Abstract:
Software, firmware, and systems are described herein that migrate functionality of a source physical computing device to a destination physical computing device. A non-production copy of data associated with a source physical computing device is created. A configuration of the source physical computing device is determined. A configuration for a destination physical computing device is determined based at least in part on the configuration of the source physical computing device. The destination physical computing device is provided access to data and metadata associated with the source physical computing device using the non-production copy of data associated with the source physical computing device.
Abstract:
A data storage system includes a generic snapshot interface, allowing for integration with a wide variety of snapshot-capable storage devices. The generic interface can be a programming interface (e.g., an application programming interface [API]). Using the snapshot interface, storage device vendors can integrate their particular snapshot technology with the data storage system. For instance, the data storage system can access a shared library of functions (e.g., a dynamically linked library [DLL]) provided by the vendor (or another by appropriate entity) and that complies with the specifications of the common programming interface. And by invoking the appropriate functions in the library, the data storage system implements the snapshot operation on the storage device.
Abstract:
According to certain aspects, a method of creating customized bootable images for client computing devices in an information management system can include: creating a backup copy of each of a plurality of client computing devices, including a first client computing device; subsequent to receiving a request to restore the first client computing device to the state at a first time, creating a customized bootable image that is configured to directly restore the first client computing device to the state at the first time, wherein the customized bootable image includes system state specific to the first client computing device at the first time and one or more drivers associated with hardware existing at time of restore on a computing device to be rebooted; and rebooting the computing device to the state of the first client computing device at the first time from the customized bootable image.
Abstract:
This application discloses a system for processing requests for data in production and archive/backup databases. The system stores a mapping of data in production and archive databases to multiple different data storage locations, including a production system storing at least one production database and an archive system storing at least one archive database. The system receives a data request from an application component, which manages or receives data from a user interface and has received the data request directly from the user interface. The system translates the data request to one or more database queries based on the mapping. The system causes to execute the database queries against data on the production or archive system. The system returns a result of executing the one or more database queries to the application component, where the application component returns the result to the user via the user interface.
Abstract:
A data storage system protects virtual machines using block-level backup operations and restores the data at a file level. The system accesses the virtual machine file information from the file allocation table of the host system underlying the virtualization layer. A file index associates this virtual machine file information with the related protected blocks in a secondary storage device during the block-level backup. Using the file index, the system can identify the specific blocks in the secondary storage device associated with a selected restore file. As a result, file level granularity for restore operations is possible for virtual machine data protected by block-level backup operations without restoring more than the selected file blocks from the block-level backup data.
Abstract:
An illustrative “open archive” architecture relieves the immediate need to add network-attached storage (NAS) devices to a storage management system. The open archive architecture provides streamlined access to live production data, which originally was stored on a NAS device but which is archived to secondary storage to free up NAS space. An open-archive server coordinates with an open-archive layer that operates on the NAS device. The open-archive server identifies data sets on the NAS that meet archiving criteria, which are then automatically moved to an open archive in secondary storage. The open archive layer intercepts data-access calls coming into the NAS device, e.g., open calls, read calls, write calls. The intercepted calls are reported to the open-archive server for analysis. If the open-archive server determines that the data referenced in an intercepted call is stored in the open archive, the open-archive server initiates a restore job that recovers the data from secondary storage and stores it back on the NAS device. The intercepted call may now be served from the NAS. These operations occur automatically and do not involve users or their computing devices, and the computing devices operate without data agents for the NAS-based data.
Abstract:
Techniques for enabling user search of content stored in a file archive include providing a search interface comprising a search rules portion and an action rules portion, receiving a file archive search criterion comprising at least one search rule, and searching the file archive using the search criterion. The techniques also include generating a set of files filtered using the search criterion and performing an action specified in the action rules portion on a file included in the set of files.
Abstract:
A data storage environment can include one or more virtual clients instantiated on a host proxy computing device. The virtual clients may have only indirect access to a storage device, and may access the storage device via the proxy computing device. For example, the proxy computing device receives storage operation requests from one of the virtual clients, such as a request to create, mount or revert a snapshot of virtual client data. The proxy computing device generally acts as an intermediary between the virtual clients and the storage device to carry out the snapshots or other storage operations. The proxy computing device may further receive a notification upon completion of the storage operations, and transmits relevant data to the requesting virtual client regarding the storage operation.
Abstract:
A method and system for utilizing snapshots to provide copies of a database or other application or large data structure to computing devices receives a request for access to a copy of a database, and performs a snapshot of a storage volume containing the requested database. The system then clones the snapshot and mounts the snapshot to a computing device, thus enabling the computing device to access a copy of the database. In some examples, the system automatically updates copies of a database on a scheduled basis (e.g., daily or weekly basis) to refresh a database regularly.
Abstract:
The data storage system according to certain aspects can implement table level database restore. Table level database restore may refer to restoring a database table and its related data without restoring the entire database. The data storage system may use table metadata index to implement table level restore. A table metadata index may be created for each table, e.g., during a backup of the database. The table metadata index for a table can include any type of information for restoring the table and its related data. Some examples of the type of information included in the table metadata index include the following: container for the table, table backup location, system data, table index, table relationships, etc. Table metadata index can make the restoring of tables fast and efficient by packaging information that can be used to restore a table and its related data in an easily accessible manner.