MERGE UPDATES FOR KEY VALUE STORES
    71.
    发明申请

    公开(公告)号:US20190080107A1

    公开(公告)日:2019-03-14

    申请号:US15703706

    申请日:2017-09-13

    Applicant: VMware, Inc.

    Abstract: Embodiments of the present disclosure relate to techniques for performing a merge update for a database. In particular, certain embodiments of a method include generating a message comprising a first key and a first transaction associated with the first key, the first transaction indicating a transaction to perform other than for key-value pairs comprising the first key. The method further includes storing the message in a database. The method further includes merging the message with a first key-value pair stored in the database, the first-key value pair comprising the first key. The method further includes performing the first transaction based on merging the message with the first key-value pair.

    MAINTAING ENCRYPTION KEYS TO PROVIDE ENCRYPTION ON TOP OF DATA DEDUPLICATION
    73.
    发明申请
    MAINTAING ENCRYPTION KEYS TO PROVIDE ENCRYPTION ON TOP OF DATA DEDUPLICATION 有权
    通过加密加密来提供加密数据重写

    公开(公告)号:US20160342814A1

    公开(公告)日:2016-11-24

    申请号:US14716768

    申请日:2015-05-19

    Applicant: VMware, Inc.

    Abstract: Exemplary methods, apparatuses, and systems generate an encryption key based upon data content of a portion of data to be encrypted by the encryption key. The encryption key is stored as one of a plurality of encryption keys within a subset of storage. Each of the plurality of encryption keys is generated based upon corresponding data content. A checksum representing the plurality of encryption keys is calculated. In response to receiving an input/output (I/O) request for data encrypted by the encryption key, a verification checksum representing the plurality of encryption keys is calculated. The requested data is decrypted using the encryption key in response to verifying the checksum and verification checksum match.

    Abstract translation: 示例性方法,装置和系统基于通过加密密钥加密的数据的一部分的数据内容来生成加密密钥。 加密密钥作为存储器子集中的多个加密密钥之一存储。 基于对应的数据内容生成多个加密密钥中的每一个。 计算表示多个加密密钥的校验和。 响应于接收到由加密密钥加密的数据的输入/输出(I / O)请求,计算表示多个加密密钥的验证校验和。 响应于验证校验和和验证校验和匹配,使用加密密钥对所请求的数据进行解密。

    INSPECTION AND REPAIR OF OBJECT METADATA IN VIRTUAL STORAGE AREA NETWORKS

    公开(公告)号:US20240086391A1

    公开(公告)日:2024-03-14

    申请号:US17940853

    申请日:2022-09-08

    Applicant: VMware, Inc.

    CPC classification number: G06F16/2365 G06F9/45558 G06F2009/45583

    Abstract: Systems and methods for inspection and repair of VSAN object metadata. A user-space indirection layer is maintained to map logical addresses of VSAN objects to physical memory addresses of their metadata. Commands may then be sent from the user space to distributed object manager (DOM) clients, with the physical addresses of metadata of objects to be inspected. DOM owners thus may bypass their own indirection layers to retrieve object metadata directly from received user commands. Retrieved information is then used to reconstruct and repair object metadata. Repaired metadata may be written back to the VSAN by transmitting a write request containing the physical address at which the repaired metadata is to be written. DOM owners may be placed in a specified mode in which received I/O instructions are ignored unless they are designated as being for metadata repair purposes, such as by including a physical address.

    ENHANCED LOCKING MECHANISM FOR B+ TREE DATA STRUCTURES

    公开(公告)号:US20230281180A1

    公开(公告)日:2023-09-07

    申请号:US18144797

    申请日:2023-05-08

    Applicant: VMware, Inc.

    CPC classification number: G06F16/2246 G06F16/288 G06F16/24552 G06F16/2343

    Abstract: A method for modifying key-value pairs of a B+ tree is provided. The method receives a request to modify a particular key-value pair. Each node of the tree has a modification number. The method traverses a path on the tree from the root node toward the particular node. The traversing includes upon reaching a parent node of the path, acquiring a shared lock on both the parent node and a child node one level below the parent node. Upon determining that the child node is the particular node, the method stores the modification number of the particular node, releases the shared lock on the particular node, compares a current modification number of the node with its stored number, and acquires an exclusive lock on the node if the numbers are the same. The method increments the current modification number of the node and modifies it while in the exclusive lock.

    EFFICIENT METHOD FOR MANAGING STORAGE SPACE AND SNAPSHOTS

    公开(公告)号:US20230092177A1

    公开(公告)日:2023-03-23

    申请号:US17478397

    申请日:2021-09-17

    Applicant: VMware, Inc.

    Abstract: A method of managing storage space of a storage device containing a plurality of snapshots of a file includes the steps of: recording a first count record that includes a number of data blocks that are owned by a first snapshot; after recording the first count record, recording a second count record that includes a number of data blocks that are both owned by the first snapshot and shared with a second snapshot that is a child snapshot of the first snapshot; and determining an amount of reclaimable space of the first snapshot as the difference between the numbers of data blocks of the first and second count records.

    STORING DATA IN A LOG-STRUCTURED FORMAT IN A TWO-TIER STORAGE SYSTEM

    公开(公告)号:US20230064693A1

    公开(公告)日:2023-03-02

    申请号:US17410673

    申请日:2021-08-24

    Applicant: VMware, Inc.

    Abstract: The disclosure herein describes storing data using a capacity data storage tier and a smaller performance data storage tier. The capacity data storage tier includes capacity data storage hardware configured to store log-structured leaf pages (LLPs), and the performance data storage tier includes performance data storage hardware. A virtual address table (VAT) includes a set of virtual address entries referencing the LLPs. A tree-structured index includes index nodes referencing the set of virtual address entries of the VAT. Data to be stored is received, and at least a first portion of metadata associated with the received data is stored in the LLPs using the VAT, and at least a second portion of metadata associated with the received data is stored in the performance data storage tier. The architecture reduces space usage of the performance data storage tier.

    SITE LOCALITY SUPPORT FOR FILE SERVICES IN A STRETCHED CLUSTER ENVIRONMENT

    公开(公告)号:US20230021195A1

    公开(公告)日:2023-01-19

    申请号:US17467292

    申请日:2021-09-06

    Applicant: VMware, Inc.

    Abstract: The location of resources for file services are located within the same site, thereby eliminating or reducing performance issues caused by cross-site accesses in a stretched cluster environment. A file server placement algorithm initially places file servers at a site based at least in part on host workload and affinity settings, and can perform failover to move the file servers to a different location (e.g., to a different host on the same site or to another site) in the event of a failure of the host where the file servers were initially placed. File servers may be co-located with clients at a location based on client latencies and site workload. Failover support is also provided in the event that the sites in the stretched cluster have different subnet addresses.

    SYSTEM AND METHOD FOR REDUCING READ AMPLIFICATION OF ARCHIVAL STORAGE USING PROACTIVE CONSOLIDATION

    公开(公告)号:US20220197861A1

    公开(公告)日:2022-06-23

    申请号:US17131155

    申请日:2020-12-22

    Applicant: VMware, Inc.

    Abstract: System and method for managing snapshots of storage objects in a storage system use a consolidation operation to reduce read amplification for stored snapshots of a storage object that are stored in log segments in the storage system according to a log-structured file system as storage service objects. The consolidation operation involves identifying target log segments among the log segments that include live blocks that are associated with the latest snapshot of the storage object and determining the number of the live blocks included in each of the target log segments. Based on the number of the live blocks in each of the target log segments, candidate consolidation log segments are determined from the target log segments. The live blocks in the candidate consolidation log segments are then consolidated to new log segments, which are uploaded to the storage system as new storage service objects.

Patent Agency Ranking