Enabling data replication processes between heterogeneous storage systems
First Claim
1. A method, comprising:
- identifying a first protocol message mapped to a first snapshot operation request, generated by a first file system of a first device for initiating a snapshot operation, within a first library structure mapping a first set of snapshot operation requests interpretable by the first file system to protocol messages, wherein the first set of snapshot operation requests within the first library structure are uninterpretable by a second file system of a second device;
transmitting the first protocol message to the second device, wherein a second library structure is accessible to the second file system for identifying a snapshot operation request mapped to the first protocol message, wherein the second library structure maps a second set of snapshot operation requests interpretable by the second file system to the protocol messages, wherein the second set of snapshot operation requests within the second library structure are uninterpretable by the first file system, and wherein the snapshot operation request corresponds to the snapshot operation to remove a lock, on a snapshot at the second device, held by the first device by disassociating the snapshot from an identifier of the first device and by automatically deleting the snapshot to remove the lock based upon a bit not being set by the second device to override the snapshot operation request corresponding to the first protocol message, wherein the snapshot operation request is overridden based upon the bit being set; and
identifying a second snapshot operation request mapped to a second protocol message, received from the second device, within the first library structure, wherein the second snapshot operation request is processed by the first file system, and wherein the second snapshot request is uninterpretable by the second file system.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for enabling data replication is described. A set of protocol messages can be associated with a set of corresponding set of requests. The associated set of protocol messages can be provided to each of a source storage system and a destination storage system. The source storage system and the destination storage system can be heterogeneous storage systems that implement different types of file systems or file layouts. The source storage system and the destination storage system are enabled to perform a data replication process, in which at least a set of data is to be replicated from the source storage system to the destination storage system, using at least a protocol message from the associated set of protocol messages. The protocol message can correspond to a request for a list of snapshots stored at the source storage system.
35 Citations
20 Claims
-
1. A method, comprising:
-
identifying a first protocol message mapped to a first snapshot operation request, generated by a first file system of a first device for initiating a snapshot operation, within a first library structure mapping a first set of snapshot operation requests interpretable by the first file system to protocol messages, wherein the first set of snapshot operation requests within the first library structure are uninterpretable by a second file system of a second device; transmitting the first protocol message to the second device, wherein a second library structure is accessible to the second file system for identifying a snapshot operation request mapped to the first protocol message, wherein the second library structure maps a second set of snapshot operation requests interpretable by the second file system to the protocol messages, wherein the second set of snapshot operation requests within the second library structure are uninterpretable by the first file system, and wherein the snapshot operation request corresponds to the snapshot operation to remove a lock, on a snapshot at the second device, held by the first device by disassociating the snapshot from an identifier of the first device and by automatically deleting the snapshot to remove the lock based upon a bit not being set by the second device to override the snapshot operation request corresponding to the first protocol message, wherein the snapshot operation request is overridden based upon the bit being set; and identifying a second snapshot operation request mapped to a second protocol message, received from the second device, within the first library structure, wherein the second snapshot operation request is processed by the first file system, and wherein the second snapshot request is uninterpretable by the second file system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A non-transitory machine readable medium comprising instructions for performing a method, which when executed by a machine, causes the machine to:
-
identify a first protocol message mapped to a first snapshot operation request, generated by a first file system of a first device for initiating a snapshot operation, within a first library structure mapping a first set of snapshot operation requests interpretable by the first file system to protocol messages, wherein the first set of snapshot operation requests within the first library structure are uninterpretable by a second file system of a second device; transmit the first protocol message to the second device, wherein a second library structure is accessible to the second file system for identifying a snapshot operation request mapped to the first protocol message, wherein the second library structure maps a second set of snapshot operation requests interpretable by the second file system to the protocol messages, wherein the second set of snapshot operation requests within the second library structure are uninterpretable by the first file system, and wherein the snapshot operation request corresponds to the snapshot operation to remove a lock, on a snapshot at the second device, held by the first device by disassociating the snapshot from an identifier of the first device and by automatically deleting the snapshot to remove the lock based upon a bit not being set by the second device to override the snapshot operation request corresponding to the first protocol message, wherein the snapshot operation request is overridden based upon the bit being set; and identify a second snapshot operation request mapped to a second protocol message, received from the second device, within the first library structure, wherein the second snapshot operation request is processed by the first file system, and wherein the second snapshot request is uninterpretable by the second file system. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A computing device comprising:
-
a memory comprising machine executable code; and a processor coupled to the memory, the processor configured to execute the machine executable code to cause the processor to; identify a first protocol message mapped to a first snapshot operation request, generated by a first file system of a first device for initiating a snapshot operation, within a first library structure mapping a first set of snapshot operation requests interpretable by the first file system to protocol messages, wherein the first set of snapshot operation requests within the first library structure are uninterpretable by a second file system of a second device; transmit the first protocol message to the second device, wherein a second library structure is accessible to the second file system for identifying a snapshot operation request mapped to the first protocol message, wherein the second library structure maps a second set of snapshot operation requests interpretable by the second file system to the protocol messages, wherein the second set of snapshot operation requests within the second library structure are uninterpretable by the first file system, and wherein the snapshot operation request corresponds to the snapshot operation to remove a lock, on a snapshot at the second device, held by the first device by disassociating the snapshot from an identifier of the first device and by automatically deleting the snapshot to remove the lock based upon a bit not being set by the second device to override the snapshot operation request corresponding to the first protocol message, wherein the snapshot operation request is overridden based upon the bit being set; and identify a second snapshot operation request mapped to a second protocol message, received from the second device, within the first library structure, wherein the second snapshot operation request is processed by the first file system, and wherein the second snapshot request is uninterpretable by the second file system. - View Dependent Claims (18, 19, 20)
-
Specification