Data storage with snapshot-to-snapshot recovery
First Claim
1. A method for data storage comprising:
- deleting a corrupted node under a first meta-volume node in a hierarchical tree structure, wherein the hierarchical tree structure further comprises a source node under the first meta-volume node, the corrupted node and the source node each comprise a respective set of local pointers, and the corrupted node and the source node represent respective copies of a logical volume;
reconfiguring the source node to become a second meta-volume node having the same set of local pointers as the source node;
creating a first new node under the second meta-volume node in the hierarchical tree structure to represent the corrupted node;
configuring the first new node to have no local pointers;
creating a second new node under the second meta-volume node in the hierarchical tree structure to represent the source node; and
configuring the second new node to have no local pointers.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the present invention provide methods, apparatuses, systems, and computer software products for data storage. A corrupted node under a first meta-volume node in a hierarchical tree structure is deleted. The hierarchical tree structure further includes a source node under the first meta-volume node. The corrupted node and the source node each include a respective set of local pointers. The corrupted node and the source node represent respective copies of a logical volume. The source node is reconfigured to become a second meta-volume node having the same set of local pointers as the source node. A first new node is created under the second meta-volume node in the hierarchical tree structure to represent the corrupted node. A second new node is created under the second meta-volume node to represent the source node. The first and second new nodes are configured to have no local pointers.
39 Citations
20 Claims
-
1. A method for data storage comprising:
-
deleting a corrupted node under a first meta-volume node in a hierarchical tree structure, wherein the hierarchical tree structure further comprises a source node under the first meta-volume node, the corrupted node and the source node each comprise a respective set of local pointers, and the corrupted node and the source node represent respective copies of a logical volume; reconfiguring the source node to become a second meta-volume node having the same set of local pointers as the source node; creating a first new node under the second meta-volume node in the hierarchical tree structure to represent the corrupted node; configuring the first new node to have no local pointers; creating a second new node under the second meta-volume node in the hierarchical tree structure to represent the source node; and configuring the second new node to have no local pointers. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An apparatus for data storage, comprising:
-
an interface configured to communicate with a host computer to receive data for storage that is addressed to a logical volume assigned on a storage device; and a processor coupled to the interface and adapted to; delete a corrupted node under a first meta-volume node in a hierarchical tree structure, wherein the hierarchical tree structure further comprises a source node under the first meta-volume node, the corrupted node and the source node each comprise a respective set of local pointers, and the corrupted node and the source node represent respective copies of a logical volume; reconfigure the source node to become a second meta-volume node having the same set of local pointers as the source node; create a first new node under the second meta-volume node in the hierarchical tree structure to represent the corrupted node; configure the first new node to have no local pointers; create a second new node under the second meta-volume node in the hierarchical tree structure to represent the source node; and configure the second new node to have no local pointers. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer software product for data storage, the product comprising a non-transitory computer-readable medium, in which program instructions are stored, the program instructions comprising:
-
a first executable portion for deleting a corrupted node under a first meta-volume node in a hierarchical tree structure, wherein the hierarchical tree structure further comprises a source node under the first meta-volume node, the corrupted node and the source node each comprise a respective set of local pointers, and the corrupted node and the source node represent respective copies of a logical volume; a second executable portion for reconfiguring the source node to become a second meta-volume node having the same set of local pointers as the source node; a third executable portion for creating a first new node under the second meta-volume node in the hierarchical tree structure to represent the corrupted node; a fourth executable portion for configuring the first new node to have no local pointers; a fifth executable portion for creating a second new node under the second meta-volume node in the hierarchical tree structure to represent the source node; and a sixth executable portion for configuring the second new node to have no local pointers. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification