US 12,216,551 B2
Vulnerability tagging for Kubernetes workloads in a data protection system
Mahesh Reddy Av, Bangalore (IN); Avinash Kumar, Patna (IN); and Terry O'Callaghan, Hopkinton, MA (US)
Assigned to Dell Products L.P., Round Rock, TX (US)
Filed by Dell Products L.P., Round Rock, TX (US)
Filed on Jun. 5, 2023, as Appl. No. 18/329,313.
Prior Publication US 2024/0403170 A1, Dec. 5, 2024
Int. Cl. G06F 11/14 (2006.01); H04L 9/40 (2022.01)
CPC G06F 11/1464 (2013.01) [G06F 11/1453 (2013.01); H04L 63/1433 (2013.01); G06F 2201/84 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A computer-implemented method of dynamically prioritizing backups of datasets in a network, comprising:
defining one or more protection policies to back up the datasets according to a defined prioritization;
monitoring events that affect data of a dataset to be protected by the one or more protection policies;
processing the monitored events in an event analyzer to characterize each event in terms of a severity of potential damage to the data by each event;
calculating a vulnerability measure for a dataset as the product of the number of occurrences of each event based on the severity associated with each event;
assigning a numerical score to the calculated vulnerability measure;
tagging the score as metadata to a payload of the dataset; and
using the score to modify the defined prioritization for backing up the dataset in the one or more protection policies to accommodate a vulnerability of the dataset as indicated by the vulnerability measure.