are several ways to help you save storage costs and help you control the overall situation:
1. recovery capacity
capacity reclamation system is often referred to as a good administrator The room was cleaned. Capacity recovery should be done frequently. Not only capacity recovery in the user environment, but also in the virtual architecture. System administrators run periodic checks to find duplicate virtual machine disk files, orphaned virtual machine disk files, and unused backup systems waiting to be revoked.
the garbage collection process to a large extent can help reclaim storage. Systems that are marked for deletion should be reclaimed at the beginning of the process. This continuous storage recycling can help reduce storage costs and free up existing space so that you don't have to buy new storage.
2.
control the amount of each company when discussing the use of storage will involve the amount of the issue. User data is growing at a very fast rate, often matching the data usage of production systems. User credits can help control unchecked storage usage. A quota is the storage limit assigned to a particular user. The best example of the amount of user space
is e-mail. When you are close to your space limit, you will receive a message reminding you that you are close to the limit, and then you can delete or remove some emails. This type of warning is called a "soft" limit. When you are close to your "hard" limit or absolute limit, you will no longer receive emails. You must remove or delete the message to restore the credit. The quota prevents users from consuming all available space so that individual users use their own space without interfering with the use of others.
3. Control storage growth
control storage growth is not an easy thing. The expansion of Moore's Law makes storage consumption faster and faster (doubles every two years). Moore's Law is very precise, but we don't have to think of it as a way to accept it. The best way to control storage growth is through storage policies: you can set standards for every operation that involves storage. This does not have to be very accurate, but it must be implemented and implemented. Since
also swallowed storage virtualization, storage policy is an example of a standard virtual machine configuration standard 40GB capacity C drive and D drive capacity of 40GB. Exceptions other than any standard must undergo some form of review. This type of strategy can help storage administrators accurately predict storage consumption rates.
4. prevent the server from misuse
server abuse is a very consuming money moves, it will consume your memory very quickly. Virtual machine server abuse also consumes licenses, CPU, memory, and network resources. Perhaps because the deployment of virtual machines is very easy, server abuse in virtual infrastructures is also more common. Server abuse issues in virtual infrastructure are not as compelling as physical systems because virtual server deployment consumes relatively little resources and planning. A system administrator can create and start a virtual machine in minutes, and a physical server can take several weeks to configure.
best way to prevent abuse of the server is to use a method of metering similar to the physical machine. Although part of the fun of virtualization is that you can deploy new systems very quickly, it's also a burden. Flexibility is always accompanied by cost. This cost is the abuse of the server. You need to check the number of systems regularly and compare the number of systems to the number of licenses you have purchased. 5. The
deduplication Deduplication technology can reduce the need to store the number of backup and archive volume inside the volume data. Reducing the amount of data storage by eliminating duplicate data can extend the life of your current storage capacity. By reducing backup time, deduplication can save money, capacity, and time.
6. hierarchical data
If you must store each data, at least a portion of the data you want to migrate to less expensive storage. Data that is rarely accessed but must be saved can be placed on a cheap SAS drive. You don't want to put financial data, log files, or archived mail 10 years ago on expensive solid-state drives (SSDs) or 15,000-rpm disk drives.
you can produce data and mission-critical systems on expensive and highly redundant storage. As for the rest, you can put it on slow and cheap storage.
7. cloud storage
if you do not completely own data storage happens? Cloud vendors provide a safe and inexpensive way to store data. Amazon's Simple Storage Service (S3: Simple Storage Service) is the best known solution. There are some cloud storage vendors for individuals and small companies that use Amazon's S3 services. You can bypass S3. Amazon's direct use of S3. Amazon's highly durable storage and pay-as-you-go payment methods, perfect for backup, archiving and disaster recovery. You can turn the storage to Amazon for processing, which reduces storage costs.
Amazon also provides further storage, known as Reduced Redundancy Storage (RRS: to redundant memory). RRS is a storage solution for non-critical data. For example, if you need to find secondary storage for your archived data, RRS is a good choice because it can reduce costs. However, cost reductions result in reduced reliability (99.99% durability and reliability). 99.99% reliability is clearly lower than Amazon's standard (99.999999999%), and you should not like data loss.
Open the parent path is the beginning of this concept in Windows 2003, the previous windows xp, wind
The topic requires a DNS server to act as a domain name resolution server for two mail servers. 1. S
server perfect settings, support asp php cgi jsp asp.net mysql! First download the program we want
                  Todays classmates computer IIS server suddenly has a problem, let me help, I look
Digital Campus Solution Based on Linux Operating System
Server Security Dog Remote Desktop Protection Tutorial
Safety first: Top Ten Tips for Enterprise Protection DNS Server
Happy summer, Baotong teaches you how to play the server DIY
Server MYSQL CPU usage is too high solution
Make your web server log files more secure
Server IIS prohibits exe, zip, rar and other file downloads
Teach you how to install and configure a server cluster system
Windows server2003 speed up method
Win8.1 screenshot method Daquan
Detailed analysis: the process of installing and configuring VNC under CentOS
How to modify the mac address of the win7 flagship platform
Win7 Ultimate system appears blue screen display code 0x0000007A how to solve
How does the Win7 system shut down port 445?
How does the Win7 system computer safely open the poisoned U disk?
How to fix the Win10 stopwatch to the start menu? Fix Win10 stopwatch to the start menu tutorial
Switching From Windows to Nix or a Newbie to Linux � 20 Use