Failure recovery in shared storage operations
First Claim
Patent Images
1. A method, comprising:
- acquiring, by a processing device, a lock with respect to a storage domain comprising a specified disk image;
creating a transaction marker associated with the disk image, wherein the transaction marker is represented by a metadata file having a name comprising a pre-defined extension;
creating a component of a new volume associated with the disk image;
destroying the transaction marker by removing the extension from the name of the metadata file representing the transaction marker; and
releasing the lock with respect to the storage domain.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for failure recovery in shared storage operations. An example method comprises: acquiring a lock with respect to a storage domain comprising a specified disk image; creating a transaction marker associated with the disk image; creating a component of a new volume associated with the disk image; destroying the transaction marker; and releasing the lock with respect to the storage domain.
-
Citations
14 Claims
-
1. A method, comprising:
-
acquiring, by a processing device, a lock with respect to a storage domain comprising a specified disk image; creating a transaction marker associated with the disk image, wherein the transaction marker is represented by a metadata file having a name comprising a pre-defined extension; creating a component of a new volume associated with the disk image; destroying the transaction marker by removing the extension from the name of the metadata file representing the transaction marker; and releasing the lock with respect to the storage domain. - View Dependent Claims (2, 3, 7, 8)
-
-
4. A method, comprising:
-
scanning, by a processing device running a first process, a specified storage area to compile a list of transaction markers; acquiring a lock with respect to the specified storage area; identifying, in the list, a first transaction marker that was modified by a second process before the lock has been acquired by the first process; removing the first transaction marker from the list; retrieving a second transaction marker from the list; destroying a storage object referenced by the second transaction marker; destroying the second transaction marker; and releasing the lock with respect to the specified storage area. - View Dependent Claims (5, 6, 9, 10)
-
-
11. A computer-readable non-transitory storage medium comprising executable instructions that, when executed by a processing device, cause the processing device to:
-
scan a specified storage area to compile a list of transaction markers; acquire a lock with respect to the specified storage area; identifying, in the list, a first transaction marker that was modified by another process before the lock has been acquired; removing the first transaction marker from the list; retrieve a second transaction marker from the list; destroy a storage object referenced by the second transaction marker; destroy the second transaction marker; and release the lock with respect to the specified storage area. - View Dependent Claims (12, 13, 14)
-
Specification