Dell PowerStore 9000T EMC PowerStore Protecting Your Data - Page 3

Dell EMC PowerStore Protecting Your Data, Additional Resources

Page 3 highlights

Contents Additional Resources...4 1 Introduction...5 Data protection in PowerStore...5 Snapshots...5 Replication...6 Protection policies...6 Associate a protection policy with a storage resource 7 2 Snapshots...8 Snapshot rules...8 Take a snapshot...8 Create a thin clone...8 Using snapshots to access hosts...9 Refresh a storage resource...9 Restore a storage resource from a snapshot...9 3 Replication...10 Remote systems...10 Replication rules...10 Failover...11 Recovery point objective...11 Synchronization...11 A Use cases...13 Snapshot and thin clone use cases...13 Replication use cases...14 Using replication for planned downtime...14 Using replication for disaster recovery...14 Contents 3

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14

Additional Resources
...................................................................................................................................................................
4
1 Introduction
.................................................................................................................................
5
Data protection in PowerStore
............................................................................................................................................
5
Snapshots
...............................................................................................................................................................................
5
Replication
..............................................................................................................................................................................
6
Protection policies
.................................................................................................................................................................
6
Associate a protection policy with a storage resource
...............................................................................................
7
2 Snapshots
...................................................................................................................................
8
Snapshot rules
........................................................................................................................................................................
8
Take a snapshot
.....................................................................................................................................................................
8
Create a thin clone
................................................................................................................................................................
8
Using snapshots to access hosts
........................................................................................................................................
9
Refresh a storage resource
..................................................................................................................................................
9
Restore a storage resource from a snapshot
....................................................................................................................
9
3 Replication
.................................................................................................................................
10
Remote systems
...................................................................................................................................................................
10
Replication rules
...................................................................................................................................................................
10
Failover
...................................................................................................................................................................................
11
Recovery point objective
.....................................................................................................................................................
11
Synchronization
.....................................................................................................................................................................
11
A Use cases
...................................................................................................................................
13
Snapshot and thin clone use cases
....................................................................................................................................
13
Replication use cases
...........................................................................................................................................................
14
Using replication for planned downtime
......................................................................................................................
14
Using replication for disaster recovery
........................................................................................................................
14
Contents
Contents
3