-
公开(公告)号:US20200293498A1
公开(公告)日:2020-09-17
申请号:US16352606
申请日:2019-03-13
Applicant: Commvault Systems, Inc.
Inventor: Manoj Kumar VIJAYAN , Deepak Raghunath ATTARDE
IPC: G06F16/174
Abstract: An information management system can dynamically adjust the order in which compression and deduplication operations are performed based on the type of file for which a secondary copy operation is requested. For example, the information management system can determine whether the file for which a secondary copy operation is requested is a first type of file that is text-based and/or that has data blocks that are highly compressible or a second type of file that may have data blocks that are not highly compressible. If the information management system determines that the file is of the second type, the information management system can perform a deduplication operation prior to performing a compression operation. Furthermore, the information management system can dynamically adjust the size of various deduplication blocks based on the type of file for which a secondary copy operation is requested.
-
公开(公告)号:US20200259899A1
公开(公告)日:2020-08-13
申请号:US16789848
申请日:2020-02-13
Applicant: Commvault Systems, Inc.
Inventor: Manoj Kumar VIJAYAN , Srikant VISWANATHAN , Deepak Raghunath ATTARDE , Varghese DEVASSY , Rajiv KOTTOMTHARAYIL
Abstract: According to various embodiments, systems and methods are provided that relate to shared access to Storage Area Networks (SAN) devices. In one embodiment, a Storage Area Network (SAN) host is provided, comprising: a server component: a first host bus adapter configured to be connected to a SAN client over a first SAN; a second host bus adapter configured to be connected to a SAN storage device over a second SAN; and wherein the server component is configured to manage a data block on the SAN storage device, receive a storage operation request from the SAN client through the first host bus adapter, and in response to the storage operation request, perform a storage operation on the data block, the storage operation being performed over the second SAN through the second host bus adapter.
-
公开(公告)号:US20190026305A1
公开(公告)日:2019-01-24
申请号:US15875896
申请日:2018-01-19
Applicant: Commvault Systems, Inc.
Inventor: Manoj Kumar VIJAYAN , Rajiv KOTTOMTHARAYIL , Deepak Raghunath ATTARDE
CPC classification number: G06F16/1748 , G06F3/067 , G06F11/1453 , G06F16/137 , G06F16/174 , G06F16/22 , G06F16/256 , H04L67/02 , H04L67/06
Abstract: A distributed, deduplicated storage system according to certain embodiments is arranged in a parallel configuration including multiple deduplication nodes. Deduplicated data is distributed across the deduplication nodes. The deduplication nodes can be networked together and communicate with one another according using a light-weight, customized communication scheme (e.g., a scheme based on FTP or HTTP). In some cases, deduplication management information including deduplication signatures and/or other metadata is stored separately from the deduplicated data in deduplication management nodes, improving performance and scalability.
-
公开(公告)号:US20170192866A1
公开(公告)日:2017-07-06
申请号:US15299254
申请日:2016-10-20
Applicant: Commvault Systems, Inc.
Inventor: Manoj Kumar VIJAYAN , Jaidev Oppath KOCHUNNI , Deepak Raghunath ATTARDE , Ramachandra Reddy ANKIREDDYPALLE
CPC classification number: G06F11/1662 , G06F3/0619 , G06F3/0632 , G06F3/0641 , G06F3/0647 , G06F3/065 , G06F3/0659 , G06F3/067 , G06F3/0683 , G06F11/2094 , G06F17/30174 , G06F17/30575 , G06F2201/805 , G06F2201/82 , H04L67/1097
Abstract: Systems and methods are provided herein for automatically configuring newly installed secondary storage computing devices and managing secondary storage computing devices when one or more become unavailable. For example, a storage manager can then detect the computing resources available to the newly installed secondary storage computing device, assign a role to the newly installed secondary storage computing device based on the detected computing resources, configure the newly installed secondary storage computing device with deduplication and storage policies used by the other secondary storage computing devices, re-partition secondary storage devices to allocate memory for the newly installed secondary storage computing device, and instruct other secondary storage computing devices to replicate their managed data such that the newly installed secondary storage computing device has access to the replicated data.
-
公开(公告)号:US20210294510A1
公开(公告)日:2021-09-23
申请号:US17174769
申请日:2021-02-12
Applicant: Commvault Systems, Inc.
Inventor: Manoj Kumar VIJAYAN , Jaidev Oppath KOCHUNNI , Deepak Raghunath ATTARDE , Ramachandra Reddy ANKIREDDYPALLE
IPC: G06F3/06 , G06F11/20 , H04L29/08 , G06F16/215
Abstract: Systems and methods are provided herein for automatically configuring newly installed secondary storage computing devices and managing secondary storage computing devices when one or more become unavailable. For example, a storage manager can then detect the computing resources available to the newly installed secondary storage computing device, assign a role to the newly installed secondary storage computing device based on the detected computing resources, configure the newly installed secondary storage computing device with deduplication and storage policies used by the other secondary storage computing devices, re-partition secondary storage devices to allocate memory for the newly installed secondary storage computing device, and instruct other secondary storage computing devices to replicate their managed data such that the newly installed secondary storage computing device has access to the replicated data.
-
公开(公告)号:US20210209056A1
公开(公告)日:2021-07-08
申请号:US17185064
申请日:2021-02-25
Applicant: Commvault Systems, Inc.
Inventor: Paramasivam KUMARASAMY , Prakash VARADHARAJAN , Deepak Raghunath ATTARDE , Pavan Kumar Reddy BEDADALA , Satish Chandra KILARU
Abstract: Techniques for enabling user search of content stored in a file archive include providing a search interface comprising a search rules portion and an action rules portion, receiving a file archive search criterion comprising at least one search rule, and searching the file archive using the search criterion. The techniques also include generating a set of files filtered using the search criterion and performing an action specified in the action rules portion on a file included in the set of files.
-
公开(公告)号:US20210019236A1
公开(公告)日:2021-01-21
申请号:US16569559
申请日:2019-09-12
Applicant: Commvault Systems, Inc.
Inventor: Deepak Raghunath ATTARDE , Chandrashekar MARANNA , Suseela Sowmya SRIPADA , Manoj Kumar VIJAYAN
IPC: G06F11/14 , G06F16/215 , G06F16/23
Abstract: If a deduplication database becomes corrupted or is lost, the deduplication database may be reconstructed by restoring an earlier backup copy of the deduplication database. The backup copy of the deduplication database, however, may not be synced with the deduplicated data blocks that are presently stored in the secondary storage subsystem. To address the possibility of data loss and improve reconstruction timing, a deduplicated storage system is provided according to certain embodiments that uses one or more mechanisms to restore the deduplication database and resync with the secondary storage by using one or more journal files that track the data blocks that have been or may have been deleted from the secondary storage since the last deduplication database backup.
-
公开(公告)号:US20200226030A1
公开(公告)日:2020-07-16
申请号:US16743879
申请日:2020-01-15
Applicant: CommVault Systems, Inc.
Inventor: Chandrashekar MARANNA , Manoj Kumar VIJAYAN , Abhishek NARULKAR , Deepak Raghunath ATTARDE , Saurabh AGRAWAL
IPC: G06F11/14 , G06F3/06 , G06F16/21 , G06F16/174 , G06F11/00
Abstract: According to certain aspects, a method can include receiving an indication that a restoration of a deduplication database using a secondary copy of a file associated with a secondary copy job is complete; retrieving a first data fingerprint from a data storage database, wherein the first data fingerprint is associated with the secondary copy job used to restore the deduplication database; retrieving a second data fingerprint from a deduplication database media agent, wherein the second data fingerprint is associated with the secondary copy job used to restore the deduplication database; comparing the first data fingerprint with the second data fingerprint to determine whether the first data fingerprint and the second data fingerprint match; and transmitting an instruction to the deduplication database media agent to rebuild the restored deduplication database in response to a determination that the first data fingerprint and the second data fingerprint do not match.
-
公开(公告)号:US20190109870A1
公开(公告)日:2019-04-11
申请号:US16129644
申请日:2018-09-12
Applicant: Commvault Systems, Inc.
Inventor: PurnaChandra Sekhar BEDHAPUDI , Sri Karthik BHAGI , Deepak Raghunath ATTARDE , Arun Prasad AMARENDRAN , Amit Bhaskar AUSARKAR , Mrityunjay UPADHYAY
Abstract: This application relates to ransomware detection and intelligent restore. Ransomware typically involves an I/O heavy process of encrypting data files and/or deleting or renaming the original files. Thus, ransomware attacks may be detected by analyzing the I/O activity in a given file system. When a potential ransomware attack is detected, a timestamp is recorded. If the client machine is indeed taken over by the ransomware attack, an intelligent restore operation can be performed such that the file system is automatically restored to a point in time prior to the infection by the ransomware attack using the recorded timestamp.
-
公开(公告)号:US20190108340A1
公开(公告)日:2019-04-11
申请号:US16129609
申请日:2018-09-12
Applicant: Commvault Systems, Inc.
Inventor: PurnaChandra Sekhar BEDHAPUDI , Sri Karthik BHAGI , Deepak Raghunath ATTARDE , Arun Prasad AMARENDRAN , Amit Bhaskar AUSARKAR , Mrityunjay UPADHYAY
Abstract: This application relates to ransomware detection. Ransomware typically involves an I/O heavy process of encrypting data files and/or deleting or renaming the original files. Thus, ransomware attacks may be detected by analyzing the I/O activity in a given file system. In some embodiments, a software module running on a client machine monitors the I/O activity in a file system. The software module records the number of times the files in the file system are modified, created, deleted, and renamed. The recorded number is compared against a threshold. If the number exceeds the threshold, the software module provides an alert to the user of the client machine that the client machine may be under a ransomware attack. In some embodiments, index data gathered as part of backup operations is utilized, either alone or in combination with the continuously monitored I/O activity data, to detect ransomware attacks.
-
-
-
-
-
-
-
-
-