Enabling data integrity checking and faster application recovery in synchronous replicated datasets
First Claim
1. A method comprising:
- evaluating a snapshot create request using a snapshot replication policy rule to determine whether the snapshot create request comprises a replication label, wherein the snapshot replication policy rule is specified for a synchronous replication relationship between a first node hosting first storage and a second node hosting second storage, the snapshot replication policy rule specifying that the replication label is used to designate that snapshot create requests, targeting the first storage and having the replication label, are to be replicated to the second storage and that snapshot create requests without the replication label are excluded from being replicated to the second storage;
creating a snapshot of the first storage at the first node based upon the snapshot create request;
creating a replication snapshot of the second storage at the second node based upon the snapshot create request comprising the replication label; and
validating data integrity based upon a comparison of the snapshot and the replication snapshot.
1 Assignment
0 Petitions
Accused Products
Abstract
One or more techniques and/or computing devices are provided for utilizing snapshots for data integrity validation and/or faster application recovery. For example, a first storage controller, hosting first storage, has a synchronous replication relationship with a second storage controller hosting second storage. A snapshot replication policy rule is defined to specify that a replication label is to be used for snapshot create requests, targeting the first storage, that are to be replicated to the second storage. A snapshot creation policy is created to issue snapshot create requests comprising the replication label. Thus a snapshot of the first storage and a replication snapshot of the second storage are created based upon a snapshot create request comprising the replication label. The snapshot and the replication snapshot may be compared for data integrity validation (e.g., determine whether the snapshots comprise the same data) and/or quickly recovering an application after a disaster.
-
Citations
20 Claims
-
1. A method comprising:
-
evaluating a snapshot create request using a snapshot replication policy rule to determine whether the snapshot create request comprises a replication label, wherein the snapshot replication policy rule is specified for a synchronous replication relationship between a first node hosting first storage and a second node hosting second storage, the snapshot replication policy rule specifying that the replication label is used to designate that snapshot create requests, targeting the first storage and having the replication label, are to be replicated to the second storage and that snapshot create requests without the replication label are excluded from being replicated to the second storage; creating a snapshot of the first storage at the first node based upon the snapshot create request; creating a replication snapshot of the second storage at the second node based upon the snapshot create request comprising the replication label; and validating data integrity based upon a comparison of the snapshot and the replication snapshot. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A non-transitory machine readable medium having stored thereon instructions for performing a method comprising machine executable code which when executed by at least one machine, causes the machine to:
-
evaluate a snapshot create request using a snapshot replication policy rule to determine whether the snapshot create request comprises a replication label, wherein the snapshot replication policy rule is specified for a synchronous replication relationship between a first node hosting first storage, and a second node hosting second storage, the snapshot replication policy rule specifying that the replication label is used to designate that snapshot create requests, targeting the first storage and having the replication label, are to be replicated to the second storage and that snapshot create requests without the replication label are excluded from being replicated to the second storage; create a snapshot of the first storage at the first node based upon the snapshot create request; and create a replication snapshot of the second storage at the second node as a replication application consistent snapshot based upon the snapshot create request comprising the replication label; and validate data integrity based upon a comparison of the snapshot and the replication snapshot. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A computing device comprising:
-
a memory containing machine readable medium comprising machine executable code having stored thereon instructions for performing a method; and a processor coupled to the memory, the processor configured to execute the machine executable code to cause the processor to; evaluate a snapshot create request using a snapshot replication policy rule to determine whether the snapshot create request comprises a replication label, wherein the snapshot replication policy rule is specified for a synchronous replication relationship between a first node hosting first storage and a second node hosting second storage, the snapshot replication policy rule specifying that the replication label is used to designate that snapshot create requests, targeting the first storage and having the replication label, are to be replicated to the second storage and that snapshot create requests without the replication label are excluded from being replicated to the second storage; create a snapshot of the first storage at the first node based upon the snapshot create request; and create a replication snapshot of the second storage at the second node based upon the snapshot create request comprising the replication label. - View Dependent Claims (19, 20)
-
Specification