Auto-snapshot manager analysis tool
First Claim
1. A computer-implemented method for analyzing snapshot operation data of one or more snapshot operations associated with at least one storage device and at least one host computer, the computer-implemented method comprising:
- configuring to a quiescent state, the at least one host computer, the at least one storage device, and a tunneling interface positioned between the at least one host computer and the at least one storage device;
based upon the configured quiescent state, performing the one or more snapshot operations to retrieve the snapshot operation data from (i) the tunneling interface positioned between the host computer and the at least one storage device and (ii) zero or more of;
the at least one host computer and the at least one storage device;
locating the snapshot operation data associated with the one or more performed snapshot operations;
assembling configuration information from the snapshot operation data;
storing debug data associated with the one or more performed snapshot operations;
performing an analysis including the snapshot operation data, the assembled configuration information, and the stored debug data;
identifying one or more issues and one or more action plans for resolution based upon the analysis; and
providing a report to one or more users including the assembled configuration information, the one or more identified issues, and the one or more identified action plans.
14 Assignments
0 Petitions
Accused Products
Abstract
The invention pertains to a method and information handling system (IHS) for analyzing snapshot operation data of one or more snapshot operations associated with at least one storage device and at least one host computer. An embodiment of a method of the present invention begins by locating the snapshot operation data. Next, configuration information is assembled from the snapshot operation data. Further, debug data associated with the one or more snapshot operations is stored. An analysis is performed including the snapshot operation data, the configuration information, and the stored debug data. Next, the method identifies one or more issues and one or more action plans for resolution based upon the analysis. Finally, the method provides a report to one or more users including the configuration information, the one or more identified issues, and the one or more action plans.
99 Citations
20 Claims
-
1. A computer-implemented method for analyzing snapshot operation data of one or more snapshot operations associated with at least one storage device and at least one host computer, the computer-implemented method comprising:
-
configuring to a quiescent state, the at least one host computer, the at least one storage device, and a tunneling interface positioned between the at least one host computer and the at least one storage device; based upon the configured quiescent state, performing the one or more snapshot operations to retrieve the snapshot operation data from (i) the tunneling interface positioned between the host computer and the at least one storage device and (ii) zero or more of;
the at least one host computer and the at least one storage device;locating the snapshot operation data associated with the one or more performed snapshot operations; assembling configuration information from the snapshot operation data; storing debug data associated with the one or more performed snapshot operations; performing an analysis including the snapshot operation data, the assembled configuration information, and the stored debug data; identifying one or more issues and one or more action plans for resolution based upon the analysis; and providing a report to one or more users including the assembled configuration information, the one or more identified issues, and the one or more identified action plans. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. An Information Handling System (IHS) comprising:
-
a processor; and a memory with non-transitory computer code instructions stored therein, the memory operatively coupled to said processor such that the computer code instructions configure the processor to implement; a data module configured to configure to a quiescent state, at least one host computer, at least one storage device, and a tunneling interface positioned between the at least one host computer and the at least one storage device; the data module being further configured to perform one or more snapshot operations to retrieve snapshot operation data from (i) the tunneling interface positioned between the host computer and the at least one storage device and (ii) zero or more of;
the at least one host computer and the at least one storage device;the data module configured to locate the snapshot operation data associated with the one or more performed snapshot operations; the data module further configured to assemble configuration information from the snapshot operation data; the data module further configured to store debug data associated with the one or more performed snapshot operations; a computing module configured to perform an analysis including the snapshot operation data, the assembled configuration information, and the stored debug data; the computing module further configured to identify one or more issues and one or more action plans for resolution based upon the analysis; and a reporting module configured to provide a report to one or more users including the assembled configuration information, the one or more identified issues, and the one or more identified action plans. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
-
20. A non-transitory computer readable medium having stored thereon a sequence of instructions which, when loaded and executed by a processor coupled to an apparatus, causes the apparatus to:
-
configure to a quiescent state, at least one host computer, at least one storage device, and a tunneling interface positioned between the at least one host computer and the at least one storage device; perform one or more snapshot operations to retrieve snapshot operation data from (i) the tunneling interface positioned between the host computer and the at least one storage device and (ii) zero or more of;
the at least one host computer and the at least one storage device;locate snapshot operation data associated with one or more performed snapshot operations; assemble configuration information from the snapshot operation data; store debug data associated with the one or more performed snapshot operations; perform an analysis including the snapshot operation data, the assembled configuration information, and the stored debug data; identify one or more issues and one or more action plans for resolution based upon the analysis; and provide a report to one or more users including the assembled configuration information, the one or more identified issues, and the one or more identified action plans.
-
Specification