Patents by Inventor Partha Sarathi Seetala
Partha Sarathi Seetala has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11947489Abstract: A new snapshot of a storage volume is created by instructing computing nodes to suppress write requests. Once pending write requests from the computing nodes are completed, storage nodes create a new snapshot for the storage volume by allocating a new segment to the new snapshot and finalizes and performs garbage collection with respect to segments allocated to the previous snapshot. Subsequent write requests to the storage volume are then performed on the segments allocated to the new snapshot. A segment maps segments to a particular snapshot and metadata stored in the segment indicates storage volume addresses of data written to the segment. The snapshots may be represented by a storage manager in a hierarchy that identifies an ordering of snapshots and branches to clone snapshots.Type: GrantFiled: September 5, 2017Date of Patent: April 2, 2024Assignee: Robin Systems, Inc.Inventors: Dhanashankar Venkatesan, Partha Sarathi Seetala, Gurmeet Singh
-
Patent number: 11556361Abstract: A bundled application includes a plurality of entities such as logical storage volumes, application instances, pods, clusters, and computing nodes that are dependent on one another. Dependencies of the bundled application on individual entities is determined and quantified. Impact of failure of an entity may be determined using the dependencies. Dependency may be determined with reference to redundancy among entities. Usage of an entity by other entities and potential redistribution may be determined.Type: GrantFiled: December 9, 2020Date of Patent: January 17, 2023Assignee: Robin Systems, Inc.Inventors: Partha Sarathi Seetala, Raghavendra Pandimakki Ganesha, Lakshay Badlani, Manjunath Mageswaran
-
Publication number: 20220179671Abstract: A bundled application includes a plurality of entities such as logical storage volumes, application instances, pods, clusters, and computing nodes that are dependent on one another. Dependencies of the bundled application on individual entities is determined and quantified. Impact of failure of an entity may be determined using the dependencies. Dependency may be determined with reference to redundancy among entities. Usage of an entity by other entities and potential redistribution may be determined.Type: ApplicationFiled: December 9, 2020Publication date: June 9, 2022Inventors: Partha Sarathi Seetala, Raghavendra Pandimakki Ganesha, Lakshay Badlani, Manjunath Mageswaran
-
Patent number: 11086725Abstract: A new snapshot of a storage volume is created by instructing computing nodes to suppress write requests. An orchestration layer implements a multi-role application that is provisioned with virtualized storage and computation resources. A snapshot of the application may be created and used to rollback or clone the application. Clones snapshots of storage volumes may be gradually populated with data from prior snapshots to reduce loading on a primary snapshot. A multi-role application may be orchestrated using multiple orchestration approaches and objects of the multi-role application may be discovered and added to an application definition. The application definition may be used to create snapshots of the application and the snapshot may be used to rollback, clone, backup, or migrate the application.Type: GrantFiled: March 25, 2019Date of Patent: August 10, 2021Assignee: Robin Systems, Inc.Inventors: Ravi Kumar Alluboyina, Tushar Doshi, Partha Sarathi Seetala, Ripulkumar Hemantbhai Patel, Jagadish Kumar Mukku
-
Publication number: 20200310915Abstract: A new snapshot of a storage volume is created by instructing computing nodes to suppress write requests. An orchestration layer implements a multi-role application that is provisioned with virtualized storage and computation resources. A snapshot of the application may be created and used to rollback or clone the application. Clones snapshots of storage volumes may be gradually populated with data from prior snapshots to reduce loading on a primary snapshot. A multi-role application may be orchestrated using multiple orchestration approaches and objects of the multi-role application may be discovered and added to an application definition. The application definition may be used to create snapshots of the application and the snapshot may be used to rollback, clone, backup, or migrate the application.Type: ApplicationFiled: March 25, 2019Publication date: October 1, 2020Inventors: Ravi Kumar Alluboyina, Tushar Doshi, Partha Sarathi Seetala, Ripulkumar Hemantbhai Patel, Jagadish Kumar Mukku
-
Patent number: 10579276Abstract: A storage scheme allocates portions of a logical volume to storage nodes in excess of the capacity of the storage nodes. Slices of the storage nodes and segments of slices are allocated in response to write requests such that actual allocation on the storage nodes is only in response to usage. Segments are identified with virtual segment identifiers that are retained when segments are moved to a different storage node. Logical volumes may therefore be moved seamlessly to different storage nodes to ensure sufficient storage capacity. Data is written to new locations in segments having space and a block map tracks the last segment to which data for a given address is written. Garbage collection is performed to free segments that contain invalid data, i.e. data for addresses that have been subsequently written to.Type: GrantFiled: September 13, 2017Date of Patent: March 3, 2020Assignee: ROBIN SYSTEMS, INC.Inventors: Dhanashankar Venkatesan, Partha Sarathi Seetala
-
Patent number: 10534549Abstract: A system maintains a consistency database that maintains a status (current, down, stale) for copies of logical storage volumes stored on storage nodes. As failures are detected, the consistency database is updated. Copies are synchronized with one another using information in the consistency database. Write operations on a primary node for a slice of a logical storage node are assigned a virtual block address (VBA) that is mapped to a logical block address (LBA) within the slice. Consistency of the VBAs of the primary node and that of a secondary node is evaluated and used to detect currency. VBA holes are detected and corresponding write commands resent to maintain currency. Physical segments on the primary node are assigned virtual segment identifiers (VSID) that are maintained consistent with VSIDs on clone nodes so that they can be used for garbage collection and synchronization.Type: GrantFiled: September 19, 2017Date of Patent: January 14, 2020Assignee: ROBIN SYSTEMS, INC.Inventors: Gurmeet Singh, Ripulkumar Hemantbhai Patel, Partha Sarathi Seetala
-
Patent number: 10452267Abstract: A storage scheme allocates portions of a logical volume to storage nodes in excess of the capacity of the storage nodes. Slices of the storage nodes and segments of slices are allocated in response to write requests such that actual allocation on the storage nodes is only in response to usage. Segments are identified with virtual segment identifiers that are retained when segments are moved to a different storage node. Logical volumes may therefore be moved seamlessly to different storage nodes to ensure sufficient storage capacity. Data is written to new locations in segments having space and a block map tracks the last segment to which data for a given address is written. Garbage collection is performed to free segments that contain invalid data, i.e. data for addresses that have been subsequently written to.Type: GrantFiled: September 13, 2017Date of Patent: October 22, 2019Assignee: ROBIN SYSTEMS, INC.Inventors: Gurmeet Singh, Dhanashankar Venkatesan, Partha Sarathi Seetala
-
Patent number: 10430105Abstract: A storage scheme allocates portions of a logical volume to storage nodes in excess of the capacity of the storage nodes. Slices of the storage nodes and segments of slices are allocated in response to write requests such that actual allocation on the storage nodes is only in response to usage. Segments are identified with virtual segment identifiers that are retained when segments are moved to a different storage node. Logical volumes may therefore be moved seamlessly to different storage nodes to ensure sufficient storage capacity. Data is written to new locations in segments having space and a block map tracks the last segment to which data for a given address is written. Garbage collection is performed to free segments that contain invalid data, i.e. data for addresses that have been subsequently written to.Type: GrantFiled: September 13, 2017Date of Patent: October 1, 2019Assignee: ROBIN SYSTEMS, INC.Inventors: Dhanashankar Venkatesan, Partha Sarathi Seetala
-
Patent number: 10423344Abstract: A system maintains a consistency database that maintains a status (current, down, stale) for copies of logical storage volumes stored on storage nodes. As failures are detected, the consistency database is updated. Copies are synchronized with one another using information in the consistency database. Write operations on a primary node for a slice of a logical storage node are assigned a virtual block address (VBA) that is mapped to a logical block address (LBA) within the slice. Consistency of the VBAs of the primary node and that of a secondary node is evaluated and used to detect currency. VBA holes are detected and corresponding write commands resent to maintain currency. Physical segments on the primary node are assigned virtual segment identifiers (VSID) that are maintained consistent with VSIDs on clone nodes so that they can be used for garbage collection and synchronization.Type: GrantFiled: September 19, 2017Date of Patent: September 24, 2019Assignee: ROBIN SYSTEMS, INC.Inventors: Gurmeet Singh, Ripulkumar Hemantbhai Patel, Partha Sarathi Seetala
-
Publication number: 20190138244Abstract: A distributed storage schemes manages implementation of QoS targets for IOPs across compute nodes executing applications, primary storage nodes storing a primary copy of a logical storage volume, and clone storage nodes. On the compute node, a maximum priority is assigned to a minimum number of IOPs in a queue within a time window from a time of receipt of a last unexecuted IOP. Other IOPs are assigned a minimum priority. On the storage node, maximum priority IOPs are assigned to high priority queues, from which IOPs are executed first, and low priority IOPs are assigned to low priority queues. Methods for determining the capacity of storage nodes and allocating storage requests are also disclosed.Type: ApplicationFiled: November 8, 2017Publication date: May 9, 2019Inventors: Gurmeet Singh, Partha Sarathi Seetala
-
Publication number: 20190087104Abstract: A system maintains a consistency database that maintains a status (current, down, stale) for copies of logical storage volumes stored on storage nodes. As failures are detected, the consistency database is updated. Copies are synchronized with one another using information in the consistency database. Write operations on a primary node for a slice of a logical storage node are assigned a virtual block address (VBA) that is mapped to a logical block address (LBA) within the slice. Consistency of the VBAs of the primary node and that of a secondary node is evaluated and used to detect currency. VBA holes are detected and corresponding write commands resent to maintain currency. Physical segments on the primary node are assigned virtual segment identifiers (VSID) that are maintained consistent with VSIDs on clone nodes so that they can be used for garbage collection and synchronization.Type: ApplicationFiled: September 19, 2017Publication date: March 21, 2019Inventors: Gurmeet Singh, Ripulkumar Hemantbhai Patel, Partha Sarathi Seetala
-
Publication number: 20190087105Abstract: A system maintains a consistency database that maintains a status (current, down, stale) for copies of logical storage volumes stored on storage nodes. As failures are detected, the consistency database is updated. Copies are synchronized with one another using information in the consistency database. Write operations on a primary node for a slice of a logical storage node are assigned a virtual block address (VBA) that is mapped to a logical block address (LBA) within the slice. Consistency of the VBAs of the primary node and that of a secondary node is evaluated and used to detect currency. VBA holes are detected and corresponding write commands resent to maintain currency. Physical segments on the primary node are assigned virtual segment identifiers (VSID) that are maintained consistent with VSIDs on clone nodes so that they can be used for garbage collection and synchronization.Type: ApplicationFiled: September 19, 2017Publication date: March 21, 2019Inventors: Gurmeet Singh, Ripulkumar Hemantbhai Patel, Partha Sarathi Seetala
-
Publication number: 20190079692Abstract: A storage scheme allocates portions of a logical volume to storage nodes in excess of the capacity of the storage nodes. Slices of the storage nodes and segments of slices are allocated in response to write requests such that actual allocation on the storage nodes is only in response to usage. Segments are identified with virtual segment identifiers that are retained when segments are moved to a different storage node. Logical volumes may therefore be moved seamlessly to different storage nodes to ensure sufficient storage capacity. Data is written to new locations in segments having space and a block map tracks the last segment to which data for a given address is written. Garbage collection is performed to free segments that contain invalid data, i.e. data for addresses that have been subsequently written to.Type: ApplicationFiled: September 13, 2017Publication date: March 14, 2019Inventors: Dhanashankar Venkatesan, Partha Sarathi Seetala
-
Publication number: 20190079674Abstract: A storage scheme allocates portions of a logical volume to storage nodes in excess of the capacity of the storage nodes. Slices of the storage nodes and segments of slices are allocated in response to write requests such that actual allocation on the storage nodes is only in response to usage. Segments are identified with virtual segment identifiers that are retained when segments are moved to a different storage node. Logical volumes may therefore be moved seamlessly to different storage nodes to ensure sufficient storage capacity. Data is written to new locations in segments having space and a block map tracks the last segment to which data for a given address is written. Garbage collection is performed to free segments that contain invalid data, i.e. data for addresses that have been subsequently written to.Type: ApplicationFiled: September 13, 2017Publication date: March 14, 2019Inventors: Gurmeet Singh, Dhanashankar Vankatesan, Partha Sarathi Seetala
-
Publication number: 20190079679Abstract: A storage scheme allocates portions of a logical volume to storage nodes in excess of the capacity of the storage nodes. Slices of the storage nodes and segments of slices are allocated in response to write requests such that actual allocation on the storage nodes is only in response to usage. Segments are identified with virtual segment identifiers that are retained when segments are moved to a different storage node. Logical volumes may therefore be moved seamlessly to different storage nodes to ensure sufficient storage capacity. Data is written to new locations in segments having space and a block map tracks the last segment to which data for a given address is written. Garbage collection is performed to free segments that contain invalid data, i.e. data for addresses that have been subsequently written to.Type: ApplicationFiled: September 13, 2017Publication date: March 14, 2019Inventors: Dhanashankar Venkatesan, Partha Sarathi Seetala
-
Publication number: 20190073270Abstract: A new snapshot of a storage volume is created by instructing computing nodes to suppress write requests. Once pending write requests from the computing nodes are completed, storage nodes create a new snapshot for the storage volume by allocating a new segment to the new snapshot and finalizes and performs garbage collection with respect to segments allocated to the previous snapshot. Subsequent write requests to the storage volume are then performed on the segments allocated to the new snapshot. A segment maps segments to a particular snapshot and metadata stored in the segment indicates storage volume addresses of data written to the segment. The snapshots may be represented by a storage manager in a hierarchy that identifies an ordering of snapshots and branches to clone snapshots.Type: ApplicationFiled: September 5, 2017Publication date: March 7, 2019Inventors: Dhanashankar Venkatesan, Partha Sarathi Seetala, Gurmeet Singh
-
Publication number: 20190073372Abstract: A new snapshot of a storage volume is created by instructing computing nodes to suppress write requests. Once pending write requests from the computing nodes are completed, storage nodes create a new snapshot for the storage volume by allocating a new segment to the new snapshot and finalizes and performs garbage collection with respect to segments allocated to the previous snapshot. Subsequent write requests to the storage volume are then performed on the segments allocated to the new snapshot. A segment maps segments to a particular snapshot and metadata stored in the segment indicates storage volume addresses of data written to the segment. The snapshots may be represented by a storage manager in a hierarchy that identifies an ordering of snapshots and branches to clone snapshots.Type: ApplicationFiled: September 5, 2017Publication date: March 7, 2019Inventors: Dhanashankar Venkatesan, Partha Sarathi Seetala, Gurmeet Singh