Dell products l.p. (20240126652). SYSTEM AND METHOD TO EXCLUDE UNSUPPORTED DISKS DURING APPLICATION CONSISTENT BACKUPS simplified abstract

From WikiPatents
Jump to navigation Jump to search

SYSTEM AND METHOD TO EXCLUDE UNSUPPORTED DISKS DURING APPLICATION CONSISTENT BACKUPS

Organization Name

dell products l.p.

Inventor(s)

Krishnendu Bagchi of Pune (IN)

Vipin Kaushal of Bangalore (IN)

Sudha Hebsur of Bangalore (IN)

Amarendra Behera of Bangalore (IN)

Pallavi Prakash of Bangalore (IN)

SYSTEM AND METHOD TO EXCLUDE UNSUPPORTED DISKS DURING APPLICATION CONSISTENT BACKUPS - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240126652 titled 'SYSTEM AND METHOD TO EXCLUDE UNSUPPORTED DISKS DURING APPLICATION CONSISTENT BACKUPS

Simplified Explanation

A data protection agent is installed within a virtual machine (VM) to perform a backup of the application databases associated with the VM. The agent communicates with the disk manager of the guest operating system to map the virtual machine disks (VMDKs) to volumes, and then identifies the volumes containing the application databases. A copy service prepares the application for backup, and a snapshot data mover is instructed to take a snapshot of the application databases by excluding VMDKs not containing the application databases.

  • Data protection agent installed within a virtual machine (VM)
  • Communication with disk manager to map VMDKs to volumes
  • Identification of volumes containing application databases
  • Preparation of application for backup by copy service
  • Instruction to snapshot data mover to take a snapshot of application databases

Potential Applications

The technology described in this patent application could be applied in various industries where data protection and backup of application databases within virtual machines are crucial, such as:

  • Cloud computing
  • Data centers
  • Enterprise IT environments

Problems Solved

This technology addresses the following problems:

  • Efficient backup of application databases within virtual machines
  • Mapping of virtual machine disks to volumes for backup purposes
  • Identification of volumes containing critical data for backup

Benefits

The benefits of this technology include:

  • Improved data protection within virtual machines
  • Streamlined backup processes for application databases
  • Enhanced efficiency in managing and securing critical data

Potential Commercial Applications

The technology could be commercially applied in:

  • Data backup and recovery solutions
  • Virtual machine management software
  • Cloud service providers

Possible Prior Art

One possible prior art for this technology could be the use of snapshot technologies in virtual environments for data protection and backup purposes.

Unanswered Questions

How does the data protection agent ensure the security of the backup data during the snapshot process?

The article does not provide details on the security measures implemented by the data protection agent to safeguard the backup data during the snapshot process.

What are the system requirements for implementing this technology within virtual machines?

The article does not mention the specific system requirements or hardware/software dependencies needed to install and operate the data protection agent within virtual machines.


Original Abstract Submitted

a data protection agent is installed within a virtual machine (vm). a request to perform a backup is received. the request includes identifications of virtual machine disks (vmdks) associated with the virtual machine. communications are exchanged with a disk manager of a guest operating system of the vm to generate a map that maps the vmdks to volumes attached to the vm. communications are exchanged with an application in the vm to be protected to identify which of the volumes contain application databases associated with the application. a copy service is instructed to prepare the application for backup. a request is issued to a snapshot data mover for a snapshot of the application. the snapshot request includes identifications of a subset of the vmdks mapped to corresponding volumes that contain the application databases. vmdks mapped to corresponding volumes not containing the application databases are excluded from the snapshot request.