-
公开(公告)号:US20220121365A1
公开(公告)日:2022-04-21
申请号:US17072904
申请日:2020-10-16
Applicant: VMware, Inc.
Inventor: Wenguang WANG , Vamsidhar GUNTURU , Junlong GAO , Ilya LANGUEV , Petr VANDROVEC , Maxime AUSTRUY , Ilia SOKOLINSKI , Satish PUDI
Abstract: Techniques for the increased efficiency of storing data objects storage in the object storage of a software designed data center (SDDC) are provided. The techniques include the efficient storage of data, while enabling snapshots of each updating of the data. The snapshots of the data may be efficiently recovered via the techniques. Difference-level mappings for each snapshot are encoded in compact self-balancing data trees included in the object's metadata. The metadata mappings include mappings between various address spaces employed by the SDDC, as well as the address spaces employed by data stores that store the data on physical medium. Because the metadata is efficiently structured, the metadata for an object may be cached for quick lookups during data access and/or snapshot recovery. The techniques also provide low-latency recovery and/or system rollback in the event of any failure in the SDDC.
-
公开(公告)号:US20220164125A1
公开(公告)日:2022-05-26
申请号:US17100663
申请日:2020-11-20
Applicant: VMware, Inc.
Inventor: Wenguang WANG , Petr VANDROVEC , Hardik Singh NEGI , Junlong GAO , Vamsi GUNTURU
IPC: G06F3/06
Abstract: A method for cleaning an object storage having a plurality of segments is provided. Each segment includes an identifier through which the segment is accessed. The method identifies a first segment in the plurality of segments. The first segment includes a first identifier and a first size. The method determines that a utilization ratio for the first segment is below a threshold. As a result, the method generates a second segment from the first segment, such that the second segment includes a second identifier that is the same as the first identifier and a second size that is smaller than the first size. The method then writes the second segment to the object storage.
-
3.
公开(公告)号:US20220198021A1
公开(公告)日:2022-06-23
申请号:US17127696
申请日:2020-12-18
Applicant: VMware, Inc.
Inventor: Samyuktha SUBRAMANIAN , Jesse POOL , Petr VANDROVEC , Viswesh NARAYANAN
Abstract: A method for protecting an OS disk of a computing device without block encrypting the OS disk. The method identifies one or more files that store configuration data associated with OS binaries executed on the computing device. The method encrypts the configuration data stored in the one or more files using an encryption key and seals the encryption key to a TPM of the computing device. The method then boots the computing device by attempting to unseal the encryption key by authenticating one or more of the OS binaries with the TPM. When authenticating the one or more of the OS binaries is successful, the method completes boot of the computing device by decrypting the configuration data using the encryption key. If authentication of the one or more of the OS binaries is not successful, however, the method aborts boot of the computing device.
-
公开(公告)号:US20220121532A1
公开(公告)日:2022-04-21
申请号:US17072961
申请日:2020-10-16
Applicant: VMware, Inc.
Inventor: Petr VANDROVEC , Wenguang WANG , Vamsidhar GUNTURU , Junlong GAO , Ilia SOKOLINSKI , Maxime AUSTRUY
IPC: G06F11/14
Abstract: Techniques for the increased efficiency of storing data objects storage in the object storage of a software designed data center (SDDC) are provided. The techniques include the efficient storage of data, while enabling snapshots of each updating of the data. The snapshots of the data may be efficiently recovered via the techniques. Difference-level mappings for each snapshot are encoded in compact self-balancing data trees included in the object's metadata. The metadata mappings include mappings between various address spaces employed by the SDDC, as well as the address spaces employed by data stores that store the data on physical medium. Because the metadata is efficiently structured, the metadata for an object may be cached for quick lookups during data access and/or snapshot recovery. The techniques also provide low-latency recovery and/or system rollback in the event of any failure in the SDDC, including when the failure occurs while uploading a snapshot.
-
-
-