System and method for backup by splitting a copy pair and storing a snapshot

ABSTRACT

When detecting the completion of remote copying of a primary volume to a secondary volume, a host compute splits a copy pair into the primary volume and the secondary volume and has the secondary volume store a snapshot of the primary volume. A backup server recognizes the secondary volume.

CROSS-REFERENCES TO RELATED APPLICATIONS

This application is a Continuation of non-provisional U.S. applicationSer. No. 11/524,242 filed Sep. 21, 2006, now U.S. Pat. No. 7,809,907,which relates to and claims priority from Japanese Patent ApplicationNo. 2006-209059, filed on Jul. 31, 2006, the entire disclosure of whichis incorporated herein by reference.

BACKGROUND

The invention relates to a backup system and method for acquiringbackups in a plurality of storage systems.

Recently, there has been a trend in computer systems toward distributionsystems, mainly client server systems, and away from computer systemsthat collectively manage basic business such as banking andsecurities-related business using large-sized computers. In such adistribution system environment, a configuration where requests fromclients are processed by multiple servers and multiple disk arraysystems in a cluster structure is adopted. JP-A-2003-99306 discloseshighly available clusters as described above, with data centers not onlyat a primary site, but also at secondary site located a long distanceaway from the primary site, in which data is duplicated by means ofremote copying, so that a local disaster such as an earthquake will notresult in complete loss of all data.

A snapshot function is also known as one of the backup functions inclient server systems, as disclosed in JP-A-2003-532191. Vendors supplyvarious products equipped with the snapshot function. For example, VSS(Volume shadow copy service) supplied by Microsoft® is a service forproviding a common infrastructure for snapshot creation tobackup-related hardware and software such as back-up software, serverapplication programs, and storage hardware. In backup processing by VSS,a snapshot is created and then back-up data is acquired from thesnapshot. Accordingly, the backup data can be created without stoppingthe running server application program.

SUMMARY

However, different solutions have been put into practice, i.e., asolution for acquiring a backup of data in a sole storage system andanother solution for acquiring a backup of data in a plurality ofstorage systems and, it is difficult to use the former solution to makea backup of data in a plurality of storage systems. In the VSS, forexample, snapshots are acquired when a coordinator, which has received asnapshot request from a requester, gives a write stop instruction to awriter and a snapshot creation instruction to a provider. We can saythat the snapshot creation environment provided by the VSS was designedconsciously for snapshot acquisition in a sole storage system. So, inorder to acquire snapshots in a plurality of storage systems by usingthe VSS, the coordinator' function, which is part of the OS function,needs to be changed.

Therefore, it is an object of the present invention to acquire a backupby using the provider solution or any system upper layer solution,without changing the coordinator's function and regardless of how thesystem on layers lower than that of the provider is configured.

In order to achieve the above-described object, a backup systemaccording to an aspect of the invention includes: a host computer; afirst storage system having at least one primary volume that stores datainput and output by the host computer; a second storage system having atleast one secondary volume that can form a copy pair with the primaryvolume; and a backup server connected to the second storage system. Whendetecting the completion of remote copying of the primary volume to thesecondary volume, a provider in the host computer splits the copy pairinto the primary volume and the secondary volume and has the secondaryvolume store a snapshot of the primary volume. The provider in thebackup server has the backup server operating system recognize thesecondary volume.

According to the invention, a backup can be acquired by the providersolution or any system upper layer solution without changing thecoordinator's function and regardless of how the system on layers lowerthan that of the provider is configured.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a system configuration diagram focused on the softwareconfiguration of a backup system according to an embodiment of theinvention.

FIG. 2 is a flowchart illustrating backup processing according to theembodiment.

FIG. 3 is a system configuration diagram focused on the hardwareconfiguration of an example of a backup system.

FIG. 4 is a system configuration diagram focused on the softwareconfiguration of an example of the backup system.

FIG. 5 is a flowchart illustrating backup processing according to theexample.

FIG. 6 is a flowchart illustrating processing for judging whether or notthe relevant volume can be backed up.

FIG. 7 is a flowchart illustrating volume registration processing.

FIG. 8 is a flowchart illustrating backup volume creation processing.

FIG. 9 is a flowchart illustrating backup volume information noticeprocessing.

FIG. 10 is a system configuration diagram focused on the softwareconfiguration of a further example of a backup system.

DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS

Embodiments of this invention will be described with reference to theattached drawings.

FIG. 1 is a system configuration diagram focused on the softwareconfiguration of a backup system 10 according to an embodiment of theinvention. The backup system 10 includes: a storage system 30 installedat a primary site; a host computer 20 that operates using storage system30 storage resources; a storage system 50 installed at a secondary sitelocated a long distance away from the primary site; and a backup server40 for backup management between the storage systems 30 and 50.

A primary volume (original logical volume) 31 of the storage system 30and a secondary volume (duplicate logical volume) 51 of the storagesystem 50 constitute a remote copy pair. Data in the primary volume 31as of a certain point in time is kept in the secondary volume by meansof a snapshot function. Remote copying of the storage system 30 to thestorage system 50 may be either synchronous copying or asynchronouscopying.

“Synchronous copying” is a method of reporting the completion of writingto the host computer 20 when writing of the same data to the primaryvolume 31 and to the secondary volume 51 is completed (to be exact, whenwriting data to cache memory is completed). “Asynchronous copying” is amethod of: reporting the completion of writing to the host computer 20when data is written to the primary volume 31 (to be exact, when writingdata to cache memory is completed) and then writing data to thesecondary volume 51 at a specified time.

The host computer 20 includes a requester 21, a coordinator 22, aprovider 23, a RAID manager 24, and a writer 25.

The requester 21 is, for example, a backup application program. Therequester 21 designates a volume for which it requests the acquisitionof a snapshot, to the coordinator 22 and receives snapshot information(such as a special device file and a device name). The requester 21 ofthe host computer 20 communicates with the requester 41 of the backupserver 40 and is capable of sending/receiving necessary information forthe backup processing.

The coordinator 22 functions as part of the OS and operates as a servicefor providing an infrastructure for snapshot creation. Specificallyspeaking, the coordinator 22 controls the writer 25's accessing of theprimary volume 31 in response to requests from the requester 21. Thecoordinator 22 makes an inquiry to the provider 23 about whether thevolume designated for backup purposes can be backed up or not, and sendssnapshot volume information to the requester 21.

The provider 23 is provided by each vendor who manufactures and sellsstorage products. The provider 23 operates as a service for providing aninfrastructure for snapshot creation. Specifically speaking, theprovider 23 creates snapshots of the primary volume 31 under theinstructions of the coordinator 22. There are two types of provider 23;a hardware provider dependent on the storage system; and a softwareprovider not dependent on the vendor.

The RAID manager 24 is management software for managing volumes.Specifically speaking, the RAID manager 24 operates pairs of volumes andacquires their status information under the instructions of the provider23. The RAID manager 24 of the host computer 20 communicates with theRAID manager 44 of the backup server 40 and is capable of operatingvolumes and acquiring their status information in the storage system 50located at the secondary site.

The writer 25 is a program attached to a server application program andprovides a snapshot backup service. Specifically speaking, the writer 25is, for example, an SQL server for database management.

The backup server 40 includes a requester 41, a coordinator 42, aprovider 43, and a RAID manager 44. Since their functions are the sameas those of the requester 21, the coordinator 22, the provider 23, andthe RAID manager 24 described above, their detailed description has beenomitted.

The storage system 30 includes one or more primary volumes 31 and acommand device 32. The primary volumes 31 are operational volumesaccessed by the host computer 20. The command device 32 is aspecial-purpose logical unit for exchanging commands and statusinformation between the host computer 20 (more specifically, the RAIDmanager 24) and the storage system 30. Commands sent from the RAIDmanager 24 to the storage system 30 are written to the command device32. The storage system 30 executes processing in response to commandswritten to the command device 32 and then writes the execution result asstatus information to the command device 32. The RAID manager 24 readsand confirms the status written to the command device 32 and writes acommand that should be executed next to the command device 32. In thisway, the RAID manager 24 gives various instructions to the storagesystem 30.

The storage system 50 includes one or more secondary volumes 51 and acommand device 52. The secondary volumes 51 are volumes for backuppurposes, which can form remote copy pairs with the primary volumes 31.Since the function of the command device 52 is the same as that of thecommand device 32, a detailed description has been omitted.

Next, the outline of a backup method according to an embodiment of theinvention will be described below. In this embodiment, a backup volumeis created by combining a remote copy with a snapshot (in the exampleshown in FIG. 1, the secondary volume 51 is a backup volume).Accordingly, the host computer 20 (more specifically, the provider 23)has to detect the completion of remote copying of the primary volume 31to the secondary volume 51 and acquire a snapshot of the primary volume31. After freezing the relevant database, the provider 23 compares themost recent sequence number for data stored in the primary volume 31with the most recent sequence number for data stored in the secondaryvolume 51; and depending on whether the former sequence numbercorresponds with the latter, the provider 23 judges whether the remotecopying has been completed or not (see JP-A-2003-99306).

When the remote copying is complete, the RAID manager 24 of the hostcomputer 20 commands the RAID manager 44 of the backup server 40 tosplit the relevant remote copy pair (i.e., to create a snapshot).Subsequently, the RAID manager 44 of the backup server 40 executesprocessing for having the operating system of the backup server 40recognize the secondary volume 51.

If the backup volume is no longer necessary, a setting is made so thatthe operating system of the backup server 40 cannot recognize thesecondary volume 51, and the remote copy pair is re-synchronized. In theresulting environment, snapshots can be acquired again.

Incidentally, multiple-generation snapshots can be acquired in thestorage systems 30 and 50 in the same manner as the acquisition ofmultiple-generation snapshots in a single storage system, by acquiringin advance the number of generations MU# of snapshots (in the pairstatus that can be split), that can be used for the acquisition ofsnapshots, by using the functions of the RAID managers 24 and 44.

Next, the flow of backup processing will be described with reference toFIG. 2. For convenience of explanation, a processing sequence foracquiring a backup volume (Steps 201 to 228) and a processing sequencefor deleting a backup volume (Steps 229 to 234) are illustrated in thesame sequence diagram. However, the backup volume acquisition processingand the backup volume deletion processing do not always have to beexecuted successively.

First, the processing sequence for acquiring a backup volume will beexplained below.

The requester 21 first designates a volume and makes a backup request tothe coordinator 22 (Step 201).

The coordinator 22 then makes an inquiry to the provider 23 aboutwhether the volume for which the backup request was made can be backedup or not (Step 202).

Subsequently, the provider 23 makes an inquiry to the RAID manager 24about whether the relevant remote copy pair can be split or not (Step203). Since, here, backup volume acquisition using the snapshot functionis assumed, if the remote copy pair can be split, this means that thebackup volume can be acquired; and if the remote copy pair cannot besplit, this means that the backup volume cannot be acquired.

After receiving an answer from the RAID manager 24 about whether theremote copy pair can be split or not (Step 204), the provider 23transfers that information to the coordinator 22 (Step 205).

If the volume for which the backup request was made can be backed up,the coordinator 22 makes a volume registration request to the provider23 (Step 206). The provider 23 then returns an acknowledgement signal tothe coordinator 22 in response to the registration request (Step 207).

After the coordinator 22 is informed by the provider 23 of thecompletion of the volume registration, the coordinator 22 reports to therequester 21 whether backup is possible or not (Step 208).

If a backup volume can be acquired, the requester 21 notifies thecoordinator 22 of a backup start request (Step 209).

The coordinator 22 then makes an inquiry to the provider 23 aboutwhether the volume registration processing has been completed or not(Step 210). After the coordinator 22 is informed by the provider 23 ofthe completion of the registration processing (Step 211), thecoordinator 22 commands the writer 25 to freeze the relevant database(Step 212).

After the coordinator 22 is informed by the writer 25 of the cessationof write processing (Step 213), the coordinator 22 gives a copy creationinstruction to the provider 23 (the instruction to acquire a backupvolume, using the snapshot function) (Step 214).

Then, the provider 23 makes an inquiry to the RAID manager 24 aboutwhether remote copying between the relevant remote pair has beencompleted or not (Step 215). The RAID manager 24 waits for thecompletion of the remote copying and then reports the completion of theremote copying (Step 216).

Subsequently, the provider 23 commands the RAID manager 24 to split theremote pair (Step 217). The RAID manager 24 of the host computer 20commands the RAID manager 44 of the backup server 40 to split the pairinto the primary volume 31 and the secondary volume 51, waits for thecompletion of the pair split, and then reports the completion of thepair split (Step 218).

Subsequently, the provider 23 notifies the coordinator 22 of backupvolume information (Step 219).

The coordinator 22 commands the writer 25 to terminate the databasefreeze (Step 220). After the coordinator 22 is informed by the writer 25of the termination of the database freeze (Step 221), the coordinator 22makes an inquiry to the requester 21 about whether a backup volume canbe acquired or not (Step 222).

Although it is not shown in FIG. 2, the requester 21 of the hostcomputer 20 makes an inquiry to the requester 41 of the backup server 40about whether a backup volume can be acquired or not. The backup volumeis concealed from the operating system of the backup server 40.

When the requester 41 makes a backup volume acquisition request to thecoordinator 22 (Step 223), the coordinator 42 has the operating systemof the backup server 40 recognize the backup volume and transmits thevolume name to the provider 43 (Step 224).

Then, the provider 43 commands the RAID manager 44 to cancel theconcealment of the backup volume from the operating system (Step 225).

After the provider 43 is informed by the RAID manager 44 of thecompletion of the concealment cancellation (Step 226), the provider 43reports the completion of the concealment cancellation to thecoordinator 42 (Step 227). Consequently, the requester 41 can acquirethe backup volume (Step 228).

Next, the processing sequence for deleting a backup volume will beexplained.

The requester 41 makes a backup volume deletion request to thecoordinator 42 (Step 229).

Then, the coordinator 42 makes a backup deletion request to the provider43 (Step 230).

The provider 43 commands the RAID manager 44 to execute processing forconcealing a backup volume from the operating system (Step 231).

Although it is not shown in FIG. 2, the RAID manager 44 of the backupserver 40 commands the RAID manager 24 of the host computer 20 tore-synchronize the remote pair (to delete the backup volume).

The RAID manager 44 reports the completion of the backup volume deletionto the provider 43 (Step 232).

The provider 43 reports the completion of the backup volume deletion tothe coordinator 42 (Step 233).

The coordinator 42 reports the completion of the backup volume deletionto the requester 41 (Step 234).

If the system configuration on layers lower than that of the provider ischanged (for example, when the number of the storage systems is changedor when a cascade pair is changed), processing for dealing with thechange of the system configuration is executed by a function in theprovider according to this embodiment. Accordingly, it is unnecessary tomake any functional change to the provider or any upper layer (forexample, the requester). Therefore, a system administrator who managesthe backup system using a backup application program only has to operatethe backup application program and does not have to be concerned withany change in the system configuration on layers lower than that of theprovider. In other words, since the provider has a function that dealswith any change in the system configuration on layers lower than that ofthe provider, this feature can contribute to the reduction of load onthe backup application program.

EXAMPLES

FIG. 3 is a system configuration diagram focused on the hardwareconfiguration of a backup system 10 in an example of the invention.Devices the same as those shown in FIG. 1 are given the same referencenumerals as in FIG. 1, and their detailed descriptions have beenomitted. The host computer 20, the storage system 30, the backup server40, and the storage system 50 are connected to each other via a network60.

The host computer 20 is a computer system equipped with a CPU (CentralProcessing Unit), memory, and input/output interfaces. Specificallyspeaking, the host computer 20 is, for example, a personal computer, aworkstation, or a mainframe. The host computer 20 stores applicationprograms (such as database programs) that use storage system 20 storageresources.

The storage system 30 includes a storage apparatus 320 for storing data,and a storage control apparatus 310 for controlling reading/writing datafrom/to the storage apparatus 320. The storage control apparatus 310includes a plurality of ports 311, one or more microprocessors 312, oneor more shared memories 313, and one or more cache memories 314. Thestorage apparatus 320 includes a plurality of storage devices 321.

The port 311 is a communication interface for controlling datacommunication between the host computer 20, the backup server 40, andthe storage system 50. The port 311 is configured as a microcomputersystem equipped with a CPU and memory and interprets and executescommands from the host computer 20. A network address (such as an IPaddress or a WWN [World Wide Name]) is assigned to each port 311 inorder to identify itself. Each port 311 can function as NAS (NetworkAttached Storage).

The microprocessor 312 controls data input to and output from thestorage devices 321. The microprocessor 312 writes data the port 311receives from the host computer 20 to a specified address of the storagedevice 321 according to a write command from the host computer 20. Themicroprocessor 312 also reads data from a specified address of thestorage device 321 according to a read command from the host computer20, and sends the data to the host computer 20. The microprocessor 312controls data input and output between the storage devices 321 byconverting a logical address of the data into a physical address. If themultiple storage devices 321 are managed according to a RAID (RedundantArrays of Independent/Inexpensive Disks) system, the microprocessor 312accesses data according to the RAID configuration.

The shared memory 313 is mainly used to store resource structureinformation and various commands. The cache memory 314 is mainly used totemporarily store data read from or written to the storage devices 321.

The storage devices 321 are physical devices such as hard disks,flexible disks, magnetic tapes, semiconductor memory, flash memory, andoptical disks.

The storage system 50 includes a storage apparatus 520 for storing data,and a storage control apparatus 510 for controlling reading/writing datafrom/to the storage apparatus 520. The storage control apparatus 510includes a plurality of ports 511, one or more microprocessors 512, oneor more shared memories 513, and one or more cache memories 514. Thestorage apparatus 520 includes a plurality of storage devices 521.

The network 60 is, for example, a LAN (Local Area Network), a SAN(Storage Area Network), the Internet, private line(s), or publicline(s). Data communications via a LAN are performed according to TCP/IP(Transmission Control Protocol/Internet Protocol). If the host computer20 is connected to the storage system 30 via a LAN, the host computer 20requests data input or output in files by designating a file name. Onthe other hand, if the host computer 20 is connected to the storagesystem 30 via a SAN, the host computer 20 requests data input to oroutput from the storage devices 321 according to Fibre Channel Protocolby inputting and outputting data in blocks, which are the units for datamanagement in storage areas provided by a plurality of storage devices321. If the network 60 is a LAN, the port 311 is, for example, a LANnetwork card. If the network 60 is a SAN, the port 311 is, for example,an HBA (Host Bus Adapter).

FIG. 4 is a system configuration diagram focused on the softwareconfiguration of the backup system 10 in this example. Devices the sameas those shown in FIG. 1 are given the same reference numerals as inFIG. 1, and their detailed descriptions have been omitted.

The storage system 50 includes: a secondary volume 51 that forms aremote copy pair with the primary volume 31; and secondary volumes 53and 54 that form cascade pairs with the secondary volume 51. Thesecondary volumes 53 and 54 respectively store snapshots of differentgenerations of the secondary volume 51. For example, the secondaryvolume 53 stores a snapshot of the secondary volume 51 as of a certainpoint in time t1, while the secondary volume 54 stores a snapshot of thesecondary volume 51 as of another point in time t2.

For convenience of explanation in this specification, the pairrelationship between the primary volume 31 and the secondary volume 51is referred to as a “remote copy pair” and the pair relationship betweenthe secondary volume 51 and the secondary volume 53 or 54 is referred toas a “cascade pair” in order to distinguish the former relationship fromthe latter.

As described above, data transfer time can be reduced and the number ofsnapshot generations can be increased by transferring data in theprimary volume 31 to the secondary volume 51, the remote copydestination, and then acquiring a snapshot of the secondary volume 51.

Next, the flow of backup processing will be explained with reference toFIG. 5. For convenience of explanation, a processing sequence foracquiring a backup volume (Steps 501 to 528) and a processing sequencefor deleting a backup volume (Steps 529 to 534) are illustrated in thesame sequence diagram. However, the backup volume acquisition processingand the backup volume deletion processing do not always have to beexecuted successively.

First, the processing sequence for acquiring a backup volume will beexplained below.

The requester 21 first designates a volume and makes a backup request tothe coordinator 22 (Step 501).

The coordinator 22 then makes an inquiry to the provider 23 aboutwhether the volume for which the backup request was made can be backedup or not (Step 502).

Subsequently, the provider 23 makes an inquiry to the RAID manager 24about whether the relevant cascade pair can be split or not (Step 503).Since, here, backup volume acquisition using the snapshot function isassumed, if the cascade pair can be split, this means that the backupvolume can be acquired; and if the cascade copy pair cannot be split,this means that the backup volume cannot be acquired.

When receiving an answer from the RAID manager 24 about whether thecascade pair can be split or not (Step 504), the provider 23 transfersthat information to the coordinator 22 (Step 505).

If the volume for which the backup request was made can be backed up,the coordinator 22 makes a volume registration request to the provider23 (Step 506). Then, the provider 23 returns an acknowledgement signalto the coordinator 22 in response to the registration request (Step507).

After the coordinator 22 is informed by the provider 23 of thecompletion of the volume registration, the coordinator 22 reports to therequester 21 whether backup is possible or not (Step 508).

If a backup volume can be acquired, the requester 21 notifies thecoordinator 22 of a backup start request (Step 509).

The coordinator 22 then makes an inquiry to the provider 23 aboutwhether the volume registration processing has been completed or not(Step 510). After the coordinator 22 is informed by the provider 23 ofthe completion of the registration processing (Step 511), thecoordinator 22 commands the writer 25 to freeze the relevant database(Step 512).

After the coordinator 22 is informed by the writer 25 of the cessationof write processing (Step 513), the coordinator 22 gives a copy creationinstruction to the provider 23 (the instruction to acquire a backupvolume, using the snapshot function) (Step 514).

Then, the provider 23 makes an inquiry to the RAID manager 24 aboutwhether copying between the relevant cascade pair has been completed ornot (Step 515). The RAID manager 24 waits for the completion of thecopying and then reports the completion of the copying (Step 516).

Subsequently, the provider 23 commands the RAID manager 24 to split thecascade pair (Step 517). The RAID manager 24 waits for the completion ofthe pair split, and then reports the completion of the pair split (Step518).

Subsequently, the provider 23 notifies the coordinator 22 of backupvolume information (Step 519).

The coordinator 22 commands the writer 25 to terminate the databasefreeze (Step 520). After the coordinator 22 is informed by the writer 25of the termination of the database freeze (Step 521), the coordinator 22makes an inquiry to the requester 21 about whether a backup volume canbe acquired or not (Step 522).

Although it is not shown in FIG. 5, the requester 21 of the hostcomputer 20 makes an inquiry to the requester 41 of the backup server 40about whether a backup volume can be acquired or not. The backup volumeis concealed from the operating system of the backup server 40.

When the requester 41 makes a backup volume acquisition request to thecoordinator 22 (Step 523), the coordinator 42 has the operating systemof the backup server 40 recognize the backup volume and transmits thevolume name to the provider 43 (Step 524).

Then, the provider 43 commands the RAID manager 44 to cancel theconcealment of the backup volume from the operating system (Step 525).

After the provider 43 is informed by the RAID manager 44 of thecompletion of the concealment cancellation (Step 526), the provider 43reports the completion of the concealment cancellation to thecoordinator 42 (Step 527). Consequently, the requester 41 can acquirethe backup volume (Step 528).

Next, the processing sequence for deleting a backup volume will beexplained.

The requester 41 makes a backup volume deletion request to thecoordinator 42 (Step 529).

Then, the coordinator 42 makes a backup deletion request to the provider43 (Step 530).

The provider 43 commands the RAID manager 44 to execute processing forconcealing a backup volume from the operating system (Step 531).

Although it is not shown in FIG. 5, the RAID manager 44 of the backupserver 40 commands the RAID manager 24 of the host computer 20 tore-synchronize the cascade pair (to delete the backup volume).

The RAID manager 44 reports the completion of the backup volume deletionto the provider 43 (Step 532).

The provider 43 reports the completion of the backup volume deletion tothe coordinator 42 (Step 533).

The coordinator 42 reports the completion of the backup volume deletionto the requester 41 (Step 534).

Next, processing by the provider 23 will be explained in detail withreference to FIGS. 6 to 9.

First, the processing for judging whether a volume for which a backuprequest was made can be backed up will be explained with reference toFIG. 6.

After the provider 23 acquires LUN information about the primary volume31 from the coordinator 22 (Step 601), the provider 23 checks a vendorID and a product ID contained in the LUN information and judges whetherthe primary volume 31 is a support target or not (Step 602).

If the provider 23 determines that the primary volume 31 is not thesupport target, the provider 23 replies to the coordinator 22 that theprimary volume 31 cannot be supported (Step 603).

On the other hand, if the provider 23 determines that the primary volume31 is the support target, the provider 23 acquires a DKC number of thestorage system 30, which has the primary volume 31, and an LDEV numberof the primary volume 31 from the LUN information of the primary volume31 (Step 604). The DKC number indicates a storage system product number.

Then, the provider 23 repeats processing from Step 606 to Step 608within the range of the number of snapshot generations MU# (Step 605).Specifically speaking, the provider 23 acquires cascade pair informationfrom the RAID manager 44 of the backup server 40 (Step 606); judgeswhether or not the relevant cascade pair is in the pair status where thevolumes constituting the pair can be used as backup volumes (Step 607);and if the relevant cascade pair is in the pair status where the volumesconstituting the pair can be used as backup volumes, the provider 23acquires its generation number (Step 608).

Subsequently, the provider 23 checks whether there is any availablegeneration number or not (Step 609). If there is no available generationnumber, the provider 23 replies to the coordinator 22 that the supportis impossible (Step 610). If there is an available generation number,the provider 23 replies to the coordinator 22 that a backup volume canbe acquired (Step 611).

Next, volume registration processing will be explained with reference toFIG. 7.

After the provider 23 acquires LUN information about the primary volume31 from the coordinator 22 (Step 701), the provider 23 acquires a DKCnumber of the storage system 30 and an LDEV number of the primary volume31 from the LUN information of the primary volume 31 (Step 702).

Then, the provider 23 repeats processing from Step 704 to Step 706within the range of the number of snapshot generations MU# (Step 703).Specifically speaking, the provider 23 acquires cascade pair informationfrom the RAID manager 44 of the backup server 40 (Step 704); judgeswhether or not the relevant cascade pair is in the pair status where thevolumes constituting the pair can be used as backup volumes (Step 704);and if the relevant cascade pair is in the pair status where the volumesconstituting the pair can be used as backup volumes, the provider 23acquires its generation number (Step 706).

Subsequently, the provider 23 checks whether there is any availablegeneration number or not (Step 707). If there is no available generationnumber, the provider 23 replies to the coordinator 22 that support isimpossible (Step 708). If there is an available generation number, theprovider 23 stores the DKC number, the LDEV number, and the MU# in asnapshot structure (Step 709). The “snapshot structure” means a storagearea for storing information about volumes for which backup volumes areacquired by means of the snapshot function.

Next, backup volume creation processing will be explained with referenceto FIG. 8.

The provider 23 acquires a snapshot ID from the coordinator 22 and thenacquires a snapshot structure according to the snapshot ID (Step 801).

Subsequently, the provider 23 repeats the processing from Step 803 toStep 805 with regard to information about all the volumes stored in thesnapshot structure (Step 802). Specifically speaking, the provider 23acquires the DKC number of the storage system 30, which has the primaryvolume 31, and the LDEV number of the primary volume 31 from thesnapshot structure (Step 803); waits for the completion of remotecopying of the primary volume 31 to the secondary volume 51 (Step 804);and commands the RAID manager 44 to split the relevant cascade pairformed by the secondary volumes corresponding to the MU# stored in thesnapshot structure (Step 805).

Next, backup volume information notice processing will be explained withreference to FIG. 9.

The provider 23 acquires LUN information about the primary volume 31from the coordinator 22 (Step 901).

Subsequently, the provider 23 acquires, from the LUN information, theDKC number of the storage system 30, which has the primary volume 31,and the LDEV number of the primary volume 31 and also acquires, via theRAID manager 44 of the backup server 40, the DKC number of the storagesystem having the relevant cascade pair and the LDEV numbers of thesecondary volumes (backup volumes) of the cascade pair (Step 902).

The provider 23 generates backup volume information according to the DKCnumber of the storage system having the cascade pair and the LDEVnumbers of the secondary volumes (backup volumes) of the cascade pair,and then returns the backup volume information to the coordinator 22(Step 903).

FIG. 10 is a system configuration diagram focused on the softwareconfiguration of a backup system 11 according to a further embodiment ofthe invention. Devices the same as those shown in FIG. 1 are given thesame reference numerals as in FIG. 1, and their detailed descriptionshave been omitted.

The backup system 11 includes a storage system 70 where backups areformed, in addition to the storage system 50. The storage system 70includes: a secondary volume 71 that forms a remote copy pair with theprimary volume 31; secondary volumes 73 and 74 that form cascade pairswith the secondary volume 71; and a command device 72 for volumeoperation.

The storage system 30 includes a plurality of primary volumes 31 and 33and a command device 32 for volume operation. The primary volume 31 isremote-copied to the secondary volume 71. A static data image of acertain time is stored in the secondary volume 73 as a snapshot, and astatic data image of another time is stored in the secondary volume 74as a snapshot. In the same manner as the primary volume 31, the primaryvolume 33 is remote-copied to the secondary volume 51. A static dataimage of a certain time is stored in the secondary volume 53 as asnapshot, and a static data image of another time is stored in thesecondary volume 54 as a snapshot.

Accordingly, even if the system configuration on layers lower than thatof the providers 23 and 43 is changed (for example, when the number ofstorage systems is changed or when a cascade pair is changed), afunction in the providers 23 and 43 can deal with the change of thesystem configuration. Therefore, a system administrator who manages thebackup system using a backup application program only has to operate thebackup application program and does not have to be concerned with anychange in the system configuration on layers lower than that of theproviders. Since the providers have a function that deals with anychange in the system configuration on layers lower than that of theproviders, this feature can contribute to the reduction of load on thebackup application program.

What is claimed is:
 1. A backup system comprising: a host computercomprising a first coordinator module as an upper layer which is a partof operating system of the host computer, and a first provider module asa lower layer which is provided by a storage vendor to manage a systemconfiguration of the backup system; a backup server comprising a secondcoordinator module as an upper layer which is a part of operating systemof the backup server, and a second provider module as a lower layerwhich is provided by the storage vendor to manage the systemconfiguration of the backup system; a first storage system coupled tothe host computer and having a primary volume that stores data input andoutput by the host computer; and a second storage system coupled to thebackup server and the first storage system and having a secondary volumethat forms a remote copy pair with the primary volume, wherein the firstprovider module of the host computer checks whether it is possible tosplit the remote copy pair of the primary volume and the secondaryvolume in accordance with a backup request from the first coordinatormodule of the host computer, wherein if the remote copy pair can besplit, the first provider module of the host computer registers theprimary volume as a subject of backup process, the first coordinatormodule of the host computer ceases write processing to the primaryvolume and sends snapshot instruction to the first provider module ofthe host computer, and the first provider module of the host computercreates a first copy from the primary volume to the secondary volume asa snapshot, wherein when detecting completion of the first copy, thefirst provider module of the host computer splits the remote copy pairand transfers backup information to the first coordinator module of thehost system, and wherein if the second coordinator module of the backupserver requires at least one backup volume to the second provider moduleof the backup server, the second provider module of the backup serverrecognizes the secondary volume as a backup volume corresponding to theprimary volume, for storing the snapshot of the primary volume as of acertain point in time, and cancels a concealment of the backup volumefrom the backup server, so that the second coordinator module of thebackup server achieves the backup volume, while the backup volume isinitially concealed from the operating system of the backup server. 2.The backup system according to claim 1, wherein when the secondcoordinator module of the backup server requires a deletion of thebackup volume, the second provider module of the backup server concealsthe backup volume from the backup server, and deletes the backup volumefrom the second storage system by starting re-synchronization of theremote copy pair of the primary volume and the secondary volume.
 3. Thebackup system according to claim 1, wherein the first provider module ofthe host computer judges whether the first copy of the primary volume tothe secondary volume is complete or not, based on whether a sequencenumber for the data stored in the primary volume corresponds with asequence number for the data stored in the secondary volume or not.
 4. Abackup method for a backup system that includes a host computer; abackup server; a first storage system coupled to the host computer andhaving a primary volume that stores data input and output by the hostcomputer; and a second storage system coupled to the backup server andthe first storage system and having a secondary volume that forms a copypair with the primary volume, wherein the host computer comprises afirst coordinator module as an upper layer which is a part of operatingsystem of the host computer, and a first provider module as a lowerlayer which is provided by a storage vendor to manage a systemconfiguration of the backup system; and wherein the backup servercomprises a second coordinator module as an upper layer which is a partof operating system of the backup server, and a second provider moduleas a lower layer which is provided by the storage vendor to manage thesystem configuration of the backup system, the backup method comprisingthe steps of: checking by the first provider module of the host computerwhether it is possible to split the remote copy pair of the primaryvolume and the secondary volume in accordance with a backup request fromthe first coordinator module of the host computer; if the remote copypair can be split, registering by the first provider module of the hostcomputer the primary volume as a subject of backup process, ceasing bythe first coordinator module of the host computer write processing bythe host computer to the primary volume and sending by the firstcoordinator module snapshot instruction to the first provider module ofthe host computer, and creating by the first provider module of the hostcomputer a first copy from the primary volume to the secondary volume asa snapshot; when detecting completion of the first copy, splitting bythe first provider module of the host computer the remote copy pair andtransferring backup information to the first coordinator module of thehost system; and if being required by the second coordinator module ofthe backup server at least one backup volume to the second providermodule of the backup server recognizing by the second provider module ofthe backup server the secondary volume as a backup volume correspondingto the primary volume, for storing a snapshot of the primary volume asof a certain point in time, and canceling a concealment of the backupvolume from the backup server, so that the second coordinator module ofthe backup server achieves the first backup volume, while the firstbackup volume is initially concealed from the operating system of thebackup server.
 5. The backup method according to claim 4, wherein whenbeing required by the second coordinator module of the backup server adeletion of the backup volume, the backup method further comprises thestep of: concealing by the second provider module of the backup serverthe backup volume from the backup server; and deleting by the secondprovider module of the backup server the backup volume from the secondstorage system by starting re-synchronization of the remote copy pair-ofthe primary volume and the secondary volume.
 6. The backup methodaccording to claim 4, further comprising the step of judging by thefirst provider module of the host computer whether the first copy of theprimary volume to the first secondary volume is complete or not, basedon whether a sequence number for the data stored in the primary volumecorresponds with a sequence number for the data stored in the secondaryvolume or not.
 7. The backup system according to claim 1, wherein thefirst storage system further includes second primary volumes that storedata input and output by the host computer, the backup system furthercomprising: a third storage system coupled to the backup server andhaving a second secondary volume that forms a remote copy pair with thesecond primary volume, wherein the first provider module of the hostcomputer further creates a second copy from the second primary volume tothe second secondary volume, and the second provider module of thebackup server recognizes the second secondary volume as a second backupvolume for storing a snapshot of the second primary volume as of acertain point in time.
 8. The backup system according to claim 7,wherein the first and the second provider modules change the systemconfiguration without changing functions by the first and the secondcoordinator modules, when the third storage system having the secondsecondary volume is newly added to the backup system.
 9. The backupsystem according to claim 1, wherein the first and the second providermodules change the system configuration without changing functions bythe first and the second coordinator modules, when the remote copy pairbetween the primary and the secondary volumes is changed.