摘要:
Systems, methods, apparatus and software can utilize an extent guard to prevent modification (including relocation) of data in the storage resource while a third-party copy operation directed at the storage resource is occurring. A data transport mechanism such as a data restore application provides an extent list to the extent guard, which monitors read and/or write activity to storage resources described by the extent list. The data transport mechanism requests a data mover to perform a third-party copy operation whereby data is moved from a data source to the storage resource. If a modification attempt is made on the portion of the storage resource described by the extent list, the extent guard stalls the modification attempt until the third-party copy operation is aborted.
摘要:
Systems, methods, apparatus and software can utilize an extent guard to prevent modification (including relocation) of data in the storage resource while a third-party copy operation directed at the storage resource is occurring. A data transport mechanism such as a data restore application provides an extent list to the extent guard, which monitors read and/or write activity to storage resources described by the extent list. The data transport mechanism requests a data mover to perform a third-party copy operation whereby data is moved from a data source to the storage resource. If a modification attempt is made on the portion of the storage resource described by the extent list, the extent guard stalls the modification attempt until the third-party copy operation is aborted.
摘要:
Systems, methods, apparatus and software can utilize an indirect write driver to prevent possible error conditions associated with using a third-party copy operation directed at a storage resource. A data transport mechanism such as a data restore application initiates a third-party copy operation from a data source to a data cache. The indirect write driver monitors write commands as they pass to a storage resource driver. If a command is found to be an indirect write command, e.g., a command designed to complete the movement of data from the data cache to the storage resource, it is handled accordingly. Normal write commands are passed on to the storage resource driver. By completing the data move operation using normal storage management channels, e.g., the operating system, file system, and/or volume manager, error conditions can be avoided.
摘要:
A system and method for backing up a virtual machine executing on a virtualization server computer are described. A snapshot of a virtual disk image file of the virtual machine may be created on a network-attached storage (NAS) device coupled to the virtualization server computer. The snapshot may be used to backup the virtual disk image file from the NAS device to a backup storage device without transferring the virtual disk image file through the virtualization server computer. Mapping information useable to access the plurality of files stored in the virtual disk image file on an individual basis may be created and stored together with the backup copy of the virtual disk image file on the backup storage device.
摘要:
Systems, methods, apparatus and software can utilize storage resource locks to prevent modification (including relocation) of data in the storage resource while a third-party copy operation directed at the storage resource is occurring. A data transport mechanism such as a data restore application requests that a relevant portion of the storage resource be locked. Once locked, the data transport mechanism requests a data mover to perform a third-party copy operation whereby data is moved from a data source to the locked portion of the storage resource. When the third party-copy operation is complete, the data transport mechanism requests release of the lock on the portion of the storage resource.
摘要:
A virtual tape library may be configured to delete or free data blocks corresponding to expired backup images. A virtual tape volume may comprise multiple backup images, each corresponding to data stored by a backup application. The backup application may expire individual backup images of a virtual tape volume without expiring the entire virtual tape volume. In contrast to traditional virtual tape libraries, the virtual tape library described herein may delete, free and/or reuse the data blocks corresponding to expired backup images even before the entire virtual tape volume is expired.
摘要:
A method, system, and computer-readable storage medium are disclosed for recovering a backup catalog from replicated data. A set of catalog metadata may be stored in a metadata object on a first storage device. The set of catalog metadata may describe a plurality of files stored in an archive. The metadata object and the archive may be copied to a second storage device, thereby generating a replicated metadata object and a replicated archive on the second storage device. The set of catalog metadata may be imported from the replicated metadata object into a destination backup catalog. The destination backup catalog describes the plurality of files stored in the replicated archive.
摘要:
A system and method for backing up a virtual machine executing on a virtualization server computer are described. A snapshot of a virtual disk image file of the virtual machine may be created on a network-attached storage (NAS) device coupled to the virtualization server computer. The snapshot may be used to backup the virtual disk image file from the NAS device to a backup storage device without transferring the virtual disk image file through the virtualization server computer. Mapping information useable to access the plurality of files stored in the virtual disk image file on an individual basis may be created and stored together with the backup copy of the virtual disk image file on the backup storage device.
摘要:
A method, system, and computer-readable storage medium are disclosed for sharing non-distributed, random-access storage resources among a plurality of computer systems. A first backup or restore operation may be initiated. In response to initiation of the first backup or restore operation, a volume of a random-access storage device may be automatically mounted at a first computer system. The random-access storage device may be coupled to the first computer system by a network, and the volume may store a non-distributed file system. The first backup or restore operation may be completed by transmitting a first set of data between the random-access storage device and the first computer system. In response to completion of the first backup or restore operation, the volume of the random-access storage device may be automatically unmounted at the first computer system.
摘要:
A system and method for partitioning a data stream into a plurality of segments of varying sizes. A data stream manager partitions a received data stream into segments which are then conveyed to a deduplication engine for processing. The data stream received by the data stream manager includes metadata corresponding to the data stream. Based upon the metadata, which may include an indication as to a type of data included in the data stream, the data stream is partitioned into segments for further processing. A size of a segment used for partitioning given data is based at least in part on a type of data being partitioned. The variable segment sizes may be chosen to balance between maximizing the deduplication ratio and minimizing both the segment count and the size of the fingerprint index.