POINT-IN-TIME BACKUPS OF A PRODUCTION APPLICATION MADE ACCESSIBLE OVER FIBRE CHANNEL AND/OR ISCSI AS DATA SOURCES TO A REMOTE APPLICATION BY REPRESENTING THE BACKUPS AS PSEUDO-DISKS OPERATING APART FROM THE PRODUCTION APPLICATION AND ITS HOST
First Claim
1. A method for executing an application in a storage management system apart from a production environment, the method comprising:
- storing a secondary copy to a secondary storage device that is in communication with a secondary storage computing device,wherein the secondary copy is a block-level point-in-time backup of primary data for a first application that operates on a client computing device in the production environment,wherein the secondary storage computing device hosts a media agent and a pseudo-disk driver, andwherein the secondary storage computing device is in communication over a network with a host computing device that hosts a second application;
instructing, by the media agent, the pseudo-disk driver to generate a pseudo-disk corresponding to the secondary copy;
generating the pseudo-disk on the secondary storage computing device, by the pseudo-disk driver,wherein the generating comprises creating (i) a first data structure for storing data recalled from the secondary copy, (ii) a second data structure for storing data written by the second application, and (iii) an input-output buffer for receiving read and write requests from the second application and for responding thereto, andwherein the generating further comprises associating the pseudo-disk with the secondary copy;
exposing the pseudo-disk as a SCSI storage device over the network to the host computing device;
executing the second application on the host computing device using the exposed pseudo-disk as the second application'"'"'s recovery point,wherein data written by the second application is stored to the second data structure of the pseudo-disk; and
wherein the second application uses the pseudo-disk without restoring the secondary copy in its entirety from the secondary storage device.
3 Assignments
0 Petitions
Accused Products
Abstract
The present enhancement leaves production systems undisturbed while a remote application (“testbed application”) executes elsewhere (“testbed host”). An intermediary computing device hosts an enhanced pseudo-disk driver, pseudo-disks, and an enhanced media agent. The enhanced pseudo-disk driver creates the pseudo-disks, each one representing an associated point-in-time backup image residing in secondary storage. A network, e.g., an Internet Protocol (IP) network or a Fibre Channel (FC) Storage Area Network (SAN), connects the intermediary device with the testbed host, and the enhanced media agent exposes pseudo-disks over the network using iSCSI or FC protocol, respectively. The testbed application uses an exposed pseudo-disk as its recovery data source, such that pseudo-disk resources provide data on an as-needed basis sufficient for the testbed application to operate, yet (a) without restoring the entire associated backup image from secondary storage and (b) without impacting the production environment.
-
Citations
17 Claims
-
1. A method for executing an application in a storage management system apart from a production environment, the method comprising:
-
storing a secondary copy to a secondary storage device that is in communication with a secondary storage computing device, wherein the secondary copy is a block-level point-in-time backup of primary data for a first application that operates on a client computing device in the production environment, wherein the secondary storage computing device hosts a media agent and a pseudo-disk driver, and wherein the secondary storage computing device is in communication over a network with a host computing device that hosts a second application; instructing, by the media agent, the pseudo-disk driver to generate a pseudo-disk corresponding to the secondary copy; generating the pseudo-disk on the secondary storage computing device, by the pseudo-disk driver, wherein the generating comprises creating (i) a first data structure for storing data recalled from the secondary copy, (ii) a second data structure for storing data written by the second application, and (iii) an input-output buffer for receiving read and write requests from the second application and for responding thereto, and wherein the generating further comprises associating the pseudo-disk with the secondary copy; exposing the pseudo-disk as a SCSI storage device over the network to the host computing device; executing the second application on the host computing device using the exposed pseudo-disk as the second application'"'"'s recovery point, wherein data written by the second application is stored to the second data structure of the pseudo-disk; and wherein the second application uses the pseudo-disk without restoring the secondary copy in its entirety from the secondary storage device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A storage management system comprising:
-
a primary storage subsystem that comprises a primary application executing on a client computing device, wherein the application accesses primary data on a primary storage device; a secondary storage device storing a secondary copy of the primary data, wherein the secondary copy is a point-in-time block-level backup of the primary data; a secondary storage computing device that hosts (i) a media agent that acts as a data access portal to the secondary storage device and the secondary copy stored thereon, and (ii) a pseudo-disk created by a pseudo-disk driver, wherein the pseudo-disk points to the secondary copy; a host computing device in communication with the secondary storage computing device over a network, wherein the pseudo-disk is exposed over the network to the host computing device as a SCSI storage device; and a secondary application executing on the host computing device, wherein the secondary application is logically attached to the pseudo-disk as a recovery data source for the secondary application, and wherein the second application uses the pseudo-disk to access data as needed without restoring the secondary copy in its entirety from the secondary storage device. - View Dependent Claims (11, 12, 13)
-
-
14. A computer-readable medium, excluding transitory propagating signals, storing instructions that, when executed by at least one secondary storage computing device, cause the secondary storage computing device to perform operations comprising:
-
storing a secondary copy to a secondary storage device that is in communication with a secondary storage computing device, wherein the secondary copy is a block-level point-in-time backup of primary data for a first application that operates on a client computing device; hosting a media agent and a pseudo-disk driver; communicating over a network with a host computing device that hosts a second application, wherein the host computing device is distinct and apart from the client computing device; after storing the secondary copy to the secondary storage device, causing the pseudo-disk driver to generate a pseudo-disk corresponding to and associated with the secondary copy, wherein the pseudo-disk comprises (i) a first data structure for storing data retrieved from the secondary copy, (ii) a second data structure for storing data written by the second application, and (iii) an input-output buffer for receiving read and write requests from the second application and for responding thereto; and exposing the pseudo-disk as a SCSI storage device over the network to the host computing device, thereby enabling the second application to attach to the exposed pseudo-disk and to use the exposed pseudo-disk as pseudo-disk as a recovery data source for the second application without restoring the secondary copy in its entirety from the secondary storage device. - View Dependent Claims (15, 16, 17)
-
Specification