Solved

Read-only Snapshots vs ransomware attacks

  • 24 August 2021
  • 1 reply
  • 211 views

Userlevel 2
Badge +9

Is there anyone who would care to speak about (some pros and cons) using Snapshots to preserve Disk Library Mount Paths’s content? Our Storage System provide Snapshots that are read-only—they can’t be altered, overwritten, or deleted directly from Media Agent Servers. We are evaluating the possibility of creating a recovery point every 12 hours using Snapshots as an additional action beyond those described on the following pages. 

 

Mount Paths are essentially File Systems exported via NFS from Storage Systems that don’t support WORM.

icon

Best answer by Damian Andre 24 August 2021, 19:20

View original

1 reply

Userlevel 7
Badge +23

Hey @Eduardo Braga,

I’ve seen this done before by accident. Mostly on NetApp arrays where there is a default snapshot schedule that catches customers out sometimes. In those cases, Commvault pruning, which is very granular and runs constantly, can really hurt performance. On NetApp, we have seen maxed out CPU consumption because of it, causing all sorts of cascading issues. Some arrays do not have very good block sizes for changes - a 128k block deletion may result in a 4MB copy on write to the snap.

The other piece is that the CommServe database and deduplication is very closely tied to the data on disk - restoring a point in time copy of library will certainly throw that out of sync which could have unexpected consequences. For example, we may think we wrote a block at T2, but you restored back to T1 and now we’re deduplication against phantom data which will result in the inability to restore.

So, while it sounds like good protection from ransomware, I would definitely not recommend it.

Reply