Abstract:
Methods and systems for a storage system are provided. One method includes obtaining network interface information by a processor executable plugin executed by a computing device from a storage system node managing stored information; filtering logical interface information based on a protocol used by a processor executable application that uses the storage system node to store information; obtaining aliases for the logical interface information, when available; and storing the filtered logical interface information and associated aliases at a network identifier cache managed by the plugin; wherein the network identifier cache is used by the plugin to verify network interface information as associated with a data path for a data container stored at a storage device.
Abstract:
Methods and systems for a networked storage environment are provided. For example, a method includes interfacing by a management device with a plurality of management layers that communicate with a plurality of application plugins executed by a plurality of computing devices, where each application plugin is associated with an application for providing storage services for stored objects managed by a storage system for the plurality of applications; for managing the plurality of computing devices, presenting selectable options for adding an application plugin for a computing device, configuring the application plugin, migrating the application plugin from one location to another and placing the computing device in a maintenance mode; and providing a summary for a plurality of storage service operations and a data protection summary.
Abstract:
Methods and systems for applications and/or virtual machines (“VM”) are provided. As an example, one method includes registering a storage system configured to store data for a VM; creating a policy for the VM for generating a VM backup by a storage management system interfacing with the storage system and a cloud-based microservice; storing, by the cloud-based micro-service, a copy of the VM backup at a cloud-based storage; receiving, by the cloud-based micro-service, an indication from the storage management system of a successful execution of a pre-restore operation upon unregistering the VM from a VM management system; and copying, by the cloud-based micro-service, VM data from the VM backup stored at the cloud-based storage to the storage system for executing a restore operation to restore the VM backup at the storage system.
Abstract:
Methods and systems for role based access control (RBAC)) by a management device are provided. The management device communicates with a plurality of application plugins executed by one or more host computing devices through a management interface layer for managing backup, restore and clone operations involving objects that are stored on behalf of the plurality of applications by a storage system. The plurality of applications and the storage system have different RBAC requirements. The management device generates a token and the same token is used for RBAC across any of the applications and the storage system.
Abstract:
Methods and systems for a storage system are provided. One method includes obtaining network interface information by a processor executable plugin executed by a computing device from a storage system node managing stored information; filtering logical interface information based on a protocol used by a processor executable application that uses the storage system node to store information; obtaining aliases for the logical interface information, when available; and storing the filtered logical interface information and associated aliases at a network identifier cache managed by the plugin; wherein the network identifier cache is used by the plugin to verify network interface information as associated with a data path for a data container stored at a storage device.
Abstract:
Method and system for performing recovery for a replicated copy of a storage space presented as a logical object is provided. An attribute associated with the logical object for enabling the recovery is set and when the storage space is replicated the attribute is stored as metadata for the replicated copy of the storage space. Based on the attribute, a clone of the logical object is presented as a writable option to write to the first replicated copy. After the write operation where information is written to the clone, a second replicated copy with the clone information is created. The clone is deleted after the second copy is generated.
Abstract:
Methods and systems for protecting virtual machines is provided. One method includes discovering, by a first plugin, from a virtual machine (“VM”) management system, a plurality of VMs that share a logical data store having a plurality of virtual volumes used for storing data for the VMs by a storage system registered with the first plugin and a virtual appliance of the VM management system; obtaining, by the first plugin, from the virtual appliance, metadata and storage layout of a set of virtual volumes used by a VM to store data; using a first application programming interface (API), by the first plugin, for identifying a first set of storage volumes used by the storage system to store data for the set of virtual volumes; and creating, by the first plugin, a consistency group (“CG”) having the identified the first set of storage volumes and generating a snapshot of the CG.
Abstract:
Methods and systems for protecting virtual machines is provided. One method includes discovering, by a first plugin, from a virtual machine (“VM”) management system, a plurality of VMs that share a logical data store having a plurality of virtual volumes used for storing data for the VMs by a storage system registered with the first plugin and a virtual appliance of the VM management system; obtaining, by the first plugin, from the virtual appliance, metadata and storage layout of a set of virtual volumes used by a VM to store data; using a first application programming interface (API), by the first plugin, for identifying a first set of storage volumes used by the storage system to store data for the set of virtual volumes; and creating, by the first plugin, a consistency group (“CG”) having the identified the first set of storage volumes and generating a snapshot of the CG.
Abstract:
Methods and systems for providing storage services in a networked environment are provided. A management device interfaces with a plurality of management layers that communicates with a plurality of application plugins executed by a plurality of computing devices. Each application plugin is associated with an application for providing storage services for stored objects managed by a storage system. A same request and response format is used by the management device to obtain information from the plurality of management layers regarding storage space used by the plurality of applications for storing the stored objects and the management device maintains storage space information as a storage resource object for virtual storage resources and physical storage resources used by the plurality of applications for storing the stored objects.
Abstract:
Methods and systems for a networked storage environment are provided. For example, a method includes interfacing by a management device with a plurality of management layers that communicate with a plurality of application plugins executed by a plurality of computing devices, where each application plugin is associated with an application for providing storage services for stored objects managed by a storage system for the plurality of applications; for managing the plurality of computing devices, presenting selectable options for adding an application plugin for a computing device, configuring the application plugin, migrating the application plugin from one location to another and placing the computing device in a maintenance mode; and providing a summary for a plurality of storage service operations and a data protection summary.