add-circle-bold add-circle add-square add alarm-bell-1 alert-diamond analytics-pie-2 archive archive arrow-down-1 arrow-down-2 arrow-left-1 arrow-right-1 arrow-up-1 attachment-1 bin-paper-1 book-star button-record check-1 check-circle-1 close close-quote close cog-1 cog common-file-stack copy-paste credit-card-1 diagram-fall-down disable time-clock-midnight download-thick-bottom drawer-send envelope-letter envelope-letter expand-6 expand-6 file-code filter-1 floppy-disk flying-insect-honey folder-file-1 headphones-customer-support hierarchy-9 hyperlink-2 information-circle keyboard-arrow-down keyboard-arrow-up layout-module-1 list-bullets lock-2 lock-unlock-1 love-it messages-bubble-square move-to-top multiple-circle multiple-neutral-1 multiple-users-1 navigation-menu-horizontal navigation-menu network-browser open-quote pencil-1 pencil-write pencil-1 print-text rating-star rating-star remove-circle remove-square-1 search send-email-1 shield-warning single-neutral-actions single-neutral smiley-sad-1 smiley-unhappy smiley-indifferent smiley-smile-1_1 smiley-happy smiley-sad-1 smiley-unhappy smiley-indifferent smiley-happy smiley-thrilled social-media-twitter synchronize-arrows-1 tags-double ticket-1 ticket-1 time-clock-circle undo view-1 view-off view wench

Disk Storage Considerations

DATASTOR software intelligently protects data on company servers using protection plans and efficiently stores the data in a central repository on a disk volume called a store.

Plan and prepare storage up front to minimize the need to reorganize storage down the line. For larger Enterprise level roll outs protecting multiple terabytes of data, consider our best practices. Small to medium size businesses may not need to follow each recommendation.

  • Create one store per disk volume for best performance.  When there is only one store on a disk volume, DATASTOR Shield version 9.0 can use fast scan technology instead of performing a 'find first, find next' directory scan during execution of store tasks. The volume must be formatted as an NTFS file system. This step is highly recommended in most configurations.
  • Size the disk volume according to the anticipated size of the store at the end of the maximum retention period, plus 10%.
  • Create a separate volume for vaulting. Vaulting to cloud or tape requires a cache on disk to hold vault metadata and to stage data pulled from a vault back to disk during data recovery. Plan a separate volume for the cache location that is at least double the size of the largest archive restore point in the vault (the amount stored on disk on its initial execution).

To achieve maximum performance of maintenance tasks requires proper planning of the number, location, and size of stores. Consider these further best practices.

  • Best performance is achieved when the store is on a volume that appears as a local disk in Windows, using internal, DAS, SAN, or iSCSI attached storage, as opposed to using a NAS share. 
  • Format the volume with the NTFS file system. Stores may be created on NTFS, FAT32 or EXFAT volumes. The fast scan only works with NTFS volumes.
  • A single store may not span multiple volumes. DATASTOR does not support mount points or junction points within the store itself.
  • Global Single Intance Storage data reduction takes place between all protected servers storing data in the same store . Cross-server deduplication does not take place between stores. Group your servers with the highest level of identical data in the same store.
  • When carving a volume out of a SAN device with multiple spindles (hard disks) for use by a store, be careful not to share the same spindles (hard disks) used for production data. If you do and a RAID failure occurs you could lose both your production data and the protected data in the stores with no recovery option available to you.
  • Microsoft best practice is to create a volume with a GUID Partition Table for large volumes. A partition created in Windows with a GUID Partition Table (GPT) may be extended without re-initializing the volume and losing the store. An MBR volume may not. Click this link for more information
  • Take into consideration growth in the size of the store as protection plans continue to run. 
  • If you are limited to a 2 TB volume due to a virtual machine or SCSI device limitation keep in mind that the store has a hard limit. Once full you will need to expire and purge data to recover disk space for plans to continue to run to the targeted store. Plan the number of remote servers, data set size, and retention period accordingly.
  • For stores that cannot use fast scan technology that are protecting multiple-Terabyte, discrete data sets, consider creating a separate store on a separate volume (drive letter) or share for each data type protected. That is, create a separate store for Exchange, SQL, File server data, or document management data types.