Methods and systems for validating accessibility and currency of replicated data
First Claim
1. A process for validating replicated data residing on network devices in a network, comprising:
- defining a replicated-data policy for replicating data in the network wherein the replicated-data policy specifies at least a recovery point objective for a set of replicas in the network, wherein the recovery point objective specifies at least a maximum recovery point age of a replica;
monitoring access paths and access path attributes between at least one of network devices and applications running on the network devices, said access paths defining end-to-end communication connectivity between the at least one of network devices and applications;
monitoring data replication activities in the network wherein monitoring data replication activities includes monitoring at least one of a copy start, a copy complete, a synch, a split, a source data volume, a target data volume, and a time of replication;
comparing currency and accessibility of a set of replicas with the requirements in the replicated-data policy to identify discrepancies with the replicated-data policy wherein comparing the currency includes comparing a computed recovery point age of a replica in a set of replicas with the recovery point objective specified in the replicated-data policy and comparing the accessibility of the set of replicas includes comparing a set of access paths associated with the set of replicas to an accessibility requirement specified in the replicated-data policy, thereby validating the replicated data residing in the network, wherein identifying discrepancies includes identifying at least one of currency violation, missing access path, unauthorized access path, and path attribute violation; and
providing a violation notification if a discrepancy is identified.
5 Assignments
0 Petitions
Accused Products
Abstract
Systems and processes for determining and validating accessibility and currency, i.e., the actual status, of data replicated in a networked environment are disclosed. According to the disclosed process, a replicated-data policy for replicating data is defined, and access paths between network devices or between applications running on the network devices are monitored, for example, by a replicated-data monitor. Also monitored are the data replication activities in the network. The currency, i.e., timeliness, and accessibility of a replica by a network device is then compared with the requirements in the replicated-data policy and discrepancies with the replicated-data policy are identified, optionally accompanied by a notification.
-
Citations
22 Claims
-
1. A process for validating replicated data residing on network devices in a network, comprising:
-
defining a replicated-data policy for replicating data in the network wherein the replicated-data policy specifies at least a recovery point objective for a set of replicas in the network, wherein the recovery point objective specifies at least a maximum recovery point age of a replica; monitoring access paths and access path attributes between at least one of network devices and applications running on the network devices, said access paths defining end-to-end communication connectivity between the at least one of network devices and applications; monitoring data replication activities in the network wherein monitoring data replication activities includes monitoring at least one of a copy start, a copy complete, a synch, a split, a source data volume, a target data volume, and a time of replication; comparing currency and accessibility of a set of replicas with the requirements in the replicated-data policy to identify discrepancies with the replicated-data policy wherein comparing the currency includes comparing a computed recovery point age of a replica in a set of replicas with the recovery point objective specified in the replicated-data policy and comparing the accessibility of the set of replicas includes comparing a set of access paths associated with the set of replicas to an accessibility requirement specified in the replicated-data policy, thereby validating the replicated data residing in the network, wherein identifying discrepancies includes identifying at least one of currency violation, missing access path, unauthorized access path, and path attribute violation; and providing a violation notification if a discrepancy is identified. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A replication-data validation management system, comprising:
-
memory, configured to store a replicated-data policy for replicating data in a network wherein the replicated-data policy specifies at least a recovery point objective for replicas in a set of replicas in the network, wherein the recovery point objective specifies at least a maximum recovery point age of a replica; a network interface, communicably coupled to the network; a replication-data validation manager, electronically connected to the memory and to the network interface, configured to; monitor access path, using the network interface, between at least one of network devices and applications running on the network devices, said access paths defining end-to-end communication connectivity between the at least one of the network devices and applications, monitor data replication activities in the network, using the network interface, wherein monitoring data replication activities includes monitoring at least one of a copy start, a copy complete, a synch, a split, a source data volume, a target data volume, and a time of replication, compare currency and accessibility of a set of replicas with the requirements in the replicated-data policy to identify discrepancies with the replicated-data policy, wherein the replicated-data policy is retrieved from the memory, comparing the currency includes comparing a computed recovery point age of a replica in a set of replicas with the recovery point objective specified in the replicated-data policy and comparing the accessibility of the set of replicas includes comparing a set of access paths associated with the set of replicas to an accessibility requirement specified in the replicated-data policy wherein identifying discrepancies includes identifying at least one of currency violation. missing access path, unauthorized access path, and path attribute violation; and provide a violation notification if a discrepancy is identified. - View Dependent Claims (18, 19, 20, 21, 22)
-
Specification