INLINE DEDUPLICATION
    12.
    发明申请

    公开(公告)号:US20200159432A1

    公开(公告)日:2020-05-21

    申请号:US16774127

    申请日:2020-01-28

    Applicant: NetApp Inc.

    Abstract: One or more techniques and/or computing devices are provided for inline deduplication. For example, a checksum hash table and/or a block number hash table may be maintained within memory (e.g., a storage controller may maintain the hash tables in-core). The checksum hash table may be utilized for inline deduplication to identify potential donor blocks that may comprise the same data as an incoming storage operation. Data within an in-core buffer cache is eligible as potential donor blocks so that inline deduplication may be performed using data from the in-core buffer cache, which may mitigate disk access to underlying storage for which the in-core buffer cache is used for caching. The block number hash table may be used for updating or removing entries from the hash tables, such as for blocks that are no longer eligible as potential donor blocks (e.g., deleted blocks, blocks evicted from the in-core buffer cache, etc.).

    ON-DEMAND SERVERLESS DISASTER RECOVERY
    14.
    发明公开

    公开(公告)号:US20240078160A1

    公开(公告)日:2024-03-07

    申请号:US18507431

    申请日:2023-11-13

    Applicant: NetApp Inc.

    CPC classification number: G06F11/2025 G06F11/1469 G06F2201/84

    Abstract: Techniques are provided for on-demand serverless disaster recovery. A primary node may host a primary volume. Snapshots of the primary volume may be backed up to an object store. In response to failure, a secondary node and/or an on-demand volume may be created on-demand. The secondary node may provide clients with failover access to the on-demand volume while a restore process restores a snapshot of the primary volume to the on-demand volume. In some embodiments, there was no secondary node and/or on-demand volume while the primary node was operational. This conserves computing resources that would be wasted by otherwise hosting the secondary node and/or on-demand volume while clients were able to access the primary volume through the primary node. Modifications directed to the on-demand volume are incrementally backed up to the object store for subsequently restoring the primary volume after recovery.

    AGGREGATE INLINE DEDUPLICATION WITH VOLUME GRANULAR ENCRYPTION

    公开(公告)号:US20220171557A1

    公开(公告)日:2022-06-02

    申请号:US17676342

    申请日:2022-02-21

    Applicant: NetApp Inc.

    Abstract: Techniques are provided for aggregate inline deduplication and volume granularity encryption. For example, data that is exclusive to a volume of a tenant is encrypted using an exclusive encryption key accessible to the tenant. The exclusive encryption key of that tenant is inaccessible to other tenants. Shared data that has been deduplicated and shared between the volume and another volume of a different tenant is encrypted using a shared encryption key of the volume. The shared encryption key is made available to other tenants. In this way, data can be deduplicated across multiple volumes of different tenants of a storage environment, while maintaining security and data privacy at a volume level.

    Background deduplication using trusted fingerprints

    公开(公告)号:US11055005B2

    公开(公告)日:2021-07-06

    申请号:US16254741

    申请日:2019-01-23

    Applicant: NetApp Inc.

    Abstract: Techniques are provided for background deduplication using trusted fingerprints. Trusted fingerprints of blocks are inserted into a trusted fingerprint store as the blocks are being allocated by a file system sequentially according to block numbers of the blocks. In this way, the trusted fingerprint store is indexed by block numbers of where the blocks are stored. Blocks that are to be deduplicated are identifying by sorting the blocks based upon weak fingerprints, and moving duplicates to a dup file. The dup file is sorted based upon block numbers. Trusted fingerprints are loaded from the trusted fingerprint store for deduplicating the blocks within the dup file.

Patent Agency Ranking