Mobile storage manager control application for managing a storage manager of an information management system

    公开(公告)号:US11615147B2

    公开(公告)日:2023-03-28

    申请号:US17488156

    申请日:2021-09-28

    Abstract: A storage manager control application facilitates interactions with, and configurations of, a storage manager that manages one or more client computing devices of an information management system. The storage manager control application may be implemented using a variety of modules that allow a user to interact with the storage manager in various ways. Using the storage manager control application, a user may view a backup status of the information management system, and view the backup status of specific client computing devices that are managed by the storage manager. The user may also search for various entities and/or objects within the information management system using the storage manager control application. In addition, a user may view the status of one or more backup jobs configured within the information management system, as well as backup plans that have been established for one or more of the client computing devices.

    Systems and methods to identify unprotected virtual machines

    公开(公告)号:US11544221B2

    公开(公告)日:2023-01-03

    申请号:US16918512

    申请日:2020-07-01

    Abstract: Virtualization sprawl can lead to virtual machines with no designated periodic backup. If the data associated with these unprotected virtual machines is not backed up, it cannot be restored if needed, leading to system failures. A data storage system identifies and protects the unprotected virtual machines. For instance, the system compares a list of virtual machines with a list of computing devices having a designated backup policy in the data storage system and determines which of the virtual machines are unprotected. The system further automatically categorizes the unprotected virtual machines, identifies those unprotected virtual machines that remain uncategorized, and applies a default backup policy to the uncategorized and unprotected virtual machines to provide protected virtual machines.

    Dynamic computing progress tracker
    105.
    发明授权

    公开(公告)号:US11537959B2

    公开(公告)日:2022-12-27

    申请号:US16902993

    申请日:2020-06-16

    Abstract: A system may measure one or more metrics relating to the performance of a job for a set of occurrences of the job with respect to a data set. The measurements may be used to predict a completion time for a subsequent job or phase of the job on the data set. This prediction may be used to present a more accurate indication of a job completion status on the data set. The process may be repeated or performed separately for each client or set of data to provide an individualized progress meter or indicator. Thus, in some cases, variances in the data or computing systems may be reflected in the displayed progress of the job providing for a more accurate indication of job progress.

    Anomaly detection in deduplication pruning operations

    公开(公告)号:US11256673B2

    公开(公告)日:2022-02-22

    申请号:US16789232

    申请日:2020-02-12

    Abstract: Described herein are techniques for better understanding problems arising in an illustrative information management system, such as a data storage management system, and for issuing appropriate alerts and reporting to data management professionals. The illustrative embodiments include a number of features that detect and raise awareness of anomalies in system operations, such as in deduplication pruning operations. Such anomalies can include delays in the processing of archive files to be deleted and/or delays in the generation of the list of archive files to delete. Anomalies are characterized by frequency anomalies and/or by occurrence counts. Utilization is also of interest for certain key system resources, such as deduplication databases, CPU and memory at the storage manager, etc., without limitation. Predicting low utilization periods for these and other key resources is useful for scheduling maintenance activities without interfering with ordinary deduplication pruning operations and/or other data protection jobs.

    Systems and methods for managing single instancing data

    公开(公告)号:US11016858B2

    公开(公告)日:2021-05-25

    申请号:US14674229

    申请日:2015-03-31

    Abstract: Described in detail herein are systems and methods for managing single instancing data. Using a single instance database and other constructs (e.g. sparse files), data density on archival media (e.g. magnetic tape) is improved, and the number of files per storage operation is reduced. According to one aspect of a method for managing single instancing data, for each storage operation, a chunk folder is created on a storage device that stores single instancing data. The chunk folder contains three files: 1) a file that contains data objects that have been single instanced; 2) a file that contains data objects that have not been eligible for single instancing; and 3) a metadata file used to track the location of data objects within the other files. A second storage operation subsequent to a first storage operation contains references to data objects in the chunk folder created by the first storage operation instead of the data objects themselves.

    Operation readiness checking and reporting

    公开(公告)号:US10942894B2

    公开(公告)日:2021-03-09

    申请号:US16733134

    申请日:2020-01-02

    Abstract: An information management system according to certain aspects may determine whether storage operations will work prior to executing them. The system may check various factors or parameters relating to a storage policy to verify whether the storage policy will work at runtime without actually executing the policy. Some examples of factors can include: availability of primary storage devices, availability of secondary storage devices, license availability for performing that operation, user credentials for connecting to primary and/or second storage devices, available storage capacity, connectivity to storage devices, etc. The system may also check whether a particular system configuration is supported in connection with storage operations. The result of the determination can be provided in the form of a report summarizing any problems found with the storage policy. The report can include recommended courses of action or solutions for resolving any identified issues.

Patent Agency Ranking