-
公开(公告)号:US12038947B2
公开(公告)日:2024-07-16
申请号:US17492796
申请日:2021-10-04
发明人: Philip Shilane , George Mathew , Abhinav Duggal
IPC分类号: G06F16/27 , G06F16/215
CPC分类号: G06F16/273 , G06F16/215
摘要: An access object service receives a communication of a stream of fingerprints, corresponding to segments of a file, from a source of the file, and identifies sequential fingerprints in the stream of fingerprints as a group of fingerprints. The access object service identifies a similarity group identifier for the group of fingerprints. The access object service communicates the group of fingerprints to a deduplication service associated with a range of similarity group identifiers that include the similarity group identifier. The deduplication service identifies fingerprints in the group of fingerprints which are missing from fingerprint storage. The deduplication service communicates the identified fingerprints to the access object service, which communicates a request for segments of the file, corresponding to the identified fingerprints, to the source of the file. The deduplication service receives a communication of the requested segments from the source of the file and stores the requested segments.
-
公开(公告)号:US11893422B2
公开(公告)日:2024-02-06
申请号:US17215586
申请日:2021-03-29
发明人: Philip Shilane , Abhinav Duggal , George Mathew
IPC分类号: G06F9/50 , G06F16/174 , H04L67/1023 , G06F16/16 , G06F16/13
CPC分类号: G06F9/505 , G06F16/134 , G06F16/162 , G06F16/1748 , H04L67/1023
摘要: A deduplicated file system includes a set of microservices including front-ends and back-ends. Assignments of files are balanced across front-ends. The files are represented by segment trees including multiple segment levels. Assignments of similarity groups are balanced across back-ends. Similarity groups are associated with segments at a lower-level of the segment trees that form the files. Front-ends are responsible for operations involving an upper-level of the trees. Back-ends are responsible for operations involving the lower-level of the trees. A mapping of file assignments to front-ends and of similarity group assignments to back-ends is stored. A request to perform a file system operation is received. The mapping is consulted to identify particular front and back-ends that should be responsible for handling and processing the request.
-
公开(公告)号:US11811917B2
公开(公告)日:2023-11-07
申请号:US17368093
申请日:2021-07-06
CPC分类号: H04L9/0825 , H04L9/3213 , H04L9/3263
摘要: Embodiments for a system and method for secure authentication of backup clients in a way that eliminates the need to create users for backup client authentication anywhere in the backup ecosystem, and which eliminates the need for credentials, such as passwords that need protection, updating and synchronization. Such embodiments use a short-term token, such as a JSON web token, for both client and server authentication within the system, and verifies that the tokens grant access using the public key corresponding to the private key assigned to the directory objects by the creator of the directory objects.
-
公开(公告)号:US11593218B1
公开(公告)日:2023-02-28
申请号:US17492866
申请日:2021-10-04
发明人: George Mathew , Philip Shilane , Abhinav Duggal
IPC分类号: G06F16/14 , G06F11/14 , G06F16/174
摘要: Object service receives request to copy file to destination and identifies group identifier for fingerprints group corresponding to sequential segments in file. Object service communicates request for fingerprints group to deduplication service associated with group identifier range including group identifier. Deduplication service communicates fingerprints group, retrieved from fingerprint storage, to object service, which communicates fingerprints group and group identifier to destination. Object service communicates request for file segments, corresponding to fingerprints missing in destination, communicated from destination, to deduplication service, which communicates requested segments, retrieved from source storage, to object service, which communicates requested segments to destination. System identifies generation identifier associated with time of communicating by object service or deduplication service, and generation identifier associated with another time of communicating by object service or deduplication service. If generation identifier associated with time differs from generation identifier associated with other time, object service or deduplication service restarts communication.
-
公开(公告)号:US20230018820A1
公开(公告)日:2023-01-19
申请号:US17377859
申请日:2021-07-16
发明人: Anand Rudrabhatla , George Mathew
摘要: A security level tagging process to enable a user to associate a security level descriptor with a file, or a namespace directory where files and subdirectories inherit the security level descriptor from a parent directory. A parser can be used to automatically set a security level descriptor based on the contents of the file and/or attributes of files, or an administrator can associate a security level to a storage tier in the file system so that files are placed on the storage tiers with the matching security level as the file security level descriptor. The placement of the file on a storage tier depends on the data security level descriptor of the file and the security level of the storage so that files are placed on tiers where security level associated with the tier is greater than or equal to data security level of the file. Files can be migrated among storage tiers as their security levels may change.
-
公开(公告)号:US20210357293A1
公开(公告)日:2021-11-18
申请号:US16875155
申请日:2020-05-15
发明人: George Mathew , Xiaohong Wang , Abhishek Rajimwale
IPC分类号: G06F11/14 , G06F16/215
摘要: An intelligent method of handling incremental backups concurrent with load balancing movement. The file system uses placement tags, incremental backup requests and capacity balancing data movement to make intelligent decision to avoid affecting any backup windows for clients or backup apps. The file system tracks capacity balancing file movements inside the cluster. When switching locations of files in a cluster from one node to another, it is performed as an atomic change of switching inode attributes by the file system after the contents of the file have been copied over to the new node. During the file movement for capacity balancing, the file system handles requests for full backups differently than requests for incremental backups. The file system continues to handle virtual systhesis and fastcopy requests on the node that hosts the previous backup to ensure that the incremental backup succeeds with the expected smaller backup window from the client.
-
公开(公告)号:US10599618B2
公开(公告)日:2020-03-24
申请号:US16264365
申请日:2019-01-31
发明人: Murthy Mamidi , George Mathew , Pengju Shang
IPC分类号: G06F12/08 , G06F16/172 , G06F12/0866 , G06F16/16 , G06F16/182 , G06F12/0888
摘要: In one example, a method includes receiving metadata in the form of a modification to metadata represented by a file system namespace abstraction, and the file system namespace abstraction corresponds to less than the entire file system namespace. Next, the file system namespace abstraction is updated based on the received metadata. Next, a determination is made whether or not caching is enabled for the file system namespace abstraction. If caching is enabled for the file system namespace abstraction, the updated file system namespace abstraction is cached in SSD storage.
-
公开(公告)号:US20190037045A1
公开(公告)日:2019-01-31
申请号:US16146519
申请日:2018-09-28
CPC分类号: H04L67/2852 , G06F3/0604 , G06F3/0646 , G06F3/067 , G06F16/128 , H04L67/1095 , H04L67/1097 , H04L67/2857
摘要: A data management device includes a buffer and a processor. The processor may select an unprocessed full key and generate a buffer entry based on a difference between an entry of a local snapshot specified by the unprocessed full key and an entry of a previous local snapshot specified by the unprocessed full key. The processor may make a first determination that a lookup key entry associated with the unprocessed full key is different than a lookup key entry associated with a processed full key. The process may add the generated buffer entry to the buffer after processing the buffer in response to the first determination.
-
公开(公告)号:US12072992B2
公开(公告)日:2024-08-27
申请号:US17377859
申请日:2021-07-16
发明人: Anand Rudrabhatla , George Mathew
CPC分类号: G06F21/6209 , G06F12/1491 , G06F2212/1052 , G06F2221/2145
摘要: A security level tagging process to enable a user to associate a security level descriptor with a file, or a namespace directory where files and subdirectories inherit the security level descriptor from a parent directory. A parser can be used to automatically set a security level descriptor based on the contents of the file and/or attributes of files, or an administrator can associate a security level to a storage tier in the file system so that files are placed on the storage tiers with the matching security level as the file security level descriptor. The placement of the file on a storage tier depends on the data security level descriptor of the file and the security level of the storage so that files are placed on tiers where security level associated with the tier is greater than or equal to data security level of the file. Files can be migrated among storage tiers as their security levels may change.
-
公开(公告)号:US11797397B2
公开(公告)日:2023-10-24
申请号:US17513352
申请日:2021-10-28
发明人: Pengju Shang , George Mathew , Dhawal Bhagwat , Pranay Singh , Englin Koay
CPC分类号: G06F11/1471 , G06F3/065 , G06F3/0619 , G06F3/0679 , G06F11/1456 , G06F16/1805 , G06F16/1815 , G06F2201/84
摘要: In one example, a method for writing data includes receiving a write request and performing a first type of logging process in connection with the write request, and creating a corresponding first logging record. Additionally, a second type of logging process is performed in connection with the write request, and a corresponding second logging record created, where the second type of logging process is different from the first type of logging process. Next, a determination is made, as between the two logging records, which of the logging records requires the least amount of non-volatile random access memory (NVRAM), and the logging record that requires the least amount of NVRAM is written to the NVRAM.
-
-
-
-
-
-
-
-
-