-
公开(公告)号:US20210271642A1
公开(公告)日:2021-09-02
申请号:US17321546
申请日:2021-05-17
Applicant: NetApp Inc.
Inventor: Tijin George , Jagavar Nehra , Roopesh Chuggani , Dnyaneshwar Nagorao Pawar , Atul Ramesh Pandit , Kiyoshi James Komatsu
IPC: G06F16/178 , G06F16/16 , G06F16/11
Abstract: Techniques are provided for managing objects within an object store. An object is maintained within an object store. The object is used to store data of a snapshot of a file system hosted by a remote computing device. A determination is made that the snapshot was deleted by the remote computing device. Bitmaps describing objects within the object store that are related to snapshots of the file system are evaluated to determine that the object is unique to the deleted snapshot. The object is freed from storage within the object store.
-
公开(公告)号:US20200159432A1
公开(公告)日:2020-05-21
申请号:US16774127
申请日:2020-01-28
Applicant: NetApp Inc.
Inventor: Mukul Sharma , Kartik Rathnakar , Dnyaneshwar Nagorao Pawar , Venkateswarlu Tella , Kiran Nenmeli Srinivasan , Rajesh Khandelwal , Alok Sharma
IPC: G06F3/06
Abstract: One or more techniques and/or computing devices are provided for inline deduplication. For example, a checksum hash table and/or a block number hash table may be maintained within memory (e.g., a storage controller may maintain the hash tables in-core). The checksum hash table may be utilized for inline deduplication to identify potential donor blocks that may comprise the same data as an incoming storage operation. Data within an in-core buffer cache is eligible as potential donor blocks so that inline deduplication may be performed using data from the in-core buffer cache, which may mitigate disk access to underlying storage for which the in-core buffer cache is used for caching. The block number hash table may be used for updating or removing entries from the hash tables, such as for blocks that are no longer eligible as potential donor blocks (e.g., deleted blocks, blocks evicted from the in-core buffer cache, etc.).
-
公开(公告)号:US20240143549A1
公开(公告)日:2024-05-02
申请号:US18406338
申请日:2024-01-08
Applicant: NetApp Inc.
Inventor: Tijin George , Jagavar Nehra , Roopesh Chuggani , Dnyaneshwar Nagorao Pawar , Atul Ramesh Pandit , Anil Kumar Ponnapur , Jose Mathew , Sriram Venketaraman
IPC: G06F16/14 , G06F11/14 , G06F16/11 , G06F16/182
CPC classification number: G06F16/148 , G06F11/1451 , G06F16/128 , G06F16/182 , G06F2201/80 , G06F2201/84
Abstract: Techniques are provided for an object file system for an object store. Data, maintained by a computing device, is stored into slots of an object. The data within the slots of the object is represented as a data structure comprising a plurality of nodes comprising cloud block numbers used to identify the object and particular slots of the object. A mapping metafile is maintained to map block numbers used to store the data by the computing device to cloud block numbers of nodes representing portion of the data stored within slots of the object. The object is stored into the object store, and the mapping metafile and the data structure are used to provide access through the object file system to portions of data within the object.
-
公开(公告)号:US20240078160A1
公开(公告)日:2024-03-07
申请号:US18507431
申请日:2023-11-13
Applicant: NetApp Inc.
Inventor: Dnyaneshwar Nagorao Pawar , Sumith Makam , Roopesh Chuggani` , Tijin George
CPC classification number: G06F11/2025 , G06F11/1469 , G06F2201/84
Abstract: Techniques are provided for on-demand serverless disaster recovery. A primary node may host a primary volume. Snapshots of the primary volume may be backed up to an object store. In response to failure, a secondary node and/or an on-demand volume may be created on-demand. The secondary node may provide clients with failover access to the on-demand volume while a restore process restores a snapshot of the primary volume to the on-demand volume. In some embodiments, there was no secondary node and/or on-demand volume while the primary node was operational. This conserves computing resources that would be wasted by otherwise hosting the secondary node and/or on-demand volume while clients were able to access the primary volume through the primary node. Modifications directed to the on-demand volume are incrementally backed up to the object store for subsequently restoring the primary volume after recovery.
-
公开(公告)号:US11868312B2
公开(公告)日:2024-01-09
申请号:US17498263
申请日:2021-10-11
Applicant: NetApp Inc.
Inventor: Tijin George , Jagavar Nehra , Roopesh Chuggani , Dnyaneshwar Nagorao Pawar , Atul Ramesh Pandit , Anil Kumar Ponnapur , Jose Mathew , Sriram Venketaraman
IPC: G06F16/14 , G06F16/11 , G06F16/182 , G06F11/14
CPC classification number: G06F16/148 , G06F11/1451 , G06F16/128 , G06F16/182 , G06F2201/80 , G06F2201/84
Abstract: Techniques are provided for an object file system for an object store. Data, maintained by a computing device, is stored into slots of an object. The data within the slots of the object is represented as a data structure comprising a plurality of nodes comprising cloud block numbers used to identify the object and particular slots of the object. A mapping metafile is maintained to map block numbers used to store the data by the computing device to cloud block numbers of nodes representing portion of the data stored within slots of the object. The object is stored into the object store, and the mapping metafile and the data structure are used to provide access through the object file system to portions of data within the object.
-
公开(公告)号:US11662930B2
公开(公告)日:2023-05-30
申请号:US17676342
申请日:2022-02-21
Applicant: NetApp Inc.
Inventor: Srinivasan Narayanamurthy , Dnyaneshwar Nagorao Pawar , Jagadish Vasudeva , Parag Deshmukh , Siddhartha Nandi
CPC classification number: G06F3/0641 , G06F3/067 , G06F3/0608 , H04L9/0838 , H04L9/0891
Abstract: Techniques are provided for aggregate inline deduplication and volume granularity encryption. For example, data that is exclusive to a volume of a tenant is encrypted using an exclusive encryption key accessible to the tenant. The exclusive encryption key of that tenant is inaccessible to other tenants. Shared data that has been deduplicated and shared between the volume and another volume of a different tenant is encrypted using a shared encryption key of the volume. The shared encryption key is made available to other tenants. In this way, data can be deduplicated across multiple volumes of different tenants of a storage environment, while maintaining security and data privacy at a volume level.
-
公开(公告)号:US20220171557A1
公开(公告)日:2022-06-02
申请号:US17676342
申请日:2022-02-21
Applicant: NetApp Inc.
Inventor: Srinivasan Narayanamurthy , Dnyaneshwar Nagorao Pawar , Jagadish Vasudeva , Parag Deshmukh , Siddhartha Nandi
Abstract: Techniques are provided for aggregate inline deduplication and volume granularity encryption. For example, data that is exclusive to a volume of a tenant is encrypted using an exclusive encryption key accessible to the tenant. The exclusive encryption key of that tenant is inaccessible to other tenants. Shared data that has been deduplicated and shared between the volume and another volume of a different tenant is encrypted using a shared encryption key of the volume. The shared encryption key is made available to other tenants. In this way, data can be deduplicated across multiple volumes of different tenants of a storage environment, while maintaining security and data privacy at a volume level.
-
公开(公告)号:US11055005B2
公开(公告)日:2021-07-06
申请号:US16254741
申请日:2019-01-23
Applicant: NetApp Inc.
Inventor: Dnyaneshwar Nagorao Pawar , Kartik Rathnakar
IPC: G06F3/06
Abstract: Techniques are provided for background deduplication using trusted fingerprints. Trusted fingerprints of blocks are inserted into a trusted fingerprint store as the blocks are being allocated by a file system sequentially according to block numbers of the blocks. In this way, the trusted fingerprint store is indexed by block numbers of where the blocks are stored. Blocks that are to be deduplicated are identifying by sorting the blocks based upon weak fingerprints, and moving duplicates to a dup file. The dup file is sorted based upon block numbers. Trusted fingerprints are loaded from the trusted fingerprint store for deduplicating the blocks within the dup file.
-
公开(公告)号:US11016943B2
公开(公告)日:2021-05-25
申请号:US16296442
申请日:2019-03-08
Applicant: NetApp Inc.
Inventor: Tijin George , Jagavar Nehra , Roopesh Chuggani , Dnyaneshwar Nagorao Pawar , Atul Ramesh Pandit , Kiyoshi James Komatsu
IPC: G06F16/178 , G06F16/11 , G06F16/16
Abstract: Techniques are provided for managing objects within an object store. An object is maintained within an object store. The object is used to store data of a snapshot of a file system hosted by a remote computing device. A determination is made that the snapshot was deleted by the remote computing device. Bitmaps describing objects within the object store that are related to snapshots of the file system are evaluated to determine that the object is unique to the deleted snapshot. The object is freed from storage within the object store.
-
公开(公告)号:US20200285611A1
公开(公告)日:2020-09-10
申请号:US16296427
申请日:2019-03-08
Applicant: NetApp Inc.
Inventor: Tijin George , Jagavar Nehra , Roopesh Chuggani , Dnyaneshwar Nagorao Pawar , Atul Ramesh Pandit , Kiyoshi James Komatsu
IPC: G06F16/11 , G06F16/907 , G06F16/9035 , G06F16/901 , G06F16/13
Abstract: Techniques are provided for managing objects within an object store. An object is maintained within an object store. In an embodiment, a rule is enforced for the object that in-use slots of the object are non-modifiable and unused slots of the object are modifiable. Metadata of additional information for a slot within the object is attached to the object header. A first application allowed to access user data within the slot is provided access to the user data without being provided access to the metadata. A second application allowed access to the user data and the additional information is provided with access to the user data and the metadata for identifying a location of additional information within the object.
-
-
-
-
-
-
-
-
-