WO2012176307A1 - ストレージ管理システム及びストレージ管理方法 - Google Patents
ストレージ管理システム及びストレージ管理方法 Download PDFInfo
- Publication number
- WO2012176307A1 WO2012176307A1 PCT/JP2011/064419 JP2011064419W WO2012176307A1 WO 2012176307 A1 WO2012176307 A1 WO 2012176307A1 JP 2011064419 W JP2011064419 W JP 2011064419W WO 2012176307 A1 WO2012176307 A1 WO 2012176307A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- copy
- backup
- storage
- copy function
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
- G06F11/1461—Backup scheduling policy
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1448—Management of the data involved in backup or backup restore
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/0614—Improving the reliability of storage systems
- G06F3/0619—Improving the reliability of storage systems in relation to data integrity, e.g. data losses, bit errors
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0646—Horizontal data movement in storage systems, i.e. moving data in between storage devices or systems
- G06F3/065—Replication mechanisms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0668—Interfaces specially adapted for storage systems adopting a particular infrastructure
- G06F3/067—Distributed or networked storage systems, e.g. storage area networks [SAN], network attached storage [NAS]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
- G06F2201/815—Virtual
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
- G06F2201/84—Using snapshots, i.e. a logical point-in-time copy of the data
Definitions
- the present invention relates to a storage management system and a storage management method, and more particularly to management of a copy function of a storage system.
- a server virtualization technique is known as a technique for realizing easy management of a host computer.
- VMware Virtual Machine File System: Technical Overview and Best Practices (Non-patent Document 1).
- This technology is also called a virtual machine (Virtual Machine (VM)) that operates a virtualization control program (called hypervisor) on a host computer, and the hypervisor has a different configuration, number, and processing capacity from the host computer. Is constructed on the host computer.
- VM Virtual Machine
- hypervisor virtualization control program
- the hypervisor manages multiple volumes and provides them as a single data storage area (called a data store).
- VM information In an environment using server virtualization technology (referred to as server virtualization environment), VM information, an OS (guest OS) operating on the VM, an application program, and its data are one or more image files (VM image files). Data).
- the VM image file is stored in the data store and managed by the hypervisor.
- the VM image file is stored in a storage area of the storage system.
- the VM image file does not necessarily have the data structure of a file managed by the file system.
- Patent Document 1 describes a copy of a storage system in which a storage system connected to a host computer collects volumes for storing data of application programs operating on the host computer. It is disclosed to replicate simultaneously by function.
- the storage system backup technology can reduce the load on the host computer because the storage system performs data copying necessary for backup. This technology can perform backup of a plurality of VMs without degrading the performance of the host computer (virtualized server).
- the VM information is collected in the VM image file. In some cases, it may not be possible to satisfy a detailed backup request for each program (and its data).
- One embodiment of the present invention is a storage management system that manages a storage system that includes a processor and a storage device and has one or more copy functions.
- the processor specifies data designated for determining a backup method.
- the storage device stores copy function management information related to the one or more copy functions of the storage system.
- the processor specifies each copy unit of the one or more copy functions with reference to the copy function management information.
- the processor determines a copy function candidate of the storage system to be used for backing up the designated data according to a data configuration in a volume storing the designated data and a copy unit of the copy function candidate. To do.
- FIG. 5 is a flowchart illustrating an example of an overall flow of processing for determining a backup method in the first embodiment. It is a figure which shows an example of the backup setting screen in 1st Embodiment. 6 is a flowchart illustrating an example of processing for diagnosing a storage state of target data in order to determine a backup method candidate in the first embodiment.
- 4 is a flowchart illustrating an example of processing for determining a backup method candidate according to a storage state of target data in the first embodiment.
- 4 is a flowchart illustrating an example of processing for determining a backup method candidate according to a storage state of target data in the first embodiment.
- 4 is a flowchart illustrating an example of processing for determining a backup method candidate according to a storage state of target data in the first embodiment. It is a figure which shows an example of the backup method display screen in 1st Embodiment.
- 9 is a flowchart illustrating an example of processing for determining a backup method in the second embodiment.
- a first embodiment of the present invention will be described.
- management of a computer system including a host computer, a storage system, and a management system will be described.
- the management system according to the first embodiment determines a backup method candidate for designated data (for example, a logical disk of a virtual machine).
- data for example, a logical disk of a virtual machine.
- For backup it is preferable to use only the copy function of the storage system without using the copy function of the host computer in order to reduce the load on the host computer. Further, from the viewpoint of capacity efficiency and security, it is preferable that data other than the backup target is excluded from the data copy in the backup.
- the management system specifies the volume configuration in the storage space provided by the storage system and used by the host computer, and specifies the arrangement of the storage data in the volume configuration.
- the management system further specifies the specifications of the copy function implemented in the storage system.
- the copy unit for example, volume unit or file unit
- the management system selects a copy function in the storage system that can back up only the data to be backed up when backing up specified data.
- the management system uses a data movement method to realize it. decide. In the configuration after data movement, any copy function of the storage system can copy only the target data of the specific backup.
- a method for performing backup with fine granularity (for example, for each logical drive or for each application) can be determined by the copy function of the storage system.
- the specific process of determining the backup method is hidden from the user.
- FIG. 1 is a block diagram schematically showing the configuration of a computer system 1 according to the first embodiment.
- the computer system 1 includes storage systems 10A and 10B, a host computer 30, and a management computer 40, which are connected by a data network 20 and a management network 21.
- the storage systems 10A and 10B and the host computer 30 are connected to each other via the data network 20 from each data interface.
- the data network 20 is, for example, a SAN (Storage Area Network).
- the data network 20 may be an IP network or any other type of data communication network.
- the storage systems 10A and 10B, the host computer 30, and the management computer 40 are connected to each other via the management network 21 from their management interfaces.
- the management network 21 is, for example, an IP network.
- the management network 21 may be a SAN or any other type of network.
- the data network 20 and the management network 21 may be the same network.
- the host computer 30 and the management computer 40 may be computers having the same hardware configuration.
- 1 includes two storage systems 10A and 10B, one host computer 30, and one management computer 40.
- the number of various computers and storage systems included in the computer system 1 is as follows. It is not limited.
- the storage system 10 means any one of the storage systems 10A and 10B. In this example, they have the same configuration.
- FIG. 2 is a diagram schematically showing the configuration of the storage system 10 according to the first embodiment.
- the storage system 10 includes a storage controller 11 that controls the entire storage system 10 and a storage device 12 that stores data.
- the storage controller 11 and the storage apparatus 12 are connected via a storage interface (I / F) 112.
- the storage controller 11 includes a data I / F 110, a CPU (Central Processing Unit) 111, a storage I / F 112, a management I / F 113, and a memory 114.
- the data I / F 110 is an interface to the data network 20 and has one or more communication ports.
- the storage controller 11 exchanges data with the host computer 30 via this port.
- the CPU 111 is a processor that executes a program stored in the memory 114 that is a main storage device.
- the storage I / F 112 is an interface to the storage system 10.
- the storage controller 11 transmits and receives data and control commands to and from the storage apparatus 12 via the storage I / F. Note that at least a part of the functions of the storage controller 11 described in the present embodiment may be realized by hardware.
- the management I / F 113 is an interface with the management network 21 and has one or more communication ports.
- the storage controller 11 transmits and receives data and control commands to and from the host computer 30, the management computer 40, and other storage systems via this port.
- a storage microprogram 115 is stored in the memory 114.
- the storage microprogram 115 is a program for managing the storage system 10 and is executed by the CPU 111.
- the storage microprogram 115 is shown in the memory 114, but typically the storage microprogram 115 and the data used by it are stored from the storage area of the storage device 12 or other non-volatile storage device. It is loaded into the storage area of the memory 114.
- the storage microprogram 115 has a function of causing the host computer 30 to recognize the volume.
- the storage microprogram 115 provides the physical storage area of the storage apparatus 12 to the host computer 30 via the I / F as one or more volumes.
- four physical resources 120A to 120D are illustrated.
- the physical resource 120 means any one of the physical resources 120A to 120D.
- the physical resource 120 is a real storage area for storing data used by the host computer 30.
- the physical resource 120 represents a physical storage area provided by a physical device such as an HDD (Hard Disk Drive) or an SSD (Solid State Drive).
- the physical resource 120 is a RAID (Redundant Array of Independent Disks) physical storage area composed of a plurality of data storage drives.
- the storage microprogram 115 of this example constructs a pool 121 including a plurality of logical volumes.
- the pool includes two physical resources 120C and 120D.
- the physical resources 120C and 120D provide a plurality of logical volumes.
- each logical volume is divided into a plurality of pages.
- the storage microprogram 115 manages the pool 121 in units of pages.
- the storage microprogram 115 constructs a virtual volume from the pool 121 and provides it to the host computer 30. This point will be described later.
- the storage microprogram 115 has a function of copying data in a logical volume to another logical volume in accordance with setting data. For example, when the physical resources 120A and 120B in the storage system 10 each constitute one logical volume, the storage microprogram 115 copies data from the physical resource 120A to the physical resource 120B.
- the storage microprogram 115 also has a function of copying a virtual volume.
- the unit (copy granularity) with which the storage controller 11 can copy data depends on the design (function) of the storage controller 11.
- the copy unit of the storage controller 11 is, for example, a volume unit, a file unit, a page unit, a block unit, or the like. In copying in block units, the range specified by the LBA is copied.
- the storage controller 11 is equipped with a copy function in one or more units.
- the system according to the present embodiment determines a backup method according to a copy unit that can be supported by the storage controller 11 (storage system 10). This point will be described later.
- FIG. 3 is a block diagram schematically showing the configuration of the host computer 30 according to the first embodiment.
- the host computer 30 includes an input device 300, a display device 301, a CPU 302, a data I / F 303, a memory 304, a non-volatile storage area 305 of a secondary storage device, and a management I / F 306.
- a typical example of the input device 300 is a keyboard and a pointer device, but a different device may be used.
- the display device 301 is typically an LCD (Liquid Crystal Display). The user operates the host computer 30 with these input / output devices.
- the CPU 302 is a processor that executes a program stored in the memory 304.
- the data I / F 303 is an interface to the data network 20 and has one or more communication ports.
- the host computer 30 transmits and receives data to and from the storage systems 10A and 10B via this port.
- the memory 304 is a main storage device.
- the memory 304 stores a virtual machine (VM) 307, a hypervisor 308, and an agent 309.
- VM virtual machine
- hypervisor hypervisor
- agent 309 agent 309.
- the application 310 and the operating system 311 operate. These programs are executed by the CPU 302.
- the programs and the data they use are shown in the memory 304, but typically the programs and the data they use are stored from the storage area 305 of the secondary storage device to the storage area of the memory 304. To be loaded.
- the memory 304 and the storage area 305 can be viewed as one storage device.
- the storage area 305 of the secondary storage device has a non-transitory storage medium that stores programs and data necessary for realizing a predetermined function.
- the secondary storage device may be an external storage device connected via a network.
- the application 310 is a program that executes a task that runs on the VM 307. Processing is executed by reading / writing data from / to the physical resource 120 of the storage system 10.
- FIG. 3 illustrates one application 310, but a plurality of applications may be operating in the VM 307.
- the application 310 is, for example, a groupware / email server program or a database management system.
- the storage system 10 provides one or a plurality of volumes to the application 310.
- the OS 311 is basic software for managing the entire computer operating on the VM 307 of the host computer 30. This is called a guest OS.
- the hypervisor 308 is a virtualization control program that constructs the VM 307 and controls it.
- the hypervisor 308 can operate one or more VMs 307 on the memory 304.
- the function of copying or moving the VM image file of the VM 307 is included in the hypervisor 308.
- the agent 309 has a function of acquiring information of the host computer 30, VM 307, guest OS 310 and application 311 and information of the storage systems 10A and 10B, and notifying the management computer 40 of the information.
- the management I / F 306 is an interface with the management network 21, and transmits and receives data and control commands to and from the storage systems 10A and 10B and the management computer 40 for system management.
- FIG. 4 is a block diagram schematically showing the configuration of the management computer 40 according to the first embodiment.
- the management computer 40 includes an input device 400, a display device 401, a CPU 402, a management I / F 403, a memory 404, and a storage area 405.
- Typical examples of the input device 400 are a keyboard and a pointer device, but other devices may be used.
- the display device 401 is typically an LCD.
- the management system includes a single management computer 40.
- the management system can include a management console that provides a user interface in addition to the management computer 40.
- Management console has a display device and an input device.
- the administrator accesses the management computer 40 from the management console, instructs the management computer 40 to process, and acquires and displays the processing result of the management computer 40 on the management console.
- the management system can also include a plurality of computers each having part or all of the functions of the management computer 40.
- the CPU 402 is a processor that executes a program stored in the memory 404.
- the management I / F 403 is an interface with the management network 21 and transmits and receives data and control commands to and from the host computer 30 and the storage systems 10A and 10B for system management.
- the memory 404 stores a replication management program 406, a configuration information table 407, a data storage area management table 408, a copy function management table 409, a backup management table 410, and a system policy table 411.
- the programs and tables are shown in the memory 404, but typically the programs and tables are loaded from the storage area 405 of the secondary storage device to the storage area of the memory 404. These can be viewed as one storage device.
- the secondary storage device is a storage device including a nonvolatile non-transitory storage medium.
- the secondary storage device may be an external storage device connected via a network.
- the replication management program 406 is realized by being executed by the CPU 402, and realizes the processing of this embodiment.
- the replication management program 406 provides a setting screen to the administrator, obtains information from the host computer 30 and the storage systems 10A and 10B, selects a backup method, presents a backup method, controls a copy function, and manages each table. .
- the configuration information table 407, data storage area management table 408, copy function management table 409, backup management table 410, and system policy table 411 will be described later.
- information (data) used by the management system is stored in the table.
- the information stored in the data storage area and used in the present embodiment does not depend on the data structure and may be expressed in any data structure. For example, a data structure appropriately selected from a table, list, database, or queue can store information.
- the program is executed by a processor to perform a predetermined process using a storage device and a communication interface. Therefore, in the present embodiment, the description that uses the program, for example, the replication management program 406 as the subject may be the description that uses the processor (CPU) as the subject. Or the process which a program performs is a process which the apparatus and system which the program operate
- the processor operates as a functional unit that realizes a predetermined function by operating according to a program.
- the CPU 402 functions as a management unit of the computer system by operating according to the replication management program 406.
- An apparatus and system including a processor and a program are apparatuses and systems including these functional units.
- FIG. 5 shows an example of the configuration information table 407.
- the configuration information table 407 stores information on each column (field) in association with each entry.
- the configuration information table 407 is a table for storing information on the logical configuration (volume configuration and file configuration) of the host computer 30 and the storage systems 10A and 10B.
- the configuration information table 407 is referred to by the replication management program 406 executed by the management computer 40.
- the configuration information table 407 stores configuration information of volumes and VMs (including their image files). Specifically, the configuration information table 407 identifies the host ID 501 for identifying the host computer 30, the VM ID 502 for identifying the VM on the host computer 30, and the logical drive recognized on the guest OS of the VM. Drive ID 503 and VM image file ID 504 for identifying the VM image file of the VM are stored.
- the configuration information table 407 further includes a data store ID 505 for identifying the data store, a host volume ID 506 for identifying the host volume, a storage ID 507 for identifying the storage system 10, and a virtual volume ID 508 for identifying the virtual volume. Is stored.
- the replication management program 406 acquires information on the host ID 501, VMID 502, drive ID 503, VM image file ID 504, data store ID 505, and host volume ID 508 from the agent 309 of the host computer 30.
- the replication management program 406 acquires information on the storage ID 507 and the virtual volume ID 506 from the storage microprogram 115 of the storage systems 10A and 10B.
- the replication management program 406 stores the acquired information in the configuration information table 407.
- the administrator may input necessary information in the configuration information table 407 in advance.
- the configuration information table 407 may store the identifier of the application running on the guest OS in the column of the drive ID 503 that is the identifier of the logical drive information.
- the entry containing the application identifier has the same fields as the logical drive entry.
- expressions such as an identifier, a name, and an ID can be used for identification information for identifying a target, and these can be replaced.
- FIG. 6 shows an example of the data recording area management table 408.
- the data storage area management table 408 is a mapping table for specifying the physical storage area of the guest OS logical drive.
- the data recording area management table 408 stores information on each column (field) in association with each entry. This table is referred to by the replication management program 406 executed by the management computer 40.
- the data storage area management table 408 identifies a VM / drive ID 601 for identifying a logical drive and its VM, a host volume ID 602 for identifying the host volume, and an area in the host volume in which VM / drive data is written.
- Host volume LBA Logical Block Address
- the data storage area management table 408 further includes a storage ID 604 for identifying the storage system 10, a pool ID 605 for identifying the pool 121 constructed in the storage system 10, and a virtual volume ID 606 for identifying the virtual volume. including.
- the data storage area management table 408 further includes a virtual volume LBA area 607 for identifying the storage area of the virtual volume corresponding to the host volume LBA area 603, a physical resource ID 608 for identifying the physical resource 120, and a virtual volume LBA area.
- the physical resource LBA area 609 for identifying the storage area of the physical resource corresponding to 607 is included.
- the replication management program 406 acquires information on the storage ID 604, pool ID 605, virtual volume ID 606, virtual volume LBA area 607, physical resource ID 608, and physical resource LBA area 609 from the storage systems 10A and 10B.
- the storage ID 604, pool ID 605, and physical resource ID 608 are determined when the physical resource 120 is added to the storage system 10.
- the replication management program 406 acquires the VM / drive ID 601, the host volume ID 602, and the host volume LBA area 603 from the agent 309 of the host computer 30.
- the VM / drive ID 601, host volume ID 602, host volume LBA area 603, virtual volume ID 606, virtual volume LBA area 607, and physical resource LBA area 609 are determined when VM / drive data is stored.
- the virtual volume LBA area 607 and the physical resource LBA area 609 are determined when a write from the host computer 30 occurs and a page allocation request is made to the virtual volume.
- the virtual volume ID 606 may be determined when a virtual volume is created.
- the data of the D drive of the virtual machine VM001 is stored in the areas LBA3000 to 3999 of the physical resource MEDIA001 of the storage system ST001.
- the host computer 30 recognizes that the data of the D drive of the virtual machine VM001 is written in the LBA 3000 to 3999 of the host volume HVOL001, but the actual data is stored in the storage area of the physical resource It is.
- the identifier of the application running on the guest OS may be stored in the data storage area management table 408 and the VM / drive ID 601 column that is the identifier of the logical drive information.
- the entry containing the application identifier has the same fields as the logical drive entry.
- the configuration information table 407 and the data storage area management table 408 in FIGS. 5 and 6 are examples, and the data storage area management table 408 indicates the LBA of which storage area the actual data of the backup target (for example, VM or logical drive) is. Any structure may be used as long as it is written in the area.
- This example has only entries for virtual volumes, but these tables may include logical volumes other than virtual volumes.
- FIG. 7 shows an example of the copy function management table 409.
- the copy function management table 409 is a table for managing information on the copy function of each device in the computer system 1.
- the copy function management table 409 stores information on each column (field) in association with each entry.
- the copy function management table 409 is referred to by the replication management program 406 executed by the management computer 40.
- the copy function management table 409 includes a device classification 701 indicating the classification of the device, a system device ID 702 for identifying each device, a copy function 703 existing in the device, and a copy usage 703 as a backup usage 704 and a migration usage. 705, a priority 706 for using the copy function is stored.
- a virtual machine, a host computer, and a storage system are included in the device classification 701.
- the copy function 703 “volume specified copy function (clone)”, “LBA specified copy function (snapshot)”, etc. are described as an example, but what if the copy function can be specified? It may be a simple expression.
- the clone is a full copy function
- the snapshot is a differential copy function.
- some copy functions can be used only for one purpose of backup or migration, and some copy functions can be used for both purposes.
- the copy function that can be implemented by the device is not limited to these copy functions.
- Priority 706 indicates the priority of the copy function of the device used for backup. The smaller the value, the higher the priority. In order to reduce the load on the host computer 30, the priority of the copy function of the storage system 10 is higher than the priority of the copy function of the host computer 30 (including the virtual machine). Further, since it is preferable that the time required for backup is short, the priority of the copy function having a high copy speed is high.
- the replication management program 406 selects, for example, the copy function that uses the copy function with the highest priority.
- the replication management program 406 may display only the one having a high priority 706 in the presentation of the backup candidate to the administrator, or may calculate the priority of the backup candidate from the priority 706 and display it. .
- the device classification 701, the system device ID 702, the copy function 703, and the uses 704 and 705 are given by the replication management program 406 when the system is introduced or when the copy function is added. They may be entered by an administrator.
- the replication management program 406 may hold a correspondence relationship between the copy function 703 and the uses 704 and 705 in advance, or may automatically perform association from the copy function specification information.
- the priority 706 may not be in the copy function management table 409, and the replication management program 406 may not give the value.
- the replication management program 406 may acquire information on the priority 706 from the administrator and store the value, or the administrator may set a default value.
- FIG. 8 shows an example of the backup management table 410.
- the backup management table 410 is a table for managing backup setting information.
- the backup management table 410 stores information on each column (field) in association with each entry.
- the backup management table 410 is referred to by the replication management program 406 executed by the management computer 40.
- the backup management table 410 stores a backup ID 801 for identifying backup processing, a backup target ID 802 for identifying a backup target, a copy function 803 used for backup, a backup schedule 804, and backup target data.
- P-VOLID 805 for identifying the primary volume that is present, and S-VOLID 806 for identifying the secondary volume of the backup destination are stored.
- One backup ID 802 is associated with one backup ID 801.
- the replication management program 406 stores information on the backup target ID 802, copy type 803, schedule 804, and P-VOL ID 805 in the backup management table 410 in accordance with an input from an administrator who requests a specific target backup.
- the backup ID 801 is given when setting by the administrator.
- the replication management program 406 identifies the virtual volume ID 508 from the configuration information table 407 based on the information of the backup target 802 specified by the administrator, and stores the value as the P-VOL ID 806.
- the administrator may directly set the P-VOLID 806 of the primary volume that is the data volume, or may specify the P-VOLID by other information that can specify the data volume.
- the S-VOLID 806 may be set by the administrator, or the replication management program 406 may identify a volume that is not used in the configuration information table 407 and set the ID of the volume.
- the schedule 804 specifies the backup start time and is defined by the time (for example, “every day 23:00”) and the time interval (for example, “every hour”), but starts the backup. Any defining method may be used as long as the time can be specified. In general, backup for data protection is performed periodically in this way.
- Both of the two copy types illustrated in FIG. 8 are copy functions of the storage system 10, and are a volume designation copy function (clone) and a volume designation copy function (snapshot).
- FIG. 9 shows an example of the system policy table 411.
- the system policy table 411 is a table for managing the logical configuration (for example, volume configuration and file configuration) of the computer system 1 and backup conditions.
- the system policy table 411 stores policy items 901 and values 902 thereof.
- the replication management program 406 may store values obtained from the administrator in the column of the item 901 and the column of the value 902, or a default value may be set.
- the upper limit value of the number of data stores of one host computer is 10
- the upper limit value of the number of image files of one data store is 100.
- the backup window is the time available for backup.
- the replication management program 406 proposes to change the logical configuration (file and volume configuration and data arrangement) for backup, or may change it automatically.
- the replication management program 406 refers to the system policy table 411 and proposes or executes a configuration change within a range of conditions defined therein.
- the storage system 10 constructs a pool 121 that includes a plurality of logical volumes.
- a logical volume is provided by a physical resource.
- two physical resources 120 ⁇ / b> A and 120 ⁇ / b> B provide a logical volume to the pool 121.
- each logical volume is divided into a plurality of pages.
- the storage system 10 constructs a virtual volume from the pool 121 and provides it to the host computer 30.
- two virtual volumes 953A and 953B are shown.
- the capacities of the virtual volumes 953A and 953B are virtualized.
- a page is allocated to the virtual volumes 953A and 953B every time data is written to the virtual volumes 953A and 953B from the host computer 30 and a data storage area is required.
- the storage system 10 can make the capacities of the virtual volumes 953A and 953B recognized by the host computer 30 larger than the actual capacities (capacity of all pages) assigned to the virtual volumes 953A and 953B.
- the practical amount necessary to realize the capacity allocated to the server can be made smaller (dynamic provisioning).
- the storage system 10 may provide the host computer 30 with a volume that is configured from pages in the pool and whose actual capacity matches the capacity recognized by the host computer 30.
- the hypervisor 308 of the host computer 30 recognizes the virtual volumes 953A and 953B provided by the storage system 10 via the network 20 as host volumes 954A and 954B, respectively.
- the host volumes 954A and 954B visible to the hypervisor 308 can have a capacity larger than the actual capacity of the virtual volumes 953A and 953B.
- the storage system 10 may provide not a virtual volume but a logical volume (real volume) to the host computer 30 (hypervisor 308).
- the hypervisor 308 provides an environment for executing a plurality of VMs.
- VMs 307A and 307B are illustrated.
- the hypervisor 308 manages the host volumes 954A and 954B and provides them to the VMs 307A and 307B as a data store 955 which is a single data storage area (volume).
- the hypervisor 308 may straddle a plurality of host computers.
- the entities of VMs 307A and 307B are VM image files stored in the data store 955.
- a VM image file 956 of VM 307A is illustrated.
- Information about the VM, the guest OS operating on the VM, application programs, and data thereof are stored in one or more image files.
- all the data of the virtual machine VM001 is stored in one VM image file IMG001.
- the data of the virtual machine VM002 is stored in two VM image files IMG002 and IMG003. Specifically, the contents of the C drive are stored in the VM image file IMG002, and the contents of the D drive are stored in the VM image file IMG003. Has been.
- the hypervisor 308 manages in which host volume the VM image file is stored, and executes reading and writing of the VM image file.
- the data store 955 includes the host volumes 954A and 954B in which the hypervisor 308 recognizes the virtual volumes 953A and 953B of the storage system 10. That is, the VM image file stored in the data store 955 is stored in the physical storage area of the storage system 10.
- the replication management program 406 of the management computer 40 determines a backup method candidate for the target data in response to a predetermined event, for example, a backup setting change or a new backup setting, and presents it to the administrator. Alternatively, the replication management program 406 selects an optimal backup method from the determined backup method candidates, and automatically performs settings for that.
- a predetermined event for example, a backup setting change or a new backup setting
- FIG. 11 shows an example of the overall processing flow for determining the backup method.
- steps S1101 to S1105 are executed by the replication management program 406 on the management computer 40.
- the CPU 402 reads the program from the memory 404 and executes this process.
- the replication management program 406 acquires logical configuration (stored data configuration) information and copy function information existing in each device from the host computer 30 and the storage systems 10A and 10B (S1101).
- the replication management program 406 stores the acquired information in the configuration information table 407, the data storage area management table 408, and the copy function management table 409.
- the replication management program 406 acquires volume configuration and file configuration information in the host computer 30 and the storage systems 10A and 10B as logical configuration information.
- the volume configuration information includes information on the relationship between the host volume recognized by the host computer 30 and the virtual volume provided by the data store and the storage system 10.
- the file configuration information is the configuration information of the VM image file, and includes information on the VM image file in which the logical drive of each VM is stored and the storage position (storage volume) of the VM image file.
- the information stored in the copy function management table 409 is information on copy functions existing in each of the devices belonging to the computer system.
- the replication management program 406 acquires information on the copy functions for backup and data movement existing on the storage systems 10A and 10B, the host computer 30, and the virtual machine 307.
- the timing for acquiring the logical configuration and copy function information in the system is, for example, the timing when the administrator starts the replication management program 406, or the replication management program 406 may periodically acquire the information. .
- the replication management program 406 may have a mechanism for receiving information on a change in the logical configuration of the system, and the information may be updated at the reception timing.
- the replication management program 406 acquires backup setting information (S1102).
- the replication management program 406 provides a screen for backup setting, and starts selection of a backup method according to an instruction from the administrator.
- the user interface for data input may be a graphic screen operation (GUI (Graphical User Interface)) or a command input (CLI (Command Line Interface)).
- GUI Graphic screen operation
- CLI Common Line Interface
- the replication management program 406 may refer to a property file created by the administrator, or may automatically generate a backup setting by itself, and the setting method is not limited.
- FIG. 12 shows an example of the backup setting screen.
- the display device 401 displays this backup setting screen.
- the backup setting screen of this example includes a section for setting the backup target 1201 and the backup policy 1202.
- the backup policy defines the backup conditions for the target data.
- the administrator instructs the replication management program 406 to change the backup policy (backup method) of specific data (for example, logical drive) or to set backup of new data (for example, logical drive), Display the backup setting screen.
- the backup setting screen displays the host ID 501, VMID 503, and drive ID 503 of the configuration information table 407 in the backup target 1201.
- the drive ID 503 may not be information on the drive, but may be information specifying an application using the drive.
- the data that can be specified to determine the backup method depends on the design.
- An administrator can input setting information using the input device 400. Specifically, the administrator can select a data area designated for determining the backup method by clicking the corresponding check box.
- the D drive ( ⁇ D) of the host computer HOST001 and the virtual machine VM001 is designated.
- the backup target 1201 designates a backup target for determining the backup method, and the actual backup target data can include other data having the same designated data and backup policy.
- the administrator can set a failure response 1203, a backup window 1204, and a schedule 1207 in the backup policy 1202.
- the information set in the schedule 1207 is the same as the backup management table 410 schedule 804, and the backup start time is set.
- the failure response 1203, the administrator can select one of physical failure countermeasure and logical failure countermeasure. With this setting, a copy function candidate to be used is determined.
- Measures for physical failure are measures when the volume being used is physically damaged and data is lost.
- another remote storage system may acquire backup data in preparation for damage to the entire storage system, which is one of physical failures. This backup typically uses a full copy to accommodate volume corruption.
- ⁇ Logic failure countermeasure is a countermeasure when some data is lost due to an operational error of the administrator. Since the volume is not damaged, it is sufficient that the data can be recovered to the previous data. Therefore, typically, the storage system 10 uses a snapshot.
- the time limit for backup of specified data (in this example, the D drive of the virtual machine VM001) is set.
- the replication management program 406 selects as a candidate a backup method that falls within the backup window in which the time required for backup is set.
- the selected backup method candidates may include data movement prior to data copying for backup.
- the number of data movements is one, and thereafter, only the data copy by the copy function of the storage system 10 may be performed in the scheduled backup.
- the replication management program 406 assumes the time required for using the migration function in addition to the copy function, and determines backup method candidates so that the total time is within the value of the backup window 1204. Alternatively, a backup method candidate may be determined from the time required for data copying regardless of the data movement time.
- the replication management program 406 acquires the backup setting information input by the administrator.
- a cancel button 1206 is pressed, the replication management program 406 ends without performing backup setting.
- the above backup policy is an example, and the backup conditions included in the backup policy depend on the design.
- the administrator does not have to set a backup policy for specific data.
- Data for which no backup policy is set can be regarded as having the same backup conditions as all data in determining the backup method.
- the replication management program 406 identifies the configuration of the specified data from the content specified in S1102 and the configuration information table 407 (S1103). Specifically, the storage location of the designated data, that is, the file and volume (including the data store) in which the designated data is stored is specified. This information is used in the subsequent diagnosis of the backup method in S1105.
- the replication management program 406 stores the configuration information table 407.
- the host ID 501 is searched for HOST001
- the VMID 502 is searched for VM001
- the drive ID 503 is searched for D.
- the replication management program 406 can know that the VM image file ID 504 of the specified HOST001-VM001-D is IMG001, its data store ID 505 is DS001, and its host volume ID 506 is HVOL001.
- the replication management program 406 identifies the data storage area of the data designated in S1102 from the information stored in the data storage area management table 408 (S1104). For example, as in S1102, the replication management program 406 searches for VM001-D in the column of the VM / drive ID 601 according to the information in FIG.
- the replication management program 406 can know that the host volume ID 602 of the designated data (VM001-D) is HVOL001, and that the host volume LBA area 603 is LBA3000-3999.
- the replication management program 406 searches the data storage area management table 408 for the correspondence relationship between the volume storing the designated data (VM001-D) and the storage area. As indicated by the data storage area management table 408, the virtual volume ID 606 of the designated data (VM001-D) is VVOL001, and the virtual volume LBA area 607 is LBA0000-0999.
- the physical resource ID 608 and the physical resource LBA area 609 corresponding to the storage area of the virtual volume are MEDIA001 and LBA3000-3999, respectively. That is, it can be seen that the D drive entity on VM001 is stored in LBA 3000-3999 of MEDIA001. The data in this storage area is the actual backup target.
- the replication management program 406 knows from the data storage area management table 408 the virtual volume and the storage area specified by the LBA, the physical resource and the storage area specified by the LBA of the specified data. Can do.
- the replication management program 406 lists the backup method candidates (S1105).
- Candidate backup methods may include data movement for data placement changes. Data movement is performed only once for subsequent periodic backups. Details of selection of backup method candidates to be listed will be described later with reference to FIGS. 13A to 13D.
- the replication management program 406 further determines a backup method to be finally used from the backup method candidates (S1106).
- One of the determination methods is to let the administrator select the backup method to be used from the candidates listed in S1105.
- the replication management program 406 generates a screen for presenting a backup method candidate and displays it on the display device 401.
- the user interface may be GUI or CLI, and the display method is not limited.
- the replication management program 406 acquires necessary information on the backup method display screen as shown in FIG.
- the backup method display screen includes a backup setting item 1401 and a backup method list 1402 section.
- the backup setting item 1401 displays, for example, the contents set by the administrator on the backup setting screen (FIG. 12).
- the backup method list 1402 displays, for example, the backup method candidates listed in S1105. The administrator can select the backup method to be used by clicking the check box. In the example of FIG. 14, the backup method list 1402 displays information on a copy function 1403, a backup speed 1404, configuration change presence / absence 1405, and movement presence / absence 1406.
- the configuration change presence / absence 1405 indicates whether or not the volume configuration or file configuration changes due to the adoption of the corresponding backup method.
- the movement presence / absence 1406 indicates whether or not data movement occurs with the adoption of the corresponding backup method. Details thereof will be described later with reference to FIGS. 13A to 13D.
- the replication management program 406 can acquire information to be displayed in the backup speed 1404 from the copy function management table 409, for example.
- the copy function management table 409 has a copy performance information column (not shown), and displays the information stored in the column at the backup speed 1404.
- the backup method list 1402 provides supplementary information for determining the backup method to the administrator.
- the setting button 1407 is pressed, the input setting is confirmed.
- a cancel button 1408 is pressed, the process ends without selecting a backup method to be applied.
- the replication management program 406 selects a backup method according to the information in the system policy table 411 (FIG. 9). If the backup method is uniquely identified in S1105, that is, if there is only one backup method candidate, this step need not be executed.
- the replication management program 406 constructs a backup configuration that realizes the backup method determined in S1106 (S1107). For example, the replication management program 406 executes this step when the replication management program 406 receives a backup configuration construction instruction from the administrator or when there is a policy of automatically executing the backup configuration construction.
- the replication management program 406 sets the storage system 10 and the host computer 30 necessary for data movement necessary for backup of designated data and backup of target data.
- the replication management program 406 may not execute this step.
- the storage controller 11 performs backup according to the setting data.
- the replication management program 406 operates according to these flowcharts.
- the replication management program 406 diagnoses the storage state of the designated data according to the flowchart shown in FIG. 13A, and classifies the designated data (data designated as the backup target for determining the backup method) according to the storage state.
- the replication management program 406 specifies the arrangement of the designated data (HST001-VM001- ⁇ D in the example of FIG. 12), that is, the file and volume for storing the data, and further the volume for storing the data.
- the data structure in the file, specifically, the volume storing the designated data and other data in the file are specified.
- the replication management program 406 classifies the designated data according to the specified storage state of the designated data.
- the function required to copy only the backup target including the specified data differs depending on the storage status of the specified data. That is, the copy function of the storage system 10 that can be used for backup differs depending on the storage state of the designated data. Furthermore, the copy function of the storage system 10 that can be used for backup can be increased by moving data (designated data or other data) and changing the data arrangement (data storage state).
- the computer system 1 preferably performs backup with the copy function of the storage system 10 without using the copy function of the host computer 30 in order to reduce the load on the host computer 30. Further, it is preferable to realize backup of only the backup target data without moving the data. This is to avoid an increase in the load on the host computer 30 accompanying data movement and an increase in the management load accompanying a change in volume configuration.
- the replication management program 406 follows the flowchart of FIG. 13A according to the copy unit (copy granularity) required for the storage system 10 to perform backup with the copy function of the storage system 10 without moving data. Classify specified data.
- the replication management program 406 determines a backup method candidate depending on whether or not the storage system 10 has a copy function in units of volumes, files, and blocks.
- a block is a unit of data access in the storage system 10.
- the check of the presence or absence of the copy function by the replication management program 406 is based on the copy function that can be implemented in the storage system 10. All of the above three functions may or may not be checked.
- the replication management program 406, for example, checks whether or not there is a copy function in units of pages together with a copy function in other units, and according to the check result, the copy function of the storage system used in backup and the data movement associated with the backup method Necessity may be determined.
- the replication management program 406 determines whether or not the VM image file storing the specified data includes data of a backup policy different from the backup policy of the specified data (S1301). ). Data with the same backup policy can be copied in the same backup. Therefore, data of the same backup policy as the designated data can be included in the target data in the same backup.
- step 3 flow chart in FIG. 13D.
- the data classified in step 3 requires a copy function in units of blocks in the current data arrangement. Details of step 3 will be described later.
- the VM image file contains data whose backup policy is different from the specified data
- copying the VM image file for backup of the specified data using the volume unit copy function or the file unit copy function copies unnecessary data to the backup. Will do. Therefore, a function capable of copying a part of the VM image file is required.
- the replication management program 406 can specify the VM image file storing the specified data and the storage data of the VM image file with reference to the configuration information table 407. it can.
- the replication management program 406 searches the column of the VM image file ID 504, and whether there is any other VMID 502 or drive ID 503 sharing the IMG001. Confirm. In the example of FIG. 5, it can be seen that the VM001 C drive shares the IMG001.
- the replication management program 406 can know the backup policy of the VM001 C drive by referring to the system policy table 411. When the backup policy of this data is different from the backup condition of the D drive which is the designated data, the determination result in S1301 is YES.
- step S1302 the replication management program 406 determines whether a VM image file having a backup policy different from the backup policy for the specified data exists in the data store in which the VM image file including the specified data is stored. .
- the VM image file that stores the designated data is composed of only the designated data or data that has the same designated data and backup policy as the designated data.
- step 1 (FIG. 13B).
- the data classified into step 1 requires a copy function with a granularity of a volume unit or less in the storage system 10 in the current arrangement. Details of step 1 will be described later.
- the replication management program 406 can specify the data store in which the designated data is stored and the configuration thereof with reference to the configuration information table 407. For example, when the VM image file ID 504 specified in S1103 is IMG001, the data store ID 505 of the data store that stores the VM image file IMG001 is DS001. Further, the replication management program 406 can know the backup policy of the data stored in the data store ID 505 with reference to the system policy table 411.
- the replication management program 406 searches the column of the data store ID 505 and checks whether a VM image file other than IMG001 is stored in the data store DS001. In the example of FIG. 5, only the VM image file IMG001 is stored in the data store DS001. That is, the determination result in S1302 is NO.
- the replication management program 406 determines whether or not the VM image file including the specified data is distributed to a plurality of host volumes. If the determination result in S1303 is NO, the replication management program 406 proceeds to S1304. If the determination result in S1303 is YES, a copy function in units of blocks is necessary for backup of the distributed data, and the replication management program 406 proceeds to Step 3.
- one VM image file includes only designated data, or data of the same backup policy is stored in one VM image file, and further this image file is stored. This is a case where another image file having a different backup policy exists in the stored data store.
- the replication management program 406 determines whether or not the VM image file is distributed to a plurality of host volumes in an environment where a plurality of host volumes are allocated to the data store. For example, in the example of the configuration information table 407 in FIG. 5, the data of the VM image file IMG002 is distributed over the host volume HVOL002 and the host volume HVOL003. Therefore, the determination result in S1303 is YES.
- the replication management program 406 determines whether a VM image file having a different backup policy from the designated data exists in the host volume storing the VM image file including the designated data.
- the VM image file storing the specified data is stored in one volume (S1303: NO). Further, the VM image file includes only designated data, or only designated data and data of the same backup policy as the designated data.
- the replication management program 406 proceeds to step 1. If the determination result in S1304 is NO, the backup target VM image file is stored in a single host volume, and the host volume stores only the VM image file of the same backup policy, or other VM image file is not stored. Therefore, only the VM image file can be copied by the copy function in units of volumes.
- the replication management program 406 proceeds to step 2. If the determination result in S1304 is YES, the VM image file including the specified data is stored in a single host volume, and the host volume storing the VM image file stores other VM image files with different backup policies. is doing. Since the copy function in units of files can copy only the VM image file including the specified data, the replication management program 406 proceeds to step 2.
- the replication management program 406 refers to the configuration information table 407 and checks whether or not the entry of the host volume ID 506 stores a plurality of VM image file IDs 504.
- the host volume H-VOL001 stores only the VM image file IMG001.
- the determination result in S1304 is NO.
- Step 1 determines a backup method candidate when the designated data is stored in one or a plurality of host volumes (virtual volumes) and the backup policy of the data in the volume is the same.
- the storage system 10 can satisfy the backup request by using a copy function with a granularity equal to or less than the volume unit.
- the replication management program 406 refers to the copy function management table 409, checks the copy function of the storage system 10 to be operated, and performs a volume unit copy function (volume designation copy function), a file unit copy function ( It is checked whether or not any one of the copy function (file specified copy function) and block unit copy function (LBA specified copy function) exists.
- a volume unit copy function volume designation copy function
- a file unit copy function It is checked whether or not any one of the copy function (file specified copy function) and block unit copy function (LBA specified copy function) exists.
- the replication management program 406 proceeds to S1312. Any copy function can copy only data that needs to be backed up (data to be backed up). That is, data having a backup policy different from the specified data can be excluded from the copy for backup of the specified data. If there is no copy function in any unit, the replication management program 406 proceeds to S1313.
- the replication management program 406 can know that the storage system ST002 has a copy function of a volume unit copy function (clone) by referring to the copy function management table 409. In this case, the determination result in S1311 is yes, and the replication management program 406 proceeds to S1312.
- step S1312 the replication management program 406 determines one or more backup method candidates that use the copy function, and stores information indicating the backup method candidates in the memory 404.
- the replication management program 406 may generate a new file and store backup method candidate information therein.
- the replication management program 406 specifies a backup method that uses other than the copy function of the storage system 10 (1313). Specifically, in the copy function management table 409, when an entry of a virtual machine or a host computer indicates a copy function for backup use, the replication management program 406 presents a backup method using these copy functions to the administrator. .
- the host computer HOST001 hypervisor operating there
- the replication management program 406 presents a backup method candidate using this copy function to the administrator.
- the replication management program 406 may not execute this step.
- Step 2 the VM image file of the specified data is stored in a single host volume (virtual volume), but data with different backup policies, that is, data not included in the backup target of the specified data is also stored in the same virtual volume. Decide backup method candidates when stored in the volume.
- step S1321 the replication management program 406 searches the column of the system device ID 702 of the copy function management table 409 for the ID of the storage system 10 that is the operation target, and the storage system 10 uses the file unit copy function or block unit copy. It is determined whether or not it has a function.
- the replication management program 406 proceeds to S1322.
- the replication management program 406 proceeds to S1323.
- the replication management program 406 proceeds to S1323.
- the storage system ST001 has a file unit copy function and a block unit copy function, the replication management program 406 proceeds to S1322.
- the replication management program 406 determines that the backup method using the copy function specified in S1321 is a candidate for the backup method to be actually used. Specifically, the replication management program 406 holds information indicating backup method candidates in the memory 404. The replication management program 406 may generate a new file and store the above information therein. No data movement is necessary for this backup method.
- the replication management program 406 refers to the copy function management table 409 in S1323 and stores the volume unit in the storage system 10. It is determined whether or not a copy function exists.
- the replication management program 406 proceeds to S1324. If the storage system 10 does not have a volume unit copy function (S1323: none), the replication management program 406 proceeds to S1326.
- the storage system ST002 has a copy function of a volume unit copy function (clone). If the storage system that performs the backup copy is the storage system ST002, the determination result in S1323 is yes, and the replication management program 406 proceeds to S1324.
- the replication management program 406 determines whether or not the host computer 30 has a data movement function for performing backup that satisfies the request by the copy function in units of volumes. If the VM image file migration function exists (S1324: present), the replication management program 406 proceeds to S1325. If the migration function does not exist (S1324: none), the replication management program 406 proceeds to S1326.
- the replication management program 406 searches the copy function management table 409 for the copy function 703 whose usage is move 705. In an environment that passes through this step, data with different backup policies is mixed in the target data store. Furthermore, image files with different backup policies are stored in one host volume included in the data store, that is, one virtual volume (primary volume).
- the host computer 30 can move a VM image file between host volumes, only the target data (and data of the same backup policy) can be copied by the volume unit copy function of the storage system 10. .
- These host volumes may exist in the same data store or in different data stores.
- VM guest OS
- hypervisor the image file relocation function in the data store of the host computer
- hypervisor the image file relocation function in the data store of the host computer
- the VM data copy function can move a VM image file or partial data in the VM image file to the same or different host volume. Specifically, the VM data copy function generates a new VM image file including the copied data in the same or different host volume.
- the image file relocation function in the data store of the host computer 30 moves VM image files between different host volumes included in the same data store. With this function, data can be rearranged so that data with different backup policies is not mixed in the same volume.
- the image file move function between data stores of the host computer 30 moves the VM image file in the volume to the volume of another data store.
- This function requires a data store other than the target data store.
- the host computer 30 newly creates another data store, or moves the target VM image file to another data store having the same backup policy.
- any of the above three migration functions can migrate VM image files between different host volumes. Therefore, if any one of the above three migration functions exists, the volume unit copy function of the storage system 10 can back up the target data in accordance with the backup request after data migration by that function. it can.
- step S1325 the replication management program 406 determines one or more backup method candidates that use the migration function and the volume unit copy function, and stores information indicating the backup method candidates in the memory 404.
- the replication management program 406 may generate a new file and store backup method candidate information therein. As described above, one or more mobile functions that can be used are specified in S1324.
- the replication management program 406 specifies a backup method that uses other than the copy function of the storage system 10 (S1326).
- S1326 is the same as S1313.
- the replication management program 406 may specify a backup method candidate that involves migration even when there is a backup method candidate that does not involve migration (S ⁇ b> 1305). This point is the same in the process according to the flowchart of FIG. 13D described below.
- Step 3 when the designated data is stored in one VM image file together with other data having a different backup policy (S1301: YES), or a VM image file having a different backup policy exists in the data store ( If the VM image file including the specified data is distributed and stored in a plurality of host volumes (S1303: YES), a backup method candidate is determined.
- the replication management program 406 refers to the copy function management table 409, and determines whether or not the copy function in units of blocks exists in the operation target storage system 10. When the block unit copy function exists (S1331: Yes), the replication management program 406 proceeds to S1332. When the block unit copy function does not exist (S1331: No), the replication management program 406 proceeds to S1333.
- the storage system ST001 has a copy function in units of blocks. Therefore, when the storage system ST001 is an operation target, the determination result in S1331 is yes, and the replication management program 406 proceeds to S1332.
- the replication management program 406 determines a backup method candidate that uses the corresponding copy function (block unit copy function), and holds information indicating the backup method candidate in the memory 404.
- the replication management program 406 may generate a new file and store backup method candidate information therein. No data movement is necessary for this backup method.
- the replication management program 406 refers to the copy function management table 409 and determines whether or not the file-based copy function exists in the operation target storage system 10. When the file unit copy function exists (S1333: present), the replication management program 406 proceeds to S1334. When the file unit copy function does not exist (S1333: None), the replication management program 406 proceeds to S1337.
- the replication management program 406 determines whether or not the host computer 30 has a migration function for realizing backup by the file unit copy function. If the corresponding migration function exists (S1334: present), the replication management program 406 proceeds to S1335. If the corresponding migration function does not exist (S1334: No), the replication management program 406 proceeds to S1336.
- the replication management program 406 searches the copy function management table 409 for the copy function 703 whose usage is move 705.
- the target VM image file includes designated data and data having a different backup policy from the designated data, or the designated data is distributed over a plurality of volumes.
- the file-by-file move function and copy function cannot be used.
- the data copy function of the virtual machine can move designated data or data other than the designated data to another VM image file on the guest OS. Thereby, it is possible to prevent data having different backup policies from being mixed in the VM image file including the designated data.
- a VM image file other than the target VM image file is required.
- the VM image file may be newly created.
- data may be moved to the image file.
- step S1335 the replication management program 406 determines a backup method candidate that uses the corresponding migration function and copy function (file unit or volume unit copy function), and stores information indicating the backup method candidate in the memory 404. To do.
- the replication management program 406 may generate a new file and store backup method candidate information therein.
- step 1336 the replication management program 406 identifies a backup method that uses a copy function other than the copy function of the storage system 10. This step is the same as S1313.
- the replication management program 406 refers to the copy function management table 409, and determines whether or not the volume-unit copy function exists in the operation target storage system 10. If the storage system 10 has a copy function in units of volumes (S1337: present), the replication management program 406 proceeds to S1338. When the copy function for each volume does not exist in the storage system 10 (S1337: None), the replication management program 406 proceeds to S1336.
- the replication management program 406 determines whether or not there is a migration function for realizing backup by the volume unit copy function. If the corresponding migration function exists, the replication management program 406 proceeds to S1335. If there is no corresponding migration function, the replication management program 406 proceeds to S1336.
- the determination method of S1338 is the same as the determination method of S1334.
- the second embodiment is applied when the logical configuration is changed in the computer system 1 in the first embodiment, for example, when a VM is newly created.
- a new logical configuration (including volume configuration and data arrangement) is recommended according to the copy unit of the copy function of the storage system.
- a backup policy By acquiring a backup policy at the timing of VM creation, a logical configuration suitable for the backup environment can be constructed.
- a new image file may be generated, or an existing VM image file may be copied.
- step S ⁇ b> 1501 the replication management program 406 acquires logical configuration information and copy function information existing in each device from the host computer 30 and the storage system 10. This step is the same as S1101.
- the replication management program 406 acquires VM creation information and backup setting information.
- the VM creation information includes configuration information of newly created VM data (designated data), for example, information on the configuration of a logical drive (information indicating what kind of logical drive is included).
- the logical configuration of the VM is the same as the configuration of the VM before distribution.
- the replication management program 406 acquires backup setting information in the same manner as in S1102.
- the creation information of the VM is notified by the agent 309 to the replication management program 406 when the hypervisor 308 creates the VM.
- the replication management program 406 may acquire VM creation information in cooperation with the hypervisor 308.
- the replication management program 406 provides a new virtual machine creation screen and a screen for acquiring a backup policy, and starts processing according to an instruction from the administrator.
- the user interface may be a screen operation using a GUI or a command input using a CLI.
- a property file created by the administrator may be used, or the replication management program 406 may automatically generate a VM.
- the setting method is not limited.
- the replication management program 406 presents a new backup method and VM data placement candidates for realizing the backup method.
- the data configuration specifies the configuration of a volume and file for storing VM data, and specifically specifies one or a plurality of added VM image files and a volume in which each VM image file is stored.
- the replication management program 406 determines a backup method and data arrangement candidates from the copy function of the storage system 10 and VM creation information. For example, the replication management program 406 presents that when there is data of different backup policies in the VM and the copy function of the storage system 10 is only the volume specification copy function, each data is stored in different virtual volumes. To do. As a result, backup can be performed only with the copy function of the storage system 10.
- the replication management program 406 confirms whether there is data of a different backup policy in the VM from the newly created VM setting information and the backup setting information acquired in S1502. Next, the replication management program 406 identifies an available copy function of the storage system 10 from the copy function management table 409.
- each added VM image file is composed of data of the same backup policy and stored in a single volume.
- the storage system 10 has a block unit copy function, the data structure of the newly added VM is arbitrary.
- the replication management program 406 determines the backup method to be used and the data structure of the newly added VM corresponding thereto. For example, the replication management program 406 causes the administrator to select one backup method from the candidates listed in S1503. In this case, the replication management program 406 provides a screen for presenting backup method candidates.
- the display method is not limited. Further, when the configuration can be uniquely identified, it is not necessary to execute this process.
- the replication management program 406 builds the environment determined in S1504. Specifically, the replication management program 406 performs the setting for the backup method determined in S1503 in the storage system 10. Furthermore, the replication management program 406 issues an instruction to the hypervisor 308 to construct the data configuration determined in S1504. Thereby, the environment determined in S1504 can be constructed.
- the above-described configurations, functions, processing units, processing means, etc. may be realized in hardware by designing a part or all of them, for example, with an integrated circuit.
- Information such as programs, tables, and files that realize each function is stored in a non-volatile semiconductor memory, a hard disk drive, a storage device such as an SSD (Solid State Drive), or a computer-readable information such as an IC card, SD card, or DVD. It can be stored on a temporary data storage medium.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Quality & Reliability (AREA)
- Computer Security & Cryptography (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Description
本発明の第1実施形態について説明する。第1実施形態は、ホスト計算機、ストレージシステムそして管理システムを含む計算機システムの管理を説明する。第1実施形態の管理システムは、指定されたデータ(例えば仮想マシンの論理ディスク)のバックアップ方法の候補を決定する。バックアップは、ホスト計算機の負荷低減のために、ホスト計算機のコピー機能を使用することなく、ストレージシステムのコピー機能のみを使用することが好ましい。また、容量効率及びセキュリティに観点から、バックアップにおけるデータコピーから、バックアップ対象以外のデータが除かれていることが好ましい。
次に、第2実施形態を説明する。第2実施形態は、第1実施形態における計算機システム1において、論理構成が変更されるとき、例えばVMが新規に作成されるときに適用される。第2実施形態は、ストレージシステムのコピー機能のコピー単位に応じて、新たな論理構成(ボリューム構成及びデータ配置を含む)を推奨する。VM作成のタイミングでバックアップポリシを取得することで、バックアップ環境に適した論理構成を構築できる。VMの新規作成は、新たなイメージファイルを生成してもよいし、既存のVMのイメージファイルをコピーしてもよい。
Claims (15)
- プロセッサと記憶デバイスとを含み、1以上のコピー機能を有するストレージシステムを管理する、ストレージ管理システムであって、
前記プロセッサは、バックアップ方法決定のために指定されたデータを特定し、
前記記憶デバイスは、前記ストレージシステムの前記1以上のコピー機能に関するコピー機能管理情報を記憶し、
前記プロセッサは、前記コピー機能管理情報を参照して、前記1以上のコピー機能のそれぞれのコピー単位を特定し、
前記プロセッサは、前記指定されたデータをバックアップするために使用する前記ストレージシステムのコピー機能候補を、前記指定されたデータを格納するボリューム内のデータ構成及び前記コピー機能候補のコピー単位に応じて決定する、ストレージ管理システム。 - 請求項1に記載のストレージ管理システムであって、
前記ストレージシステムは、ホスト計算機上で動作している仮想マシンに1以上のボリュームを提供し、
前記指定されたデータは前記仮想マシンのデータである、ストレージ管理システム。 - 請求項2に記載のストレージ管理システムであって、
前記コピー候補による前記指定されたデータのコピーから、前記指定されたデータとバックアップ条件が異なるデータは除かれる、ストレージ管理システム。 - 請求項3に記載のストレージ管理システムであって、
前記記憶デバイスは、前記ストレージシステムに格納されているデータのバックアップ条件を規定する条件情報を記憶し、
前記プロセッサは、前記条件情報を参照して、前記指定されたデータの前記コピー候補によるコピーにおいて、前記指定されたデータと異なるバックアップ条件のデータが除外されるように、前記コピー候補と前記コピー候補によるコピー前の前記指定されたデータが格納されているボリュームのデータの移動の有無とを決定する、ストレージ管理システム。 - 請求項4に記載のストレージ管理システムであって、
前記プロセッサは、前記データの移動に使用することができる前記ホスト計算機の移動機能を特定する、ストレージ管理システム。 - 請求項5に記載のストレージ管理システムであって、
前記ストレージ管理システムは、表示デバイスをさらに含み、
前記表示デバイスは、前記コピー機能候補と前記データ移動の有無とを含む、前記指定データのバックアップ方法の候補の情報を表示する、ストレージ管理システム。 - 請求項6に記載のストレージ管理システムであって、
前記条件情報は、前記ホスト計算機に新たに追加される仮想マシンのバックアップ条件を含み、
前記プロセッサは、前記仮想マシンのデータのバックアップにおいて使用する第2コピー機能候補を決定し、
前記プロセッサは、前記第2コピー機能候補のコピー単位に基づいて、前記第2コピー機能候補による前記仮想マシンの前記データのコピーから前記仮想マシンの前記データとバックアップ条件が異なるデータが除外される、前記仮想マシンの前記データの配置、を決定する、ストレージ管理システム。
- 1以上のコピー機能を有するストレージシステムを管理する、ストレージ管理システムによる、ストレージ管理方法であって、
前記ストレージ管理システムが、バックアップ方法決定のために指定されたデータを特定し、
前記ストレージ管理システムが、予め記憶されているコピー機能管理情報を参照して、前記1以上のコピー機能のそれぞれのコピー単位を特定し、
前記ストレージ管理システムが、前記指定されたデータをバックアップするために使用する前記ストレージシステムのコピー機能候補を、前記指定されたデータを格納するボリューム内のデータ構成及び前記コピー機能候補のコピー単位に応じて決定する、ストレージ管理方法。 - 請求項8に記載のストレージ管理方法であって、
前記指定されたデータは、前記ストレージシステムが1以上のボリュームを提供しているホスト計算機上で動作している仮想マシンのデータである、ストレージ管理方法。 - 請求項8に記載のストレージ管理方法であって、
前記コピー候補による前記指定されたデータのコピーから、前記指定されたデータのバックアップにおける対象データ以外のデータは除かれる、ストレージ管理方法。 - 請求項8に記載のストレージ管理方法であって、
前記コピー機能候補の決定は、前記ストレージシステムに格納されているデータのバックアップ条件を規定する条件情報を参照して、前記指定されたデータの前記コピー候補によるコピーにおいて、前記指定されたデータと異なるバックアップ条件のデータが除外されるように、前記コピー候補と前記コピー候補によるコピー前の前記指定されたデータが格納されているボリュームのデータの移動の有無とを決定する、ストレージ管理方法。 - 請求項11に記載のストレージ管理方法であって、
前記コピー機能候補の決定は、前記データの移動に使用することができる前記ホスト計算機の移動機能を特定する、ストレージ管理方法。 - 請求項8に記載のストレージ管理方法であって、
前記ストレージ管理システムが、前記コピー機能候補と前記データ移動の有無とを含む、前記指定データのバックアップ方法の候補の情報を表示する、ことをさらに含むストレージ管理方法。 - 請求項8に記載のストレージ管理方法であって、
前記条件情報は、ホスト計算機に新たに追加される仮想マシンのバックアップ条件を含み、
前記ストレージ管理システムが、前記仮想マシンのデータのバックアップにおいて使用する第2コピー機能候補を決定し、
前記ストレージ管理システムが、前記第2コピー機能候補のコピー単位に基づいて、前記第2コピー機能候補による前記仮想マシンの前記データのコピーから前記仮想マシンの前記データとバックアップ条件が異なるデータが除外される、前記仮想マシンの前記データの配置、を決定することをさらに含む、ストレージ管理方法。 - プロセッサと記憶デバイスとを含み、1以上のコピー機能を有するストレージシステムを管理する、ストレージ管理システムであって、
前記プロセッサは、バックアップ方法を決定するために指定されたデータを特定し、
前記記憶デバイスは、前記ストレージシステムの前記1以上のコピー機能に関するコピー機能管理情報、を記憶し、
前記プロセッサは、前記コピー機能管理情報を参照して、前記1以上のコピー機能のそれぞれのコピー単位を特定し、
前記プロセッサは、前記指定されたデータをバックアップするために使用する前記ストレージシステムのコピー機能と、前記ストレージシステムが提供するボリューム構成における前記指定されたデータの配置と、の組み合わせを、前記コピー機能のコピー単位に応じて決定する、ストレージ管理システム。
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2013521378A JP5728087B2 (ja) | 2011-06-23 | 2011-06-23 | ストレージ管理システム及びストレージ管理方法 |
EP11868067.7A EP2674866A4 (en) | 2011-06-23 | 2011-06-23 | STORAGE ADMINISTRATION SYSTEM AND STORAGE DELIVERY METHOD |
US13/384,960 US8886903B2 (en) | 2011-06-23 | 2011-06-23 | Storage management system and storage management method |
PCT/JP2011/064419 WO2012176307A1 (ja) | 2011-06-23 | 2011-06-23 | ストレージ管理システム及びストレージ管理方法 |
US14/512,664 US9015435B2 (en) | 2011-06-23 | 2014-10-13 | Storage management system and storage management method |
US14/643,623 US9189344B2 (en) | 2011-06-23 | 2015-03-10 | Storage management system and storage management method with backup policy |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2011/064419 WO2012176307A1 (ja) | 2011-06-23 | 2011-06-23 | ストレージ管理システム及びストレージ管理方法 |
Related Child Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/384,960 A-371-Of-International US8886903B2 (en) | 2011-06-23 | 2011-06-23 | Storage management system and storage management method |
US14/512,664 Continuation US9015435B2 (en) | 2011-06-23 | 2014-10-13 | Storage management system and storage management method |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2012176307A1 true WO2012176307A1 (ja) | 2012-12-27 |
Family
ID=47362958
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2011/064419 WO2012176307A1 (ja) | 2011-06-23 | 2011-06-23 | ストレージ管理システム及びストレージ管理方法 |
Country Status (4)
Country | Link |
---|---|
US (3) | US8886903B2 (ja) |
EP (1) | EP2674866A4 (ja) |
JP (1) | JP5728087B2 (ja) |
WO (1) | WO2012176307A1 (ja) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2017076264A (ja) * | 2015-10-15 | 2017-04-20 | 日本電気株式会社 | ファイルアクセスシステム、方法及びプログラム |
WO2020157950A1 (ja) * | 2019-02-01 | 2020-08-06 | 三菱電機株式会社 | 情報処理装置、バックアップ方法、リストア方法およびプログラム |
Families Citing this family (52)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8307177B2 (en) | 2008-09-05 | 2012-11-06 | Commvault Systems, Inc. | Systems and methods for management of virtualization data |
US11449394B2 (en) | 2010-06-04 | 2022-09-20 | Commvault Systems, Inc. | Failover systems and methods for performing backup operations, including heterogeneous indexing and load balancing of backup and indexing resources |
JP5966466B2 (ja) * | 2012-03-14 | 2016-08-10 | 富士通株式会社 | バックアップ制御方法、および情報処理装置 |
US9798627B2 (en) * | 2012-05-25 | 2017-10-24 | Veritas Technologies Llc | Backup image duplication |
US9740702B2 (en) | 2012-12-21 | 2017-08-22 | Commvault Systems, Inc. | Systems and methods to identify unprotected virtual machines |
US9223597B2 (en) | 2012-12-21 | 2015-12-29 | Commvault Systems, Inc. | Archiving virtual machines in a data storage system |
US20140196039A1 (en) | 2013-01-08 | 2014-07-10 | Commvault Systems, Inc. | Virtual machine categorization system and method |
US20140201151A1 (en) | 2013-01-11 | 2014-07-17 | Commvault Systems, Inc. | Systems and methods to select files for restoration from block-level backup for virtual machines |
US20140201157A1 (en) * | 2013-01-11 | 2014-07-17 | Commvault Systems, Inc. | Systems and methods for rule-based virtual machine data protection |
US9286110B2 (en) | 2013-01-14 | 2016-03-15 | Commvault Systems, Inc. | Seamless virtual machine recall in a data storage system |
US11238009B1 (en) * | 2013-03-13 | 2022-02-01 | Veritas Technologies Llc | Techniques for automated policy analysis |
US9164691B1 (en) * | 2013-03-15 | 2015-10-20 | Emc Corporation | Intelligent configuration for snapshot based backups |
US9939981B2 (en) | 2013-09-12 | 2018-04-10 | Commvault Systems, Inc. | File manager integration with virtualization in an information management system with an enhanced storage manager, including user control and storage management of virtual machines |
US9842027B1 (en) * | 2013-12-27 | 2017-12-12 | EMC IP Holding Company LLC | Intelligent application optimized backups |
WO2015116098A1 (en) | 2014-01-30 | 2015-08-06 | Hewlett-Packard Development Company, L.P. | Selecting a backup process for a file system |
US9811427B2 (en) | 2014-04-02 | 2017-11-07 | Commvault Systems, Inc. | Information management by a media agent in the absence of communications with a storage manager |
EP3163447B1 (en) * | 2014-07-15 | 2019-11-06 | Huawei Technologies Co. Ltd. | Data replication method, device and system |
US20160019317A1 (en) | 2014-07-16 | 2016-01-21 | Commvault Systems, Inc. | Volume or virtual machine level backup and generating placeholders for virtual machine files |
US9417968B2 (en) | 2014-09-22 | 2016-08-16 | Commvault Systems, Inc. | Efficiently restoring execution of a backed up virtual machine based on coordination with virtual-machine-file-relocation operations |
US9710465B2 (en) | 2014-09-22 | 2017-07-18 | Commvault Systems, Inc. | Efficiently restoring execution of a backed up virtual machine based on coordination with virtual-machine-file-relocation operations |
US9436555B2 (en) | 2014-09-22 | 2016-09-06 | Commvault Systems, Inc. | Efficient live-mount of a backed up virtual machine in a storage management system |
US10776209B2 (en) | 2014-11-10 | 2020-09-15 | Commvault Systems, Inc. | Cross-platform virtual machine backup and replication |
US9983936B2 (en) | 2014-11-20 | 2018-05-29 | Commvault Systems, Inc. | Virtual machine change block tracking |
US10565067B2 (en) | 2016-03-09 | 2020-02-18 | Commvault Systems, Inc. | Virtual server cloud file system for virtual machine backup from cloud operations |
US10839852B2 (en) | 2016-09-21 | 2020-11-17 | International Business Machines Corporation | Log snapshot control on an automated data storage library |
US10782890B2 (en) * | 2016-09-21 | 2020-09-22 | International Business Machines Corporation | Log snapshot procedure control on an automated data storage library |
US10417102B2 (en) | 2016-09-30 | 2019-09-17 | Commvault Systems, Inc. | Heartbeat monitoring of virtual machines for initiating failover operations in a data storage management system, including virtual machine distribution logic |
US10152251B2 (en) | 2016-10-25 | 2018-12-11 | Commvault Systems, Inc. | Targeted backup of virtual machine |
US10162528B2 (en) | 2016-10-25 | 2018-12-25 | Commvault Systems, Inc. | Targeted snapshot based on virtual machine location |
US10678758B2 (en) | 2016-11-21 | 2020-06-09 | Commvault Systems, Inc. | Cross-platform virtual machine data and memory backup and replication |
US20180276085A1 (en) | 2017-03-24 | 2018-09-27 | Commvault Systems, Inc. | Virtual machine recovery point generation |
US10387073B2 (en) | 2017-03-29 | 2019-08-20 | Commvault Systems, Inc. | External dynamic virtual machine synchronization |
US11074018B2 (en) * | 2017-04-06 | 2021-07-27 | International Business Machines Corporation | Network asset management |
US10866750B2 (en) | 2018-01-10 | 2020-12-15 | EMC IP Holding Company LLC | System and method for predicting data storage characteristics |
US11082492B2 (en) | 2018-01-10 | 2021-08-03 | EMC IP Holding Company LLC | System and method for dynamic backup sessions |
US10671311B1 (en) | 2018-01-10 | 2020-06-02 | EMC IP Holding Company LLC | System and method for dynamic data migration |
US10757188B1 (en) | 2018-01-10 | 2020-08-25 | EMC IP Holding Company LLC | System and method for efficient data access for restores |
US10877928B2 (en) | 2018-03-07 | 2020-12-29 | Commvault Systems, Inc. | Using utilities injected into cloud-based virtual machines for speeding up virtual machine backup operations |
US10572349B2 (en) | 2018-04-27 | 2020-02-25 | EMC IP Holding Company LLC | System and method for backup in a virtualized environment |
US10698719B2 (en) | 2018-04-27 | 2020-06-30 | EMC IP Holding Company LLC | System and method for virtual machine restoration |
US11150998B2 (en) * | 2018-06-29 | 2021-10-19 | EMC IP Holding Company LLC | Redefining backup SLOs for effective restore |
US11200124B2 (en) | 2018-12-06 | 2021-12-14 | Commvault Systems, Inc. | Assigning backup resources based on failover of partnered data storage servers in a data storage management system |
US10996974B2 (en) | 2019-01-30 | 2021-05-04 | Commvault Systems, Inc. | Cross-hypervisor live mount of backed up virtual machine data, including management of cache storage for virtual machine data |
US10768971B2 (en) | 2019-01-30 | 2020-09-08 | Commvault Systems, Inc. | Cross-hypervisor live mount of backed up virtual machine data |
US11169728B2 (en) * | 2019-09-10 | 2021-11-09 | Western Digital Technologies, Inc. | Replication configuration for multiple heterogeneous data stores |
US11467753B2 (en) | 2020-02-14 | 2022-10-11 | Commvault Systems, Inc. | On-demand restore of virtual machine data |
CN113378184B (zh) * | 2020-02-25 | 2024-05-28 | 伊姆西Ip控股有限责任公司 | 用于数据保护的方法、设备和计算机程序产品 |
US11442768B2 (en) | 2020-03-12 | 2022-09-13 | Commvault Systems, Inc. | Cross-hypervisor live recovery of virtual machines |
US11099956B1 (en) | 2020-03-26 | 2021-08-24 | Commvault Systems, Inc. | Snapshot-based disaster recovery orchestration of virtual machine failover and failback operations |
US11500669B2 (en) | 2020-05-15 | 2022-11-15 | Commvault Systems, Inc. | Live recovery of virtual machines in a public cloud computing environment |
CN114265721A (zh) * | 2020-09-16 | 2022-04-01 | 伊姆西Ip控股有限责任公司 | 选择备份目的地的方法、电子设备和计算机程序产品 |
US11656951B2 (en) | 2020-10-28 | 2023-05-23 | Commvault Systems, Inc. | Data loss vulnerability detection |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7120769B2 (en) | 2004-03-08 | 2006-10-10 | Hitachi, Ltd. | Point in time remote copy for multiple sites |
JP2008033585A (ja) * | 2006-07-28 | 2008-02-14 | Nec Corp | 差分バックアップシステム、差分バックアップ方法、差分バックアップ装置及び差分バックアッププログラム |
JP2009533777A (ja) * | 2006-04-17 | 2009-09-17 | マイクロソフト コーポレーション | 仮想マシンのホストレベルのアプリケーション整合バックアップの作成 |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4411929B2 (ja) * | 2003-02-28 | 2010-02-10 | 株式会社日立製作所 | バックアップ方法、システム、及びプログラム |
US20080155215A1 (en) * | 2005-01-21 | 2008-06-26 | Natsume Matsuzaki | Backup System, Relay Device, Information Terminal, and Backup Device |
JP4671720B2 (ja) * | 2005-03-11 | 2011-04-20 | 株式会社日立製作所 | ストレージシステム及びデータ移動方法 |
US7991972B2 (en) * | 2007-12-06 | 2011-08-02 | International Business Machines Corporation | Determining whether to use a full volume or repository for a logical copy backup space |
JP5172574B2 (ja) | 2008-09-29 | 2013-03-27 | 株式会社日立製作所 | アプリケーションデータのバックアップ構成構築に用いる管理計算機 |
JP5241671B2 (ja) * | 2009-10-05 | 2013-07-17 | 株式会社日立製作所 | 記憶装置のデータ移行制御方法 |
-
2011
- 2011-06-23 WO PCT/JP2011/064419 patent/WO2012176307A1/ja active Application Filing
- 2011-06-23 JP JP2013521378A patent/JP5728087B2/ja not_active Expired - Fee Related
- 2011-06-23 EP EP11868067.7A patent/EP2674866A4/en not_active Withdrawn
- 2011-06-23 US US13/384,960 patent/US8886903B2/en not_active Expired - Fee Related
-
2014
- 2014-10-13 US US14/512,664 patent/US9015435B2/en not_active Expired - Fee Related
-
2015
- 2015-03-10 US US14/643,623 patent/US9189344B2/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7120769B2 (en) | 2004-03-08 | 2006-10-10 | Hitachi, Ltd. | Point in time remote copy for multiple sites |
JP2009533777A (ja) * | 2006-04-17 | 2009-09-17 | マイクロソフト コーポレーション | 仮想マシンのホストレベルのアプリケーション整合バックアップの作成 |
JP2008033585A (ja) * | 2006-07-28 | 2008-02-14 | Nec Corp | 差分バックアップシステム、差分バックアップ方法、差分バックアップ装置及び差分バックアッププログラム |
Non-Patent Citations (1)
Title |
---|
See also references of EP2674866A4 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2017076264A (ja) * | 2015-10-15 | 2017-04-20 | 日本電気株式会社 | ファイルアクセスシステム、方法及びプログラム |
WO2020157950A1 (ja) * | 2019-02-01 | 2020-08-06 | 三菱電機株式会社 | 情報処理装置、バックアップ方法、リストア方法およびプログラム |
JP6762452B1 (ja) * | 2019-02-01 | 2020-09-30 | 三菱電機株式会社 | 情報処理装置、バックアップ方法、リストア方法およびプログラム |
US11281395B2 (en) | 2019-02-01 | 2022-03-22 | Mitsubishi Electric Corporation | Information processing device, backup method, restore method, and program |
Also Published As
Publication number | Publication date |
---|---|
JPWO2012176307A1 (ja) | 2015-02-23 |
EP2674866A4 (en) | 2015-03-18 |
US8886903B2 (en) | 2014-11-11 |
EP2674866A1 (en) | 2013-12-18 |
US20150032983A1 (en) | 2015-01-29 |
US9189344B2 (en) | 2015-11-17 |
US20120331248A1 (en) | 2012-12-27 |
US20150186223A1 (en) | 2015-07-02 |
US9015435B2 (en) | 2015-04-21 |
JP5728087B2 (ja) | 2015-06-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5728087B2 (ja) | ストレージ管理システム及びストレージ管理方法 | |
US8122212B2 (en) | Method and apparatus for logical volume management for virtual machine environment | |
JP5478107B2 (ja) | 仮想ストレージ装置を管理する管理サーバ装置及び仮想ストレージ装置の管理方法 | |
JP5183650B2 (ja) | 計算機システム,計算機システムにおけるバックアップ方法及びプログラム | |
US10222983B2 (en) | Storage management computer and management method of storage apparatus | |
US9442809B2 (en) | Management computer used to construct backup configuration of application data | |
US8086808B2 (en) | Method and system for migration between physical and virtual systems | |
US8024536B2 (en) | Method of constructing replication environment and storage system | |
US8448167B2 (en) | Storage system, and remote copy control method therefor | |
US8707004B2 (en) | Computer system and storage consolidation management method | |
US20110145199A1 (en) | System and method of storing backup image catalog | |
US9575858B2 (en) | Dynamic protection of storage resources for disaster recovery | |
US8977825B1 (en) | Techniques for abstract profile definition to support information hiding | |
EP2639698B1 (en) | Backup control program, backup control method, and information processing device | |
US20120246425A1 (en) | Storage system and performance management method of storage system | |
US8543779B2 (en) | Management system and management method for managing computer system | |
JP6069395B2 (ja) | 管理計算機 | |
US20140281210A1 (en) | Dynamic storage device libraries |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 13384960 Country of ref document: US |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 11868067 Country of ref document: EP Kind code of ref document: A1 |
|
REEP | Request for entry into the european phase |
Ref document number: 2011868067 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2011868067 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2013521378 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |