Pavel Losevsky - Fotolia
At one time, this would have meant flat backup technology wasn't an option for protecting application servers. However, major storage hardware vendors have introduced application-consistent snapshot capabilities into their products. This means protecting an application server by using a flat backup may be an option, as long as the storage hardware supports application-consistent snapshots for that particular application.
Flat backups are vendor specific, so they probably won't be an option for organizations that use a variety of storage hardware from multiple vendors.
In some cases, available bandwidth may be the limiting factor that prevents the use of flat backups. Remember, the technology works by replicating snapshots to an alternate location. To function correctly, the flat backup mechanism must keep pace with snapshot creation or a backlog can occur that may be impossible to overcome.
If a flat backup is created within the local data center, replication performance won't be much of an issue as long as high-speed connectivity exists between the primary storage and protected storage. However, bandwidth can become a problem if snapshots are replicated to a remote data center over a wide-area network connection. This is especially true for environments with a lot of write-intensive applications.
Snapshots can serve as backup option, but planning is required
A lot to like with snapshots, but there are misconceptions too
Build a comprehensive protection strategy with replication, snapshots
Dig Deeper on Backup and recovery software
Related Q&A from Brien Posey
Compatibility, connection and cost are key considerations for hyper-converged data backup. Dive into these best practices to improve your data ... Continue Reading
Although several newer tools are available, Microsoft roaming profiles is a simple and time-tested way to manage a user's profile across physical and... Continue Reading
SaaS application backup is increasingly prevalent, and for good reason -- it's critical for ensuring data protection. These five guidelines will help... Continue Reading