Patent classifications
G06F3/0662
Methods and systems for securely and efficiently clustering distributed processes using a consistent database
Certain embodiments described relate to methods and systems for adding one or more nodes to a first cluster including a first node in a computer system. A method performed by the first node comprises retrieving a first cluster configuration associated with the first cluster from a distributed database through a first database server (DBS) and creating a second cluster configuration using the first cluster configuration and information received from a second node as part of a request to join the first cluster. The method further comprises populating a first one or more local trust stores of a first one or more processes executing on the first node with a second one or more security certificates of a second one or more processes executing on the second node. The method further comprises writing the second cluster configuration to the distributed database and returning the second cluster configuration to the second node.
Fabric attached storage
Technology is described for a profile-based lifecycle management for data storage servers. The technology can receive a profile, monitor events emitted by devices of the data storage system, determine based on the monitored events that a device of the storage system matches the indicated condition, and perform the action corresponding to the indicated condition, wherein the action includes managing data stored by the data storage system. The received profile can indicate a condition and an action corresponding to the condition.
MANAGING OWNERSHIP TRANSFER OF FILE SYSTEM INSTANCE IN VIRTUALIZED DISTRIBUTED STORAGE SYSTEM
Example implementations relate to managing ownership transfer of a file system instance in a virtualized distributed storage system. The virtualized distributed storage system includes a first node having a first virtual controller that acts as an owner of a file system instance in a distributed storage, and a second node having a second virtual controller coupled to the first node over a network. A failure condition associated with a first node is detected. Further, in response to detection of the failure condition, an ownership of the file system instance may be transferred from the first virtual controller to the second virtual controller no later than an IP address switchover of the first virtual controller.
Data storage system binding virtual volumes to host-specific protocol endpoints
Data storage systems of a cluster associate virtual volumes (VVols) with protocol endpoints (PEs) organized into host-specific initiator groups. From the perspective of the hosts, the PEs are specialized SCSI LUNs that aggregate the VVols bound thereto. In operation, a host directs VVol access requests to the host-specific PEs, and a data storage system processes the VVol requests as received via the corresponding PEs.
PASID BASED ROUTING EXTENSION FOR SCALABLE IOV SYSTEMS
Methods and apparatus for PASID-based routing extension for Scalable IOV systems. The system may include a Central Processing Unit (CPU) operatively coupled to a scalable Input/Output Virtualization (IOV) device via an in-line device such as a smart controller or accelerator. A Control Process Address Space Identifier (C-PASID) associated with a first memory space is implemented in an Assignable Device Interface (ADI) for the IOV device. The ADI also implements a Data PASID (D-PASID) associated with a second memory space in which data are stored. The C-PASID is used to fetch a descriptor in the first memory space and the D-PASID is employed to fetch data in the second memory space. A hub embedded on the in-line device or implemented as a discrete device is used to steer memory access requests and/or fetches to the CPU or to the in-line device using the C-PASID and D-PASID. IOV devices include multi-PASID helper devices and off-the-shelf devices such as NICs with modified ADIs to support C-PASID and D-PASID usage.
MEMORY PROTECTION IN VIRTUALIZED COMPUTER SYSTEMS USING SHADOW PAGE TABLES
Aspects of the disclosure provide for mechanisms for memory protection of virtual machines in a computer system. A first host page table and a second host page table is generated by a processing device running a hypervisor in view of a guest page table associated with a virtual machine. The first host page table includes a first mapping corresponding to a privileged page of a guest memory and a second mapping corresponding to an unprivileged page of the guest memory. The second host page table includes a third mapping corresponding to the unprivileged page of the guest memory. The first host page table is associated with the virtual machine. In response to detecting a transition from a first guest mode to a second guest mode by the virtual machine, the virtual machine is associated with the second page table.
DATA VALIDITY TRACKING IN A NON-VOLATILE MEMORY
A computer device reads an indicator from a configuration file that identifies a granularity of units of data at which to track validity. The granularity is one of a plurality of granularities ranging from one unit of data to many units of data. The computer device generates a machine-readable file configured to cause a processing device of a memory system to track validity at the identified granularity using a plurality of data validity counters with each data validity counter in the plurality of data validity counters tracking validity of a group of units of data at the identified granularity. The computer device transfers the machine-readable file to a memory of the memory system.
STORAGE CONTROL APPARATUS AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM FOR STORING STORAGE CONTROL PROGRAM
A storage control apparatus configured to be coupled to a redundant configuration including a first and second storage devices, the storage control apparatus includes: a memory; and processing circuitry coupled to the memory, the processing circuitry being configured to execute a first processing that includes dealing with access to any of the first and second storage devices from a higher-level apparatus; and execute a second processing that includes converting an access destination of the access such that each same physical position in the first and second storage devices corresponds to a first logical address for a first storage device and a second logical address for the second storage device, the first logical address being a logical address different from the second logical address.
APPLICATION AND INFORMATION PROCESSING APPARATUS
An information processing apparatus includes a processor and a memory storing instructions. Executing the instructions by the processor causes the processor to perform operations. A virtual device on the information processing apparatus to transmit a print job to an image forming apparatus is selected. A user interface is displayed that is for activating, in accordance with the selected virtual device and among one or more applications to provide an additional function to the image forming apparatus, an application that corresponds to a model of the image forming apparatus to which the selected virtual device transmits the print job.
Determining capacity utilization in a deduplicating storage system
Attributing consumed storage capacity among entities storing data in a storage array includes: identifying a data object stored in the storage array and shared by a plurality of entities, where the data object occupies an amount of storage capacity of the storage array; and attributing to each entity a fractional portion of the amount of storage capacity occupied by the data object.