摘要:
An optimized backup image of a virtual machine is generated. The virtual machine is associated with a virtual disk. The virtual disk includes one or more virtual volumes. Generating the optimized backup image includes excluding one or more invalid sectors of the virtual disk from the optimized backup image.
摘要:
In one embodiment, a backup application is disclosed which is configured to detect that one or more incremental virtual disk files are provided in a virtual machine image. The backup application may invoke a merge function in the virtual machine monitor, and may merge the incremental virtual disk files into the base virtual disk file. Redundant data is thus eliminated, and may reduce the amount of archive media needed to store the backed-up virtual machine image.
摘要:
Various techniques, including a method, system and computer program product for restoring encrypted files are disclosed. The method includes accessing a file table record for an encrypted file. The file table record includes an encrypted file stream and extent information identifying a location of one or more portions of the encrypted file in a virtual machine image. In response to accessing the file table record a consecutive data stream is stored. Storing the consecutive data stream includes encapsulating the encrypted file stream and the one or more portions of the encrypted file.
摘要:
A computer has a storage device that is infected with malicious software (malware). The malware uses stealth or rootkit techniques to hide itself in the storage device. A security module within the storage device detects the malware by comparing the files read from the storage device to those reported by the operating system. Upon detecting the malware, the security module prepares the computer for malware obfuscation by storing information describing the location of the malware, deploying an executable file, and configuring it to run on reboot. The executable file executes upon reboot and locates the data on the storage device associated with the malware. The executable file obfuscates the data so that the malware no longer loads at boot time, thereby disabling the rootkit technique. The computer reboots and the security module remediates the malware infection.
摘要:
In one embodiment, a backup application is disclosed which is configured to detect that one or more incremental virtual disk files are provided in a virtual machine image. The backup application may invoke a merge function in the virtual machine monitor, and may merge the incremental virtual disk files into the base virtual disk file. Redundant data is thus eliminated, and may reduce the amount of archive media needed to store the backed-up virtual machine image.
摘要:
Techniques for managing non-snappable volumes are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for managing non-snappable volumes comprising identifying a virtual disk associated with a virtual machine, identifying a non-snappable volume associated with the virtual disk, analyzing the non-snappable volume, using at least one computer processor, to determine whether the non-snappable volume contains application data, and performing one or more responsive actions in the event the non-snappable volume is determined to contain application data.
摘要:
In one embodiment, a backup application transmits a remote request to a virtual machine that includes an application to be backed up. The request solicits metadata from the application that describes a structure of the data stored by the application on the virtual storage devices of the virtual machine. Using the metadata, the backup application may identify objects within the virtual machine. Accordingly, a granular restore of data to the virtual machine may be possible without installing backup software within the virtual machine.
摘要:
A system and method for backing up a virtual machine executing on a virtualization server computer are described. A snapshot of a virtual disk image file of the virtual machine may be created on a network-attached storage (NAS) device coupled to the virtualization server computer. The snapshot may be used to backup the virtual disk image file from the NAS device to a backup storage device without transferring the virtual disk image file through the virtualization server computer. Mapping information useable to access the plurality of files stored in the virtual disk image file on an individual basis may be created and stored together with the backup copy of the virtual disk image file on the backup storage device.
摘要:
In one embodiment, a backup application transmits a remote request to a virtual machine that includes an application to be backed up. The request solicits metadata from the application that describes a structure of the data stored by the application on the virtual storage devices of the virtual machine. Using the metadata, the backup application may identify objects within the virtual machine (e.g. individual files, individual messages, database records or tables, etc.). Accordingly, a granular restore of data to the virtual machine may be possible without installing backup software within the virtual machine.
摘要:
A system and method for backing up a virtual machine executing on a virtualization server computer are described. A snapshot of a virtual disk image file of the virtual machine may be created on a network-attached storage (NAS) device coupled to the virtualization server computer. The snapshot may be used to backup the virtual disk image file from the NAS device to a backup storage device without transferring the virtual disk image file through the virtualization server computer. Mapping information useable to access the plurality of files stored in the virtual disk image file on an individual basis may be created and stored together with the backup copy of the virtual disk image file on the backup storage device.