-
公开(公告)号:US20180329789A1
公开(公告)日:2018-11-15
申请号:US15590929
申请日:2017-05-09
Applicant: VMware, Inc.
Inventor: Jingliang Shang
CPC classification number: G06F11/203 , G06F2201/805 , G06F2201/825 , H04L67/1097
Abstract: Failover processing of a service in a cluster of nodes is disclosed. A node brings up a failover instance of a service in response to an indication of a failure in an initial instance of the service. The failover service executes in the background so as not to be visible to users and thus does not receive user requests. The background service is terminated in response to the failure indication being a false positive. The background service is executed in the foreground in response to detecting that the initial instance of the service has failed and processes user requests.
-
公开(公告)号:US10078641B1
公开(公告)日:2018-09-18
申请号:US14985211
申请日:2015-12-30
Applicant: Acronis International GbmH
Inventor: Andrey Redko , Stanislav S. Protassov , Serguei M. Beloussov , Mark Shmulevich
CPC classification number: G06F16/128 , G06F11/1448 , G06F11/3041 , G06F2201/825
Abstract: A method for optimizing lock detection in a change block tracker (CBT). A volume subject to the backup constantly receives writes. Therefore, it is important to divide writes that occurred before the lock and the write that occurred after the lock. The CBT is installed into kernel at the installation of the backup agent (application). The detection of changes is started at the completion of a previous snapshot. Snapshot creation request (SCR) is generated. Lock request is received by the CBT. Once the lock request is intercepted, the current changes are moved to frozen changes. The CBT processes the SCR and creates a collection of changes—i.e., snapshot with a Name. The CBT moves the current changes to the snapshot Name.
-
公开(公告)号:US10015042B2
公开(公告)日:2018-07-03
申请号:US15179812
申请日:2016-06-10
Applicant: Amazon Technologies, Inc.
Inventor: Timothy Andrew Rath , Jakub Kulesza , David Alan Lutz
CPC classification number: H04L41/0668 , G06F3/0617 , G06F3/0653 , G06F3/0659 , G06F3/0683 , G06F11/1425 , G06F11/1662 , G06F11/2028 , G06F11/2041 , G06F11/2048 , G06F11/2094 , G06F11/2097 , G06F2201/825 , H04L67/1097 , H04L67/16
Abstract: A system that implements a data storage service may store data on behalf of storage service clients. The system may maintain data in multiple replicas of various partitions that are stored on respective computing nodes in the system. The system may employ a single master failover protocol, usable when a replica attempts to become the master replica for a replica group of which it is a member. Attempting to become the master replica may include acquiring a lock associated with the replica group, and gathering state information from the other replicas in the group. The state information may indicate whether another replica supports the attempt (in which case it is included in a failover quorum) or stores more recent data or metadata than the replica attempting to become the master (in which case synchronization may be required). If the failover quorum includes enough replicas, the replica may become the master.
-
公开(公告)号:US20180089032A1
公开(公告)日:2018-03-29
申请号:US15278180
申请日:2016-09-28
Applicant: International Business Machines Corporation
Inventor: Ying -Yeung Li
IPC: G06F11/14
CPC classification number: G06F11/1441 , G06F11/1474 , G06F2201/805 , G06F2201/82 , G06F2201/825 , G06F2201/85
Abstract: Techniques are provided for performing automated operations to enable first-failure data capture functionality during initialization of multiple lockstep processors. Following a hardware reset of two lockstep processors, an indication is received of one or more crosscheck errors regarding the operation of the two lockstep processors. In response to the crosscheck errors, crosscheck first-failure data capture (FFDC) data is saved to one or more memory areas that are persistent across a hardware reset, and it is determined whether a predefined reset threshold has been satisfied. Responsive to determining that the predefined reset threshold has been satisfied, the crosscheck FFDC data from the one or more persistent memory areas is analyzed and one or more crosscheck initialization codes are responsively generated. An additional hardware reset is initiated.
-
145.
公开(公告)号:US09858160B2
公开(公告)日:2018-01-02
申请号:US14731658
申请日:2015-06-05
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Lior Aronovich , Asaf Levy , Liran Loya
IPC: G06F17/30 , G06F11/20 , G06F11/14 , G06F12/0813 , H04L29/08 , G06F11/16 , G06F9/38 , G06F3/12 , G06F9/52
CPC classification number: G06F11/2007 , G06F3/121 , G06F9/3863 , G06F9/526 , G06F11/1435 , G06F11/1471 , G06F11/1658 , G06F11/1666 , G06F11/2023 , G06F11/2043 , G06F11/2094 , G06F12/0813 , G06F17/30076 , G06F17/30312 , G06F2201/82 , G06F2201/825 , G06F2201/84 , G06F2209/523 , H04L67/1097
Abstract: A DSM component is organized as a matrix of page. The data structure of a set of data structures occupies a column in the matrix of pages. A recovery file is maintained in a persistent storage. The recovery file consists of entries and each one of the entries corresponds to a column in the matrix of pages by a location of each one of the entries.
-
公开(公告)号:US20170308566A1
公开(公告)日:2017-10-26
申请号:US15495399
申请日:2017-04-24
Applicant: TRANSWARP TECHNOLOGY (SHANGHAI) CO., LTD.
Inventor: Fei XU , Wanggen LIU , Ke DAI , Yi KANG
CPC classification number: G06F16/2343 , G06F11/1438 , G06F11/203 , G06F16/2379 , G06F16/24553 , G06F2201/80 , G06F2201/805 , G06F2201/82 , G06F2201/825
Abstract: An objective of the present application is to provide a method and device for processing a distributed transaction. Compared with the prior art, in a distributed system, a first device in the present application is a group formed by multiple nodes. The first device acquires a writer lock adding request, sent by an SQL compiler, about a target table of a to-be-processed transaction, and performs writer lock adding processing on the target table on the basis of the writer lock adding request, so as to avoid collision problems in multi-transaction concurrence and to ensure isolation of transactions. If the writer lock adding processing is successful, to-be-processed version information of the target table is sent to the SQL compiler, so as to ensure that the SQL compiler operates a correct version of the target table later. Further, by restarting child nodes which do not respond to the writer lock adding request or migrating service of the child nodes to other physical machines and then updating locking state information of the child nodes, the present application effectively recovers errors and ensures in-group consistency.
-
公开(公告)号:US20170242755A1
公开(公告)日:2017-08-24
申请号:US15055861
申请日:2016-02-29
Applicant: Red Hat, Inc.
Inventor: Adam Litke , Nir Soffer , Liron Aravot
CPC classification number: G06F11/1451 , G06F3/0604 , G06F3/0622 , G06F3/065 , G06F3/0659 , G06F3/0665 , G06F3/0667 , G06F3/067 , G06F3/0673 , G06F9/45545 , G06F9/45558 , G06F11/0793 , G06F2009/45583 , G06F2201/805 , G06F2201/815 , G06F2201/82 , G06F2201/825
Abstract: Systems and methods for failure recovery in shared storage operations. An example method comprises: acquiring a lock with respect to a storage domain comprising a specified disk image; creating a transaction marker associated with the disk image; creating a component of a new volume associated with the disk image; destroying the transaction marker; and releasing the lock with respect to the storage domain.
-
公开(公告)号:US20170235758A1
公开(公告)日:2017-08-17
申请号:US15422286
申请日:2017-02-01
Applicant: Nutanix, Inc.
Inventor: Anil Kumar Gopalapura Venkatesh , Richard James Sharpe , Durga Mahesh Arikatla , Kalpesh Ashok Bafna , Devyani Suryakant Kanada
CPC classification number: G06F8/65 , G06F3/0619 , G06F3/0647 , G06F3/065 , G06F3/0664 , G06F3/0665 , G06F3/0683 , G06F3/0689 , G06F9/4406 , G06F9/45558 , G06F11/0712 , G06F11/0751 , G06F11/0793 , G06F11/1451 , G06F11/1464 , G06F11/1484 , G06F11/2025 , G06F11/2033 , G06F11/2035 , G06F11/2046 , G06F11/2058 , G06F11/2069 , G06F16/1727 , G06F16/176 , G06F16/1774 , G06F16/183 , G06F16/1844 , G06F16/2365 , G06F21/53 , G06F21/56 , G06F21/6218 , G06F21/78 , G06F2009/45579 , G06F2009/45583 , G06F2009/45587 , G06F2009/45595 , G06F2201/80 , G06F2201/815 , G06F2201/825 , G06F2201/84 , G06F2201/87 , G06F2221/034 , G06F2221/2101 , G06F2221/2141 , G06F2221/2145 , H04L41/06 , H04L41/082 , H04L41/0859 , H04L41/5009 , H04L67/10 , H04L67/1095 , H04L67/1097 , H04L67/34
Abstract: In one embodiment, a system for managing a virtualization environment includes a set of host machines, each of which includes a hypervisor, virtual machines, and a virtual machine controller, and a virtualized file server backup system configured to identify backup data, wherein the backup data comprises data stored on the virtual disks and VFS configuration information, and the first data is identified in accordance with a backup policy, send the backup data to one or more remote sites for storage, and, in response to detection of changes in the backup data, send the changes to the remote sites in accordance with a replication policy. The backup data may be identified based on a protection domain associated with the backup policy. The data stored on the VFS may include one or more storage objects. The storage objects may include shares, groups of shares, files, or directories.
-
公开(公告)号:US20170235639A1
公开(公告)日:2017-08-17
申请号:US15369328
申请日:2016-12-05
Applicant: NETAPP, INC.
Inventor: Saji Kumar VIJAYAKUMARI RAJENDRAN NAIR , John MENEGHINI , Arun Kumar RAJENDRAN , Frederick KNIGHT
CPC classification number: G06F11/1446 , G06F3/061 , G06F3/065 , G06F3/067 , G06F17/30117 , G06F17/30171 , G06F17/30581 , G06F17/30864 , G06F2201/825 , G06F2201/84
Abstract: Methods and systems for a copy-offload operation are provided. A soft range lock is placed for a data container for generating a token for a copy-offload operation for copying the data container from a source location to a destination location, where presence of the soft range lock indicates that content of the data container has not changed during the copy-offload operation. A token for the copy-offload operation represents the content of data container and includes information regarding the soft range lock. The token with the soft range lock information is provided to the client that requests the copy-offload operation. If the soft range lock exists, then the data container is copied without using a point in time copy of the data container.
-
公开(公告)号:US09684573B2
公开(公告)日:2017-06-20
申请号:US12770577
申请日:2010-04-29
Applicant: Sarin Sumit Manmohan , Manav Laxmikant Deshmukh
Inventor: Sarin Sumit Manmohan , Manav Laxmikant Deshmukh
CPC classification number: G06F11/2028 , G06F11/2038 , G06F11/2046 , G06F2201/825
Abstract: In response to an instruction to dismount a storage volume, for example, an object in the storage volume is identified and a handle that references the object is closed. Once an exclusive lock on the storage volume is acquired, the storage volume can be dismounted. The storage volume can then remounted.
-
-
-
-
-
-
-
-
-