G06F16/1827

Congestion Mitigation in a Distributed Storage System

A system comprises a plurality of computing devices that are communicatively coupled via a network and have a file system distributed among them, and comprises one or more file system request buffers residing on one or more of the plurality of computing devices. File system choking management circuitry that resides on one or more of the plurality of computing devices is operable to separately control: a first rate at which a first type of file system requests (e.g., one of data requests, data read requests, data write requests, metadata requests, metadata read requests, and metadata write requests) are fetched from the one or more buffers , and a second rate at which a second type of file system requests (e.g., another of data requests, data read requests, data write requests, metadata requests, metadata read requests, and metadata write requests) are fetched from the one or more buffers.

Efficient filename storage and retrieval
11704336 · 2023-07-18 · ·

The disclosed technology relates to a system configured to detect a modification to a node in a tree data structure. The node is associated with a content item managed by a content management service as well as a filename. The system may append the filename and a separator to a filename array, determine a location of the filename in the filename array, and store the location of the filename in the node.

LOCAL INDEXING FOR METADATA REPOSITORY OBJECTS

A method, a system, and a computer program product for retrieving metadata files using a local metadata index. A request to access one or more metadata files associated with at least one computing component is received. At least one primary key and at least secondary key identifying the computing component are determined. An identifier of a storage location storing the metadata files is associated with the primary key and the secondary key. A metadata index for the metadata files is generated. The metadata index includes the primary key, the secondary key, and the associated identifier of the storage location. The metadata index is stored in a memory location associated with the computing component. The stored metadata index is accessed and the metadata files are retrieved using the stored metadata index.

File level incremental continuous data protection

Creating point-in-time versions of files for applications at a storage system includes maintaining at the storage system a data structure correlating each of a plurality of applications with files for each of the applications and correlating each of the files with portions of the data storage system, using the data structure to determine specific files for a particular one of the applications for which a point-in-time version is being created, using the data structure to determine specific portions of the storage system corresponding to the specific files, suspending writes to the specific portions, completing previous writes to the specific portions following suspending writes, and performing a snapshot of the specific files following completing previous writes. The portions of the data storage may be extents. A host may provide information to the storage system to correlate applications with files and to correlate files with portions of the data storage system.

TECHNIQUES FOR ASYNCHRONOUS SNAPSHOT INVALIDATION
20230214363 · 2023-07-06 ·

Asynchronous snapshot invalidation techniques are described. According to various such techniques, an enhanced file handle structure may be defined that includes a snapshot generation ID that is to comprise a value that singularly identifies a snapshot performed at a particular point in time. In some embodiments, when a snapshot ID assigned to that snapshot is reused at a subsequent point in time, a different snapshot generation ID may be assigned to that subsequent snapshot. With respect to an in-core cache, the differing snapshot generation IDs may eliminate unacceptable ambiguity regarding respective file information sets corresponding to the initial and subsequent snapshots sharing the same snapshot ID. As a result, obsolete file information sets may be cleared from the in-core cache asynchronously, enabling improved performance. The embodiments are not limited in this context.

Unified multi-platform system for data privacy
11537741 · 2022-12-27 · ·

A data manager in an enterprise provides data management of users' personal data, which is used by enterprise applications to support operations in the enterprise. The data manager obtains personal data from the enterprise applications via the use of corresponding connector modules. The data manager communicates with each connector module, which then communicates with its corresponding enterprise application to obtain personal data used by that application. The data manager can also communicate with a central database that can store personal data used by the enterprise applications. The central database can serve as a central store of personal data for the enterprise applications.

METHODS FOR ENSURING CORRECTNESS OF FILE SYSTEM ANALYTICS AND DEVICES THEREOF

Methods, non-transitory machine readable media, and computing devices that ensure correctness of file system analytics are disclosed. With this technology, a first generation number for a volume is incremented in response to a modification of a rule set that defines properties of objects of a file system associated with the volume. A determination is made when a second generation number in a first inode for a first one of the objects matches the first generation number. The first inode is identified based on a traversal of a directory tree associated with the file system. The modified rule set is applied to the properties for the first one of the objects to obtain values, when the second generation number fails to match the first generation number. Analytics data is output after the traversal has completed. The analytics data is generated in response to a query and is based on the values.

SELECTIVE DATA DEDUPLICATION IN A MULTITENANT ENVIRONMENT
20220405251 · 2022-12-22 ·

Computer implemented methods for selective data deduplication in a multitenant environment are disclosed. Data deduplication of blocks written to a storage area associated with a tenant and redundant copies of the blocks written to other storage areas of other tenants is permitted or prevented based on tagging the first storage area associated with the tenant with a particular type of parameter. Responsive to detecting a write operation directed to the storage area tagged with a parameter indicating that deduplication is not permitted, a block to be written to the storage area is modified prior to hashing the block. Responsive to detecting a write operation directed to the storage area tagged with a parameter indicating that deduplication is permitted, a block to be written to the storage area is prevented from being modified prior to hashing the block.

SELECTIVE DATA DEDUPLICATION IN A MULTITENANT ENVIRONMENT
20220405789 · 2022-12-22 ·

A computer-implemented method for dynamic storage pricing in a multitenant environment is disclosed. The computer-implemented method includes dynamically modifying a storage cost for one or more tenants pointing to a block written to a storage area of the multitenant environment based, at least in part, on detecting a change in a number of tenants pointing to the block.

Computer-implemented knowledge asset distribution platform and a computer-implemented method for distributing packages of knowledge assets

A computer-implemented knowledge asset distribution platform distributes packages of knowledge assets between plural provider system environments (PSE) and/or consumer system environments (CSE), which store knowledge assets and make the knowledge assets available to users of the CSE. The platform includes one or more processor unit(s), with one or more non-transitory memory unit(s), and a distribution module that distributes packages of knowledge assets. The platform includes a receiver module that receives packages of knowledge assets, a database module that stores packages of knowledge assets and/or stores content information of packages of knowledge assets, a browser module that provides a browser function for browsing the knowledge assets stored by the database module and/or for browsing the content information stored by the database module and a sender module that relays packages of knowledge assets.