You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: WindowsServerDocs/storage/file-server/volume-shadow-copy-service.md
+2-27
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
description: "Learn more about: Volume Shadow Copy Service"
3
3
title: Volume Shadow Copy Service
4
-
ms.date: 01/30/2019
4
+
ms.date: 12/06/2022
5
5
author: JasonGerend
6
6
manager: elizapo
7
7
ms.author: jgerend
@@ -30,7 +30,6 @@ VSS coordinates the actions that are required to create a consistent shadow copy
30
30
31
31
- You need a fast recovery from data loss by restoring data to the original Logical Unit Number (LUN) or to an entirely new LUN that replaces an original LUN that failed.
32
32
33
-
34
33
Windows features and applications that use VSS include the following:
35
34
36
35
-[Windows Server Backup](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc754572(v=ws.10)) (https://go.microsoft.com/fwlink/?LinkId=180891)
@@ -39,8 +38,7 @@ Windows features and applications that use VSS include the following:
39
38
40
39
-[System Center Data Protection Manager](https://go.microsoft.com/fwlink/?linkid=180892) (https://go.microsoft.com/fwlink/?LinkId=180892)
@@ -86,7 +84,6 @@ To create a shadow copy, the requester, writer, and provider perform the followi
86
84
87
85
8. VSS tells the writers to thaw application write I/O requests. At this point applications are free to resume writing data to the disk that is being shadow-copied.
88
86
89
-
90
87
> [!NOTE]
91
88
> The shadow copy creation can be aborted if the writers are kept in the freeze state for longer than 60 seconds or if the providers take longer than 10 seconds to commit the shadow copy.
92
89
<br>
@@ -95,7 +92,6 @@ To create a shadow copy, the requester, writer, and provider perform the followi
95
92
96
93
10. If the shadow copy is successfully created, the Volume Shadow Copy Service returns the location information for the shadow copy to the requester. In some cases, the shadow copy can be temporarily made available as a read-write volume so that VSS and one or more applications can alter the contents of the shadow copy before the shadow copy is finished. After VSS and the applications make their alterations, the shadow copy is made read-only. This phase is called Auto-recovery, and it is used to undo any file-system or application transactions on the shadow copy volume that were not completed before the shadow copy was created.
97
94
98
-
99
95
### How the Provider Creates a Shadow Copy
100
96
101
97
A hardware or software shadow copy provider uses one of the following methods for creating a shadow copy:
@@ -114,7 +110,6 @@ A complete copy is usually created by making a "split mirror" as follows:
114
110
115
111
2. The shadow copy volume is separated from the original volume. This breaks the mirror connection.
116
112
117
-
118
113
After the mirror connection is broken, the original volume and the shadow copy volume are independent. The original volume continues to accept all changes (write I/O requests), while the shadow copy volume remains an exact read-only copy of the original data at the time of the break.
119
114
120
115
### Copy-on-write method
@@ -162,7 +157,6 @@ The copy-on-write method is a quick method for creating a shadow copy, because i
162
157
163
158
In the redirect-on-write method, whenever the original volume receives a change (write I/O request), the change is not applied to the original volume. Instead, the change is written to another volume's shadow copy storage area.
164
159
165
-
166
160
<table>
167
161
<colgroup>
168
162
<col>
@@ -257,11 +251,8 @@ In Windows Server 2008 R2 and Windows 7, VSS requesters can use a hardware sh
257
251
258
252
The shadow copy can be a full clone or a differential shadow copy. In either case, at the end of the resync operation, the destination LUN will have the same contents as the shadow copy LUN. During the resync operation, the array performs a block-level copy from the shadow copy to the destination LUN.
259
253
260
-
261
254
> [!NOTE]
262
255
> The shadow copy must be a transportable hardware shadow copy.
263
-
<br>
264
-
265
256
266
257
Most arrays allow production I/O operations to resume shortly after the resync operation begins. While the resync operation is in progress, read requests are redirected to the shadow copy LUN, and write requests to the destination LUN. This allows arrays to recover very large data sets and resume normal operations in several seconds.
267
258
@@ -273,11 +264,8 @@ LUN resynchronization is different from LUN swapping. A LUN swap is a fast recov
273
264
274
265
- If the destination LUN is unusable and needs to be recreated, LUN swapping may be more economical because it doesn't require a destination LUN.
275
266
276
-
277
267
> [!WARNING]
278
268
> All of the operations listed are LUN-level operations. If you attempt to recover a specific volume by using LUN resynchronization, you are unwittingly going to revert all the other volumes that are sharing the LUN.
279
-
<br>
280
-
281
269
282
270
### Restoring individual files (Shadow Copies for Shared Folders)
283
271
@@ -303,11 +291,8 @@ With the Volume Shadow Copy Service and a storage array with a hardware provider
303
291
304
292
**Figure 3** Shadow copy creation and transport between two servers
305
293
306
-
307
294
> [!NOTE]
308
295
> A transportable shadow copy that is created on Windows Server 2003 cannot be imported onto a server that is running Windows Server 2008 or Windows Server 2008 R2. A transportable shadow copy that was created on Windows Server 2008 or Windows Server 2008 R2 cannot be imported onto a server that is running Windows Server 2003. However, a shadow copy that is created on Windows Server 2008 can be imported onto a server that is running Windows Server 2008 R2 and vice versa.
309
-
<br>
310
-
311
296
312
297
Shadow copies are read-only. If you want to convert a shadow copy to a read/write LUN, you can use a Virtual Disk Service-based storage-management application (including some requesters) in addition to the Volume Shadow Copy Service. By using this application, you can remove the shadow copy from Volume Shadow Copy Service management and convert it to a read/write LUN.
313
298
@@ -351,14 +336,12 @@ For more information, see the following Microsoft TechNet Web sites:
351
336
352
337
-[Windows Server Backup](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc754572(v=ws.10)) (https://go.microsoft.com/fwlink/?LinkID=180891)
353
338
354
-
355
339
### Can I exclude files from a shadow copy to save space?
356
340
357
341
VSS is designed to create shadow copies of entire volumes. Temporary files, such as paging files, are automatically omitted from shadow copies to save space.
358
342
359
343
To exclude specific files from shadow copies, use the following registry key: **FilesNotToSnapshot**.
360
344
361
-
362
345
> [!NOTE]
363
346
> The <STRONG>FilesNotToSnapshot</STRONG> registry key is intended to be used only by applications. Users who attempt to use it will encounter limitations such as the following:
364
347
> <br>
@@ -368,7 +351,6 @@ To exclude specific files from shadow copies, use the following registry key: **
368
351
> <LI>It can delete files from a shadow copy that was created by using the <ahref="/windows-server/administration/windows-commands/diskshadow"data-raw-source="[Diskshadow](../../administration/windows-commands/diskshadow.md)">Diskshadow</a> utility, but it cannot delete files from a shadow copy that was created by using the <ahref="/windows-server/administration/windows-commands/vssadmin"data-raw-source="[Vssadmin](../../administration/windows-commands/vssadmin.md)">Vssadmin</a> utility.<BR><BR>
369
352
> <LI>Files are deleted from a shadow copy on a best-effort basis. This means that they are not guaranteed to be deleted.<BR><BR></LI></UL>
370
353
371
-
372
354
For more information, see [Excluding Files from Shadow Copies](/windows/win32/vss/excluding-files-from-shadow-copies) (https://go.microsoft.com/fwlink/?LinkId=180904) on MSDN.
373
355
374
356
### My non-Microsoft backup program failed with a VSS error. What can I do?
@@ -399,7 +381,6 @@ The following criteria are evaluated, in this order, to determine the diff area
399
381
400
382
- If the volume being shadow copied is one of the possible locations, then a local association is created. Otherwise an association with the volume with the most available space is created.
401
383
402
-
403
384
### Can VSS create shadow copies of non-NTFS volumes?
404
385
405
386
Yes. However, persistent shadow copies can be made only for NTFS volumes. In addition, at least one volume mounted on the system must be an NTFS volume.
@@ -430,7 +411,6 @@ The Windows operating system provides the following tools for working with VSS:
DiskShadow is a VSS requester that you can use to manage all the hardware and software snapshots that you can have on a system. DiskShadow includes commands such as the following:
@@ -445,7 +425,6 @@ DiskShadow is a VSS requester that you can use to manage all the hardware and so
445
425
446
426
-**revert**: Reverts a volume back to a specified shadow copy
447
427
448
-
449
428
This tool is intended for use by IT professionals, but developers might also find it useful when testing a VSS writer or VSS provider.
450
429
451
430
DiskShadow is available only on Windows Server operating systems. It is not available on Windows client operating systems.
@@ -466,7 +445,6 @@ VssAdmin includes commands such as the following:
466
445
467
446
-**resize shadowstorage**: Changes the maximum size of the shadow copy storage area
468
447
469
-
470
448
VssAdmin can only be used to administer shadow copies that are created by the system software provider.
471
449
472
450
VssAdmin is available on Windows client and Windows Server operating system versions.
@@ -481,7 +459,6 @@ The following registry keys are available for use with VSS:
481
459
482
460
-**MinDiffAreaFileSize**
483
461
484
-
485
462
### VssAccessControl
486
463
487
464
This key is used to specify which users have access to shadow copies.
@@ -492,7 +469,6 @@ For more information, see the following entries on the MSDN Web site:
492
469
493
470
-[Security Considerations for Requesters](/windows/win32/vss/security-considerations-for-requestors) (https://go.microsoft.com/fwlink/?LinkId=180908)
494
471
495
-
496
472
### MaxShadowCopies
497
473
498
474
This key specifies the maximum number of client-accessible shadow copies that can be stored on each volume of the computer. Client-accessible shadow copies are used by Shadow Copies for Shared Folders.
@@ -513,7 +489,6 @@ For more information, see the following entry on the MSDN Web site:
513
489
514
490
The following table lists the minimum supported operating system versions for VSS features.
0 commit comments