Transaction log index generation in an enterprise backup system

    公开(公告)号:US11263173B2

    公开(公告)日:2022-03-01

    申请号:US16526699

    申请日:2019-07-30

    Abstract: Certain embodiments disclosed herein reduce or eliminate a communication bottleneck at the storage manager by reducing communication with the storage manager while maintaining functionality of an information management system. In some implementations, operations performed as part of a backup process may be stored in transaction logs. These transaction logs may include information about a transaction performed between the client computing system and the network storage that hosts the backup of the client computing system. The transaction logs may be provided to a secondary storage system that can be used to form a backup index. The backup index may be used to facilitate accessing the data stored at the network storage. Advantageously, generating the transaction logs and separating the generation of the backup index from the backup process can reduce resource usage during performance of the backup and speed up the backup process while further reducing interaction with the storage manager.

    Anomaly detection in deduplication pruning operations

    公开(公告)号:US11256673B2

    公开(公告)日:2022-02-22

    申请号:US16789232

    申请日:2020-02-12

    Abstract: Described herein are techniques for better understanding problems arising in an illustrative information management system, such as a data storage management system, and for issuing appropriate alerts and reporting to data management professionals. The illustrative embodiments include a number of features that detect and raise awareness of anomalies in system operations, such as in deduplication pruning operations. Such anomalies can include delays in the processing of archive files to be deleted and/or delays in the generation of the list of archive files to delete. Anomalies are characterized by frequency anomalies and/or by occurrence counts. Utilization is also of interest for certain key system resources, such as deduplication databases, CPU and memory at the storage manager, etc., without limitation. Predicting low utilization periods for these and other key resources is useful for scheduling maintenance activities without interfering with ordinary deduplication pruning operations and/or other data protection jobs.

    Systems and methods for management of virtualization data

    公开(公告)号:US10754841B2

    公开(公告)日:2020-08-25

    申请号:US15679560

    申请日:2017-08-17

    Abstract: Described in detail herein is a method of copying data of one or more virtual machines being hosted by one or more non-virtual machines. The method includes receiving an indication that specifies how to perform a copy of data of one or more virtual machines hosted by one or more virtual machine hosts. The method may include determining whether the one or more virtual machines are managed by a virtual machine manager that manages or facilitates management of the virtual machines. If so, the virtual machine manager is dynamically queried to automatically determine the virtual machines that it manages or that it facilitates management of. If not, a virtual machine host is dynamically queried to automatically determine the virtual machines that it hosts. The data of each virtual machine is then copied according to the specifications of the received indication.

    SECONDARY STORAGE OPERATION INSTRUCTION TAGS IN INFORMATION MANAGEMENT SYSTEMS

    公开(公告)号:US20170090796A1

    公开(公告)日:2017-03-30

    申请号:US15282545

    申请日:2016-09-30

    Abstract: According to certain aspects, a system can include a client computing device configured to: in response to user interaction, store an identifier associated with a first tag in association with a first file; and in response to instructions to perform a secondary copy operation, forward the first file, a second file, and the identifier associated with the first tag. The system may also include a secondary storage controller computer(s) configured to: based on a review of the identifier associated with the first tag, identify the first file as having been tagged with the first tag; electronically obtain rules associated with the first tag; perform on the first file at least a first secondary storage operation specified by the rules associated with the first tag; and perform on the second file at least a second secondary storage operation, wherein the first and second secondary storage operations are different.

    Systems and methods for management of virtualization data
    9.
    发明授权
    Systems and methods for management of virtualization data 有权
    用于虚拟化数据管理的系统和方法

    公开(公告)号:US08725973B2

    公开(公告)日:2014-05-13

    申请号:US13667890

    申请日:2012-11-02

    Abstract: Described in detail herein is a method of copying data of one or more virtual machines being hosted by one or more non-virtual machines. The method includes receiving an indication that specifies how to perform a copy of data of one or more virtual machines hosted by one or more virtual machine hosts. The method may include determining whether the one or more virtual machines are managed by a virtual machine manager that manages or facilitates management of the virtual machines. If so, the virtual machine manager is dynamically queried to automatically determine the virtual machines that it manages or that it facilitates management of. If not, a virtual machine host is dynamically queried to automatically determine the virtual machines that it hosts. The data of each virtual machine is then copied according to the specifications of the received indication.

    Abstract translation: 在此详细描述的是复制由一个或多个非虚拟机托管的一个或多个虚拟机的数据的方法。 该方法包括接收指示,该指示指定如何执行由一个或多个虚拟机主机托管的一个或多个虚拟机的数据的副本。 该方法可以包括确定一个或多个虚拟机是否由管理或促进虚拟机的管理的虚拟机管理器管理。 如果是这样,则虚拟机管理器被动态地查询以自动确定其管理的虚拟机或者它有助于管理。 如果没有,则虚拟机主机将被动态查询以自动确定其托管的虚拟机。 然后根据接收到的指示的规格复制每个虚拟机的数据。

Patent Agency Ranking