Abstract:
An information management system according to certain aspects may be configured to generate a snapshot of data relating to a plurality of applications. Data generated by the plurality of applications may be stored in a logical volume in primary storage. The system may include a plurality of data agents including a database data agent associated with a database application that can be configured to back up one or more log files of a database log separately from data of the database application. The system may also include a snapshot manager configured to: in response to receiving notifications from the plurality of data agents that the associated applications are in consistent states, obtain a snapshot of the logical volume; generate mapping information between a particular application of the plurality of applications and a portion of the snapshot relating to the particular application; and truncate the database log of the database application.
Abstract:
An information management system according to certain aspects may be configured to restore data of an application from a snapshot including data of a plurality of applications. The system may include a snapshot manager configured to: receive instructions to restore data of a first application from a snapshot in secondary storage, the snapshot comprising data of a plurality of applications stored in a logical volume in primary storage at a first time, the plurality of applications comprising the first application and executing on a client computing device at the first time, the plurality of applications being in consistent states at the first time; access mapping information that maps data of the first application in the snapshot to the first application; locate a portion of the snapshot corresponding to the data of the first application to be restored; and copy the portion of the snapshot from the secondary storage.
Abstract:
Disclosed are systems and methods for providing a user-centric interface into an information management system. The interface may enable a user to search for, view, and modify data objects in an information management system that are associated with the user or with the user's username. The interface may also enable a user to apply administrator-like functions to the data objects associated with the user. The administrator-like functions may include content modification, deduplication operations, and storage policy adjustments, among others.
Abstract:
Systems and methods for providing and/or facilitating live browsing of granular mail or mailbox data, such as data stored within Exchange mailboxes, are described. For example, the systems and methods may provide mechanisms for browsing and/or restoring granular data (e.g., email data) from an Exchange database backup copy (or other secondary copy), without having to restore the entire database from the backup copy.
Abstract:
An information management system includes a storage manager for managing backup and/or restore operations for one or more client computing devices. The storage manager may be in communication with a resource administrator of a computing resource cluster, wherein the resource administrator instantiates one or more computing pods using the computing resource cluster. The resource administrator may receive a request for computing resources from the storage manager and provision the computing pods based on the request. The resource administrator may then select a pre-configured container image from one or more pre-configured container images based on the computing resource request, wherein the pre-configured container image configures a computing pod to create secondary copies of primary data from a particular primary data source of the information management system. The resource administrator may then communicate a message to the storage manager informing the storage of the availability of the provisioned computing pods.
Abstract:
Data protection resources are automatically scaled to the needs of data source(s) in an application orchestrator computing environment, such as a cluster in a Kubernetes deployment. The approach is adaptable to data sources in production clusters or application suites that are not application orchestrator deployments, such as a cloud-based database-as-a-service (DBaaS). A data storage management system protects cluster-based data with an elastic number of data protection resources (e.g., data agents, media agents), which are deployed on demand. The number of data protection resources deployed for a particular job are appropriate to the workload(s) at present and depend on a variety of scaling factors. In some embodiments, data protection resources are deployed within the same cluster as the data sources. In other embodiments, a separate infrastructure cluster provides the data protection resources on demand, and connects to any number and types of data sources, whether cloud-based or otherwise, without limitation.
Abstract:
Systems and methods for providing and/or facilitating live browsing of granular mail or mailbox data, such as data stored within Exchange mailboxes, are described. For example, the systems and methods may provide mechanisms for browsing and/or restoring granular data (e.g., email data) from an Exchange database backup copy (or other secondary copy), without having to restore the entire database from the backup copy.
Abstract:
Systems and methods for performing backup operations and other secondary copy operations for mail servers, such as Exchange servers, are described. In some cases, the systems and methods perform multi-streaming backup and other copy operations using a single mailbox agent, which launches backup streams via a coordinator that determines when to launch streams, at what mailboxes (or folders) to launch the streams, and so on. The coordinator communicates with controllers at different machines (e.g., servers) to be backed up, and may assign streams, mailboxes, and so on, to the different controllers, which perform the backup operations for their assigned mailboxes and/or clients.
Abstract:
An improved content indexing (CI) system is disclosed herein. For example, the improved CI system may include a distributed architecture of client computing devices, media agents, a single backup and CI database, and a pool of servers. After a file backup occurs, the backup and CI database may include file metadata indices and other information associated with backed up files. Servers in the pool of servers may, in parallel, query the backup and CI database for a list of files assigned to the respective server that have not been content indexed. The servers may then request a media agent to restore the assigned files from secondary storage and provide the restored files to the servers. The servers may then content index the received restored files. Once the content indexing is complete, the servers can send the content index information to the backup and CI database for storage.
Abstract:
Systems and methods for storage pruning can enable users to delete, edit, or copy backed up data that matches a pattern. Storage pruning can enable fine-grain deletion or copying of these files from backups stored in secondary storage devices. Systems and methods can also enable editing of metadata associated with backups so that when the backups are restored or browsed, the logical edits to the metadata can then be performed physically on the data to create a custom restore or a custom view. A user may perform operations such as renaming, deleting, modifying flags, and modifying retention policies on backed up items. Although the underlying data in the backup may not change, the view of the backup data when the user browses the backup data can appear to include the user's changes. A restore of the data can cause those changes to be performed on the backup data.