Patents Assigned to NetApp, Inc.
-
Patent number: 12045207Abstract: A distributed storage management system comprising nodes that form a cluster, a distributed block layer that spans the nodes in the cluster, and file system instances deployed on the nodes. Each file system instance comprises a data management subsystem and a storage management subsystem disaggregated from the data management subsystem. The storage management subsystem comprises a node block store that forms a portion of the distributed block layer and a storage manager that manages a key-value store and virtualized storage supporting the node block store. A file system volume hosted by the data management subsystem maps to a logical block device hosted by the virtualized storage in the storage management subsystem. The key-value store includes, for a data block of the logical block device, a key that comprises a block identifier for the logical block device and a value that comprises the data block.Type: GrantFiled: October 1, 2021Date of Patent: July 23, 2024Assignee: NetApp, Inc.Inventors: Ravikanth Dronamraju, Ananthan Subramanian, Daniel McCarthy, Christopher Cason, Arindam Banerjee
-
Patent number: 12045491Abstract: Systems and methods are provided for bringing a volume of a consistency group (CG) into an in-synchronization (InSync) state while other volumes of the CG remain in the InSync state. According to an example, in order to support recovery from disruptive events in a manner that ensures a zero recovery point objective (RPO) guarantee and insulates an application making use of the CG from adverse impacts, responsive to a triggering event, a Fast Resync process may first be attempted to promptly bring an affected volume back into an in-synchronization (InSync) state from an out of synchronization (OOS) state while allowing other members of the CG to remain in the InSync state. Should the Fast resync process be unsuccessful in bringing the volume back into the InSync state within a predetermined or configurable time threshold, then a second type of resynchronization process may be employed at the CG level.Type: GrantFiled: November 8, 2022Date of Patent: July 23, 2024Assignee: NetApp, Inc.Inventors: Murali Subramanian, Akhil Kaushik, Anoop Vijayan, Arun Kumar Selvam
-
Patent number: 12045144Abstract: Techniques are provided for orchestrating operations between a storage environment and a computing environment hosting virtual machines. A virtual machine proxy, associated with a computing environment hosting a virtual machine, is accessed by an orchestrator to identify the virtual machine and properties of the virtual machine. A storage proxy, associated with a storage environment comprising a volume within which snapshots of the virtual machine are to be stored, is accessed by the orchestrator to initialize a backup procedure. The orchestrator utilizes the virtual machine proxy to create a snapshot of the virtual machine. The orchestrator utilizes the storage proxy to back up the snapshot to the volume using the backup procedure.Type: GrantFiled: May 15, 2023Date of Patent: July 23, 2024Assignee: NetApp, Inc.Inventors: Jose Mathew, Ling Zheng
-
Patent number: 12045374Abstract: Methods and systems for securing unstructured data are provided. One method includes generating, by a processor, a schema from unstructured data, the schema including one or more relationships between named entities of the unstructured data; identifying, by the processor, a plurality of semantic relationships between the named entities; determining, by the processor, a sensitive relationship from the plurality of semantic relationships; and anonymizing, by the processor, sensitive data associated with the sensitive relationship by replacing, a first portion of the sensitive data with generalized information.Type: GrantFiled: November 3, 2022Date of Patent: July 23, 2024Assignee: NETAPP, INC.Inventors: Deepti Aggarwal, Jayanta Basak
-
Patent number: 12045489Abstract: Systems and methods for performing a fast resynchronization of a mirrored aggregate of a distributed storage system using disk-level cloning are provided. According to one embodiment, responsive to a failure of a disk of a plex of the mirrored aggregate utilized by a high-availability (HA) pair of nodes of a distributed storage system, disk-level clones of the disks of the healthy plex may be created external to the distributed storage system and attached to the degraded HA partner node. After detection of the cloned disks by the degraded HA partner node, mirror protection may be efficiently re-established by assimilating the cloned disks within the failed plex and then resynchronizing the mirrored aggregate by performing a level-1 resync of the failed plex with the healthy plex based on a base file system snapshot of the healthy plex. In this manner, a more time-consuming level-0 resync may be avoided.Type: GrantFiled: November 30, 2022Date of Patent: July 23, 2024Assignee: NetApp, Inc.Inventors: Sangramsinh Pandurang Pawar, Bhoovaraghan Subramanian, William Derby Dallas, Sowkoor Sunad Bhandary, Rajesh Rajarman, FNU Sahasranshu
-
Patent number: 12047449Abstract: Systems, methods, and machine-readable media are disclosed for collecting, maintaining, and retrieving use and limit data for connected resources, as well as determining an optimal location for creating a new volume (or volumes) on a storage platform and placing the volume at the determined location. A resource tracker collects resource use and/or limits data and stores it in a database. A volume placement service receives a volume deployment specification having constraints for creating a new volume. The volume placement service retrieves the data from the database. The volume placement service identifies an optimal location for the volume based at least in part on given constraints from the specification and the resource usage data. The system places the requested volume at the determined location.Type: GrantFiled: April 20, 2023Date of Patent: July 23, 2024Assignee: NetApp, Inc.Inventors: Sundeep Singh, Wesley R. Witte, Gyanendra Pradhan, Priya Thiruvasakan, Mohammed Haroon Shareef, Youyuan Wu, Abhishek Maurya, Sachin Pandit
-
Patent number: 12045481Abstract: Systems and methods for reducing read application in a virtual storage system are provided. According to one embodiment, read amplification is reduced when AZCS compression is being utilized by avoiding restarting of a read process via a slow path via a RAID layer of the virtual storage system when a data block associated with a read request and obtained via a first fast path read has been found not to be compressed. Instead, a second fast path read may be performed to obtain the corresponding checksum. Alternatively, or additionally, heuristics may be used to predict the odds of the data block being compressed. For example, when information encoded within a PVBN of the data block that identifies the PVBN as being within a compressed AZCS zone has shown to be sufficiently/insufficiently predictive of the data block being compressed, then a flag may be set to enable/disable fast path reads.Type: GrantFiled: March 30, 2022Date of Patent: July 23, 2024Assignee: NetApp, Inc.Inventors: Ritika, Jagadish Vasudeva, Vani Vully, Raj Kamal, Deepak Dangi, Parag Deshmukh
-
Patent number: 12038886Abstract: In various examples, data storage is managed using a distributed storage management system that is resilient. Data blocks of a logical block device may be distributed across multiple nodes in a cluster. The logical block device may correspond to a file system volume associated with a file system instance deployed on a selected node within a distributed block layer of a distributed file system. Each data block may have a location in the cluster identified by a block identifier associated with each data block. Each data block may be replicated on at least one other node in the cluster. A metadata object corresponding to a logical block device that maps to the file system volume may be replicated on at least another node in the cluster. Each data block and the metadata object may be hosted on virtualized storage that is protected using redundant array independent disks (RAID).Type: GrantFiled: July 26, 2023Date of Patent: July 16, 2024Assignee: NetApp, Inc.Inventors: Ravikanth Dronamraju, Ananthan Subramanian, Daniel McCarthy, Christopher Cason, Arindam Banerjee
-
Patent number: 12038817Abstract: Methods, non-transitory machine readable media, and computing devices that facilitate cache rewarming in a failover domain are disclosed. With this technology, a tag is inserted into a local tagstore. The tag includes a location of data in a cache hosted by a failover computing device and is retrieved from a snapshot of a remote tagstore for the cache. An invalidation log for an aggregate received from the failover computing device is replayed subsequent to mounting a filesystem that is associated with the aggregate and comprises the data. The data is retrieved from the cache following determination of the location from the tag in the local tagstore in order to service a received storage operation associated with the data. Takeover nodes do not have to wait for a cache to repopulate organically, and can leverage the contents of a cache of a failover node to thereby improve performance following takeover events.Type: GrantFiled: December 27, 2021Date of Patent: July 16, 2024Assignee: NETAPP, INC.Inventor: Brian Naylor
-
Patent number: 12032847Abstract: To replicate a source LUN to a different storage system platform, a first storage system transmits a request to replicate a LUN along with attributes for the LUN to a second storage system. The second storage system maps the attributes to attributes used and understood by the platform of the second storage system. The second storage system then creates a destination LUN based on the mapped attributes. Since the destination LUN is created with similar attributes as the source LUN, the destination LUN can store the replicated data of the source LUN while still being accessed and recognized as a LUN by the second storage system. The second storage system also stores any proprietary attributes received from the first storage system so that the proprietary attributes can be supplied to the first storage system to recover the source LUN after a data loss event.Type: GrantFiled: March 28, 2022Date of Patent: July 9, 2024Assignee: NetApp, Inc.Inventors: Ravindra Kuramkote, Kiyoshi James Komatsu, Ling Na Zheng, Rachita Kothiyal, Michael Lee Federwisch, Vijay Mohan Deshmukh
-
Patent number: 12032446Abstract: Recovery support techniques for storage virtualization environments are described. In one embodiment, for example, a method may be performed that comprises defining, by processing circuitry, a storage container comprising one or more logical storage volumes of a logical storage array of a storage system, associating the storage container with a virtual volume (vvol) datastore, identifying metadata for a vvol of the vvol datastore, and writing the metadata for the vvol to the storage system. Other embodiments are described and claimed.Type: GrantFiled: November 8, 2021Date of Patent: July 9, 2024Assignee: NetApp, Inc.Inventors: Deepak Thomas, Dan Sarisky, Nagender Somavarapu, Santosh Lolayekar
-
Patent number: 12032459Abstract: Techniques are provided for metadata management for enabling automated switchover in accordance with a configuration of storage solution that expresses a preference for either maintaining availability (e.g., a non-zero RPO mode) of the storage solution or avoiding data loss (e.g., a zero RPO mode). In one example, responsive to detecting a switchover trigger event, a node of a local cluster of a cross-site storage solution determines whether performance of an automated switchover from a failed cluster to a surviving cluster of the cross-site storage solution is enabled. Responsive to an affirmative determination, the node selectively proceeds with the automated switchover based on the configuration.Type: GrantFiled: May 19, 2022Date of Patent: July 9, 2024Assignee: NetApp, Inc.Inventors: Sasidharan Krishnan, Kalaivani Arumugham, Preksha Bansal, Vijay Kumar Chakravarthy Ekkaladevi, Ryan Edward Bartlett
-
Publication number: 20240220377Abstract: Systems and methods that make use of cluster-level redundancy within a distributed storage management system to address various node-level error scenarios are provided. Rather than using a generalized one-size-fits-all approach to reduce complexity, an approach tailored to the node-level error scenario at issue may be performed to avoid doing more than necessary. According to one embodiment, after identifying a missing branch of a tree implemented by a KV store of a first node of a cluster of a distributed storage management system, a branch resynchronization process may be performed, including, for each block ID in the range of block IDs of the missing branch (i) reading a data block corresponding to the block ID from a second node of the cluster that maintains redundant information relating to the block ID; and (ii) restoring the block ID within the KV store by writing the data block to the first node.Type: ApplicationFiled: March 18, 2024Publication date: July 4, 2024Applicant: NetApp, Inc.Inventors: Wei Sun, Anil Paul Thoppil, Anne Maria Vasu
-
Publication number: 20240220634Abstract: Systems and methods for enhancing application security are provided. In one example, exposure of an application to potential security vulnerabilities is reduced by identifying dynamically loaded symbols by the application via performance of static and/or dynamic symbol analysis to identify dynamically loaded symbols that are potentially and/or actually used, respectively, and that correspond to functions contained within shared libraries. Based on a shared library's usage of functions within a standard library and a known mapping between functions of the standard library and system calls, those system calls potentially and actually accessed by the application may be identified and a security policy may be generated and configured for enforcement by a kernel security module to limit system call usage accordingly. Additionally, removal of files or functions of libraries that are deemed unnecessary for proper execution of the applications may be performed to reduce the footprint of the application.Type: ApplicationFiled: December 14, 2023Publication date: July 4, 2024Applicant: NetApp, Inc.Inventor: Azzedine Benameur
-
Publication number: 20240220632Abstract: Systems and methods for enhancing container security are provided by reducing the attack surface. In one example, the exposure of containers to potential security vulnerabilities is reduced by identifying dynamically loaded symbols by an application via performance of static analysis (which may be referred to herein as static symbol analysis). Static symbol analysis may include examining one or more sections of an executable to identify dynamically loaded symbols corresponding to functions contained within shared libraries (e.g., shared object files and dynamic libraries). Based on a given shared library's usage of functions within standard libraries (e.g., the standard C library) and a known mapping between functions of standard libraries and kernel system calls, those kernel system calls potentially accessed by the application may be identified and a security policy may be generated and configured for enforcement by a kernel security module to limit kernel system call usage accordingly.Type: ApplicationFiled: December 14, 2023Publication date: July 4, 2024Applicant: NetApp, Inc.Inventor: Azzedine Benameur
-
Publication number: 20240220633Abstract: Systems and methods for enhancing container security are provided by reducing the attack surface. In one example, the exposure of containers to potential security vulnerabilities is reduced by identifying dynamically loaded symbols by an application via performance of static symbol analysis by examining a section of an executable to identify dynamically loaded symbols corresponding to functions contained within shared libraries. Based on a given shared library's usage of functions within standard libraries and a known mapping between functions of standard libraries and system calls, those system calls potentially accessed by the application may be identified and a security policy may be generated and configured for enforcement by a kernel security module to limit system call usage accordingly. Thereafter, the security policy enforced by the kernel security module may be refined based on performance of dynamic symbol analysis to identify system calls that are actually called by the application during runtime.Type: ApplicationFiled: December 14, 2023Publication date: July 4, 2024Applicant: NetApp, Inc.Inventor: Azzedine Benameur
-
Publication number: 20240220136Abstract: Systems and methods for reducing the provisioned storage capacity of a disk or aggregate of disks of a storage appliance while the storage appliance continues to serve clients are provided. According to one embodiment, the size of the aggregate may be reduced by shrinking the file system of the storage appliance and removing a selected disk from the aggregate. When an identified shrink region includes the entire addressable PVBN space of the selected disk, the file system may be shrunk by relocating valid data from the selected disk elsewhere within the aggregate. After the valid data is relocated, the selected disk may be removed from the aggregate, thereby reducing the provisioned storage capacity of the aggregate by the size of the selected disk.Type: ApplicationFiled: December 27, 2022Publication date: July 4, 2024Applicant: NetApp, Inc.Inventors: Mrinal K. Bhattacharjee, Sreenath Korrakuti, Sateesh Kumar Pola
-
Publication number: 20240220616Abstract: Systems and methods for enhancing container security are provided. In one example, exposure of a containerize application to potential security vulnerabilities is reduced by identifying dynamically loaded symbols by the application via performance of static and/or dynamic symbol analysis to identify dynamically loaded symbols that are potentially and/or actually used, respectively, and that correspond to functions contained within shared libraries. Based on a shared library's usage of functions within a standard library and a known mapping between functions of the standard library and system calls, those system calls potentially and actually accessed by the application may be identified and a security policy may be generated and configured for enforcement by a kernel security module to limit system call usage accordingly. Additionally, removal of files or functions of libraries that are deemed unnecessary for proper execution of the applications may be performed to reduce the footprint of the application.Type: ApplicationFiled: December 14, 2023Publication date: July 4, 2024Applicant: NetApp, Inc.Inventor: Azzedine Benameur
-
Publication number: 20240211158Abstract: Systems and methods for reducing the provisioned storage capacity of a disk or aggregate of disks of a storage appliance while the storage appliance continues to serve clients are provided. According to one embodiment, the size of the aggregate may be reduced by shrinking the file system of the storage appliance and removing a selected disk from the aggregate. When an identified shrink region is less than the entire addressable PVBN space of the selected disk, the file system may be shrunk by relocating valid data from the shrink region of the selected disk to one or more regions outside of the shrink region, mirroring data of the selected disk from outside of the shrink region to a smaller disk added to the aggregate, and then removing the selected disk after the mirrors are in sync, thereby reducing the provisioned storage capacity of the aggregate by the difference in size between the selected disk and the smaller disk.Type: ApplicationFiled: December 27, 2022Publication date: June 27, 2024Applicant: NetApp, Inc.Inventors: Mrinal K. Bhattacharjee, Sreenath Korrakuti, Sateesh Kumar Pola
-
Publication number: 20240214348Abstract: Systems and methods for enhancing API security by identifying anomalous activities in a cloud environment are provided. In one embodiment, the lack of awareness of an external API with respect to how calls to the external API may affect a cluster of a container orchestration platform is addressed. For instance, the views of the external and internal APIs may be combined to achieve better API security by correlating external API calls with undesirable behavior or other anomalies arising in the internal API. Responsive to identifying such undesirable behavior, information (e.g., a host, a source IP, a user, a specific payload) associated with the offending external API call may be added to a network security feature (e.g., a deny list, an IPS, or a WAF) utilized by the external API to facilitate performance of enhanced filtering of subsequent external API calls by the external API on behalf of the internal API.Type: ApplicationFiled: April 19, 2023Publication date: June 27, 2024Applicant: NetApp, Inc.Inventors: Azzedine Benameur, Yun Shen