Migration of an existing computing system to new hardware

ABSTRACT

Software, firmware, and systems are described herein that migrate functionality of a source physical computing device to a destination physical computing device. A non-production copy of data associated with a source physical computing device is created. A configuration of the source physical computing device is determined. A configuration for a destination physical computing device is determined based at least in part on the configuration of the source physical computing device. The destination physical computing device is provided access to data and metadata associated with the source physical computing device using the non-production copy of data associated with the source physical computing device.

CROSS-REFERENCE TO RELATED APPLICATION(S)

The present application is a continuation of U.S. patent applicationSer. No. 13/789,871, filed Mar. 8, 2013, now U.S. Pat. No. 9,372,827,which claims priority to and the benefit of U.S. Provisional ApplicationNo. 61/618,666, filed Mar. 30, 2012, each of which is herebyincorporated herein by reference in its entirety.

This application is related to assignee's U.S. patent application Ser.No. 13/250,962, filed on Sep. 30, 2011, entitled “EFFICIENT DATAMANAGEMENT IMPROVEMENTS, SUCH AS DOCKING LIMITED-FEATURE DATA MANAGEMENTMODULES TO A FULL-FEATURED DATA MANAGEMENT SYSTEM”, which is herebyincorporated by reference herein in its entirety. This application isrelated to commonly-assigned U.S. Provisional Patent Application61/618,579, entitled DATA STORAGE RECOVERY AUTOMATION, filed Mar. 30,2012, which is hereby incorporated by reference herein in its entirety.

BACKGROUND

Companies have the opportunity to reduce the complexity of their ITinfrastructure and their IT costs by using virtualization technologiesand cloud computing services. In general, virtualization refers to thesimultaneous hosting of one or more operating systems on a physicalcomputer. Such virtual operating systems and their associated virtualresources are called virtual machines. Virtualization software (orsynonymously, a hypervisor or Virtual Machine Monitor), sits between thevirtual machines and the hardware of the physical computer, which iscalled a virtual machine host. One example of virtualization software isESX Server, by VMware, Inc. of Palo Alto, Calif. Other examples includeMicrosoft Virtual Server and Microsoft Windows Server Hyper-V, both byMicrosoft Corporation of Redmond, Wash., and Sun xVM by Oracle AmericaInc. of Santa Clara, Calif.

Virtualization software provides to each virtual operating systemvirtual resources, such as virtual processors, virtual memory, virtualnetwork devices, and virtual disks. Each virtual machine has one or morevirtual disks to store the files, metadata, and other data used by thevirtual machine. Virtualization software typically stores the data ofvirtual disks in files on the file system of the physical computer,called virtual machine disk files (in the case of VMware virtualservers) or virtual hard disk image files (in the case of Microsoftvirtual servers). For example, VMware's ESX Server provides the VirtualMachine File System (VMFS) for managing virtual machine disk files. Avirtual machine reads data from and writes data to its virtual disk muchthe same way that an actual physical machine reads data from and writesdata to an actual disk.

Cloud computing services (or “cloud services”) provide computing as aservice by sharing resources and software to computing devices over anetwork such as the Internet, typically as a paid (e.g., metered orsubscription) service. For example, cloud services provide storageresources, computational power, software, and data access to theircustomers, who are generally unaware of the underlying structure of thephysical devices and software that facilitate the services. Examples ofcloud computing service vendors include Amazon Corporation of Seattle,Wash. (offering Amazon Web Services); Rackspace Corporation of SanAntonio, Tex.; and Microsoft Corporation of Redmond, Wash. (offeringWindows Azure).

A cloud service often provides an Application Programming Interface(“API”) or similar interface that enables a cloud service customer'smachines to access, modify, and otherwise manage the customer's cloudservices and data. Typically, cloud services are facilitated byvirtualization. For example, in order to provide data storage, access,and computational resources for customers, a cloud service provider mayoperate a data center having multiple virtual machine hosts, each ofwhich runs multiple virtual machines.

When companies transition their existing in-house physical ITinfrastructure, such as existing application servers, to virtualmachines and cloud services, they may experience numerous difficulties.For example, the company's IT staff may be unfamiliar withvirtualization software or cloud service APIs and therefore spendsubstantial internal resources familiarizing themselves with these.Alternatively, a company's IT staff may be familiar with using only asingle virtualization or cloud computing service vendor and thereforemiss the opportunity to transition to a different, more cost-effectivevendor. The internal IT staff may also incorrectly transition existingapplication servers or stored data to a new virtualized or cloudplatform. Moreover, even if IT staff are familiar with numerousvirtualization and cloud service vendors, they may need to spendsubstantial time and energy cataloguing existing physical IT resources,designing and deploying comparable virtualization or cloud servicesplatforms to replace those physical resources, porting existingapplications to the new platforms, testing the new platforms, andredirecting client service requests to the new platforms.

Some systems and software may convert a physical machine to a virtualmachine. However, typically such systems and software require that allof the production data of the physical machine be read and transmittedover a network, which requires substantial time and network bandwidth.These systems and software also typically require that the same data bestored twice: once at the source physical machine and once at thedestination virtual machine. Moreover, such systems and softwaretypically must perform substantial processing to convert the productiondata of the physical machine to a virtual disk file (e.g., a .vmdkfile). Further, such systems and software typically cannot create avirtual machine from an earlier, point-in-time state of the physicalmachine, but can only create a virtual machine reflecting the state ofthe physical machine at the present time when the virtual machine isbeing created.

The need exists for systems and methods that overcome the aboveproblems, as well as systems and methods that provide additionalbenefits. Overall, the examples herein of some prior or related systemsand methods and their associated limitations are intended to beillustrative and not exclusive. Other limitations of existing or priorsystems and methods will become apparent to those of skill in the artupon reading the following Detailed Description.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1A is a block diagram illustrating an environment in which a systemfor migrating physical computing resources operates.

FIG. 1B is a block diagram illustrating another environment in which asystem for migrating physical computing resources operates.

FIG. 2 is a block diagram illustrating details of a migration systemthat can migrate physical computing resources to virtual machines andcloud service providers and provide disaster recovery testingfunctionality.

FIG. 3 is a flow diagram illustrating a process implemented by themigration system in connection with migrating physical computingresources to one or more virtual machines.

FIG. 4 is a flow diagram illustrating a process for creating and using anon-production copy of the data and metadata of a virtual machine havinga mapped LUN.

FIG. 5 is a flow diagram illustrating a process for creating one or moreadditional non-production copies of a virtual machine's data andmetadata from snapshots.

FIG. 6A shows a process for using snapshots to revert a virtual machinehaving a mapped LUN to an earlier point in time.

FIG. 6B shows a process for using non-production copies to restore avirtual machine that has one or more mapped LUNs.

FIG. 7 illustrates an example of a virtual machine tracking datastructure.

FIG. 8 is a block diagram illustrating an example of a suitableinformation management environment in which aspects of the inventivesystems and methods may operate.

FIG. 9 illustrates examples of production and non-production data thatmay be processed by the information management environment of FIG. 8.

FIG. 10 is a block diagram illustrating one example of a hierarchicalarrangement of resources for the information management system of FIG.8, including information management cells.

FIG. 11 is a block diagram illustrating an example of resources formingan information management cell.

DETAILED DESCRIPTION

The headings provided herein are for convenience only and do notnecessarily affect the scope or meaning of the disclosure.

Overview

A software, firmware, and/or hardware system for migrating a physicalmachine to a virtual machine (the “system”) is disclosed. The systemreceives a request to clone physical machine functionality on a newvirtual machine. In response, the system creates or identifies anon-production, point-in-time copy of the data and metadata from thephysical machine, such as a snapshot copy. Using the non-production copyof the data and any applicable policies, the system can automaticallydetect the configuration and resource usage of the physical machine anddetermine a desired configuration and location of the new virtualmachine. The system then provisions a new virtual machine at thedetermined location, adjusts its configuration to match the desiredconfiguration, and makes data and metadata from the physical machineavailable to the virtual machine. Once the virtual machine has thus beencreated and configured, it may be used for disaster recovery purposes orto replace the physical machine. In some examples, the non-productioncopy of the data is a snapshot copy and the data and metadata from thephysical machine is made available by exposing a production data storeassociated with the physical machine or a replica of the production datastore to the virtual machine.

Other migration methods are also described herein, including methods formigrating a source physical machine to another destination physicalmachine, migrating a source virtual machine to another destinationvirtual machine, and migrating a virtual machine to a physical machine.

Also described herein are systems and methods for creating one or moreadditional non-production copies of a virtual machine's data andmetadata from snapshots, using snapshots to revert a virtual machinehaving a physical compatibility mode raw device mapped LUN (or“PRDM-mapped LUN”) (or another type of mapped external LUN or device) toan earlier point in time, and using non-production copies other thansnapshots to restore a virtual machine that has a PRDM-mapped LUN (oranother type of mapped external LUN or device).

Various examples of the invention will now be described. The followingdescription provides specific details for a thorough understanding andenabling description of these examples. One skilled in the relevant artwill understand, however, that the invention may be practiced withoutmany of these details. Likewise, one skilled in the relevant art willalso understand that the invention may include many other obviousfeatures not described in detail herein. Additionally, some well-knownstructures or functions may not be shown or described in detail below,so as to avoid unnecessarily obscuring the relevant description.

The terminology used below is to be interpreted in its broadestreasonable manner, even though it is being used in conjunction with adetailed description of certain specific examples of the invention.Indeed, certain terms may even be emphasized below; however, anyterminology intended to be interpreted in any restricted manner will beovertly and specifically defined as such in this Detailed Descriptionsection.

Illustrative Environments

FIG. 1A is a block diagram illustrating an environment 100 in which asystem for migrating physical computing resources operates. Theenvironment 100 includes an existing private computing network 106 thatincludes multiple physical computing machines 102 (or “physicalmachines”), each of which may be a server that provides applicationservices to multiple client computers 101, or each of which may beanother type of computing device that provides application services to auser (e.g., a workstation or personal computer). Each physical machinein this example is an existing computing system that does not providevirtualization. A physical machine is capable of running only a singleoperating system 107 at any given time, although it may have “dual-boot”or a similar capability that permits the machine to be booted up fromone of many operating systems at the time of system startup. Eachphysical machine includes one or more applications 103 executing orloaded on the physical machine's operating system 107.

The operating system 107 on the physical machine 102 reads data from andwrites data directly to a physical production data store 109, withoutthe intervention of virtualization software and without using a virtualdisk. The physical production data store 109 may include one or more oflocal disks, a network attached storage array, or any other type ofproduction data storage media. The operating system 107 may be any typeof operating system (e.g., Microsoft Windows, Linux operating systems,Sun Solaris operating systems, UNIX operating systems, or any other typeof operating system). The applications 103 may be any applications(e.g., database applications, file server applications, mail serverapplications, web server applications, transaction processingapplications, or any other type of application) that may run on theoperating system 107. As just one illustrative example, the physicalmachine may be a mail server operated by an organization that is runninga Windows Server operating system and Microsoft Exchange Server.

The existing private computing network 106 also includes a disasterrecovery (DR) test module 111 and a migration module 113 described ingreater detail herein. The various components shown in the existingprivate computing network 106 are connected to each other via a network104A, which may be a local area network (“LAN”), a wide area network(“WAN”), a storage area network (“SAN”), a virtual private network(“VPN”), the public Internet, some other type of network, or somecombination of the above. In some examples, each of the components shownin the existing private computing network 106 is operated by or onbehalf of a single organization, such as a company, corporation,governmental entity, or other type of entity, to support theorganization's operations.

The environment 100 also includes a virtual machine network 108, whichincludes multiple virtual machine hosts 105 operating or executing onphysical computing systems, and a virtual machine manager 150. Thevarious components shown in the virtual machine network 108 areconnected to each other and the existing private computing network 106via a network 104B, which may be a LAN, WAN, SAN, VPN, the publicInternet, some other type of network, or some combination of the above.In some examples, the various constituent components of the virtualmachine network 108 are operated by, or on behalf of, the same singleorganization associated with the existing private computing network. Inother examples, the virtual machine network 108 is operated by anorganization different from the organization that operates the existingprivate computing network 106. In such examples, the existing privatecomputing network 106 and the virtual machine network 108 may beconnected over the Internet or another public network.

A virtual machine host 105 (e.g., a VMware ESX Server, a MicrosoftVirtual Server, a Microsoft Windows Server Hyper-V host, or any serverrunning another type of virtualization software) hosts one or morevirtual machines 110 (e.g., VMware virtual machines, Microsoft virtualmachines, or any other type of virtual machine). Each virtual machine110 has its own operating system 120 and one or more applications 115executing or loaded on the virtual machine's operating system. Theoperating systems 120 may be any type of operating system 120 (e.g.,Microsoft Windows, Linux operating systems, Sun Solaris operatingsystems, UNIX operating systems, or any other type of operating system)that can be hosted by the virtual machine host 105. The applications 115may be any applications that run on the operating systems 120 (e.g.,database applications, file server applications, mail serverapplications, web server applications, transaction processingapplications, or any other type of application).

Each virtual machine host 105 has or is associated with a productiondata store 135 that stores the virtual disks 140 of the virtual machines110 and otherwise stores production data and metadata of the virtualmachines 110. The production data store 135 may span locally attacheddisks, networked storage arrays, and/or other types of production datastorage media. The virtual disks 140 may be managed by a virtual machinefile system or similar system. Virtual disk 140 a is used by virtualmachine 110 a, and virtual disk 140 b is used by virtual machine 110 b.Although each virtual machine 110 is shown with only one virtual disk140, each virtual machine 110 may have more than one virtual disk 140 inthe production data store 135. A virtual disk 140 corresponds to one ormore virtual machine disk files (e.g., one or more *.vmdk, *.vhd files,or any other type of virtual machine disk file) in the production datastore 135.

A virtual machine 110, its applications 115, and its operating system120 may also have the ability, via a raw device mapping (“RDM”), todirectly read and write data and metadata on one or more logical unitnumbers (“LUNs”) or other logical subdivisions of an external datastorage subsystem, such as a network storage array. In computer storage,a logical unit number or LUN is a number used to identify a logicalunit, which is a device addressed by the SCSI protocol or similarprotocols such as Fibre Channel or iSCSI. A LUN may be used with anydevice which supports read/write operations, such as a tape drive, butis most often used to refer to a logical disk as created on a SAN.Though not technically correct, the term “LUN” is often also used torefer to the drive or disk itself. Thus, as used further herein, “LUN”is intended to refer to not only the identifier associated with alogical disk or storage device, but also the associated logical disk orstorage device itself. An RDM may be used to facilitate clusteringbetween virtual machines or between physical and virtual machines. TheRDM between a virtual machine and a LUN may be configured in either avirtual compatibility mode (a “virtual RDM” or “VRDM”) or a physicalcompatibility mode (a “physical RDM” or “PRDM”). A virtual compatibilitymode typically permits features similar to a virtual machine filesystem, such as file locking and snapshotting by the virtual machinehost 105 or virtual machine manager 150. A physical compatibility modetypically permits the virtual machine to access the mapped LUN directly,to use conventional SAN commands, and to invoke most hardware functionsof the external data storage subsystem. A physical RDM may permitapplications on the virtual machine to avoid some overhead that wouldotherwise be imposed by performing input/output operations via a virtualmachine host 105. Therefore an RDM may be used for critical orI/O-intensive applications. However, typically, a virtual machine host105, such as an ESX server, or a virtual machine manager 150 cannot takea snapshot of a LUN that has been mapped to a virtual machine via aphysical RDM, even though the virtual machine host and virtual machinemanager may be aware of the existence of the physical RDM. This can makeit difficult for conventional data backup systems to back up the dataand metadata from a LUN mapped via a physical RDM.

VMware virtualization software supports RDMs. However, VMwarevirtualization software and other commercially available virtualizationsoftware (such as virtualization software from Citrix, RedHat, Oracle,Microsoft and others) may provide other types of mappings that to permita virtual machine to directly read and write data and metadata on one ormore LUNs or other logical subdivisions of an external data storagesubsystem or device. The remainder of this application focuses on themanagement of virtual machines having RDM-mapped LUNs, however, it willbe appreciated that the systems and methods described herein have equalapplicability to a virtual machine that is mapped to or exposed to anexternal data storage subsystem or device via a differentvendor-specific or standardized type of mapping.

The virtual machine manager 150 (e.g., a VMware VCenter server, aMicrosoft System Center Virtual Machine Manager, a Citrix XenServer, anOracle VM Manager, or a RedHat Enterprise Virtualization, or any serverrunning another type of virtual machine manager software) manages orfacilitates management of the virtual machines 110 and/or the virtualmachine hosts 105. The virtual machine manager 150 and the virtualmachine hosts 105 may each include an API component to expose or providevarious types of APIs, such as an API for creating or configuring a newvirtual machine 110; identifying, accessing and manipulating virtualdisks 140; identifying, accessing and manipulating LUNs that are mappedto a virtual machine via an RDM; and performing other functions relatedto management of virtual machines 110.

FIG. 1B is a block diagram illustrating another environment 150 in whicha system for migrating physical computing resources operates. Theenvironment 150 includes an existing private computing network 106, asdescribed previously, that is coupled via a network 154B to a cloudservice network 158. The cloud service network 158 includes one or morecloud services 160, each of which may be operated by a different cloudcomputing service vendor. Each cloud service 160 provides the ability tocreate and manage virtual machines, such as the virtual machines 110described previously, and may also provide additional cloud services.Each cloud service 160 may provide APIs, such as an API for creating orconfiguring a new virtual machine 110; identifying, accessing andmanipulating virtual disks 140; identifying, accessing and manipulatingLUNs that are mapped to a virtual machine via an RDM; and performingother functions related to management of virtual machines hosted by thecloud service. Typically, the cloud computing service vendors thatoperate the various cloud services 160 are different from theorganization that operates the existing private computing network 106.In such examples, the existing private computing network 106 istypically connected to the cloud service network 158 over the Internetor another public network.

The migration module 113, described in greater detail herein, managesthe process of migrating or replicating some or all of the computingfunctionality provided by a physical machine 102 so that a virtualmachine (such as a virtual machine 110 hosted in a virtual machinenetwork 108 or a virtual machine hosted by a cloud service 160) canprovide the same or similar computing functionality, such as providingapplication service to clients 101. For example, the migration module113 can create a virtual machine that provides the same applications toclients 101 as physical machine A 102 a and performs the related storageand manipulation of application-related data. In some examples, anorganization may perform such a migration so that the physical machinemay be decommissioned from service and replaced by the virtual machine.In some examples an organization may perform such a migration so thatthe virtual machine can be used for disaster recovery (DR) testing,i.e., testing to determine whether the organization would be able toquickly recover computing functionality and application-related data ifa disaster, such as a fire, wrecked a physical machine 102. The DR testmodule 111 may perform functions related to using a virtual machine forDR testing.

In FIGS. 1A and 1B, the reference numbers ending with a lower caseletter represent one particular instance of a more general class ofcomponents. For example, reference number 101 a refers to one specificclient. Thus, unless the context requires otherwise, a reference numberin the text that omits any of the lower-case letters shown refers to oneor many particular instances of the associated class of components. Forexample, “client 101” and “clients 101” refers to one and multiple ofclients 101 a, 101 b, 101 c, 101 d, and 101 e, respectively.

Illustrative System

FIG. 2 is a block diagram illustrating in more detail a migration system200 that can perform the migration functionality, DR testingfunctionality, and other functionality described herein. The migrationsystem 200 can be implemented by or in any of the components illustratedin FIGS. 1A and 1B, such as by or in the migration module 113 and/or DRtest module 111.

The migration system 200 includes a memory 214. The memory 214 includessoftware 216 incorporating executable components 218 and data 220typically used by the migration system 200. The data 220 comprisesvirtual machine creation data 221, configuration data 222, datamigration data 224, IP management data 226, and DR test data 227. Thevirtual machine creation data 221 can include policies, rules, orcriteria for creating new virtual machines. The configuration data 222can include data regarding the current or past configuration,performance, and usage of physical machines or virtual machines. Theconfiguration data can also include policies, rules, or criteria fordetermining the desired configuration or performance of a new virtualmachine. The data migration data 224 can include policies, rules, orcriteria for creating, storing, tracking, and using non-productioncopies of data from a physical machine, such as snapshot copies andbackup copies, in order to migrate production data or metadata so thatit is accessible and usable by a new virtual machine. The IP managementdata 226 can include policies, rules, or criteria for routing clientrequests for computing services to physical machines and virtualmachines. The IP management data 226 may include information such asDomain Name System (“DNS”) tables, routing tables, or other datastructures that permit client requests for computing services to beresolved to the IP address, MAC address, or another type of address ofan appropriate physical machine or virtual machine capable of providingthe requested computing service. The DR test data 227 can includepolicies, rules or criteria for performing disaster recovery testing ofa physical machine by using a virtual machine.

The components 218 may include subcomponents, modules, or other logicalentities that assist with or enable the performance of some or all ofthe functionality of the migration system 200, such as a virtual machinecreation component 215, a physical configuration determination component230, a virtual machine configuration component 232, an IP managementcomponent 233, a data migration component 234, a user interfacecomponent 252, a management component 254, an API component 256, and aDR test component 257.

While described in more detail herein, a brief description of eachcomponent will now be provided. The physical configuration determinationcomponent 230 uses the configuration data 222 to determine theconfiguration, performance, and usage of an existing physical machinewhose functionality is being migrated to a virtual machine. The virtualmachine creation component 215 fulfills requests to create new virtualmachines using the virtual machine creation data 221. The virtualmachine creation component 215 may, for example, identify availablevirtual machine hosts 105, virtual machine managers 150, and/or cloudservices 160 capable of hosting and managing virtual machines. Thevirtual machine creation component 215 may also apply informationmanagement policies to select a virtual machine host, virtual machinemanager, and/or cloud service vendor to host and manage a newly createdvirtual machine. In conjunction with the virtual machine creationcomponent 215 and physical configuration determination component 230,the virtual machine configuration component 232 uses the virtual machinecreation data 221 and the configuration data 222 to determine thedesired configuration of a newly created virtual machine.

The data migration component 234 migrates the production data andmetadata used by a physical machine 102 to a new virtual machine byusing the data migration data 224. For example, the data migrationcomponent may perform or request the performance of one or moreinformation management operations that create a new, non-production copy(e.g., a snapshot, backup, auxiliary, or replication copy) of thephysical machine's production data and metadata. Alternatively, the datamigration component may use the data migration data 224 to identify anexisting non-production copy of the physical machine's production dataand metadata. The data migration component may then use a created oridentified non-production copy of the data in order to provide the newvirtual machine with access to the same application data, metadata,and/or other data as the physical machine.

The IP management component 233 redirects or resolves client requestsfor computing services to the address of particular physical machinesand virtual machines. The IP management component may maintain andupdate DNS tables, routing tables, or similar data structures that mapparticular computing services or machine names to particular IPaddresses, MAC addresses, or other types of addresses. As one example,the IP management component may update such data structures after thefunctionality of an existing physical machine has been migrated to a newvirtual machine, so that clients 101 may use the newly created virtualmachine instead of the existing physical machine transparently, withoutany interruption in service.

The DR test component 257 provides DR testing capabilities using createdvirtual machines. The API component 256 provides functions that enableprogrammatic interaction with the virtual machine manager 150, thevirtual machines 110, the virtual machine hosts 105 and cloud services160. For example, the API component may determine suitable API calls tomake to interact with a particular type of virtual machine manager,virtual machine host, and/or cloud service. The user interface component252 provides a user interface for managing the migration of physicalmachines 102 to virtual machines 110 and DR testing. The managementcomponent 254 provides ongoing virtual machine 110 managementfunctionality, such as managing the protection of virtual machineproduction data and metadata via information management operations. Asone example, as described in further detail herein, the managementcomponent may perform processes for creating non-production copies ofthe data and metadata from virtual machines, including virtual machinesthat utilize a physical RDM in order to store data and metadata in a LUNof an external, physical storage array. As another example, as describedin further detail herein, the management component may perform processesfor reverting or restoring virtual machines, including virtual machinesthat utilize a physical RDM in order to store data and metadata in a LUNof an external, physical storage array.

While items 218 and 220 are illustrated as being stored in the memory214, those skilled in the art will appreciate that these items, orportions of them, may be transferred between the memory 214 and apersistent storage device 206 (e.g., a magnetic hard drive, a tape of atape library, etc.) for purposes of memory management, data integrity,and/or other purposes.

The migration system 200 further includes one or more central processingunits (CPU) 202 for executing the software 216, and a computer-readablemedia drive 204 for reading information or installing the software 216from tangible, non-transitory computer-readable storage media, such as afloppy disk, a CD-ROM, a DVD, a USB flash drive, and/or other tangibleand non-transitory computer-readable storage media. The migration system200 also includes one or more of the following: a network connectiondevice 208 for connecting to a network, an information input device 210(e.g., a mouse, a keyboard, etc.), and an information output device 212(e.g., a display).

Some or all of the software 216, components 218, and data 220 of themigration system 200 may be implemented as a plug-in to third-partyvirtualization software, such as the VMware ESX Server or VMware vCentersoftware and/or to information management software, such as Simpanasoftware from CommVault Systems, Inc. The plug-in may be downloaded tothe various physical machines 102, virtual machines 110, and/or virtualmachine hosts 105, for example, from a server running VMware vCentersoftware, a storage manager (described further herein), and/or othersystem components such as the virtual machine manager 150. Thefunctionality of the migration system 200 may be performed by any or allof such components. The components 218 are not limited to beingimplemented by or in a single computing device.

Migration of Physical Machines to Virtual Machines

FIG. 3 is a flow diagram illustrating a process 300 implemented by themigration system 200 or another component in connection with migratingthe functionality of a physical machine to a virtual machine. Theprocess begins at block 305, when the migration system receives arequest to clone some or all of the computing functionality of anexisting physical machine to a new virtual machine, such as a virtualmachine 110 hosted within a virtual machine network 108 or a virtualmachine hosted by a cloud service 160. In one example, the request mayindicate that it is being made so the new virtual machine can be used toreplace the existing physical machine, for example, such as if theexisting physical machine is being decommissioned. In another example,the request may indicate that it is being made so that the new virtualmachine may be used for DR testing purposes. In yet another example, therequest may indicate that only certain computing functionalities (e.g.,only certain applications or production data) are to be migrated to thenew virtual machine.

The migration process 300 may not be triggered by an explicit request,but may be automatically triggered. For example, the migration system oranother system component monitoring the physical machine may determinethat a set of criteria associated with an information management policyhas been met and therefore, the physical machine should be migrated oran administrator should be notified that a migration is recommended. Forexample, a migration system may receive notifications that the physicalmachine has experienced an increased number hard disk errors, hasexperienced reduced performance, is older than a threshold age or time(e.g., over three years old,) has lost some of its data redundancyprotection or a disk drive (e.g., if a RAID volume has failed), has lostnetwork connectivity, has been infected by a virus, or otherwisepresented symptoms indicative of system, application, or datainstability. As another example, a migration system may determine thatit is time to initiate and perform a scheduled (e.g., periodic) DR testof the physical machine.

At block 310, the migration system 200 creates at least onenon-production copy of the production data store 109 from the physicalmachine 102 (or a portion thereof), which is typically a point-in-timecopy of the production data and metadata of the physical machine. Forexample, the migration system may request that another system component(e.g., a snapshot device or utility) create a snapshot copy of the dataand metadata stored in the production data store 109 that is associatedwith the physical machine. Taking such a snapshot copy typically doesnot substantially impact the performance of the physical machine becausemost of the underlying production data is not physically copied. Rather,a set of pointers is created that references the underlying productiondata and metadata as it existed at a particular point in time. Asanother example, the migration system 200 may request that anothersystem component create a backup or auxiliary copy of the data andmetadata in a non-production data storage medium, such as a backupserver, which may be performed in whole or in part using one-touchbackup and recovery techniques such as those described incommonly-assigned U.S. patent application Ser. No. 13/076,792, filedMar. 31, 2011, entitled “RESTORING COMPUTING ENVIRONMENTS, SUCH ASAUTORECOVERY OF FILE SYSTEMS AT CERTAIN POINTS IN TIME” and assignee'sU.S. patent application Ser. No. 10/989,893, filed Nov. 15, 2004,entitled “SYSTEM AND METHOD FOR PERFORMING INTEGRATED STORAGEOPERATIONS,” now U.S. Pat. No. 7,734,578, both of which are herebyincorporated by reference herein in their entirety.

In some examples, the migration system uses an existing backup copy ofthe data and metadata in order to create another “auxiliary” backup copythat will be used by the new virtual machine. For example, the auxiliarycopy may be created in a storage device accessible to the virtualmachine host 105 or cloud service 160 that will be hosting the virtualmachine. The auxiliary copy may be periodically or continuously updatedto reflect ongoing changes to the existing backup copy. To illustrate,an auxiliary copy may be periodically or continuously updated tofacilitate periodic DR testing of the same physical machine, e.g., withthe same auxiliary copy updated every time a new DR test is initiated.The migration system may create a backup or auxiliary copy usingsource-side deduplication techniques that only send a copy of the blocksthat have changed since the last point-in-time copy was made (e.g., thelast time the physical machine was DR tested), e.g., as described incommonly-assigned U.S. patent application Ser. No. 12/982,087, filedDec. 30, 2010, entitled Systems and Methods for Retaining and Using DataBlock Signatures in Data Protection Operations, which is herebyincorporated by reference herein in is entirety. As yet another example,the migration system may use a hardware-based replication device orutility to continuously or intermittently replicate a copy of thephysical machine's production data and metadata to another destinationstorage device accessible to the virtual machine host 105 or cloudservice 160 that will be hosting the virtual machine.

Alternatively or additionally, the migration system 200 may identify oneor more previously created non-production copies of the data andmetadata from the physical machine. For example the migration system mayidentify an existing snapshot, backup, auxiliary, replica, archive, orother type of non-production copy of the data from the physical machinethat was previously created at a particular point in time, e.g., by aninformation management system, as described in greater detail herein. Insome examples, at block 310, the migration system 200 may create oridentify a non-production copy that is also used by an informationmanagement system for a different purpose other than just migrationand/or DR testing. For example, the migration system 200 may identify anexisting backup copy of the physical machine's data and metadata that isstored by a cloud service for backup and recovery purposes, and use thatnon-production copy, as described further herein, for DR testingpurposes.

The non-production copy at block 310 may be created in accordance withan applicable information management policy. For example, a policy mayspecify that only data and metadata that is classified asnon-confidential or high-priority may be copied in order to be moved toa new virtual machine. As such, the non-production copy may be limitedto a subset of the data and metadata of the physical machine, e.g., forimproved security or reduced costs.

In some examples, at block 310, more than one type of non-productioncopy may be created. For example, a backup or auxiliary copy may becreated of the physical machine's local file system and a snapshot maybe taken of a volume that contains an application-specific data source(e.g., a snapshot may be taken of an Oracle or Exchange database), orvice versa. Also, at block 310, more than one information managementagent 980 may be used to create the non-production copy or copies (e.g.,one may be used to create copies of a files system and another may beused to create copies of application-specific data source (e.g., anOracle or Exchange database).

After a non-production copy is created or identified, the process 300proceeds at block 315, where the migration system automatically detectsthe configuration of the physical machine, which may be performed inwhole or in part using one-touch backup techniques and kernel-basedtechniques such as those described in commonly-assigned U.S. patentapplication Ser. Nos. 13/076,792, 10/989,893, both of which areincorporated by reference above, and in commonly-assigned U.S. patentapplication Ser. No. 12/895,377, filed Sep. 30, 2010, entitled “KernelSwapping Systems and Methods for Recovering a Network Device, now U.S.Patent Application Publication No. 2012/0017111, which is also herebyincorporated by reference herein in its entirety. The configuration maybe determined in conjunction with the creation of a non-production copy,e.g., during a backup operation.

For example, the migration system may determine the type and version ofthe operating system and the type and version of the applicationsinstalled on the physical machine. The migration system may alsodetermine the operating system-specific and application-specificsettings and configurations, such as the host name of the file system,network configurations, drivers used, peripheral configurations, how andwhere drives are mounted (i.e., mount points), disk layout information,disk partitions, volume manager configurations, volume groups, volumenames, the IP or network address of the file system, file system types(e.g., .NTFS, FAT32, ext), port assignments, where applications areinstalled, and registry values. The migration system may determine theconfiguration of the physical machine as it existed at the time thenon-production copy of the physical machine data was made. To do so, themigration system may mine the operating system registry, boot sectors,partition layouts, boot.ini file, kernel, and/or other files used by theoperating system and/or applications on the physical machine

In some examples, the data storage server 110 may capture some or allconfiguration parameters from a system configuration xml file, such as:

<system_configuration> <site name=“client1” > <hosts> <host_refname=“host1”/> </hosts> </site> <group name=“mysql” gid=“500”/> <username=“mysql” uid=“500”> <groups> <group_ref name=“mysql”/> </groups></user> <host name=“host1” > <users> <user_ref name=“mysql”> </users><profiles> <profile_ref name=“workstation”/> </profiles> </host><profile name=“workstation” > <components> <component_refname=“user-setup” > <component_ref name=“mysql-db” > </components></profile> <component name=“user-setup”> </component> <componentname=“mysql-db”> </component> </system_configuration>

As another example, at block 315, the migration system 200 may determinethe physical hardware resources available to the physical machine, suchas the specifications of the machine's processors (e.g., number ofprocessors, clock rate, manufacturer, model), memory (e.g., type, speed,and capacity), hard disks or other production data stores such asnetworked storage arrays (e.g., type, speed, capacity, and faulttolerance), communication configurations (wired and/or wireless),network adapters (e.g., number and type of network cards), and otherhardware. The migration system may also determine how the physicalmachine presently uses or previously used the physical resourcesavailable to it. To illustrate, the migration system may determinehistorical trends in the quantity or quality of data processing, memory,stored production data, data throughput, and/or networking bandwidthused by the physical machine.

The operating system, application, physical resource, and otherconfiguration information may be obtained from the point-in-timenon-production copy obtained at block 310, for example, in a snapshot,backup, auxiliary, replication, or other non-production copy of theregistry, boot sectors, partition layouts, etc. The migration system mayalso mine sysfs and procfs file systems. Alternatively or additionally,the migration system may determine such information directly from thephysical machine itself. Alternatively or additionally, the migrationsystem may also obtain configuration information that has been storedelsewhere, for example, in management data maintained by an informationmanagement system, described below. The migration system may also obtainand utilize configuration information using kernel-based techniques thatcapture and utilize a kernel image for recovery purposes, as describedin commonly-assigned U.S. patent application Ser. No. 12/895,377,introduced and incorporated by reference above, e.g., for Linux-basedsystems.

At block 320, the migration system 200 determines the desiredconfiguration and location of the new virtual machine that should beused to provide the requested functionality. The desired configurationmay describe, inter alia, the type of operating system, the operatingsystem-specific settings (e.g., disk partitions, network configuration(e.g., IP address), peripheral configuration, registry values), the typeof applications, the application-specific settings/configurations, andthe quality and quantity of virtual resources (e.g., virtual disks,virtual memory, virtual processing, virtual networking) to deploy at thevirtual machine. To make the determination, the migration system mayanalyze the detected configuration and/or usage of the physical machinedescribed at block 315. By default, the migration system may determinethat the new virtual machine should have the same configuration as thephysical machine, including the same operating system, applications,data processing capability, memory, disk or other production datastorage capacity, data input-output throughput, and/or networkinghardware capabilities.

However, as part of the analysis, the migration system 200 may makealterations to the default configuration. As a first example, themigration system 200 may determine that the IP address or hostname ofthe new virtual machine should be different from that of the physicalmachine, so that the two machines may be run simultaneously withoutconflict. As another example, as part of the analysis, the migrationsystem may determine whether there are trends in the usage of thephysical machine that suggest that the new virtual machine should have aconfiguration different than the existing physical machine. Toillustrate, the migration system may identify that the physical machinehas experienced a trend of increasing use of its hard disks or otherproduction data stores, and extrapolate that trend in order to determinethat the virtual machine should be created with a higher data storagecapacity than the physical machine in order to accommodate a predictedhigher future use. To illustrate further, the migration system mayidentify that the physical machine has experienced a trend of decreasinguse of its hard disks or other production data stores, and extrapolatethat trend in order to determine that the virtual machine should becreated with a lower data storage capacity than the physical machine inorder to accommodate a predicted lower future use. Similarly, themigration system may identify and use trends in the physical machine'susage in order to adjust the desired processing, memory, networking, orother characteristics of the new virtual machine away from the defaultconfiguration.

As a second example, the migration system 200 may use information in theinitial request received at block 305 to determine whether to adjust thedesired characteristics of the new virtual machine away from the defaultconfiguration. To illustrate, the migration system may determine thatthe new virtual machine is being temporarily deployed only for DRtesting and that the virtual machine will not replace the existingphysical machine. In such an example, the migration system may determinethat the production data storage capacity of the virtual machine shouldbe set at approximately the current storage capacity usage of theexisting physical machine because the new virtual machine will notgenerate a substantial quantity of new production data during the DRtesting. As another example, the migration system may determine thatonly a subset of the applications installed on the physical machine areto be migrated, and therefore determine that only a subset of thephysical machine's production data and metadata will be migrated, againreducing the capacity of production data storage needed by the virtualmachine.

As a third example, the migration system may determine whether thedrivers that were used on the existing physical machine will becompatible with the virtual machine or whether different drivers shouldbe used. If the migration system determines that a particular driver isnot compatible, the migration system may change the driver used at thevirtual machine. For example, if a physical machine accessed aparticular device via an SCSI connection using a SCSI-compatible driver,but the virtual machine will access a comparable device via an iSCSIconnection, the migration system may determine that it should select adifferent iSCSI-compatible driver for the virtual machine to manage thecomparable device.

In order to determine the desired configuration and location of the newvirtual machine, the migration system 200 may access and implementpolicies, such as information management policies described furtherherein. For example, the migration system may access a policy thatdictates preferred virtual machine hosts 105, virtual machine managers150, and/or cloud services 160 to use when migrating particular physicalmachines. Alternatively, in order to determine the desired configurationand location of the new virtual machine, the migration system may usepolicies or preferences received from a user as part of the requestreceived at block 305.

At block 325, the migration system 200 connects to a cloud serviceprovider, virtual machine host, or a virtual machine manager andrequests that they provision a new virtual machine with the desiredconfiguration. To do so, the migration system may invoke commandsspecified by an API that are specific to the particular cloud serviceprovider, virtual machine host, or virtual machine manager. In response,the cloud service provider, a virtual machine host, and/or virtualmachine manager should provision a new virtual machine having thedesired virtual resources and operating system, and that may also havesome or all of the desired operating system configurations (e.g., diskpartitions) and/or desired applications installed. For example, if thephysical machine had the operating system installed on a D:/ drive andExchange installed on an E:/ drive, the new virtual machine may besimilarly configured. If the physical machine had access to an externalstorage array, a cloud service provider may also provision a similarexternal storage array and make this array available to the new virtualmachine for storage (e.g., via a virtual or physical RDM). The requestmade at block 325 may comprise using one or more virtual machinetemplates.

At block 330, the migration system 200 may install an informationmanagement agent, described further herein, onto the provisioned virtualmachine. The information management agent may be configured to, interalia, perform information management operations on the production dataof the provisioned virtual machine, and restore or otherwise provideproduction data to the virtual machine from a non-production copy of thedata. In some examples, to simplify the process 300, the informationmanagement agent may not be installed, for example if a data restorationoperation is not performed at the virtual machine.

At block 335, the migration system 200 adjusts the configuration of thevirtual machine to match the desired configuration that was determinedat block 320, which may be performed in whole or in part using one-touchrecovery techniques such as those described in commonly-assigned U.S.patent application Ser. Nos. 13/076,792 and 10/989,893, both of whichare incorporated by reference above. For example, using the desiredconfiguration determined at block 320, the migration system mayreplicate operating system-specific or application-specificconfigurations or settings. To illustrate, the migration system mayadjust registry values, disk partition information, networkingconfigurations, and/or other settings or configurations of the newvirtual machine to bring them in line with the desired configuration.

At block 340, the migration system 200 may install application binarieson the virtual machine and as necessary, reconfigure the applications.The application binaries installed on the virtual machine may beentirely new application binaries or the binaries installed may bederived from a non-production copy of the physical machine's productiondata that was created or identified at block 310 using restorationmethods similar to those described at block 345 below. If theapplication binaries are derived from a backup or other non-productioncopy, an information management agent may be used to derive the binariesfrom the non-production copy. The system may send a message to aninformation management system to indicate a copy of an application wasmade so that the information management system can track compliance withsoftware licenses.

At block 345, the migration system 200 makes application data, metadata,and/or other production data copied from the production data store 109of the physical machine 102 available to the virtual machine. The dataand metadata that is made available may be limited in accordance withapplicable information management policies. For example, data that hasbeen classified as “confidential” under an information management policymay not be made available to the virtual machine.

In some examples where a snapshot was created or identified at block310, in order to make the snapshot, data, and metadata available to thevirtual machine, the migration system may expose or otherwise providethe virtual machine with access (e.g., network access) to the physicalproduction data store 109 associated with the physical machine, or areplica of the physical production data store. The replica may be acontinuously-updated replica of the production data store 109 createdusing a hardware-based replication technology. The production data store109 or replica thereof will typically contain both the set of snapshotpointers or references as well as the underlying physical data blocks.Using API calls, the migration system may instruct the operating system120 on the virtual machine, the virtual machine host 105, or the virtualmachine manager 150 to mount the snapshot stored therein as a disk onthe virtual machine. In such examples, the time, bandwidth, andadditional storage capacity needed to bring up the virtual machine maybe greatly reduced, because there is no need to physically copy datablocks over from the source physical machine and store those blocks atthe destination virtual machine.

Where a backup, auxiliary, or other type of non-production copy wascreated or identified at block 310, in order to make the data andmetadata available to the virtual machine, the migration system mayinstruct an information management agent to restore the data andmetadata from the backup, auxiliary, or other non-production copy to avirtual disk 140 or other production data store 135 of the virtualmachine. This may require the agent to “unpack” the data from aproprietary format (such as a proprietary backup format) into a nativeapplication format that is readable using conventional file systemcalls. Alternatively, if the non-production copy has retained usablefile system information (but other data is in a non-native format), themigration system may simply use API calls to instruct the operatingsystem 120 on the virtual machine, the virtual machine host 105, or thevirtual machine manager 150 to mount such a copy as a disk on thevirtual machine (e.g., by mounting a replication or auxiliary copy froma storage area network or a local disk), possibly via an RDM.

In some examples, at block 345, two different information managementagents may restore the data and metadata from backup, auxiliary, orother non-production copy to a virtual disk 140 or other production datastore 135 of the virtual machine. For example, a first informationmanagement agent may be responsible for restoring application binariesand file system files to a virtual disk 140 or other production datastore 135 of the virtual machine. A second, application-specificinformation management agent (e.g., specific to Exchange or Oracle data)may restore application-specific data (e.g., an Exchange or Oracledatabase) to a virtual disk 140 or other production data store 135 ofthe virtual machine and take other steps, e.g., to bring a database intoa consistent state.

If, at block 310, more than one type of non-production copies werecreated or identified (e.g., a backup copy and a snapshot copy), thenthe copied data and metadata may be made available to the virtualmachine through more than one of the mechanisms described above. Forexample, a restoration may be performed from a backup or auxiliary copyto make the files on the physical machine's local file system availableto the virtual machine and a snapshot of a volume that containsapplication-specific data source (e.g., a snapshot may be taken of anOracle or Exchange database) may be mounted to the virtual machine.

At block 345, the migration system 200 may also play back or analyzeoperating system-specific or application-specific logs or journals, e.g.logs obtained from the existing physical machine 102, or invokeapplication-specific update mechanisms in order to bring the operatingsystem, applications, data and metadata on the virtual machine into astate that is consistent with the existing physical machine. Forexample, the migration system may play back or analyze file systemchange journals, database logs or e-mail server logs or invokeapplication-specific update mechanisms by binding an application to theexisting physical machine. As another example, if at block 310 anon-production copy of data and metadata from a physical machine wascreated at a first time, T1 and at block 345, the data and metadata wasmade available to the destination machine at a later time T2, themigration system may capture the logs from the physical machine for thewindow between times T1 and T2 and play back those captured logs. Theselogs may be provided by applications such as Oracle or Exchange. Forexample, with a snapshot, the system may need to access a log of changesmade from when the snapshot was taken to another point in time reflectedin the log, e.g., as described in assignee's U.S. patent applicationSer. No. 12/558,947, filed Sep. 14, 2009, entitled “USING A SNAPSHOT ASA DATA SOURCE,” now U.S. Patent Publication No. 2010/0070726; assignee'sU.S. patent application Ser. No. 12/978,984, filed Dec. 27, 2010,entitled “SYSTEMS AND METHODS FOR ANALYZING SNAPSHOTS,” now U.S. PatentPublication No. 2011/0161295; and assignee's U.S. patent applicationSer. No. 12/979,101, filed Dec. 27, 2010, entitled “SYSTEMS AND METHODSFOR PERFORMING DATA MANAGEMENT OPERATIONS USING SNAPSHOTS,” now U.S.Patent Publication No. 2011/0161299. All of these applications arehereby incorporated by reference herein in their entirety. At block 345,the migration system may also query the file system of the existingphysical machine for any changes made to files or metadata on thephysical machine that occurred between the time that the non-productioncopy was created at block 310 and the time of the migration (e.g., usinglast modification times). The migration system may then adjust thevirtual machine's data or metadata to reflect these changes.

At block 350, the migration system 200 may update a mapping of the IPaddress of the physical machine and/or virtual machine, so that clients101 will be directed or routed to the virtual machine instead of thephysical machine. For example, if live DR testing is being performedwith the virtual machine, or the existing physical machine is beingdecommissioned entirely, a DNS table, routing table or similar datastructures may be updated so that the table points to the IP address (oranother type of address, such as a MAC address) of the virtual machineinstead of pointing to the address of the existing physical machine.

At block 355, the migration system tracks, protects, and/or appliesexisting information management policies to the production data andmetadata of the virtual machine on an ongoing basis. Informationmanagement policies are described in greater detail herein. For example,the migration system may apply the same or similar informationmanagement policies to the virtual machine that were applied to thephysical machine. To illustrate, the migration system may regularly backup or otherwise create non-production copies of the production datastore 135 of the virtual machine on a prescribed schedule, e.g., asdescribed in commonly-assigned U.S. patent application Ser. No.12/553,294, filed Sep. 3, 2009, entitled “SYSTEMS AND METHODS FORMANAGEMENT OF VIRTUALIZATION DATA,” now U.S. Patent Publication No.2010/0070725, is hereby incorporated by reference herein in itsentirety. As another example, the migration system may take steps toshut down and/or archive the virtual machine if it becomes inactive, asdescribed in commonly-assigned co-pending U.S. patent application Ser.No. 13/250,962, filed Sep. 30, 2011, entitled “EFFICIENT DATA MANAGEMENTIMPROVEMENTS, SUCH AS DOCKING LIMITED-FEATURE DATA MANAGEMENT MODULES TOA FULL-FEATURED DATA MANAGEMENT SYSTEM”, is hereby incorporated byreference herein in its entirety.

Next, at block 360, the migration system 200 may use the virtual machinefor DR testing. For example, the migration system may determine whetherthe virtual machine is actually able to bring up an application (e.g., amail server or database application) and retrieve certain emails orrecords, so that the application provides the same or comparable levelof service as it did at the source physical machine. As another example,the migration system may determine whether the virtual machine is ableto access all of the same application data, metadata, and/or otherproduction data that was available to the source physical machine, andwhether any data or metadata was lost in the migration process. Theprocess 300 then ends. During the process 300 and in other processes andmethods described herein, the migration system may employ backupmethods, restoration methods, recovery methods and other systems andmethods described in commonly-assigned U.S. Provisional PatentApplication 61/618,579, entitled DATA STORAGE RECOVERY AUTOMATION, filedMar. 30, 2012, which is hereby incorporated by reference herein in itsentirety.

In some examples, the process 300 permits periodic or scheduled DRtesting. For example, a request may be received for DR testing to beperformed on a requested periodic basis or other schedule. In accordancewith the schedule, the process 300 may be performed repeatedly. Duringeach iteration of process 300 a virtual machine may be created that hasthe appropriate configuration and data access to permit the scheduled DRtest. During the process 300, a prescribed DR test may be performed(e.g., using scripts) and the results reported, e.g., to the user whorequested the DR testing.

As described in greater detail above, the process 300 permits severaldifferent approaches to DR testing. As a first example, the process 300may permit an organization to perform a DR test of a physical server ata particular point in time, including historical time points, bymounting a snapshot stored on a production data store 109 on a newvirtual machine. By exposing the production data store 109 to thevirtual machine for this purpose, the process may avoid the time andbandwidth needed to transmit all or most of the contents of theproduction data store 109 over a network to the virtual machine beingused for DR testing purposes. Instead, the virtual machine can use thesnapshot to retrieve only the subset of data and metadata from theproduction data store 109 that is needed to perform the DR test.

As a second example, the process 300 may permit an organization toperform a DR test of a physical server at a particular point in time,including historical time points, by mounting a snapshot stored on acontinuously updated replica of a production data store 109 on a newvirtual machine. By maintaining a continuously updated replica of theproduction data store 109 for this purpose and using snapshots, theprocess may be able to initiate a DR test almost instantly, withoutneeding to first transmit all or most of the contents of the productiondata store 109 over a network to the virtual machine being used for DRtesting purposes. In both of these two examples, the process can avoidhaving to create a virtual disk file (such as a .vmdk file) containingthe data and metadata from the production data store 109 by using asnapshot instead.

As a third example, the process 300 may permit an organization toperform a DR test of a physical server at a particular point in time bymounting or restoring from a backup or auxiliary copy. The backup orauxiliary copy may be updated periodically or continuously for thepurpose of periodic DR testing. In order to reduce the network bandwidthand data storage requirements of the DR testing, the backup or auxiliarycopy may be created by using client-side or other deduplicationtechniques that don't require a block-by-block copy of all of the dataand metadata from the physical machine.

Other Types of Migration

Although FIG. 3 describes a process 300 for migrating the functionalityof a physical machine to a virtual machine, adaptations may be made tothe process to instead migrate a source physical machine to anotherdestination physical machine, migrate a source virtual machine toanother destination virtual machine, or migrate a virtual machine to aphysical machine.

As a first example, to migrate the functionality of a source physicalmachine to another destination physical machine, the migration systemmay perform a process very similar to FIG. 3 in response to receiving arequest to clone a source physical machine's functionality to adestination physical machine. Alternatively, the migration system may doso automatically, e.g., upon detecting increased errors or a drivefailure in the source physical system. However, in lieu of performingblocks 325-340 as shown in FIG. 3, the migration system may additionallyor alternatively perform a one-touch backup and recovery operation toensure that the destination physical machine has an operating system andapplications installed and configured in accordance with a desiredconfiguration by directly copying or porting the operating system andsome or all application binaries, or application-specific data andconfiguration information from the source physical machine directly tothe destination physical machine. Such one-step migration is describedfurther in assignee's U.S. patent application Ser. Nos. 13/076,792 and10/989,893, both of which are incorporated by reference above. Asnecessary, the migration system may adjust the configuration of the newphysical machine and install some application binaries (either new orfrom a non-production copy) to ensure all of the desired applicationsare installed on the destination machine, e.g., as described previouslywith respect to blocks 335-340. Then, as discussed previously at block345, the application data, metadata, and other files in the file systemmay be recovered from a backup or other non-production, point-in-timecopy of the source physical machine's data and metadata.

Also, the migration system 200 may play back or analyze operatingsystem-specific or application-specific logs or journals from the sourcephysical machine, or invoke application-specific update mechanisms,e.g., by binding an application to the source physical machine. Forexample, if a non-production copy of data and metadata from a sourcephysical machine was created at a first time, T1 and the data andmetadata was made available to the destination machine at a later timeT2, the migration system may capture the logs from the source machinefor the window between times T1 and T2 that and play back those capturedlogs. These logs may be provided by applications such as Oracle orExchange. The migration system may also query the file system of thesource physical machine for any changes made to files or metadata on thesource physical machine that occurred between the time that thenon-production copy was created and the time of the migration and adjustthe destination machine's data or metadata to reflect these changes.Therefore, the operating system and applications on the destinationphysical machine may be migrated from a first location (i.e., the sourcephysical machine) while most or all of the application data, metadata,and other files are migrated from a second, different location (i.e., abackup server that has a backup copy of the source machine's data andmetadata).

As a second example, to migrate the functionality of a source virtualmachine to another destination virtual machine, the migration system mayperform a process very similar to FIG. 3 automatically or in response toreceiving a request to clone a source virtual machine's functionality toa destination virtual machine. At block 310, a non-production copy of asource virtual machine, such as a snapshot copy, may be taken, e.g. viaAPI calls to the source machine's host 105, a virtual machine manager150, or by processes such as those described herein with respect toFIGS. 4 and 5 or in assignee's U.S. patent application Ser. No.12/553,294, filed Sep. 3, 2009, entitled “SYSTEMS AND METHODS FORMANAGEMENT OF VIRTUALIZATION DATA,” now U.S. Patent Publication No.2010/0070725, which is incorporated by reference above. Alternatively oradditionally, at block 315, the migration system may automaticallydetect the configuration of the source virtual machine via API calls tothe source machine's host 105 or the virtual machine manager 150.

As a third example, to migrate the functionality of a source virtualmachine to a destination physical machine, the migration system mayperform a process very similar to FIG. 3 automatically or in response toreceiving a request to clone a source virtual machine's functionality toa destination physical machine. For example, a user may identify, via aGUI of the migration system, the source virtual machine he intends toclone to a physical machine, and a new client name and hostname. Aftermigration, the new physical machine may be updated to the provided newclient name and may be registered as a client of an informationmanagement system. Then, the migrated virtual machine's hostname and IPconfiguration may be updated.

The migration methods described herein may be used for many purposesother than decommissioning an existing machine or disaster recovery. Forexample, the processes may be employed to create a clone machine for thepurposes of complying with a legal hold or e-discovery request thatrequires that data or metadata be preserved as it existed at aparticular point in time. As another example, a virtual machine may bemigrated from one cloud service 160 to another cloud service 160, avirtual machine 110, or a physical machine 102 to reduce costs orimprove performance.

At the conclusion of process 300 or a variant thereof, other steps maybe performed. For example, if a source physical machine isdecommissioned after its functionality has been migrated, the migrationsystem may take other steps to dispose of the source physical machine.For example, the migration system may implement a routine to permanentlywipe the data and metadata from the source physical machine and notify aserver (such as an intranet site or auction site) that the sourcephysical machine is available, e.g., for use by other users in theorganization or for sale to external parties, along with a descriptionof the physical machine's specifications, as determined at block 315.Thus, the migration system may automatically post an accuratedescription of the machine's specification, which was already identifiedabove, to an auction site in order to sell the physical machine.

Information Management Operations on Virtual Machines with a PhysicalRDM

As described further herein, an information management system may createand use non-production copies of a virtual machine's data and metadata,such as snapshot, backup, or archive copies of the virtual machine'sdata and metadata. A virtual machine host 105 on which a virtual machineresides is typically unable to create or cause the creation of asnapshot of a LUN that is mapped to the resident virtual machine via aphysical RDM (a “PRDM-mapped LUN”). Thus, as described below, themanagement component 254 may perform processes to create and usenon-production copies of the data and metadata stored on PRDM-mappedLUNs.

FIG. 4 illustrates a process 400 for creating and using a non-productioncopy of the data and metadata of a virtual machine that has a mapped LUN(e.g., a PRDM-mapped LUN). Although FIGS. 4, 5, 6A, 6B, and 7 aredescribed herein for the specific example case of virtual machineshaving PRDM-mapped LUNs, it will be appreciated that the processesdescribed in these figures have broader applicability to virtualmachines that have other mapped LUNs that are mapped using other typesof mappings, as introduced above. The process begins at block 405, wherethe management component 254 discovers a virtual machine having aPRDM-mapped LUN. Methods for the discovery, detection, and/oridentification of virtual machines 110 are described incommonly-assigned co-pending U.S. patent application Ser. No.13/250,962, filed Sep. 30, 2011, entitled “EFFICIENT DATA MANAGEMENTIMPROVEMENTS, SUCH AS DOCKING LIMITED-FEATURE DATA MANAGEMENT MODULES TOA FULL-FEATURED DATA MANAGEMENT SYSTEM” and commonly-assigned U.S.patent application Ser. No. 12/553,294, filed Sep. 3, 2009, entitled“SYSTEMS AND METHODS FOR MANAGEMENT OF VIRTUALIZATION DATA,” now U.S.Patent Publication No. 2010/0070725, both of which are incorporated byreference herein in their entirety. These methods include querying avirtual machine host 105 or a virtual machine manager 150 via an API,crawling or spidering a network, and accessing a data structure thattracks the existence and network location of virtual machines. At block410, the management component 254 discovers and identifies the virtualdisks and the PRDM-mapped LUNs associated with the virtual machine, forexample by using APIs to query the virtual machine host 105 on which thevirtual machine resides or a virtual machine manager 150.

At block 412, the management component 254 tracks the relationshipbetween the virtual machine and its virtual disks and PRDM-mapped LUNs.For example, the management component may maintain, e.g., in data 220, avirtual machine tracking data structure, such as that shown in FIG. 7.As shown in FIG. 7, the virtual machine tracking data structure 700 mayhave a virtual machine ID column 708 that contains an identifier orreference for each discovered virtual machine, a virtual disk ID column712 that contains an identifier or reference for each discovered virtualdisk associated with a virtual machine, and a mapped (e.g., PRDM-mapped)LUN ID column 714 that contains an identifier or reference for eachdiscovered PRDM-mapped LUN associated with a virtual machine. Thevirtual machine tracking data structure may also include a mount pointcolumn 710 that indicates the drive location or drive identifier (e.g.C:/) where each virtual disk or PRDM-mapped LUN is mounted within thefile system of the virtual machine, a Snap Copy Ref column 716 thatcontains a reference or pointer to snapshot copies of each virtual diskor PRDM-mapped LUN (and may contain additional information such as thetime a snapshot copy was taken or the type of snapshot copy taken), andan Other Copy Ref column 718 that contains a reference or pointer toother types of copies of each virtual disk or PRDM-mapped LUN such asbackup or auxiliary copies (and may contain additional information suchas the type of copy or the time a copy was created or updated). Forexample, rows 702 and 704 indicate that the management component 254 hasdiscovered a virtual machine identified as “VM_1” that has a virtualdisk identified as “VD_1” that is mounted at drive location “C:/” and aPRDM-mapped LUN identified as “PL_1” that is mounted at drive location“D:/.”

At block 415, the management component 254 takes snapshots of thevirtual disks of the virtual machine. For example, the managementcomponent 254 may instruct the virtual machine's host 105 or the virtualmachine manager 150 to take a snapshot of each of the virtual disks ofthe virtual machine via an API. At block 420, the management component254 takes a snapshot of each PRDM-mapped LUN. For example, themanagement component 254 may instruct a hardware or software componentof an external storage array to take a snapshot of the PRDM-mapped LUN.As another example, the management component 254 may instruct thevirtual machine via an API to initiate a snapshot of the PRDM-mappedLUN. After snapshots are taken of the virtual disks and PRDM-mappedLUNs, the management component 254 may update a virtual machine trackingdata structure 700, so that the data structure associates the virtualmachine with an identifier, location, reference or pointer to eachsnapshot taken. For example, as shown in rows 702 and 704 of FIG. 7, themanagement component may indicate that a snapshot of the virtual diskidentified as “VD_1” can be located using the reference or pointer“VD_1_snap*,” and a snapshot of the PRDM-mapped LUN identified as “PL_1”can be can be located using the reference or pointer “PL_1_snap*.”

After block 420, the process 400 may take one or both of two differentbranches. The branch or branches that are taken may be determined bywhether an administrator wants to effectuate an in-place reversion or arestoration to a new machine. In one branch, represented by block 425,the management component 254 preserves the snapshots taken at blocks 415and 420 to permit the virtual machine to be reverted in place, i.e. onthe same virtual machine host 105. In the other branch, represented byblock 430, the management component 254 uses the snapshots to create orupdate one or more additional non-production copies of the virtualmachine and its associated data and metadata, which may be performedusing a process such as the process 500 described herein with respect toFIG. 5. After additional copies are created or updated, the managementcomponent 254 may update a virtual machine tracking data structure 700,so that the data structure associates the virtual machine with anidentifier, location, reference or pointer to each additional copycreated or updated. For example, as shown in rows 702 and 704 of FIG. 7,the management component may indicate that a backup copy of the virtualdisk identified as “VD_1” can be located using the reference or pointer“VD_1_bu*,” and a backup of the PRDM-mapped LUN identified as “PL_1” canbe can be located using the reference or pointer “PL_1_bu*.” The process400 concludes at block 435, where the management component 254 uses thesnapshots and/or additional non-production copies to revert or restorethe virtual machine, which may be performed using the processesdescribed herein with respect to FIGS. 6A and 6B. The process 400 thenconcludes.

FIG. 5 shows a process 500 for creating one or more additionalnon-production copies of a virtual machine's data and metadata fromsnapshots. The process 500 may be performed by the management component254 or another component. The process 500 begins at block 505, where themanagement component 254 mounts snapshots taken of a virtual machine'svirtual disks onto a proxy virtual machine host 105. The proxy virtualmachine host is typically a virtual machine host 105 different than thevirtual machine host that originally hosted the virtual machine. Atblock 510, the management component 254 brings up an instance of thevirtual machine (a “proxy virtual machine”) from the mounted virtualdisk snapshot images, e.g., via API calls to the proxy virtual machinehost.

At block 515, the management component 254 mounts the snapshot of eachPRDM-mapped LUN on the proxy virtual host. Using API calls to the proxyvirtual host 105, a virtual machine manager 150, and/or the proxyvirtual machine, the management component maps each mounted snapshot ofa PRDM-mapped LUN to the proxy virtual machine, but via a virtual RDMinstead of a physical RDM. Each snapshot may be mounted at the samemount point where the corresponding virtual disk or PRDM-mapped LUN waspreviously mounted. The mount points may be determined using virtualmachine tracking data structure 700. For example, if a PRDM-mapped LUNwas previously mapped to the D:/ drive of the virtual machine VM_1 asshown in row 704, a new VRDM-mapped LUN will be mapped to the D:/ driveof the created proxy virtual machine. Thus, effectively, what was aPRDM-mapped LUN on the original virtual machine is instead convertedinto a VRDM-mapped LUN on the proxy virtual machine at the same drivelocation or mount point. Doing so permits the proxy virtual machine andproxy virtual machine host to perform actions such as taking snapshotsof the VRDM-mapped LUN.

At block 520, using virtual machine host APIs or an installedinformation management agent, the management component 254 reads dataand metadata out of the proxy virtual machine's virtual disks andVRDM-mapped LUNs that were mounted at blocks 505-520. The informationmanagement agent uses the read data and metadata to perform informationmanagement operations (e.g., backup operations or archive operations)that create additional non-production copies of the data and metadata,e.g., as described in commonly-assigned U.S. patent application Ser. No.12/553,294, filed Sep. 3, 2009, entitled “SYSTEMS AND METHODS FORMANAGEMENT OF VIRTUALIZATION DATA,” now U.S. Patent Publication No.2010/0070725, which is incorporated by reference above. For example, themanagement component 254 may create a backup copy or archive copy of thedata and metadata on a non-production storage medium such as tape. Theprocess 500 then ends. By using VRDM mappings and API calls to a proxyhost, the process 500 can avoid installing information management agentsdirectly onto virtual machines when creating backup or othernon-production copies of PRDM-mapped LUNs.

FIG. 6A shows a process 600 for using snapshots to revert a virtualmachine having a PRDM-mapped LUN to an earlier point in time. Theprocess 600 may be performed by the management component 254 or anothercomponent. The process begins at block 605, where the managementcomponent 254 reverts the virtual machine's virtual disks to an earlierstate using a previously-acquired snapshot of the virtual disks, e.g.via API calls to the virtual machine host 105. At block 610, themanagement component 254 reverts the PRDM-mapped LUN in its originallocation using a previously acquired snapshot of the PRDM-mapped LUN.For example the management component 254 may instruct a hardware orsoftware component of an external storage array to use a previoussnapshot of the PRDM-mapped LUN in order to revert the PRDM-mapped LUNto an earlier state. Generally, no further reconfiguration of thereverted virtual machine is needed. The process 600 then ends.

FIG. 6B shows a process 650 for using non-production copies other thansnapshots to restore a virtual machine that has one or more PRDM-mappedLUNs. The process 650 may be performed by the management component 254or another component and may be used in conjunction with the DRtesting-related processes described herein, such as the process 300 ofFIG. 3 and its variants, in order to perform DR testing of virtualmachines. The process 650 begins at block 655, where the managementcomponent 254 brings up a new instance of the virtual machine usingnon-production copies of the machine's virtual disks. For example, themanagement component 254 may use a virtual machine tracking datastructure 700 to identify the location or identifiers of non-productioncopies of the machine's virtual disks, such as backup or archive copiesstored in a non-production storage medium. The management component 254may then use the identified non-production copies of the virtual disksto restore virtual disk files to a virtual machine host 105, e.g., usingconventional data restoration methods and API calls to the host or astorage manager, or using the techniques described in commonly-assignedU.S. patent application Ser. No. 12/553,294, filed Sep. 3, 2009,entitled “SYSTEMS AND METHODS FOR MANAGEMENT OF VIRTUALIZATION DATA,”now U.S. Patent Publication No. 2010/0070725, which is incorporated byreference above. The management component 254 may then bring up thevirtual machine on the virtual machine host using API calls to the hostor a virtual machine manager 150.

At block 660, the management component 254 restores any associated LUNsthat were previously associated with the virtual machine to a storagearray or other external storage device using non-production copies ofthe LUNs. For example, the management component 254 may look up, in avirtual machine tracking data structure 700, identifiers or locationsfor PRDM-mapped LUNs that were previously associated with the virtualmachine and/or identifiers or locations of non-production copies ofthose PRDM-mapped LUNs (e.g., that were created using the process ofFIG. 5). Using the identified non-production copies of the PRDM-mappedLUNs, the management component 254 may then restore the LUNs' data andmetadata into a storage array or other external storage device usingconventional restoration techniques. At block 615, the managementcomponent 254 mounts each restored LUN on the virtual machine via avirtual RDM, typically to the same mount point where the correspondingphysical RDM had been previously mounted. For example, the managementcomponent 254 may instruct the virtual machine host 105 or a virtualmachine manager 150 to create a new virtual RDM between the restoredvirtual machine and the restored LUN using a mount point determined froma virtual machine tracking data structure. The process 650 then ends.

Information Management Environment

Aspects of the technologies described herein may be practiced in aninformation management environment 800, which will now be describedwhile referencing FIG. 8. As shown in FIG. 8, the environment 800includes multiple computing devices that execute numerous softwareapplications to facilitate the operations of an organization (ormultiple affiliated organizations), such as a household, corporation orother business entity, a non-profit organization, an educationalinstitution, or a governmental agency. The computing devices may includeone or more: servers 805 (such as mail servers, file servers, databaseservers, print servers, and web servers), personal computers 810,workstations 815, or other types of fixed computing systems such asmainframe computers and minicomputers (not shown). The servers 805 mayinclude network-attached storage (NAS) filers.

The environment 800 may include virtualized computing resources, such asa virtual machine 820 provided to the organization by a third-partycloud service vendor or a virtual machine 825 running on a virtualmachine host 830 operated by the organization. For example, theorganization may use one virtual machine 825A as a database server andanother virtual machine 825B as a mail server. The environment 800 mayalso include mobile or portable computing devices, such as laptops 835,tablet computers 840, personal data assistants 845, mobile phones 852(such as smartphones), and other mobile or portable computing devicessuch as embedded computers, set top boxes, vehicle-mounted devices,wearable computers, etc.

Of course, other types of computing devices may form part of theenvironment 800. As part of their function, each of these computingdevices creates, accesses, modifies, writes, and otherwise usesproduction copies of data and metadata that are typically stored in apersistent storage medium having fast I/O times. For example, eachcomputing device may regularly access and modify data files and metadatastored on semiconductor memory, a local disk drive or a network-attachedstorage device. Each of these computing devices may access data andmetadata via a file system supported by an operating system of thecomputing device.

The environment 800 may also include hosted services 822 that providevarious online services to the organization or its constituent members(e.g., the organization's departments, employees, independentcontractors, etc.) such as social networking services (e.g., Facebook,Twitter, Pinterest), hosted email services (e.g., Gmail, Yahoo Mail,Hotmail), or hosted productivity applications or other hostedapplications (e.g., Microsoft Office 365, Google Docs, Salesforce.com).Hosted services may include software-as-a-service (SaaS),platform-as-a-service (PaaS), application service providers (ASPs),cloud services, and all manner of delivering computing or functionalityvia a network. As it provides services to users, each hosted service maygenerate additional “hosted data and metadata” that is associated witheach user. For example, Facebook may generate and store photos, wallposts, notes, videos, and other content that are associated with aparticular Facebook user's account.

The organization directly or indirectly employs an informationmanagement system 850 to protect and manage the data and metadata usedby the various computing devices in the environment 800 and the data andmetadata that is maintained by hosted services on behalf of usersassociated with the organization. One example of an informationmanagement system is the CommVault Simpana system, available fromCommVault Systems, Inc. of Oceanport, N.J. The information managementsystem creates and manages non-production copies of the data andmetadata to meet information management goals, such as: permitting theorganization to restore data, metadata or both data and metadata if anoriginal copy of the data/metadata is lost (e.g., by deletion,corruption, or disaster, or because of a service interruption by ahosted service); allowing data to be recovered from a previous time;complying with regulatory data retention and electronic discovery(“e-discovery”) requirements; reducing the amount of data storage mediaused; facilitating data organization and search; improving user accessto data files across multiple computing devices and/or hosted services;and implementing information lifecycle management (“ILM”) or other dataretention policies for the organization. The information managementsystem 850 may create the additional non-production copies of the dataand metadata on any suitable non-production storage medium such asmagnetic disks 855, magnetic tapes 860, other storage media 865 such assolid-state storage devices or optical disks, or on cloud data storagesites 870 (e.g. those operated by third-party vendors). Further detailson the information management system may be found in the assignee's U.S.patent application Ser. No. 12/751,850, filed Mar. 31, 2010 entitledDATA OBJECT STORE AND SERVER FOR A CLOUD STORAGE ENVIRONMENT, INCLUDINGDATA DEDUPLICATION AND DATA MANAGEMENT ACROSS MULTIPLE CLOUD STORAGESITES, now U.S. Patent Publication No. 2010/0332456, which is herebyincorporated by reference herein in its entirety.

FIG. 9 helps illustrates some differences between “production copies” ofdata and metadata and “non-production copies” of data and metadata inthe data management environment 800. As shown, each computing device 905in the environment 800 has at least one operating system 910 installedand one or more applications 915A-D, such as mail server applications,file server applications, mail client applications, databaseapplications, word processing applications, spreadsheet applications,presentation applications, browser applications, mobile applications,entertainment applications, and so on. Each application can access andmodify various production copies of files stored in a production datastorage medium 918, which may be a network attached storage filer orform part of a Hadoop distributed file system, Open VMS file system, orother type of distributed file system, simply by making conventionalfile system calls via the operating system 910, without needing theinformation management system 850 to intervene on behalf of theoperating system or application. The production copies of files mayinclude structured data (e.g., database files), unstructured data (e.g.,documents), and/or semi-structured data, and thus may include one ormore documents 920A-B, spreadsheets 925, presentation documents 930,video files 932, image files 934, email mailboxes 935, html/xml or othertypes of markup language files 922, and/or databases 940. The operatingsystem 910 may also access and modify production copies of files andother data, such as files in a system volume and/or boot volume. Thehosted data and metadata used by a hosted service are also “productioncopies” of data and metadata since the hosted service accesses andmodifies the user's data and metadata as part of its services.Production copies of data may include not only files, but also subsetsof files, each of which a related application 915 or the operatingsystem 910 treats as an independent functional unit, but which is notseparately addressed in the associated file system. For example, asingle email mailbox 935 may include multiple email messages 945A-C,email headers, and attachments. As another example, a single database940 may include multiple tables 955A-C. As used herein, a “data object”refers to both (1) any file that is currently or previously addressableby a file system and (2) a functional subset of such a file that has aparticular function for a related application 915A-D or the operatingsystem 910. Each data object may be further decomposed into one or moredata blocks each of which is a collection of data bits within the dataobject that may not have any particular function for a relatedapplication or the operating system. In addition to data objects, theoperating system 910 and applications 915A-D may also access and modifyproduction copies of metadata, such as boot sectors, partition layouts,file or data object metadata (e.g., file name, file size,creation/modification/access timestamps, file location within a filefolder directory structure, user permissions, owners, groups, accesscontrol lists (“ACLs”)), and system metadata (e.g., registryinformation). In addition to metadata generated by or related to filesystems and operating systems, some applications maintain indices ofproduction metadata for data objects, e.g., metadata associated withindividual email messages. Thus, as shown in FIG. 9, each data objectmay be associated with a production copy of object metadata(“Meta1-11”), which may be file system metadata and/orapplication-specific metadata.

The information management system 850 accesses or receives copies of thevarious production copies of data objects and metadata, and via aninformation management operation (such as a backup operation, archiveoperation, or snapshot operation), creates non-production copies ofthese data objects and metadata, often stored in one or morenon-production storage mediums 965 different than the production storagemedium 918 where the production copies of the data objects and metadatareside. A non-production copy of a data object represents the productiondata object and its associated metadata at a particular point in time(non-production objects 960A-C). Since a production copy of a dataobject or metadata changes over time as it is modified by an application915, hosted service 822, or the operating system 910, the informationmanagement system 850 may create and manage multiple non-productioncopies of a particular data object or metadata, each representing thestate of the production data object or metadata at a particular point intime. Moreover, since a production copy of a data object may eventuallybe deleted from the production data storage medium and the file systemfrom which it originated, the information management system may continueto manage point-in-time representations of that data object, even thougha production copy of the data object itself no longer exists.

For virtualized computing devices, such as virtual machines, theoperating system 910 and applications 915A-D may be running on top ofvirtualization software, and the production data storage medium 918 maybe a virtual disk created on a physical medium such as a physical disk.The information management system may create non-production copies ofthe discrete data objects stored in a virtual disk file (e.g.,documents, email mailboxes, and spreadsheets) and/or non-productioncopies of the entire virtual disk file itself (e.g., a non-productioncopy of an entire .vmdk file).

Each non-production object 960A-C may contain copies of or otherwiserepresent more than one production data object. For example,non-production object 960A represents three separate production dataobjects 955C, 930 and 945C (represented as 945C′, 930′ and 945′,respectively). Moreover, as indicated by the prime mark (′), anon-production object may store a representation of a production dataobject or metadata differently than the original format of the dataobject or metadata, e.g., in a compressed, encrypted, deduplicated, orotherwise optimized format. Although FIG. 9 shows that a singleproduction data object (e.g., 955C), and its associated data objectmetadata (e.g., Meta11) are represented by the contents of only a singlenon-production object (e.g., 960A), the entire contents of a singleproduction data object and/or its metadata at a particular point in timemay instead span across numerous non-production objects. Also a singlenon-production object 960 may contain copies of or otherwise representproduction data objects that originated from different computingdevices.

Non-production copies include backup copies, archive copies, andsnapshot copies. Backup copies are generally used for shorter-term dataprotection and restoration purposes and may be in a native applicationformat or in a non-native format (e.g., compressed, encrypted,deduplicated, and/or otherwise modified from the original applicationformat). Archive copies are generally used for long-term data storagepurposes and may be compressed, encrypted, deduplicated and/or otherwisemodified from the original application format. In some examples, when anarchive copy of a data object is made, a logical reference or stub maybe used to replace the production copy of the data object in theproduction storage medium 918. In such examples, the stub may point toor otherwise reference the archive copy of the data object stored in thenon-production storage medium so that the information management systemcan retrieve the archive copy if needed. The stub may also include somemetadata associated with the data object, so that a file system and/orapplication can provide some information about the data object and/or alimited-functionality version (e.g., a preview) of the data object. Asnapshot copy represents a data object at a particular point in time. Asnapshot copy can be made quickly and without significantly impactingproduction computing resources because large amounts of data need not becopied or moved. A snapshot copy may include a set of pointers derivedfrom the file system or an application, where each pointer points to arespective stored data block, so collectively, the set of pointersreflect the storage location and state of the data object at aparticular point in time when the snapshot copy was created. In“copy-on-write”, if a block of data is to be deleted or changed, thesnapshot process writes the block to a particular data storage location,and the pointer for that block is now directed to that particularlocation. The set of pointers and/or the set of blocks pointed to by asnapshot may be stored within the production data storage medium 918.

Non-production copies of a data object or metadata may be distinguishedfrom a production copy of a data object or metadata in several ways.First, a non-production copy of a data object is created to meet thedifferent information management goals described above and is notdirectly used or modified by applications 915A-D, hosted services 822,or the operating system 910. Second, a non-production copy of a dataobject is stored as one or more non-production objects 960 that may havea format different from the native application format of the productioncopy of the data object, and thus often cannot be directly used by thenative application or a hosted service 822 without first being modified.Third, non-production objects are often stored on a non-productionstorage medium 965 that is inaccessible to the applications 915A-Drunning on computing devices and hosted services 822. Also, somenon-production copies may be “offline copies,” in that they are notreadily available (e.g. not mounted tape or disk.) Offline copiesinclude copies of data that the information management system can accesswithout any human intervention (e.g. tapes within an automated tapelibrary, but not yet mounted in a drive), and copies that theinformation management system 850 can access only with at least somehuman intervention (e.g. tapes located at an offsite storage site).

The information management system 850 also generates informationmanagement data 975, such as indexing information, that permit theinformation management system to perform its various informationmanagement tasks. As shown in FIG. 9, a computing device 905 may includeone or more data management agents 980 that provide client-sidefunctions for the information management system.

Information Management System

FIG. 10 shows a hierarchical arrangement of resources that may form aninformation management system 850. As shown, the information managementsystem 850 includes multiple information management cells 1050 arrangedin a hierarchy, with some information management cells (e.g., 1050D-E)subordinate to other information management cells (e.g., 1050B). Aglobal storage manager 1005, which may form part of a global informationcell 1050 x, manages the overall hierarchy of information managementcells by receiving reports from the various subordinate informationmanagement cells related to the operation of the cells, determiningglobal information management policies in light of received reports, andpushing information management policies towards subordinate cells forimplementation. The global storage manager may also maintain anddisseminate, to the various cells, system-wide information managementdata. A superior information management cell (e.g., 1050B), may performsimilar tasks for its subordinate cells (e.g., 1050D-E) and/or otherwiseact as an intermediary between the subordinate cells and the globalstorage manager 1005.

Information Management Cell

FIG. 11 shows an arrangement of resources that may form an informationmanagement cell 1050. As shown, the information management cell includesa storage manager 1102, one or more media agents 1110A-M, one or morenon-production storage mediums 855-870, one or more computing devices905A-N, and one or more production data storage mediums 918A-N. Outsideof the information management cell are hosted services 822, which mayinteract with media agents 1110 and its components, as described furtherherein. In some examples, all or a portion of an information managementcell may be implemented as an object store, as described in assignee'sU.S. patent application Ser. No. 12/751,850, which is incorporated byreference above.

The storage manager 1102 may be a software module or other applicationthat coordinates and controls information management operationsperformed by one or more information management cells 1050 to protectand control copies of non-production data objects and metadata. As shownby the dashed lines 1116 and 1122, the storage manager may communicatewith some or all elements of the information management cell 1050, suchas the media agents 1110 and computing devices 905, to initiate andmanage backup operations, snapshot operations, archive operations, datareplication operations, data migrations, data distributions, datarecovery, and other information management operations. The storagemanager may control additional information management operationsincluding ILM, deduplication, content indexing, data classification,data mining or searching, e-discovery management, collaborativesearching, encryption, and compression. Alternatively or additionally, astorage manager may control the creation and management of disasterrecovery copies, which are often created as secondary, high-availabilitydisk copies, using auxiliary copy or replication technologies.

The storage manager 1102 may include a jobs agent 1155, a managementagent 1150, a network agent 1145, and an interface agent 1160, all ofwhich may be implemented as interconnected software modules orapplication programs. The jobs agent 1155 monitors the status ofinformation management operations previously performed, currently beingperformed, or scheduled to be performed by the information managementcell 1050. The management agent 1150 provides an interface that allowsvarious management agents 1150 in multiple information management cells1050 (or in a global storage manager 1005) to communicate with oneanother. This allows each information management cell 1050 to exchangestatus information, routing information, capacity and utilizationinformation, and information management operation instructions orpolicies with other cells. In general, the network agent 1145 providesthe storage manager 1102 with the ability to communicate with othercomponents within the information management cell and the largerinformation management system, e.g., via proprietary or non-proprietarynetwork protocols and application programming interfaces (“APIs”)(including HTTP, HTTPS, FTP, REST, virtualization software APIs, cloudservice provider APIs, hosted service provider APIs). The interfaceagent 1160 includes information processing and display software, such asa graphical user interface (“GUI”), an API, or other interactiveinterface through which users and system processes can retrieveinformation about the status of information management operations orissue instructions to the information management cell and itsconstituent components. The storage manager 1102 may also trackinformation that permits it to select, designate, or otherwise identifycontent indices, deduplication databases, or similar databases withinits information management cell (or another cell) to be searched inresponse to certain queries.

The storage manager 1102 may also maintain information management data,such as a database 1165 of management data and policies. The database1165 may include a management index that stores logical associationsbetween components of the system, user preferences, user profiles (thatamong other things, map particular information management users tocomputing devices or hosted services), management tasks, or other usefuldata. The database 1165 may also include various “information managementpolicies,” which are generally data structures or other informationsources that each includes a set of criteria and rules associated withperforming an information management operation. The criteria may be usedto determine which rules apply to a particular data object, systemcomponent, or information management operation, an may include:

-   -   frequency with which a production or non-production copy of a        data object or metadata has been or is predicted to be used,        accessed, or modified;    -   access control lists or other security information;    -   the sensitivity (e.g., confidentiality) of a data object as        determined by its content and/or metadata;    -   time-related factors;    -   deduplication information;    -   the computing device, hosted service, computing process, or user        that created, modified, or accessed a production copy of a data        object; and    -   an estimated or historic usage or cost associated with different        components.        The rules may specify, among other things:    -   a schedule for performing information management operations,    -   a location (or a class or quality of storage media) for storing        a non-production copy,    -   preferences regarding the encryption, compression, or        deduplication of a non-production copy,    -   resource allocation between different computing devices or other        system components (e.g., bandwidth, storage capacity),    -   whether and how to synchronize or otherwise distribute files or        other data objects across multiple computing devices or hosted        services,    -   network pathways and components to utilize (e.g., to transfer        data) during an information management operation, and    -   retention policies (e.g., the length of time a non-production        copy should be retained in a particular class of storage media).

As noted above, each computing device 905 may include one or more datamanagement agents 980. Each data management agent is a software moduleor component that helps govern communications with other systemcomponents. For example, the data management agent receives commandsfrom the storage manager 1102 and sends to and receives from mediaagents 1110 copies of data objects, metadata, and other payload (asindicated by the heavy arrows). Each data management agent accesses dataand/or metadata stored in a production data storage medium 918 andarranges or packs the data and metadata in a certain format (e.g.,backup or archive format) before it is transferred to another component.Each data management agent can also restore a production copy of a dataobject or metadata in a production data storage medium 918 from anon-production copy. A data management agent may perform some functionsprovided by a media agent, which are described further herein, such ascompression, encryption, or deduplication. Each data management agentmay be specialized for a particular application (e.g. a specified datamanagement agent customized to handle data generated or used by Exchangeby Microsoft Corp.). Alternatively or additionally, a more generic datamanagement agent may handle data generated or used by two or moreapplications.

Each computing device 905 may also include a data distribution and livebrowsing client module 1105 (herein “distribution client module”). Thedistribution client module 1105 is responsible for, inter alia,associating mobile devices and/or hosted service accounts with users ofthe information management system, setting information managementpolicies for mobile and other computing devices, pushing data objects toa distribution module for distribution to other computing devices,providing unified access to a user's data via an interface, andproviding live browsing features. The various functions of thedistribution client module are described in greater detail herein.

A media agent 1110, which may be implemented as a software module,conveys data, as directed by the storage manager 1102, between acomputing device 905 (or hosted service 822) and one or morenon-production storage mediums 855-870. Each media agent 1110 maycontrol one or more intermediary storage devices 1118, such as a cloudserver or a tape or magnetic disk library management system, to read,write, or otherwise manipulate data stored in a non-production storagemediums 855-870. Each media agent 1110 may be considered to be“associated with” a storage device and its related non-productionstorage media if that media agent is capable of routing data to andstoring data in the storage media managed by the particular storagedevice. A media agent may communicate with computing devices 905, hostedservices 822, storage devices 1118A-D, and the storage manager 1102 viaany suitable communications path, including SCSI, a Storage Area Network(“SAN”), a Fibre Channel communications link, or a wired, wireless, orpartially wired/wireless computer or telecommunications network,including the Internet.

To perform its functions, the media agent 1110 may include a media filesystem module 1125, a data classification module 1135, a contentindexing module 1120, a deduplication module 1130, an encryption module1175, a compression module 1185, a network module 1115, a distributionmodule 1190, and a media agent database 1140. The media file systemmodule 1125 is responsible for reading, writing, archiving, copying,migrating, restoring, accessing, moving, sparsifying, deleting,sanitizing, destroying, or otherwise performing file system operationson various non-production storage devices of disparate types. The mediafile system module may also instruct the storage device to use a roboticarm or other retrieval means to load or eject certain storage media suchas a tape.

The network module 1115 permits the media agent to communicate withother components within the system and hosted services 822 via one ormore proprietary and/or non-proprietary network protocols or APIs(including cloud service provider APIs, virtual machine management APIs,and hosted service provider APIs). The deduplication module 1130performs deduplication of data objects and/or data blocks to reduce dataredundancy in the cell. The deduplication module may generate and storedata structures to manage deduplicated data objects, such asdeduplication tables, in the media agent database 1140. The encryptionmodule 1175 performs encryption of data objects, data blocks, ornon-production objects to ensure data security in the cell. Thecompression module 1185 performs compression of data objects, datablocks, or non-production objects to reduce the data capacity needed inthe cell.

The content indexing module 1120 analyzes the contents of productioncopies or non-production copies of data objects and/or their associatedmetadata and catalogues the results of this analysis, along with thestorage locations of (or references to) the production or non-productioncopies, in a content index stored within a media agent database 1140.The results may also be stored elsewhere in the system, e.g., in thestorage manager 1102, along with a non-production copy of the dataobjects, and/or an index cache. Such index data provides the media agent1110 or another device with an efficient mechanism for locatingproduction copies and/or non-production copies of data objects thatmatch particular criteria. The index data or other analyses of dataobjects or metadata may also be used by the data classification module1135 to associate data objects with classification identifiers (such asclassification tags) in the media agent database 1140 (or other indices)to facilitate information management policies and searches of storeddata objects.

The distribution module 1190 may be a set of instructions thatcoordinates the distribution of data objects and indices of dataobjects. The distribution may occur from one computing device 905 toanother computing device 905 and/or from hosted services 822 tocomputing devices 905. As a first example, the distribution module maycollect and manage data and metadata from hosted services 822 or mobiledevices 905. As another example, the distribution module may synchronizedata files or other data objects that are modified on one computingdevice so that the same modified files or objects are available onanother computing device. As yet another example, the distributionmodule may distribute indices of data objects that originated frommultiple computing devices and/or hosted services, so a user can accessall of their data objects through a unified user interface or a nativeapplication on their computing device. The distribution module may alsoinitiate “live browse” sessions to permit communications betweendifferent computing devices so that the devices can interchange data andmetadata or so the devices can provide computing resources, such asapplications, to each other.

CONCLUSION

Systems and modules described herein may comprise software, firmware,hardware, or any combination(s) of software, firmware, or hardwaresuitable for the purposes described herein. Software and other modulesmay reside on servers, workstations, personal computers, computerizedtablets, PDAs, and other computing devices suitable for the purposesdescribed herein. Modules described herein may be executed by ageneral-purpose computer, e.g., a server computer, wireless device, orpersonal computer. Those skilled in the relevant art will appreciatethat aspects of the invention can be practiced with othercommunications, data processing, or computer system configurations,including: Internet appliances, hand-held devices (including personaldigital assistants (PDAs)), wearable computers, all manner of cellularor mobile phones, multi-processor systems, microprocessor-based orprogrammable consumer electronics, set-top boxes, network PCs,mini-computers, mainframe computers, and the like. Furthermore, aspectsof the invention can be embodied in a special purpose computer or dataprocessor that is specifically programmed, configured, or constructed toperform one or more of the computer-executable instructions explained indetail herein.

Software and other modules may be accessible via local memory, anetwork, a browser, or other application in an ASP context, or viaanother means suitable for the purposes described herein. Examples ofthe technology can also be practiced in distributed computingenvironments where tasks or modules are performed by remote processingdevices, which are linked through a communications network, such as aLocal Area Network (LAN), Wide Area Network (WAN), or the Internet. In adistributed computing environment, program modules may be located inboth local and remote memory storage devices. Data structures describedherein may comprise computer files, variables, programming arrays,programming structures, or any electronic information storage schemes ormethods, or any combinations thereof, suitable for the purposesdescribed herein. User interface elements described herein may compriseelements from graphical user interfaces, command line interfaces, andother interfaces suitable for the purposes described herein.

Examples of the technology may be stored or distributed oncomputer-readable media, including magnetically or optically readablecomputer disks, hard-wired or preprogrammed chips (e.g., EEPROMsemiconductor chips), nanotechnology memory, or other data storagemedia. Indeed, computer-implemented instructions, data structures,screen displays, and other data under aspects of the invention may bedistributed over the Internet or over other networks (including wirelessnetworks), or they may be provided on any analog or digital network(packet switched, circuit switched, or other scheme).

Unless the context clearly requires otherwise, throughout thedescription and the claims, the words “comprise,” “comprising,” and thelike are to be construed in an inclusive sense, as opposed to anexclusive or exhaustive sense; that is to say, in the sense of“including, but not limited to.” As used herein, the terms “connected,”“coupled,” or any variant thereof, means any connection or coupling,either direct or indirect, between two or more elements; the coupling orconnection between the elements can be physical, logical, or acombination thereof. Additionally, the words “herein,” “above,” “below,”and words of similar import, when used in this application, refer tothis application as a whole and not to any particular portions of thisapplication. Where the context permits, words in the above DetailedDescription using the singular or plural number may also include theplural or singular number respectively. The word “or,” in reference to alist of two or more items, covers all of the following interpretationsof the word: any of the items in the list, all of the items in the list,and any combination of the items in the list.

The above Detailed Description is not intended to be exhaustive or tolimit the invention to the precise form disclosed above. While specificexamples for the invention are described above for illustrativepurposes, various equivalent modifications are possible within the scopeof the invention, as those skilled in the relevant art will recognize.For example, while processes or blocks are presented in a given order,alternative implementations may perform routines having steps, or employsystems having blocks, in a different order, and some processes orblocks may be deleted, moved, added, subdivided, combined, and/ormodified to provide alternative or subcombinations. Each of theseprocesses or blocks may be implemented in a variety of different ways.Also, while processes or blocks are at times shown as being performed inseries, these processes or blocks may instead be performed orimplemented in parallel, or may be performed at different times. Furtherany specific numbers noted herein are only examples: alternativeimplementations may employ differing values or ranges.

The teachings of the invention provided herein can be applied to othersystems, not necessarily the systems described herein. The elements andacts of the various examples described above can be combined to providefurther implementations of the invention.

Any patents and applications and other references noted above, includingany that may be listed in accompanying filing papers, are incorporatedherein by reference. Aspects of the invention can be modified, ifnecessary, to employ the systems, functions, and concepts of the variousreferences described above to provide yet further implementations of theinvention.

These and other changes can be made to the invention in light of theabove Detailed Description. While the above description describescertain examples of the invention, no matter how detailed the aboveappears in text, the invention can be practiced in many ways. Details ofthe system may vary considerably in its specific implementation, whilestill being encompassed by the invention disclosed herein. As notedabove, particular terminology used when describing certain features oraspects of the invention should not be taken to imply that theterminology is being redefined herein to be restricted to any specificcharacteristics, features, or aspects of the invention with which thatterminology is associated. In general, the terms used in the followingclaims should not be construed to limit the invention to the specificexamples disclosed in the specification, unless the above DetailedDescription section explicitly defines such terms. Accordingly, theactual scope of the invention encompasses not only the disclosedexamples, but also all equivalent ways of practicing or implementing theinvention under the claims.

While certain examples are presented below in certain forms, theapplicant contemplates the various aspects of the invention in anynumber of claim forms. Accordingly, the applicant reserves the right toadd additional claims after filing the application to pursue suchadditional claim forms for other aspects of the invention.

We claim:
 1. A non-transitory computer-readable storage medium storinginstructions, which when executed by a processor, cause a system toperform a method for migrating functionality of a source physicalcomputing device to a destination physical computing device, the methodcomprising: identifying data associated with a source physical computingdevice, wherein an information management system maintains and storesthe data; determining a configuration of the source physical computingdevice; determining a configuration for a destination physical computingdevice based at least in part on the determined configuration of thesource physical computing device; selecting a destination physicalcomputing device to which functionality of the source physical computingdevice may be migrated, providing, via the information managementsystem, the selected destination physical computing device with accessto the data associated with the source physical computing device;modifying an existing configuration of the selected destination physicalcomputing device to match at least part of the configuration of thesource computing device; decommissioning the source physical computingdevice after migration is complete, wherein the source physicalcomputing device is inoperable after being decommissioned; executing aroutine to permanently wipe data and metadata from the decommissionedsource physical computing device; and notifying a party that thedecommissioned source physical computing device is available byproviding at least a partial description of the decommissioned sourcephysical computing device specification.
 2. The non-transitorycomputer-readable storage medium of claim 1, wherein the migrationmethod is initiated in response to determining that a set ofpredetermined criteria have been met, and wherein the predeterminedcriteria include at least one of: the source physical computing deviceis older than a threshold age or time, the source physical computingdevice has lost some of its data redundancy protection or a disk drive,the source physical computing device has lost network connectivity; thesource physical computing device has been infected by a virus; or anycombination thereof.
 3. The non-transitory computer-readable storagemedium of claim 1, further comprising: executing instructions to providea description of the decommissioned source physical computing device toan auction site.
 4. The non-transitory computer readable storage mediumof claim 1, wherein the method is initiated in response to determiningthat the source physical computing device has experienced an increasednumber of errors.
 5. The non-transitory computer-readable storage mediumof claim 1, wherein the method is initiated in response to determiningthat the source physical computing device has presented symptomsindicative of system instability.
 6. A non-transitory computer-readablestorage medium storing instructions, which when executed by a processingdevice perform a method for migrating functionality of a source physicalcomputing device to a destination physical computing device, the methodcomprising: maintaining a copy of data associated with a source physicalcomputing device, wherein the copy is maintained by an informationmanagement system, wherein the information management system is at leastpartially located on the source physical computing device and at leastpartially located on a destination physical computing device; migratingan existing configuration of the source physical computing device to thedestination physical computing device; providing, via the informationmanagement system, the destination physical computing device with accessto the copy of data associated with the source physical computingdevice; decommissioning the source physical computing device aftermigration is complete, wherein the source physical computing device isinoperable after being decommissioned; executing a routine to wipe datafrom the decommissioned source physical computing device; and notifyinga party that the decommissioned source physical computing device isavailable by providing at least a partial description of thedecommissioned source physical computing device specification.
 7. Thenon-transitory computer-readable storage medium of claim 6, the methodfurther comprising: providing a description of the decommissioned sourcephysical computing device to an intranet site.
 8. The non-transitorycomputer-readable storage medium of claim 6, the method furthercomprising: providing a graphical user interface (GUI) for a user toidentify the source physical computing device for migration.
 9. Thenon-transitory computer-readable storage medium of claim 6, wherein thecopy of data associated with the source physical computing devicerepresents a snapshot copy of data and metadata associated with thesource physical computing device at a particular time, and whereinproviding the destination physical computing device with access to thecopy of data comprises mounting the snapshot copy of data and metadataat the destination physical computing device.
 10. The non-transitorycomputer-readable storage medium of claim 6, wherein the copy of dataassociated with the source physical computing device comprises anauxiliary backup copy of data associated with the source physicalcomputing device, wherein the auxiliary backup copy is created using anexisting backup copy of data associated with the source physicalcomputing device, and wherein the auxiliary copy is periodically orcontinuously updated to reflect ongoing changes to the existing backupcopy of data associated with the source physical computing device. 11.The non-transitory computer-readable storage medium of claim 6, whereinthe copy of data associated with the source physical computing device iscreated in accordance with an information management policy.
 12. Thenon-transitory computer-readable storage medium of claim 6, wherein theexisting configuration of the source physical computing device isdetermined based at least in part on the copy of data associated withthe source physical computing device.
 13. The non-transitorycomputer-readable storage medium of claim 6, wherein providing thedestination physical computing device access the copy of data associatedwith the source physical computing device comprises providing access toonly a limited subset of data from the source physical computing devicein accordance with an information management policy.
 14. A method formanaging a network of physical machines in a cloud computingenvironment, the method comprising: receiving a notification that asource physical computing device has met information management policycriteria to be decommissioned; based on the notification, initiating aprocess to decommission the source physical computing device, whereinthe process comprises: generating, via an information management system,a copy of data associated with the source physical computing deviceusing an existing backup copy of data associated with the sourcephysical computing device; decommissioning the source physical computingdevice, wherein decommissioning comprises executing a routine topermanently wipe data from the decommissioned source physical computingdevice; and providing a description of the decommissioned sourcephysical computing device to an intranet site, wherein the descriptionis at least partially based on a configuration of the source physicalcomputing device.
 15. The method of claim 14, wherein the receivingnotification that the source physical computing device has met theinformation management policy criteria includes at least one of:receiving notification that the source physical computing device isundergoing a disaster recovery (DR) operation; receiving notificationthat the source physical computing device is older than a threshold ageor time, receiving notification that the source physical computingdevice has lost some of its data redundancy protection; receivingnotification that the source physical computing device has lost networkconnectivity; receiving notification that the source physical computingdevice has been infected by a virus; receiving notification that thesource physical computing device experienced an increased number oferrors; or any combination thereof.
 16. The method of claim 14, whereinthe existing backup copy is periodically or continuously updated toreflect ongoing changes to the copy of data associated with the sourcephysical; and wherein the existing backup copy represents a snapshot ofdata associated with the source physical computing device at aparticular time.
 17. The method of claim 14, wherein the copy of dataassociated with the source physical computing device is created inaccordance with an information management policy.
 18. The method ofclaim 14, wherein the process further comprises prohibiting users fromaccessing or using the decommissioned source physical computing device.19. The method of claim 14, wherein providing the access to the copy ofdata comprises providing access to only a limited subset of data from inaccordance with the information management policy.
 20. The method ofclaim 14, wherein the intranet is associated with a corporation,business entity, non-profit organization, educational institution, or agovernmental agency.