-
公开(公告)号:US20190235761A1
公开(公告)日:2019-08-01
申请号:US15885446
申请日:2018-01-31
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Glenn S. Watkins , Curtis Mello , Michael Champigny , John Michael Czerkowicz
CPC classification number: G06F3/0611 , G06F3/0619 , G06F3/0631 , G06F3/0644 , G06F3/0665 , G06F3/0689 , G06F9/45533 , G06F16/122
Abstract: Example implementations relate to allocating an I/O request. In an example, a demultiplexer may forward an I/O request to a file system instance to which the I/O request belongs. The file system instance may tag the I/O request with a file system instance identifier associated with that file system instance. A volume manager may identify an extent pool to which the I/O request is to be allocated from among a plurality of extent pools of a storage based on the file system instance identifier tagged to the I/O request.
-
公开(公告)号:US11100235B2
公开(公告)日:2021-08-24
申请号:US16397661
申请日:2019-04-29
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Gareth David Richards , Glenn S. Watkins , John Michael Czerkowicz
Abstract: Example implementations relate to encrypting data objects. In an example, data objects of a file system instance contained by a security domain are encrypted using a Data Encryption Key that is specific to the security domain and is wrapped by a Key Encryption Key shared exclusively within a cluster. A root object of the file system instance is encrypted using a Metadata Encryption Key. A backup of the file system instance is created on a backup node. The Data Encryption Key and the Metadata Encryption Key are sent to the backup node.
-
公开(公告)号:US10862736B2
公开(公告)日:2020-12-08
申请号:US16776768
申请日:2020-01-30
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Glenn S. Watkins , John Michael Czerkowicz , Sumit Narayan , George A. Klarakis
Abstract: In an example, a system includes network nodes implementing an object store. The system may determine reference count updates for objects stored on the object store, and delay persisting the reference count updates to a persistent storage. The system may cancel reference count updates that increments and decrement between the determined reference count update and another reference count update received during the delay in persisting the reference count update to the persistent storage to minimize writing to the object record.
-
公开(公告)号:US10860738B2
公开(公告)日:2020-12-08
申请号:US15884121
申请日:2018-01-30
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: John Michael Czerkowicz , Glenn S. Watkins , Peter William Madany
Abstract: In an example, a system may modify an object stored in an object store for storing objects to include augmented metadata. The system may encode a signature of the modified object such that the signature is identical to a signature of the object prior to being modified to include the augmented metadata.
-
15.
公开(公告)号:US20200342117A1
公开(公告)日:2020-10-29
申请号:US16397661
申请日:2019-04-29
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Gareth David Richards , Glenn S. Watkins , John Michael Czerkowicz
Abstract: Example implementations relate to encrypting data objects. In an example, data objects of a file system instance contained by a security domain are encrypted using a Data Encryption Key that is specific to the security domain and is wrapped by a Key Encryption Key shared exclusively within a cluster. A root object of the file system instance is encrypted using a Metadata Encryption Key. A backup of the file system instance is created on a backup node. The Data Encryption Key and the Metadata Encryption Key are sent to the backup node.
-
公开(公告)号:US20190236302A1
公开(公告)日:2019-08-01
申请号:US15884121
申请日:2018-01-30
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: John Michael Czerkowicz , Glenn S. Watkins , Peter William Madany
CPC classification number: G06F21/6227 , G06F16/137 , G06F16/178 , H04L9/0643
Abstract: In an example, a system may modify an object stored in an object store for storing objects to include augmented metadata. The system may encode a signature of the modified object such that the signature is identical to a signature of the object prior to being modified to include the augmented metadata.
-
公开(公告)号:US12093316B2
公开(公告)日:2024-09-17
申请号:US16263390
申请日:2019-01-31
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
IPC: G06F16/90 , G06F9/455 , G06F16/188 , G06F16/27 , G06F16/901 , G06F16/908
CPC classification number: G06F16/9027 , G06F9/45558 , G06F16/192 , G06F16/273 , G06F16/908 , G06F2009/45595
Abstract: Example implementations relate to partial file system instances. In an example, a subset of objects of a source file system instance on a source system are replicated to a target system to form a partial file system instance on the target system comprised of the subset of objects. Each of the objects of the source file system instance is identified by a signature based on content of each of the objects and the objects exhibit a hierarchical relationship to a root object in the file system instance. An unmaterialized object is dynamically added to the partial file system instance by replicating the corresponding object from the source file system instance. The target system is asynchronously updated from the source file system instance based on a comparison of the partial file system instance to the source file system instance.
-
公开(公告)号:US11226867B2
公开(公告)日:2022-01-18
申请号:US16398069
申请日:2019-04-29
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Gareth David Richards , Glenn S. Watkins , John Michael Czerkowicz
Abstract: Example implementations relate to encrypting data objects. In an example, data objects of a file system instance contained by a security domain are encrypted using a Data Encryption Key that is specific to the security domain and is wrapped by a Key Encryption Key shared exclusively within a cluster. A backup of the file system instance is created on a backup node. The backup includes at least some of the encrypted data objects. The DEK is sent to the backup node. The backup node cannot decrypt the backup unless the backup node is a member of the cluster and has access to the KEK to unwrap the DEK.
-
公开(公告)号:US20200250232A1
公开(公告)日:2020-08-06
申请号:US16263390
申请日:2019-01-31
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
IPC: G06F16/901 , G06F16/908 , G06F16/27 , G06F16/188 , G06F9/455
Abstract: Example implementations relate to partial file system instances. In an example, a subset of objects of a source file system instance on a source system are replicated to a target system to form a partial file system instance on the target system comprised of the subset of objects. Each of the objects of the source file system instance is identified by a signature based on content of each of the objects and the objects exhibit a hierarchical relationship to a root object in the file system instance. An unmaterialized object is dynamically added to the partial file system instance by replicating the corresponding object from the source file system instance. The target system is asynchronously updated from the source file system instance based on a comparison of the partial file system instance to the source file system instance.
-
公开(公告)号:US10565125B2
公开(公告)日:2020-02-18
申请号:US15906506
申请日:2018-02-27
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Curtis Mello , Michael Champigny , Glenn S. Watkins , John Michael Czerkowicz
IPC: G06F12/10 , G06F12/1018
Abstract: Example implementations relate to objects in extents on a storage resource. In an example, an extent identifier is persisted to a storage allocation table, where the extent identifier locates an extent on a storage resource. An extent map tracks which objects in the extent are deallocated. A virtual block address is generated allocating an object to store data. The virtual block address may include a storage allocation table key that locates the extent identifier in the storage allocation table and an extent offset to locate the object within the extent.
-
-
-
-
-
-
-
-
-