-
公开(公告)号:US20240303162A1
公开(公告)日:2024-09-12
申请号:US18120235
申请日:2023-03-10
Applicant: Cohesity, Inc.
Inventor: Debasish Garai , Amandeep Gautam , Apurv Gupta , Jagavar Nehra , Emalayan Vairavanathan
IPC: G06F11/14
CPC classification number: G06F11/1451 , G06F11/1435 , G06F11/1464
Abstract: Data associated with an object to be stored is received from a source system for a destination logical storage container selected among a plurality of destination logical storage containers. A total number of the destination logical storage containers allowed to be concurrently supported by the source system is limited. The selected destination logical storage container is shared by a plurality of objects of the source system. Based at least in part on an identifier associated with the object, a child logical storage container corresponding to the object is identified. The child logical storage container is different from the selected destination logical storage container. The data associated with the object received for the selected destination logical storage container is automatically stored in the identified child logical storage container.
-
公开(公告)号:US20230030246A1
公开(公告)日:2023-02-02
申请号:US17386076
申请日:2021-07-27
Applicant: Cohesity, Inc.
Inventor: Abhijit Chakankar , Pramesh Gupta , Vipin Vishvkarma , Apurv Gupta
IPC: G06F21/55 , G06F16/242 , G06F16/245
Abstract: Events from one or more primary systems associated with one or more tenants are received. The received events are stored in a message queue. At least a portion of the events in the message queue are ingested for organization and storage in a data store. One or more progress identifiers associated with ingesting of the events in the message queue are tracked. An event query is received from an external system. The event query is rewritten into a first component query for the data store and a second component query for the message queue based at least in part on a progress identifier. A result of the first component query and a result of the second component query are combined to determine a result of the event query.
-
公开(公告)号:US10650146B1
公开(公告)日:2020-05-12
申请号:US16372230
申请日:2019-04-01
Applicant: Cohesity, Inc.
Inventor: Prashant Gaurav , Sidharth Mishra , Karandeep Singh Chawla , Anubhav Gupta , Sudhir Srinivas , Nagapramod Mandagere , Apurv Gupta
Abstract: An amount of data change associated with a version of a content file with respect to one or more previous versions of the content file is determined. The amount of change associated with the version of the content file is determined using a tree data structure associated with the content file that is stored on a storage cluster. One or more statistics associated with backup snapshot are provided to a server. The server is configured to determine that the amount of data change associated with the version of the content file is anomalous based in part on the one or more statistics associated with the backup snapshot. A notification that data associated with the backup snapshot is potentially infected by malicious software is received from the server. The version of the content file is indicated as being potentially infected by malicious software.
-
公开(公告)号:US09971821B1
公开(公告)日:2018-05-15
申请号:US14624357
申请日:2015-02-17
Applicant: COHESITY, INC.
Inventor: Apurv Gupta , Vipin Gupta , Johnny Chen , Sunil Moolchandani , Murali Vajapeyam
CPC classification number: G06F17/30575 , G06F9/54
Abstract: Techniques presented herein disclose techniques for evaluating application-level data in a storage system for search and analysis. A backup analysis tool retrieves a backup object stored in the storage system. The backup analysis tool reconstructs an application object from the backup object. The backup analysis tool accesses the first application object according to a native application format associated with the first object.
-
5.
公开(公告)号:US20230350763A1
公开(公告)日:2023-11-02
申请号:US17731056
申请日:2022-04-27
Applicant: Cohesity, Inc.
Inventor: Apurv Gupta , Mandar Suresh Naik , Zhihuan Qiu , Gurunarayanan Nagasubramanian , Anirban Mitra
IPC: G06F11/14 , G06F16/215
CPC classification number: G06F11/1453 , G06F16/215 , G06F2201/84
Abstract: Range information associated with one or more objects is received from a storage system. One or more missing ranges and/or one or more mismatched ranges associated with the one or more objects is determined based on the received range information. A plurality of data chunk identifiers associated with a plurality of variable-length data chunks included in the one or more determined ranges associated with the one or more objects is provided to the storage system. A response that is used to identify among the plurality of variable-length data chunks, one or more variable-length data chunks not already stored in a storage associated with the storage system is received from the storage system. Content of the identified one or more variable-length data chunks is provided to the storage system.
-
公开(公告)号:US11556501B2
公开(公告)日:2023-01-17
申请号:US16818547
申请日:2020-03-13
Applicant: Cohesity, Inc.
Inventor: Prashant Pogde , Apurv Gupta , Zheng Cai , Sureshbabu Murugesan , Markose Thomas
Abstract: A file directory tree structure of a selected storage snapshot is dynamically divided into different portions. A plurality of the different file directory tree structure portions are analyzed in parallel to identify any changes of the selected storage snapshot from a previous storage snapshot. To analyze each of the plurality of the different file directory tree structure portions, a processor is further configured to traverse and compare a corresponding file directory tree structure portion of the selected storage snapshot with a corresponding portion of a file directory tree structure of the previous storage snapshot while at least another one of the plurality of the different file directory tree structure portions of the selected storage snapshot is being analyzed in parallel.
-
公开(公告)号:US20220318095A1
公开(公告)日:2022-10-06
申请号:US17218619
申请日:2021-03-31
Applicant: Cohesity, Inc.
Inventor: Amandeep Gautam , Anand Arun , Debasish Garai , Rupesh Bajaj , Himanshu Mehra , Vairavanathan Emalayan , Apurv Gupta
Abstract: An identification of a new primary snapshot created for a primary storage system is received. A threshold time window based on a capture time associated with the new primary snapshot is determined. Entries of a storage log of the primary storage system occurring within the threshold time window are analyzed to identify any objects of the primary storage system that have changed during the threshold time window. Changed objects to capture in a new secondary backup stored at a secondary storage system and corresponding to the new primary snapshot are identified. Metadata of the new primary snapshot and metadata of a previous secondary backup are compared to determine for each of the objects of the primary storage system identified as having changed during the threshold time window whether a change to an object since the previous secondary backup is captured in the new primary snapshot.
-
公开(公告)号:US10943011B2
公开(公告)日:2021-03-09
申请号:US16832503
申请日:2020-03-27
Applicant: Cohesity, Inc.
Inventor: Prashant Gaurav , Sidharth Mishra , Karandeep Singh Chawla , Anubhav Gupta , Sudhir Srinivas , Apurv Gupta , Nagapramod Mandagere
Abstract: An amount of data change associated with a version of a content file with respect to one or more previous versions of the content file is determined. The amount of change associated with the version of the content file is determined using a tree data structure associated with the content file that is stored on a storage cluster. One or more statistics associated with backup snapshot are provided to a server. The server is configured to determine that the amount of data change associated with the version of the content file is anomalous based in part on the one or more statistics associated with the backup snapshot. A notification that data associated with the backup snapshot is potentially infected by malicious software is received from the server. The version of the content file is indicated as being potentially infected by malicious software.
-
公开(公告)号:US10747778B2
公开(公告)日:2020-08-18
申请号:US15664738
申请日:2017-07-31
Applicant: Cohesity, Inc.
Inventor: Anirvan Duttagupta , Apurv Gupta , Dinesh Pathak
IPC: G06F16/27 , G06F16/22 , G06F16/18 , G06F16/174
Abstract: A data identifier for each data portion of a first group of different data portions of a first version of data is determined. The first version of the data is represented in a tree structure that references the determined data identifiers. A second version of the data is represented in a second tree structure using at least a portion of elements of the first tree structure of the first version. The second tree structure references one or more data identifiers of a portion of the second version of the data that is different from the first version of the data. The one or more data identifiers of the portion of the second version of the data that is different from the first version of the data are identified and sent. A response indicating which of the data portions corresponding to the sent one or more data identifiers are requested to be provided for replication is received.
-
10.
公开(公告)号:US20190303350A1
公开(公告)日:2019-10-03
申请号:US16411690
申请日:2019-05-14
Applicant: Cohesity, Inc.
Inventor: Apurv Gupta
IPC: G06F16/11
Abstract: Embodiments presented herein disclose techniques for capturing a snapshot of a file system object (e.g., a file or a directory) that is associated with a write journal having outstanding data. A bridge process in a storage server receives a request to capture a snapshot of a file system object. The snapshot is a backup of a state of the file system object in a given point in time. Upon determining that the file system object has one or more outstanding updates recorded in a write journal, the bridge process generates a copy of the write journal. The bridge process captures the snapshot of the file system object. The bridge process also associates the copy of the write journal with the snapshot of the file system object.
-
-
-
-
-
-
-
-
-