Browse Prior Art Database

Efficient Offhost Method to Protect Multiple VMs in a Red Hat Virtualization Environment

IP.com Disclosure Number: IPCOM000244204D
Publication Date: 2015-Nov-23
Document File: 4 page(s) / 348K

Publishing Venue

The IP.com Prior Art Database

Related People

Dulipsinh Deshmukh: INVENTOR [+3]

Abstract

In offhost backup backup processing is offloaded to the backup host which reduces the impact on the Virtual Machine VM and or hypervisor resources caused by local backup However there are certain challenges in a Red Hat Enterprise Virtualization RHEV environment to achieve this efficiently for multiple VMs This solution describes the solution to solve these challenges and to provide an efficient way to backup multiple VMs in a RHEV environment

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 52% of the total text.

Page 01 of 4

 Efficient Offhost Method to Protect Multiple VMs in a Red Hat Virtualization Environment

Dulipsinh Deshmukh Anup Parekh Mahesh Waghole

Symantec Corporation

Abstract

In offhost backup, backup processing is offloaded to the backup host which reduces the impact on the Virtual Machine ("VM") and/or hypervisor resources caused by local backup. However, there are certain challenges in a Red Hat Enterprise Virtualization ("RHEV") environment to achieve this efficiently for multiple VMs. This solution describes the solution to solve these challenges and to provide an efficient way to backup multiple VMs in a RHEV environment.

Copyright © 2015 Symantec Corporation. All rights reserved.

1


Page 02 of 4

Copyright © 2015 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. For a full list of Symantec trademarks, please visit http://www.symantec.com/about/profile/policies/trademarks/currentlist.jsp

Any Symantec products described in this document are distributed under licenses restricting their use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any.

THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.

Symantec Corporation 350 Ellis Street Mountain View, CA 94043 United States

http://www.symantec.com

2

Copyright © 2015 Symantec Corporation. All rights reserved.


Page 03 of 4

Efficient Offhost Method to Protect Multiple VMs in a Red Hat Virtualization Environment

Problem Statement

Today, Virtual Machines ("VMs") can be protected in a Red Hat Virtualization Environment ("RHVE") environment by installing a backup agent inside each VM. This affects the performance of applications running inside the VM.

Another potential offhost method may involve using a virtual appliance. But the...