Patent classifications
G06F16/182
Virtualized file server smart data ingestion
In one embodiment, a system for managing a virtualization environment includes a set of host machines, each of which includes a hypervisor, virtual machines, and a virtual machine controller, and a data migration system configured to identify one or more existing storage items stored at one or more existing File Server Virtual Machines (FSVMs) of an existing virtualized file server (VFS). For each of the existing storage items, the data migration system is configured to identify a new FSVMs of a new VFS based on the existing FSVM, send a representation of the storage item from the existing FSVM to the new FSVM, such that representations of storage items are sent between different pairs of FSVMs in parallel, and store a new storage item at the new FSVM, such that the new storage item is based on the representation of the existing storage item received by the new FSVM.
Providing enhanced security for object access in object-based datastores
A method of enhancing security in object based datastores is provided. The method mounts first and second datastores identified, respectively, by first and second datastore identifiers. The first and second datastores include, respectively, first and second namespace objects that are mapped to first and second subfolders in the first and second datastores. A first file within the first subfolder references a first object via a first object identifier, while a second file within the second subfolder references a second object via a second object identifier. The first and second objects are tagged with the first and second datastores' identifiers. The first and second datastores share an underlying storage and may be configured to have separate access permissions. The method receives a command to access the first object via a datastore identifier, compares the datastore identifier with the first datastore identifier, and if they match, allows access to the first object.
Providing enhanced security for object access in object-based datastores
A method of enhancing security in object based datastores is provided. The method mounts first and second datastores identified, respectively, by first and second datastore identifiers. The first and second datastores include, respectively, first and second namespace objects that are mapped to first and second subfolders in the first and second datastores. A first file within the first subfolder references a first object via a first object identifier, while a second file within the second subfolder references a second object via a second object identifier. The first and second objects are tagged with the first and second datastores' identifiers. The first and second datastores share an underlying storage and may be configured to have separate access permissions. The method receives a command to access the first object via a datastore identifier, compares the datastore identifier with the first datastore identifier, and if they match, allows access to the first object.
Snapshot performance optimizations
Techniques for creating and using snapshots may include: receiving a request to create a new snapshot of a source object; determining whether a first generation identifier associated with the source object matches a second generation identifier associated with a base snapshot of the source object; determining whether the source object has been modified since the base snapshot was created; and responsive to determining the first generation identifier matches the second generation identifier and also determining that the source object has not been modified since the base snapshot was created, associating the new snapshot with the base snapshot thereby indicating that the new snapshot and the base snapshot have matching content and denote a same point in time copy of the source object.
Correspondence of external operations to containers and mutation events
A method is provided for determining command-to-process correspondence. The method includes identifying, by the hardware processor, initial processes resulting from executions of container immutability change events for each of multiple containers in a cluster, based on an execution time, a process identifier and a process group identifier for each of the container immutability change events. The method further includes checking, by the hardware processor, if an initial process from among the identified initial processes matches an entry in a database that stores external container commands and at least one respective process resulting from executing each of the external container commands. The method also includes designating, by the hardware processor, a particular external command, from among the external container commands stored in the database, as having a correspondence to the initial process, responsive to the initial process matching the at least one respective process resulting from executing the particular external command.
Correspondence of external operations to containers and mutation events
A method is provided for determining command-to-process correspondence. The method includes identifying, by the hardware processor, initial processes resulting from executions of container immutability change events for each of multiple containers in a cluster, based on an execution time, a process identifier and a process group identifier for each of the container immutability change events. The method further includes checking, by the hardware processor, if an initial process from among the identified initial processes matches an entry in a database that stores external container commands and at least one respective process resulting from executing each of the external container commands. The method also includes designating, by the hardware processor, a particular external command, from among the external container commands stored in the database, as having a correspondence to the initial process, responsive to the initial process matching the at least one respective process resulting from executing the particular external command.
Multidirectional synchronization of cloud application data
In embodiments, application data is received from multiple application platforms. Once received, an object mapping is used to determine a synchronization data object that is mapped to data objects from the application data. A function mapping is used to determine one or more functions to apply to the application data. Data objects from the application data that are mapped to the synchronization data object are compared to detect conflicts between fields. In response to detecting a conflict, the conflict is resolved based on configuration rules that indicate priority between fields of different data objects. Once the conflict is resolved, the data objects are merged into a modified synchronization data object that represents an updated version of the synchronization data object. Changes between the synchronization data object and the modified synchronization data object are identified and propagated to application platforms to perform updates to application data managed by the application platforms.
Multidirectional synchronization of cloud application data
In embodiments, application data is received from multiple application platforms. Once received, an object mapping is used to determine a synchronization data object that is mapped to data objects from the application data. A function mapping is used to determine one or more functions to apply to the application data. Data objects from the application data that are mapped to the synchronization data object are compared to detect conflicts between fields. In response to detecting a conflict, the conflict is resolved based on configuration rules that indicate priority between fields of different data objects. Once the conflict is resolved, the data objects are merged into a modified synchronization data object that represents an updated version of the synchronization data object. Changes between the synchronization data object and the modified synchronization data object are identified and propagated to application platforms to perform updates to application data managed by the application platforms.
Methods and systems for transmitting information
Methods and systems for transferring information, comprising: transmitting, by a first computing device of the first computing system, a first network function request to a decentralized network, the first network function request including first information; and transmitting, by a second computing device of the second computing system, a second network function request to the decentralized network, the second network function request including second information.
Methods and systems for transmitting information
Methods and systems for transferring information, comprising: transmitting, by a first computing device of the first computing system, a first network function request to a decentralized network, the first network function request including first information; and transmitting, by a second computing device of the second computing system, a second network function request to the decentralized network, the second network function request including second information.