Patents by Inventor Kshithij Iyer

Kshithij Iyer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240143338
    Abstract: An example method for prioritizing deployment of nodes in a cluster comprises: determining, at a first time and by a first node of a plurality of nodes in a cluster of a distributed storage system, that a second node having a higher priority than the first node is in a startup phase of the second node; determining, at a second time subsequent to the first time and by the first node, that the second node has completed the startup phase of the second node; and initiating, based on the determining that the second node has completed the startup phase and by the first node, a startup phase of the first node.
    Type: Application
    Filed: November 2, 2022
    Publication date: May 2, 2024
    Inventors: Naveen Revanna, Aditya Dani, Piyush Nimbalkar, Kshithij Iyer
  • Publication number: 20240146804
    Abstract: An example method for dynamic determination of locks for prioritized deployment in a distributed storage system comprises providing, by a storage management system, N locks to a cluster of a distributed storage system, the cluster including a plurality of nodes and the N locks allowing N nodes of the plurality of nodes to each initiate a startup phase during a first time window, wherein N is a number greater than zero; tracking, by the storage management system, application programming interface (API) calls made by the N nodes to a platform of the cluster during the first time window; and providing, by the storage management system based on the tracking, M locks to the cluster, the M locks allowing M nodes of the plurality of nodes to each initiate a startup phase during a second time window subsequent to the first time window, wherein M is a number greater than zero.
    Type: Application
    Filed: April 28, 2023
    Publication date: May 2, 2024
    Inventors: Naveen Revanna, Aditya Dani, Piyush Nimbalkar, Kshithij Iyer
  • Publication number: 20240037229
    Abstract: An example method for monitoring for security threats in a container system comprises: monitoring, by a container storage management system configured to manage storage resources for containerized applications deployed on one or more nodes within a container system, activity within the container system; detecting, by the container storage management system based on the monitoring, an anomaly associated with the activity; and determining, by the container storage management system based on the detecting the anomaly, that data stored by the one or more storage resources is possibly being targeted by a security threat.
    Type: Application
    Filed: July 28, 2022
    Publication date: February 1, 2024
    Inventors: Luis Pablo Pabón, Kshithij Iyer, Chun-Yi Su, Vijayan Satyamoorthy Srinivasa
  • Publication number: 20240037259
    Abstract: An example method for monitoring volume dependencies for security threats comprises: detecting a request to perform an operation with respect to a volume included in a plurality of volumes included in a storage system; determining, based on a dependency mapping that specifies dependencies between the plurality of volumes, that performance of the operation would affect a dependency between the volume and one or more other volumes included in the plurality of volumes; and determining, based on the determining that the performance of the operation would affect the dependency between the volume and the one or more other volumes, that the request is possibly associated with a security threat against data stored by the storage system.
    Type: Application
    Filed: July 28, 2022
    Publication date: February 1, 2024
    Inventors: Luis Pablo Pabón, Kshithij Iyer, Chun-Yi Su, Vijayan Satyamoorthy Srinivasa
  • Publication number: 20240004546
    Abstract: An example method for adjusting IO profiles in a distributed storage system comprises: determining, by a storage system that provides a volume as persistent storage for a container application running in a container system, a characteristic of the container application; and adjusting, by the storage system and based on the characteristic of the container application, an input/output (IO) profile of the volume.
    Type: Application
    Filed: June 30, 2022
    Publication date: January 4, 2024
    Inventors: Luis Pablo Pabón, Kshithij Iyer, Paul Theunis, Abhay Chavan
  • Publication number: 20230236939
    Abstract: An illustrative method includes accessing, by a controller operating within a global control plane, a recovery policy that specifies parameters for generating recovery data associated with one or more resources of a first cluster comprising a first one or more containers, wherein the first cluster comprises a first local control plane separate from the global control plane; determining, by the controller and based on the recovery policy, a second cluster comprising a second one or more containers, wherein the second cluster comprises a second local control plane separate from the global control plane; and generating, by the controller and with respect to the second cluster, the recovery data associated with the one or more resources of the first cluster.
    Type: Application
    Filed: January 25, 2022
    Publication date: July 27, 2023
    Inventors: Mohammed Umair Mufti, Kshithij Iyer, Ram Suradkar, Luis Pablo Pabón
  • Publication number: 20230229561
    Abstract: An illustrative method of container recovery using layer prioritization includes identifying a set of immutable layers of container images included in a dataset used by a container system to run containerized applications on a first cluster; copying the set of immutable layers of container images to a second cluster in preparation for a recovery event; receiving, after the set of immutable layers of container images are copied to the second cluster, a recovery request to recover the containerized applications; and copying, in response to the recovery request, a set of mutable layers included in the dataset to the second cluster, the second cluster configured to use the copied set of immutable layers and the copied set of mutable layers to recover the containerized applications on the second cluster.
    Type: Application
    Filed: July 26, 2022
    Publication date: July 20, 2023
    Inventors: Kshithij Iyer, Luis Pablo Pabón
  • Publication number: 20230195539
    Abstract: An illustrative method includes providing, by an orchestrator implemented on top of a plurality of clusters, a client-facing interface; receiving, by the orchestrator by way of the client-facing interface, a request to deploy a containerized application; selecting, by the orchestrator and based on the request, a cluster from the plurality of clusters; and deploying, by the orchestrator, the containerized application to the selected cluster.
    Type: Application
    Filed: September 19, 2022
    Publication date: June 22, 2023
    Inventors: Luis Pablo Pabón, Taher Vohra, Lakshmi Narasimhan Sundararajan, Kshithij Iyer