G06F11/301

Method and system for determining maturity level of a cloud computing service

Systems and methods are disclosed that evaluate maturity or readiness of services of a cloud infrastructure client instance. Service maturity may be defined based on certain predetermined maturity criteria, which may evaluate certain corresponding service parameters of the service, such as a software component status of a service, a hardware component status of the service, and/or an error status of the service. In some embodiments, the definition of service maturity may be customized by a user. For example, the user may adjust, add, or remove the maturity criteria. The systems and methods may determine the service parameters of the service, and determine the maturity of the service by applying the maturity criteria to the determined service parameters. The service maturity may then be output (e.g., displayed or sent) to the user.

METHOD AND SYSTEM FOR DEPLOYING INTELLIGENT EDGE CLUSTER MODEL
20230058310 · 2023-02-23 ·

The present disclosure relates to a method for deploying an intelligent edge cluster model includes checking an application requirement and a key performance indicator at a first edge node, dynamically assigning a first resource from the resources in the virtual resource pool of the intelligent edge cluster model to the first edge node, instructing a command to another edge node to assign one or more resources to the first edge node. In particular, the intelligent edge cluster model includes edge nodes and master controller having corresponding one or more resources combined to form the virtual resource pool.

Resource management with dynamic resource policies

A method and apparatus of a device for resource management by using a hierarchy of resource management techniques with dynamic resource policies is described. The device terminates several misbehaving application programs when available memory on the device is running low. Each of those misbehaving application programs consumes more memory space than a memory consumption limit assigned to the application program. If available memory on the device is still low after terminating those misbehaving application programs, the device further sends memory pressure notifications to all application programs. If available memory on the device is still running low after sending the memory pressure notifications, the device further terminates background, idle, and suspended application programs. The device further terminates foreground application programs when available memory on the device is still low after terminating the background, idle, and suspended application programs.

Methods, apparatuses and systems for providing forensics to manage containers
11586521 · 2023-02-21 · ·

A method, apparatus and system for providing process-level forensics for a plurality of application containers includes for each of the plurality of application containers; monitoring forensics information of the application container, encoding the monitored forensics information using an encoder of a predetermined encoder/decoder pair to determine a forensics model, decoding the forensics model to determine a reconstructed representation of the forensics information, comparing the reconstructed representation of the forensics information to the monitored forensics information to determine an error and comparing the error to a threshold to determine if an error above the threshold exists. If the error is below the threshold, the forensics model is communicated to a higher-level manager to be used for higher-level management. If the error is above the threshold, the monitored forensics information of the application container is also communicated to the higher-level manager. The predetermined encoder/decoder pair is determined using an autoencoding process.

Live migrating virtual machines to a target host upon fatal memory errors
11586513 · 2023-02-21 · ·

The disclosed technology provides techniques, systems, and apparatus for containing and recovering from uncorrectable memory errors in distributed computing environment through migration of virtual machines and associated memory to a target host machine. An aspect of the disclosed technology includes a hypervisor or virtual machine manager that receives signaling of an uncorrectable memory error detected by a host machine. The virtual machine manager then uses information received via the signaling to identify virtual memory addresses or memory pages associated with the corrupted memory element so as to allow for containment and recovery from the error, and for live migration of the virtual machine.

Methods and systems for managing networked storage system resources

Methods and systems for a networked storage environment are provided. One method includes maintaining by a processor of a management console, a plurality of structured objects representing a plurality of resources in a networked storage system for storing and retrieving client data from a plurality of storage devices; receiving by the processor unstructured data from an application programming interface (API) associated with a resource of the networked storage system; parsing by the processor, the unstructured data and generating an identifier hash value based on uniquely identifying fields of the unstructured data for an unstructured object; and generating by the processor a logical index with a configuration index and a performance index for the unstructured object identified by the identifier hash value for responding to user requests for performance information regarding the unstructured object.

DETERMINING MIGRATIONS BETWEEN GEOGRAPHICALLY DISTRIBUTED DATA CENTERS
20220357869 · 2022-11-10 ·

Methods, apparatus, and processor-readable storage media for determining migrations between geographically distributed data centers are provided herein. An example computer-implemented method includes obtaining information associated with data centers that are geographically distributed relative to one another, wherein the information includes: information related to migration factors specific to the respective geographic location of each of the data centers and information related to a respective set of processes of each of the data centers; automatically generating a migration schedule based at least in part on the obtained information, wherein the migration schedule comprises one or more times for migrating at least one of the processes of a first one of the data centers to a second one of the data centers; and automatically triggering at least one migration of the at least one process between the data centers based at least in part on the migration schedule.

METADATA CONTROL IN A LOAD-BALANCED DISTRIBUTED STORAGE SYSTEM
20230099290 · 2023-03-30 ·

A plurality of computing devices are communicatively coupled to each other via a network, and each of the plurality of computing devices is operably coupled to one or more of a plurality of storage devices. A plurality of failure resilient address spaces are distributed across the plurality of storage devices such that each of the plurality of failure resilient address spaces spans a plurality of the storage devices. The plurality of computing devices maintains metadata that maps each failure resilient address space to one of the plurality of computing devices. The metadata is grouped into buckets. Each bucket is stored in a group of computing devices. However, only the leader of the group is able to directly access a particular bucket at any given time.

Application aware backup of virtual machines

Systems and methods for performing application aware backups and/or generating other application aware secondary copies of virtual machines are described. For example, the systems and methods described herein may access a virtual machine, automatically discover various databases and/or applications (e.g., SQL, Exchange, Sharepoint, Oracle, and so on) running on the virtual machine, and perform data storage operations that generate a backup, or other secondary copy, of the virtual machine, as well as backups, or other secondary copies, of each of the discovered applications.

Virtual machine backup and restore coordinator

A backup and restore coordinator configured to receive a plurality of backup and restore requests from at least two uncoordinated backup functionalities implemented in a virtual environment, the virtual environment including a hypervisor hosting a plurality of virtual machines and a backup server. The backup and restore coordinator configured to extract respective information from the plurality of backup and restore requests including target data, backup resource information, and a type of request. The backup and restore coordinator configured to order the plurality of backup and restore requests in a prioritized queue based on the information extracted from the plurality of backup and restore requests.