Abstract:
A method, system, and computer program product for use in a replication environment comprising intercepting an IO sent from a host to a storage device in a splitter, marking information about the IO in a tracking structure, sending the IO to the storage device, and sending the IO to a replication device; wherein the IO is sent to the storage device before confirming that the replication device has received the IO.
Abstract:
A method and system for maintaining granular backups is discussed. Backup windows may be defined, and policies may be associated with those windows. Journal and backup files may be retained or deleted in accordance with those policies.
Abstract:
In one aspect, a method includes mirroring a logical unit between a first site and a second site, tracking the changes to the logical unit on a backlog mirrored between the first site and the second site, replicating a virtual machine from the first site to a third site, storing virtual machine disks on a file system on the mirrored logical unit and resuming replication of the virtual machine to the third site from the second site using the mirrored logical unit after failure of the first site.
Abstract:
In one aspect, a method includes determining whether a volume selected for replication is a linked clone, determining if a base file associated with the linked clone exists at a replication site and generating the base file associated with the linked clone at the replication site if a base file does not exist at the replication site.
Abstract:
Example embodiments of the present invention relate to a method, a system, and a computer program product for transitioning between replication technologies. The method includes performing continuous data protection in a data protection environment, transitioning from continuous data protection to changed block tracking in the data protection environment, and performing changed block tracking in the data protection environment.
Abstract:
In one aspect, a method includes receiving a request to restore data of a volume, determining if the data is stored at a first storage device or a second storage device, restoring the data of the volume by using a journal and a first snapshot of the volume stored at the first storage device if the data is stored at the first storage device and restoring the data of the volume by using a second snapshot of the volume stored at the second storage device if the data is stored at the second storage device.
Abstract:
In one aspect, a method includes receiving a first I/O at a kernel interface using a pseudo data storage system, writing the first I/O to a first virtual device on a datastore, receiving a second I/O at the kernel interface using the pseudo data storage system and writing the second I/O to a second virtual device on the datastore.
Abstract:
In one aspect, a method includes replicating a first volume to a consistency group (CG) file on a backup device. The method also includes replicating a second volume to the CG file concurrently with the replicating of the first volume, the first and second volumes being in a consistency group.
Abstract:
In one aspect, a method includes replicating a first volume of a first storage array to a second volume of a second storage array and notifying a first splitter of a start of migration. The first splitter is configured to send I/Os sent from an application to the first volume to a first data replication appliance (DPA) to be replicated at the second volume and configured to send the I/Os to the first volume. The method also includes configuring a second splitter of a third storage array to: ignore data migrating from the first volume to the third volume and send the I/Os sent from the application to the third volume to the first DPA to be replicated at the second volume and to send the I/Os to the third volume; and migrating data from the first volume to the third volume.
Abstract:
In one aspect, a method to provide asymmetric active-active access to a first storage volume using a global cache coupled to a first and second virtual storage volumes includes replicating asynchronously the first storage volume at a first site to a second storage volume at a second site, virtualizing the first storage volume with the first virtual storage volume; and virtualizing the second storage volume with the second virtual storage volume. The first storage volume has primary storage functionality.