Method and system for performing data protection services using a grouped subsystem level feedback mechanism

ABSTRACT

In general, in one aspect, the invention relates to a method for managing performances of services, the method comprising: generating subsystem groups, wherein each subsystem group of the subsystem groups comprises a plurality of subsystems, wherein each subsystem group is associated with one a plurality of services, wherein the subsystem groups are generated using per-service subsystem requirements; and performing at least one of the plurality of services using a subsystem group of the subsystem groups.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation-in-part of U.S. patent application Ser. No. 17/384,190, filed on Jul. 23, 2021, and entitled: “METHOD AND SYSTEM FOR PERFORMING DATA PROTECTION SERVICES USING A SUBSYSTEM LEVEL FEEDBACK MECHANISM”. Accordingly, this application claims benefit of U.S. patent application Ser. No. 17/384,190 under 35 U.S.C. § 120, which is hereby incorporated by reference in its entirety. U.S. patent application Ser. No. 17/384,190 claims priority to Indian Provisional Application No. 202141025762 filed on Jun. 10, 2021. Indian Provisional Application No. 202141025762 is hereby incorporated by reference in its entirety.

BACKGROUND

Computing devices may provide services. To provide the services, the computing devices may include hardware components and software components. Data may be generated by the computing devices during the performance of the services. The data may be important to users. To protect the data, backups of the data may be generated and stored in storage devices.

SUMMARY

In general, in one aspect, the invention relates to a method for managing performances of services, the method comprising: generating subsystem groups, wherein each subsystem group of the subsystem groups comprises a plurality of subsystems, wherein each subsystem group is associated with one a plurality of services, wherein the subsystem groups are generated using per-service subsystem requirements; and performing at least one of the plurality of services using a subsystem group of the subsystem groups.

In general, in one aspect, the invention relates to a non-transitory computer readable medium comprising computer readable program code, which when executed by a computer processor enables the computer processor to perform a method for managing performances of services, the method comprising: generating subsystem groups, wherein each subsystem group of the subsystem groups comprises a plurality of subsystems, wherein each subsystem group is associated with one a plurality of services, wherein the subsystem groups are generated using per-service subsystem requirements; and performing at least one of the plurality of services using a subsystem group of the subsystem groups.

In general, in one aspect, the invention relates to a data protection manager, comprising: a processor and memory, and configured to: generate subsystem groups, wherein each subsystem group of the subsystem groups comprises a plurality of subsystems, wherein each subsystem group is associated with one a plurality of services, wherein the subsystem groups are generated using per-service subsystem requirements; and perform at least one of the plurality of services using a subsystem group of the subsystem groups.

BRIEF DESCRIPTION OF DRAWINGS

Certain embodiments of the invention will be described with reference to the accompanying drawings. However, the accompanying drawings illustrate only certain aspects or implementations of the invention by way of example and are not meant to limit the scope of the claims.

FIG. 1A shows a diagram of a system in accordance with one or more embodiments of the invention.

FIG. 1B shows a diagram of a persistent storage of data protection manager in accordance with one or more embodiments of the invention.

FIG. 2A shows a flowchart of a method for setting up data protection services in accordance with one or more embodiments of the invention.

FIG. 2B shows a flowchart of a method for managing the performance of data protection services in accordance with one or more embodiments of the invention.

FIGS. 3A-3C show diagrams of the operation of an example system over time in accordance with one or more embodiments of the invention.

FIG. 4 shows a diagram of a computing device in accordance with one or more embodiments of the invention.

DETAILED DESCRIPTION

Specific embodiments will now be described with reference to the accompanying figures. In the following description, numerous details are set forth as examples of the invention. It will be understood by those skilled in the art that one or more embodiments of the present invention may be practiced without these specific details and that numerous variations or modifications may be possible without departing from the scope of the invention. Certain details known to those of ordinary skill in the art are omitted to avoid obscuring the description.

In the following description of the figures, any component described with regard to a figure, in various embodiments of the invention, may be equivalent to one or more like-named components described with regard to any other figure. For brevity, descriptions of these components will not be repeated with regard to each figure. Thus, each and every embodiment of the components of each figure is incorporated by reference and assumed to be optionally present within every other figure having one or more like-named components. Additionally, in accordance with various embodiments of the invention, any description of the components of a figure is to be interpreted as an optional embodiment, which may be implemented in addition to, in conjunction with, or in place of the embodiments described with regard to a corresponding like-named component in any other figure.

Throughout this application, elements of figures may be labeled as A to N. As used herein, the aforementioned labeling means that the element may include any number of items and does not require that the element include the same number of elements as any other item labeled as A to N. For example, a data structure may include a first element labeled as A and a second element labeled as N. This labeling convention means that the data structure may include any number of the elements. A second data structure, also labeled as A to N, may also include any number of elements. The number of elements of the first data structure and the number of elements of the second data structure may be the same or different.

In general embodiments of the invention relate to a system and method for managing data protection services for various subsystems of a data protection system. More specifically, embodiments of the invention relate to assigning and adjusting subsystem concurrencies based on the subsystem statistics collected from the subsystems during the performance of the data protection services.

FIG. 1A shows a diagram of a system in accordance with one or more embodiments of the invention. The system may include a host (100), storages (110), a network (140), and a data protection manager (120). The system may include other and/or additional components without departing from the invention.

The host (100) provides computer implemented services to entities not illustrated in FIG. 1A such as, for example, clients. The computer implemented services may include database services, instant messaging services, electronic communication services, and any other type of computer implemented services without departing from the invention. The host (100) may obtain data protection services from the data protection manager (120), backup storage services from the storages (110) and data transmission services from the network (140). The host (100) may obtain and/or provide other and/or additional services without departing from the invention. For additional information regarding the host (100), refer to FIG. 1B.

In one or more embodiments of the invention, the host (100) hosts one or more applications (not shown). In one or more embodiments of the invention, the application(s) perform computer implemented services for e.g., clients. Performing the computer implemented services may include performing operations on data that is stored in the host (100). The operations may include creating data, moving data, modifying data, deleting data, and other and/or additional operations on host data and/or metadata without departing from the invention. The application(s) and/or users of the client(s) may include functionality for performing the aforementioned operations on the host data in the host (100). The application(s) may be, for example, instances of databases, email servers, and/or other applications. The host (100) may host other types of applications without departing from the invention.

In one or more of embodiments of the invention, the application(s) is implemented as computer instructions, e.g., computer code, stored on a persistent storage (not shown) that when executed by a processor(s) of the host (100) cause the host (100) to provide the functionality of the application(s) described throughout this application.

In one or more embodiments of the invention, the host (100) is implemented as a computing device (see e.g., FIG. 4 ). The computing device may be, for example, a mobile phone, a tablet computer, a laptop computer, a desktop computer, a server, a distributed computing system, or a cloud resource. The computing device may include one or more processors, memory (e.g., random access memory), and persistent storage (e.g., disk drives, solid state drives, etc.). The computing device may include instructions, stored on the persistent storage, that when executed by the processor(s) of the computing device cause the computing device to perform the functionality of the host (100) described throughout this application.

In one or more embodiments of the invention, the host (100) is implemented as a logical device. The logical device may utilize the computing resources of any number of computing devices and thereby provide the functionality of the host (100) described throughout this application.

In one or more embodiments of the invention, the host (100) includes the host data subsystem (102). The host data subsystem (102) may include any number of data movers, agent services, and/or replication engines and/or any other components of the host (100) that that perform backup and/or replication operations of the data protection services without departing from the invention. The host data subsystem (102) may read data from an asset source hosted by the host (100) (e.g., a virtual machine, a SQL database, a file system, and/or other and/or additional types of applications) and transmit the data to other components of the system such as the storages (110) and the data protection manager (120). The host data subsystem (102) may include other and/or additional components and/or functionalities without departing from the invention.

In one or more embodiments of the invention, the network (140) performs data transmission services for the host (100), the data protection manager (120) and the storages (110). The network may include a network subsystem (142). The network subsystem may include any number of network devices (e.g., routers, switches, gateways, etc.) that transmit data from one device to another and/or one subsystem to another subsystem. The network subsystem (142) may be shared across multiple targets (e.g., host (100), storages (110), and the data protection manager (120)) without departing from the invention. The network subsystem (142) may include other and/or additional components and may include other and/or additional functionalities without departing from the invention.

In one or more embodiments of the invention, the storage (110) includes the functionality to provide backup storage services to the host (100) as discussed above. The backup storage services may include (i) obtaining backups of data generated through the performance of computer implemented services, (ii) storing data and metadata associated with the backups in persistent storage (not shown) of the storages (110), and (iii) providing backup data and/or metadata to the host (100) and/or data protection manager (120) for restoration purposes and/or other and/or additional purposes without departing from the invention. The backup storage services may include other and/or additional services without departing from the invention. The storages (110) may include any number of storages without departing from the invention.

In one or more embodiments of the invention, the storages (110) are implemented as computing devices (see e.g., FIG. 4 ). A computing device of the computing devices may be, for example, a mobile phone, a tablet computer, a laptop computer, a desktop computer, a server, a distributed computing system, or a cloud resource. The computing device may include one or more processors, memory (e.g., random access memory), and persistent storage (e.g., disk drives, solid state drives, etc.). The computing device may include instructions stored on the persistent storage, that when executed by the processor(s) of the computing device cause the computing device to perform the functionality of a backup storage (e.g., backup storage A (120A)) of the storages (110) described throughout this application.

In one or more embodiments of the invention, the storages (110) are implemented as logical devices. The logical devices may utilize the computing resources of any number of computing devices and thereby provide the functionality of the storages (110) described throughout this application.

In one or more embodiments of the invention, the storages (110) include the storages data subsystem (112). The storages data subsystem (112) may include any number of data movers, agent services, and/or replication engines and/or any other components of the storages (110) that that perform at least a portion of the backup and/or replication operations of the data protection services without departing from the invention. The storages data subsystem (112) may obtain backups, replications, and/or copies of asset data from the host (100) and store the backups, replications, and/or copies of the asset data from the asset source in persistent storages for restoration purposes. The storages data subsystem (112) may include other and/or additional components and/or other and/or additional functionalities without departing from the invention.

In one or more embodiments of the invention, the data protection manager includes the functionality to provide data protection services for the host (100). The data protection services may include initiating the performance of data protection services based on protection policies and assigning and updating concurrent operations to subsystems (e.g., host data subsystem (102), network subsystem (142), storages data subsystem (112), metadata subsystem (128), and a compute subsystem (130)) included in the system. The system may include other and/or additional subsystems without departing from the invention. For example, the host (100) may further include a compute subsystem (130) to perform complex to perform additional data protection services such as deduplication, compression, encryption, etc.

In one or more embodiments of the invention, the data protection manager (120) is implemented as a computing device (see e.g., FIG. 4 ). A computing device may be, for example, a mobile phone, a tablet computer, a laptop computer, a desktop computer, a server, a distributed computing system, or a cloud resource. The computing device may include one or more processors, memory (e.g., random access memory), and persistent storage (e.g., disk drives, solid state drives, etc.). The computing device may include instructions stored on the persistent storage, that when executed by the processor(s) of the computing device cause the computing device to perform the functionality of the data protection manager (120) described throughout this application.

In one or more embodiments of the invention, the data protection manager (120) is implemented as a logical devices. The logical device may utilize the computing resources of any number of computing devices and thereby provide the functionality of the data protection manager (120) described throughout this application.

To provide the aforementioned data protection services, the data protection manager (120) may include a data protection manager controller (122), an analytical engine (124), persistent storage (126), a metadata subsystem (128) and a compute subsystem (130). The data protection manager (120) may include other and/or additional components without departing from the invention.

In one or more embodiments of the invention, the data protection manager controller (122). The data protection manager controller may initiate the performance of data protection services based on protection policies and a priority specified by the protection policies and assign concurrent operations to the subsystems to perform the data protection services. The data protection manager controller (122) may include other and/or additional functionalities without departing from the invention.

In one or more embodiments of the invention, the data protection manager controller (122) is a physical device. The physical device may include circuitry. The physical device may be, for example, a field-programmable gate array, application specific integrated circuit, programmable processor, microcontroller, digital signal processor, or other hardware processor. The physical device may be adapted to provide the functionality of the data protection management controller (122) described throughout this application.

In one or more embodiments of the invention, the data protection manager controller (122) is implemented as computer instructions, e.g., computer code, stored on a persistent storage that when executed by a processor of the data protection manager (120) causes the data protection manager (120) to provide the functionality of the data protection manager controller (122) described throughout this application.

In one or more embodiments of the invention, an analytical engine (124) of the data protection manager (120) periodically collects the subsystem statistics from each subsystem (i.e., 102, 112, 128, 130, 142). The analytical engine (124) may also collect subsystem level resource utilization for each subsystem, which may be included in the subsystem statistics. The subsystem level resource utilization may include CPU utilization, memory utilization, input and output operations, network information and capacities, and other and/or additional information associated with the subsystem level resource utilization without departing from the invention. The analytical engine (124) may then use the subsystem statistics to generate the feedback mechanism by adjusting individual subsystem concurrencies that effect the overall performance of the subsystem and the data protection system as a whole.

In one or more embodiments of the invention, the subsystem statistics may specify performance parameters associated with each subsystem. The performance parameters may include the number of operations per protection policy performed by the subsystems, the priority associated with each policy and/or operation, the number of requests to the metadata, the resource allocation of each subsystem, the data transfer rate, quality of service settings, and the target storage device in the storages (110) and/or any other information associated with subsystem performance of data protection services without departing from the invention. The performance parameters may include other and/or additional parameters that when adjusted, change the performance of a subsystem and therefore the overall system without departing from the invention.

In one or more embodiments of the invention, each subsystem is allocated a static number of concurrent operations by the data protection manager controller (122) as discussed above. The number of concurrent operations may then by dynamically adjusted based on the priority of the data specified by the protection policies. The priority of operations may be assigned as high priority operations, medium priority operations, and low priority operations. Each subsystem may be allocated a static concurrency (i.e., number of concurrent operations) and a percentage of this static allocation may be assigned to the high priority operations, medium priority operations, and the low priority operations. The analytical engine (124) may periodically collect subsystem statistics from each subsystem and dynamically adjust both the concurrency and the priority percentage of the concurrency (priority mappings) based on the obtained subsystem statistics. The analytical engine (124) may include other and/or additional functionalities without departing from the invention.

In one or more embodiments of the invention, the analytical engine (124) is a physical device. The physical device may include circuitry. The physical device may be, for example, a field-programmable gate array, application specific integrated circuit, programmable processor, microcontroller, digital signal processor, or other hardware processor. The physical device may be adapted to provide the functionality of the analytical engine (124) described throughout this application.

In one or more embodiments of the invention, the analytical engine (124) is implemented as computer instructions, e.g., computer code, stored on a persistent storage that when executed by a processor of the data protection manager (120) causes the data protection manager (120) to provide the functionality of the analytical engine (124) described throughout this application.

In one or more embodiments of the invention, the data protection manager (120) includes a metadata subsystem (128). In one or more embodiments of the invention, the metadata subsystem (128) performs at least a portion of every read, write, and/or control operation of the data protection system. The metadata subsystem (128) may include metadata (e.g., the metadata repository (138)) stored in persistent storage which may be accessed by other entities (e.g., data protection manager controller (122), analytical engine (124), host (100), storages (110), or the network (140)) or other subsystems (e.g., 102, 112, 130, 142) to perform the aforementioned read, write, and/or control operations from other subsystems. Due to the large quantity (e.g., millions) of operations that require access to metadata of the metadata subsystem (128), the metadata subsystem may require optimal performance to avoid negative performance impacts on other subsystems. The metadata subsystem (128) may include other and/or additional components and may include other and/or additional other and/or additional functionalities without departing from the invention.

In one or more embodiments of the invention, the data protection manager (120) includes a compute subsystem (130). In one or more embodiments of the invention, the compute subsystem (130) includes compute devices of the system (e.g., central processing units, graphics processing units, field programmable gate arrays, etc.) and any components associated with the compute devices such as operating systems, memory, etc. The compute subsystem (130) may include the functionality to perform data processing operations to carry out the aforementioned backup and replication operations. The data processing may include reading, writing, updating, modifying, moving, deleting and/or other and/or additional data processing operations without departing from the invention. The compute subsystem (130) may include other and/or additional components and may include other and/or additional functionalities without departing from the invention.

In one or more embodiments of the invention, the data protection manager (120) includes persistent storage (126). In one or more embodiments of the invention, the persistent storage (126) stores data. The persistent storage (126) may store any quantity and any type of data without departing from the invention. The persistent storage (126) may store other and/or additional data without departing from the invention. For additional information regarding the persistent storage (126), refer to FIG. 1B.

The persistent storage (126) may be implemented using physical storage devices and/or logical storage devices. The physical storage devices may include any combination of hard disk drives, solid state disk drives, tape drives, and/or any other physical storage mediums for the storage of data.

The logical storage devices (e.g., virtualized storage) may utilize any quantity of hardware storage resources of any number of computing devices for storing data. For example, the persistent storage (126) may utilize portions of any combination of hard disk drives, solid state disk drives, tape drives, and/or any other physical storage medium of any number of computing devices.

FIG. 1B shows a diagram of a persistent storage of data protection manager in accordance with one or more embodiments of the invention. As discussed above, the persistent storage (126) stores data. The persistent storage (126) may store protection policies (132), a concurrency repository (134), a subsystem statistics repository (136), and a metadata repository (138). The persistent storage (126) may store other and/or additional types of data without departing from the invention. Each of the aforementioned types of data is discussed below.

Protection policies (132) may be data structures that include various requirements for storing backups of host data. For example, the protection policies may include location, type, and a schedule for the backups to be generated. The protection policies (132) may further specify a priority as discussed above. There may be any number of protection policies (132) stored in the persistent storage (126). There may be any quantity of requirements associated with a protection policy of protection policies (132). The protection policies (132) may be analyzed by the data protection manager (120) to initiate the performance of data protection services and to determine whether the requirements of the protection policies (132) are being met.

There may be any quantity of protection policies (132) stored in the persistent storage (126). The requirements may include information regarding the to-be generated backup associated with a particular protection policy. There may be any quantity of information included in the protection policies (132) that pertain to any number of different backup guidelines included in the protection policies (132). The protection policies (132) may include other and/or additional information without departing from the invention.

The concurrency repository (134) may include one or more data structures that include concurrency information associated with each subsystem in the data protection system. The concurrency information may specify a concurrency assigned to each subsystem (i.e., the number of concurrent operations performed by the subsystem) that is associated with the protection policies (132). The concurrency information may further include priorities associated with each concurrency. The concurrency information may include historical concurrency information. In other words, the concurrency information may include previously assigned concurrencies and timestamps associated with the previously assigned concurrencies. The concurrency repository (134) may include other and/or additional information without departing from the invention.

The subsystem statistics repository (136) may include one or more data structures that include subsystem statistics information associated with each subsystem in the data protection system. The subsystem statistics information may include the performance metrics (discussed above) associated with the performance of data protection services by each subsystem. The subsystem statistics repository (136) may include other and/or additional information without departing from the invention.

The metadata repository (138) may include one or more data structure that include information associated with data stored in the data protection system. The information may include backup information that may specify storage locations, retention periods, backup identifiers, and other and/or additional types of information that may be used to perform operations of the data protection services. The metadata repository (138) may include other and/or additional information without departing from the invention.

FIG. 2A shows a flowchart of a method for setting up data protection services in accordance with one or more embodiments of the invention. The method may be performed by, for example, a data protection manager (120, FIG. 1A). Other components of the system illustrated in FIG. 1A may perform all, or a portion of the method of FIG. 2A without departing from the invention.

While FIG. 2A is illustrated as a series of steps, any of the steps may be omitted, performed in a different order, additional steps may be included, and/or any or all of the steps may be performed in a parallel and/or partially overlapping manner without departing from the invention.

In step 200, a protection policy event associated with a protection policy initiating the performance of data protection services for data stored in a host is identified.

In one or more embodiments of the invention, the data protection manager monitors the protection policies to identify protection policy events. As discussed above, the protection policies may specify requirements for performing data protection services for host data. The protection policies may specify backup schedules associated with the performance of data protection services. Each schedule may specify points in time to perform data protection services. The data protection manager may monitor the schedules, and therefore, may identify the occurrence of a point in time to perform data protection services specified by a schedule of a protection policy as the protection policy event. The protection policy event may include other and/or additional events that initiate the performance of data protection services (such as obtaining data protection requests from users of the system, obtaining a new protection policy from a user, etc.) without departing from the invention. A protection policy event associated with a protection policy initiating the performance of the data protection services for data stored in a host may be identified via other and/or additional methods without departing from the invention.

In step 202, concurrencies are assigned to each subsystem associated with the protection policy event based on the protection policy and subsystem statistics.

In one or more embodiments of the invention, the data protection manager uses the protection policy associated with the protection policy event and the subsystem statistics to assign the concurrencies to each subsystem. As discussed above, the protection policy may specify the data protection services associated with the protection policy event. Based on the specified data protection services, the data protection manager may identify the subsystems to perform the data protection services. The protection policy may also specify a priority associated with the data protection services. The data protection manager may use the subsystem statistics and the concurrency information of the concurrency repository associated with each identified subsystem to identify the concurrency associated with each identified subsystem. The data protection manager may also use the concurrency information of the concurrency repository to identify the priority mappings associated with each identified subsystem.

In one or more embodiments of the invention, if a subsystem is not performing data protection services associated with previous protection policy events of the same priority as the protection policy event identified in step 200 and the subsystem statistics indicate that the subsystem is not currently experiencing performance issues, then the data protection manager may assign the entire portion of the concurrency associated with the priority specified by the protection policy.

For example, the concurrency information may indicate that a host data subsystem has a concurrency of 1000 (i.e., may be capable of performing 1000 concurrent operations) and a priority mapping that specifies that fifty percent of the concurrency is associated with high priority protection policies, thirty percent of the concurrency is associated with medium priority protection policies, and twenty percent of the concurrency is associated with low priority protection policies. The protection policy event may be associated with a high priority protection policy. Therefore, the data protection manager may assign a concurrency of 500 to the host data subsystem to perform the data protection services associated with the protection policy event. In other words, the data protection manager may assign all of the portion of the concurrency of the host data subsystem associated with high priority protection policies to perform the data protection services specified by the protection policy event.

In one or more embodiments of the invention, if a subsystem is not performing data protection services associated with previous protection policy events of the same priority as the protection policy event identified in step 200 and the subsystem statistics indicate that the subsystem is currently experiencing performance issues, then the data protection manager may adjust the concurrency of the identified subsystem and assign the entire portion of the lowered concurrency associated with the priority specified by the protection policy.

For example, the concurrency information may indicate that a host data subsystem has a concurrency of 1000 (i.e., may be capable of performing 1000 concurrent operations) and a priority mapping that specifies that fifty percent of the concurrency is associated with high priority protection policies, thirty percent of the concurrency is associated with medium priority protection policies, and twenty percent of the concurrency is associated with low priority protection policies. The protection policy event may be associated with a high priority protection policy. The subsystem statistics may indicate that a component of the host data subsystem has failed. Therefore, the data protection manager may adjust the concurrency of the host data subsystem from 1000 to 500 and assign a concurrency of 250 to the host data subsystem to perform the data protection services associated with the protection policy event. In other words, the data protection manager may assign all of the portion of the adjusted concurrency of the host data subsystem associated with high priority protection policies to perform the data protection services specified by the protection policy event.

In one or more embodiments of the invention, if a subsystem is performing data protection services associated with previous protection policy events of the same priority as the protection policy event identified in step 200, then the data protection manager may equally divide the portion of the concurrency among the data protection services associated with the previous protection policy events and the data protection services associated with the protection policy event identified in step 200.

In one or more embodiments of the invention, if a subsystem is performing data protection services associated with previous protection policy events of the same priority as the protection policy event identified in step 200, then the data protection manager may assign the a concurrency as discussed above and put the data protection services associated with a protection policy event in a queue. The host data subsystem may perform the data protection services specified by the protection policy event in step 200 after the data protection services of the previous protection policy events conclude using the queue. A queue is a data structure that specifies an ordered list of elements (e.g., data protection services associated with protection policy events). There may be a queue associated with each subsystem.

Concurrencies may be assigned to each subsystem associated with the protection policy event based on the protection policy and subsystem statistics via other and/or additional methods without departing from the invention.

In step 204, the performance of data protection services by the subsystems based on the assigned concurrencies is initiated.

In one or more embodiments of the invention, the data protection manager sends messages to each of the identified subsystems associated with the protection policy event. The messages may include requests to perform the data protection services. Each message of the messages may specify what data protection services to perform. Additionally, Each message may include the assigned concurrency of the associated subsystem to perform the data protection services. The messages may include other and/or additional data and/or information without departing from the invention. In response to obtaining the messages, the subsystems may perform the data protection services using the assigned concurrencies. The performance of the data protection services by the subsystems based on the assigned concurrencies may be initiated via other and/or additional methods without departing from the invention.

In step 206, the performance of the data protection services is managed.

In one or more embodiments of the invention, the data protection manager manages the performance of the data protection services by periodically obtaining subsystem statistics associated with the performance of the data protection services. The data protection manager may adjust the concurrency of one or more subsystems based on the obtained subsystem statistics. The performance of data protection services may be managed via other and/or additional methods without departing from the invention. For additional information regarding the management of the data protection services, refer to FIG. 2B.

In one or more embodiments of the invention, the method may end following step 206.

FIG. 2B shows a flowchart of a method for managing the performance of data protection services in accordance with one or more embodiments of the invention. The method may be performed by, for example, a data protection manager (120, FIG. 1A). Other components of the system illustrated in FIG. 1A may perform all, or a portion of the method of FIG. 2B without departing from the invention.

While FIG. 2B is illustrated as a series of steps, any of the steps may be omitted, performed in a different order, additional steps may be included, and/or any or all of the steps may be performed in a parallel and/or partially overlapping manner without departing from the invention.

In step 220, subsystem statistics are obtained from the subsystems.

In one or more embodiments of the invention, the data protection manager sends a message to the subsystems associated with the performance of the data protection services. The message may include requests for subsystem statistics. The data protection manager may periodically request subsystem statistics from the subsystems. Each subsystem may include an entity (e.g., a monitoring engine) that generates subsystem statistics associated with the performance of data protection services by the subsystem. In response to obtaining the messages, the subsystems, and/or a component of the subsystems may send the subsystem statistics to the data protection manager. The subsystem statistics may be obtained from the subsystems via other and/or additional methods without departing from the invention.

In step 222, a determination is made as to whether the subsystem statistics indicate a subsystem concurrency adjustment is required.

In one or more embodiments of the invention, the analytical engine of the data protection manager determines whether the subsystem statistics indicate a subsystem concurrency adjustment is required by comparing the obtained subsystem statistics with previously obtained subsystem statistics and the protection policy. As discussed above, the subsystem statistics includes performance characteristics associated with each subsystem. The analytical engine may compare the performance characteristics included in the obtained subsystem statistics with the performance characteristics included in previously obtained subsystem statistics.

If the performance characteristics of the obtained subsystem statistics for one of the subsystems are above an upper threshold or below a lower threshold compared to the performance characteristics of the previously obtained subsystem statistics, then the analytical engine of the data protection manager may determine that the subsystem statistics indicate a subsystem concurrency adjustment is required. If the performance characteristics of the obtained subsystem statistics for all of the subsystems are not above an upper threshold or below a lower threshold compared to the performance characteristics of the previously obtained subsystem statistics, then the analytical engine of the data protection manager may determine that the subsystem statistics do not indicate a subsystem concurrency adjustment is required. Additionally, if the performance characteristics of the obtained subsystem statistics indicate that a protection policy requirement is not being met, then the analytical engine of the data protection manager may determine that the subsystem statistics indicate a subsystem concurrency adjustment is required. If the performance characteristics of the obtained subsystem statistics indicate that all protection policy requirements are being met, then the analytical engine of the data protection manager may determine that the subsystem statistics do not indicate a subsystem concurrency adjustment is required. The determination as to whether the subsystem statistics indicate a subsystem concurrency adjustment is required may be made via other and/or additional methods without departing from the invention.

If it is determined that the subsystem statistics indicate that a subsystem concurrency adjustment is required, then the method may proceed to step 224. If it is determined that the subsystem statistics indicate that a subsystem concurrency adjustment is not required, then the method may proceed to step 228.

In step 224, adjusted concurrency is assigned to a subsystem(s) based on the subsystem statistics and the priorities.

In one or more embodiments of the invention, the analytical engine of the data protection manager uses the subsystem statistics to assign adjusted concurrencies. Additionally, the analytical engine may also adjust priority mappings associated with the adjusted concurrencies (i.e., the percentages of the adjusted concurrencies associated with high priority, medium priority, and low priority protection policies). As discussed above, the subsystem statistics may indicate whether a subsystem is performing above an upper threshold (i.e., performing better than the previously assigned concurrency) or below a lower threshold (i.e., performing worse than the previously assigned concurrency and require a concurrency adjustment.

If the subsystem statistics indicate that a subsystem is performing worse than expected or worse than a previously assigned concurrency, then the data protection manager may assign an adjusted concurrency that is lower than the previously assigned concurrency to the subsystem. The data protection manager may assign any adjusted concurrency that is lower than the previously assigned concurrency without departing from the invention. If the subsystem statistics indicate that a subsystem is performing better than expected or better than a previously assigned concurrency, then the data protection manager may assign an adjusted concurrency that is higher than the previously assigned concurrency to the subsystem. The data protection manager may assign any adjusted concurrency that is higher than the previously assigned concurrency but less than or equal to the maximum concurrency without departing from the invention. The adjusted concurrency will also be associated with the same priority and priority mappings as specified in step 202.

In one or more embodiments of the invention, the data protection manager may also assign an adjusted concurrency to one or more subsystems that are dependent upon a subsystem that was assigned an adjusted concurrency. As a result, subsystems may not face a bottleneck of operations due to the adjusted concurrency of the system or systems in which the subsystems are dependent upon.

For example, the subsystem statistics may indicate that a network subsystem is experiencing high latency. The previous concurrency associated with the network subsystem associated with the data protection services was 1000 operations with a priority mapping of 500 operations going to high priority protection policies, 300 operations going to medium priority operations, and 200 operations going to low priority operations. The protection policy associated with the data protection services may be a high priority protection policy. As a result, the network subsystem assigned a previous concurrency of 500 to perform the data protection services. Based on the latency associated with the network subsystem, the data protection manager may adjust the concurrency associated with the network subsystem and assign an adjusted concurrency of 500 operations, with 250 of those operations associated with the data protection services due to the high priority associated with the data protection services. Additionally, the data protection manager may identify that the host data subsystem and the metadata subsystem depend on the network subsystem to perform the data protection services using the subsystem statistics. Therefore, the data protection manager may also assign adjusted concurrencies to (i.e., lower the concurrencies of) the host data subsystem and the metadata subsystem in order to avoid bottlenecking, inefficiencies, and/or errors as the result of adjusting the network subsystem concurrency.

In one or more embodiments of the invention, an adjusted concurrency may be assigned to a subsystem(s) based on the subsystem statistics and the priorities via other and/or additional methods without departing from the invention.

In step 226, the performance of the data protection services using the adjusted concurrencies is initiated.

In one or more embodiments of the invention, the data protection manager sends messages to each of the identified subsystems associated with the protection policy event. The messages may include requests to perform the data protection services. Each message of the messages may specify what data protection services to perform. Additionally, Each message may include the assigned adjusted concurrency of the associated subsystem to perform the data protection services. The messages may include other and/or additional data and/or information without departing from the invention. In response to obtaining the messages, the subsystems may perform the data protection services using the assigned adjusted concurrencies. The performance of the data protection services by the subsystems may be initiated using the assigned adjusted concurrencies via other and/or additional methods without departing from the invention.

In step 228, a determination is made as to whether there are additional data protection services.

In one or more embodiments of the invention, the data protection manager determines whether there are additional data protection services using the protection policy associated with the data protection services. As discussed above, the protection policy may specify a schedule associated with the data protection services and the particular data protection services specified by the schedule. The subsystem statistics may indicate which data protection services specified by the schedule have been completed. If the schedule is not complete, i.e., there are additional data protection services not yet performed that are specified by the schedule of the protection policy, then the data protection manager may determine that there are additional data protection services. If the schedule is complete, i.e., all data protection services have performed that are specified by the schedule of the protection policy have been performed, then the data protection manager may determine that there are additional data protection services. The determination as to whether there are additional data protection services may be made via other and/or additional methods without departing from the invention.

If it is determined that there are additional data protection services, then the method may proceed to step 220. If it is determined that there are no additional data protection services, then the method may end following step 228.

Example

FIGS. 3A-3C show diagrams of the operation of an example system over time in accordance with one or more embodiments of the invention.

Turning to FIG. 3A, the example system includes a host (100) with a host data subsystem (102), a network (140) with a network subsystem (142), storage (110) with a storages data subsystem (112), and a data protection manager (120) with a metadata subsystem (128) and a compute subsystem (130).

At step 1, the data protection manager (120) identifies a protection policy event. In response to the identification of the protection policy event, at step 2, the data protection manager (120) assigns initial concurrencies and priorities to the subsystems (102, 142, 112, 128, 130). At step 3, the data protection manager (120) initiates the performance of data protection services specified by the protection policy event using the assigned initial concurrencies and the priority by sending a message that includes a request to perform portions of the data protection services using assigned concurrencies and priorities to the subsystems (102, 142, 112, 128, 130). After obtaining the messages, each subsystem (102, 142, 112, 128, 130), at step 4, begins performing a portion of the data protection services using the assigned initial concurrency and the priority.

Turning FIG. 3B, at step 5, a network device included in the network subsystem (142) fails. As a result, the performance of the network subsystem (142) is reduced. At some point in time after the failure of the network device, at step 6, the data protection manager (120) obtains subsystem statistics from each of the subsystems (102, 142, 112, 128, 130). At step 7, the data protection manager (120) determines that the subsystem statistics indicate that the network subsystem (142) is not operating at the assigned initial concurrency and is therefore not meeting the requirements of the protection policy associated with the protection policy event. Since the network subsystem (142) is used to transmit data between the other subsystems (102, 112, 128, 130) the operating concurrency of each of the other subsystems (102, 112, 128, 130) is below that of the initial concurrencies.

As a result, at step 8, the data protection manager (120) assigns adjusted concurrencies and priorities to all of the subsystems (102, 142, 112, 128, 130) to reduce the number of concurrencies performed by each subsystem to avoid data protection failures due to the failed network device. The adjusted concurrencies include the same assigned priorities. At step 9, the data protection manager (120) initiates the performance of the remaining data protection services specified by the protection policy event using the assigned adjusted concurrencies by sending a message that includes a request to perform portions of the remaining data protection services using assigned adjusted concurrencies to the subsystems (102, 142, 112, 128, 130). After obtaining the messages, each subsystem (102, 142, 112, 128, 130), at step 10, begins performing a portion of the data protection services using the assigned adjusted concurrency.

Turing to FIG. 3C, at step 11, the failed network device included in the network subsystem (142) is replaced. As a result, the performance of the network subsystem (142) is improved. At some point in time after the replacement of the network device, at step 12, the data protection manager (120) obtains subsystem statistics from each of the subsystems (102, 142, 112, 128, 130). At step 13, the data protection manager (120) determines that the subsystem statistics indicate that the network subsystem (142) is capable of operating at the assigned initial concurrency and is therefore capable of reverting back to the initial concurrency to meet the requirements of the protection policy associated with the protection policy event. Since the network subsystem (142) is used to transmit data between the other subsystems (102, 112, 128, 130) the concurrency of each of the other subsystems (102, 112, 128, 130) may now also be reverted back to the initial concurrencies.

As a result, at step 14, the data protection manager (120) assigns the initial concurrencies and priorities to all of the subsystems (102, 142, 112, 128, 130) to improve the operation of data protection services to meet the protection policy requirements. The initial concurrencies include the same assigned priorities. At step 15, the data protection manager (120) initiates the performance of the remaining data protection services specified by the protection policy event using the assigned initial concurrencies by sending a message that includes a request to perform portions of the remaining data protection services using assigned initial concurrencies to the subsystems (102, 142, 112, 128, 130). After obtaining the messages, each subsystem (102, 142, 112, 128, 130), at step 16, begins performing a portion of the data protection services using the assigned initial concurrency.

End of Example

Subsystem Groups

In one or more embodiments of the invention, the data protection manager (120) may support different types of data protection services—e.g., backup services, replication services, tiering services, and disaster recovery services. The data protection manager may support additional or different services without departing from the invention. Briefly, backup services generate backups (which may be incremental backups, full backups, block-based backups, file-based backups, metadata backups, or any combination thereof), replication services generate mirrored copies of the data, tiering services move data between different storage tiers (e.g., between on-prem storage and cloud storage, between solid state storage and magnetic storage, etc.), and disaster recovery services restore data to a production environment from a backup copy(copies).

Each of these services requires a set of subsystems. The required subsystems may be specified using per-service subsystem requirements. The subsystem requirements may specify at least the type and quantity of each required subsystem. The subsystem requirements may specify other requirements such as connectivity and/or location of the subsystems. For example, the subsystem requirements may specify that two subsystems need to be co-located in the same data center and/or in the same production host. The subsystem requirements may be obtained from a user and/or any other entity.

The data protection manager may perform a discovery process to determine which subsystems are available/accessible to the data protection manager and the characteristics of each subsystem. The characteristics may specific location, type, capacity, etc. As part of the discovery process, the data protection manager may also obtain subsystem statistics for each of the subsystems.

The data protection manager may then generate subsystem groups by grouping the discovered subsystems based on the per-service subsystem requirements. The result of this process is one or more per-service subsystem groups. If there are limited number of subsystems and the user (or another entity) has specified a ranking (or priority for the services), then the data protection manager attempts to generate per-service subsystem groups based on the rankings and the number of subsystem groups that the data protection manager is attempting to create per service.

For example, consider a scenario in which the rankings (and number of requested subsystem groups) is as follows: rank 1: backup services (three subsystem groups), rank 2: replication services (two subsystem groups), rank 3: tiering services (five subsystem groups), and rank 4: disaster recovery services (two subsystem groups). In this scenario, the data protection manager may attempt to create the three backup service subsystem groups first, then attempt to create the two replication services subsystem groups, then attempt to create the five tiering services subsystem groups, and then attempt to create the four disaster subsystem groups. However, depending on the per-service subsystem requirements and the subsystems that were discovered by the data protection manager, if the requested number of subsystem groups for a given service cannot be created, then the data protection manager creates as many as it can and then proceeds to try and create the subsystem groups for the next lower ranked service. Alternatively, the user may manually create subsystem groups based on the discovered set of subsystems.

If there is no per-service ranking, then the data protection manager may attempt to create an even number of subsystem groups for each service until all discovered subsystems have been allocated and/or no other subsystem groups can be created with the remaining unallocated subsystems.

Once the allocation process is completed, the data protection manager will have access to a set of per-service subsystem groups. The number of subsystem groups that have been created may be displayed to a user (e.g., via graphical user interface on their computing device, which is operatively connected to the data protection manager).

The data protection manager may then allocate the per-service subsystem groups to perform the corresponding services based on requests it receives to perform the service. Once a subsystem group is allocated to perform a service, the subsystems in the subsystem group may be managed in accordance with FIGS. 2A-2B. Those skilled in the art will appreciate that at any given point in time, one or more subsystem groups may be idle (i.e., non-allocated).

While the data protection manager may determine the operation of a given subsystem in the subsystem group, the data protection manager may also track the operation of all subsystem groups on a per-service basis and provide this information to the user. For example, performance statistics may be captured (or otherwise obtained) for each subsystem group and these per-subsystem group performance statistics may be combined to provide a quality of service (or other performance metric) for the subsystem group. Each of these per-subsystem group performance metrics may be used to generate a performance metric for the service (also referred to as a per-service performance metric).

For example, is a service has three subsystem groups (SSGs)—SSG1, SSG2, SSG3, then the performance metric for the service is a function of the performance metrics for SSG1, SSG2, and SSG3. The service performance metrics may then be displayed visually to a user.

Each subsystem group may be associated with a performance threshold, which specifies whether a given subsystem group is operating as expected. The performance thresholds may take into account the individual performance statistics of each of the subsystems that are part of the subsystem group. The combination of the per-subsystem performance metrics is used to generate a per-subsystem group performance metric. The per-subsystem performance metrics are then compared to performance thresholds (which may be defined per service, system wide, or any combination thereof) to determine how each subsystem group is operating. The results of this analysis is a per-subsystem group performance rating. The per-subsystem group performance rating is then used to determine how the service to which the subsystem groups are associated is performing.

For example, consider a scenario in which the performance metrics for each subsystem group are analyzed and the result of the analysis is that each subsystem group is ranked as follows: (i) the subsystem group is performing at or above expected performance levels or (ii) the subsystem group is performing below expected performance levels. In this example, if any subsystem group associated with a service is performing at below the expected performance levels, then entire service is deemed to be operating below the expected performance level and this information is visually reflected on a user interface that is accessible to a user. For example, services that are operating below the expected performance levels are shown in yellow and the services that are operating at or above expected performance levels are shown in green. The invention is not limited to the aforementioned example.

In one or more embodiments of the invention, if a service is operating below its expected performance levels, the users may also be notified of the cause (or potential cause of such performance issue). For example, the user may be notified that a given subsystem has failed or is operating in a safe mode, which is causing the subsystem group to be deemed to be operating below an expected performance level. This in-turn may then be reflected to the user as the service, to which the aforementioned subsystem is allocated to, is performing below expectations. In response to this notification, the user may trigger the re-allocation of subsystems such that the aforementioned underperforming subsystem is removed from the subsystem group and a properly performing subsystem is allocated to the subsystem group. The aforementioned reallocation may also be performed on an automated basis by the data protection manager.

The use of groups of subsystems allows for various services to be provided to the users in a manner that supports scaling. Specifically, if additional processing capacity for a given service is required, additional subsystem groups may be allocated to the service. Further, by visually representing the performance (or health) of the given subsystem groups on a per service basis the user (or the data protection manager) may take steps to reallocate workloads and/or subsystem groups to continue to offer the required level of performance (or quality of service) while taking into the account the current performance of the various subsystems.

As discussed above, embodiments of the invention may be implemented using computing devices. FIG. 4 shows a diagram of a computing device in accordance with one or more embodiments of the invention. The computing device (400) may include one or more computer processors (402), non-persistent storage (404) (e.g., volatile memory, such as random access memory (RAM), cache memory), persistent storage (406) (e.g., a hard disk, an optical drive such as a compact disk (CD) drive or digital versatile disk (DVD) drive, a flash memory, etc.), a communication interface (412) (e.g., Bluetooth interface, infrared interface, network interface, optical interface, etc.), input devices (410), output devices (408), and numerous other elements (not shown) and functionalities. Each of these components is described below.

In one embodiment of the invention, the computer processor(s) (402) may be an integrated circuit for processing instructions. For example, the computer processor(s) may be one or more cores or micro-cores of a processor. The computing device (400) may also include one or more input devices (410), such as a touchscreen, keyboard, mouse, microphone, touchpad, electronic pen, or any other type of input device. Further, the communication interface (412) may include an integrated circuit for connecting the computing device (400) to a network (not shown) (e.g., a local area network (LAN), a wide area network (WAN) such as the Internet, mobile network, or any other type of network) and/or to another device, such as another computing device.

In one embodiment of the invention, the computing device (400) may include one or more output devices (408), such as a screen (e.g., a liquid crystal display (LCD), a plasma display, touchscreen, cathode ray tube (CRT) monitor, projector, or other display device), a printer, external storage, or any other output device. One or more of the output devices may be the same or different from the input device(s). The input and output device(s) may be locally or remotely connected to the computer processor(s) (402), non-persistent storage (404), and persistent storage (406). Many different types of computing devices exist, and the aforementioned input and output device(s) may take other forms.

One or more embodiments of the invention may improve the efficiency of providing data protection services. More specifically, embodiments of the invention relate to dynamically adjusting concurrencies of subsystems in a data protection system. An analytical engine of a data protection manager may periodically collect subsystem statistics. The analytical engine may use the subsystem statistics to determine whether subsystems require concurrency adjustments to maintain efficiency of performing data protection services for the system. Accordingly, the analytical engine may dynamically adjust the concurrencies of the subsystems based on the subsystem statistics. Additionally, the analytical manager may adjust the concurrencies of subsystems that are dependent upon a subsystem that was assigned an adjusted concurrency to maintain stability in the data protection system. As a result, the subsystems of the data protection system may be dynamically adjusted to efficiently and reliably perform the data protection services.

Thus, embodiments of the invention may address the problem of inefficient use of computing resources to perform data protection services. This problem arises due to the technological nature of the environment in which data protection services are performed.

One or more embodiments of the invention may be implemented using instructions executed by one or more processors of the data management device. Further, such instructions may correspond to computer readable instructions that are stored on one or more non-transitory computer readable mediums.

While the invention has been described with respect to a limited number of embodiments, those skilled in the art, having benefit of this disclosure, will appreciate that other embodiments can be devised which do not depart from the scope of the technology as disclosed herein. Accordingly, the scope of the invention should be limited only by the attached claims. 

What is claimed is:
 1. A method for managing performances of services, the method comprising: generating subsystem groups, wherein each subsystem group of the subsystem groups comprises a plurality of subsystems, wherein each subsystem group is associated with one a plurality of services, wherein the subsystem groups are generated using per-service subsystem requirements; and performing at least one of the plurality of services using a subsystem group of the subsystem groups.
 2. The method of claim 1, wherein the plurality of subsystems comprises one selected from a group consisting of: a host data subsystem, a storages data subsystem, a network subsystem, a metadata subsystem, and a compute subsystem.
 3. The method of claim 2, wherein the plurality of services comprises at least one selected from the group consisting of: a backup service; a replication service; a tiering service; and a disaster recovery service.
 4. The method of claim 1, further comprising: obtaining subsystem statistics for each of the plurality of subsystems for each of the subsystem groups; and determining a per-service performance metric for each service based on the subsystem statistics.
 5. The method of claim 4, wherein the per-service performance metric for a service of the plurality of services indicates that the service is operating below an expected performance level; further comprising: sending, a notification to a user, when the per-service performance metric for a service of the plurality of services indicates that the service is operating below an expected performance level.
 6. The method of claim 5, wherein the notification specifies a cause of the service is operating below an expected performance level.
 7. The method of claim 6, further comprising: removing a subsystem from a subsystem group associated with the service, wherein the subsystem group is specified as the cause in the notification; and allocating another subsystem to the subsystem group.
 8. A non-transitory computer readable medium comprising computer readable program code, which when executed by a computer processor enables the computer processor to perform a method for managing performances of services, the method comprising: generating subsystem groups, wherein each subsystem group of the subsystem groups comprises a plurality of subsystems, wherein each subsystem group is associated with one a plurality of services, wherein the subsystem groups are generated using per-service subsystem requirements; and performing at least one of the plurality of services using a subsystem group of the subsystem groups.
 9. The non-transitory computer readable medium of claim 8, wherein the plurality of subsystems comprises one selected from a group consisting of: a host data subsystem, a storages data subsystem, a network subsystem, a metadata subsystem, and a compute subsystem.
 10. The non-transitory computer readable medium of claim 9, wherein the plurality of services comprises at least one selected from the group consisting of: a backup service; a replication service; a tiering service; and a disaster recovery service.
 11. The non-transitory computer readable medium of claim 8, the method further comprising: obtaining subsystem statistics for each of the plurality of subsystems for each of the subsystem groups; and determining a per-service performance metric for each service based on the subsystem statistics.
 12. The non-transitory computer readable medium of claim 11, wherein the per-service performance metric for a service of the plurality of services indicates that the service is operating below an expected performance level; where the method further comprises: sending, a notification to a user, when the per-service performance metric for a service of the plurality of services indicates that the service is operating below an expected performance level.
 13. The non-transitory computer readable medium of claim 12, wherein the notification specifies a cause of the service is operating below an expected performance level.
 14. The non-transitory computer readable medium of claim 13, further comprising: removing a subsystem from a subsystem group associated with the service, wherein the subsystem group is specified as the cause in the notification; and allocating another subsystem to the subsystem group.
 15. A data protection manager, comprising: a processor and memory, and configured to: generate subsystem groups, wherein each subsystem group of the subsystem groups comprises a plurality of subsystems, wherein each subsystem group is associated with one a plurality of services, wherein the subsystem groups are generated using per-service subsystem requirements; and perform at least one of the plurality of services using a subsystem group of the subsystem groups.
 16. The data protection manager of claim 15, wherein the plurality of subsystems comprises one selected from a group consisting of: a host data subsystem, a storages data subsystem, a network subsystem, a metadata subsystem, and a compute subsystem.
 17. The data protection manager of claim 16, wherein the plurality of services comprises at least one selected from the group consisting of: a backup service; a replication service; a tiering service; and a disaster recovery service.
 18. The data protection manager of claim 15, wherein the data protection manager is further configured to: obtain subsystem statistics for each of the plurality of subsystems for each of the subsystem groups; and determine a per-service performance metric for each service based on the subsystem statistics.
 19. The data protection manager of claim 18, wherein the per-service performance metric for a service of the plurality of services indicates that the service is operating below an expected performance level; where the data protection manager is further configured to: send, a notification to a user, when the per-service performance metric for a service of the plurality of services indicates that the service is operating below an expected performance level, wherein the notification specifies a cause of the service is operating below an expected performance level.
 20. The data protection manager of claim 19, wherein the data protection manager is further configured to: remove a subsystem from the subsystem group associated with the service, wherein the subsystem group is specified as the cause in the notification; and allocate another subsystem to the subsystem group. 