Patent classifications
G06F11/142
Storage cluster configuration change method, storage cluster, and computer system
Various embodiments provide a storage cluster configuration change method, an apparatus, a computer system, and the like. In a storage cluster that uses a consensus replication protocol, when half of storage nodes become faulty, if it is determined that at least one storage node exists in the storage cluster after the fault, and a latest log index number of the storage node is greater than or equal to an index number of a committed log provided by the storage cluster for a client, an arbitration module sends a forced cluster configuration change instruction to a fault-free storage node. The forced cluster configuration change instruction is used to instruct the fault-free storage node to change local cluster configuration information.
Electronic control device and preferential error detection method of configuration memory
An electronic control device includes a rewritable configuration memory composed of a plurality of frames in which logic circuit information is stored, a reconfiguration control unit configured to rewrite the logic circuit information of the frames, a logic unit configured to form a logic circuit based on the logic circuit information stored in the frames, and a configuration memory diagnosis unit configured to read the logical circuit information stored in the frames of the configuration memory and to perform error detection which is detection of an error in the stored logic circuit information, in which when the frames are rewritten by the reconfiguration control unit, the configuration memory diagnosis unit performs the error detection of ones of the frames that are rewritten prior to ones of the frames that are not rewritten.
Duplicating authentication information between connections
A method includes authenticating, by a computing device, a first connection between one or more storage units and at least one of the computing device and a first user computing device. The method further includes determining, by the computing device, to add a second connection between the one or more storage units and at least one of the computing device and a second user computing device. The method further includes generating, by the computing device, a secret code and sending the secret code to the one or more storage units via the first connection. The method further includes sending, by the one or more storage units, responses to the secret code to the computing device via the second connection. The method further includes authenticating, by the computing device, the second connection based on the authentication of the first connection and the responses from the one or more storage units.
Memory device with dynamic processing level calibration
A system includes a memory array including a plurality of memory cells; and a processing device coupled to the memory array, the processing device configured to iteratively adjust an active processing level used to process data, wherein, for each iteration, the processing device is configured to: determine a first error rate corresponding to the active processing level, determine a second error rate based on using an offset processing level different than the active processing level, and incrementally adjust the active processing level based on a comparison of the first error rate and the second error rate.
Effective selection of a virtual machine to be moved outside influence range of a failure
A method performed by an apparatus is provided. The apparatus extracts a virtual machine before starting operation from among virtual machines within a range of influence of a failure upon detection of the failure. With reference to a storage unit storing history information concerning operation of a virtual machine, the apparatus generates first information corresponding to time intervals of operation start time of the extracted virtual machine, second information corresponding to movement required time required to move the extracted virtual machine out of the range of influence of the failure, and third information corresponding to recovery required time required for recovery of the failure detected to have occurred. The apparatus determines whether to move the extracted virtual machine out of the range of influence of the failure, based on the generated first, second, and third information.
Managing system run-levels
Disclosed herein are system, method, and computer program product embodiments for transitioning virtual systems from one run-level to a next run-level. In an embodiment, a controller may receive a run-level request to transition a computing cluster (e.g., vSystem) from a first run-level to a second run-level. The controller persists a current run-level of the computing cluster as the second run-level in a configuration file. The controller executes a set of actions corresponding to the second run-level to transition the computing cluster from the first run-level to the second-level. A gateway of the computing cluster receives a request to access the computing cluster. The request includes a user's authentication details. The gateway grants or restricts access to the computing cluster based on the type of user attempting to access the computing cluster and the current run-level of the computing cluster as indicated in the configuration file.
MEMORY FAULT HANDLING SYSTEM, INFORMATION PROCESSING DEVICE, AND MEMORY FAULT HANDLING METHOD
A memory fault handling system includes: a memory controller, firmware, and software. The memory controller has: an error occurrence notification means for, when the occurrence of a memory error is detected, notifying firmware or software of the occurrence of the memory error on the basis of a setting pertaining to a notification recipient. The firmware includes: a notification recipient setting means for setting a notification recipient; and a spare memory switching instruction means for, when a notification indicating the occurrence of a memory error is received from the memory controller, instructing to switch from a memory to a spare memory. The software includes: a disabling instruction means for, when a notification indicating the occurrence of a memory error is received from the memory controller, instructing to cause a page corresponding to the memory in which the memory error has occurred to be disabled.
SYSTEM AND METHODS FOR APPLICATION FAILOVER AUTOMATION
Provided is a failover automation system and method comprising: obtaining, by a processor, a process inventory for a failover of an application from a first datacenter to a second data center; generating, by the processor, a data model for the failover based on the process inventor; generating, by the processor, a workflow for the failover based on the data model; assembling, by the processor, a set of one or more virtual engineers to perform the failover for the application based on the workflow; and performing, by the processor, the failover for the application with the set of one or more virtual engineers based on the workflow.
Edge side filtering in hybrid cloud environments
Various embodiments disclosed herein are related to a non-transitory computer readable storage medium. In some embodiments, the medium includes instructions stored thereon that, when executed by a processor, cause the processor to receive, at a node of a cluster on an edge network, an indication that the cluster received a configuration update, compare a first parameter of a configuration state of the node to a second parameter of the configuration update, determine if the first parameter matches the second parameter, in response to determining that the first parameter matches the second parameter, apply the configuration update, and collect data in accordance with the configuration update.
Automated virtual machine resource management in container-supported many task computing
An apparatus includes a processor to: receive a request to perform a job flow; within a performance container, based on the data dependencies among a set of tasks of the job flow, derive an order of performance of the set of tasks that includes a subset able to be performed in parallel, and derive a quantity of task containers to enable the parallel performance of the subset; based on the derived quantity of task containers, derive a quantity of virtual machines (VMs) to enable the parallel performance of the subset; provide, to a VM allocation routine, an indication of a need for provision of the quantity of VMs; and store, within a task queue, multiple task routine execution request messages to enable parallel execution of task routines within the quantity of task containers to cause the parallel performance of the subset.