Stubbing systems and methods in a data replication environment
First Claim
1. A computer-implemented method comprising:
- receiving, in response to a communication from a first computing device, a modification instruction to modify a first portion of data at a second computing device, at least a portion of the first portion of data received from the first computing device at a point in time prior to receiving the communication from the first computing device, the first portion of data including a stub file;
determining, based at least in part on whether the stub file includes a tag value, whether the stub file is of a first type of stub file or a second type of stub file, wherein the first type of stub file indicates that the stub file was received with the first portion of data from the first computing device and wherein the second type of stub file indicates that the stub file was created at the second computing device after the first portion of data was received from the first computing device;
in response to determining that the stub file is of the second type of stub file;
retrieving a data block from a secondary storage of the second computing device;
replacing the stub file with the data block to obtain a restored first portion of data; and
modifying the restored first portion of data based on the modification instruction.
2 Assignments
0 Petitions
Accused Products
Abstract
Stubbing systems and methods are provided for intelligent data management in a replication environment, such as by reducing the space occupied by replication data on a destination system. In certain examples, stub files or like objects replace migrated, de-duplicated or otherwise copied data that has been moved from the destination system to secondary storage. Access is further provided to the replication data in a manner that is transparent to the user and/or without substantially impacting the base replication process. In order to distinguish stub files representing migrated replication data from replicated stub files, priority tags or like identifiers can be used. Thus, when accessing a stub file on the destination system, such as to modify replication data or perform a restore process, the tagged stub files can be used to recall archived data prior to performing the requested operation so that an accurate copy of the source data is generated.
650 Citations
20 Claims
-
1. A computer-implemented method comprising:
-
receiving, in response to a communication from a first computing device, a modification instruction to modify a first portion of data at a second computing device, at least a portion of the first portion of data received from the first computing device at a point in time prior to receiving the communication from the first computing device, the first portion of data including a stub file; determining, based at least in part on whether the stub file includes a tag value, whether the stub file is of a first type of stub file or a second type of stub file, wherein the first type of stub file indicates that the stub file was received with the first portion of data from the first computing device and wherein the second type of stub file indicates that the stub file was created at the second computing device after the first portion of data was received from the first computing device; in response to determining that the stub file is of the second type of stub file; retrieving a data block from a secondary storage of the second computing device; replacing the stub file with the data block to obtain a restored first portion of data; and modifying the restored first portion of data based on the modification instruction. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system comprising:
-
a secondary storage device configured to store one or more common data blocks, the one or more common data blocks comprising data blocks included in multiple portions of data stored at a destination computing device; the destination computing device in communication with the secondary storage device and configured to; receive, from a source computing device, an indication to modify a first portion of data at the destination computing device, at least a portion of the first portion of data received from the source computing device; determine whether the first portion of data includes a stub file; in response to determining that the first portion of data includes the stub file, determine, based at least in part on whether the stub file includes a tab value, whether the stub file was received from the source computing device or generated by a migration module of the destination computing device; in response to determining that the stub file was generated by the destination computing device, the destination computing device is further configured to; restore a common data block from the one or more common data blocks stored at the secondary storage device, the common data block corresponding to the stub file; replace the stub file with the common data block to obtain a restored first portion of data; and modify the restored first portion of data based on the indication to modify the first portion of data. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A computer-readable, non-transitory storage medium storing computer executable instructions that, when executed by one or more computing devices, configure the one or more computing devices to perform operations comprising:
-
receiving an identification of a modification to a first portion of data stored at a second computing device, at least a portion of the first portion of data received from a first computing device, the first portion of data including a stub file, and the modification occurring at the first computing device; determining, based at least in part on whether the stub file includes a tab value, whether the stub file is of a first type of stub file or a second type of stub file, wherein the first type of stub file indicates that the stub file was included with the first portion of data when the first portion of data was received from the first computing device and wherein the second type of stub file indicates that the stub file was created at the second computing device after the first portion of data was received from the first computing device; and in response to determining that the stub file is of the second type of stub file; accessing a data block from a secondary storage of the second computing device; replacing the stub file with the data block to obtain a restored first portion of data; and modifying the restored first portion of data based on the indication of the modification. - View Dependent Claims (18, 19, 20)
-
Specification