Method and device for protecting snapshot
A technology for protecting devices and snapshots, applied in the field of snapshot protection methods and devices, can solve the problems that production volumes cannot be restored to data, cannot be protected by snapshot data, and are disadvantageous.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0030] Embodiment 1. A snapshot protection method, the process of which is shown in FIG. 3 , including:
[0031] A1. Obtain an instruction to create a snapshot copy for the first snapshot.
[0032] The first snapshot in this embodiment has a general meaning, that is, a data object that stores data in an image manner. The first snapshot can be created directly from the production volume, or it can be a snapshot after the modification operation is performed; and if the created snapshot copy still retains the image-like data structure, that is, it can still be called a "snapshot", then the first A snapshot can also be a copy of another snapshot, which means that a copy of a copy of a snapshot can be instructed to be recreated.
[0033] The same snapshot can be instructed to create a snapshot copy one or more times, and the instruction to create a snapshot copy can be made at the beginning of creation of the first snapshot or at any time after creation. The specific method and t...
Embodiment 2
[0054] Embodiment 2. A snapshot protection method. Compared with the method of creating a snapshot copy by copying data provided in Embodiment 1, the difference is that the snapshot copy is created by copying the mapping table. The process is shown in Figure 5, including :
[0055] B1. Acquire an instruction to create a snapshot copy for the first snapshot.
[0056] For this step, refer to step A1 in Embodiment 1.
[0057] B2. According to the instruction of creating a snapshot copy, copy the mapping table of the first snapshot and create a second snapshot, use the copied mapping table as the mapping table of the second snapshot, and use the second snapshot as a copy of the first snapshot.
[0058] An example of this copy creation method is shown in Figure 6. In Figure 6, the first snapshot saves the data images A, B, C, and D of the production volume at a certain time, and the second snapshot is generated by copying the mapping table of the first snapshot as the second snaps...
Embodiment 3
[0076] Embodiment 3. A snapshot protection method. Compared with the method of creating a snapshot copy by copying data provided in Embodiment 1, the difference is that the snapshot copy is created by copying the mapping table and the resource volume. The process is shown in FIG. 9 display, including:
[0077] C1. Acquire an instruction to create a snapshot copy for the first snapshot.
[0078] For this step, refer to step A1 in Embodiment 1.
[0079] C2. Create a second snapshot by copying the mapping table and resource volume of the first snapshot according to the instructions for creating a snapshot copy, and use the second snapshot as a copy of the first snapshot; the specific steps include:
[0080] C21. Copy the mapping information in the mapping table of the first snapshot;
[0081] C22. Determine whether the address in the copied mapping information points to the resource volume of the first snapshot, if so, execute step C23; if not, continue to execute step C21, and...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 