James Thew - Fotolia
What are ghost imaging software benefits and drawbacks?
Ghost imaging comes in many forms, and it has reached the cloud. It helps avoid much of the manual input of unit setup, but some vendors don't support ghosted units.
Ghosting is a popular process that enables a complete image of a drive or volume to be snapshotted, and then used to create a new image on one or more drives. It can, for instance, be used when a bunch of desktops need to be set up quickly with near-identical configurations.
Here, the common portion of the image is ghosted so it can be put on each unit, with no real limit as to how many times this can be done. Then, the user-specific portion of the unit's setup is added, and it's ready to use. Today's ghost imaging software enables several units to be ghosted in parallel, which increases speed.
There are many ghost imaging software packages available, both as commercial code and open source. The more sophisticated packages enable you to build a library of images that can be stored (compressed) on a large local or network drive. These images include software settings, so setup is near error-proof. It is also possible to use ghosting to clone just about everything, minus an OS, for example.
Ghosting is by far the fastest method for bringing up a new unit, whether it is a server, desktop or mobile device. It's the way vendors preload software, too.
Because settings are saved, ghost imaging software helps avoid much of the manual input required during normal, from-scratch setup. This is a real boon in the Linux world, where typing the command-line interface is very error-prone.
Ghosting has some downsides. Any existing data on the target drive can be lost, since ghosting is not incremental in nature. There is also a constraint that the source and target systems have the same hardware, though at least one ghost imaging software package -- SmartDeploy -- allows for images to be dropped onto a thin virtual machine to hide underlying hardware differences.
The nature of cloning is that it bypasses licensing tools built into installers. The result is reluctance by some vendors, including Microsoft, to support ghosted units.
Cloning has reached the cloud, with image ghosting tools available for OpenStack and the major cloud service providers. This is critical to agile instance creation, and it offers a way for certified images to be distributed to users. This certification is critical to a smoothly run cloud, keeping out rogue code and ensuring that all application and tool components are properly in sync from a revision and settings perspective.
Ghost imaging among virtual disaster recovery techniques
Considerations for purchasing data backup software
Differences between cloning and snapshotting
Dig Deeper on Data backup and recovery software
Related Q&A from Jim O'Reilly
Explore the revert-to-snapshot feature in OpenStack Cinder
OpenStack Cinder has added a revert-to-snapshot function, enabling enterprises to recover from corrupted data sets. However, if the feature falls ... Continue Reading
How can I encrypt backups for better data protection?
Don't let backup data encryption fall through the cracks. When encrypting backups, key management and compression are just two of the best practices ... Continue Reading
Can I replace HDDs with SSDs to support in-memory storage?
Replacing all your HDDs with SSDs won't solve the storage issues associated with in-memory databases. Look to hyper-convergence and NVDIMMs instead. Continue Reading