Patents by Inventor Rakesh Bhargava M.R.
Rakesh Bhargava M.R. has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230350758Abstract: Techniques are provided for volume group backup, volume group restore, and volume group garbage collection for volume groups backed up to an object store. A volume group workflow is implemented to orchestrate individual consistent volume workflows that are separately and individually implemented by nodes hosting constituent volumes of a volume group. The volume group workflow and the individual consistent volume workflows are performed to back up the volume group to the object store, restore a volume group backup from the object store to a restore destination, and/or perform garbage collection on slots of objects storing data unique to a volume group backup to delete.Type: ApplicationFiled: April 27, 2022Publication date: November 2, 2023Inventors: Rakesh Bhargava M.R., Murali Subramanian, Tijin George, Ching-Yuk Paul Ngan
-
Publication number: 20230350573Abstract: Techniques are provided for volume group backup, volume group restore, and volume group garbage collection for volume groups backed up to an object store. A volume group workflow is implemented to orchestrate individual consistent volume workflows that are separately and individually implemented by nodes hosting constituent volumes of a volume group. The volume group workflow and the individual consistent volume workflows are performed to back up the volume group to the object store, restore a volume group backup from the object store to a restore destination, and/or perform garbage collection on slots of objects storing data unique to a volume group backup to delete.Type: ApplicationFiled: April 27, 2022Publication date: November 2, 2023Inventors: Rakesh Bhargava M.R., Murali Subramanian, Tijin George, Ching-Yuk Pau Ngan
-
Publication number: 20230350801Abstract: Techniques are provided for volume group backup, volume group restore, and volume group garbage collection for volume groups backed up to an object store. A volume group workflow is implemented to orchestrate individual consistent volume workflows that are separately and individually implemented by nodes hosting constituent volumes of a volume group. The volume group workflow and the individual consistent volume workflows are performed to back up the volume group to the object store, restore a volume group backup from the object store to a restore destination, and/or perform garbage collection on slots of objects storing data unique to a volume group backup to delete.Type: ApplicationFiled: April 29, 2022Publication date: November 2, 2023Inventors: Rakesh Bhargava M.R., Murali Subramanian, Tijin George, Ching-Yuk Paul Ngan
-
Patent number: 11797213Abstract: Techniques are provided for freeing and utilizing unused inodes. For example, an operation, targeting a first storage object of a first node having a replication relationship with a second storage object of a second node, is intercepted. A replication operation is created as a replication of the operation. The operation is implemented upon the first storage object and the replication operation is implemented upon the second storage object. A determination is made that the replication operation uses an inode no longer used by storage objects of the second node. The inode targeted by the replication operation is freed and utilized based upon the inode being a leaf inode. If the inode is a stream directory inode, then data streams of the stream directory inode are moved under a new private inode and the stream directory inode is released.Type: GrantFiled: August 9, 2021Date of Patent: October 24, 2023Assignee: NetApp, Inc.Inventors: Krishna Murthy Chandraiah setty Narasingarayanapeta, Rakesh Bhargava M.R.
-
Publication number: 20230259529Abstract: Techniques are provided for selectively allowing or blocking services from utilizing snapshots. A splitter intercepts and assigns timestamps to operations for execution upon files of a file system. If a snapshot is created while there are no pending operation, then the snapshot is tagged to indicate that the snapshot was created while there were no pending operations, and the snapshot is considered a tagged snapshot. Otherwise, the snapshot is not tagged, and is considered an untagged snapshot. Storage services (e.g., backup applications, lifecycle management applications, applications that consider timestamps of files, etc.) are allowed to utilize tagged snapshots and are blocked from utilizes untagged snapshots in order to maintain consistency.Type: ApplicationFiled: April 28, 2023Publication date: August 17, 2023Inventors: Krishna Murthy Chandraiah setty Narasingarayanapeta, Rakesh Bhargava M.R.
-
Publication number: 20230012754Abstract: Techniques are provided for persistent hole reservation. For example, hole reservation flags of operations targeting a first storage object of a first node are replicated into replication operations targeting a second storage object of a second node during a transition operation to transition the first storage object and the second storage object from an asynchronous replication state to a synchronous replication state. In another example, the second storage object is grown to a size of a replication punch hole operation that failed due to targeting a file block number greater than an end of size of the second storage object.Type: ApplicationFiled: September 19, 2022Publication date: January 19, 2023Inventors: Krishna Murthy Chandraiah setty Narasingarayanapeta, Rakesh Bhargava M.R.
-
Publication number: 20220035837Abstract: Techniques are provided for timestamp consistency. An operation targeting a first storage object having a synchronous replication relationship with a second storage object is intercepted. A timestamp is assigned to the operation. A replication operation is created as a replication of the operation. The same timestamp is assigned to the replication operation. The operation is implemented upon the first storage object and the replication operation is implemented upon the second storage object.Type: ApplicationFiled: October 18, 2021Publication date: February 3, 2022Inventors: Krishna Murthy Chandraiah setty Narasingarayanapeta, Rakesh Bhargava M.R., Harsha Handral Sridhara
-
Publication number: 20210365187Abstract: Techniques are provided for freeing and utilizing unused inodes. For example, an operation, targeting a first storage object of a first node having a replication relationship with a second storage object of a second node, is intercepted. A replication operation is created as a replication of the operation. The operation is implemented upon the first storage object and the replication operation is implemented upon the second storage object. A determination is made that the replication operation uses an inode no longer used by storage objects of the second node. The inode targeted by the replication operation is freed and utilized based upon the inode being a leaf inode. If the inode is a stream directory inode, then data streams of the stream directory inode are moved under a new private inode and the stream directory inode is released.Type: ApplicationFiled: August 9, 2021Publication date: November 25, 2021Inventors: Krishna Murthy Chandraiah setty Narasingarayanapeta, Rakesh Bhargava M.R.
-
Patent number: 11151162Abstract: Techniques are provided for timestamp consistency. An operation targeting a first storage object having a synchronous replication relationship with a second storage object is intercepted. A timestamp is assigned to the operation. A replication operation is created as a replication of the operation. The same timestamp is assigned to the replication operation. The operation is implemented upon the first storage object and the replication operation is implemented upon the second storage object.Type: GrantFiled: March 19, 2019Date of Patent: October 19, 2021Assignee: NetApp Inc.Inventors: Krishna Murthy Chandraiah setty Narasingarayanapeta, Rakesh Bhargava M.R., Harsha Handral Sridhara
-
Publication number: 20210081114Abstract: Techniques are provided for persistent hole reservation. For example, hole reservation flags of operations targeting a first storage object of a first node are replicated into replication operations targeting a second storage object of a second node during a transition operation to transition the first storage object and the second storage object from an asynchronous replication state to a synchronous replication state. In another example, the second storage object is grown to a size of a replication punch hole operation that failed due to targeting a file block number greater than an end of size of the second storage object.Type: ApplicationFiled: November 30, 2020Publication date: March 18, 2021Inventors: Krishna Murthy Chandraiah setty Narasingarayanapeta, Rakesh Bhargava M.R.
-
Patent number: 10852985Abstract: Techniques are provided for persistent hole reservation. For example, hole reservation flags of operations targeting a first storage object of a first node are replicated into replication operations targeting a second storage object of a second node during a transition operation to transition the first storage object and the second storage object from an asynchronous replication state to a synchronous replication state. In another example, the second storage object is grown to a size of a replication punch hole operation that failed due to targeting a file block number greater than an end of size of the second storage object.Type: GrantFiled: March 19, 2019Date of Patent: December 1, 2020Assignee: NetApp Inc.Inventors: Krishna Murthy Chandraiah setty Narasingarayanapeta, Rakesh Bhargava M.R.
-
Publication number: 20200301948Abstract: Techniques are provided for timestamp consistency. An operation targeting a first storage object having a synchronous replication relationship with a second storage object is intercepted. A timestamp is assigned to the operation. A replication operation is created as a replication of the operation. The same timestamp is assigned to the replication operation. The operation is implemented upon the first storage object and the replication operation is implemented upon the second storage object.Type: ApplicationFiled: March 19, 2019Publication date: September 24, 2020Inventors: Krishna Murthy Chandraiah setty Narasingarayanapeta, Rakesh Bhargava M.R., Harsha Handral Sridhara
-
Publication number: 20200301588Abstract: Techniques are provided for freeing and utilizing unused inodes. For example, an operation, targeting a first storage object of a first node having a replication relationship with a second storage object of a second node, is intercepted. A replication operation is created as a replication of the operation. The operation is implemented upon the first storage object and the replication operation is implemented upon the second storage object. A determination is made that the replication operation uses an inode no longer used by storage objects of the second node. The inode targeted by the replication operation is freed and utilized based upon the inode being a leaf inode. If the inode is a stream directory inode, then data streams of the stream directory inode are moved under a new private inode and the stream directory inode is released.Type: ApplicationFiled: March 19, 2019Publication date: September 24, 2020Inventors: Krishna Murthy Chandraiah setty Narasingarayanapeta, Rakesh Bhargava M.R.
-
Publication number: 20200301587Abstract: Techniques are provided for persistent hole reservation. For example, hole reservation flags of operations targeting a first storage object of a first node are replicated into replication operations targeting a second storage object of a second node during a transition operation to transition the first storage object and the second storage object from an asynchronous replication state to a synchronous replication state. In another example, the second storage object is grown to a size of a replication punch hole operation that failed due to targeting a file block number greater than an end of size of the second storage object.Type: ApplicationFiled: March 19, 2019Publication date: September 24, 2020Inventors: Krishna Murthy Chandraiah setty Narasingarayanapeta, Rakesh Bhargava M.R.
-
Publication number: 20190324862Abstract: One or more techniques and/or systems are provided for profiling a dataset. For example, a snapshot of a volume may be evaluated to identify a set of data characteristics, such as file and directory size information. A baseline dataset profile of a dataset of data within the volume may be constructed based upon the set of data characteristics. Histograms and graphs of directory counts and file counts may be constructed based upon the baseline dataset profile. An incremental dataset profile may be constructed for the dataset based upon an evaluation of the snapshot and a subsequent snapshot of the volume. Histograms and graphs of directories and files that are modified, created, and/or deleted may be constructed based upon the incremental dataset profile. Performance predictions, analytics, field diagnostics of performance issues, and/or scheduling of service execution may be implemented for a storage network hosting the volume based upon dataset profiles.Type: ApplicationFiled: July 2, 2019Publication date: October 24, 2019Inventors: Krishna Murthy Chandraiah setty Narasingarayanapeta, Rakesh Bhargava M.R., Jose Mathew
-
Patent number: 10365973Abstract: One or more techniques and/or systems are provided for profiling a dataset. For example, a snapshot of a volume may be evaluated to identify a set of data characteristics, such as file and directory size information. A baseline dataset profile of a dataset of data within the volume may be constructed based upon the set of data characteristics. Histograms and graphs of directory counts and file counts may be constructed based upon the baseline dataset profile. An incremental dataset profile may be constructed for the dataset based upon an evaluation of the snapshot and a subsequent snapshot of the volume. Histograms and graphs of directories and files that are modified, created, and/or deleted may be constructed based upon the incremental dataset profile. Performance predictions, analytics, field diagnostics of performance issues, and/or scheduling of service execution may be implemented for a storage network hosting the volume based upon dataset profiles.Type: GrantFiled: May 1, 2017Date of Patent: July 30, 2019Assignee: NetApp Inc.Inventors: Krishna Murthy Chandraiah setty Narasingarayanapeta, Rakesh Bhargava M.R., Jose Mathew
-
Publication number: 20170235644Abstract: One or more techniques and/or systems are provided for profiling a dataset. For example, a snapshot of a volume may be evaluated to identify a set of data characteristics, such as file and directory size information. A baseline dataset profile of a dataset of data within the volume may be constructed based upon the set of data characteristics. Histograms and graphs of directory counts and file counts may be constructed based upon the baseline dataset profile. An incremental dataset profile may be constructed for the dataset based upon an evaluation of the snapshot and a subsequent snapshot of the volume. Histograms and graphs of directories and files that are modified, created, and/or deleted may be constructed based upon the incremental dataset profile. Performance predictions, analytics, field diagnostics of performance issues, and/or scheduling of service execution may be implemented for a storage network hosting the volume based upon dataset profiles.Type: ApplicationFiled: May 1, 2017Publication date: August 17, 2017Inventors: Krishna Murthy Chandraiah setty Narasingarayanapeta, Rakesh Bhargava M.R., Jose Mathew
-
Publication number: 20170060667Abstract: One or more techniques and/or systems are provided for profiling a dataset. For example, a snapshot of a volume may be evaluated to identify a set of data characteristics, such as file and directory size information. A baseline dataset profile of a dataset of data within the volume may be constructed based upon the set of data characteristics. Histograms and graphs of directory counts and file counts may be constructed based upon the baseline dataset profile. An incremental dataset profile may be constructed for the dataset based upon an evaluation of the snapshot and a subsequent snapshot of the volume. Histograms and graphs of directories and files that are modified, created, and/or deleted may be constructed based upon the incremental dataset profile. Performance predictions, analytics, field diagnostics of performance issues, and/or scheduling of service execution may be implemented for a storage network hosting the volume based upon dataset profiles.Type: ApplicationFiled: August 26, 2015Publication date: March 2, 2017Inventors: Krishna Murthy Chandraiah setty Narasingarayanapeta, Rakesh Bhargava M.R., Jose Mathew