-
公开(公告)号:US20210208974A1
公开(公告)日:2021-07-08
申请号:US17206713
申请日:2021-03-19
Applicant: Trilio Data, Inc.
Inventor: Muralidhara R. Balcha , Prashanto Jairaj Kochavara , David Safaii , Vinod Patil , Ajay Nemade , Prafull Ladha , Abhisek Dwivedi , Madhur Nawandar , Sanjay Singh Shekhawat
Abstract: A computer-implemented method of data protection for containerized applications includes initiating a backup process for a containerized application comprising an application template, application information, and application data. An application template associated with the application is saved to a first repository. Application information is identified and saved to a second repository. A persistent volume containing the application data is identified and at least some of the application data from the persistent volume is saved to a third repository. The application is then restored based on the saved template, application information and application data.
-
公开(公告)号:US20220147391A1
公开(公告)日:2022-05-12
申请号:US17521922
申请日:2021-11-09
Applicant: Trilio Data, Inc.
Inventor: Muralidhara R. Balcha , Prashanto Jairaj Kochavara , David Safaii , Seema Patwardhan Karandikar , Madhur Nawandar
Abstract: A computer-implemented method for providing cloud resource monitor interfaces for containerized applications includes portraying a hierarchy of monitored cloud resources and identifying a request to display system metrics for a selected set of monitored cloud resources in the hierarchy. One or more application tools associated with the selected set of monitored cloud resources are discovered. The discovered one or more application tools associated with the selected set of monitored cloud resources are portrayed in a first window where each of the one or more application tools are represented by a corresponding symbol presented in the first window such that the one or more application tools can be selected. The one or more system metrics of each of the one or more application tools portrayed in the first window using at least one attribute of the corresponding symbol of the one or more application tools such that system metrics of the one or more application tools can be compared so that a comparison results in a selected set of application tools being determined. A request to display summary system metrics for the selected set of application tools based on the comparison and portraying summary system metrics for the selected set of application tools is identified in a second window.
-
公开(公告)号:US11288130B2
公开(公告)日:2022-03-29
申请号:US17206713
申请日:2021-03-19
Applicant: Trilio Data, Inc.
Inventor: Muralidhara R. Balcha , Prashanto Jairaj Kochavara , David Safaii , Vinod Patil , Ajay Nemade , Prafull Ladha , Abhisek Dwivedi , Madhur Nawandar , Sanjay Singh Shekhawat
Abstract: A computer-implemented method of data protection for containerized applications includes initiating a backup process for a containerized application comprising an application template, application information, and application data. An application template associated with the application is saved to a first repository. Application information is identified and saved to a second repository. A persistent volume containing the application data is identified and at least some of the application data from the persistent volume is saved to a third repository. The application is then restored based on the saved template, application information and application data.
-
公开(公告)号:US20210149769A1
公开(公告)日:2021-05-20
申请号:US17098668
申请日:2020-11-16
Applicant: Trilio Data, Inc.
Inventor: Muralidhara R. Balcha , Prashanto Jairaj Kochavara , David Safaii , Vinod Patil , Ajay Nemade , Prafull Ladha , Abhisek Dwivedi , Madhur Nawandar , Sanjay Singh Shekhawat
Abstract: A computer-implemented method of data protection for containerized applications includes initiating a backup process for a containerized application comprising an application template, application information, and application data. An application template associated with the application is saved to a first repository. Application information is identified and saved to a second repository. A persistent volume containing the application data is identified and at least some of the application data from the persistent volume is saved to a third repository. The application is then restored based on the saved template, application information and application data.
-
-
-