Full Backup: A full backup refers to the complete replication of virtual machine data, creating an independent and complete backup copy.
Incremental Backup: Incremental backup is an efficient data protection technique. After the initial full backup (which copies all data), subsequent backup tasks only back up the data blocks that have changed since the last backup.
CDP: CDP is an advanced backup technology for I/O in seconds. Data protection is implemented by recording every data modification made by you and restoring data with zero data loss.
RPO: RPO (Recovery Point Objective) refers to the time difference between the point in time when the data is restored after business recovery and the moment the failure occurred. It measures the maximum amount of data loss the system can tolerate. For example, if a data backup is performed every night at midnight, and a failure occurs in the afternoon, up to 24 hours of data might be lost, making the RPO approximately 24 hours.
RTO: RTO (Recovery Time Objective) refers to the shortest amount of time required for the system to recover and become accessible again after a failure. It measures the duration of business disruption. For example, if a critical business system requires service to be restored within 1 hour after a failure, the RTO objective would be 1 hour.
Agentless Backup: By using the OpenAPI and SDK for disk data access provided by Sangfor SCP, third-party backup applications can configure VMs on SCP and their disks and manipulate disk data to enable agentless VM business backups and recovery, without installing plugins on SCP or VMs.
Backup Chain: backup chain is a logical structure composed of a full backup point and a series of subsequent incremental backup points in chronological order. It fully records the data change history of a virtual machine over a specific period of time.
Data Fetching: The main purpose of data fetching is to verify and optimize the already created backup files, ensuring that the backup data blocks are readable and the metadata is not corrupted, thus ensuring that the backup files are complete and available when recovery is needed.