Patents by Inventor Krishna Murthy Chandraiah setty Narasingarayanapeta

Krishna Murthy Chandraiah setty Narasingarayanapeta has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11119860
    Abstract: One or more techniques and/or systems are provided for profiling a dataset. For example, a snapshot of a volume may be evaluated to identify a set of data characteristics, such as file and directory size information. A baseline dataset profile of a dataset of data within the volume may be constructed based upon the set of data characteristics. Histograms and graphs of directory counts and file counts may be constructed based upon the baseline dataset profile. An incremental dataset profile may be constructed for the dataset based upon an evaluation of the snapshot and a subsequent snapshot of the volume. Histograms and graphs of directories and files that are modified, created, and/or deleted may be constructed based upon the incremental dataset profile. Performance predictions, analytics, field diagnostics of performance issues, and/or scheduling of service execution may be implemented for a storage network hosting the volume based upon dataset profiles.
    Type: Grant
    Filed: July 2, 2019
    Date of Patent: September 14, 2021
    Assignee: NetApp Inc.
    Inventors: Krishna Murthy Chandraiah setty Narasingarayanapeta, Rakesh Bhargava M. R., Jose Mathew
  • Publication number: 20210271659
    Abstract: Techniques are provided for maintaining timestamp parity during a transition replay phase to a synchronous state. During a transition logging phase where metadata operations executed by a primary node are logged into a metadata log and regions modified by data operations executed by the primary node are tracked within a dirty region log, a close stream operation to close a stream associated with a basefile of the primary node is identified. A determination is made as to whether the dirty region log comprises an entry for the stream indicating that a write data operation previously modified the stream. In an example, in response to the dirty region log comprising the entry, an indicator is set to specify that the stream was deleted by the close stream operation. In another example, a modify timestamp of the basefile is logged into the metadata log for subsequent replication to the secondary node.
    Type: Application
    Filed: February 28, 2020
    Publication date: September 2, 2021
    Inventors: Krishna Murthy Chandraiah setty Narasingarayanapeta, Preetham Kudgi Shenoy
  • Patent number: 11100044
    Abstract: A request is received to retrieve at least a portion of a file from a compressed data archived image stored in a backup storage device. The compressed data archived image comprises a backup of a file system having a number of directories and a number of files. The compressed data archived image comprises a file that includes a compression of the number of files. An address of the at least the portion of the file within the compressed data archived image is determined. The at least the portion of the file is retrieved at the address in the compressed data archived image, without decompressing the compressed data archived image.
    Type: Grant
    Filed: April 28, 2016
    Date of Patent: August 24, 2021
    Assignee: NetApp, Inc.
    Inventors: Sisir Shekhar, Rakesh Bhargava M R, Krishna Murthy Chandraiah setty Narasingarayanapeta
  • Patent number: 11086551
    Abstract: Techniques are provided for freeing and utilizing unused inodes. For example, an operation, targeting a first storage object of a first node having a replication relationship with a second storage object of a second node, is intercepted. A replication operation is created as a replication of the operation. The operation is implemented upon the first storage object and the replication operation is implemented upon the second storage object. A determination is made that the replication operation uses an inode no longer used by storage objects of the second node. The inode targeted by the replication operation is freed and utilized based upon the inode being a leaf inode. If the inode is a stream directory inode, then data streams of the stream directory inode are moved under a new private inode and the stream directory inode is released.
    Type: Grant
    Filed: March 19, 2019
    Date of Patent: August 10, 2021
    Assignee: NetApp, Inc.
    Inventors: Krishna Murthy Chandraiah setty Narasingarayanapeta, Rakesh Bhargava M. R.
  • Publication number: 20210089557
    Abstract: Techniques are provided for dependency aware parallel splitting of operations. For example, a first operation and a second operation may be replicated in parallel from a first device to a second device if the operations only target a single common inode that is an access control list inode referenced by the operations. An operation that dereferences the access control list inode can be replicated in parallel with other operations if the operation does not have the potential to delete the access control list inode from the second device. In another example, operations may be replicated to the second device in parallel if the operations only affect a single common parent directory inode and where timestamps are only moved forward in time at the second device.
    Type: Application
    Filed: September 20, 2019
    Publication date: March 25, 2021
    Inventor: Krishna Murthy Chandraiah setty Narasingarayanapeta
  • Publication number: 20210081114
    Abstract: Techniques are provided for persistent hole reservation. For example, hole reservation flags of operations targeting a first storage object of a first node are replicated into replication operations targeting a second storage object of a second node during a transition operation to transition the first storage object and the second storage object from an asynchronous replication state to a synchronous replication state. In another example, the second storage object is grown to a size of a replication punch hole operation that failed due to targeting a file block number greater than an end of size of the second storage object.
    Type: Application
    Filed: November 30, 2020
    Publication date: March 18, 2021
    Inventors: Krishna Murthy Chandraiah setty Narasingarayanapeta, Rakesh Bhargava M.R.
  • Patent number: 10852985
    Abstract: Techniques are provided for persistent hole reservation. For example, hole reservation flags of operations targeting a first storage object of a first node are replicated into replication operations targeting a second storage object of a second node during a transition operation to transition the first storage object and the second storage object from an asynchronous replication state to a synchronous replication state. In another example, the second storage object is grown to a size of a replication punch hole operation that failed due to targeting a file block number greater than an end of size of the second storage object.
    Type: Grant
    Filed: March 19, 2019
    Date of Patent: December 1, 2020
    Assignee: NetApp Inc.
    Inventors: Krishna Murthy Chandraiah setty Narasingarayanapeta, Rakesh Bhargava M.R.
  • Publication number: 20200356274
    Abstract: Techniques are provided for handling misaligned holes and writes beyond end of files during a quick reconciliation process. During quick reconciliation, a read operation is performed to read data from a first storage object and is replicated to a second storage object. If the data read from the first storage object comprises misaligned holes, then a different range of data is read from the first storage object so that aligned holes are read and replicated to the second storage object. If the read operation targets a region beyond an end of the first storage object, then the second storage object is truncated to a size of the first storage object.
    Type: Application
    Filed: July 28, 2020
    Publication date: November 12, 2020
    Inventors: Akhil KAUSHIK, Anoop Chakkalakkal Vijayan, Krishna Murthy Chandraiah setty Narasingarayanapeta, Shrey Sengar
  • Publication number: 20200301588
    Abstract: Techniques are provided for freeing and utilizing unused inodes. For example, an operation, targeting a first storage object of a first node having a replication relationship with a second storage object of a second node, is intercepted. A replication operation is created as a replication of the operation. The operation is implemented upon the first storage object and the replication operation is implemented upon the second storage object. A determination is made that the replication operation uses an inode no longer used by storage objects of the second node. The inode targeted by the replication operation is freed and utilized based upon the inode being a leaf inode. If the inode is a stream directory inode, then data streams of the stream directory inode are moved under a new private inode and the stream directory inode is released.
    Type: Application
    Filed: March 19, 2019
    Publication date: September 24, 2020
    Inventors: Krishna Murthy Chandraiah setty Narasingarayanapeta, Rakesh Bhargava M.R.
  • Publication number: 20200301587
    Abstract: Techniques are provided for persistent hole reservation. For example, hole reservation flags of operations targeting a first storage object of a first node are replicated into replication operations targeting a second storage object of a second node during a transition operation to transition the first storage object and the second storage object from an asynchronous replication state to a synchronous replication state. In another example, the second storage object is grown to a size of a replication punch hole operation that failed due to targeting a file block number greater than an end of size of the second storage object.
    Type: Application
    Filed: March 19, 2019
    Publication date: September 24, 2020
    Inventors: Krishna Murthy Chandraiah setty Narasingarayanapeta, Rakesh Bhargava M.R.
  • Publication number: 20200301886
    Abstract: Techniques are provided for inofile management and access control list file handle parity. For example, operations targeting a first storage object of a first node are replicated to a second storage object of a second node. A size of an inofile maintained by the second node is increased if an inode number to be allocated by the replication operation is greater than a current size of the inofile. Access control list file handle parity is achieved by maintaining parity between inode number and generation number pairings of the first node and the second node.
    Type: Application
    Filed: March 19, 2019
    Publication date: September 24, 2020
    Inventors: Krishna Murthy Chandraiah setty Narasingarayanapeta, Harsha Handral Sridhara
  • Publication number: 20200301948
    Abstract: Techniques are provided for timestamp consistency. An operation targeting a first storage object having a synchronous replication relationship with a second storage object is intercepted. A timestamp is assigned to the operation. A replication operation is created as a replication of the operation. The same timestamp is assigned to the replication operation. The operation is implemented upon the first storage object and the replication operation is implemented upon the second storage object.
    Type: Application
    Filed: March 19, 2019
    Publication date: September 24, 2020
    Inventors: Krishna Murthy Chandraiah setty Narasingarayanapeta, Rakesh Bhargava M.R., Harsha Handral Sridhara
  • Publication number: 20200278791
    Abstract: Techniques are provided for handling misaligned holes and writes beyond end of files during a quick reconciliation process. During quick reconciliation, a read operation is performed to read data from a first storage object and is replicated to a second storage object. If the data read from the first storage object comprises misaligned holes, then a different range of data is read from the first storage object so that aligned holes are read and replicated to the second storage object. If the read operation targets a region beyond an end of the first storage object, then the second storage object is truncated to a size of the first storage object.
    Type: Application
    Filed: February 28, 2019
    Publication date: September 3, 2020
    Inventors: Akhil Kaushik, Anoop Chakkalakkal Vijayan, Krishna Murthy Chandraiah setty Narasingarayanapeta, Shrey Sengar
  • Patent number: 10761768
    Abstract: Techniques are provided for handling misaligned holes and writes beyond end of files during a quick reconciliation process. During quick reconciliation, a read operation is performed to read data from a first storage object and is replicated to a second storage object. If the data read from the first storage object comprises misaligned holes, then a different range of data is read from the first storage object so that aligned holes are read and replicated to the second storage object. If the read operation targets a region beyond an end of the first storage object, then the second storage object is truncated to a size of the first storage object.
    Type: Grant
    Filed: February 28, 2019
    Date of Patent: September 1, 2020
    Assignee: NetApp Inc.
    Inventors: Akhil Kaushik, Anoop Chakkalakkal Vijayan, Krishna Murthy Chandraiah setty Narasingarayanapeta, Shrey Sengar
  • Patent number: 10684918
    Abstract: One or more techniques and/or computing devices are provided for restarting a dump backup. For example, a phase offset table is used to track a directory transfer phase offset and a file transfer phase offset of phases of a dump backup. An offset map is used to map inodes, of data being backed up, to offsets within a backup image within which the data is being backed up. The phase offset table and/or the offset map are evaluated using a bytes written value to identify a phase during which the dump backup aborted and to identify a restart point. Accordingly, the dump backup is restarted at the restart point. In this way, the dump backup may be restarted during any phase and/or at any point using the bytes written value, the phase offset table, and the offset map without the need for additional information such as a file history.
    Type: Grant
    Filed: March 16, 2016
    Date of Patent: June 16, 2020
    Assignee: NetApp Inc.
    Inventors: Krishna Murthy Chandraiah setty Narasingarayanapeta, Vijay Srinath, Rakesh Bhargava M R
  • Publication number: 20200050587
    Abstract: Techniques are provided for resynchronizing a synchronous replication relationship. Asynchronous incremental transfers are performed to replicate data of a storage object to a replicated storage object. Incoming write requests, targeting the storage object, are logged into a dirty region log during a last asynchronous incremental transfer. Metadata operations, executed on the storage object, are logged into a metadata log during the last asynchronous incremental transfer. Sequence numbers are assigned to the metadata operations based upon an order of execution. The metadata operations are replicated to the replicated storage object for execution according to the sequence numbers, and the dirty regions are replicated to the replicated storage object in response to the metadata operations having been replicated to the replicated storage object.
    Type: Application
    Filed: May 2, 2019
    Publication date: February 13, 2020
    Inventors: Akhil Kaushik, Krishna Murthy Chandraiah setty Narasingarayanapeta
  • Publication number: 20200050687
    Abstract: Techniques are provided for resynchronizing a synchronous replication relationship. Asynchronous incremental transfers are performed to replicate data of a storage object to a replicated storage object. Incoming write requests, targeting the storage object, are logged into a dirty region log during a last asynchronous incremental transfer. Metadata operations, executed on the storage object, are logged into a metadata log during the last asynchronous incremental transfer. Sequence numbers are assigned to the metadata operations based upon an order of execution. The metadata operations are replicated to the replicated storage object for execution according to the sequence numbers, and the dirty regions are replicated to the replicated storage object in response to the metadata operations having been replicated to the replicated storage object.
    Type: Application
    Filed: November 15, 2018
    Publication date: February 13, 2020
    Inventors: Akhil Kaushik, Krishna Murthy Chandraiah setty Narasingarayanapeta
  • Publication number: 20190324862
    Abstract: One or more techniques and/or systems are provided for profiling a dataset. For example, a snapshot of a volume may be evaluated to identify a set of data characteristics, such as file and directory size information. A baseline dataset profile of a dataset of data within the volume may be constructed based upon the set of data characteristics. Histograms and graphs of directory counts and file counts may be constructed based upon the baseline dataset profile. An incremental dataset profile may be constructed for the dataset based upon an evaluation of the snapshot and a subsequent snapshot of the volume. Histograms and graphs of directories and files that are modified, created, and/or deleted may be constructed based upon the incremental dataset profile. Performance predictions, analytics, field diagnostics of performance issues, and/or scheduling of service execution may be implemented for a storage network hosting the volume based upon dataset profiles.
    Type: Application
    Filed: July 2, 2019
    Publication date: October 24, 2019
    Inventors: Krishna Murthy Chandraiah setty Narasingarayanapeta, Rakesh Bhargava M.R., Jose Mathew
  • Publication number: 20190311049
    Abstract: Techniques are provided for replay of metadata and data operations. During initial execution of operations, identifiers of objects modified by the execution of each operation are identified and stored in association with the operations. When the operations are to be replayed (e.g., executed again, such as part of a replication operation or as part of flushing content from a cache to persistent storage), the identifiers are evaluated to determine which operations are independent with respect to one another and which operations are dependent with respect to one another. In this way, independent operations are executed in parallel and dependent operations are executed serially with respect to the operations from the dependent operations depend.
    Type: Application
    Filed: April 4, 2018
    Publication date: October 10, 2019
    Inventors: Rakesh Bhargava M R, Krishna Murthy Chandraiah setty Narasingarayanapeta
  • Patent number: 10365973
    Abstract: One or more techniques and/or systems are provided for profiling a dataset. For example, a snapshot of a volume may be evaluated to identify a set of data characteristics, such as file and directory size information. A baseline dataset profile of a dataset of data within the volume may be constructed based upon the set of data characteristics. Histograms and graphs of directory counts and file counts may be constructed based upon the baseline dataset profile. An incremental dataset profile may be constructed for the dataset based upon an evaluation of the snapshot and a subsequent snapshot of the volume. Histograms and graphs of directories and files that are modified, created, and/or deleted may be constructed based upon the incremental dataset profile. Performance predictions, analytics, field diagnostics of performance issues, and/or scheduling of service execution may be implemented for a storage network hosting the volume based upon dataset profiles.
    Type: Grant
    Filed: May 1, 2017
    Date of Patent: July 30, 2019
    Assignee: NetApp Inc.
    Inventors: Krishna Murthy Chandraiah setty Narasingarayanapeta, Rakesh Bhargava M.R., Jose Mathew