Access Consistency in High-Availability Databases

    公开(公告)号:US20240004746A1

    公开(公告)日:2024-01-04

    申请号:US18203388

    申请日:2023-05-30

    Applicant: PayPal, Inc.

    Abstract: Techniques are disclosed relating to maintaining a high availability (HA) database. In some embodiments, a computer system receives, from a plurality of host computers, a plurality of requests to access data stored in a database implemented using a plurality of clusters. In some embodiments, the computer system responds to the plurality of requests by accessing data stored in an active cluster. The computer system may then determine, based on the responding, health information for ones of the plurality of clusters, wherein the health information is generated based on real-time traffic for the database. In some embodiments, the computer system determines, based on the health information, whether to switch from accessing the active cluster to accessing a backup cluster. In some embodiments, the computer system stores, in respective clusters of the database, a changeover decision generated based on the determining.

    BALANCED DATA MIRRORING DISTRIBUTION FOR PARALLEL ACCESS

    公开(公告)号:US20230385167A1

    公开(公告)日:2023-11-30

    申请号:US17828077

    申请日:2022-05-31

    Inventor: Kuolin Hua

    CPC classification number: G06F11/2069 G06F11/2082 G06F11/1096 G06F11/1088

    Abstract: Mirrored pairs in a RAID-1 are distributed in a balanced and deterministic way that increases data access parallelism. For a group of k+1 disks that can be represented as a matrix of disk rows indexed 0 through k, where each disk is organized into k same-size subdivisions, in columns indexed 1 through k, corresponding mirrors of data members on the first disk (row index 0) are distributed across all other disks along a matrix diagonal such that the row index is the same as the column index for each mirror. Additional mirror pairs are created and symmetrically distributed in two submatrix triangles that are defined and separated by the diagonal. The two triangles are populated with symmetrically distributed mirrors that are flipped around the matrix diagonal such that for any mirror data in one triangle, its corresponding mirror data can be found in the other triangle by swapping the row and column indices.

    Enabling data integrity checking and faster application recovery in synchronous replicated datasets

    公开(公告)号:US11829607B2

    公开(公告)日:2023-11-28

    申请号:US17548990

    申请日:2021-12-13

    Applicant: NetApp Inc.

    Abstract: One or more techniques and/or computing devices are provided for utilizing snapshots for data integrity validation and/or faster application recovery. For example, a first storage controller, hosting first storage, has a synchronous replication relationship with a second storage controller hosting second storage. A snapshot replication policy rule is defined to specify that a replication label is to be used for snapshot create requests, targeting the first storage, that are to be replicated to the second storage. A snapshot creation policy is created to issue snapshot create requests comprising the replication label. Thus a snapshot of the first storage and a replication snapshot of the second storage are created based upon a snapshot create request comprising the replication label. The snapshot and the replication snapshot may be compared for data integrity validation (e.g., determine whether the snapshots comprise the same data) and/or quickly recovering an application after a disaster.

    Failover Methods and System in a Networked Storage Environment

    公开(公告)号:US20230325289A1

    公开(公告)日:2023-10-12

    申请号:US18208478

    申请日:2023-06-12

    Applicant: NETAPP, INC.

    Abstract: Failover methods and systems for a storage environment are provided. During a takeover operation to take over storage of a first storage system node by a second storage system node, the second storage system node copies information from a first storage location to a second storage location. The first storage location points to an active file system of the first storage system node, and the second storage location is assigned to the second storage system node for the takeover operation. The second storage system node quarantines storage space likely to be used by the first storage system node for a write operation, while the second storage system node attempts to take over the storage of the first storage system node. The second storage system node utilizes information stored at the second storage location during the takeover operation to give back control of the storage to the first storage system node.

Patent Agency Ranking