-
公开(公告)号:US11144506B2
公开(公告)日:2021-10-12
申请号:US16173298
申请日:2018-10-29
Applicant: EMC IP Holding Company LLC
Inventor: Assaf Natanzon , Amihai Savir , Avitan Gefen
IPC: G06F16/174 , G06N20/00 , G06F16/17 , G06F16/2458
Abstract: Techniques are provided for compression of log data using field types. An exemplary method comprises: obtaining at least one log message, wherein the at least one log message comprises a message template and at least one message variable, wherein the message template comprises at least one field corresponding to the at least one message variable; obtaining a compression index that maps a plurality of message templates to a corresponding message signature; identifying a predefined field type of the at least one field; selecting a compression technique to apply to the at least one message variable based on the predefined field type to obtain a compressed message variable; and writing the compressed message variable and a message signature corresponding to the message template of the at least one log message to a log file. The at least one log message can be a historical log message or part of a real-time stream of log messages.
-
公开(公告)号:US11100130B2
公开(公告)日:2021-08-24
申请号:US16053953
申请日:2018-08-03
Applicant: EMC IP Holding Company LLC
Inventor: Assaf Natanzon , Luay Al-Alem , Antony Bett , Michael Rhodes
Abstract: A containerized environment and application that are configured for component specific continuous replication and granular application level application. A key value store, which stores key values related to configuration data of the containerized application, is replicated continuously to a replicated key value store at a replica site. Persistent volumes may also be replicated to a replica site. The replication can be performed to multiple replica sites in an application specific manner.
-
公开(公告)号:US11099930B2
公开(公告)日:2021-08-24
申请号:US16906482
申请日:2020-06-19
Applicant: EMC IP Holding Company LLC
Inventor: Man Lv , Yong Zou , Assaf Natanzon , Bing Liu
Abstract: One example method includes receiving an IO request that specifies an operation to be performed concerning a data block, determining if a policy exists for a device that made the IO request, when a policy is determined to exist for the device, comparing the IO request to the policy, recording the IO request, and passing the IO request to a disk driver regardless of whether the IO request is determined to violate the policy or not.
-
公开(公告)号:US20210165590A1
公开(公告)日:2021-06-03
申请号:US17172803
申请日:2021-02-10
Applicant: EMC IP Holding Company LLC
Inventor: Assaf Natanzon , David Zlotnick , Boris Shpilyuck
Abstract: One example method includes chunking a respective disk of each of a plurality of virtual machines (VM) to create a respective plurality of chunks associated with each of the VMs, creating, based on the chunking process, a cluster comprising one or more of the VMs, creating a VM template whose data and disk structure match respective data and disk structures of each of the VMs in the cluster, and in response to a file operation involving a first one of the VM disks, defragmenting the first VM disk so that a disk structure of the first VM disk is the same as a disk structure of the VM template.
-
公开(公告)号:US11022469B2
公开(公告)日:2021-06-01
申请号:US16050239
申请日:2018-07-31
Applicant: EMC IP Holding Company LLC
Inventor: Anat Parush Tzur , Oshry Ben-Harush , Amihai Savir , Assaf Natanzon
Abstract: Techniques are provided for correcting sensor data in a multi-sensor environment. An exemplary method comprises obtaining sensor data from a first sensor; applying an anomaly detection technique to detect an anomaly in the sensor data from the first sensor based on additional sensor data from one or more of the first sensor and at least one additional sensor in proximity to the first sensor; and correcting the anomalous sensor data from the first sensor using additional sensor data from one or more of the first sensor and the at least one additional sensor. In some embodiments, additional sensor data from a plurality of neighboring sensors is used to predict the sensor data from the first sensor. The anomalous sensor data is optionally corrected substantially close in time to the detection of the anomaly in the sensor data.
-
公开(公告)号:US11016677B2
公开(公告)日:2021-05-25
申请号:US16367630
申请日:2019-03-28
Applicant: EMC IP Holding Company LLC
Inventor: Saar Cohen , Assaf Natanzon , Kirill Shoikhet
Abstract: An aspect of performing dual splitting functions in a data replication system include receiving an I/O from a host computer. The host computer includes a first splitter configured to perform control path functions. An aspect also includes adding, via the first splitter, metadata for the I/O to a backlog at the host computer, and sending the I/O to a storage array. The storage array includes a second splitter configured to perform data path functions. An aspect further includes receiving, by the storage array, the I/O from the host computer, and sending, via the second splitter, the I/O to at least one storage device of the storage array and to a data protection appliance (DPA). The control path functions include tracking I/Os and maintaining backlogs including the backlog at the host computer, and the data path functions include mirroring operations in the storage array.
-
公开(公告)号:US11010265B2
公开(公告)日:2021-05-18
申请号:US16253005
申请日:2019-01-21
Applicant: EMC IP Holding Company LLC
Inventor: Pengfei Wu , Assaf Natanzon , Kun Wang
Abstract: In a decentralized system of nodes configured to provide data protection functionality, wherein at least a subset of the nodes store and share data using content-addresses managed via a distributed hash table in each of the subset of nodes, a given one of the subset of nodes locally stores: a data protection policy to be implemented by the given node; data protected on the given node; and metadata comprising information indicating placement of a given data set on one or more other ones of the subset of nodes. The given node accesses the locally stored metadata to manage protection of the given data set on the one or more other ones of the subset of nodes.
-
公开(公告)号:US11003538B2
公开(公告)日:2021-05-11
申请号:US16249958
申请日:2019-01-17
Applicant: EMC IP Holding Company LLC
Inventor: Assaf Natanzon , David Zlotnick , Boris Shpilyuck
IPC: G06F9/455 , G06F11/14 , G06F9/4401 , G06F11/30 , G06F11/20
Abstract: Systems and methods for automatically generating a boot sequence. A multiple virtual machine computing environment is analyzed to generate a boot sequence that is used during a recovery operation. The boot sequence may be based on applications and application types running on the virtual machines, a network configuration and network traffic, and on manual boots of virtual machines. The boot sequence prioritizes the order in which the virtual machines are booted in the recovery site.
-
公开(公告)号:US20210109821A1
公开(公告)日:2021-04-15
申请号:US17130903
申请日:2020-12-22
Applicant: EMC IP Holding Company LLC
Inventor: Assaf Natanzon , David Zlotnick , Boris Shpilyuck
Abstract: One example method includes receiving data segments that are not already part of a full disk image of a backup, storing the data segments in storage, determining whether or not an aggregate total of data segments in the storage, that are not already part of a full disk image of a backup, equals or exceeds a threshold, when the aggregate total of data segments in the storage equals or exceeds the threshold, creating a full disk image of a backup that includes the data segments in storage, and storing the created full disk image of the backup to a recovery disk.
-
公开(公告)号:US10936440B2
公开(公告)日:2021-03-02
申请号:US16391156
申请日:2019-04-22
Applicant: EMC IP Holding Company LLC
Inventor: Assaf Natanzon , David Zlotnick , Boris Shpilyuck
Abstract: One example method includes receiving data segments that are not already part of a full disk image of a backup, storing the data segments in storage, determining whether or not an aggregate total of data segments in the storage, that are not already part of a full disk image of a backup, equals or exceeds a threshold, when the aggregate total of data segments in the storage equals or exceeds the threshold, creating a full disk image of a backup that includes the data segments in storage, and storing the created full disk image of the backup to a recovery disk.
-
-
-
-
-
-
-
-
-