MIGRATION TO CLOUD STORAGE
    1.
    发明申请

    公开(公告)号:US20240396967A1

    公开(公告)日:2024-11-28

    申请号:US18794957

    申请日:2024-08-05

    Abstract: During a data protection operation, a data storage system can collect computing attributes associated with hosting of an application generating data being backed up and may also obtain information relating to physical characteristics of the computing device hosting the application and the data. At the time of migration to a cloud, the system can use the collected attributes and/or information to provision cloud resources. The cloud storage system may accept provisioning requests, and may provide several templates which each specify a cloud resource that can be provisioned upon request. The system may compare the collected attributes with the attributes of the available templates to determine the best match. Then, the system may issue a provisioning request to the cloud provider according to the best-matched template. After provisioning the resources, the system may restore backup data of the application to the cloud storage system to migrate the data.

    SYSTEMS AND METHODS FOR BACKING UP TO A VIRTUAL TAPE LIBRARY

    公开(公告)号:US20220137885A1

    公开(公告)日:2022-05-05

    申请号:US17086026

    申请日:2020-10-30

    Abstract: Presented herein are systems and methods for backing up and restoring data from a client computing system to a provider's virtual tape library using a proxy. The proxy emulates a physical tape library that interfaces with a client's system and allowing the use of client's native tape backup commands to initiate the backup data process. The backup data is transferred into files that represent tapes in the proxy and further processed into extents in the provider's object store. The processed backup data is stored in the local cache in the object store where it is retained for future access. The backup data may also be transferred to long-term storage via a media agent that facilitate movement of the data from the local cache to secondary storage. The present disclosure also provides for creating auxiliary copies of the backed-up data using a second VTL at a second site.

    USING METADATA TO MANAGE DATA AND REPORT USAGE

    公开(公告)号:US20210208788A1

    公开(公告)日:2021-07-08

    申请号:US17142108

    申请日:2021-01-05

    Abstract: A data storage system can scan one or more information stores and analyze the metadata of files stored in the one or more information stores to identify secondary copy operations (e.g., archiving) that can be performed on the files. The storage system can also identify storage usage information of each file during the scan and use that information to generate reports regarding the usage of the storage.

    DYNAMIC MANAGEMENT OF EXPANDABLE CACHE STORAGE FOR MULTIPLE NETWORK SHARES CONFIGURED IN A FILE SERVER

    公开(公告)号:US20200334209A1

    公开(公告)日:2020-10-22

    申请号:US16917565

    申请日:2020-06-30

    Abstract: Expandable cache management dynamically manages cache storage for multiple network shares configured in a file server. Once a file is written to a directory or folder on a specially designated network share, such as one that is configured for “infinite backup,” an intermediary pre-backup copy of the file is created in an expandable cache in the file server that hosts the network share. On write operations, cache storage space can be dynamically expanded or freed up by pruning previously backed up data. This advantageously creates flexible storage caches in the file server for each network share, each cache managed independently of other like caches for other network shares on the same file server. On read operations, intermediary file storage in the expandable cache gives client computing devices speedy access to data targeted for backup, which is generally quicker than restoring files from backed up secondary copies.

    LOG MONITORING
    5.
    发明申请
    LOG MONITORING 审中-公开

    公开(公告)号:US20200272549A1

    公开(公告)日:2020-08-27

    申请号:US16808083

    申请日:2020-03-03

    Abstract: A log monitoring system uses log monitoring rules to monitor log data generated by applications executing on a client computing device. By monitoring log data, the system detects that one or more triggering events have occurred on the client computing device. In response, the log monitoring system can perform one or more appropriate remedial actions. Additionally, in response to the detected event(s), the log monitoring system can extract a select subset of relevant data from the client and transmit the subset of data to a separate repository for storage and/or processing.

    CREATING A CUSTOMIZED BOOTABLE IMAGE FOR A CLIENT COMPUTING DEVICE FROM AN EARLIER IMAGE SUCH AS A BACKUP COPY

    公开(公告)号:US20200233756A1

    公开(公告)日:2020-07-23

    申请号:US16844878

    申请日:2020-04-09

    Abstract: According to certain aspects, a method of creating customized bootable images for client computing devices in an information management system can include: creating a backup copy of each of a plurality of client computing devices, including a first client computing device; subsequent to receiving a request to restore the first client computing device to the state at a first time, creating a customized bootable image that is configured to directly restore the first client computing device to the state at the first time, wherein the customized bootable image includes system state specific to the first client computing device at the first time and one or more drivers associated with hardware existing at time of restore on a computing device to be rebooted; and rebooting the computing device to the state of the first client computing device at the first time from the customized bootable image.

    DATA PROTECTION OPERATIONS BASED ON NETWORK PATH INFORMATION

    公开(公告)号:US20200097369A1

    公开(公告)日:2020-03-26

    申请号:US16556078

    申请日:2019-08-29

    Abstract: A system according to certain aspects improves the process of performing data protection operations (e.g., creating backup copies in a secondary storage device). The system can generate network path information based on client information associated with client computing devices (e.g., application type, data type, client device ID, etc.) and process requests to perform data protection operations based on the network path information specified in the requests. For example, the system may use the specified network path information to determine the data types of the primary data stored on the client computing devices and store backup copies of the primary data at the location indicated by the network path information.

    MONITORING OF NODES WITHIN A DISTRIBUTED STORAGE ENVIRONMENT

    公开(公告)号:US20200089579A1

    公开(公告)日:2020-03-19

    申请号:US16550064

    申请日:2019-08-23

    Abstract: In certain systems disclosed herein, a distributed data monitoring and management system is provided that can replicate a distributed storage environment. The distributed data monitoring and management system can intelligently and automatically configure data access nodes to form a structure that matches the distributed storage environment. By matching the structure of the distributed storage environment, the distributed structure of the data may be maintained, enabling the data to be backed up from and/or restored to the distributed storage environment and/or migrated to another distributed storage environment without altering the distribution of the data. Further, embodiments herein enable the monitoring of nodes within the system and transfer of data from a non-distributed environment to a distributed storage environment. Thus, in some cases, an entity can migrate data from a local storage structure to a network-based distributed storage structure.

Patent Agency Ranking