G06F11/2066

Data storage management system for multi-cloud protection, recovery, and migration of databases-as-a-service (DBAAS) and/or serverless database management systems (DBMS)

A streamlined approach enables customers to retain management control over their data in a database-as-a-service (DBaaS) setting, by providing managed backup copies outside cloud service providers' sphere of control. An illustrative data storage management system provides control over performing backup operations to generate managed backup copies, storing managed backup copies, recovering managed backup copies in whole or in part, migrating managed backup copies, and migrating DBaaS instances. Management control also extends to choices of where to store the managed backup copies, whether on the same cloud computing platform as the source DBaaS, on a different cloud computing platform, and/or in a non-cloud data center.

Method for remote asynchronous replication of volumes and apparatus therefor

A method for remote asynchronous volume replication and apparatus therefor. Asynchronous replication is applied to handle data changes on the source volume on the local site incurred by Host IO requests. In coordination with the point-in-time differential backup technology, the original data in the block to be written by a host IO request will be backuped to Source BAS on the local site (backup-on-write operation) only when the original data being written into the block of the source volume is different from the data of the corresponding block of the destination volume on the remote site. As a result, once a new data is written into the source volume completely, the host will be responded that its Host IO request is completed. Therefore, the data necessarily transmitted to the destination volume can be minimized, and the problem of remote data transmission limited by network bandwidth can be prevented effectively.

Replication of log-structured data

A method includes a primary storage unit receiving a first write request including a first key and a first value; persisting the first value in a first non-volatile memory in association with the first key; broadcasting the first write request and a first set of globally-durable keys to secondary storage units; receiving, from the secondary storage units, an acknowledgement of the first write request and a first set of locally-durable keys, each of the first sets of locally-durable keys including the first key; the primary storage unit receiving a second write request including a second key and a second value; persisting the second value in the first non-volatile memory in association with the second key; and broadcasting the second write request and a second set of globally-durable keys to the secondary storage units, the second set of locally-durable keys including the first key. A system is also disclosed.

Replication based security

A computer implemented method, system, and computer comprising intercepting an production IO at a splitter, determining if the production IO is a write IO, based on a positive determination of a write IO; replicating a copy of the write IO, based on a negative determination, determining if the production IO is a read IO and based on a positive determination of a read IO; replicating to metadata of the read IO.

OPTIMIZED SEQUENTIAL WRITES ON MIRRORED DISKS

Embodiments for optimizing sequential write operations in a data deduplication environment by one or more processors. Similar data deduplication signatures for stored data at all storage devices in one or more storage systems may be maintained. A deduplication signature associated with a write operation at a storage device may be compared to the similar data deduplication signatures. Results of the comparison with each of the other storage devices may be shared prior to performing the write operation.

Application service-level configuration of dataloss failover

Application service configuration of a timeframe for performing dataloss failover (failover that does not attempt full data replication to the secondary data store) from a primary data store to the secondary data store. A data-tier service, such as perhaps a database as a service (or DBaaS), could receive that configuration from the application service and automatically perform the dataloss failover as configured by the application service. This relieves the application service from having to manage the failover workflow while still allowing the application service to appropriately balance the timing of dataloss failover, which will depend on a very application-specific optimal balance between the negative effects of operational latency versus dataloss.

Remote Data Replication Method and System
20190163591 · 2019-05-30 ·

A remote data replication method and a storage system, where a production array sends a data replication request to a disaster recovery array. The data replication request includes an identifier of a source object and a data block corresponding to the source object. The data block is stored in physical space of a hard disk of the production array. The disaster recovery array receives the data replication request. The disaster recovery array creates a target object when the disaster recovery array does not include an object having a same identifier as the source object. An identifier of the target object is the same as the identifier of the source object, the disaster recovery array writes the data block into the physical space. This may reduce bandwidth load between the production array and the disaster recovery array.

CONFIGURING A SECONDARY STORAGE SYSTEM FOR DATA MIRRORING
20190163590 · 2019-05-30 ·

A method for configuring a storage system. The method includes a computer processor receiving at a storage system, an indication to initiate data mirroring for an application. The method further includes determining a set of information associated with a network-accessible computing system that hosts the application. The method further includes identifying an analysis of historic performance data associated with data mirroring to the storage system with respect to the application. The method further includes identifying a set configuration information associated with data mirroring from among a plurality of sets of configuration information associated with data mirroring based, at least in part, on the determined set of information associated with the network-accessible computing system and the identified analysis of performance data associated with data mirroring with respect to the application. The method further includes applying the identified set configuration information associated with data mirroring for the application to the storage system.

PROACTIVELY PREDICTING FAILURE IN DATA COLLECTION DEVICES AND FAILING OVER TO ALTERNATE DATA COLLECTION DEVICES
20190163588 · 2019-05-30 ·

A computer-implemented method includes: detecting, by a computing device, a failure event for a primary data collection device that is currently collecting and providing data; discontinuing, by the computing device, use of the primary data collection device based on the detecting the failure event; selecting, by the computing device, an alternate data collection device based on the discontinuing the use of the primary data collection device; receiving, by the computing device, data collected by the alternate data collection device; receiving, by the computing device, failure related data associated with the primary data collection device after discontinuing use of the primary data collection device; and updating, by the computing device, a hazard function based on the failure related data, wherein the hazard function is used to detect future failures of a same type of primary data collection device.

Utilizing data views to optimize secure data access in a storage system

A storage system has filtered views of data. The storage system receives a read request for a filtered view of data in memory. The read request is associated with one or more permissions for viewing the data. The storage system identifies a subset of the data, based on the one or more permissions. The storage system provides the filtered view. The filtered view includes the subset of the data.