G06F11/1484

Time based SLA compliance for disaster recovery of business critical VMs

One example method includes receiving data segments that are not already part of a full disk image of a backup, storing the data segments in storage, determining whether or not an aggregate total of data segments in the storage, that are not already part of a full disk image of a backup, equals or exceeds a threshold, when the aggregate total of data segments in the storage equals or exceeds the threshold, creating a full disk image of a backup that includes the data segments in storage, and storing the created full disk image of the backup to a recovery disk.

ROBUST RESOURCE REMOVAL FOR VIRTUAL MACHINES
20230214247 · 2023-07-06 ·

Systems and methods providing robust resource removal for virtual machines. In one implementation, a hypervisor may receive configuration data associated with a virtual machine (VM). The hypervisor may determine, based on the configuration data, a type of support by the VM of recovery from unexpected hardware resource removal. The hypervisor may identify, based on the type of support of recovery form unexpected hardware resource removal, a type of access of the VM to one or more hardware resources. The hypervisor may launch the VM according to the type of access to the one or more hardware resources.

Online disk encryption using mirror driver
11693689 · 2023-07-04 · ·

Provided are techniques for encrypting a virtual disk of a virtual computing instance (VCI) while the VCI is online and still running using a mirror driver. In certain aspects a mirror driver is a filter running in an I/O stack used for accessing a virtual disk, such that the mirror driver receives I/Os destined to the virtual disk and mirrors those I/Os to the virtual disk and one or more additional virtual disks. The mirror driver begins copying data from an unencrypted source virtual disk to a destination virtual disk, and the data is encrypted as it is stored in the destination virtual disk, while the VCI is still online. During the copying, as new writes are issued to the unencrypted source virtual disk from the VCI, the mirror driver mirrors the writes to both the unencrypted source virtual disk and the destination virtual disk.

System and method for improved fault tolerance in a network cloud environment

Described herein are systems and methods for fault tolerance in a network cloud environment. In accordance with various embodiments, the present disclosure provides an improved fault tolerance solution, and improvement in the fault tolerance of systems, by way of failure prediction, or prediction of when an underlying infrastructure will fail, and using the predictions to counteract the failure by spinning up or otherwise providing new component pieces to compensate for the failure.

Recovery of a software-defined data center from persistent entity stores for virtual machines

Examples described herein include systems and methods for backing up and recovering a software-defined data center (“SDDC”). In one example, entities of the SDDC, such as virtual machines, hosts, and clusters, can coexist with corresponding entity stores. The entity stores can store current state information for each SDDC entity. For example, an identifier or name of a virtual machine can be stored in that virtual machine's corresponding entity store. When recovery of a controller is needed, the controller can rebuild state information that has changed after the controller was backed up, by retrieving state information from entity stores of the various SDDC entities.

METHOD, ELECTRONIC DEVICE, AND COMPUTER PROGRAM PRODUCT FOR DATA PROTECTION
20220405176 · 2022-12-22 ·

Embodiments of the present disclosure provide a method, an electronic device, and a computer program product for data protection. The method described here includes backing up an identifier of an application wrapper operating on a source platform and application data to a repository. The method further includes acquiring a container mirror image based on an identifier of a target platform and the identifier of the application wrapper that is restored from the repository, the container mirror image targeting the application wrapper operating on the target platform. The method further includes applying the application data restored from the repository to a container started from the container mirror image. With the solution of data protection of the present application, it is possible to efficiently migrate applications on a source platform to multiple different types of target platforms flexibly by backing up only application data and identifiers of application wrappers, thus improving the efficiency of data protection.

Data restoration operations based on network path information

A system according to certain aspects improves the process of data restoration and application recovery operations. The system can back up primary data based on network path information associated with a client computing device. When the primary data becomes corrupted or unavailable, a previously backed up copy of the primary data may be used as the primary data to achieve instant application recovery. For example, when a portion of the primary data is requested by a user or an application, the system may identify a corresponding portion in the backed up copy of the primary data and provide the identified portion to the user or the application in a manner transparent to the user or the application. Alternatively, the application running on the client computing device may send a request for the backup copy of the primary data to the secondary storage device upon determining that the requested data is not available.

Methods and systems for data resynchronization in a replication environment
11531604 · 2022-12-20 · ·

Methods, computer program products, computer systems, and the like are disclosed that provide for scalable deduplication in an efficient and effective manner. For example, such methods, computer program products, and computer systems can include determining whether a source data store and a replicated data store are unsynchronized and, in response to a determination that the source data store and the replicated data store are unsynchronized, performing a resynchronization operation. The source data stored in the source data store is replicated to replicated data in the replicated data store. The resynchronization operation resynchronizes the source data and the replicated data.

On-the-fly pit selection in cloud disaster recovery

On-the-fly point-in-time recovery operations are disclosed. During a recovery operation, the PiT being restored can be changed on-the-fly or during the existing recovery operation without restarting the recovery process from the beginning. IN one example, this improves recovery time operation (RTO) and prevents aspects of the recovery operation to be avoided when changing to a different PiT.

On the fly pit selection in cloud disaster recovery

On-the-fly point-in-time recovery operations are disclosed. During a recovery operation, the PiT being restored can be changed on-the-fly or during the existing recovery operation without restarting the recovery process from the beginning. In one example, this improves recovery time operation (RTO) and prevents aspects of the recovery operation to be avoided when changing to a different PiT.