Proactive identification of hotspots in a cloud computing environment
    2.
    发明授权
    Proactive identification of hotspots in a cloud computing environment 有权
    在云计算环境中主动识别热点

    公开(公告)号:US09329908B2

    公开(公告)日:2016-05-03

    申请号:US12893302

    申请日:2010-09-29

    IPC分类号: G06F15/173 G06F9/50

    摘要: The present invention proactively identifies hotspots in a cloud computing environment through cloud resource usage models that use workload parameters as inputs. In some embodiments the cloud resource usage models are based upon performance data from cloud resources and time series based workload trend models. Hotspots may occur and can be detected at any layer of the cloud computing environment, including the server, storage, and network level. In a typical embodiment, parameters for a workload are identified in the cloud computing environment and inputted into a cloud resource usage model. The model is run with the inputted workload parameters to identify potential hotspots, and resources are then provisioned for the workload so as to avoid these hotspots.

    摘要翻译: 本发明通过使用工作负载参数作为输入的云资源使用模型主动地识别云计算环境中的热点。 在一些实施例中,云资源使用模型基于来自云资源和基于时间序列的工作负载趋势模型的性能数据。 热点可能发生,可以在云计算环境的任何层面检测,包括服务器,存储和网络级别。 在典型的实施例中,工作负载的参数在云计算环境中被识别并被输入到云资源使用模型中。 该模型使用输入的工作负载参数运行,以识别潜在的热点,然后为工作负载提供资源,以避免这些热点。

    Detecting inadvertent or malicious data corruption in storage subsystems and recovering data
    3.
    发明授权
    Detecting inadvertent or malicious data corruption in storage subsystems and recovering data 失效
    检测存储子系统中的无意或恶意数据损坏并恢复数据

    公开(公告)号:US08315991B2

    公开(公告)日:2012-11-20

    申请号:US12763934

    申请日:2010-04-20

    IPC分类号: G06F17/30

    摘要: Embodiments of the invention detect inadvertent or malicious data corruption and for recovering data including receiving a query specifying corrupted application data; analyzing transaction logs to find update operations related to the data; determining where the data are stored, by mapping the table data to locations within the file system and mapping the file system locations to volume logical blocks; and analyzing snapshot volume bitmaps to determine if the bitmaps show changes to the table data stored in the volume logical blocks. Changes which are reflected in the bitmaps for the data, but which do not have corresponding entries in the transaction logs are flagged as unauthorized changes. Snapshots of the data, from a time prior to the time at which a flagged snapshot was taken, are identified for use in restoring data to its status prior to the unauthorized change.

    摘要翻译: 本发明的实施例检测无意或恶意的数据损坏并且用于恢复数据,包括接收指定损坏的应用数据的查询; 分析事务日志以查找与数据相关的更新操作; 通过将表数据映射到文件系统内的位置并将文件系统位置映射到卷逻辑块来确定数据的存储位置; 并分析快照卷位图以确定位图是否显示存储在卷逻辑块中的表数据的更改。 反映在数据的位图中但在事务日志中没有相应条目的更改将被标记为未经授权的更改。 在从被标记的快照拍摄之前的时间起,数据的快照被识别用于在未经授权的更改之前将数据恢复到其状态。

    Detecting Inadvertent or Malicious Data Corruption in Storage Subsystems and Recovering Data
    5.
    发明申请
    Detecting Inadvertent or Malicious Data Corruption in Storage Subsystems and Recovering Data 失效
    检测存储子系统中无意或恶意数据损坏和恢复数据

    公开(公告)号:US20110258164A1

    公开(公告)日:2011-10-20

    申请号:US12763934

    申请日:2010-04-20

    IPC分类号: G06F12/16 G06F17/30

    摘要: Embodiments of the invention detect inadvertent or malicious data corruption and for recovering data including receiving a query specifying corrupted application data; analyzing transaction logs to find update operations related to the data; determining where the data are stored, by mapping the table data to locations within the file system and mapping the file system locations to volume logical blocks; and analyzing snapshot volume bitmaps to determine if the bitmaps show changes to the table data stored in the volume logical blocks. Changes which are reflected in the bitmaps for the data, but which do not have corresponding entries in the transaction logs are flagged as unauthorized changes. Snapshots of the data, from a time prior to the time at which a flagged snapshot was taken, are identified for use in restoring data to its status prior to the unauthorized change.

    摘要翻译: 本发明的实施例检测无意或恶意的数据损坏并且用于恢复数据,包括接收指定损坏的应用数据的查询; 分析事务日志以查找与数据相关的更新操作; 通过将表格数据映射到文件系统内的位置并将文件系统位置映射到卷逻辑块来确定数据的存储位置; 并分析快照卷位图以确定位图是否显示存储在卷逻辑块中的表数据的更改。 反映在数据的位图中但在事务日志中没有相应条目的更改将被标记为未经授权的更改。 在从被标记的快照拍摄之前的时间起,数据的快照被识别用于在未经授权的更改之前将数据恢复到其状态。

    Middleware for Extracting Aggregation Statistics to Enable Light-Weight Management Planners
    6.
    发明申请
    Middleware for Extracting Aggregation Statistics to Enable Light-Weight Management Planners 失效
    提取聚合统计数据以实现轻量级管理规划者的中间件

    公开(公告)号:US20110126219A1

    公开(公告)日:2011-05-26

    申请号:US12622737

    申请日:2009-11-20

    IPC分类号: G06F9/46

    CPC分类号: G06F9/50

    摘要: Management of a planner through use of a middleware layer. A computer system is configured with the middleware layer in communication with both a planner and a data repository. One or more modules are provided in the middleware layer to support the functionality of the planner. Application program interface calls are employed to call the modules, thereby mitigating duplication of the functionality in separate planners.

    摘要翻译: 通过使用中间件层来管理计划者。 计算机系统配置有与计划者和数据存储库通信的中间件层。 在中间件层中提供一个或多个模块以支持计划者的功能。 应用程序接口调用用于调用模块,从而减轻单独规划者中功能的重复。

    STORAGE MANAGEMENT THROUGH ADAPTIVE DEDUPLICATION
    7.
    发明申请
    STORAGE MANAGEMENT THROUGH ADAPTIVE DEDUPLICATION 有权
    存储管理通过自适应校验

    公开(公告)号:US20100250501A1

    公开(公告)日:2010-09-30

    申请号:US12411902

    申请日:2009-03-26

    IPC分类号: G06F12/02 G06F12/00 G06F17/30

    CPC分类号: G06F17/30598 G06F17/30489

    摘要: One embodiment retrieves a first portion of a plurality of stored objects from at least one storage device. The embodiment further performs a base type deduplication estimation process on the first portion of stored objects. The embodiment still further categorizes the first portion of the plurality of stored objects into deduplication sets based on a deduplication relationship of each object of the plurality of stored objects with each of the estimated first plurality of deduplication chunk portions. The embodiment further combines deduplication sets into broad classes based on deduplication characteristics of the objects in the deduplication sets. The embodiment still further classifies a second portion of the plurality of stored objects into broad classes using classifiers. The embodiment further selects an appropriate deduplication approach for each categorized class.

    摘要翻译: 一个实施例从至少一个存储设备检索多个存储对象的第一部分。 该实施例还对存储对象的第一部分执行基本类型的重复数据删除估计处理。 该实施例还基于多个存储对象中的每个对象与所估计的第一多个重复数据删除块部分中的每一个的重复数据删除关系,进一步将多个存储对象的第一部分分类为重复数据删除集合。 该实施例还将重复数据删除集合基于重复数据删除集中的对象的重复数据删除特性组合成大类。 该实施例还使用分类器进一步将多个存储对象的第二部分分类为广泛类。 该实施例进一步为每个分类的类选择适当的重复数据删除方法。

    Self-modulation in a model-based automated management framework
    8.
    发明授权
    Self-modulation in a model-based automated management framework 失效
    基于模型的自动化管理框架中的自调制

    公开(公告)号:US07444272B2

    公开(公告)日:2008-10-28

    申请号:US11250066

    申请日:2005-10-13

    IPC分类号: G06F17/10 G06E1/00

    CPC分类号: G05B17/02 G05B13/042

    摘要: Embodiments herein present a method, system, computer program product, etc. for automated management using a hybrid of prediction models and feedback-based systems. The method begins by calculating confidence values of models. Next, the method selects a first model based on the confidence values and processes the first model through a constraint solver to produce first workload throttling values. Following this, workloads are repeatedly processed through a feedback-based execution engine, wherein the feedback-based execution engine is controlled by the first workload throttling values. The first workload throttling values are applied incrementally to the feedback-based execution engine, during repetitions of the processing of the workloads, with a step-size that is proportional to the confidence values. The processing of the workloads is repeated until an objective function is maximized, wherein the objective function specifies performance goals of the workloads.

    摘要翻译: 本文的实施例提出了使用预测模型和基于反馈的系统的混合的自动化管理的方法,系统,计算机程序产品等。 该方法从计算模型的置信度开始。 接下来,该方法基于置信度值选择第一模型,并通过约束求解器处理第一模型以产生第一工作负载节流值。 此后,通过基于反馈的执行引擎重复处理工作负载,其中基于反馈的执行引擎由第一工作负载节流值控制。 在重复处理工作负载期间,第一个工作负载限制值将逐步应用于基于反馈的执行引擎,步长与置信度值成比例。 重复处理工作负载直到目标函数最大化,其中目标函数指定工作负载的性能目标。

    Proactive detection of data inconsistencies in a storage system point-in-time copy of data
    10.
    发明授权
    Proactive detection of data inconsistencies in a storage system point-in-time copy of data 有权
    主动检测存储系统中数据不一致的时间点数据副本

    公开(公告)号:US08818962B2

    公开(公告)日:2014-08-26

    申请号:US12788026

    申请日:2010-05-26

    IPC分类号: G06F17/00 G06F17/30

    CPC分类号: G06F11/1004

    摘要: Embodiments of the invention relate to testing a storage system point-in-time copy of data for consistency. An aspect of the invention includes receiving system and application event information from systems and applications associated with point-in-time copies of data. The system and application event information is associated with each of point-in-time copies of data. At least one point-in-time copy of data is selected for testing. The system and application event information is compared with inconsistency classes to determine tests for testing the point-in-time copy of data. The point-in-time copy of data is tested.

    摘要翻译: 本发明的实施例涉及测试用于一致性的数据的存储系统时间点副本。 本发明的一个方面包括从与数据的时间点副本相关联的系统和应用接收系统和应用事件信息。 系统和应用事件信息与数据的每个时间点副本相关联。 选择至少一个时间点的数据副本进行测试。 将系统和应用程序事件信息与不一致类进行比较,以确定测试数据的时间点副本。 测试数据的时间点副本。