Patent classifications
G06F11/202
USING CLUSTERS TO CREATE TEST INSTANCES
Described is a system and method that includes executing, by a processing device, a staging creation service (SCS) to monitor a development of an application in a development environment of the application. The method includes removing, by the SCS, a production cluster of a plurality of production clusters from a production cluster pool in response to one or more development tests of the application having passed in the development environment. Each production cluster of the plurality of production clusters comprises a production environment of the application. The method includes assigning, by the SCS, the production cluster to be a staging cluster comprising a staging environment of the application to perform one or more staging tests of the application.
SYSTEM AND METHOD FOR EFFICIENT REPLICATION
A system and method determining a Chain Identification Number (CID) of a source snapshot to be replicated from a source site to a target site of a virtual computing system, determining a predetermined number of potential reference snapshots based on the CID of the source snapshot, computing a closeness value between the source snapshot and each of the potential reference snapshots, and creating a list of the potential reference snapshots based on the closeness value of each of the potential reference snapshots. One snapshot from the list is selected as a reference snapshot. The source snapshot is replicated to the target site based on the reference snapshot.
Managing metadata for a backup data storage
A method for managing metadata for data stored in a cloud storage is provided. The method receives, at a first of a plurality of metadata servers, information associated with an object stored in the cloud storage, the information comprising a plurality of LBAs for where the object is stored. Each metadata server allocates contiguous chunk IDs for a group of objects. The method generates a new chunk ID for the object, which is a combination of a unique fixed value and a monotonically incrementing local value associated with each LBA, such that a first LBA is mapped to a first chunk ID having a first local value and a next LBA is mapped to a second chunk ID having the first local value incremented as a second local value. The method stores the new chunk ID and other metadata in one or more tables stored in a metadata storage.
Methods and systems for protecting databases of a database availability group
Methods and systems for storage services is provided. One method includes configuring by a processor, a database availability group (DAG) storing an active database copy at a first computing node and a passive database copy of the active database copy at a second computing node; initiating a backup operation for backing up the passive database copy from the second computing node; and interfacing with the first computing node by the second computing node for completing the backup operation. The first computing node identifies logs for the backup operation, backs up the identified logs and provides metadata associated with the backup of the identified logs to the second computing node. The second computing node updates metadata for the backup operation such that a backup copy of the passive database copy points to the second node with metadata received from the first computing node.
Preventing extraneous messages when exiting core recovery
A method and a computer system for core recovery management are provided. A first operation signal is generated via a first hardware agent. The first operation signal indicates that the first hardware agent is processing an operation requested by a first processor core. The first processor core receives a first extend fence signal based on the generated first operation signal. As long as the first extend fence signal is received via the first processor core, the first processor core is kept in a fenced state for core recovery.
System and Method for Storage System Node Fencing
A method, computer program product, and computing system for receiving, at a first baseboard management controller (BMC) of a first node, a fence request from a central processing unit (CPU) of the first node. The first BMC of the first node may communicate with a second BMC of a second node, wherein the first node and the second node are communicatively coupled to a plurality of storage drives. The first BMC and the second BMC may determine which node of the first node and the second node to fence from the plurality of storage drives. One of the first node and the second node may be fenced, via one of the first BMC and the second BMC, from the plurality of storage drives, thus defining a fenced node.
Machine learning model for storage system
Data associated with storage media utilized by one or more storage systems is received. The data is provided as an input to a machine learning model executed by a processing device. The machine learning model identifies one or more deterministic characteristics from the data. The one or more deterministic characteristics associated with the storage media are received from the machine learning model. A data structure comprising the one or more deterministic characteristics is generated for use in a telemetry process to qualify types of storage media.
MANAGING FILES ACCORDING TO CATEGORIES
According to various embodiments, with respect to a target set of files being managed (e.g., protected by data snapshots), each file in the target set of files is classified into one of two or more filesets (discontiguous filesets), where each of these filesets comprises one or more files that are related to each other by one or more factors, such as frequency of file change or purpose of existence (e.g., used by a software application). Once classified, files within the target set of files can be uniquely processed by a data management operation (e.g., incremental data snapshot process) according to their association to a discontiguous fileset.
Allocating external IP addresses from isolated pools
Techniques are described for creating isolated pools of external, failover, and/or floating IP addresses. In one example, this disclosure describes a method including creating a plurality of virtual networks, creating a plurality of pools of external IP addresses, detecting a request to instantiate an object that identifies a specific pool from the plurality of pools of external IP addresses; and instantiating the object and configuring the object with an external IP address drawn from the specific pool. The pools of external IP addresses may be created and isolated on a per-namespace, per-service, or per-ingress basis.
VEHICLE CONTROL SYSTEM
A first controller includes a plurality of computation units and a diagnosis unit. A second controller is disposed on a signal path between the first controller and an actuator, and includes an output unit. Each of the computation units supplies a first control signal for controlling the actuator to the output unit. The diagnosis unit performs an abnormal diagnosis of each of the computation units. The output unit outputs a second control signal for controlling the actuator based on the first control signals supplied from the computation units and diagnosis results of the computation units obtained by the diagnosis unit.