Method and system for automatic replication data verification and recovery
First Claim
Patent Images
1. A method comprising:
- assigning a unique identifier to a snapshot at a source node in a data storage system;
performing asynchronous replication of the snapshot, including the unique identifier, from the source node to a target node;
performing integrity verification on the replicated snapshot having the unique identifier at the target node to determine whether or not the replicated snapshot matches the snapshot having the unique identifier at the source node;
setting a first consistency attribute associated with the replicated snapshot to a first value responsive to the integrity verification indicating that the replicated snapshot does not match the snapshot having the unique identifier at the source node;
triggering a replication recovery in response to the first consistency attribute associated with the replication snapshot having the first value;
selecting a replication recovery snapshot from a list of candidate snapshots, a second consistency attribute associated with the selected replication recovery snapshot having a second value different from the first value, wherein the first value indicates an inconsistent verification status and the second value indicates one of a verified verification status and a synchronized but not yet verified verification status; and
performing replication recovery according to the selected replication recovery snapshot.
7 Assignments
0 Petitions
Accused Products
Abstract
Example embodiments of the present invention relate to methods, systems, and a computer program product for performing asynchronous replication of a snapshot. The method includes assigning a unique identifier to a snapshot at a source node in a data storage system. Asynchronous replication of the snapshot, including the unique identifier, then may be performed from the source node to a target node. Integrity of the replicated snapshot having the unique identifier then may be verified at the target node.
83 Citations
21 Claims
-
1. A method comprising:
-
assigning a unique identifier to a snapshot at a source node in a data storage system; performing asynchronous replication of the snapshot, including the unique identifier, from the source node to a target node; performing integrity verification on the replicated snapshot having the unique identifier at the target node to determine whether or not the replicated snapshot matches the snapshot having the unique identifier at the source node; setting a first consistency attribute associated with the replicated snapshot to a first value responsive to the integrity verification indicating that the replicated snapshot does not match the snapshot having the unique identifier at the source node; triggering a replication recovery in response to the first consistency attribute associated with the replication snapshot having the first value; selecting a replication recovery snapshot from a list of candidate snapshots, a second consistency attribute associated with the selected replication recovery snapshot having a second value different from the first value, wherein the first value indicates an inconsistent verification status and the second value indicates one of a verified verification status and a synchronized but not yet verified verification status; and performing replication recovery according to the selected replication recovery snapshot. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A data storage system comprising:
-
a source node; a target node; one or more processors; and memory storing computer program code that when executed on the one or more processors performs the operations of; assigning a unique identifier to a snapshot at a source node in a data storage system; performing asynchronous replication of the snapshot, including the unique identifier, from the source node to a target node; performing integrity verification on the replicated snapshot having the unique identifier at the target node to determine whether or not the replicated snapshot matches the snapshot having the unique identifier at the source node; setting a first consistency attribute associated with the replicated snapshot to a first value responsive to the integrity verification indicating that the replicated snapshot does not match the snapshot having the unique identifier at the source node; triggering a replication recovery in response to the first consistency attribute associated with the replication snapshot having the first value; selecting a replication recovery snapshot from a list of candidate snapshots, a second consistency attribute associated with the selected replication recovery snapshot having a second value different from the first value, wherein the first value indicates an inconsistent verification status and the second value indicates one of a verified verification status and a synchronized but not yet verified verification status; and performing replication recovery according to the selected replication recovery snapshot. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer program product including a non-transitory computer readable storage medium having computer program code encoded there on that when executed on a processor of a computer causes the computer to verify integrity of snapshots, comprising:
-
computer program code for assigning a unique identifier to a snapshot at a source node in a data storage system; computer program code for performing asynchronous replication of the snapshot, including the unique identifier, from the source node to a target node; computer program code for performing integrity verification on the replicated snapshot having the unique identifier at the target node to determine whether or not the replicated snapshot matches the snapshot having the unique identifier at the source node; computer program code for setting a first consistency attribute associated with the replicated snapshot to a first value responsive to the integrity verification indicating that the replicated snapshot does not match the snapshot having the unique identifier at the source node; computer program code for triggering a replication recovery in response to the first consistency attribute associated with the replication snapshot having the first value; computer program code for selecting a replication recovery snapshot from a list of candidate snapshots, a second consistency attribute associated with the selected replication recovery snapshot having a second value different from the first value, wherein the first value indicates an inconsistent verification status and the second value indicates one of a verified verification status and a synchronized but not yet verified verification status; and computer program code for performing replication recovery according to the selected replication recovery snapshot. - View Dependent Claims (20, 21)
-
Specification