Apparatus and method for information recovery quality assessment in a computer system
First Claim
1. In a computer network including an at least one computing device, an at least one storage object, an at least one data protection server device, and an at least one data protection storage device, an apparatus for an assessment of the quality of a recovery process, the apparatus comprising the elements of:
- a data protection policy builder component to create at least one data protection rule associated with an organization operating the computer network, the at least one data protection rule being used to control a backup process and indicating that a first storage object is a candidate for backup, the at least one data protection rule comprising a data protection rules repository;
a network computer-level analyzer component to compare an at least one network computer with an at least one data protection input parameter of the at least one data protection rule;
a network storage object-level analyzer component to compare an at least one network storage object with the at least one data protection input parameter of the at least one data protection rule, and with data protection result output data of at least one data protection server index, wherein the at least one network storage object is a previously backed up storage object and the network storage object-level analyzer component performs recovery logic analysis to validate ability to subsequently restore the at least one network storage object, wherein the recovery logic analysis uses a plurality of control fields including a first control field having a value indicating whether additional storage objects or a dependency component are backed up with said at least one network storage object and a second control field having a value indicating whether said at least one network storage object is down or in a backup mode when backed up, wherein said first control field is one of a plurality of dependency type values including a first dependency type value indicating that said at least one network storage object is backed up together with a following identified dependency component a second dependency type value indicating that said at least one network storage object is backed up without a following identified dependency component, and a third dependency type value indicating that additional storage objects are backed up when said at least one network storage object is backed up; and
a rejected objects identifier component to identify anomalous or rejected objects in accordance with results generated by the data protection policy builder component or by the network computer-level analyzer component or by the network storage object-level analyzer component, wherein said anomalous or rejected objects identified by said rejected objects identifier component include objects omitted from a data protection process or which have been backed up improperly.
3 Assignments
0 Petitions
Accused Products
Abstract
An apparatus and method for information recovery quality assessment in a computing environment is disclosed. This includes a group of inter-related software modules and associated data structures that analyze and assess the recoverability of the network data through the data protection configuration setup and a previously performed data protection process. It examines in a comprehensive manner the recoverability perspective across a pre-defined data protection domain, such as a computer network with an organization. The results of the examination provide for the display of inconsistencies of data protection configuration and previously performed data protection processes that consequently result in problems of recovering the network objects in an appropriate manner.
-
Citations
36 Claims
-
1. In a computer network including an at least one computing device, an at least one storage object, an at least one data protection server device, and an at least one data protection storage device, an apparatus for an assessment of the quality of a recovery process, the apparatus comprising the elements of:
-
a data protection policy builder component to create at least one data protection rule associated with an organization operating the computer network, the at least one data protection rule being used to control a backup process and indicating that a first storage object is a candidate for backup, the at least one data protection rule comprising a data protection rules repository; a network computer-level analyzer component to compare an at least one network computer with an at least one data protection input parameter of the at least one data protection rule; a network storage object-level analyzer component to compare an at least one network storage object with the at least one data protection input parameter of the at least one data protection rule, and with data protection result output data of at least one data protection server index, wherein the at least one network storage object is a previously backed up storage object and the network storage object-level analyzer component performs recovery logic analysis to validate ability to subsequently restore the at least one network storage object, wherein the recovery logic analysis uses a plurality of control fields including a first control field having a value indicating whether additional storage objects or a dependency component are backed up with said at least one network storage object and a second control field having a value indicating whether said at least one network storage object is down or in a backup mode when backed up, wherein said first control field is one of a plurality of dependency type values including a first dependency type value indicating that said at least one network storage object is backed up together with a following identified dependency component a second dependency type value indicating that said at least one network storage object is backed up without a following identified dependency component, and a third dependency type value indicating that additional storage objects are backed up when said at least one network storage object is backed up; and a rejected objects identifier component to identify anomalous or rejected objects in accordance with results generated by the data protection policy builder component or by the network computer-level analyzer component or by the network storage object-level analyzer component, wherein said anomalous or rejected objects identified by said rejected objects identifier component include objects omitted from a data protection process or which have been backed up improperly. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. In a computer network including an at least one computing device, an at least one storage object, an at least one data protection server device, and an at least one data protection storage device, a method for an assessment of the quality of a recovery process, the method comprising the steps of:
-
building a combined data protection policy table by obtaining and inserting into the table the at least one data protection rule, the at least one data protection rule being used to control a backup process and indicating that a first storage object is a candidate far backup; performing a network computer-level analysis by scanning the computer network, locating an at least one network computer linked to the network, obtaining network computer-specific data to identify the at least one network computer, and comparing the network computer-specific data with the content of the combined data protection policy table; performing a network storage object-level analysis by locating an at least one network storage object associated with the at least one network computer linked to the computer network, obtaining storage object-specific data that identifies the at least one network storage object, and comparing the storage object-specific data with the content of the combined data protection policy table, wherein the at least one network storage object is a previously backed up storage object and the network storage object-level analysis further includes performing recovery logic analysis to validate ability to subsequently restore the at least one network storage object, wherein the recovery logic analysis uses a plurality of control fields including a first control field having a value indicating whether additional storage objects or a dependency component arc backed up with said at least one network storage object and a second control field having a value indicating whether said at least one network storage object is down or in a backup mode when backed up, wherein said first control field is one of a plurality of dependency type values including a first dependency type value indicating that said at least one network storage object is backed up together with a following identified dependency component, a second dependency type value indicating that said at least one network storage object is backed up without a following identified dependency component, and a third dependency type value indicating that additional storage objects are backed'"'"'up when said at least one network storage object is backed up; and comparing an at least one first data protection input parameters with the at least one data protection rule or with an at least one second data protection input parameters to identify inconsistencies or to identify storage objects that cannot be recovered, wherein said storage objects that cannot be recovered include objects which have been backed up improperly or which have been omitted from a data protection process. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35)
-
-
36. In a computer network including an at least one computing device, an at least one storage object, an at least one data protection server device, and an at least one data protection storage device, an apparatus for an assessment of the quality of a recovery process, the apparatus comprising the elements of:
-
a data protection policy builder component to create at least one data protection rule associated with an organization operating the computer network, the at least one data protection rule being used to control a backup process and indicating that a first storage object is a candidate for backup, the at least one data protection rule comprising a data protection rules repository; a network computer-level analyzer component to compare an at least one network computer with an at least one data protection input parameter of the at least one data protection rule; a network storage object-level analyzer component to compare an at least one network storage object with the at least one data protection input parameter of the at least one data protection rule, and with data protection result output data of at least one data protection server index, wherein the at least one network storage object is a previously backed up storage object and the network storage object-level analyzer component performs recovery logic analysis to validate ability to subsequently restore the at least one network storage object, wherein the recovery logic analysis uses a plurality of control fields including a first control field having a value indicating whether additional storage objects or a dependency component are backed up with said at least one network storage object'"'"'and a second control field having a value indicating whether said at least one network storage object is down or in a backup mode when backed up; and a rejected objects identifier component to identify anomalous or rejected objects in accordance with results generated by the data protection policy builder component or by the network computer-level analyzer component or by the network storage object-level analyzer component, wherein said anomalous or rejected objects identified by said rejected objects identifier component include objects omitted from a data protection process or which have been backed up improperly, wherein said first control field is one of a plurality of dependency type values including a first dependency type value indicating that said at least one network storage object is backed up together with a following identified dependency component, a second dependency type value indicating that said at least one network storage object is backed up without a following, identified dependency component, and a third dependency type value indicating that additional storage objects are backed up when said at least one network storage object is backed up, and wherein said second control field is one of a plurality of backup type values including a first backup type value indicating that said at least one network storage object is in said backup mode when backed up, a second backup type value indicating that said at least one network storage object is down when backed up, and a third backup type value indicating that said at least one network storage object is in any mode when backed up.
-
Specification