NetApp Snapshot Technology, when does a snapshot grow?

Similar documents
NetApp Data Ontap Simulator Cookbook

NetApp Storage Lab Blog Posts: Introduction:

NetApp Data Ontap Simulator Cookbook

Configuring NetApp Deduplication with LUN s

NetBackup 7.6 Replication Director A Hands On Experience

Deep Dive - Veeam Backup & Replication with NetApp Storage Snapshots

Version 1.0 May Snapshot in Qsan Unified Storage

XP: Backup Your Important Files for Safety

1.7 Limit of a Function

Monitoring and Reporting for an ONTAP Account

EMC VNXe3200 Unified Snapshots

NETAPP - Accelerated NCDA Boot Camp Data ONTAP 7-Mode

Using GitHub to Share with SparkFun a

HQPlayer Kick-Start Guide

textures not patterns

CS354 gdb Tutorial Written by Chris Feilbach

Accelerated NCDA Boot Camp Data ONTAP 7-Mode (ANCDABC87)

How to Rescue a Deleted File Using the Free Undelete 360 Program

Taskbar: Working with Several Windows at Once

Clustered Data ONTAP Administration (DCADM)

Clustered Data ONTAP 8.2

Data ONTAP 8.1 SAN Administration Guide For 7-Mode

Intro. Scheme Basics. scm> 5 5. scm>

Global Locking. Technical Documentation Global Locking

Welcome to VFW WebMail. We hope you enjoy your new mailbox. For those users who had been using the old VFW WebMail system, a couple of items:

Chapter 11. SnapProtect Technology

Deduplication and Incremental Accelleration in Bacula with NetApp Technologies. Peter Buschman EMEA PS Consultant September 25th, 2012

Table of Contents. 1. Cover Page 2. Quote 3. Calculated Fields 4. Show Values As 5. Multiple Data Values 6. Enroll Today!

Data ONTAP 8.1 Storage Efficiency Management Guide for 7-Mode

How to export data from Reckon Quicken Personal Plus to Moneydance By Michael Young

Server Fault Protection with NetApp Data ONTAP Edge-T

UV Mapping to avoid texture flaws and enable proper shading

A Thorough Introduction to 64-Bit Aggregates

Crash Course in Modernization. A whitepaper from mrc

7-Mode Data Transition Using SnapMirror

Chapter01.fm Page 1 Monday, August 23, :52 PM. Part I of Change. The Mechanics. of Change

Clustered Data ONTAP Administration and Data Protection

The Dynamic Typing Interlude

A Thorough Introduction to 64-Bit Aggregates

Gearing Up for Development CS130(0)

COSC 2P91. Bringing it all together... Week 4b. Brock University. Brock University (Week 4b) Bringing it all together... 1 / 22

Infinite Volumes Management Guide

Intro to Algorithms. Professor Kevin Gold

Hello World! Computer Programming for Kids and Other Beginners. Chapter 1. by Warren Sande and Carter Sande. Copyright 2009 Manning Publications

The attendee will get a deep dive into all the DDL changes needed in order to exploit DB2 V10 Temporal tables as well as the limitations.

2. Click on the Freeform Pen Tool. It looks like the image to the right. If it s not showing, right click on that square and choose it from the list.

7-Mode Data Transition Using SnapMirror Technology

EI 338: Computer Systems Engineering (Operating Systems & Computer Architecture)

Data Protection Guide

Keep Track of Your Passwords Easily

Arranging lunch value of preserving the causal order. a: how about lunch? meet at 12? a: <receives b then c>: which is ok?

Virtualizing Microsoft Exchange Server 2010 with NetApp and VMware

SPRITES Moving Two At the Same Using Game State

Lesson 9 Transcript: Backup and Recovery

Spectroscopic Analysis: Peak Detector

SAN Administration Guide

The What, Why and How of the Pure Storage Enterprise Flash Array. Ethan L. Miller (and a cast of dozens at Pure Storage)

CS 167 Final Exam Solutions

Installing and Using Trackside Cameras Revised November 2008

Symbol for Windows Shuffle

EBOOK. NetApp ONTAP Cloud FOR MICROSOFT AZURE ENTERPRISE DATA MANAGEMENT IN THE CLOUD

Copy-Based Transition Guide

Part 6 - Constructing Railroad Bridges

SAN Administration Guide

7-Mode Transition Tool 2.2

FlexCache Caching Architecture

Intro to Python Programming

Data Protection Power Guide

MAKING OF BY BRUNO HAMZAGIC SOFTWARE USED: MAYA AND ZBRUSH

The Right Read Optimization is Actually Write Optimization. Leif Walsh

COS 318: Operating Systems. NSF, Snapshot, Dedup and Review

Bootable duplicate: Create a bootable duplicate of your startup volume on an external hard drive, and update that duplicate regularly.

FILE SYSTEMS, PART 2. CS124 Operating Systems Fall , Lecture 24

Source control with Subversion A user perspective

Netapp Exam NS0-155 Data ONTAP 7-Mode Administrator Version: 6.2 [ Total Questions: 173 ]

What Are CSS and DHTML?

CHAPTER 1 COPYRIGHTED MATERIAL. Finding Your Way in the Inventor Interface

Cluster Management Workflows for OnCommand System Manager

ICANN and Technical Work: Really? Yes! Steve Crocker DNS Symposium, Madrid, 13 May 2017

A Tour of Photoshop Elements 8 What s what and what it does

REVIEW: A LOOK AT A PORTABLE USB3 NETWORK TAP WIRESHARK HEROES SERIES VISIT

Introduction to Programming

SnapCenter Software 1.1 Installation and Setup Guide

Jerry Cain Handout #5 CS 106AJ September 30, Using JSKarel

FROM 4D WRITE TO 4D WRITE PRO INTRODUCTION. Presented by: Achim W. Peschke

Hash Tables. Hash tables combine the random access ability of an array with the dynamism of a linked list.

StorageCraft OneXafe and Veeam 9.5

SQL stands for Structured Query Language. SQL is the lingua franca

NetApp Unified Storage Capacity Management Using Open Interfaces

Announcements. Persistence: Log-Structured FS (LFS)

Data Protection Guide

Data ONTAP 7-Mode Administration Course D7ADM; 5 Days, Instructor-led

Create Reflections with Images

Today s trends in the storage world. Jacint Juhasz Storage Infrastructure Architect

the NXT-G programming environment

A Simplified Explanation of the Repository Technique. A Simplified Explanation of the Repository Technique. The Repository Technique Explained

Requirements for virtualizing Exchange Server 2010

What is version control? (discuss) Who has used version control? Favorite VCS? Uses of version control (read)

Your Data Demands More NETAPP ENABLES YOU TO LEVERAGE YOUR DATA & COMPUTE FROM ANYWHERE

Outline: ONTAP 9 Cluster Administration and Data Protection Bundle (CDOTDP9)

Transcription:

NetApp Snapshot Technology, when does a snapshot grow? Source : http://blog.hernanjlarrea.com.ar/index.php/netapp-snapshot-technology-when-does-a-snapshot-grow/ by Hernán J. Larrea Let s take a quick but deeper view on how does snapshots work and behave, the concept is simple save volume data as it was in certain point in time, but actually it is not so simple or it has some secrets. NetApp snapshot technology is famous because the ability it has to preserve data by using little space and it is the key to many of the features which make NetApp such a great storage technology such as, snapmirror, flex clones, snap vault, deduplication and many others. Understanding the basics First of all take a look at the environment I ve set up to run the tests and some concepts we need to understand: Environment A simulated NetApp filer is exporting via NFS a volume to a server running Linux operating system. This server will create, modify and delete files in the NFS export while it is being monitored in the filer side, on file system utilization, snapshots creation and growth rate. Tools Let s see which tools can we use to monitor snapshots behavior: (CLI) snap delta: this command displays the rate of change of data between snapshots. (TIP: I have found particularly useful this command to determine how much data has changed between last snapmirror snapshot taken and the AFS (or new snapmirror snapshot if transfer is is progress), this way you can determine how much data would be transferred if you update the snapmirror relationship). (CLI) snap reclaimable: this command allows you to determine how much space would be released from a certain volume after deleting the given names of the snapshots. (Filer View) Volumes > Snapshots > Manage: in this part of Filer View (which is particularly useful) you will be able to determine how much does a snapshot occupy (haven t found a way yet to do this through the CLI) and you can calculate the reclaimable space as you can do using snap reclaimable CLI command.

Concepts Active File System or AFS, it s a concept very similar to Snapshot, it is a table, but this one points to the production data blocks within a volume being presented to the server. In other words a server accessing a volume (CIFS, NFS export or LUN, there is no difference) is only aware of the blocks pointed by the AFS table as the data available on the volume. Watching snapshots in action And now let s take a look at the following time line to understand how snaps behave: Overwriting a file Step Description t0 The initial state, volume empty (500MB), exported and mounted in the server (AFS stands for Active File System, the table which point to the data blocks being presented to the server). t1 A file named file1 (10MB) is created.

t2 A snapshot named snap.1 is created. As you can see in the drawing the snap holds pointers to the data blocks the AFS was pointing at the time the snap was taken. t3 A new file named file2 (10MB) is created. t4 A new snapshot named snap.2 is created. Now the blocks used by the

new file also get locked by the new snap. Check out Filer View, as we didn t modify any files snaps have their original size: t5 file1 is fully overwritten by 10MB bunch of data. Lets take a new look to Filer View to see snaps sizes. As you can see, the most recent snapshot has grew, this is quite a logical event as the file which was 10MB has been overwritten by another 10MB of data, and you need to be able to go back to the time before the overwrite, those original 10MB of data must be stored somewhere, and

that somewhere is the snapshot area of the volume. Now let s delete the most recent snapshot (snap.2), and let s take a look at the snapshots size: t6 As you can see, the snapshot snap.1 which previously was only couple of KBs now it is 10MB size, why is that? Well, it is because snapshots tend to merge, snap.2 was 10MB, in other words it had 10MB of data blocks locked by it, but between snap.1 and snap.2 there was no modifications to file1, so when we overwritten the file in t5, snap.2 saved the data for file1, but snap.1 should be also able to restore to the same state (remember between snap.1 and snap.2, file1 didn t suffer any changes) so now snap.2 is not any more here, the 10MB of original data from file1 must be saved by some one in order to ensure the ability to restore to that point in time. This is called merge, and it is a cool way to save space. In other words, when we deleted the snapshot snap.2, the following one (snap.1) toke over those data blocks which were from interest to him. I know this concept might sound estrange and little hard to understand, but play a little with your volumes and snapshots, and if you can do some diagrams.

Adding a new file So until this moment we have seen, a snapshot will grow when it is the last snapshot taken (most recent) and when an already existing file at the moment of the snapshot take is modified, and when it is the second newest snap and the newest one get s deleted. Let s now go back to the time line, back to t5 (now t5 ), but now will create a new file instead of modifying an existing one: Step Description t5 A new file named file3 (10MB) is created. Let s take a look at the snaps sizes: As you can see, none of them grew, this is because the files, actually the blocks used by the file we just created are not locked by any snapshot.

Appending data to an already existing file And now let s look what happens when you append data to files in a volume that is being snapped: Step Description t5 10MB bunch of data is appended to file1. Let s see what happens to the snapshot sizes: As you can see, none of the has grew since new blocks are being added but not locked by any snap.

Deleting files Now let s go to t5 (now t5 ) and let s see what happens when you try to delete a file. I ve used the case of t5 Step Description After appending 10MB bunch of data to file1 in t5 (now file1 is 20MB size). We deleted file1, Let s see what happens to the snapshot sizes: t5 As you can see, the most recent snapshot has grew, but only in 10MB. This is because only 10MB of file1 were protected by snapshots, the additional 10MB were added before any other snapshot was taken, so now, if you try to restore from snap.2 or snap.1 you could only take file1 to the status previous to the appending of 10MB of data.

Conclusion At this point we have seen what happens when you, create a new file, overwrite a file, append data to a file, and delete files in a volume being snapped. So in conclusion, we can say: A snapshot will grow when It is the most recent snap and the files (actually data blocks) existing at the moment of the snapshot take are modified. When a snap is deleted the next one will take over the data blocks the deleted one has released and are from interest to him, this will make the next snapshot to grow. When files are deleted, the most recent snapshot will grow since this one will take over the data blocks it is locking. A snapshot won t grow when A new file is added When appending data to a file, no matter if the file (actually it s blocks) were already locked by a snap. Always remember a volume has space to store data and to store snapshots, an Active File System and a snapshot area. And you must try to find equilibrium between these two, which is actually not an easy task to achieve, specially in big volumes, when snapshots are involved, many things must be taken in considerations. Imagine you need to release space from a CIFS volume which is being snapped and you don t want to extend the volume, it sounds really simple, require users to delete files, but remember when you try to delete files your snaps will grow, so actually you will see no space is actually being released even though your users are deleting. Here you will find some tools or features of volumes, such as snap reserve, which will help you to solve this, and eventually if you need to delete old snaps to release some space, remember it is a good practice to start deleting snapshots from the oldest ones and always to use snap reclaimable command in order to determine how much space are you actually releasing. Again, I know this isn t easy to understand in the first reading, I know it might require couple of re reads to understand, it wasn t easy to write it either, but it has really helped me to gain much deeper understanding on how snapshots behave, hope you can enjoy it too. Hernán J. Larrea