摘要:
A method and system comprising splitting an IO in a system; intercepting the IO in an appliance; determining whether the IO is directed to a replicated file system; sending the IO directed to the replicated file system to a replication device; and acknowledging the receipt of the IO. A method, system and computer program product comprising requesting access to a point in time in a replicated file system; determining from a plurality of bookmarks of file system configurations; a bookmark corresponding to the point in time; determining if the current configuration of the file system is equivalent to the bookmark; and reconfiguring the file system when the current configuration is not equivalent to the configuration of the bookmark.
摘要:
In one aspect, a method includes intercepting write I/Os going to a volume on a storage array and sending the write I/Os to targets on a plurality of source-side data protection appliances based on a load balancing scheme. In another aspect, an article includes a non-transitory machine-readable medium that stores executable instructions. The instructions cause a machine to intercept write I/Os going to a volume on a storage array and send the write I/Os to targets on a plurality of source-side data protection appliances based on a load balancing scheme. In a further aspect, an apparatus includes circuitry configured to intercept write I/Os going to a volume on a storage array and send the write I/Os to targets on a plurality of source-side data protection appliances based on a load balancing scheme.
摘要:
A method, system, and computer program product for receiving a request to roll an image to a point in time by reading data from a journal, applying data from the journal to create a asynchronous copy on write image at the requested point in time, creating a virtual image data structure, and allowing writes to be cached in a journal based replication appliance.
摘要:
In one aspect, a method includes determining that a first quorum of servers is available at a production site and a target site and generating a group-set bookmark if the first quorum of servers is available. In another aspect, an article includes a non-transitory machine-readable medium that stores executable instructions. The instructions cause a machine to determine that a first quorum of servers is available at a production site and a target site and generate a group-set bookmark if the first quorum of servers is available. In a further aspect, an apparatus includes circuitry configured to determine that a first quorum of servers is available at a production site and a target site; and generate a group -set bookmark if the first quorum of servers available.
摘要:
In one aspect, a method includes receiving a request to access a virtual volume snapshot, preparing to bind the virtual volume snapshot, intercepting a command to prepare bind of the virtual volume snapshot, rolling back to a point in time corresponding to the requested virtual volume snapshot and generating a virtual volume snapshot in a storage array.
摘要:
A method, computer program product, and computing system for receiving an indication that a target virtual machine is going to be migrated from a first operating environment to a second operating environment. The target cache system is associated with target virtual machine. An auxiliary virtual machine is generated within the second operating environment. An auxiliary cache system is associated with the auxiliary virtual machine. The target virtual machine and the auxiliary virtual machine are connected. IO requests for the target virtual machine are mirrored to the auxiliary virtual machine. At least a portion of cache data included within a target memory system associated with the target cache system is copied to an auxiliary memory system associated with the auxiliary cache system. The target virtual machine is migrated from the first operating environment to the second operating environment.
摘要:
In one aspect, a method to manage encrypted data includes configuring a first portion of a storage medium to store encrypted data. The encrypted data is encrypted using a time-based encryption key. The method also includes configuring a second portion of the storage medium to include metadata identifying the time-based encryption key and storing the time-based encryption key in a location other than the storage medium.
摘要:
In one aspect, a method includes performing replication of a first volume using a snapshot shipping mode, performing replication of a second volume using a continuous replication mode and generating a consistent point in time for the first and second volumes to enable retrieval of replicated data from the first and second volumes at the consistent point in time.
摘要:
In traditional storage arrays, the number of clones permitted inside the storage array may be limited by the amount of available storage. Further, clones stored on the array may require significant storage resources. Thus, the number of clone stored by the storage array may also be limited by the storage system memory and not just by the disk space. Accordingly, example embodiments of the present invention allow for creating and maintaining a plurality (e.g., an unlimited number) of thin asynchronous clones in storage, even if replica storage is capable of storing only a limited number of snapshots. Further, example embodiments of the present invention allow clones to be freely attached and detached from the replication environment for various purposes.
摘要:
A system, method, and computer program product for intercepting Input/Outputs (IOs) sent to a second storage medium in a storage array via a splitter in the storage array, redirecting read IOs to a first storage medium, and redirecting writes to the first storage medium and a Data Protection appliance.