EP2126701A1 - Data management in a data storage system using data sets - Google Patents

Data management in a data storage system using data sets

Info

Publication number
EP2126701A1
EP2126701A1 EP08725916A EP08725916A EP2126701A1 EP 2126701 A1 EP2126701 A1 EP 2126701A1 EP 08725916 A EP08725916 A EP 08725916A EP 08725916 A EP08725916 A EP 08725916A EP 2126701 A1 EP2126701 A1 EP 2126701A1
Authority
EP
European Patent Office
Prior art keywords
data
storage
data set
management policy
data management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP08725916A
Other languages
German (de)
French (fr)
Inventor
Peter L. Smoot
Jim Holl
Sahn Lam
Colin Johnson
David E. La France
Brian Hackworth
Kostadis Roussos
Jim Voll
Anawat Chankhunthod
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NetApp Inc
Original Assignee
NetApp Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US11/710,190 external-priority patent/US7953928B2/en
Priority claimed from US11/710,202 external-priority patent/US20080208926A1/en
Application filed by NetApp Inc filed Critical NetApp Inc
Publication of EP2126701A1 publication Critical patent/EP2126701A1/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/16Error detection or correction of the data by redundancy in hardware
    • G06F11/20Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
    • G06F11/2053Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where persistent mass storage functionality or persistent mass storage control functionality is redundant
    • G06F11/2056Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where persistent mass storage functionality or persistent mass storage control functionality is redundant by mirroring
    • G06F11/2071Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where persistent mass storage functionality or persistent mass storage control functionality is redundant by mirroring using a plurality of controllers

Definitions

  • the present invention relates to networked data storage systems, and more particularly, to managing data storage using data sets.
  • a networked data storage system can be used for a variety of purposes, such as providing multiple users access to shared data, or facilitating backups or data mirroring.
  • a networked storage system may include a number of storage servers.
  • a storage server may provide services related to accessing and organizing data on mass storage devices, such as disks.
  • Some storage servers are commonly referred to as filers or file servers, as these storage servers provide file-level access to data. Some of these filers further provide clients with sub-file level access to data (e.g., block-level access).
  • An example of such a storage server is any of the Filer products made by Network Appliance, Inc. in Sunnyvale, California.
  • the storage server may be implemented with a special-purpose computer or a general-purpose computer programmed in a particular way.
  • Logical units of storage may be created and manipulated on storage servers, such as files, directories, volumes, logical unit numbers (LUNs). Such logical units are referred to as storage objects in this document. Creating a single storage object is typically fast and easy, but managing a storage object over time can be difficult. A storage administrator has to make numerous decisions, such as how to monitor the available space for the storage object, how to schedule data backups, how to configure backups, whether the data should be mirrored, where data should be mirrored, etc.
  • Answers to the above questions may be provided in a data management policy, and once this policy is decided, the administrator needs to ensure that the policy is correctly implemented on all relevant storage objects, that the required space is available, that the data protection operations succeed, and so forth. If the administrator decides to change the policy (for example, extending the amount of time that backups should be retained), the administrator has to find all the affected storage objects and then manually re-configure all the relevant settings.
  • the present invention includes an apparatus and a method to manage data using data sets.
  • the apparatus includes a conformance checker and a conformance engine to make data sets conform to data management policies.
  • the conformance checker may be operable to compare a state of a data set against a data management policy associated with the data set to determine if the data set currently conforms to the data management policy.
  • the conformance engine may then make the data set conform to the data management policy if the conformance checker determines that the data set currently violates the data management policy.
  • the method includes allowing an administrator of a data storage system to define a data set having a plurality of storage objects and to associate the data set with a data management policy.
  • Each of the storage objects includes a logical representation of a collection of data and replicas of the collection of data.
  • the collection of data is stored in storage containers.
  • the storage containers are managed by storage servers in the data storage system, wherein the storage containers are independent of the logical representation of the collection of data.
  • the method may further include using a storage manager to manage the data set as a single unit according to the data management policy.
  • Figure 1 illustrates an embodiment of a networked storage system
  • Figure 2 illustrates an embodiment of a storage manager
  • Figure 3 A shows a tree graph of one embodiment of a data management policy
  • Figures 3B and 3C illustrate a flow diagram of one embodiment of a process performed by a conformance checker to determine if a data set is in conformance with a data management policy
  • Figure 4 illustrates a functional diagram of an embodiment of a storage manager
  • Figure 5 illustrates a flow diagram of an embodiment of a process to make a data set conform to a data management policy
  • Figures 6A-6C illustrate an embodiment of a series of GUI screens to create a new data set
  • Figure 6D illustrates an embodiment of a GUI screen for applying a data management policy to a data set
  • Figure 7 illustrates a flow diagram of an embodiment of a process to manage data using data sets.
  • the apparatus includes a conformance checker and a conformance engine.
  • the conformance checker is operable to compare a state of a data set against a data management policy associated with the data set to determine if the data set conforms to the data management policy.
  • the conformance engine then makes the data set conform to the data management policy if the conformance checker determines that the data set violates the data management policy.
  • conformance checker and the conformance engine described herein provides great convenience to storage administrators, because the data sets can be checked automatically and frequently without imposing much burden on the administrators. More details about the data sets, storage objects, data management policy, conformance checker, and conformance engine are discussed below.
  • the method includes allowing an administrator of a network data storage system to define a data set having a set of storage objects associated with a data management policy.
  • Each storage object may include a logical representation of a collection of data and replicas of the collection of data.
  • the collection of data is stored in one or more storage containers.
  • the storage containers are managed by one or more storage servers in the data storage system.
  • the storage containers are independent of the logical representation.
  • the method may further include managing the data set as a single unit according to the data management policy using a storage manager.
  • a single unit in the context of the following discussion is a group having one or more members, which may be manipulated by the administrator as a whole without referring to each individual member of the group.
  • the data management policy and any changes thereof are applied to all of the storage objects in the data set.
  • Using data sets and data management policies can vastly reduce the workload of storage administrators, as well as the risk of making errors in deploying changes in the data management policy. More details about the data sets, storage objects, and data management policy are discussed below.
  • FIG. 1 shows a networked data storage system 100 according to some embodiments of the present invention.
  • the system 100 includes client machines 110, 112, and 114, a storage manager 120, a storage manager database 130, a storage server 160, a backup storage server 140, and a mirror storage server 150.
  • the above components can be coupled to each other through one or more networks of various types, such as local area network (LAN), wide area network (WAN), etc.
  • the network connections may be wireline, wireless, or a combination of both.
  • the above components may or may not be located at different geographical locations.
  • data is stored and transferred in units of files in the data storage system 100. Therefore, the system 100 may be a file- based networked storage system.
  • the system 100 can be a network-attached storage (NAS) system that provides clients with access to data at the file level.
  • a NAS system uses file access protocols to retrieve data, such as, for example, Network File System (NFS), or Common Internet File System (CIFS).
  • the files are logically arranged into directories.
  • a volume of storage devices may be mapped to one or more directories.
  • the system 100 may include or be part of a storage area network (SAN), to provide clients with access to data at the block level of storage servers.
  • a block is the basic unit of data used to store data in the SAN.
  • the data storage system 100 may provide clients with access to data at both the block level and the file level.
  • any or all of the components of system 100 and associated hardware may be used in various embodiments of the present invention.
  • other configurations of the networked data storage system may include more or fewer devices than those discussed above.
  • the client machine 110 is used by a storage administrator, and thus, may be referred to as an administrative client.
  • the other client machines 112 and 114 are used by users of the network data storage system 100 to access data, and thus, may be referred to as storage clients.
  • a storage client and an administrative client may not be mutually exclusive, that is, both the administrator and users may use the same client machine in some embodiments.
  • the client machines 110, 112, and 114 may be implemented on personal computers (PCs), laptop computers, special purpose computing devices, etc.
  • the client machine 110 is coupled to the storage manager 120, which is further coupled to the storage manager database 130.
  • the storage manager 120 is a software application which may be implemented on one or more servers, personal computers (PCs), special- purpose computing machines, etc. Details of one embodiment of a machine usable to implement the data manager 120 are shown in Figure 2.
  • the storage manager 120 may include an application programming interface (API) 124 to interface with the client machine 110. Further, the storage manager 120 manages storage using entities called data sets. Details of data sets are discussed below.
  • the storage manager 120 creates a user interface (e.g., graphical user interface (GUI), command line interface (CLI), etc.) and provides the user interface to the client machine 110 via the API 124.
  • GUI graphical user interface
  • CLI command line interface
  • the API 124 may be implemented on a separate server coupled between the storage manager 120 and the client machine 110.
  • the client machine 110 includes a display (e.g., a monitor) to present the user interface (e.g., the GUI 118) to a storage administrator of the data storage system 100 (also commonly referred to as the administrator).
  • the GUI 118 the administrator may input information of data sets and/or data management policies to the storage manager 120.
  • the GUI 118 is presented via a network access application, such as an internet browser, operable on the client machine 110.
  • the storage manager 120 may include a data set support module 122 to manage storage using data sets.
  • the storage manager 120 may further include a user interface module 126 to create the user interface (e.g., graphical user interface (GUI), command line interface (CLI), etc.) and to provide the user interface to the client machine 110 via the API 124.
  • GUI graphical user interface
  • CLI command line interface
  • Some exemplary embodiments of screen displays of the GUI 118 are illustrated in Figures 6A-6D.
  • the term "storage manager" is used herein to encompass all embodiments of storage manager 120.
  • the storage manager 120 Based on the administrator inputs, the storage manager 120 creates, removes, and/or updates data sets, where each data set is associated with a data management policy.
  • Objects representing the data sets and the data management policy are stored in the storage manager database 130.
  • the storage manager database 130 may be implemented using a storage device that stores data persistently, such as a disk, a read-only memory (ROM), etc.
  • the storage manager 120 manages data in the networked data storage system 100. More details of the data sets, data management policies, and data management using data sets are discussed below.
  • the storage manager 120 is further coupled to the storage server 160, the backup storage server 140, and the mirror storage server 150.
  • the storage servers 140, 150, and 160 are shown in Figure 1 as examples of storage servers for illustrative purpose only. Other embodiments of the data storage system may include more or fewer storage servers, each storage server managing a set of physical storage devices, such as magnetic disks, optical disks, tape drives, etc., in different configurations.
  • the storage server 160 manages two disks 162A and 162B.
  • the disks 162 A and 162B may hold various storage containers, either in whole or in part.
  • a storage container is a logical unit for storing data, such as a file, a directory, a volume, a qtree (which is a subset of a volume, optionally associated with a space usage quota), a LUN, etc.
  • the disk 162 A holds two qtrees 164A and 164B.
  • a disk may hold a part of a storage container.
  • a disk may hold part of a volume, where the volume spans multiple disks.
  • the client machines 112 and 114 may access data in the disks managed by the storage server 160.
  • the data may be stored in storage containers of different forms and/or structures, such as qtrees, directories, volumes, etc.
  • the client machine 112 stores data in the qtree 164 A
  • the client machine 114 stores data in the qtree 164B.
  • the storage server 160 may send the data in the qtrees 164 A and 164B to the backup storage server 140, which creates a backup copy of the data in the qtrees 164A and 164B in the disk 142.
  • the backup filer 140 may further mirror the disk 142 onto the disk 152 managed by the mirror storage server 150.
  • the client machine 112 stores data in an internal disk (not shown) and have the internal disk backed up in the disk 142 managed by the backup storage server 140. Note that the above are merely one example of data protection policy topologies. It should be appreciated that many different data protection policy topologies may be implemented in the system 100.
  • the storage manager 120 automatically uses data sets to manage data in the data storage system 100 according to data management policies from the administrator. Details of data sets and the use of such are discussed below. Data Sets and Storage Objects
  • a data set includes a set of storage objects associated with a data management policy.
  • the data management policy is applied to the storage objects in the data set, directing how the administrator wishes the data in the storage objects to be managed as a single unit.
  • a data set is a collection of storage objects grouped by virtue of the storage objects to be managed as a single unit.
  • a storage object may be defined to be a home directory of an employee in a company, which is a member of a data set of the home directories of all employees in the company.
  • the storage objects may be referred to as members of the data set.
  • a storage object may include a logical representation of a collection of data in one or more storage containers and replicas of the collection of data (e.g., a mirrored copy of the data and/or a backed up copy of the data).
  • a logical representation of the storage object of the employee's home directory may be the employee's identification (ID), such as "jsmith.”
  • ID employee's identification
  • the collection of data may be created by users or the administrator of the data storage system 100.
  • the data of a storage object is stored in a storage container or a set of storage containers (e.g., the disk 162A) managed by one or more storage servers (such as the storage server 160) in the data storage system 100.
  • the content of the employee's home directory in the above example may be stored in the qtree 164A in the disk 162 A.
  • Some examples of storage objects include data in qtrees, volumes, directories, etc. These examples may also be referred to as elementary storage objects because they are logical representation of data in basic units of storage in the networked data storage system 100 in the context of data sets. Further, a storage object may be a reference to a collection of elementary storage objects, such as a reference to all volumes on a storage server.
  • the physical implementation of the storage containers are independent of the logical representation of the data.
  • the data is not managed by where the data is stored or how the data is accessed. Rather, the data is managed by the logical representation, which may be associated with the content of the data.
  • the data may be a word processing document, "employee_review.doc" stored in the disk 162 A.
  • the logical representation may be the name of the document (i.e., "employee_review.doc").
  • the storage manager 120 may manage the document by the name of the document (i.e., "employee_review.doc"), rather than by the storage container (i.e., the disk 162A in the current example) or the set of storage containers in which the document is stored.
  • the physical implementation of the disk 162 A is independent of the name of the document (i.e., "employee_review.doc") stored in the disk 162A.
  • the storage object, as well as the data set having the storage object are not bound to any actual physical location or storage container and may move to another location or another storage container over time.
  • the storage containers associated with a data set may become obsolete in performance over time and the storage manager 120 may move the data to a set of new storage containers, with or without alerting the administrator. Any movement of data sets may be substantially transparent from a client perspective in order to provide a separation of the logical representation from the physical location of the data.
  • the storage manager 120 may re-balance resources (e.g., the disks 162 A, 162B, 142, and 152) in the data storage system 100 over time.
  • the data set provides the virtualization of the physical storage containers used to hold the data.
  • a data set includes user created data as well as meta data.
  • Meta data may include information about the user created data. Examples of meta data include exported names, language settings, storage server association, LUN mappings, replication configuration, quotas, policies, consistency groups, etc. Meta data may be used to move or restore the corresponding data set. A complete data set backup is thus useful in handling disaster recovery scenarios. If the storage server (e.g., a filer) which hosts the primary storage set associated with the data set is destroyed, the data set may be reconstructed on another storage server using another storage set that is a replica of the primary storage set to provide client data access without manual configuration by the administrator. [0039].
  • a data set may have two types of membership of the storage objects which it contains, namely static and dynamic membership.
  • Static members are low level storage objects (volumes, directories, LUNs), which could be managed by themselves.
  • the elementary storage objects mentioned above are static members.
  • Dynamic members are references to storage objects which may contain other storage objects. For example, an administrator could add a user's home directory to a data set as a static member. Alternatively, the administrator could realize that a given storage server is only used to hold home directories and add the storage server itself to a data set as a dynamic member. This saves the administrator work later because, as directories are created and destroyed on that storage server, the directories may be dynamically added to or removed from the data set.
  • a data set aggregates the status of its members according to some embodiments of the invention.
  • status parameters include a data availability status, a data protection status, and a data protection policy conformance.
  • the data availability status indicates whether all components of the data set are available for use.
  • the data protection status indicates that all the data set members are being protected by a data protection policy.
  • the data protection policy conformance status indicates that the data protection mechanisms (e.g., snapshots, backups, and mirrors) have been configured in accordance with the data protection policy.
  • the storage manager 120 may roll up the corresponding statuses of members of the data set to derive or to generate a value of the corresponding status of the data set.
  • a status parameter may have a number of levels, each associated with a value.
  • the storage manager 120 may select the maximum value among all the corresponding statuses of the members.
  • a status can have six possible levels: normal, information, warning, error, critical, and emergency, where normal has a value of 1 , information has a value of 2, warning has a value of 3, and so forth.
  • an exemplary data set has three members and, the corresponding status parameter values of which are 2, 3, and 5. Then the storage manager 120 may determine the corresponding status parameter value of the entire data set to be 5, which is the maximum value among the three values.
  • the storage manager 120 may perform various operations on a data set, such as in response to administrator requests. Some examples of such operations include changing or modifying an associated data management policy of a data set, provisioning new members in a data set, listing members in a data set, adding members to a data set, deleting or removing members from a data set, migrating a data set to a different set of storage containers, generating performance views specific to a data set, generating storage usage reports of a data set, setting quota on a data set or individual members within a data set.
  • Some examples of such operations include changing or modifying an associated data management policy of a data set, provisioning new members in a data set, listing members in a data set, adding members to a data set, deleting or removing members from a data set, migrating a data set to a different set of storage containers, generating performance views specific to a data set, generating storage usage reports of a data set, setting quota on a data set or individual members within a data set.
  • a data management policy includes a description of the desired behavior of the associated data set.
  • a data management policy may describe how the storage should be used and configured.
  • One exemplary data management policy is a data protection policy, which describes how storage objects in a data set should be protected.
  • Other examples of data management policies include a performance management policy, a provisioning policy, etc. Attributes associated with a data management policy are abstracted at the highest level possible, allowing implementation of underlying technology to change over time without adversely impacting the administrator. In other words, a layer of abstraction is provided between the administrator and the physical implementation of the storage containers in which the data is stored.
  • the physical implementation may be modified without violating or impacting the data management policy.
  • the administrator may be shielded from the idiosyncrasies of various underlying implementations that allow the data set to use newer technology as it becomes available in an automated fashion.
  • the storage manager 120 may automatically start applying the data management policy associated with the data set to all members in the data set. For instance, the storage manager 120 may configure storage objects in the data set, schedule backup of the storage objects in the data set, etc., according to the data management policy.
  • the storage manager 120 may generate an error message to alert the administrator, who may respond by reassigning the subset of storage object(s) to another data set or by creating a new data set for the subset of storage object(s).
  • a data management policy may be represented by a tree graph having a number of nodes and branches.
  • Figure 3 A shows a tree graph of one embodiment of a data management policy.
  • the tree graph 210 includes nodes 211-216 and branches 251-255.
  • Each node represents a storage object and is coupled to another node via a branch, which describes the relationship between the two corresponding storage objects.
  • branch 253 is marked as a "backup" connection between nodes 212 and 214.
  • storage object represented by node 214 is a backup copy of the storage object 212.
  • the graph 210 represents how the administrator intends to manage data in the data storage system.
  • the data management policy describes attributes of the data in terms that the administrator is comfortable with, and leaves the configuration and choice of technologies to implement the policy to the storage manager 120.
  • the attributes in the policies generally focus on desired data protection behaviors and configuration settings rather than on software technology and hardware choices. Although the choice of hardware may have some impact on the performance and cost of the storage, the physical equipment choices may be driven by a simple label scheme described in more detail below. Examples of the above-mentioned attributes include cost, performance, availability, reliability, type of data protection, capacity related actions, security settings, capabilities, etc.
  • the storage containers in the system 100 are identical to [0047] in some embodiments.
  • tier-1 may be collectively referred to as a resource pool
  • tier-2 may be collectively referred to as a resource pool
  • tier-3 Such labels may be specified as a part of a provisioning policy to limit physical storage resources to a select data set.
  • a data access name may be specified in addition to a policy for the desired behavior of the resulting data set.
  • the data access name is used to configure the necessary export configurations (e.g., NFS, CIFS, ISCSI, FCP, etc.).
  • the data management policy associated with a data set may be explicitly changed by the administrator. For example, in a tiered storage system, as the data in tier-1 storage ages, the relevance or importance of the data may diminish, and thus, the data may be migrated to tier-2 storage from the tier-1 storage. In some embodiments, the administrator may determine which data sets are candidates for migration and associate such data sets with a policy created for data in tier-2 storage.
  • the storage manager 120 automatically starts applying the data management policy associated with the data set to all members in the data set. For instance, the storage manager 120 may configure storage objects in the data set, schedule backup of the storage objects in the data set, etc., according to the data management policy.
  • the storage manager 120 In response to a change in the data set and/or the data management policy, the storage manager 120 automatically checks the data set to determine if the data set still conforms to the policy and if not, the storage manager 120 may re-apply the policy to the data set to make the data set conform to the policy. For example, when the administrator adds a new member to a data set, the storage manager 120 automatically applies the data management policy associated with the data set to the new member.
  • the storage manager 120 when the administrator alters a data management policy associated with a data set, the storage manager 120 automatically identifies the data set associated with the altered data management policy. To identify the affected data sets, the storage manager 120 may access the storage manager database 130 to find the data sets associated to the altered policy. Then the storage manager 120 automatically checks to determine if the storage objects in the data set still conform to the altered data management policy. If not, the storage manager 120 automatically applies the altered policy to the storage objects in the data set. For instance, the storage manager 120 may automatically re-configure the storage servers (e.g., storage servers 140, 150, 160) and/or the storage devices (e.g., disks 142, 152, 162A, 162B), as well as the relationships between the storage servers according to the altered policy.
  • the storage servers e.g., storage servers 140, 150, 160
  • the storage devices e.g., disks 142, 152, 162A, 162B
  • the storage manager 120 may also give the administrator a preview of what actions the storage manager 120 is configured to take to make the data set conform to the data management policy, so that the administrator can confirm the actions are correct before the actions are taken. In some embodiments, the storage manager 120 may find certain situations unresolvable and report these to the administrator for manual resolution.
  • policies may be modified according to disaster recovery requirements or storage attributes, subject to permission allowed via the role based access control mechanism.
  • For cloning a new copy of a policy with identical attributes may be generated using the cloning operation.
  • Using data sets and data management policies as described herein can vastly reduce the workload of storage administrators. There are at least two ways in which using data sets as described herein help reduce manual administrative work and ensure a more reliable policy implementation. [0053] First, using data sets can reduce work by reducing the number of objects a storage administrator has to monitor. While a data center may have hundreds of thousands of directories, these may be classified into a much smaller number of collections and be managed by a smaller number of policies. For example, every user in a large enterprise may have a home directory, but these all need to be managed the same way. Thus, these home directories can be collected into a single data set associated with a data protection policy.
  • the second way a data set reduces work is by automating implementation of and changes to data management policies. For instance, suppose a data center originally decided user home directories should be backed up, but the secondary storage holding the backups did not need further protection. Further, suppose the administrator subsequently decided this was not adequate and that home directory backups should be mirrored to off-site storage. In a conventional environment, this would be a huge task, including, for example, tracking down all the secondary volumes which have ever held home directory backups, provisioning appropriate mirrored storage, configuring all the mirror processes, and monitoring that the mirror operations have been succeeding, etc. Using a data set associated with a data management policy, the administrator only has to modify the data management policy to add a mirroring stage.
  • the storage manager 120 may then perform the tedious task of finding all the volumes which now require mirrors, provision the mirrored storage, and establish the relationships, etc. On an ongoing basis, the storage manager 120 may monitor that the mirrors are working and report a data set wide error status if not.
  • the storage manager 120 may be implemented on a server as illustrated in Figure 2.
  • the storage manager 200 includes a processor 222, a memory 224, a network interface 226, and a storage adaptor 228, which are coupled to each other via a bus system 230.
  • the bus system 230 may include one or more busses and/or interconnects.
  • the storage manager 200 communicates with a network (e.g., the Internet) via the network interface 226, which can be an Ethernet adaptor, fiber channel adaptor, etc.
  • the network interface 226 may be coupled to a public network, a private network, or a combination of both in order to communicate with a client machine (such as the client machine 110 in Figure 1) usable by an administrator of the data storage system.
  • the processor 222 reads instructions from the memory 224 and executes the instructions.
  • the memory 224 may include any of various types of memory devices, such as, for example, random access memory (RAM), read-only memory (ROM), flash memory, one or more mass storage devices (e.g., disks), etc.
  • the memory 224 stores instructions of an operating system 230.
  • the processor 222 may retrieve the instructions from the memory 224 to run the operating system 230.
  • the storage manager 200 interfaces with one or more storage servers (e.g., the storage servers 140, 150, 160 in Figure 1) via the storage adaptor 228, which may include a small computer system interface (SCSI) adaptor, fiber channel adaptor, etc.
  • SCSI small computer system interface
  • Figure 4 illustrates a functional diagram of one embodiment of a storage manager 300, which can represent storage manager 120 in Figure 1.
  • the storage manager 300 includes an API 330, a conformance checker 310, and a conformance engine 320.
  • the API 330 is operatively coupled to the conformance checker 310, which is further operatively coupled to the conformance engine 320.
  • the conformance checker 310 includes a translator 312.
  • the conformance engine 320 includes a storage adaptor 322.
  • the API 330 is communicably coupled to a GUI 340, which may be provided by a client machine (e.g., the client machine 110 in Figure 1).
  • the storage manager 300 is coupled to a database 350, which stores representations of data sets and data management policies, which are also referred to as objects.
  • the conformance checker 310 checks whether the storage objects of a data set conforms to a data management policy associated with the data set.
  • the storage objects of the data set has to have relationships with each other as specified by the data management policy.
  • the data set violates the data management policy if the storage objects are not related to each other as specified in the data management policy.
  • a data set includes three volumes, namely, volume A, volume B, and volume C.
  • the data set is associated with a data management policy, which is a protection policy that specifies some backup and mirroring relationships between the volumes. Specifically, the protection policy specifies that volume A should be backed up on volume B and volume B should be mirrored to volume C.
  • the data management policy (which, in this case, is the protection policy) may specify more details on the relationships between the storage objects (e.g., the frequencies of backup and mirroring). More details on how the conformance checker 310 determines if a data set conforms or violates a data management policy are described below.
  • the GUI 340 receives administrator inputs 301 on data sets and/or data management policies.
  • the administrator inputs 301 may include, for example, a request to apply a data management policy to a data set, a change to an existing data management policy and/or an existing data set, to request to create a new data management policy and/or a new data set, etc.
  • the administrator inputs 301 are typically written in human readable terms, such as words, phrases, etc., in a structured, machine-readable format.
  • the API 330 receives the administrator inputs 301 from the GUI 340 and forwards the inputs 305 to the conformance checker 310. [0060]
  • the translator 312 in the conformance checker 310 translates the administrator inputs 301 into machine-readable terms.
  • a client program running on a client machine invokes the API 330, which may construct an in-memory representation of the data set and its associated data protection policy, which are commonly referred to as objects. Note that these objects are software entities distinct from the storage objects described above.
  • the API 330 invokes the main entry point in the conformance checker 310 with pointers to the objects corresponding to the data set and policy.
  • the conformance checker 310 compares the state of the data set against the data management policy to determine if the data set conforms to the data management policy. For example, the conformance checker 310 iterates through the connections of a tree graph representing the policy as applied to the data set.
  • the conformance checker 310 iterates through the connections represented by branches 251 -255. For instance, the conformance checker 310 may iterate through the tree graph 210 from branch 251 to branch 252, then to branches 253, 254, and 255. Alternatively, the conformance checker 310 may iterate through the tree graph 210 from branch 251 to branches 253 and 254, and then to branch 252, and finally to branch 255. For each connection, the conformance checker 310 compares the states of the storage objects represented by the nodes 211 -216 by making various determinations. A flowchart showing the determinations made by the conformance checker 310 according to one embodiment of the invention is shown in Figures 3B and 3C.
  • the conformance checker 310 determines if each member of the data set corresponding to a source node of the tree graph is protected by a relationship between storage servers according to the policy (block 261). For instance, the conformance checker 310 may look into a configuration file of the data storage system to find out the relationships between the storage servers managing the storage objects. For example, the policy may require volume A to be mirrored to volume B, where volume A is on storage server A and volume B is on storage server B. Then the conformance checker 310 may look into the configuration file of the data storage system to determine if storage server A mirrors volume A onto volume B on storage server B.
  • the conformance checker 310 may check whether there is a mirroring relationship between storage server A and storage server B. If not, then the data set is not in conformance. Otherwise, the conformance checker 310 continues at block 262 to determine if there are any source nodes protected by relationships that do not terminate at a destination node of the tree graph. If there are, then the data set is not in conformance. Otherwise, the conformance checker 310 determines if there are any destination nodes that are end points for relationships not corresponding to the source node (block 263). If there are, then the data set is not in conformance. Next, the conformance checker 310 determines if there is a missing physical relationship in the tree graph (block 264).
  • the conformance checker 310 determines if there is an existing storage object already in the data set to hold a copy of the source node (block 265). If not, the data set is not in conformance. Otherwise, the conformance checker 310 determines if the storage object is large enough to hold the data (block 266). If not, the data set is not in conformance. Next, the conformance checker 310 determines if there is an appropriate destination object (block 267). If so, the data set is in conformance. Otherwise, the conformance checker 310 determines if an appropriate destination object can be constructed (block 268).
  • the conformance checker 310 determines that the data set is not in conformance with the data management policy, the conformance checker 310 generates a task or a set of tasks, which is for making the data set conform to the data management policy.
  • a task includes one or more specific machine-executable or machine-readable instructions to cause a storage server to perform a specific function, such as to create a storage object, to create a relationship between a set of storage objects, to delete a storage object, etc.
  • the conformance checker 310 may generate a task including instructions to provision storage in order to create a new storage object.
  • the task may further include the parameters of what needs to be done in order to make the data set conform to its policy.
  • the translator 312 translates the task list into human readable description 303B, which is sent to the API 330 from the conformance checker 310.
  • each task is associated with a specific piece of code to translate the task into a corresponding human readable description.
  • the API 330 forwards the human readable description 303A of the task list to the GUI 340, which outputs the human readable description 303A of the task list to the administrator.
  • the GUI 340 may output the human readable description 303 A of the task list in a screen display.
  • the administrator may verify the human readable description 303A of the task list and if correct, the administrator may confirm that the human readable description 303A of the task list is correct via the GUI 340.
  • the conformance checker 310 may forward the machine-readable task list 307 to the conformance engine 320.
  • the conformance engine 320 processes tasks in the list 307 in sequence, for example, first-in- first-out (FIFO), sending the appropriate commands or instructions 309 to storage servers (e.g., the storage servers 140, 150, 160 in Figure 1) to re-configure the storage system to comply with the policy.
  • storage servers e.g., the storage servers 140, 150, 160 in Figure 1.
  • the conformance engine 320 is not making decisions based on the policy, rather, the conformance engine 320 is simply processing the tasks on behalf of the conformance checker 310. As such, the conformance engine 320 does not change the sequence of the tasks in the list 307.
  • the conformance engine 320 includes a network adaptor 322 to interface with one or more storage servers in the data storage system, such as storage servers 140, 150, and 160 in Figure 1.
  • the storage servers are managed by the storage manager 300.
  • the network adaptor 322 may issue the instructions in the task list 307 to the relevant storage servers to cause the storage servers to perform functions according to the instructions in order to make the data set to conform to the data' management policy.
  • the instructions from the storage manager 300 may cause a storage server to schedule data backup according to the data management policy, to reconfigure some storage objects managed by the storage server according to the data management policy, to re-allocate storage devices according to the data management policy, etc.
  • the storage manager 300 has made the data set conform to the data management policy.
  • the storage manager 300 described above provides great convenience to the administrator. Since the conformance checker 310 of the storage manager 300 automatically checks for conformance, the data sets in the data storage system can be checked faster and more frequently. This may help to detect issues much sooner than having the administrator to manually check the data sets. Further, if the conformance checker 310 detects an issue, the administrator does not have to manually enter commands to resolve the situation. Rather, the conformance checker 310 generates a list of tasks, which may be executed to make the data sets conform to the data management policy. Manually entering commands or instructions is tedious and error prone. Thus, the storage manager 300 helps to reduce risk in making errors when changing a data management policy.
  • splitting the conformance process into two stages, supported by the conformance checker 310 and the conformance engine 320 respectively, allows the administrator to find out what tasks would be executed before any expensive or irreversible actions are taken.
  • the administrator may cancel tasks before they are executed, should the administrator decide not to accept the tasks recommended by the conformance checker 310.
  • the conformance checker 310 may identify all the data sets using that policy and deduce the operations needed to bring the data sets into conformance. As mentioned above, this may be considered as a dry run of the change in the data management policy. Previewing the dry run allows the administrator to decide whether such a change is too disruptive or expensive before implementing the change in the data management policy.
  • Figure 5 illustrates a flow diagram of one embodiment of a process to manage data in a data storage system using data sets.
  • the process is performed by processing logic that comprises hardware (e.g., circuitry, dedicated logic, etc.), software (such as is run on a general-purpose computer system or a dedicated machine, such as the storage manager 120 in Figure 1), firmware, or any combination of these.
  • hardware e.g., circuitry, dedicated logic, etc.
  • software such as is run on a general-purpose computer system or a dedicated machine, such as the storage manager 120 in Figure 1
  • firmware e.g., firmware, or any combination of these.
  • processing logic receives input from an administrator of the data storage system (processing block 410). Processing logic then checks if there is a request to apply a data management policy to a data set or change to at least one of the data management policy and the data set (processing block 420). If there is no request or change, then processing logic transitions to processing block 490 and the process ends. Otherwise, processing logic transitions to processing block 430.
  • processing logic compares a state of the data set against the data management policy (processing block 430). Then processing logic checks if the data set conforms to the policy (processing block 440). If so, then processing logic transitions to processing block 490 and the process ends. Otherwise, processing logic transitions to processing block 450. [0073] Processing logic then translates the input from the administrator into instructions executable by storage servers (processing block 450). In some embodiments, these instructions are translated back into a human readable task list and output to the administrator for verification. The administrator may accept or reject the task list.
  • processing logic may issue the instructions to the storage servers to cause the storage servers to take actions that would bring the storage objects into conformance with the policy (processing block 460). Then processing logic transitions to processing block 490 and the process ends. Details of some embodiments of the above operations have been described above.
  • FIGs 6A-6C illustrate one embodiment of a series of displays of GUI to enable an administrator to create a new data set.
  • a GUI 610 for creating new data sets is shown.
  • the GUI 610 may be displayed via a window created by the client machine 110 in Figure 1.
  • the GUI 610 includes a field 612 for entry of a name of the data set and a field 614 for entry of the description of the data set.
  • an administrator has input "Accounting Data" as the name of a new data set.
  • the GUI 600 includes additional fields for entry of other attributes or information of the new data set, such as owner, contact, timezone.
  • Figure 6B illustrates one embodiment of a display of a GUI used in creating the new data set.
  • the GUI 620 includes a list 622 of available physical resources (e.g., available directories) to be added into the new data set. The administrator may select from the list 622 of physical resources by clicking onto the particular resource.
  • the GUI 620 further includes a set of user interface controls 624 to allow the administrator to add the selected physical resources to the new data set.
  • the GUI 620 includes a field 626 to display the selected physical resources in the data set.
  • Figure 6C illustrates one embodiment of a display of a GUI used in creating the new data set.
  • the GUI 630 shows a summary of the new data set created using the GUI 610 and 620 in Figures 6A and 6B.
  • the administrator may verify the newly created data set using the GUI 630 and if desired, may return to the GUI 610 and/or 620, to make changes using the user interface control 632.
  • the administrator may confirm the creation of the new data set by actuating the user interface control 634.
  • the administrator may cancel the creation of the new data set by actuating the user interface control 636.
  • FIG. 6D illustrates one embodiment of a display of a GUI for applying a data management policy to a data set.
  • the GUI 640 includes a field 642 displaying data sets created, a field 644 displaying data management policies, a field 646 to display details of a data management policy selected.
  • An administrator may click on a data set in the field 642 to select the data set. For instance, the data set "NY Payroll" is selected in the example shown in Figure 6D.
  • the GUI 640 further includes user interface controls 648 to allow the administrator to add, edit, or delete a data set.
  • the administrator may select one of the data management policies in the field 644 to apply to the selected data set by first clicking on the desired data management policy and the desired data set to select them, and then actuating the "Apply" button 649 to apply the selected policy to the selected data set.
  • the administrator has selected the policy of "Backed up, then mirrored" in the field 644, and details of this policy is displayed in the field 646 in graphics, text, or a combination of both.
  • Figure 7 illustrates a flow diagram of one embodiment of a process to manage data in a data storage system using data sets.
  • the process is performed by processing logic that comprises hardware (e.g., circuitry, dedicated logic, etc.), software (such as is run on a general-purpose computer system or a dedicated machine, such as the storage manager 120 in Figure 1), or a combination of both.
  • hardware e.g., circuitry, dedicated logic, etc.
  • software such as is run on a general-purpose computer system or a dedicated machine, such as the storage manager 120 in Figure 1
  • processing logic creates a GUI to receive inputs from an administrator of the data storage system (processing block 710).
  • Processing logic receives administrator inputs on data sets and/or data management policies (processing block 720).
  • the administrator may provide information via the GUI to define data sets (e.g., names and description of the data set, storage objects to be included in the data set, etc.) and to define data management policies (e.g., a data protection policy).
  • the processing logic organizes storage objects specified by the administrator into data sets based on administrator inputs (processing block 730).
  • Processing logic may store a list of the storage objects in each data set in a persistent store (processing logic 740).
  • processing logic manages each data set as a single unit by applying a corresponding data management policy to the data set (processing block 750). For example, processing logic may apply the data manage policy by configuring the storage objects, scheduling backups of the storage objects, etc., according to the data management policy. [0080] Further, processing logic may determine a value of a status of each data set based on the corresponding status of each storage object in the respective data set (processing block 770). Details of data sets, data management policies, and management of data using such have been described in detail above.
  • the present invention also relates to an apparatus for performing the operations described herein.
  • This apparatus may be specially constructed for the required purpose, or it may comprise a general-purpose computer selectively activated or reconfigured by a computer program stored in the computer.
  • a computer program may be stored in a machine-accessible medium, also referred to as a computer-readable medium, such as, but is not limited to, any type of disk including floppy disks, optical disks, CD-ROMs, and magnetic-optical disks, read-only memories (ROMs), random access memories (RAMs), EPROMs, EEPROMs, magnetic or optical cards, or any type of media suitable for storing electronic instructions, and each coupled to a computer system bus.

Abstract

An apparatus and a method to manage data using data sets are presented. In one aspect, the apparatus includes a conformance checker and a conformance engine to make data sets conform to data management policies. The conformance checker may be operable to compare a state of a data set against a data management policy associated with the data set. The conformance engine may then make the data set conform to the data management policy if the conformance checker determines that the data set currently violates the data management policy. In another aspect, the method includes allowing an administrator of a data storage system to define a data set having a plurality of storage objects and to associate the data set with a data management policy. The method may further include using a storage manager to manage the data set as a single unit according to the data management policy.

Description

DATA MANAGEMENT IN A DATA STORAGE SYSTEM USING DATA SETS
[0001] A portion of the disclosure of this patent document contains material which is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent file or records, but otherwise reserves all copyright rights whatsoever. TECHNICAL FIELD
[0002] The present invention relates to networked data storage systems, and more particularly, to managing data storage using data sets. BACKGROUND
[0003] A networked data storage system can be used for a variety of purposes, such as providing multiple users access to shared data, or facilitating backups or data mirroring. A networked storage system may include a number of storage servers. A storage server may provide services related to accessing and organizing data on mass storage devices, such as disks. Some storage servers are commonly referred to as filers or file servers, as these storage servers provide file-level access to data. Some of these filers further provide clients with sub-file level access to data (e.g., block-level access). An example of such a storage server is any of the Filer products made by Network Appliance, Inc. in Sunnyvale, California. The storage server may be implemented with a special-purpose computer or a general-purpose computer programmed in a particular way. Depending on the application, various networked storage systems may include different numbers of storage servers. [0004] Logical units of storage may be created and manipulated on storage servers, such as files, directories, volumes, logical unit numbers (LUNs). Such logical units are referred to as storage objects in this document. Creating a single storage object is typically fast and easy, but managing a storage object over time can be difficult. A storage administrator has to make numerous decisions, such as how to monitor the available space for the storage object, how to schedule data backups, how to configure backups, whether the data should be mirrored, where data should be mirrored, etc. Answers to the above questions may be provided in a data management policy, and once this policy is decided, the administrator needs to ensure that the policy is correctly implemented on all relevant storage objects, that the required space is available, that the data protection operations succeed, and so forth. If the administrator decides to change the policy (for example, extending the amount of time that backups should be retained), the administrator has to find all the affected storage objects and then manually re-configure all the relevant settings.
[0005] As the number of storage objects grows in the system, the administrator's job becomes more difficult and complex. It becomes increasingly likely that the administrator may not readily determine what policy is supposed to apply to a given storage object, or why a given volume is mirrored. In addition, the administrator has to perform many tedious manual operations for each storage object, which can be error prone and unreliable. A large data center may have hundreds to over a thousand filers. Each filer may manage hundreds of volumes and thousands of qtrees. This leads to a total of tens to hundreds of thousands of volumes and qtrees to manage with a similar number of backup and mirror relationships. The number of objects is growing faster than information technology headcounts, so each administrator is managing more and more objects. Eventually, the sheer number of objects makes it infeasible, if not impossible, for an administrator to reliably implement data management policies. Thus, a storage administrator needs help tracking what storage objects exist in a storage system, how the storage objects relate to other objects, and which policy should be applied to the storage objects.
[0006] Other important challenges for storage administrators include deciding how to manage their storage infrastructure and ensuring that their storage systems are managed in the way they have decided. The first challenge is the problem of deciding on a data management policy. The storage administrators have a plethora of choices to make when deciding on a policy. They need to decide how often to back up data, how long to retain the back up copies, whether to use local snapshots to provide local backups, whether to mirror storage objects, and so forth. Typically, one way to manage the data depends on what type of data it is, and how important the data is. For example, the data for a mission-critical product order database requires a different data management policy from the home directories of ex-employees. [0007] Once an administrator has defined a data management policy, the policy has to be described or encoded in such a way that other administrators can understand and carry out the policy. This description is often in the form of an operation manual written in a natural language commonly used in human communication, such that the description can be read and interpreted by other members of the storage management staff. Currently, there is no automated implementation of a policy written in this form. Furthermore, there is currently no way to automatically audit a data center and find storage objects that are not being managed in compliance with the policy. Conventionally, administrators write ad-hoc tools and/or use ad-hoc queries to monitor the storage environment and to look for discrepancies between the policy and the states of storage objects. If the administrators find a discrepancy, they have to manually decide what actions to take to correct the situation. This takes so much time and is so error prone that most large data centers have little confidence on whether they are managing their data in accordance with their data management policies.
SUMMARY
[0008] The present invention includes an apparatus and a method to manage data using data sets. In one embodiment, the apparatus includes a conformance checker and a conformance engine to make data sets conform to data management policies. The conformance checker may be operable to compare a state of a data set against a data management policy associated with the data set to determine if the data set currently conforms to the data management policy. The conformance engine may then make the data set conform to the data management policy if the conformance checker determines that the data set currently violates the data management policy. [0009] In one embodiment, the method includes allowing an administrator of a data storage system to define a data set having a plurality of storage objects and to associate the data set with a data management policy. Each of the storage objects includes a logical representation of a collection of data and replicas of the collection of data. The collection of data is stored in storage containers. The storage containers are managed by storage servers in the data storage system, wherein the storage containers are independent of the logical representation of the collection of data. The method may further include using a storage manager to manage the data set as a single unit according to the data management policy.
[0010] Other features of the present invention will be apparent from the accompanying drawings and from the detailed description that follows.
BRIEF DESCRIPTION OF THE DRAWINGS
[0011] The present invention is illustrated by way of example and not limitation in the figures of the accompanying drawings, in which like references indicate similar elements and in which:
[0012] Figure 1 illustrates an embodiment of a networked storage system;
[0013] Figure 2 illustrates an embodiment of a storage manager;
[0014] Figure 3 A shows a tree graph of one embodiment of a data management policy;
[0015] Figures 3B and 3C illustrate a flow diagram of one embodiment of a process performed by a conformance checker to determine if a data set is in conformance with a data management policy;
[0016] Figure 4 illustrates a functional diagram of an embodiment of a storage manager;
[0017] Figure 5 illustrates a flow diagram of an embodiment of a process to make a data set conform to a data management policy;
[0018] Figures 6A-6C illustrate an embodiment of a series of GUI screens to create a new data set;
[0019] Figure 6D illustrates an embodiment of a GUI screen for applying a data management policy to a data set; and
[0020] Figure 7 illustrates a flow diagram of an embodiment of a process to manage data using data sets.
DETAILED DESCRIPTION
[0021] In the following description, numerous specific details are set forth. However, it is understood that embodiments of the invention may be practiced without these specific details. In other instances, well-known components, structures, and techniques have not been shown in detail in order not to obscure the understanding of this description. [0022] An apparatus and a method to automatically make data sets conform to data management policies are described. In one embodiment, the apparatus includes a conformance checker and a conformance engine. The conformance checker is operable to compare a state of a data set against a data management policy associated with the data set to determine if the data set conforms to the data management policy. The conformance engine then makes the data set conform to the data management policy if the conformance checker determines that the data set violates the data management policy. Using the conformance checker and the conformance engine described herein provides great convenience to storage administrators, because the data sets can be checked automatically and frequently without imposing much burden on the administrators. More details about the data sets, storage objects, data management policy, conformance checker, and conformance engine are discussed below.
[0023] A method and an apparatus to manage data using data sets in a data storage system are also described. In one embodiment, the method includes allowing an administrator of a network data storage system to define a data set having a set of storage objects associated with a data management policy. Each storage object may include a logical representation of a collection of data and replicas of the collection of data. The collection of data is stored in one or more storage containers. The storage containers are managed by one or more storage servers in the data storage system. The storage containers are independent of the logical representation. The method may further include managing the data set as a single unit according to the data management policy using a storage manager. A single unit in the context of the following discussion is a group having one or more members, which may be manipulated by the administrator as a whole without referring to each individual member of the group. To manage the data set as a single unit, the data management policy and any changes thereof are applied to all of the storage objects in the data set. Using data sets and data management policies can vastly reduce the workload of storage administrators, as well as the risk of making errors in deploying changes in the data management policy. More details about the data sets, storage objects, and data management policy are discussed below. System Overview
[0024] Figure 1 shows a networked data storage system 100 according to some embodiments of the present invention. The system 100 includes client machines 110, 112, and 114, a storage manager 120, a storage manager database 130, a storage server 160, a backup storage server 140, and a mirror storage server 150. The above components can be coupled to each other through one or more networks of various types, such as local area network (LAN), wide area network (WAN), etc. Moreover, the network connections may be wireline, wireless, or a combination of both. As such, the above components may or may not be located at different geographical locations. [0025J In one embodiment, data is stored and transferred in units of files in the data storage system 100. Therefore, the system 100 may be a file- based networked storage system. In such an embodiment, the system 100 can be a network-attached storage (NAS) system that provides clients with access to data at the file level. A NAS system uses file access protocols to retrieve data, such as, for example, Network File System (NFS), or Common Internet File System (CIFS). The files are logically arranged into directories. A volume of storage devices may be mapped to one or more directories. Alternatively, the system 100 may include or be part of a storage area network (SAN), to provide clients with access to data at the block level of storage servers. A block is the basic unit of data used to store data in the SAN. Alternatively, the data storage system 100 may provide clients with access to data at both the block level and the file level.
[0026] Note that any or all of the components of system 100 and associated hardware may be used in various embodiments of the present invention. However, it can be appreciated that other configurations of the networked data storage system may include more or fewer devices than those discussed above.
[0027] In one embodiment, the client machine 110 is used by a storage administrator, and thus, may be referred to as an administrative client. In contrast, the other client machines 112 and 114 are used by users of the network data storage system 100 to access data, and thus, may be referred to as storage clients. Of course, a storage client and an administrative client may not be mutually exclusive, that is, both the administrator and users may use the same client machine in some embodiments. The client machines 110, 112, and 114 may be implemented on personal computers (PCs), laptop computers, special purpose computing devices, etc.
[0028] In one embodiment, the client machine 110 is coupled to the storage manager 120, which is further coupled to the storage manager database 130. The storage manager 120 is a software application which may be implemented on one or more servers, personal computers (PCs), special- purpose computing machines, etc. Details of one embodiment of a machine usable to implement the data manager 120 are shown in Figure 2. The storage manager 120 may include an application programming interface (API) 124 to interface with the client machine 110. Further, the storage manager 120 manages storage using entities called data sets. Details of data sets are discussed below. In one embodiment, the storage manager 120 creates a user interface (e.g., graphical user interface (GUI), command line interface (CLI), etc.) and provides the user interface to the client machine 110 via the API 124. The API 124 may be implemented on a separate server coupled between the storage manager 120 and the client machine 110. The client machine 110 includes a display (e.g., a monitor) to present the user interface (e.g., the GUI 118) to a storage administrator of the data storage system 100 (also commonly referred to as the administrator). Using the GUI 118, the administrator may input information of data sets and/or data management policies to the storage manager 120. In some embodiments, the GUI 118 is presented via a network access application, such as an internet browser, operable on the client machine 110.
[0029] In one embodiment, the storage manager 120 may include a data set support module 122 to manage storage using data sets. The storage manager 120 may further include a user interface module 126 to create the user interface (e.g., graphical user interface (GUI), command line interface (CLI), etc.) and to provide the user interface to the client machine 110 via the API 124. Some exemplary embodiments of screen displays of the GUI 118 are illustrated in Figures 6A-6D. The term "storage manager" is used herein to encompass all embodiments of storage manager 120. [0030] Based on the administrator inputs, the storage manager 120 creates, removes, and/or updates data sets, where each data set is associated with a data management policy. Objects representing the data sets and the data management policy are stored in the storage manager database 130. The storage manager database 130 may be implemented using a storage device that stores data persistently, such as a disk, a read-only memory (ROM), etc. Using the data sets and the data management policies, the storage manager 120 manages data in the networked data storage system 100. More details of the data sets, data management policies, and data management using data sets are discussed below.
[0031] In addition to the client machine 110 and the storage manager database 130, the storage manager 120 is further coupled to the storage server 160, the backup storage server 140, and the mirror storage server 150. It should be apparent that the storage servers 140, 150, and 160 are shown in Figure 1 as examples of storage servers for illustrative purpose only. Other embodiments of the data storage system may include more or fewer storage servers, each storage server managing a set of physical storage devices, such as magnetic disks, optical disks, tape drives, etc., in different configurations. Referring back to Figure 1 , the storage server 160 manages two disks 162A and 162B. The disks 162 A and 162B may hold various storage containers, either in whole or in part. A storage container is a logical unit for storing data, such as a file, a directory, a volume, a qtree (which is a subset of a volume, optionally associated with a space usage quota), a LUN, etc. For instance, the disk 162 A holds two qtrees 164A and 164B. Alternatively, a disk may hold a part of a storage container. For example, a disk may hold part of a volume, where the volume spans multiple disks.
[0032] The client machines 112 and 114 may access data in the disks managed by the storage server 160. Note that the data may be stored in storage containers of different forms and/or structures, such as qtrees, directories, volumes, etc. For example, the client machine 112 stores data in the qtree 164 A, while the client machine 114 stores data in the qtree 164B. To protect the data in the qtrees 164A and 164B, the storage server 160 may send the data in the qtrees 164 A and 164B to the backup storage server 140, which creates a backup copy of the data in the qtrees 164A and 164B in the disk 142. In addition, the backup filer 140 may further mirror the disk 142 onto the disk 152 managed by the mirror storage server 150. In some embodiments, the client machine 112 stores data in an internal disk (not shown) and have the internal disk backed up in the disk 142 managed by the backup storage server 140. Note that the above are merely one example of data protection policy topologies. It should be appreciated that many different data protection policy topologies may be implemented in the system 100.
[0033] One should appreciate that as the numbers of storage servers and storage devices grow in the data storage system 100, the workload as well as the complexity of data management increases. Thus, it becomes more difficult for the administrator to manually manage data in the system 100. In order to improve efficiency and to reduce the risk of making errors, the storage manager 120 automatically uses data sets to manage data in the data storage system 100 according to data management policies from the administrator. Details of data sets and the use of such are discussed below. Data Sets and Storage Objects
[0034] To efficiently manage data, the storage manager 120 uses entities called data sets to manage data in some embodiments. In one embodiment, a data set includes a set of storage objects associated with a data management policy. The data management policy is applied to the storage objects in the data set, directing how the administrator wishes the data in the storage objects to be managed as a single unit. In other words, a data set is a collection of storage objects grouped by virtue of the storage objects to be managed as a single unit. For example, a storage object may be defined to be a home directory of an employee in a company, which is a member of a data set of the home directories of all employees in the company. The storage objects may be referred to as members of the data set. Before going further into the details of the data set and the data management policy, details of a storage object are described below.
[0035] A storage object may include a logical representation of a collection of data in one or more storage containers and replicas of the collection of data (e.g., a mirrored copy of the data and/or a backed up copy of the data). Referring back to the above example, a logical representation of the storage object of the employee's home directory may be the employee's identification (ID), such as "jsmith." The collection of data may be created by users or the administrator of the data storage system 100. In some embodiments, the data of a storage object is stored in a storage container or a set of storage containers (e.g., the disk 162A) managed by one or more storage servers (such as the storage server 160) in the data storage system 100. For instance, the content of the employee's home directory in the above example may be stored in the qtree 164A in the disk 162 A. [0036] Some examples of storage objects include data in qtrees, volumes, directories, etc. These examples may also be referred to as elementary storage objects because they are logical representation of data in basic units of storage in the networked data storage system 100 in the context of data sets. Further, a storage object may be a reference to a collection of elementary storage objects, such as a reference to all volumes on a storage server.
[0037] Note that the physical implementation of the storage containers are independent of the logical representation of the data. Thus, the data is not managed by where the data is stored or how the data is accessed. Rather, the data is managed by the logical representation, which may be associated with the content of the data. For instance, the data may be a word processing document, "employee_review.doc" stored in the disk 162 A. hi the current example, the logical representation may be the name of the document (i.e., "employee_review.doc"). The storage manager 120 may manage the document by the name of the document (i.e., "employee_review.doc"), rather than by the storage container (i.e., the disk 162A in the current example) or the set of storage containers in which the document is stored. The physical implementation of the disk 162 A is independent of the name of the document (i.e., "employee_review.doc") stored in the disk 162A. As such, the storage object, as well as the data set having the storage object, are not bound to any actual physical location or storage container and may move to another location or another storage container over time. For example, the storage containers associated with a data set may become obsolete in performance over time and the storage manager 120 may move the data to a set of new storage containers, with or without alerting the administrator. Any movement of data sets may be substantially transparent from a client perspective in order to provide a separation of the logical representation from the physical location of the data. Thus, the storage manager 120 may re-balance resources (e.g., the disks 162 A, 162B, 142, and 152) in the data storage system 100 over time. In other words, the data set provides the virtualization of the physical storage containers used to hold the data.
[0038] In some embodiments, a data set includes user created data as well as meta data. Meta data may include information about the user created data. Examples of meta data include exported names, language settings, storage server association, LUN mappings, replication configuration, quotas, policies, consistency groups, etc. Meta data may be used to move or restore the corresponding data set. A complete data set backup is thus useful in handling disaster recovery scenarios. If the storage server (e.g., a filer) which hosts the primary storage set associated with the data set is destroyed, the data set may be reconstructed on another storage server using another storage set that is a replica of the primary storage set to provide client data access without manual configuration by the administrator. [0039]. Furthermore, a data set may have two types of membership of the storage objects which it contains, namely static and dynamic membership. Static members are low level storage objects (volumes, directories, LUNs), which could be managed by themselves. In other words, the elementary storage objects mentioned above are static members. Dynamic members are references to storage objects which may contain other storage objects. For example, an administrator could add a user's home directory to a data set as a static member. Alternatively, the administrator could realize that a given storage server is only used to hold home directories and add the storage server itself to a data set as a dynamic member. This saves the administrator work later because, as directories are created and destroyed on that storage server, the directories may be dynamically added to or removed from the data set. [0040] Beyond membership, a data set aggregates the status of its members according to some embodiments of the invention. There may be multiple status parameters an administrator may wish to track. Some exemplary status parameters include a data availability status, a data protection status, and a data protection policy conformance. The data availability status indicates whether all components of the data set are available for use. The data protection status indicates that all the data set members are being protected by a data protection policy. The data protection policy conformance status indicates that the data protection mechanisms (e.g., snapshots, backups, and mirrors) have been configured in accordance with the data protection policy. The storage manager 120 may roll up the corresponding statuses of members of the data set to derive or to generate a value of the corresponding status of the data set.
[0041] In one embodiment, a status parameter may have a number of levels, each associated with a value. To combine the corresponding status parameters of the members in the data set, the storage manager 120 may select the maximum value among all the corresponding statuses of the members. For example, a status can have six possible levels: normal, information, warning, error, critical, and emergency, where normal has a value of 1 , information has a value of 2, warning has a value of 3, and so forth. Suppose an exemplary data set has three members and, the corresponding status parameter values of which are 2, 3, and 5. Then the storage manager 120 may determine the corresponding status parameter value of the entire data set to be 5, which is the maximum value among the three values.
[0042] Combining individual object status parameter values into a single data set status parameter value allows the administrator to track a much smaller number of values. If the value of the status parameter of a data set is above or equal to a predetermined threshold, the administrator does not have to check the individual object status values. Conversely, if the data set status parameter is below the threshold, the storage manager 120 may alert the administrator to investigate the cause of the error. Breaking the status into multiple levels indicates to the administrator the nature of the error, giving the administrator a head start on resolving the issue. Operations on Data Sets
[0043] In some embodiments, the storage manager 120 may perform various operations on a data set, such as in response to administrator requests. Some examples of such operations include changing or modifying an associated data management policy of a data set, provisioning new members in a data set, listing members in a data set, adding members to a data set, deleting or removing members from a data set, migrating a data set to a different set of storage containers, generating performance views specific to a data set, generating storage usage reports of a data set, setting quota on a data set or individual members within a data set. One should appreciate that the above are merely illustrative examples of some of the operations the storage manager 120 may perform on data sets. The above list is not an exhaustive list of all of the possible operations. Data Management Policy
[0044] As mentioned above, the storage objects in the data set are associated with a data management policy. In general, a data management policy includes a description of the desired behavior of the associated data set. For instance, a data management policy may describe how the storage should be used and configured. One exemplary data management policy is a data protection policy, which describes how storage objects in a data set should be protected. Other examples of data management policies include a performance management policy, a provisioning policy, etc. Attributes associated with a data management policy are abstracted at the highest level possible, allowing implementation of underlying technology to change over time without adversely impacting the administrator. In other words, a layer of abstraction is provided between the administrator and the physical implementation of the storage containers in which the data is stored. The physical implementation may be modified without violating or impacting the data management policy. Thus, the administrator may be shielded from the idiosyncrasies of various underlying implementations that allow the data set to use newer technology as it becomes available in an automated fashion. Once the administrator has added the desired members to the data set, the storage manager 120 may automatically start applying the data management policy associated with the data set to all members in the data set. For instance, the storage manager 120 may configure storage objects in the data set, schedule backup of the storage objects in the data set, etc., according to the data management policy. If the administrator attempts to apply a different data management policy to a subset of storage object(s) in the data set, then the storage manager 120 may generate an error message to alert the administrator, who may respond by reassigning the subset of storage object(s) to another data set or by creating a new data set for the subset of storage object(s).
[0045J In some embodiments, a data management policy may be represented by a tree graph having a number of nodes and branches. Figure 3 A shows a tree graph of one embodiment of a data management policy. The tree graph 210 includes nodes 211-216 and branches 251-255. Each node represents a storage object and is coupled to another node via a branch, which describes the relationship between the two corresponding storage objects. For example, branch 253 is marked as a "backup" connection between nodes 212 and 214. Thus, storage object represented by node 214 is a backup copy of the storage object 212. The graph 210 represents how the administrator intends to manage data in the data storage system. [0046] In some embodiments, the data management policy describes attributes of the data in terms that the administrator is comfortable with, and leaves the configuration and choice of technologies to implement the policy to the storage manager 120. The attributes in the policies generally focus on desired data protection behaviors and configuration settings rather than on software technology and hardware choices. Although the choice of hardware may have some impact on the performance and cost of the storage, the physical equipment choices may be driven by a simple label scheme described in more detail below. Examples of the above-mentioned attributes include cost, performance, availability, reliability, type of data protection, capacity related actions, security settings, capabilities, etc.
[0047] In some embodiments, the storage containers in the system 100
(may be collectively referred to as a resource pool) are labeled with user- defined strings, such as "tier-1," "tier-2," and "tier-3." Such labels may be specified as a part of a provisioning policy to limit physical storage resources to a select data set. When provisioning storage, a data access name may be specified in addition to a policy for the desired behavior of the resulting data set. The data access name is used to configure the necessary export configurations (e.g., NFS, CIFS, ISCSI, FCP, etc.).
[0048] Note that the data management policy associated with a data set may be explicitly changed by the administrator. For example, in a tiered storage system, as the data in tier-1 storage ages, the relevance or importance of the data may diminish, and thus, the data may be migrated to tier-2 storage from the tier-1 storage. In some embodiments, the administrator may determine which data sets are candidates for migration and associate such data sets with a policy created for data in tier-2 storage.
[0049] In some embodiments, once the administrator has added the desired members to the data set, the storage manager 120 automatically starts applying the data management policy associated with the data set to all members in the data set. For instance, the storage manager 120 may configure storage objects in the data set, schedule backup of the storage objects in the data set, etc., according to the data management policy. In response to a change in the data set and/or the data management policy, the storage manager 120 automatically checks the data set to determine if the data set still conforms to the policy and if not, the storage manager 120 may re-apply the policy to the data set to make the data set conform to the policy. For example, when the administrator adds a new member to a data set, the storage manager 120 automatically applies the data management policy associated with the data set to the new member. In another example, when the administrator alters a data management policy associated with a data set, the storage manager 120 automatically identifies the data set associated with the altered data management policy. To identify the affected data sets, the storage manager 120 may access the storage manager database 130 to find the data sets associated to the altered policy. Then the storage manager 120 automatically checks to determine if the storage objects in the data set still conform to the altered data management policy. If not, the storage manager 120 automatically applies the altered policy to the storage objects in the data set. For instance, the storage manager 120 may automatically re-configure the storage servers (e.g., storage servers 140, 150, 160) and/or the storage devices (e.g., disks 142, 152, 162A, 162B), as well as the relationships between the storage servers according to the altered policy.
[0050] In some embodiments, the storage manager 120 may also give the administrator a preview of what actions the storage manager 120 is configured to take to make the data set conform to the data management policy, so that the administrator can confirm the actions are correct before the actions are taken. In some embodiments, the storage manager 120 may find certain situations unresolvable and report these to the administrator for manual resolution.
[0051] Various operations on data management policies are available.
Some examples include policy administration and cloning. For policy administration, policies may be modified according to disaster recovery requirements or storage attributes, subject to permission allowed via the role based access control mechanism. For cloning, a new copy of a policy with identical attributes may be generated using the cloning operation. Advantages of Data Management using Data Sets
[0052] Using data sets and data management policies as described herein can vastly reduce the workload of storage administrators. There are at least two ways in which using data sets as described herein help reduce manual administrative work and ensure a more reliable policy implementation. [0053] First, using data sets can reduce work by reducing the number of objects a storage administrator has to monitor. While a data center may have hundreds of thousands of directories, these may be classified into a much smaller number of collections and be managed by a smaller number of policies. For example, every user in a large enterprise may have a home directory, but these all need to be managed the same way. Thus, these home directories can be collected into a single data set associated with a data protection policy. This means that no matter how large the enterprise grows, there is no additional day- to-day management burden for the new users. When a new home directory is created, it is added, manually or automatically, to a data set containing other home directories, and the administrator may manage the data set as a single unit from then on, instead of managing thousands of home directories individually.
[0054] The second way a data set reduces work is by automating implementation of and changes to data management policies. For instance, suppose a data center originally decided user home directories should be backed up, but the secondary storage holding the backups did not need further protection. Further, suppose the administrator subsequently decided this was not adequate and that home directory backups should be mirrored to off-site storage. In a conventional environment, this would be a huge task, including, for example, tracking down all the secondary volumes which have ever held home directory backups, provisioning appropriate mirrored storage, configuring all the mirror processes, and monitoring that the mirror operations have been succeeding, etc. Using a data set associated with a data management policy, the administrator only has to modify the data management policy to add a mirroring stage. The storage manager 120 may then perform the tedious task of finding all the volumes which now require mirrors, provision the mirrored storage, and establish the relationships, etc. On an ongoing basis, the storage manager 120 may monitor that the mirrors are working and report a data set wide error status if not.
[0055] With the above introduction to the concepts of data sets, storage objects, data management policies according to some embodiments of the invention, more details of some embodiments of the storage manager 120 and the process to make data sets conform to data management policies are described below. Storage Manager
[0056] One embodiment of the storage manager 120 may be implemented on a server as illustrated in Figure 2. Referring to Figure 2, the storage manager 200 includes a processor 222, a memory 224, a network interface 226, and a storage adaptor 228, which are coupled to each other via a bus system 230. The bus system 230 may include one or more busses and/or interconnects. The storage manager 200 communicates with a network (e.g., the Internet) via the network interface 226, which can be an Ethernet adaptor, fiber channel adaptor, etc. The network interface 226 may be coupled to a public network, a private network, or a combination of both in order to communicate with a client machine (such as the client machine 110 in Figure 1) usable by an administrator of the data storage system. [0057] In one embodiment, the processor 222 reads instructions from the memory 224 and executes the instructions. The memory 224 may include any of various types of memory devices, such as, for example, random access memory (RAM), read-only memory (ROM), flash memory, one or more mass storage devices (e.g., disks), etc. The memory 224 stores instructions of an operating system 230. The processor 222 may retrieve the instructions from the memory 224 to run the operating system 230. The storage manager 200 interfaces with one or more storage servers (e.g., the storage servers 140, 150, 160 in Figure 1) via the storage adaptor 228, which may include a small computer system interface (SCSI) adaptor, fiber channel adaptor, etc. Conformance Checker and Conformance Engine
[0058] Figure 4 illustrates a functional diagram of one embodiment of a storage manager 300, which can represent storage manager 120 in Figure 1. The storage manager 300 includes an API 330, a conformance checker 310, and a conformance engine 320. The API 330 is operatively coupled to the conformance checker 310, which is further operatively coupled to the conformance engine 320. The conformance checker 310 includes a translator 312. The conformance engine 320 includes a storage adaptor 322. The API 330 is communicably coupled to a GUI 340, which may be provided by a client machine (e.g., the client machine 110 in Figure 1). The storage manager 300 is coupled to a database 350, which stores representations of data sets and data management policies, which are also referred to as objects. In general, the conformance checker 310 checks whether the storage objects of a data set conforms to a data management policy associated with the data set. To conform to the data management policy, the storage objects of the data set has to have relationships with each other as specified by the data management policy. In other words, the data set violates the data management policy if the storage objects are not related to each other as specified in the data management policy. For example, a data set includes three volumes, namely, volume A, volume B, and volume C. The data set is associated with a data management policy, which is a protection policy that specifies some backup and mirroring relationships between the volumes. Specifically, the protection policy specifies that volume A should be backed up on volume B and volume B should be mirrored to volume C. Then the data set conforms to the protection policy if volume A is backed up on volume B and volume B is mirrored to volume C. On the other hand, the data set violates the protection policy if volume A is not backed up on volume B, and/or volume B is not mirrored to volume C. Of course, the data management policy (which, in this case, is the protection policy) may specify more details on the relationships between the storage objects (e.g., the frequencies of backup and mirroring). More details on how the conformance checker 310 determines if a data set conforms or violates a data management policy are described below. [0059] In some embodiments, the GUI 340 receives administrator inputs 301 on data sets and/or data management policies. The administrator inputs 301 may include, for example, a request to apply a data management policy to a data set, a change to an existing data management policy and/or an existing data set, to request to create a new data management policy and/or a new data set, etc. The administrator inputs 301 are typically written in human readable terms, such as words, phrases, etc., in a structured, machine-readable format. The API 330 receives the administrator inputs 301 from the GUI 340 and forwards the inputs 305 to the conformance checker 310. [0060] The translator 312 in the conformance checker 310 translates the administrator inputs 301 into machine-readable terms. In some embodiments, a client program running on a client machine (e.g., the client machine 110 in Figure 1) invokes the API 330, which may construct an in-memory representation of the data set and its associated data protection policy, which are commonly referred to as objects. Note that these objects are software entities distinct from the storage objects described above. Then the API 330 invokes the main entry point in the conformance checker 310 with pointers to the objects corresponding to the data set and policy. The conformance checker 310 then compares the state of the data set against the data management policy to determine if the data set conforms to the data management policy. For example, the conformance checker 310 iterates through the connections of a tree graph representing the policy as applied to the data set. Referring back to Figure 3 A, the conformance checker 310 iterates through the connections represented by branches 251 -255. For instance, the conformance checker 310 may iterate through the tree graph 210 from branch 251 to branch 252, then to branches 253, 254, and 255. Alternatively, the conformance checker 310 may iterate through the tree graph 210 from branch 251 to branches 253 and 254, and then to branch 252, and finally to branch 255. For each connection, the conformance checker 310 compares the states of the storage objects represented by the nodes 211 -216 by making various determinations. A flowchart showing the determinations made by the conformance checker 310 according to one embodiment of the invention is shown in Figures 3B and 3C. [0061] Referring to Figure 3B, the conformance checker 310 determines if each member of the data set corresponding to a source node of the tree graph is protected by a relationship between storage servers according to the policy (block 261). For instance, the conformance checker 310 may look into a configuration file of the data storage system to find out the relationships between the storage servers managing the storage objects. For example, the policy may require volume A to be mirrored to volume B, where volume A is on storage server A and volume B is on storage server B. Then the conformance checker 310 may look into the configuration file of the data storage system to determine if storage server A mirrors volume A onto volume B on storage server B. In other words, the conformance checker 310 may check whether there is a mirroring relationship between storage server A and storage server B. If not, then the data set is not in conformance. Otherwise, the conformance checker 310 continues at block 262 to determine if there are any source nodes protected by relationships that do not terminate at a destination node of the tree graph. If there are, then the data set is not in conformance. Otherwise, the conformance checker 310 determines if there are any destination nodes that are end points for relationships not corresponding to the source node (block 263). If there are, then the data set is not in conformance. Next, the conformance checker 310 determines if there is a missing physical relationship in the tree graph (block 264). If there is, then the data set is not in conformance. Otherwise, the process continues in Figure 3C. [0062] Referring to Figure 3C, the conformance checker 310 determines if there is an existing storage object already in the data set to hold a copy of the source node (block 265). If not, the data set is not in conformance. Otherwise, the conformance checker 310 determines if the storage object is large enough to hold the data (block 266). If not, the data set is not in conformance. Next, the conformance checker 310 determines if there is an appropriate destination object (block 267). If so, the data set is in conformance. Otherwise, the conformance checker 310 determines if an appropriate destination object can be constructed (block 268). If so, the data set is in conformance. Otherwise, the data set is not in conformance. [0063] When the conformance checker 310 determines that the data set is not in conformance with the data management policy, the conformance checker 310 generates a task or a set of tasks, which is for making the data set conform to the data management policy. A task includes one or more specific machine-executable or machine-readable instructions to cause a storage server to perform a specific function, such as to create a storage object, to create a relationship between a set of storage objects, to delete a storage object, etc. For example, when the conformance checker 310 determines that the data set is not in conformance with the data management policy because there is no existing storage object in the data set to hold a source node, the conformance checker 310 may generate a task including instructions to provision storage in order to create a new storage object. The task may further include the parameters of what needs to be done in order to make the data set conform to its policy. Some of the above questions may lead to situations unresolvable by the conformance checker 310. For example, if the data set does not contain enough storage objects for the destination node of a connection, the conformance checker 310 cannot resolve this issue unless the administrator supplies more storage objects. The tasks corresponding to these situations are considered unresolvable. Other tasks are resolvable, meaning that the conformance checker 310 has enough information to decide on the appropriate corrective action. The conformance checker 310 puts the tasks generated into a task list.
[0064] In some embodiments, the translator 312 translates the task list into human readable description 303B, which is sent to the API 330 from the conformance checker 310. For example, each task is associated with a specific piece of code to translate the task into a corresponding human readable description. The API 330 forwards the human readable description 303A of the task list to the GUI 340, which outputs the human readable description 303A of the task list to the administrator. For example, the GUI 340 may output the human readable description 303 A of the task list in a screen display. The administrator may verify the human readable description 303A of the task list and if correct, the administrator may confirm that the human readable description 303A of the task list is correct via the GUI 340. These descriptions allow a user to see a "dry run" of the conformance checker 310. The administrator may accept the dry run results or cancel the operation. These dry run results are why it is useful to send modified copies of either the data set or policy objects to the conformance checker 310. The administrator may provisionally make changes to these objects and then invoke the conformance checker 310. The dry run results indicate what would have to be done should the administrator commit the changes to the data storage system. Since some changes may be relatively disruptive, allowing the administrator to see the impact of the changes before implementing the changes gives the administrator a safety net against making such disruptive changes. [0065] Upon receipt of confirmation from the administrator, the conformance checker 310 may forward the machine-readable task list 307 to the conformance engine 320. The conformance engine 320 processes tasks in the list 307 in sequence, for example, first-in- first-out (FIFO), sending the appropriate commands or instructions 309 to storage servers (e.g., the storage servers 140, 150, 160 in Figure 1) to re-configure the storage system to comply with the policy. Note that the conformance engine 320 is not making decisions based on the policy, rather, the conformance engine 320 is simply processing the tasks on behalf of the conformance checker 310. As such, the conformance engine 320 does not change the sequence of the tasks in the list 307. [0066] In some embodiments, the conformance engine 320 includes a network adaptor 322 to interface with one or more storage servers in the data storage system, such as storage servers 140, 150, and 160 in Figure 1. The storage servers are managed by the storage manager 300. The network adaptor 322 may issue the instructions in the task list 307 to the relevant storage servers to cause the storage servers to perform functions according to the instructions in order to make the data set to conform to the data' management policy. For example, the instructions from the storage manager 300 may cause a storage server to schedule data backup according to the data management policy, to reconfigure some storage objects managed by the storage server according to the data management policy, to re-allocate storage devices according to the data management policy, etc. When the tasks have completed execution, the storage manager 300 has made the data set conform to the data management policy.
Advantages of Using Conformance Checker and Conformance Engine [0067] As discussed above, storage administrators conventionally describe data management policies in some non-machine readable form (e.g., in English text) and then manually check the storage system configuration against the policy to see if there are any issues. Using the storage manager 300 described above to verify that policy is being implemented correctly has many benefits over the conventional approach.
[0068] First, the storage manager 300 described above provides great convenience to the administrator. Since the conformance checker 310 of the storage manager 300 automatically checks for conformance, the data sets in the data storage system can be checked faster and more frequently. This may help to detect issues much sooner than having the administrator to manually check the data sets. Further, if the conformance checker 310 detects an issue, the administrator does not have to manually enter commands to resolve the situation. Rather, the conformance checker 310 generates a list of tasks, which may be executed to make the data sets conform to the data management policy. Manually entering commands or instructions is tedious and error prone. Thus, the storage manager 300 helps to reduce risk in making errors when changing a data management policy.
[0069] Moreover, splitting the conformance process into two stages, supported by the conformance checker 310 and the conformance engine 320 respectively, allows the administrator to find out what tasks would be executed before any expensive or irreversible actions are taken. The administrator may cancel tasks before they are executed, should the administrator decide not to accept the tasks recommended by the conformance checker 310. Further, should the administrator decide to change a data protection policy, the conformance checker 310 may identify all the data sets using that policy and deduce the operations needed to bring the data sets into conformance. As mentioned above, this may be considered as a dry run of the change in the data management policy. Previewing the dry run allows the administrator to decide whether such a change is too disruptive or expensive before implementing the change in the data management policy.
Operations to Make Data Sets Conform to Data Management Policies [0070] Figure 5 illustrates a flow diagram of one embodiment of a process to manage data in a data storage system using data sets. The process is performed by processing logic that comprises hardware (e.g., circuitry, dedicated logic, etc.), software (such as is run on a general-purpose computer system or a dedicated machine, such as the storage manager 120 in Figure 1), firmware, or any combination of these.
[0071] Referring to Figure 5, processing logic receives input from an administrator of the data storage system (processing block 410). Processing logic then checks if there is a request to apply a data management policy to a data set or change to at least one of the data management policy and the data set (processing block 420). If there is no request or change, then processing logic transitions to processing block 490 and the process ends. Otherwise, processing logic transitions to processing block 430.
[0072] In some embodiments, processing logic compares a state of the data set against the data management policy (processing block 430). Then processing logic checks if the data set conforms to the policy (processing block 440). If so, then processing logic transitions to processing block 490 and the process ends. Otherwise, processing logic transitions to processing block 450. [0073] Processing logic then translates the input from the administrator into instructions executable by storage servers (processing block 450). In some embodiments, these instructions are translated back into a human readable task list and output to the administrator for verification. The administrator may accept or reject the task list. If the administrator accepts the task list, processing logic may issue the instructions to the storage servers to cause the storage servers to take actions that would bring the storage objects into conformance with the policy (processing block 460). Then processing logic transitions to processing block 490 and the process ends. Details of some embodiments of the above operations have been described above. User Interface
[0074] Figures 6A-6C illustrate one embodiment of a series of displays of GUI to enable an administrator to create a new data set. Referring to Figure 6A, a GUI 610 for creating new data sets is shown. The GUI 610 may be displayed via a window created by the client machine 110 in Figure 1. The GUI 610 includes a field 612 for entry of a name of the data set and a field 614 for entry of the description of the data set. In the current example, an administrator has input "Accounting Data" as the name of a new data set. In some embodiments, the GUI 600 includes additional fields for entry of other attributes or information of the new data set, such as owner, contact, timezone. [0075] Figure 6B illustrates one embodiment of a display of a GUI used in creating the new data set. The GUI 620 includes a list 622 of available physical resources (e.g., available directories) to be added into the new data set. The administrator may select from the list 622 of physical resources by clicking onto the particular resource. The GUI 620 further includes a set of user interface controls 624 to allow the administrator to add the selected physical resources to the new data set. The GUI 620 includes a field 626 to display the selected physical resources in the data set. [0076] Figure 6C illustrates one embodiment of a display of a GUI used in creating the new data set. The GUI 630 shows a summary of the new data set created using the GUI 610 and 620 in Figures 6A and 6B. The administrator may verify the newly created data set using the GUI 630 and if desired, may return to the GUI 610 and/or 620, to make changes using the user interface control 632. The administrator may confirm the creation of the new data set by actuating the user interface control 634. Finally, the administrator may cancel the creation of the new data set by actuating the user interface control 636.
[0077] Figure 6D illustrates one embodiment of a display of a GUI for applying a data management policy to a data set. The GUI 640 includes a field 642 displaying data sets created, a field 644 displaying data management policies, a field 646 to display details of a data management policy selected. An administrator may click on a data set in the field 642 to select the data set. For instance, the data set "NY Payroll" is selected in the example shown in Figure 6D. The GUI 640 further includes user interface controls 648 to allow the administrator to add, edit, or delete a data set. The administrator may select one of the data management policies in the field 644 to apply to the selected data set by first clicking on the desired data management policy and the desired data set to select them, and then actuating the "Apply" button 649 to apply the selected policy to the selected data set. In the current example, the administrator has selected the policy of "Backed up, then mirrored" in the field 644, and details of this policy is displayed in the field 646 in graphics, text, or a combination of both. Process to Manage Data
[0078] Figure 7 illustrates a flow diagram of one embodiment of a process to manage data in a data storage system using data sets. The process is performed by processing logic that comprises hardware (e.g., circuitry, dedicated logic, etc.), software (such as is run on a general-purpose computer system or a dedicated machine, such as the storage manager 120 in Figure 1), or a combination of both.
[0079] Referring to Figure 7, processing logic creates a GUI to receive inputs from an administrator of the data storage system (processing block 710). Processing logic then receives administrator inputs on data sets and/or data management policies (processing block 720). For instance, the administrator may provide information via the GUI to define data sets (e.g., names and description of the data set, storage objects to be included in the data set, etc.) and to define data management policies (e.g., a data protection policy). The processing logic organizes storage objects specified by the administrator into data sets based on administrator inputs (processing block 730). Processing logic may store a list of the storage objects in each data set in a persistent store (processing logic 740). Then processing logic manages each data set as a single unit by applying a corresponding data management policy to the data set (processing block 750). For example, processing logic may apply the data manage policy by configuring the storage objects, scheduling backups of the storage objects, etc., according to the data management policy. [0080] Further, processing logic may determine a value of a status of each data set based on the corresponding status of each storage object in the respective data set (processing block 770). Details of data sets, data management policies, and management of data using such have been described in detail above.
[0081] Some portions of the preceding detailed description are presented in terms of algorithms and symbolic representations of operations on data bits within a computer memory. These algorithmic descriptions and representations are the tools used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. An algorithm is here, and generally, conceived to be a self-consistent sequence of operations leading to a desired result. The operations are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.
[0082] It should be kept in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise as apparent from the above discussion, it is appreciated that throughout the description, discussions utilizing terms such as "processing" or "computing" or "calculating" or "determining" or "displaying" or the like, refer to the action and processes of a computer system, or similar electronic computing device, that manipulates and transforms data represented as physical (electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission or display devices.
[0083] The present invention also relates to an apparatus for performing the operations described herein. This apparatus may be specially constructed for the required purpose, or it may comprise a general-purpose computer selectively activated or reconfigured by a computer program stored in the computer. Such a computer program may be stored in a machine-accessible medium, also referred to as a computer-readable medium, such as, but is not limited to, any type of disk including floppy disks, optical disks, CD-ROMs, and magnetic-optical disks, read-only memories (ROMs), random access memories (RAMs), EPROMs, EEPROMs, magnetic or optical cards, or any type of media suitable for storing electronic instructions, and each coupled to a computer system bus.
[0084] The processes and displays presented herein are not inherently related to any particular computer or other apparatus. Various general-purpose systems may be used with programs in accordance with the teachings herein, or it may prove convenient to construct a more specialized apparatus to perform the operations described. The required structure for a variety of these systems will be evident from the description below. In addition, the present invention is not described with reference to any particular programming language. It will be appreciated that a variety of programming languages may be used to implement the teachings of the invention as described herein. [0085] The foregoing discussion merely describes some exemplary embodiments of the present invention. One skilled in the art will readily recognize from such discussion, the accompanying drawings and the claims that various modifications can be made without departing from the scope of the invention.

Claims

CLAIMSWhat is claimed is:
1. A storage manager comprising: a conformance checker to compare a state of a data set against a data management policy associated with the data set to determine if the data set conforms to the data management policy; and a conformance engine coupled to the conformance checker to make the data set conform to the data management policy if the conformance checker determines that the data set violates the data management policy.
2. The storage manager of claim 1 , further comprising: an application programming interface (API) to interface with a client machine to receive input from an administrator, wherein the conformance checker compares the state of the data set against the data management policy in response to the input.
3. The storage manager of claim 2, wherein the input includes a request from the administrator to apply the data management policy to the data set.
4. The storage manager of claim 2, wherein the input includes a change to at least one of the data set and the data management policy.
5. The storage manager of claim 2, wherein the conformance checker comprises a translator to translate the input from the administrator into instructions executable by a storage server to make the data set conform to the data management policy.
6. The storage manager of claim 5, wherein the conformance engine comprises a storage adaptor to couple to the storage server and the conformance engine is operable to issue the instructions to the storage server via the storage adaptor.
7. The storage manager of claim 6, wherein the data set includes a plurality of storage objects associated with the data management policy, wherein each of the plurality of storage objects includes a representation of data stored in storage containers, wherein the storage containers are independent of the representation, wherein the state of the data set includes relationships between the plurality of storage objects under the data management policy.
8. A data storage system comprising the storage manager of claim 7, the data storage system further comprising the storage server.
9. The data storage system of claim 8, further comprising: a client machine coupled to the API to provide a graphical user interface (GUI) to receive the input from the administrator.
10. A machine- implemented method comprising: comparing a state of a data set against a data management policy associated with the data set to determine if the data set conforms to the data management policy; and causing a storage server to execute a task to make the data set conform to the data management policy if the data set violates the data management policy.
11. The method of claim 10, further comprising: receiving input from an administrator, wherein the comparing the state of the data set against the data management policy is performed in response to the input.
12. The method of claim 11 , wherein the input includes a request from the administrator to apply the data management policy to the data set.
13. The method of claim 11, wherein the input includes a change to at least one of the data set and the data management policy.
14. The method of claim 11, further comprising: translating the input from the administrator into instructions executable by the storage server to carry out the task.
15. The method of claim 14, wherein causing the storage server to execute the task comprises: issuing the instructions to the storage server.
16. The method of claim 10, wherein the data set includes a plurality of storage objects associated with the data management policy, wherein each of the plurality of storage objects includes a representation of data stored in storage containers, wherein the storage containers are independent of the representation, and wherein the state of the data set includes relationships between the plurality of storage objects under the data management policy.
17. The method of claim 10, wherein said comparing is performed periodically.
18. A machine-accessible medium that stores instructions which, if executed by a processor, will cause the processor to perform operations comprising: generating a plurality of tasks to apply a data management policy to a data set including a plurality of storage objects in response to a request from an administrator; outputting information identifying the plurality of tasks in a human- readable form to the administrator for verification; and causing a storage server to execute the plurality of tasks in response to receiving a confirmation from the administrator.
19. The machine-accessible medium of claim 18, wherein the operations further comprise: comparing a state of the data set against the data management policy in response to the request.
20. The machine-accessible medium of claim 19, wherein the request includes a change to at least one of the data set and the data management policy.
21. The machine-accessible medium of claim 19, wherein the operations further comprise: generating a plurality of instructions executable by the storage server to carry out the plurality of tasks.
22. The machine-accessible medium of claim 21, wherein causing the storage server to execute the plurality of tasks comprises: issuing the plurality of instructions to the storage server.
23. The machine-accessible medium of claim 22, wherein each of the plurality of storage objects includes a representation of data stored in storage containers, wherein the storage containers are independent of the representation, and wherein the state of the data set includes relationships between the plurality of storage objects under the data management policy.
24. A computer-implemented method comprising: allowing an administrator of a data storage system to define a data set including a plurality of storage objects and to associate the data set with a data management policy, wherein each of the plurality of storage objects includes a logical representation of data stored in a plurality of storage containers managed by a plurality of storage servers in the data storage system, wherein a physical implementation of the plurality of storage containers are independent of the logical representation; and using a storage manager to manage the data set as a single unit according to the data management policy.
25. The method of claim 24, further comprising: storing a list of the plurality of storage objects in a persistent store accessible by the storage manager.
26. The method of claim 24, further comprising: creating a user interface to receive input from the administrator, the input including information about the data management policy, wherein the data management policy includes a data protection policy.
27. The method of claim 26, wherein managing the data set as a single unit comprises: applying the data protection policy to each of the plurality of storage objects; and in response to a change in the data protection policy, applying the change to each of the plurality of storage objects.
28. The method of claim 27, wherein the data protection policy includes a description of a structure of protection relationships between the replicas of the collection of data and the collection of data, and property settings of each of a plurality of components of the structure.
29. The method of claim 28, wherein the protection relationships include backup and mirror relationships.
30. The method of claim 27, wherein applying the data protection policy comprises: backing up a first subset of the plurality of storage objects according to the data protection policy; and mirroring a second subset of the plurality of storage objects according to the data protection policy.
31. The method of claim 24, wherein a first one of the plurality of storage objects is an elementary storage object.
32. The method of claim 31, wherein a second one of the plurality of storage objects is a reference to the elementary storage object.
33. The method of claim 24, further comprising: determining a value of a status parameter of each of the plurality of storage objects; and deriving a value of a corresponding status parameter of the data set from the value of the status parameter of each of the plurality of storage objects.
34. The method of claim 33, wherein the deriving the value of the corresponding status parameter of the data set comprises: selecting a maximum value among the value of the status parameter of each of the plurality of storage objects to be the value of the corresponding status parameter of the data set.
35. The method of claim 24, further comprising: providing a layer of abstraction to shield the administrator from the physical implementation of the storage objects; and modifying the physical implementation of the storage objects without violating the data management policy.
36. An apparatus comprising: a user interface module to create a user interface to allow an administrator of a data storage system to define a data set having a plurality of storage objects and to associate the data set with a data management policy, each of the plurality of storage objects includes a logical representation of data stored in a plurality of storage containers managed by a plurality of storage servers in the data storage system, wherein a physical implementation of the plurality of storage containers is independent of the logical representation; and a storage manager to manage the data set as a single unit.
37. The apparatus of claim 36, further comprising: an application programming interface (API) to interface the user interface with the storage manager.
38. The apparatus of claim 36, further comprising: a persistent store coupled to the storage manager to store a list of the plurality of storage objects.
39. The apparatus of claim 36, wherein the user interface includes a graphical user interface (GUI) to display a plurality of data management policies, a plurality of data sets, and a first plurality of user interface controls to allow the administrator to apply one of the plurality of data management policies to one of the plurality of data sets.
40. The apparatus of claim 39, wherein the GUI further includes: a second plurality of user interface controls to allow the administrator to add data sets and to delete data sets; and a third plurality of user interface controls to allow the administrator to define a data management policy and to apply the defined data management policy to the plurality of data sets.
41. The apparatus of claim 39, wherein the GUI further includes: a status display to output a status of each of the plurality of data sets based on a status value of each of the plurality of storage objects in a corresponding data set.
42. The apparatus of claim 36, wherein the storage manager manages the data set as a single unit by applying the data management policy to each of the plurality of storage objects and, in response to a change in the data management policy, applying the change to each of the plurality of storage objects.
43. A data storage system comprising: a plurality of storage servers; a client machine operable to provide a user interface to allow an administrator of the data storage system to define a data set having a plurality of storage objects, to associate the data set with a data management policy, and to monitor the data set as a single unit, wherein each of the plurality of storage objects includes a logical representation of a collection of data and replicas of the collection of data, the collection of data stored in a plurality of storage containers managed by the plurality of storage servers, wherein the plurality of storage containers are independent of the logical representation.
44. The data storage system of claim 43, further comprising: a storage manager coupled to the plurality of storage servers and the client machine, to manage the data set as a single unit according to the data management policy by applying the data management policy to each of the plurality of storage objects and, in response to a change in the data management policy, applying the change to each of the plurality of storage objects, wherein the storage manager includes an application programming interface (API) to interface the user interface with the storage manager.
45. The data storage system of claim 44, further comprising: a persistent store coupled to the storage manager to store a list of the plurality of storage objects.
46. The data storage system of claim 43, wherein the user interface includes a graphical user interface (GUI) to display a plurality of data management policies, a plurality of data sets, and a first plurality of user interface controls to allow the administrator to apply one of the plurality of data management policies to one or more of the plurality of data sets.
47. The data storage system of claim 46, wherein the GUI further comprises: a second plurality of user interface controls to allow the administrator to add data sets and to delete data sets; and a third plurality of user interface controls to allow the administrator to define a data management policy and to apply the defined data management policy to the plurality of data sets.
48. The data storage system of claim 46, wherein the GUI further comprises: a status display to output a status of each of the plurality of data sets based on a status value of each of the plurality of storage objects in a corresponding data set.
49. A machine-accessible medium that stores instructions which, if executed by a processor, will cause the processor to perform operations comprising: organizing a plurality of storage objects in a network data storage system into a data set in response to a request from an administrator, wherein each of the plurality of storage objects includes a logical representation of a collection of data stored in a storage container, and wherein the logical representation is independent of the storage container; associating the data set with a data management policy according to the request; and managing the data set as a single unit according to the data management policy.
50. The machine-accessible medium of claim 48, wherein the operations further comprise: storing a list of the plurality of storage objects in a persistent store accessible by a storage manager.
51. The machine-accessible medium of claim 48, wherein the operations further comprise: creating a user interface to receive the request from the administrator, the request including information about the data management policy, wherein the data management policy includes a data protection policy.
52. The machine-accessible medium of claim 50, wherein managing the data set as a single unit comprises: applying the data protection policy to each of the plurality of storage objects; and in response to a change in the data protection policy, applying the change to each of the plurality of storage objects.
53. The machine-accessible medium of claim 52, wherein the data protection policy includes a description of a structure of protection relationships between the replicas of the collection of data and the collection of data, and property settings of each of a plurality of components of the structure.
54. The machine-accessible medium of claim 53, wherein the protection relationships include backup and mirror relationships.
55. The machine-accessible medium of claim 52, wherein applying the data protection policy comprises: backing up a first subset of the plurality of storage objects according to the data protection policy; and mirroring a second subset of the plurality of storage objects according to the data protection policy.
56. The machine-accessible medium of claim 55, wherein mirroring a second subset of the plurality of storage objects according to the data protection policy comprises: identifying a first plurality of storage containers in which data of the second subset of the plurality of storage objects is stored; provisioning a second plurality of storage containers for a mirror image of the second subset of the plurality of storage objects; establishing a plurality of mirror relationships between the first plurality of storage containers and the second plurality of storage containers.
57. The machine-accessible medium of claim 56, wherein the operations further comprise: reporting a data set wide error if one of the plurality of mirror relationships fails.
58. The machine-accessible medium of claim 49, wherein the operations further comprise: determining a value of a status parameter of the data set based on a corresponding status parameter of each of the plurality of storage objects.
EP08725916A 2007-02-22 2008-02-22 Data management in a data storage system using data sets Withdrawn EP2126701A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US11/710,190 US7953928B2 (en) 2007-02-22 2007-02-22 Apparatus and a method to make data sets conform to data management policies
US11/710,202 US20080208926A1 (en) 2007-02-22 2007-02-22 Data management in a data storage system using data sets
PCT/US2008/002326 WO2008103429A1 (en) 2007-02-22 2008-02-22 Data management in a data storage system using data sets

Publications (1)

Publication Number Publication Date
EP2126701A1 true EP2126701A1 (en) 2009-12-02

Family

ID=39540362

Family Applications (1)

Application Number Title Priority Date Filing Date
EP08725916A Withdrawn EP2126701A1 (en) 2007-02-22 2008-02-22 Data management in a data storage system using data sets

Country Status (3)

Country Link
EP (1) EP2126701A1 (en)
JP (1) JP2010519646A (en)
WO (1) WO2008103429A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8438247B1 (en) * 2010-12-21 2013-05-07 Amazon Technologies, Inc. Techniques for capturing data sets
US20120254118A1 (en) * 2011-03-31 2012-10-04 Microsoft Corporation Recovery of tenant data across tenant moves
US8775774B2 (en) * 2011-08-26 2014-07-08 Vmware, Inc. Management system and methods for object storage system

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020188592A1 (en) * 2001-06-11 2002-12-12 Storage Technology Corporation Outboard data storage management system and method
EP1430399A1 (en) * 2001-08-31 2004-06-23 Arkivio, Inc. Techniques for storing data based upon storage policies
US7287047B2 (en) * 2001-11-23 2007-10-23 Commvault Systems, Inc. Selective data replication system and method
JP4196579B2 (en) * 2002-04-10 2008-12-17 株式会社日立製作所 Storage operation management method and system
JP2004303190A (en) * 2003-03-20 2004-10-28 Hitachi Ltd Program, information processor, method for controlling information processor, and recording medium
WO2005001646A2 (en) * 2003-06-25 2005-01-06 Arkivio, Inc. Techniques for performing policy automated operations
US7581224B2 (en) * 2003-07-10 2009-08-25 Hewlett-Packard Development Company, L.P. Systems and methods for monitoring resource utilization and application performance
US7734561B2 (en) * 2003-12-15 2010-06-08 International Business Machines Corporation System and method for providing autonomic management of a networked system using an action-centric approach
US7397770B2 (en) * 2004-02-20 2008-07-08 International Business Machines Corporation Checking and repairing a network configuration
US7818608B2 (en) * 2005-02-18 2010-10-19 Microsoft Corporation System and method for using a file system to automatically backup a file as a generational file

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO2008103429A1 *

Also Published As

Publication number Publication date
WO2008103429A1 (en) 2008-08-28
JP2010519646A (en) 2010-06-03

Similar Documents

Publication Publication Date Title
US7953928B2 (en) Apparatus and a method to make data sets conform to data management policies
US11474896B2 (en) Monitoring, diagnosing, and repairing a management database in a data storage management system
US11238173B2 (en) Automated intelligent provisioning of data storage resources in response to user requests in a data storage management system
US10942894B2 (en) Operation readiness checking and reporting
US20200356443A1 (en) Single snapshot for multiple applications
US20080208926A1 (en) Data management in a data storage system using data sets
US10628267B2 (en) Client managed data backup process within an enterprise information management system
US20180373597A1 (en) Live browsing of backed up data residing on cloned disks
US9632874B2 (en) Database application backup in single snapshot for multiple applications
US20150212894A1 (en) Restoring application data from a single snapshot for multiple applications
US20150212895A1 (en) Generating mapping information for single snapshot for multiple applications
US8364640B1 (en) System and method for restore of backup data
US11249863B2 (en) Backup-based media agent configuration
US8321867B1 (en) Request processing for stateless conformance engine
US11615147B2 (en) Mobile storage manager control application for managing a storage manager of an information management system
WO2019213058A1 (en) Client managed data backup process within an enterprise information management system
EP2126701A1 (en) Data management in a data storage system using data sets
Holl et al. Policy-Driven Management of Data Sets.

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20090918

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MT NL NO PL PT RO SE SI SK TR

DAX Request for extension of the european patent (deleted)
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

17Q First examination report despatched

Effective date: 20161207

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20170419