10.5 HP StoreVirtual Storage User Guide (AX696-96269, March 2013)
would run weekly and retain 5 copies. A third schedule would run monthly and keep 4
copies.
• File-level restore without tape or backup software
• Source volumes for data mining, test and development, and other data use.
Best Practice—Use SmartClone volumes. See “SmartClone volumes” (page 183).
Planning snapshots
When planning to use snapshots, consider their purpose and size. If you are planning to use
schedules to snapshot a volume, see “Clusters and storage systems” (page 136) and Table 51
(page 166) for approximate data change rates for some common applications.
Table 51 Common applications’ daily change rates
Daily Change RatesApplication
1 - 3%Fileshare
10 - 20%Email/Exchange
10%Database
NOTE: When considering the size of snapshots in the cluster, remember that the data protection
level of the volume is duplicated in the snapshot.
Also consider how many volumes and snapshots you want to create and manage. For information
about the recommended maximum number of volumes and snapshots that can be created in a
management group, see “Configuration Summary overview” (page 110) and “Working with
management groups” (page 107).
Configuring snapshots
When creating a snapshot, you define the following characteristics or options.
Table 52 Snapshot characteristics
What it meansSnapshot parameter
This option quiesces applications on the server before the
LeftHand OS software creates the snapshot. This option
Application-Managed Snapshot
requires the use of the Application Aware Snapshot
Manager. For more information, see “Prerequisites for
application-managed snapshots” (page 167). If the
Application Aware Snapshot Manager is not installed, the
LeftHand OS software creates a point-in-time snapshot (not
using the Application Aware Snapshot Manager).
The name of the snapshot that is displayed in the CMC. A
snapshot name must be from 1 to 127 characters and is
Snapshot Name
case sensitive. Snapshots have a default naming convention
enabled when the CMC is installed. You can change or
disable this naming convention. See “Setting naming
conventions” (page 18) for information about this naming
convention. The following are illegal characters: , ' “ ; : =.
(Optional) A description of the snapshot – from 0 to 127
characters.
Description
(Optional for Windows) Configure server access to the
snapshot.
Required for VMware: In the CMC, first configure a server
with the controlling IP address. The controlling IP address
Assign and Unassign Servers
is the IP address of the application server on which the
166 Using snapshots