Method and apparatus for automated data protection with IT infrastructure visibility
First Claim
1. A computer-implemented method, for execution on a computer comprising a processor and memory storing program logic, comprising:
- receiving an input defining a desired state of a data protection environment;
monitoring a current state of the data protection environment at a first time;
determining whether the current state of the data protection environment at the first time deviates from the desired state of the data protection environment;
generating a service plan automatically upon determining a deviation in the data protection environment according to the differences between the current state of the data protection environment at the first time and the desired state of the data protection environment, wherein the generated service plan, based on the differences, includes one or more commands automatically selected from a group of command sets consisting of a service plan command set, an application command set, a storage command set, a host command set, an entity command set, and a service command set; and
executing the service plan according to the automatically selected commands included in the service plan to affect the current state of the data protection environment from the first time to a second time such that the differences between the current state of the data protection environment at the first time and the desired state of the data protection environment are remedied and the subsequent state of the data protection environment at the second time is equivalent to and does not deviate from the desired state of the data protection environment.
6 Assignments
0 Petitions
Accused Products
Abstract
IT organizations are challenged with maintaining data application and availability while satisfying service level agreements and compliance requirements. Unprecedented data growth is straining IT resources requiring greater investments, while capital and operational expenses are under scrutiny. Given this tension, IT organizations are seeking efficiency and optimization to regain control and meet business SLAs. Example embodiments of the present invention provide a method, an apparatus, and a computer program product for performing automated data protection with information technology (IT) infrastructure visibility. The method comprises receiving input regarding a desired state of a data protection environment for an IT infrastructure and creating a data protection environment according to the desired state of the data protection environment.
10 Citations
22 Claims
-
1. A computer-implemented method, for execution on a computer comprising a processor and memory storing program logic, comprising:
-
receiving an input defining a desired state of a data protection environment; monitoring a current state of the data protection environment at a first time; determining whether the current state of the data protection environment at the first time deviates from the desired state of the data protection environment; generating a service plan automatically upon determining a deviation in the data protection environment according to the differences between the current state of the data protection environment at the first time and the desired state of the data protection environment, wherein the generated service plan, based on the differences, includes one or more commands automatically selected from a group of command sets consisting of a service plan command set, an application command set, a storage command set, a host command set, an entity command set, and a service command set; and executing the service plan according to the automatically selected commands included in the service plan to affect the current state of the data protection environment from the first time to a second time such that the differences between the current state of the data protection environment at the first time and the desired state of the data protection environment are remedied and the subsequent state of the data protection environment at the second time is equivalent to and does not deviate from the desired state of the data protection environment. - View Dependent Claims (2, 3, 4, 5, 6, 14, 15, 16)
-
-
7. An apparatus comprising:
-
a processor; and memory storing computer program code that, when executed on the processor, causes the apparatus to perform the operations of; receiving an input defining a desired state of a data protection environment; monitoring a current state of the data protection environment at a first time; determining whether the current state of the data protection environment at the first time deviates from the desired state of the data protection environment; generating a service plan automatically upon determining a deviation in the data protection environment according to the differences between the current state of the data protection environment at the first time and the desired state of the data protection environment, wherein the generated service plan, based on the differences, includes one or more commands automatically selected from a group of command sets consisting of a service plan command set, an application command set, a storage command set, a host command set, an entity command set, and a service command set; and executing the service plan according to the automatically selected commands included in the service plan to affect the current state of the data protection environment from the first time to a second time such that the differences between the current state of the data protection environment at the first time and the desired state of the data protection environment are remedied and the subsequent state of the data protection environment at the second time is equivalent to and does not deviate from the desired state of the data protection environment. - View Dependent Claims (8, 9, 10, 11, 12, 17, 18, 19)
-
-
13. A computer program product including a non-transitory computer-readable storage medium having computer program code encoded thereon that, when executed on a processor of a computer, causes the computer to automate data protection, the computer program code comprising:
-
computer program code for receiving an input defining a desired state of a data protection environment; computer program code for monitoring a current state of the data protection environment at a first time; computer program code for determining whether the current state of the data protection environment at the first time deviates from the desired state of the data protection environment; computer program code for generating a service plan automatically upon determining a deviation in the data protection environment according to the differences between the current state of the data protection environment at the first time and the desired state of the data protection environment, wherein the generated service plan, based on the differences, includes one or more commands selected from a group of command sets consisting of a service plan command set, an application command set, a storage command set, a host command set, an entity command set, and a service command set; and computer program code for executing the service plan in the data protection environment according to the commands included in the service plan to affect the current state of the data protection environment from the first time to a second time such that the differences between the current state of the data protection environment at the first time and the desired state of the data protection environment are remedied and the subsequent state of the data protection environment at the second time is equivalent to and does not deviate from the desired state of the data protection environment. - View Dependent Claims (20, 21, 22)
-
Specification