Настройки

Укажите год
-

Небесная энциклопедия

Космические корабли и станции, автоматические КА и методы их проектирования, бортовые комплексы управления, системы и средства жизнеобеспечения, особенности технологии производства ракетно-космических систем

Подробнее
-

Мониторинг СМИ

Мониторинг СМИ и социальных сетей. Сканирование интернета, новостных сайтов, специализированных контентных площадок на базе мессенджеров. Гибкие настройки фильтров и первоначальных источников.

Подробнее

Форма поиска

Поддерживает ввод нескольких поисковых фраз (по одной на строку). При поиске обеспечивает поддержку морфологии русского и английского языка
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Укажите год
Укажите год

Применить Всего найдено 3077. Отображено 100.
05-04-2012 дата публикации

Automatic replication of virtual machines

Номер: US20120084414A1
Принадлежит: Unisys Corp

Systems and methods are disclosed herein to automatically replicate virtual machine image (VM) files on secondary VM computing devices, from a primary VM computing device. The secondary VM computing devices are automatically selected by constantly reviewing the operating parameter values (e.g., cost of resources, power consumption, etc.) of a number of secondary VM computing devices available of storing VM image replicas. The replica of the primary VM image is stored in the secondary VM computing devices in geographically disparate cloud locations. The primary VM image is automatically broken into constituent data blocks stored in an active index, which is compared against a stale index of data blocks. When an update is detected in the primary VM image, the comparison of indices will indicate that there is new data. Only the new data is used to update the secondary VM images, thereby reducing network traffic and latency issues.

Подробнее
31-05-2012 дата публикации

Method for protecting data in damaged memory cells by dynamically switching memory mode

Номер: US20120137168A1
Автор: Ying-chih Lu
Принадлежит: Inventec Corp

A method for protecting data in damaged memory cells by dynamically switching memory mode is provided. The method is adapted to an electronic device having a memory, which has a memory controller and at least one memory module, each of which is consisted of a plurality of memory cells, and the memory cells are divided into a plurality of pages. A power-on self test is executed and a mirror memory mode is activated to protect the data in the memory modules. An uncorrectable error of each page of the memory modules is detected by the memory controller when an operating system reads the memory. If the uncorrectable error in one page is detected, the memory module having the page is determined as a damaged memory module, and the mirror memory mode is switched to a spare memory mode, so as to protect the data in the memory modules.

Подробнее
07-06-2012 дата публикации

Validation of access to a shared data record subject to read and write access by multiple requesters

Номер: US20120143836A1
Принадлежит: International Business Machines Corp

According to a method of access to a shared data record subject to contemporaneous read and write access by multiple requesters, a requester reads a shared data record including a payload and a first checksum. The requester calculates a second checksum of the payload of the data record. If the first and second checksums are not equal, the requester again reads the shared data record, including a third checksum, and calculates a fourth checksum of the payload of the shared data record. If the third and fourth checksums are equal, the requester processes the shared data record as valid, and if the second and fourth checksums are equal, the requester handles the shared data record as corrupt.

Подробнее
07-06-2012 дата публикации

Obviation of Recovery of Data Store Consistency for Application I/O Errors

Номер: US20120144233A1
Принадлежит: International Business Machines Corp

Embodiments comprise a plurality of computing devices that dynamically intercept process application I/O errors. Various embodiments comprise two or more computing devices, such as two or more servers, each having access to a shared data storage system. An application may be executing on the first computing device and performing an I/O operation when an I/O error occurs. The first computing device may intercept the I/O error, rather than passing it back to the application, and prevent the error from affecting the application. The first computing device may complete the I/O operation, and any other pending I/O operations not written to disk, via an alternate path, perform a checkpoint operation to capture the state of the set of processes associated with the application, and transfer the checkpoint image to the second computing device. The second computing device may resume operation of the application from the checkpoint image.

Подробнее
14-06-2012 дата публикации

System reset

Номер: US20120151258A1
Принадлежит: Microsoft Corp

Some embodiments of the invention provide techniques whereby a user may perform a system reset (e.g., to address system performance and/or reliability degradation, such as which may be caused by unused applications that unnecessarily consume system resources, an attempted un-install of an application that left remnants of the application behind, and/or other causes). In some embodiments, performing a system reset replaces a first instance of an operating system on the system with a new instance of the operating system, and removes any applications installed on the system, without disturbing the user's data.

Подробнее
16-08-2012 дата публикации

Incremental virtual machine backup supporting migration

Номер: US20120209812A1
Принадлежит: Microsoft Corp

A record of changes to virtual machine data of a virtual machine and a record of changes to snapshots of the virtual machine that have been received since the virtual machine was last backed up are maintained. In response to it being time to perform an incremental backup of the virtual machine, a portion of the virtual machine data is backed up based on the record of changes to the virtual machine data, and a portion of the snapshots is backed up based on the record of changes to the snapshots. In response to it being time to migrate the virtual machine to a second host device, the virtual machine data, the record of changes to the virtual machine data, the record of changes to the snapshots, and one or more of the snapshots are migrated to the second host device.

Подробнее
30-08-2012 дата публикации

Registration in a de-coupled environment

Номер: US20120222049A1
Принадлежит: International Business Machines Corp

A method, system and computer program product for registration in a de-coupled environment or system may include providing an identity of a spawned component to a manager. The method, system and computer program product may also include taking a predetermined action in response to the spawned component failing to report its status to the manager after a preset time period.

Подробнее
20-09-2012 дата публикации

Ranking service units to provide and protect highly available services using n+m redundancy models

Номер: US20120240129A1
Автор: Ali Kanso, Maria Toeroe
Принадлежит: Telefonaktiebolaget LM Ericsson AB

Among other things, embodiments described herein enable systems, e.g., Availability Management Forum (AMF) systems, having service units to operate with balanced loads both before and after the failure of one of the service units. A method for balancing standby workload assignments and active workload assignments for a group of service units in a system which employs an N+M redundancy model, wherein N service units are active service units and M service units are standby service units is described. An active workload that the N active service units need to handle is calculated and each of the N active service units in the group is provided with an active workload assignment based on the calculated active workload. Standby workload assignments are distributed among the M standby service units substantially equally.

Подробнее
13-12-2012 дата публикации

method for operating an arithmetic unit

Номер: US20120317576A1
Принадлежит: ROBERT BOSCH GMBH

A method for operating an arithmetic unit having at least two computation cores. One signature register which has multiple inputs is assigned in each case to at least two of the at least two computation cores. At least one task is executed by the at least two of the at least two computation cores, an algorithm is computed in each task, results computed by each computation core are written into the assigned signature register, and the results written into the signature registers are compared.

Подробнее
21-03-2013 дата публикации

Mirroring Virtual Machines from a Primary Host to a Secondary Host

Номер: US20130073778A1
Принадлежит: International Business Machines Corp

A system and computer program product for mirroring virtual machines from a primary host to a secondary host. The system includes a processor tracking changes for each of a plurality of memory pages and processor states for one or more primary host virtual machines. Responsive to an occurrence of a checkpoint, the primary host virtual machines are stopped. A determination is made if each of the memory pages is frequently changed. In response to the memory page being frequently changed, the frequently changed memory page is marked as being writeable and copied to a buffer. In response to the memory page being infrequently changed, the infrequently changed memory page is marked as being read only. The one or more primary host virtual machines are resumed. A copy of the memory pages, the buffer and changes to the processor states are transmitted to the secondary host.

Подробнее
28-03-2013 дата публикации

Distributed job scheduling in a multi-nodal environment

Номер: US20130080824A1
Принадлежит: International Business Machines Corp

Techniques are described for decentralizing a job scheduler in a distributed system environment. Embodiments of the invention may generally include receiving a job to be performed by a multi-nodal system which includes a cluster of nodes. Instead of a centralized job scheduler assigning the job to a node or nodes, each node has a job scheduler which scans a shared-file system to determine what job to execute on the node. In a job requiring multiple nodes, one of the nodes that joined the multi-nodal job becomes the primary node which then assigns and monitors the job's execution on the multiple nodes.

Подробнее
20-06-2013 дата публикации

Selecting a Primary-Secondary Host Pair for Mirroring Virtual Machines

Номер: US20130159649A1
Принадлежит: International Business Machines Corp

A method for mirroring virtual machines from a primary host to a secondary host. The method includes tracking changes for each of a plurality of memory pages and processor states for one or more primary host virtual machines. Responsive to an occurrence of a checkpoint, the primary host virtual machines are stopped. A determination is made if each of the memory pages is frequently changed. In response to the memory page being frequently changed, the frequently changed memory page is marked as being writeable and copied to a buffer. In response to the memory page being infrequently changed, the infrequently changed memory page is marked as being read only. The one or more primary host virtual machines are resumed. A copy of the memory pages, the buffer and changes to the processor states are transmitted to the secondary host.

Подробнее
04-07-2013 дата публикации

Fault tolerant distributed lock manager

Номер: US20130174165A1
Автор: Rajat Chopra
Принадлежит: Red Hat Inc

A lock manager running on a machine may write a first entry for a first process to a queue associated with a resource. If the first entry is not at a front of the queue, the lock manager identifies a second entry that is at the front of the queue, and determines whether a second process associated with the second entry is operational. If the second process is not operational, the lock manager removes the second entry from the queue. Additionally, if the queue becomes unavailable, the lock manager may initiate failover to a backup copy of the queue.

Подробнее
25-07-2013 дата публикации

Transparent high availability for stateful services

Номер: US20130191831A1
Принадлежит: Brocade Communications Systems LLC

One embodiment of the present invention provides a system. The system includes a high availability module and a data transformation module. During operation, the high availability module identifies a modified object belonging to an application in a second system. A modification to the modified object is associated with a transaction identifier. The high availability module also identifies a local object corresponding to the modified object associated with a standby application corresponding to the application in the second system. The data transformation module automatically transforms the value of the modified object to a value assignable to the local object, including pointer conversion to point to equivalent object of the second system. The high availability module updates the current value of the local object with the transformed value.

Подробнее
01-08-2013 дата публикации

Data transfer and recovery

Номер: US20130198557A1
Автор: Andrew Bensinger
Принадлежит: DSSDR LLC

A backup image generator can create a primary image and periodic delta images of all or part of a primary server. The images can be sent to a network attached storage device and one or more remote storage servers. In the event of a failure of the primary server, an updated primary image may be used to provide an up-to-date version of the primary system at a backup or other system. As a result, the primary data storage may be timely backed-up, recovered and restored with the possibility of providing server and business continuity in the event of a failure.

Подробнее
10-10-2013 дата публикации

Microprocessor System Having Fault-Tolerant Architecture

Номер: US20130268798A1
Принадлежит: Continental Teves AG and Co oHG

The invention relates to a microprocessor system for executing software modules, at least some of which are security critical, within the scope of controlling functions or tasks assigned to the software modules, comprising an intrinsically safe microprocessor module having at least two microprocessor cores. At least one further intrinsically safe microprocessor module having at least two microprocessor cores is provided. At least two microprocessor modules are connected via a bus system, at least two software modules are provided which execute functions, at least some of which overlap, the software modules having at least partially overlapping functions are distributed on a microprocessor module or n at least two microprocessor modules, and means for comparing or arbitrating events generated with the software modules for the identical functions are provided in order to detect software or hardware faults.

Подробнее
17-10-2013 дата публикации

Providing application based monitoring and recovery for a hypervisor of an ha cluster

Номер: US20130275966A1
Принадлежит: International Business Machines Corp

An embodiment of the invention is directed to a method associated with a node comprising a hypervisor and guest VMs, each guest VM being managed by the hypervisor and disposed to run applications, the node being joined with other nodes to form an HA cluster. The method includes establishing an internal bidirectional communication channel between each guest VM and the hypervisor, and further includes sending commands and responses thereto through the channel, wherein respective commands manage a specified application running on the given guest VM. The messages are selectively monitored, to detect a failure condition associated with the specified application running on the given guest VM. Responsive to detecting a failure condition, action is taken to correct the failure condition, wherein the action includes sending at least one command through the internal channel from the hypervisor to the given guest VM.

Подробнее
12-12-2013 дата публикации

Computer system

Номер: US20130332925A1
Принадлежит: Renesas Electronics Corp

There is a need to provide a computer system capable of preventing a failure from propagating and recovering from the failure. VCPU# 0 through VCPU# 2 each operate different OS's. VCPU# 0 operates a management OS that manages the other OS's. When notified of bus error occurrence, a virtual CPU execution portion 201 operates only VCPU# 0 regardless of an execution sequence stored in schedule register A. VCPU# 0 reinitializes a bus where an error occurred.

Подробнее
19-12-2013 дата публикации

Processor management method

Номер: US20130339632A1
Принадлежит: Fujitsu Ltd

A processor management method includes setting a master mechanism in a given processor among multiple processors, where the master mechanism manages the processors; setting a local master mechanism and a virtual master mechanism in each of processors other than the given processor among the processors, where the local master mechanism and the virtual master mechanism manage each of the processors; and notifying by the master mechanism, the processors of an offset value of an address to allow a shared memory managed by the master mechanism to be accessed as a continuous memory by the processors.

Подробнее
19-12-2013 дата публикации

Node

Номер: US20130339981A1

To facilitate changing a system configuration and allow having high redundancy in a computer system connecting a plurality of nodes. A node includes a CPU and constitutes a computer system. The node executes one or more processes and including predetermined functions. The node includes a shared memory that stores system information including process information related to each process executed by each node, in a state accessible from each process of its own node. In the node, the system information including the process information related to each process of its own node is multicast to the other nodes. A shared memory control process of the node receives the system information multicast from the other nodes and stores the system information in the shared memory.

Подробнее
16-01-2014 дата публикации

Job management server and job management method

Номер: US20140019613A1
Автор: Yohey Ishikawa
Принадлежит: HITACHI LTD

A job management server for managing a plurality of jobs to be executed by a virtual computer generated on a computer, a job management part to manage information on a job net which configures a plurality of jobs and allocate a plurality of jobs included in a job net to the virtual computer, and a recovery part to monitor an execution status of each of the plurality of jobs included in the job net and perform recovery processing, wherein the job management server is configured to: specify a target job for changing allocation, in a case where a failure has occurred in a first virtual computer to execute a first job included in the first job net; determine a performance of a virtual computer required to execute the target job.

Подробнее
13-02-2014 дата публикации

Virtual machine managing apparatus, virtual machine managing method, and program thereof

Номер: US20140047444A1
Автор: Keisuke Yamaguchi
Принадлежит: NEC Corp

In a virtual machine system, an arrangement of virtual machines, which has fault tolerance, is performed. A virtual machine managing apparatus includes a similar group generating unit and an arrangement restriction generating unit. The similar group generating unit generates a group of virtual machines having a similarity relationship which indicates that performance values of virtual machines at each timing are approximately the same, out of plural virtual machines. The arrangement restriction generating unit outputs the group of virtual machines having the similarity relationship as a distributed-arrangement restriction indicating a group of virtual machines to be arranged on different processing apparatuses among plural processing apparatuses carrying out processes of the virtual machines.

Подробнее
20-02-2014 дата публикации

Virtual machine fault tolerance

Номер: US20140053022A1
Принадлежит: NetApp Inc

One or more techniques and/or systems are provided for hosting a virtual machine from a snapshot. In particular, a snapshot of a virtual machine hosted on a primary computing device may be created. The virtual machine may be hosted on a secondary computing device using the snapshot, for example, when a failure of the virtual machine on the primary computing device occurs. If a virtual machine type (format) of the snapshot is not supported by the secondary computing device, then the virtual machine within the snapshot may be converted to a virtual machine type supported by the secondary computing device. In this way, the virtual machine may be operable and/or accessible on the secondary computing device despite the failure. Hosting the virtual machine on the secondary computing device provides, among other things, fault tolerance for the virtual machine and/or applications comprised therein.

Подробнее
06-03-2014 дата публикации

Management system for managing computer system comprising multiple monitoring-target devices

Номер: US20140068343A1
Принадлежит: HITACHI LTD

A management system manages a computer system including multiple monitoring-target devices. A storage device of the management system stores a general rule, general plan information, unresolved information, and configuration information. A control device of the management system creates multiple expanded rules based on the general rule and the configuration information, and if an event related to any of the multiple monitoring-target devices has occurred, identifies, based on the multiple expanded rules, a first conclusion event constituting a candidate for the cause of the occurred event, creates, based on the general plan information, one or more expanded plans, which are recovery plans that can be implemented if the first conclusion event is a cause, identifies an unresolved event based on the unresolved information, identifies a risk site based on the identified unresolved event, and displays data showing the first conclusion event, expanded plan, and risk site.

Подробнее
20-03-2014 дата публикации

Maintaining consistency of storage in a mirrored virtual environment

Номер: US20140082311A1

A method achieves data consistency in a shared storage accessible by a first and second machine. The method includes, in response to receiving state information of the first machine, configuring the second machine to a mirrored operating state corresponding to an operating state of the first machine, receiving a notification that the first machine will overwrite existing data stored in the shared storage, and, in response to the notification, reading the existing data, storing a copy of existing data in a local storage of the second machine, and sending an acknowledgment to the first machine that the copy has been stored in the local storage, to enable the first machine to overwrite the existing data with newly written data. The method also includes, in response to receiving a failure notification, retrieving the copy of the existing data, overwriting the newly written data with the copy of the existing data.

Подробнее
20-03-2014 дата публикации

Fault tolerant system and method for performing fault tolerant

Номер: US20140082408A1
Принадлежит: Yokogawa Electric Corp

A primary virtual machine is formed on a primary machine in which a primary hypervisor runs, and inputs virtual interrupt based on an external interrupt from the primary hypervisor to a primary guest OS. A secondary virtual machine is formed on a secondary machine in which a secondary hypervisor runs, and inputs the virtual interrupt to a secondary guest OS on the basis of timing information on the virtual interrupt transmitted from the primary virtual machine. When inputting the virtual interrupt to the primary guest OS, the primary virtual machine suspends the primary guest OS, and determines whether the suspended position is in a critical section. If the suspended position is not in the critical section, the primary virtual machine inputs the virtual interrupt at the suspended position. If the suspended position is in the critical section, the primary virtual machine changes the suspended position, and again performs the determination.

Подробнее
10-04-2014 дата публикации

Method, Apparatus, and System for Handling Virtual Machine Internal Fault

Номер: US20140101489A1
Автор: Yang Xiaowei
Принадлежит: Huawei Technologies Co., Ltd.

A method, an apparatus, and a system for handling a virtual machine internal fault. The method includes: monitoring, by a virtual machine internal fault detecting apparatus, a state of a virtual machine operating system; when detecting that the virtual machine operating system encounters an exception, obtaining, by an exception catching module in the virtual machine internal fault detecting apparatus, exception information corresponding to the exception according to a context of the virtual machine operating system; and reporting, by the exception catching module, the exception information to a virtual machine monitoring apparatus, so that the virtual machine monitoring apparatus determines, according to the exception information, a policy for resolving the exception corresponding to the exception information, and resolves the exception corresponding to the exception information by using the policy. The present invention is applicable to a virtualized environment having a virtual machine. 1. A method for handling a virtual machine internal fault , comprising:monitoring, by a virtual machine internal fault detecting apparatus, a state of a virtual machine operating system;obtaining, by an exception catching module in the virtual machine internal fault detecting apparatus, exception information corresponding to the exception according to a context of the virtual machine operating system when detecting that the virtual machine operating system encounters an exception, wherein the exception catching module is loaded to the virtual machine operating system when the virtual machine operating system is started; andreporting, by the exception catching module, the exception information to a virtual machine monitoring apparatus so that the virtual machine monitoring apparatus determines, according to the exception information, a policy for resolving the exception corresponding to the exception information, and resolves the exception corresponding to the exception information ...

Подробнее
07-01-2016 дата публикации

Method and device for synchronously running an application in a high availability environment

Номер: US20160004608A1
Автор: Georges Lecourtier
Принадлежит: Bull SA

A method for synchronously running an application in a high availability environment including a plurality of calculating modules interconnected by a very high-speed broad band network, includes: configuring the modules into partitions including a primary and a secondary partition and a monitoring partition; running the application on each running partition, inputs-outputs processed by the primary partition transmitted to the secondary running partition via the monitoring partition; synchronizing the runnings via exploiting microprocessor context changes; transmitting a catastrophic error signal to the monitoring partition; continuing the running by switching to a degraded mode, the running continuing on a single partition.

Подробнее
07-01-2021 дата публикации

RECOVERY OF A SOFTWARE-DEFINED DATA CENTER

Номер: US20210004293A1
Принадлежит:

Examples described herein include systems and methods for backing up and recovering a software-defined data center (“SDDC”). In one example, entities of the SDDC, such as virtual machines, hosts, and clusters, can coexist with corresponding entity stores. The entity stores can store current state information for each SDDC entity. For example, an identifier or name of a virtual machine can be stored in that virtual machine's corresponding entity store. When recovery of a controller is needed, the controller can rebuild state information that has changed after the controller was backed up, by retrieving state information from entity stores of the various SDDC entities. 1. A method for restoring up a Software-Defined Data Center (“SDDC”) , comprising:changing, by a controller of the SDDC, a state of a virtual machine, wherein the virtual machine updates an entity store that persists with the virtual machine to reflect the state;upon a failure of the controller, restoring the controller from a backup record, wherein the backup record was created prior to changing the state of the virtual machine;requesting, by the controller, state information from the virtual machine, wherein the state from the entity store is returned to the controller; andupdating the controller to reflect the retrieved state of the virtual machine.2. The method of claim 1 , wherein the state is one of an identifier of the virtual machine and a name of the virtual machine.3. The method of claim 1 , wherein changing the state includes:updating the entity store of the virtual machine;receiving the state at the controller from the virtual machine; andupdating a controller database to include the state.4. The method of claim 1 , further comprising:requesting a list of virtual machines from a host, wherein the virtual machine is not reflected in the backup record; andupdating a controller database to include the virtual machine and the state of the virtual machine.5. The method of claim 4 , wherein the ...

Подробнее
07-01-2021 дата публикации

RECOVERY OF A SOFTWARE-DEFINED DATA CENTER

Номер: US20210004300A1
Принадлежит:

Examples described herein include systems and methods for backing up and recovering a software-defined data center (“SDDC”). In one example, entities of the SDDC, such as virtual machines, hosts, and clusters, can coexist with corresponding entity stores. The entity stores can store current state information for each SDDC entity. For example, an identifier or name of a virtual machine can be stored in that virtual machine's corresponding entity store. When recovery of a controller is needed, the controller can rebuild state information that has changed after the controller was backed up, by retrieving state information from entity stores of the various SDDC entities. 1. A method for restoring a Software-Defined Data Center (“SDDC”) , comprising:receiving a selection, on a graphical user interface (“GUI”), to recover the SDDC from one of (1) entity stores and (2) a controller database, wherein the entity stores correspond to virtual objects in the SDDC;retrieving states from the entity stores that correspond to the virtual objects;determining, for a first virtual object, that a difference exists between a first state from a corresponding first entity store and state information in the controller database; andreconciling the difference between the controller database and the first entity store in a direction indicated by the selection.2. The method of claim 1 , wherein the selection is to recover from the entity stores claim 1 , and wherein the reconciling includes updating the controller database to include the first state of the first entity store.3. The method of claim 1 , wherein the selection is to recover from the controller database claim 1 , and wherein the reconciling includes updating the first entity store to include the state information from the controller database.4. The method of claim 1 , further comprising:determining if all virtual objects of the SDDC have been reconciled by comparing the states of the entity stores to the state information of the ...

Подробнее
02-01-2020 дата публикации

FAULT TOLERANCE METHOD AND SYSTEM FOR VIRTUAL MACHINE GROUP

Номер: US20200004642A1

A fault tolerance method and system for a virtual machine group is proposed. The method includes: establishing fault tolerance backup connections of virtual machines between a virtual machine hypervisor of at least one primary host and a virtual machine hypervisor of at least one backup host to perform fault tolerance backups of the virtual machines, wherein the plurality of virtual machines are included in a fault tolerance group; when a synchronizer determines that a failover of at least one first virtual machine among the primary virtual machines in the fault tolerance group is being performed. Informing, by the synchronizer, to perform a failover of other remaining primary virtual machines among the primary virtual machines in the fault tolerance group, or to return other remaining primary virtual machines among the primary virtual machines in the fault tolerance group back to a last fault tolerance backup state of each and continue performing fault tolerance backups of the other remaining primary virtual machines. 1. A fault tolerance method for a virtual machine group , applicable to a fault tolerance system , and comprising:establishing fault tolerance backup connections of a plurality of primary virtual machines between a virtual machine hypervisor of at least one primary host and a virtual machine hypervisor of at least one backup host to perform fault tolerance backups of the primary virtual machines, wherein the primary virtual machines are included in a fault tolerance group; andwhen a synchronizer determines that a failover of at least one first virtual machine among the primary virtual machines in the fault tolerance group is being performed,informing, by the synchronizer, to perform a failover of one or more other remaining primary virtual machines among the primary virtual machines in the fault tolerance group, orinforming, by the synchronizer, to return the one or more other remaining primary virtual machines among the primary virtual machines in ...

Подробнее
03-01-2019 дата публикации

SECURE IDENTIFICATION OF EXECUTION CONTEXTS

Номер: US20190004850A1
Принадлежит:

A virtual-machine-based system that identifies an application or process in a virtual machine in order to locate resources associated with the identified application. Access to the located resources is then controlled based on a context of the identified application. Those applications without the necessary context will have a different view of the resource. 1. In a computer system comprising a virtual machine monitor (VMM) running on system hardware and supporting a virtual machine (VM) having a first execution context running therein , a method of facilitating a guest operating system (OS) running in the VM to perform at least one function for the first execution context comprising:the VMM intercepting a first event from the first execution context to the guest OS;the VMM confirming an identity of the first execution context; the VMM saving a state of the first execution context in a memory space provided for the identified first execution context and passing a second event to the guest OS, the second event being a function of the first event and comprising control return location information;', 'the guest OS processing the second event and returning control as a function of the control return location information;', 'the VMM receiving a request to resume the first execution context;', 'the VMM determining if the request to resume the first execution context is valid; and', 'if the request to resume is valid, the VMM restoring the saved state of the first execution context; and, 'if the identity is confirmedthe first execution context resuming operation.2. The method of claim 1 , wherein the first event comprises at least one of:a virtual hardware interrupt;a virtual software interrupt;a virtual hardware fault; anda control transfer instruction.3. The method of claim 1 , wherein at least one of: the VMM confirming the identity of the first execution context and determining if the request to resume the first execution context is valid comprises:the VMM receiving ...

Подробнее
03-01-2019 дата публикации

VIRTUAL MACHINE BACKUP

Номер: US20190004902A1
Принадлежит:

A computer system comprises a processor unit arranged to run a hypervisor running one or more virtual machines; a cache connected to the processor unit and comprising a plurality of cache rows, each cache row comprising a memory address, a cache line and an image modification flag; and a memory connected to the cache and arranged to store an image of at least one virtual machine. The processor unit is arranged to define a log in the memory and the cache further comprises a cache controller arranged to set the image modification flag for a cache line modified by a virtual machine being backed up, but not for a cache line modified by the hypervisor operating in privilege mode; periodically check the image modification flags; and write only the memory address of the flagged cache rows in the defined log. 1. A computer system for virtual machine backup , the computer system comprising:a processor unit arranged to run a hypervisor running one or more virtual machines, to run multiple execution threads, and to define a log in memory;a cache connected to the processor unit and comprising a plurality of cache rows, each cache row comprising a memory address, a cache line, and an image modification flag; anda memory connected to the cache, wherein the hypervisor is arranged to maintain a thread mask flagging those threads that relate to one or more virtual machines being backed up; and 'set the image modification flag for a cache line modified by a virtual machine being backed up by reference to the thread mask; and', 'the cache further comprises a cache controller arranged towrite only the memory address of the flagged cache rows in the defined log.2. The computer system of claim 1 , wherein the cache controller is further arranged to write the memory address of a flagged cache line in the defined log upon the eviction of the flagged cache row from the cache.3. The computer system of claim 2 , wherein the cache controller is further arranged to write a thread ID of a ...

Подробнее
14-01-2016 дата публикации

USING RDMA FOR FAST SYSTEM RECOVERY IN VIRTUALIZED ENVIRONMENTS

Номер: US20160012009A1
Принадлежит:

A method, system and computer program product are disclosed for recovery in a virtualized environment using remote direct memory access (RDMA). In one embodiment, the method comprises operating a virtual computer system on a physical computer system, and the virtual system maintains in a memory area a record of a state of the virtual system. In this method, when defined error conditions occur on the virtual system, RDMA is used to pull the record of the state of the virtual system from that memory area onto a standby computer. This record on the standby computer is used to re-initialize the virtual computer. Embodiments of the invention provide methods that provide a very fast recovery from a virtual machine fault or error, while requiring much fewer resources than standard approaches. In embodiments of the invention, one spare real computer system can be used for backing up several virtual systems. 1. A method of system recovery in a virtualized environment using remote direct memory access , the method comprising:operating a virtual computer system on a physical computer system, including the virtual computer system maintaining a record of a state of the virtual computer system at each of a series of checkpoints; andwhen defined error conditions occur on the virtual computer system, initializing a system recovery procedure for pushing the record of the state of the virtual computer system at one of the checkpoints onto a standby computer system using remote direct memory access, includingthe virtual computer system placing a message in a send buffer in a memory space of the virtual computer system, generating a send reque3st, and posting the send request in a send queue to indicate that the message has been placed in the send buffer, andcalling a virtual system interface to send the message to the standby computer system.2. The method according to claim 1 , further comprising the virtual system interface detecting that the send request has been posted to the send ...

Подробнее
14-01-2021 дата публикации

HYPERVISOR-INDEPENDENT BLOCK-LEVEL LIVE BROWSE FOR ACCESS TO BACKED UP VIRTUAL MACHINE (VM) DATA AND HYPERVISOR-FREE FILE-LEVEL RECOVERY (BLOCK-LEVEL PSEUDO-MOUNT)

Номер: US20210011754A1
Принадлежит:

Hypervisor-independent block-level live browse is used for directly accessing backed up virtual machine (VM) data. Hypervisor-free file-level recovery (block-level pseudo-mount) from backed up VMs also is disclosed. Backed up virtual machine (“VM”) data can be browsed without needing or using a hypervisor. Individual backed up VM files can be requested and restored to anywhere without a hypervisor and without the need to restore the rest of the backed up virtual disk. Hypervisor-agnostic VM backups can be browsed and recovered without a hypervisor and from anywhere, and individual backed up VM files can be restored to anywhere, e.g., to a different VM platform, to a non-VM environment, without restoring an entire virtual disk, and without a recovery data agent at the destination. 1. A system comprising: wherein the first computing device is communicatively coupled to a storage device that comprises a secondary copy of virtual-machine data,', 'wherein the virtual machine data was backed up from a virtual disk of a virtual machine executing on an other computing device distinct from the first computing device, and', 'wherein the secondary copy comprises (i) a catalogue of a virtual machine file system for the virtual machine that governed the virtual disk at the other computing device, and (ii) data blocks backed up from the virtual disk; and, 'a first computing device comprising one or more hardware processors,'} execute at least a first file system, a pseudo-disk driver, and a media agent,', 'host a pseudo-disk created by the pseudo-disk driver,', 'mount to the first computing device, the pseudo-disk created by the pseudo-disk driver as a block data storage device,', 'receive a request at the media agent to browse the secondary copy,', 'by the pseudo-disk driver, retrieve the catalogue of the virtual machine file system from the secondary copy and into the pseudo-disk,', 'by the first file system without using a hypervisor to interpret the catalogue, enumerate the ...

Подробнее
14-01-2021 дата публикации

SYSTEM AND METHOD FOR RESTORATIONS OF VIRTUAL MACHINES IN VIRTUAL SYSTEMS

Номер: US20210011814A1
Принадлежит:

A method for restoring virtual machines in accordance with one or more embodiments of the invention includes obtaining, by a data protection manager, a restoration request, and in response to the restoration request: identifying a plurality of virtual machines (VMs) to restore based on the restoration request, determining a restoration process based on the plurality of virtual machines, and initiating a deployment of a production agent based on the restoration process, wherein the production agent initiates a restoration on at least a portion of the plurality of VMs. 1. A method for performing virtual machine restorations , the method comprising:obtaining, by a data protection manager, a restoration request; and identifying a plurality of virtual machines (VMs) to restore based on the restoration request;', 'determining a restoration process based on the plurality of virtual machines; and', 'initiating a deployment of a production agent based on the restoration process,', 'wherein the production agent initiates a restoration on at least a portion of the plurality of VMs., 'in response to the restoration request2. The method of claim 1 , wherein initiating the deployment of the first production agent comprises:initiating installation of the production agent on a production host;initiating a configuration of the production agent to disable an automatic power-on of at least the portion of the plurality of VMs; andinitiating a further configuration of the production agent to restore at least the portion of the plurality of the VMs based on the restoration process.3. The method of claim 2 , wherein the restoration process specifies an order of restoration.4. The method of claim 3 , wherein the order of restoration is determined using a restoration policy.5. The method of claim 3 , wherein the order of restoration is based on an interdependency between at least a first virtual machine of the plurality of virtual machines and a second virtual machine of the plurality of ...

Подробнее
14-01-2021 дата публикации

PREPARING CONTAINERIZED APPLICATIONS FOR BACKUP USING A BACKUP SERVICES CONTAINER IN A CONTAINER-ORCHESTRATION POD

Номер: US20210011816A1
Принадлежит:

A “backup services container” comprises “backup toolkits,” which include scripts for accessing containerized applications plus enabling utilities/environments for executing the scripts. The backup services container is added to Kubernetes pods comprising containerized applications without changing other pod containers. For maximum value and advantage, the backup services container is “over-equipped” with toolkits. The backup services container selects and applies a suitable backup toolkit to a containerized application to ready it for a pending backup. Interoperability with a proprietary data storage management system provides features that are not possible with third-party backup systems. Some embodiments include one or more components of the proprietary data storage management within the illustrative backup services container. Some embodiments include one or more components of the proprietary data storage management system in a backup services pod configured in a Kubernetes node. All configurations and embodiments are suitable for cloud and/or non-cloud computing environments. 1. A computer-implemented method for using a backup services container comprising:generating a first container that is based on an operating system-level virtualization service, wherein the first container comprises: (i) executable discovery logic, (ii) a plurality of executable scripts and corresponding enabling utilities for executing the scripts, wherein each script is configured to prepare for backup one or more corresponding applications, and (iii) executable selection logic;adding the first container to a container-orchestration pod that comprises one or more other containers comprising one or more containerized applications, wherein components of the container-orchestration pod, including the first container and the one or more other containers, run on a computing environment comprising at least one hardware processor and computer memory;by the discovery logic that executes in the ...

Подробнее
14-01-2021 дата публикации

Virtual Machine Recovery Method and Virtual Machine Management Device

Номер: US20210011817A1
Автор: Heng Huang, Xiaoyuan Wu
Принадлежит: Huawei Technologies Co Ltd

A virtual machine recovery method, where after receiving a virtual machine recovery command for recovering a to-be-recovered virtual machine, a virtual machine management device obtains configuration information of the to-be-recovered virtual machine from a cloud server. Then the virtual machine management device creates, according to the configuration information, a recovered virtual machine and a local storage. After downloading basic system data from the cloud server, the recovered virtual machine is started according to the basic system data. When receiving an input/output (IO) request for accessing a first data of the to-be-recovered virtual machine, the virtual machine management device downloads the first data from the cloud server to the local storage.

Подробнее
03-02-2022 дата публикации

SELECTING OPTIMAL DISK TYPES FOR DISASTER RECOVERY IN THE CLOUD

Номер: US20220035715A1
Принадлежит:

Embodiments for providing automated selection of optimal disk types for virtualized storage by defining a minimum number of backup samples, selecting, if the minimum number of backup samples is not met for a backup operation, a solid state drive (SSD) for a virtual machine (VM) storage for a disaster recovery operation, otherwise selecting a hard disk drive (HDD) for the VM storage. The method further defines a cold HDD threshold (CHT) value and a minimal percentage of backups (PPT) value, and obtains a cold backup count based on the CHT value. It compares a ratio of the cold backup count to an amount of backups (AB) for the disaster recovery operation to the defined PPT value, and if the ratio is greater than the PPT value, it selects the SSD rather than HDD for the VM storage. 1. A computer-implemented method of providing automated selection of optimal disk types for virtualized storage , comprising:defining a minimum number of backup samples;selecting, if the minimum number of backup samples is not met for a backup operation, a solid state drive (SSD) for a virtual machine (VM) storage for a disaster recovery operation, otherwise selecting a hard disk drive (HDD) for the VM storage;defining a cold HDD threshold (CHT) value and a minimal percentage of backups (PPT) value;obtaining a cold backup count based on the CHT value;comparing a ratio of the cold backup count to an amount of backups (AB) for the disaster recovery operation to the defined PPT value; andif the ratio is greater than the PPT value, selecting the SSD for the VM storage, otherwise selecting the HDD for the VM storage.2. The method of wherein the virtualized storage is maintained in a cloud network.3. The method of wherein the backup operation copies data from a VM disk of a production site to a cloud recovery site in the cloud network.4. The method of further comprising using production site information including a disk speed of the production site VM disk to modify at least one of the defined PPT ...

Подробнее
21-01-2016 дата публикации

Trusted Boot of a Virtual Machine

Номер: US20160019393A1
Принадлежит:

A method, system and program product for performing a trusted boot of a virtual machine comprises the steps of executing, in turn, a series of components of the trusted boot, performing a function on each component prior to the execution of the respective component, storing the output of the functions in a virtual trusted platform module, detecting that the virtual trusted platform module has not responded to the storing of the output of a function in the virtual trusted platform module, and generating a request that the virtual trusted platform module be disabled.

Подробнее
17-01-2019 дата публикации

Method for Dirty-Page Tracking and Full Memory Mirroring Redundancy in a Fault-Tolerant Server

Номер: US20190018746A1
Принадлежит: Stratus Technologies Bermuda Ltd.

A method of transferring memory from an active to a standby memory in an FT Server system. The method includes the steps of: reserving a portion of memory using BIOS; loading and initializing an FT Kernel Mode Driver; loading and initializing an FT Virtual Machine Manager (FTVMM) including the Second Level Address Translation table SLAT into the reserved memory. In another embodiment, the method includes tracking memory accesses using the FTVMM's SLAT in Reserved Memory and tracking “L2” Guest memory accesses by tracking the current Guest's SLAT and intercepting the Hypervisor's writes to the SLAT. In yet another embodiment, the method includes entering Brownout by collecting the D-Bits; invalidating the processor's cached SLAT translation entries, and copying the dirtied pages from the active memory to memory in the second Subsystem. In one embodiment, the method includes entering Blackout and moving the final dirty pages from active to the mirror memory. 1. A method of transferring memory from an active to a standby memory in an FT (Fault Tolerant) Server system comprising the steps of:Reserving a portion of memory using BIOS of the FT Server system;Loading and initializing an FT Kernel Mode Driver into memory;Loading and initializing an FT virtual machine Manager (FTVMM) including the Second Level Address Table (SLAT) into the reserved portion of memory and synchronizing all processors in the FTVMM;Tracking the OS (Operating System), driver, software and Hypervisor memory accesses using the FTVMM's SLAT in Reserved Memory;Tracking Guest VM (Virtual Machine) memory accesses by tracking all pages of the SLAT associated with the guest and intercepting the Hypervisor writes to memory pages that constitute the SLAT;Entering Brownout—level 0, by executing a full memory copy while keeping track of the dirty bits (D-Bits) in the SLAT to track memory writes by all software in the FT Server;Clearing all of the D-Bits in the FTVMM SLAT and each Guest's current SLAT; ...

Подробнее
21-01-2021 дата публикации

Utilizing data views to optimize secure data access in a storage system

Номер: US20210019063A1
Принадлежит: Pure Storage Inc

A storage system has filtered views of data. The storage system receives a read request for a filtered view of data in memory. The read request is associated with one or more permissions for viewing the data. The storage system identifies a subset of the data, based on the one or more permissions. The storage system provides the filtered view. The filtered view includes the subset of the data.

Подробнее
21-01-2021 дата публикации

RECOVERING DYNAMIC SYSTEM DATA

Номер: US20210019239A1
Принадлежит:

Aspects of the invention include creating a collection of control blocks associated with one or more catalogs, each control block including an eye catcher value and a plurality of pointers, creating a collection of recovery control blocks based the collection of control blocks, each recovery control block including a corresponding copy of the eye catcher value and the plurality of pointers, storing a control block memory location for each control block in the collection of control blocks and a recovery memory location for each recovery control block in the collection of recovery control blocks in a recovery table, analyzing the collection of control blocks to determine that a corruption exists, determining a corruption type, the corruption type comprises an infrastructure corruption and or a control block corruption, and initiating a remedial action for the collection of control blocks based at least in part on the corruption type. 1. A computer-implemented method for data recovery , the method comprising:creating a collection of control blocks associated with one or more catalogs, wherein each control block in the collection of control blocks comprises an eye catcher value and a plurality of pointers;creating a collection of recovery control blocks based at least in part on the collection of control blocks, wherein each recovery control block in the collection of recovery control blocks comprises a corresponding copy of the eye catcher value and the plurality of pointers;storing a control block memory location for each control block in the collection of control blocks and a recovery memory location for each recovery control block in the collection of recovery control blocks in a recovery table;analyzing the collection of control blocks to determine that a corruption exists;determining a corruption type, wherein the corruption type comprises one or both of an infrastructure corruption or a control block corruption; andinitiating a remedial action for the collection ...

Подробнее
17-04-2014 дата публикации

Decoupled application program-operating system computing architecture

Номер: US20140108864A1
Автор: Rajiv Madampath
Принадлежит: NetApp Inc

A method of application program-operating system decoupling includes performing, through an application program configured to execute on a client machine, a system call to a first operating system executing on a server machine over an interconnect configured to couple the server machine to the client machine. The method also includes serving the application program configured to execute on the client machine through the first operating system executing on the server machine in accordance with the system call.

Подробнее
17-04-2014 дата публикации

Dynamic Taint Analysis of Multi-Threaded Programs

Номер: US20140108867A1
Принадлежит: NEC Laboratories America, Inc.

Disclosed is a dynamic taint analysis framework for multithreaded programs (DTAM) that identifies a subset of program inputs and shared memory accesses that are relevant for issues related to concurrency. Computer implemented methods according to the framework generally involve the computer implemented steps of: applying independently a dynamic taint analysis to each of the multiple threads comprising a multi-threaded computer program; aggregating each independent result from the analysis for each of the multiple threads by consolidating effect of taint analysis in one or more possible re-orderings of observed shared memory accesses among threads; and outputting an indicia of the aggregated result as a set of relevant program inputs or a set of relevant shared memory accesses. 1. A method of performing dynamic taint analysis of a multi-threaded computer program communicating with shared memory where some of the shared memory accesses are used for thread synchronization and some of the shared memory accesses are used for data exchange between threads , said method comprising the computer implemented steps of:applying independently a dynamic taint analysis to each of the multiple threads comprising the multi-threaded computer program, wherein taint propagates from tainted inputs to a set of outputs in local thread order through thread-local and shared memory accesses in each thread, independent of the other threads;aggregating each independent result comprising tainted outputs and the propagated tainted inputs from the said analysis for each of the multiple threads, wherein aggregation consolidates the effect of taint propagation in one or more possible re-orderings of observed shared memory accesses; andoutputting an indicia of the aggregated result as a set of outputs tainted with the propagated tainted inputs.2. The method of wherein the aggregation step considers the observed total order of memory accesses.3. The method of wherein the aggregation step considers ...

Подробнее
10-02-2022 дата публикации

Migrating Workloads Using Active Disaster Recovery

Номер: US20220043695A1
Принадлежит: Pure Storage Inc

Migrating workloads among execution environments including storage systems includes: selecting a target execution environment for supporting a workload and migrating the workload to the target execution environment utilizing active disaster recovery. Migrating the workload can include: assigning storage resources of the workload to a first pod; linking for replication, the first pod to a second pod of the target execution environment; and replicating the storage resources of the workload to the second pod of the target execution environment.

Подробнее
10-02-2022 дата публикации

DYNAMICALLY SELECTING OPTIMAL INSTANCE TYPE FOR DISASTER RECOVERY IN THE CLOUD

Номер: US20220043721A1
Принадлежит:

The selection of an optimal restore instance type based on a customer's speed/cost tradeoff resolution is disclosed. An automated restore activity may be performed on a baseline test VM of a predefined size using different restore instance types. The number of calibration runs or evaluations needed to identify an optimal restore instance type in terms of performance and price, with respect to bandwidth or other constraining factor, is performed on less than all of the restore instance types. 1. A method , comprising:identifying restore instance types associated with a cloud provider;performing a search on less that all of the restore instance types to identify an optimal restore instance type;determining an optimal restore instance type from the restore instance types based on the search; andperforming a data protection operation with a restore virtual machine based on the optimal restore instance type.2. The method as recited in claim 1 , further comprising determining an optimal restore instance type for each tier of bandwidths associated with the restore instance types.3. The method as recited in claim 2 , further comprising performing the search for each tier of bandwidths to determine the optimal restore instance type for4. The method as recited in claim 1 , further comprising identifying the restore instance types and sorting the restore instance types by price.5. The method as recited in claim 1 , wherein performing a search includes performing a binary search on the restore instance types.6. The method as recited in claim 5 , further comprising performing a calibration run for each restore instance while performing the binary search.7. The method as recited in claim 5 , further comprising interpolating results for restore instance types not included in the search.8. The method as recited in claim 1 , further comprising applying a policy based at least on recovery price and recovery time to select a restore instance type for the data protection operation that ...

Подробнее
24-01-2019 дата публикации

VIRTUALIZED FILE SERVER DATA SHARING

Номер: US20190026101A1
Принадлежит: Nutanix, Inc.

In one embodiment, a system for managing a virtualization environment includes a set of host machines, each of which includes a hypervisor, virtual machines, and a virtual machine controller, and a first virtualized file server configured to receive a request to access a storage item located at a second virtualized file server, determine that the storage item is designated as being accessible by other virtualized file servers, identify an FSVM of the second virtualized file server at which the storage item is located, and forward the request to the FSVM of the second virtualized file server. The storage item may be designated as being accessible by other virtualized file servers when the storage item is associated with a predetermined tag value indicating that the storage item is shared among virtualized file servers. The predetermined tag value may be stored in a sharding map in association with the storage item. 1. A method comprising:receiving, at a first virtualized file server of a first computing device, a request to access a storage item located at a second virtualized file server of a second computing device;identifying a File Server Virtual Machine (FSVM) of the second virtualized file server configured to serve a storage resource storing the storage item; andsending the request to the identified FSVM of the second virtualized file server to access the storage item.2. The method of claim 1 , wherein sending the request to the identified FSVM of the second virtualized file server to access the storage item is in response to the storage item is being permitted to the first virtualized file server.3. The method of claim 2 , wherein determining whether the first virtualized file server is permitted to access the storage item.4. The method of claim 3 , wherein determining whether the first virtualized server is permitted to access the storage item includes determining that the storage item is associated with a tag value indicating that the storage item is shared ...

Подробнее
24-01-2019 дата публикации

MULTI-VIRTUAL MACHINE TIME CONSISTENT SNAPSHOTS

Номер: US20190026187A1
Принадлежит:

A method of generating time-coordinated snapshots across virtual machines (VMs) managed by at least one hypervisor executing in at least one host computer is described. The method includes: controlling at least one hypervisor to activate write caches for caching write traffic, generated by the VMs, targeting virtual disks; receiving, from the at least one hypervisor, messages that indicate idle periods in the write traffic; determining a quiescent window in the write traffic across the VMs from the idle periods; controlling the at least one hypervisor to flush the write caches up to a start time of the quiescent window; and controlling the at least one hypervisor to generate snapshots of the VMs. 1. A method of generating time-coordinated snapshots across virtual machines (VMs) managed by at least one hypervisor executing in at least one host computer , the method comprising:controlling at least one hypervisor to activate write caches for caching write traffic, generated by the VMs, targeting virtual disks;receiving, from the at least one hypervisor, messages that indicate idle periods in the write traffic;determining a quiescent window in the write traffic across the VMs from the idle periods;controlling the at least one hypervisor to flush the write caches up to a start time of the quiescent window; andcontrolling the at least one hypervisor to generate snapshots of the VMs.2. The method of claim 1 , wherein each of the idle periods has a duration of at least a duration of the quiescent window.3. The method of claim 1 , further comprising:controlling, subsequent to generation of the snapshots, the at least one hypervisor to completely flush, and then deactivate, the write caches.4. The method of claim 1 , wherein the step of receiving the messages comprises:receiving a first message indicating a start of a first idle period; andreceiving a second message indicating an end of the first idle period.5. The method of claim 1 , wherein each of the write caches includes ...

Подробнее
24-01-2019 дата публикации

CROSS SITE RECOVERY OF A VM

Номер: US20190026194A1
Принадлежит:

Restoring a virtual machine is disclosed. An indication of the virtual machine of a primary site to be restored at a remote site using a copy stored at the remote site of a backup data of the virtual machine of the primary site is received. The virtual machine is restored to the remote site using a backup application deployed at the remote site as a virtual appliance managed using a virtual environment management platform. 1. A system for restoring a virtual machine , comprising: determine a type of restoration site of a remote site;', 'provide a list of one or more virtual machines available to be restored at the remote site, wherein the one or more virtual machines included in the list of one or more virtual machines available to be restored at the remote site is determined based on the type of restoration site of the remote site;', 'receive an indication to restore the virtual machine of a primary site at the remote site, wherein the virtual machine of the primary site is one of the one or more virtual machines available to be restored at the remote site; and', 'restore the virtual machine to the remote site using a backup application of the remote site; and, 'a processor configured toa memory coupled to the processor and configured to provide the processor with instructions.2. The system of claim 1 , wherein the primary site and the remote site are located at different geographical locations.3. The system of claim 1 , wherein the indication is received in response to a determination that the primary site has encountered an error.4. The system of claim 1 , wherein the indication is received in response to a determination that the remote site is to provide at least a portion of a functionality of the primary site.5. The system of claim 1 , wherein the indication is received in response to a determination that a utilization level of a resource of the primary site is above a threshold.6. The system of claim 1 , wherein the processor is further configured to create a ...

Подробнее
24-01-2019 дата публикации

METADATA RECOVERY FOR DE-DUPLICATED DATA

Номер: US20190026197A1
Принадлежит:

A data stream is stored in storage media. As part of the storage, the data stream is divided into a plurality of chunks. The plurality of chunks include a target chunk that is next to a first chunk in a file within the data stream. A determination is made that the target chunk matches an existing chunk stored in the storage media. In response to the determination, a first pointer to the existing stored chunk is created in file metadata for the file. Also in response to the determination, a second pointer to a first stored chunk that matches the first chunk is created in chunk metadata embedded with the existing stored chunk. 1. A method for storing a data stream in storage media , the method comprising:dividing the data stream into a plurality of chunks, the plurality of chunks including a target chunk that is next to a first chunk in a file within the data stream;determining that the target chunk matches an existing chunk stored in the storage media;creating, in response to the determining, a first pointer to the existing stored chunk in file metadata for the file; andcreating, in response to the determining, a second pointer to a first stored chunk that matches the first chunk in chunk metadata embedded with the existing stored chunk.2. The method of claim 1 , wherein the target chunk is preceded by the first chunk in the file and followed by a third chunk in the file claim 1 , the method further comprising:creating, in response to the determining, a third pointer to a third stored chunk that matches the third chunk in chunk metadata embedded with the existing stored chunk.3. The method of claim 2 , wherein the third chunk is followed claim 2 , in the file claim 2 , by a fourth chunk of the plurality of chunks claim 2 , the method further comprising:determining that the third chunk does not match any existing chunks stored in the storage media;storing, in response to the determining that the third chunk does not match any existing stored chunks, the third chunk in ...

Подробнее
23-01-2020 дата публикации

CONTROLLING PROCESSING ELEMENTS IN A DISTRIBUTED COMPUTING ENVIRONMENT

Номер: US20200026605A1
Принадлежит:

A computer system controls processing elements associated with a stream computing application. A stream computing application is monitored for the occurrence of one or more conditions. One or more processing element groups are determined to be restarted based on occurrence of the one or more conditions, wherein the processing element groups each include a plurality of processing elements associated with the stream computing application. Each processing element of the determined one or more processing element groups is concurrently restarted. Embodiments of the present invention further include a method and program product for controlling processing elements within a stream computing application in substantially the same manner described above. 1. A computer-implemented method of controlling processing elements associated with a stream computing application comprising:monitoring a stream computing application for occurrence of one or more conditions;determining one or more processing element groups to restart based on occurrence of the one or more conditions, wherein the processing element groups each include a plurality of processing elements associated with the stream computing application; andconcurrently restarting each processing element of the determined one or more processing element groups.2. The computer-implemented method of claim 1 , wherein determining one or more processing element groups further comprises:establishing at least one processing element group based on a configuration attribute.3. The computer-implemented method of claim 1 , wherein the one or processing elements include a plurality of operators claim 1 , and determining one or more processing element groups further comprises:establishing at least one processing element group based on locations of processing elements within an operator graph indicating a flow through the operators.4. The computer-implemented method of claim 1 , wherein the one or processing elements include a plurality of ...

Подробнее
01-02-2018 дата публикации

SYSTEMS AND METHODS FOR DETERMINING PARENT STATES OF PARENT COMPONENTS IN A VIRTUAL-MACHINE ENVIRONMENT BASED ON PERFORMANCE STATES OF RELATED CHILD COMPONENTS AND COMPONENT STATE CRITERIA DURING A USER-SELECTED TIME PERIOD

Номер: US20180032363A1
Принадлежит:

Techniques promote monitoring of hypervisor systems by presenting dynamic representations of hypervisor architectures that include performance indicators. A reviewer can interact with the representation to progressively view select lower-level performance indicators. Higher level performance indicators can be determined based on lower level state assessments. A reviewer can also view historical performance metrics and indicators, which can aid in understanding which configuration changes or system usages may have led to sub-optimal performance. 1. A computer-implemented method , comprising:identifying, on a computing device, a parent component in a virtual-machine environment;identifying a set of child components of the parent component, wherein when the parent component includes a host cluster, a child component in the set of child components includes a host in the host cluster, and when the parent component includes a host, a child component in the set of child components includes a virtual machine running on the host;determining, on the computing device, a performance metric for a child component in the set of child components, wherein the performance metric for the child component indicates a performance of the child component;determining a performance state for a child component in the set of child components based on the performance metric for the child component and a child-component state criterion, wherein the child-component state criterion associates performance states for the child component with separate ranges of values for the performance metric for the child component;determining a parent state for the parent component based on performance states for child components in the set of child components and a parent-component state criterion, wherein the parent-component state criterion associates a performance state with a selection of child components that have the performance state; andcausing display of a visual representation of the virtual-machine ...

Подробнее
01-02-2018 дата публикации

COMPUTER SYSTEM AND MAINTENANCE METHOD OF COMPUTER SYSTEM

Номер: US20180032367A1
Принадлежит:

A communication system includes a control device configured to calculate a packet forwarding path and set a flow based on the packet forwarding path in a node, and a plurality of nodes configured to forward a received packet based on a flow set by the control device. The control device, when receiving a detour instruction, calculates a new packet forwarding path which detours a detour target node and sets a flow based on the new packet forwarding path in the plurality of nodes on the new packet forwarding path. 112-. (canceled)13. A control apparatus , comprising:memory configured to store program instructions; and identify a target node on a first packet forwarding path including a source node and a destination node;', 'identify forwarding information to forward a packet along a second packet forwarding path which is between the source node and the destination node but detours the target node; and', 'send the forwarding information to a plurality of nodes., 'a processor configured to execute the program instructions to14. The control apparatus according to claim 13 , wherein the processor is further configured to execute the program instructions to receive target node information from a management apparatus claim 13 , the target node information represents the target node.15. The control apparatus according to claim 14 , wherein the management apparatus is configured to manage a virtual machine on a server.16. The control apparatus according to claim 14 , wherein the target node information corresponds to the target node performing a maintenance.17. The control apparatus according to claim 13 , wherein the destination node is virtual machine on a server.18. The control apparatus according to claim 17 , wherein the virtual machine is configured to perform a migration.19. A network system claim 17 , comprising:a plurality of nodes; and memory configured to store program instructions; and', identify a target node on a first packet forwarding path including a source ...

Подробнее
01-02-2018 дата публикации

LOAD BALANCING AND FAULT TOLERANT SERVICE IN A DISTRIBUTED DATA SYSTEM

Номер: US20180032382A1
Принадлежит:

Techniques for load balancing and fault tolerant service are described. An apparatus may comprise load balancing and fault tolerant component operative to execute a load balancing and fault tolerant service in a distributed data system. The load balancing and fault tolerant service distributes a load of a task to a first node in a cluster of nodes using a routing table. The load balancing and fault tolerant service stores information to indicate the first node from the cluster of nodes is assigned to perform the task. The load balancing and fault tolerant service detects a failure condition for the first node. The load balancing and fault tolerant service moves the task to a second node from the cluster of nodes to perform the task for the first node upon occurrence of the failure condition. 1. A method , comprising:creating relationships between a quorum of nodes in a cluster;adding a new node to the quorum of nodes;adding a new user space process to the new node; andreassigning a relationship handled by the new user space process based upon the user space process failing.2. The method of claim 1 , comprising:assigning each user space process of each node within the quorum of nodes to handle a virtual server disaster recovery relationship of the cluster.3. The method of claim 1 , wherein no more than one user space process is assigned to each node.4. The method of claim 1 , wherein the new user space process comprises a virtual server disaster recovery process.5. The method of claim 1 , wherein the reassigning comprises:accessing a library of a replicated database (RDB) service to evaluate a set of classes indicative of nodes in the cluster that have not failed.6. The method of claim 5 , comprising:utilizing an RDB ring of a user space process to detect that a current node has failed.7. The method of claim 5 , comprising:utilizing the RDB ring of the user space process to detect that the current node has been activated.8. The method of claim 5 , comprising: ...

Подробнее
01-02-2018 дата публикации

DIAGNOSTIC SYSTEM AND METHOD

Номер: US20180032389A1
Принадлежит:

A computer-implemented method, computer program product and computing system for recording video information on the computing device during a monitored event. Execution information is recorded on the computing device during the monitored event. The video information and the execution information are temporally synchronized to form temporally-synchronized diagnostic content. 1. A computer-implemented method , executed on a computing device , comprising:recording video information on the computing device during a monitored event;recording execution information on the computing device during the monitored event; andtemporally synchronizing the video information and the execution information to form temporally-synchronized diagnostic content.2. The computer-implemented method of further comprising:providing the temporally-synchronized diagnostic content to a third party for analysis.3. The computer-implemented method of wherein recording video information on the computing device during a monitored event includes:recording a timestamped video portion.4. The computer-implemented method of wherein the execution information includes network traffic information.5. The computer-implemented method of wherein the execution information includes diagnostic information.6. The computer-implemented method of wherein the video information include web browser content rendered within a web browser by the computing device.7. The computer-implemented method of wherein the monitored event is a computer malfunction event.8. A computer program product residing on a computer readable medium having a plurality of instructions stored thereon which claim 1 , when executed by a processor claim 1 , cause the processor to perform operations comprising:recording video information on the computing device during a monitored event;recording execution information on the computing device during the monitored event; andtemporally synchronizing the video information and the execution information to form ...

Подробнее
17-02-2022 дата публикации

USING OVER PROVISIONING SPACE FOR SELECTIVELY STORING BLOCK PARITY

Номер: US20220050747A1
Принадлежит:

Methods and apparatus for storing parity bits in an available over provisioning (OP) space to recover data lost from an entire memory block. For example, a data storage device may receive data from a host device, write the data to a block, and generate a corresponding block parity. The device may then determine a bit error rate (BER) of the block and an average programming duration to write the data written to the block, calculate a probability of the block becoming defective based on the BER and the average programming duration, and comparing the probability of the block to a set of probabilities respectively corresponding to a set of worst-performing blocks in a NVM. Thereafter, the device may write the block parity to an available over provisioning (OP) space in the NVM responsive to the probability of the block being greater than any probability in the set of probabilities. 1. A data storage device , comprising:a non-volatile memory (NVM); and{'claim-text': ['receive data from a host device,', 'write the data to a block in the NVM and generate a corresponding block parity,', 'determine a bit error rate (BER) of the block and an average programming duration to write the data written to the block,', 'calculate a probability of the block becoming defective based on the BER and the average programming duration,', 'compare the probability of the block to a set of probabilities respectively corresponding to a set of worst-performing blocks in the NVM, and', 'write the block parity to an available over provisioning (OP) space in the NVM responsive to the probability of the block being greater than any probability in the set of probabilities.'], '#text': 'a data storage controller configured to:'}2. The data storage device of claim 1 , wherein the data storage controller is further configured to refrain from writing the block parity in any memory responsive to the probability of the block being less than all probabilities in the set of probabilities.3. The data storage ...

Подробнее
02-02-2017 дата публикации

Virtual Zones for Open Systems Interconnection Layer 4 Through Layer 7 Services in a Cloud Computing System

Номер: US20170034257A1
Принадлежит: AT&T INTELLECTUAL PROPERTY I LP

Concepts and technologies disclosed herein are directed to virtual zones for Open Systems Interconnection (“OSI”) communication model layers 4-7 services in a cloud computing system. According to one aspect of the concepts and technologies disclosed herein, a cloud computing system can include a hardware resource and a virtual zone. The virtual zone can include a virtual network function (“VNF”) that is executable by the hardware resource. The VNF can support a service that operates within one of layers 4-7 of the OSI communication model. A computing system can detect new subscribers to the service within the virtual zone. The computing system also can determine that a capacity constraint exists within the virtual zone as a result of the new subscribers. The computing system also can home the new subscribers to the further virtual zone so that the further VNF can provide the service to the new subscribers.

Подробнее
30-01-2020 дата публикации

EFFICIENT RECOVERY OF ERASURE CODED DATA

Номер: US20200034256A1
Принадлежит:

To efficiently recover from a multiple storage node failure, a storage node concurrently restores data fragments to the multiple failed storage nodes, as opposed to restoring each node individually. In the VCS based storage technique, storage nodes are restored as part of an ECG repair process. For each ECG being repaired, a storage node performing the restoration process reads data fragments from active nodes in the ECG and generates new data fragments to replace any lost data fragments. The node then stores one of the new data fragments across each of the failed storage nodes. By concurrently restoring data fragments to each failed storage node, the data fragments needed to repair each ECG are only read once, thereby preserving disk operations and network bandwidth. 1. A method comprising:identifying a set of virtual chunk spaces storing an erasure coded data object across a first plurality of storage nodes, wherein each virtual chunk space corresponds to a respective storage node, further wherein the set of virtual chunk spaces is affected by data loss;reading first data fragments from a group of active storage nodes in the first plurality of storage nodes;reconstructing the data object from the first data fragments according to an erasure coding algorithm;generating new data fragments from reconstructing the data object; andstoring the new data fragments within the set of virtual chunk spaces across a second plurality of storage nodes.2. The method of further comprising:prioritizing restoration of a plurality of sets of virtual chunk spaces based, at least in part, on a number of data fragments lost for each set of virtual chunk spaces.3. The method of claim 1 , wherein the first plurality of storage nodes includes a set of storage controllers.4. The method of claim 1 , wherein identifying the set of virtual chunk spaces comprises identifying mappings to the first plurality of storage nodes in metadata.5. The method of claim 1 , wherein reading first data ...

Подробнее
04-02-2021 дата публикации

Streaming database cloning using cluster live mounts

Номер: US20210034398A1
Принадлежит: Rubrik Inc

A database can be instantly cloned from a source device to a target device by a cluster mapped to a database to be cloned. Nodes of the cluster are mapped over channels to directories of the database. Scripts are generated from one or more templates that specify the order and values to be executed to perform a database job, such as cloning the database to the target device using the mappings. To clone the database, a template can be executed that generates and populates scripts, which can be executed on the target device to provide a functioning cloned database using the mapped cluster.

Подробнее
04-02-2021 дата публикации

METHODS, SYSTEMS, AND COMPUTER READABLE STORAGE DEVICES FOR MANAGING FAULTS IN A VIRTUAL MACHINE NETWORK

Номер: US20210034481A1
Принадлежит:

Faults are managed in a virtual machine network. Failure of operation of a virtual machine among a plurality of different types of virtual machines operating in the virtual machine network is detected. The virtual machine network operates on network elements connected by transport mechanisms. A cause of the failure of the operation of the virtual machine is determined, and recovery of the virtual machine is initiated based on the determined cause of the failure. 1. A method comprising:detecting, by a processor, a failure of operation of a virtual machine among a plurality of different types of virtual machines operating in a virtual machine network, wherein the virtual machine network comprises a plurality of network elements; a fault of a network element of the plurality of network elements;', 'a fault of the virtual machine;', 'a fault of a virtual application being executed by the virtual machine; and', 'a fault of a transport mechanism serving the virtual machine network; and, 'determining, by the processor, a cause of the failure of operation of the virtual machine via a fault signature, wherein the determining the cause of the failure includes identifying the cause of the failure from among a plurality of possible causes which includeinitiating, by the processor, a recovery of the virtual machine based on the cause of the failure that is determined, wherein when the cause of the failure is determined to be the fault of the virtual machine, the initiating the recovery of the virtual machine includes selecting between whether to: restore operation of the virtual machine, or repair a network infrastructure of the plurality of network elements.2. The method of claim 1 , further comprising claim 1 , responsive to a determination to repair a network infrastructure of the plurality of network elements claim 1 , determining a hardware resource of the network infrastructure to be repair.3. The method of claim 2 , wherein the hardware resource comprises at least one of: ...

Подробнее
09-02-2017 дата публикации

DATA TRANSFER AND RECOVERY

Номер: US20170039112A1
Автор: BENSINGER Andrew
Принадлежит:

A backup image generator can create a primary image and periodic delta images of all or part of a primary server. The images can be sent to a network attached storage device and one or more remote storage servers. In the event of a failure of the primary server, an updated primary image may be used to provide an up-to-date version of the primary system at a backup or other system. As a result, the primary data storage may be timely backed-up, recovered and restored with the possibility of providing server and business continuity in the event of a failure. 1. A method performed by a first backup computer system in communication with a primary computer system and a second backup computer system , the method comprising: receiving a first image of a primary computer system remote from the first backup system;', 'creating a first virtual hard drive at the first backup computer system that operates as a replica of the first primary computer system;', 'providing an image of the first virtual hard drive to a second backup computer system remote from the first backup computer system;', 'receiving a first plurality of delta images from the primary computer system, each delta image of the first plurality of delta images representing an incremental change in the first computer system;', 'updating the first virtual hard drive based upon the plurality of delta images;', 'providing a second plurality of delta images of the first virtual hard drive to the second backup computer system;', 'based upon an indication that the primary computer system is deactivated, operating in the stead of the primary computer system; and', 'providing a third plurality of delta images of the first virtual hard drive to the second backup computer system, each delta image of the third plurality of delta images representing an incremental change in the first backup computer system subsequent to deactivation of the primary computer system., 'by a first backup computer system2. A system comprising: receive ...

Подробнее
08-02-2018 дата публикации

REPLICATION BASED SECURITY

Номер: US20180039436A1
Принадлежит:

A method, system, and computer program product for intercepting IO to a virtual machine file system by a storage based splitter, replicating, via a replication appliance, the IO to a replica of the image; the replica of the image containing a replica of the virtual machine file system, and periodically mounting the replica of the virtual machine file system to create entries for a database tracking information about the virtual machines running in the hypervisor. 1. A system comprising: 'a storage based splitter;', 'a hypervisor running one or more virtual machines;'}a replication appliance using the storage based splitter to replicate the virtual machines, and intercepting IO to the virtual machine file system by the storage based splitter;', 'replicating, via the replication appliance, the IO to a replica of the image; the replica of the image containing a replica of the virtual machine file system;', 'periodically mounting the replica of the virtual machine file system to create entries for a database tracking information about the virtual machines running in the hypervisor., 'computer-executable logic operating in memory, wherein the computer-executable program logic is configured to enable execution across one or more processors of2. The system of the computer-executable program logic further configured to enable execution across one or more processors of: analyzing the database to determine whether suspicious activity has occurred.3. The system of the computer-executable program logic further configured to enable execution across one or more processors of:based on a positive description of suspicious activity, mounting a point in time corresponding to the time when the suspicious activity was identified; andexamining one or more virtual machines at the mounted point in time for suspicious activity.3. The system of wherein the entries of the database include the number of virtual machines in the hypervisor at the point in time.4. The system of wherein the ...

Подробнее
24-02-2022 дата публикации

RAID DATA STORAGE DEVICE AND DATA STORAGE SYSTEM INCLUDING THE SAME

Номер: US20220058086A1
Принадлежит:

A data storage system includes a host configured to provide a read request; a plurality of storage devices constituting a redundant array of independent disks (RAID); and a RAID controller configured to a plurality of read commands in response to the read request, the read commands being provided to the plurality of storage devices according to a RAID setting, wherein one data storage device of the plurality of data storage devices includes a nonvolatile memory device; an error handling information storage circuit to store error handling information; and an error detection and correction circuit configured to detect an error in data output from the nonvolatile memory device according to a read command and to selectively correct the error according to the error handling information. 1. A data storage system , comprising:a host configured to provide a read request;a plurality of storage devices constituting a redundant array of independent disks (RAID); anda RAID controller configured to generate a plurality of read commands in response to the read request, the read commands being provided to the plurality of storage devices according to a RAID setting,wherein one data storage device of the plurality of data storage devices includes:a nonvolatile memory device;an error handling information storage circuit to store error handling information; andan error detection and correction circuit configured to detect an error in data output from the nonvolatile memory device according to a read command and to selectively correct the error according to the error handling information.2. The data storage system of claim 1 , wherein the RAID controller includes a RAID data processing circuit configured to correct the error of the one data storage device by using data read from the other data storage devices among the plurality of data storage devices when the error detection and correction circuit does not correct the error.3. The data storage system of claim 2 , wherein the RAID ...

Подробнее
24-02-2022 дата публикации

CLONED VIRTUAL MACHINE DISK REPLICATION

Номер: US20220058159A1
Принадлежит:

One or more techniques and/or computing devices are provided for replicating virtual machine disk clones. For example, a first storage controller, hosting first storage, may have a synchronous replication relationship with a second storage controller hosting second storage. A virtual machine, within the first storage, may be specified as having synchronous replication protection. Accordingly, virtual machine disk clones of a virtual machine disk of the virtual machine may be replicated from the first storage to the second storage. For example, virtual machine disk clones may be synchronous replicated, replicated by a resync process invoked by a hypervisor agent, and/or stored and replicated from a clone backup directory. 1. A method comprising:receiving a virtual machine disk clone operation targeting first storage;determining that the virtual machine disk clone operation targets a virtual machine hosted by a first node having synchronous replication protection with respect to a second node;splitting the virtual machine disk clone operation to create a replication virtual machine disk clone operation;locally implementing the virtual machine disk clone operation upon the first storage; andsending the replication virtual machine disk clone operation to the second node for implementation upon second storage.2. The method of claim 1 , wherein the locally implementing comprises:implementing the virtual machine disk clone operation as a clone create operation to create a virtual machine disk clone of a virtual machine disk of the virtual machine.3. The method of claim 1 , wherein the locally implementing comprises:implementing the virtual machine disk clone operation as a clone delete operation to delete a target virtual machine disk clone of a virtual machine disk of the virtual machine.4. The method of claim 1 , wherein the locally implementing comprises:implementing the virtual machine disk clone operation as a clone rename operation to rename a target virtual machine ...

Подробнее
07-02-2019 дата публикации

ZONE AWARE REQUEST SCHEDULING AND DATA PLACEMENT

Номер: US20190042363A1
Принадлежит:

A method begins with receiving an encoded data slice that has associated therewith a slice name that is representative of a dispersed storage network (DSN) logical address. The method continues with accessing a DSN address to memory device mapping based on the DSN logical address to identify a memory device of the storage unit. The method continues with retrieving a logical zone to physical address space mapping of the identified memory device. The method continues with determining information regarding the encoded data slice and a logical zone of the memory device from the logical zone to physical address space mapping based on the encoded data slice information. The method continues with generating a physical address within the identified logical zone for storing the encoded data slice. The method continues with storing the encoded data slice within the identified memory device at the physical address. 1. A method comprises:receiving, by a storage unit of a disperse storage network (DSN), an encoded data slice for storage, wherein the encoded data slice has associated therewith a slice name that is representative of a DSN logical address, and wherein a data segment is dispersed storage error encoded to produce a set of encoded data slices, wherein the set of encoded data slices includes the encoded data slice;accessing, by the storage unit, a DSN address to memory device mapping based on the DSN logical address to identify one of a plurality of memory devices of the storage unit to produce an identified memory device;retrieving, by the storage unit, a logical zone to physical address space mapping of the identified memory device;determining, by the storage unit, information regarding the encoded data slice;determining, by the storage unit, a logical zone of the memory device from the logical zone to physical address space mapping based on the encoded data slice information to produce an identified logical zone;generating, by the storage unit, a physical address ...

Подробнее
07-02-2019 дата публикации

VALIDATING AN IMAGE USING AN EMBEDDED HASH IN AN INFORMATION HANDLING SYSTEM

Номер: US20190042753A1
Принадлежит:

A method, an information handling system (IHS) and a validation system for validating an image using an embedded hash. The method includes retrieving, via a controller, a first image from a first memory device and extracting a first hash from a first location within the first image. The first hash was previously generated using an original set of data that includes a first data string, and the first image includes the first hash inserted into the first location to replace the first data string. The method includes retrieving a copy of the first data string. The method further includes generating a second image by inserting the first data string into the first location from which the first hash was extracted such that the second image contains the original set of data. The method further includes validating the first image using the first hash and the second image. 1. A method for validating an image using an embedded hash within an information handling system , the method comprising:retrieving, via a controller, a first image from a first memory device;extracting a first hash from a first location within the first image, the first hash being generated using an original set of data that includes a first data string, the first image including the first hash inserted into the first location to replace the first data string;retrieving the first data string, the first data string being part of the original set of data used to generate the first hash;generating a second image by inserting the first data string into the first location from which the first hash was extracted such that the second image contains the original set of data; andvalidating the first image using the first hash and the second image.2. The method of claim 1 , wherein validating the first image comprises:calculating a second hash of the second image;determining if the first hash and the second hash match; and generating a first type error message that indicates detection of tampering with the first ...

Подробнее
06-02-2020 дата публикации

SYSTEMS AND METHODS FOR MANAGING RELEASES OF GLOBAL SERVICES IN A CONTROLLED MANNER

Номер: US20200042298A1
Принадлежит:

Described herein are systems and methods for managing releases of global services in a controlled manner. A computing environment may include a first release of a global service, a second release of the global service, and a manager service. The first and second release may be enabled and disabled. The first release may be enabled and the second release may be disabled. The second release may be ready for use in the computing environment after passing one or more checks. A manager service may enable use of the second release in the computing environment. The manager service may disable use of (but maintain execution of) the first release in the computing environment. The second release may be determined to have one or more issues. Responsive to determining the second release has issue(s), the manager service may disable use of the second release and re-enable use of the first release. 1. A method for managing releases of global services in a controlled manner , the method comprising:(a) deploying in a computing environment a second release of a global service in a disabled state, the computing environment having a first release of the global service enabled and in use, each of the first release of the global service and the second release of the global service configured to be enabled and disabled;(b) identifying that the second release of the global service has passed one or more checks and is ready to be enabled for use in the computing environment;(c) enabling, by a manager service, use of the second release of the global service in the computing environment;(d) disabling, by the manager service, use of the first release of the global service in the computing environment while maintaining execution of the first release of the global service in the computing environment;(e) determining that the second release of the global service has one or more issues and is to be disabled; and(f) disabling, by the manager service, use of the second release of the global service ...

Подробнее
06-02-2020 дата публикации

GLOBAL NAMING FOR INTER-CLUSTER REPLICATION

Номер: US20200042402A1
Принадлежит: Nutanix, Inc.

Systems for multi-cluster virtualized computing system management. A method for performing virtual entity replication between source computing clusters and target computing clusters commences upon establishing a virtual entity naming convention that is observed by both the source computing clusters and the target computing clusters. A snapshot from a source cluster is associated with a global snapshot ID before being transmitted to a target computing cluster. At some point in time, the source cluster will initiate acts to replicate a virtual entity to a particular data state that is associated with a particular named snapshot. A second replication protocol then commences. The second replication protocol includes exchanges that serve to determine whether or not the target computing cluster has a copy of a particular named snapshot as named by the global snapshot ID, and if so, to then initiate virtual entity replication at the target computing cluster using the named snapshot. 1. A method comprising:replicating a snapshot from a source computing cluster to a target computing cluster, wherein the snapshot is associated with a global snapshot ID that is consistent across multiple clusters; and determining whether or not the target computing cluster has a copy of the snapshot that is associated with the global snapshot ID;', 'initiating virtual entity replication at the target computing cluster using the copy of the snapshot that is associated with the global snapshot ID when the target computing cluster does have the copy of the snapshot; and', 'initiating snapshot replication at the target computing cluster to create a newly-replicated copy of the snapshot that is associated with the global snapshot ID when the target computing cluster does not have the copy of the snapshot., 'performing disaster recovery by2. The method of claim 1 , wherein the virtual entity replication at the target computing cluster uses the newly-replicated copy of the snapshot that is associated ...

Подробнее
18-02-2021 дата публикации

SYSTEMS AND METHODS FOR CHANGE BLOCK TRACKING

Номер: US20210049079A1
Принадлежит:

Aspects of the present disclosure enable data protection operations including differential and incremental backups by performing changed-block tracking in network or cloud computing systems with architectures that do not natively support changed-block tracking or do not expose changed-block tracking functionality to an information management system. In certain aspects, an identity of changed blocks may be obtained by using a hypervisor configured to interface with the cloud computing architecture. The identified changed blocks may be used to generate a map of the changed blocks. The maps of the changed blocks can be used by a virtual server agent to extract the changed blocks from a copy of a virtual machine disk and backed up to perform a differential or incremental backup. 1. A computer-implemented method of performing a backup of changed data associated with a virtual machine client implemented in a virtualized computing environment maintained by a virtualization manager , the computer-implemented method comprising: receiving a request from a data agent to provide a listing of changed data associated with a data set involved in a backup operation, the data set corresponding to primary data generated by the virtual machine client and stored in a primary storage device, wherein the virtualization manager directs operation of a virtual machine monitor (VMM) executing the virtual machine client, and wherein the virtualization manager provides an interface between the data agent and the VMM;', 'executing an image generation command of an application programming interface of the VMM, which causes the VMM to generate an image of a volume of data corresponding to the data set, wherein the image generation command is not exposed to the data agent;', 'determining, based at least on the image of the volume, an identity of changed blocks included in the volume;', 'generating a map of the changed blocks at least in part on the identified changed blocks; and', 'transmitting ...

Подробнее
01-05-2014 дата публикации

High availability system allowing conditionally reserved computing resource use and reclamation upon a failover

Номер: US20140122920A1
Принадлежит: VMware LLC

In one embodiment, a method determines a first set of virtual machines and a second set of virtual machines. The first set of virtual machines is associated with a first priority level and the second set of virtual machines is associated with a second priority level. A first set of computing resources and a second set of computing resources are associated with hosts. Upon determining a failure of a host, the method performs: generating a power off request for one or more of the second set of virtual machines powered on the second set of computing resources and generating a power on request for one or more virtual machines from the first set of virtual machines that were powered on the failed host, the power on request powering on the one or more virtual machines from the first set of virtual machines on the second set of computing resources.

Подробнее
18-02-2016 дата публикации

PERFORMANCE MONITORING IN A DATA PROCESSING APPARATUS CAPABLE OF EXECUTING INSTRUCTIONS AT A PLURALITY OF PRIVILEGE LEVELS

Номер: US20160048440A1
Принадлежит:

A data processing apparatus has processing circuitry which can execute instructions at one of several privilege levels. A plurality of performance monitoring circuits are included. In response to an instruction executed at a first privilege level, first configuration data can be set for controlling performance monitoring by a first subset of performance monitoring circuits. A disable control flag can be set in response to an instruction executed at a second privilege level higher than the first privilege level. If the disable control flag has a predetermined value then performance monitoring control circuitry disables performance monitoring by the first subset of performance monitoring circuits while the processing circuitry is executing instructions at the second privilege level. 1. A data processing apparatus comprising:processing circuitry configured to execute program instructions at a plurality of privilege levels; anda plurality of performance monitoring circuits, wherein the processing circuitry is configured to set, in response to at least one program instruction executed by the processing circuitry at a first privilege level, first configuration data for controlling performance monitoring by a first subset of performance monitoring circuits;the processing circuitry is configured to set a disable control flag in response to at least one program instruction executed by the processing circuitry at a second privilege level higher than the first privilege level; andthe apparatus comprises performance monitoring control circuitry configured to disable performance monitoring by said first subset of performance monitoring circuits while the processing circuitry is executing instructions at the second privilege level if said disable control flag has a predetermined value.2. The data processing apparatus according to claim 1 , wherein the processing circuitry is configured to set claim 1 , in response to at least one program instruction executed by the processing ...

Подробнее
16-02-2017 дата публикации

ENHANCED CONFIGURATION AND PROPERTY MANAGEMENT SYSTEM

Номер: US20170046175A1
Принадлежит:

Embodiments of the invention are directed to systems, methods and computer program products for creating and managing a virtual operating environment on a physical machine connected to a distributed network, the virtual operating environment is virtualized by the physical machine. The invention may categorize the virtual operating environment using a tiered data structure, where each tier of the tiered data structure defines an attribute for categorizing the virtual operating environment. The invention generates a graphical representation of the tiered data structure for display via a user computing device that enables a user to communicate requests for causing the virtual operating environment to perform a function and communicates commands to the physical machine based on receiving such requests. The invention may additionally update the graphical representation after the virtual operating environment has executed the function. 1. A system for operating a virtual operating environment over a distributed network , the system comprising:a memory;at least one computing processor; and create a virtual operating environment, wherein the virtual operating environment is hosted on a physical machine accessible via a distributed network, wherein the physical machine is configured to receive operational commands over the distributed network for controlling the virtual operating environment, wherein the virtual operating environment is virtualized by the physical machine, and wherein the virtual operating environment accesses hardware components of the physical machine to perform at least one preconfigured function;', 'categorize the virtual operating environment using a tiered data structure, wherein each tier of the tiered data structure defines an attribute for categorizing the virtual operating environment, wherein each tier of the multiple tiered data structure may comprise one or more sub-tiers, thereby forming a parent/child relationship, wherein the sub-tier is ...

Подробнее
15-02-2018 дата публикации

TECHNIQUES FOR IMPROVING OUTPUT-PACKET-SIMILARITY BETWEEN PRIMARY AND SECONDARY VIRTUAL MACHINES

Номер: US20180046480A1
Автор: Dong Yao Zu, Jiang Yunhong
Принадлежит: Intel Corporation

Examples may include intercepting packets outputted from a primary virtual machine (PVM) hosted by a first server and converting one or more fields of protocol headers for each intercepted packet such that output-packet-similarity may be increased between the PVM outputted packets and packets outputted by a secondary virtual machine (SVM) hosted by a second server. 1. An apparatus comprising:circuitry;an intercept module for execution by the circuitry to intercept first network packets outputted from a primary virtual machine (PVM) hosted by a first server, each network packet of the first network packets having a transport control protocol/internet protocol (TCP/IP) header; anda conversion module for execution by the processor circuit to convert one or more fields of each TCP/IP header to more predictable or deterministic values while maintaining TCP/IP semantics for each respectively converted field in each TCP/IP header, the one or more fields including at least one of a TCP sequence number field, an IP header identification (ID) field, a timestamp field or a TCP window size field.2. The apparatus of claim 1 , comprising:a send module for execution by the circuitry to forward the first network packets with the converted one or more fields to a coarse-grained lock-stepping (COLO) manager, the COLO manager to determine output-packet-similarity of the first network packets compared to corresponding second network packets outputted from a secondary virtual machine (SVM) hosted by a second server, each network packet of the corresponding second network packets having similarly converted one or more fields of each TCP/IP header.3. The apparatus of claim 2 , comprising the conversion module to convert the TCP sequence number field by the conversion module to:access a first namespace including first original TCP sequence numbers randomly generated by a first operating system executed by the PVM using a first randomization value;access a second namespace including first ...

Подробнее
18-02-2021 дата публикации

Distributed components in computing clusters

Номер: US20210051130A1
Принадлежит: Microsoft Technology Licensing LLC

The subject disclosure is directed towards components in different server clusters, e.g., comprising software components such as components of a distributed computing system. Components are available for use by distributed computing system applications, yet managed by the distributed computing system runtime such that only a single instance can be activated and exist within communicating (non-partitioned) clusters. Also described is recovery from a situation in which no longer partitioned clusters each have created the same component.

Подробнее
14-02-2019 дата публикации

Chunk allocation

Номер: US20190050301A1
Принадлежит: Rubrik Inc

Methods and systems for identifying a set of disks within a cluster and then storing a plurality of data chunks into the set of disks such that the placement of the plurality of data chunks within the cluster optimizes failure tolerance and storage system performance for the cluster are described. The plurality of data chunks may be generated using replication of data (e.g., n-way mirroring) or application of erasure coding to the data (e.g., using a Reed-Solomon code or a Low-Density Parity-Check code). The topology of the cluster including the physical arrangement of the nodes and disks within the cluster and status information for the nodes and disks within the cluster (e.g., information regarding disk fullness, disk performance, and disk age) may be used to identify the set of disks in which to store the plurality of data chunks.

Подробнее
13-02-2020 дата публикации

HIGHLY AVAILABLE CLOUD-BASED DATABASE SERVICES

Номер: US20200050522A1
Принадлежит:

A management fabric for a server cluster may receive an indication of a failover condition in the server cluster for a virtual machine executing in the server cluster, where a first database program executing at the virtual machine communicates with one or more data storage devices that is attached to the virtual machine, and where a hostname is associated with the virtual machine. In response to receiving the indication of the failover condition, the server cluster may perform failover, including attaching the one or more data storage devices to a backup virtual machine associated with the one or more data storage devices, so that a second database program executing at the backup virtual machine is able to communicate with the one or more data storage devices, where the backup virtual machine is already executing in the server cluster, and associating the hostname with the backup virtual machine. 1. A computer-implemented method comprising:receiving an indication of a failover condition in a server cluster for a virtual machine executing in the server cluster, wherein a first database program executing at the virtual machine communicates with one or more data storage devices that is attached to the virtual machine, and wherein a hostname is associated with the virtual machine; and attaching the one or more data storage devices to a backup virtual machine associated with the one or more data storage devices, so that a second database program executing at the backup virtual machine is able to communicate with the one or more data storage devices, wherein the backup virtual machine is already executing in the server cluster, and', 'associating the hostname with the backup virtual machine., 'in response to receiving the indication of the failover condition, performing failover of the server cluster, including2. The computer-implemented method of claim 1 , wherein performing the failover of the server cluster further comprises:detaching the one or more data storage ...

Подробнее
22-02-2018 дата публикации

System and Method For Analyzing Data Records

Номер: US20180052890A1
Принадлежит: Google LLC

Systems and methods for analyzing input data records are provided in which a master process initiates a plurality of concurrent first processes each of which comprises, for each data record in at least a subset of a plurality of input data records, creating a parsed representation of the data record and independently applying a procedural language query to the parsed representation to extract one or more values. A respective emit operator is applied to at least one of the extracted one or more values thereby adding corresponding information to a respective intermediate data structure. The respective emit operator implements one of a predefined set of statistical information processing functions. The master process also initiates a plurality of second processes each of which aggregates information from a corresponding subset of intermediate data structures to produce aggregated data that is, in turn, combined to produce output data.

Подробнее
23-02-2017 дата публикации

Virtual machine cluster backup

Номер: US20170052852A1
Принадлежит: Microsoft Technology Licensing LLC

Embodiments are directed to backing up a virtual machine cluster and to determining virtual machine node ownership prior to backing up a virtual machine cluster. In one scenario, a computer system determines which virtual machines nodes are part of the virtual machine cluster, determines which shared storage resources are part of the virtual machine cluster and determines which virtual machine nodes own the shared storage resources. The computer system then indicates to the virtual machine node owners that at least one specified application is to be quiesced over the nodes of the virtual machine cluster, such that a consistent, cluster-wide checkpoint can be created. The computer system further creates a cluster-wide checkpoint which includes a checkpoint for each virtual machine in the virtual machine cluster.

Подробнее
25-02-2016 дата публикации

Enabling uniform switch management in virtual infrastructure

Номер: US20160057005A1
Принадлежит: VMware LLC

A method of configuring a logical network in a datacenter is provided. The datacenter includes a plurality of host physical computing devices, a compute manager to configure one or more data compute nodes (DCNs) on virtualization software of each host, and a network manager. The method configures, by the network manager, a logical network. the method provides, by the network manager, a read-only configuration construct of the logical network to the virtualization software of a set of hosts in the plurality of hosts. The method obtains, by the compute manager, the read-only configuration construct of the logical network from the virtualization software of the set of hosts. The method configures, by the compute manager, a plurality of DCNs to connect to the logical network using the read only configuration construct of the logical network.

Подробнее
25-02-2016 дата публикации

Enabling virtual machines access to switches configured by different management entities

Номер: US20160057014A1
Принадлежит: VMware LLC

A method of configuring a plurality of logical forwarding elements (LFEs) on a physical computing device comprising virtualization software and a plurality of data compute nodes (DCNs) is provided. The method provisions a first LFE configured and managed by a network manager of a datacenter on the physical computing device, the first LFE for performing OSI L 3 )packet forwarding between DCNs on one or more hosts, the first LFE comprising a plurality of logical ports configured and managed by the network manager, each logical port of the first LFE for connecting a DCN to a logical network configured and managed by the network manager. The method provisions a second LFE configured and managed by a compute manager of the datacenter on the physical computing device, the second LFE for performing OSI L3 packet forwarding between DCNs on one or more hosts, the second LFE comprising a plurality of logical port groups configured and managed by the compute manager, each logical port of the second LFE for connecting a DCN to a logical network configured and managed by the compute manager. The method configures a first DCN in the plurality of DCNs by the compute manager to connect to a logical network configured and managed by the network manager through a port of the first LFE. The method configures a second DCN in the plurality of DCNs by the compute manager to connect to a logical network configured and managed by the compute manager through a port of the second LFE.

Подробнее
10-03-2022 дата публикации

Application Exception Recovery

Номер: US20220075696A1
Принадлежит:

An application exception recovery method, an electronic device, a storage medium storing the recovery method, and a recovery apparatus, the method including, storing page information of an exception page, in response to that an exception occurs in at least one application installed on an electronic device, wherein the exception page is a page displayed by the at least one application in response to the exception occurring, displaying a mask, wherein the mask is a picture displayed on at least a window of the at least one application during restart of the at least one application, restarting the at least one application, wherein restarting the at least one application comprises creating the exception page, and removing the mask. 1. An application exception recovery method , comprising:storing page information of an exception page, in response to that an exception occurs in at least one application installed on an electronic device, wherein the exception page is a page displayed by the at least one application in response to the exception occurring;displaying a mask, wherein the mask is a picture displayed on at least a window of the at least one application during restart of the at least one application;restarting the at least one application, wherein restarting the at least one application comprises creating the exception page; andremoving the mask.2. The recovery method according to claim 1 , further comprising: determining claim 1 , in response to the exception occurring claim 1 , a case in which the exception page does not have a security label as a case in which the page information of the exception page can be stored claim 1 , and storing the page information of the exception page.3. The recovery method according to claim 1 , wherein the mask comprises a page snapshot of the exception page.4. The recovery method according to claim 1 , wherein the page information comprises redirection information used to redirect to the page to which the page information ...

Подробнее
21-02-2019 дата публикации

DETECTING A GUEST OPERATING SYSTEM CRASH ON A VIRTUAL COMPUTING INSTANCE

Номер: US20190056985A1
Принадлежит:

The subject matter described herein is generally directed towards detection and remediation of virtual computing instance (VCI) failure on host devices. Monitoring is performed to detect suspected failures of different guest operating systems, identify failure information, and perform remediation to provide high availability for the VCI. 1. A system for detecting a guest operating system (OS) crash of a virtual computing instance (VCI) , said system comprising:at least one physical processor; and [ intercepting a command from the guest OS to create a core dump of the guest OS, the guest OS issuing the command in response to failure of the guest OS, or', 'recognizing failure screen display information generated by the guest OS;, 'detect, by a hypervisor executing on a host, failure of the guest OS of the VCI, the VCI executing on the host in a cluster that has been configured for high availability, wherein detecting comprises, 'in response to detecting the failure of the guest OS, notify a high availability process on the hypervisor; and', 'perform, by the high availability process on the hypervisor, remediation for the VCI., 'at least one memory comprising computer program code, the at least one memory and the computer program code configured to, with the at least one physical processor, cause the physical processor to at least2. The system of claim 1 , wherein the computer program code is configured to intercept the command from the guest OS to create the core dump by intercepting a hypercall from the guest OS to the hypervisor to create a reserved partition for storage of the core dump claim 1 , the hypercall occurring when the guest OS crashes.3. The system of claim 1 , wherein the computer program code is configured to intercept the command from the guest OS to create the core dump by intercepting a command from the guest OS to write the core dump to a file system mounted on the VCI.4. The system of claim 1 , wherein the computer program code is configured to ...

Подробнее
21-02-2019 дата публикации

PROTECTING VIRTUAL MACHINES AGAINST STORAGE CONNECTIVITY FAILURES

Номер: US20190057005A1
Принадлежит:

A system for monitoring a virtual machine executed on a host. The system includes a processor that receives an indication that a failure caused a storage device to be inaccessible to the virtual machine, the inaccessible storage device impacting an ability of the virtual machine to provide service, and applies a remedy to restore access to the storage device based on a type of the failure. 1. A system for monitoring software application instances , the system comprising:a host executing first and second software application instances; and receive an indication that a failure caused a storage device to be inaccessible to at least one of the first and second software application instances and impacted an ability of at least one of the first and second software application instances to provide service;', 'determine if the failure is permanent or transient; and', if the failure is permanent, terminating at least one of the first and second software application instances and restarting the at least one of the first and second software application instances on a healthy host, and', 'if the failure is transient, determining whether both of the first and second software application instances are impacted by the transient failure, and based on whether both of the first and second software instances are impacted, terminating at least one of the first and second software application instances and restarting the at least one of the first and second software application instances on a healthy host., 'apply a remedy comprising], 'a processor programmed to2. The system of claim 1 , wherein claim 1 , if the failure is transient and both of the first and second software application instances are impacted by the transient failure and if the host and a master host claim 1 , which coordinates activity of hosts and/or software application instances claim 1 , are separated by a network partition claim 1 , the first and second software application instances are either restarted on the ...

Подробнее
03-03-2016 дата публикации

STORAGE POLICY-BASED AUTOMATION OF PROTECTION FOR DISASTER RECOVERY

Номер: US20160062858A1
Принадлежит:

Exemplary methods, apparatuses, and systems include a recovery manager receiving selection of a storage profile to be protected. The storage profile is an abstraction of a set of one or more logical storage devices that are treated as a single entity based upon common storage capabilities. In response to the selection of the storage profile to be protected, a set of virtual datacenter entities associated with the storage profile is added to a disaster recovery plan to automate a failover of the set of virtual datacenter entities from a protection site to a recovery site. The set of one or more virtual datacenter entities includes one or more virtual machines, one or more logical storage devices, or a combination of virtual machines and logical storage devices. The set of virtual datacenter entities is expandable and interchangeable with other virtual datacenter entities. 1. A computer-implemented method , comprising:receiving selection of a storage profile to be protected, wherein the storage profile is an abstraction of a set of one or more logical storage devices that are treated as a single entity based upon common storage capabilities, andadding, in response to the selection of the storage profile to be protected, a set of virtual datacenter entities associated with the storage profile to a disaster recovery plan to automate a failover of the set of virtual datacenter entities from a protection site to a recovery site, wherein the set of one or more virtual datacenter entities includes one or more virtual machines, one or more logical storage devices, or a combination of virtual machines and logical storage devices, and wherein the set of virtual datacenter entities is expandable and interchangeable with other virtual datacenter entities.2. The computer-implemented method of claim 1 , further comprising:receiving notification of a change to the set of virtual datacenter entities associated with the storage profile;determining an updated set of one or more ...

Подробнее
01-03-2018 дата публикации

DEDUPLICATION OF VIRTUAL MACHINE CONTENT

Номер: US20180059973A1
Принадлежит: RUBRIK, INC.

Methods and systems for managing, storing, and serving data within a virtualized environment are described. In some embodiments, a data management system may manage the extraction and storage of virtual machine snapshots, provide near instantaneous restoration of a virtual machine or one or more files located on the virtual machine, and enable secondary workloads to directly use the data management system as a primary storage target to read or modify past versions of data. The data management system may allow a virtual machine snapshot of a virtual machine stored within the system to be directly mounted to enable substantially instantaneous virtual machine recovery of the virtual machine. 1. A method for operating a data management system , comprising:acquiring an instruction from a computing device;detecting that a second version of a second virtual machine should be generated based on the instruction;concurrently acquiring a base image associated with a first version of a first virtual machine different from the second virtual machine from a first storage device of a first type while acquiring one or more incremental files associated with the second virtual machine from a second storage device of a second type in response to detecting that the second version of the second virtual machine should be generated;generating at least a portion of a file corresponding with the second version of the second virtual machine by patching the one or more incremental files associated with the second virtual machine to the base image associated with the first virtual machine; andtransmitting the at least the portion of the file to the computing device.2. The method of claim 1 , wherein:the concurrently acquiring the base image associated with the first version of the first virtual machine while acquiring the one or more incremental files associated with the second virtual machine includes sequentially reading the base image from the first storage device of the first type while ...

Подробнее
01-03-2018 дата публикации

INTELLIGENT RESTORE-CONTAINER SERVICE OFFERING FOR BACKUP VALIDATION TESTING AND BUSINESS RESILIENCY

Номер: US20180060187A1
Принадлежит:

A method and system for creating a new restore container. A count that is determined for each unique infrastructure container of existing unique infrastructure containers is a number of instances in which a particular container type that is unique for each unique infrastructure container has been utilized. In response to both determining that the count for one unique infrastructure container is equal to or greater than a specified threshold and determining that a popular infrastructure container does not exist within a central repository that stores the existing unique infrastructure containers, the new restore container is created within the central repository by determining a most similar container of the existing restore containers whose software stack content matches, in part, software content in a first software stack of the popular infrastructure container more closely than does software content in the software stack of any other existing restore container. 1. A method for creating a new restore container , said method comprising:determining, by one or more processors of a computer system, a count for each unique infrastructure container of a plurality of existing unique infrastructure containers, wherein the count for each unique infrastructure container is a number of instances in which a particular container type that is unique for each unique infrastructure container has been utilized, wherein the count for one unique infrastructure container of the plurality of existing unique infrastructure containers is equal to or greater than a specified threshold, wherein the one unique infrastructure container is designated as a popular infrastructure container due to the count for the one unique infrastructure container being equal to or greater than the specified threshold, and wherein the popular infrastructure container comprises a first software stack that includes a first operating system, a first application, and a first data protection software, and wherein ...

Подробнее
20-02-2020 дата публикации

LAYERING A DISTRIBUTED STORAGE SYSTEM INTO STORAGE GROUPS AND VIRTUAL CHUNK SPACES FOR EFFICIENT DATA RECOVERY

Номер: US20200057701A1
Принадлежит:

Technology is disclosed for storing data in a distributed storage system using a virtual chunk service (VCS). In the VCS based storage technique, a storage node (“node”) is split into multiple VCSs and each of the VCSs can be assigned a unique ID in the distributed storage. A set of VCSs from a set of nodes form a storage group, which also can be assigned a unique ID in the distributed storage. When a data object is received for storage, a storage group is identified for the data object, the data object is encoded to generate multiple fragments and each fragment is stored in a VCS of the identified storage group. The data recovery process is made more efficient by using metadata, e.g., VCS to storage node mapping, storage group to VCS mapping, VCS to objects mapping, which eliminates resource intensive read and write operations during recovery. 1. A method comprising:identifying a first set of virtual chunk spaces assigned to a first data storage node of a distributed storage system, wherein a plurality of virtual chunk spaces across the distributed storage system includes the first set of virtual chunk spaces;reassigning the first set of virtual chunk spaces to a second data storage node of the distributed storage system;identifying a first set of fragments of a first set of data objects that were stored to the first set of virtual chunk spaces when assigned to the first data storage node; andwriting the first set of fragments to the first set of virtual chunk spaces at the second data storage node.2. The method of claim 1 , further comprising:recovering the first set of fragments according to an erasure coding method used by the distributed storage system.3. The method of claim 1 , further comprising:determining that the first data storage node has failed.4. The method of claim 1 , wherein the reassigning is based on determining that the first data storage node has failed.5. The method of claim 1 , wherein the reassigning comprises:updating mappings between a ...

Подробнее
02-03-2017 дата публикации

MONITORING VIRTUAL MACHINES FOR ALERT CONDITIONS

Номер: US20170060718A1
Принадлежит:

Methods and systems may provide for detecting an event external to a plurality of virtual machines running on one or more physical machines and determining that the event corresponds to one or more error conditions associated with at least one particular virtual machine in the plurality of virtual machines. Additionally, an alert may be generated in response to at least one of the one or more error conditions. In one example, detecting the event includes detecting an emulated device interrupt associated with the at least one particular virtual machine. 1. A system to monitor virtual machines , comprising:a processor; anda computer readable storage medium having program instructions embodied therewith, the program instructions executable by the processor to cause the system to:detect an event external to a plurality of virtual machines running on one or more physical machines;identify at least one particular virtual machine in the plurality of virtual machines based on the event, wherein the event is to be detected as an emulated device interrupt associated with the at least one particular virtual machine and the emulated device interrupt is to include one or more of an activation of a hardware speaker or an activation of a serial port;determine that the event corresponds to one or more error conditions associated with the at least one particular virtual machine; andgenerate an alert in response to at least one of the one or more error conditions.2. The system of claim 1 , wherein the alert is to be generated via a user interface.3. The system of claim 2 , wherein the user interface is to be associated with at least one of the one or more physical machines.4. The system of claim 2 , wherein the user interface is to be associated with a remote device.5. A computer program product to monitor virtual machines claim 2 , the computer program product comprising a computer readable storage medium having program instructions embodied therewith claim 2 , the program ...

Подробнее
04-03-2021 дата публикации

ACCESS ARBITRATION TO A SHARED CACHE STORAGE AREA IN A DATA STORAGE MANAGEMENT SYSTEM FOR LIVE BROWSE, FILE INDEXING, BACKUP AND/OR RESTORE OPERATIONS

Номер: US20210064486A1
Принадлежит:

A cache storage area stores key data blocks, usually metadata, used in live browse, file indexing, and/or file restore operations, which can avoid retrieving data on demand from backup copies. An illustrative shared data storage resource hosts the cache storage area, which is subdivided into virtual disk-specific caches, each one accompanied by a respective cache-specific index. A media agent acting as cache arbitrator manages access to the various caches. The cache arbitrator grants to other media agents in the system temporary ownership of particular caches, thereby facilitating parallel usage among the caches by different media agents. By enabling parallelism and a shared cache storage environment, these embodiments improve overall operational performance and add resiliency to the system as a whole. The cache arbitrator media agent is specially appointed to the role by a storage manager that generally manages storage operations throughout the illustrative data storage management system. 1. A computer-implemented method for arbitrating access to a shared cache storage area associated with a data storage management system managed by a storage manager component , the method comprising: 'wherein the first cache file is configured at a shared data storage resource that is accessible to a plurality of media agents in the data storage management system, including the first media agent and the second media agent;', 'by a first media agent designated a cache arbitrator by the storage manager, receiving a request from a second media agent to access a first cache file associated with a backup copy of a first virtual disk of a virtual machine,'}by the first media agent, based on determining that a third media agent, distinct from the second media agent, has ownership of the first cache file, requesting ownership over the first cache file from the third media agent;by the third media agent, based on determining that the first cache file is in use by a job being performed by ...

Подробнее
04-03-2021 дата публикации

SMART FILE LEVEL RESTORE WITH RP4VM

Номер: US20210064487A1
Автор: Shemer Jehuda, Solan Alex
Принадлежит:

A method, apparatus, and system for recreating a file that corresponds to a specified point in time (PiT) in a data storage system is disclosed. The particular PiT and the name of the file to be restored may be received from a user. A file system inode structure corresponding to the particular PiT may be recreated based on an inode event stream stored in a journal. One or more disk locations associated with the file to be restored may be determined based on the inode structure corresponding to the particular PiT. A temporary file may be constructed with data read from the one or more disk locations in a storage system of the backup site. Thereafter, the file to be restored may be obtained, which may comprise rolling back data of the temporary file to the particular PiT based on a data stream stored in the journal. 1. A computer-implemented method , comprising:receiving a particular point in time (PiT) and a name of a file to be restored that corresponds to the particular PiT;recreating a file system inode structure corresponding to the particular PiT based on an inode event stream stored in a journal at a backup site;determining one or more disk locations associated with the file to be restored corresponding to the particular PiT based on the file system inode structure corresponding to the particular PiT;constructing a temporary file with data corresponding to a current time read from the one or more disk locations in a storage system of the backup site; andobtaining the file to be restored, comprising rolling back data of the temporary file from the current time to the particular PiT based on a data stream stored in the journal at the backup site.2. The method of claim 1 , wherein the inode event stream stored in the journal at the backup site comprises a plurality of inode events captured by a file system agent in a virtual machine (VM) at a production site and transmitted over time from the production site to the backup site for journaling.3. The method of claim ...

Подробнее
17-03-2022 дата публикации

METHOD OF USING A SINGLE CONTROLLER (ECU) FOR A FAULT-TOLERANT/FAIL-OPERATIONAL SELF-DRIVING SYSTEM

Номер: US20220080992A1
Принадлежит:

In a self-driving autonomous vehicle, a controller architecture includes multiple processors within the same box. Each processor monitors the others and takes appropriate safe action when needed, Some processors may run dormant or low priority redundant functions that become active when another processor is detected to have failed. The processors are independently powered and independently execute redundant algorithms from sensor data processing to actuation commands using different hardware capabilities (GPUs, processing cores, different input signals, etc.). Intentional hardware and software diversity improves fault tolerance. The resulting fault-tolerant/fail-operational system meets ISO26262 ASIL-D specifications based on a single electronic controller unit platform that can be used for self-driving vehicles. 1. A control system comprising:a first sensor,a second sensor,a third sensor,at least one input bus connected to the first, second and third sensors,an electronic controller comprising a first processor, a second processor and a third processor each coupled to the at least one input bus,wherein the first, second and third processors each independently process signals from the at least one input bus to provide control signals,the first processor providing first control signals in response to a first combination of the first, second and third sensors,the second processor providing second control signals in response to a second combination of the first, second and third sensors different from the first combination,the third processor providing third control signals in response to a third combination of the first, second and third sensors different from at least one of the first combination and different from the second combination, andan intelligent control signal arbitrator that receives the first, second and third control signals and arbitrates between them to perform at least one control function.2. The system of wherein the third processor is configured to ...

Подробнее
04-03-2021 дата публикации

Disaster Recovery of Cloud Resources

Номер: US20210067402A1
Автор: Pogrebinsky Vladimir
Принадлежит:

Embodiments of the present invention are directed to methods by which different services registered with cloud infrastructure may recover in case of disaster. Also directs procedures with which a resource provider may recover and rebuild its cloud resource information by scanning actual resources available. A resource provider will synchronize resources with a central service to get updated consumer and subscription information. In the scenario in which a central service fails and is recovered from backup, the central service should synchronize with resource providers to update its resource information. 1. A method for recovering from a failure of a resource provider within a distributed computer network , the method being performed by the resource provider , the method comprising:registering the resource provider with a central service;associating resources on the distributed computer network with specific information that uniquely identifies the resources and enables the resource provider to determine resource owners; and scanning the resources and the specific information that is associated with the resources;', 'recreating metadata records in a metadata store based at least in part on the specific information;', 'synchronizing the resources with the central service to obtain updated subscription information from the central service; and', 'updating subscription information in the metadata records based at least in part on the updated subscription information obtained from the central service., 'in response to the failure of the resource provider2. The method of claim 1 , wherein the specific information that is associated with a particular resource enables a metadata record corresponding to the particular resource to be recreated.3. The method of claim 1 , further comprising:detecting that at least one recreated metadata record violates a business rule; andmarking the at least one recreated metadata record for manual action.4. The method of claim 1 , further ...

Подробнее
17-03-2022 дата публикации

OPTIMIZED DOCUMENT BACKUP TO CLOUD-BASED OBJECT STORE

Номер: US20220083427A1
Принадлежит:

Storing documents in an object store in the cloud by creating a container for the documents, defining a document record including unique document ID and an index. A backup record for every backup includes a timestamp for each backup, and a bitmask for each document in the container has a single bit position for each document to indicate the corresponding document as unchanged or that it has been changed/deleted. Each bit location in the bitmask is referenced by the index in the document record. Large documents have a multi-part record identifying the containers. During point-in-time recovery, containers that match a given timestamp are found, and documents where the bitmask bit is set are restored. 1. A computer-implemented method of storing documents in an object store of a cloud network , comprising:creating a container for the documents;defining a document record for each document, which includes a unique document ID and an index;defining a backup record of the container for every backup in a series of backups, which includes a timestamp for each backup, and a bitmask for each document in the container, wherein the bitmask has a single bit position for each document in the container which is set to a first binary value to indicate that the corresponding document is unchanged and a second binary value indicates the document is changed or deleted for a backup;referencing each specific bit location in the bitmask by the index in the document record;finding, during a point-in-time recovery operation, containers from the backup record that match a given timestamp; andrestoring documents in each container where the bitmask bit is set to the first binary value.2. The method of wherein the container is a write-once object that will not be modified or copied as part of a data protection process for the documents stored therein.3. The method of wherein the document is a large document too large to be stored in a single container claim 1 , the method further comprising: ...

Подробнее
28-02-2019 дата публикации

ENCODING METHOD AND A MEMORY STORAGE APPARATUS USING THE SAME

Номер: US20190065307A1
Принадлежит: WINBOND ELECTRONICS CORP.

An encoding method for a memory storage apparatus adopting a Lien ECC scheme is provided. The memory storage apparatus comprises an ECC encoder using a Lien Code. The encoding method includes: receiving a first data or a second data which is one's complement of the first data; and performing an encoding operation based on the Lien Code by the ECC encoder. The encoding operation includes: if the first data is received, generating a first codeword according to the first data; and if the second data is received, generating a second codeword which is one's complement of the first codeword according to the second data. In addition, a memory storage apparatus using the encoding method based on the Lien Code is also provided. 1. An encoding method for a memory storage apparatus adopting a Lien ECC scheme , comprising:receiving a first data or a second data, wherein the second data is one's complement of the first data; andperforming an encoding operation based on a Lien Code by an ECC encoder, wherein the memory storage apparatus comprises the ECC encoder using the Lien Code, wherein the encoding operation comprises:if the first data is received, generating a first codeword according to the first data; andif the second data is received, generating a second codeword according to the second data, wherein the second codeword is one's complement of the first codeword.2. The encoding method as claimed in claim 1 , wherein generating the first codeword according to the first data comprises:calculating a first parity data of the first data based on the Lien Code by the ECC encoder; andcombing the first parity data and the first data to generate the first codeword, and wherein generating the second codeword according to the second data comprises:calculating a second parity data of the second data based on the Lien Code by the ECC encoder; andcombing the second parity data and the second data to generate the second codeword.3. The encoding method as claimed in claim 2 , wherein ...

Подробнее
08-03-2018 дата публикации

Virtual machine backup

Номер: US20180067816A1
Принадлежит: International Business Machines Corp

A computer system comprises a processor unit arranged to run a hypervisor running one or more virtual machines; a cache connected to the processor unit and comprising a plurality of cache rows, each cache row comprising a memory address, a cache line and an image modification flag; and a memory connected to the cache and arranged to store an image of at least one virtual machine. The processor unit is arranged to define a log in the memory and the cache further comprises a cache controller arranged to set the image modification flag for a cache line modified by a virtual machine being backed up, but not for a cache line modified by the hypervisor operating in privilege mode; periodically check the image modification flags; and write only the memory address of the flagged cache rows in the defined log.

Подробнее
08-03-2018 дата публикации

STORAGE POLICY-BASED AUTOMATION OF PROTECTION FOR DISASTER RECOVERY

Номер: US20180067827A1
Принадлежит:

Exemplary methods, apparatuses, and systems include a recovery manager receiving selection of a storage profile to be protected. The storage profile is an abstraction of a set of one or more logical storage devices that are treated as a single entity based upon common storage capabilities. In response to the selection of the storage profile to be protected, a set of virtual datacenter entities associated with the storage profile is added to a disaster recovery plan to automate a failover of the set of virtual datacenter entities from a protection site to a recovery site. The set of one or more virtual datacenter entities includes one or more virtual machines, one or more logical storage devices, or a combination of virtual machines and logical storage devices. The set of virtual datacenter entities is expandable and interchangeable with other virtual datacenter entities. 1. A computer-implemented method , comprising:receiving selection of a storage profile to be protected, wherein the storage profile is an abstraction of a set of one or more logical storage devices that are treated as a single entity based upon common storage capabilities; andadding, in response to the selection of the storage profile to be protected, a set of virtual datacenter entities associated with the storage profile to a disaster recovery plan to automate a failover of the set of virtual datacenter entities from a protection site to a recovery site, wherein the set of one or more virtual datacenter entities includes one or more virtual machines, one or more logical storage devices, or a combination of virtual machines and logical storage devices, and wherein the set of virtual datacenter entities is expandable and interchangeable with other virtual datacenter entities.2. The computer-implemented method of claim 1 , further comprising:receiving notification of a change to the set of virtual datacenter entities associated with the storage profile;determining an updated set of one or more ...

Подробнее
08-03-2018 дата публикации

HEALING CLOUD SERVICES DURING UPGRADES

Номер: US20180067830A1
Принадлежит:

Embodiments described herein are directed to migrating affected services away from a faulted cloud node and to handling faults during an upgrade. In one scenario, a computer system determines that virtual machines running on a first cloud node are in a faulted state. The computer system determines which cloud resources on the first cloud node were allocated to the faulted virtual machine, allocates the determined cloud resources of the first cloud node to a second, different cloud node and re-instantiates the faulted virtual machine on the second, different cloud node using the allocated cloud resources. 1. A computer system comprising:one or more processors; determining that a virtual machine running on a first cloud node is in a faulted state;', 'determining computing and network resources that were allocated to the virtual machine in the faulted state', 'obtaining a set of constraints by combining information based on the determined computing and network resources and model of service established for a user of the virtual machine in the faulted state;', 'in order to reduce time to heal in response to the faulted state as well as more rapidly notifying service instances of any topology changes, using the set of constraints to perform an incremental allocation process for only instances of the determined computing and network resources that need migration rather than migrating all the determined computing and network resources; and', 're-instantiating the virtual machine in the faulted state on a virtual machine at a second, different cloud node using only the instances of the determined computing and network resources that need migration in accordance with the set of constraints used to perform the incremental allocation process., 'one or more computer-readable storage media having stored thereon computer-executable instructions that, when executed by the one or more processors, causes the computing system to perform a method for migrating affected services away ...

Подробнее
08-03-2018 дата публикации

SYSTEMS AND METHODS TO IDENTIFY UNPROTECTED VIRTUAL MACHINES

Номер: US20180067955A1
Принадлежит:

Virtualization sprawl can lead to virtual machines with no designated periodic backup. If the data associated with these unprotected virtual machines is not backed up, it cannot be restored if needed, leading to system failures. A data storage system identifies and protects the unprotected virtual machines. For instance, the system compares a list of virtual machines with a list of computing devices having a designated backup policy in the data storage system and determines which of the virtual machines are unprotected. The system further automatically categorizes the unprotected virtual machines, identifies those unprotected virtual machines that remain uncategorized, and applies a default backup policy to the uncategorized and unprotected virtual machines to provide protected virtual machines. 1. A method to identify virtual machine backup policies in a data management system , the method comprising:monitoring a first plurality of client devices that are physical machines that generate primary data stored on one or more primary storage devices;monitoring a second plurality of client devices that are virtual machines that generate primary data stored on one or more primary storage devices;directing one or more media agents to perform at least one data protection operation that copies the primary data stored on one or more primary storage devices to create secondary data stored on one or more secondary storage devices, the at least one data protection operation converts the primary data from a native format to secondary data in a backup format wherein the backup formal is different than the native format;determining which of the first and second plurality of client devices are virtual machines, by automatically requesting with one or more computer processors a first list of virtual machines in a data management system from virtual machine management software;receiving the first list of the virtual machines in the data management system in response to the request; ...

Подробнее
29-05-2014 дата публикации

METHOD AND SYSTEM FOR FREQUENT CHECKPOINTING

Номер: US20140149792A1
Принадлежит: VMWARE, INC.

A virtualization platform provides fault tolerance for a primary virtual machine by continuously transmitting checkpoint information of the primary virtual machine to a collector process, such as a backup virtual machine. When implemented on a hardware platform comprising a multi-processor that supports nested page tables, the virtualization platform leverages the nested page table support to quickly identify memory pages that have been modified between checkpoints. The backup virtual machine provides feedback information to assist the virtualization platform in identifying candidate memory pages for transmitting actual modifications to the memory pages rather than the entire memory page as part of the checkpoint information. The virtualization platform further maintains a modification history data structure to identify memory pages that can be transmitted simultaneous with the execution of the primary virtual machine rather than while the primary virtual machine has been stunned. 1. A method of transmitting modifications made to a memory page of a running virtual machine during a time interval , the method comprising:computing a difference value for the memory page, the difference value quantifying changes made to the memory page during the time interval; andtransmitting either the changes to the memory page or the entire memory page based on the difference value.2. The method of claim 1 , further comprising:comparing the difference value with a threshold value; andtransmitting the changes to the memory page if the difference value is less than the threshold value.3. The method of claim 1 , further comprising:comparing the difference value with a threshold value; andtransmitting the entire memory page if the difference value is greater than the threshold value.4. The method of claim 1 , further comprising:stunning the running virtual machine at the end of the time interval prior to the computing step; andresuming execution of the running virtual machine prior to ...

Подробнее