-
公开(公告)号:US20230409597A1
公开(公告)日:2023-12-21
申请号:US18181414
申请日:2023-03-09
发明人: Satish Kumar Kashi Visvanathan , Vikram Singh Bisht , Viggnesh Venugopal , Ravi Lingappa Shamanna
IPC分类号: G06F16/27
CPC分类号: G06F16/27
摘要: Techniques are described for partitioning B-tree keys of file systems into key ranges for parallel processing in delta generation during file storage replications between file systems in different cloud infrastructure regions. In certain embodiments, a delta generation processing for cross-region replication may utilize a key-range splitting mechanism involving a recursive algorithm that partitions B-tree keys of a source file system into roughly equal-size key ranges. All the partitioned key ranges may be processed in parallel and concurrently by different processing threads, one thread per key range, to improve the performance of the delta generation and achieve scalability.
-
公开(公告)号:US20230409442A1
公开(公告)日:2023-12-21
申请号:US18304226
申请日:2023-04-20
发明人: Satish Kumar Kashi Visvanathan , Viggnesh Venugopal , Victor Vladimir Golosovker , Ravi Lingappa Shamanna
CPC分类号: G06F11/1464 , G06F11/1451 , G06F16/2246 , G06F2201/84
摘要: Techniques are described for maintaining data consistency when failure events occur during file storage replications between file systems in different cloud infrastructure regions. In certain embodiments, two generation numbers (or different identifications) are assigned to two groups of processed B-tree key-value pairs, one before and one after a failure event, within a key range. In some embodiments, the two generation numbers are assigned to a group of B-tree key-value pairs processed by a failed thread and another group of B-tree key-value pairs processed by a substitute thread taking over the failed thread to avoid potential data corruption.
-
公开(公告)号:US20230412375A1
公开(公告)日:2023-12-21
申请号:US18094302
申请日:2023-01-06
CPC分类号: H04L9/14 , H04L9/0819 , H04L9/3228 , G06F11/2023 , G06F2201/84
摘要: Novel techniques are described for performing hierarchical key management involving an end-to-end file storage replication between different cloud infrastructure regions. The novel hierarchical key management comprises three different keys, a first security key for the source region, a session key, valid only for a session, for the transfer of data between two different regions, and a second security key for the target region. Novel techniques are also described for using different file keys for different files of a file system in each region.
-
公开(公告)号:US20230409534A1
公开(公告)日:2023-12-21
申请号:US18304161
申请日:2023-04-20
发明人: Satish Kumar Kashi Visvanathan , Viggnesh Venugopal , Victor Vladimir Golosovker , Ravi Lingappa Shamanna
IPC分类号: G06F16/178 , G06F16/176 , G06F16/185
CPC分类号: G06F16/178 , G06F16/1774 , G06F16/185
摘要: Techniques are described for checkpointing multiple key ranges in parallel and concurrently during file storage replications between file systems in different cloud infrastructure regions. In certain embodiments, multiple range threads processing multiple key ranges, one thread per key range, create checkpoints for their respective key ranges in parallel and concurrently after processing a per-determined number of B-tree keys. In certain embodiments, each thread requests a lock from a central checkpoint record and takes turns for updating a status byte while continuing processing the B-tree keys in its responsible key range. In certain embodiments, upon encountering a failure event, either a system crash or a thread failure, each thread restarts its B-tree key processing from a B-tree key after the most recent checkpoint.
-
公开(公告)号:US20240281413A1
公开(公告)日:2024-08-22
申请号:US18646676
申请日:2024-04-25
发明人: Satish Kumar Kashi Visvanathan , Viggnesh Venugopal , Victor Vladimir Golosovker , Ravi Lingappa Shamanna
IPC分类号: G06F16/182 , G06F9/50 , G06F11/14 , G06F11/20 , G06F16/11 , G06F16/174 , G06F16/176 , G06F16/178 , G06F16/185 , G06F16/22 , G06F16/23 , G06F16/27 , G06F21/60 , G06F21/62 , H04L9/08 , H04L9/14 , H04L9/32
CPC分类号: G06F16/1844 , G06F9/505 , G06F11/1417 , G06F11/1451 , G06F11/1464 , G06F11/2023 , G06F11/2028 , G06F16/128 , G06F16/1756 , G06F16/1774 , G06F16/178 , G06F16/185 , G06F16/2246 , G06F16/2365 , G06F16/27 , G06F21/602 , G06F21/6218 , H04L9/0819 , H04L9/14 , H04L9/3228 , G06F2201/84
摘要: Techniques are described for checkpointing multiple key ranges in parallel and concurrently during file storage replications between file systems in different cloud infrastructure regions. In certain embodiments, multiple range threads processing multiple key ranges, one thread per key range, create checkpoints for their respective key ranges in parallel and concurrently after processing a per-determined number of B-tree keys. In certain embodiments, upon encountering a failure event, either a system crash or a thread failure, each thread restarts its B-tree key processing from a B-tree key after the most recent checkpoint.
-
6.
公开(公告)号:US20230409559A1
公开(公告)日:2023-12-21
申请号:US18162459
申请日:2023-01-31
发明人: Satish Kumar Kashi Visvanathan , Viggnesh Venugopal , Stephen Anthony Fridella , Ashwin Vijayavel
CPC分类号: G06F16/2365 , G06F2201/84 , G06F11/1464 , G06F16/27
摘要: Novel techniques are described for maintaining file consistency between different cloud infrastructure regions during cross-region file storage replication. The novel techniques comprise upon detecting a file deletion status (i.e., a file directory entry version marked as deletion) in a source file system during a replication cycle, retrieving file name from a valid file directory entry of a prior snapshot to construct a temporary file directory entry containing necessary information for a target file system to reconstruct a duplicate file directory entry version marked as deletion. The temporary file directory entry is transferred from the source file system to the target file system during the same replication cycle.
-
7.
公开(公告)号:US20230409522A1
公开(公告)日:2023-12-21
申请号:US17991688
申请日:2022-11-21
发明人: Satish Kumar Kashi Visvanathan , Sudarsan R. Piduri , Vikram Singh Bisht , Viggnesh Venugopal , John McClain
CPC分类号: G06F16/128 , G06F21/6218 , G06F21/602 , G06F16/2246
摘要: Novel techniques for end-to-end file storage replication and security between file systems in different cloud infrastructure regions are disclosed herein. In one embodiment, a file storage service generates deltas between snapshots in a source file system, and transfers the deltas and associated data through a high-throughput object storage to recreate a new snapshot in a target file system located in a different region during disaster recovery. The file storage service utilizes novel techniques to achieve scalable, reliable, and restartable end-to-end replication. Novel techniques are also described to ensure a secure transfer of information and consistency during the end-to-end replication.
-
公开(公告)号:US12001404B2
公开(公告)日:2024-06-04
申请号:US18304161
申请日:2023-04-20
发明人: Satish Kumar Kashi Visvanathan , Viggnesh Venugopal , Victor Vladimir Golosovker , Ravi Lingappa Shamanna
IPC分类号: G06F16/182 , G06F9/50 , G06F11/14 , G06F11/20 , G06F16/11 , G06F16/174 , G06F16/176 , G06F16/178 , G06F16/185 , G06F16/22 , G06F16/23 , G06F16/27 , G06F21/60 , G06F21/62 , H04L9/08 , H04L9/14 , H04L9/32
CPC分类号: G06F16/1844 , G06F9/505 , G06F11/1417 , G06F11/1451 , G06F11/1464 , G06F11/2023 , G06F11/2028 , G06F16/128 , G06F16/1756 , G06F16/1774 , G06F16/178 , G06F16/185 , G06F16/2246 , G06F16/2365 , G06F16/27 , G06F21/602 , G06F21/6218 , H04L9/0819 , H04L9/14 , H04L9/3228 , G06F2201/84
摘要: Techniques are described for checkpointing multiple key ranges in parallel and concurrently during file storage replications between file systems in different cloud infrastructure regions. In certain embodiments, multiple range threads processing multiple key ranges, one thread per key range, create checkpoints for their respective key ranges in parallel and concurrently after processing a per-determined number of B-tree keys. In certain embodiments, each thread requests a lock from a central checkpoint record and takes turns for updating a status byte while continuing processing the B-tree keys in its responsible key range. In certain embodiments, upon encountering a failure event, either a system crash or a thread failure, each thread restarts its B-tree key processing from a B-tree key after the most recent checkpoint.
-
9.
公开(公告)号:US20240134828A1
公开(公告)日:2024-04-25
申请号:US18536072
申请日:2023-12-11
IPC分类号: G06F16/178 , G06F16/172 , G06F16/185 , G06F21/60
CPC分类号: G06F16/178 , G06F16/172 , G06F16/185 , G06F21/602
摘要: Techniques are described for a hierarchical caching mechanism enabling efficient cross-region replications. In some embodiments, replication-related information (e.g., key-value pairs) is stored in a particular layout in a binary tree (B-tree) of a file system for replication processing. A hierarchy of caches storing a first type of information (e.g., crypto keys associated with iNodes) may be arranged to match the particular layout in the B-tree to enable efficient parallel processing of a second type of information (e.g., files, file data, or symbolic links), where the replication-related information in the B-tree is partitioned into multiple key ranges for parallel processing. In some embodiments, the caches in different hierarchies may be shared by different parallel-processing key ranges and replication jobs in a file system.
-
10.
公开(公告)号:US20240104062A1
公开(公告)日:2024-03-28
申请号:US18536067
申请日:2023-12-11
IPC分类号: G06F16/178 , G06F16/185 , G06F21/60
CPC分类号: G06F16/178 , G06F16/185 , G06F21/602
摘要: Techniques are described for snapshot key inter-dependency resolution during cross-region replications. Dependency between a first type of replication-related information (e.g., crypto keys associated with a parent directory iNode or a file iNode) and a second type of replication-related information (e.g., files, file data/FMAPs, or symbolic links) during a cross-region replication may be resolved to enable non-blocking delta application in a target file system. In some embodiments, temporary dummy entries for the first type of information may be created in the B-tree of the target file system for the out-of-order download (e.g., the second type being downloaded before the first type) of these two types of information. In some embodiments, a consolidation process may be performed between the dummy entries and the later-arriving first type of information.
-
-
-
-
-
-
-
-
-