Patent classifications
G06F16/1815
ANY POINT IN TIME BACKUP ON SECONDARY STORAGE FOR DISTRIBUTED CONSISTENCY GROUPS
Any point in time backups for distributed consistency is disclosed. IOs from a consistency group are received by multiple aggregators and stored in corresponding journals. In response to a bookmark, the multiple journals are synthesized to create a do stream or to add the multiple journals to the do stream. A full synchronization operation can be performed simultaneously with replication operations.
SEALED DISTRIBUTED LEDGER SYSTEM
A system for ensuring privacy of transactions is provided. The system may be performed by a computing system during execution of trusted code within a secure enclave of the computing system. The system receives an indication of a transaction. The system validates the transaction. The system encrypts the validated transaction using an encryption key of the trusted code. The system requests untrusted code of the computing system to store the encrypted validated transaction in a portion of a data store. The untrusted code cannot decrypt the encrypted validated transaction that is stored in the data store. Rather, only the trusted code can decrypt the encrypted validated transaction.
AUTOMATED FAILOVER FOR ASYNCHRONOUS REMOTE COPY
Example implementations described herein are directed to automated failover and assuring RTO (Recovery Time Objective) assurance, and RPO (Recovery Point Objective) on asynchronous remote copy feature of storage. By using markers that are cyclically stored to the journal volume, the storage device can thereby determine an accurate communication loss period.
Storage cluster configuration change method, storage cluster, and computer system
Various embodiments provide a storage cluster configuration change method, an apparatus, a computer system, and the like. In a storage cluster that uses a consensus replication protocol, when half of storage nodes become faulty, if it is determined that at least one storage node exists in the storage cluster after the fault, and a latest log index number of the storage node is greater than or equal to an index number of a committed log provided by the storage cluster for a client, an arbitration module sends a forced cluster configuration change instruction to a fault-free storage node. The forced cluster configuration change instruction is used to instruct the fault-free storage node to change local cluster configuration information.
Sealed distributed ledger system
A system for ensuring privacy of transactions is provided. The system may be performed by a computing system during execution of trusted code within a secure enclave of the computing system. The system receives an indication of a transaction. The system validates the transaction. The system encrypts the validated transaction using an encryption key of the trusted code. The system requests untrusted code of the computing system to store the encrypted validated transaction in a portion of a data store. The untrusted code cannot decrypt the encrypted validated transaction that is stored in the data store. Rather, only the trusted code can decrypt the encrypted validated transaction.
Directory selective backups
Backup operations on selected directories are performed in a computing system. File system operations that impact the ability to backup the selected directories are failed while other file system operations are allowed. In particular, file system operations that would require a trawl of the selected directory in order to perform the backup operation are failed.
Incremental inline journaling in a journaled file system
Incremental inline journaling in a journaled file system can be utilized to facilitate concurrency and throughput of a journaled file system. In an example, a request can be received for a transaction to modify a sub-block portion of a file stored in a distributed storage system. In response to that, the modification can be allocated to a data structure in a journal of the distributed storage system. After the transaction commits, a current value of the sub-block portion of the file can be saved to the delta structure. Then, a new value corresponding to the request for the transaction to modify the sub-block portion of the file can be written to the metadata block. After writing the new value to the metadata block, a memory space used to store the delta structure can be freed.
System for transition from a hierarchical file system to an object store
Techniques are provided for transitioning from a hierarchical file system to an object store. A request is received to change file metadata of a hierarchical file system. In response to the request: in-cache file metadata of the hierarchical file system is modified. The in-cache file metadata includes a directory structure of the hierarchical file system and file metadata of the hierarchical file system. Additionally, an in-store metadata journal entry is generated. The in-store metadata journal entry indicates an update to in-store file metadata. The in-store file metadata includes the directory structure of the hierarchical file system and file metadata of the hierarchical file system and is stored in an object store. The in-store metadata journal entry is stored in the object store. Furthermore, in-store file metadata and in-store metadata journal entry may be used to reconstruct the in-cache file metadata on another node.
SHRINKING SEGMENT CLEANING ALGORITHM IN AN OBJECT STORAGE
A method for cleaning an object storage having a plurality of segments is provided. Each segment includes an identifier through which the segment is accessed. The method identifies a first segment in the plurality of segments. The first segment includes a first identifier and a first size. The method determines that a utilization ratio for the first segment is below a threshold. As a result, the method generates a second segment from the first segment, such that the second segment includes a second identifier that is the same as the first identifier and a second size that is smaller than the first size. The method then writes the second segment to the object storage.
IDENTIFYING A CURRENT JOURNAL STATE BY INVALIDATING RECORDS BASED ON OUT OF ORDER WRITES
The technologies described herein are generally directed toward identifying a current journal state by determining the most recent valid journal record using valid and null journal records. According to an embodiment, a system can comprise a processor and a memory that can enable performance of operations including identifying a hint journal record of a group of journal records of a journal of a journaled data storage system. The operations can further include, based on an identified null record and the hint journal record, determining a highest sequence journal record comprising a sequence indicator. The operations can further include, based on the sequence indicator, analyzing, by the journaling equipment, other journal records of the group of journal records to confirm that the highest sequence journal record corresponds to a valid journal state.