DATABASE PROTECTION USING BLOCK-LEVEL MAPPING
2 Assignments
0 Petitions
Accused Products
Abstract
A system according to certain aspects may include a client computing device including: a database application configured to output a database file in a primary storage device(s), the database application outputting the database file as a series of application-level blocks; and a data agent configured to divide the database file into a plurality of first blocks having a first granularity larger than a second granularity of the application-level blocks such that each of the first blocks spans a plurality of the application-level blocks. The system may include a secondary storage controller computer(s) configured to: in response to instructions to create a secondary copy of the database file: copy the plurality of first blocks to a secondary storage device(s) to create a secondary copy of the database file; and create a table that provides a mapping between the copied plurality of first blocks and corresponding locations on the secondary storage device(s).
8 Citations
20 Claims
-
1. (canceled)
-
2. A data storage system for protecting database files, the system comprising:
-
in response to instructions to retrieve one or more requested application-level blocks of a database file from a secondary copy; one or more secondary storage controller computers comprising computer hardware configured to; access a table that provides a mapping between the plurality of requested application-level blocks and corresponding plurality of blocks stored in a secondary copy, each of the corresponding plurality of blocks having a first granularity larger than a second granularity of the application-level blocks such that each of the corresponding plurality of blocks in the secondary copy spans a plurality of the application-level blocks, the plurality of corresponding blocks further stored a native format of the database file in the secondary copy; retrieve the corresponding plurality of blocks from the secondary copy; and a client computing device comprising; at least one hardware processor; a data agent executing on the processor and configured to divide the corresponding plurality of blocks retrieved from the secondary copy into the one or more requested application-level blocks; and a database application executing on the processor, the database in communication with the data agent, the database application configured to receive the requested application-level blocks from the data agent. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method of protecting database files, the method comprising:
-
in response to instructions to retrieve one or more requested application-level blocks of a database file from a secondary copy; with one or more secondary storage controller computers comprising computer hardware; accessing a table that provides a mapping between the plurality of requested application-level blocks and corresponding plurality of blocks stored in a secondary copy, each of the corresponding plurality of blocks having a first granularity larger than a second granularity of the application-level blocks such that each of the corresponding plurality of blocks in the secondary copy spans a plurality of the application-level blocks, the plurality of corresponding blocks further stored a native format of the database file in the secondary copy; retrieving the corresponding plurality of blocks from the secondary copy; and with a client computing device comprising computer hardware; dividing the corresponding plurality of blocks retrieved from the secondary copy into the one or more requested application-level blocks; and receiving at a database application executing on the processor, the requested application-level blocks. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
Specification