-
公开(公告)号:US20210232460A1
公开(公告)日:2021-07-29
申请号:US17233187
申请日:2021-04-16
Applicant: Commvault Systems, Inc.
Inventor: Rajiv KOTTOMTHARAYIL , Deepak Raghunath ATTARDE , Manoj Kumar VIJAYAN
IPC: G06F11/14 , G06F16/174
Abstract: Described in detail herein are systems and methods for managing single instancing data. Using a single instance database and other constructs (e.g. sparse files), data density on archival media (e.g. magnetic tape) is improved, and the number of files per storage operation is reduced. According to one aspect of a method for managing single instancing data, for each storage operation, a chunk folder is created on a storage device that stores single instancing data. The chunk folder contains three files: 1) a file that contains data objects that have been single instanced; 2) a file that contains data objects that have not been eligible for single instancing; and 3) a metadata file used to track the location of data objects within the other files. A second storage operation subsequent to a first storage operation contains references to data objects in the chunk folder created by the first storage operation instead of the data objects themselves.
-
公开(公告)号:US20200241766A1
公开(公告)日:2020-07-30
申请号:US16722756
申请日:2019-12-20
Applicant: Commvault Systems, Inc.
Inventor: Manoj Kumar VIJAYAN , Saurabh AGRAWAL , Deepak Raghunath ATTARDE
Abstract: A system according to certain aspects may include a secondary storage controller computer configured to: in response to a first instruction to obtain a first secondary copy of a first data set from a secondary storage device(s), the first instruction associated with a first restore operation: instantiate a first restore thread on a processor of the secondary storage controller computer; using the first restore thread, retrieve the first secondary copy from the secondary storage device(s); and forward the retrieved first secondary copy to a primary storage subsystem for storage; and in response to a second instruction to obtain a second secondary copy of a second data set from the secondary storage device(s), the second instruction associated with a second restore operation: using the first restore thread, retrieve the second secondary copy from the secondary storage device(s); and forward the retrieved second secondary copy to the primary storage subsystem for storage.
-
公开(公告)号:US20200089659A1
公开(公告)日:2020-03-19
申请号:US16550094
申请日:2019-08-23
Applicant: Commvault Systems, Inc.
Inventor: Deepak Raghunath ATTARDE , Manoj Kumar VIJAYAN
IPC: G06F16/174 , G06F3/06
Abstract: An information management system can manage the removal of data block entries in a deduplicated data store using working copies of the data block entries residing in a local data store of a secondary storage computing device. The system can use the working copies to identify data blocks for removal. Once the deduplication database is updated with the changes to the working copies (e.g., using a transaction based update scheme), the system can query the deduplication database for the database entries identified for removal. Once identified, the system can remove the database entries identified for pruning and/or the corresponding deduplication data blocks from secondary storage.
-
公开(公告)号:US20190108341A1
公开(公告)日:2019-04-11
申请号:US16129623
申请日:2018-09-12
Applicant: Commvault Systems, Inc.
Inventor: PurnaChandra Sekhar BEDHAPUDI , Sri Karthik BHAGI , Deepak Raghunath ATTARDE , Arun Prasad AMARENDRAN , Amit Bhaskar AUSARKAR , Mrityunjay UPADHYAY
IPC: G06F21/56 , G06F16/17 , G06F16/174
Abstract: This application relates to ransomware detection and data pruning management. Ransomware typically involves an I/O heavy process of encrypting data files and/or deleting or renaming the original files. Thus, ransomware attacks may be detected by analyzing the I/O activity in a given file system. In some embodiments, a software module running on a client machine manages copying, archiving, migrating, and/or replicating of primary data and restoring and/or pruning secondary data (e.g., backup copies of the primary data). When a potential ransomware attack is detected, the software module is immediately stopped so that the software module does not prune any data that may need to be restored. Upon receiving user input that indicates that the client machine is not under a ransomware attack, the software module is allowed to resume its operations, including pruning of the secondary data.
-
公开(公告)号:US20170193003A1
公开(公告)日:2017-07-06
申请号:US15299299
申请日:2016-10-20
Applicant: Commvault Systems, Inc.
Inventor: Manoj Kumar VIJAYAN , Jaidev Oppath KOCHUNNI , Deepak Raghunath ATTARDE , Ramachandra Reddy ANKIREDDYPALLE
Abstract: Systems and methods are provided herein for automatically configuring newly installed secondary storage computing devices and managing secondary storage computing devices when one or more become unavailable. For example, a storage manager can then detect the computing resources available to the newly installed secondary storage computing device, assign a role to the newly installed secondary storage computing device based on the detected computing resources, configure the newly installed secondary storage computing device with deduplication and storage policies used by the other secondary storage computing devices, re-partition secondary storage devices to allocate memory for the newly installed secondary storage computing device, and instruct other secondary storage computing devices to replicate their managed data such that the newly installed secondary storage computing device has access to the replicated data.
-
公开(公告)号:US20160335009A1
公开(公告)日:2016-11-17
申请号:US14727611
申请日:2015-06-01
Applicant: Commvault Systems, Inc.
Inventor: Manoj Kumar VIJAYAN , Saurabh AGRAWAL , Deepak Raghunath ATTARDE
CPC classification number: G06F3/0619 , G06F3/0647 , G06F3/065 , G06F3/0683 , G06F9/466 , G06F11/1446 , G06F11/1448 , G06F11/1458 , G06F11/1469
Abstract: A system according to certain aspects may include a secondary storage controller computer configured to: in response to a first instruction to obtain a first secondary copy of a first data set from a secondary storage device(s), the first instruction associated with a first restore operation: instantiate a first restore thread on a processor of the secondary storage controller computer; using the first restore thread, retrieve the first secondary copy from the secondary storage device(s); and forward the retrieved first secondary copy to a primary storage subsystem for storage; and in response to a second instruction to obtain a second secondary copy of a second data set from the secondary storage device(s), the second instruction associated with a second restore operation: using the first restore thread, retrieve the second secondary copy from the secondary storage device(s); and forward the retrieved second secondary copy to the primary storage subsystem for storage.
Abstract translation: 根据某些方面的系统可以包括辅助存储控制器计算机,其被配置为:响应于从辅助存储设备获得第一数据集的第一副本的第一指令,与第一恢复相关联的第一指令 操作:在辅助存储控制器计算机的处理器上实例化第一恢复线程; 使用第一个还原线程从辅助存储设备检索第一个副本; 并将所检索的第一副本转发到主存储子系统以进行存储; 并且响应于从所述辅助存储设备获得第二数据集的第二副本的第二指令,所述第二指令与第二还原操作相关联:使用所述第一恢复线程从所述第二恢复线程中检索所述第二副本 辅助存储设备; 并将检索到的第二副本转发到主存储子系统以进行存储。
-
公开(公告)号:US20240160535A1
公开(公告)日:2024-05-16
申请号:US18414528
申请日:2024-01-17
Applicant: Commvault Systems, Inc.
Inventor: Henry Wallace DORNEMANN , Amit MITKAR , Pratik S. RANA , Deepak Raghunath ATTARDE , Ashwin Gautamchand SANCHETI
IPC: G06F11/14 , G06F16/13 , G06F16/172
CPC classification number: G06F11/1469 , G06F16/13 , G06F16/172 , G06F9/45533 , G06F2201/815
Abstract: An illustrative approach accelerates file indexing operations for block-level backup copies in a data storage management system. A cache storage area is maintained for locally storing and serving key data blocks, thus relying less on retrieving data on demand from the backup copy. File indexing operations are used for populating the cache storage area for speedier retrieval during subsequent live browsing of the same backup copy, and vice versa. The key data blocks cached while file indexing and/or live browsing an earlier backup copy help to pre-fetch corresponding data blocks of later backup copies, thus producing a beneficial learning cycle. The approach is especially beneficial for cloud and tape backup media, and is available for a variety of data sources and backup copies, including block-level backup copies of virtual machines (VMs) and block-level backup copies of file systems, including UNIX-based and Windows-based operating systems and corresponding file systems.
-
公开(公告)号:US20220245105A1
公开(公告)日:2022-08-04
申请号:US17725451
申请日:2022-04-20
Applicant: Commvault Systems, Inc.
Inventor: Deepak Raghunath ATTARDE , Manoj Kumar VIJAYAN
IPC: G06F16/215 , G06F16/27 , G06F16/22
Abstract: A deduplicated storage system is provided according to certain embodiments that uses one or more mechanisms to update the deduplication database and remove records corresponding to data blocks that have been or will be erased from the secondary copies, without using or tracking reference counting values. Some embodiments described herein use a secondary table to identify the corresponding records from the primary table that can be removed and/or moved to another table for storing “zero-reference” data blocks. In other embodiments, the system will then traverse the “zero-reference” table and remove those primary data blocks from secondary storage devices.
-
公开(公告)号:US20210271758A1
公开(公告)日:2021-09-02
申请号:US17173816
申请日:2021-02-11
Applicant: Commvault Systems, Inc.
Inventor: PurnaChandra Sekhar BEDHAPUDI , Sri Karthik BHAGI , Deepak Raghunath ATTARDE , Arun Prasad AMARENDRAN , Amit Bhaskar AUSARKAR , Mrityunjay UPADHYAY
IPC: G06F21/56 , G06F16/174 , G06F16/17
Abstract: This application relates to ransomware detection and data pruning management. Ransomware typically involves an I/O heavy process of encrypting data files and/or deleting or renaming the original files. Thus, ransomware attacks may be detected by analyzing the I/O activity in a given file system. In some embodiments, a software module running on a client machine manages copying, archiving, migrating, and/or replicating of primary data and restoring and/or pruning secondary data (e.g., backup copies of the primary data). When a potential ransomware attack is detected, the software module is immediately stopped so that the software module does not prune any data that may need to be restored. Upon receiving user input that indicates that the client machine is not under a ransomware attack, the software module is allowed to resume its operations, including pruning of the secondary data.
-
公开(公告)号:US20210209128A1
公开(公告)日:2021-07-08
申请号:US17188202
申请日:2021-03-01
Applicant: Commvault Systems, Inc.
Inventor: Marcus S. MULLER , Deepak Raghunath ATTARDE , Manoj Kumar VIJAYAN
IPC: G06F16/27
Abstract: Described are systems and methods for storing a variable number of instances of data objects (e.g., 1, 2, 3, or up to N−1 instances, where N is the number of instances of the data object included in primary data) in secondary storage across a data storage network. In some examples, a system for storing a variable number of instances of data objects includes, one or more computing devices storing a set of data objects and multiple storage devices distinct from the one or more computing devices. Each of the multiple storage devices is configured to store at least a single instance of a data object. The system also includes a database configured to store information associated with the data objects. This information includes substantially unique identifiers for the data objects and, for each of the data objects, a number of instances of the data object stored on the multiple storage devices.
-
-
-
-
-
-
-
-
-