224:. In other words, the time and I/O needed to create the snapshot does not increase with the size of the data set; by contrast, the time and I/O required for a direct backup is proportional to the size of the data set. In some systems once the initial snapshot is taken of a data set, subsequent snapshots copy the changed data only, and use a system of pointers to reference the initial snapshot. This method of pointer-based snapshots consumes less disk capacity than if the data set was repeatedly cloned.
122:
25:
348:
EMC's Isilon OneFS clustered storage platform implements a single scalable file system that supports read-only snapshots at the file or directory level. Any file or directory within the file system can be snapshotted and the system will implement a copy-on-write or point-in-time snapshot dynamically
253:
by copying changed blocks‍—‌just before they are to be overwritten within "parent" volumes‍—‌to other storage, thus preserving a self-consistent past image of the block device. Filesystems on such snapshot images can later be mounted as if they were on a read-only media.
261:
snapshots, extending the copy-on-write approach by disassociating any blocks modified within the snapshot from their "parent" blocks in the original volume. Such a scheme could be also described as performing additional copy-on-write operations triggered by the writes to snapshots.
181:, since the backup operation had already taken place before the addition of the file. Version skew may also cause corruption with files which change their size or contents underfoot while being read.
195:
provided by the operating system to enforce exclusive read access. This is tolerable for low-availability systems (on desktop computers and small workgroup servers, on which regular
422:
WAFL is not a file system. WAFL is a file layout that provides mechanisms that enable a variety of file systems and technologies that want to access disk blocks.
188:
to safely backing up live data is to temporarily disable write access to data during the backup, either by stopping the accessing applications or by using the
42:
360:
file systems support creating snapshots (cloning) of individual files. Additionally, Btrfs also supports the creation of snapshots of subvolumes. On AIX,
535:
468:
177:. For example, if a user moves a file into a directory that has already been backed up, then that file would be completely missing on the
89:
61:
269:(LVM) allows creation of both read-only and read-write snapshots. Writable snapshots were introduced with the LVM version 2 (LVM2).
192:
108:
218:—and allow applications to continue writing to their data. Most snapshot implementations are efficient and can create snapshots in
68:
383:
266:
46:
75:
170:
388:
57:
278:
329:
provides snapshots via the same VSS interface for shared storage. Snapshots have also been available in the NSS (
35:
378:
242:
513:
142:
499:"Understanding and exploiting snapshot technology for data protection, Part 1: Snapshot technology overview"
330:
211:
189:
342:
146:
286:
178:
162:
82:
540:
282:
169:, there may be writes to that data while it is being backed up. This prevents the backup from being
314:
393:
166:
498:
121:
373:
326:
298:
530:
403:
174:
293:, internally track old versions of files and make snapshots available through a special
145:
of a system at a particular point in time. The term was coined as an analogy to that in
220:
524:
443:
322:
246:
215:
398:
250:
206:
To avoid downtime, high-availability systems may instead perform the backup on a
318:
309:, access to snapshots is provided by the Volume Shadow-copying Service (VSS) in
24:
310:
294:
196:
134:
16:
Recorded state of a computer storage system at a particular point in time
334:
469:"Optimized Storage Solution for Enterprise Scale Hyper-V Deployments"
185:
158:
357:
353:
349:
based on which method is determined to be optimal for the system.
338:
290:
126:
120:
361:
306:
238:
200:
503:
302:
18:
161:
of a large data set may take a long time to complete. On
49:. Unsourced material may be challenged and removed.
203:systems, however, cannot bear service stoppages.
173:and introduces a version skew that may result in
8:
257:Some volume managers also allow creation of
337:since version 4.11, and more recently on
109:Learn how and when to remove this message
435:
415:
7:
47:adding citations to reliable sources
514:"Storage Basics: Backup Strategies"
474:. Microsoft. March 2010. p. 15
374:Apple File System § Snapshots
199:is acceptable). High-availability
14:
305:for accessing file histories. In
214:copy of the data set frozen at a
129:filesystem, managed with snapper
58:"Snapshot" computer storage
23:
536:Fault-tolerant computer systems
497:Garimella, Neeta (2006-04-26).
34:needs additional citations for
384:Persistence (computer science)
301:, provide an operating system
241:systems have snapshot-capable
1:
512:Harwood, Mike (2003-09-24).
389:Sandbox (computer security)
277:Some file systems, such as
557:
125:Example of snapshots of a
379:Application checkpointing
364:also support snapshots.
331:Novell Storage Services
243:logical volume managers
343:Open Enterprise Server
267:Logical Volume Manager
130:
287:Plan 9 from Bell Labs
124:
43:improve this article
315:Windows Server 2003
394:Storage Hypervisor
245:. These implement
167:multi-user systems
131:
341:platforms in the
333:) file system on
119:
118:
111:
93:
548:
517:
508:
484:
483:
481:
479:
473:
465:
459:
458:
456:
455:
440:
423:
420:
135:computer systems
114:
107:
103:
100:
94:
92:
51:
27:
19:
556:
555:
551:
550:
549:
547:
546:
545:
521:
520:
511:
496:
493:
488:
487:
477:
475:
471:
467:
466:
462:
453:
451:
442:
441:
437:
432:
427:
426:
421:
417:
412:
404:Virtual machine
370:
297:. Others, like
275:
235:
233:Volume managers
230:
228:Implementations
175:data corruption
155:
115:
104:
98:
95:
52:
50:
40:
28:
17:
12:
11:
5:
554:
552:
544:
543:
538:
533:
523:
522:
519:
518:
509:
492:
491:External links
489:
486:
485:
460:
448:3.8. Snapshots
434:
433:
431:
428:
425:
424:
414:
413:
411:
408:
407:
406:
401:
396:
391:
386:
381:
376:
369:
366:
352:On Linux, the
274:
271:
234:
231:
229:
226:
154:
151:
117:
116:
99:September 2013
31:
29:
22:
15:
13:
10:
9:
6:
4:
3:
2:
553:
542:
539:
537:
534:
532:
529:
528:
526:
515:
510:
506:
505:
500:
495:
494:
490:
470:
464:
461:
449:
445:
439:
436:
429:
419:
416:
409:
405:
402:
400:
397:
395:
392:
390:
387:
385:
382:
380:
377:
375:
372:
371:
367:
365:
363:
359:
355:
350:
346:
344:
340:
336:
332:
328:
324:
323:Windows Vista
320:
316:
312:
308:
304:
300:
296:
292:
288:
284:
280:
272:
270:
268:
263:
260:
255:
252:
251:block devices
248:
247:copy-on-write
244:
240:
232:
227:
225:
223:
222:
217:
216:point in time
213:
209:
204:
202:
198:
194:
191:
187:
182:
180:
176:
172:
168:
164:
163:multi-tasking
160:
152:
150:
148:
144:
140:
136:
128:
123:
113:
110:
102:
91:
88:
84:
81:
77:
74:
70:
67:
63:
60: –
59:
55:
54:Find sources:
48:
44:
38:
37:
32:This article
30:
26:
21:
20:
502:
476:. Retrieved
463:
452:. Retrieved
447:
438:
418:
399:System image
351:
347:
276:
273:File systems
264:
258:
256:
236:
219:
207:
205:
183:
179:backup media
156:
138:
132:
105:
96:
86:
79:
72:
65:
53:
41:Please help
36:verification
33:
541:Persistence
444:"LVM HOWTO"
319:Shadow Copy
147:photography
525:Categories
478:25 October
454:2013-09-29
450:. tldp.org
430:References
311:Windows XP
265:On Linux,
249:on entire
69:newspapers
345:product.
295:namespace
212:read-only
153:Rationale
368:See also
327:Melio FS
259:writable
208:snapshot
197:downtime
186:approach
139:snapshot
335:NetWare
190:locking
157:A full
141:is the
83:scholar
531:Backup
289:, and
283:fossil
171:atomic
159:backup
85:
78:
71:
64:
56:
472:(PDF)
410:Notes
358:OCFS2
354:Btrfs
339:Linux
291:ODS-5
237:Some
143:state
127:Btrfs
90:JSTOR
76:books
480:2012
362:JFS2
356:and
317:and
313:and
307:NTFS
299:UFS2
285:for
279:WAFL
239:Unix
221:O(1)
201:24/7
184:One
137:, a
62:news
504:IBM
321:in
303:API
210:—a
193:API
165:or
133:In
45:by
527::
501:.
446:.
325:.
281:,
149:.
516:.
507:.
482:.
457:.
112:)
106:(
101:)
97:(
87:·
80:·
73:·
66:·
39:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.