Backup solutions, such as EMC® Networker® backup offerings, may be used to back up data associated with applications and/or services. For example, a SQL or other database may be backed up using such solutions. Typically, a backup API of the application server may be called to cause the application to generate the backup data that is to be indexed and stored by the backup solution on backup media.
For large files and data sets, such as a very large database file, a FULL backup (i.e., a complete copy of all data objects in a data set) may be desired to be performed only during maintenance periods, e.g., when demand to access the production data may be expected to be relatively low, such as on weekends or late at night. At other times, a DIFFERENTIAL backup may be generated. A differential backup typically involves backing up only data that has been changed since a most recently completed backup. A differential backup may comprise data sufficient to reconstruct the data set as of the backup time with which the differential backup is associated, but only if a full backup referenced by the differential backup is available. For example, a full backup of a data set as of lam and a differential backup of the data set as of 10 am that references the lam full backup may be required to restore the data set to its state as of the 10 am differential backup.
As noted, to be useable to restore the data set without data loss to a state associated with a differential backup both data backed up during the differential backup and the full backup on which the differential backup depends must be available. In addition, since the application API typically is used to generate the backup data, it may be necessary to ensure that no intervening backup that might have changed the last backed up state of the application data from the perspective of the application has been performed. In modern network environments, backup solutions from more than one backup vendor may be in use in a network or other enterprise environment. In some cases, to ensure continuity a check may be required and performed to determine whether any backup of application data has been performed by another vendor's backup solution which might result in data loss if a differential backup is performed that depends on a full backup that was taken prior to such an intervening backup having been performed.
Various embodiments of the invention are disclosed in the following detailed description and the accompanying drawings.
The invention can be implemented in numerous ways, including as a process; an apparatus; a system; a composition of matter; a computer program product embodied on a computer readable storage medium; and/or a processor, such as a processor configured to execute instructions stored on and/or provided by a memory coupled to the processor. In this specification, these implementations, or any other form that the invention may take, may be referred to as techniques. In general, the order of the steps of disclosed processes may be altered within the scope of the invention. Unless stated otherwise, a component such as a processor or a memory described as being configured to perform a task may be implemented as a general component that is temporarily configured to perform the task at a given time or a specific component that is manufactured to perform the task. As used herein, the term ‘processor’ refers to one or more devices, circuits, and/or processing cores configured to process data, such as computer program instructions.
A detailed description of one or more embodiments of the invention is provided below along with accompanying figures that illustrate the principles of the invention. The invention is described in connection with such embodiments, but the invention is not limited to any embodiment. The scope of the invention is limited only by the claims and the invention encompasses numerous alternatives, modifications and equivalents. Numerous specific details are set forth in the following description in order to provide a thorough understanding of the invention. These details are provided for the purpose of example and the invention may be practiced according to the claims without some or all of these specific details. For the purpose of clarity, technical material that is known in the technical fields related to the invention has not been described in detail so that the invention is not unnecessarily obscured.
Techniques to efficiently backup data are disclosed. In various embodiments, a check may be performed at the time a differential backup is to be performed to ensure no intervening backup that might result in data loss has been performed, e.g., by a third party backup vendor, since a last full backup with respect to which the differential backup is to be performed. In various embodiments, to avoid unnecessary promotion of a differential backup to full backup techniques are disclosed to determine based on backup event type whether an intervening backup, if determined to be present, requires promotion of a differential backup to full backup.
In various embodiments, if an intervening backup (e.g., performed by another backup vendor's backup solution) is found to have been performed subsequent to a full backup with respect to which a differential backup is scheduled or otherwise indicated to be taken, the type of backup is checked to determine whether it is necessary to promote the differential backup to full backup. For example, in the case of a Microsoft® SQL server, if an intervening backup is determined to have been a “transaction log” or “TLOG” backup, the differential backup would not promoted to full backup.
In various embodiments, backup agent 104 may be configured to determine, in the event of a differential backup, whether a risk of data loss is presented if a differential backup is performed. For example, in various embodiments, backup agent 104 may be configured to determine whether a last full backup to be referenced by the differential backup is in fact the last full backup to have been performed of the protected data set, e.g., SQL database 106 in the example shown in
In various embodiments, a risk of data loss may be present if a differential backup is performed even if the full backup it references remains available. For example, if another vendor has performed certain types of backup operation, by invoking a backup or related API of SQL server 102 for example, insufficient data may be obtained and backed up in a subsequent differential backup by a vendor whose backup solution performed the last full backup. For this reason, in some prior approaches, detection of any intervening backup performed by another vendor's solution between the time of the full back referenced by a differential backup and the differential backup typically would result in the differential backup being promoted to full backup. However, certain types of backup or related operation that a third party backup vendor's solution may cause a backup client, such as SQL server 102, to perform between the time of a last full back and a subsequent differential backup by the same vendor would not present a risk of data loss.
Examples of an intervening backup operation that would not present such a risk of data loss include, without limitation, a transaction log or TLOG backup of SQL database 106. A transaction log backup, for example, would not result in change block tracking data structures being reset, for example, and therefore no changes would be lost if a differential backup were performed subsequent to such a transaction log backup.
In various embodiments, backup agent 104 and/or backup server 110 is/are configured to query SQL server 102 in such a way that transaction log backups by a third party vendor, and/or other backup operations that do not give rise to a risk of data loss, either are not detected and/or are filtered out of a set of backups identified by the SQL server 102 as having been performed. In various embodiments, if there is no intervening backup OR if the only intervening backup(s) is/are of a type that does not present a risk of data loss in the event a differential backup is performed, such as a transaction log backup of SQL server 102, the intervening backup (if any) is ignored and the differential backup is performed (i.e., the differential backup is not promoted to a full backup).
Using techniques disclosed herein, unnecessarily promoting a differential backup to full backup may be prevented, thereby avoiding the consumption of resources and potential down time of the production system to perform a full backup at a time when a differential backup would be sufficient.
Although the foregoing embodiments have been described in some detail for purposes of clarity of understanding, the invention is not limited to the details provided. There are many alternative ways of implementing the invention. The disclosed embodiments are illustrative and not restrictive.
Number | Name | Date | Kind |
---|---|---|---|
5778395 | Whiting | Jul 1998 | A |
6397308 | Ofek | May 2002 | B1 |
6651077 | East | Nov 2003 | B1 |
6675177 | Webb | Jan 2004 | B1 |
7165154 | Coombs et al. | Jan 2007 | B2 |
7801859 | Desai | Sep 2010 | B1 |
7941619 | Rossi | May 2011 | B1 |
8260750 | Gugick | Sep 2012 | B1 |
8341121 | Claudatos | Dec 2012 | B1 |
8583601 | Claudatos | Nov 2013 | B1 |
8615495 | Payne | Dec 2013 | B1 |
8666944 | Beatty | Mar 2014 | B2 |
8712970 | Sim-Tang | Apr 2014 | B1 |
8756198 | Mehrotra | Jun 2014 | B2 |
9032171 | Niles | May 2015 | B2 |
9235606 | Mooney | Jan 2016 | B1 |
9740577 | Chakraborty | Aug 2017 | B1 |
10108652 | Kumarasamy | Oct 2018 | B2 |
10503604 | Anami | Dec 2019 | B2 |
20020107877 | Whiting | Aug 2002 | A1 |
20040030852 | Coombs et al. | Feb 2004 | A1 |
20060059384 | Helliker | Mar 2006 | A1 |
20070136541 | Herz et al. | Jun 2007 | A1 |
20100218966 | Liebhard | Sep 2010 | A1 |
20100332453 | Prahlad | Dec 2010 | A1 |
20100332561 | Prahlad | Dec 2010 | A1 |
20100332990 | Prahlad | Dec 2010 | A1 |
20110218966 | Barnes | Sep 2011 | A1 |
20120078855 | Beatty | Mar 2012 | A1 |
20120239624 | Barnes | Sep 2012 | A1 |
20130006945 | Prahlad | Jan 2013 | A1 |
20130151472 | Niles | Jun 2013 | A1 |
20130238559 | Bushman | Sep 2013 | A1 |
20140025640 | Prahlad | Jan 2014 | A1 |
20150199239 | Prahlad | Jul 2015 | A1 |
20150242428 | Niles | Aug 2015 | A1 |
20150278034 | Barnes | Oct 2015 | A1 |
20160364156 | Haustein | Dec 2016 | A1 |
20170116088 | Anami | Apr 2017 | A1 |
20170192683 | Neporada | Jul 2017 | A1 |
20170255526 | Barnes | Sep 2017 | A1 |
20190102094 | Mutha | Apr 2019 | A1 |