摘要:
Described are techniques for processing recovery points. One or more storage objects for which data protection processing is performed are determined. The data protection processing includes copying data for each of said one or more storage objects to one or more data protection storage devices. One or more recovery points corresponding to each of said one or more storage objects are determined. For each of the one or more recovery points corresponding to each of the one or more storage objects, performing processing including determining whether said each recovery point is at least one of recoverable in accordance with recoverable criteria and restartable in accordance with restartable criteria.
摘要:
Described are techniques for processing recovery points. One or more storage objects for which data protection processing is performed are determined. The data protection processing includes copying data for each of said one or more storage objects to one or more data protection storage devices. One or more recovery points corresponding to each of said one or more storage objects are determined. For each of the one or more recovery points corresponding to each of the one or more storage objects, performing processing including determining whether said each recovery point is at least one of recoverable in accordance with recoverable criteria and restartable in accordance with restartable criteria.
摘要:
Example embodiments of the present invention provide a method, apparatus and computer-program product for application migration validation. In short, example embodiments of the present invention provide a tool to be run by an administrator prior to migration to determine a pre-migration policy. The administrator then performs the migration. After the migration is complete, the administrator runs to tool again to determine a post-migration policy. The tool then validates the post-migration policy. For example, the tool may compare the pre-migration policy and the post-migration police to determine whether there are differences between the pre-migration policy and the post-migration policy. Alternatively, the tool may compare the post-migration policy against a changed policy, different from the pre-migration policy, deliberately implemented by the administrator. The tool may alert on differences between the pre-migration policy and the desired post-migration policy (i.e., a properly migrated pre-migration policy or a new policy different than the pre-migration policy).
摘要:
Described are techniques for determining an implemented data protection policy. One or more recovery points corresponding to each of one or more storage objects are determined. A data protection method determined in accordance with a facility and replication type associated with each recovery point is selected for each of the one or more recovery points. A data protection category for each of the one or more recovery points is determined in accordance with the data protection method, a recovery point type, and a recovery point location associated with each recovery point. A data protection policy indicating an implemented data protection policy for each of the one or more storage objects for at least one data protection category is stored.
摘要:
In one aspect, a method includes obtaining data on components of a virtualization server comprising acquiring a mapping of virtual disks in a virtual store to storage disks, obtaining data on components of a storage array comprising acquiring a mapping of logical units in the storage array to the storage disks, the logical units replicating data from a corresponding storage disk, correlating each virtual disk to a logical unit based on the mapping of the virtual disks to the storage disks and the mapping of the logical units to the storage disks, retrieving replication data of the logical units from the storage arrays and, for a selected virtual store, checking that the selected virtual store has a replica for all the required storage disks mapped to the virtual disks of the selected virtual store.
摘要:
In one aspect, a method includes determining if a rule in a memory of an event-based analysis engine has been used by the event-based analysis engine within a predetermined period of time and moving the rule to a storage device if the rule in the memory of the event-based analysis engine has not been used by the event-based analysis engine within the predetermined period of time.
摘要:
In one aspect, a method, includes receiving and storing objects in a repository, translating objects in an object repository format to a graphical user interface (GUI) format, rendering the GUI format to a user, receiving a rule from the user using the GUI format, translating the rule in the GUI format to a rule repository format, storing rule in the rule repository format in a rule repository and compiling the rule in the rule repository format into a format that is acceptable for processing by the event based analysis engine.
摘要:
Providing a multiple protection snapshot copy of a logical device includes creating the snapshot copy of the logical device, where, in response to a write to a section of the logical device, data is copied to a first alternative storage area prior to the write and, following creating the snapshot copy, pointing portions of the snapshot copy to a second alternative storage area having data that is a copy of the logical device, where data corresponding to the snapshot copy is stored in one of: the first alternative storage area and the second alternative storage area. Providing a multiple protection snapshot copy of a logical device may also include, prior to pointing portions of the snapshot copy to the second alternative storage area and after creating the snapshot copy, copying data from the logical device to the second alternative storage area.
摘要:
Several aspects for providing historical information to an event based image include a method, an apparatus and an article. One or more of the aspects includes receiving a trigger associated with a rule, determining if the rule requires that historical information be provided to an event-based analysis engine, filtering out events not needed by the rule if the rule requires historical information and providing the event-based analysis engine with historical information based on the filtering.
摘要:
Described are techniques for determining an implemented data protection policy. One or more recovery points corresponding to each of one or more storage objects are determined. A data protection method determined in accordance with a facility and replication type associated with each recovery point is selected for each of the one or more recovery points. A data protection category for each of the one or more recovery points is determined in accordance with the data protection method, a recovery point type, and a recovery point location associated with each recovery point. A data protection policy indicating an implemented data protection policy for each of the one or more storage objects for at least one data protection category is stored.