G06F11/1612

Recovering error corrected data

A plurality of storage nodes within a single chassis is provided. The plurality of storage nodes is configured to communicate together as a storage cluster. The plurality of storage nodes has a non-volatile solid-state storage for user data storage. The plurality of storage nodes is configured to distribute the user data and metadata associated with the user data throughout the plurality of storage nodes, with erasure coding of the user data. The plurality of storage nodes is configured to recover from failure of two of the plurality of storage nodes by applying the erasure coding to the user data from a remainder of the plurality of storage nodes. The plurality of storage nodes is configured to detect an error and engage in an error recovery via one of a processor of one of the plurality of storage nodes, a processor of the non-volatile solid state storage, or the flash memory.

Common server san core solution to enable software defined storage

In an aspect of the disclosure, a method, a computer-readable medium, and a computer system are provided. The computer system includes a baseboard management controller (BMC). The BMC receives a first message from a first remote device on a management network. The BMC determines whether the first message is directed to a storage service or fabric service running on a host of the BMC. The host is a storage device. The BMC extracts a service management command from the first message, when the first message is directed to the storage service or fabric service. The BMC sends, through a BMC communication channel to the host, a second message containing the service management command to the host. The BMC communication channel established for communicating baseboard management commands between the BMC and the host.

Toke Based Communication
20230188365 · 2023-06-15 ·

A method for authorizing I/O (input/output) commands in a storage cluster is provided. The method includes generating a token responsive to an I/O command, wherein the token is specific to assignment of a storage node of the storage cluster. The method includes verifying the I/O command using the token, wherein the token includes a signature confirming validity of the token and wherein the token is revocable.

TWO-WAY REAL TIME COMMUNICATION SYSTEM THAT ALLOWS ASYMMETRIC PARTICIPATION IN CONVERSATIONS ACROSS MULTIPLE ELECTRONIC PLATFORMS

Methods, systems, and apparatuses, including computer programs encoded on computer-readable media, for receiving a first communication request, from a web browser of a user. A first responder requests information and a response to the request for information is received as part of a conversation. A conversation identifier is used to store the conversation. Based on the conversation, the conversation is determined to stop and a second responder is identified. The conversation is then transferred to the second responder.

TWO-WAY REAL TIME COMMUNICATION SYSTEM THAT ALLOWS ASYMMETRIC PARTICIPATION IN CONVERSATIONS ACROSS MULTIPLE ELECTRONIC PLATFORMS

Methods, systems, and apparatuses, including computer programs encoded on computer-readable media, for receiving a first communication request, from a web browser of a user. A request for information is sent to the web browser. A first communication as part of the first conversation is received from the user. A conversation identifier is identified and used to store the conversation of the first user. A request is received from a second, different, responder for the conversation. The conversation identifier is determined based on the request from the second responder. The request for information and first communication are retrieved from a persistent data store and sent to the second responder.

DATA STORAGE SYSTEM WITH METADATA CHECK-POINTING

A data storage system includes multiple head nodes and data storage sleds. Volume data is replicated between a primary and one or more secondary head nodes for a volume partition and is further flushed to a set of mass storage devices of the data storage sleds. Volume metadata is maintained in a primary and one or more secondary head nodes for a volume partition and is updated in response to volume data being flushed to the data storage sleds. Also, the primary and secondary head nodes store check-points of volume metadata to the data storage sleds, wherein in response to a failure of a primary or secondary head node for a volume partition, a replacement secondary head node for the volume partition recreates a secondary replica for the volume partition based, at least in part, on a stored volume metadata checkpoint.

Audit file generation in a dispersed storage network
11243839 · 2022-02-08 · ·

A method for execution by a dispersed storage and task (DST) processing unit includes obtaining audit records for an audit object and determining when the audit object is complete. When the audit object is complete, aggregating the audit records of the audit object within the audit object by generating the audit object to include the audit records; generating identifier (ID) information and generating integrity information. Fields of the audit object are populated with the audit records, the ID information, and the integrity information and a name of the audit object is determined for storage of the audit object and the name of the audit object in a dispersed storage network (DSN).

Method, device, and computer program product for managing storage system

Techniques involve managing a storage system. In accordance with the techniques, a plurality of copies of metadata of the storage system are read from a plurality of storage devices in a resource pool of the storage system. The resource pool includes a first number of storage devices, and the metadata describes configuration information of the storage system. A second number of copies are selected from the plurality of copies based on version information in the plurality of copies, where the second number of copies comprises the metadata in the same version. It is determined whether a relation between the first number and the second number satisfies a predetermined condition. The second number of copies are identified as trusted metadata based on determining the relation satisfies the predetermined condition. With the foregoing example implementation, the metadata in the storage system may be managed with higher reliability.

Two-way real time communication system that allows asymmetric participation in conversations across multiple electronic platforms

Methods, systems, and apparatuses, including computer programs encoded on computer-readable media, for receiving a first communication as part of a conversation, from an unauthenticated user of a web browser. A conversation identifier is determined based on the first communication. A first responder, a communication protocol, and a communication address of the first responder is determined. The first communication is sent to the first responder and a first reply is received. The conversation identifier is determined based on the first reply and the first reply is mapped to the web browser. The first reply is sent to the web browser.

FAILOVER OF A DATABASE IN A HIGH-AVAILABILITY CLUSTER

As disclosed herein a computer-implemented method for managing an HA cluster includes activating, by a cluster manager, a monitoring process that monitors a database on a first node in a high-availability database cluster. The method further includes receiving an indication that the database on the first node is not healthy, initiating a failover operation for deactivating the database on the first node and activating a standby database on a second node in the high-availability database cluster providing an activated standby database, and ensuring that any additional databases on the first node are unaffected by the failover operation. A computer program product corresponding to the above method is also disclosed.