PROTECTION OF VIRTUAL PRIVATE CLOUD CONFIGURATIONS

    公开(公告)号:US20250110838A1

    公开(公告)日:2025-04-03

    申请号:US18476803

    申请日:2023-09-28

    Abstract: The methods and systems described herein provide a solution for protecting configuration data associated with a virtual private cloud. Network configurations, accounts, and/or security data may be collected from the host of the virtual private network using APIs provided by the host. The point-in-time configuration information of a VPC can be used in disaster recovery, migration to a new VPC host, or manage VPC configurations across accounts and regions. During a backup operation of a computing resource within a VPC, one or more processes requests security, network, and/or gateway configuration information from the VPC host. This information may be collected and requested for the entire VPC topology. The VPC configuration information, in the format/output received from the VPC host, is then backed up and stored with the backup of that computing resource in secondary storage.

    Continuously run log backup with minimal configuration and resource usage from the source machine

    公开(公告)号:US12253977B2

    公开(公告)日:2025-03-18

    申请号:US18492556

    申请日:2023-10-23

    Abstract: A system for performing continuous transaction log backups with minimal resource usage of the client computing devices that are processing the transactions is disclosed. The system detects at least one input/output (I/O) activity at a client computing device. The I/O activity can be associated with at least one database operation performed via the client computing device. The system then executes one or more native commands to backup transactions log data associated with the detected I/O activity to a virtualized location. Backing-up the transactions log data comprises dynamically identifying a mount path location corresponding to the virtualized location, and transferring the transactions log data to the dynamically identified mount path using the one or more native commands. The system can then perform data processing operations (for example, data chunking and deduplicating) on the transactions log data after it is received at the dynamically identified mount path location.

    Resiliency of a data storage system by protecting its management database to meet a recovery point objective (RPO)

    公开(公告)号:US12248375B2

    公开(公告)日:2025-03-11

    申请号:US18672466

    申请日:2024-05-23

    Abstract: An illustrative data storage management system comprises a management database that stores administrative preferences and system configurations, as well as results and/or statistics of completed secondary storage operations, i.e., information needed by the system to protect customers' data and to track and recover the protected data, including secondary copies such as backup copies, archive copies, etc. The disclosed data storage management system is configured to protect its own system data subject to a very aggressive (short) Recovery Point Objective (RPO), by using an innovative infrastructure that enables the system's storage manager to fail over to any number of other failover destination storage managers, each one comprising a destination management database. An illustrative database granularly tracks whether each and every transaction log file has been successfully applied to each and every destination management database to synchronize with the source management database.

    ADAPTIVE DATA PROTECTION FOR A MULTI-NODE DATA CLUSTER

    公开(公告)号:US20250077358A1

    公开(公告)日:2025-03-06

    申请号:US18787300

    申请日:2024-07-29

    Abstract: An illustrative data storage management system protects data in a replicated multi-node system (“cluster”). The illustrative system creates a new administrative entity (“pseudo-client”) that represents the cluster within the system. The system intelligently performs as an adaptive “set it and forget it” system. Preferences for the pseudo-client, including alternate rules that cover various contingencies in the cluster, need not be reset as the cluster undergoes node failures and/or role changes over time. Rather, the disclosed system adapts, on each successive secondary copy job, to the current configuration of the cluster without requiring a system administrator to provide further input or analysis. This approach ensures that jobs can begin promptly as scheduled or on demand. Component selection is based at least in part on geography/zone and/or network topology considerations, which improves the likelihood of job completion and success, and RPO/RTO service levels are more likely to be met.

    ADAPTIVE RATE THROTTLING FOR CLOUD-BASED SERVICE REQUESTS

    公开(公告)号:US20250016098A1

    公开(公告)日:2025-01-09

    申请号:US18398915

    申请日:2023-12-28

    Abstract: Some service providers (e.g., Microsoft's Office 365 services) throttle application or service requests an organization, a user, or device can request from a specific application or a suite of applications/services. This throttling can significantly impact performance for, not only the requesting user/device, but also for other tenants associated with that organization. To limit this imposed external throttling, an intelligent internal adaptive throttling or rate limiting may be implemented. In an embodiment, the system monitors throttling imposed by the service provider. Using this information, the system determines an optimal rate of calls that can made for that service to maximize throughput and performance. The system continuously monitors the throttling and in response dynamically modifies the internal target rate.

    CLOUD-BASED AIR-GAPPED DATA STORAGE MANAGEMENT SYSTEM

    公开(公告)号:US20250013542A1

    公开(公告)日:2025-01-09

    申请号:US18893602

    申请日:2024-09-23

    Abstract: An illustrative cloud-based air-gapped data storage management (destination) system obtains authorized access to other (source) systems' backup copies, replicates those copies within the destination system, parses supplemental metadata included in the source backup copies, and integrates the replica copies into the destination system as though natively created there. Replica copies are integrated as backup copies without first restoring the source backup copies to a native data format. The source system lacks knowledge of or connectivity with the destination system, thus maintaining an “air gap” between the systems. The destination system preferably operates in a cloud computing environment. The destination system uses supplemental metadata from the replica copies to re-create or mimic the source's computing environment and to restore backed up data from the replica copies. The destination system also operates as an autonomous analytics engine, applying value-added services to backed up data pulled from source system(s).

    MANAGEMENT DATABASE LONG-TERM ARCHIVING TO A RECOVERY MANAGER

    公开(公告)号:US20250013540A1

    公开(公告)日:2025-01-09

    申请号:US18885883

    申请日:2024-09-16

    Inventor: Prasad NARA

    Abstract: A storage manager for an information management system determines whether one or more predetermined conditions have been met for transferring metadata of previously performed backup jobs stored in a first management database. A backup job may correspond to a backup operation of a primary storage device of a first client computing device. In response to a determination that one or more of the predetermined conditions have been met, the storage manager may transfer metadata for a second plurality of backup jobs to a second management database of a recovery manager. The recovery manager may receive a request to restore data to the primary storage device of the first client computing device based on the metadata of the second plurality of backup jobs. A media agent managed by the recovery manager may then restore the requested data to the primary storage device of the first client computing device.

Patent Agency Ranking