TRAFFIC ROUTING IN BACKUP AND RECOVERY OF NON-ADDRESSABLE HOSTS

    公开(公告)号:US20240305561A1

    公开(公告)日:2024-09-12

    申请号:US18119242

    申请日:2023-03-08

    Applicant: Rubrik, Inc.

    CPC classification number: H04L45/42 H04L45/741 H04L63/166

    Abstract: Methods, systems, and devices for data management are described. A data management system (DMS) may provide backup and recovery services to one or more non-addressable hosts within a network. The DMS may receive a packet from a host within the network. A source internet protocol (IP) address of the packet, when received at the DMS, may be an IP address associated with the network. The packet may also include an identifier associated with the host. The DMS may include one or more storage entities used to back up the one or more hosts. To route the packet to a storage entity used to back up the host, the DMS may set the source IP address of the received packet to be a virtual IP address associated with the host based on the identifier and use the virtual IP address to route the packet to the storage entity.

    IDENTIFIER MAPPING TECHNIQUES FOR CROSS NODE CONSISTENCY

    公开(公告)号:US20240311451A1

    公开(公告)日:2024-09-19

    申请号:US18121510

    申请日:2023-03-14

    Applicant: Rubrik, Inc.

    CPC classification number: G06F21/31 G06F16/182

    Abstract: Methods, systems, and devices for data management are described. A server hosted by a storage node within a cluster of a data management system (DMS) may receive a request to access a file stored in a distributed file system. The request may be associated with a security identifier (SID). The server may transmit an indication of the SID to a shared repository accessible to the cluster. Accordingly, the server may receive an indication of a mapping between the SID and one or both of a user identifier (UID) or a group identifier (GID) associated with the SID. The server may transmit an indication of the file and the UID/GID to the distributed file system, which may compare the UID/GID to a list of authorized identifiers for the file. If the UID/GID is on the list of authorized identifiers, the distributed file system may execute the request accordingly.

Patent Agency Ranking