued with an IO index (ioidx) 1010 which is used to correlate transactions 1002 within the subset 1002. When the cluster seqno increments, the subset 1 002 is complete and a subset manifest 1010 is generated which contains the subset and set totals. The set manager receives the subset totals and returns the sum of these values to each subset manager to be included in the subset manifest 1012, for example, in place of X.
[0078] Fig. 1 1 is a process flow diagram of an example method 1 100 for asynchronously replicating transactions from a source array to a destination array. The method 1 100 may be implemented by the origination nodes of the source array and destination nodes of the target array. The method 1 1 00 begins at block 1 102, when a host write transaction is received in an origination node in the source array. At block 1 104 a replication ticket is requested for the transaction. At block 1 106 the cluster sequence number 1 108 is read in order to create the replication ticket at block 1 1 04.
[0079] At block 1 1 10, the transaction is added to a subset by the origination node. At block 1 1 12, a collision check is performed by the origination node to determine if the transaction will overwrite data that is still being replicated. At block 1 1 14, if a collision has been detected, for example, between data with different sequence numbers, a revision page may be created by copying the data to a free cache memory page, as described further with respect to Fig. 18. At block 1 1 16, the origination node writes the data to the local volume. At block 1 1 1 8, a write acknowledgement is returned to the host, which is then free to send another transaction. At block 1 120, the transaction is sent to the target node on the destination array, e.g., the remote array, for replication. At block 1 1 22, the origination node waits for an acknowledgement from the target node.
[0080] At block 1 124, the target node on the remote array receives the transaction from the origination node of the source array. At block 1 126, the target node adds the transaction to a local subset, and, at block 1 128, returns an acknowledgement to the origination node.
[0081] The origination node receives the acknowledgement at block 1 122 and proceeds to block 1 130 to determine if the subset is complete. A number of transactions may be sent following the method 1 100 from block 1 1 02 to block 1 130. Further, it may be noted that a number of other origination nodes in the source array are also following this procedure to send transactions in the set to various target nodes on the destination array. [0082] At block 1 132, the cluster sequence number 1 108 is updated, for example, when the time interval ends and a new interval begins. At this point, the origination node sends a count of the transactions in the subset to the set manager, which returns the total count of transactions to the origination node. The origination node creates the subset manifest at block 1 1 34, which is added to the subset 1 136 and, at block 1 1 38, transferred to the target node, for example, by the procedure of steps 1 124-1 130. At this point, the origination node determines that the subset is complete, and releases the replication ticket at block 1 140.
[0083] At block 1 142, the target node confirms that the subset is received, for example, by comparing the subset manifest received to the manifest it has created as transactions were received. As noted with respect to Fig. 9, it may also inform the set manager for the destination array that the subset is complete and get instructions to apply the data to the local volume. At block 1 144, the set manager instructs the target node to apply the data. At block 1 146, the set manager writes the data to the local volume.
[0084] The method 1 100 provides an overview of the steps taking place, but not every step needs to be present in every example. Further, steps may be included in more detailed views of particular parts of the method. Examples of these are described further with respect to Figs. 1 2-15.
[0085] Fig. 12 is a process flow diagram of an example method 1200 for managing sets of transactions for replication. The method begins at block 1202, when a transaction is received in a source array, for example, at an origination node, that is to be replicated to a destination array, for example, in a target node. At block 1204, the transaction is associated with a cluster wide correlator. As described herein, the cluster wide correlator may be created from a time interval during which the transaction is received. At block 1206, the transaction is grouped into a set, for example, based on the cluster wide correlator. Each set may corresponds to transactions received during an interval in time.
[0086] Fig. 13 is a process flow diagram of an example method 1300 for managing manifests for replication. The method 1300 begins at block 1302, with the tagging of each of a number of transactions from a host to an origination node in a source array with a replication ticket. The replication ticket may be used to group the transactions into a subset. At block 1 304, each of the transactions may be tagged with an index number to correlate transactions within the subset. At block 1306, a target node in a destination array is selected for the transactions. At block 1308, the transactions are transmitted to the target node. At block 1310, a subset manifest is created for the transactions and, at block 131 2, the subset manifest is sent to the target node.
[0087] Fig. 14 is a process flow diagram of an example method 1400 for recovering from an origination node failure during an asynchronous replication. The method 1400 begins at block 1402 with the logging a portion of the replication transactions to the origination node in each of a number of mirror nodes. The mirror nodes are origination nodes that share a logging function for another origination node between them. At block 1404, a determination is made if the origination node has failed. At block 1406, mirrored replication transactions logged by each of the mirror nodes are replayed. Each of the mirror nodes then recreates a corresponding partial subset of the recovered transactions. At block 1408, a total for the replication transactions sent from each of the mirror nodes is requested, for example, by the set manager in the source array. At block 1410, the totals from each of the mirror nodes are summed to create a transaction total. At block 1412, the transaction total is provided to each of the mirror nodes.
[0088] Fig. 15 is a process flow diagram of an example method 1500 for collision handling during an asynchronous replication. As each write transaction completes on the source array the host application is free to send another write transaction to the same volume at the same offset and length. The nature of asynchronous streaming replication means that the previous write transaction may not have been transmitted to the target array yet. This is an IO collision, the data at that specific volume, offset and length needs to be preserved for transmission, however the host cannot be prevented from overwriting this region of the volume. A mechanism that may preserve the data between sets is creating revision pages.
[0089] The method 1 500 begins at block 1502, when a first write transaction is received in an origination node from a host. At block 1504, the transaction is saved to a cache memory page. At block 1506, a replication of the transaction to a target node in a destination array is initiated. At block 1508, the storage of the transaction on a volume coupled to the node is completed and, at block 1510, the transaction is acknowledged to the host. At block 1 51 2, a second write transaction is received from the host that overlaps the first write transaction. At block 1514, a collision between the first write transaction and the second write transaction is detected. At block 1516, the second write transaction is prevented from overwriting the first write transaction. This may be performed by merging transactions onto a single page, for example, if a collision happens in a single sequence number, or by creating revision pages, for example, if a collision happens between sequence numbers. This is discussed further with respect to Figs. 16-18.
[0090] Fig. 16 is a schematic example diagram of illustrating the transfer 1600 of a cache memory page from an origination node to a target node in the absence of any collisions. Transactions arrive in the origination node and are stored in a cache memory page 1602 that is an anonymous page 1604, e.g., a buffer page. The transactions in the cache memory page have an associated cluster wide correlator, such as a cluster sequence number 1606.
[0091] In this example, the data in the cache memory page 1602 is in cluster sequence number 1606 when it is first received. The cache memory page 1602 is transferred to a cache memory page 1608 that is a named page 1 610, for example, using the cluster sequence number 1 01 . As there are no other pages that are attempting to be stored in the same place as a named page 1610, there are no collisions, and no need to create cache memory pages that are revision pages 1612.
[0092] As there are no collisions, the cache memory page 1608 in the named page 1 61 0 is provided a ticket number 1614 to form a transport page 1 61 6. The transport page 1616 is then sent to the remote cache memory, for example, in the target node. The remote page 1 618 can then be added to the remote subset and processed.
[0093] If two pages arrive in the named page 1610, for example, with a single cluster sequence number, the transactions for the second page may overwrite the first page. This can be handled by merging the transactions into a single page before transferring the merged page under a single ticket number.
[0094] Fig. 17 is a schematic example diagram of two pages with the same cluster sequence number that have a collision being merged into a single page with a single assigned replication ticket. Like numbered items are as described with respect to Fig. 1 6. Transactions forming a first page 1702 are received in the origination node and may be named using the cluster sequence number to form a named page 1704. Transactions forming a second page 1 706 are received and may form a second named page 1708. However, if the transactions forming the second page were written into a second named page 1708, the first named page may be overwritten. The potential collision 1710 may be detected and prevented by merging the transaction data to form a single named page 1712. The named page 171 2 is issued a replication ticket number 1714, forming a transport page 161 6, which is sent on to the target node, forming a remote page 1716. The remote page 171 6 can be processed normally by the target node.
[0095] Fig. 18 is a schematic example diagram of a revision page created to protect a named page from being overwritten by a named page created from data in a different sequence number. Like numbered items are as described with respect to Fig. 16. As used herein, revision pages 1 612 are cache memory pages that are copied to free cache memory pages. The revision pages 1 612 may be tagged with a replication ticket, indicating that the page is being used for replication and should be protected. A revision page 1612 can have several references from different requests covering either the same or different regions of the cache memory page. Reference counts are used to track how many outstanding remote copy requests need the revision page. Once the reference count drops to zero, the revision page 1612 is released. In the example of Fig. 18, transaction data forming cache memory page 1802 is received under a first sequence number 1804. The cache memory page 1802 is moved to a named page 161 0. When the cluster sequence number increments to form a new sequence number 1806 another cache memory page 1808 is received. [0096] However, the cache memory page 1802 may still be in the process of transferring. In this case, a potential collision is detected. To protect the data, and free the named page 1 61 0, the cache memory page 1802 is copied to a free page, creating a revision page 1810. The duplicate of the cache memory page 1802 may be made on a different node with a log entry created between these nodes to indicate the details of the revision page 1810. The instantiation of the revision page 1810 in a new location allows the named page 1610 to be released for the host to update as usual.
[0097] The revision page 1810 may be given a ticket number, forming a first transport page 1812, which is copied to a remote page 181 8 and processed by the target array. The second page 1 820 may then be given a subsequent ticket number to form another transport page 1 822, before being sent on to a remote page 1824 for processing by the target node.
[0098] Fig. 19 is a schematic example of a coordinated snapshot (CSS) used to provide a restart point for synching a source array with a destination array. The initial synchronization of asynchronous streaming groups will be performed in the same manner as synchronous and asynchronous periodic modes. Synchronous ticketing will prevent write transactions to regions of the volume that are being read and sent to the remote array.
[0099] When the remote copy group is in sync, sets 1902 will be flowing between the arrays. As sets are applied, the RPO 1904 moves forward with the sets. The RPO 1904 denotes the amount of data loss that an enterprise can withstand in the event of a disaster without any significant impact to their business operations. Asynchronous streaming replication will provide an RPO 1904 of 30 seconds or less without the host latency impact of synchronous replication.
[0100] However, it may not be possible to track each set for group restart purposes. Further, there is no set mechanism that allows a consistency point to be determined, for example, to restart the process in case of failure. For this
consistency point a snapshot is required. Periodically a coordinated snapshot (CSS) 1906 may be taken on both the source and destination volumes. The snapshot request will be inserted into the data stream 1908. The CSS 1906 may provide a group consistent restart point between source and target arrays.
[0101] Fault tolerance may also be an issue for asynchronous streaming replication. The main concerns for fault tolerance are a failed link and a failed node. Link failures may cause the system to become unbalanced with respect to replication link capacity, which may lead to some or all replication groups to stop. A group policy can be defined which will allow the user to prioritize which groups to stop if the solution become unsustainable. This policy monitors the utilization of source array cache and may be triggered when the acceptable usage limits are breached. Failed nodes may also cause problems for the replication solution, and may be handled using the same policy. Techniques for providing fault tolerance for link failures and node failures are described with respect to Figs. 20 and 21 .
[0102] Fig. 20 is a schematic example of replication transactions being transferred 2000 from an origination node 2002 to a target node 2004 after a failure of a link 2006 between the nodes 2002 and 2004. In this example, a first transaction 2008 is successfully transferred from the origination node 2002 over the link 2006 to the target node 2004. However, before succeeding transactions 2010 can be transferred, the link fails 2012.
[0103] In this example, the succeeding transactions 2010 are transferred to a second origination node 2014 that has an operational link 2016 to a second target node 201 8. From the second origination node 2014, the transactions are transferred to the second target node 2018 over the operational link 2016. Once at the second target node 2018, the transactions may be transferred to the target node 2004.
[0104] This technique assumes sufficient bandwidth exists in the remaining operational links between the source array 2002 and the destination array 2020 to handle the normal traffic in addition to the traffic that had been carried by the failed link 2006. As noted, a policy may be defined to prioritize transfers of transactions between the arrays if overload conditions may lead to replication failures.
[0105] Fig. 21 is a schematic example of replication transactions being recovered after a node failure. All replication transactions are logged to mirror memory, e.g., in other origination nodes in the source array, which are termed mirror nodes herein. In addition to the transactions, the log includes the identifying details such as the sequence number, replication group id and target node id. For example, transactions (A, B, and C) in an origination node 1 2102 may be logged in origination node 0 2104 (A), origination node 2 2106 (B), and origination node 3 2108 (C).
[0106] If origination node 1 2102 fails, the transactions may be recovered and sent by the mirror nodes 2104, 2106, and 21 08. The transactions may also be replayed and relogged by the mirror nodes 2104, 21 06, and 2108. However, the subset for origination node 1 2102 will have become fragmented across the source array 21 10.
[0107] Accordingly, each mirror node 2104, 2106, and 2108 may replay the transactions it has recovered, and create a partial subset to log the details for the transaction counts. The set manager for the source array may request set totals for any inflight sets. Each mirror node will respond with subset totals for the failed node.
[0108] The set manager will reconstruct the total transaction count for the failed node, e.g., origination node 1 2102, from the partial counts from each mirror node 2104, 2106, and 2108 and return a set total to each mirror node 2104, 2106, and 21 08. Once the mirror nodes 21 04, 2106, and 2108 have the set totals, they can rebuild a partial subset manifest 21 12 for the transaction they have recovered. The partial manifests may each be sent to the target node by operational links between the mirror nodes and other target nodes, for example, as discussed with respect to Fig. 20.
[0109] At the target node 21 14, the partial set manifests are accumulated to create a set manifest for the failed node. This can be used to confirm that the set is complete. As for a link failure, a node failure may lead to replication failure due to the extra loading. Accordingly, as for the link failure, policies may be defined to prioritize the transactions for replication.
[0110] Fig. 22 is an example non-transitory machine readable medium 2200 that contains code for managing sets of transactions for replication. The machine readable medium 2200 is linked to one or more processors 2202, for example, by a high speed interconnect 2204. The machine readable medium 2200 contains code 2206 to direct the processors 2202 to issue a cluster wide correlator. This may be based, for example, on a time interval. Code 2208 may be included to direct the processors 2202 to receive a transaction in a source array that is to be replicated to a destination array. Code 2210 may be included to assign the cluster wide correlator to the transaction. Further, code 221 2 may be included to associate a number of transactions into sets. For example, this may be based on the cluster wide correlator assigned to each of the transactions.
[0111] Fig. 23 is an example non-transitory machine readable medium 2300 that contains code to managing manifests for replication. The machine readable medium 2300 is linked to one or more processors 2302, for example, by a high speed interconnect 2304. The machine readable medium 2300 may include code 2306 to direct the processors 2302 to receive a transaction in a source array that is to be replicated to a destination array. Code 2308 may be included to request a replication ticket for the transaction from a remote copy ticket dispenser. The replication ticket may include a sequence number and replication group for the transaction. Further, code 2310 may be included to associate the transactions into sets. This may be based, for example, on the ticket number.
[0112] Fig. 24 is an example non-transitory machine readable medium 2400 that contains code to recover from an origination node failure during an
asynchronous replication. The machine readable medium 2400 is linked to one or more processors 2402, for example, by a high speed interconnect 2404. The machine readable medium 2400 includes code 2406 to direct the processors to log at least a portion of the replication transactions to the origination node in each of a number of mirror nodes. Code 2408 is included to determine a failure of the origination node. The machine readable medium 2400 also includes code 241 0 to send the logged replication transactions from each of the plurality of mirror nodes to a corresponding node in the destination array for transfer to the target node.
[0113] Fig. 25 is an example non-transitory machine readable medium 2500 that contains code to handle collisions during an asynchronous replication. The machine readable medium 2500 is linked to one or more processors 2502, for example, by a high speed interconnect 2504. The machine readable medium 2500 includes code 2506 to direct the processors 2502 to detect an attempted overwrite of a cache memory page that is being replicated from a source node to a destination node. Code 2508 is also included to prevent the cache memory page from being overwritten before the replication is completed.
[0114] While the present techniques may be susceptible to various modifications and alternative forms, the exemplary examples discussed above have been shown only by way of example. It is to be understood that the technique is not intended to be limited to the particular examples disclosed herein. Indeed, the present techniques include all alternatives, modifications, and equivalents falling within the scope of the present techniques.

Claims

CLAIMS WHAT IS CLAIMED IS:
1 . A method for recovering from an origination node failure during an asynchronous replication, the method comprising:
logging a portion of replication transactions sent to an origination node in each of a plurality of mirror nodes;
determining if the origination node has failed;
replaying mirrored replication transactions logged by each of the plurality of mirror nodes, wherein each of the plurality of mirror nodes recreates a corresponding partial subset of the replication transactions; requesting a total for the replication transactions sent from each of the
plurality of mirror nodes;
summing the totals from each of the plurality of mirror nodes to create a
transaction total; and
providing the transaction total to each of the plurality of mirror nodes.
2. The method of claim 1 , wherein the logging comprises recording a sequence number, a replication group identification and a target node identification for each of the replication transactions.
3. The method of claim 1 , comprising sending the mirrored replication transactions for the failed origination node to a target node in a destination array from each of the plurality of mirror nodes in a source array.
4. The method of claim 1 , comprising:
creating a partial subset manifest in each of the plurality of mirror nodes; and sending the partial subset manifest from each of the plurality of mirror nodes to a target node in a destination array.
5. The method of claim 3, wherein the mirrored replication transactions are sent from each of the plurality of mirror nodes to a corresponding node in the destination array for transfer to the target node.
6. The method of claim 4, wherein the partial subset manifest is sent from each of the plurality of mirror nodes to a corresponding node in the destination array for transfer to the target node.
7. The method of claim 6, comprising assembling the partial subset manifests from each of the plurality of mirror nodes to form a complete subset manifest on the target node.
8. The method of claim 1 , comprising stopping replication groups to maintain replication link capacity based, at least in part, on a defined policy.
9. A system for recovering from an origination node failure during an asynchronous replication, comprising:
an origination node in a source array from which transactions are being
replicated;
a plurality of mirror nodes each logging a portion of the transactions from the origination node;
a link between each of the plurality of mirror nodes and a node in a
destination array;
a detector to identify a link failure and determine a reason for the link failure; and
a failure handler to determine actions needed to communicate transactions to a target node.
10. The system of claim 9, comprising a transaction communicator to send transactions to another origination node to be forwarded to a receiving node in the destination array for forwarding to the target node.
1 1 . The system of claim 9, comprising:
a replayer in each of the plurality of mirror nodes to replay logged
transactions; and
a transaction communicator to send the logged transactions to the target node.
12. A non-transitory, machine readable medium comprising code to recover from an origination node failure during an asynchronous replication by directing a processor to:
log at least a portion of replication transactions to the origination node in each of a plurality of mirror nodes;
determine a failure of the origination node; and
send the logged replication transactions from each of the plurality of mirror nodes to a corresponding node in a destination array for transfer to a target node.
13. The non-transitory, machine readable medium of claim 12, comprising code to direct the processor to:
replay mirrored replication transactions logged by each of the plurality of mirror nodes, wherein each of the plurality of mirror nodes recreates a corresponding partial group of the replication transactions; request a total for mirrored replication transactions from each of the plurality of mirror nodes;
sum the total from each of the plurality of mirror nodes and the total of
transactions for partially sent subsets to create a transaction total; and provide the transaction total to each of the plurality of mirror nodes to create a partial subset manifest for transactions logged by that mirror node.
14. The non-transitory, machine readable medium of claim 12, comprising code to direct the processor to send the replication transactions from each of the plurality of mirror nodes to a corresponding node in the destination array for transfer to a target node.
15. The non-transitory, machine readable medium of claim 12, comprising code to direct the processor to send a partial subset manifest from each of the plurality of mirror nodes to a corresponding node in the destination array for transfer to the target node.
PCT/US2015/047388 2015-08-28 2015-08-28 Recovering from an origination node failure during an asynchronous replication WO2017039579A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/US2015/047388 WO2017039579A1 (en) 2015-08-28 2015-08-28 Recovering from an origination node failure during an asynchronous replication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US2015/047388 WO2017039579A1 (en) 2015-08-28 2015-08-28 Recovering from an origination node failure during an asynchronous replication

Publications (1)

Publication Number Publication Date
WO2017039579A1 true WO2017039579A1 (en) 2017-03-09

Family

ID=58188190

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2015/047388 WO2017039579A1 (en) 2015-08-28 2015-08-28 Recovering from an origination node failure during an asynchronous replication

Country Status (1)

Country Link
WO (1) WO2017039579A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111124755A (en) * 2019-12-06 2020-05-08 中国联合网络通信集团有限公司 Cluster node fault recovery method and device, electronic equipment and storage medium
CN114327507A (en) * 2021-12-20 2022-04-12 江苏云工场信息技术有限公司 Automatic arranging method and device for CDN (content delivery network) nodes
WO2023115590A1 (en) * 2021-12-20 2023-06-29 江苏云工场信息技术有限公司 Cdn node full-link monitoring method and apparatus

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040158588A1 (en) * 2003-02-07 2004-08-12 International Business Machines Corporation Apparatus and method for coordinating logical data replication with highly available data replication
US20050256972A1 (en) * 2004-05-11 2005-11-17 Hewlett-Packard Development Company, L.P. Mirroring storage interface
US20060155770A1 (en) * 2004-11-11 2006-07-13 Ipdev Co. System and method for time-based allocation of unique transaction identifiers in a multi-server system
US20090157766A1 (en) * 2007-12-18 2009-06-18 Jinmei Shen Method, System, and Computer Program Product for Ensuring Data Consistency of Asynchronously Replicated Data Following a Master Transaction Server Failover Event
US20110010498A1 (en) * 2009-07-10 2011-01-13 Matthew Russell Lay Providing preferred seed data for seeding a data deduplicating storage system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040158588A1 (en) * 2003-02-07 2004-08-12 International Business Machines Corporation Apparatus and method for coordinating logical data replication with highly available data replication
US20050256972A1 (en) * 2004-05-11 2005-11-17 Hewlett-Packard Development Company, L.P. Mirroring storage interface
US20060155770A1 (en) * 2004-11-11 2006-07-13 Ipdev Co. System and method for time-based allocation of unique transaction identifiers in a multi-server system
US20090157766A1 (en) * 2007-12-18 2009-06-18 Jinmei Shen Method, System, and Computer Program Product for Ensuring Data Consistency of Asynchronously Replicated Data Following a Master Transaction Server Failover Event
US20110010498A1 (en) * 2009-07-10 2011-01-13 Matthew Russell Lay Providing preferred seed data for seeding a data deduplicating storage system

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111124755A (en) * 2019-12-06 2020-05-08 中国联合网络通信集团有限公司 Cluster node fault recovery method and device, electronic equipment and storage medium
CN111124755B (en) * 2019-12-06 2023-08-15 中国联合网络通信集团有限公司 Fault recovery method and device for cluster nodes, electronic equipment and storage medium
CN114327507A (en) * 2021-12-20 2022-04-12 江苏云工场信息技术有限公司 Automatic arranging method and device for CDN (content delivery network) nodes
CN114327507B (en) * 2021-12-20 2022-07-15 江苏云工场信息技术有限公司 Automatic arranging method and device for CDN nodes
WO2023115590A1 (en) * 2021-12-20 2023-06-29 江苏云工场信息技术有限公司 Cdn node full-link monitoring method and apparatus

Similar Documents

Publication Publication Date Title
US10929431B2 (en) Collision handling during an asynchronous replication
US8103937B1 (en) Cas command network replication
US9916201B2 (en) Write performance in fault-tolerant clustered storage systems
CN101635638B (en) Disaster tolerance system and disaster tolerance method thereof
CN100461122C (en) System and method for application fault tolerance and recovery
US6345368B1 (en) Fault-tolerant access to storage arrays using active and quiescent storage controllers
US7315958B1 (en) Method and system for restoring data redundancy in a storage system without a hot standby disk
US7240238B2 (en) Remote data mirroring
US7694177B2 (en) Method and system for resynchronizing data between a primary and mirror data storage system
US6260125B1 (en) Asynchronous write queues, reconstruction and check-pointing in disk-mirroring applications
US10073902B2 (en) Snapshot and replication of a multi-stream application on multiple hosts at near-sync frequency
US8689047B2 (en) Virtual disk replication using log files
US5889935A (en) Disaster control features for remote data mirroring
CN101755257B (en) Managing the copying of writes from primary storages to secondary storages across different networks
JP5159797B2 (en) Preserve cache data after failover
US20030158999A1 (en) Method and apparatus for maintaining cache coherency in a storage system
CN101038565A (en) System and method for data copying between management storage systems
US20060212668A1 (en) Remote copy method and storage system
US6332197B1 (en) System for updating data in a multi-adaptor environment
JP2007511008A (en) Hybrid real-time data replication
JP2006227964A (en) Storage system, processing method and program
JPS59133663A (en) Message transmission between task execution means for systemof allowing fault in decentralized multiprocessor/computer
US20180004761A1 (en) Managing manifests for replication
WO2017039579A1 (en) Recovering from an origination node failure during an asynchronous replication
US20180004617A1 (en) Managing sets of transactions for replication

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15903170

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15903170

Country of ref document: EP

Kind code of ref document: A1