Method and system for mapping data protection policies to data clusters

ABSTRACT

Techniques described herein relate to a method for managing data protection services for data clusters. The method includes identifying, by a mapping module of a data protection manager, a first discovery event associated with a first data cluster; in response to identifying the first discovery event: obtaining first data cluster topology information associated with the first data cluster from the first data cluster; obtaining data cluster data protection information from a data cluster data protection information repository; mapping first protection policies to the first data cluster using the first data cluster topology information and the data cluster data protection information; updating data cluster topology information protection policy mappings using the using the first data cluster topology information and the data cluster data protection information; and initiating performance of first data protection services for the first data cluster based on the first mapped protection policies.

BACKGROUND

Computing devices may provide services. To provide the services, thecomputing devices may include hardware components and softwarecomponents. To provide the aforementioned services, the hardware andsoftware components of the computing devices may generate data. The datamay be relevant to users of the computing devices. The data may beprotected to ensure availability to users of the computing devices.

SUMMARY

In general, in one aspect, the invention relates to a method formanaging data protection services for data clusters in accordance withone or more embodiments of the invention. The method includesidentifying, by a mapping module of a data protection manager, a firstdiscovery event associated with a first data cluster; in response toidentifying the first discovery event: obtaining first data clustertopology information associated with the first data cluster from thefirst data cluster; obtaining data cluster data protection informationfrom a data cluster data protection information repository; mappingfirst protection policies to the first data cluster using the first datacluster topology information and the data cluster data protectioninformation; updating data cluster topology information protectionpolicy mappings using the using the first data cluster topologyinformation and the data cluster data protection information; andinitiating performance of first data protection services for the firstdata cluster based on the first mapped protection policies.

In general, in one aspect, the invention relates to a system formanaging data protection services for data clusters in accordance withone or more embodiments of the invention. The system includes persistentstorage, which stores data cluster topology protection policy mappings,and a mapping module of a data protection manager. The mapping module isprogrammed to identify a first discovery event associated with a firstdata cluster; in response to identifying the first discovery event:obtain first data cluster topology information associated with the firstdata cluster from the first data cluster; obtain data cluster dataprotection information from a data cluster data protection informationrepository; map first protection policies to the first data clusterusing the first data cluster topology information and the data clusterdata protection information; update data cluster topology informationprotection policy mappings using the using the first data clustertopology information and the data cluster data protection information;and initiate performance of first data protection services for the firstdata cluster based on the first mapped protection policies.

In general, in one aspect, the invention relates to a non-transitorycomputer readable medium which includes computer readable program code,which when executed by a computer processor enables the computerprocessor to perform a method for managing data protection services fordata clusters in accordance with one or more embodiments of theinvention. The method includes identifying, by a mapping module of adata protection manager, a first discovery event associated with a firstdata cluster; in response to identifying the first discovery event:obtaining first data cluster topology information associated with thefirst data cluster from the first data cluster; obtaining data clusterdata protection information from a data cluster data protectioninformation repository; mapping first protection policies to the firstdata cluster using the first data cluster topology information and thedata cluster data protection information; updating data cluster topologyinformation protection policy mappings using the using the first datacluster topology information and the data cluster data protectioninformation; and initiating performance of first data protectionservices for the first data cluster based on the first mapped protectionpolicies.

BRIEF DESCRIPTION OF DRAWINGS

Certain embodiments of the invention will be described with reference tothe accompanying drawings. However, the accompanying drawings illustrateonly certain aspects or implementations of the invention by way ofexample and are not meant to limit the scope of the claims.

FIG. 1A shows a diagram of a system in accordance with one or moreembodiments of the invention.

FIG. 1B shows a diagram of a data protection manager in accordance withone or more embodiments of the invention.

FIG. 1C shows a diagram of a data cluster in accordance with one or moreembodiments of the invention.

FIG. 1D shows a diagram of a management domain of a data cluster inaccordance with one or more embodiments of the invention.

FIG. 1E shows a diagram of a workload domain of a data cluster inaccordance with one or more embodiments of the invention.

FIG. 2A shows a flowchart of a method for mapping protection policies todata cluster topology in accordance with one or more embodiments of theinvention.

FIG. 2B shows a flowchart of a method for updating a data cluster dataprotection policy information repository in accordance with one or moreembodiments of the invention.

FIG. 3A shows a diagram of the operation of an example system over timein accordance with one or more embodiments of the invention.

FIG. 3B shows a diagram of the continuation of the operation of theexample system over time in accordance with one or more embodiments ofthe invention.

FIG. 4 shows a diagram of a computing device in accordance with one ormore embodiments of the invention.

DETAILED DESCRIPTION

Specific embodiments will now be described with reference to theaccompanying figures. In the following description, numerous details areset forth as examples of the invention. It will be understood by thoseskilled in the art that one or more embodiments of the present inventionmay be practiced without these specific details and that numerousvariations or modifications may be possible without departing from thescope of the invention. Certain details known to those of ordinary skillin the art are omitted to avoid obscuring the description.

In the following description of the figures, any component describedwith regard to a figure, in various embodiments of the invention, may beequivalent to one or more like-named components described with regard toany other figure. For brevity, descriptions of these components will notbe repeated with regard to each figure. Thus, each and every embodimentof the components of each figure is incorporated by reference andassumed to be optionally present within every other figure having one ormore like-named components. Additionally, in accordance with variousembodiments of the invention, any description of the components of afigure is to be interpreted as an optional embodiment, which may beimplemented in addition to, in conjunction with, or in place of theembodiments described with regard to a corresponding like-namedcomponent in any other figure.

Throughout this application, elements of figures may be labeled as A toN. As used herein, the aforementioned labeling means that the elementmay include any number of items and does not require that the elementinclude the same number of elements as any other item labeled as A to N.For example, a data structure may include a first element labeled as Aand a second element labeled as N. This labeling convention means thatthe data structure may include any number of the elements. A second datastructure, also labeled as A to N, may also include any number ofelements. The number of elements of the first data structure and thenumber of elements of the second data structure may be the same ordifferent.

In general, embodiments of the invention relate to system and methodsfor managing data protection services for data clusters. Morespecifically, embodiments of the invention relate to a mapping module ofa data protection manager that maps protection policies to data clustersbased on data cluster topologies associated with the data clusters.

FIG. 1A shows a diagram of a system in accordance with one or moreembodiments of the invention. The system may include a data protectionmanager (100) and data clusters (120). The system may include any numberof data clusters (120) without departing from the invention. Forexample, the system may include data cluster A (120A) and data cluster N(120N). The system may include additional, fewer, and/or othercomponents without departing from the invention. Each of the componentsin the system may be operatively connected via any combination ofwireless and/or wired networks.

In one or more embodiments of the invention, the data protection manager(100) includes the functionality provide data protection services to thedata clusters (120). The data protection manager (100) may include thefunctionality to provide and/or obtain other and/or additional serviceswithout departing from the invention. For additional informationregarding the data protection manager (100) refer to FIG. 1B.

In one or more embodiments of the invention, the data protection manager(100) is implemented as a computing device (see e.g., FIG. 4 ). Thecomputing device may be, for example, a mobile phone, a tablet computer,a laptop computer, a desktop computer, a server, a distributed computingsystem, or a cloud resource. The computing device may include one ormore processors, memory (e.g., random access memory), and persistentstorage (e.g., disk drives, solid state drives, etc.). The computingdevice may include instructions, stored on the persistent storage, thatwhen executed by the processor(s) of the computing device cause thecomputing device to perform the functionality of the data protectionmanager (100) described throughout this application.

In one or more embodiments of the invention, the data protection manager(100) is implemented as a logical device. The logical device may utilizethe computing resources of any number of computing devices and therebyprovide the functionality of the data protection manager (100) describedthroughout this application.

In one or more embodiments of the invention, the data clusters (120)include the functionality to obtain data protection services from thedata protection manager. The data clusters (120) may further include thefunctionality to perform computer implemented services for users of thedata clusters (e.g., clients, not shown). The computer implementedservices may include, for example, database services, electronic mailservices, data processing services, etc. The computer implementedservices may include other and/or additional types of services withoutdeparting from the invention.

In one or more embodiments of the invention, a data cluster (e.g., 120A)of the data clusters may be implemented as one or more computing devices(e.g., see above discussion). A data cluster (e.g., (120A)) may includeany number of computing devices without departing from the invention.Each data cluster may include different numbers of computing devices,different quantity and types of computer resources, and may performdifferent computer implemented services without departing from theinvention. For additional information regarding data clusters (120),refer to FIG. 1C.

FIG. 1B shows a diagram of a data protection manager in accordance withone or more embodiments of the invention. The data protection managermay be an embodiment of the data protection manager (100, FIG. 1A)discussed above. As discussed above, the data protection manager mayperform data protection services for the data clusters (120, FIG. 1A).To perform the aforementioned data protection services, the dataprotection manager (100) may include a mapping module (102) andpersistent storage (106). The data protection manager (100) may includeother and/or additional components without departing from the invention.Each of the aforementioned components of the data protection manager(100) is discussed below.

In one or more embodiments of the invention, the mapping module (102)includes the functionality to perform a portion of the data protectionservices of the data protection manager (100). The portion of the dataprotection services performed by the mapping module (102) may includethe methods depicted in FIGS. 2A-2B. The mapping module (102) mayinclude the functionality to perform and or obtain other and/oradditional services without departing from the invention.

In one or more embodiments of the invention, the mapping module (102) isa physical device. The physical device may include circuitry. Thephysical device may be, for example, a field-programmable gate array,application specific integrated circuit, programmable processor,microcontroller, digital signal processor, or other hardware processor.The physical device may be adapted to provide the functionality of themapping module (102) described throughout this application.

In one or more embodiments of the invention, the mapping module (102) isimplemented as computer instructions, e.g., computer code, stored on apersistent storage that when executed by a processor of the dataprotection manager (100) causes the data protection manager (100) toprovide the functionality of the mapping module (102) describedthroughout this application.

In one or more embodiments of the invention, the persistent storage(106) stores data. The persistent storage (106) may include a datacluster topology information repository (108), a data cluster dataprotection information repository (110), and data cluster topologyprotection policy mappings (112). The persistent storage (106) may storeother and/or additional data without departing from the invention. Eachof the aforementioned types of data stored in the persistent storage(106) is discussed below.

The data cluster topology information repository (108) may be one ormore data structures that include data cluster topology informationassociated with each of the data clusters (120, FIG. 1A). The datacluster topology information may include, for example, the softwareresources and/or hardware resources (e.g., GPUs, CPUs, storage devices,operating systems, etc.) associated with each of the data clusters (120,FIG. 1A), computing resource utilization associated with each of thedata clusters, etc. The data cluster topology information repository mayinclude other and/or additional types of information without departingfrom the invention.

The data cluster data protection information repository (110) may be oneor more data structures that include data cluster topology types andprotection policies associated with each data cluster topology type. Adata cluster topology type may be an identifier associated with aparticular configuration of data cluster components (e.g., GPUs, CPUs,storage devices, operating systems, virtual machines, etc.) and datacluster component types. The particular configurations of data clustercomponents may be included in the data cluster data protectioninformation repository (110). Each data cluster topology type may beassociated with different sets of one or more protection policieswithout departing from the invention. The protection policies associatedwith each data cluster topology type may be specified by a third partydomain expert (e.g., a manufacturer, IT administrator, etc.) and includeinformation and/or recommendations obtained directly from a third partydomain expert of a data cluster topology (or data cluster componentincluded in the data cluster topology) and/or is configured by a user ofthe data protection manager (100). The data cluster data protectioninformation repository (110) may include other and/or additionalinformation without departing from the invention.

The data cluster topology protection policy mappings (112) may includeone or more data structures that specify the protection policies mappedto each data cluster topologies of the data clusters (120, FIG. 1A). Thedata cluster topology protection policy mappings (112) may include otherand/or additional types of information without departing from theinvention.

The persistent storage (106) may be implemented using physical storagedevices and/or logical storage devices. The physical storage devices mayinclude any combination of hard disk drives, solid state disk drives,tape drives, and/or any other physical storage mediums for the storageof data.

The logical storage devices (e.g., virtualized storage) may utilize anyquantity of hardware storage resources of any number of computingdevices for storing data. For example, the persistent storage (106) mayutilize portions of any combination of hard disk drives, solid statedisk drives, tape drives, and/or any other physical storage medium ofany number of computing devices.

FIG. 1C shows a diagram of a data cluster in accordance with one or moreembodiments of the invention. The data cluster may be an embodiment of adata cluster (e.g., 120A, FIG. 1A) of the data clusters (120, FIG. 1A)discussed above. As discussed above, data cluster A (120A) may includethe functionality to perform computer implemented services and obtaindata protection services from the data protection manager (100, FIG.1A). To obtain and perform the aforementioned services, data cluster A(120A) may include a management domain (122) and workload domains (124).Data cluster A (120A) may include any number of workload domains withoutdeparting from the invention. For example, data cluster A (120A) mayinclude workload domain A (124A) and workload domain N (124N).

In one or more embodiments of the invention, the management domain (122)provides management services for data cluster A (120A). The managementservices may include generating information associated with data clusterA (120A) as a result of obtaining data protection services. Themanagement domain (122) may perform and/or obtain other and/oradditional services without departing from the invention. For additionalinformation regarding the management domain (122) refer to FIG. 1D.

In one or more embodiments of the invention, the workload domains (124)obtain management services from the management domain (122), dataprotection services from the data protection manager (100, FIG. 1A), andperform computer implemented services for users. The workload domains(124) may perform and/or obtain other and/or additional services withoutdeparting from the invention. For additional information regarding theworkload domains (124), refer to FIG. 1E.

FIG. 1D shows a diagram of a management domain of a data cluster inaccordance with one or more embodiments of the invention. The managementdomain (122) may be an embodiment of the management domain (122, FIG.1C) discussed above. As discussed above, the management domain (122)provides management services for the workload domains (124, FIG. 1C). Toperform the management services, the management domain (122) may includea data cluster manager (126), management domain components (128), andpersistent storage (130). The management domain (122) may include otherand/or additional components without departing from the invention.

In one or more embodiments of the invention, the data cluster manager(126) includes the functionality to perform the management servicesdiscussed above. The data cluster manager (126) may perform and/orprovide other and/or additional services without departing from theinvention.

In one or more embodiments of the invention, the data cluster manager(126) is implemented as a computing device (discussed above).

In one or more embodiments of the invention, the data cluster manager(126) is a physical device. The physical device may include circuitry.The physical device may be, for example, a field-programmable gatearray, application specific integrated circuit, programmable processor,microcontroller, digital signal processor, or other hardware processor.The physical device may be adapted to provide the functionality of thedata cluster manager (126) described throughout this application.

In one or more embodiments of the invention, the data cluster manager(126) is implemented as computer instructions, e.g., computer code,stored on a persistent storage that when executed by a processor of datacluster A (120A, FIG. 1C) causes data cluster A (120A, FIG. 1C) toprovide the functionality of the data cluster manager (126) describedthroughout this application.

In one or more embodiments of the invention, the management domaincomponents (128) include hardware and software components of the one ormore computing devices associated with data cluster A (120A, FIG. 1A)associated with the management domain (122). The hardware components mayinclude, for example, central processing units, graphics processingunits, storage devices, etc. The hardware components may include otherand/or additional hardware components of computing devices withoutdeparting from the invention. The software components may include, forexample, virtual machines, applications, operating systems, etc. Thesoftware components may include other and/or additional types ofsoftware components of computing devices without departing from theinvention. The management domain components (128) may include a portionof the data cluster topology of data cluster A (120A).

The persistent storage (130) may be an embodiment of the persistentstorage (106, FIG. 1B) discussed above. The persistent storage (130) maystore data cluster topology information (132). The persistent storage(130) may store other and/or additional data without departing from theinvention.

The data cluster topology information (132) may be an embodiment of thedata cluster topology information associated with data cluster A (120A)discussed above with respect to the data cluster topology informationrepository (108, FIG. 1B).

FIG. 1E shows a diagram of a workload domain of a data cluster inaccordance with one or more embodiments of the invention. Workloaddomain A (124A) may be an embodiment of a workload domain (e.g., 124A,FIG. 1C) discussed above. As discussed above, workload domain A (124)obtains management services and data protection services and providescomputer implemented services for users. To perform and obtain theaforementioned services, workload domain A (124A) may include workloaddomain A components (142) and a persistent storage (144). Workloaddomain A (124A) may include other and/or additional components withoutdeparting from the invention.

In one or more embodiments of the invention, the workload domain Acomponents (142) include hardware and software components of the one ormore computing devices associated with data cluster A (120A, FIG. 1A)associated with workload domain A (124A). The hardware components mayinclude, for example, central processing units, graphics processingunits, storage devices, etc. The hardware components may include otherand/or additional hardware components of computing devices withoutdeparting from the invention. The software components may include, forexample, virtual machines, applications, operating systems, etc. Thesoftware components may include other and/or additional types ofsoftware components of computing devices without departing from theinvention. The workload domain A components (142) may include a portionof the data cluster components of data cluster A (120A).

The persistent storage (144) may be an embodiment of the persistentstorage (106, FIG. 1B) discussed above. The persistent storage (144) maystore workload domain A data (146). The workload domain A data (146) mayinclude one or more data structures that include data generated and/orused during the performance of computer implemented services by workloaddomain A (124A). The workload domain A data (146) may include, forexample, database data, instant messaging data, etc. The workload domainA data (146) may include other and/or additional types of data withoutdeparting from the invention.

FIG. 2A shows a flowchart of a method for mapping protection policies todata cluster topologies in accordance with one or more embodiments ofthe invention. The method may be performed by, for example, a mappingmodule (102, FIG. 1B) of a data protection manager (100, FIG. 1A). Othercomponents of the system illustrated in FIGS. 1A-1E may perform all, ora portion, of the method of FIG. 2A without departing from theinvention.

While FIG. 2A is illustrated as a series of steps, any of the steps maybe omitted, performed in a different order, additional steps may beincluded, and/or any or all of the steps may be performed in a paralleland/or partially overlapping manner without departing from theinvention.

In step 200, a discovery event associated with a data cluster isidentified.

In one or more embodiments of the invention, the mapping module isconfigured to perform periodic discoveries of data cluster componentsfor data clusters that have registered with the data protection manager.The mapping module may monitor the amount of time that has passed sincea previous discovery was performed for a data cluster. The mappingmodule may, after a configurable amount of time has passed since thelast discovery of the data cluster was performed, perform a subsequentdiscovery of the data cluster components of the data cluster. Themapping module may identify the expiration of the configurable amount oftime since the previous discovery was performed as the discovery event.The discovery event associated with the data cluster may be identifiedvia other and/or additional methods without departing from theinvention.

In one or more embodiments of the invention, a user of the data clusterand/or the data protection manager sends a message to the mapping moduleof the data protection manager. The message may include a request toperform a data cluster discovery. The message may include communicationinformation. The communication information may include a data clusteridentifier, a data cluster manager identifier, a data cluster managernetwork address, an SFTP server identifier, an SFTP server networkaddress, and security information (e.g., security keys, encryption keys,etc.). The communication information may include other and/or additionalinformation that may be used to communicate with the data cluster andthe data cluster manager of the data cluster associated with the initialdiscovery event without departing from the invention. The message mayinclude other and/or additional information without departing from theinvention. The message may be transmitted to the mapping module usingany appropriate method of data transmission (e.g., network packets,application programming interface (API) calls, etc.) without departingfrom the invention. The mapping module of the data protection managermay identify obtaining the request to perform a data cluster discoveryas the discovery event. The discovery event associated with the datacluster may be identified via other and/or additional methods withoutdeparting from the invention.

In one or more embodiments of the invention, a data cluster manager of adata cluster sends a message to the mapping module of the dataprotection manager. The message may include a request to register thedata cluster with the data protection manager. The message may includecommunication information. The communication information may include adata cluster identifier, a data cluster manager identifier, a datacluster manager network address, an SFTP server identifier, an SFTPserver network address, and security information (e.g., a security key,an encryption key, etc.). The communication information may includeother and/or additional information that may be used to communicate withthe data cluster and the data cluster manager of the data clusterassociated with the initial discovery event without departing from theinvention. The message may include other and/or additional informationwithout departing from the invention. The message may be transmitted tothe mapping module using any appropriate method of data transmission(e.g., network packets, application programming interface (API) calls,etc.) without departing from the invention. The mapping module of thedata protection manager may identify obtaining the registration requestas the discovery event. The discovery event associated with the datacluster may be identified via other and/or additional methods withoutdeparting from the invention.

In step 202, data cluster topology information associated with the datacluster is obtained.

In one or more embodiments of the invention, a mapping module of thedata protection manager sends a message to the data cluster manager ofthe data cluster associated with the initial discovery event. Themessage may include a request for data cluster topology informationassociated with the data cluster. The message may be sent using thecommunication information obtained in step 200. The message may includeother and/or additional information without departing from theinvention. The message may be transmitted to the data cluster managerusing any appropriate method of data transmission (e.g., networkpackets, application programming interface (API) calls, etc.) withoutdeparting from the invention. The request for client topologyinformation associated with the data cluster may be sent to the datacluster manager associated with the data cluster via other and/oradditional methods without departing from the invention.

In one or more embodiments of the invention, the mapping module obtainsa message from the data cluster manager of the data cluster. The messagemay include data cluster topology information associated with the datacluster. The message may include other and/or additional informationwithout departing from the invention. In response to obtaining therequest, the data cluster manager may generate and/or obtain the datacluster topology information. The message may be transmitted to themapping module using any appropriate method of data transmission (e.g.,network packets, application programming interface (API) calls, etc.)without departing from the invention. The data cluster topologyinformation associated with the data cluster may be obtained from thedata cluster manager via other and/or additional methods withoutdeparting from the invention.

In step 204, protection policies are mapped to the data cluster topologyusing data cluster topology information and data cluster data protectioninformation.

In one or more embodiments of the invention, the mapping module uses thedata cluster topology information and the data cluster data protectioninformation associated with the data cluster topology type associatedwith the data cluster to map protection policies to the data cluster.The data cluster data protection information may include a list of datacluster topology types, the data cluster topology information associatedwith each of the data cluster topology types, and the list of one ormore protection policies associated with each of the data clustertopology types. The mapping module may identify the data clustertopology type associated with the data cluster by comparing the datacluster topology information obtained in step 202 with the data clustertopology information associated with each type of data cluster topologyincluded in the data cluster data protection information repository. Themapping module may identify the data cluster topology type associatedwith the data cluster as the data cluster topology type that isassociated with data cluster topology information included in the datacluster data protection information repository that matches the datacluster topology information obtained in step 202. The mapping modulemay map the protection policies associated with the identified datacluster topology type of the data cluster to the data cluster.

The protection policies may be mapped to the data cluster using datacluster topology information and data cluster data protectioninformation via other and/or additional methods without departing fromthe invention.

In step 206, the data cluster topology protection policy mappings areupdated using the data cluster topology information and the data clusterdata protection information.

In one or more embodiments of the invention, the data cluster topologyprotection policy mappings are updated using the data cluster topologyinformation and the data cluster data protection information byincluding the data cluster identifier, the data cluster topology type,and the protection policies associated with the data cluster topologytype. The mapping module may associate the data cluster identifierincluded in the data cluster topology information with both the datacluster topology type and the protection policies associated with thedata cluster topology type (i.e., included in the data cluster dataprotection information) in the data cluster topology protection policymappings. The mapping module may store the associated data clusteridentifier, the data cluster topology type, and the protection policiesin the data cluster topology protection policy mappings of thepersistent storage of the data protection manager. The mapping modulemay include other and/or additional information associated with the datacluster and the mapped protection policies in the data cluster topologyprotection policy mappings without departing from the invention. Thedata cluster topology protection policy mappings may be updated usingthe data cluster topology information and the data cluster dataprotection information via other and/or additional methods withoutdeparting from the invention.

In step 208, the performance of data protection services for the datacluster is initiated based on the mapped protection policies.

In one or more embodiments of the invention, the mapping moduleinitiates the performance of data protection services for the datacluster using the mapped protection policies. The protection policiesmay include one or more protection policies that specify data protectionrequirements for performing data protection services associated with thedata cluster components included in the data cluster topology of thedata cluster. The mapping module may initiate the performance of dataprotection services for each data cluster component of the data clustertopology that satisfy the data protection requirements. The mappingmodule may cancel and/or otherwise stop performing at least a portion ofthe data protection services associated with data cluster componentsthat were removed from the data cluster if the discovery event is notassociated with an initial discovery event.

The data protection services may include generating backups of datacluster components according to a schedule specified by the mappedprotection policies, storing backups in storage locations specified bythe mapped protection policies, and other and/or additional dataprotection services that satisfy data protection requirements specifiedby the mapped protection policy types without departing from theinvention. The mapping module may initiate the performance of the dataprotection services by requesting the data protection manager to monitorthe protection policies mapped to each data cluster component of thedata cluster topology and to perform the data protection servicesspecified by the mapped protection policies. As a result, the dataprotection manager may perform the data protection services. Theperformance of data protection services for the data cluster isinitiated based on the mapped protection policies via other and/oradditional methods without departing from the invention.

In one or more embodiments of the invention, the method ends followingstep 208.

FIG. 2B shows a flowchart of a method for data cluster data protectioninformation in accordance with one or more embodiments of the invention.The method may be performed by, for example, a mapping module (102, FIG.1B) of a data protection manager (100, FIG. 1A). Other components of thesystem illustrated in FIGS. 1A-1E may perform all, or a portion, of themethod of FIG. 2B without departing from the invention.

While FIG. 2B is illustrated as a series of steps, any of the steps maybe omitted, performed in a different order, additional steps may beincluded, and/or any or all of the steps may be performed in a paralleland/or partially overlapping manner without departing from theinvention.

In step 210, a data cluster data protection information update event isidentified.

In one or more embodiments of the invention, a user of the data clusterand/or the data protection manager sends a message to the mapping moduleof the data protection manager. The message may include a request toupdate the data cluster data protection information repository. Themessage may include other and/or additional information withoutdeparting from the invention. The message may be transmitted to themapping module using any appropriate method of data transmission (e.g.,network packets, application programming interface (API) calls, etc.)without departing from the invention. The mapping module of the dataprotection manager may identify obtaining the request to update the datacluster data protection information as the data cluster data protectioninformation update event. The data cluster data protection informationupdate event may be identified via other and/or additional methodswithout departing from the invention.

In one or more embodiments of the invention, an entity that managesprotection policies (e.g., a third party domain expert or a protectionpolicy manager, both not shown in the system of FIG. 1A) sends a messageto the mapping module of the data protection manager. The message mayinclude a request to update the data cluster data protection informationrepository. The message may include other and/or additional informationwithout departing from the invention. The message may be transmitted tothe mapping module using any appropriate method of data transmission(e.g., network packets, application programming interface (API) calls,etc.) without departing from the invention. The mapping module of thedata protection manager may identify obtaining the request to update thedata cluster data protection information as the data cluster dataprotection information update event. The data cluster data protectioninformation update event may be identified via other and/or additionalmethods without departing from the invention.

In step 212, updated data cluster data protection information isobtained based on the data cluster data protection information updateevent.

In one or more embodiments of the invention, the mapping module of thedata protection manager sends a message to the user of the data cluster,the user of the data protection manager, the third party domain expert,and/or the protection policy management entity associated with the datacluster data protection information update event. The message mayinclude a request for updated data cluster data protection information.The message may be transmitted by the mapping module using anyappropriate method of data transmission (e.g., network packets,application programming interface (API) calls, etc.) without departingfrom the invention.

In response to obtaining the request from the mapping module, the userof the data cluster, the user of the data protection manager, the thirdparty domain expert, and/or the protection policy management entity maygenerate and/or otherwise obtain updated data cluster data protectioninformation. The new data cluster data protection information mayinclude (i) one or more updated protection policies associated with oneor more data cluster topology types, (ii) one or more new protectionpolicies associated with one or more data cluster topology types, and/oradditional information associated with data cluster data protectioninformation without departing from the invention. The user of the datacluster, the user of the data protection manager, the third party domainexpert, and/or the protection policy management entity may provide theupdated data cluster data protection information to the mapping module.The message may be transmitted by the mapping module using anyappropriate method of data transmission (e.g., network packets,application programming interface (API) calls, etc.) without departingfrom the invention. Updated data cluster data protection information maybe obtained based on the data cluster data protection information updateevent via other and/or additional methods without departing from theinvention.

In step 214, the data cluster data protection information repository isupdated based on the updated data cluster data protection information.

In one or more embodiments of the invention, the mapping module storesthe updated data cluster data protection information in the data clusterdata protection information repository to update the data cluster dataprotection information. As discussed above, the updated data clusterdata protection information may include new and/or modified protectionpolicies associated with one or more data cluster topology types. Themapping module may overwrite the data cluster data protectioninformation associated with data cluster topology types for which theupdated data cluster topology data protection information is associated.The mapping module may overwrite all, or a portion, of the data clusterdata protection information included in the data cluster data protectioninformation repository to update the data cluster data protectioninformation repository. In one embodiment of the invention, the mappingmodule may include new data cluster data protection information of theupdated data cluster data protection information in the data clusterdata protection information repository without overwriting any previousdata cluster data protection information (e.g., a new data clustertopology type was included in the updated data cluster data protectioninformation. The data cluster data protection information repository maybe updated based on the updated data cluster data protection informationvia other and/or additional methods without departing from theinvention.

In step 216, a determination is made as to whether an update to the datacluster topology protection policy mappings is required.

In one or more embodiments of the invention, the mapping moduledetermines whether an update to the data cluster topology protectionpolicy mappings is required using the updated data cluster dataprotection information and the data cluster topology protection policymappings. To determine whether an update to the data cluster topologyprotection policy mappings is required, the mapping module may comparethe protection policies associated with each data cluster topology typein the updated data cluster data protection information repository withthe protection policies associated with each data cluster topology typeincluded in the data cluster topology protection policy mappings. If theone or more protection policies associated with one or more data clustertopology types in the data cluster topology protection policy mappingsdo not match the protection policies associated with the same datacluster topology types in the updated data cluster data protectioninformation repository, then the mapping module may determine that anupdate to the data cluster topology protection policy mappings isrequired. If all of the one or more protection policies associated withall of the one or more data cluster topology types in the data clustertopology protection policy mappings match the protection policiesassociated with the same data cluster topology types in the updated datacluster data protection information repository, then the mapping modulemay determine that an update to the data cluster topology protectionpolicy mappings is not required. The determination as to whether anupdate to the data cluster topology protection policy mappings isrequired may be made via other and/or additional methods withoutdeparting from the invention.

In one or more embodiments of the invention, if it is determined that anupdate to the data cluster topology protection policy mappings isrequired, then the method proceeds to step 218. In one or moreembodiments of the invention, if it is determined that an update to thedata cluster topology protection policy mappings is not required, thenthe method ends following step 216.

In step 218, the data cluster topology protection policy mappings areupdated based on the updated data cluster data protection informationrepository.

In one or more embodiments of the invention, the data cluster topologyprotection policy mappings are updated using the updated data clusterdata protection information repository. The mapping module may updatethe protection policies in the data cluster topology protection policymappings that do not match the protection policies associated with thesame data cluster topology type in the updated data cluster dataprotection information repository with the protection policies includedin the updated data cluster data protection information repository. As aresult, the data cluster topology protection policy mappings include thenew and/or updated protection policies included in the updated datacluster data protection information repository. The data clustertopology protection policy mappings are updated based on the updateddata cluster data protection information repository via other and/oradditional methods without departing from the invention.

In step 220, the performance of data protection services for the dataclusters are initiated based on the updated data cluster topologyprotection policy mappings.

In one or more embodiments of the invention, the mapping moduleinitiates the performance of data protection services for the dataclusters using the updated mapped protection policies included in theupdated data cluster topology protection policy mappings. The protectionpolicies may include one or more protection policies that specify dataprotection requirements associated with the data cluster componentsincluded in the data cluster topology of the data cluster. The mappingmodule may initiate the performance of data protection services for eachdata cluster component of the data cluster topology that satisfy thedata protection requirements. The mapping module may cancel and/orotherwise stop performing at least a portion of the data protectionservices associated with previous protection policies that were replacedin step 218.

The data protection services may include generating backups of datacluster components according to a schedule specified by the mappedprotection policies, storing backups in storage locations specified bythe mapped protection policies, and other and/or additional dataprotection services that satisfy data protection requirements specifiedby the mapped protection policy types without departing from theinvention. The mapping module may initiate the performance of the dataprotection services by requesting the data protection manager to monitorthe protection policies mapped to each data cluster component of thedata cluster topology and to perform the data protection servicesspecified by the mapped protection policies. As a result, the dataprotection manager may perform the data protection services. Theperformance of data protection services for the data cluster isinitiated based on the mapped protection policies via other and/oradditional methods without departing from the invention.

In one or more embodiments of the invention, the method ends followingstep 220.

To further clarify embodiments of the invention, non-limiting examplesare provided in FIGS. 3A-3B. FIGS. 3A-3B show diagrams of operations ofexample systems over time. FIGS. 3A-3B may show a system similar to thatillustrated in FIG. 1A. Actions performed by components of the systemare illustrated by numbered, circular boxes interconnected with arrowedlines. For the sake of brevity, only a limited number of componentsillustrated in FIG. 1A are illustrated in FIGS. 3A-3B.

Examples

FIG. 3A shows a diagram of the operation of a first example system overtime in accordance with one or more embodiments of the invention.Turning to FIG. 3A, consider a scenario in which data cluster A (120A)is provisioned and has just registered with a data protection manager(100). The data protection manager (100) includes a mapping module (102)and a persistent storage (106). At step 1, the mapping module (102) ofthe data protection manager (100) obtains a request to perform aninitial discovery of the data cluster topology associated with datacluster A (120A). In response to obtaining the request to perform aninitial discovery of data cluster topology, at step 2, the mappingmodule (102) sends a message to a data cluster manager (not shown) ofdata cluster A (120A). The message includes a request for the currentlydeployed data cluster topology of data cluster A (120A).

In response to obtaining the request, the data cluster manager generatesand/or obtains data cluster topology information associated with datacluster A (120A). After generating and/or obtaining the data clustertopology information, at step 3, the data cluster manager sends the datacluster topology information to the mapping module (102). At step 4, themapping module (102) obtains data cluster data protection information.At step 5, the mapping module uses the data cluster topology informationand the data cluster data protection information to map protectionpolicies to the data cluster topology of data cluster A (120A) resultingin data cluster topology protection policy mappings associated with datacluster A (120A).

The data cluster topology information specifies the data clustertopology currently deployed in data cluster A (120A). The data clusterdata protection information specifies, for each type of data clustertopology, one or more protection policies recommended for the datacluster topology by a manufacturer of the data cluster topology of datacluster A (120A). The mapping module (102) then, at step 6, updates thedata cluster topology information repository stored in the persistentstorage (106) with the data cluster topology information associated withdata cluster A (120A) and stores the data cluster topology protectionpolicy mappings associated with data cluster A (120A) in the persistentstorage (106). At step 7, the mapping module (102) initiates theperformance of data protection services for the data cluster topology ofdata cluster A (120A) based on the data cluster topology protectionpolicy mappings associated with data cluster A (120A). At step 8, thedata protection manager (100) performs the data protection services fordata cluster A (120A) based on the data cluster topology protectionpolicy mappings associated with data cluster A (120A).

At step 9, the mapping module (102) of the data protection manager (100)obtains a request to perform an initial discovery of the data clustertopology associated with data cluster B (120B). In response to obtainingthe request to perform an initial discovery of the data clustertopology, at step 10, the mapping module (102) sends a message to a datacluster manager (not shown) of data cluster B (120B). The messageincludes a request for the currently deployed data cluster topology ofdata cluster B (120B).

In response to obtaining the request, the data cluster manager generatesand/or obtains data cluster topology information associated with datacluster B (120B). After generating and/or obtaining the data clustertopology information, at step 11, the data cluster manager sends thedata cluster topology information to the mapping module (102). At step12, the mapping module uses the data cluster topology information andthe data cluster data protection information to map protection policiesto the data cluster topology of data cluster B (120B) resulting in datacluster topology protection policy mappings associated with data clusterB (120B).

The data cluster topology of data cluster B (120B) (e.g.,non-hyperconverged infrastructure (HCI)) is different than that of datacluster A (120A) (e.g., HCI). The data cluster topology informationspecifies the data cluster topology currently deployed in data cluster B(120B). The data cluster data protection information specifies, for eachtype of data cluster topology, one or more protection policiesrecommended for the data cluster topology by a manufacturer of the datacluster topology of data cluster B (120B). The mapped protectionpolicies to data cluster B (120B) are different than the mappedprotection policies to data cluster A (120A). The mapping module (102)then, at step 13, updates the data cluster topology informationrepository stored in the persistent storage (106) with the data clustertopology information associated with data cluster B (120B) and storesthe data cluster topology protection policy mappings associated withdata cluster B (120B) in the persistent storage (106). At step 14, themapping module (102) initiates the performance of data protectionservices for the data cluster topology of data cluster B (120B) based onthe data cluster topology protection policy mappings associated withdata cluster B (120B). At step 15, the data protection manager (100)performs the data protection services for data cluster B (120B) based onthe data cluster topology protection policy mappings associated withdata cluster B (120B).

FIG. 3B shows a diagram of the continuation of the operation of theexample system over time in accordance with one or more embodiments ofthe invention. Turning to FIG. 3B, at some point in time after step 15of FIG. 3A, at step 1, the mapping module (102) of the data protectionmanager (100) identifies a data cluster data protection informationupdate event. In response to identifying the data cluster dataprotection information update event, at step 2, the mapping module (102)obtains updated data cluster data protection information based on thedata cluster data protection information update event. At step 3, themapping module (102) obtains the previous data cluster data protectioninformation from the data cluster data protection information repositoryof the persistent storage (106).

After obtaining the previous data cluster data protection information,at step 4, the mapping module updates the previous data cluster dataprotection information using the updated data cluster data protectioninformation. At step 5, the mapping module (102) determines that theupdated data cluster data protection information requires an update toboth the mapped protection policies for data cluster A (120A) and datacluster B (120B). At step 6, the mapping module (102) uses the updateddata cluster data protection information to update the data clustertopology protection policy mappings associated with data cluster A(120A) and data cluster B (120B).

At step 7, the mapping module stores the updated data cluster topologyprotection policy mappings associated with data cluster A (120A) anddata cluster B (120B) in persistent storage (106). Additionally, themapping module stores the updated data cluster data protectioninformation in the data cluster data protection information repositoryin the persistent storage (106). At step 8, the data protection manager(100) performs the data protection services for data cluster A (120A)based on the updated data cluster topology protection policy mappingsassociated with data cluster A (120A). At step 9, the data protectionmanager (100) performs the data protection services for data cluster B(120B) based on the updated data cluster topology protection policymappings associated with data cluster B (120B).

End of Examples

As discussed above, embodiments of the invention may be implementedusing computing devices. FIG. 4 shows a diagram of a computing device inaccordance with one or more embodiments of the invention. The computingdevice (400) may include one or more computer processors (402),non-persistent storage (404) (e.g., volatile memory, such as randomaccess memory (RAM), cache memory), persistent storage (406) (e.g., ahard disk, an optical drive such as a compact disk (CD) drive or digitalversatile disk (DVD) drive, a flash memory, etc.), a communicationinterface (412) (e.g., Bluetooth interface, infrared interface, networkinterface, optical interface, etc.), input devices (410), output devices(408), and numerous other elements (not shown) and functionalities. Eachof these components is described below.

In one embodiment of the invention, the computer processor(s) (402) maybe an integrated circuit for processing instructions. For example, thecomputer processor(s) may be one or more cores or micro-cores of aprocessor. The computing device (400) may also include one or more inputdevices (410), such as a touchscreen, keyboard, mouse, microphone,touchpad, electronic pen, or any other type of input device. Further,the communication interface (412) may include an integrated circuit forconnecting the computing device (400) to a network (not shown) (e.g., alocal area network (LAN), a wide area network (WAN) such as theInternet, mobile network, or any other type of network) and/or toanother device, such as another computing device.

In one embodiment of the invention, the computing device (400) mayinclude one or more output devices (408), such as a screen (e.g., aliquid crystal display (LCD), a plasma display, touchscreen, cathode raytube (CRT) monitor, projector, or other display device), a printer,external storage, or any other output device. One or more of the outputdevices may be the same or different from the input device(s). The inputand output device(s) may be locally or remotely connected to thecomputer processor(s) (402), non-persistent storage (404), andpersistent storage (406). Many different types of computing devicesexist, and the aforementioned input and output device(s) may take otherforms.

One or more embodiments of the invention may be implemented usinginstructions executed by one or more processors of the data managementdevice. Further, such instructions may correspond to computer readableinstructions that are stored on one or more non-transitory computerreadable mediums.

One or more embodiments of the invention may improve the operation ofone or more computing devices. More specifically, embodiments of theinvention relate to a mapping module of a data protection manager thatassigns protection policies to data clusters based on data clustertopologies associated with the data clusters. To map data protectionservices, the mapping module may obtain data cluster topologyinformation associated with a data cluster which may specify the datacluster type associated with the data cluster. The mapping module mayuse the data cluster topology information and data cluster dataprotection information to map the protection polices to the data clustertopology. Therefore, protection policies and data protection servicesmay be efficiently mapped to the entirety of the data cluster topologywhile mitigating user involvement.

Thus, embodiments of the invention may address the problem ofinefficient use of computing resources to map protection policies todata clusters. This problem arises due to the nature of thetechnological environment in which the data cluster operate.

The problems discussed above should be understood as being examples ofproblems solved by embodiments of the invention disclosed herein and theinvention should not be limited to solving the same/similar problems.The disclosed invention is broadly applicable to address a range ofproblems beyond those discussed herein.

While the invention has been described with respect to a limited numberof embodiments, those skilled in the art, having benefit of thisdisclosure, will appreciate that other embodiments can be devised whichdo not depart from the scope of the technology as disclosed herein.Accordingly, the scope of the invention should be limited only by theattached claims.

What is claimed is:
 1. A method for managing data protection servicesfor data clusters, the method comprising: identifying, by a mappingmodule of a data protection manager, a first discovery event associatedwith a first data cluster; in response to identifying the firstdiscovery event: obtaining first data cluster topology informationassociated with the first data cluster from the first data cluster,wherein the first data cluster topology information specifies a firstdata cluster topology comprising: software resources of the first datacluster comprising an operating system, an application, and a virtualmachine associated with the first data cluster, and hardware resourcesof the first data cluster comprising a central processing unit, agraphics processing unit, and a storage device; obtaining data clusterdata protection information from a data cluster data protectioninformation repository, wherein the data cluster data protectioninformation specifies: a first data cluster topology type associatedwith the software resources and the hardware resources of the first datacluster topology, and first protection policies associated with thefirst data cluster topology type; mapping first protection policies tothe first data cluster using the first data cluster topology informationand the data cluster data protection information; updating data clustertopology information protection policy mappings using the first datacluster topology information and the data cluster data protectioninformation; and initiating performance of first data protectionservices for the first data cluster based on the first mapped protectionpolicies.
 2. The method of claim 1, further comprising: identifying asecond discovery event associated with a second data cluster; inresponse to identifying the second discovery event: obtaining seconddata cluster topology information associated with the second datacluster from the second data cluster; mapping second protection policiesto the second data cluster using the second data cluster topologyinformation and the data cluster data protection information; updatingdata cluster topology information protection policy mappings using thesecond data cluster topology information and the data cluster dataprotection information; and initiating performance of second dataprotection services for the second data cluster based on the secondmapped protection policies.
 3. The method of claim 2, wherein: thesecond data cluster topology information specifies a second data clustertopology associated with the second data cluster, wherein the seconddata cluster topology is associated with a second data cluster topologytype.
 4. The method of claim 3, wherein the data cluster data protectioninformation specifies: the second protection policies are associatedwith the second data cluster topology type.
 5. The method of claim 4,wherein the data cluster data protection information is configured basedon recommendations by third party domain experts of the first datacluster and the second data cluster.
 6. The method of claim 4, whereinthe data cluster data protection information is configured by a user ofthe first data cluster and a user of the second data cluster.
 7. Themethod of claim 2, further comprising: prior to initiating theperformance of the second data protection services for the second datacluster based on the second mapped protection policies: identifying adata cluster data protection information update event; in response toidentifying the data cluster data protection information update event:obtaining updated data cluster data protection information based on thedata cluster data protection information update event; updating the datacluster data protection information repository based on the updated datacluster data protection information to obtain an updated data clusterdata protection information repository; making a determination thatupdates to the data cluster topology protection policy mappings arerequired; and in response to the determination: updating the datacluster topology protection policy mappings based on the updated datacluster data protection information repository to obtain updated firstmapped protection policies and updated second mapped protectionpolicies; and initiate the performance of the first data protectionservices and the second data protection services based on the updatedfirst mapped protection policies and the updated second mappedprotection policies.
 8. A non-transitory computer readable mediumcomprising computer readable program code, which when executed by acomputer processor enables the computer processor to perform a methodfor managing data protection services for data clusters, the methodcomprising: identifying, by a mapping module of a data protectionmanager, a first discovery event associated with a first data cluster;in response to identifying the first discovery event: obtaining firstdata cluster topology information associated with the first data clusterfrom the first data cluster, wherein the first data cluster topologyinformation specifies a first data cluster topology comprising: softwareresources of the first data cluster comprising an operating system, anapplication, and a virtual machine associated with the first datacluster, and hardware resources of the first data cluster comprising acentral processing unit, a graphics processing unit, and a storagedevice; obtaining data cluster data protection information from a datacluster data protection information repository, wherein the data clusterdata protection information specifies: a first data cluster topologytype associated with the software resources and the hardware resourcesof the first data cluster topology, and first protection policiesassociated with the first data cluster topology type; mapping firstprotection policies to the first data cluster using the first datacluster topology information and the data cluster data protectioninformation; updating data cluster topology information protectionpolicy mappings using the first data cluster topology information andthe data cluster data protection information; and initiating performanceof first data protection services for the first data cluster based onthe first mapped protection policies.
 9. The non-transitory computerreadable medium of claim 8, further comprising: identifying a seconddiscovery event associated with a second data cluster; in response toidentifying the second discovery event: obtaining second data clustertopology information associated with the second data cluster from thesecond data cluster; mapping second protection policies to the seconddata cluster using the second data cluster topology information and thedata cluster data protection information; updating data cluster topologyinformation protection policy mappings using the second data clustertopology information and the data cluster data protection information;and initiating performance of second data protection services for thesecond data cluster based on the second mapped protection policies. 10.The non-transitory computer readable medium of claim 9, wherein: thesecond data cluster topology information specifies a second data clustertopology associated with the second data cluster, wherein the seconddata cluster topology is associated with a second data cluster topologytype.
 11. The non-transitory computer readable medium of claim 10,wherein the data cluster data protection information specifies: thesecond protection policies are associated with the second data clustertopology type.
 12. The non-transitory computer readable medium of claim11, wherein the data cluster data protection information is configuredbased on recommendations by third party domain experts of the first datacluster and the second data cluster.
 13. The non-transitory computerreadable medium of claim 11, wherein the data cluster data protectioninformation is configured by a user of the first data cluster and a userof the second data cluster.
 14. The non-transitory computer readablemedium of claim 9, further comprising: prior to initiating theperformance of the second data protection services for the second datacluster based on the second mapped protection policies: identifying adata cluster data protection information update event; in response toidentifying the data cluster data protection information update event:obtaining updated data cluster data protection information based on thedata cluster data protection information update event; updating the datacluster data protection information repository based on the updated datacluster data protection information to obtain an updated data clusterdata protection information repository; making a determination thatupdates to the data cluster topology protection policy mappings arerequired; and in response to the determination: updating the datacluster topology protection policy mappings based on the updated datacluster data protection information repository to obtain updated firstmapped protection policies and updated second mapped protectionpolicies; and initiate the performance of the first data protectionservices and the second data protection services based on the updatedfirst mapped protection policies and the updated second mappedprotection policies.
 15. A system for managing data protection servicesfor data clusters, comprising: persistent storage for storing a datacluster topology protection policy mappings; and a mapping module of adata protection manager, comprising a processor and memory, programmedto: identify a first discovery event associated with a first datacluster; in response to identifying the first discovery event: obtainfirst data cluster topology information associated with the first datacluster from the first data cluster, wherein the first data clustertopology information specifies a first data cluster topology comprising:software resources of the first data cluster comprising an operatingsystem, an application, and a virtual machine associated with the firstdata cluster, and hardware resources of the first data clustercomprising a central processing unit, a graphics processing unit, and astorage device; obtain data cluster data protection information from adata cluster data protection information repository, wherein the datacluster data protection information specifies: a first data clustertopology type associated with the software resources and the hardwareresources of the first data cluster topology, and first protectionpolicies associated with the first data cluster topology type; map firstprotection policies to the first data cluster using the first datacluster topology information and the data cluster data protectioninformation; update data cluster topology information protection policymappings using the first data cluster topology information and the datacluster data protection information; and initiate performance of firstdata protection services for the first data cluster based on the firstmapped protection policies.
 16. The system of claim 15, wherein themapping module if further programmed to: identify a second discoveryevent associated with a second data cluster; in response to identifyingthe second discovery event: obtain second data cluster topologyinformation associated with the second data cluster from the second datacluster; map second protection policies to the second data cluster usingthe second data cluster topology information and the data cluster dataprotection information; update data cluster topology informationprotection policy mappings using the second data cluster topologyinformation and the data cluster data protection information; andinitiate performance of second data protection services for the seconddata cluster based on the second mapped protection policies.
 17. Thesystem of claim 16, wherein: the second data cluster topologyinformation specifies a second data cluster topology associated with thesecond data cluster, wherein the second data cluster topology isassociated with a second data cluster topology type.
 18. The system ofclaim 17, wherein the data cluster data protection informationspecifies: the second protection policies are associated with the seconddata cluster topology type.
 19. The system of claim 18, wherein the datacluster data protection information is configured based onrecommendations by third party domain experts of the first data clusterand the second data cluster.
 20. The system of claim 18, wherein thedata cluster data protection information is configured by a user of thefirst data cluster and a user of the second data cluster.