Abstract:
According to certain aspects, a system may include a first computing device configured to: in response to a request to access at least one first database object of a plurality of database objects represented by a database file generated by a first database application, the database file including a plurality of data blocks, identify a subset of the plurality of data blocks corresponding to the first database object; a secondary storage controller computer(s) configured to: access a stored table providing a mapping between the secondary copies of the plurality of data blocks and corresponding locations of the secondary copies in a secondary storage device(s); retrieve and forward the subset of data blocks from the secondary storage device(s); and a second computing device configured to: receive the requested data blocks retrieved from the secondary storage device(s); and convert the received data blocks to a format usable by a second database application.
Abstract:
Systems and method that restore application data stored by a virtual machine database for an application (e.g., SQL, Sharepoint, Exchange, and so on) running on the virtual machine are described. The systems and methods create an integrated snapshot of the application data stored in the virtual machine database, by creating a secondary copy of the application data stored in the virtual machine database, performing, via a virtual server agent (VSA), a software snapshot of the virtual machine, and performing, via the virtual server agent, a hardware snapshot of the software snapshot of the virtual machine.
Abstract:
A information management system allows a user to search through a secondary copy of data, such as a back up, archive, or snapshot without first retrieving the secondary copy of data. Instead, the system constructs lightweight data that can be displayed to a user as a representation of the search results. Lightweight data may include metadata or other information that identifies data included in the secondary copy of data. The lightweight data may be perceived as being the secondary copy of data and allow a user to browse through search results. Once the user identifies a search result that is of interest, information in the lightweight data can be used to retrieve the secondary copy of data. Because lightweight data may have a smaller file size than the file size of the secondary copy of data, the latency of performing a search may be reduced.
Abstract:
Aspects of this disclosure relate to protecting email data. For example, email protection rules can instruct an email server to route an email to an email protection module. The one or more email rules can identify a group of one or more email addresses. The email protection module can receive an email from the email server that has an email address of the group as an intended receipt. The email protection module can route the email to secondary storage and store the email in secondary storage to create a secondary copy of the email. The secondary copy can be stored inline to persistent memory of secondary storage, according to certain embodiments. Access to the backup copy of the email stored to the persistent memory can be controlled, for example, based on whether a user had permission to access to the email when the email was sent.
Abstract:
An information management system according certain aspects may be configured to generate a snapshot of data relating to a plurality of applications. The system may include first and second data agents associated with first and second applications, respectively. The system may also include a snapshot manager configured to: in response to receiving notifications from the first and second data agents that the first and second applications are in consistent states: obtain a snapshot of the logical volume including data generated by the first and second applications; generate mapping information between the first application and a portion of the snapshot relating to the first application based at least in part on metadata obtained by the first data agent; and generate mapping information between the second application and a portion of the snapshot relating to the second application based at least in part on metadata obtained by the second data agent.
Abstract:
According to certain aspects, systems and methods for archiving and/or backing up PST files or other mail or calendar data, or the like (“off-line mail data”) are provided. Off-line mail data can be searched for in a client computer system, a copy of which may be transferred to secondary storage. Further, emails, contacts, calendar data, and/or the like (e.g., Microsoft Outlook data) contained in the transferred off-line mail data may be extracted, wherein it is determined whether copies of the data already exist backup data. Off-line mail data that already exists in backup can be deleted from the PST file. Following back-up of the off-line mail data, the backed up file may be deleted from the client system and/or the creation of future off-line mail files may be disabled.
Abstract:
A method and system for providing unified access to data for multiple computing devices includes a system that associates multiple computing devices with a user of an information management system, assigns information management policies to data from the multiple computing devices within the information management system, and collects multiple data objects from the multiple computers. The system may generate a preview version of each collected data object, and provide at least one preview version of a collected data object to a computing device associated with the user. The system may also generate indexing information for each collected data object and distribute the indexing information with the preview version of the data object.
Abstract:
A system for performing continuous transaction log backups with minimal resource usage of the client computing devices that are processing the transactions is disclosed. The system detects at least one input/output (I/O) activity at a client computing device. The I/O activity can be associated with at least one database operation performed via the client computing device. The system then executes one or more native commands to backup transactions log data associated with the detected I/O activity to a virtualized location. Backing-up the transactions log data comprises dynamically identifying a mount path location corresponding to the virtualized location, and transferring the transactions log data to the dynamically identified mount path using the one or more native commands. The system can then perform data processing operations (for example, data chunking and deduplicating) on the transactions log data after it is received at the dynamically identified mount path location.
Abstract:
An illustrative data storage management system comprises a management database that stores administrative preferences and system configurations, as well as results and/or statistics of completed secondary storage operations, i.e., information needed by the system to protect customers' data and to track and recover the protected data, including secondary copies such as backup copies, archive copies, etc. The disclosed data storage management system is configured to protect its own system data subject to a very aggressive (short) Recovery Point Objective (RPO), by using an innovative infrastructure that enables the system's storage manager to fail over to any number of other failover destination storage managers, each one comprising a destination management database. An illustrative database granularly tracks whether each and every transaction log file has been successfully applied to each and every destination management database to synchronize with the source management database.
Abstract:
According to certain aspects, a system may include a data agent configured to: process a database file residing on a primary storage device(s) to identify a subset of data in the database file for archiving, the database file generated by a database application; and extract the subset of the data from the database file and store the subset of the data in an archive file on the primary storage device(s) as a plurality of blocks having a common size; and at least one secondary storage controller computer configured to, as part of a secondary copy operation in which the archive file is copied to a secondary storage device(s): copy the plurality of blocks to the secondary storage devices to create a secondary copy of the archive file; and create a table that provides a mapping between the copied plurality of blocks and corresponding locations in the secondary storage device(s).