Knowledge (XXG)

Snapshot (computer storage)

Source đź“ť

224:. In other words, the time and I/O needed to create the snapshot does not increase with the size of the data set; by contrast, the time and I/O required for a direct backup is proportional to the size of the data set. In some systems once the initial snapshot is taken of a data set, subsequent snapshots copy the changed data only, and use a system of pointers to reference the initial snapshot. This method of pointer-based snapshots consumes less disk capacity than if the data set was repeatedly cloned. 122: 25: 348:
EMC's Isilon OneFS clustered storage platform implements a single scalable file system that supports read-only snapshots at the file or directory level. Any file or directory within the file system can be snapshotted and the system will implement a copy-on-write or point-in-time snapshot dynamically
253:
by copying changed blocks‍—‌just before they are to be overwritten within "parent" volumes‍—‌to other storage, thus preserving a self-consistent past image of the block device. Filesystems on such snapshot images can later be mounted as if they were on a read-only media.
261:
snapshots, extending the copy-on-write approach by disassociating any blocks modified within the snapshot from their "parent" blocks in the original volume. Such a scheme could be also described as performing additional copy-on-write operations triggered by the writes to snapshots.
181:, since the backup operation had already taken place before the addition of the file. Version skew may also cause corruption with files which change their size or contents underfoot while being read. 195:
provided by the operating system to enforce exclusive read access. This is tolerable for low-availability systems (on desktop computers and small workgroup servers, on which regular
422:
WAFL is not a file system. WAFL is a file layout that provides mechanisms that enable a variety of file systems and technologies that want to access disk blocks.
188:
to safely backing up live data is to temporarily disable write access to data during the backup, either by stopping the accessing applications or by using the
42: 360:
file systems support creating snapshots (cloning) of individual files. Additionally, Btrfs also supports the creation of snapshots of subvolumes. On AIX,
535: 468: 177:. For example, if a user moves a file into a directory that has already been backed up, then that file would be completely missing on the 89: 61: 269:(LVM) allows creation of both read-only and read-write snapshots. Writable snapshots were introduced with the LVM version 2 (LVM2). 192: 108: 218:—and allow applications to continue writing to their data. Most snapshot implementations are efficient and can create snapshots in 68: 383: 266: 46: 75: 170: 388: 57: 278: 329:
provides snapshots via the same VSS interface for shared storage. Snapshots have also been available in the NSS (
35: 378: 242: 513: 142: 499:"Understanding and exploiting snapshot technology for data protection, Part 1: Snapshot technology overview" 330: 211: 189: 342: 146: 286: 178: 162: 82: 540: 282: 169:, there may be writes to that data while it is being backed up. This prevents the backup from being 314: 393: 166: 498: 121: 373: 326: 298: 530: 403: 174: 293:, internally track old versions of files and make snapshots available through a special 145:
of a system at a particular point in time. The term was coined as an analogy to that in
220: 524: 443: 322: 246: 215: 398: 250: 206:
To avoid downtime, high-availability systems may instead perform the backup on a
318: 309:, access to snapshots is provided by the Volume Shadow-copying Service (VSS) in 24: 310: 294: 196: 134: 16:
Recorded state of a computer storage system at a particular point in time
334: 469:"Optimized Storage Solution for Enterprise Scale Hyper-V Deployments" 185: 158: 357: 353: 349:
based on which method is determined to be optimal for the system.
338: 290: 126: 120: 361: 306: 238: 200: 503: 302: 18: 161:
of a large data set may take a long time to complete. On
49:. Unsourced material may be challenged and removed. 203:systems, however, cannot bear service stoppages. 173:and introduces a version skew that may result in 8: 257:Some volume managers also allow creation of 337:since version 4.11, and more recently on 109:Learn how and when to remove this message 435: 415: 7: 47:adding citations to reliable sources 514:"Storage Basics: Backup Strategies" 474:. Microsoft. March 2010. p. 15 374:Apple File System § Snapshots 199:is acceptable). High-availability 14: 305:for accessing file histories. In 214:copy of the data set frozen at a 129:filesystem, managed with snapper 58:"Snapshot" computer storage 23: 536:Fault-tolerant computer systems 497:Garimella, Neeta (2006-04-26). 34:needs additional citations for 384:Persistence (computer science) 301:, provide an operating system 241:systems have snapshot-capable 1: 512:Harwood, Mike (2003-09-24). 389:Sandbox (computer security) 277:Some file systems, such as 557: 125:Example of snapshots of a 379:Application checkpointing 364:also support snapshots. 331:Novell Storage Services 243:logical volume managers 343:Open Enterprise Server 267:Logical Volume Manager 130: 287:Plan 9 from Bell Labs 124: 43:improve this article 315:Windows Server 2003 394:Storage Hypervisor 245:. These implement 167:multi-user systems 131: 341:platforms in the 333:) file system on 119: 118: 111: 93: 548: 517: 508: 484: 483: 481: 479: 473: 465: 459: 458: 456: 455: 440: 423: 420: 135:computer systems 114: 107: 103: 100: 94: 92: 51: 27: 19: 556: 555: 551: 550: 549: 547: 546: 545: 521: 520: 511: 496: 493: 488: 487: 477: 475: 471: 467: 466: 462: 453: 451: 442: 441: 437: 432: 427: 426: 421: 417: 412: 404:Virtual machine 370: 297:. Others, like 275: 235: 233:Volume managers 230: 228:Implementations 175:data corruption 155: 115: 104: 98: 95: 52: 50: 40: 28: 17: 12: 11: 5: 554: 552: 544: 543: 538: 533: 523: 522: 519: 518: 509: 492: 491:External links 489: 486: 485: 460: 448:3.8. Snapshots 434: 433: 431: 428: 425: 424: 414: 413: 411: 408: 407: 406: 401: 396: 391: 386: 381: 376: 369: 366: 352:On Linux, the 274: 271: 234: 231: 229: 226: 154: 151: 117: 116: 99:September 2013 31: 29: 22: 15: 13: 10: 9: 6: 4: 3: 2: 553: 542: 539: 537: 534: 532: 529: 528: 526: 515: 510: 506: 505: 500: 495: 494: 490: 470: 464: 461: 449: 445: 439: 436: 429: 419: 416: 409: 405: 402: 400: 397: 395: 392: 390: 387: 385: 382: 380: 377: 375: 372: 371: 367: 365: 363: 359: 355: 350: 346: 344: 340: 336: 332: 328: 324: 323:Windows Vista 320: 316: 312: 308: 304: 300: 296: 292: 288: 284: 280: 272: 270: 268: 263: 260: 255: 252: 251:block devices 248: 247:copy-on-write 244: 240: 232: 227: 225: 223: 222: 217: 216:point in time 213: 209: 204: 202: 198: 194: 191: 187: 182: 180: 176: 172: 168: 164: 163:multi-tasking 160: 152: 150: 148: 144: 140: 136: 128: 123: 113: 110: 102: 91: 88: 84: 81: 77: 74: 70: 67: 63: 60: â€“  59: 55: 54:Find sources: 48: 44: 38: 37: 32:This article 30: 26: 21: 20: 502: 476:. Retrieved 463: 452:. Retrieved 447: 438: 418: 399:System image 351: 347: 276: 273:File systems 264: 258: 256: 236: 219: 207: 205: 183: 179:backup media 156: 138: 132: 105: 96: 86: 79: 72: 65: 53: 41:Please help 36:verification 33: 541:Persistence 444:"LVM HOWTO" 319:Shadow Copy 147:photography 525:Categories 478:25 October 454:2013-09-29 450:. tldp.org 430:References 311:Windows XP 265:On Linux, 249:on entire 69:newspapers 345:product. 295:namespace 212:read-only 153:Rationale 368:See also 327:Melio FS 259:writable 208:snapshot 197:downtime 186:approach 139:snapshot 335:NetWare 190:locking 157:A full 141:is the 83:scholar 531:Backup 289:, and 283:fossil 171:atomic 159:backup 85:  78:  71:  64:  56:  472:(PDF) 410:Notes 358:OCFS2 354:Btrfs 339:Linux 291:ODS-5 237:Some 143:state 127:Btrfs 90:JSTOR 76:books 480:2012 362:JFS2 356:and 317:and 313:and 307:NTFS 299:UFS2 285:for 279:WAFL 239:Unix 221:O(1) 201:24/7 184:One 137:, a 62:news 504:IBM 321:in 303:API 210:—a 193:API 165:or 133:In 45:by 527:: 501:. 446:. 325:. 281:, 149:. 516:. 507:. 482:. 457:. 112:) 106:( 101:) 97:( 87:· 80:· 73:· 66:· 39:.

Index


verification
improve this article
adding citations to reliable sources
"Snapshot" computer storage
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message

Btrfs
computer systems
state
photography
backup
multi-tasking
multi-user systems
atomic
data corruption
backup media
approach
locking
API
downtime
24/7
read-only
point in time
O(1)

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑