Abstract:
Techniques are described for reducing I/O operations and storage capacity requirements for centralized backup storage systems. A central server optimizes the collection and centralization of backup data from a number of endpoint devices for backup purposes. The central server utilizes a single instance store and a persistent files cache to minimize the number of backup copies for each non-unique file, reduce storage usage, network traffic, memory footprint and CPU cycles required to identify and process non-unique data. For each file in the single instance store, the server tracks the source device of that file until a threshold number of devices have been reached. Once the file reaches the threshold number of sources, the file is marked as persistent and its hash value is placed in the persistent files cache. Thereafter, all pointer creation and reference counting for that file cease.
Abstract:
In one aspect, a method to send a snapshot to a replication site includes generating a first snapshot of a production storage volume at a first point in time, generating a second snapshot of the production storage volume at a second point in time after the first point in time, obtaining differences between the first snapshot and the second snapshot, reading signatures from the production storage volume, sending the signatures to the replication site, writing the signatures to the replication site, reading data from changed locations in the second snapshot which is not at the replication site and sending the data from the changed locations to the replication site comprising a replica volume replicating the production storage volume. The production storage volume is part of a deduplication-based storage array.
Abstract:
The present invention is directed to computer storage systems and methods thereof. More specifically, embodiments of the present invention provide an isolated storage control system that includes both a non-volatile memory and a volatile memory. The non-volatile memory comprises a data area and a metadata area. In power failure or similar situations, content of the volatile memory is copied to the data area of the non-volatile memory, and various system parameters are stored at the metadata area. When the system restores its operation, the information at the metadata area is processed, and the content stored at the data area of the non-volatile memory is copied to the volatile memory. There are other embodiments as well.
Abstract:
Techniques relate to fingerprint-initiated trace extraction. A determination is made of whether a fingerprint is present in software that is currently executing on a processor of a computer system. The fingerprint comprises a representation of a sequence of behavior that occurs in the processor while the software is executing. In response to determining that the fingerprint is not present in the software currently executing on the processor, monitoring continues for the software executing on the processor to determine whether the fingerprint is present. In response to determining that the fingerprint is present in the software executing on the processor, a trace is triggered of a code segment of the software corresponding to when the fingerprint is recognized. The trace is for a record of instructions of the code segment of the software.
Abstract:
Embodiments of the present invention provide a system and method for synchronizing data to update backup files. In one embodiment, data associated with files to be synchronized is sent to a second computer system by a first computers system. The second computer system matches data associated with the files to be synchronized to a database, and the first computer system determines differences between an old and new version of the files to be synchronized and creates a backup of the files. The backup of the files is stored in a storage device.
Abstract:
A method for data locality control in a deduplication system is provided. The method includes forming a fingerprint cache from a backup image corresponding to a first backup operation. The method includes removing one or more fingerprints from inclusion in the fingerprint cache, in response to the one or more fingerprints having a data segment locality, in a container, less than a threshold of data segment locality. The container has one or more data segments corresponding to the one or more fingerprints. The method includes applying the fingerprint cache, with the one or more fingerprints removed from inclusion therein, to a second backup operation, wherein at least one method operation is executed through a processor.
Abstract:
Hash value comparison during crash-tolerant incremental change tracking between backups of a source storage. In one example embodiment, a method includes assigning each block in a source storage into one of multiple zones, creating a nonvolatile zone map, tracking each of the zones that is changed between a first point in time and a second point in time, identifying, as potentially changed zone blocks, the blocks in the source storage assigned to any zone marked as changed in the nonvolatile zone map, identifying, as potentially outdated backup blocks, the most recently backed-up blocks in one or more prior backups that correspond to the potentially changed zone blocks, calculating source hash values of the potentially changed zone blocks, calculating backup hash values of the potentially outdated backup blocks, and comparing the source hash values to the backup hash values to determine which blocks in the source storage actually changed.
Abstract:
A method for backing up a client data set on a computer by generating a manifest of the client data set and storing the manifest on a remote server along with a server data set corresponding to the client data set; taking a snapshot of the server manifest and data set; and comparing the manifest to the remote server data set and synchronizing the client dataset if a difference is detected.
Abstract:
The present disclosure provides for efficiently creating a full backup image of a client device by efficiently communicating backup data to a backup server using a change tracking log, or track log. A present full backup image can be created using a track log that is associated with a previous full backup image. The client device can determine whether files, which were included in the previous full backup image, have or have not changed using the track log. The client device can transmit changed file data to the backup server for inclusion in the present full backup image. The client device can also transmit metadata identifying unchanged file data to the backup server. The backup server can use the metadata to extract a copy of the unchanged file data from the previous full backup image for inclusion in the present full backup image.
Abstract:
An approach is provided to apply a virtual machine (VM) image to a computer system. In the approach, implemented by an information handling system, a detection is made that a current VM image executing on the computer system is experiencing a problem. In response, prior VM images are analyzed, with each of the prior VM images being an image that was previously executed on the computer system. Based on the analysis, one of the prior VM images is selected and the selected image is used to replace the current VM image on the computer system.