- 03-08-21Wegwerkzaamheden BIT-2 van 16 aug tot en met 25 sep
- 23-07-21DDoS aanvallen naar BIT infra
- 25-06-21Mond- en neusmasker niet meer verplicht bij BIT
- 14-04-21Untangle haalt de complexiteit uit netwerkbeveiliging
- 03-03-21Vacature Netwerk Engineer
- 02-03-21Update RFO netwerk incident 17 februari 2021
- 18-02-21RFO netwerk incident
- 17-02-21Netwerk incident - www.bit.nl niet bereikbaar
- 22-01-21Avondklok: Datacenters 24/7 bereikbaar en remote hands en brains mogelijk
- 30-11-20Mond- en neusmasker vanaf 1 december bij BIT verplicht
A look in the spice cabinet of BIT
“Any sufficiently advanced technology is indistinguishable from magic.”
- Clarke’s First Law
We use ZFS as ‘backing storage’ for our network backup service. In Linux-land, ZFS is a relatively new filing system with many advantages compared to the old ‘tested’ filing systems that we know, like FAT, EXT4 or XFS.
One of those advantages is the option to make ‘snapshots’. A ‘snapshot’ is a picture. In the filing system world, a snapshot is often a recording of that status of a filing system at a certain moment in time. This way we can ‘go back in time’ in the filing system, like you would when looking at childhood pictures.
ZFS is very efficient when it comes to snapshots. It uses the so-called ‘COW’-principle. COW stands for ‘Copy on Write’. A snapshot that has just been made, does not take up any space. The snapshot will only start to take up space when bytes change in the ‘source volume’ of the snapshot. Before the changed data is saved in the filing system, a copy of that data is put on the snapshot. This does make it a little unclear where the usage of the network backup can be found. Occasionally we get questions about our network backup report, ranging from ‘what is the usage of the system’ to ‘if I delete this snapshot, do I get that amount of bites in free space back’.
It is often hard to give a clear answer to such questions.
With some hands-on examples, we hope to give you some insight in the effect of snapshots on the available ‘quota’ of the hired network backup service.
If you still have some questions despite (or because of) this technical explanation, please feel free to contact us!
By: Sander Smeenk