Size Requirements for the Volume Shadow Copy Service

by Chris Sanders [Published on 25 Jan. 2007 / Last Updated on 25 Jan. 2007]

The Volume Shadow Copy service is a great way to provide an added means of backing up your data. Here we will look at some of the space requirements you will need to plan for when implementing it.

The Volume Shadow Copy Service (VSS) service is a great feature that allows for an added layer of data recoverability in your backup plan. Through the use of shadow copies you can create an automatic point in time backup of all the volumes on your Windows Server 2003 systems.

When planning for a shadow copy implementation it is a good idea to plan ahead for the storage requirements of this feature. By default, this service will automatically create a 100 MB backup file when you enable it. Also, the default maximum size used for these backups will be set to 10% of the volumes total disk space. As soon as this maximum is met, VSS will begin deleting older versions of the data being backed up in order to create new backups. This being the case, you will want to plan for a larger storage maximum if you need to keep shadow copy backups for an extended amount of time.

Just remember, VSS is NOT a one-stop shop for data backups, that is, it should not be the only backup you rely on. You should always develop a full backup plan that includes off-server and off-site backups.

***

Chris Sanders is the network administrator for one of the largest public school systems in the state of Kentucky. Chris's specialties include general network administration, windows server 2003, wireless networking, and security. You can view Chris' personal website at www.chrissanders.org.

The Author — Chris Sanders

Chris Sanders is a network security analyst for EWA Government Systems Inc. Chris is the author of the book Practical Packet Analysis as well as several technical articles. His personal website at www.chrissanders.org contains a great deal of information, articles, and guides related to network administration, network security, packet analysis, and general information technology.

Latest Contributions

Featured Links