More Elegant Exastore Apparatus and Method of Operation
First Claim
1. A computer-implemented method for control of an apparatus comprising a processor configured by instructions stored on a non-transitory computer readable medium, the method comprising:
- receiving from a backup client of a plurality of backup clients distinguishable by a client identifier, a substantially unique characteristic derived from a shard;
determining when the shard is a previously stored shard or a new shard to be stored,when the shard is a previously stored shard,appending the client identifier of the backup client to an end of a previously stored uniquely named flat file.
11 Assignments
0 Petitions
Accused Products
Abstract
An apparatus to scale for multiple petabyte backup in redundant locations. Workload is automatically shared among many servers by a characteristic derived from the content itself. Duplicate storage is eliminated by checking for the existence or absence of simple files and appending client identification to files shared among multiple subscribers. Replication depends on simple atomic file operations rather than use of tables or databases. An efficient storage method for much larger quantities of data than conventional services.
77 Citations
20 Claims
-
1. A computer-implemented method for control of an apparatus comprising a processor configured by instructions stored on a non-transitory computer readable medium, the method comprising:
-
receiving from a backup client of a plurality of backup clients distinguishable by a client identifier, a substantially unique characteristic derived from a shard; determining when the shard is a previously stored shard or a new shard to be stored, when the shard is a previously stored shard, appending the client identifier of the backup client to an end of a previously stored uniquely named flat file. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
wherein the name of the new uniquely named flat file comprises the substantially unique characteristic derived from the shard.
-
-
5. The method of claim 4 wherein determining when the shard is a previously stored shard comprises determining when a flat file already exists which has a name comprising the substantially unique characteristic derived from the shard.
-
6. The method of claim 5 further comprising:
creating a token file to request replication of a shard and creating a token file to request replication of a uniquely named flat file wherein replication comprises storing to at least one non-transitory computer-readable medium on an other apparatus.
-
7. The method of claim 6 further comprising
deleting the token file when a shard of a uniquely named flat file has been successfully replicated. -
8. The method of claim 7 further comprising
assigning the shard and the substantially named flat file to a server according to an except from the substantially unique characteristic derived from the shard. -
9. The method of claim 8 wherein the except is a range of characters in the substantially unique characteristic.
-
10. The method of claim 9 further comprising
assigning the shard to a group of servers based on the client identifier of the backup client.
-
11. A method comprising,
receiving a shard and meta-data of a shard from a backup client, assigning to a server based on the first n bytes of a key, and appending to a file for the shard, the client id of the backup client.
-
18. An apparatus comprising
a file management circuit to determine if a uniquely named flat file exists, when the uniquely named flat file exists, to append a client identifier to the end of the file, when the uniquely named flat file does not exist, to create and store a flat file comprising an encryption key and a client identifier and to request and store a shard with the substantially unique characteristic as the name of the flat file.
Specification