Data replication techniques using incremental checkpoints
First Claim
1. A method comprising:
- starting generation of a full copy of a file system on a primary node at a first time, wherein the file system is locked while the full copy is generated;
starting generation of an incremental checkpoint at substantially the first time;
receiving input/output requests to the file system on the primary node;
storing queued changes to the file system in a sequential log;
unlocking and making changes to the file system on the primary node at a second time later than the first time in response to corresponding input/output requests;
completing generation of the full copy at a third time concurrent with or later than the second time;
storing the full copy on a remote node;
completing generation of the incremental checkpoint after the third time, wherein the incremental checkpoint consists of changes to the file system stored in the sequential log;
storing the incremental checkpoint on the remote node; and
generating a replication copy of the file system by applying the changes in the incremental checkpoint to the full copy of the file system.
7 Assignments
0 Petitions
Accused Products
Abstract
Incremental checkpoint, for use in data replication, track the changes made to a file system after a point in time at which the incremental checkpoint is created. Data replication techniques using the incremental checkpoints may include taking a regular checkpoint of the file system and creating the first time full copy on remote node using the regular checkpoint. Changes made to the file system are then tracked in an incremental checkpoint that are stored on the remote node. The processes of taking the incremental checkpoint and storing the incremental checkpoint are iteratively performed. The first time fully copy and the incremental checkpoints may then be used for data replication, backup, continuous data protection (CDP), or the like.
10 Citations
20 Claims
-
1. A method comprising:
-
starting generation of a full copy of a file system on a primary node at a first time, wherein the file system is locked while the full copy is generated; starting generation of an incremental checkpoint at substantially the first time; receiving input/output requests to the file system on the primary node; storing queued changes to the file system in a sequential log; unlocking and making changes to the file system on the primary node at a second time later than the first time in response to corresponding input/output requests; completing generation of the full copy at a third time concurrent with or later than the second time; storing the full copy on a remote node; completing generation of the incremental checkpoint after the third time, wherein the incremental checkpoint consists of changes to the file system stored in the sequential log; storing the incremental checkpoint on the remote node; and generating a replication copy of the file system by applying the changes in the incremental checkpoint to the full copy of the file system. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. One or more non-transitory computing device readable media having computing device executable instructions which when executed perform a method comprising:
-
starting generation of a full copy of a file system on a primary node at a first time, wherein the file system is locked while the full copy is generated; starting generation of an incremental checkpoint at substantially the first time; receiving input/output requests to the file system on the primary node; storing queued changes to the file system in a sequential log; unlocking and making changes to the file system on the primary node at a second time later than the first time in response to corresponding input/output requests; completing generation of the full copy at a third time concurrent with or later than the second time; storing the full copy on a remote node; completing generation of the incremental checkpoint after the third time, wherein the incremental checkpoint consists of changes to the file system stored in the sequential log; storing the incremental checkpoint on the remote node; and generating a replication copy of the file system by applying the changes in the incremental checkpoint to the full copy of the file system. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A storage system comprising:
one or more processors coupled to one or more computing device readable storage media and executing computing device readable code which implement one or more modules, wherein the one or more modules; start generation of a full copy of a file system on a primary node at a first time, wherein the file system is locked while the full copy is generated; start generation of an incremental checkpoint at substantially the first time; receive input/output requests to the file system on the primary node; store queued changes to the file system in a sequential log; unlock and make changes to the file system on the primary node at a second time later than the first time in response to corresponding input/output requests; complete generation of the full copy at a third time concurrent with or later than the second time; store the full copy on a remote node; complete generation of the incremental checkpoint after the third time, wherein the incremental checkpoint consists of changes to the file system stored in the sequential log; store the incremental checkpoint on the remote node; and generate a replication copy of the file system by applying the changes in the incremental checkpoint to the full copy of the file system. - View Dependent Claims (16, 17, 18, 19, 20)
Specification