-
公开(公告)号:US20190243718A1
公开(公告)日:2019-08-08
申请号:US16232965
申请日:2018-12-26
Applicant: Commvault Systems, Inc.
Inventor: Manoj Kumar Vijayan , Deepak Raghunath Attarde
IPC: G06F11/14
CPC classification number: G06F11/1456 , G06F11/1448 , G06F11/1451 , G06F11/1469 , G06F11/2094 , G06F2201/84
Abstract: The data storage system according to certain aspects can implement partial file restore, where only a portion of the secondary copy of a file is restored. Such portion may be designated by one or more application offsets for the file. The system may provide an in-chunk index that includes mapping information between the application offsets and the secondary copy offsets. Chunks may refer to logical data units in which secondary copies are stored, and the in-chunk index for a chunk may be stored in secondary storage with the chunk. Because the mapping information may not be provided at a fixed interval, the system can search through application offsets in the in-chunk index to locate the secondary copy offset corresponding to the portion application offset(s). In this manner, the system may restore the designated portion of the secondary copy in a fast and efficient manner by using the in-chunk index.
-
公开(公告)号:US20190243680A1
公开(公告)日:2019-08-08
申请号:US16388990
申请日:2019-04-19
Applicant: International Business Machines Corporation
Inventor: Joshua H. Armitage , Michael P. Clarke , John A.W. Kaputin , King-Yan Kwan , Andrew Wright
CPC classification number: G06F9/466 , G06F11/1474 , G06F2201/84
Abstract: Disclosed aspects relate to agent flow arrangement management in a distributed commit processing environment. A first set of agent utilization data may be collected with respect to a first commit processing agent. A second set of agent utilization data may be collected with respect to a second commit processing agent. An agent flow arrangement may be determined based on a first value with respect to the first set of agent utilization data exceeding a second value with respect to the second set of agent utilization data. The agent flow arrangement may have the first commit processing agent subsequent to the second commit processing agent. The distributed commit operation may be processed using the agent flow arrangement which has the first commit processing agent subsequent to the second commit processing agent.
-
公开(公告)号:US20190243554A1
公开(公告)日:2019-08-08
申请号:US16386703
申请日:2019-04-17
Applicant: International Business Machines Corporation
Inventor: Andrew D. Baptist , Jason K. Resch , Ilya Volvovski , Ethan S. Wozniak
IPC: G06F3/06 , H03M13/11 , G06F11/10 , H04L29/08 , G06F9/48 , G06F9/50 , G06F12/0891 , G06F12/0866 , H03M13/15 , G06F11/14 , G06F15/173 , H03M13/37
CPC classification number: G06F11/1092 , G06F3/061 , G06F3/0619 , G06F3/0629 , G06F3/0635 , G06F3/064 , G06F3/0644 , G06F3/0665 , G06F3/067 , G06F3/0689 , G06F9/4881 , G06F9/5083 , G06F11/1076 , G06F11/108 , G06F11/1402 , G06F11/1464 , G06F12/0866 , G06F12/0891 , G06F15/17331 , G06F2201/84 , G06F2211/1007 , G06F2212/1024 , G06F2212/154 , G06F2212/263 , G06F2212/403 , H03M13/1105 , H03M13/1515 , H03M13/3761 , H03M13/616 , H03M13/6502 , H04L61/1582 , H04L61/6004 , H04L63/101 , H04L67/1097
Abstract: A method for use in a dispersed storage network operates to initiate retrieval of a decode threshold number of encoded data slices of each of one or more sets of encoded data slices in accordance with a first recovery approach. When a recovery time frame expires prior to receiving a second decode threshold number of encoded data slices of each of the one or more second sets of encoded data slices, the method proceeds to select a second data recovery approach that differs from the first recovery approach; recover a sufficient number of encoded data slices in accordance with the second data recovery approach; and dispersed storage error decode the sufficient number of encoded data slices to produce recovered data.
-
194.
公开(公告)号:US20190235969A1
公开(公告)日:2019-08-01
申请号:US15886714
申请日:2018-02-01
Applicant: EMC IP Holding Company LLC
Inventor: Anupam Sharma
CPC classification number: G06F11/1464 , G06F9/45558 , G06F11/1469 , G06F11/1474 , G06F21/604 , G06F2009/45583 , G06F2009/45595 , G06F2201/84 , H04L67/28
Abstract: One embodiment is related to a method for backing up application transaction data through a virtual backup proxy node, comprising: mounting an application transaction data disk image at the virtual backup proxy node, the application transaction data disk image comprising application transaction data generated by an application running on a virtual machine; and copying the transaction data disk image to a storage device for backup protection through a first network.
-
公开(公告)号:US20190220360A1
公开(公告)日:2019-07-18
申请号:US15870728
申请日:2018-01-12
Applicant: VMware, Inc.
Inventor: Satish Kumar Kashi Visvanathan , Pooja Sarda , Ilya Langouev
CPC classification number: G06F11/1435 , G06F3/0652 , G06F3/067 , G06F16/907 , G06F2201/84 , H04L67/1097
Abstract: Techniques for deleting a snapshot of a data set archived in cloud/object storage are provided. In one set of embodiments, a computer system can identify data blocks that are part of the snapshot and are referred to by an incremental child snapshot of the snapshot. The computer system can further create a new metadata object that includes metadata entries for the identified data blocks, each metadata entry comprising an identifier of the incremental child snapshot, an identifier of a data block, and an identifier of a data object of the incremental child snapshot where the data block is stored. The computer system can then associate the new metadata object with the incremental child snapshot in the cloud/object storage.
-
公开(公告)号:US20190220198A1
公开(公告)日:2019-07-18
申请号:US15870711
申请日:2018-01-12
Applicant: VMware, Inc.
Inventor: Satish Kumar Kashi Visvanathan , Pooja Sarda , Ilya Langouev , Arun Kandambakkam
CPC classification number: G06F3/067 , G06F3/0638 , G06F16/907 , G06F2201/84 , H04L67/1097
Abstract: Techniques for archiving a data set in cloud/object storage are provided. In one set of embodiments, a computer system can receive an incremental snapshot of the data set and package the incremental snapshot into one or more data objects and one or more metadata objects. The one or more data objects can include data blocks of the incremental snapshot, and the one or more metadata objects can include a metadata entry for each data block, the metadata entry comprising an identifier of the incremental snapshot, an identifier of the data block, and an identifier of a data object in which the data block is stored. The computer system can then write the one or more data objects and the one or more metadata objects to the cloud/object storage.
-
197.
公开(公告)号:US20190213083A1
公开(公告)日:2019-07-11
申请号:US16355731
申请日:2019-03-16
Applicant: International Business Machines Corporation
Inventor: Alexander Cook , Manuel Orozco , Christopher R. Sabotta , John M. Santosuosso
IPC: G06F11/14 , G06F16/901 , G06F16/2455
CPC classification number: G06F11/1461 , G06F11/1438 , G06F11/1474 , G06F16/24568 , G06F16/9024 , G06F2201/805 , G06F2201/84
Abstract: A variable checkpoint mechanism in a streams manager checkpoints a streaming application based on periodic time periods for checkpoints. The variable checkpoint mechanism can take a checkpoint before a periodic time period ends when a spike is coming, or can take a checkpoint after the periodic time period ends when there is backpressure in a consistent region of the streaming application. When there is no anticipated spike coming and when there is no backpressure in a consistent region of the streaming application, the checkpoint is performed at the normal end of the periodic time period for checkpoints. In this manner the checkpoint timing of the variable checkpoint mechanism can be adjusted real-time to minimize the negative impact of checkpointing on the performance of the streaming application.
-
公开(公告)号:US20190196919A1
公开(公告)日:2019-06-27
申请号:US16286546
申请日:2019-02-26
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Arun Sankar , Jagadish Madhu , Ramesh Kannan Karuppasamy , Rajkumar Kannan
CPC classification number: G06F11/1469 , G06F11/1004 , G06F11/1012 , G06F16/116 , G06F16/125 , G06F16/2365 , G06F2201/84
Abstract: To maintain files in a retained file system, a run-time error detection code (EDC) is generated for a retained file. The run-time EDC is generated on the basis of at least one of entire content and metadata of the retained file. Further, the run-time EDC is compared with a validation EDC associated with the retained file to identify a corruption of the retained file. The validation EDC is generated at an instance of placing the retained file in the retained FS. Furthermore, the validation EDC is based on at least one of entire content and metadata of the retained file. Based on the comparison, an original version of the retained file may is restored from a trusted backup system.
-
公开(公告)号:US20190188085A1
公开(公告)日:2019-06-20
申请号:US15842123
申请日:2017-12-14
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Alastair Slater , Andrew Sparkes
CPC classification number: G06F11/1451 , G06F3/0619 , G06F3/0641 , G06F11/1453 , G06F11/1464 , G06F11/1469 , G06F11/1471 , G06F16/128 , G06F2201/84
Abstract: Examples include the persistent storage of cached data of a write to a block device presentation. Some examples may include a block device presentation of data represented by first backup objects stored in a deduplication backup appliance, and may cause the deduplication backup appliance to store second backup objects representing the data stored in a cache for each transient write to the block device presentation.
-
公开(公告)号:US20190146948A1
公开(公告)日:2019-05-16
申请号:US16233851
申请日:2018-12-27
Applicant: Commvault Systems, Inc.
CPC classification number: G06F16/128 , G06F11/00 , G06F11/1448 , G06F11/1458 , G06F2201/805 , G06F2201/84
Abstract: An information management system according to certain aspects may determine whether storage operations will work prior to executing them. The system may check various factors or parameters relating to a storage policy to verify whether the storage policy will work at runtime without actually executing the policy. Some examples of factors can include: availability of primary storage devices, availability of secondary storage devices, license availability for performing that operation, user credentials for connecting to primary and/or second storage devices, available storage capacity, connectivity to storage devices, etc. The system may also check whether a particular system configuration is supported in connection with storage operations. The result of the determination can be provided in the form of a report summarizing any problems found with the storage policy. The report can include recommended courses of action or solutions for resolving any identified issues.
-
-
-
-
-
-
-
-
-