-
公开(公告)号:US12008135B2
公开(公告)日:2024-06-11
申请号:US17557530
申请日:2021-12-21
Applicant: Commvault Systems, Inc.
Inventor: Bhavyan Bharatkumar Mehta , Anand Vibhor , Mrityunjay Upadhyay , Shree Nandhini Santhakumar
IPC: G06F21/62
CPC classification number: G06F21/6245
Abstract: An illustrative data storage management system uses a control layer that controls information content presented to users and ensures information privacy between diverse tenants and/or resellers who share the system. The system populates a relationship database as transactions roll in (intake processing), and uses information in the relationship database later when processing responses (output processing). The relationship database comprises associations between e.g., a company ID and any number of entities that were created by or on behalf of the company or that are related to the company's service in the system. The control layer parses raw results that are responsive to requests for information and prevents others' information from being included in the responsive message(s). The techniques disclosed herein are not limited to shared systems managed by service providers, and may be implemented in fully owned and operated systems to add security and privacy among diverse users and/or departments.
-
公开(公告)号:US11012508B2
公开(公告)日:2021-05-18
申请号:US16358424
申请日:2019-03-19
Applicant: Commvault Systems, Inc.
Inventor: Bhavyan Bharatkumar Mehta , Anand Vibhor , Suraj Bharech , Mrityunjay Upadhyay
Abstract: A region-based distributed information management system is described herein in which some or all of the operations typically performed by a centralized storage manager can be distributed to storage managers located in the various geographic regions. These regional storage managers can manage components of the information management system located in their respective geographic region, and communicate with the centralized storage manager (also referred to herein as a “master storage manager”) for synchronization purposes and/or to hand off operations that cannot be performed by the regional storage manager.
-
公开(公告)号:US10296613B2
公开(公告)日:2019-05-21
申请号:US15475746
申请日:2017-03-31
Applicant: Commvault Systems, Inc.
Inventor: Amey Vijaykumar Karandikar , Anand Vibhor , Mrityunjay Upadhyay
IPC: G06F17/30
Abstract: A system according to certain aspects improves the process of managing log data. The system may receive a log data file including one or more log lines that contain information relating to computing operations. At least some of the log lines may include a static portion and a variable portion. The system may process a first log line to identify and extract a static portion from the first log line, and determine a first value for the first log line based on the extracted static portion. The system may process a second log line to identify and extract a static portion from the second log line, and determine a second value for the second log line based on the extracted static portion. The system may compare the first and second values, and based on the comparison, organize the first and second log lines together for presentation to a user.
-
公开(公告)号:US12093386B2
公开(公告)日:2024-09-17
申请号:US17173816
申请日:2021-02-11
Applicant: Commvault Systems, Inc.
Inventor: PurnaChandra Sekhar Bedhapudi , Sri Karthik Bhagi , Deepak Raghunath Attarde , Arun Prasad Amarendran , Amit Bhaskar Ausarkar , Mrityunjay Upadhyay
IPC: G06F21/56 , G06F16/17 , G06F16/174
CPC classification number: G06F21/566 , G06F16/1734 , G06F16/1752 , G06F2221/034 , G06F2221/2101
Abstract: This application relates to ransomware detection and data pruning management. Ransomware typically involves an I/O heavy process of encrypting data files and/or deleting or renaming the original files. Thus, ransomware attacks may be detected by analyzing the I/O activity in a given file system. In some embodiments, a software module running on a client machine manages copying, archiving, migrating, and/or replicating of primary data and restoring and/or pruning secondary data (e.g., backup copies of the primary data). When a potential ransomware attack is detected, the software module is immediately stopped so that the software module does not prune any data that may need to be restored. Upon receiving user input that indicates that the client machine is not under a ransomware attack, the software module is allowed to resume its operations, including pruning of the secondary data.
-
公开(公告)号:US20240302960A1
公开(公告)日:2024-09-12
申请号:US18431590
申请日:2024-02-02
Applicant: Commvault Systems, Inc.
Inventor: Anand Vibhor , Bhavyan Bharatkumar Mehta , Mrityunjay Upadhyay , Rohit Iyer , Balamurugan Avudaiappan , Jagadeesh Narayanan Kallidaikurichi Swaminathan
IPC: G06F3/06
CPC classification number: G06F3/0605 , G06F3/0629 , G06F3/067
Abstract: Distributed architecture for executing information management services using shared platform microservices, containerization techniques, and regional core services. This architecture decentralizes the traditional model by segmenting the various functions of the centralized control and information manager into modular cloud microservices. This modularization not only enhances system flexibility but also allows for a more dynamic configuration, with certain elements being deployable as containers. The resilient architecture leverages the inherent scalability and adaptability of cloud technology.
-
公开(公告)号:US11815993B2
公开(公告)日:2023-11-14
申请号:US17522264
申请日:2021-11-09
Applicant: Commvault Systems, Inc.
Inventor: Mrityunjay Upadhyay
CPC classification number: G06F11/0793 , G06F11/0721 , G06F11/30 , G06F11/3024 , G06F11/3419
Abstract: An illustrative data storage management system comprises “awareness logic” that executes on computing devices hosting storage management components such as storage manager, data agent, media agent, and/or other storage management applications. The illustrative awareness logic operates within each of these illustrative components, e.g., as a thread within processes of the storage management component, such as storage management core process, file identifier process, log monitoring process, etc. The awareness logic monitors the targeted process over time and triggers remedial action when criteria are met. Certain vital statistics of each process are collected periodically and analyzed by the illustrative awareness logic, such as CPU usage, memory usage, and handle counts. Criteria for corrective action include rising trends based on local minima data points for one or more vital statistics of the process. Other criteria include exceeding a threshold based on a logarithm function of the collected data points.
-
公开(公告)号:US11687424B2
公开(公告)日:2023-06-27
申请号:US16886520
申请日:2020-05-28
Applicant: Commvault Systems, Inc.
Inventor: Shree Nandhini Santhakumar , Mrityunjay Upadhyay
CPC classification number: G06F11/2094 , G06F3/0604 , G06F3/067 , G06F3/0634 , G06N3/08 , G06F2201/82
Abstract: Described herein are techniques for automating media agent state management. For example, if a media agent is running poorly, then the media agent can be disabled and an alternate media agent can perform secondary copy job operations in place of the poorly running media agent. To determine whether a media agent is running poorly, a storage manager can determine whether the media agent has an anomalous number of failed jobs, pending jobs, and/or long running jobs and/or can determine whether the amount of resources used by the media agent is high or is increasing constantly, at a constant rate, or at a near constant rate.
-
公开(公告)号:US11200110B2
公开(公告)日:2021-12-14
申请号:US16906424
申请日:2020-06-19
Applicant: Commvault Systems, Inc.
Inventor: Mrityunjay Upadhyay
Abstract: An illustrative data storage management system comprises “awareness logic” that executes on computing devices hosting storage management components such as storage manager, data agent, media agent, and/or other storage management applications. The illustrative awareness logic operates within each of these illustrative components, e.g., as a thread within processes of the storage management component, such as storage management core process, file identifier process, log monitoring process, etc. The awareness logic monitors the targeted process over time and triggers remedial action when criteria are met. Certain vital statistics of each process are collected periodically and analyzed by the illustrative awareness logic, such as CPU usage, memory usage, and handle counts. Criteria for corrective action include rising trends based on local minima data points for one or more vital statistics of the process. Other criteria include exceeding a threshold based on a logarithm function of the collected data points.
-
公开(公告)号:US09934265B2
公开(公告)日:2018-04-03
申请号:US14683005
申请日:2015-04-09
Applicant: CommVault Systems, Inc.
Inventor: Amey Vijaykumar Karandikar , Anand Vibhor , Mrityunjay Upadhyay
IPC: G06F17/30
CPC classification number: G06F17/30368 , G06F17/30303 , G06F17/30554
Abstract: A system according to certain aspects improves the process of managing log data. The system may receive a log data file including one or more log lines that contain information relating to computing operations. At least some of the log lines may include a static portion and a variable portion. The system may process a first log line to identify and extract a static portion from the first log line, and determine a first value for the first log line based on the extracted static portion. The system may process a second log line to identify and extract a static portion from the second log line, and determine a second value for the second log line based on the extracted static portion. The system may compare the first and second values, and based on the comparison, organize the first and second log lines together for presentation to a user.
-
公开(公告)号:US11892991B2
公开(公告)日:2024-02-06
申请号:US17571341
申请日:2022-01-07
Applicant: Commvault Systems, Inc.
Inventor: Pavan Kumar Reddy Bedadala , Marcelo dos Reis Mansano , Rajiv Kottomtharayil , Anand Vibhor , Bhavyan Bharatkumar Mehta , Mrityunjay Upadhyay
IPC: G06F11/30 , G06F16/215 , G06F16/23 , G06F11/07
CPC classification number: G06F16/215 , G06F11/0766 , G06F16/2365
Abstract: Described herein are techniques for better understanding problems arising in an illustrative information management system, such as a data storage management system, and for issuing appropriate alerts and reporting to data management professionals. The illustrative embodiments include a number of features that detect and raise awareness of anomalies in system operations, such as in deduplication pruning operations. Such anomalies can include delays in the processing of archive files to be deleted and/or delays in the generation of the list of archive files to delete. Anomalies are characterized by frequency anomalies and/or by occurrence counts. Utilization is also of interest for certain key system resources, such as deduplication databases, CPU and memory at the storage manager, etc., without limitation. Predicting low utilization periods for these and other key resources is useful for scheduling maintenance activities without interfering with ordinary deduplication pruning operations and/or other data protection jobs.
-
-
-
-
-
-
-
-
-