Some changes in terminology have occured since CDP 2.0. See the table below.
|CDP 2||CDP 3||CDP 3 Short-hand|
|Backup Task||Data Protection Policy||Policy|
|Backup||Replication||Replica, Replicate, Synchronize, Sync|
|Delete Backup / Delete Recovery Point||Merge Recovery Points||Merge|
See Advanced Edition.
CDP system generates warning alerts to inform users that the current course of action could be in some way dangerous or detrimental.
An application programming interface (API) is an interface implemented by a software program that enables it to interact with other software. There is a list of CDP API provided by R1Soft. See API Documentation.
An Archive Point is basically a copy of the most recent Recovery Point, which can be used for long term data storage to provide further integrity and safe-keeping of data. It supports all of the Recovery Points' functionality. You can browse and restore your files as well as perform a Bare-Metal Restore. See Archiving.
Refers to advanced recovery point archiving rules available in CDP. This process involves archiving the most recently available recovery point as configured on a daily/weekly/monthly basis for long term storage. See Archiving.
A new computer system that does not contain an operating system or any software.
Bare-Metal Restore is the process of instantly rebuilding a computer or server from scratch after a catastrophic failure. The CDP application allows to restore servers directly from disk-based backup. There is no need to first partition your drive and install the operating system. Instead, you use the Bare-Metal Restore process built directly into the CDP Server. See: Bare-Metal Restore.
The file system of every operating system divides the hard disk into groups of bytes called blocks. Block-based backup application reads the data from these blocks. Compared to backup applications that read every file using file system, which is slow and time consuming process, block based backups are more efficient.
Compression is the reduction in size of data in order to save disk space or transmission time. There are three types of compression in CDP: None, Zlib or QuickLZ.
Control Panel Instance is an occurrence of a Hosting Control Panel (a certain installation on the machine where the CDP Agent is installed.) The Instance must be added to the Policy. For each Instance, you need to specify Control Panel Type, Name, Description, and Virtuozzo Container ID (if exists). See CDP for Hosting Control Panels.
Deltas are the data that has changed since the last backup run. Various types of data can be treated as Deltas. It depends on how the backup application computes deltas. A delta could be a raw disk block, a variables length portion of a file or even a complete file depending on the method.
To map the block deltas versions and Recovery Points, the block deltas database is used. This database is a Disk Safe. Disk Safe contains the data needed to restore the Device(s) of Agent. See: Disk Safes.
See Enterprise Edition.
File Excludes are files and folders that a user wants to excluded from replications. The system allows to define various exclude rules while customizing the settings of a replication. The user can exclude files and folders as well. See Excluding Files and Folders.
This is a particular type of CDP replication of a device. It happens under certain conditions and is required to get the asynchronous CDP replication back in sync. Usually this process takes much time and may reduce a network throughput.
Globally Unique Identifier is generated by the system. This is a unique reference number used as an identifier in computer software. The value of a GUID is represented as a 32-character string, for example 0f6b6a6e-d444-4c77-a026-f76be7723e16.
R1Soft Hyper-V VHD Explorer allows you to mount and dismount your Hyper-V Virtual Hard Disk (VHD) files. Explorer shell integration adds right-click "Attach" and "Detach" actions to .vhd files in MS Windows Explorer. Use the Hyper-V VHD Explorer graphical user interface to manage all your mounted VHD files.
This option defines how much free space can be left. This is an effective limit defined in percents of the Device volume. If the limit is reached, then the system forbids generating new Recovery Points. The replication is interrupted and failed.
Log File is a file that lists actions that have occurred. Three types of log files are available in CDP: log file with messages from tasks performed by the backup agent (cdp.log); log file with messages from the CDP Server (server.log); log file with messages from the web GUI, and startup/shutdown tasks (monitor.log). See Accessing Log Files.
The process of deleting a Recovery Point is actually a merge between the unwanted recovery point and closest existing recovery point. Deltas that have changed between the two Recovery Points can be discarded and the space they consume in the Disk Safe freed. See Merging Recovery Points.
In Unix-like systems, a mount point is the location in the operating system's directory structure where a mounted file system appears. In Microsoft Windows, mapping a drive is the equivalent to mount point.
Multi-Point Replication is a function built-in CDP Enterprise Edition. It allows a secondary replicationof your CDP Enterprise Server machine. As the primary CDP Server itself could potentially crash due to hardware failure, virus attack, etc., you can run another CDP Server enabling you to protect the machine with your primary CDP Server installed. Using Multi-Point Replication function, you can replicate your primary CDP Enterprise Server machine by a secondary CDP Enterprise Server. See Multi-Point Replication.
MySQL is a database software with a variety of tools providing multi-user access to a number of databases. The CDP system allows to backup and restore MySQL databases. See CDP for MySQL.
Partition as an action means to divide memory or mass storage into isolated sections. The Partitions are specific areas within the hard disk. Partition Table is a placeholder for the description of a Partition on the hard disk.
Policy is assigned to a Disk Safe. It is a schedule of Disk Safe replication. You can schedule recurring Policies or create one-time Policies. The Policy starts at the time you have specified in the Policy properties. The Policy properties include information about how may Recovery Points to keep in the Disk Safe. See Policies.
Recurrence selected for running the Policy (On Demand, Minutely, Hourly, Daily, Weekly, Monthly, or Yearly)
A Recovery Point is a set of many deltas. Deltas represent the state of a disk volume block at a particular point in time. Each delta can be used by one or more Recovery Point. The relationship between Deltas and Recovery Points is maintained by the Disk Safe. See: Recovery Points.
The limit indicates how many Recovery Points will be kept. The old Recovery Points will be merged automatically.
In order to keep the CDP Agent secure, connections are only accepted from specified CDP Servers. To specify it, you need to add Server Public Key to the CDP Agent. It means creating a text file on the Agent machine. See Adding the Server Key to Linux Agent, Adding the Server Key to Windows Agent.
This is the first stage of replication process. The system creates a point-in-time snapshot of the servers file system for a consistent open file backup.
This is a warning level where users are informed they are close to reaching their effective limit. The level is also defined in percents of the Device volume. This limit is usually a lesser value to Limit Disk Space Available to CDP.
See Standard Edition.
Virtual Hard Disk (VHD) is typically used as a hard disk of a virtual machine. It allows you to deploy multiple operating systems on a single host machine. On the market, there are pre-configured VHDs with already installed software. Such VHDs enable you to evaluate different software solutions in your own environment without the need for dedicated servers or complex installations. Use the Hyper-V VHD Explorer graphical user interface to manage all your mounted VHD files.