FIELD: information technology.
SUBSTANCE: method involves sending to a virtual machine a request to create an application-coordinated snapshot of the virtual machine volume of said virtual machine, wherein the virtual machine is configured to create said application-coordinated snapshot while the virtual machine is being run; reception of the signal which indicates that the virtual machine has created an application-coordinated snapshot of the virtual machine volume; creating a snapshot of the host volume, wherein the virtual machine volume is stored as a file at the host; and extracting the application-coordinated snapshot of the virtual machine volume from the snapshot of the host volume.
EFFECT: efficient creation of application-coordinated backup copies without initial interruption or switching off of the virtual machine.
21 cl, 5 dwg
Title | Year | Author | Number |
---|---|---|---|
CONVERTING MACHINES TO VIRTUAL MACHINES | 2007 |
|
RU2446450C2 |
CONTROL OF DUPLICATE VIRTUAL STORE AT RECOVERY SITES | 2012 |
|
RU2619894C2 |
RANSOMWARE MITIGATION IN INTEGRATED ISOLATED APPLICATIONS | 2020 |
|
RU2807463C2 |
BACKUP METHOD | 2017 |
|
RU2646309C1 |
METHOD OF SOFTWARE INSTALLATION, SET-UP, ADMINISTRATION AND BACK-UP | 2010 |
|
RU2445686C2 |
CREATING TEMPLATES OF SWITCHED OFF RESOURCES | 2007 |
|
RU2436150C2 |
DOUBLE SELF-TEST OF MEMORY FOR PROTECTION OF MULTIPLE NETWORK ENDPOINTS | 2016 |
|
RU2714607C2 |
COMPUTER SECURITY CONTROL, FOR INSTANCE IN VIRTUAL MACHINE OR REAL OPERATING SYSTEM | 2005 |
|
RU2397537C2 |
SYSTEM AND METHODS FOR DECRYPTING NETWORK TRAFFIC IN A VIRTUALIZED ENVIRONMENT | 2017 |
|
RU2738021C2 |
SECURE TRANSPORT OF ENCRYPTED VIRTUAL MACHINES WITH CONTINUOUS ACCESS OF THE OWNER | 2015 |
|
RU2693313C2 |
Authors
Dates
2011-11-10—Published
2007-02-15—Filed