Patent classifications
G06F11/1484
STORAGE SYSTEM, FAILOVER CONTROL METHOD, AND RECORDING MEDIUM
Failover is performed appropriately when a failure occurs in a physical server. In a plurality of physical servers of a storage system, one or more protocol VMs and one or more file system VMs are created. The protocol VMs perform processing related to a protocol for a file storage with a client via a front-end network. The file system VMs perform processing related to management of files in the file storage. A first physical server causes, when a failure occurs in a second physical server, a physical server other than the second physical server to operate a file system VM to be operated in place of the file system VM of the second physical server, and controls the protocol VM of the physical server other than the second physical server to perform processing to be performed by the protocol VM of the second physical server.
Using a storage path to facilitate disaster recovery
A method, computer program product, and computing system for using a storage path to facilitate disaster recovery are described. A method may comprise receiving a selection of the storage path to facilitate access to a cloud storage device by the cloud computing client. The method may further comprise configuring the storage path to facilitate access to the cloud storage device by the cloud computing client, wherein the storage path is dedicated to the cloud computing client, and wherein a cloud computing site infrastructure is inaccessible to the cloud computing client via the storage path. The method may also comprise configuring a backup routine to generate a backed-up client resource and transmit the backed-up client resource to the cloud storage device via the storage path. The method may additionally comprise transmitting a list of backed-up client resources stored at the cloud storage device.
High Availability and Software Upgrades in Network Software
Ensuring the high availability of a Passive Optical Network (PON). A broadband network architecture comprises (a) at least a portion of optical fiber in a communication path to individual subscriber premises, (b) one or more software-implemented Optical Line Terminal (OLT) Controllers, (c) one or more software-implemented Service Provisioning Applications (SPAs), and (d) one or more software-implemented Broadband Network Gateways (BNGs). Each of the one or more OLT Controllers, one or more SPAs, and one or more BNGs execute on Commercial Off-the-Shelf (COTS) computer systems and entirely upon a plurality of protection groups. Each of the plurality of protection groups consists of a plurality of pods. The pods in a particular protection group which are active are dynamically adjusted to ensure the high availability of the broadband network architecture.
Dynamic flavor allocation
A method for allocating a plurality of virtual machines (51-55) provided on at least one host (11-15) to a virtualized network function is provided, which provides a defined functional behavior in a network and requires a total application capacity for the functional behavior, the functional behavior being provided by needed virtual machines from the plurality of virtual machines, wherein each of the at least one host has an available processing capacity which can be assigned to the virtual machines provided on the corresponding host, and each virtual machine has at least one flavor which indicates a used processing capacity of the available processing capacity of the corresponding host and which corresponds to a partial application capacity of the total application capacity provided by the corresponding virtual machine, the method comprising: —determining the total application capacity of the virtualized network function, —determining, for each of the virtual machines, the at least one flavor taking into account the available processing capacity of the host on which the corresponding virtual machine is provided, and the corresponding at least one partial application capacity, —determining the needed virtual machines from the plurality of virtual machines and needed flavors of the needed virtual machines that are required to provide the total application capacity, wherein determining the needed virtual machines and needed flavors comprises: performing an iterative process in which the needed virtual machines are dynamically determined from the plurality of virtual machines based on the total application capacity, and in which the needed flavor for each of the needed virtual machines is dynamically determined taking into account the total application capacity and the available processing capacity provided on the host on which the corresponding needed virtual machine is provided.
Self-healing architecture for resilient computing services
For each respective virtual machine (VM) of a plurality of VMs, a distributed computing system generates a unique Application Binary Interface (ABI) for an operating system for the respective VM, compiles a software application to use the unique ABI, and installs the operating system and the compiled software application on the respective VM. A dispatcher node dispatches, to one or more VMs of the plurality of VMs that provide a service and are in the active mode, request messages for the service. Furthermore, a first host device may determine, in response to software in the first VM invoking a system call in a manner inconsistent with the unique ABI for the operating system of the first VM, that a failover event has occurred. Responsive to the failover event, the distributed computing system fails over from the first VM to a second VM.
Vendor-neutral models of vendors' application resources
Vendor-neutral models of vendors' application resources are described. A host outputs capabilities of data protection operations which are specified by a vendor of an application that is installed on the host. The host inputs a vendor-neutral version of a data protection operation, based on any of the capabilities, for a resource of the application. The host uses a vendor-neutral model of the resource of the application to perform the vendor-neutral version of the data protection operation on the application resource.
SYSTEM AND METHOD FOR RANKING DATA STORAGE DEVICES FOR EFFICIENT PRODUCTION AGENT DEPLOYMENT
A method for processing backup policy generation requests includes receiving, by a production agent manager, a backup policy generation request, in response to receiving the backup policy generation request: identifying a backup to transfer to a backup storage, wherein the backup comprises a plurality of data blocks, performing a data storage device evaluation on a set of data storage devices to obtain a set of health scores, wherein each health score of the set of health scores corresponds to a data storage device of the set of data storage devices, assigning, based on the set of health scores, a production agent to a data storage device of the set of data storage devices to generate a backup policy, and initiating, based on the backup policy, a deployment of the production agent to the data storage device.
Systems and methods for change block tracking for backing up changed data
Aspects of the present disclosure enable data protection operations including differential and incremental backups by performing changed-block tracking in network or cloud computing systems with architectures that do not natively support changed-block tracking or do not expose changed-block tracking functionality to an information management system. In certain aspects, an identity of changed blocks may be obtained by using a hypervisor configured to interface with the cloud computing architecture. The identified changed blocks may be used to generate a map of the changed blocks. The maps of the changed blocks can be used by a virtual server agent to extract the changed blocks from a copy of a virtual machine disk and backed up to perform a differential or incremental backup.
Computing an unbroken snapshot sequence
Methods, systems and computer program products for high-availability computing. In a computing configuration comprising a primary node, a first backup node, and a second backup node, a particular data state is restored to the primary node from a backup snapshot at the second backup node. Firstly, a snapshot coverage gap is identified between a primary node snapshot at the primary node and the backup snapshot at the second backup node. Next, intervening snapshots at the first backup node that fills the snapshot coverage gap are identified and located. Having both the backup snapshot from the second backup node and the intervening snapshots from the first backup node, the particular data state at the primary node is restored by performing differencing operations between the primary node snapshot, the backup snapshot from the second backup node, and the intervening snapshots of the first backup node.
System and method of dynamic system resource allocation for primary storage systems with virtualized embedded data protection
Embodiments provide for a primary storage array having multiple storage tiers. The multiple storage tiers include one or more performance tiers and at least one deduplicated storage tier storing deduplicated data. One embodiment provides for a data storage system including the storage array and an I/O engine to manage I/O requests for the storage array. The data storage system additionally includes a virtual execution environment to execute a virtual backup engine, the virtual backup engine to generate backup data for the one or more storage tiers of primary storage and deduplicate the backup data and a resource manager to manage a resource allocation to the virtual backup engine based on a hint received from the virtual backup engine, the hint associated with a backup operation that has a characterization selected from a set including computationally intensive and I/O intensive.