SYSTEMS AND METHODS TO IDENTIFY UNPROTECTED VIRTUAL MACHINES
First Claim
1. A method to identify virtual machine backup policies in a data management system, the method comprising:
- monitoring a first plurality of client devices that are physical machines that generate primary data stored on one or more primary storage devices;
monitoring a second plurality of client devices that are virtual machines that generate primary data stored on one or more primary storage devices;
directing one or more media agents to perform at least one data protection operation that copies the primary data stored on one or more primary storage devices to create secondary data stored on one or more secondary storage devices, the at least one data protection operation converts the primary data from a native format to secondary data in a backup format wherein the backup formal is different than the native format;
determining which of the first and second plurality of client devices are virtual machines, by automatically requesting with one or more computer processors a first list of virtual machines in a data management system from virtual machine management software;
receiving the first list of the virtual machines in the data management system in response to the request;
automatically retrieving with one or more computer processors a second list of virtual machines in the data management system, each virtual machine on the second list associated with at least one backup policy;
automatically comparing with one or more computer processors the first list with the second list; and
automatically identifying with one or more computer processors a least one unprotected virtual machine that is not associated with the at least one backup policy based at least in part on the comparison of the first list with the second list;
automatically querying the at least one unprotected virtual machine to obtain information about the at least one unprotected virtual machine;
comparing the information associated with the at least one unprotected virtual machine with backup criteria, said backup criteria comprising at least one of;
a department to which the unprotected virtual machine is assigned, and a type of virtual machine manager associated with the unprotected virtual machine;
when the information associated with the at least one unprotected virtual machine matches the backup criteria, automatically applying the at least one backup policy to the unprotected virtual machine and directing the one or media agents during the at least one data protection operation to copy the primary data generated by the unprotected virtual machine in the native format to the one or more secondary storage devices in the backup format; and
when the at least one unprotected virtual machine does not match the criteria, automatically applying a default backup policy to the unprotected virtual machine and directing the one or media agents during the at least one data protection operation to copy the primary data generated by the unprotected virtual machine in the native format to the one or more secondary storage devices in the backup format.
2 Assignments
0 Petitions
Accused Products
Abstract
Virtualization sprawl can lead to virtual machines with no designated periodic backup. If the data associated with these unprotected virtual machines is not backed up, it cannot be restored if needed, leading to system failures. A data storage system identifies and protects the unprotected virtual machines. For instance, the system compares a list of virtual machines with a list of computing devices having a designated backup policy in the data storage system and determines which of the virtual machines are unprotected. The system further automatically categorizes the unprotected virtual machines, identifies those unprotected virtual machines that remain uncategorized, and applies a default backup policy to the uncategorized and unprotected virtual machines to provide protected virtual machines.
-
Citations
20 Claims
-
1. A method to identify virtual machine backup policies in a data management system, the method comprising:
-
monitoring a first plurality of client devices that are physical machines that generate primary data stored on one or more primary storage devices; monitoring a second plurality of client devices that are virtual machines that generate primary data stored on one or more primary storage devices; directing one or more media agents to perform at least one data protection operation that copies the primary data stored on one or more primary storage devices to create secondary data stored on one or more secondary storage devices, the at least one data protection operation converts the primary data from a native format to secondary data in a backup format wherein the backup formal is different than the native format; determining which of the first and second plurality of client devices are virtual machines, by automatically requesting with one or more computer processors a first list of virtual machines in a data management system from virtual machine management software; receiving the first list of the virtual machines in the data management system in response to the request; automatically retrieving with one or more computer processors a second list of virtual machines in the data management system, each virtual machine on the second list associated with at least one backup policy; automatically comparing with one or more computer processors the first list with the second list; and automatically identifying with one or more computer processors a least one unprotected virtual machine that is not associated with the at least one backup policy based at least in part on the comparison of the first list with the second list; automatically querying the at least one unprotected virtual machine to obtain information about the at least one unprotected virtual machine; comparing the information associated with the at least one unprotected virtual machine with backup criteria, said backup criteria comprising at least one of;
a department to which the unprotected virtual machine is assigned, and a type of virtual machine manager associated with the unprotected virtual machine;when the information associated with the at least one unprotected virtual machine matches the backup criteria, automatically applying the at least one backup policy to the unprotected virtual machine and directing the one or media agents during the at least one data protection operation to copy the primary data generated by the unprotected virtual machine in the native format to the one or more secondary storage devices in the backup format; and when the at least one unprotected virtual machine does not match the criteria, automatically applying a default backup policy to the unprotected virtual machine and directing the one or media agents during the at least one data protection operation to copy the primary data generated by the unprotected virtual machine in the native format to the one or more secondary storage devices in the backup format. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A data management system for making secondary copies of primary data, the data management system comprising:
-
one or more media agents that monitor a first plurality of client devices that are physical machines that generate primary data stored on one or more primary storage devices, the one or more media agents further monitor a second plurality of client devices that are virtual machines that generate primary data stored on one or more primary storage devices; a storage manager comprising computer hardware including one or more computer processors, the storage manager configured to; direct the one or more media agents to perform at least one data protection operation that copies the primary data stored on one or more primary storage devices to create secondary data stored on one or more secondary storage devices, the at least one data protection operation converts the primary data from a native format to secondary data in a backup format wherein the backup format is different than the native format; determine which of the first and second plurality of client devices are virtual machines, by automatically requesting with one or more computer processors a first list of virtual machines in a data management system from virtual machine management software; receive the first list of the virtual machines in the data management system in response to the request; automatically retrieve a second list of virtual machines, each virtual machine on the second list associated with a at least one backup policy; automatically compare the first list with the second list; and automatically identify at least one unprotected virtual machines machine that is not associated with the at least one backup policy based at least in part on the comparison of the first list with the second list; automatically query the at least one unprotected virtual machine to obtain information about the at least one unprotected virtual machine; compare the information associated with the at least one unprotected virtual machine with backup criteria, said backup criteria comprising at least one of;
a department to which the unprotected virtual machine is assigned, and a type of virtual machine manager associated with the unprotected virtual machine;when the information associated with the at least one unprotected virtual machine matches the backup criteria, automatically apply the at least one backup policy to the unprotected virtual machine and directing the one or media agents during the at least one data protection operation to copy the primary data generated by the unprotected virtual machine in the native format to the one or more secondary storage devices in the backup format; and when the at least one unprotected virtual machine does not match the criteria, automatically apply a default backup policy to the unprotected virtual machine and directing the one or media agents during the at least one data protection operation to copy the primary data generated by the unprotected virtual machine in the native format to the one or more secondary storage devices in the backup format. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification