Policy based resource management for legacy data
First Claim
1. A computer-based method for implementing policy-based management for legacy data comprising the steps of:
- receiving an input;
preparing a query to locate one or more data objects that match said received input;
executing said query and locating said one or more data objects;
identifying a policy associated with said identified one or more data objects, each data object stored on a respective associated storage device among a plurality of different storage devices, said plurality of different storage devices comprising combinations of;
storage device in a storage area network (SAN), network attached storage (NAS), legacy storage device, or a remotely located storage device;
probing each associated storage device and determining at least one property related to the policy, said property comprising any of the following;
a block-level functionality associated with encrypted data blocks, a file system-level functionality comprising a file system creation time, and an application-level functionality associated with a database integrity constraint;
identifying any associated storage devices in which the at least one property violates the policy;
outputting any identified storage devices in which that at least one property violates the policyidentify an additional storage device having the one property that satisfies the policy; and
migrating those data objects, stored on associated storage devices in which the at least one property violates the policy, to the additional storage device.
1 Assignment
0 Petitions
Accused Products
Abstract
A policy-based resource management system provides an infrastructure that uses high-level definitions of data-types along with desired policy rules to manage legacy data. In particular, relevant legacy data is identified as well as the characteristics of storage devices where the legacy data resides. The storage management system determines what if any of the legacy data is stored in a manner that is non-compliant with the policy rules and corrects any violations. It generates corrective action plans, and then uses existing data migration software to migrate the data. Accordingly, the legacy data may be managed in a policy-based manner without requiring typical storage management software.
30 Citations
13 Claims
-
1. A computer-based method for implementing policy-based management for legacy data comprising the steps of:
-
receiving an input; preparing a query to locate one or more data objects that match said received input; executing said query and locating said one or more data objects; identifying a policy associated with said identified one or more data objects, each data object stored on a respective associated storage device among a plurality of different storage devices, said plurality of different storage devices comprising combinations of;
storage device in a storage area network (SAN), network attached storage (NAS), legacy storage device, or a remotely located storage device;probing each associated storage device and determining at least one property related to the policy, said property comprising any of the following;
a block-level functionality associated with encrypted data blocks, a file system-level functionality comprising a file system creation time, and an application-level functionality associated with a database integrity constraint;identifying any associated storage devices in which the at least one property violates the policy; outputting any identified storage devices in which that at least one property violates the policy identify an additional storage device having the one property that satisfies the policy; and migrating those data objects, stored on associated storage devices in which the at least one property violates the policy, to the additional storage device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer-based system for policy-based management for legacy data comprising the steps of:
-
an application configured to receive an input, prepare a query to locate one or more data objects that match said received input, execute said query and locate said one or more data objects, and identify a policy associated with said identified one or more data objects, each data object stored on a respective associated storage device among a plurality of different storage devices, said plurality of different storage devices comprising combinations of;
storage device in a storage area network (SAN), network attached storage (NAS), legacy storage device, or a remotely located storage device;an probe configured to probe and determine for each associated storage device at least one property related to the policy, said property comprising any of the following;
a block-level functionality associated with encrypted data blocks, a file system-level functionality comprising a file system creation time, and an application-level functionality associated with a database integrity constraint; andthe application further including an analyzer in communication with the probe and configured to identify any associated storage devices in which the at least one property violates the policy and the application;
outputting any identified storage devices in which the at least one property violates the policy, identify an additional storage device having the one property that satisfies the policy; and
migrating those data objects, stored on associated storage devices in which the at least one property violates the policy, to the additional storage device. - View Dependent Claims (10, 11)
-
-
12. An apparatus for implementing policy-based management for legacy data, the apparatus comprising:
-
at least one processor; a memory coupled with the at least one processor; one or more data objects, each data object stored on a respective associated storage device among a plurality of different storage devices, said plurality of different storage devices comprising combinations of;
storage device in a storage area network (SAN), network attached storage (NAS), legacy storage device, or a remotely located storage device; anda program code residing in the memory and executed by the at least one processor, the program code configured to; receiving an input preparing a query to locate one or more data objects that match said received input; executing said query and locating said one or more data objects; identify a policy associated with said identified one or more data objects; probing each associated storage device and determine at least one property related to the policy, said property comprising any of the following;
a block-level functionality associated with encrypted data blocks, a file system-level functionality comprising a file system creation time, and an application-level functionality associated with a database integrity constraint;identify any associated storage devices in which the at least one property violates the policy; identify an additional storage device having the one property that satisfies the policy; and migrate those data objects, stored on associated storage devices in which the at least one property violates the policy, to the additional storage device.
-
-
13. A program product for implementing policy-based management for legacy data, comprising:
-
computer readable program code receiving an input, preparing a query to locate one or more data objects that match said received input, executing said query and locating said one or more data objects, and identifying a policy associated with said identified one or more data objects, each data object stored on a respective associated storage device among a plurality of different storage devices, said plurality of different storage devices comprising combinations of;
storage device in a storage area network (SAN), network attached storage (NAS), legacy storage device, or a remotely located storage device;computer readable program code probing and determining for each associated storage device at least one property related to the policy, said property comprising any of the following;
a block-level functionality associated with encrypted data blocks, a file system-level functionality comprising a file system creation time, and an application-level functionality associated with a database integrity constraint;computer readable program code identifying any associated storage devices in which the at least one property violates the policy; computer readable program code identifying an additional storage device having the one property that satisfies the policy; and computer readable program code migrate those data objects, stored on associated storage devices in which the at least one property violates the policy, to the additional storage device.
-
Specification