Apparatus, system and method for volume-level restoration of cluster server data
First Claim
Patent Images
1. An apparatus to restore cluster server data at a volume level, the apparatus comprising:
- a first cluster server of a plurality of cluster servers, the first cluster server comprising a memory device storing executable code and a processor executing the executable code, the executable code comprising;
a setup module saving disk signatures identifying cluster disks for at least one source volume to a device distinct from the cluster disks;
a copy module copying data with a volume-level restore from at least one snapshot volume to the at least one source volume, overwriting the disk signatures identifying the cluster disks so that the cluster disks cannot be accessed; and
a reset module rewriting the saved disk signatures to the cluster disks.
0 Assignments
0 Petitions
Accused Products
Abstract
A setup module saves disk signatures identifying cluster disks for at least one source volume to a device distinct from the cluster disks. A copy module copies data with a volume-level restore from at least one snapshot volume to the at least one source volume, overwriting the disk signatures identifying the cluster disks so that the cluster disks cannot be accessed. A reset module rewrites the saved disk signatures to the cluster disks.
-
Citations
20 Claims
-
1. An apparatus to restore cluster server data at a volume level, the apparatus comprising:
a first cluster server of a plurality of cluster servers, the first cluster server comprising a memory device storing executable code and a processor executing the executable code, the executable code comprising; a setup module saving disk signatures identifying cluster disks for at least one source volume to a device distinct from the cluster disks; a copy module copying data with a volume-level restore from at least one snapshot volume to the at least one source volume, overwriting the disk signatures identifying the cluster disks so that the cluster disks cannot be accessed; and a reset module rewriting the saved disk signatures to the cluster disks. - View Dependent Claims (2, 3, 4, 5, 6)
-
7. A memory device storing executable code executed on a processor embodied in a first cluster server of a plurality of cluster servers to:
-
save disk signatures identifying cluster disks for at least one source volume to a device distinct from the cluster disks; copy data for a volume-level restore from at least one snapshot volume to the at least one source volume, overwriting the disk signatures identifying the cluster disks so that the cluster disks cannot be accessed; and rewrite the saved disk signatures to the cluster disks. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A system comprising:
-
a plurality of cluster servers; cluster disks comprising at least one source volume storing data for the plurality of cluster servers; snapshot disks comprising at least one snapshot volume storing a backup instance of the at least one source volume; a first cluster server of the plurality of cluster servers comprising; a setup module saving disk signatures identifying cluster disks for the at least one source volume to a device distinct from the cluster disks; a copy module copying data with a volume-level restore from the at least one snapshot volume to the at least one source volume, overwriting the disk signatures identifying the cluster disks so that the cluster disks cannot be accessed; and a reset module rewriting the saved disk signatures to the cluster disks. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A method for deploying computer infrastructure, comprising integrating executable code stored in a memory device into a first cluster server of a plurality of cluster servers, wherein the code in combination with the first cluster server performs the following:
-
saving disk signatures identifying cluster disks for at least one source volume to a device distinct from the cluster disks; copying data for a volume-level restore from at least one snapshot volume to the at least one source volume, overwriting the disk signatures identifying the cluster disks so that the cluster disks cannot be accessed; and rewriting the saved disk signatures to the cluster disks. - View Dependent Claims (19, 20)
-
Specification