VAST Cluster enables you to protect your data with the following backup and recovery features:
-
Snapshots which enable local backup on the VAST Cluster itself.
In local backup, snapshots are taken periodically, or manually whenever you want to take one, and retained on the cluster for a configurable period. Data that was backed up with snapshots can be accessed in a read only virtual directory via a client connection to the path protected by the snapshot. Data can be restored by simply copying from the virtual directory to another directory.
For full feature documentation, see Snapshots and Local Backup.
-
VAST Asynchronous replication
In async replication, data is replicated from a local path to a path on one or more remote replication peer clusters, where it is marked as read-only. Snapshots (which can also be retained for local backup) are copied regularly to the remote peers and retained on the peers for a configurable period.
Async replication enables failover to a remote destination peer, in which replicated data becomes writeable, the peer can be used in place of the original cluster, and the now writable peer can take on the role of replication source.
For full feature documentation, see VAST Asynchronous Replication and Failover to a Replication Peer.
-
Backup to S3.
In backup to S3, snapshots (which can also be retained for local backup) are copied to an AWS S3 bucket or a custom target location that is accessible via S3 operations. Backed up data can be accessed in a read only virtual directory via client connection to the root of the cluster's element store. Data can be restored by simply copying from the virtual directory to another directory.
For full feature documentation, see Backup to S3.
-
Indestructibility.
This feature enables you to create and maintain immutable backups. Snapshots and protection policies can be flagged indestructible and they are then protected from accidental or malicious deletion and modification. Modifying and deleting indestructible policies and snapshots requires a token-based authorized unlocking of an indestructibility mechanism.
Comments
0 comments
Article is closed for comments.