Patent classifications
G06F11/2025
Automating the failover of a relational database in a cloud computing environment
Described herein is a method, system, and non-transitory computer readable medium for helping customers in accessing data through an application from a replica database, detecting whether the replica database, zone of availability of the replica database, or geographical region encompassing the zone of availability is experiencing an outage or other failure, and re-routing traffic to a backup replica database accordingly. To assess the status of the database, metrics are pushed in a secure manner from a private subnet to a public-facing monitoring agent, achieving a clear segregation of private subnet and public facing components. Further, circuit-breaker logic is included for preventing failure during updating DNS addresses during the re-routing process.
Automated discovery of databases
A networked computing system comprises a backup node cluster of a backup service in communication with a host database node cluster of a host, a host database at least initially undiscovered by the backup node cluster, one or more processors coupled with memory storing instructions that, when executed, perform operations comprising at least installing a backup agent on at least one node of the host database node cluster, registering the host at the backup service, based on the host registration, triggering a host database discovery process to discover the undiscovered database automatically, the discovery process including a discovery call, in response to the discovery call, receiving metadata relating to the discovered database, and communicating with the discovered database.
Node recovery solution for composable and disaggregated environment
In an aspect of the disclosure, a method, a computer-readable medium, and an apparatus are provided. The apparatus may be a pod manager. The pod manager receives receive a request for composing a target composed-node. The pod manager employs a first set of pooled hardware resources of the computing pod to build the target composed-node. The pod manager determines to reserve a second set of pooled hardware resources of the computing pod for a backup node of the target composed-node. The pod manager determines that the target composed-node has failed. The pod manager employs the second set of pooled hardware resources to build the backup node.
Adaptive multipath fabric for balanced performance and high availability
A computing system providing high-availability access to computing resources includes: a plurality of interfaces; a plurality of sets of computing resources, each of the sets of computing resources including a plurality of computing resources; and at least three switches, each of the switches being connected to a corresponding one of the interfaces via a host link and being connected to a corresponding one of the sets of computing resources via a plurality of resource connections, each of the switches being configured such that data traffic is distributed to remaining ones of the switches through a plurality of cross-connections between the switches if one of the switches fails.
Method and system for disaster recovery of a regional cloud based desktop fabric
A system and method for ensuring the availability of virtual desktops in a cloud based system. The system includes a primary regional datacenter having a primary desktop pool accessible by a desktop client providing access to a desktop to a desktop user. A secondary regional datacenter includes a secondary desktop pool. A control plane orchestrates communication between the desktop client and the regional datacenters. The control plane creates a copy of the desktop from the primary regional datacenter. The control plane performs an activation procedure when a disaster event occurs. The activation procedure includes creating the desktop in the secondary desktop pool from the copy. The activation procedure also directs the desktop client to the secondary desktop pool to access the desktop from the secondary regional datacenter. A deactivation procedure directs the desktop client in the secondary desktop pool to reestablish availability to desktops in the primary desktop pool.
Creating robustness scores for selected portions of a computing infrastructure
A system for generating a robustness score for hardware components, nodes, and clusters of nodes in a computing infrastructure is provided. The system includes a memory and at least one processing device coupled to the memory. The processing device is to obtain first telemetry data associated with a selected portion of a computing infrastructure, and the selected portion includes a first node and a first hardware component. The processing device is further to obtain first metadata associated with the selected portion, input one or more telemetry inputs corresponding to the first telemetry data into a machine learning model, input one or more metadata inputs corresponding to the first metadata into the machine learning model, and generate, from the machine learning model, a first robustness score for the first hardware component representing a health state of the first hardware component.
TRANSFERRING TASK DATA BETWEEN EDGE DEVICES IN EDGE COMPUTING
Edge device task management by receiving an indicator corresponding to a first container running a task on a first edge device of a cluster of edge devices, wherein the indicator indicates an error status of the first container, and wherein task data of the task is stored in a first local storage of the first edge device, selecting a second edge device from the cluster of edge devices, wherein a second container on the second edge device is to run the task, instructing the first and second edge devices to transfer the task data from the first local storage of the first edge device to a second local storage of the second edge device, and in response to receiving a notification that indicates the task data has been transferred from the first local storage to the second local storage, sending the task to the second container.
REDUNDANT CONTROL IN A DISTRIBUTED AUTOMATION SYSTEM
A method for redundant control in a distributed automation system, preferably a real-time automation system, for operating a client device of the distributed automation system is discussed. The method includes using the client device to monitor for the occurrence of a fault in communication between the client device and a first computing infrastructure that is part of the distributed automation system and operates the client device. The method may also include using the client device, once the fault occurs, to instruct a second computing infrastructure of the distributed automation system to operate the client device.
ACTIVE-STANDBY PODS IN A CONTAINER ORCHESTRATION ENVIRONMENT
Container orchestration platforms, such as Kubernetes, automatically manage the execution of applications in containers on host computing systems. An application may include component applications that execute in different containers and a container orchestration platform may organize the containers for those component applications into a pod for the application. To spread the load for the application, the container orchestration platform may enable creation of more than one pod for a single application. Once created, any of the multiple pods may be selected to handle a request to the application. As such, all of the pods are considered active by the container orchestration platform.
High Availability and Software Upgrades in Network Software
Ensuring the high availability of a Passive Optical Network (PON). A broadband network architecture comprises (a) at least a portion of optical fiber in a communication path to individual subscriber premises, (b) one or more software-implemented Optical Line Terminal (OLT) Controllers, (c) one or more software-implemented Service Provisioning Applications (SPAs), and (d) one or more software-implemented Broadband Network Gateways (BNGs). Each of the one or more OLT Controllers, one or more SPAs, and one or more BNGs execute on Commercial Off-the-Shelf (COTS) computer systems and entirely upon a plurality of protection groups. Each of the plurality of protection groups consists of a plurality of pods. The pods in a particular protection group which are active are dynamically adjusted to ensure the high availability of the broadband network architecture.