G06F11/2056

Storage controller, storage system, and non-transitory computer-readable storage medium having stored therein control program
09720621 · 2017-08-01 · ·

A storage controller performing a copy process in which data stored in a copy source storage area is copied to a copy destination storage area, the storage controller includes a processor, wherein the processor receives a transfer command for giving an instruction for transferring data stored in a first area of the copy source storage area to a second area of the copy source storage area, starts a transfer process in which transfer data from the first area is read and is written into the second area in accordance with reception of the transfer command, and starts copying the transfer data into a corresponding area of the copy destination storage area that corresponds to the second area in the copy process together with the starting of the transfer process.

Virtual machine deployment

According to a computer-implemented method, a first virtual machine (VM) is deployed on a first hypervisor from a non-clustered server pool to run a workload of one or more applications. A dummy VM is configured on a second hypervisor from the non-clustered server pool to reserve same resources as the first VM without powering the dummy VM. The first VM is powered with a cold start on the second hypervisor using the resources on the dummy VM. Also, the first VM is provided with a same VM configuration on the second hypervisor that was on the first hypervisor.

Failover and recovery for replicated data instances

Replicated instances in a database environment provide for automatic failover and recovery. A monitoring component can periodically communicate with a primary and a secondary replica for an instance, with each capable of residing in a separate data zone or geographic location to provide a level of reliability and availability. A database running on the primary instance can have information synchronously replicated to the secondary replica at a block level, such that the primary and secondary replicas are in sync. In the event that the monitoring component is not able to communicate with one of the replicas, the monitoring component can attempt to determine whether those replicas can communicate with each other, as well as whether the replicas have the same data generation version. Depending on the state information, the monitoring component can automatically perform a recovery operation, such as to failover to the secondary replica or perform secondary replica recovery.

External dynamic virtual machine synchronization

Embodiments disclosed herein include systems and processes for replicating one or more user computing systems of an information management system at an external resource system to create a backup or fallback of the user computing systems. Replicating the user computing systems may include replicating data as well as the applications, operating systems and configuration of the user computing systems. This replicated or fallback user computing system may be implemented on a virtual machine at the external resource system. Thus, if a user computing system becomes inaccessible, a new user computing system can be generated based on the backup copy of the user computing system at the external resource system. Further, in some embodiments, the copy of the user computing system may be interacted with at the external resource system. Thus, certain embodiments disclosed herein can be used to transition an information management system to an external resource system.

Method and Device for Differential Data Backup
20170269847 · 2017-09-21 ·

A method for a source storage device replicating data to a backup storage device, where the source storage device identifies a current fingerprint set based on an identifier of a current backup period. Each of the plurality of fingerprint sets corresponds to a backup period. The current fingerprint set includes one or more fingerprints and identifies one or more data blocks respectively. The one or more data blocks are received by the source storage device between an end moment of a previous backup period and a start moment of the current backup period. Further, the source storage device obtains the one or more data block and sends them the backup storage device. Therefore, data backup efficiency can be improved.

Automating the failover of a relational database in a cloud computing environment

Described herein is a method, system, and non-transitory computer readable medium for helping customers in accessing data through an application from a replica database, detecting whether the replica database, zone of availability of the replica database, or geographical region encompassing the zone of availability is experiencing an outage or other failure, and re-routing traffic to a backup replica database accordingly. To assess the status of the database, metrics are pushed in a secure manner from a private subnet to a public-facing monitoring agent, achieving a clear segregation of private subnet and public facing components. Further, circuit-breaker logic is included for preventing failure during updating DNS addresses during the re-routing process.

Conveying value of implementing an integrated data management and protection system
09760446 · 2017-09-12 · ·

A system and method are described for conveying to a user the value it would receive by implementing an integrated system to protect and manage its data. An integrated system can combine archiving, backup, snapshot management, reporting, secure data access, eDiscovery and data analytics, among other functions, thus simplifying data protection and data management for an organization. The system generates a value dashboard, exhibiting value data, including data and graphics portraying the benefits to a user of implementing an integrated data management and protection system. Value may be evaluated with reference to simplification and efficiency, risk reduction, and unlocking data value.

Session based packet mirroring in a network ASIC

A forwarding pipeline of a forwarding engine includes a mirror bit mask vector with one bit per supported independent mirror session. Each bit in the mirror bit mask vector can be set at any point in the forwarding pipeline when the forwarding engine determines that conditions for a corresponding mirror session are met. At the end of the forwarding pipeline, if any of the bits in the mirror bit mask vector is set, then a packet, the mirror bit mask vector and a pointer to the start of a mirror destination linked list are forwarded to the multicast replication engine. The mirror destination linked list typically defines a rule for mirroring. The multicast replication engine mirrors the packet according to the mirror destination linked list and the mirror bit mask vector.

Hot backup system, hot backup method, and computer device

Embodiments of the present disclosure provide a hot backup system, a hot backup method, and a computer device. The hot backup system includes a centralized management module, a master server, a slave server and a delay server. The master server is configured to receive a write instruction sent by the centralized management module, and write first data to a database of the master server based on the write instruction. The slave server is configured to perform data synchronization with the master server in real time, receive a read instruction sent by the centralized management module, and send second data read based on the read instruction to the centralized management module to cause the centralized management module to send the second data to the service server.

Copy Using Metadata Representation
20210405930 · 2021-12-30 ·

A virtualized copy-by-reference includes: receiving, from a first computer system, a request for reference information for source data within a source volume; providing, to the first computer system, the reference information, wherein the reference information corresponds to a metadata representation of the source data; receiving, from a second computer system, a request to write the source data to a target volume, and wherein the request to write the source data indicates the reference information; and copying, using the reference information, the metadata representation of the source data to the target volume.