735 patents
Page 3 of 37
Utility
Self-healing Virtualized File Server
7 Sep 23
In one embodiment, a system for managing a virtualization environment comprises a plurality of host machines, one or more virtual disks comprising a plurality of storage devices, a virtualized file server (VFS) comprising a plurality of file server virtual machines (FSVMs), wherein each of the FSVMs is running on one of the host machines and conducts I/O transactions with the one or more virtual disks, and a virtualized file server self-healing system configured to identify one or more corrupt units of stored data at one or more levels of a storage hierarchy associated with the storage devices, wherein the levels comprise one or more of file level, filesystem level, and storage level, and when data corruption is detected, cause each FSVM on which at least a portion of the unit of stored data is located to recover the unit of stored data.
Anil Kumar Gopalapura Venkatesh, Rishabh Sharma, Richard James Sharpe, Shyamsunder Prayagchand Rathi, Durga Mahesh Arikatla
Filed: 25 Apr 23
Utility
Vblock metadata management
5 Sep 23
Various embodiments set forth techniques for managing and/or accessing metadata associated with a vblock, systems implementing said techniques, and computer-readable media storing instructions for performing said techniques.
Kamalneet Singh, Rishi Bhardwaj, Karan Gupta, Vanita Prabhu
Filed: 18 Mar 21
Utility
Container-based Application Processing
31 Aug 23
Methods, systems, and computer program products for moving a container-based application from a source HCI cluster to a target HCI cluster.
Bharat Kumar BEEDU, Naveen KUMAR, Niranjan Sanjiv PENDHARKAR, Pranab PATNAIK
Filed: 9 Jan 23
Utility
Generic proxy endpoints using protocol tunnels including life cycle management and examples for distributed cloud native services and applications
22 Aug 23
Applications or Agents or Administrators can communicate with services and/or applications at hosted and/or remote locations via proxy service or application endpoints.
Shyan-Ming Perng, Akhilesh Joshi, Anuraag Deepak Advani
Filed: 26 Feb 21
Utility
Edge side filtering in hybrid cloud environments
22 Aug 23
Various embodiments disclosed herein are related to a non-transitory computer readable storage medium.
Isha Singhal, Venkata Vamsi Krishna Kothuri, Matthew James Armstrong, Praveen Uday Bhaskara Pisipati, Anurag Choudhary, Arvind Mohan
Filed: 18 Dec 20
Utility
Efficient metadata management
22 Aug 23
Systems for high-performance distributed computing.
Karan Gupta, Pavan Kumar Konka, Rishi Bhardwaj, Rohit Jain, Tabrez Parvez Memon
Filed: 9 Nov 20
Utility
Configuring virtualization system images for a computing cluster
22 Aug 23
A plurality of different virtualization system images are configured for deployment to a plurality of nodes in heterogeneous environments.
Joshua John Berry, Mohan Maturi, Shlomo Shiomi Vaknin, Aman Nijhawan, Anil Kumar Kushwah, Avi Bhandari, Jan Ralf Alexander Olderdissen
Filed: 31 Dec 20
Utility
Dynamically formatted storage allocation record
22 Aug 23
One or more non-transitory computer-readable media can store program instructions that, when executed by one or more processors, cause the one or more processors to perform steps of organizing storage as a set of storage regions, each storage region having a fixed size; and for each storage region, storing a storage allocation structure of the storage region formatted in a first format selected from a format set including at least two formats, determining a change of an allocation feature of the storage region, based on the allocation feature of the storage region, selecting, from the format set, a second format of the storage allocation structure, and reformatting the storage allocation structure in the second format.
Rohit Jain, Harshit Agarwal
Filed: 29 Oct 21
Utility
System and Method to Provide Priority Based Quality of Service for Telemetry Data
17 Aug 23
Various embodiments disclosed herein are related to a non-transitory computer readable storage medium.
Mukesh Bafna, Akshay Narayan Muramatti, Pranjal Bhor, Amey Barve
Filed: 3 Jun 22
Utility
System and method for selecting authentication methods for secure transport layer communication
15 Aug 23
One embodiment of the present invention provides an enhanced authentication system.
Sunil Agrawal
Filed: 20 Aug 20
Utility
Upgrade systems for service domains
15 Aug 23
Non-transitory computer readable media are encoded with instructions which, when executed by one or more processors of a central computing system, cause the central computing system to connect with multiple service domains and determine that at least one service domain of the multiple service domains is eligible for upgrade.
Akhilesh Joshi, Kevin Thomas, Gaurav Poothia, Naorem Khogendro Singh
Filed: 13 Jan 21
Utility
Hypervisor Hibernation
10 Aug 23
Upon receiving a request to hibernate a hypervisor of a virtualization system running on a first computer, acts are carried out to capture a state of the hypervisor, where the state of the hypervisor comprises hypervisor logical resource parameters and an execution state of the hypervisor.
Binny Sher GILL
Filed: 30 Jan 23
Utility
System and Method for Cloning As SQL Server Ag Databases In a Hyperconverged System
10 Aug 23
A system and method include creating, by an Availability Group (“AG”) controller in a virtual computing system, a first AG clone from a source database.
Tarun Mehta, Rohan Mohan Rayaraddi
Filed: 27 Feb 23
Utility
System and Method for Backing Up Highly Available Source Databases In a Hyperconverged System
10 Aug 23
A system and method includes a plurality of nodes distributed between a first cluster and a second cluster, each of the plurality of nodes storing a copy of a source database and a processor executing computer-readable instructions stored on a memory to designate a first node of the plurality of nodes as a primary node, designate remaining ones of the plurality of nodes as secondary nodes to take over from the primary node upon failure of the primary node, designate a second node of the plurality of nodes as an initial active node, backup the source database from the initial active node, automatically designate, based on a switch over policy, a third node of the plurality of nodes as a next active node upon the initial active node becoming unavailable, and continue backups of the source database from the next active node upon the initial active node becoming unavailable.
Sagar Sontakke, Kamaldeep Khanuja, Bakul Banthia
Filed: 12 Apr 23
Utility
Manual Snapshot and Restore of User Applications Hosted on Cloud Infrastructures
3 Aug 23
An aspect of the present disclosure facilitates manual snapshot and restore of user applications hosted on cloud infrastructures.
Santhosh Kumar Vijayan, Sampanna Hegde, Pranav Gupta, Esha Doda
Filed: 31 Oct 22
Utility
Replication Using Data Identity
3 Aug 23
Label-based replication of data between two computing clusters.
Niranjan Sanjiv PENDHARKAR, Shubham Mangilal Sharma, Kiran TATIPARTHI
Filed: 31 Jan 22
Utility
Method for forecasting distributed resource utilization in a virtualization environment
1 Aug 23
A method for time series analysis of time-oriented usage data pertaining to computing resources of a computing system.
Jianjun Wen, Abhinay Nagpal, Himanshu Shukla, Binny Sher Gill, Cong Liu, Shuo Yang
Filed: 29 Dec 16
Utility
Transparent Referrals for Distributed File Servers
27 Jul 23
Examples of systems described herein include a virtualized file server including a first file server virtual machine and a second file server virtual machine configured to manage a distributed file share of storage items.
Durga Mahesh Arikatla, Hemanth Kumar Thummala, Manish Gupta, Manoj Naik, Saji Kumar Vijaya Kumari Rajendran Nair, Shyamsunder Prayagchand Rathi, Sukruth Sridharan
Filed: 21 Dec 22
Utility
Systems and Methods for Transparently Detecting Unencrypted Virtual Machine I/o
27 Jul 23
In some aspects, an apparatus includes a processor and a memory.
Carl Alan Waldspurger, Bijan Mottahedeh
Filed: 21 Jan 22
Utility
Consistent Access Control Lists Across File Servers for Local Users In a Distributed File Server Environment
27 Jul 23
Examples described herein are generally directed towards file server access controls, and more specifically towards a mechanism to create consistent access control lists for local users across different file servers in a distributed file server environment.
Hemantha Kumar Thummala, Manoj Premanand Naik, Saji Kumar Vijaya Kumari Rajendran Nair, Srikrishan Malik
Filed: 24 Jan 22