Patent classifications
G06F11/1446
METHOD, ELECTRONIC DEVICE, AND COMPUTER PROGRAM PRODUCT FOR DATA PROCESSING
Embodiments of the present disclosure provide a method, an electronic device, and a computer program product for data processing. The method described herein includes determining identification information for an operation, wherein the identification information includes at least one field indicating content of the operation and a field indicating a unique identification of the operation. The method further includes identifying, based on the identification information, log entries for the operation in log files for at least one microservice invoked by the operation. The method further includes determining a log for the operation, wherein the log includes the identified log entries. With the solution for data processing of the present application, it is possible to easily acquire logs for an operation using identification information that includes a field indicating the content of the operation, so as to facilitate targeted analysis of the operation based on the content of the operation.
CONTINUOUS DATA PROTECTION IN CLOUD USING STREAMS
One example method includes performing a recovery operation. A recovery operation is performed using streams rather than volumes in the cloud and without using compute instances or servers for do data. Do data is written to a do stream. Occasionally, a compute instance power on reads data from the do stream. The do data ready from the do stream is applied to a cloud volume and a snapshot of the cloud volume is performed. The backups include discrete PiT backups and recovery can be performed to any of the discrete PiT backups.
Self-healing architecture for resilient computing services
For each respective virtual machine (VM) of a plurality of VMs, a distributed computing system generates a unique Application Binary Interface (ABI) for an operating system for the respective VM, compiles a software application to use the unique ABI, and installs the operating system and the compiled software application on the respective VM. A dispatcher node dispatches, to one or more VMs of the plurality of VMs that provide a service and are in the active mode, request messages for the service. Furthermore, a first host device may determine, in response to software in the first VM invoking a system call in a manner inconsistent with the unique ABI for the operating system of the first VM, that a failover event has occurred. Responsive to the failover event, the distributed computing system fails over from the first VM to a second VM.
Policy approval layer
A customer of a policy management service may use an interface with a configuration and management service to interact with policies that may be applicable to the customer's one or more resources. The customer may create and/or modify the policies and the configuration and management service may notify one or more other entities of the created and/or modified policies. The one or more other entities may be operated by user authorized to approve the created and/or modified policies. Interactions with the configuration and management service may be the same as the interactions with the policy management service.
CONFIGURING AUTOSAVE TRIGGERS BASED ON VALUE METRICS
Techniques for configuring autosave triggers in a computing environment based on environment and data conditions are disclosed. A system trains a machine learning model based on data attributes and environmental attributes to generate autosave value triggers for a computing environment. The autosave value triggers are triggered by different conditions. For example, one autosave trigger may be triggered when an error condition is detected. Another may be triggered when a certain number of operations are performed. The machine learning model generates autosave trigger values scores for one or more autosave triggers. The system may implement the autosave triggers in the computing environment based on the autosave trigger values.
Storage management of data using an open-archive architecture, including streamlined access to primary data originally stored on network-attached storage and archived to secondary storage
An illustrative “open archive” architecture provides streamlined access to production data, which originally was stored on a NAS device but which is archived to secondary storage to free up NAS space. An open-archive server coordinates with an open-archive layer on the NAS device. The open-archive server identifies data sets on the NAS that meet archiving criteria, which are then automatically moved to an open archive in secondary storage. The open archive layer intercepts data-access calls coming into the NAS device, and reports the intercepted calls to the open-archive server. If the open-archive server determines that the data referenced in an intercepted call is in the open archive, the server initiates a restore job that recovers the data from secondary storage and stores it back on the NAS device. The intercepted call may now be served from the NAS. These operations occur automatically and without data agents for the NAS-based data.
Efficient Read By Reconstruction
A method for efficient reads by reconstruction may determining an expected read latency for reading data from a primary read location of a plurality of storage devices, determining an expected reconstruction latency for reconstructing the data using reconstruction data, wherein portions of the reconstruction data are stored at a plurality of alternative read locations of the plurality of storage devices, reading the portions of the reconstruction data from the plurality of alternative read locations of the plurality of storage devices, and reconstructing the data stored at the primary read location using the reconstruction data, wherein the expected reconstruction latency is lower than the expected read latency.
Dynamic management of expandable cache storage for multiple network shares configured in a file server
Expandable cache management dynamically manages cache storage for multiple network shares configured in a file server. Once a file is written to a directory or folder on a specially designated network share, such as one that is configured for “infinite backup,” an intermediary pre-backup copy of the file is created in an expandable cache in the file server that hosts the network share. On write operations, cache storage space can be dynamically expanded or freed up by pruning previously backed up data. This advantageously creates flexible storage caches in the file server for each network share, each cache managed independently of other like caches for other network shares on the same file server. On read operations, intermediary file storage in the expandable cache gives client computing devices speedy access to data targeted for backup, which is generally quicker than restoring files from backed up secondary copies.
Large content file optimization
A size associated with a content file is determined to be greater than a threshold size. In response to the determination, file metadata of the content file split and stored across a plurality of component file metadata structures. The file metadata of the content file specifies tree structure organizing data components of the content file and each component file metadata structure of the plurality of component file metadata structures stores a portion of the tree structure. A snapshot tree is updated to reference the plurality of component file metadata structures for the content file.
RESOURCE ALLOCATION FOR SYNTHETIC BACKUPS
Example implementations relate to metadata operations in a storage system. An example storage system includes a machine-readable storage storing instructions executable by a processor to determine to generate a synthetic full backup based on data stream representations of a plurality of data streams. The instructions are also executable to, in response to a determination to generate the synthetic full backup, create a logical group including the data stream representations. The instructions are also executable to specify a cache resource allocation for the logical group, and generate the synthetic full backup from data stream representations using an amount of a cache resource limited by the cache resource allocation for the logical group.