PERFORMING A BACKUP OF AN OBJECT BASED ON AN IDENTIFIER ASSOCIATED WITH THE OBJECT

    公开(公告)号:US20240303162A1

    公开(公告)日:2024-09-12

    申请号:US18120235

    申请日:2023-03-10

    Applicant: Cohesity, Inc.

    CPC classification number: G06F11/1451 G06F11/1435 G06F11/1464

    Abstract: Data associated with an object to be stored is received from a source system for a destination logical storage container selected among a plurality of destination logical storage containers. A total number of the destination logical storage containers allowed to be concurrently supported by the source system is limited. The selected destination logical storage container is shared by a plurality of objects of the source system. Based at least in part on an identifier associated with the object, a child logical storage container corresponding to the object is identified. The child logical storage container is different from the selected destination logical storage container. The data associated with the object received for the selected destination logical storage container is automatically stored in the identified child logical storage container.

    UTILIZING PROGRESS IDENTIFIERS TO REWRITE AN EVENT QUERY

    公开(公告)号:US20230030246A1

    公开(公告)日:2023-02-02

    申请号:US17386076

    申请日:2021-07-27

    Applicant: Cohesity, Inc.

    Abstract: Events from one or more primary systems associated with one or more tenants are received. The received events are stored in a message queue. At least a portion of the events in the message queue are ingested for organization and storage in a data store. One or more progress identifiers associated with ingesting of the events in the message queue are tracked. An event query is received from an external system. The event query is rewritten into a first component query for the data store and a second component query for the message queue based at least in part on a progress identifier. A result of the first component query and a result of the second component query are combined to determine a result of the event query.

    Malicious software detection
    3.
    发明授权

    公开(公告)号:US10650146B1

    公开(公告)日:2020-05-12

    申请号:US16372230

    申请日:2019-04-01

    Applicant: Cohesity, Inc.

    Abstract: An amount of data change associated with a version of a content file with respect to one or more previous versions of the content file is determined. The amount of change associated with the version of the content file is determined using a tree data structure associated with the content file that is stored on a storage cluster. One or more statistics associated with backup snapshot are provided to a server. The server is configured to determine that the amount of data change associated with the version of the content file is anomalous based in part on the one or more statistics associated with the backup snapshot. A notification that data associated with the backup snapshot is potentially infected by malicious software is received from the server. The version of the content file is indicated as being potentially infected by malicious software.

    Determining differences between two versions of a file directory tree structure

    公开(公告)号:US11556501B2

    公开(公告)日:2023-01-17

    申请号:US16818547

    申请日:2020-03-13

    Applicant: Cohesity, Inc.

    Abstract: A file directory tree structure of a selected storage snapshot is dynamically divided into different portions. A plurality of the different file directory tree structure portions are analyzed in parallel to identify any changes of the selected storage snapshot from a previous storage snapshot. To analyze each of the plurality of the different file directory tree structure portions, a processor is further configured to traverse and compare a corresponding file directory tree structure portion of the selected storage snapshot with a corresponding portion of a file directory tree structure of the previous storage snapshot while at least another one of the plurality of the different file directory tree structure portions of the selected storage snapshot is being analyzed in parallel.

    USING A STORAGE LOG TO GENERATE AN INCREMENTAL BACKUP

    公开(公告)号:US20220318095A1

    公开(公告)日:2022-10-06

    申请号:US17218619

    申请日:2021-03-31

    Applicant: Cohesity, Inc.

    Abstract: An identification of a new primary snapshot created for a primary storage system is received. A threshold time window based on a capture time associated with the new primary snapshot is determined. Entries of a storage log of the primary storage system occurring within the threshold time window are analyzed to identify any objects of the primary storage system that have changed during the threshold time window. Changed objects to capture in a new secondary backup stored at a secondary storage system and corresponding to the new primary snapshot are identified. Metadata of the new primary snapshot and metadata of a previous secondary backup are compared to determine for each of the objects of the primary storage system identified as having changed during the threshold time window whether a change to an object since the previous secondary backup is captured in the new primary snapshot.

    Malicious software detection
    8.
    发明授权

    公开(公告)号:US10943011B2

    公开(公告)日:2021-03-09

    申请号:US16832503

    申请日:2020-03-27

    Applicant: Cohesity, Inc.

    Abstract: An amount of data change associated with a version of a content file with respect to one or more previous versions of the content file is determined. The amount of change associated with the version of the content file is determined using a tree data structure associated with the content file that is stored on a storage cluster. One or more statistics associated with backup snapshot are provided to a server. The server is configured to determine that the amount of data change associated with the version of the content file is anomalous based in part on the one or more statistics associated with the backup snapshot. A notification that data associated with the backup snapshot is potentially infected by malicious software is received from the server. The version of the content file is indicated as being potentially infected by malicious software.

    Replication of data using chunk identifiers

    公开(公告)号:US10747778B2

    公开(公告)日:2020-08-18

    申请号:US15664738

    申请日:2017-07-31

    Applicant: Cohesity, Inc.

    Abstract: A data identifier for each data portion of a first group of different data portions of a first version of data is determined. The first version of the data is represented in a tree structure that references the determined data identifiers. A second version of the data is represented in a second tree structure using at least a portion of elements of the first tree structure of the first version. The second tree structure references one or more data identifiers of a portion of the second version of the data that is different from the first version of the data. The one or more data identifiers of the portion of the second version of the data that is different from the first version of the data are identified and sent. A response indicating which of the data portions corresponding to the sent one or more data identifiers are requested to be provided for replication is received.

    DISTRIBUTED WRITE JOURNALS THAT SUPPORT FAST SNAPSHOTTING FOR A DISTRIBUTED FILE SYSTEM

    公开(公告)号:US20190303350A1

    公开(公告)日:2019-10-03

    申请号:US16411690

    申请日:2019-05-14

    Applicant: Cohesity, Inc.

    Inventor: Apurv Gupta

    Abstract: Embodiments presented herein disclose techniques for capturing a snapshot of a file system object (e.g., a file or a directory) that is associated with a write journal having outstanding data. A bridge process in a storage server receives a request to capture a snapshot of a file system object. The snapshot is a backup of a state of the file system object in a given point in time. Upon determining that the file system object has one or more outstanding updates recorded in a write journal, the bridge process generates a copy of the write journal. The bridge process captures the snapshot of the file system object. The bridge process also associates the copy of the write journal with the snapshot of the file system object.

Patent Agency Ranking