Storage management system and method
First Claim
Patent Images
1. A computer-implemented method, executed on a computing device, comprising:
- identifying a storage target that has become corrupt within a data array, wherein the storage target includes one or more corrupt data portions;
identifying a relevant backup copy of the storage target;
establishing a broken mirror between the storage target and the relevant backup copy that identifies one or more differences between the storage target and the relevant backup copy;
rebuilding the storage target by overwriting the corrupt data portions within the storage target with corresponding non-corrupt data obtained from the relevant backup copy;
receiving a read request for the storage target during the rebuilding of the storage target; and
determining if the read request concerns the one or more corrupt data portions included within the storage target that have not yet been recovered from the relevant backup copy.
10 Assignments
0 Petitions
Accused Products
Abstract
A method, computer program product, and computing system for identifying a storage target that has become corrupt within a data array. The storage target includes one or more corrupt data portions. A relevant backup copy of the storage target is identified. A “broken” mirror is established between the storage target and the relevant backup copy that identifies one or more differences between the storage target and the relevant backup copy. The storage target is rebuilt by overwriting the corrupt data portions within the storage target with corresponding non-corrupt data obtained from the relevant backup copy.
40 Citations
18 Claims
-
1. A computer-implemented method, executed on a computing device, comprising:
-
identifying a storage target that has become corrupt within a data array, wherein the storage target includes one or more corrupt data portions; identifying a relevant backup copy of the storage target; establishing a broken mirror between the storage target and the relevant backup copy that identifies one or more differences between the storage target and the relevant backup copy; rebuilding the storage target by overwriting the corrupt data portions within the storage target with corresponding non-corrupt data obtained from the relevant backup copy; receiving a read request for the storage target during the rebuilding of the storage target; and determining if the read request concerns the one or more corrupt data portions included within the storage target that have not yet been recovered from the relevant backup copy. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer program product residing on a non-transitory computer readable medium having a plurality of instructions stored thereon which, when executed by a processor, cause the processor to perform operations comprising:
-
identifying a storage target that has become corrupt within a data array, wherein the storage target includes one or more corrupt data portions; identifying a relevant backup copy of the storage target; establishing a broken mirror between the storage target and the relevant backup copy that identifies one or more differences between the storage target and the relevant backup copy; rebuilding the storage target by overwriting the corrupt data portions within the storage target with corresponding non-corrupt data obtained from the relevant backup copy; receiving a read request for the storage target during the rebuilding of the storage target; and determining if the read request concerns the one or more corrupt data portions included within the storage target that have not yet been recovered from the relevant backup copy. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A computing system including a processor and memory configured to perform operations comprising:
-
identifying a storage target that has become corrupt within a data array, wherein the storage target includes one or more corrupt data portions; identifying a relevant backup copy of the storage target; establishing a broken mirror between the storage target and the relevant backup copy that identifies one or more differences between the storage target and the relevant backup copy; rebuilding the storage target by overwriting the corrupt data portions within the storage target with corresponding non-corrupt data obtained from the relevant backup copy; receiving a read request for the storage target during the rebuilding of the storage target; and determining if the read request concerns the one or more corrupt data portions included within the storage target that have not yet been recovered from the relevant backup copy. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification