EFFICIENT FILE RECOVERY FROM TIERED CLOUD SNAPSHOTS

    公开(公告)号:US20230325286A1

    公开(公告)日:2023-10-12

    申请号:US17714408

    申请日:2022-04-06

    Applicant: Rubrik, Inc.

    CPC classification number: G06F11/1469 G06F11/1471 G06F16/188 G06F16/128

    Abstract: A file system in a user space partition of virtual memory may be mounted by a computing device that runs a virtual machine which includes a set of storage disks. The file system in user space may then expose one or more virtual files associated with one or more storage disks that correspond to one or more loop devices configured to map files of the virtual machine to the one or more virtual files. The computing device may then receive a request to read a data block stored at the virtual machine and may identify a file and corresponding virtual file that stores the requested data block based on a set of metadata provided by the loop devices. The computing device may then determine the location of the data block stored at the virtual machine, and may read the data block from the determined location.

    EFFICIENT FILE RECOVERY FROM TIERED CLOUD SNAPSHOTS

    公开(公告)号:US20240193054A1

    公开(公告)日:2024-06-13

    申请号:US18424727

    申请日:2024-01-26

    Applicant: Rubrik, Inc.

    CPC classification number: G06F11/1469 G06F11/1471 G06F16/128 G06F16/188

    Abstract: A file system in a user space partition of virtual memory may be mounted by a computing device that runs a virtual machine which includes a set of storage disks. The file system in user space may then expose one or more virtual files associated with one or more storage disks that correspond to one or more loop devices configured to map files of the virtual machine to the one or more virtual files. The computing device may then receive a request to read a data block stored at the virtual machine and may identify a file and corresponding virtual file that stores the requested data block based on a set of metadata provided by the loop devices. The computing device may then determine the location of the data block stored at the virtual machine, and may read the data block from the determined location.

    Efficient file recovery from tiered cloud snapshots

    公开(公告)号:US11954000B2

    公开(公告)日:2024-04-09

    申请号:US17714408

    申请日:2022-04-06

    Applicant: Rubrik, Inc.

    CPC classification number: G06F11/1469 G06F11/1471 G06F16/128 G06F16/188

    Abstract: A file system in a user space partition of virtual memory may be mounted by a computing device that runs a virtual machine which includes a set of storage disks. The file system in user space may then expose one or more virtual files associated with one or more storage disks that correspond to one or more loop devices configured to map files of the virtual machine to the one or more virtual files. The computing device may then receive a request to read a data block stored at the virtual machine and may identify a file and corresponding virtual file that stores the requested data block based on a set of metadata provided by the loop devices. The computing device may then determine the location of the data block stored at the virtual machine, and may read the data block from the determined location.

    EFFICIENT VULNERABILITY ANALYSIS OVER BACKUPS

    公开(公告)号:US20230376605A1

    公开(公告)日:2023-11-23

    申请号:US17748834

    申请日:2022-05-19

    Applicant: Rubrik, Inc.

    CPC classification number: G06F21/577 G06F2221/033

    Abstract: A storage appliance or system may support backup and recovery for virtual machines that support various applications. The storage appliance or system may process a backup snapshot of the virtual machine to identify security vulnerabilities in the virtual machine. The storage appliance may generate an index of software packages installed on the virtual machine and software versions of the software packages. The index of software packages may be compared to a list of security vulnerabilities to identify the security vulnerability at the virtual machine. A notification may be triggered, and the notification may indicate a result of comparing the index of software packages and the software versions to the list of vulnerabilities. In some examples, a set of network configurations implemented by the virtual machines may be determined by processing the backup snapshot and used to identify security vulnerabilities.

Patent Agency Ranking