Solved

How does snap shot’s works?

Posted on 2014-12-04
2
410 Views
Last Modified: 2014-12-28
any difference made in 4.z and 5.x ?

how actually snapshot works?

files created when we take snapshot ?

Min free space required to create snap or to delete snapshot from datstore ?
0
Comment
Question by:patron
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 121

Accepted Solution

by:
Andrew Hancock (VMware vExpert / EE MVE^2) earned 500 total points
ID: 40482381
Very quickly in a few sentences, when a Snapshot is taken or created, a new child (delta) file is created linked to the parent disk, all writes are now written to this child disk (the snapshot), the parent disk, has no write lock on the file, so it can be copied, when the snapshot is deleted, it's contents are ,merged with the parent.

There are no differences in snapshots between any version of ESXi/ESX.

My EE Article should tell you all you need to know, after reading it and ALL the links

HOW TO: VMware Snapshots :- Be Patient

if you still have questions, please ask.

Minimum free space to create a snapshot or delete a snapshot, depends on how large the snapshot is, and how active your virtual machine, is, approx a snapshot grows at the rate of 1GB an hour for an idle VM, much more for a very active VM.

We allow 20% free space of the datastore size for snapshots.
0
 
LVL 1

Author Closing Comment

by:patron
ID: 40521383
Thanks
0

Featured Post

When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article aims to explain the working of CircularLogArchiver. This tool was designed to solve the buildup of log file in cases where systems do not support circular logging or where circular logging is not enabled
Many businesses neglect disaster recovery and treat it as an after-thought. I can tell you first hand that data will be lost, hard drives die, servers will be hacked, and careless (or malicious) employees can ruin your data.
This Micro Tutorial will teach you how to reformat your flash drive. Sometimes your flash drive may have issues carrying files so this will completely restore it to manufacturing settings. Make sure to backup all files before reformatting. This w…
This video shows you how to use a vSphere client to connect to your ESX host as the root user. Demonstrates the basic connection of bypassing certification set up. Demonstrates how to access the traditional view to begin managing your virtual mac…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question