Co-located Journaling and Data Storage for Write Requests

    公开(公告)号:US20240061603A1

    公开(公告)日:2024-02-22

    申请号:US18497925

    申请日:2023-10-30

    Applicant: NetApp, Inc.

    Abstract: Methods and systems for co-locating journaling and data storage are provided. Separate journal and volume partitions may be maintained within each logical storage unit (e.g., Logical Unit Number (LUN)) of a distributed storage system. Journaling of metadata associated with write requests received from one or more clients may be distributed by identifying a destination logical storage unit to which data associated with a given write request is to be stored and causing the data and metadata to be persisted to disk by journaling the metadata and the data to respective portions of an active log within the journal partition of the destination logical storage unit. By using the same logical storage unit for both journaling of write requests and writing the data associated with such write requests, the bottleneck due to there being only a single device or storage unit handling all metadata for all write requests can be avoided.

    Malfunctioning system identification mechanism

    公开(公告)号:US11892929B2

    公开(公告)日:2024-02-06

    申请号:US17078804

    申请日:2020-10-23

    Applicant: NetApp, Inc.

    CPC classification number: G06F11/327 G06F11/3034 G06F11/325 G06F11/328

    Abstract: A management system is described. The management system includes an interface coupled to a plurality of infrastructure appliances and one or more processors to monitor each of the plurality of infrastructure appliances, detect a malfunction at a first of the infrastructure appliances, and transmit a display message to one or more of the plurality of infrastructure appliances that are adjacent to the first infrastructure appliance, wherein a display message indicates one or more activity light indicators to be activated at an adjacent infrastructure appliance.

    Quality of service policy sets
    67.
    发明授权

    公开(公告)号:US11886363B2

    公开(公告)日:2024-01-30

    申请号:US17739391

    申请日:2022-05-09

    Applicant: NetApp, Inc.

    Abstract: Disclosed are systems, computer-readable mediums, and methods for managing client performance in a storage system. In one example, the storage system receives a request from a client to write data to the storage system. The storage system estimates, based on a system metric associated with the storage system reflecting usage of the storage system, a requested write QoS parameter for storing the data by the storage system during a first time period. The storage system further determines a target write QoS parameter for the client based on the estimated requested write QoS parameter and an allocated write QoS parameter for the client. Then, the storage system independently regulates read performance and write performance of the client using a controller to adjust the write performance toward the determined target write QoS parameter within the first time period based on feedback regarding the estimated requested write QoS parameter.

    Managing ephemeral storage of a virtual machine to provide victim caches for use by virtual storage appliances in a cloud environment

    公开(公告)号:US11880605B2

    公开(公告)日:2024-01-23

    申请号:US17671775

    申请日:2022-02-15

    Applicant: NetApp, Inc.

    CPC classification number: G06F3/0664 G06F3/064 G06F3/067 G06F3/0613 G06F3/0631

    Abstract: Systems and methods are described for managing ephemeral storage of a virtual machine (VM) to provide victim caches for virtual storage appliances running on the VM. According to one embodiment, a central service may run within the VM and be responsible for managing allocation and reclamation of ephemeral storage space of the VM to/from the virtual storage appliances. Responsive to startup of a new virtual storage appliance on the VM, the new virtual storage appliance may request space from the central service to inform creation of its victim cache. In connection with servicing the request, the central service may take into consideration various factors including one or more of the total aggregate size of multiple local ephemeral drives associated with the VM, remaining available ephemeral storage space, the number of active virtual storage appliances, and the SLO of the virtual storage appliance seeking to establish its victim cache.

    Variable number and size of put operations for storage backup

    公开(公告)号:US11880280B2

    公开(公告)日:2024-01-23

    申请号:US17822629

    申请日:2022-08-26

    Applicant: NetApp, Inc.

    CPC classification number: G06F11/1458 G06F11/1446 G06F16/113

    Abstract: A plurality of data objects is generated from a data stream received for constructing a backup image. A stream size of the data stream is determined. For each multi-threaded put operation used to write a data object of the plurality of data objects to a cloud storage, a maximum number of threads is determined into which the data object can be separated into a number of parts for simultaneous transmission to the cloud storage. A part size of each part is determined. A number of multi-threaded put operations is determined for writing the plurality of data objects to the cloud storage based, at least in part, on the stream size, the maximum number of threads into which the data object can be separated, and the part size. The plurality of data objects is stored into the cloud storage using the number of multi-threaded put operations.

    SYSTEMS AND METHODS FOR DETECTING MALWARE ATTACKS

    公开(公告)号:US20240022597A1

    公开(公告)日:2024-01-18

    申请号:US18477879

    申请日:2023-09-29

    Applicant: NetApp Inc.

    CPC classification number: H04L63/145 H04L63/1416 G06F21/602

    Abstract: A method, a computing device, and a non-transitory machine-readable medium for detecting malware attacks. In one example, an agent implemented in an operating system detects an overwrite in which an original data component is overwritten with a new data component. The agent computes a plurality of features associated with the overwrite, the plurality of features including an original entropy corresponding to the original data component, a new entropy corresponding to the new data component, an overwrite fraction, and a set of divergence features. The agent determines whether the new data component is encrypted using the plurality of features.

Patent Agency Ranking