Abstract:
Methods and systems for a storage system are provided. One method includes obtaining network interface information by a processor executable plugin executed by a computing device from a storage system node managing stored information; filtering logical interface information based on a protocol used by a processor executable application that uses the storage system node to store information; obtaining aliases for the logical interface information, when available; and storing the filtered logical interface information and associated aliases at a network identifier cache managed by the plugin; wherein the network identifier cache is used by the plugin to verify network interface information as associated with a data path for a data container stored at a storage device.
Abstract:
Described herein are systems and methods for providing data policy management over application objects in a storage system environment. An application object may comprise non-virtual or virtual objects (e.g., non-virtual-based applications, virtual-based applications, or virtual storage components). An application object manager may represent application objects by producing mapping graphs and/or application object data that represent application objects in a standardized manner. A mapping graph for an application object may describe a mapping between the application object and its underlying storage objects on a storage system. Application object data may describe a mapping graph in a standardized format. Application object data representing application objects may be received by an application policy manager that manages data policies on the application objects (including virtual applications and virtual storage components) based on the received application object data. Data policies may include policies for backup, service level objectives, recovery, monitoring and/or reporting.
Abstract:
Methods and systems for protecting virtual machines is provided. One method includes discovering, by a first plugin, from a virtual machine (“VM”) management system, a plurality of VMs that share a logical data store having a plurality of virtual volumes used for storing data for the VMs by a storage system registered with the first plugin and a virtual appliance of the VM management system; obtaining, by the first plugin, from the virtual appliance, metadata and storage layout of a set of virtual volumes used by a VM to store data; using a first application programming interface (API), by the first plugin, for identifying a first set of storage volumes used by the storage system to store data for the set of virtual volumes; and creating, by the first plugin, a consistency group (“CG”) having the identified the first set of storage volumes and generating a snapshot of the CG.
Abstract:
Methods and systems for protecting virtual machines is provided. One method includes generating, by a first plugin, a directory for a virtual machine (VM) from among a plurality of VMs for a restore operation to restore the VM from a snapshot, the plurality of VMs sharing a logical data store having a plurality of virtual volumes used for storing data for the VMs by a storage system registered with the first plugin and a virtual appliance of a VM management system, the storage system using a first set of storage volumes to store data for a set of virtual volumes of the VM; renaming, by the first plugin, a logical object associated with the snapshot; and calling, by the first plugin, the virtual appliance to import the renamed logical object as a virtual volume.
Abstract:
Methods and systems for storage services is provided. One method includes configuring by a processor, a database availability group (DAG) storing an active database copy at a first computing node and a passive database copy of the active database copy at a second computing node; initiating a backup operation for backing up the passive database copy from the second computing node; and interfacing with the first computing node by the second computing node for completing the backup operation. The first computing node identifies logs for the backup operation, backs up the identified logs and provides metadata associated with the backup of the identified logs to the second computing node. The second computing node updates metadata for the backup operation such that a backup copy of the passive database copy points to the second node with metadata received from the first computing node.
Abstract:
Methods and systems for applications and/or virtual machines (“VM”) are provided. As an example, one method includes registering a storage system configured to store data for a VM; creating a policy for the VM for generating a VM backup by a storage management system interfacing with the storage system and a cloud-based microservice; storing, by the cloud-based micro-service, a copy of the VM backup at a cloud-based storage; receiving, by the cloud-based micro-service, an indication from the storage management system of a successful execution of a pre-restore operation upon unregistering the VM from a VM management system; and copying, by the cloud-based micro-service, VM data from the VM backup stored at the cloud-based storage to the storage system for executing a restore operation to restore the VM backup at the storage system.
Abstract:
Methods and systems for a storage system are provided. One method includes obtaining network interface information by a processor executable plugin executed by a computing device from a storage system node managing stored information; filtering logical interface information based on a protocol used by a processor executable application that uses the storage system node to store information; obtaining aliases for the logical interface information, when available; and storing the filtered logical interface information and associated aliases at a network identifier cache managed by the plugin; wherein the network identifier cache is used by the plugin to verify network interface information as associated with a data path for a data container stored at a storage device.
Abstract:
Methods and systems for protecting virtual machines is provided. One method includes discovering, by a first plugin, from a virtual machine (“VM”) management system, a plurality of VMs that share a logical data store having a plurality of virtual volumes used for storing data for the VMs by a storage system registered with the first plugin and a virtual appliance of the VM management system; obtaining, by the first plugin, from the virtual appliance, metadata and storage layout of a set of virtual volumes used by a VM to store data; using a first application programming interface (API), by the first plugin, for identifying a first set of storage volumes used by the storage system to store data for the set of virtual volumes; and creating, by the first plugin, a consistency group (“CG”) having the identified the first set of storage volumes and generating a snapshot of the CG.
Abstract:
Methods and systems for protecting virtual machines is provided. One method includes discovering, by a first plugin, from a virtual machine (“VM”) management system, a plurality of VMs that share a logical data store having a plurality of virtual volumes used for storing data for the VMs by a storage system registered with the first plugin and a virtual appliance of the VM management system; obtaining, by the first plugin, from the virtual appliance, metadata and storage layout of a set of virtual volumes used by a VM to store data; using a first application programming interface (API), by the first plugin, for identifying a first set of storage volumes used by the storage system to store data for the set of virtual volumes; and creating, by the first plugin, a consistency group (“CG”) having the identified the first set of storage volumes and generating a snapshot of the CG.
Abstract:
Methods and systems for storage services is provided. One method includes configuring by a processor, a database availability group (DAG) storing an active database copy at a first computing node and a passive database copy of the active database copy at a second computing node; initiating a backup operation for backing up the passive database copy from the second computing node; and interfacing with the first computing node by the second computing node for completing the backup operation. The first computing node identifies logs for the backup operation, backs up the identified logs and provides metadata associated with the backup of the identified logs to the second computing node. The second computing node updates metadata for the backup operation such that a backup copy of the passive database copy points to the second node with metadata received from the first computing node.