Skip to end of metadata
Go to start of metadata

Server Backup Manager creates backups using the Virtual Full Backup method. First, SBM creates the initial full backup, or initial replica. After that, each time a replication executes, SBM stores only the differences (or block-level deltas) that have occurred since the last replication. The following image illustrates the size of data for each replication.

Each replication creates a point-in-time image of the device. This image is called a recovery point. Server Backup Manager uses the block deltas database to map the block versions and recovery points. This database is called a Disk Safe. The following image illustrates the information within a Disk Safe.

SBM uses a Disk Safe to keep and arrange the pieces of replicated information. A Disk Safe can be defined as a container for the data necessary for a restore. You can restore from any available recovery point in any Disk Safe.

Disk Safes have one or more assigned devices selected for backup. Note that you can assign one device to multiple Disk Safes.

Notice
You cannot begin backing up a device until a Disk Safe is created to act as the back up repository. 

To run a replication, you need to associate a data protection policy with your Disk Safe. The policy backs up devices associated with the Disk Safe. If there are items you do not want to include in the replication, you can exclude selected files and folders from the replication when defining the policy properties.

On a physical level, a Disk Safe is a directory containing the following files and folders:

  • .db file
  • .db-journal file
  • .ebs file
  • metadata folder
Properties of a Disk Safe

Disk Safes have the following properties, which you define when creating the Disk Safe:

  • Identification. A unique name that distinguishes this specific Disk Safe in a list and while defining policies.
  • Disk Safe Location. The physical location where the Disk Safe is saved.
  • Devices. A list of devices associated with this Disk Safe. Server Backup Manager automatically identifies and adds all devices during Disk Safe creation. You can also manually add one or more hard disks, partitions, and other volumes of a server where file systems are mounted as devices.
  • Compression Type. Type of data compression used on this Disk Safe. Compressing data helps reduce the consumption of hard disk space or transmission bandwidth.
  • Encryption. Type of data encryption used on this Disk Safe. Encryption helps to protect your Disk Safe data from unauthorized access. When using encryption, your data is converted to cipher text.

Use the Server Backup Manager Web interface to change these characteristics for an existing Disk Safe, with the exception of Disk Safe Location, Encryption, and Deduplication.

The following additional properties are available for existing Disk Safes:

  • State
  • Recovery Points
  • Archive Points
  • On Disk Size
States of a Disk Safe

Disk Safes exist in one of the following states:

  • Opened. An Opened Disk Safe allows you to associate tasks including Backup with opened Disk Safes, and browse the recovery points of a task.
  • Closed. A Closed Disk Safe prevents any tasks associated with it from running. You also cannot browse the recovery points contained within the Disk Safe.
Available Disk Safe tasks

The following actions are available with any Disk Safe:

Section Content
Labels:
disk_safe disk_safe Delete
Enter labels to add to this page:
Please wait 
Looking for a label? Just start typing.