摘要:
An improved technique for performing forensic investigations in an electronic system includes capturing and associating multiple streams of information. The streams include a network stream and a storage stream. The network stream includes a record of network activities. The storage stream includes a record of storage activities. In some examples, the storage stream includes both disk activities and memory activities, including both reads and writes. Records of the captured streams are stored in a data storage array and are associated by applying a common timing reference to the records. A comprehensive history is thus obtained, with both network and storage activities coordinated in time, to enable examination and tracing of suspect or malicious occurrences across network and storage domains. The improved technique can be used in both physical and virtual computing environments and affords particular advantages in virtual and cloud environments where forensic analysis has proven to be difficult.
摘要:
An improved technique for logging events in an electronic system for forensic analysis includes receiving event records by a recording unit from different forensic agents of the electronic system and applying timing information included within the event records to resequence the event records in the recording unit in a more accurate order. In some examples, the timing information includes a vector clock established among the agents of the electronic system for storing sequences of events. The vector clock provides sequence information about particular events occurring among the forensic agents, which is applied to correct the order of reported event records. In other examples, the timing information includes timestamps published to the agents from a common timestamp server. In yet other examples, the timing information includes timestamps of the devices on which the agents are running, or any combination of the foregoing examples of timing information.
摘要:
A method and system comprising splitting an IO in a system; intercepting the IO in an appliance; determining whether the IO is directed to a replicated file system; sending the IO directed to the replicated file system to a replication device; and acknowledging the receipt of the IO. A method, system and computer program product comprising requesting access to a point in time in a replicated file system; determining from a plurality of bookmarks of file system configurations; a bookmark corresponding to the point in time; determining if the current configuration of the file system is equivalent to the bookmark; and reconfiguring the file system when the current configuration is not equivalent to the configuration of the bookmark.
摘要:
In one aspect, a method includes intercepting write I/Os going to a volume on a storage array and sending the write I/Os to targets on a plurality of source-side data protection appliances based on a load balancing scheme. In another aspect, an article includes a non-transitory machine-readable medium that stores executable instructions. The instructions cause a machine to intercept write I/Os going to a volume on a storage array and send the write I/Os to targets on a plurality of source-side data protection appliances based on a load balancing scheme. In a further aspect, an apparatus includes circuitry configured to intercept write I/Os going to a volume on a storage array and send the write I/Os to targets on a plurality of source-side data protection appliances based on a load balancing scheme.
摘要:
A method, system, and computer program product for receiving a request to roll an image to a point in time by reading data from a journal, applying data from the journal to create a asynchronous copy on write image at the requested point in time, creating a virtual image data structure, and allowing writes to be cached in a journal based replication appliance.
摘要:
In one aspect, a method includes determining that a first quorum of servers is available at a production site and a target site and generating a group-set bookmark if the first quorum of servers is available. In another aspect, an article includes a non-transitory machine-readable medium that stores executable instructions. The instructions cause a machine to determine that a first quorum of servers is available at a production site and a target site and generate a group-set bookmark if the first quorum of servers is available. In a further aspect, an apparatus includes circuitry configured to determine that a first quorum of servers is available at a production site and a target site; and generate a group -set bookmark if the first quorum of servers available.
摘要:
In one aspect, a method includes receiving a request to access a virtual volume snapshot, preparing to bind the virtual volume snapshot, intercepting a command to prepare bind of the virtual volume snapshot, rolling back to a point in time corresponding to the requested virtual volume snapshot and generating a virtual volume snapshot in a storage array.
摘要:
A method, computer program product, and computing system for receiving an indication that a target virtual machine is going to be migrated from a first operating environment to a second operating environment. The target cache system is associated with target virtual machine. An auxiliary virtual machine is generated within the second operating environment. An auxiliary cache system is associated with the auxiliary virtual machine. The target virtual machine and the auxiliary virtual machine are connected. IO requests for the target virtual machine are mirrored to the auxiliary virtual machine. At least a portion of cache data included within a target memory system associated with the target cache system is copied to an auxiliary memory system associated with the auxiliary cache system. The target virtual machine is migrated from the first operating environment to the second operating environment.
摘要:
In one aspect, a method to manage encrypted data includes configuring a first portion of a storage medium to store encrypted data. The encrypted data is encrypted using a time-based encryption key. The method also includes configuring a second portion of the storage medium to include metadata identifying the time-based encryption key and storing the time-based encryption key in a location other than the storage medium.
摘要:
In one aspect, a method includes performing replication of a first volume using a snapshot shipping mode, performing replication of a second volume using a continuous replication mode and generating a consistent point in time for the first and second volumes to enable retrieval of replicated data from the first and second volumes at the consistent point in time.