-
公开(公告)号:US12222954B2
公开(公告)日:2025-02-11
申请号:US18513140
申请日:2023-11-17
Applicant: Snowflake Inc.
Inventor: Kavinder S. Dhaliwal , Bicheng Gao , Valeri Kim , Nithin Mahesh , Jiaqi Yan , Jiaqi Zhang
IPC: G06F16/25 , G06F16/22 , G06F16/245
Abstract: The subject technology provides techniques for enabling hidden database objects, which in an example are utilized for testing and verifying new database objects against existing workloads. Hidden database objects are a mechanism for bridging that gap by running user workloads on user data in advance of exposing the feature to users. This mechanism allows placing a database object as a hidden object nested beneath a user's visible object (e.g., table, column, view, and the like). Hidden database objects can be used to verify the functionality, parity, performance, and correctness of new unreleased features.
-
公开(公告)号:US12135734B2
公开(公告)日:2024-11-05
申请号:US18324787
申请日:2023-05-26
Applicant: Snowflake Inc.
Inventor: Pui Kei Johnston Chu , Benoit Dageville , Shreyas Narendra Desai , Nithin Mahesh , Subramanian Muralidhar , Vishnu Dutt Paladugu , Sahaj Saini , Chieh-Sheng Wang , Di Wu
Abstract: Various embodiments provide for replicating a share across deployments of a data platform, where the share can be on a source deployment and the share can be replicated on one or more target deployments, and where the share is replicated with one or more database objects of the source deployment associated with the share. Some embodiments analyze the share to be replicated and, based on the analysis, determine one or more database objects that would be replicated to the one or more target deployments to enable a replica of the share on the one or more target deployments.
-
公开(公告)号:US12101294B2
公开(公告)日:2024-09-24
申请号:US18341954
申请日:2023-06-27
Applicant: Snowflake Inc.
Inventor: Robert Bengt Benedikt Gernhardt , Mikhail Kazhamiaka , Nithin Mahesh , Eric Robinson
IPC: H04L9/40
CPC classification number: H04L63/0218 , H04L63/0236 , H04L63/0245
Abstract: Different database deployments, or other data system deployments, may want to communicate with each other without sacrificing security or control. To this end, embodiments of the present disclosure may provide secure message exchange techniques for a source and/or target deployment. Configurable rule sets may be stored in the deployments; the rule sets may define what messages may be communicated between deployments. The deployments may implement a selective filtering scheme in one or more stages based on the rule sets to filter outgoing and/or incoming messages.
-
公开(公告)号:US20240176711A1
公开(公告)日:2024-05-30
申请号:US18329348
申请日:2023-06-05
Applicant: Snowflake Inc.
Inventor: Loc Duc Bui , Hitesh Madan , Nithin Mahesh , Subramanian Muralidhar , Sahaj Saini , Di Wu
CPC classification number: G06F11/203 , G06F16/256 , G06F16/27
Abstract: The subject technology determines a set of share objects in a replication group. The subject technology, for each object from the set of share objects, determines a set of permissions for a set of objects of databases that has been granted to each share object from the replication group. The subject technology, for each permission from the set of permissions, determines a set of dependencies, the set of dependencies comprising a second set of objects. The subject technology generates a graph structure based at least in part on the set of share objects, the set of permissions, and the set of dependencies. The subject technology traverses at least a portion of the graph structure to determine a final set of dependencies for replication. The subject technology performs a replication process based at least in part on the final set of dependencies.
-
公开(公告)号:US20230297591A1
公开(公告)日:2023-09-21
申请号:US18324787
申请日:2023-05-26
Applicant: Snowflake Inc.
Inventor: Pui Kei Johnston Chu , Benoit Dageville , Shreyas Narendra Desai , Nithin Mahesh , Subramanian Muralidhar , Vishnu Dutt Paladugu , Sahaj Saini , Chieh-Sheng Wang , Di Wu
CPC classification number: G06F16/27 , G06F16/213 , G06F16/256
Abstract: Various embodiments provide for replicating a share across deployments of a data platform, where the share can be on a source deployment and the share can be replicated on one or more target deployments, and where the share is replicated with one or more database objects of the source deployment associated with the share. Some embodiments analyze the share to be replicated and, based on the analysis, determine one or more database objects that would be replicated to the one or more target deployments to enable a replica of the share on the one or more target deployments.
-
公开(公告)号:US11586515B1
公开(公告)日:2023-02-21
申请号:US17663941
申请日:2022-05-18
Applicant: Snowflake Inc.
Inventor: Abdullah Al Mahmood , Ruta Dhaneshwar , Xin Huang , Ganeshan Ramachandran Iyer , Jiaxing Liang , Nithin Mahesh , Raghav Ramachandran , Purav B. Saraiya , Yanyi Zhang
Abstract: Described herein are techniques for improving disaster recovery, in particular disaster recovery pertaining to data transfer requests. The data transfer request can be received by each of multiple deployments; however, only a primary deployment can process the request. The data transferred by the primary deployment may be replicated in the secondary deployments. In response to a failover event, one of the secondary deployments can be designated as the new primary development and continue the data transfer based on the data transfer request and the replication information received from the old primary deployment prior to the failover.
-
公开(公告)号:US11372891B2
公开(公告)日:2022-06-28
申请号:US17226141
申请日:2021-04-09
Applicant: Snowflake Inc.
Inventor: Pui Kei Johnston Chu , Shreyas Narendra Desai , German Alberto Gil Echeverri , Prasanna Krishnan , Nithin Mahesh , Subramanian Muralidhar , Eric Robinson , Sahaj Saini
Abstract: A method of implementing sub-table replication starts with the processor detecting a first update to an entitlements table. The processor then performs incremental replication of the data table by causing a full inventory replication at a next refresh to be executed for provider accounts associated with the provider account identifiers in the entitlements table. Other embodiments are also described herein.
-
公开(公告)号:US20210281544A1
公开(公告)日:2021-09-09
申请号:US17156072
申请日:2021-01-22
Applicant: Snowflake Inc.
Inventor: Robert Bengt Benedikt Gernhardt , Mikhail Kazhamiaka , Nithin Mahesh , Eric Robinson
IPC: H04L29/06
Abstract: Different database deployments, or other data system deployments, may want to communicate with each other without sacrificing security or control. To this end, embodiments of the present disclosure may provide secure message exchange techniques for a source and/or target deployment. Configurable rule sets may be stored in the deployments; the rule sets may define what messages may be communicated between deployments. The deployments may implement a selective filtering scheme in one or more stages based on the rule sets to filter outgoing and/or incoming messages.
-
公开(公告)号:US10999261B1
公开(公告)日:2021-05-04
申请号:US17086261
申请日:2020-10-30
Applicant: Snowflake Inc.
Inventor: Damien Carru , Robert Bengt Benedikt Gernhardt , Martin Hentschel , Nithin Mahesh , Eric Robinson
Abstract: A networked device communication system can configure network devices (e.g., a primary and secondary database) to send and receive sequences of messages, such as replicated data, using one or more keypairs and wrapping keys. The sequences of messages can include an initial set of messages that are encrypted by a wrapping key, and further include another set of messages that are encrypted by a replaced staggered key. The sequence of messages can be configured to be decrypted without exporting keys of hardware security modules.
-
公开(公告)号:US10938780B1
公开(公告)日:2021-03-02
申请号:US16809209
申请日:2020-03-04
Applicant: Snowflake Inc.
Inventor: Robert Bengt Benedikt Gernhardt , Mikhail Kazhamiaka , Nithin Mahesh , Eric Robinson
IPC: H04L29/06
Abstract: Different database deployments, or other data system deployments, may want to communicate with each other without sacrificing security or control. To this end, embodiments of the present disclosure may provide secure message exchange techniques for a source and/or target deployment. Configurable rule sets may be stored in the deployments; the rule sets may define what messages may be communicated between deployments. The deployments may implement a selective filtering scheme in one or more stages based on the rule sets to filter outgoing and/or incoming messages.
-
-
-
-
-
-
-
-
-