ROLLBACK FROM A RETENTION LOCKED NAMESPACE
    2.
    发明公开

    公开(公告)号:US20240256393A1

    公开(公告)日:2024-08-01

    申请号:US18162381

    申请日:2023-01-31

    摘要: One example method includes accessing a point-in-time copy including retention locked backups that were stored on a backup storage server at a time the point-in-time copy was generated. The method further includes accessing a current namespace including retention locked backups that are currently stored on the backup storage server. Each retention locked backup includes data backup files. The method also includes determining a first set of retention locked backups that are included in the point-in-time copy, but are not included in the current namespace. The method finally includes copying the first set of retention locked backups from the point-in-time copy into the current namespace without removing any of the retention locked backups already in the current namespace.

    Communicating context for messages between users in copy management systems

    公开(公告)号:US11829708B1

    公开(公告)日:2023-11-28

    申请号:US18309363

    申请日:2023-04-28

    IPC分类号: G06F40/134 G06F16/11

    CPC分类号: G06F40/134 G06F16/128

    摘要: A system creates a snapshot of a part of copy management content which is displayed by a user interface, and which is selected by a user of the system as context for a subsequent message from the user. The system creates a hyperlink in the message to the snapshot which depicts the part of the copy management content. The system stores user entries for a tag that identifies at least one intended recipient of the message, a time when the message is made available for the intended recipient(s), and text for the message. The system sends the message at the time to the intended recipient(s) via an internal communication channel of the system. In response to the recipient of the message selecting the message's hyperlink to the snapshot, the system outputs the context for the message to the recipient's user interface, which enables the recipient to respond to the message.

    AUDITING CONTEXTUAL MESSAGES BETWEEN USERS IN COPY MANAGEMENT SYSTEMS

    公开(公告)号:US20240362141A1

    公开(公告)日:2024-10-31

    申请号:US18495135

    申请日:2023-10-26

    IPC分类号: G06F11/32 G06F11/14

    CPC分类号: G06F11/327 G06F11/1458

    摘要: System audits messages, communicated internally in copy management system, about copy management jobs, and learns about relationships between message requests for user actions on copy management jobs and subsequent failures of copy management jobs. System creates snapshot of copy management content displayed by user interface and selected by user as context for user's message, and creates message's link to snapshot. System stores user entries that identify message's intended recipient(s), time of availability, and text. If message requests user action on copy management job, and relationship between unanswered requests for user to perform action on copy management job and subsequent failures of copy management job satisfies relationship threshold, then machine learning system sends message via copy management system's internal communication channel to system-selected administrator, who selects message's hyperlink to snapshot. System responds by outputting context for message to system-selected administrator's user interface, which enables system-selected administrator to respond to message.

    Data replication using an extended file replication protocol

    公开(公告)号:US12117907B2

    公开(公告)日:2024-10-15

    申请号:US17733550

    申请日:2022-04-29

    IPC分类号: G06F16/182 G06F11/14

    摘要: Methods of cloning data backup across namespaces are disclosed. In response to receiving a file replication request, one or more source files are cloned from a first namespace to a second namespace, as one or more destination files. A first attribute indicating that the source file(s) have been cloned to the second namespace as the destination file(s) is created. A source synthetic file is cloned from the first namespace to the second namespace, as a destination synthetic file, where synthetic information of the destination synthetic file points to the source file(s) as one or more base file. A second attribute indicating that the source synthetic file has been cloned to the second namespace as the destination synthetic file is created. Based on the first and second attributes, the synthetic information of the destination synthetic file is updated or propagated to use the destination file(s) as one or more base files on the second namespace.

    Creating file recipes for copy overwrite workloads in deduplication file systems

    公开(公告)号:US12105594B2

    公开(公告)日:2024-10-01

    申请号:US17841960

    申请日:2022-06-16

    IPC分类号: G06F11/14 G06F16/14

    摘要: Embodiments for processing fastcopy overwrite backup workloads (FCOW) as virtual synthetic backups, by detecting whether or not a backup workload comprises an FCOW workload in which a base file is fastcopied to a target file, wherein portions of the base file are overwritten through overwrites by new data in the target file by a deduplication backup process. For FCOW workloads, the process creates a file recipe by trapping seek offsets and write byte lengths for the overwrites, and writing extent information comprising offset differences to a recipe table of the file recipe, and the file recipe facilitates file processing optimizations including differencing, replication, and tiering.

    Method and system for detecting compression ratio anomalies in data streams in a deduplication storage system

    公开(公告)号:US12001410B2

    公开(公告)日:2024-06-04

    申请号:US17684751

    申请日:2022-03-02

    IPC分类号: G06F16/215

    CPC分类号: G06F16/215

    摘要: This disclosure provides system, methods, and media for identifying inadvertent compression or encryption in data streams from a client that land on a deduplication storage system. When one or more such abnormalities are detected, an alert message is generated to alert the administrator of the deduplication storage system so that corrective actions can be taken to prevent undesired consequences. According to an exemplary method, machine learning techniques are used to plot and smoothen global compression ratios and local compression ratios of historical backups from a client over a period of time. Then, a second derivative of each data point on the smoothened curves is taken and compared with a predetermined threshold to detect whether that the slope of the data point exceeds a threshold. A data point whose slope exceeds the threshold can be determined to be a data point corresponding to a backup that includes compression and/encryption.