Patent classifications
G06F11/1415
Recovery via backups of recovery information
An example computing device includes a controller to control operation of a firmware subsystem of the computing device. The controller is separate from a main processor of the computing device. A memory stores subsystem data that is useable by the controller. The subsystem data includes recovery information executable by the controller to initiate recovery of the subsystem. The computing device further includes recovery coordination instructions. The recovery coordination instructions determine integrity of the recovery information as stored on the memory and. In response to determining that the recovery information lacks integrity, the recovery coordination instructions initiate recovery of the firmware subsystem using a backup of the recovery information and perform recovery of the firmware subsystem using an update to the firmware subsystem.
AUTOMATED OPERATIONS MANAGEMENT FOR COMPUTER SYSTEMS
Techniques are disclosed relating to automated operations management. In various embodiments, a computer system accesses operational information that defines commands for an operational scenario and accesses blueprints that describe operational entities in a target computer environment related to the operational scenario. The computer system implements the operational scenario for the target computer environment. The implementing may include executing a hierarchy of controller modules that include an orchestrator controller module at top level of the hierarchy that is executable to carry out the commands by issuing instructions to controller modules at a next level. The controller modules may be executable to manage the operational entities according to the blueprints to complete the operational scenario. In various embodiments, the computer system includes additional features such as an application programming interface (API), a remote routing engine, a workflow engine, a reasoning engine, a security engine, and a testing engine.
Auto-upgrade of remote data management connectors
Methods and systems for automatically upgrading or synchronizing a remote data management agent running on a remote host machine (e.g., a hardware server) to a particular version that is in-sync with a corresponding version used by a cluster of data storage nodes controlling the remote data management agent are described. The remote agent may be initially installed on the remote host and subsequent updates to the remote agent may be performed using the remote agent itself without requiring intervention by the remote host. The remote agent may comprise a backup agent and a bootstrap agent that are each exposed in different network ports or associated with different port numbers or networking addresses. The backup agent may perform data backup related tasks for backing up files stored on the remote host and the bootstrap agent may perform upgrade related tasks for upgrading the backup agent.
Storage system and method for data recovery after detection of an uncorrectable error
A storage system caches, in volatile memory, data read from non-volatile memory. After detecting an uncorrectable error in the data cached in the volatile memory, the storage system replaces the cached data with data re-read from the non-volatile memory and updated to reflect any changes made to the data after it was stored in the non-volatile memory. The storage system can also analyze a pattern in data adjacent to the uncorrectable error and predict corrected data based on the pattern.
SYSTEMS AND METHODS FOR HOST IMAGE TRANSFER
Methods and systems for transferring a host image of a first machine to a second machine, such as during disaster recovery or migration, are disclosed. In one example, a first profile of a first machine of a first type is compared to a second profile of a second machine of a second type different from the first type, to which the host image is to be transferred. The first and second profiles each comprise at least one property of the first type of first machine and the second type of second machine, respectively. At least one property of a host image of the first machine is conformed to at least one corresponding property of the second machine. The conformed host image is provided to the second machine, via a network. The second machine is configured with at least one conformed property of the host image.
Hang Detection and Remediation in a Multi-Threaded Application Process
Detecting non-callable external component APIs is provided. It is determined whether a first function call stack of a worker thread in a multi-threaded application of the computer matches a second function call stack of the worker thread. In response to determining that the first function call stack matches the second function call stack of the worker thread, an external component application programming interface (API) corresponding to the worker thread is identified from a function call stack of the worker thread. The external component API corresponding to the worker thread is marked as non-callable in an API state map. The worker thread is marked as being in a hang state. The worker thread in the hang state is terminated as a remediation action step to maintain performance.
Memory system re-performing access operation and operating method thereof
A memory system includes a memory device; and a controller configured to transmit a target address to the memory device for performing an access operation, receive from the memory device a reference address at which the access operation has been performed, and selectively re-perform the access operation based on the reference address. The controller re-performs the access operation when the reference address is different from the target address.
Data integrity protection
The integrity of transmitted data can be protected by causing that data to be transmitted twice, and calculating protection information (PI) for the data from each transmission. The PI can include information such as a checksum or signature that should have the same value if the data from each transmission is the same. If the PI values are not the same, an error handling procedure can be activated, such as may retry the transmission. For write operations, the data can be transmitted twice from a source to a storage destination, while for read operations, the data can be transmitted to a recipient then sent back from the recipient to the storage device, with PI calculated for each transmission. A component such as a storage processor can perform at least this comparison step. Such approaches can also be used for network transmission or high performance computing.
SYSTEM AND METHOD FOR EXTRACTING AND CATALOGING SPECIFIED FILE ACTIVITY DATA
A system for use in restoring data processing capabilities in the event of an interruption. System including a user catalog program that when executed by a processor configures the system to store indexes of data utilized by the system, a system management facility (SMF) program that when executed by the processor configures the system to create SMF audit records that track the catalog activity as SMF data, and a virtual catalog program that when executed by the processor configures the system to intercept portions of the SMF data over a timeline. The portions correspond to the creation, deletion and modification of the data files, and catalog the intercepted portions of SMF data over the timeline.
WORKFLOWS FOR AUTOMATED OPERATIONS MANAGEMENT
Techniques are disclosed relating to automated operations management. In various embodiments, a computer system accesses operational information that defines commands for an operational scenario and accesses blueprints that describe operational entities in a target computer environment related to the operational scenario. The computer system implements the operational scenario for the target computer environment. The implementing may include executing a hierarchy of controller modules that include an orchestrator controller module at top level of the hierarchy that is executable to carry out the commands by issuing instructions to controller modules at a next level. The controller modules may be executable to manage the operational entities according to the blueprints to complete the operational scenario. In various embodiments, the computer system includes additional features such as an application programming interface (API), a remote routing engine, a workflow engine, a reasoning engine, a security engine, and a testing engine.