Computer data is vital to today's organizations and a significant part of protection against disasters is focused on data protection. As solid-state memory has advanced to the point where cost of storage has become a relatively insignificant factor, organizations can afford to operate with systems that store and process terabytes of data.
Conventional data protection systems include tape backup drives, for storing organizational production site data on a periodic basis. Another conventional data protection system uses data replication, by creating a copy of production site data of an organization on a secondary backup storage system, and updating the backup with changes. The backup storage system may be situated in the same physical location as the production storage system, or in a physically remote location. Data replication systems generally operate either at the application level, at the file system level, or at the data block level.
In one aspect, a method includes configuring a kernel driver to record data block changes of a logical unit in a bit map and using the bitmap to perform an incremental backup of the logical unit. In another aspect, an apparatus includes electronic hardware circuitry configured to configure a kernel driver to record data block changes of a logical unit in a bit map and use the bitmap to perform an incremental backup of the logical unit. In a further aspect, an article includes a non-transitory computer-readable medium that stores computer-executable instructions. The instructions cause a machine to configure a kernel driver to record data block changes of a logical unit in a bit map and use the bitmap to perform an incremental backup of the logical unit.
Described herein are techniques to perform host-side tracking of data blocks for incremental backup. In one example, these techniques may be applied to multi-host configurations where a logical unit is shared by multiple hosts. Using these techniques, no special support from a block storage system is required (beyond the ability to take snapshots). Tracking changed blocks for shared LUNs has very limited overhead, with no cross-host synchronization required in the normal block I/O path.
Referring to
Referring to
Referring to
Referring to
Referring to
Process 400 switches to a new bitmap (404). For example, a command is issued to the kernel driver 112 to start a new bit map X′. Processing block 404 is atomic with respect to any application writes
Process 400 obtains bit map from the kernel driver (406). For example, the backup module 150 obtains the bit map 126 from the kernel driver 112. In one particular example, processing blocks 404 and 406 are performed simultaneously.
Process 400 takes a snapshot of the logical unit (412). For example, the backup module 150 takes or causes to be taken a snapshot of the logical unit 160 and placed on the local storage 116.
Process 400 obtains the new bitmap (414) and merges the previous bit map with the new bit map (422). For example, the bitmap X and a new bitmap X′ are merged together to form a single bitmap using a logical “or” function.
Process 400 copies the changed data blocks to the object store (432). For example, the backup module 150 uses the combined bitmap 422 to identify which portions of the snapshot hold changed data and copies that data to the object store 118.
Process 400 releases the snapshot after the copy is done (436). For example, the backup module 150 releases the snapshot taken in processing block 412 to be, for example, erased after processing block 432 has completed or the storage consumed by the snapshot is freed so it can be used for other purposes.
Referring to
Referring to
Process 600 instructs each host to switch to a new bitmap for each kernel driver (604). For example, each of the kernel drivers 112a-112c are instructed to start a new bit map X′. Processing block 604 occurs between application writes.
Process 600 instructs each host to obtain a bit map, X (606). For example, each of the kernel drivers 112a-112c are instructed to obtain their respective bit map 126a-126c. In one example, processing blocks 604 and 606 are performed simultaneously.
Process 600 takes a snapshot of the logical unit (610). For example, the backup module 150 takes or causes to be taken a snapshot of the logical unit 160 to the object block storage after processing blocks 604 and 606 have completed.
Process 600 provides the ID of the snapshot to each of the hosts (612). For example, the backup module 150 sends the ID of the snapshot of the logical unit to each of the backup modules 152, 154.
Process 600 instructs each host to: obtain the new bitmap (614) and merge the previous bit map with the new bit map (622). For example, each of the backup modules 150, 152, 154 are instructed (e.g., by a user component) to get their respective new bit map X′ and merge the previous bitmap X with the new bitmap X′ to form a merged bitmap using a logical “or” function.
Process 600 instructs each host to copy the changed data to the object store (632). For example, each of the backup modules 150, 152, 154 uses their respective merged bitmap to identify the data that has changed and to the copy the changed data from the snapshot taken in processing block 612 to the object store 118.
Process 600 releases the snapshot after the copy is done (636). For example, the backup module 150 releases the snapshot taken in processing block 612 to be, for example, erased after processing block 632 has completed.
Referring to
Process 700 instruct each host to switch to a new bitmap, X′ (704). For example, a command is issued to the kernel driver 112a-112c to start a new bit map.
Process 700 obtains a bit map X from each kernel driver (706). For example, the backup module 150 obtains the bit maps 126a-126c from the kernel drivers 112a-112c.
Processing blocks 704 and 706 are either performed simultaneously, or the new bit map is started before the old bit map is retrieved. Starting the new bitmap must be synchronized so that no writes are lost.
Process 700 takes a snapshot of the logical unit (712). For example, the backup module 150 takes or causes to be taken a snapshot of the logical unit 160 on the storage 116 after processing blocks 704 and 706 have completed.
Process 700 obtains the new bitmap from each host (714) and merges the previous bit map with the new bit map (722). For example, the bitmap X and a new bitmap X′ are merged together to form a single bitmap using a logical “or” function.
Process 700 segments changed block by host (726) and distributes change blocks by host (728). For example, each host 110a-110c will receive a section of the bitmap which indicates a partial set of the data blocks that have changed.
Process 700 instructs each host to use the bitmap section it was sent to identify a set of blocks which have changed, to read those blocks from the snapshot, and to copy them to the object store (732). For example, each of the backup modules 150, 152, 154 copies the data that changed to the object store 118.
Process 700 releases the snapshot after the copy is done (736). For example, the backup module 150 releases the snapshot taken in processing block 712 to be, for example, erased after processing block 732 has completed.
Referring to
The processes described herein (e.g., processes 200, 300, 400, 600 and 700) are not limited to use with the hardware and software of
The system may be implemented, at least in part, via a computer program product, (e.g., in a non-transitory machine-readable storage medium such as, for example, a non-transitory computer-readable medium), for execution by, or to control the operation of, data processing apparatus (e.g., a programmable processor, a computer, or multiple computers)). Each such program may be implemented in a high level procedural or object-oriented programming language to communicate with a computer system. However, the programs may be implemented in assembly or machine language. The language may be a compiled or an interpreted language and it may be deployed in any form, including as a stand-alone program or as a module, component, subroutine, or other unit suitable for use in a computing environment. A computer program may be deployed to be executed on one computer or on multiple computers at one site or distributed across multiple sites and interconnected by a communication network. A computer program may be stored on a non-transitory machine-readable medium that is readable by a general or special purpose programmable computer for configuring and operating the computer when the non-transitory machine-readable medium is read by the computer to perform the processes described herein. For example, the processes described herein may also be implemented as a non-transitory machine-readable storage medium, configured with a computer program, where upon execution, instructions in the computer program cause the computer to operate in accordance with the processes. A non-transitory machine-readable medium may include but is not limited to a hard drive, compact disc, flash memory, non-volatile memory, volatile memory, magnetic diskette and so forth but does not include a transitory signal per se.
The processes described herein are not limited to the specific examples described. For example, the processes 200, 300, 400, 600 and 700 are not limited to the specific processing order of
The processing blocks (for example, in the processes 200, 300, 400, 600 and 700) associated with implementing the system may be performed by one or more programmable processors executing one or more computer programs to perform the functions of the system. All or part of the system may be implemented as, special purpose logic circuitry (e.g., an FPGA (field-programmable gate array) and/or an ASIC (application-specific integrated circuit)). All or part of the system may be implemented using electronic hardware circuitry that include electronic devices such as, for example, at least one of a processor, a memory, a programmable logic device or a logic gate.
Elements of different embodiments described herein may be combined to form other embodiments not specifically set forth above. Various elements, which are described in the context of a single embodiment, may also be provided separately or in any suitable subcombination. Other embodiments not specifically described herein are also within the scope of the following claims.
Number | Name | Date | Kind |
---|---|---|---|
6385706 | Ofek et al. | May 2002 | B1 |
7603533 | Tsypliaev et al. | Oct 2009 | B1 |
7953948 | Dyatlov et al. | May 2011 | B1 |
8010495 | Kuznetzov et al. | Aug 2011 | B1 |
8108640 | Holl, II | Jan 2012 | B1 |
8370301 | Chen | Feb 2013 | B1 |
9171002 | Mam | Oct 2015 | B1 |
9424137 | Mam | Aug 2016 | B1 |
20020079221 | Dolphin | Jun 2002 | A1 |
20030061399 | Wagener et al. | Mar 2003 | A1 |
20050015685 | Yamamoto | Jan 2005 | A1 |
20050125609 | Satoyama et al. | Jun 2005 | A1 |
20060015696 | Nguyen et al. | Jan 2006 | A1 |
20070088767 | Passerini et al. | Apr 2007 | A1 |
20070220309 | Andre et al. | Sep 2007 | A1 |
20080301663 | Bahat | Dec 2008 | A1 |
20090006792 | Federwisch et al. | Jan 2009 | A1 |
20100023716 | Nemoto | Jan 2010 | A1 |
20100076934 | Pershin et al. | Mar 2010 | A1 |
20100077165 | Lu et al. | Mar 2010 | A1 |
20110231698 | Zlati | Sep 2011 | A1 |
20120079221 | Sivasubramanian | Mar 2012 | A1 |
20130238562 | Kumarasamy | Sep 2013 | A1 |
20140108351 | Nallathambi | Apr 2014 | A1 |
20160147607 | Dornemann | May 2016 | A1 |
Entry |
---|
Response to U.S. Non-Final Office Action dated May 19, 2017 for U.S. Appl. No. 14/674,308; Response filed on Aug. 14, 2017; 12 Pages. |
U.S. Non-Final Office Action dated May 19, 2017 for U.S. Appl. No. 14/674,308; 14 Pages. |
U.S. Appl. No. 14/674,308, filed Mar. 31, 2015, O'Connell et al. |
U.S. Final Office Action dated Nov. 16, 2017 for U.S. Appl. No. 14/674,308; 18 Pages. |
Response to U.S. Final Office Action dated Nov. 16, 2017 U.S. Appl. No. 14/674,308; Response filed on Feb. 14, 2018; 10 Pages. |