Veritas Storage Foundation 5.1 SP1 Advanced Features Administrator"s Guide (5900-1503, April 2011)

Chapter 19 Administering Storage Checkpoints .............................. 267
About Storage Checkpoints .......................................................... 267
Distinguishing between Storage Checkpoints and
snapshots ..................................................................... 268
Operation of a Storage Checkpoint ................................................. 269
Copy-on-write ...................................................................... 271
Types of Storage Checkpoints ....................................................... 272
Data Storage Checkpoints ...................................................... 272
Nodata Storage Checkpoints ................................................... 273
Removable Storage Checkpoints .............................................. 274
Non-mountable Storage Checkpoints ....................................... 274
Storage Checkpoint administration ................................................ 274
Creating a Storage Checkpoint ................................................ 275
Removing a Storage Checkpoint .............................................. 276
Accessing a Storage Checkpoint .............................................. 277
Converting a data Storage Checkpoint to a nodata Storage
Checkpoint .................................................................... 279
Storage Checkpoint space management considerations ..................... 286
Restoring from a Storage Checkpoint ............................................. 287
Restoring a file from a Storage Checkpoint ................................ 287
Storage Checkpoint quotas ........................................................... 292
Chapter 20 Administering FileSnaps .................................................. 293
About FileSnaps ......................................................................... 293
Properties of FileSnaps ................................................................ 294
Creating FileSnaps ...................................................................... 295
Concurrent I/O to FileSnaps ......................................................... 295
Copy-on-write and FileSnaps ........................................................ 295
Reading from FileSnaps ............................................................... 296
Block map fragmentation and FileSnaps ......................................... 296
Backup and FileSnaps .................................................................. 296
Using FileSnaps ......................................................................... 297
Best practices with FileSnaps ........................................................ 298
Virtual desktops ................................................................... 298
Write intensive applications ................................................... 298
Data mining, reporting, and testing ......................................... 299
Comparison of the logical size output of the fsadm -S shared, du, and
df commands ....................................................................... 299
13Contents