Creating global aggregated namespaces for storage management
    4.
    发明授权
    Creating global aggregated namespaces for storage management 有权
    创建用于存储管理的全局聚合命名空间

    公开(公告)号:US09330161B2

    公开(公告)日:2016-05-03

    申请号:US13861997

    申请日:2013-04-12

    Abstract: Embodiments are directed to creating global, aggregated namespaces for storage management and to providing consistent namespaces in a distributed storage system. In one scenario, a computer system defines data storage objects for each data storage node. The data storage objects uniquely identify storage elements of the data storage nodes, where each data storage object includes various associated attributes. The computer system replicates the defined data storage objects and any associated attributes from a first data storage node to a second, different data storage node among the data storage nodes. As such, the defined data storage objects are visible from any node in the data storage nodes. The computer system also aggregates the defined data storage objects for each of the data storage nodes and creates a global, aggregated namespace that includes the aggregated data storage objects for each of the data storage nodes.

    Abstract translation: 实施例旨在创建用于存储管理的全局,聚合命名空间,并在分布式存储系统中提供一致的命名空间。 在一种情况下,计算机系统为每个数据存储节点定义数据存储对象。 数据存储对象唯一地标识数据存储节点的存储元件,其中每个数据存储对象包括各种关联的属性。 计算机系统将定义的数据存储对象和任何相关联的属性从第一数据存储节点复制到数据存储节点中的第二不同的数据存储节点。 因此,定义的数据存储对象可从数据存储节点中的任何节点看到。 计算机系统还聚合每个数据存储节点的定义的数据存储对象,并创建包括每个数据存储节点的聚合数据存储对象的全局聚合命名空间。

    Fault tolerant federation of computing clusters

    公开(公告)号:US10177994B2

    公开(公告)日:2019-01-08

    申请号:US14459066

    申请日:2014-08-13

    Abstract: Embodiments are directed to organizing computing nodes in a cluster federation and to reassigning roles in a cluster federation. In one scenario, a computer system identifies computing nodes that are to be part of a cluster federation which includes a master cluster and worker clusters. The computer system assigns a director role to a master node in the master cluster which governs decisions that affect consistency within the federation, and further assigns a leader role to at least one master node which monitors and controls other master nodes in the master cluster. The computer system assigns a worker agent role to a worker node which receives workload assignments from the master cluster, and further assigns a worker role to a worker node which processes the assigned workload. The organized cluster federation provides fault tolerance by allowing roles to be dynamically reassigned to computing nodes in different master and worker clusters.

    Recovery of application from snapshot
    8.
    发明授权
    Recovery of application from snapshot 有权
    从快照恢复应用程序

    公开(公告)号:US09430333B2

    公开(公告)日:2016-08-30

    申请号:US13829204

    申请日:2013-03-14

    Abstract: The targeted recovery of application-specific data corresponding to an application without performing recovery of the entire volume. The recovery is initiated by beginning to copy the prior state of the content of an application-specific data container from a prior snapshot to the application-specific data container in an operation volume accessible by the application. However, while the content of the application-specific data container is still being copied from the snapshot to the application-specific data container, the application is still permitted to perform read and write operations on the application-specific data container. Thus, the application-specific data container appears to the application to be fully accessible even though recovery of the content of the application-specific data container is still continuing in the background.

    Abstract translation: 有针对性地恢复与应用程序相对应的应用程序特定数据,而不执行整个卷的恢复。 通过开始将应用程序特定数据容器的内容的先前状态从先前的快照复制到应用程序可访问的操作卷中的应用程序特定的数据容器来启动恢复。 然而,尽管应用程序特定数据容器的内容仍然从快照复制到特定于应用程序的数据容器,但仍然允许应用程序对应用程序特定的数据容器执行读写操作。 因此,即使应用程序特定的数据容器的内容的恢复仍然在后台继续,应用程序对应用程序看起来是完全可访问的。

    Domain joined virtual names on domainless servers

    公开(公告)号:US10798092B2

    公开(公告)日:2020-10-06

    申请号:US16295193

    申请日:2019-03-07

    Abstract: Services from domainless machines are made available in a security domain under a virtual name. Each machine is not joined to the domain but can reach a security domain controller. The controller controls at least one security domain using an authentication protocol, such as a modified Kerberos protocol. One obtains a set of security domain credentials, generates a cluster name secret, gives the cluster a virtual name, and authenticates the machines to the domain controller using these items. In some cases, authentication uses a ticket-based protocol which accepts the cluster name secret in place of a proof of valid security domain membership. In some, the domain controller uses a directory service which is compatible with an active directory service; the cluster virtual name is provisioned as an account in the directory service. The cluster virtual name may concurrently serve clients on different security domains of the directory service.

Patent Agency Ranking