Patents by Inventor Shyamsundar Ranganathan
Shyamsundar Ranganathan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11658982Abstract: Efficient authentication in a file system with multiple security groups is disclosed. A file system (FS) executing on at least one processor device receives, from a first client application of a plurality of client applications, a request to access a first object, the request including a unique object ID that identifies the first object. The FS determines, based on a data structure maintained by the FS and inaccessible to the first client application, that the first client application is associated with a first security group of a plurality of different security groups. The FS determines, based on metadata of the first object, that the first object is associated with the first security group, and grants the first client application access to the first object.Type: GrantFiled: October 6, 2017Date of Patent: May 23, 2023Assignee: Red Hat, Inc.Inventors: Shyamsundar Ranganathan, Jeffrey Darcy, Pranith K. Karampuri, Vijay Bellur
-
Patent number: 11243918Abstract: Systems and methods for enforcing consistency of file to storage node mappings in distributed file systems. An example method may include: receiving a request to perform a file operation with respect to a file associated with a directory of a distributed file system; identifying a directory layout version number associated with the directory; identifying a volume layout version number associated with a volume in which the directory resides; and responsive to determining that the directory layout version number matches the volume layout version number, performing the requested file operation with respect to the file.Type: GrantFiled: January 3, 2019Date of Patent: February 8, 2022Assignee: Red Hat, Inc.Inventors: Raghavendra Gowdappa, Shyamsundar Ranganathan, Jeffrey Jon Darcy
-
Publication number: 20210173818Abstract: Systems and methods for reducing locks on a storage layout of a distributed file system by detecting and notifying clients of stale storage layouts. An example method may comprise: receiving a request to modify a file system object associated with a storage layout, the request comprising an index range and the storage layout comprising an index range; determining whether the request is associated with a stale storage layout in view of a comparison of the index range of the request and the one or more index ranges of the storage layout; receiving a lock request to prevent changes to the storage layout; and transmitting at least a portion of the storage layout to update the stale storage layout.Type: ApplicationFiled: February 18, 2021Publication date: June 10, 2021Inventors: Raghavendra Gowdappa, Shyamsundar Ranganathan
-
Patent number: 10929357Abstract: Systems and methods for reducing locks on a storage layout of a distributed file system by detecting and notifying clients of stale storage layouts. An example method may comprise: receiving a request to modify a file system object associated with a storage layout, the request comprising an index range and the storage layout comprising an index range; determining whether the request is associated with a stale storage layout in view of a comparison of the index range of the request and the one or more index ranges of the storage layout; receiving a lock request to prevent changes to the storage layout; and transmitting at least a portion of the storage layout to update the stale storage layout.Type: GrantFiled: May 25, 2016Date of Patent: February 23, 2021Assignee: Red Hat, Inc.Inventors: Raghavendra Gowdappa, Shyamsundar Ranganathan
-
Patent number: 10810168Abstract: Systems and methods for allocating file system metadata to storage nodes of a distributed file system. An example method may include: defining, by a processing device, a plurality of tokens, wherein each token comprises a sequence of bits; associating each token of the plurality of tokens with a metadata node of a cluster of metadata nodes; receiving a request to create a directory; selecting, among the plurality of tokens, a token associated with the directory; generating a directory identifier comprising the selected token; and creating, on a metadata node associated with the selected token, a directory record comprising the directory identifier.Type: GrantFiled: November 24, 2015Date of Patent: October 20, 2020Assignee: Red Hat, Inc.Inventors: Jeffrey Jon Darcy, Shyamsundar Ranganathan
-
Publication number: 20190138502Abstract: Systems and methods for enforcing consistency of file to storage node mappings in distributed file systems. An example method may include: receiving a request to perform a file operation with respect to a file associated with a directory of a distributed file system; identifying a directory layout version number associated with the directory; identifying a volume layout version number associated with a volume in which the directory resides; and responsive to determining that the directory layout version number matches the volume layout version number, performing the requested file operation with respect to the file.Type: ApplicationFiled: January 3, 2019Publication date: May 9, 2019Inventors: Raghavendra Gowdappa, Shyamsundar Ranganathan, Jeffrey Jon Darcy
-
Publication number: 20190109852Abstract: Efficient authentication in a file system with multiple security groups is disclosed. A file system (FS) executing on at least one processor device receives, from a first client application of a plurality of client applications, a request to access a first object, the request including a unique object ID that identifies the first object. The FS determines, based on a data structure maintained by the FS and inaccessible to the first client application, that the first client application is associated with a first security group of a plurality of different security groups. The FS determines, based on metadata of the first object, that the first object is associated with the first security group, and grants the first client application access to the first object.Type: ApplicationFiled: October 6, 2017Publication date: April 11, 2019Inventors: Shyamsundar Ranganathan, Jeffrey Darcy, Pranith K. Karampuri, Vijay Bellur
-
Patent number: 10210174Abstract: Systems and methods for enforcing consistency of file to storage node mappings in distributed file systems. An example method may include: receiving a request to perform a file operation with respect to a file associated with a volume of a distributed file system; identifying, among a plurality of storage nodes of the distributed file system, a storage node associated with the file; obtaining a lock of a layout of the volume; and responsive to determining, by a processing device, that a directory layout version number matches a volume layout version number, performing the requested file operation with respect to the file.Type: GrantFiled: December 17, 2015Date of Patent: February 19, 2019Assignee: Red Hat, Inc.Inventors: Raghavendra Gowdappa, Shyamsundar Ranganathan, Jeffrey Jon Darcy
-
Publication number: 20170249327Abstract: Systems and methods for reducing locks on a storage layout of a distributed file system by detecting and notifying clients of stale storage layouts. An example method may comprise: receiving a request to modify a file system object associated with a storage layout, the request comprising an index range and the storage layout comprising an index range; determining whether the request is associated with a stale storage layout in view of a comparison of the index range of the request and the one or more index ranges of the storage layout; receiving a lock request to prevent changes to the storage layout; and transmitting at least a portion of the storage layout to update the stale storage layout.Type: ApplicationFiled: May 25, 2016Publication date: August 31, 2017Inventors: Raghavendra Gowdappa, Shyamsundar Ranganathan
-
Publication number: 20170177611Abstract: Systems and methods for enforcing consistency of file to storage node mappings in distributed file systems. An example method may include: receiving a request to perform a file operation with respect to a file associated with a volume of a distributed file system; identifying, among a plurality of storage nodes of the distributed file system, a storage node associated with the file; obtaining a lock of a layout of the volume; and responsive to determining, by a processing device, that a directory layout version number matches a volume layout version number, performing the requested file operation with respect to the file.Type: ApplicationFiled: December 17, 2015Publication date: June 22, 2017Inventors: Raghavendra Gowdappa, Shyamsundar Ranganathan, Jeffrey Jon Darcy
-
Publication number: 20170147602Abstract: Systems and methods for allocating file system metadata to storage nodes of a distributed file system. An example method may include: defining, by a processing device, a plurality of tokens, wherein each token comprises a sequence of bits; associating each token of the plurality of tokens with a metadata node of a cluster of metadata nodes; receiving a request to create a directory; selecting, among the plurality of tokens, a token associated with the directory; generating a directory identifier comprising the selected token; and creating, on a metadata node associated with the selected token, a directory record comprising the directory identifier.Type: ApplicationFiled: November 24, 2015Publication date: May 25, 2017Inventors: Jeffrey Jon Darcy, Shyamsundar Ranganathan
-
Patent number: 9270459Abstract: Techniques for achieving tenant data confidentiality in a cloud environment are presented. A daemon process within a Tenant Storage Machine (TSM) manages a key store for a particular tenant of a cloud storage environment having multiple other tenants. Just TSM storage processes are given access to the key store. Data is decrypted for the particular tenant when access is needed and data is encrypted using encryption keys of the key store when written in the cloud storage environment.Type: GrantFiled: September 12, 2012Date of Patent: February 23, 2016Assignee: CloudByte, Inc.Inventors: Umasankar Mukkara, Felix Xavier, Shyamsundar Ranganathan
-
Patent number: 9218264Abstract: Techniques for translating Service Level Agreement (SLA) policy into storage controller requirements within a cloud storage environment are presented. System resource metrics for a storage controller are derived. The SLA policy is defined in terms of SLA parameters. Heuristics are used to translate the SLA parameters into defined percentages of system resources for the storage controller, which are compared to the system resource metrics and adjustments are updates are made as needed.Type: GrantFiled: September 18, 2012Date of Patent: December 22, 2015Assignee: CloudByte, Inc.Inventors: Felix Xavier, Umasankar Mukkara, Shyamsundar Ranganathan
-
Publication number: 20130073806Abstract: Techniques for translating Service Level Agreement (SLA) policy into storage controller requirements within a cloud storage environment are presented. System resource metrics for a storage controller are derived. The SLA policy is defined in terms of SLA parameters. Heuristics are used to translate the SLA parameters into defined percentages of system resources for the storage controller, which are compared to the system resource metrics and adjustments are updates are made as needed.Type: ApplicationFiled: September 18, 2012Publication date: March 21, 2013Applicant: CLOUDBYTE, INC.Inventors: Felix Xavier, Umasankar Mukkara, Shyamsundar Ranganathan
-
Publication number: 20120328105Abstract: Techniques for achieving tenant data confidentiality in a cloud environment are presented. A daemon process within a Tenant Storage Machine (TSM) manages a key store for a particular tenant of a cloud storage environment having multiple other tenants. Just TSM storage processes are given access to the key store. Data is decrypted for the particular tenant when access is needed and data is encrypted using encryption keys of the key store when written in the cloud storage environment.Type: ApplicationFiled: September 12, 2012Publication date: December 27, 2012Applicant: CloudByte,Inc.Inventors: Umasankar Mukkara, Felix Xavier, Shyamsundar Ranganathan
-
Patent number: 8082227Abstract: Techniques for the session sensitive data backups and restores are presented. Data having a plurality of hard linked file references are backed up and restored once during a backup operation. Any modifications to the backed up data are noted as session-specific versions and also backed up once. The hard linked file references are maintained in a data structure and managed during backups to define associations to the backed up data and to the session-specific versions of the data. The data structure is also used during restores to re-establish desired hard linked file reference associations to either the backed up data or to a particular session-specific versions of the data.Type: GrantFiled: June 26, 2007Date of Patent: December 20, 2011Assignee: EMC CorporationInventors: Kalidas Balakrishnan, Shyamsundar Ranganathan
-
Publication number: 20110191291Abstract: Techniques for the session sensitive data backups and restores are presented. Data having a plurality of hard linked file references are backed up and restored once during a backup operation. Any modifications to the backed up data are noted as session-specific versions and also backed up once. The hard linked file references are maintained in a data structure and managed during backups to define associations to the backed up data and to the session-specific versions of the data. The data structure is also used during restores to re-establish desired hard linked file reference associations to either the backed up data or to a particular session -specific versions of the data.Type: ApplicationFiled: June 26, 2007Publication date: August 4, 2011Applicant: Novell, Inc.Inventors: Kalidas Balakrishnan, Shyamsundar Ranganathan
-
Patent number: 7844787Abstract: Techniques for data replication are presented. A snap shot request is processed within an environment associated with a local volume by flushing pending Input/Output (I/O) operations into an event packet. The event packet is sent to a replicated volume and processed against the replicated volume to create a snap shot version of the local volume.Type: GrantFiled: June 27, 2007Date of Patent: November 30, 2010Assignee: Novell, Inc.Inventors: Shyamsundar Ranganathan, Kalidas Balakrishnan
-
Publication number: 20080209145Abstract: Techniques for asynchronous data replication are presented. A bitmap records changes to selective blocks of data on a source between replication periods. During a replication, the bitmap is copied and used to acquire changed blocks from the source to write to a replica. Should a unprocessed block have a pending write detected during the replication, then that block is copied into cache from the source before the write is processed on the source. The pending write then processes against the source; the copied block is flushed to the replica; the original bitmap and copied bitmap are updated.Type: ApplicationFiled: August 2, 2007Publication date: August 28, 2008Inventors: Shyamsundar Ranganathan, Kalidas Balakrishnan
-
Publication number: 20080148000Abstract: Techniques for data replication are presented. A snap shot request is processed within an environment associated with a local volume by flushing pending Input/Output (I/O) operations into an event packet. The event packet is sent to a replicated volume and processed against the replicated volume to create a snap shot version of the local volume.Type: ApplicationFiled: June 27, 2007Publication date: June 19, 2008Applicant: NOVELL, INC.Inventors: Shyamsundar Ranganathan, Kalidas Balakrishnan