Method and system for mapping protection policies to data cluster components

ABSTRACT

Techniques described herein relate to a method for managing data protection services for data clusters. The method includes identifying, by a mapping module of a data protection manager, an initial discovery event associated with a data cluster; in response to identifying the discovery event, by the mapping module: sending a request for currently deployed components to a data cluster manager associated with the data cluster; obtaining data cluster component inventory information associated with the data cluster from the data cluster manager; mapping protection policy types to data cluster components of the data cluster using the data cluster component inventory information and component data protection information; and initiating performance of data protection services for the data cluster components based on the mapped protection policy types.

BACKGROUND

Computing devices may provide services. To provide the services, thecomputing devices may include hardware components and softwarecomponents. To provide the aforementioned services, the hardware andsoftware components of the computing devices may generate data. The datamay be relevant to users of the computing devices. The data may beprotected to ensure availability to users of the computing devices.

SUMMARY

In general, in one aspect, the invention relates to a method formanaging data protection services for data clusters in accordance withone or more embodiments of the invention. The method includesidentifying, by a mapping module of a data protection manager, aninitial discovery event associated with a data cluster; in response toidentifying the discovery event, by the mapping module: sending arequest for currently deployed components to a data cluster managerassociated with the data cluster; obtaining data cluster componentinventory information associated with the data cluster from the datacluster manager; mapping protection policy types to data clustercomponents of the data cluster using the data cluster componentinventory information and component data protection information; andinitiating performance of data protection services for the data clustercomponents based on the mapped protection policy types.

In general, in one aspect, the invention relates to a system formanaging data protection services for data clusters in accordance withone or more embodiments of the invention. The system includes persistentstorage, which stores a data cluster component inventory repository, anda mapping module of a data protection manager. The mapping module isprogrammed to identify an initial discovery event associated with a datacluster; in response to identifying the discovery event: send a requestfor currently deployed components to a data cluster manager associatedwith the data cluster; obtain data cluster component inventoryinformation associated with the data cluster from the data clustermanager; map protection policy types to data cluster components of thedata cluster using the data cluster component inventory information andcomponent data protection information; and initiate performance of dataprotection services for the data cluster components based on the mappedprotection policy types.

In general, in one aspect, the invention relates to a non-transitorycomputer readable medium which includes computer readable program code,which when executed by a computer processor enables the computerprocessor to perform a method for managing data protection services fordata clusters in accordance with one or more embodiments of theinvention. The method includes identifying, by a mapping module of adata protection manager, an initial discovery event associated with adata cluster; in response to identifying the discovery event, by themapping module: sending a request for currently deployed components to adata cluster manager associated with the data cluster; obtaining datacluster component inventory information associated with the data clusterfrom the data cluster manager; mapping protection policy types to datacluster components of the data cluster using the data cluster componentinventory information and component data protection information; andinitiating performance of data protection services for the data clustercomponents based on the mapped protection policy types.

BRIEF DESCRIPTION OF DRAWINGS

Certain embodiments of the invention will be described with reference tothe accompanying drawings. However, the accompanying drawings illustrateonly certain aspects or implementations of the invention by way ofexample and are not meant to limit the scope of the claims.

FIG. 1A shows a diagram of a system in accordance with one or moreembodiments of the invention.

FIG. 1B shows a diagram of a data protection manager in accordance withone or more embodiments of the invention.

FIG. 1C shows a diagram of a data cluster in accordance with one or moreembodiments of the invention.

FIG. 1D shows a diagram of a management domain of a data cluster inaccordance with one or more embodiments of the invention.

FIG. 1E shows a diagram of a workload domain of a data cluster inaccordance with one or more embodiments of the invention.

FIG. 2A shows a flowchart of a method for mapping protection policies todata cluster components in accordance with one or more embodiments ofthe invention.

FIG. 2B shows a flowchart of a method for discovering data clustercomponents in accordance with one or more embodiments of the invention.

FIG. 2C shows a diagram of a method for mapping data protection servicesto data cluster components in accordance with one or more embodiments ofthe invention.

FIG. 2D shows a diagram of a method for discovering data clustertopologies in accordance with one or more embodiments of the invention.

FIG. 2E shows a diagram of a method for restoring a data cluster inaccordance with one or more embodiments of the invention.

FIG. 3 shows a diagram of the operation of a first example system overtime in accordance with one or more embodiments of the invention.

FIG. 4 shows a diagram of the operation of a second example system overtime in accordance with one or more embodiments of the invention.

FIG. 5 shows a diagram of the operation of a third example system overtime in accordance with one or more embodiments of the invention.

FIG. 6 shows a diagram of the operation of a fourth example system overtime in accordance with one or more embodiments of the invention.

FIG. 7 shows a diagram of a computing device in accordance with one ormore embodiments of the invention.

DETAILED DESCRIPTION

Specific embodiments will now be described with reference to theaccompanying figures. In the following description, numerous details areset forth as examples of the invention. It will be understood by thoseskilled in the art that one or more embodiments of the present inventionmay be practiced without these specific details and that numerousvariations or modifications may be possible without departing from thescope of the invention. Certain details known to those of ordinary skillin the art are omitted to avoid obscuring the description.

In the following description of the figures, any component describedwith regard to a figure, in various embodiments of the invention, may beequivalent to one or more like-named components described with regard toany other figure. For brevity, descriptions of these components will notbe repeated with regard to each figure. Thus, each and every embodimentof the components of each figure is incorporated by reference andassumed to be optionally present within every other figure having one ormore like-named components. Additionally, in accordance with variousembodiments of the invention, any description of the components of afigure is to be interpreted as an optional embodiment, which may beimplemented in addition to, in conjunction with, or in place of theembodiments described with regard to a corresponding like-namedcomponent in any other figure.

Throughout this application, elements of figures may be labeled as A toN. As used herein, the aforementioned labeling means that the elementmay include any number of items and does not require that the elementinclude the same number of elements as any other item labeled as A to N.For example, a data structure may include a first element labeled as Aand a second element labeled as N. This labeling convention means thatthe data structure may include any number of the elements. A second datastructure, also labeled as A to N, may also include any number ofelements. The number of elements of the first data structure and thenumber of elements of the second data structure may be the same ordifferent.

In general, embodiments of the invention relate to a method and systemfor managing data protection services for data clusters. Morespecifically, embodiments of the invention relate to a mapping modulethat maps protection policy types to initially discovered data clustercomponents based on data protection requirements associated with thedata cluster components.

FIG. 1A shows a diagram of a system in accordance with one or moreembodiments of the invention. The system may include a data protectionmanager (100) and data clusters (120). The system may include any numberof data clusters (120) without departing from the invention. Forexample, the system may include data cluster A (120A) and data cluster N(120N). The system may include additional, fewer, and/or othercomponents without departing from the invention. Each of the componentsin the system may be operatively connected via any combination ofwireless and/or wired networks.

In one or more embodiments of the invention, the data protection manager(100) includes the functionality provide data protection services to thedata clusters (120). The data protection manager (100) may include thefunctionality to provide and/or obtain other and/or additional serviceswithout departing from the invention. For additional informationregarding the data protection manager (100) refer to FIG. 1B.

In one or more embodiments of the invention, the data protection manager(100) is implemented as a computing device (see e.g., FIG. 7 ). Thecomputing device may be, for example, a mobile phone, a tablet computer,a laptop computer, a desktop computer, a server, a distributed computingsystem, or a cloud resource. The computing device may include one ormore processors, memory (e.g., random access memory), and persistentstorage (e.g., disk drives, solid state drives, etc.). The computingdevice may include instructions, stored on the persistent storage, thatwhen executed by the processor(s) of the computing device cause thecomputing device to perform the functionality of the data protectionmanager (100) described throughout this application.

In one or more embodiments of the invention, the data protection manager(100) is implemented as a logical device. The logical device may utilizethe computing resources of any number of computing devices and therebyprovide the functionality of the data protection manager (100) describedthroughout this application.

In one or more embodiments of the invention, the data clusters (120)include the functionality to obtain data protection services from thedata protection manager. The data clusters (120) may further include thefunctionality to perform computer implemented services for users of thedata clusters (e.g., clients, not shown). The computer implementedservices may include, for example, database services, electronic mailservices, data processing services, etc. The computer implementedservices may include other and/or additional types of services withoutdeparting from the invention.

In one or more embodiments of the invention, a data cluster (e.g., 120A)of the data clusters may be implemented as one or more computing devices(e.g., see above discussion). A data cluster (e.g., (120A)) may includeany number of computing devices without departing from the invention.Each data cluster may include different numbers of computing devices,different quantity and types of computer resources, and may performdifferent computer implemented services without departing from theinvention. For additional information regarding data clusters (120),refer to FIG. 1C.

FIG. 1B shows a diagram of a data protection manager in accordance withone or more embodiments of the invention. The data protection managermay be an embodiment of the data protection manager (100, FIG. 1A)discussed above. As discussed above, the data protection manager mayperform data protection services for the data clusters (120, FIG. 1A).To perform the aforementioned data protection services, the dataprotection manager (100) may include a mapping module (102), a data typemodule (104), and persistent storage (106). The data protection manager(100) may include other and/or additional components without departingfrom the invention. Each of the aforementioned components of the dataprotection manager is discussed below.

In one or more embodiments of the invention, the mapping module (102)includes the functionality to perform a portion of the data protectionservices of the data protection manager (100). The portion of the dataprotection services performed by the mapping module (102) may includethe methods depicted in FIGS. 2A-2B. The mapping module (102) mayinclude the functionality to perform and or obtain other and/oradditional services without departing from the invention.

In one or more embodiments of the invention, the mapping module (102) isa physical device. The physical device may include circuitry. Thephysical device may be, for example, a field-programmable gate array,application specific integrated circuit, programmable processor,microcontroller, digital signal processor, or other hardware processor.The physical device may be adapted to provide the functionality of themapping module (102) described throughout this application.

In one or more embodiments of the invention, the mapping module (102) isimplemented as computer instructions, e.g., computer code, stored on apersistent storage that when executed by a processor of the dataprotection manager (100) causes the data protection manager (100) toprovide the functionality of the mapping module (102) describedthroughout this application.

In one or more embodiments of the invention, the data type module (104)includes the functionality to perform a portion of the data protectionservices of the data protection manager (100). The portion of the dataprotection services performed by the data type module (104) may includethe methods depicted in FIGS. 2C-2E. The data type module (104) mayinclude the functionality to perform and or obtain other and/oradditional services without departing from the invention.

In one or more embodiments of the invention, the data type module (104)is a physical device. The physical device may include circuitry. Thephysical device may be, for example, a field-programmable gate array,application specific integrated circuit, programmable processor,microcontroller, digital signal processor, or other hardware processor.The physical device may be adapted to provide the functionality of thedata type module (104) described throughout this application.

In one or more embodiments of the invention, the data type module (104)is implemented as computer instructions, e.g., computer code, stored ona persistent storage that when executed by a processor of the dataprotection manager (100) causes the data protection manager (100) toprovide the functionality of the data type module (104) describedthroughout this application.

In one or more embodiments of the invention, the persistent storage(106) stores data. The persistent storage (106) may include a datacluster component inventory repository (108), component data protectioninformation (110), data cluster component protection policy mappings(112) and a data cluster topology information repository (114). Thepersistent storage (106) may store other and/or additional data withoutdeparting from the invention. Each of the aforementioned types of datastored in the persistent storage (106) is discussed below.

The data cluster component inventory repository (108) may include one ormore data structures that may include data cluster component inventoryinformation associated with each data cluster that may be used specifythe data cluster components deployed in each of the data clusters (120,FIG. 1A). The data cluster component inventory information may includedata cluster component identifiers and data cluster component typesassociated with each data cluster component identifier. The data clustercomponent inventory repository (108) may include dependency information,data types (e.g., image data, file data, database data, etc.), and datachange rates (i.e., the amount of data change per unit of time). Thedata cluster component inventory information may include other and/oradditional types of information without departing from the invention.

The component data protection information (110) may be one or more datastructures that include data cluster component types and data protectionrequirements and data type requirements associated with each datacluster component type. The data protection requirements associated witheach data cluster component type may be specified by manufacturerinformation obtained directly from a manufacturer of a data clustercomponent and/or configured by a user of the data protection manager(100). The data protection requirements may specify requirements forperforming data protection services for data cluster components. Thedata protection requirements may include, for example, recovery pointobjectives, target storages for storing backups, backup schedules, andretention periods (i.e., amount of time before a backup is removed froma storage). The data protection requirements may include other and/oradditional requirements associated with the performance of dataprotection services for data cluster component without departing fromthe invention. The component data protection information (110) may alsoinclude backup metadata associated with each data cluster component ofthe data clusters (120, FIG. 1A). The backup metadata may includeinformation regarding the performance of past data protection servicesassociated with the data cluster components. Such information mayinclude, for example, backup data sizes, change information, etc. Thecomponent data protection information (110) may include other and/oradditional types of information without departing from the invention.

The data cluster component protection policy mappings (112) may includeone or more data structures that specify the protection policy typemappings and backup type mappings associated with each data clustercomponent of the data clusters (120, FIG. 1A). The data clustercomponent protection policy mappings (112) may include other and/oradditional types of information without departing from the invention.

The data cluster topology information repository (114) may be one ormore data structures that include data cluster topology informationassociated with each of the data clusters (120, FIG. 1A). The datacluster topology information may include, for example, the computingresources (e.g., GPUs, CPUs, storage devices, etc.) associated with eachof the data clusters (120, FIG. 1A), computing resource utilizationassociated with each of the data clusters, etc. The data clustertopology information repository may include other and/or additionaltypes of information without departing from the invention.

The persistent storage (106) may be implemented using physical storagedevices and/or logical storage devices. The physical storage devices mayinclude any combination of hard disk drives, solid state disk drives,tape drives, and/or any other physical storage mediums for the storageof data.

The logical storage devices (e.g., virtualized storage) may utilize anyquantity of hardware storage resources of any number of computingdevices for storing data. For example, the persistent storage (106) mayutilize portions of any combination of hard disk drives, solid statedisk drives, tape drives, and/or any other physical storage medium ofany number of computing devices.

FIG. 1C shows a diagram of a data cluster in accordance with one or moreembodiments of the invention. The data cluster may be an embodiment of adata cluster (e.g., 120A, FIG. 1A) of the data clusters (120, FIG. 1A)discussed above. As discussed above, data cluster A (120A) may includethe functionality to perform computer implemented services and obtaindata protection services from the data protection manager (100, FIG.1A). To obtain and perform the aforementioned services, data cluster A(120A) may include a management domain (122) and workload domains (124).Data cluster A (120A) may include any number of workload domains withoutdeparting from the invention. For example, data cluster A (120A) mayinclude workload domain A (124A) and workload domain N (124N).

In one or more embodiments of the invention, the management domain (122)provides management services for data cluster A (120A). The managementservices may include generating information associated with data clusterA (120A) as a result of obtaining data protection services. Themanagement domain (122) may perform and/or obtain other and/oradditional services without departing from the invention. For additionalinformation regarding the management domain (122) refer to FIG. 1D.

In one or more embodiments of the invention, the workload domains (124)obtain management services from the management domain (122), dataprotection services from the data protection manager (100, FIG. 1A), andperform computer implemented services for users. The workload domains(124) may perform and/or obtain other and/or additional services withoutdeparting from the invention. For additional information regarding theworkload domains (124), refer to FIG. 1E.

FIG. 1D shows a diagram of a management domain of a data cluster inaccordance with one or more embodiments of the invention. The managementdomain (122) may be an embodiment of the management domain (122, FIG.1C) discussed above. As discussed above, the management domain (122)provides management services for the workload domains (124, FIG. 1C). Toperform the management services, the management domain (122) may includea data cluster manager (126), management domain components (128), andpersistent storage (130). The management domain (122) may include otherand/or additional components without departing from the invention.

In one or more embodiments of the invention, the data cluster manager(126) includes the functionality to perform the management servicesdiscussed above. The data cluster manager (126) may perform and/orprovide other and/or additional services without departing from theinvention.

In one or more embodiments of the invention, the data cluster manager(126) is implemented as a computing device (discussed above).

In one or more embodiments of the invention, the data cluster manager(126) is a physical device. The physical device may include circuitry.The physical device may be, for example, a field-programmable gatearray, application specific integrated circuit, programmable processor,microcontroller, digital signal processor, or other hardware processor.The physical device may be adapted to provide the functionality of thedata cluster manager (126) described throughout this application.

In one or more embodiments of the invention, the data cluster manager(126) is implemented as computer instructions, e.g., computer code,stored on a persistent storage that when executed by a processor of datacluster A (120A) causes data cluster A (120A) to provide thefunctionality of the data cluster manager (126) described throughoutthis application.

In one or more embodiments of the invention, the management domaincomponents (128) include hardware and software components of the one ormore computing devices associated with data cluster A (120A, FIG. 1A)associated with the management domain (122). The hardware components mayinclude, for example, central processing units, graphical processingunits, storage devices, etc. The hardware components may include otherand/or additional hardware components of computing devices withoutdeparting from the invention. The software components may include, forexample, virtual machines, applications, operating systems, etc. Thesoftware components may include other and/or additional types ofsoftware components of computing devices without departing from theinvention. The management domain components (128) may include a portionof the data cluster components of data cluster A (120A).

The persistent storage (130) may be an embodiment of the persistentstorage (106, FIG. 1B) discussed above. The persistent storage (130) maystore data cluster topology information (132) and data cluster componentinventory information (134). Each of the aforementioned components ofthe persistent storage (130) is discussed below.

The data cluster topology information (132) may be an embodiment of thedata cluster topology information associated with data cluster A (120A)discussed above with respect to the data cluster topology informationrepository (114, FIG. 1B).

The data cluster component inventory information (134) may be anembodiment of the data cluster component inventory informationassociated with data cluster A (120A) discussed above with respect tothe data cluster component inventory repository (108, FIG. 1B).

FIG. 1E shows a diagram of a workload domain of a data cluster inaccordance with one or more embodiments of the invention. Workloaddomain A (124A) may be an embodiment of a workload domain (e.g., 124A,FIG. 1C) discussed above. As discussed above, workload domain A (124)obtains management services and data protection services and providescomputer implemented services for users. To perform and obtain theaforementioned services, workload domain A (124A) may include workloaddomain A components (142), and a persistent storage (144). Workloaddomain A (124A) may include other and/or additional components withoutdeparting from the invention.

In one or more embodiments of the invention, the workload domain Acomponents (142) include hardware and software components of the one ormore computing devices associated with data cluster A (120A, FIG. 1A)associated with workload domain A (124A). The hardware components mayinclude, for example, central processing units, graphical processingunits, storage devices, etc. The hardware components may include otherand/or additional hardware components of computing devices withoutdeparting from the invention. The software components may include, forexample, virtual machines, applications, operating systems, etc. Thesoftware components may include other and/or additional types ofsoftware components of computing devices without departing from theinvention. The workload domain A components (142) may include a portionof the data cluster components of data cluster A (120A).

The persistent storage (144) may be an embodiment of the persistentstorage (106, FIG. 1B) discussed above. The persistent storage (144) maystore workload domain A data (146). The workload domain A data (146) mayinclude data generated and used during the performance of computerimplemented services by workload domain A (124A). The workload domain Adata (146) may include, for example, database data, instant messagingdata, machine learning training data, etc. The workload domain A data(146) may include other and/or additional types of data withoutdeparting from the invention.

FIG. 2A shows a flowchart of a method for mapping protection policies todata cluster components in accordance with one or more embodiments ofthe invention. The method may be performed by, for example, a mappingmodule (102, FIG. 1B) of a data protection manager (100, FIG. 1A). Othercomponents of the system illustrated in FIGS. 1A-1E may perform all, ora portion, of the method of FIG. 2A without departing from theinvention.

While FIG. 2A is illustrated as a series of steps, any of the steps maybe omitted, performed in a different order, additional steps may beincluded, and/or any or all of the steps may be performed in a paralleland/or partially overlapping manner without departing from theinvention.

In step 200, an initial discovery event associated with a data clusteris identified.

In one or more embodiments of the invention, a user of the data clusterand/or the data protection manager sends a message to the mapping moduleof the data protection manager. The message may include a request toperform a data cluster discovery. The message may include communicationinformation. The communication information may include a data clusteridentifier, a data cluster manager identifier, a data cluster managernetwork address, an SFTP server identifier, an SFTP server networkaddress, and security information (e.g., security keys, encryption keys,etc.). The communication information may include other and/or additionalinformation that may be used to communicate with the data cluster andthe data cluster manager of the data cluster associated with the initialdiscovery event without departing from the invention. The message mayinclude other and/or additional information without departing from theinvention. The message may be transmitted to the mapping module usingany appropriate method of data transmission (e.g., network packets,application programming interface (API) calls, etc.) without departingfrom the invention. The mapping module of the data protection managermay identify obtaining the request to perform a data cluster discoveryas the initial discovery event. The initial discovery event associatedwith the data cluster may be identified via other and/or additionalmethods without departing from the invention.

In one or more embodiments of the invention, a data cluster manager of adata cluster sends a message to the mapping module of the dataprotection manager. The message may include a request to register thedata cluster with the data protection manager. The message may includecommunication information. The communication information may include adata cluster identifier, a data cluster manager identifier, a datacluster manager network address, an SFTP server identifier, an SFTPserver network address, and security information (e.g., a security key,an encryption key, etc.). The communication information may includeother and/or additional information that may be used to communicate withthe data cluster and the data cluster manager of the data clusterassociated with the initial discovery event without departing from theinvention. The message may include other and/or additional informationwithout departing from the invention. The message may be transmitted tothe mapping module using any appropriate method of data transmission(e.g., network packets, application programming interface (API) calls,etc.) without departing from the invention. The mapping module of thedata protection manager may identify obtaining the registration requestas the initial discovery event. The initial discovery event associatedwith the data cluster may be identified via other and/or additionalmethods without departing from the invention.

In step 202, a request for currently deployed components is sent to adata cluster manager associated with the data cluster.

In one or more embodiments of the invention, the mapping module of thedata protection manager sends a message to the data cluster manager ofthe data cluster associated with the initial discovery event. Themessage may include a request for currently deployed components of thedata cluster that require data protection. The message may be sent usingthe communication information obtained in step 200. The message mayinclude other and/or additional information without departing from theinvention. The message may be transmitted to the mapping module usingany appropriate method of data transmission (e.g., network packets,application programming interface (API) calls, etc.) without departingfrom the invention. The request for currently deployed component may besent to the data cluster manager associated with the data cluster viaother and/or additional methods without departing from the invention.

The data cluster may include one or more components that are notdiscoverable by the data cluster manager. In such scenarios, in one ormore embodiments of the invention, the mapping module sends a message toa user of the data cluster. The message may include a request forcurrently deployed components of the data cluster that may not bediscoverable by the data cluster manager that require data protection.The message may be sent using the communication information obtained instep 200. The message may include other and/or additional informationwithout departing from the invention. The message may be transmitted tothe user using any appropriate method of data transmission (e.g.,network packets, application programming interface (API) calls, etc.)without departing from the invention.

In step 204, data cluster component inventory information associatedwith the data cluster is obtained from the data cluster manager.

In one or more embodiments of the invention, the mapping module obtainsa message from the data cluster manager of the data cluster. The messagemay include data cluster component inventory information associated withthe data cluster. The message may include other and/or additionalinformation without departing from the invention. In response toobtaining the request of step 202, the data cluster manager may generateand/or obtain the data cluster component inventory information. The datacluster component inventory information may be associated with each datacluster component that is discoverable by the data cluster manager. Themessage may be transmitted to the mapping module using any appropriatemethod of data transmission (e.g., network packets, applicationprogramming interface (API) calls, etc.) without departing from theinvention. The data cluster component inventory information associatedwith the data cluster may be obtained from the data cluster manager viaother and/or additional methods without departing from the invention.

As discussed above, the data cluster may include one or more componentsthat may not be discoverable by the data cluster manager. In suchscenarios, in one or more embodiments of the invention, the mappingmodule obtains a message from the user of the data cluster and/or thedata protection manager. The message may include data cluster componentinventory information associated with the data cluster. The message mayinclude other and/or additional information without departing from theinvention. In response to obtaining the request of step 202, the usermay generate and/or obtain the data cluster component inventoryinformation. The data cluster component inventory information may beassociated with each data cluster component that is not discoverable bythe data cluster manager. The message may be transmitted to the mappingmodule using any appropriate method of data transmission (e.g., networkpackets, application programming interface (API) calls, etc.) withoutdeparting from the invention. The data cluster component inventoryinformation associated with the data cluster may be obtained from theuser via other and/or additional methods without departing from theinvention.

In step 206, protection policy types are mapped to the data clustercomponents using data cluster component inventory information andcomponent data protection information.

In one or more embodiments of the invention, the mapping module uses thedata cluster component inventory and the component data protectioninformation associated with the data cluster components to mapprotection policy types to each data cluster component of the datacluster specified by the data cluster component inventory information.The data cluster component inventory information may include a componentidentifier and a component type associated with each data clustercomponent currently deployed in the data cluster. For each data clustercomponent, the mapping module may identify a portion of the componentdata protection information associated with the component type of thedata cluster component. The component data protection information mayspecify data protection requirements associated with each data clustercomponent type. The component data protection information may alsoinclude the protection policy types that may be mapped to the datacluster components.

The mapping module may compare the data protection requirements of thedata cluster component specified by the component data protectioninformation with the data protection requirements specified by eachprotection policy type. The mapping module may map the protection policytype of the protection policy types that meets the data protectionrequirements associated with data cluster component by associating thedata cluster component identifier with the protection policy type. Theprotection policy types may be mapped to the data cluster componentsusing data cluster component inventory information and component dataprotection information via other and/or additional methods withoutdeparting from the invention.

In step 208, the data cluster component inventory repository is updatedusing the data cluster component inventory information.

In one or more embodiments of the invention, the mapping module updatesthe data cluster component inventory repository using the data clustercomponent inventory information by generating a data cluster componentinventory repository entry associated with the data cluster. The mappingmodule may include the data cluster identifier and the data clustercomponent inventory information associated with each data clustercomponent obtained in step 204 in the entry. The mapping module may alsoinclude the protection policy type mappings associated with each datacluster component in the entry and in the data cluster componentprotection policy mappings. The mapping module may include other and/oradditional information associated with the data cluster components ofthe data cluster in the entry without departing from the invention. Thedata cluster component inventory repository may be updated using thedata cluster component inventory information via other and/or additionalmethods without departing from the invention.

In step 210, the performance of data protection services for the datacluster components is initiated based on the mapped protection policytypes.

In one or more embodiments of the invention, the mapping moduleinitiates the performance of data protection services for the datacluster components using the mapped protection policy types. Asdiscussed above, the protection policy types may include protectionpolicies that specify data protection requirements associated with thedata cluster components. The mapping module may initiate the performanceof data protection services for each data cluster component that satisfythe data protection requirements of each data cluster componentspecified by each mapped protection policy type. The data protectionservices may include generating backups of data cluster componentsaccording to a schedule specified by the mapped protection policy types,storing backups in storage locations specified by the mapped protectionpolicy types, and other and/or additional data protection services thatsatisfy data protection requirements specified by the mapped protectionpolicy types without departing from the invention. The mapping modulemay initiate the performance of the data protection services byrequesting the data protection manager to monitor the protection policytypes mapped to each data cluster component of the data cluster and toperform the data protection services specified by the mapped protectionpolicy types. As a result, the data protection manager may perform thedata protection services. The performance of data protection servicesfor the data cluster components may be initiated based on the mappedprotection policy types via other and/or additional methods withoutdeparting from the invention.

In one or more embodiments of the invention, the method ends followingstep 210.

FIG. 2B shows a flowchart of a method for discovering data clustercomponents in accordance with one or more embodiments of the invention.The method may be performed by, for example, a mapping module (102, FIG.1B) of a data protection manager (100, FIG. 1A). Other components of thesystem illustrated in FIGS. 1A-1E may perform all, or a portion, of themethod of FIG. 2B without departing from the invention.

While FIG. 2B is illustrated as a series of steps, any of the steps maybe omitted, performed in a different order, additional steps may beincluded, and/or any or all of the steps may be performed in a paralleland/or partially overlapping manner without departing from theinvention.

In step 220, a discovery event associated with a data cluster isidentified.

In one or more embodiments of the invention, the mapping module isconfigured to perform periodic discoveries of data cluster componentsfor data clusters that have registered with the data protection manager.The mapping module may monitory the amount of time that has passed sincea previous discovery was performed for a data cluster. The mappingmodule may, after a configurable amount of time has passed since thelast discovery of the data cluster was performed, perform a subsequentdiscovery of the data cluster components of the data cluster. Themapping module may identify the expiration of the configurable amount oftime since the previous discovery was performed as the discovery event.The discovery event associated with the data cluster may be identifiedvia other and/or additional methods without departing from theinvention.

In one or more embodiments of the invention, a user of the data clusterand/or the data protection manager sends a message to the mapping moduleof the data protection manager. The message may include a request toperform a data cluster discovery. The message may include communicationinformation. The communication information may include a data clusteridentifier, a data cluster manager identifier, a data cluster managernetwork address, an SFTP server identifier, an SFTP server networkaddress, and security information (e.g., security keys, encryption keys,etc.). The communication information may include other and/or additionalinformation that may be used to communicate with the data cluster andthe data cluster manager of the data cluster associated with the initialdiscovery event without departing from the invention. The message mayinclude other and/or additional information without departing from theinvention. The message may be transmitted to the mapping module usingany appropriate method of data transmission (e.g., network packets,application programming interface (API) calls, etc.) without departingfrom the invention. The mapping module of the data protection managermay identify obtaining the request to perform a data cluster discoveryas the discovery event. The initial discovery event associated with thedata cluster may be identified via other and/or additional methodswithout departing from the invention.

In one or more embodiments of the invention, a data cluster manager of adata cluster sends a message to the mapping module of the dataprotection manager. The message may include a request to register thedata cluster with the data protection manager. The message may includecommunication information. The communication information may include adata cluster identifier, a data cluster manager identifier, a datacluster manager network address, an SFTP server identifier, an SFTPserver network address, and security information (e.g., a security key,an encryption key, etc.). The communication information may includeother and/or additional information that may be used to communicate withthe data cluster and the data cluster manager of the data clusterassociated with the initial discovery event without departing from theinvention. The message may include other and/or additional informationwithout departing from the invention. The message may be transmitted tothe mapping module using any appropriate method of data transmission(e.g., network packets, application programming interface (API) calls,etc.) without departing from the invention. The mapping module of thedata protection manager may identify obtaining the registration requestas the discovery event. The initial discovery event associated with thedata cluster may be identified via other and/or additional methodswithout departing from the invention.

In step 222, a request for currently deployed components is sent to adata cluster manager associated with the data cluster.

In one or more embodiments of the invention, the mapping module of thedata protection manager sends a message to the data cluster manager ofthe data cluster associated with the initial discovery event. Themessage may include a request for currently deployed components of thedata cluster that require data protection. The message may be sent usingthe communication information. The message may include other and/oradditional information without departing from the invention. The messagemay be transmitted to the mapping module using any appropriate method ofdata transmission (e.g., network packets, application programminginterface (API) calls, etc.) without departing from the invention. Therequest for currently deployed component may be sent to the data clustermanager associated with the data cluster via other and/or additionalmethods without departing from the invention.

The data cluster may include one or more components that are notdiscoverable by the data cluster manager. In such scenarios, in one ormore embodiments of the invention, the mapping module sends a message toa user of the data cluster. The message may include a request forcurrently deployed components of the data cluster that may not bediscoverable by the data cluster manager that require data protection.The message may be sent using the communication information. The messagemay include other and/or additional information without departing fromthe invention. The message may be transmitted to the user using anyappropriate method of data transmission (e.g., network packets,application programming interface (API) calls, etc.) without departingfrom the invention.

In step 224, data cluster component inventory information associatedwith the data cluster is obtained from the data cluster manager.

In one or more embodiments of the invention, the mapping module obtainsa message from the data cluster manager of the data cluster. The messagemay include data cluster component inventory information associated withthe data cluster. The message may include other and/or additionalinformation without departing from the invention. In response toobtaining the request of step 202, the data cluster manager may generateand/or obtain the data cluster component inventory information. The datacluster component inventory information may be associated with each datacluster component that is discoverable by the data cluster manager. Themessage may be transmitted to the mapping module using any appropriatemethod of data transmission (e.g., network packets, applicationprogramming interface (API) calls, etc.) without departing from theinvention. The data cluster component inventory information associatedwith the data cluster may be obtained from the data cluster manager viaother and/or additional methods without departing from the invention.

As discussed above, the data cluster may include one or more componentsthat may not be discoverable by the data cluster manager. In suchscenarios, in one or more embodiments of the invention, the mappingmodule obtains a message from the user of the data cluster and/or thedata protection manager. The message may include data cluster componentinventory information associated with the data cluster. The message mayinclude other and/or additional information without departing from theinvention. In response to obtaining the request of step 202, the usermay generate and/or obtain the data cluster component inventoryinformation. The data cluster component inventory information may beassociated with each data cluster component that is not discoverable bythe data cluster manager. The message may be transmitted to the mappingmodule using any appropriate method of data transmission (e.g., networkpackets, application programming interface (API) calls, etc.) withoutdeparting from the invention. The data cluster component inventoryinformation associated with the data cluster may be obtained from theuser via other and/or additional methods without departing from theinvention.

In step 226, a determination is made as to whether there is a change inthe currently deployed data cluster components.

In one or more embodiments of the invention, the mapping moduledetermines whether there is change in the currently deployed datacluster component of the data cluster using the data cluster componentinventory information obtained in step 224 and the data clustercomponent inventory repository. The data cluster component inventoryrepository may include an entry associated with the data cluster. Themapping module may identify the entry associated with the data clusterusing the data cluster identifier associated with the data cluster. Theentry may include a list of data cluster components deployed in the datacluster at the time of the previous discovery event. The data clustercomponent inventory information may include a list of data clustercomponents currently deployed in the data cluster. The mapping modulemay compare the list of previously deployed data cluster components withthe list of currently deployed data cluster components.

If the list of currently deployed data cluster components does not matchthe list of previously deployed data cluster components, then themapping module may determine that there is a change in the currentlydeployed data cluster components. If the list of currently deployed datacluster components matches the list of previously deployed data clustercomponents, then the mapping module may determine that there is not achange in the currently deployed data cluster components. Thedetermination as to whether there is a change in the currently deployeddata cluster components may be made via other and/or additional methodswithout departing from the invention.

In one or more embodiments of the invention, if it is determined thatthere is a change in the currently deployed data cluster components,then the method proceeds to step 228. In one or more embodiments of theinvention, if it is determined that there is not a change in thecurrently deployed data cluster components, then the method endsfollowing step 226.

In step 228, a determination is made as to whether the changed deployeddata cluster components include newly deployed data cluster components.

In one or more embodiments of the invention, the mapping module maydetermine whether the changed deployed data cluster components includenewly deployed data cluster components using the data cluster componentinventory repository and the data cluster component inventoryinformation obtained in step 224. The data cluster component inventoryrepository may include an entry associated with the data cluster. Themapping module may identify the entry associated with the data clusterusing the data cluster identifier associated with the data cluster. Theentry may include a list of data cluster components (i.e., data clustercomponent identifiers) deployed in the data cluster at the time of theprevious discovery event. The data cluster component inventoryinformation may include a list of data cluster components (i.e., datacluster component identifiers) currently deployed in the data cluster.The mapping module may compare the list of previously deployed datacluster components with the list of currently deployed data clustercomponents.

If the list of currently deployed data cluster components includes oneor more data cluster components not included in the list of previouslydeployed data cluster components, then the mapping module may determinethat the changed deployed data cluster components includes newlydeployed data cluster components. If the list of currently deployed datacluster components does not include one or more data cluster componentsnot included in the list of previously deployed data cluster components,then the mapping module may determine that the changed deployed datacluster components includes newly deployed data cluster components. Thedetermination as to whether the changed deployed data cluster componentsinclude newly deployed data cluster components may be made via otherand/or additional methods without departing from the invention.

In one or more embodiments of the invention, if it is determined thatthe changed deployed data cluster components include newly deployed datacluster components, then the method proceeds to step 230. In one or moreembodiments of the invention, if it is determined that the changeddeployed data cluster components does not include newly deployed datacluster components, then the method ends following step 232.

In step 230, protection policies are mapped to the newly deployed datacluster components using data cluster component inventory informationand component data protection information.

In one or more embodiments of the invention, the mapping module uses thedata cluster component inventory and the component data protectioninformation associated with the data cluster components to mapprotection policy types to each newly deployed data cluster component ofthe data cluster specified by the data cluster component inventoryinformation. The data cluster component inventory information includes acomponent identifier and a component type associated with each datacluster component currently deployed in the data cluster. The mappingmodule may identify all data cluster components included in list ofcurrently deployed data components and not included in the list ofpreviously deployed components as the newly deployed data clustercomponents.

For each newly deployed data cluster component, the mapping module mayidentify a portion of the component data protection informationassociated with the component type of the data cluster component. Thecomponent data protection information may specify data protectionrequirements associated with each data cluster component type. Thecomponent data protection information may also include the protectionpolicy types that may be mapped to the data cluster components. Themapping module may compare the data protection requirements of the datacluster component type specified by the component data protectioninformation with the data protection requirements specified by eachprotection policy type. The mapping module may map the protection policytype of the protection policy types that meets the data protectionrequirements associated with the newly deployed data cluster componentby associating the data cluster component identifier of the newlydeployed data cluster component with the protection policy type. Theprotection policy types may be mapped to the newly deployed data clustercomponents using data cluster component inventory information andcomponent data protection information via other and/or additionalmethods without departing from the invention.

In step 232, a determination is made as to whether the changed deployeddata cluster components include previously deployed data clustercomponents.

In one or more embodiments of the invention, the mapping module maydetermine whether the changed deployed data cluster components includepreviously deployed data cluster components using the data clustercomponent inventory repository and the data cluster component inventoryinformation obtained in step 224. The data cluster component inventoryrepository may include an entry associated with the data cluster. Themapping module may identify the entry associated with the data clusterusing the data cluster identifier associated with the data cluster. Theentry may include a list of data cluster components (i.e., data clustercomponent identifiers) deployed in the data cluster at the time of theprevious discovery event. The entry may also include a list of datacluster components that were deployed in the data cluster at any pointin the past that were removed from the data cluster. The data clustercomponent inventory information may include a list of data clustercomponents (i.e., data cluster component identifiers) currently deployedin the data cluster. The mapping module may compare the list ofpreviously deployed data cluster components with the list of currentlydeployed data cluster components.

If the list of currently deployed data cluster components includes oneor more data cluster components included in the list of data clustercomponents that were deployed in the data cluster at any point in thepast that were removed from the data cluster, then the mapping modulemay determine that the changed deployed data cluster components includespreviously deployed data cluster components. If the list of currentlydeployed data cluster components does not include one or more datacluster components included in the list of data cluster components thatwere deployed in the data cluster at any point in the past that wereremoved from the data cluster, then the mapping module may determinethat the changed deployed data cluster components do not includepreviously deployed data cluster components. The determination as towhether the changed deployed data cluster components include previouslydeployed data cluster components may be made via other and/or additionalmethods without departing from the invention.

In one or more embodiments of the invention, if it is determined thatthe changed deployed data cluster components include previously deployeddata cluster components, then the method proceeds to step 234. In one ormore embodiments of the invention, if it is determined that the changeddeployed data cluster components does not include previously deployeddata cluster components, then the method ends following step 236.

In step 234, protection policy types are mapped to the previouslydeployed data cluster components using previously mapped data protectionpolicies.

In one or more embodiments of the invention, the mapping module uses thedata cluster inventory information repository to map the protectionpolicy types to the previously deployed data cluster components. Thedata cluster component inventory repository may include an entryassociated with the data cluster. The mapping module may identify theentry associated with the data cluster using the data cluster identifierassociated with the data cluster. The entry may include a list of datacluster components (i.e., data cluster component identifiers) deployedin the data cluster at the time of the previous discovery event. Eachdata cluster components included in the aforementioned list may also beassociated with the protection policy type that was previously mapped tothe data cluster component. The mapping module may map the previouslymapped protection policy type to each previously deployed data clustercomponent by associated the data cluster component identifier of eachpreviously deployed data cluster component with the protection policytype specified in the data cluster component inventory repository entry.Protection policy types may be mapped to the previously deployed datacluster components using previously mapped data protection policy typesvia other and/or additional methods without departing from theinvention.

In step 236, the data cluster component inventory repository is updatedusing the data cluster component inventory information.

In one or more embodiments of the invention, the mapping module updatesthe data cluster component inventory repository using the data clustercomponent inventory information by updating a data cluster componentinventory repository entry associated with the data cluster. The mappingmodule may identify the entry associated with the data cluster using thedata cluster identifier. The mapping module may update the list ofcurrently deployed data cluster components by including newly deployeddata cluster components and/or previously deployed data clustercomponents and deleting removed data cluster components. The mappingmodule may add the removed data cluster components to the list of datacluster components that were deployed in the data cluster at any pointin the past that were removed from the data cluster. The mapping modulemay also include the protection policy type mappings associated witheach newly deployed data cluster component in the entry. The mappingmodule may include other and/or additional information associated withthe data cluster components of the data cluster in the entry withoutdeparting from the invention. The data cluster component inventoryrepository may be updated using the data cluster component inventoryinformation via other and/or additional methods without departing fromthe invention.

In step 238, the performance of data protection services for the newlydeployed data cluster components is initiated based on the mappedprotection policies.

In one or more embodiments of the invention, the mapping moduleinitiates the performance of data protection services for the newlydeployed data cluster components using the mapped protection policytypes. The protection policy types may include protection policies thatspecify data protection requirements associated with the data clustercomponents. The mapping module may initiate the performance of dataprotection services for each newly deployed data cluster component thatsatisfy the data protection requirements of each data cluster componentspecified by each mapped protection policy type. The mapping module maycancel and/or other stop performing at least a portion of the dataprotection services associated with data cluster components that wereremoved from the data cluster.

The data protection services may include generating backups of datacluster components according to a schedule specified by the mappedprotection policy types, storing backups in storage locations specifiedby the mapped protection policy types, and other and/or additional dataprotection services that satisfy data protection requirements specifiedby the mapped protection policy types without departing from theinvention. The mapping module may initiate the performance of the dataprotection services by requesting the data protection manager to monitorthe protection policy types mapped to each data cluster component of thedata cluster and to perform the data protection services specified bythe mapped protection policy types. As a result, the data protectionmanager may perform the data protection services. The performance ofdata protection services for the newly deployed data cluster componentsmay be initiated based on the mapped protection policy types via otherand/or additional methods without departing from the invention.

In one or more embodiments of the invention, the method ends followingstep 238.

FIG. 2C shows a diagram of a method for mapping data protection servicesto data cluster components in accordance with one or more embodiments ofthe invention. The method may be performed by, for example, a data typemodule (104, FIG. 1B) of a data protection manager (100, FIG. 1A). Othercomponents of the system illustrated in FIGS. 1A-1E may perform all, ora portion, of the method of FIG. 2C without departing from theinvention.

While FIG. 2C is illustrated as a series of steps, any of the steps maybe omitted, performed in a different order, additional steps may beincluded, and/or any or all of the steps may be performed in a paralleland/or partially overlapping manner without departing from theinvention.

In step 240, a discovery event associated with a data cluster isidentified.

In one or more embodiments of the invention, the mapping module isconfigured to perform periodic discoveries of data cluster componentsfor data clusters that have registered with the data protection manager.The mapping module may monitory the amount of time that has passed sincea previous discovery was performed for a data cluster. The mappingmodule may, after a configurable amount of time has passed since thelast discovery of the data cluster was performed, perform a subsequentdiscovery of the data cluster components of the data cluster. Themapping module may identify the expiration of the configurable amount oftime since the previous discovery was performed as the discovery event.The discovery event associated with the data cluster may be identifiedvia other and/or additional methods without departing from theinvention.

In one or more embodiments of the invention, a user of the data clusterand/or the data protection manager sends a message to the mapping moduleof the data protection manager. The message may include a request toperform a data cluster discovery. The message may include communicationinformation. The communication information may include a data clusteridentifier, a data cluster manager identifier, a data cluster managernetwork address, an SFTP server identifier, an SFTP server networkaddress, and security information (e.g., security keys, encryption keys,etc.). The communication information may include other and/or additionalinformation that may be used to communicate with the data cluster andthe data cluster manager of the data cluster associated with the initialdiscovery event without departing from the invention. The message mayinclude other and/or additional information without departing from theinvention. The message may be transmitted to the mapping module usingany appropriate method of data transmission (e.g., network packets,application programming interface (API) calls, etc.) without departingfrom the invention. The mapping module of the data protection managermay identify obtaining the request to perform a data cluster discoveryas the discovery event. The initial discovery event associated with thedata cluster may be identified via other and/or additional methodswithout departing from the invention.

In one or more embodiments of the invention, a data cluster manager of adata cluster sends a message to the mapping module of the dataprotection manager. The message may include a request to register thedata cluster with the data protection manager. The message may includecommunication information. The communication information may include adata cluster identifier, a data cluster manager identifier, a datacluster manager network address, an SFTP server identifier, an SFTPserver network address, and security information (e.g., a security key,an encryption key, etc.). The communication information may includeother and/or additional information that may be used to communicate withthe data cluster and the data cluster manager of the data clusterassociated with the initial discovery event without departing from theinvention. The message may include other and/or additional informationwithout departing from the invention. The message may be transmitted tothe mapping module using any appropriate method of data transmission(e.g., network packets, application programming interface (API) calls,etc.) without departing from the invention. The mapping module of thedata protection manager may identify obtaining the registration requestas the discovery event. The initial discovery event associated with thedata cluster may be identified via other and/or additional methodswithout departing from the invention.

In step 242, a request for currently deployed components is sent to adata cluster manager associated with the data cluster.

In one or more embodiments of the invention, the mapping module of thedata protection manager sends a message to the data cluster manager ofthe data cluster associated with the initial discovery event. Themessage may include a request for currently deployed components of thedata cluster that require data protection. The message may be sent usingthe communication information. The message may include other and/oradditional information without departing from the invention. The messagemay be transmitted to the mapping module using any appropriate method ofdata transmission (e.g., network packets, application programminginterface (API) calls, etc.) without departing from the invention. Therequest for currently deployed component may be sent to the data clustermanager associated with the data cluster via other and/or additionalmethods without departing from the invention.

The data cluster may include one or more components that are notdiscoverable by the data cluster manager. In such scenarios, in one ormore embodiments of the invention, the mapping module sends a message toa user of the data cluster. The message may include a request forcurrently deployed components of the data cluster that may not bediscoverable by the data cluster manager that require data protection.The message may be sent using the communication information. The messagemay include other and/or additional information without departing fromthe invention. The message may be transmitted to the user using anyappropriate method of data transmission (e.g., network packets,application programming interface (API) calls, etc.) without departingfrom the invention.

In step 244, data cluster component inventory information associatedwith the data cluster is obtained from the data cluster manager.

In one or more embodiments of the invention, the mapping module obtainsa message from the data cluster manager of the data cluster. The messagemay include data cluster component inventory information associated withthe data cluster. The message may include other and/or additionalinformation without departing from the invention. In response toobtaining the request, the data cluster manager may generate and/orobtain the data cluster component inventory information. The datacluster component inventory information may be associated with each datacluster component that is discoverable by the data cluster manager. Themessage may be transmitted to the mapping module using any appropriatemethod of data transmission (e.g., network packets, applicationprogramming interface (API) calls, etc.) without departing from theinvention. The data cluster component inventory information associatedwith the data cluster may be obtained from the data cluster manager viaother and/or additional methods without departing from the invention.

As discussed above, the data cluster may include one or more componentsthat may not be discoverable by the data cluster manager. In suchscenarios, in one or more embodiments of the invention, the mappingmodule obtains a message from the user of the data cluster and/or thedata protection manager. The message may include data cluster componentinventory information associated with the data cluster. The message mayinclude other and/or additional information without departing from theinvention. In response to obtaining the request, the user may generateand/or obtain the data cluster component inventory information. The datacluster component inventory information may be associated with each datacluster component that is not discoverable by the data cluster manager.The message may be transmitted to the mapping module using anyappropriate method of data transmission (e.g., network packets,application programming interface (API) calls, etc.) without departingfrom the invention. The data cluster component inventory informationassociated with the data cluster may be obtained from the user via otherand/or additional methods without departing from the invention.

In step 246, protection policies are mapped to the data clustercomponents using data cluster component inventory information andcomponent data protection information.

In one or more embodiments of the invention, the mapping module uses thedata cluster component inventory and the component data protectioninformation associated with the data cluster components to mapprotection policy types to each data cluster component of the datacluster specified by the data cluster component inventory information.The data cluster component inventory information includes a componentidentifier and a component type associated with each data clustercomponent currently deployed in the data cluster. For each data clustercomponent, the mapping module may identify a portion of the componentdata protection information associated with the component type of thedata cluster component. The component data protection information mayspecify data protection requirements associated with each data clustercomponent type. The component data protection information may alsoinclude the protection policy types that may be mapped to the datacluster components.

The mapping module may compare the data protection requirements of thedata cluster component specified by the component data protectioninformation with the data protection requirements specified by eachprotection policy type. The mapping module may map the protection policytype of the protection policy types that meets the data protectionrequirements associated with data cluster component by associating thedata cluster component identifier with the protection policy type. Theprotection policy types may be mapped to the data cluster componentsusing data cluster component inventory information and component dataprotection information via other and/or additional methods withoutdeparting from the invention.

In step 248, backup types are mapped to the data cluster componentsusing data cluster component inventory information and component dataprotection information.

In one or more embodiments of the invention, the data type module of thedata protection manager uses the data cluster component inventoryinformation and the component data protection information to map backuptypes to the data cluster components. The data cluster componentinventory information may include data types associated with eachcurrently deployed data cluster component. The data cluster componentinventory may also include data change rates associated with eachcurrently deployed data cluster component. The component data protectioninformation may also specify data types associated with each datacluster component type. The component data protection information mayinclude backup types that specify data type requirements associated witheach backup type. The backup types may include full backups, incrementalbackups, snapshots, block-based backups, file-based backups, image-basedbackups, and/or other and/or additional backup types without departingfrom the invention. Each backup type may be associated with a differentdata type and/or data change rates. For each currently deployed datacluster component, the data type module may compare the data type andchange rate specified by the data cluster component inventoryinformation with the backup type requirements of the backup types. Thedata type module may map a backup type associated with backup typerequirements that match the data type and change rate associated witheach currently deployed component. The backup types may be mapped to thedata cluster components using data cluster component inventoryinformation and component data protection information via other and/oradditional methods without departing from the invention.

In step 250, the data cluster component inventory repository is updatedusing the data cluster component inventory information.

In one or more embodiments of the invention, the mapping module updatesthe data cluster component inventory repository using the data clustercomponent inventory information by updating a data cluster componentinventory repository entry associated with the data cluster. The mappingmodule may identify the entry associated with the data cluster using thedata cluster identifier. The mapping module may update the list ofcurrently deployed data cluster components by including newly deployeddata cluster components and/or previously deployed data clustercomponents and deleting removed data cluster components. The mappingmodule may add the removed data cluster components to the list of datacluster components that were deployed in the data cluster at any pointin the past that were removed from the data cluster. The mapping modulemay also include the protection policy type mappings associated witheach newly deployed data cluster component in the entry. The mappingmodule may include other and/or additional information associated withthe data cluster components of the data cluster in the entry withoutdeparting from the invention. The data cluster component inventoryrepository may be updated using the data cluster component inventoryinformation via other and/or additional methods without departing fromthe invention.

In step 252, the performance of data protection services for the datacluster components is initiated based on the mapped protection policiesand the mapped backup types.

In one or more embodiments of the invention, the mapping moduleinitiates the performance of data protection services for the newlydeployed data cluster components using the mapped protection policytypes and the mapped backup types. The protection policy types mayinclude protection policies that specify data protection requirementsassociated with the data cluster components. The backup types mayinclude backups associated with specific data type requirements. Themapping module may initiate the performance of data protection servicesfor each newly deployed data cluster component that satisfy the dataprotection requirements and the data type requirements of each datacluster component. The mapping module may cancel and/or other stopperforming at least a portion of the data protection services associatedwith data cluster components that were removed from the data cluster.

The data protection services may include generating backups of datacluster components according to a schedule specified by the mappedprotection policy types, generating specific types of backups based onthe mapped backup types, storing backups in storage locations specifiedby the mapped protection policy types, and other and/or additional dataprotection services that satisfy data protection requirements and datatype requirements specified by the mapped protection policy types andthe mapped backup types without departing from the invention. Themapping module may initiate the performance of the data protectionservices by requesting the data protection manager to monitor theprotection policy types mapped to each data cluster component of thedata cluster and to perform the data protection services specified bythe mapped protection policy types. As a result, the data protectionmanager may perform the data protection services. The performance ofdata protection services for the newly deployed data cluster componentsmay be initiated based on the mapped protection policy types and themapped backup types via other and/or additional methods withoutdeparting from the invention.

In one or more embodiments of the invention, the method ends followingstep 252.

FIG. 2D shows a diagram of a method for discovering data clustertopologies in accordance with one or more embodiments of the invention.The method may be performed by, for example, a data protection manager(100, FIG. 1A). Other components of the system illustrated in FIGS.1A-1E may perform all, or a portion, of the method of FIG. 2D withoutdeparting from the invention.

While FIG. 2D is illustrated as a series of steps, any of the steps maybe omitted, performed in a different order, additional steps may beincluded, and/or any or all of the steps may be performed in a paralleland/or partially overlapping manner without departing from theinvention.

In step 260, a discovery event associated with a data cluster isidentified.

The discovery event associated with the data cluster may be identifiedusing the methods of step 240 of FIG. 2C discussed above.

In step 262, data cluster component inventory information associatedwith the data cluster is obtained.

The data cluster component inventory information associated with thedata cluster may be obtained using the methods of steps 242 and 244 ofFIG. 2C discussed above.

In step 264, data cluster topology information associated with the datacluster is obtained.

In one or more embodiments of the invention, a mapping module of thedata protection manager sends a message to the data cluster manager ofthe data cluster associated with the initial discovery event. Themessage may include a request for data cluster topology informationassociated with the data cluster. The message may be sent using thecommunication information obtained in step 260. The message may includeother and/or additional information without departing from theinvention. The message may be transmitted to the data cluster managerusing any appropriate method of data transmission (e.g., networkpackets, application programming interface (API) calls, etc.) withoutdeparting from the invention. The request for client topologyinformation associated with the data cluster may be sent to the datacluster manager associated with the data cluster via other and/oradditional methods without departing from the invention.

In one or more embodiments of the invention, the mapping module obtainsa message from the data cluster manager of the data cluster. The messagemay include data cluster topology information associated with the datacluster. The message may include other and/or additional informationwithout departing from the invention. In response to obtaining therequest, the data cluster manager may generate and/or obtain the datacluster topology information. The message may be transmitted to themapping module using any appropriate method of data transmission (e.g.,network packets, application programming interface (API) calls, etc.)without departing from the invention. The data cluster topologyinformation associated with the data cluster may be obtained from thedata cluster manager via other and/or additional methods withoutdeparting from the invention.

In step 266, protection policy types and backup types are mapped to thedata cluster components using data cluster component inventoryinformation and component data protection information.

Protection policy types and backup types may be mapped to the datacluster components using the methods of steps 246 and 248 of FIG. 2Cdiscussed above.

In step 268, the data cluster component inventory repository is updatedusing the data cluster component inventory information.

The data cluster component inventory repository may be updated using themethods of step 250 of FIG. 2C discussed above.

In step 270, the data cluster topology information repository is updatedusing the data cluster topology information.

In one or more embodiments of the invention, the mapping module updatesthe data cluster topology information repository using the data clustertopology information by generating or updating a data cluster componenttopology information repository entry associated with the data cluster.The mapping module may identify the entry associated with the datacluster using the data cluster identifier. The mapping module mayinclude the resource identifiers and the resource information associatedwith the resources of the data cluster specified by the data clustertopology information in the entry. The mapping module may include otherand/or additional information associated with the data cluster topologyof the data cluster in the entry without departing from the invention.The data cluster topology information repository may be updated usingthe data cluster topology information via other and/or additionalmethods without departing from the invention.

In step 272, the performance of data protection services for the datacluster components is initiated based on the mapped protection policiesand the mapped backup types.

The performance of data protection services for the data clustercomponents may be initiated based on the mapped protection policy typesand the mapped backup types using the methods of step 252 of FIG. 2Cdiscussed above.

In one or more embodiments of the invention, the method ends followingstep 272.

FIG. 2E shows a diagram of a method for restoring a data cluster inaccordance with one or more embodiments of the invention. The method maybe performed by, for example, a data type module (104, FIG. 1B) of adata protection manager (100, FIG. 1A). Other components of the systemillustrated in FIGS. 1A-1E may perform all, or a portion, of the methodof FIG. 2E without departing from the invention.

While FIG. 2E is illustrated as a series of steps, any of the steps maybe omitted, performed in a different order, additional steps may beincluded, and/or any or all of the steps may be performed in a paralleland/or partially overlapping manner without departing from theinvention.

In step 280, a migration event associated with a first data cluster isidentified.

In one or more embodiments of the invention, a user of the data clusterand/or the data protection manager sends a message to the dataprotection manager. The message may include a request to migrate thefirst data cluster. The message may include communication information. Adata cluster may be migrated to duplicate a data cluster, to move a datacluster, to restore a data cluster, or other and/or additional purposeswithout departing from the invention. The message may include otherand/or additional information without departing from the invention. Themessage may be transmitted to the data protection manager using anyappropriate method of data transmission (e.g., network packets,application programming interface (API) calls, etc.) without departingfrom the invention. The data protection manager may identify obtainingthe request as the migration event. The migration event associated withthe first data cluster may be identified via other and/or additionalmethods without departing from the invention.

In step 282, a second data cluster capable of hosting the first datacluster is identified using data cluster topology information and datacluster component inventory information associated with the first datacluster.

In one or more embodiments of the invention, the data protection manageruses data cluster topology information associated with the first datacluster to identify the second data cluster capable of hosting the firstdata cluster. The data protection manager may use the data clusteridentifier associated with the first data cluster to identify the datacluster topology information repository entry associated with the firstdata cluster. The data protection manager may use the data clusteridentifier to identify a data cluster component inventory entryassociated with the first data cluster. The data cluster componentinventory entry may specify the data cluster components of the firstdata cluster. Additionally, the data cluster topology informationrepository entry specifies the resources of the first data cluster. Thedata cluster topology information repository entry may further includeresource information associated with the resources of the first datacluster. The resource information may specify the resource types,resource performance characteristics, resource availability, theresources associated with each data cluster component of the first datacluster specified by the data cluster component inventory information,and other and/or additional information regarding the resources of thefirst data cluster.

The data protection manager may compare the data cluster topologyinformation associated with the first data cluster with the data clustertopology information associated with other data clusters included in thedata cluster topology information repository. The data cluster mayidentify a data cluster that is associated with data cluster topologyinformation that indicates that the second data cluster includes atleast the resources to host and/or instantiate the first data clustercomponents. The identified data cluster may be identified as the seconddata cluster. The second data cluster capable of hosting the first datacluster may be identified using data cluster topology information anddata cluster component inventory information associated with the firstdata cluster

In step 284, a dependency map associated with the first data cluster isgenerated.

In one or more embodiments of the invention, the data protection managergenerates a dependency map using the data cluster component inventoryinformation included in the data cluster component inventory repositoryentry associated with the first data cluster. The data cluster componentinventory may include dependency information. The dependency informationmay specify, for each component, all data cluster components upon whichthey are dependent. The data protection manager may use the dependencyinformation to generate the dependency map. As a result, the dependencymap may specify a hierarchical structure of data cluster componentdependencies. The dependency map associated with the first data clustercomponent may be generated via other and/or additional methods withoutdeparting from the invention.

In step 286, a migration sequence is identified based on the dependencymap.

In one or more embodiments of the invention, the data protection manageridentifies the migration sequence using the dependency map. As discussedabove, the dependency map may include a hierarchical structure of datacluster dependencies. The data protection manager may put data clustercomponents at the top of dependency map in a higher position in themigration sequence. In other words, a data cluster component upon whichother data cluster components are dependent may be migrated before thedata cluster components that are dependent upon the aforementioned datacluster component. Additionally, data cluster components that have ahigher number of dependent data cluster components may be put in ahigher migration sequence position in the migration sequence than datacluster components that have a lower number of dependent data clustercomponents. The migration sequence may be identified based on thedependency map via other and/or additional methods without departingfrom the invention.

In step 288, data cluster components of the second data cluster areinitiated to perform a migration of the first data cluster.

In one or more embodiments of the invention, the data protection managermay initiate data cluster components of the second data cluster toperform a migration. The data protection manager may initiate the datacluster components of the second data cluster components to performmigration by allocating resources to data cluster components. The dataprotection manager may use data cluster topology information associatedwith first data cluster to allocate resources to the data clustercomponents of the second data cluster as indicated by the data clustertopology information associated with the first data cluster. The dataprotection manager may generate instructions for allocating theresources of the second data cluster, encapsulate the instructions in amessage, and send the message to data cluster manager of the second datacluster. To allocate the resources, the data cluster manager mayvirtualize any number of data cluster components using the resources ofthe second data cluster components and/or otherwise modify the operationof any number of resources of the second data cluster to instantiate thedata cluster components of the first data cluster. The data clustercomponents of the second data cluster may be initiated to performmigration of the first data cluster via other and/or additional methodswithout departing from the invention.

In step 290, the first data cluster is migrated using the second datacluster.

In one or more embodiments of the invention, the data protection managerinitiates the instantiation of the data cluster components of the firstdata cluster using the allocated resources of the second data cluster tomigrate the first data cluster to the second data cluster. The dataprotection manager may send a message to the data cluster manager of thesecond data cluster. The message may include a request to instantiatethe data cluster components of the first data cluster using theallocated resources of the second data cluster. The message may alsoinclude the update sequence. In response to obtaining the message, thedata cluster manager may instantiate the data cluster components of thefirst data cluster using the allocated resources of the second datacluster in the order specified by the update sequence. As a result, thefirst data cluster may be migrated to the second data cluster. The firstdata cluster may be migrated using the second data cluster via otherand/or additional methods without departing from the invention.

In one or more embodiments of the invention, the method ends followingstep 290.

To further clarify embodiments of the invention, non-limiting examplesare provided in FIGS. 3-6 . FIGS. 3-6 show diagrams of operations ofexample systems over time. FIGS. 3-6 may show a system similar to thatillustrated in FIG. 1A. Actions performed by components of the systemare illustrated by numbered, circular boxes interconnected with arrowedlines. For the sake of brevity, only a limited number of componentsillustrated in FIG. 1A are illustrated in FIGS. 3-6

EXAMPLES

FIG. 3 shows a diagram of the operation of a first example system overtime in accordance with one or more embodiments of the invention.Turning to FIG. 3 , consider a scenario in which data cluster A (120A)is provisioned and has just registered with a data protection manager(100). The data protection manager (100) includes a mapping module (102)and a persistent storage (106). At step 1, the mapping module (102) ofthe data protection manager (100) obtains a request to perform aninitial discovery of data cluster components associated with datacluster A (120A). In response to obtaining the request to perform aninitial discovery of data cluster components, at step 2, the mappingmodule (102) sends a message to a data cluster manager (not shown) ofdata cluster A (120A). The message includes a request for currentlydeployed data cluster components of data cluster A (120A).

In response to obtaining the request, the data cluster manager generatesand/or obtains data cluster component inventory information associatedwith data cluster A (120A). After generating and/or obtaining the datacluster component inventory information, at step 3, the data clustermanager sends the data cluster component inventory information to themapping module (102). At step 4, the mapping module (102) obtainscomponent data protection information. At step 5, the mapping moduleuses the data cluster component inventory information and the componentdata protection information to map protection policies to the datacluster components of data cluster A (120A) resulting in data clustercomponent protection policy mappings associated with data cluster A(120A).

The data cluster component inventory information may specify the datacluster components currently deployed in data cluster A (120A). Thecomponent data protection information may specify, for each type ofcomponent, a data protection policy recommended by each type ofcomponent by a manufacturer of the component or configured by a user ofdata cluster A (120A). The mapping module (102) then, at step 6, updatesthe data cluster component inventory repository stored in the persistentstorage (106) with the data cluster component inventory informationassociated with data cluster A (120A) and stores the data clustercomponent protection policy mappings associated with data cluster A(120A) in the persistent storage (106). At step 7, the mapping module(102) initiates the performance of data protection services for the datacluster components of data cluster A (120A) based on the data clustercomponent protection policy mappings associated with data cluster A(120A).

FIG. 4 shows a diagram of the operation of a second example system overtime in accordance with one or more embodiments of the invention.Turning to FIG. 4 , consider a scenario in which data cluster A (120A)is provisioned and has just registered with a data protection manager(100). The data protection manager (100) includes a mapping module (102)and a persistent storage (106). At step 1, the mapping module (102) ofthe data protection manager (100) obtains a request to perform aninitial discovery of data cluster components associated with datacluster A (120A). In response to obtaining the request to perform aninitial discovery of data cluster components, at step 2, the mappingmodule (102) sends a message to a data cluster manager (not shown) ofdata cluster A (120A). The message includes a request for currentlydeployed data cluster components of data cluster A (120A).

In response to obtaining the request, the data cluster manager generatesand/or obtains data cluster component inventory information associatedwith data cluster A (120A). After generating and/or obtaining the datacluster component inventory information, at step 3, the data clustermanager sends the data cluster component inventory information to themapping module (102). At step 4, the mapping module (102) obtainscomponent data protection information. At step 5, the mapping moduleuses the data cluster component inventory information and the componentdata protection information to map protection policies to the datacluster components of data cluster A (120A) resulting in data clustercomponent protection policy mappings associated with data cluster A(120A).

The data cluster component inventory information specifies the datacluster components currently deployed in data cluster A (120A). Thecomponent data protection information specifies, for each type ofcomponent, a protection policy recommended by each type of component bya manufacturer of the component or configured by a user of data clusterA (120A). The mapping module (102) then, at step 6, updates the datacluster component inventory repository stored in the persistent storage(106) with the data cluster component inventory information associatedwith data cluster A (120A) and stores the data cluster componentprotection policy mappings associated with data cluster A (120A) in thepersistent storage (106). At step 7, the mapping module (102) initiatesthe performance of data protection services for the data clustercomponents of data cluster A (120A) based on the data cluster componentprotection policy mappings associated with data cluster A (120A).

After a period of time has passed since step 7, at step 8, new datacluster components are deployed in data cluster A (120A). After the newdata cluster components are deployed in data cluster A (120A), at step9, the mapping module (102) of the data protection manager (100) obtainsa request to perform a subsequent discovery of currently deployed datacluster components associated with data cluster A (120A). In response toobtaining the request to perform an initial discovery of data clustercomponents, at step 10, the mapping module (102) sends a message to adata cluster manager (not shown) of data cluster A (120A). The messageincludes a request for currently deployed data cluster components ofdata cluster A (120A).

In response to obtaining the request, the data cluster manager generatesand/or obtains data cluster component inventory information associatedwith data cluster A (120A). After generating and/or obtaining the datacluster component inventory information, at step 11, the data clustermanager sends the data cluster component inventory information to themapping module (102). At step 12, the mapping module (102) obtainscomponent data protection information and the previously generated datacluster component inventory information from the persistent storage(106). At step 13, the mapping module (102) uses the previouslygenerated data cluster component inventory information and the newlyobtained data cluster component inventory information to determine thatnew data cluster components were deployed in data cluster A (120A). Atstep 14, the mapping module uses the newly obtained data clustercomponent inventory information and the component data protectioninformation to map protection policies to the newly deployed datacluster components of data cluster A (120A) resulting in additional datacluster component protection policy mappings associated with datacluster A (120A).

The data cluster component inventory information specifies the datacluster components currently deployed in data cluster A (120A). Thecomponent data protection information specifies, for each type ofcomponent, a protection policy recommended by each type of component bya manufacturer of the component or configured by a user of data clusterA (120A). The mapping module (102) then, at step 15, updates the datacluster component inventory repository stored in the persistent storage(106) with the newly obtained data cluster component inventoryinformation associated with data cluster A (120A) and stores theadditional data cluster component protection policy mappings associatedwith data cluster A (120A) in the persistent storage (106). At step 16,the mapping module (102) initiates the performance of data protectionservices for the data cluster components of data cluster A (120A) basedon the additional data cluster component protection policy mappingsassociated with data cluster A (120A).

FIG. 5 shows a diagram of the operation of a third example system overtime in accordance with one or more embodiments of the invention.Turning to FIG. 5 , consider a scenario in which data cluster A (120A)is provisioned and has just registered with a data protection manager(100). The data protection manager (100) includes a data type module(104) and a persistent storage (106). At step 1, the data type module(104) of the data protection manager (100) obtains a request to performan initial discovery of data cluster components associated with datacluster A (120A). In response to obtaining the request to perform aninitial discovery of data cluster components, at step 2, the data typemodule (104) sends a message to a data cluster manager (not shown) ofdata cluster A (120A). The message includes a request for currentlydeployed data cluster components of data cluster A (120A).

In response to obtaining the request, the data cluster manager generatesand/or obtains data cluster component inventory information associatedwith data cluster A (120A). After generating and/or obtaining the datacluster component inventory information, at step 3, the data clustermanager sends the data cluster component inventory information to thedata type module (104). At step 4, the data type module (104) obtainscomponent data protection information. At step 5, the data type module(104) uses the data cluster component inventory information and thecomponent data protection information to map protection policies to thedata cluster components of data cluster A (120A) resulting in a firstportion data cluster component protection policy mappings associatedwith data cluster A (120A). At step 6, the data type module uses thedata cluster component inventory information and the component dataprotection information to map backup types to the data clustercomponents of data cluster A (120A) resulting in a second portion datacluster component protection policy mappings associated with datacluster A (120A).

The data cluster component inventory information specifies the datacluster components currently deployed in data cluster A (120A). Thecomponent data protection information specifies, for each type ofcomponent, a backup type recommended by each type of component by amanufacturer of the component or configured by a user of data cluster A(120A). The data type module (104) then, at step 7, updates the datacluster component inventory repository stored in the persistent storage(106) with the data cluster component inventory information associatedwith data cluster A (120A) and stores the data cluster componentprotection policy mappings associated with data cluster A (120A) (boththe first portion and the second portion) in the persistent storage(106). At step 8, the data type module (104) initiates the performanceof data protection services for the data cluster components of datacluster A (120A) based on the data cluster component protection policymappings associated with data cluster A (120A).

FIG. 6 shows a diagram of the operation of a fourth example system overtime in accordance with one or more embodiments of the invention.Turning to FIG. 6 , consider a scenario in which data cluster A (120A)is provisioned and has just registered with a data protection manager(100) and data cluster N (120N) has registered with the data protectionmanager but is currently not being used. Data cluster A (120A) includesa hyper-converged infrastructure and data cluster N (120N) includes anon-hyper-converged infrastructure. The data protection manager (100)includes a data type module (104) and a persistent storage (106). Atstep 1, the data type module (104) of the data protection manager (100)obtains a request to perform an initial discovery of data clustercomponents associated with data cluster A (120A). In response toobtaining the request to perform an initial discovery of data clustercomponents, at step 2, the data type module (104) sends a message to adata cluster manager (not shown) of data cluster A (120A). The messageincludes a request for currently deployed data cluster components ofdata cluster A (120A).

In response to obtaining the request, the data cluster manager generatesand/or obtains data cluster component inventory information associatedwith data cluster A (120A). After generating and/or obtaining the datacluster component inventory information, at step 3, the data clustermanager sends the data cluster component inventory information to thedata type module (104). At step 4, the data type module (104) sends amessage to a data cluster manager (not shown) of data cluster A (120A).The message includes a request for data cluster topology informationassociated with data cluster A (120A).

In response to obtaining the request, the data cluster manager generatesand/or obtains data cluster topology information associated with datacluster A (120A). After generating and/or obtaining the data clustertopology information at step 3, the data cluster manager sends the datacluster topology information to the data type module (104). At step 6,the data type module (104) obtains component data protectioninformation. At step 7, the data type module (104) uses the data clustercomponent inventory information and the component data protectioninformation to map protection policies to the data cluster components ofdata cluster A (120A) resulting in a first portion data clustercomponent protection policy mappings associated with data cluster A(120A). At step 8, the data type module uses the data cluster componentinventory information and the component data protection information tomap backup types to the data cluster components of data cluster A (120A)resulting in a second portion data cluster component protection policymappings associated with data cluster A (120A).

The data cluster component inventory information specifies the datacluster components currently deployed in data cluster A (120A). Thecomponent data protection information specifies, for each type ofcomponent, a backup type recommended by each type of component by amanufacturer of the component or configured by a user of data cluster A(120A). The data type module (104) then, at step 9, (i) updates the datacluster component inventory repository stored in the persistent storage(106) with the data cluster component inventory information associatedwith data cluster A (120A), (ii) stores the data cluster componentprotection policy mappings associated with data cluster A (120A) (boththe first portion and the second portion) in the persistent storage(106), and (iii) updates a data cluster topology information repositoryin the persistent storage (106) with the data cluster topologyinformation associated with data cluster A (120A). At step 10, the datatype module (104) initiates the performance of data protection servicesfor the data cluster components of data cluster A (120A) based on thedata cluster component protection policy mappings associated with datacluster A (120A).

At step 11, data cluster A (120A) fails. In response to the failure ofdata cluster A (120A), at step 12, the data type module (104) obtains arequest to restore data cluster A (120A) using another data cluster. Inresponse to obtaining the request to restore data cluster A, the datatype module (104), at step 13, obtains data cluster topology informationassociated with all registered data clusters. At step 14, the data typemodule (104) uses the data cluster topology information associated withdata cluster A (120A) and previously obtained data cluster topologyinformation associated with data cluster N (120N) to identify datacluster N (120N) as the data cluster capable of restoring data cluster A(120A). After that, at step 15, the data type module identifies adependency map based on the data cluster topology information associatedwith data cluster A (120) and the restoration request. Then, at step 16,the data type module (104) identifies a restoration sequence based onthe dependency map and the data cluster topology information associatedwith data cluster A (120A).

At step 17, the data type module (104) sends a request to a data clustermanager (not shown) of data cluster N (120N) to initiate the restorationof data cluster A (120) using data cluster N (120N). In response toobtaining the request, at step 18, the data cluster manager of datacluster N (120N) provisions resources of data cluster N (120N) toperform the restoration. At step 19, the data type module sends arequest to perform the restoration of data cluster A (120A). At step 20,the data cluster manager of data cluster N (120N) restores all of thedata cluster components of data cluster A (120A) using the resources ofdata cluster N (120N).

End of Examples

As discussed above, embodiments of the invention may be implementedusing computing devices. FIG. 7 shows a diagram of a computing device inaccordance with one or more embodiments of the invention. The computingdevice (700) may include one or more computer processors (702),non-persistent storage (704) (e.g., volatile memory, such as randomaccess memory (RAM), cache memory), persistent storage (706) (e.g., ahard disk, an optical drive such as a compact disk (CD) drive or digitalversatile disk (DVD) drive, a flash memory, etc.), a communicationinterface (712) (e.g., Bluetooth interface, infrared interface, networkinterface, optical interface, etc.), input devices (710), output devices(708), and numerous other elements (not shown) and functionalities. Eachof these components is described below.

In one embodiment of the invention, the computer processor(s) (702) maybe an integrated circuit for processing instructions. For example, thecomputer processor(s) may be one or more cores or micro-cores of aprocessor. The computing device (700) may also include one or more inputdevices (710), such as a touchscreen, keyboard, mouse, microphone,touchpad, electronic pen, or any other type of input device. Further,the communication interface (712) may include an integrated circuit forconnecting the computing device (700) to a network (not shown) (e.g., alocal area network (LAN), a wide area network (WAN) such as theInternet, mobile network, or any other type of network) and/or toanother device, such as another computing device.

In one embodiment of the invention, the computing device (700) mayinclude one or more output devices (708), such as a screen (e.g., aliquid crystal display (LCD), a plasma display, touchscreen, cathode raytube (CRT) monitor, projector, or other display device), a printer,external storage, or any other output device. One or more of the outputdevices may be the same or different from the input device(s). The inputand output device(s) may be locally or remotely connected to thecomputer processor(s) (702), non-persistent storage (704), andpersistent storage (706). Many different types of computing devicesexist, and the aforementioned input and output device(s) may take otherforms.

One or more embodiments of the invention may be implemented usinginstructions executed by one or more processors of the data managementdevice. Further, such instructions may correspond to computer readableinstructions that are stored on one or more non-transitory computerreadable mediums.

One or more embodiments of the invention may improve the operation ofone or more computing devices. More specifically, embodiments of theinvention relate to a mapping module that maps protection policy typesto initially discovered data cluster components based on data protectionrequirements associated with the data cluster components. To mapprotection policy types to data cluster components of a data cluster,the data type module may obtain data cluster component inventoryinformation associated with the data cluster which may specify datacluster components currently deployed in the data cluster. The mappingmodule may use the data cluster component inventory information andcomponent data protection information to map the protection policy typesto the data cluster components. Therefore, the protection policies maybe efficiently mapped to data cluster components in a newly deployeddata cluster with numerous data cluster components with minimal userinvolvement.

Thus, embodiments of the invention may address the problem ofinefficient use of computing resources to map protection policies todata cluster components. This problem arises due to the nature of thetechnological environment in which the data cluster components areoperated.

The problems discussed above should be understood as being examples ofproblems solved by embodiments of the invention disclosed herein and theinvention should not be limited to solving the same/similar problems.The disclosed invention is broadly applicable to address a range ofproblems beyond those discussed herein.

While the invention has been described with respect to a limited numberof embodiments, those skilled in the art, having benefit of thisdisclosure, will appreciate that other embodiments can be devised whichdo not depart from the scope of the technology as disclosed herein.Accordingly, the scope of the invention should be limited only by theattached claims.

What is claimed is:
 1. A method for managing data protection servicesfor data clusters, the method comprising: identifying, by a mappingmodule of a data protection manager, an initial discovery eventassociated with a data cluster, wherein the initial discovery eventcomprises obtaining a registration request from the data cluster; inresponse to identifying the discovery event, by the mapping module:sending a request for currently deployed components to a data clustermanager associated with the data cluster; obtaining data clustercomponent inventory information associated with the data cluster fromthe data cluster manager, wherein the data cluster component inventoryinformation specifies hardware and software components of the datacluster; mapping protection policy types to data cluster components ofthe data cluster using the data cluster component inventory informationand component data protection information; and initiating performance ofdata protection services for the data cluster components based on themapped protection policy types.
 2. The method of claim 1, whereinmapping protection policy types to data cluster components of the datacluster comprises: identifying a first data cluster component of thedata cluster components using the data cluster component inventoryinformation; identifying first data protection requirements associatedwith the first data cluster component using the data cluster componentinventory information and the component data protection information;mapping a first protection policy type of the protection policy types tothe first data cluster component, wherein the first protection policytype satisfies the first data protection requirements; identifying asecond data cluster component of the data cluster components using thedata cluster component inventory information; identifying second dataprotection requirements associated with the second data clustercomponent using the data cluster component inventory information and thecomponent data protection information; and mapping a second protectionpolicy type of the protection policy types to the second data clustercomponent, wherein the second protection policy type satisfies thesecond data protection requirements.
 3. The method of claim 2, whereinthe component data protection information specifies data protectionrequirements associated with the data cluster components and isconfigured by a user of the data cluster.
 4. The method of claim 2,wherein the component data protection information specifies dataprotection requirements associated with the data cluster components thatare recommended by manufacturers of the data cluster components.
 5. Themethod of claim 4, wherein the data protection requirements comprise:recovery point objectives, target storages, backup schedules, andretention periods.
 6. A non-transitory computer readable mediumcomprising computer readable program code, which when executed by acomputer processor enables the computer processor to perform a methodfor managing data protection services for data clusters, the methodcomprising: identifying, by a mapping module of a data protectionmanager, an initial discovery event associated with a data cluster,wherein the initial discovery event comprises obtaining a registrationrequest from the data cluster; in response to identifying the discoveryevent, by the mapping module: sending a request for currently deployedcomponents to a data cluster manager associated with the data cluster;obtaining data cluster component inventory information associated withthe data cluster from the data cluster manager, wherein the data clustercomponent inventory information specifies hardware and softwarecomponents of the data cluster; mapping protection policy types to datacluster components of the data cluster using the data cluster componentinventory information and component data protection information; andinitiating performance of data protection services for the data clustercomponents based on the mapped protection policy types.
 7. Thenon-transitory computer readable medium of claim 6, wherein mappingprotection policy types to data cluster components of the data clustercomprises: identifying a first data cluster component of the datacluster components using the data cluster component inventoryinformation; identifying first data protection requirements associatedwith the first data cluster component using the data cluster componentinventory information and the component data protection information;mapping a first protection policy type of the protection policy types tothe first data cluster component, wherein the first protection policytype satisfies the first data protection requirements; identifying asecond data cluster component of the data cluster components using thedata cluster component inventory information; identifying second dataprotection requirements associated with the second data clustercomponent using the data cluster component inventory information and thecomponent data protection information; and mapping a second protectionpolicy type of the protection policy types to the second data clustercomponent, wherein the second protection policy type satisfies thesecond data protection requirements.
 8. The non-transitory computerreadable medium of claim 7, wherein the component data protectioninformation specifies data protection requirements associated with thedata cluster components and is configured by a user of the data cluster.9. The non-transitory computer readable medium of claim 7, wherein thecomponent data protection information specifies data protectionrequirements associated with the data cluster components that arerecommended by manufacturers of the data cluster components.
 10. Thenon-transitory computer readable medium of claim 9, wherein the dataprotection requirements comprise: recovery point objectives, targetstorages, backup schedules, and retention periods.
 11. A system formanaging data protection services for data clusters, the systemcomprising: persistent storage for storing a data cluster componentinventory repository; a mapping module of a data protection manager,comprising a processor and memory, configured to: identify an initialdiscovery event associated with a data cluster, wherein the initialdiscovery event comprises obtaining a registration request from the datacluster; in response to identifying the discovery event: send a requestfor currently deployed components to a data cluster manager associatedwith the data cluster; obtain data cluster component inventoryinformation associated with the data cluster from the data clustermanager, wherein the data cluster component inventory informationspecifies hardware and software components of the data cluster; mapprotection policy types to data cluster components of the data clusterusing the data cluster component inventory information and componentdata protection information; and initiate performance of data protectionservices for the data cluster components based on the mapped protectionpolicy types.
 12. The system of claim 11, wherein mapping protectionpolicy types to data cluster components of the data cluster comprises:identifying a first data cluster component of the data clustercomponents using the data cluster component inventory information;identifying first data protection requirements associated with the firstdata cluster component using the data cluster component inventoryinformation and the component data protection information; mapping afirst protection policy type of the protection policy types to the firstdata cluster component, wherein the first protection policy typesatisfies the first data protection requirements; identifying a seconddata cluster component of the data cluster components using the datacluster component inventory information; identifying second dataprotection requirements associated with the second data clustercomponent using the data cluster component inventory information and thecomponent data protection information; and mapping a second protectionpolicy type of the protection policy types to the second data clustercomponent, wherein the second protection policy type satisfies thesecond data protection requirements.
 13. The system of claim 12, whereinthe component data protection information specifies data protectionrequirements associated with the data cluster components and isconfigured by a user of the data cluster.
 14. The system of claim 12,wherein the component data protection information specifies dataprotection requirements associated with the data cluster components thatare recommended by manufacturers of the data cluster components.