IDENTIFYING ANOMALOUS ACTIVITIES IN A CLOUD COMPUTING ENVIRONMENT

    公开(公告)号:US20240007492A1

    公开(公告)日:2024-01-04

    申请号:US18344664

    申请日:2023-06-29

    Applicant: NetApp, Inc.

    CPC classification number: H04L63/1425 H04L41/16

    Abstract: Systems and methods for identifying anomalous activities in a cloud computing environment are provided. According to one embodiment, a customer's infrastructure may be fortified by leveraging deep learning technology (e.g., an encoder-decoder machine-learning (ML) model) to predict events in the cloud environment. During a training phase, the ML model may be trained to make a prediction regarding a next event based on a predetermined or configurable length of a sequence of contextual events. For example, historical events (e.g., cloud application programming interface (API) events logged to a cloud activity trace) observed within the customer's cloud infrastructure over the course of a particular date range may be split into appropriate event/context pairs and fed to the ML model. Subsequently, during a run-time anomaly detection phase, the ML model may be used to predict a next event based on a sequence of immediately preceding events to facilitate identification of anomalous activity.

    Methods and Systems for Resending Missing Network Data Packets

    公开(公告)号:US20240007373A1

    公开(公告)日:2024-01-04

    申请号:US18229116

    申请日:2023-08-01

    Applicant: NETAPP, INC.

    Inventor: Houze Xu Yuepeng Qi

    CPC classification number: H04L43/0829 H04L43/0847 H04L47/365 H04L47/54

    Abstract: Methods and systems for a networked storage environment are provided. One method includes splitting, by a first node, a payload into a plurality of data packets, each data packet having a portion of the payload indicated by an offset value indicating a position of each portion within the payload; transmitting, by the first node, the plurality of data packets to a second node using a network connection for a transaction, each data packet including a header generated by the first node having the offset value and a payload size; receiving, by the first node, a message from the second node indicating an offset value of a missing payload of a missing data packet from among the plurality of data packets; and resending, by the first node, the missing data packet and any other data packet whose offset value occurs after the offset value of the missing payload.

    Universal return to factory image process

    公开(公告)号:US11861340B2

    公开(公告)日:2024-01-02

    申请号:US17243974

    申请日:2021-04-29

    Applicant: NetApp, Inc.

    CPC classification number: G06F8/63 G06F8/65 G06F9/44505

    Abstract: Systems and methods for file system management are provided. According to one embodiment, a non-transitory computer-readable medium comprises instructions that when executed by the processing resource cause the processing resource to implement, in a storage node, a multi-tiered file system comprising a read-only layer that contains a base configuration for the storage node and a read-write layer that contains modifications to the base configuration; and combine the read-only layer and the read-write layer into an overlay file system to be presented to an operating system.

    Block allocation for persistent memory during aggregate transition

    公开(公告)号:US11836363B2

    公开(公告)日:2023-12-05

    申请号:US17750793

    申请日:2022-05-23

    Applicant: NetApp Inc.

    CPC classification number: G06F3/0631 G06F3/0604 G06F3/064 G06F3/065 G06F3/0679

    Abstract: Techniques are provided for block allocation for persistent memory during aggregate transition. In a high availability pair including first and second nodes, the first node makes a determination that control of a first aggregate is to transition from the first node to the second node. A portion of available free storage space is allocated from a first persistent memory of the first node as allocated pages within the first persistent memory. Metadata information for the allocated pages is updated with an identifier of the first aggregate to create updated metadata information reserving the allocated pages for the first aggregate. The updated metadata information is mirrored to the second node, so that the second node also reserves those pages. Control of the first aggregate is transitioned to the second node. As a result, the nodes do not attempt allocating the same free pages to different aggregates during a transition.

    Enabling data integrity checking and faster application recovery in synchronous replicated datasets

    公开(公告)号:US11829607B2

    公开(公告)日:2023-11-28

    申请号:US17548990

    申请日:2021-12-13

    Applicant: NetApp Inc.

    Abstract: One or more techniques and/or computing devices are provided for utilizing snapshots for data integrity validation and/or faster application recovery. For example, a first storage controller, hosting first storage, has a synchronous replication relationship with a second storage controller hosting second storage. A snapshot replication policy rule is defined to specify that a replication label is to be used for snapshot create requests, targeting the first storage, that are to be replicated to the second storage. A snapshot creation policy is created to issue snapshot create requests comprising the replication label. Thus a snapshot of the first storage and a replication snapshot of the second storage are created based upon a snapshot create request comprising the replication label. The snapshot and the replication snapshot may be compared for data integrity validation (e.g., determine whether the snapshots comprise the same data) and/or quickly recovering an application after a disaster.

    On-demand serverless disaster recovery

    公开(公告)号:US11816007B1

    公开(公告)日:2023-11-14

    申请号:US17824120

    申请日:2022-05-25

    Applicant: NetApp Inc.

    CPC classification number: G06F11/2025 G06F11/1469 G06F2201/84

    Abstract: Techniques are provided for on-demand serverless disaster recovery. A primary node may host a primary volume. Snapshots of the primary volume may be backed up to an object store. In response to failure, a secondary node and/or an on-demand volume may be created on-demand. The secondary node may provide clients with failover access to the on-demand volume while a restore process restores a snapshot of the primary volume to the on-demand volume. In some embodiments, there was no secondary node and/or on-demand volume while the primary node was operational. This conserves computing resources that would be wasted by otherwise hosting the secondary node and/or on-demand volume while clients were able to access the primary volume through the primary node. Modifications directed to the on-demand volume are incrementally backed up to the object store for subsequently restoring the primary volume after recovery.

Patent Agency Ranking