9.5.01 HP P4000 SAN Solution User Guide (AX696-96168, February 2012)

would run weekly and retain 5 copies. A third schedule would run monthly and keep 4
copies.
File-level restore without tape or backup software
Source volumes for data mining, test and development, and other data use.
Best Practice—Use SmartClone volumes. See “SmartClone volumes” (page 178) .
Planning snapshots
When planning to use snapshots, consider their purpose and size. If you are planning to use
schedules to snapshot a volume, see “Clusters and storage systems” (page 133) and Table 45
(page 163) for approximate data change rates for some common applications.
Table 45 Common applications’ daily change rates
Daily Change RatesApplication
1 - 3%Fileshare
10 - 20%Email/Exchange
10%Database
NOTE: When considering the size of snapshots in the cluster, remember that the data protection
level of the volume is duplicated in the snapshot.
Also consider how many volumes and snapshots you want to create and manage. For information
about the recommended maximum number of volumes and snapshots that can be created in a
management group, see “Configuration Summary overview” (page 109) and “Working with
management groups” (page 104).
Configuring snapshots
When creating a snapshot, you define the following characteristics or options.
Table 46 Snapshot characteristics
What it meansSnapshot parameter
This option quiesces applications on the server before the
SAN/iQ software creates the snapshot. This option requires
Application-Managed Snapshot
the use of the Application Aware Snapshot Manager. For
more information, see “Prerequisites for
application-managed snapshots” (page 164). If the
Application Aware Snapshot Manager is not installed, the
SAN/iQ software creates a point-in-time snapshot (not
using the Application Aware Snapshot Manager).
The name of the snapshot that is displayed in the CMC. A
snapshot name must be from 1 to 127 characters and is
Snapshot Name
case sensitive. Snapshots have a default naming convention
enabled when the CMC is installed. You can change or
disable this naming convention. See “Setting naming
conventions” (page 15) for information about this naming
convention. The following are illegal characters: , ' ; : =.
(Optional) A description of the snapshot – from 0 to 127
characters.
Description
(Optional for Windows) Configure server access to the
snapshot.
Required for VMware: In the CMC, first configure a server
with the controlling IP address. The controlling IP address
Assign and Unassign Servers
is the IP address of the application server on which the
Planning snapshots 163