How VMware Snapshots Work - It's Like It Never Happened!

แชร์
ฝัง
  • เผยแพร่เมื่อ 5 ก.พ. 2025
  • How do VMware Snapshots work.
    This is a brief technical view of how VMware Snapshots work as it is very different from typical COW or ROW type snapshots.
    SUBSCRIBE:
    📈 www.youtube.com...
    Visit the Techworks Website:
    👀✔ mytechworks.on...

ความคิดเห็น • 5

  • @nandopanda_ts
    @nandopanda_ts 6 หลายเดือนก่อน

    very clear explanation

  • @lightotw
    @lightotw 7 วันที่ผ่านมา +1

    You're missing some crucial decision and I/O steps in there. You say, we're about to write to C5, and then it just writes to C5. First of all, these are blocks, not files, so you're skipping the whole step of determining what is being manipulated. To write one byte, you need to write the whole block. But what about the original C5? You didn't mention reading that at all! That is not how it works!
    The full sequence is this: I am modifying C5 (which contains a file on the OS), so I read from the original VMDK, put it in memory, alter it, and then save to the child disk. The next time you want to read the file modified inside of C5, it needs to read from the child disk not the original. How does it decide to do that? Well, the child disk wasn't empty as you've implied. It contains one of two things: a pointer to an unmodified block on the original VMDK, if it was never altered, or it contains the modified block.

    • @TechworksOnline
      @TechworksOnline  7 วันที่ผ่านมา

      Yes! this is a missed step, to first read the data in the parent disks and copy bits that are not modified in the block to the child disk. At the time I made this, I thought it was implied.
      Thanks for the clarification!

  • @fontanot
    @fontanot ปีที่แล้ว

    nice video there,
    what would happen if i created a snapshot from original and that child got hacked ?
    if i delete the child snapshot (the one hacked), what would happen to the original one? is it possible that my original would be now the one hacked?

    • @TechworksOnline
      @TechworksOnline  ปีที่แล้ว

      Depends on the hack, and if the vulnerability existed prior to the snapshot. If you mean a virus or something, then it would be gone if you rolled back. If anything was deleted or lost. Then it would be recovered. But if the way into the machine already existed then you will need to fix that way in after rolling back.