G06F11/0712

Methods, apparatuses and systems for providing forensics to manage containers
11586521 · 2023-02-21 · ·

A method, apparatus and system for providing process-level forensics for a plurality of application containers includes for each of the plurality of application containers; monitoring forensics information of the application container, encoding the monitored forensics information using an encoder of a predetermined encoder/decoder pair to determine a forensics model, decoding the forensics model to determine a reconstructed representation of the forensics information, comparing the reconstructed representation of the forensics information to the monitored forensics information to determine an error and comparing the error to a threshold to determine if an error above the threshold exists. If the error is below the threshold, the forensics model is communicated to a higher-level manager to be used for higher-level management. If the error is above the threshold, the monitored forensics information of the application container is also communicated to the higher-level manager. The predetermined encoder/decoder pair is determined using an autoencoding process.

Automated disaster recovery test verification

A Disaster Recovery (DR) verification process or system verifies readiness to execute a Disaster Recovery (DR) test. Such DR verification is automatically provided on a regular basis, with minimum impact on both a production and recovery environment. However, DR verification is only enabled at a time when no disaster recovery or DR testing of other sites is already under way. Configuration data needed for DR verification is constantly replicated from production to recovery, by dedicated data movers. DR verification allocates and configures recovery resources in an encapsulated environment, confirms successful their instantiation (such as boot up and network connections), and reports the outcome.

Live migrating virtual machines to a target host upon fatal memory errors
11586513 · 2023-02-21 · ·

The disclosed technology provides techniques, systems, and apparatus for containing and recovering from uncorrectable memory errors in distributed computing environment through migration of virtual machines and associated memory to a target host machine. An aspect of the disclosed technology includes a hypervisor or virtual machine manager that receives signaling of an uncorrectable memory error detected by a host machine. The virtual machine manager then uses information received via the signaling to identify virtual memory addresses or memory pages associated with the corrupted memory element so as to allow for containment and recovery from the error, and for live migration of the virtual machine.

Systems and method for continuous data protection and recovery by implementing a set of algorithms based on the length of I/O data streams

Example embodiments relate generally to systems and methods for continuous data protection (CDP) and more specifically to an input and output (I/O) filtering framework and log management system to seek a near-zero recovery point objective (RPO).

Providing alternate resource deployment guidance for use with cloud services

The present disclosure relates to devices, methods, and computer-readable medium for providing recommendations for alternate resources to use for cloud services. The devices, methods, and computer-readable medium may receive a resource allocation request for a new resource of a computing system and may predict an occurrence of a capacity related allocation for the resource allocation request. The devices, methods, and computer-readable medium may identify alternate resources to use for the resource allocation request and may provide recommendations with the alternate resources.

PROVIDING ALTERNATE RESOURCE DEPLOYMENT GUIDANCE FOR USE WITH CLOUD SERVICES

The present disclosure relates to devices, methods, and computer-readable medium for providing recommendations for alternate resources to use for cloud services. The devices, methods, and computer-readable medium may receive a resource allocation request for a new resource of a computing system and may predict an occurrence of a capacity related allocation for the resource allocation request. The devices, methods, and computer-readable medium may identify alternate resources to use for the resource allocation request and may provide recommendations with the alternate resources.

Automatic Application of Software Updates to Container Images Based on Dependencies
20230091915 · 2023-03-23 ·

Automatic application of software patches to software associated with container images based upon image relationships in a dependency tree. The computing device determines whether software associated with a base container image requires software patches. The computing device accesses dependency trees maintaining image relationships between the base container image and dependent container images. The computing device determines based upon the accessed one or more dependency trees whether the base container image has dependent container images derived from the base container image. The computing device applies software patches to the software associated with the base container image. The computing device rebuilds the base container image with the applied software patches. The computing device then rebuilds the dependent container images dependent upon the rebuilt base container image.

MEMORY PAGE FAULT HANDLING FOR NETWORK INTERFACE DEVICES IN A VIRTUALIZED ENVIRONMENT
20220350694 · 2022-11-03 ·

Systems and methods for supporting memory page fault handling for network devices are disclosed. In one implementation, a processing device may receive, at a network interface device of a host computer system, an incoming packet from a network. The processing device may also select a first buffer from a plurality of buffers associated with a receiving queue of the network interface device. The processing device may attempt to store the incoming packet at the first buffer of the plurality of buffers. Responsive to receiving a notification that attempting to store the incoming packet at the first buffer encountered a page fault, the processing device may assign the first buffer to a wait queue of the network interface device. The processing device may further store the incoming packet at a second buffer of the plurality of buffers associated with the receiving queue.

Systems and methods for continuous data protection comprising storage of completed I/O requests intercepted from an I/O stream using touch points

Example embodiments relate generally to systems and methods for continuous data protection (CDP) and more specifically to an input and output (I/O) filtering framework and log management system to seek a near-zero recovery point objective (RPO).

Adjusting Error Encoding Parameters for Writing Encoded Data Slices

A method includes writing sets of encoded data slices to storage units of a storage network in accordance with error encoding parameters, where for a set of encoded data slices, the error encoding parameters include an error coding number and a decode threshold number, the error coding number indicates a number of encoded data slices that results when a data segment is encoded using an error encoding function and the decode threshold number indicates a minimum number needed to recover the data segment. The method further includes monitoring processing of the writing the sets of encoded data slices to produce write processing performance information. When the write processing performance information compares unfavorably to a desired write performance range, the method further includes adjusting at least one of the error coding number and the decode threshold number to produce adjusted error encoding parameters for writing subsequent encoded data slices.