Patent classifications
G06F16/125
IMMUTABLE SNAPSHOT COPIES STORED IN WRITE ONCE READ MANY (WORM) STORAGE
Techniques are provided for storing immutable snapshot copes in write once read many (WORM) storage. A snapshot of a volume may be stored into one or more objects formatted according to an object format. An expiry time may be assigned to the snapshot and the one or more objects based upon a creation time of the snapshot and a retention time. The one or more objects may be stored within a remote object store. The one or more objects are retained in an immutable state and cannot be deleted until expiration of the expiry time. In response to identifying an existing object within the remote object store comprising shared snapshot data referenced by the snapshot, an assigned expiry time of the existing object may be modified based upon the expiry time of the snapshot to create a modified expiry time for the existing object.
Automated email legal hold
In some examples, a computing device may receive, from an email server, an email rule comprising conditions and actions and determine a subset of archived emails stored on the computing device that satisfy the conditions. The computing device may perform the actions to the subset of archived emails, such as placing a legal hold on the subset of archived emails, creating and sending copies of the subset of archived emails to the email server, or deleting, from the computing device, the subset of archived emails. After determining that a user is attempting to perform a prohibited action on (e.g., delete, edit, forward) an email of the subset of archived emails, the computing device may perform a protective action, such as logging the user out of an email account, preventing the user from logging in to the email account, automatically sending an email to an administrator or the like.
DELETED OBJECT RETENTION IN A COMMUNICATION PLATFORM
Techniques for specifying a deleted data retention rule for deleted objects in a communication platform are described herein. Deleted objects include objects (e.g., files, reaction emojis, etc.), that are transmitted and/or accessible via the communication platform and subsequently deleted. An administrative user of an organization can establish one or more deleted data retention rules (e.g., policies) for the organization. A deleted data retention rule can include a policy for continued storage of a deleted object after receiving a request to delete the object from the communication platform. In response to receiving the request to delete the object, and based on a deleted data retention rule, the communication platform can remove the object from view by the end user (e.g., remove from an interface), but can continue to store the object in a database for a period of time specified in the deleted data retention rule.
MANAGING OBJECTS STORED AT A REMOTE STORAGE
An indication to store to a remote storage a new archive of a snapshot of a source storage is received. At least one shared data chunk of the new archive is determined to be already stored in an existing chunk object of the remote storage storing data chunks of a previous archive. One or more evaluation metrics for the existing chunk object are determined based at least in part on a retention period associated with one or more individual chunks stored in the chunk object and a data lock period associated with the entire existing chunk object. It is determined based on the one or more evaluation metrics whether to reference the at least one shared data chunk of the new archive from the existing chunk object or store the at least one shared data chunk in a new chunk object of the remote storage.
MANAGING OBJECTS STORED AT A REMOTE STORAGE
A first archive of a first snapshot of a source storage is caused to be stored to a remote storage. At least a portion of content of the first archive is stored in data chunks stored in a first chunk object of the remote storage and the first archive is associated with a first data policy. A second archive of a second snapshot of the source storage is caused to be stored to the remote storage. At least a portion of content of the second archive is referenced from data chunks stored in the first chunk object and the second archive is associated with a second data policy. Policy compliance of the chunk object storing data chunks referenced by the first archive and the second archive that are different is automatically managed based on the first data policy and the second data policy that are different.
GARBAGE COLLECTION FROM ARCHIVAL OF STORAGE SNAPSHOTS
A technique improves storage efficiency of an object store configured to maintain numerous snapshots for long-term storage in an archival storage system by efficiently determining data that is exclusively owned by an expiring snapshot to allow deletion of the expiring snapshot from the object store. The technique involves managing index data structures to enable efficient garbage collection across a very large number of data objects. When a snapshot expires, the technique obviates the need to scan the numerous snapshot data objects to determine which index structures are no longer needed and can be reclaimed (garbage collected). The technique is directed to management of underlying storage based on different sets of policies. When certain snapshots expire and are ready for deletion, the technique is directed to finding those data blocks that are no longer referenced (used) by any valid snapshots.
MANAGING DATA RESOURCES
A method comprising: storing, in a database, a list of geographical regions in which the party consents to their data being stored; receiving a request to store data of the party, wherein at least one of the data has a region-restriction that restricts the regions in which that data can be stored; determining, based on a respective region-restriction of a respective one of the data, in which of the list of regions the respective data can be stored; storing the data, wherein each respective data is stored in at least one respective storage centre associated with one of the regions according to the determination; storing, in the database, a list comprising a pointer to each respective stored data, wherein the pointer identifies the respective storage centre; receiving a request to retrieve a respective stored data; and using the pointer to route the request to the respective storage centre.
Immutable snapshot copies stored in write once read many (WORM) storage
Techniques are provided for storing immutable snapshot copes in write once read many (WORM) storage. A snapshot of a volume may be stored into one or more objects formatted according to an object format. An expiry time may be assigned to the snapshot and the one or more objects based upon a creation time of the snapshot and a retention time. The one or more objects may be stored within a remote object store. The one or more objects are retained in an immutable state and cannot be deleted until expiration of the expiry time. In response to identifying an existing object within the remote object store comprising shared snapshot data referenced by the snapshot, an assigned expiry time of the existing object may be modified based upon the expiry time of the snapshot to create a modified expiry time for the existing object.
Demoted Data Retention via a Tiered Ordered Event Stream Data Storage System
Data retention for a tiered ordered event stream (OES) data storage system is disclosed. Data retention can be applied to demoted data, e.g., data demoted from a first tier to a second tier of data storage devices. The data retention disclosed can avoid demoted events, generally aggregated via a chunk object, file object, etc., from being subject to both a stream-cut operation and a retention period. In embodiments, where a stream-cut instance corresponds to events occurring later in time than a retention end time (RET), all demoted events, e.g., as aggregated by a chunk , file, etc., can be affiliated with the RET. However, where the stream-cut instance corresponds to events occurring earlier in time than the RET, then a portion of the events, e.g., those that will be truncated by performing the stream-cut instance, can be demoted and affiliated with the RET.
Traversal rights
The present technology pertains to a organization directory hosted by a synchronized content management system. The corporate directory can provide access to user accounts for all members of the organization to all content items in the organization directory on the respective file systems of the members' client devices. Members can reach any content item at the same path as other members relative to the organization directory root on their respective client device. In some embodiments novel access permissions are granted to maintain path consistency.