Abstract: A method includes determining, by a management controller of a first server in a storage network, if a first virtual initiator is used by a second server in the storage network, wherein the first virtual initiator includes first boot information for allocating a first storage resource of the storage network, aborting a boot up of the first server in response to determining that the first virtual initiator is being used by the second server, and proceeding with the boot up of the first server in response to determining that the first virtual initiator is not used by the second server, wherein the boot up proceeds using the first boot information to allocate the first storage resource to the first server.
Abstract: A data deduplication system includes a data deduplication subsystem coupled to each of a host system and a storage system. The data deduplication system receives data from the host system, generates a data deduplication identifier for the data, and determines whether the data deduplication identifier for the data is stored in a data deduplication database. In response to determining that the data deduplication identifier is not stored in the data deduplication database, the data deduplication system stores the data deduplication identifier for the data in the data deduplication database in association with a data counter for the data, and transmits the data to the storage system for storage. In response to determining that the data deduplication identifier is stored in the data deduplication database, the data deduplication system increments a data counter that is associated with the data deduplication identifier in the data deduplication database, and discards the data.
Type:
Application
Filed:
October 16, 2019
Publication date:
April 22, 2021
Inventors:
Dharmesh M. PATEL, Ravikanth CHAGANTI, Rizwan ALI
Abstract: A method for managing data includes obtaining a workload generation request, wherein the workload generation request specifies a security compliant rule, in response to the workload generation request: selecting a first set of resource devices using a resource allocation master list, initiating a security compliance test on the first set of resource devices to obtain a security compliance result, making a first determination, based on the security compliance result, that the first set of resource devices meet a security compliance criterion, and in response to the first determination: storing a virtual certificate in a security compliance database based on the security compliance result, and allocating the first set of resource devices to a workload based on the workload generation request.
Type:
Grant
Filed:
March 4, 2020
Date of Patent:
November 29, 2022
Assignee:
Dell Products L.P.
Inventors:
Rizwan Ali, Dharmesh M. Patel, Ravikanth Chaganti
Abstract: A configurable device includes computing resources. The configurable device further includes an out-of-band management platform that obtains a configuration request for the configurable device to place the configurable device into a predetermined state; in response to Obtaining the configuration request, obtains a configurable device profile associated with the configurable device using an out-of-band channel; instantiates a pre-operating system agent based on the configurable device profile using the computing resources; loads an operating system package into the computing resources using an in-band channel secured by the pre-operating system agent; boots the configurable device using: the operating system package, and the computing resources; and, after booting the configurable device, orchestrates post-operating system automation of the configurable device to place the configurable device into the predetermined state.
Type:
Application
Filed:
October 3, 2018
Publication date:
April 9, 2020
Inventors:
Ravikanth Chaganti, Rizwan Ali, Dharmesh M. Patel
Abstract: A configurable device for use in a solution architecture includes persistent storage and a computing resource manager. The persistent storage stores computing resources rules based on, in part, the solution architecture. The persistent storage stores a computing resource configuration that specifies characteristics of computing resources of the configurable device that must be met for the computing resources to be in a predetermined state to meet requirements of the solution architecture. The computing resources manager generates a rules-based script using the computing resources rules and a portion of the computing resource configuration; executes the rules-based script to obtain a validation report that specifies a compliance failure of a portion of the computing resources; and remediates the compliance failure by modifying the computing resources of the configurable device based on a remediation action specified by the computing resources rules.
Type:
Application
Filed:
January 29, 2019
Publication date:
July 30, 2020
Inventors:
Ravikanth Chaganti, Rizwan Ali, Dharmesh M. Patel
Abstract: A Hyper-Converged Infrastructure (HCI) networking configuration system includes HCI node subsystems with different configuration requirements, and a networking subsystem coupled HCI node subsystems via respective port(s). The networking subsystem identifies each of the HCI node subsystems and, based on that determine, based on those identifications, determines respective different configuration requirements for each of the HCI node subsystems. Based on those respective configuration requirements, the networking subsystem generates a networking subsystem configuration, and applies the networking subsystem configuration to the networking subsystem such that each of its respective ports coupled to the HCI node subsystems is configured to provide communication between the networking subsystem and that HCI node subsystem.
Type:
Grant
Filed:
October 15, 2019
Date of Patent:
April 27, 2021
Assignee:
Dell Products L.P.
Inventors:
Rizwan Ali, Ravikanth Chaganti, Dharmesh M. Patel
Abstract: A method for managing data includes obtaining a workload generation request, wherein the workload generation request specifies a security compliant rule, in response to the workload generation request: selecting a first set of resource devices using a resource allocation master list, initiating a security compliance test on the first set of resource devices to obtain a security compliance result, making a first determination, based on the security compliance result, that the first set of resource devices meet a security compliance criterion, and in response to the first determination: storing a virtual certificate in a security compliance database based on the security compliance result, and allocating the first set of resource devices to a workload based on the workload generation request.
Type:
Grant
Filed:
March 4, 2020
Date of Patent:
October 18, 2022
Assignee:
Dell Products L.P.
Inventors:
Rizwan Ali, Ravikanth Chaganti, Dharmesh M. Patel
Abstract: This application includes a method that is performed store data. The method includes obtaining, by a data processor, a first request from a host; and in response to the first request: obtaining first cluster bidding counters (CBCs) from data clusters; identifying a first data cluster of the data clusters to service the request based on the first CBCs and data access gateway (DAG) metadata; sending the first request to the first data cluster; making a first determination that the first data cluster is unable to service the request; and in response to the first determination: identifying a second data cluster of the data clusters to service the request based on the first CBCs and the DAG metadata; and sending the first request to the second data cluster.
Abstract: A method for managing data includes obtaining data from a host, applying an erasure coding procedure to the data to obtain a plurality of data chunks and at least one parity chunk, deduplicating the plurality of data chunks to obtain a plurality of deduplicated data chunks, generating storage metadata associated with the plurality of deduplicated data chunks and the at least one parity chunk, generating an object entry associated with the plurality of deduplicated data chunks and the at least one parity chunk, storing the storage metadata and the object entry in an accelerator pool, storing, across a plurality of fault domains, the plurality of deduplicated data chunks and the at least one parity chunk, and initiating metadata distribution on the storage metadata and the object entry across the plurality of fault domains.
Type:
Application
Filed:
July 31, 2019
Publication date:
February 4, 2021
Inventors:
Dharmesh M. Patel, Rizwan Ali, Ravikanth Chaganti
Abstract: A composable infrastructure update system includes a composable infrastructure management system coupled to a composable infrastructure system including composable infrastructure components. The composable infrastructure management system identifies workload solutions that are being provided by at least one of the composable infrastructure components and, for each workload solution, generates a respective workload solution catalog that identifies the at least one of the composable infrastructure components that are providing that workload solution. The composable infrastructure management system then receive a software update for a first composable infrastructure component, determines that the first composable infrastructure component is being used to provide at least two of the workload solutions, and schedules the performance of the software update for the first composable component in consideration of the at least two of the workload solutions.
Type:
Grant
Filed:
October 15, 2019
Date of Patent:
May 11, 2021
Assignee:
Dell Products L.P.
Inventors:
Rizwan Ali, Ravikanth Chaganti, Dharmesh M. Patel
Abstract: A method for managing data includes obtaining, by a storage controller, data from a host, applying an erasure coding procedure to the data to obtain a plurality of data chunks and at least one parity chunk, deduplicating the plurality of data chunks to obtain a plurality of deduplicated data chunks, generating storage metadata associated with the plurality of data chunks and the at least one parity chunk, storing, across a plurality of persistent storage devices, the plurality of deduplicated data chunks and the at least one parity chunk, wherein the plurality of persistent storage devices is operatively connected to the storage controller and a second storage controller, storing the storage metadata in the storage controller, and sending a copy of the storage metadata to the second storage controller.
Type:
Grant
Filed:
August 28, 2019
Date of Patent:
December 1, 2020
Assignee:
Dell Products L.P.
Inventors:
Dharmesh M. Patel, Rizwan Ali, Ravikanth Chaganti
Abstract: A method for managing data includes obtaining data from a host, wherein the data is associated with an object identifier (ID), initiating a classification mapping update to obtain a classification entry, applying an erasure coding procedure to the data to obtain a plurality of data chunks and at least one parity chunk, deduplicating the plurality of data chunks to obtain a plurality of deduplicated data chunks, generating storage metadata associated with the plurality of deduplicated data chunks and the at least one parity chunk, generating an object entry associated with the plurality of data chunks, and the at least one parity chunk, wherein the object entry comprises the object ID and a classification ID, storing the storage metadata and the object entry in an accelerator pool, and storing the plurality of deduplicated data chunks and the at least one parity chunk.
Type:
Application
Filed:
August 1, 2019
Publication date:
February 4, 2021
Inventors:
Rizwan Ali, Dharmesh M. Patel, Ravikanth Chaganti
Abstract: A power/workload management system includes a power system that is coupled to a first computing device that is configured to perform a first workload, as well as to a second computing device. A management subsystem is coupled to the first computing device and the second computing device, and operates to identify a reduced power event associated with the power system and, in response, determine that the first computing device is associated with a higher power consumption than the second computing device. In response to determining that the first computing device is associated with the higher power consumption than the second computing device, the management subsystem moves the first workload to the second computing device such that the second computing device performs the first workload, and configures the first computing device in a reduced power consumption state.
Type:
Application
Filed:
March 18, 2021
Publication date:
September 22, 2022
Inventors:
Naman Goel, Ravikanth Chaganti, Ravishankar Kanakapura Nanjundaswamy
Abstract: An automated operating system networking configuration system includes a plurality of switch computing devices, a server computing device, and a management subsystem that is coupled to the plurality of switch computing devices and the server computing device. The management subsystem determines that the server computing device is connected to a plurality of switch ports, identifies that the plurality of switch computing devices include the plurality of switch ports and, in response, retrieves switch port configuration information for the plurality of switch ports from the plurality of switch devices. Based on a physical topology provided by the plurality of switch computing devices connected to the server computing device via the plurality of switch ports and the switch port configuration information for the plurality of switch ports, the management subsystem determines an operating system networking configuration and transmits the operating system networking configuration to the server computing device.
Abstract: A method for generating bill of material data for complex systems comprising storing a plurality of electronic documents in a standardized format using an electronic data storage device, where each electronic document has an associated solution identifier data field and one or more associated bill of materials data fields. Receiving a query request over a data network in an electronic data format that includes a query solution identifier data field. Extracting electronic data documents having a matching data field value to the solution identifier data field. Extracting the bill of materials data fields for each electronic document using data processing equipment. Assembling a compilation of the bill of materials data fields from each of the extracted electronic data documents.
Abstract: A method and system for non-disruptive host repurposing. Specifically, the method and system disclosed herein entail the re-optimization of datacenter hosts (e.g., servers) for any infrastructure and/or workload deployment. Different infrastructure and/or workload deployments may require the tuning of various memory parameters (or attributes) in the basic input-output system (BIOS) configuration. Presently, the repurposing of any given host demands the full reset of the system configuration—i.e., a disruptive process—prior to implementing the necessary BIOS configuration changes. In contrast, the method and system disclosed herein facilitate the repurposing of a host through the installation and/or uninstallation of configuration overlays—a modular approach to interchanging infrastructure and/or workload deployments—without the disruption of full system resets.
Type:
Grant
Filed:
January 29, 2019
Date of Patent:
April 21, 2020
Assignee:
EMC IP Holding Company LLC
Inventors:
Ravikanth Chaganti, Rizwan Ali, Dharmesh M. Patel
Abstract: A method and system for non-disruptive host repurposing. Specifically, the method and system disclosed herein entail the re-optimization of datacenter hosts (e.g., servers) for any infrastructure and/or workload deployment. Different infrastructure and/or workload deployments may require the tuning of various memory parameters (or attributes) in the basic input-output system (BIOS) configuration. Presently, the repurposing of any given host demands the full reset of the system configuration—i.e., a disruptive process—prior to implementing the necessary BIOS configuration changes. In contrast, the method and system disclosed herein facilitate the repurposing of a host through the installation and/or uninstallation of configuration overlays—a modular approach to interchanging infrastructure and/or workload deployments—without the disruption of full system resets.
Type:
Grant
Filed:
January 29, 2019
Date of Patent:
August 18, 2020
Assignee:
EMC IP Holding Company LLC
Inventors:
Ravikanth Chaganti, Rizwan Ali, Dharmesh M. Patel
Abstract: Method and systems provide automated configuration of replaceable hardware components of a chassis comprising a plurality of IHSs (Information Handling Systems) and a plurality of storage devices that are configured to support demands of a specific computing solution designed for a particular computing task. The IHSs may be computing sleds and the storage devices may be storage sleds, where the sleds are coupled within bays of the chassis. Processes operating on the IHSs monitor for changes to settings related to the first computing solution. A chassis management controller detects updates to the replaceable hardware components that are coupled to the chassis and determines supported settings for detected new hardware components. Parameters for configuring the new hardware components for supporting the first computing solution are selected and used to configure the new hardware components.
Type:
Application
Filed:
November 22, 2019
Publication date:
May 27, 2021
Applicant:
Dell Products, L.P.
Inventors:
Naman Goel, Ravikanth Chaganti, Ravishankar Kanakapura N, Harsha Naik
Abstract: An apparatus comprises a processing device that is configured to maintain a list of a managed devices, to generate a seed value and to submit a login request to a first managed device. The processing device is configured to generate a value based at least in part on the seed value and to select a second managed device from the list based at least in part on the value. The processing device is further configured to receive a second factor authentication challenge from the first managed device and to obtain a device key encrypted passcode from the second managed device. The processing device is further configured to provide the device key encrypted passcode to the first managed device and to receive a successful authentication of the login request from the first managed device based at least in part on providing the device key encrypted passcode to the first managed device.
Type:
Application
Filed:
October 12, 2021
Publication date:
April 13, 2023
Inventors:
Shivendra Katiyar, Naman Goel, Ravishankar Kanakapura Nanjundaswamy, Ravikanth Chaganti
Abstract: A method for managing data includes obtaining data from a host, performing an erasure coding procedure to the data to obtain a plurality of slices, wherein each slice in the plurality of slices comprises a plurality of data chunks and at least one parity chunk, generating a plurality of segment entries, wherein each segment entry in the plurality of segment entries specifies a segment, generating metadata slice entries, wherein each metadata slice entry is associated with a slice in the plurality of slices, storing the plurality of segment entries and the metadata slice entries in an accelerator pool in a first data cluster, and storing, across a plurality of fault domains in the first data cluster, the data chunks and the parity chunk of each slice in the plurality of slices based on the plurality of segment entries.