Storage system snapshots for continuous file protection
First Claim
1. A method for providing continuous data protection, the method comprising:
- trapping a file system call;
evaluating if the trapped file system call is associated with a file that has been modified;
generating a storage snapshot in response to the file having been modified;
determining if a previous storage snapshot has been rendered redundant by generating the storage snapshot; and
deleting the previous storage snapshot if the previous storage snapshot has been rendered redundant.
3 Assignments
0 Petitions
Accused Products
Abstract
Techniques for continuous data protection can include creating snapshots of one or more underlying storage volumes upon specific file system events. Generating snapshots upon every file close event can protect the files in a storage system by keeping a snapshot of every version or modification of each file. Removal of redundant snapshots can mitigate the impact on storage capacity associated with creating these large numbers of volume snapshots upon each file close event. Additionally, file closure lists can be employed to allow generating snapshots only when a previously closed file is reopened. Such an approach can protect the previous version of a file prior to the opening of a new version of the file. Such an approach can also mitigate storage capacity impact without the creation of redundant snapshots.
-
Citations
14 Claims
-
1. A method for providing continuous data protection, the method comprising:
-
trapping a file system call; evaluating if the trapped file system call is associated with a file that has been modified; generating a storage snapshot in response to the file having been modified; determining if a previous storage snapshot has been rendered redundant by generating the storage snapshot; and deleting the previous storage snapshot if the previous storage snapshot has been rendered redundant. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for providing continuous data protection, the method comprising:
-
trapping a file system call; evaluating if the trapped file system call is associated with a file that has been modified; generating a storage snapshot in response to the file having been modified; determining if a previous storage snapshot has been rendered redundant by generating the storage snapshot, wherein determining that the previous storage snapshot has been rendered redundant comprises identifying that a version of a file protected by the previous storage snapshot is also protected by generating the storage snapshot.
-
-
8. A computer storage medium having computer-executable instructions stored thereon which, when executed by a computer system, cause the computer system to:
-
trap a file system call; evaluate if the trapped file system call is associated with a file that has been modified; generate a storage snapshot in response to the file having been modified; determine if a previous storage snapshot has been rendered redundant by generating the storage snapshot; and causing the computer system to delete the previous storage snapshot if the previous storage snapshot has been rendered redundant. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A computer storage medium having computer-executable instructions stored thereon which, when executed by a computer system, cause the computer system to:
-
trap a file system call; evaluate if the trapped file system call is associated with a file that has been modified; generate a storage snapshot in response to the file having been modified; and determine if a previous storage snapshot has been rendered redundant by generating the storage snapshot, wherein determining that the previous storage snapshot has been rendered redundant comprises identifying that a version of a file protected by the previous storage snapshot is also protected by generating the storage snapshot.
-
Specification