This disclosure relates to data management systems, and more specifically to maintaining referential integrity in such systems.
Modern computer systems hold vast quantities of data that is increasing rapidly; so rapidly, in fact, that in many cases the increase threatens to outstrip the capacity of storage systems. This growth not only needs a continuing investment in newer and bigger storage systems, it also requires a corresponding increase in the cost of managing those systems. It is highly desirable to decrease the amount of storage within a company, as the storage can significantly reduce the capital and operational expenditure of a company.
One characteristic of the data stored in most mass storage systems is that there is a tremendous amount of duplication of data. Examples include duplicate files, files that are slightly different (e.g. multiple drafts of the document), same images being stored in multiple documents, same templates or stationery being applied to presentations etc. While there are some systems that can detect identical files and store them only once, typical systems still require storing large amount of duplicate data. For example, practically every document in a company has the company logo embedded within it, but today's storage techniques are unable to recognize that the same data for the logo is being repeated in every document and are unable to save on storage for that.
There is increased emphasis on sub-file data de-duplication to detect duplicate data at a sub-file level to reduce the storage and network footprint for primal storage as well as secondary storage uses like backup and archive. In recent times, various systems have been designed that can detect duplicate data at sub-file level. De-duplication systems typically create one or more ‘chunks’ out of the file or block storage unit being analyzed for de-duplication and then employ one or more methods of comparison to detect whether a duplicate chunk has been produced.
One issue involved with representing data in a storage system as chunks is how to manage removing chunks that are no longer needed to represent any of the data stored in the system. Considerations when removing chunks include determining when non-referenced (non-used) chunks exist, when to free the storage associated with non-referenced chunks, and how to remove the non-referenced chunks in a manner that does not unduly detract from the system's performance.
As described in the text and figures of the incorporated U.S. Publication No. 2010/0161608 A1, representing data in a storage system as chunks can include one or more of the following steps applied to create chunks from a given piece of digital data (whether file, block, BLOB, or stream based) that needs to be de-duplicated:
After the above one or more steps, what is left is a logical object in a native form that is independent of format specific transformations, embedded positional data, surrounding metadata, or effects of the object having been broken into multiple sub-objects for storage purposes. Operating on the logical object in its native form obtained using the methods described above enables one to find duplicate chunks of the data across even unrelated files. It is possible that only one or more steps are applied when identifying the chunk. Some objects may use different steps, and the particular steps used may are dependent on the file type and object type.
Partitioning digital data into chunks may include creating a map, such as a block map, that includes a list of objects/chunks that may be used to reconstitute the original digital data. In addition, the partitioning can also save data that has been removed from or around a chunk for later use. This data includes information about each of the objects that made up the original file, including the various methods that were applied to the original object in the file during the chunking process, as well as the non-chunk data such as page numbers. The data can be used re-apply/restore the various transformations and data that was removed from or around the constituent chunks during the partitioning process, and to reconstruct the original file using the combination of the chunks and the non-chunk data (e.g., position-dependent, instance-dependent, and/or header/footer data that was removed from the chunks and stored separately from them).
In one set of embodiments, a method comprises: partitioning, in a data storage system, each of a plurality of instances of digital data into a respective plurality of blocks, where each instance of digital data is represented by a file identifier, the file identifier referencing each of the respective plurality of blocks; and maintaining a last-reference-check timestamp for each of the blocks within each of the pluralities of blocks such that each last-reference-check timestamp indicates a last time, if ever, the block was validated to confirm that the block was referenced within the system; maintaining a last-validation timestamp for each file identifier such that each last-validation timestamp indicates when, if ever, each block referenced by the file identifier had been validated to confirm that the file identifier referenced the respective block; removing a block from the data storage system when the last-reference-check timestamp associated with the block is earlier than the earliest last-validation timestamp in the system. In certain of these embodiments partitioning each of the plurality of instances of digital data includes: partitioning a new instance of digital data into a plurality of blocks, including a first block, generating a first file identifier based at least in part on the new digital data; associating the first file identifier with the first block and the new digital data such that the first block is referenced by the first file identifier; storing the first file identifier in the data storage system; setting the first file identifier's last-validation timestamp to the current time; storing the first block in the data storage system if the first block has not already been stored; determining if the system is currently in the process of removing unreferenced blocks; and if the system is currently in the process of removing unreferenced blocks, setting the first block's last-reference-check timestamp to the current time. In certain of these embodiments, maintaining a last-reference-check timestamp and maintaining a last-validation timestamp for each file identifier include: repeatedly performing a block reference update, the block reference update comprising: identifying the file identifier with the oldest last-validation timestamp in the data storage system as the current-file-identifier, validating each block referenced by the current-file-identifier such that each such block's last-reference-check timestamp is set to the current time; and updating the current-file-identifier's last-validation timestamp to the current time. In certain of these embodiments, each block in the storage system may exist in either a recycling bin or a primary storage bin, and where validating each block referenced by the current-file-identifier includes: if the block being validated does not exist in the primary storage bin, but does exist in the recycling bin, moving the block being validated back from the recycling bin to the primary storage bin; and if the block being validated exists neither in the primary storage bin nor the recycling bin, marking the current-file-identifier as invalid. In certain other of these embodiments, removing a block from the data storage system includes: providing an indication that unreferenced blocks are currently in the process of being removed from the storage system; removing blocks from the data storage system whose last-reference-check timestamp is earlier than the earliest last-validation timestamp; providing an indication that unreferenced blocks are no longer in the process of being removed from the storage system. In certain of these embodiments, each block may exist in either a recycling bin or a primary storage bin, and where removing all blocks from the data storage system includes: for each block in the primary storage bin whose last-reference-check timestamp is earlier than the earliest last-validation timestamp, moving the block to the recycling bin and setting the block's last-reference-check timestamp to the current time; and for each block in the recycling bin whose last-reference-check timestamp is earlier than the earliest last-validation timestamp, removing the block from the recycling bin and freeing any storage associated with the removed block. In certain of these such embodiments, an instance of digital data is further partitioned into respective additional data, where a combination of the respective plurality of blocks and additional data together represent all of the digital data of the instance, the additional data including at least one of position-dependent data, instance-dependent data, format-specific headers or footers, and format-specific transformations. In certain of these embodiments, maintaining a last-reference-check timestamp for each of the blocks, maintaining a last-validation timestamp for each file identifier, and removing a block from the data storage system are performed concurrently.
In yet another set of embodiments a method comprises: partitioning, in a data storage system, digital data into a plurality of blocks, including a first block, where each of the plurality of blocks has a last-reference-check timestamp, the last-reference-check timestamp indicating the last time, if ever, the block was validated to confirm that the block was referenced within the system; generating a file identifier based at least in part on the digital data, where the file identifier has a last-validation timestamp, the last-validation timestamp indicating when, if ever, any blocks associated with the file identifier were validated; associating the file identifier with the first block and the digital data such that the first block is referenced by the file identifier; storing the file identifier in a storage system; setting the file identifier's last-validation timestamp to the current time; storing the first block in the storage system if the first block has not already been stored; determining if the system is currently in the process of removing unreferenced blocks; and if the system is currently in the process of removing unreferenced blocks, setting the first block's last-reference-check timestamp to the current time. In some such embodiments, the digital data is further partitioned into additional data, where a combination of the plurality of blocks and the additional data together represent all of the digital data, and the additional data includes at least one of position-dependent data, instance-dependent data, format-specific headers or footers, and format-specific transformations.
In another set of embodiments, a method comprises: partitioning, in a data storage system, each of a plurality of instances of digital data into a respective plurality of blocks, where each instance of digital data is represented by a file identifier, the file identifier referencing each the respective plurality of blocks, and where each of the blocks in the system has a last-reference-check timestamp, the last-reference-check timestamp indicating the last time, if ever, the block was validated to confirm that the block was referenced by at least one file identifier within the system, and where each file identifier has a last-validation timestamp, the last-validation timestamp indicating when, if ever, blocks referenced by the file identifier were validated; repeatedly performing a block reference update, the block reference update comprising: identifying the file identifier with the oldest last-validation timestamp in the data storage system as the current-file-identifier, validating each block referenced by the current-file-identifier such that each such block's last-reference-check timestamp is set to the current time; and updating the current-file-identifier's last-validation timestamp to the current time. In some such embodiments each block in the storage system may exist in either a recycling bin or a primary storage bin, and validating each block referenced by the current-file-identifier includes: if the block being validated does not exist in the primary storage bin, but does exist in the recycling bin, moving the block being validated back from the recycling bin to the primary storage bin; if the block being validated exists neither in the primary storage bin nor the recycling bin, marking the file identifier as invalid. In some such embodiments each instance of digital data is further partitioned into respective additional data, where a combination of the respective plurality of blocks and additional data together represent all of the digital data of the instance, the additional data including at least one of position-dependent data, instance-dependent data, format-specific headers or footers, and format-specific transformations.
In still another set of embodiments, a method comprises: partitioning, in a data storage system, each of a plurality of instances of digital data into a respective plurality of blocks, where each instance of digital data is represented by a file identifier, the file identifier referencing each the respective plurality of blocks, and where each of the blocks in the system has a last-reference-check timestamp, the last-reference-check timestamp indicating the last time, if ever, the block was validated to confirm that the block was referenced by at least one file identifier within the system, and where each file identifier has a last-validation timestamp, the last-validation timestamp indicating when, if ever, blocks referenced by the file identifier were validated; providing an indication that unreferenced blocks are currently in the process of being removed from the storage system; removing all blocks from the data storage system whose last-reference-check timestamp is earlier than the earliest last-validation timestamp; providing an indication that unreferenced blocks are no longer in the process of being removed from the storage system. In some such embodiments, each block may exist in either a recycling bin or a primary storage bin, and removing all blocks from the data storage system includes: for each block in the primary storage bin whose last-reference-check timestamp is earlier than the earliest last-validation timestamp, moving the block to the recycling bin and setting the block's last-reference-check timestamp to the current time; and for each block in the recycling bin whose last-reference-check timestamp is earlier than the earliest last-validation timestamp, removing the block from the recycling bin and freeing any storage associated with the removed block. In other such embodiments, each instance of digital data is further partitioned into respective additional data, where a combination of the respective plurality of blocks and additional data together represent all of the digital data of the instance, the additional data including at least one of position-dependent data, instance-dependent data, format-specific headers or footers, and format-specific transformations.
A data de-duplication system can have the following basic components:
The following factors have hindered the scalability of the data de-duplication systems:
An advantage of data de-duplication systems is that they need to store only one copy of each unique block of data. While storing one copy of each block yields storage efficiency, it can place several requirements on data de-duplication systems. The system may have to:
These conditions are desired because, if even a single block is inaccessible, the entire data de-duplication system may become unusable.
Additionally, the following operating environment constraints, in which most data de-duplication systems operate, should be considered:
Ensuring that a block of data is not referenced by any file in a live system can be a challenge. In a live system that is receiving information regarding thousands of blocks per second, a block's reference information can change at any given time.
Traditional Systems
Traditional systems handle this problem by adopting the following measures:
Another problem with traditional systems is that while they can detect an integrity problem, they are typically unable to fix it by themselves. This inability can increase the cost of management of such systems if additional safeguards have to be built around those systems to help them recover from any integrity issues.
Traditional Method of Removing Unreferenced Blocks from Data De-Duplication System
Traditional data storage systems may organize the chunked digital data they store into several levels of hierarchical components, each of which represent and/or store different elements of the digital data.
BlockCheckSum (“BCS”): each file is broken into one or more smaller blocks using one or more chunking approaches specific to the data de-duplication repository. A checksum is computed for each block. This checksum is referred to as a BlockCheckSum, and may be used to reference the block.
FileCheckSum (“FCS”): for each file a checksum is computed for the entire file. This FileCheckSum is stored with the backup catalog of each file. The FileCheckSum may be considered a type of file identifier that represents the file as it is stored in the repository.
BlockMap: each FileCheckSum has a block map which keeps track of the interrelationships between the file and the blocks it is comprised of.
Mapping a File to FileCheckSum and BlockCheckSum Components
Still referring to
Each FileCheckSum as explained above has a BlockMap which contains the list of BlockCheckSums that comprise that particular FileCheckSum. Each BlockCheckSum maintains a reference count which is equal to the number of times it is being referenced inside all the BlockMaps.
The FileCheckSum is not deleted until the reference count associated with it is zero; i.e., there is no file is referring to it. Similarly a BlockCheckSum is not deleted until the reference count associated with it is zero; i.e., no FileCheckSum is referring to it.
A Highly Scalable, Reliable and Available Data De-Duplication System
A scalable, reliable, and available data de-duplication system is described, which can have the following attributes:
Embodiments that can identify unreferenced blocks, without relying on reference counts, are described here. One aspect of these embodiments include adding the following attributes to the metadata repository of a storage system:
Additionally, two block metadata storage containers are defined:
Based on the above additional attributes and the new metadata storage containers, the following embodiments are used for identifying and then removing unreferenced blocks from the data de-duplication system. The embodiments below are designed to be:
The embodiments consist of three primary processes, any combination of which may be running at a given time in a data storage system. One process concerns removing unreferenced blocks, and specifically unreferenced BlockCheckSums. A second process is associated with how to add new digital data to the storage system. This involves adding a new FileCheckSum while ensuring that any concurrently-running block removal process does not interfere with the addition of the blocks associated with the new FileCheckSum and vice versa. A third process, also runnable at any time with respect to the other two processes, is concerned with maintaining timestamps within the system to accommodate the needs of the block removal process and with maintaining referential integrity.
Method for Adding a New FileCheckSum
Method for Updating the Block Existence Time
Method for Removing Unreferenced Blocks
The above method of removing unreferenced blocks from the data de-duplication system has one or more of the following benefits:
Once a data de-duplication system has detected that there is an integrity issue, it should try to fix itself automatically. The following integrity issues are possible:
A highly reliable system should be able to detect the above issues and should have taken measures beforehand to ensure that it can fix these issues automatically.
Distributed Block Data and Metadata
A new system is described for intelligently distributing the metadata and block data for the centralized metadata and data repositories inherent in a data de-duplication system. The distribution is done by leveraging nodes of which one or more of them are already expected to be present in the system:
A reliable and self-healing system can influence and leverage these distributed copies of metadata and block data repositories to ensure that multiple copies of the metadata and data associated with each file, FileCheckSum, and BlockCheckSum are available in a system at a given time. The key attributes are:
The data de-duplication system can be implemented in hardware and/or software, including a special purpose processor, general purpose processor, or combination thereof. The processor can execute software programs stored in computer readable media and executed by a processor. The system for maintaining data can include one or more databases, and/or other suitable memory, including optical, magnetic, or solid state.
Although the present disclosure has been described and illustrated in the foregoing example embodiments, it is understood that the present disclosure has been made only by way of example, and that numerous changes in the details of implementation of the disclosure may be made without departing from the spirit and scope of the disclosure, which is limited only by the claims which follow. Other embodiments are within the following claims. For example, the described methods for removing unreferenced blocks could be implemented in data storage systems such as generalized databases in addition to backup systems, or within systems storing digital data in forms other than as files.
This application claims priority to U.S. Provisional Application 61/314,293 filed Mar. 16, 2010, the entire contents of which are incorporated herein by reference. This disclosure is also related to the disclosure in U.S. patent application Ser. No. 12/642,023, filed Dec. 18, 2009 and published as U.S. Publication No. 2010/0161608 A1, which is incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
5590810 | Wehbi | Jan 1997 | A |
5873104 | Tremblay et al. | Feb 1999 | A |
5990810 | Williams | Nov 1999 | A |
6065046 | Feinberg et al. | May 2000 | A |
6526493 | Ding | Feb 2003 | B1 |
6704730 | Moulton et al. | Mar 2004 | B2 |
6742081 | Talagala et al. | May 2004 | B2 |
6941436 | Lee et al. | Sep 2005 | B2 |
6959291 | Armstrong et al. | Oct 2005 | B1 |
6976146 | Aiello et al. | Dec 2005 | B1 |
7051180 | Downer et al. | May 2006 | B2 |
7065619 | Zhu et al. | Jun 2006 | B1 |
7272602 | Moulton | Sep 2007 | B2 |
7305532 | Zhu et al. | Dec 2007 | B2 |
7373464 | Zhu et al. | May 2008 | B2 |
7430616 | Husain et al. | Sep 2008 | B2 |
7472242 | Deshmukh et al. | Dec 2008 | B1 |
7477166 | McCanne et al. | Jan 2009 | B2 |
7504969 | Patterson et al. | Mar 2009 | B2 |
7562186 | Li et al. | Jul 2009 | B2 |
7590644 | Matsakis et al. | Sep 2009 | B2 |
7624335 | Maheshwari et al. | Nov 2009 | B1 |
7860843 | Dodd et al. | Dec 2010 | B2 |
7925683 | Jain et al. | Apr 2011 | B2 |
7979569 | Eisner et al. | Jul 2011 | B2 |
20020169972 | Tanaka et al. | Nov 2002 | A1 |
20030131154 | Downer et al. | Jul 2003 | A1 |
20030212873 | Lee et al. | Nov 2003 | A1 |
20040073835 | Kim | Apr 2004 | A1 |
20040091392 | McBride et al. | May 2004 | A1 |
20040139097 | Farber et al. | Jul 2004 | A1 |
20050050459 | Qu et al. | Mar 2005 | A1 |
20050216669 | Zhu et al. | Sep 2005 | A1 |
20060047855 | Gurevich et al. | Mar 2006 | A1 |
20060059171 | Borthakur et al. | Mar 2006 | A1 |
20060069719 | McCanne et al. | Mar 2006 | A1 |
20060069733 | Antonoff et al. | Mar 2006 | A1 |
20060109909 | Chang et al. | May 2006 | A1 |
20060206669 | Zhu et al. | Sep 2006 | A1 |
20060212439 | Field | Sep 2006 | A1 |
20070028110 | Brennan | Feb 2007 | A1 |
20070061544 | Uppala | Mar 2007 | A1 |
20070143359 | Uppala | Jun 2007 | A1 |
20070239945 | Li et al. | Oct 2007 | A1 |
20070239946 | Zhu | Oct 2007 | A1 |
20080013830 | Patterson et al. | Jan 2008 | A1 |
20080050025 | Bashyam et al. | Feb 2008 | A1 |
20080050026 | Bashyam et al. | Feb 2008 | A1 |
20080050027 | Bashyam et al. | Feb 2008 | A1 |
20080050029 | Bashyam et al. | Feb 2008 | A1 |
20080050047 | Bashyam et al. | Feb 2008 | A1 |
20080082525 | Cha et al. | Apr 2008 | A1 |
20080133835 | Zhu et al. | Jun 2008 | A1 |
20080159331 | Mace et al. | Jul 2008 | A1 |
20080183767 | Zhu et al. | Jul 2008 | A1 |
20080256143 | Reddy et al. | Oct 2008 | A1 |
20080270729 | Reddy et al. | Oct 2008 | A1 |
20080281908 | McCanne et al. | Nov 2008 | A1 |
20080294660 | Patterson et al. | Nov 2008 | A1 |
20080320106 | McCanne et al. | Dec 2008 | A1 |
20080320151 | McCanne et al. | Dec 2008 | A1 |
20090063528 | Yueh | Mar 2009 | A1 |
20090063795 | Yueh | Mar 2009 | A1 |
20090079597 | McCanne et al. | Mar 2009 | A1 |
20090083563 | Murase | Mar 2009 | A1 |
20090216774 | Rao et al. | Aug 2009 | A1 |
20090216788 | Rao et al. | Aug 2009 | A1 |
20090240718 | Rao et al. | Sep 2009 | A1 |
20090265397 | Williams | Oct 2009 | A1 |
20090287725 | Von Praun | Nov 2009 | A1 |
20090287874 | Rogers et al. | Nov 2009 | A1 |
20090289819 | Mahoney | Nov 2009 | A1 |
20090327625 | Jaquette et al. | Dec 2009 | A1 |
20100042790 | Mondal et al. | Feb 2010 | A1 |
20100161608 | Jain et al. | Jun 2010 | A1 |
20100161685 | Jain et al. | Jun 2010 | A1 |
20110016091 | Prahlad et al. | Jan 2011 | A1 |
20110145207 | Agrawal et al. | Jun 2011 | A1 |
20110225129 | Agrawal | Sep 2011 | A1 |
20110225141 | Chaudhry et al. | Sep 2011 | A1 |
Number | Date | Country |
---|---|---|
10-2004-0091392 | Oct 2004 | KR |
WO-2009087028 | Jul 2009 | WO |
WO-2010080591 | Jul 2010 | WO |
WO-2011113042 | Sep 2011 | WO |
WO-2011116087 | Sep 2011 | WO |
Entry |
---|
International Search Report and Written Opinion of the International Searching Authority, the Korean Intellectual Property Office, for International Application No. PCT/US2011/028318, date of mailing Sep. 27, 2011, 7 pages. |
International Search Report and Written Opinion of the International Searching Authority the Korean Intellectual Property Office for PCT/US2009/068687, mailing date of Aug. 3, 2010, 7 pages. |
International Search Report and Written Opinion of the International Searching Authority, the Korean Intellectual Property Office, for International Application No. PCT/US2011/028656, dated Oct. 26, 2011, 6 pages. |
Number | Date | Country | |
---|---|---|---|
20110231374 A1 | Sep 2011 | US |
Number | Date | Country | |
---|---|---|---|
61314293 | Mar 2010 | US |