Parameter delegation for encapsulated services

    公开(公告)号:US10795740B2

    公开(公告)日:2020-10-06

    申请号:US15640894

    申请日:2017-07-03

    Abstract: A service provider system may provide virtualized computing services to clients, including encapsulating services that call other (encapsulated) services. Once configured to delegate parameters to encapsulated services, an encapsulating service (and its API) may not need to be modified when an encapsulated service (or its API) is modified to support more, fewer, or different features or corresponding arguments. For example, an encapsulating service may receive a service request call from a client that includes arguments for an encapsulated service (e.g., as header information, or as an opaque block or uninterpreted key-value dictionary) and may call the encapsulated service, blindly passing along those arguments. An encapsulating service may access stored policy-based arguments or obtain arguments from a central service. Arguments passed to an encapsulated service may override default parameters of the service. An encapsulating service may blindly proxy responses received from an encapsulated service to a client.

    Migration of information via storage devices

    公开(公告)号:US10768849B2

    公开(公告)日:2020-09-08

    申请号:US15473475

    申请日:2017-03-29

    Abstract: A device such as a network-attachable data transfer device may be configured to operate in a cluster to coordinate the storage of data. A first manifest may be generated inventorying a first set of data successfully transferred to the data transfer device from a data source. A second manifest may be generated inventorying a second set of data successfully transferred from the data transfer device to a data destination. The first manifest may be compared with the second manifest to determine a transfer status of one or more data objects. The transfer status may indicate one or more data objects successfully transferred to the data destination from the data source. The one or more objects may be processed according to the transfer status.

    Durability-based redundancy encoded data storage

    公开(公告)号:US10649845B2

    公开(公告)日:2020-05-12

    申请号:US15785320

    申请日:2017-10-16

    Abstract: Techniques for making storage of data objects eventually durable using redundancy encoding are described herein. Data objects are stored in a first set of data storage devices with a first durability. After a predetermined length of time, the data objects are converted to data shards and distributed to a second set of data storage devices with a second durability that is distinct from the first durability.

    Dynamic power budgets
    66.
    发明授权

    公开(公告)号:US10606642B1

    公开(公告)日:2020-03-31

    申请号:US14488133

    申请日:2014-09-16

    Abstract: A system and method for dynamically implementing a resource budget based at least in part on receiving information that prompts a determination of whether to adjust a maximum amount of resources available for utilization at least in part by data storage operations. As a result of the determination, the system and method produce, based at least in part on the information, a resource budget that reflects an adjustment to the maximum amount of resources available for utilization at least in part by the data storage operations, and implements the resource budget such that performance of the data storage operations is adjusted in accordance with the adjustment to the maximum amount of resources available for utilization.

    Object loss reporting in a data storage system

    公开(公告)号:US10055451B2

    公开(公告)日:2018-08-21

    申请号:US14595020

    申请日:2015-01-12

    Abstract: In response to receiving a request from a client to store an object, a key-durable storage system may assign the object to a volume in its data store, generate a key for the object (e.g., an opaque identifier that encodes information for locating the object in the data store), store the object on one disk in the assigned volume, store the key redundantly in the assigned volume (e.g., using a replication or erasure coding technique), and may return the key to the client. To retrieve the object, the client may send a request including the key, and the system may return the object to the client. If a disk fails, the system may determine which objects were lost, and may return the corresponding keys to the appropriate clients in a notification. The system may be used to back up a more expensive object-redundant storage system.

    Incremental backups while minimizing media access

    公开(公告)号:US10042718B1

    公开(公告)日:2018-08-07

    申请号:US15280944

    申请日:2016-09-29

    Abstract: Techniques for producing incremental short-term backups while minimizing media access are described herein. A backup request is received that specifies data to backup and a schedule for that backup. The data is then partitioned based on the schedule and, for each of the partitions, it is determined whether to store a full or incremental backup of that partition. Each partition is fully backed up once during a cycle of backups and incrementally backed up at other times. With each full backup of a partition, a reverse delta that can be used to reconstruct the previous full backup for that partition is stored with the full backup.

Patent Agency Ranking