-
公开(公告)号:US20240020206A1
公开(公告)日:2024-01-18
申请号:US18115912
申请日:2023-03-01
Applicant: Hitachi, Ltd.
Inventor: Masahiro ARAI , Akira DEGUCHI , Hideyuki KOSEKI
IPC: G06F11/14
CPC classification number: G06F11/1469 , G06F11/1464 , G06F11/1451 , G06F2201/84
Abstract: In a storage system that is connected via networks to a cloud system, which provides an object store, and backs up backup data of a predetermined volume as an object to the object store, the storage system includes a processor, and the processor is configured to determine whether the storage system stores a snapshot associated with a volume at a first point in time to be restored, and restore the volume at the first point in time using the snapshot when it is determined that the storage system stores the snapshot.
-
公开(公告)号:US11876857B1
公开(公告)日:2024-01-16
申请号:US18159918
申请日:2023-01-26
Applicant: PARALLELS INTERNATIONAL GMBH
Inventor: Matthew Cini Sarreo , Nikolay Dobrovolskiy
CPC classification number: H04L67/1008 , G06F11/1464 , G06F11/3006 , G06F11/3409 , H04L67/01 , H04L67/08 , H04L67/75 , G06F2201/84
Abstract: Systems arid methods for implementing client-side load balancing for remote application servers. An example method comprises receiving, by a publishing server, an application server status information reflecting computing resource utilization by each application server of a plurality of application servers; receiving a request initiated by a client computing device to access a published application executable by at least a subset of the plurality of application servers; and responsive to determining that a load metric reflecting performance of the publishing server exceeds a threshold value, transmitting an instruction to the client computing device to perform client-side load balancing using a snapshot of the application server status information to select an application server of the subset of the plurality of application servers.
-
公开(公告)号:US11874749B1
公开(公告)日:2024-01-16
申请号:US17957415
申请日:2022-09-30
Applicant: Dell Products L.P.
Inventor: Sunil Yadav , Shelesh Chopra
CPC classification number: G06F11/1469 , G06F16/122 , G06F2201/84
Abstract: Embodiments of the invention relate to methods and systems for efficiently backing up and restoring assets such as files and folders in the form of slices and streams. In one or more embodiments, assets such as files and folders that are to be backed up are placed in appropriate network slice queues, which are then assigned to network streams. The slices/assets are assigned in such a way that each stream has a similar cost and throughput. The backup is performed, and the streams are stored in their own backup containers until a restoration is needed. Once a restoration is needed, the meta-data for the backup is used to restore the files and folders, forming the asset back to their appropriate locations in the target file-system. This results in efficient use of network resources, while minimizing the amount of work the hosts and/or clients must perform during a backup or restoration.
-
公开(公告)号:US20240012721A1
公开(公告)日:2024-01-11
申请号:US18472925
申请日:2023-09-22
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Shmoolik Yosub , Assaf Natanzon , Asaf Yeger , Michael Gutman , Shahar Salzman , David Segal
IPC: G06F11/14
CPC classification number: G06F11/1469 , G06F11/1464 , G06F2201/84 , G06F2201/815
Abstract: Provided is a computer-implemented method of backup and restore in a network data storage system (200, 310). The method includes generating, at a predefined time interval, a series of one or more virtual snapshots including, for each item in the network data storage system: (i) a strong hash of the item data, and (ii) one or more metadata elements related to the item. The method includes, in response to a request to restore a particular item: (i) searching the series of virtual snapshots for all available sources of the particular item, (ii) identifying the best source for the particular item, and (iii) recovering item data for the particular item from the identified best source.
-
公开(公告)号:US20240012717A1
公开(公告)日:2024-01-11
申请号:US17881457
申请日:2022-08-04
Applicant: Commvault Systems, Inc.
Inventor: Amit MITKAR , Srinivas Govind KUNDARAM , Shankarbabu BHAVANARUSHI , Arun Prasad AMARENDRAN , Rohit Himmatrao DIKKAR
CPC classification number: G06F11/1464 , G06F11/1451 , G06F21/6218 , G06F2201/84
Abstract: Protecting configuration data in a clustered container system may include, in some embodiments, protecting an ETCD data store in a Kubernetes cluster. A data storage management system addresses the unique needs of protecting an ETCD data store of a target Kubernetes cluster, as well as protecting non-ETCD data payloads. The illustrative data storage management system defines ETCD as a unique kind of workload. ETCD protection is integrated within the data storage management system, which automatically creates data structures and resources within the system for, and provides special-purpose features to protect, ETCD contents and associated security certificates. One of the special-purpose features deploys a temporary data transfer agent within the target Kubernetes cluster to safeguard an ETCD snapshot and transmit its contents, along with the security certificates, to a backup infrastructure that operates outside of the target Kubernetes cluster. The backup infrastructure comprises components deployed by the data storage management system.
-
公开(公告)号:US11860741B2
公开(公告)日:2024-01-02
申请号:US17687431
申请日:2022-03-04
Applicant: Amazon Technologies, Inc.
Inventor: Akshat Vig , Tate Andrew Certain , Go Hori
CPC classification number: G06F11/1451 , G06F9/54 , G06F11/1469 , G06F16/2358 , G06F16/278 , G06F2201/84
Abstract: Changes made to a database table are accumulated, in durable storage, and snapshots of partitions of the table are obtained. For successive snapshots of a partition, the system accesses a previous snapshot, applies changes from the accumulated changes, and stores the updated snapshot to a durable data store. The accumulated changes and the successive partition snapshots are made available to restore the database to any point in time across a continuum between successive snapshots. Although each partition of the table may have a backup snapshot that was generated at a time different from when other partition snapshots were generated, changes from respective change logs may be selectively log-applied to distinct partitions of a table to generate an on-demand backup of the entire table at common point-in-time across partitions. Point-in-time restores of a table may rely upon a similar process to coalesce partition snapshots that are not aligned in time.
-
107.
公开(公告)号:US11860739B2
公开(公告)日:2024-01-02
申请号:US17816457
申请日:2022-08-01
Applicant: NetApp, Inc.
Inventor: David Slik
CPC classification number: G06F11/1448 , G06F11/1435 , G06F12/0253 , G06F16/1724 , G06F16/1824 , H04L9/0643 , G06F2201/84
Abstract: Methods, non-transitory computer readable media, and devices that more effectively manage snapshots by creating a namespace including files described by stored file recipe objects and each comprising fragments, directories described by metadata in the file recipe objects and each comprising one or more of the files, and snapshots described by stored snapshot request objects. Content of one of the directories are identified based on an identification of corresponding ones of the file recipe objects that existed within the namespace at a specified time. At least one of the files, included in the identified content and existing within the namespace at the specified time, is accessed in response to one or more received requests. A garbage collection operation is periodically performed to delete the recipe objects that are marked for deletion by tombstone objects and are unreferenced by any of the snapshots as determined based on the snapshot request objects.
-
108.
公开(公告)号:US11853585B2
公开(公告)日:2023-12-26
申请号:US16773590
申请日:2020-01-27
Applicant: International Business Machines Corporation
Inventor: Matthew J. Ward , Theresa Mary Brown , Nedlaya Yazzie Francisco , Gail Spear
CPC classification number: G06F3/065 , G06F3/067 , G06F3/0619 , G06F3/0659 , G06F3/0665 , G06F11/1451 , G06F11/1464 , G06F11/1469 , G06F2201/84
Abstract: A computer-implemented method according to one embodiment includes identifying data to be transferred as part of a point-in-time snapshot copy operation; setting a data consistency application in an idle state; marking the data while the data consistency application is in the idle state; restarting the data consistency application; identifying, by the data consistency application, the marked data; creating, by the data consistency application, a consistency group including the marked data; and performing replication of the consistency group.
-
公开(公告)号:US11853285B1
公开(公告)日:2023-12-26
申请号:US17155781
申请日:2021-01-22
Applicant: PURE STORAGE, INC.
Inventor: Ronald Ekins , Ronald Karr
CPC classification number: G06F16/2358 , G06F11/1469 , G06F16/214 , G06F16/27 , G06F2201/84
Abstract: Systems, methods, and computer readable storage mediums for blockchain logging of volume-level events in a storage system. Blockchain logging of volume-level event includes receiving, by a storage controller, a storage operation directed to a storage volume; detecting, by the storage controller, that the storage operation is a volume-level event associated that affects the volume as a whole; and updating a blockchain ledger to include information describing the volume-level event, wherein the information comprises data describing a host associated with the event.
-
公开(公告)号:US20230409713A1
公开(公告)日:2023-12-21
申请号:US18458466
申请日:2023-08-30
Applicant: Rubrik, Inc.
Inventor: Oscar Chen , Di Wu , Benjamin Reisner , Matthew Edward Noe
IPC: G06F21/56 , G06F11/14 , G06F16/11 , G06F16/951
CPC classification number: G06F21/565 , G06F11/1458 , G06F16/128 , G06F16/951 , G06F2201/84 , G06F2221/034
Abstract: Described herein is a system that detects ransomware infection in filesystems. The system detects ransomware infection by using backup data of machines. The system detects ransomware infection in two stages. In the first stage, the system analyzes a filesystem's behavior. The filesystem's behavior can be obtained by loading the backup data and crawling the filesystem to create a filesystem metadata including information about file operations during a time interval. The filesystem determines a pattern of the file operations and compares the pattern to a normal patter to analyze the filesystem's behavior. If the filesystem's behavior is abnormal, the system proceeds to the second stage to analyze the content of the files to look for signs of encryption in the filesystem. The system combines the analysis of both stages to determine whether the filesystem is infected by ransomware.
-
-
-
-
-
-
-
-
-