-
公开(公告)号:US20230409443A1
公开(公告)日:2023-12-21
申请号:US18459265
申请日:2023-08-31
Applicant: NetApp Inc.
Inventor: Ananthan Subramanian , Ram Kesavan , Matthew Fontaine Curtis-Maury , Mark Smith
CPC classification number: G06F11/1464 , G06F3/0619 , G06F3/0641 , G06F3/0659 , G06F3/067 , G06F11/1451 , G06F11/1453 , G06F11/1469 , G06F11/2056 , G06F2201/84
Abstract: Techniques are provided for implementing a persistent memory storage tier to manage persistent memory of a node. The persistent memory is managed by the persistent memory storage tier at a higher level within a storage operating system storage stack than a level at which a storage file system of the node is managed. The persistent memory storage tier intercepts an operation targeting the storage file system. The persistent memory storage tier retargets the operation from targeting the storage file system to targeting the persistent memory. The operation is transmitted to the persistent memory.
-
公开(公告)号:US11847336B1
公开(公告)日:2023-12-19
申请号:US16862535
申请日:2020-04-29
Applicant: PURE STORAGE, INC.
Inventor: Ethan Miller , Andrew R. Bernat , John Colgrove , Alan Driscoll , Christopher Golden , Steve Hodgson , Ganesh Ramanarayanan , Malcolm Sharpe
CPC classification number: G06F3/065 , G06F3/061 , G06F3/0604 , G06F3/067 , G06F3/0683 , G06F3/0608 , G06F3/0641 , G06F11/1453 , G06F2201/84
Abstract: A system and method for performing replication using mediums. A snapshot ‘S’ is selected for replication, and the anchor medium ‘M’ of S is identified. The replica storage array ‘R’ to which M is being replicated determines a list of medium extents which are available. R sends this list to an original storage array ‘O’ and O generates a list of medium extents which need to be sent to R. Only those medium extents corresponding to M which R does not already have will be sent from O to R. Also, R can obtain medium extents from other source storage arrays during the replication process.
-
公开(公告)号:US11841953B2
公开(公告)日:2023-12-12
申请号:US17573483
申请日:2022-01-11
Applicant: Cohesity, Inc.
Inventor: Nagapramod Mandagere , Karandeep Singh Chawla , Virupaksha Kanjilal , Nilesh Pathak
CPC classification number: G06F21/577 , G06F11/1446 , G06F2201/84 , G06F2221/033
Abstract: A plurality of scanned backup snapshots are generated. A backup snapshot among a plurality of backup snapshots is selected. At least a portion of the selected backup snapshot is restored in a temporary environment to create a restored instance of at least the portion of the selected backup snapshot. A vulnerability scan of the restored instance of at least the portion of the selected backup snapshot is performed. One or more vulnerabilities of the scanned portion of the selected backup snapshot are tracked. A request associated with identifying a scanned backup snapshot to restore from the plurality of scanned backup snapshots is received. In response to the request, at least a predetermined identification of the one or more vulnerabilities of the selected backup snapshot is provided.
-
公开(公告)号:US11841772B2
公开(公告)日:2023-12-12
申请号:US17164085
申请日:2021-02-01
Applicant: Dell Products L.P.
Inventor: Nadav Azaria , Avitan Gefen
CPC classification number: G06F11/1469 , G06F9/45558 , G06N5/04 , G06N20/00 , G06F2009/45562 , G06F2009/45575 , G06F2009/45583 , G06F2201/84
Abstract: Techniques are provided for data-driven virtual machine restoration. In an example, a VM crashes and is to be restored. There can be multiple restoration paths that can be used to recover the VM (e.g., various source locations where a recovery image is stored, various recovery images, and various target locations where a VM can be restored to). A trained prediction model can analyze these various restoration paths and predict which restoration path will have a quickest time to recovery, to minimize a time that the VM is unavailable.
-
公开(公告)号:US11836051B2
公开(公告)日:2023-12-05
申请号:US17725690
申请日:2022-04-21
Applicant: Dell Products L.P.
Inventor: Upanshu Singhal , Shelesh Chopra
CPC classification number: G06F11/1464 , G06F11/1451 , G06F11/1469 , G06F21/6245 , G06F2201/84
Abstract: A method for managing data backup includes: making a determination that an asset source is a first type of asset source, in which a source client device comprises the asset source; generating, based on the determination, a data transfer path for a plurality of snapshots associated with the asset source between the source client device and a data protection system; initiating a backup for user data associated with the asset source to a target client device; obtaining the plurality of snapshots to the data protection system using the data transfer path, in which the user data is backed up in the target client device while at least a portion of the plurality of snapshots is obtained by the data protection system; and deleting the plurality of snapshots from the source client device, upon receipt of confirmation that the plurality of snapshots is successfully stored in the data protection system.
-
公开(公告)号:US11836046B1
公开(公告)日:2023-12-05
申请号:US17842584
申请日:2022-06-16
Applicant: Dell Products L.P.
Inventor: Amarendra Behera , Shelesh Chopra , Tushar Dethe , Prabhat Kumar Dubey , Sunil Yadav
CPC classification number: G06F11/1451 , G06F2201/84
Abstract: Writers participating in a backup are identified. A mapping is generated between the writers and associated files. The mapping includes file properties. The mapping is initialized by tagging the writers with a full backup tag. A base backup copy of the writers is created by conducting a full backup of each writer tagged with the full backup tag. At a current backup operation after creating the base backup, a list of current files that will participate in the current backup operation is generated. The list of current files is compared against the files in the mapping to determine whether a particular writer associated with a current file should be tagged with the full backup tag or an incremental backup tag. The particular writer is tagged with the incremental backup tag when file properties associated with the current file have changed.
-
117.
公开(公告)号:US20230385162A1
公开(公告)日:2023-11-30
申请号:US17804230
申请日:2022-05-26
Applicant: Red Hat, Inc.
Inventor: Ashutosh Mehra , Daniel Heidinga
IPC: G06F11/14
CPC classification number: G06F11/1469 , G06F2201/84
Abstract: Systems and methods are described for improving portability of checkpoints of an application using central processing unit (CPU)-specific features. In an example, a system includes a source computing system and a destination computing system. The source computing system may be configured to: cause a first execution of an application that includes a function associated with a plurality of implementations; receive a request to resolve an implementation decision for the function; select, based on a set of source CPU-specific features, a source-specific implementation for the first execution of the function; patch, by rendering a resolved callsite table, a call site associated with the function with an address of the source-specific implementation; and send, to a destination computing system, a checkpoint of the application that includes the resolved callsite table. The destination computing system is configured to restore the application by changing the implementation decision based on a set of destination CPU-specific features.
-
公开(公告)号:US20230385159A1
公开(公告)日:2023-11-30
申请号:US17751964
申请日:2022-05-24
Applicant: TESSELL, INC.
Inventor: Balasubrahmanyam Kuchibhotla , Uday Kiran Jonnala , Kamaldeep Singh Khanuja , Maneesh Rawat , Manish Pratap Singh , Bakul Banthia
IPC: G06F11/14
CPC classification number: G06F11/1464 , G06F11/1469 , G06F11/1448 , G06F2201/84
Abstract: Systems, methods, and computer readable media for preventing data loss at ephemeral and/or volatile storage of a local storage system are provided. These techniques may include synchronizing that state of the ephemeral storage system to a cloud-based storage system and capturing a cloud snapshot of the cloud-based storage system. In the event of a failure at the volatile storage, the cloud-based snapshot can be used as a restore point for the cloud-based storage system, the state of which can then be synchronized back to the volatile storage. Additionally, the local storage system includes durable storage for storing transaction logs. After synchronizing the state of the cloud-based storage system to the volatile storage, the local storage system can playback transactions in the transaction log to restore the volatile segment to the state at the time of the failure.
-
公开(公告)号:US20230385157A1
公开(公告)日:2023-11-30
申请号:US18325853
申请日:2023-05-30
Applicant: Cloudera, Inc.
Inventor: Prashant Pogde , Siddharth Wagle , Siyao Meng , Nandakumar Vadivelu , Sadanand Shenoy
IPC: G06F11/14 , G06F16/11 , G06F16/13 , G06F16/182 , G06F16/178
CPC classification number: G06F11/1458 , G06F16/122 , G06F16/134 , G06F16/1844 , G06F16/178 , G06F2201/84
Abstract: Snapshot or point-in-time image functionality improves the use of object-based datastores. An example system includes an object-based datastore and a metadata datastore associated with the object-based datastore. Instances of the metadata datastore are created as snapshot images of the object-based datastore. Comparison of snapshot images is important for database analytics, disaster recovery, data protection, and more. Example techniques provide comparison of snapshot images (as metadata datastore instances) and remain robust and accurate in view of compactions performed by the metadata datastore. An example technique includes generating and updating a graph-based data structure that captures relationships between metadata files in the metadata datastore, particularly between pre-compaction files and post-compaction files. The example technique further includes referencing the graph-based data structure to accelerate snapshot image comparison based on determining whether files of a source snapshot image were compacted into files of a destination snapshot image, and/or vice versa.
-
公开(公告)号:US11829271B2
公开(公告)日:2023-11-28
申请号:US17249531
申请日:2021-03-04
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Sankar Ramasamy , Aswin Jayaraman , Sijesh Thondapilly Balakrishnan , Alastair Slater
CPC classification number: G06F11/2097 , G06F3/0604 , G06F3/065 , G06F3/067 , G06F11/1456 , G06F11/1461 , G06F11/1469 , G06F11/2094 , G06F2201/84
Abstract: Examples described herein relate to a data protection policy management system (DPPMS) for tuning a data protection policy in events of failures. The DPPMS may detect a failure associated with an application that is protected via the data protection policy that includes settings corresponding to parameters comprising one or more of copy tiers, a data retention interval and a recovery point objective (RPO) for the copy tiers. The DPPMS may determine a type of the failure associated with the application. Further, the DPPMS may select, based on the type of the failure, at least one parameter of the parameters to be tuned in response to detection of the failure. Moreover, the DPPMS may tune the settings corresponding to the at least one selected parameter to adapt the data protection policy.
-
-
-
-
-
-
-
-
-