-
公开(公告)号:US20250110838A1
公开(公告)日:2025-04-03
申请号:US18476803
申请日:2023-09-28
Applicant: Commvault Systems, Inc
Inventor: Henry Dornemann , Anita JOSEPH , Karthikeyan NATARAJAN , Mathew ERICSON , Sri Manjari Vankayala
Abstract: The methods and systems described herein provide a solution for protecting configuration data associated with a virtual private cloud. Network configurations, accounts, and/or security data may be collected from the host of the virtual private network using APIs provided by the host. The point-in-time configuration information of a VPC can be used in disaster recovery, migration to a new VPC host, or manage VPC configurations across accounts and regions. During a backup operation of a computing resource within a VPC, one or more processes requests security, network, and/or gateway configuration information from the VPC host. This information may be collected and requested for the entire VPC topology. The VPC configuration information, in the format/output received from the VPC host, is then backed up and stored with the backup of that computing resource in secondary storage.
-
公开(公告)号:US20210103556A1
公开(公告)日:2021-04-08
申请号:US17105347
申请日:2020-11-25
Applicant: Commvault Systems, Inc.
Inventor: Ajay Venkat NAGRALE , Anita JOSEPH , Sasikala RAJU , Henry Wallace DORNEMANN
IPC: G06F16/11 , G06F9/455 , G06F11/14 , G06F16/188
Abstract: An executable utility is injected into cloud-based virtual machines (VMs) that are subject to backups by a data storage management system tasked with protecting the cloud-based VMs and their associated data. The utility is injected into a target VM which is “live” and operating. The utility analyzes the VM's live volume to discover data extents therein, and for each extent computes a respective checksum and determines whether the extent is a “hole.” Afterwards, checksums help identify changed data in successive snapshots of the live volume, so that only changed data will be read and backed up in incremental backups. Time is saved in performing the backup operation first by pre-warming the backup's source volume in parallel with the utility analyzing the live volume, and second by skipping read operations for extents unchanged since a preceding backup. The resulting incremental backup operation is sped up as compared to prior art approaches.
-
公开(公告)号:US20230052584A1
公开(公告)日:2023-02-16
申请号:US17979682
申请日:2022-11-02
Applicant: Commvault Systems, Inc.
Inventor: Ajay Venkat NAGRALE , Anita JOSEPH , Sasikala RAJU , Henry Wallace DORNEMANN
IPC: G06F16/11 , G06F16/188 , G06F11/14 , G06F9/455
Abstract: An executable utility is injected into cloud-based virtual machines (VMs) that are subject to backups by a data storage management system tasked with protecting the cloud-based VMs and their associated data. The utility is injected into a target VM which is “live” and operating. The utility analyzes the VM’s live volume to discover data extents therein, and for each extent computes a respective checksum and determines whether the extent is a “hole.” Afterwards, checksums help identify changed data in successive snapshots of the live volume, so that only changed data will be read and backed up in incremental backups. Time is saved in performing the backup operation first by pre-warming the backup’s source volume in parallel with the utility analyzing the live volume, and second by skipping read operations for extents unchanged since a preceding backup. The resulting incremental backup operation is sped up as compared to prior art approaches.
-
4.
公开(公告)号:US20190278662A1
公开(公告)日:2019-09-12
申请号:US15981739
申请日:2018-05-16
Applicant: Commvault Systems, Inc.
Inventor: Ajay Venkat NAGRALE , Anita JOSEPH , Sasikala RAJU , Henry Wallace DORNEMANN
Abstract: An executable utility is injected into cloud-based virtual machines (VMs) that are subject to backups by a data storage management system tasked with protecting the cloud-based VMs and their associated data. The utility is injected into a target VM which is “live” and operating. The utility analyzes the VM's live volume to discover data extents therein, and for each extent computes a respective checksum and determines whether the extent is a “hole.” Afterwards, checksums help identify changed data in successive snapshots of the live volume, so that only changed data will be read and backed up in incremental backups. Time is saved in performing the backup operation first by pre-warming the backup's source volume in parallel with the utility analyzing the live volume, and second by skipping read operations for extents unchanged since a preceding backup. The resulting incremental backup operation is sped up as compared to prior art approaches.
-
-
-