What is the Usage Policy?
Redstor's Usage Policy describes the terms under which the use of Redstor's services by customers is deemed acceptable and fair.
According to this policy, examples of breaches of acceptable use include
- if your average consumption per seat is abnormal compared to other customers in a similar situation, and
- if you do not follow our recommendations when backing up, increasing your total stored data abnormally.
Breaching the usage policy will result in additional fees. Acceptable use usually entails that your On- Disk data does not exceed your Data-Protected (for which you are billed). Once your On-Disk exceeds your Data-Protected, we will start billing you for On-Disk instead, at the same rate per GB. For definitions of these terms, see our Glossary.
How do I stay within the Usage Policy?
To prevent breaches of Redstor's Usage Policy, it is crucial to monitor your data usage. This can be done from the Account Management view in the Storage Platform Console. Here, you can check the Data-Selected, Data-Protected (last backup), and other values for any account.
Below, you will find some common causes of overusage and steps to remedy them.
Azure VM Pro
Cause | Remedy |
Redstor Protect is unable to efficiently process the collected data |
Protect each affected VM using Redstor ESE. Guest-level data protection is more efficient than any kind of host-level backup. |
Machines
Cause | Remedy |
SQL dump backups (.bak file dumps) |
Database dumps, especially those with name changes or encryption, are treated as new files, resulting in full file backups for each instance. To back up SQL databases, use ESE's built-in SQL backup feature, which employs VSS for greater efficiency than traditional database dumps. If a dump is necessary, disable encryption and ensure the file name remains consistent to facilitate patching. |
Host-level VM backup |
This happens when host-level data protection is unable to efficiently process the collected data. To resolve the problem, protect each affected VM using Redstor ESE (on supported operating systems). Guest-level data protection is more efficient than any kind of host-level backup. |
Other factors
- Running multiple daily backups will exacerbate any of the above causes.
- Long retention periods will also make the above causes worse. Avoid keeping data for longer than is needed for compliance purposes.
Note: If your circumstance is not listed here or you have already applied the suggested remedial steps to no effect, please reach out to Redstor's Technical Support, where a member of the team will be happy to assist you.
Comments
0 comments
Article is closed for comments.