How important is deduplication for virtual server backup and does it matter whether you perform source deduplication or dedupe at the target?
The answer to this question depends on your idea of what’s important. Deduplication could be thought of as unimportant since it is certainly possible to make a virtual server backup without it. However, if your goal is to conserve space, then deduplication does take on a level of importance. Deduplication can be especially effective in virtual server environments because of the simple fact that a single host server could be running multiple copies of the same operating system. Deduplication can help to minimize the amount of data that must be backed up.
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
The location at which deduplication is performed does make a difference. Source deduplication consumes resources on the server that is being backed up. In a virtual server environment, it is usually better to perform deduplication on the target, because you don’t want to consume more resources on a virtualization host than you have to. Those resources are usually put to better use hosting virtual machines.
One big exception comes into play if the backup location is separated from the host server by a WAN link. If you are backing the server up across a WAN then you should perform deduplication at the source as a way of minimizing the amount of data that needs to be sent across the WAN.
Dig Deeper on Backup for virtual servers
Related Q&A from Brien Posey
Making room on your SSD, checking running processes in Task Manager and using Performance Monitor are all ways you can improve Windows 10 performance.continue reading
Browser malware can make it impossible to access websites you might need for work. Luckily, there's a simple way IT and end users can get rid of ...continue reading
There are four common execution policies IT administrators can choose from to secure PowerShell against malicious attacks. Figure out which one is ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.