Recovery point objective enforcement

ABSTRACT

A maximum lag between data stores can be specified that corresponds to a recovery point objective defined in a service level agreement. Lag can be monitored during a data replication between a primary data store and a secondary data store located in geographically different regions. Activity on the primary data store including incoming data transactions can be throttled as a function of the lag and the maximum lag.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims priority under 35 U.S.C. § 119 and/or 35 U.S.C.§ 120 to U.S. patent application Ser. No. 13/768,539, also entitled“RECOVERY POINT OBJECTIVE ENFORCEMENT,” filed on Feb. 15, 2013, theentirety of which is hereby incorporated by reference as if fullyrewritten herein.

BACKGROUND

Cloud computing refers to the use of computing resources includinghardware and software that are delivered as a service over a networksuch as the Internet. Cloud service providers operate data centers thathost customer databases and applications. Customers of a cloud serviceprovider build services for their customers on top of thisinfrastructure. Some of those services are mission critical. That is,failure of those services will have an adverse effect on the ability ofan entity, such as a business, to continue operations.

One of biggest benefits of cloud computing is that customers, by virtuedata center employment, no longer have to worry about the availabilityof data and code. At the same time, hardware and various other elementsinside of data centers clearly have reliability limits and failures canoccur. The expectation is that regardless of these failures cloudservice providers will be able to run applications and protect data inany case. Mechanisms are already in place when it comes to failure ofindividual components of a data center, for example, when a serverfails. However, there are types of failures or distributive events thatcould affect an entire data center. For example, natural disasters,catastrophic human errors, or malicious acts could result in a massivefailure of a data center. Such a massive failure would result inapplication and data unavailability for a period of time while a cloudservice provider repairs the facility.

In order to guarantee availability of applications and data even incases of a massive data center failure, redundant copies can bemaintained at a separate facility. A primary data center can be selectedto host applications and data, and a secondary data center can beidentified as a backup, wherein the primary and secondary data centersare in different geographical regions. If the primary data centersuffers a massive failure and an application and database are no longeraccessible, there is a process called fail over in which the secondarydata center can be activated to provide access to the application anddatabase on the secondary data center. To support such a disasterrecovery scenario, the service provider replicates data between theprimary and secondary data centers. Nevertheless, data can be lost incase of data center failure, because of the distance between datacenters located in different regions. The distance causes a lag betweentransactions committed on a primary database and transactions committedon a secondary database, for instance. When a failure occurs, not alldata committed on the primary database will have been committed on thesecondary database. Consequently, data is lost after fail over.

SUMMARY

The following presents a simplified summary in order to provide a basicunderstanding of some aspects of the disclosed subject matter. Thissummary is not an extensive overview. It is not intended to identifykey/critical elements or to delineate the scope of the claimed subjectmatter. Its sole purpose is to present some concepts in a simplifiedform as a prelude to the more detailed description that is presentedlater.

Briefly described, the subject disclosure pertains torecovery-point-objective enforcement. A recovery point objective definesthe maximum acceptable data loss in case of disruptive event andsubsequent fail over. Further, potential data loss can be capped. Toenforce an upper limit on the amount of data loss, lag can be monitoredas data is replicated from a primary store to a secondary store.Moreover, activity on the primary store can be throttled as a functionof the lag and a maximum lag corresponding to a recovery pointobjective. If a data change to the primary source is aborted as a resultof throttling, an error message can be spawned indicating at least asmuch. Further, current lag amongst other data can be made available toenable at least compliance monitoring. Still further yet, resources canbe allocated at least as a function of the maximum lag.

To the accomplishment of the foregoing and related ends, certainillustrative aspects of the claimed subject matter are described hereinin connection with the following description and the annexed drawings.These aspects are indicative of various ways in which the subject mattermay be practiced, all of which are intended to be within the scope ofthe claimed subject matter. Other advantages and novel features maybecome apparent from the following detailed description when consideredin conjunction with the drawings.

DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of a data-loss limitation system.

FIG. 2 is a block diagram of an exemplary execution environment for thedata-loss limitation system.

FIG. 3 is a flow chart diagram of a method of configuration.

FIG. 4 is a flow chart diagram of a method of maximum lag enforcement.

FIG. 5 is a flow chart diagram of a method of data acquisition.

FIG. 6 is a schematic block diagram illustrating a suitable operatingenvironment for aspects of the subject disclosure.

DETAILED DESCRIPTION

A cloud-based application can have a service level agreement (SLA) thatdefines a limit of potential data loss in the case of wide spread lossof facilitates caused by natural disasters, catastrophic human errors,or malicious acts, for example. Since application vendors or developersmay be liable if data loss exceeds the limits defined by the SLA, amechanism to limit the potential loss can be offered by a cloud serviceprovider with respect to a data source that the application depends onfor its state (e.g., relational database, table store . . . ).Conventionally, a log shipping mechanism is employed, wherein log filesare collected and sent at a scheduled interval to a backup data center.A downside of this approach is that data loss is equal to the interval.Other solutions that employ asynchronous replication do not provide anyguarantees regarding data loss and simply employ what is called besteffort replication. Here, however, there are situations in which dataloss can exceed a maximum. By way of example, in a situation in whichthere is a high transaction rate combined with intermittent loss ofconnectivity, data loss can be significant and in excess of a maximumdefined by the SLA.

Details below are generally directed toward enforcement of a recoverypoint objective (RPO) for disaster recovery. The RPO defines the maximumamount of data that can be lost on fully recovering from a disruptiveevent such as a disastrous failure. RPO is typically specified in inservice level agreement between an application vendor or developer andits customers. A service provider that hosts such an application canprovide a mechanism to bound potential data loss by specifying a maximumlag between the times when data changes on a source and when the changesare synchronized on the replica. Lag can be monitored during datareplication, and incoming transactions corresponding to data creation,modification, or deletion, for example, can be throttled as a functionof the lag and the maximum lag. Throttling, in one instance, cancorrespond to aborting incoming transactions when the maximum lag isreached. Additionally or alternatively, the speed at which the incomingtransactions are accepted or committed on a source can be reduced as lagis approaching the maximum lag to provide a graceful slowdown andminimize situations when transactions are aborted. If a transaction isaborted, an error message can be spawned indicating that the transactionwas aborted because the current lag has exceeded a configured maximum.Further, current lag among other data can be provided in response to arequest therefor, for instance, to enable at least compliancemonitoring. Still further yet, resources, such as bandwidth, can beallocated at least as a function of the maximum lag

Various aspects of the subject disclosure are now described in moredetail with reference to the annexed drawings, wherein like numeralsrefer to like or corresponding elements throughout. It should beunderstood, however, that the drawings and detailed description relatingthereto are not intended to limit the claimed subject matter to theparticular form disclosed. Rather, the intention is to cover allmodifications, equivalents, and alternatives falling within the spiritand scope of the claimed subject matter.

Referring initially to FIG. 1, data-loss-limitation system 100 isillustrated. The system 100 can be employed in conjunction with datareplication provided by the replication component 110. In other words,the replication component 110 is configured to automatically replicatedata or changes thereto across sources. In accordance with oneembodiment, the replication component 110 can be configured to performcontinuous and asynchronous data replication. Stated differently,changes to an active source (a store that is open for full applicationaccess (e.g., read-write transactions)) can be continuously copied to areplica (a redundant store) as changes occur in what can also be termeda continuous copy relationship. In this instance, there is no delayassociated with collecting or batching changes and subsequently sendingcollections at scheduled intervals.

The system 100 can accept as input a value of maximum lag. Moreparticularly, application developer can specify the maximum lag inconjunction with a data replication, which can correspond to a recoverypoint objective in a service level agreement with an applicationcustomer. The recovery point objective defines how much data loss acustomer (e.g., individual, business, organization . . . ) will toleratein case of a disastrous failure that disrupts normal function, forexample, where there is a data center outage. The RPO can be expressedin terms of time such as seconds, minutes, or hours, for example. An RPOof one hour, for instance, means loss of an hour worth of changes to asource is the maximum acceptable data loss upon disaster recovery. Ifgiven a service level agreement it is desired to ensure that the RPO isnot violated, a corresponding maximum lag can be specified (e.g., inminutes) in conjunction with data replication.

Lag monitor component 102 is configured to determine and track themaximum difference between a source and one or more target replicas interms of time (e.g., minutes, hours . . . ). This can be accomplished bykeeping track of the lag between changes made on a source andsynchronization of the changes on a replica.

A transaction is a unit of work performed against a data store that isatomic, consistent, isolated, and durable. A transaction can includeoperations that create, retrieve, modify, or delete data. Once atransaction is committed on a data store, the transaction is permanentand acknowledgement thereof can be provided. In the context oftransactions, the lag component 102 can keep track of the oldesttransaction to commit on the source but not on a replica(acknowledgement was not received from the replica). Stated yet anotherway, maximum unacknowledged time can be monitored.

Throttle component 104 is configured to throttle activity of anapplication 120 automatically as a function of current lag, as providedby the lag monitor component 102, and the maximum lag. In other words,lag can be compared to maximum lag and throttling performed basedthereon. The throttle component 104 can be configured to operate in oneor more different modes.

In accordance with one embodiment, the throttle component 104 is binaryBased on the current lag and maximum lag, the application 120 is eitherthrottled or not. For example, if the lag exceeds the maximum lag, theapplication is throttled. Otherwise, the application is operates withoutthrottling. In one instance, a throttled application can be prohibitedfrom accepting data or transactions. Additionally or alternatively, athrottled application can prevent data from being saved or a transactionfrom being committed on a local source. By halting data or transactionsfrom being processed, additional time is provided to allow a replica tocatch up with the state of a source and lag to be reduced to anacceptable range. If the application 120 is throttled, an error messagecan be spawned through the application indicating to a user that theapplication is not accepting new transactions or that a transaction willnot be committed, for example, because the current lag is greater thanthat the permitted based on a configurable maximum lag.

According to another embodiment, the throttle component 104 can beconfigured to reduce the speed at which the application 120 can acceptincoming transactions as a function of the current lag and maximum lag.As opposed to denying the users the ability to deposit new data, thethrottle component 104 can slow acceptance of transactions down to allowa replica to catch up with the state of a source. For example, theapplication 120 can be slowed down as the current lag approaches themaximum lag. Further, the slowdown can be variable such that the extentto which activity of the application 120 is slowed down depends on howclose the current lag is to the maximum. Further yet, the pace at whichlagging is increasing for example can be considered by the throttlecomponent 104 in determining a slowdown rate. For example, if lag isincreasing rapidly the throttle component 104 can provide acorresponding degree of slowdown.

A hybrid configuration can also be employed by the throttle component104. For instance, application slowdown can be employed up to a point.At that point, additional data or transactions will not be accepted atall. As lag decreases, the application can be allowed to accepttransactions at a reduced speed until lag decreases to a threshold atwhich time throttling can be terminated.

Report component 106 is configured to output data regarding the system100, for instance in response to a user request. In one instance, thereport component 106 can provide an indication that the system 100 isactive. Further, the report component 106 can output the current lag.The maximum lag is a limit or upper boundary. However, if the maximumlag is thirty minutes, for example, that does not mean that at any givenpoint the actual or current lag is thirty minutes. Rather, the lag islikely to be few seconds. Making the lag obtainable enables a user toconfirm that the system 100 is operating as expected.

Resource management component 108 is configured to control allocation ofresources automatically as a function of the maximum lag. In particular,communication bandwidth can be allocated based thereon. For instance, ifamount of data loss that can be tolerated is small (e.g., five minutes),the resource management component 108 can allocate or initiateallocation of isolated or dedicated bandwidth between a source and areplica. Consequently, the amount of lag will be smaller than itotherwise would be since there will be no competition for resources withothers. Furthermore, the resource management component 108 can beconfigured to dynamically change resource allocation based on runtimeperformance. By way of example, more resources can be providedtemporarily when lag approaches the maximum lag to help a replica catchup.

Among other things, the system 100 enables a tradeoff between data lossand availability. In some situations, applications are highly sensitiveto data loss. The system 100 provides a mechanism to cap data loss.Moreover, in most cases availability and performance are not negativelyimpacted, except in the case when the chance is high that data loss willexceed a maximum. In this case, data transactions can be halted orslowed down in order to ensure that more data will not be lost than canbe afforded. Further, dedicated bandwidth can be employed ensure dataloss does not exceed a cap as well as improve performance by reducingthe likelihood of throttling.

FIG. 2 depicts an exemplary concrete environment in which the system canbe employed. As shown, there are two data centers, namely primary datacenter 210 and secondary data center 250. The primary data center 210 islocated in a primary region and the secondary data center 250 is locatedin a secondary region. The primary and secondary regions are differentand distant geographic regions, or, in other words, disaster recoverysites. For instance, geographic regions can correspond to countries orstates within countries. As non-limiting examples, the primary datacenter 210 could be located in the United States while the secondarydata center 250 could be located in Canada or the primary data center210 could be located in Texas while the secondary data center 250 couldbe located in Illinois. Such cross-region redundancy enables recoveryfrom a temporary outage or even the permanent loss of a data centercaused by natural disasters, catastrophic human errors, or maliciousacts. Such events, though rare, can be devastating. For example,consider a scenario in which the entire primary data center 210 isflooded. Even if the primary data center 210 is intact, an applicationand data could be inaccessible for days, which can be detrimental tobusiness continuity.

The primary data center 210 includes primary server 220 and primary datastore 230, and the secondary data center 250 includes secondary server260 and secondary data store 270. The primary data source 230 andsecondary data store 270 are non-volatile storage media that housepersistent data. In one instance, the primary data store 230 and thesecondary data store 270 can correspond to a database that storesapplication data, or, in other words, data that an application dependson for its state.

The primary server 220 and secondary server 260 are physical computersthat execute services and provide data to other computers connectedthereto over a network such as the Internet. As shown, the primaryserver 220 hosts the application 120 (as a service) that accepts andprocesses transactions from one or more users. The application 120 canbe embodied as a cloud-based service with data saved in the primary datastore 230.

The replication component 110 can also be executed on the primary server220 to replication data from the primary data store to the second datastore continuously and asynchronously. Accordingly, once a datatransaction commits, or executes successfully in its entirety, on theprimary data source 230 the transaction is transmitted and replicated onthe secondary data source. There is no delay associated with batchingtransactions and sending batches at scheduled intervals. If thetransaction successfully executes in its entirety on the secondary datastore 270, or, in other words, commits, an acknowledgment can be sent tothe replication component 110 indicating that the transaction committedand providing the commit time on the secondary data store 270.

The data-loss limitation system 100 can be communicatively coupled to,or integrated within, the replication component 110 and application 120.The system 100 can keep track of the difference between the primary datastore 230 and the secondary data store 270. More specifically, thesystem 100 can monitor lag between the two stores based on commit timesand throttle the application 120 as needed to ensure that any potentialdata loss does not exceed a configured maximum. Throttling cancorrespond to preventing the application from accepting incomingtransactions and/or preventing accepted transactions from committing onthe primary data store 230. Additionally or alternatively, throttlingcan be accomplished by reducing the speed at which transactions areaccepted and/or committed. In either case, additional time is affordedfor queued transactions to commit on the secondary data store 270.

Although not shown, the secondary server 260 can include a copy of theapplication 120 or be able to load the application from a store such asthe secondary data store 270. In any event, if an communicationinterlink between data centers is lost, there is prolonged loss ofconnectivity to the primary store, or there is a data center wide outagein a region, a decision can be made to fail over to the secondary datacenter 250 and associated secondary data store 270. In other words, thesecondary data center 250 can be activated as the new primary datacenter and transactions can be directed thereto. In this case, data losscan occur since some data transactions committed on the primary datastore 230 may not have been replicated to the secondary data store 270.Nevertheless, due to throttling the data loss will be capped.

FIG. 2 illustrates a simplified environment to facilitate clarity andunderstanding with respect to various disclosed aspects. The claimedsubject matter is not limited thereto. For example, here only onereplica is disclosed. However, it is to be appreciated that thefunctionality described herein can be extended to situations in whichtwo or more replicas exist.

The aforementioned systems, architectures, environments, and the likehave been described with respect to interaction between severalcomponents. It should be appreciated that such systems and componentscan include those components or sub-components specified therein, someof the specified components or sub-components, and/or additionalcomponents. Sub-components could also be implemented as componentscommunicatively coupled to other components rather than included withinparent components. Further yet, one or more components and/orsub-components may be combined into a single component to provideaggregate functionality. Communication between systems, componentsand/or sub-components can be accomplished in accordance with either apush and/or pull model. The components may also interact with one ormore other components not specifically described herein for the sake ofbrevity, but known by those of skill in the art.

Furthermore, various portions of the disclosed systems above and methodsbelow can include or employ of artificial intelligence, machinelearning, or knowledge or rule-based components, sub-components,processes, means, methodologies, or mechanisms (e.g., support vectormachines, neural networks, expert systems, Bayesian belief networks,fuzzy logic, data fusion engines, classifiers . . . ). Such components,inter alia, can automate certain mechanisms or processes performedthereby to make portions of the systems and methods more adaptive aswell as efficient and intelligent. By way of example, and notlimitation, the data-loss limitation system 100 can employ suchmechanisms to determine or infer that lag will exceed a maximum andproactively initiate throttling of application activity. For instancebased on the time of year, date, day of week, or time of day, it can beinferred a larger than normal amount of data will be acquired rapidly.In this situation, throttling can be initiated to slowdown processing toensure that a specified RPO is not violated.

In view of the exemplary systems described above, methodologies that maybe implemented in accordance with the disclosed subject matter will bebetter appreciated with reference to the flow charts of FIGS. 3-5. Whilefor purposes of simplicity of explanation, the methodologies are shownand described as a series of blocks, it is to be understood andappreciated that the claimed subject matter is not limited by the orderof the blocks, as some blocks may occur in different orders and/orconcurrently with other blocks from what is depicted and describedherein. Moreover, not all illustrated blocks may be required toimplement the methods described hereinafter.

Referring to FIG. 3, a configuration method 300 is illustrated. Atnumeral 310 creation of a replica can be initiated, for example as partof configuring an application hosted by a cloud service provider. Atnumeral 320, a location can be identified for the replica. The locationcan be a different and distant geographic region with respect to aprimary data source such that a disruptive event such as a naturaldisaster (e.g., tsunami, hurricane, tornado, earthquake . . . ) isunlikely to affect both the primary and replica, for instance. Atreference numeral 330, a maximum lag between the primary and replica canbe selected or otherwise specified. In one instance, the maximum lag canbe selected based on an RPO in a service level agreement. By way ofexample and not limitation, the lag can be specified between fiveminutes and twenty-four hours.

FIG. 4 illustrates a method 400 of maximum lag enforcement. At referencenumeral 410, data or changes thereto are replicated between a primarydata source and a secondary data source. Replication can be continuousand asynchronous. Stated differently, changes can be continuously copiedfrom source data store that has active transactions to a communicativelycoupled replica data store as changes are occur. At numeral 420, lagbetween the primary and secondary sources is monitored. In one instance,the oldest unacknowledged transaction can be tracked, wherein anunacknowledged transaction is one that has committed on the source datastore but acknowledgement that the transaction committed on thesecondary data source has not been received. Here, oldest can refer tothe largest difference between commit time on the source and the currenttime. At 430, activity on the primary source can be throttled as afunction of the lag and a maximum lag. For instance, if the current lagbetween a primary source and a replica is exceeds the maximum lag,incoming transactions can be rejected and/or prevented from committingon the primary source. In another instance, the speed at which datatransactions are accepted and/or processed can be reduced as lagapproaches the maximum. For example, an applications ability to acceptand process transactions can be slowed at an increasing rate such thatoperation of the application is halted when the lag reaches the maximumallowable. This allows a replica time to commit data transactions andreduce the lag at which point throttling can be reduced or terminated.

FIG. 5 is a flow chart diagram of method 500 of data acquisition. Atnumeral 510, a request of the current lag between a source and a replicais received, retrieved, or otherwise obtained or acquired. At reference520, current lag is determined by locating a pre-computed value orcomputing the difference between the current time and the oldest datatransaction committed on the source from which acknowledgement that thetransaction committed on the replica has not been received. At referencenumeral 530, the current lag can be returned in response to the request.This enables confirmation a system is operating properly in enforcingthe maximum lag. Additional information could also be returned with thecurrent lag including information indicative of whether or notthrottling is being performed and potentially the rate of throttling.

The word “exemplary” or various forms thereof are used herein to meanserving as an example, instance, or illustration. Any aspect or designdescribed herein as “exemplary” is not necessarily to be construed aspreferred or advantageous over other aspects or designs. Furthermore,examples are provided solely for purposes of clarity and understandingand are not meant to limit or restrict the claimed subject matter orrelevant portions of this disclosure in any manner. It is to beappreciated a myriad of additional or alternate examples of varyingscope could have been presented, but have been omitted for purposes ofbrevity.

As used herein, the terms “component,” and “system,” as well as variousforms thereof (e.g., components, systems, sub-systems . . . ) areintended to refer to a computer-related entity, either hardware, acombination of hardware and software, software, or software inexecution. For example, a component may be, but is not limited to being,a process running on a processor, a processor, an object, an instance,an executable, a thread of execution, a program, and/or a computer. Byway of illustration, both an application running on a computer and thecomputer can be a component. One or more components may reside within aprocess and/or thread of execution and a component may be localized onone computer and/or distributed between two or more computers.

The conjunction “or” as used in this description and appended claims isintended to mean an inclusive “or” rather than an exclusive “or,” unlessotherwise specified or clear from context. In other words, “‘X’ or ‘Y’”is intended to mean any inclusive permutations of “X” and “Y.” Forexample, if “‘A’ employs ‘X,’” “‘A employs ‘Y,’” or “‘A’ employs both‘X’ and ‘Y,’” then “‘A’ employs ‘X’ or ‘Y’” is satisfied under any ofthe foregoing instances.

As used herein, the term “inference” or “infer” refers generally to theprocess of reasoning about or inferring states of the system,environment, and/or user from a set of observations as captured viaevents and/or data. Inference can be employed to identify a specificcontext or action, or can generate a probability distribution overstates, for example. The inference can be probabilistic—that is, thecomputation of a probability distribution over states of interest basedon a consideration of data and events. Inference can also refer totechniques employed for composing higher-level events from a set ofevents and/or data. Such inference results in the construction of newevents or actions from a set of observed events and/or stored eventdata, whether or not the events are correlated in close temporalproximity, and whether the events and data come from one or severalevent and data sources. Various classification schemes and/or systems(e.g., support vector machines, neural networks, expert systems,Bayesian belief networks, fuzzy logic, data fusion engines . . . ) canbe employed in connection with performing automatic and/or inferredaction in connection with the claimed subject matter.

Furthermore, to the extent that the terms “includes,” “contains,” “has,”“having” or variations in form thereof are used in either the detaileddescription or the claims, such terms are intended to be inclusive in amanner similar to the term “comprising” as “comprising” is interpretedwhen employed as a transitional word in a claim.

In order to provide a context for the claimed subject matter, FIG. 6 aswell as the following discussion are intended to provide a brief,general description of a suitable environment in which various aspectsof the subject matter can be implemented. The suitable environment,however, is only an example and is not intended to suggest anylimitation as to scope of use or functionality.

While the above disclosed system and methods can be described in thegeneral context of computer-executable instructions of a program thatruns on one or more computers, those skilled in the art will recognizethat aspects can also be implemented in combination with other programmodules or the like. Generally, program modules include routines,programs, components, data structures, among other things that performparticular tasks and/or implement particular abstract data types.Moreover, those skilled in the art will appreciate that the abovesystems and methods can be practiced with various computer systemconfigurations, including single-processor, multi-processor ormulti-core processor computer systems, mini-computing devices, mainframecomputers, as well as personal computers, hand-held computing devices(e.g., personal digital assistant (PDA), phone, watch . . . ),microprocessor-based or programmable consumer or industrial electronics,and the like. Aspects can also be practiced in distributed computingenvironments where tasks are performed by remote processing devices thatare linked through a communications network. However, some, if not allaspects of the claimed subject matter can be practiced on stand-alonecomputers. In a distributed computing environment, program modules maybe located in one or both of local and remote memory storage devices.

With reference to FIG. 6, illustrated is an example general-purposecomputer 610 or computing device (e.g., desktop, laptop, tablet, server,hand-held, programmable consumer or industrial electronics, set-top box,game system, compute node . . . ). The computer 610 includes one or moreprocessor(s) 620, memory 630, system bus 640, mass storage 650, and oneor more interface components 670. The system bus 640 communicativelycouples at least the above system components. However, it is to beappreciated that in its simplest form the computer 610 can include oneor more processors 620 coupled to memory 630 that execute variouscomputer executable actions, instructions, and or components stored inmemory 630.

The processor(s) 620 can be implemented with a general purposeprocessor, a digital signal processor (DSP), an application specificintegrated circuit (ASIC), a field programmable gate array (FPGA) orother programmable logic device, discrete gate or transistor logic,discrete hardware components, or any combination thereof designed toperform the functions described herein. A general-purpose processor maybe a microprocessor, but in the alternative, the processor may be anyprocessor, controller, microcontroller, or state machine. Theprocessor(s) 620 may also be implemented as a combination of computingdevices, for example a combination of a DSP and a microprocessor, aplurality of microprocessors, multi-core processors, one or moremicroprocessors in conjunction with a DSP core, or any other suchconfiguration.

The computer 610 can include or otherwise interact with a variety ofcomputer-readable media to facilitate control of the computer 610 toimplement one or more aspects of the claimed subject matter. Thecomputer-readable media can be any available media that can be accessedby the computer 610 and includes volatile and nonvolatile media, andremovable and non-removable media. Computer-readable media can comprisecomputer storage media and communication media.

Computer storage media includes volatile and nonvolatile, removable andnon-removable media implemented in any method or technology for storageof information such as computer-readable instructions, data structures,program modules, or other data. Computer storage media includes memorydevices (e.g., random access memory (RAM), read-only memory (ROM),electrically erasable programmable read-only memory (EEPROM) . . . ),magnetic storage devices (e.g., hard disk, floppy disk, cassettes, tape. . . ), optical disks (e.g., compact disk (CD), digital versatile disk(DVD) . . . ), and solid state devices (e.g., solid state drive (SSD),flash memory drive (e.g., card, stick, key drive . . . ) . . . ), or anyother like mediums which can be used to store the desired informationand which can be accessed by the computer 610. Furthermore, computerstorage media excludes modulated data signals.

Communication media typically embodies computer-readable instructions,data structures, program modules, or other data in a modulated datasignal such as a carrier wave or other transport mechanism and includesany information delivery media. The term “modulated data signal” means asignal that has one or more of its characteristics set or changed insuch a manner as to encode information in the signal. By way of example,and not limitation, communication media includes wired media such as awired network or direct-wired connection, and wireless media such asacoustic, RF, infrared and other wireless media. Combinations of any ofthe above should also be included within the scope of computer-readablemedia.

Memory 630 and mass storage 650 are examples of computer-readablestorage media. Depending on the exact configuration and type ofcomputing device, memory 630 may be volatile (e.g., RAM), non-volatile(e.g., ROM, flash memory . . . ) or some combination of the two. By wayof example, the basic input/output system (BIOS), including basicroutines to transfer information between elements within the computer610, such as during start-up, can be stored in nonvolatile memory, whilevolatile memory can act as external cache memory to facilitateprocessing by the processor(s) 620, among other things.

Mass storage 650 includes removable/non-removable, volatile/non-volatilecomputer storage media for storage of large amounts of data relative tothe memory 630. For example, mass storage 650 includes, but is notlimited to, one or more devices such as a magnetic or optical diskdrive, floppy disk drive, flash memory, solid-state drive, or memorystick.

Memory 630 and mass storage 650 can include, or have stored therein,operating system 660, one or more applications 662, one or more programmodules 664, and data 666. The operating system 660 acts to control andallocate resources of the computer 610. Applications 662 include one orboth of system and application software and can exploit management ofresources by the operating system 660 through program modules 664 anddata 666 stored in memory 630 and/or mass storage 650 to perform one ormore actions. Accordingly, applications 662 can turn a general-purposecomputer 610 into a specialized machine in accordance with the logicprovided thereby.

All or portions of the claimed subject matter can be implemented usingstandard programming and/or engineering techniques to produce software,firmware, hardware, or any combination thereof to control a computer torealize the disclosed functionality. By way of example and notlimitation, the data-loss limitation system 100, or portions thereof,can be, or form part, of an application 662, and include one or moremodules 664 and data 666 stored in memory and/or mass storage 650 whosefunctionality can be realized when executed by one or more processor(s)620.

In accordance with one particular embodiment, the processor(s) 620 cancorrespond to a system on a chip (SOC) or like architecture including,or in other words integrating, both hardware and software on a singleintegrated circuit substrate. Here, the processor(s) 620 can include oneor more processors as well as memory at least similar to processor(s)620 and memory 630, among other things. Conventional processors includea minimal amount of hardware and software and rely extensively onexternal hardware and software. By contrast, an SOC implementation ofprocessor is more powerful, as it embeds hardware and software thereinthat enable particular functionality with minimal or no reliance onexternal hardware and software. For example, the data-loss limitationsystem 100 and/or associated functionality can be embedded withinhardware in a SOC architecture.

The computer 610 also includes one or more interface components 670 thatare communicatively coupled to the system bus 640 and facilitateinteraction with the computer 610. By way of example, the interfacecomponent 670 can be a port (e.g., serial, parallel, PCMCIA, USB,FireWire . . . ) or an interface card (e.g., sound, video . . . ) or thelike. In one example implementation, the interface component 670 can beembodied as a user input/output interface to enable a user to entercommands and information into the computer 610, for instance by way ofone or more gestures or voice input, through one or more input devices(e.g., pointing device such as a mouse, trackball, stylus, touch pad,keyboard, microphone, joystick, game pad, satellite dish, scanner,camera, other computer . . . ). In another example implementation, theinterface component 670 can be embodied as an output peripheralinterface to supply output to displays (e.g., CRT, LCD, LED, plasma . .. ), speakers, printers, and/or other computers, among other things.Still further yet, the interface component 670 can be embodied as anetwork interface to enable communication with other computing devices(not shown), such as over a wired or wireless communications link.

What has been described above includes examples of aspects of theclaimed subject matter. It is, of course, not possible to describe everyconceivable combination of components or methodologies for purposes ofdescribing the claimed subject matter, but one of ordinary skill in theart may recognize that many further combinations and permutations of thedisclosed subject matter are possible. Accordingly, the disclosedsubject matter is intended to embrace all such alterations,modifications, and variations that fall within the spirit and scope ofthe appended claims.

What is claimed is:
 1. A computer-implemented method, comprising:monitoring lag between a primary data store located in a firstgeographic region and a secondary data store located in a seconddifferent geographic region during data replication from the primarydata store to the secondary data store; and throttling activity on theprimary data store as a function of the lag and a configurable maximumlag, wherein throttling comprises blocking incoming transactions againstthe primary data store when the lag exceeds the maximum lag.
 2. Themethod of claim 1 further comprises replicating data asynchronouslybetween the primary data store and the secondary data store.
 3. Themethod of claim 1 further comprises blocking the incoming transactionsat primary source commit time.
 4. The method of claim 1 furthercomprises spawning an error message in an application supplying ablocked incoming transaction indicating that the lag exceeds the maximumlag.
 5. The method of claim 1, wherein throttling further comprisesreducing a speed at which other incoming transactions commit on theprimary data store.
 6. The method of claim 1, throttling furthercomprises reducing a speed at which other incoming transactions areaccepted.
 7. The method of claim 1 further comprises reporting the lagin response to a request.
 8. The method of claim 1 further comprisesdynamically changing resource allocation as a function of the lag andthe maximum lag.
 9. A system, comprising: a processor coupled to amemory having instructions stored thereon, the instructions executableby the processor to: replicate data asynchronously from a primary datasource to a secondary data source, wherein the primary data source andthe secondary data source are located in different geographic regions;monitor lag between one or more transactions committing on the primarydata source and the one or more transactions committing on the secondarydata source; throttle, at the primary data source, one or more incomingtransactions from an application based on the lag and a specifiedmaximum lag; and block the one or more incoming transactions fromcommitting on the primary source at commit time.
 10. The system of claim9, wherein the instructions are further executable by the processor toreject the one or more incoming transactions when the lag exceeds themaximum lag.
 11. The system of claim 10, wherein the instructions arefurther executable by the processor to output an error message withinthe application that indicates the lag exceeds the maximum lag.
 12. Thesystem of claim 9, wherein the instructions are further executable bythe processor to slow a rate at which other incoming transactions areaccepted from the application.
 13. The system of claim 9, wherein theinstructions are further executable by the processor to slow a rate atwhich other incoming transactions commit on the primary data source. 14.The system of claim 9, wherein the instructions are further executableby the processor to report the lag in response to a request.
 15. Acomputer-readable storage medium having instructions stored thereon thatenable at least one processor to perform a method upon execution of theinstructions, the method comprising: replicating data asynchronouslyfrom a primary data source located in a first geographic region to asecondary data source located in a second different geographic region;monitoring lag between commit time of one or more transactions on theprimary data source and secondary data source; and aborting one or moreincoming transactions on the primary data source when the lag exceeds aconfigurable maximum value.
 16. The method of claim 15 further comprisesaborting the one or more incoming transactions at primary data sourcecommit time.
 17. The method of claim 15 further comprises spawning anerror message indicating that the lag exceeds the maximum value uponaborting one of the one or more incoming transactions.
 18. The method ofclaim 15 further comprises reporting the lag in response to a request.