Migration to cloud storage from backup
First Claim
1. A system that uses secondary copy data in migration operations, the system comprising:
- a first computing system comprising one or more first computing devices comprising computer hardware and in communication over a wide area network with a with a second computing system, the first computing system configured to;
instruct data protection software installed on a client computing device to perform operations in conjunction with a data protection job in which data generated by a first application installed on the client computing device is copied from one or more primary storage devices to create a secondary copy on one or more secondary storage devices;
store in computer memory a configuration data structure in association with the secondary copy, the configuration data structure including (i) one or more computing resource attributes and (ii) resource attribute prioritization information;
as part of a migration operation in which the first application is migrated to the second computing system;
access the configuration data structure from computer storage;
compare the one or more computing resource attributes to attributes associated with a plurality of different types of computing resources which are available for provisioning using an interface of the second computing system;
based on the comparison and the resource attribute prioritization information, select a first type of the plurality of different types;
use the interface to request the second computing system to provision a computing resource instance of the first type, wherein the second computing system responds to the request by provisioning a computing resource instance within the second computing system;
cause installation of an instance of the first application on the provisioned computing resource instance;
cause installation of an instance of the data protection software on the provisioned computing resource instance; and
initiate a restore of at least a portion of the secondary copy to the provisioned computing resource instance within the second computing system, wherein the instance of the data protection software installed on the provisioned computing resource instance is involved in performance of the restore.
2 Assignments
0 Petitions
Accused Products
Abstract
According to certain aspects, a system may include one or more first computing devices in communication with a remote computing system over a wide area network (WAN), configured to initiate a data protection operation to create a secondary copy of production data generated by a first application; store in association with the secondary copy one or more computing parameters associated with hosting of the first application; compare characteristics associated with a plurality of differently appointed computing resources to provision within the remote computing system with the computing parameters; select one of the differently appointed computing resources to provision based at least in part on the comparison; request the remote computing system to provision an instance of the selected computing resource within the remote computing system; and restore at least a portion of the secondary copy of the production data generated by the first application to the remote computing system.
-
Citations
15 Claims
-
1. A system that uses secondary copy data in migration operations, the system comprising:
a first computing system comprising one or more first computing devices comprising computer hardware and in communication over a wide area network with a with a second computing system, the first computing system configured to; instruct data protection software installed on a client computing device to perform operations in conjunction with a data protection job in which data generated by a first application installed on the client computing device is copied from one or more primary storage devices to create a secondary copy on one or more secondary storage devices; store in computer memory a configuration data structure in association with the secondary copy, the configuration data structure including (i) one or more computing resource attributes and (ii) resource attribute prioritization information; as part of a migration operation in which the first application is migrated to the second computing system; access the configuration data structure from computer storage; compare the one or more computing resource attributes to attributes associated with a plurality of different types of computing resources which are available for provisioning using an interface of the second computing system; based on the comparison and the resource attribute prioritization information, select a first type of the plurality of different types; use the interface to request the second computing system to provision a computing resource instance of the first type, wherein the second computing system responds to the request by provisioning a computing resource instance within the second computing system; cause installation of an instance of the first application on the provisioned computing resource instance; cause installation of an instance of the data protection software on the provisioned computing resource instance; and initiate a restore of at least a portion of the secondary copy to the provisioned computing resource instance within the second computing system, wherein the instance of the data protection software installed on the provisioned computing resource instance is involved in performance of the restore. - View Dependent Claims (2, 3, 4, 5)
-
6. A method of performing migration using secondary copy data, the method comprising:
with a first computing system in communication over a wide area network with a second computing system; instructing a client computing device to perform operations in conjunction with a data protection job in which data generated by a first application installed on the client computing device is copied from one or more primary storage devices to create a secondary copy stored on one or more secondary storage devices; storing a configuration data structure in association with the secondary copy, the configuration data structure including (i) one or more computing resource attributes and (ii) resource attribute prioritization information; accessing the configuration data structure from computer storage; comparing the one or more computing resource attributes to attributes associated with a plurality of different types of computing resources which are available for provisioning using an interface of the second computing system; based on the comparison and the resource attribute prioritization information, selecting a first type of the plurality of different types; using the interface to request the second computing system to provision a computing resource instance of the first type, wherein the second computing system responds to the request by provisioning a computing resource instance within the second computing system; causing installation of an instance of the first application on the provisioned computing resource instance; and causing installation of data protection software on the provisioned computing resource instance; and initiating a restore of at least a portion of the secondary copy to the second computing system, wherein the data protection software installed on the provisioned computing resource is involved in performance of the restore. - View Dependent Claims (7, 8, 9, 10)
-
11. Non-transitory computer-readable memory comprising instructions, which when executed by one or more processors, cause the one or more processor to perform a method comprising:
-
instructing a client computing device to perform operations in conjunction with a data protection job in which data generated by a first application installed on the client computing device is copied from one or more primary storage devices to create a secondary copy stored on one or more secondary storage devices; storing a configuration data structure in association with the secondary copy, the configuration data structure including (i) one or more computing resource attributes and (ii) resource attribute prioritization information; accessing the configuration data structure from computer storage; comparing the one or more computing resource attributes to attributes associated with a plurality of different types of computing resources which are available for provisioning using an interface of the second computing system; based on the comparison and the resource attribute prioritization information, selecting a first type of the plurality of different types; using the interface to request the second computing system to provision a computing resource instance, wherein the second computing system responds to the request by provisioning a computing resource instance within the second computing system; causing installation of an instance of the first application on the provisioned computing resource instance; and causing installation of data protection software on the provisioned computing resource instance; and initiating a restore of at least a portion of the secondary copy to the second computing system, wherein the data protection software installed on the provisioned computing resource is involved in performance of the restore. - View Dependent Claims (12, 13, 14, 15)
-
Specification