peshkova - Fotolia
Can you outline the different ways storage snapshots are created? Also, are snapshots a legitimate alternative to backup?
Storage snapshots can be created two different ways. The first method is called a differential snapshot. The basic idea behind this type of snapshot is that when a snapshot is created, the system actually creates a differencing disk. From that point on, all write operations are directed to the differencing disk rather than to the primary storage. This ensures that the primary storage remains unmodified so that the system can be reverted back to a previous state if necessary. Pointer-based snapshots are a newer type of snapshot, and they do not impact performance nearly as much as the differencing disk snapshots. The basic idea behind a pointer-based snapshot is that the snapshotting software assigns a pointer to each storage block. Whenever a file is modified, the storage blocks associated with that file are not overwritten. Instead, new storage blocks are created and the pointers are updated to point to the new storage blocks. If a rollback is required, then the software is able to determine which storage blocks were used at a particular point in time and then use those storage blocks to roll back the system.
First-generation storage snapshot solutions were never intended to be a backup replacement. They were more of a convenience feature than anything else. Modern snapshot solutions can be used as a backup replacement so long as they take measures to protect your data. It's helpful to remember that a snapshot is different from a data replica. With today's technology, it is nearly impossible to create a copy of a multiterabyte volume in a matter of a couple of seconds. Storage snapshots are not creating true copies of your data. Therefore, in order for a snapshotting solution to be a true alternative to a traditional backup, there needs to be a way of protecting both the snapshot and the original data. Typically, this means replicating the data and the snapshots to a mirrored location.
Dig Deeper on Disk-based backup
Related Q&A from Brien Posey
Decentralized storage technology can be confusing and complicated. These best practices, however, can help with implementation in enterprise IT ... Continue Reading
Organizational resilience encompasses everything a company needs to run in times of crisis. These examples show how businesses handle tough ... Continue Reading
There are several different methods to cloud storage encryption. These best practices for encryption can help improve security of important cloud ... Continue Reading