摘要:
In one aspect there is provided a method. The method may include generating a graphical representation of a decision logic underlying a solution, the graphical representation having a plurality of nodes. A component archetype can be identified. The identified component archetype can support generating a function implementing one of the plurality of nodes in the graphical representation of the solution. An instance of the component can be generated based at least on the component archetype. The function can be generated by invoking the instance of the component. The generated function can be hosted by the instance of the component. Alternately and/or additionally, the generation function can be copied into one or more separate execution environments. Systems and articles of manufacture, including computer program products, are also provided.
摘要:
In one aspect there is provided a method. The method may include collecting one or more functions that implement the decision logic of a solution. A snapshot of the one or more functions can be generated. The snapshot can executable code associated with the one or more functions. The solution can be deployed by at least storing the snapshot of the one or more functions to a repository Systems and articles of manufacture, including computer program products, are also provided.
摘要:
A cloud-based data governance system includes a processing unit, a network adapter, and memory for storing data and code. The network adapter establishes a connection with a remote data storage system associated with a remote file system over a wide-area network (WAN). The code includes and event collection interface, a data governance service, and an enforcement service. The event collection interface is configured to capture an event from the remote data storage system. The event is indicative of a file system operation executed on a data object of the remote file system. The data governance service is configured to receive the event from the event collection interface and to process the event to determine whether the file system operation conflicts with a governance policy of the data governance system. The enforcement service executes a set of remediation actions, if the file system operation does conflict with the governance policy.
摘要:
Examples disclosed herein relate to propagating changes made on a file system volume of a primary cluster of nodes to the same file system volume also being managed by a secondary cluster of nodes. An application is executed on both clusters, and data changes on the primary cluster are mirrored to the secondary cluster using an exo-clone file. The exo-clone file includes the differences between two or more snapshots of the volume on the primary cluster, along with identifiers of the change blocks and (optionally) state information thereof. Just these changes, identifiers, and state information are packaged in the exo-clone file and then exported to the secondary cluster, which in turn makes the changes to its version of the volume. Exporting just the changes to the data blocks and the corresponding block identifiers drastically reduces the information needed to be exchanged and processed to keep the two volumes consistent.
摘要:
A method includes receiving a snapshot comprising one or more files, calculating one or more file checksums for the files in the snapshot, creating a listing of elements in the snapshot, calculating a listing checksum corresponding to the listing of elements in the snapshot, comparing the one or more file checksums and the listing checksum of the received snapshot to one or more file checksums and listing checksums of an unverified snapshot responsive to receiving a snapshot verification request, and providing an indication that the snapshot is valid responsive to determining the one or more file checksums and the listing checksum of the received snapshot and the one or more file checksums and listing checksums of an unverified snapshot are the same. A computer program product and a computer system corresponding to the method are also disclosed.
摘要:
Disclosed herein is a data synchronization between a client computing device's local store and another data store, such as a data store that is remote to the client computing device. The other data store may comprise a cloud data store. The existence, or absence, of a causal relationship between the local and remote data stores for a given data item is used to determine whether or not a conflict exists and/or whether a requested operation may be performed. The causal relationship may be determined using a previous commit's hash value, referred to as a hash_base value, and a hash value, both of which are associated with the data item.
摘要:
A system, method, and non-transitory computer-readable medium provide backup and archive services for computing devices. Typically, multiple backup snapshots are archived together in each archive cycle. A catalogue for the current archive is efficiently created by starting with a copy of the previous archive catalogue and updating it based on metadata associated with the backup snapshots.
摘要:
Provided are systems and methods for garbage collection of objects in storage. An example method may include providing a monotonically increasing logical clock. Each object is associated with a first number and a second number. The second number is a minimum of the first numbers of objects in a subtree to which the object refers. When the logical clock increases, objects with the first number less than the logical clock from the storage are deleted. When a new object is added to the storage, the first number of the new object is set to a new first number. The new first number is equal to or greater than the logical clock. The first number of each object in a subtree to which the new object is referring is updated. The updated first number is a function of a previous first number and a previous logical clock.
摘要:
A system, method, and computer program product for the provision of a snapshot repository that grows and shrinks over time. The snapshot repository stores snapshot images. When the used capacity of the repository reaches an upper bound of the repository, the image may be wrapped to the start of the repository if the image stored there previously has been deleted. Otherwise another stripe volume is added from a pool of available volumes and the image continues storage there. As older images are deleted according to a retention policy, stripe volumes that become empty may be dis-associated from their associated LBA range and released to the pool or re-mapped to a lower LBA range of the repository. When the empty stripe volume is at the end of the repository, the ending LBA may be adjusted to the end of the last allocated stripe volume as the volume is released.
摘要:
Example embodiments disclosed herein relate to use of a network controller to determine or create a network port profile for a virtual machine snapshot. In one example, the network controller receives a request from a virtual machine manager to create a network port profile for a virtual machine associated with a virtual machine identifier. In the example, a network port profile is created based on the virtual machine identifier. In the example, the network port profile includes port information about a virtual machine port associated with the virtual machine identifier, a virtual switch associated with the virtual machine port, and a physical switch port associated with the virtual switch.