摘要:
In a system comprising a production environment and a replication environment, a method and program product for dynamically switching from an asynchronous replication policy to a synchronous replication policy. In a system comprising a production environment and a replication environment, a method for dynamically switching from a synchronous replication policy to an asynchronous replication policy.
摘要:
The punch command may be replicated in a replication environment including a production site and a replication site. The solution includes implementing a punch command to free storage received at a replication site in a replication environment by applying the punch command to storage at the replication site and writing data being freed from the storage at the replication site to an undo stream of a journal at the replication site. If the punch command is not supported, a command to write zeros may be used. Further, an unpunch command is provided for properly undoing a punch command and storing data written to the volume before the punch command freed the storage. Additionally, large punch commands may be split into a plurality to smaller punch commands for efficient journal management. Additionally, volume space may be reclaimed by writing a punch command to the journal instead of zeros.
摘要:
In one aspect, a method includes intercepting write I/Os going to a volume on a storage array and sending the write I/Os to targets on a plurality of source-side data protection appliances based on a load balancing scheme. In another aspect, an article includes a non-transitory machine-readable medium that stores executable instructions. The instructions cause a machine to intercept write I/Os going to a volume on a storage array and send the write I/Os to targets on a plurality of source-side data protection appliances based on a load balancing scheme. In a further aspect, an apparatus includes circuitry configured to intercept write I/Os going to a volume on a storage array and send the write I/Os to targets on a plurality of source-side data protection appliances based on a load balancing scheme.
摘要:
In one aspect, a method includes exposing a set of storage volumes to a host at a requested point in time, in a virtual access mode. The set of storage volumes are handled by distributed virtual consistency groups (CGs) having a background process wherein the distributed virtual CGs update the set of storage volumes to the requested point in time. The method also includes exposing a first service storage volume at a data protection appliance, determining if the virtual CGs have rolled back and using at least one of a central manager and a splitter to account for input/output requests (IOs) when a virtual CG has not rolled back.
摘要:
A method and system comprising splitting an IO in a system; intercepting the IO in an appliance; determining whether the IO is directed to a replicated file system; sending the IO directed to the replicated file system to a replication device; and acknowledging the receipt of the IO. A method, system and computer program product comprising requesting access to a point in time in a replicated file system; determining from a plurality of bookmarks of file system configurations; a bookmark corresponding to the point in time; determining if the current configuration of the file system is equivalent to the bookmark; and reconfiguring the file system when the current configuration is not equivalent to the configuration of the bookmark.
摘要:
A method, system, and computer program product for receiving a request to roll an image to a point in time by reading data from a journal, applying data from the journal to create a asynchronous copy on write image at the requested point in time, creating a virtual image data structure, and allowing writes to be cached in a journal based replication appliance.
摘要:
In one aspect, a method includes determining that a first quorum of servers is available at a production site and a target site and generating a group-set bookmark if the first quorum of servers is available. In another aspect, an article includes a non-transitory machine-readable medium that stores executable instructions. The instructions cause a machine to determine that a first quorum of servers is available at a production site and a target site and generate a group-set bookmark if the first quorum of servers is available. In a further aspect, an apparatus includes circuitry configured to determine that a first quorum of servers is available at a production site and a target site; and generate a group -set bookmark if the first quorum of servers available.
摘要:
In one aspect, a method includes receiving a request to access a virtual volume snapshot, preparing to bind the virtual volume snapshot, intercepting a command to prepare bind of the virtual volume snapshot, rolling back to a point in time corresponding to the requested virtual volume snapshot and generating a virtual volume snapshot in a storage array.
摘要:
A method, computer program product, and computing system for receiving an indication that a target virtual machine is going to be migrated from a first operating environment to a second operating environment. The target cache system is associated with target virtual machine. An auxiliary virtual machine is generated within the second operating environment. An auxiliary cache system is associated with the auxiliary virtual machine. The target virtual machine and the auxiliary virtual machine are connected. IO requests for the target virtual machine are mirrored to the auxiliary virtual machine. At least a portion of cache data included within a target memory system associated with the target cache system is copied to an auxiliary memory system associated with the auxiliary cache system. The target virtual machine is migrated from the first operating environment to the second operating environment.
摘要:
In one aspect, a method to manage encrypted data includes configuring a first portion of a storage medium to store encrypted data. The encrypted data is encrypted using a time-based encryption key. The method also includes configuring a second portion of the storage medium to include metadata identifying the time-based encryption key and storing the time-based encryption key in a location other than the storage medium.