Pavel Losevsky - Fotolia
At one time, this would have meant flat backup technology wasn't an option for protecting application servers. However, major storage hardware vendors have introduced application-consistent snapshot capabilities into their products. This means protecting an application server by using a flat backup may be an option, as long as the storage hardware supports application-consistent snapshots for that particular application.
Flat backups are vendor specific, so they probably won't be an option for organizations that use a variety of storage hardware from multiple vendors.
In some cases, available bandwidth may be the limiting factor that prevents the use of flat backups. Remember, the technology works by replicating snapshots to an alternate location. To function correctly, the flat backup mechanism must keep pace with snapshot creation or a backlog can occur that may be impossible to overcome.
If a flat backup is created within the local data center, replication performance won't be much of an issue as long as high-speed connectivity exists between the primary storage and protected storage. However, bandwidth can become a problem if snapshots are replicated to a remote data center over a wide-area network connection. This is especially true for environments with a lot of write-intensive applications.
Snapshots can serve as backup option, but planning is required
A lot to like with snapshots, but there are misconceptions too
Build a comprehensive protection strategy with replication, snapshots
Dig Deeper on Backup and recovery software
Related Q&A from Brien Posey
While only a small number of hardware vendors offer DPUs, the technology has significant implications for IT storage systems -- and the admins who ... Continue Reading
Microsoft 365 is a widely used service, but its many different applications make backup complicated. Watch out for these common roadblocks. Continue Reading
A ransomware attack on cloud storage can have catastrophic effects. Cloud storage is still online, which means it is susceptible to some cyberattacks... Continue Reading