G06F11/2038

Extending a database recovery point at a disaster recovery site
11263238 · 2022-03-01 · ·

A DBA may pre-generate database recovery jobs on a convenient schedule at a local site, then recover a database at a disaster recovery site. Archive log files for the database that are generated in the interim between recovery job generation and recovery job execution are automatically incorporated into the recovery job when it executes, extending the recovery point closer to the time of the disruption that triggered the need or desire for recovery.

CO-LOCATED JOURNALING AND DATA STORAGE FOR WRITE REQUESTS

A method and system for co-locating journaling and data storage based on write requests. A write request that includes metadata and data is received from a client. A logical storage unit for storing the metadata and the data is identified. The logical storage unit is divided into a journal partition and a volume partition. The journal partition includes a first log and a second log. Which of the first log and the second log is an active log and which of the first log and the second log is an inactive log are identified. The metadata is recorded in a first location in the active log and the data is recorded in a second location in the active log during a single I/O operation. A reply is sent to the client after the metadata and the data are recorded in the journal partition.

TECHNIQUES FOR DEPLOYING WORKLOADS ON NODES IN A CLOUD-COMPUTING ENVIRONMENT
20220360624 · 2022-11-10 ·

Described are examples for deploying workloads in a cloud-computing environment. In an aspect, based on a desired number of workloads of a process to be executed in a cloud-computing environment and based on one or more failure probabilities, an actual number of workloads of the process to execute in the cloud-computing environment to provide a level of service can be determined and deployed. In another aspect, a standby workload can be executed as a second instance of the process without at least a portion of the separate configuration used by the multiple workloads, and based on detecting termination of one of multiple workloads, the standby workload can be configured to execute based on the separate configuration of the separate instance of the process corresponding to the one of the multiple workloads.

Recovery point objective enforcement

A maximum lag between data stores can be specified that corresponds to a recovery point objective defined in a service level agreement. Lag can be monitored during a data replication between a primary data store and a secondary data store located in geographically different regions. Activity on the primary data store including incoming data transactions can be throttled as a function of the lag and the maximum lag.

Mediator assisted switchover between clusters

Techniques are provided for metadata management for enabling automated switchover. An initial quorum vote may be performed before a node executes an operation associated with metadata comprising operational information and switchover information. After the initial quorum vote is performed, the node executes the operation upon one or more mailbox storage devices. Once the operation has executed, a final quorum vote is performed. The final quorum vote and the initial quorum vote are compared to determine whether the operation is to be designated as successful or failed, and whether any additional actions are to be performed.

Storage Unit Connection Security in a Storage Network and Methods for use Therewith
20220058091 · 2022-02-24 · ·

A method begins with a processing module selecting one of a plurality of dispersed storage (DS) processing modules for facilitating access to a dispersed storage network (DSN) memory. The method continues with the processing module sending a DSN memory access request to the one of the plurality of DS processing modules. The method continues with the processing module selecting another one of the plurality of DS processing modules when no response is received within a given time frame or when the response to the access request does not include an access indication. The method continues with the processing module sending the DSN memory access request to the another one of the plurality of DS processing modules.

Physical to virtual scheduling system and method
09798573 · 2017-10-24 · ·

Large-scale data migration processes are managed using a schedule optimizer implemented in software. The schedule optimizer assigns an available data migration window to each server in an inventory of servers based on a scheduling priority determined for that server. For example, servers that have manually scheduled conversion dates are assigned the highest scheduling priority, and servers that have a migration deadline are assigned the next highest scheduling priority. In addition, servers may grouped and data migration may be scheduled for server groups instead of individual servers.

DISASTER RECOVERY SYSTEM AND DISASTER RECOVERY METHOD
20230176952 · 2023-06-08 · ·

In the disaster recovery system exemplified by the information processing system, the cloud management node manages the importance information indicating the importance placed on the performance of each application to be executed by the primary site in correspondence with the virtual computer for executing the application, determines the DR method applied to the virtual computer and the application by selection from multiple types of DR methods based on the importance information of the corresponding application for each of the virtual computers, and determines a content of a predetermined set item applied to transfer of data to be used by the virtual computer.

FAULT TOLERANCE FOR CONTAINERS IN A VIRTUALIZED COMPUTING ENVIRONMENT
20170300394 · 2017-10-19 ·

Example methods are described to provide fault tolerance for a container in a virtualized computing environment that includes a first virtual machine and a second virtual machine. The method may comprise detecting a failure at the first virtual machine. The container may be supported by the first virtual machine to run an application on a first operating system of the first virtual machine. The method may further comprise providing data relating to the container to the second virtual machine; and based on the data relating to the container, resuming the container in the second virtual machine to run the application on a second operating system of the second virtual machine.

Managing replicated virtual storage at recovery sites

Techniques involving replication of storage are described. A representative technique includes apparatuses and methods for receiving replicated virtual storage of a replicated virtual machine, including at least a replicated base virtual disk that substantially corresponds to a primary base virtual disk to be replicated. Copies of differencing disks or other forms of virtual storage updates are received at a recovery site, each of the differencing disks being associated with the primary base virtual disk as descendents thereof. The received copies of the differencing disks are arranged relative to the replicated base virtual disk corresponding to the manner in which the differencing disks were arranged relative to the primary base virtual disk, thereby maintaining the data view of the replicated virtual machine in synchronization with the virtual machine at the primary site.