US20170308554A1 - Auto-determining backup level - Google Patents
Auto-determining backup level Download PDFInfo
- Publication number
- US20170308554A1 US20170308554A1 US15/648,376 US201715648376A US2017308554A1 US 20170308554 A1 US20170308554 A1 US 20170308554A1 US 201715648376 A US201715648376 A US 201715648376A US 2017308554 A1 US2017308554 A1 US 2017308554A1
- Authority
- US
- United States
- Prior art keywords
- backup
- change rate
- steady state
- criterion
- level
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/23—Updating
- G06F16/2308—Concurrency control
-
- G06F17/30289—
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1448—Management of the data involved in backup or backup restore
- G06F11/1451—Management of the data involved in backup or backup restore by selection of backup contents
-
- G06F17/30008—
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
- G06F11/1469—Backup restoration techniques
Definitions
- Traditional backup types are of level ‘full’ (e.g., backing up all data) or ‘incremental’ (e.g., backing up only data that has changed since a previous backup) with additional variations introduced by different backup applications.
- Advanced backup type ‘forever incremental’ e.g., making a first full backup and from then on only making incremental backups
- large change rates since an original full backup result in storage that is very fragmented: data is spread over a large number of discontinuous areas, negatively impacting recovery performance.
- FIG. 1 is a block diagram illustrating an embodiment of a system for auto-determining a backup level.
- FIG. 2 is a flow diagram illustrating an embodiment of a process for determining whether to make a full backup or an incremental backup.
- FIG. 3 is a flow diagram illustrating an embodiment of a process for determining whether steady state values indicate to make a full backup.
- FIG. 4 is a flow diagram illustrating an embodiment of a process for determining whether a backup criterion indicates to make a full backup.
- FIG. 5 is a flow diagram illustrating an embodiment of a process for determining a backup criterion.
- FIG. 6 is a flow diagram illustrating an embodiment of a process for auto-determining a backup level.
- the invention can be implemented in numerous ways, including as a process; an apparatus; a system; a composition of matter; a computer program product embodied on a computer readable storage medium; and/or a processor, such as a processor configured to execute instructions stored on and/or provided by a memory coupled to the processor.
- these implementations, or any other form that the invention may take, may be referred to as techniques.
- the order of the steps of disclosed processes may be altered within the scope of the invention.
- a component such as a processor or a memory described as being configured to perform a task may be implemented as a general component that is temporarily configured to perform the task at a given time or a specific component that is manufactured to perform the task.
- the term ‘processor’ refers to one or more devices, circuits, and/or processing cores configured to process data, such as computer program instructions.
- a system for auto-determining a backup level comprises an input interface and a processor.
- the input interface is configured to receive backup information.
- the processor is configured to determine whether a backup criterion is satisfied, based at least in part on the backup information, and in the event the backup criterion is satisfied, change the backup level.
- the system for auto-determining a backup level additionally comprises a memory coupled to the processor and configured to provide the processor with instructions.
- a backup system comprises a client system (e.g., a system that requires backup up) and a backup storage system (e.g., a system for storing backup data).
- the system performs both full backups (e.g., copying all data from the client system to the backup storage system) and incremental backups (e.g., copying only data that has changed since the last backup from the client system to the storage system).
- full backups e.g., copying all data from the client system to the backup storage system
- incremental backups e.g., copying only data that has changed since the last backup from the client system to the storage system.
- Incremental backups consume significantly fewer resources and storage space than full backups, however, they complicate the process of disaster recovery.
- Each incremental backup increases the fragmentation of the data stored on the backup storage system (e.g., rather than the backup data being stored in a continuous region of the storage system as in a full backup, it is stored in many small regions scattered throughout the storage system) and lengthens the time necessary to perform a recovery. It is therefore necessary to perform a full backup periodically.
- the system for auto-determining a backup level determines if a particular backup operation should be a full backup or an incremental backup.
- the system for auto-determining a backup level determines that a backup operation should be a full backup if steady state values indicate to make a full backup or if a backup criterion indicates to make a full backup.
- the steady state values comprise values of system variables that are not expected to change under normal operation of the system (e.g., operating system version, version of a database, etc.). If more than a threshold number of steady state values have changed, it is taken by the system as an indication that a major modification to the system has occurred, and a full backup is then required to ease restoration due to significant number of changes leading to fragmentation of the backup.
- the backup criterion comprises one or more of the following: a file change rate criterion, a data change rate criterion, a fragmentation level criterion, or a criterion designed to determine when enough changes have occurred since the last full backup so that another one is required, or any other appropriate criterion.
- FIG. 1 is a block diagram illustrating an embodiment of a system for auto-determining a backup level.
- network 100 comprises one or more of the following: a local area network, a wide area network, a wired network, a wireless network, the Internet, an intranet, a storage area network, or any other appropriate communication network.
- client system 106 comprises a client system (e.g., a computing system for operation by a user).
- client system 106 comprises a system accessed by a user directly (e.g., the user is in proximity with client system 106 ).
- client system 106 comprises a system accessed by a user remotely (e.g., the user is not in proximity with client system 106 , and accesses client system 106 via network 100 and a separate user system).
- Client system 106 comprises a system running enterprise software (e.g., business software for creating data, storing data, transmitting data, receiving data, etc.).
- client system 106 comprises a system for storing data on a backup system or retrieving stored data from a backup system.
- Backup storage system 102 comprises a computer system for backing up data. Backup system 102 backs up data stored on client system 106 .
- backup system 102 performs full backups of the data on client system 106 (e.g., makes complete copies of the data), performs incremental backups of the data on client system 106 (e.g., makes copies of data modified since the last backup), performs a combination of full and incremental backups of the data on client system 106 , or performs any other appropriate kind of backup.
- data stored on backup system 102 comprises deduplicated backup data (e.g., data is stored in such a way that multiple copies of the same data are only stored a single time).
- deduplicated backup data is segmented (e.g., broken into chunks which can then be compared to determine duplicate data).
- deduplicated backup data is segmented using a hash function (e.g., a hash function is used to determine where to divide data into segments).
- a hash function e.g., a hash function is used to determine where to divide data into segments.
- Backup server system 104 comprises a server system for controlling backup storage system 102 and client system 106 .
- backup server system 104 issues commands to backup storage system 102 and client system 106 , reads status information from backup storage system 102 and client system 106 , determines response times of backup storage system 102 and client system 106 , or performs any other backup server system action.
- backup server system 104 is operated by a system administrator (e.g., an administrator maintaining the network backup system). In some embodiments, backup server system 104 is accessed by a system administrator using an external management console communicating with backup server system 104 via network 100 . In some embodiments, a system administrator using an external management console can access multiple backup server systems on multiple networked backup systems.
- FIG. 2 is a flow diagram illustrating an embodiment of a process for determining whether to make a full backup or an incremental backup.
- the backup comprises backing up data on a client system (e.g., client system 106 of FIG. 1 ) to a backup storage system (e.g., backup storage system 102 of FIG. 1 ).
- a full backup comprises backing up all designated data on the client system to the backup storage system.
- An incremental backup comprises backing up only data on the client system that has changed in the designated data set since a previous backup (full or incremental) to the backup storage system.
- the process of FIG. 2 is performed by the client system, e.g., to determine whether it should send all of its data to the backup storage system.
- the process of FIG. 2 is performed by the backup storage system, e.g., to determine whether it should request the client system to send all of its data.
- the process of FIG. 2 is performed by the backup server system, e.g., to determine whether it should indicate to the client system to send all of its data to the backup storage system.
- the process of FIG. 2 is performed in response to a determination that it is time to back up data.
- a determination that it is time to back up data is made according to a calendar, by determining an amount of time since the last backup, by determining an amount of data modified since the last backup, by determining a number of files modified since the last backup, by determining a number of blocks modified since the last backup, or according to any other appropriate criteria.
- a determination that it is time to back up data is made by the client system, by the backup storage system, by the backup server system, or by any other appropriate system.
- steady-state values comprise values of system state (e.g., operating system version, amount of memory, hard drive size, etc.) that are not expected to change under normal routine operation of the system.
- the steady-state values indicate to make a full backup if more than a threshold number of them have changed (e.g., there has been a major change to the system). If it is determined in 202 that the steady-state values indicate to make a full backup, control passes to 202 .
- a full backup is made, and the process ends.
- the making of the full backup comprises performing a full backup by storing a copy of all files designated to be backed up on a backup storage system or storage location. If it is determined in 202 that the steady-state values do not indicate to make a full backup, control passes to 204 .
- a backup criterion indicates to make a full backup.
- a backup criterion comprises a file change rate, a data change rate, a fragmentation level, or any other appropriate backup criterion. If it is determined in 204 that the backup criterion indicates to make a full backup, control passes to 202 .
- an incremental backup is made.
- the making of the incremental backup comprises performing an incremental backup by storing a copy of changed files since a last incremental or full backup that were designated to be backed up on a backup storage system or storage location.
- FIG. 3 is a flow diagram illustrating an embodiment of a process for determining whether steady state values indicate to make a full backup.
- the process of FIG. 3 implements 200 of FIG. 2 .
- values of system variables are determined.
- system variables comprise operating system version, hard drive size, memory size, or any other appropriate system variables.
- the values of the system variables are compared to predetermined steady state values.
- each system variable has an associated stored value that it is compared with.
- comparing the values of system variables to predetermined steady state values comprises determining if the system variables are equal to the predetermined steady state values.
- a predetermined steady state value additionally comprises a comparison operator (e.g., less than, greater than or equal to, etc.), and comparing the value of the system variable to the predetermined steady state value is performed according to the comparison operator.
- a comparison operator e.g., less than, greater than or equal to, etc.
- reporting that the steady state variables indicate to make a full backup comprises changing the backup level to a full backup level (e.g., or not an incremental level)—for example, indicating that using a message to or indicator to indicate that a full backup level is designated. If it is determined in 304 that more than a threshold number of system variables have not changed from the steady state values, control passes to 308 . In 308 , it is reported (e.g., to the process of FIG. 2 ) that the steady state values do not indicate to make a full backup.
- a full backup level e.g., or not an incremental level
- reporting that the steady state variables indicate to not make a full backup comprises changing the backup level to an incremental backup level—for example, indicating that using a message to or indicator to indicate that an incremental backup level is designated.
- FIG. 4 is a flow diagram illustrating an embodiment of a process for determining whether a backup criterion indicates to make a full backup.
- the process of FIG. 4 implements 204 of FIG. 2 .
- a backup criterion is determined.
- a backup criterion comprises a file change rate, a data change rate, a fragmentation level, or any other appropriate backup criterion.
- a backup criterion comprises multiple backup criteria joined by Boolean conjunctions (e.g., ‘AND’, ‘OR’, ‘NAND’, ‘NOR’, ‘XOR’, ‘NOT’, etc.).
- determining whether a backup criterion is satisfied comprises comparing the backup criterion with a threshold.
- the data change rate threshold comprises 10% (e.g., 10% of stored data, e.g., the sum of modified files or blocks, has changed since the last full backup), 30%, 50%, 75%, or any other appropriate data change rate threshold.
- the file change rate threshold comprises 10% (e.g., 10% of files have changed since the last full backup), 20%, 30%, 50%, 60%, or any other appropriate file change rate threshold.
- the fragmentation level threshold comprises 10 GB (e.g., an average fragment size, e.g., the full backup size divided by the number of data discontinuities, is less than 10 GB or a number of fragments per a unit of data (e.g., 3 per 10 GB)), 5 GB, 1 GB, 500 MB, or any other appropriate fragmentation level threshold.
- control passes to 404 .
- reporting that the backup criterion indicates to make a full backup comprises changing the backup level (e.g., or to not make an incremental backup).
- control passes to 406 .
- reporting that the backup criterion indicates not to make a full backup comprises changing the backup level (e.g., or to make a full backup).
- FIG. 5 is a flow diagram illustrating an embodiment of a process for determining a backup criterion.
- the process of FIG. 5 implements 400 of FIG. 4 .
- 500 it is determined whether the backup is a block-based backup.
- it is determined whether the backup is a block-based backup by querying the backup software, by checking system settings, by querying the backup storage system, or in any other appropriate way. If it is determined in 500 that the backup is a block-based backup, control passes to 502 . In 502 , it is reported (e.g., to the process of FIG. 4 ) that the backup criterion is fragmentation level, and the process ends.
- reporting that the backup criterion is fragmentation level comprises indicating that the backup criterion comprises using a fragmentation level.
- control passes to 504 .
- the file density is determined by dividing the number of files to back up by total number of files in a full backup (e.g., as determined by a previous backup or a current backup file count).
- the number of files is determined by counting the files on the client system, by counting the files on a backup storage system, by querying a backup storage system catalog, or in any other appropriate way.
- the file density threshold comprises 1/GB, 10/GB, 100/GB, 1000/GB, 10000/GB, 100000/GB, or any other appropriate file density threshold. If it is determined in 504 that the file density is above the file density threshold, control passes to 506 . In 506 , it is reported (e.g., to the process of FIG. 4 ) that the backup criterion is a file change rate, and the process ends. For example, reporting that the backup criterion is a file change rate comprises indicating that the backup criterion comprises using a file change rate. If it is determined in 504 that the file density is not above a file density threshold, control passes to 508 .
- reporting that the backup criterion is data change rate comprises indicating that the backup criterion comprises a size of all modified files or blocks divided by the size of the complete backup.
- FIG. 6 is a flow diagram illustrating an embodiment of a process for auto-determining a backup level.
- backup information is received.
- backup information comprises values of system variables, a file change rate, a data change rate, a fragmentation level, threshold values, or any other appropriate backup information.
- it is determined whether a backup criterion is satisfied based at least in part on the backup information.
- the backup level is changed.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Quality & Reliability (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Description
- This application is a continuation of co-pending U.S. patent application Ser. No. 14/138,520 entitled AUTO-DETERMINING BACKUP LEVEL filed Dec. 23, 2013 which is incorporated herein by reference for all purposes.
- Traditional backup types are of level ‘full’ (e.g., backing up all data) or ‘incremental’ (e.g., backing up only data that has changed since a previous backup) with additional variations introduced by different backup applications. Advanced backup type ‘forever incremental’ (e.g., making a first full backup and from then on only making incremental backups) synthesizes a full backup on the server-side by combining a previous full with later incremental backups. However, large change rates since an original full backup result in storage that is very fragmented: data is spread over a large number of discontinuous areas, negatively impacting recovery performance.
- Various embodiments of the invention are disclosed in the following detailed description and the accompanying drawings.
-
FIG. 1 is a block diagram illustrating an embodiment of a system for auto-determining a backup level. -
FIG. 2 is a flow diagram illustrating an embodiment of a process for determining whether to make a full backup or an incremental backup. -
FIG. 3 is a flow diagram illustrating an embodiment of a process for determining whether steady state values indicate to make a full backup. -
FIG. 4 is a flow diagram illustrating an embodiment of a process for determining whether a backup criterion indicates to make a full backup. -
FIG. 5 is a flow diagram illustrating an embodiment of a process for determining a backup criterion. -
FIG. 6 is a flow diagram illustrating an embodiment of a process for auto-determining a backup level. - The invention can be implemented in numerous ways, including as a process; an apparatus; a system; a composition of matter; a computer program product embodied on a computer readable storage medium; and/or a processor, such as a processor configured to execute instructions stored on and/or provided by a memory coupled to the processor. In this specification, these implementations, or any other form that the invention may take, may be referred to as techniques. In general, the order of the steps of disclosed processes may be altered within the scope of the invention. Unless stated otherwise, a component such as a processor or a memory described as being configured to perform a task may be implemented as a general component that is temporarily configured to perform the task at a given time or a specific component that is manufactured to perform the task. As used herein, the term ‘processor’ refers to one or more devices, circuits, and/or processing cores configured to process data, such as computer program instructions.
- A detailed description of one or more embodiments of the invention is provided below along with accompanying figures that illustrate the principles of the invention. The invention is described in connection with such embodiments, but the invention is not limited to any embodiment. The scope of the invention is limited only by the claims and the invention encompasses numerous alternatives, modifications and equivalents. Numerous specific details are set forth in the following description in order to provide a thorough understanding of the invention. These details are provided for the purpose of example and the invention may be practiced according to the claims without some or all of these specific details. For the purpose of clarity, technical material that is known in the technical fields related to the invention has not been described in detail so that the invention is not unnecessarily obscured.
- A system for auto-determining a backup level is disclosed. A system for auto-determining a backup level comprises an input interface and a processor. The input interface is configured to receive backup information. The processor is configured to determine whether a backup criterion is satisfied, based at least in part on the backup information, and in the event the backup criterion is satisfied, change the backup level. The system for auto-determining a backup level additionally comprises a memory coupled to the processor and configured to provide the processor with instructions.
- In some embodiments, a backup system comprises a client system (e.g., a system that requires backup up) and a backup storage system (e.g., a system for storing backup data). The system performs both full backups (e.g., copying all data from the client system to the backup storage system) and incremental backups (e.g., copying only data that has changed since the last backup from the client system to the storage system). Incremental backups consume significantly fewer resources and storage space than full backups, however, they complicate the process of disaster recovery. Each incremental backup increases the fragmentation of the data stored on the backup storage system (e.g., rather than the backup data being stored in a continuous region of the storage system as in a full backup, it is stored in many small regions scattered throughout the storage system) and lengthens the time necessary to perform a recovery. It is therefore necessary to perform a full backup periodically. The system for auto-determining a backup level determines if a particular backup operation should be a full backup or an incremental backup.
- In some embodiments, the system for auto-determining a backup level determines that a backup operation should be a full backup if steady state values indicate to make a full backup or if a backup criterion indicates to make a full backup. The steady state values comprise values of system variables that are not expected to change under normal operation of the system (e.g., operating system version, version of a database, etc.). If more than a threshold number of steady state values have changed, it is taken by the system as an indication that a major modification to the system has occurred, and a full backup is then required to ease restoration due to significant number of changes leading to fragmentation of the backup. The backup criterion comprises one or more of the following: a file change rate criterion, a data change rate criterion, a fragmentation level criterion, or a criterion designed to determine when enough changes have occurred since the last full backup so that another one is required, or any other appropriate criterion.
-
FIG. 1 is a block diagram illustrating an embodiment of a system for auto-determining a backup level. In the example shown,FIG. 1 comprisesnetwork 100. In various embodiments,network 100 comprises one or more of the following: a local area network, a wide area network, a wired network, a wireless network, the Internet, an intranet, a storage area network, or any other appropriate communication network. In the example shown,client system 106 comprises a client system (e.g., a computing system for operation by a user). In some embodiments,client system 106 comprises a system accessed by a user directly (e.g., the user is in proximity with client system 106). In some embodiments,client system 106 comprises a system accessed by a user remotely (e.g., the user is not in proximity withclient system 106, andaccesses client system 106 vianetwork 100 and a separate user system).Client system 106 comprises a system running enterprise software (e.g., business software for creating data, storing data, transmitting data, receiving data, etc.). In some embodiments,client system 106 comprises a system for storing data on a backup system or retrieving stored data from a backup system. In various embodiments, there are 1, 4, 17, 22, 1459, or any other appropriate number of client systems communicating withnetwork 100.Backup storage system 102 comprises a computer system for backing up data.Backup system 102 backs up data stored onclient system 106. In various embodiments,backup system 102 performs full backups of the data on client system 106 (e.g., makes complete copies of the data), performs incremental backups of the data on client system 106 (e.g., makes copies of data modified since the last backup), performs a combination of full and incremental backups of the data onclient system 106, or performs any other appropriate kind of backup. In some embodiments, data stored onbackup system 102 comprises deduplicated backup data (e.g., data is stored in such a way that multiple copies of the same data are only stored a single time). In some embodiments, deduplicated backup data is segmented (e.g., broken into chunks which can then be compared to determine duplicate data). In some embodiments, deduplicated backup data is segmented using a hash function (e.g., a hash function is used to determine where to divide data into segments). In various embodiments, there are 1, 2, 7, 12, 45, 138, or any other appropriate number of backup storage systems communicating withnetwork 100.Backup server system 104 comprises a server system for controllingbackup storage system 102 andclient system 106. In various embodiments,backup server system 104 issues commands tobackup storage system 102 andclient system 106, reads status information frombackup storage system 102 andclient system 106, determines response times ofbackup storage system 102 andclient system 106, or performs any other backup server system action. In some embodiments,backup server system 104 is operated by a system administrator (e.g., an administrator maintaining the network backup system). In some embodiments,backup server system 104 is accessed by a system administrator using an external management console communicating withbackup server system 104 vianetwork 100. In some embodiments, a system administrator using an external management console can access multiple backup server systems on multiple networked backup systems. -
FIG. 2 is a flow diagram illustrating an embodiment of a process for determining whether to make a full backup or an incremental backup. In some embodiments, the backup comprises backing up data on a client system (e.g.,client system 106 ofFIG. 1 ) to a backup storage system (e.g.,backup storage system 102 ofFIG. 1 ). A full backup comprises backing up all designated data on the client system to the backup storage system. An incremental backup comprises backing up only data on the client system that has changed in the designated data set since a previous backup (full or incremental) to the backup storage system. In some embodiments, the process ofFIG. 2 is performed by the client system, e.g., to determine whether it should send all of its data to the backup storage system. In some embodiments, the process ofFIG. 2 is performed by the backup storage system, e.g., to determine whether it should request the client system to send all of its data. In some embodiments, the process ofFIG. 2 is performed by the backup server system, e.g., to determine whether it should indicate to the client system to send all of its data to the backup storage system. In some embodiments, the process ofFIG. 2 is performed in response to a determination that it is time to back up data. In various embodiments, a determination that it is time to back up data is made according to a calendar, by determining an amount of time since the last backup, by determining an amount of data modified since the last backup, by determining a number of files modified since the last backup, by determining a number of blocks modified since the last backup, or according to any other appropriate criteria. In various embodiments, a determination that it is time to back up data is made by the client system, by the backup storage system, by the backup server system, or by any other appropriate system. In the example shown, in 200, it is determined whether steady-state values indicate to make a full backup. In some embodiments, steady-state values comprise values of system state (e.g., operating system version, amount of memory, hard drive size, etc.) that are not expected to change under normal routine operation of the system. In some embodiments, the steady-state values indicate to make a full backup if more than a threshold number of them have changed (e.g., there has been a major change to the system). If it is determined in 202 that the steady-state values indicate to make a full backup, control passes to 202. In 202, a full backup is made, and the process ends. In some embodiments, the making of the full backup comprises performing a full backup by storing a copy of all files designated to be backed up on a backup storage system or storage location. If it is determined in 202 that the steady-state values do not indicate to make a full backup, control passes to 204. In 204, it is determined whether a backup criterion indicates to make a full backup. In various embodiments, a backup criterion comprises a file change rate, a data change rate, a fragmentation level, or any other appropriate backup criterion. If it is determined in 204 that the backup criterion indicates to make a full backup, control passes to 202. If it is determined in 204 that the backup criterion does not indicate to make a full backup, control passes to 206. In 206, an incremental backup is made. In some embodiments, the making of the incremental backup comprises performing an incremental backup by storing a copy of changed files since a last incremental or full backup that were designated to be backed up on a backup storage system or storage location. -
FIG. 3 is a flow diagram illustrating an embodiment of a process for determining whether steady state values indicate to make a full backup. In some embodiments, the process ofFIG. 3 implements 200 ofFIG. 2 . In the example shown, in 300, values of system variables are determined. In various embodiments, system variables comprise operating system version, hard drive size, memory size, or any other appropriate system variables. In 302, the values of the system variables are compared to predetermined steady state values. In some embodiments, each system variable has an associated stored value that it is compared with. In some embodiments, comparing the values of system variables to predetermined steady state values comprises determining if the system variables are equal to the predetermined steady state values. In some embodiments, a predetermined steady state value additionally comprises a comparison operator (e.g., less than, greater than or equal to, etc.), and comparing the value of the system variable to the predetermined steady state value is performed according to the comparison operator. In 304, it is determined whether more than a threshold number of system variables have changed from their steady state values. In some embodiments, it is determined whether more than a threshold number of system variables do not satisfy their stored comparison. If it is determined in 304 that more than a threshold number of system variables have changed from their steady state values, control passes to 306. In 306, it is reported (e.g., to the process ofFIG. 2 ) that the steady state variables indicate to make a full backup, and the process ends. In some embodiments, reporting that the steady state variables indicate to make a full backup comprises changing the backup level to a full backup level (e.g., or not an incremental level)—for example, indicating that using a message to or indicator to indicate that a full backup level is designated. If it is determined in 304 that more than a threshold number of system variables have not changed from the steady state values, control passes to 308. In 308, it is reported (e.g., to the process ofFIG. 2 ) that the steady state values do not indicate to make a full backup. In some embodiments, reporting that the steady state variables indicate to not make a full backup (e.g., or to make an incremental backup) comprises changing the backup level to an incremental backup level—for example, indicating that using a message to or indicator to indicate that an incremental backup level is designated. -
FIG. 4 is a flow diagram illustrating an embodiment of a process for determining whether a backup criterion indicates to make a full backup. In some embodiments, the process ofFIG. 4 implements 204 ofFIG. 2 . In the example shown, in 400, a backup criterion is determined. In various embodiments, a backup criterion comprises a file change rate, a data change rate, a fragmentation level, or any other appropriate backup criterion. In some embodiments, a backup criterion comprises multiple backup criteria joined by Boolean conjunctions (e.g., ‘AND’, ‘OR’, ‘NAND’, ‘NOR’, ‘XOR’, ‘NOT’, etc.). In 402 it is determined whether a backup criterion is satisfied. In some embodiments, determining whether a backup criterion is satisfied comprises comparing the backup criterion with a threshold. In various embodiments, in the event the backup criterion comprises a data change rate, the data change rate threshold comprises 10% (e.g., 10% of stored data, e.g., the sum of modified files or blocks, has changed since the last full backup), 30%, 50%, 75%, or any other appropriate data change rate threshold. In various embodiments, in the event the backup criterion comprises a file change rate, the file change rate threshold comprises 10% (e.g., 10% of files have changed since the last full backup), 20%, 30%, 50%, 60%, or any other appropriate file change rate threshold. In various embodiments, in the event the backup criterion comprises a fragmentation level, the fragmentation level threshold comprises 10 GB (e.g., an average fragment size, e.g., the full backup size divided by the number of data discontinuities, is less than 10 GB or a number of fragments per a unit of data (e.g., 3 per 10 GB)), 5 GB, 1 GB, 500 MB, or any other appropriate fragmentation level threshold. In the event it is determined in 402 that the backup criterion is satisfied, control passes to 404. In 404, it is reported (e.g., to the process ofFIG. 2 ) that the backup criterion indicates to make a full backup, and the process ends. In some embodiments, reporting that the backup criterion indicates to make a full backup comprises changing the backup level (e.g., or to not make an incremental backup). In the event it is determined in 402 that the backup criterion is not satisfied, control passes to 406. In 406, it is reported (e.g., to the process ofFIG. 2 ) that the backup criterion indicates not to make a full backup. In some embodiments, reporting that the backup criterion indicates not to make a full backup comprises changing the backup level (e.g., or to make a full backup). -
FIG. 5 is a flow diagram illustrating an embodiment of a process for determining a backup criterion. In some embodiments, the process ofFIG. 5 implements 400 ofFIG. 4 . In the example shown, in 500, it is determined whether the backup is a block-based backup. In various embodiments, it is determined whether the backup is a block-based backup by querying the backup software, by checking system settings, by querying the backup storage system, or in any other appropriate way. If it is determined in 500 that the backup is a block-based backup, control passes to 502. In 502, it is reported (e.g., to the process ofFIG. 4 ) that the backup criterion is fragmentation level, and the process ends. For example, reporting that the backup criterion is fragmentation level comprises indicating that the backup criterion comprises using a fragmentation level. If it is determined in 500 that the backup is not a block-based backup, control passes to 504. In 504 it is determined whether the file density is above a file density threshold. In some embodiments, the file density is determined by dividing the number of files to back up by total number of files in a full backup (e.g., as determined by a previous backup or a current backup file count). In various embodiments, the number of files is determined by counting the files on the client system, by counting the files on a backup storage system, by querying a backup storage system catalog, or in any other appropriate way. In various embodiments, the file density threshold comprises 1/GB, 10/GB, 100/GB, 1000/GB, 10000/GB, 100000/GB, or any other appropriate file density threshold. If it is determined in 504 that the file density is above the file density threshold, control passes to 506. In 506, it is reported (e.g., to the process ofFIG. 4 ) that the backup criterion is a file change rate, and the process ends. For example, reporting that the backup criterion is a file change rate comprises indicating that the backup criterion comprises using a file change rate. If it is determined in 504 that the file density is not above a file density threshold, control passes to 508. In 508, it is reported (e.g., to the process ofFIG. 4 ) that the backup criterion is a data change rate. For example, reporting that the backup criterion is data change rate comprises indicating that the backup criterion comprises a size of all modified files or blocks divided by the size of the complete backup. -
FIG. 6 is a flow diagram illustrating an embodiment of a process for auto-determining a backup level. In the example shown, in 600, backup information is received. In various embodiments, backup information comprises values of system variables, a file change rate, a data change rate, a fragmentation level, threshold values, or any other appropriate backup information. In 602, it is determined whether a backup criterion is satisfied based at least in part on the backup information. In 604, in the event the backup criterion is satisfied, the backup level is changed. - Although the foregoing embodiments have been described in some detail for purposes of clarity of understanding, the invention is not limited to the details provided. There are many alternative ways of implementing the invention. The disclosed embodiments are illustrative and not restrictive.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/648,376 US20170308554A1 (en) | 2013-12-23 | 2017-07-12 | Auto-determining backup level |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/138,520 US9747309B1 (en) | 2013-12-23 | 2013-12-23 | Auto-determining backup level |
US15/648,376 US20170308554A1 (en) | 2013-12-23 | 2017-07-12 | Auto-determining backup level |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/138,520 Continuation US9747309B1 (en) | 2013-12-23 | 2013-12-23 | Auto-determining backup level |
Publications (1)
Publication Number | Publication Date |
---|---|
US20170308554A1 true US20170308554A1 (en) | 2017-10-26 |
Family
ID=59655108
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/138,520 Active 2034-06-22 US9747309B1 (en) | 2013-12-23 | 2013-12-23 | Auto-determining backup level |
US15/648,376 Abandoned US20170308554A1 (en) | 2013-12-23 | 2017-07-12 | Auto-determining backup level |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/138,520 Active 2034-06-22 US9747309B1 (en) | 2013-12-23 | 2013-12-23 | Auto-determining backup level |
Country Status (1)
Country | Link |
---|---|
US (2) | US9747309B1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190163370A1 (en) * | 2017-11-28 | 2019-05-30 | International Business Machines Corporation | Data replication based on data-driven recovery objectives |
US20220283902A1 (en) * | 2021-03-05 | 2022-09-08 | EMC IP Holding Company LLC | Writing data blocks directly to object storage |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9645888B1 (en) * | 2014-06-02 | 2017-05-09 | EMC IP Holding Company LLC | Caching of backup chunks |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5778165A (en) * | 1995-10-20 | 1998-07-07 | Digital Equipment Corporation | Variable-level backup scheduling method and apparatus |
US7509468B1 (en) * | 2006-02-02 | 2009-03-24 | Symantec Operating Corporation | Policy-based data protection |
US20110231172A1 (en) * | 2010-03-21 | 2011-09-22 | Stephen Gold | Determining impact of virtual storage backup jobs |
US20120089572A1 (en) * | 2010-10-06 | 2012-04-12 | International Business Machines Corporation | Automated and self-adjusting data protection driven by business and data activity events |
US8260750B1 (en) * | 2009-03-16 | 2012-09-04 | Quest Software, Inc. | Intelligent backup escalation system |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3856855B2 (en) * | 1995-10-06 | 2006-12-13 | 三菱電機株式会社 | Differential backup method |
US20030177149A1 (en) * | 2002-03-18 | 2003-09-18 | Coombs David Lawrence | System and method for data backup |
US7536424B2 (en) * | 2004-05-02 | 2009-05-19 | Yoram Barzilai | System and methods for efficiently managing incremental data backup revisions |
US20060059384A1 (en) * | 2004-08-16 | 2006-03-16 | Fabrice Helliker | Full backup from incremental /differential backups |
US8117410B2 (en) * | 2008-08-25 | 2012-02-14 | Vmware, Inc. | Tracking block-level changes using snapshots |
FR2952121B1 (en) * | 2009-10-29 | 2011-12-23 | Snecma | DEVICE FOR THE MECHANICAL DRIVE OF THE HIGH PRESSURE BODY OF AN AIRCRAFT ENGINE |
US8341122B2 (en) * | 2009-12-22 | 2012-12-25 | International Business Machines Corporation | Restore of full system backup and incremental backups using multiple simultaneous device streams |
US9298563B2 (en) * | 2010-06-01 | 2016-03-29 | Hewlett Packard Enterprise Development Lp | Changing a number of disk agents to backup objects to a storage device |
US9507670B2 (en) * | 2010-06-14 | 2016-11-29 | Veeam Software Ag | Selective processing of file system objects for image level backups |
JP5630190B2 (en) * | 2010-10-06 | 2014-11-26 | 富士通株式会社 | Update management apparatus, update management method, and update management program |
US9075754B1 (en) * | 2011-12-31 | 2015-07-07 | Emc Corporation | Managing cache backup and restore |
US9021222B1 (en) * | 2012-03-28 | 2015-04-28 | Lenovoemc Limited | Managing incremental cache backup and restore |
US20140201162A1 (en) * | 2013-01-11 | 2014-07-17 | Commvault Systems, Inc. | Systems and methods to restore selected files from block-level backup for virtual machines |
US20150370645A1 (en) * | 2013-02-27 | 2015-12-24 | Hewlett-Packard Development Company, L.P. | Selecting a backup type based on changed data |
-
2013
- 2013-12-23 US US14/138,520 patent/US9747309B1/en active Active
-
2017
- 2017-07-12 US US15/648,376 patent/US20170308554A1/en not_active Abandoned
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5778165A (en) * | 1995-10-20 | 1998-07-07 | Digital Equipment Corporation | Variable-level backup scheduling method and apparatus |
US7509468B1 (en) * | 2006-02-02 | 2009-03-24 | Symantec Operating Corporation | Policy-based data protection |
US8260750B1 (en) * | 2009-03-16 | 2012-09-04 | Quest Software, Inc. | Intelligent backup escalation system |
US20110231172A1 (en) * | 2010-03-21 | 2011-09-22 | Stephen Gold | Determining impact of virtual storage backup jobs |
US20120089572A1 (en) * | 2010-10-06 | 2012-04-12 | International Business Machines Corporation | Automated and self-adjusting data protection driven by business and data activity events |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190163370A1 (en) * | 2017-11-28 | 2019-05-30 | International Business Machines Corporation | Data replication based on data-driven recovery objectives |
US20220283902A1 (en) * | 2021-03-05 | 2022-09-08 | EMC IP Holding Company LLC | Writing data blocks directly to object storage |
Also Published As
Publication number | Publication date |
---|---|
US9747309B1 (en) | 2017-08-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10078459B1 (en) | Ransomware detection using I/O patterns | |
US10467246B2 (en) | Content-based replication of data in scale out system | |
US10460124B2 (en) | Per-volume tenant encryption and external key manager | |
US10949405B2 (en) | Data deduplication device, data deduplication method, and data deduplication program | |
US10496323B2 (en) | Data protection using change-based measurements in block-based backup | |
US9058298B2 (en) | Integrated approach for deduplicating data in a distributed environment that involves a source and a target | |
US9798627B2 (en) | Backup image duplication | |
US9026679B1 (en) | Methods and apparatus for persisting management information changes | |
US9465695B2 (en) | Efficient backup replication | |
EP3989092A1 (en) | Malicious activity detection and remediation in virtualized file servers | |
US20150142756A1 (en) | Deduplication in distributed file systems | |
US8806062B1 (en) | Adaptive compression using a sampling based heuristic | |
US10346256B1 (en) | Client side cache for deduplication backup systems | |
US10915409B2 (en) | Caching of backup chunks | |
TW201516873A (en) | Backup system and method | |
US20170308554A1 (en) | Auto-determining backup level | |
US11599276B1 (en) | Snapshot shipping to multiple cloud destinations | |
US20170109376A1 (en) | Method for managing data using in-memory database and apparatus thereof | |
US10713216B2 (en) | Using relative generation numbers to deduplicate file system events | |
US11099946B1 (en) | Differential restore using block-based backups | |
US11855868B2 (en) | Reducing the impact of network latency during a restore operation | |
US9977726B2 (en) | System and method for smart framework for network backup software debugging | |
CN117743024A (en) | Restoring backup from remote storage | |
US11726884B2 (en) | Optimized filesystem walk for backup operations | |
CN112685219A (en) | Method, apparatus and computer program product for backing up data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: EMC CORPORATION, MASSACHUSETTS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MANDIC, VLADIMIR;REEL/FRAME:042991/0392 Effective date: 20140211 Owner name: EMC IP HOLDING COMPANY LLC, MASSACHUSETTS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:EMC CORPORATION;REEL/FRAME:043177/0180 Effective date: 20160906 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
AS | Assignment |
Owner name: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENT, NORTH CAROLINA Free format text: PATENT SECURITY AGREEMENT (CREDIT);ASSIGNORS:DELL PRODUCTS L.P.;EMC CORPORATION;EMC IP HOLDING COMPANY LLC;REEL/FRAME:043772/0750 Effective date: 20170829 Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS COLLATERAL AGENT, TEXAS Free format text: PATENT SECURITY AGREEMENT (NOTES);ASSIGNORS:DELL PRODUCTS L.P.;EMC CORPORATION;EMC IP HOLDING COMPANY LLC;REEL/FRAME:043775/0082 Effective date: 20170829 Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., A Free format text: PATENT SECURITY AGREEMENT (NOTES);ASSIGNORS:DELL PRODUCTS L.P.;EMC CORPORATION;EMC IP HOLDING COMPANY LLC;REEL/FRAME:043775/0082 Effective date: 20170829 Owner name: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLAT Free format text: PATENT SECURITY AGREEMENT (CREDIT);ASSIGNORS:DELL PRODUCTS L.P.;EMC CORPORATION;EMC IP HOLDING COMPANY LLC;REEL/FRAME:043772/0750 Effective date: 20170829 |
|
AS | Assignment |
Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., T Free format text: SECURITY AGREEMENT;ASSIGNORS:CREDANT TECHNOLOGIES, INC.;DELL INTERNATIONAL L.L.C.;DELL MARKETING L.P.;AND OTHERS;REEL/FRAME:049452/0223 Effective date: 20190320 Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., TEXAS Free format text: SECURITY AGREEMENT;ASSIGNORS:CREDANT TECHNOLOGIES, INC.;DELL INTERNATIONAL L.L.C.;DELL MARKETING L.P.;AND OTHERS;REEL/FRAME:049452/0223 Effective date: 20190320 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
AS | Assignment |
Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., TEXAS Free format text: SECURITY AGREEMENT;ASSIGNORS:CREDANT TECHNOLOGIES INC.;DELL INTERNATIONAL L.L.C.;DELL MARKETING L.P.;AND OTHERS;REEL/FRAME:053546/0001 Effective date: 20200409 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |
|
AS | Assignment |
Owner name: EMC IP HOLDING COMPANY LLC, TEXAS Free format text: RELEASE OF SECURITY INTEREST AT REEL 043772 FRAME 0750;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058298/0606 Effective date: 20211101 Owner name: EMC CORPORATION, MASSACHUSETTS Free format text: RELEASE OF SECURITY INTEREST AT REEL 043772 FRAME 0750;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058298/0606 Effective date: 20211101 Owner name: DELL PRODUCTS L.P., TEXAS Free format text: RELEASE OF SECURITY INTEREST AT REEL 043772 FRAME 0750;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058298/0606 Effective date: 20211101 |
|
AS | Assignment |
Owner name: EMC IP HOLDING COMPANY LLC, TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (043775/0082);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:060958/0468 Effective date: 20220329 Owner name: EMC CORPORATION, MASSACHUSETTS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (043775/0082);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:060958/0468 Effective date: 20220329 Owner name: DELL PRODUCTS L.P., TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (043775/0082);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:060958/0468 Effective date: 20220329 |