4 .\" The contents of this file are subject to the terms of the
5 .\" Common Development and Distribution License (the "License").
6 .\" You may not use this file except in compliance with the License.
8 .\" You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9 .\" or https://opensource.org/licenses/CDDL-1.0.
10 .\" See the License for the specific language governing permissions
11 .\" and limitations under the License.
13 .\" When distributing Covered Code, include this CDDL HEADER in each
14 .\" file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15 .\" If applicable, add the following below this CDDL HEADER, with the
16 .\" fields enclosed by brackets "[]" replaced with your own identifying
17 .\" information: Portions Copyright [yyyy] [name of copyright owner]
21 .\" Copyright (c) 2009 Sun Microsystems, Inc. All Rights Reserved.
22 .\" Copyright 2011 Joshua M. Clulow <josh@sysmgr.org>
23 .\" Copyright (c) 2011, 2019 by Delphix. All rights reserved.
24 .\" Copyright (c) 2013 by Saso Kiselkov. All rights reserved.
25 .\" Copyright (c) 2014, Joyent, Inc. All rights reserved.
26 .\" Copyright (c) 2014 by Adam Stevko. All rights reserved.
27 .\" Copyright (c) 2014 Integros [integros.com]
28 .\" Copyright 2019 Richard Laager. All rights reserved.
29 .\" Copyright 2018 Nexenta Systems, Inc.
30 .\" Copyright 2019 Joyent, Inc.
31 .\" Copyright 2023 Klara, Inc.
39 .Nd overview of ZFS concepts
42 .Ss ZFS File System Hierarchy
43 A ZFS storage pool is a logical collection of devices that provide space for
45 A storage pool is also the root of the ZFS file system hierarchy.
47 The root of the pool can be accessed as a file system, such as mounting and
48 unmounting, taking snapshots, and setting properties.
49 The physical storage characteristics, however, are managed by the
55 for more information on creating and administering pools.
57 A snapshot is a read-only copy of a file system or volume.
58 Snapshots can be created extremely quickly, and initially consume no additional
59 space within the pool.
60 As data within the active dataset changes, the snapshot consumes more data than
61 would otherwise be shared with the active dataset.
63 Snapshots can have arbitrary names.
64 Snapshots of volumes can be cloned or rolled back, visibility is determined
67 property of the parent volume.
69 File system snapshots can be accessed under the
71 directory in the root of the file system.
72 Snapshots are automatically mounted on demand and may be unmounted at regular
74 The availability and visibility of the
76 directory can be controlled by the
80 A bookmark is like a snapshot, a read-only copy of a file system or volume.
81 Bookmarks can be created extremely quickly, compared to snapshots, and they
82 consume no additional space within the pool.
83 Bookmarks can also have arbitrary names, much like snapshots.
85 Unlike snapshots, bookmarks can not be accessed through the filesystem in any
87 From a storage standpoint a bookmark just provides a way to reference
88 when a snapshot was created as a distinct object.
89 Bookmarks are initially tied to a snapshot, not the filesystem or volume,
90 and they will survive if the snapshot itself is destroyed.
91 Since they are very light weight there's little incentive to destroy them.
93 A clone is a writable volume or file system whose initial contents are the same
95 As with snapshots, creating a clone is nearly instantaneous, and initially
96 consumes no additional space.
98 Clones can only be created from a snapshot.
99 When a snapshot is cloned, it creates an implicit dependency between the parent
101 Even though the clone is created somewhere else in the dataset hierarchy, the
102 original snapshot cannot be destroyed as long as a clone exists.
105 property exposes this dependency, and the
107 command lists any such dependencies, if they exist.
109 The clone parent-child dependency relationship can be reversed by using the
114 file system to become a clone of the specified file system, which makes it
115 possible to destroy the file system that the clone was created from.
117 Creating a ZFS file system is a simple operation, so the number of file systems
118 per system is likely to be numerous.
119 To cope with this, ZFS automatically manages mounting and unmounting file
120 systems without the need to edit the
123 All automatically managed file systems are mounted by ZFS at boot time.
125 By default, file systems are mounted under
129 is the name of the file system in the ZFS namespace.
130 Directories are created and destroyed as needed.
132 A file system can also have a mount point set in the
135 This directory is created as needed, and ZFS automatically mounts the file
137 .Nm zfs Cm mount Fl a
144 property can be inherited, so if
150 automatically inherits a mount point of
151 .Pa /export/stuff/user .
157 prevents the file system from being mounted.
159 If needed, ZFS file systems can also be managed with traditional tools
165 If a file system's mount point is set to
167 ZFS makes no attempt to manage the file system, and the administrator is
168 responsible for mounting and unmounting the file system.
170 be imported before a legacy mount can succeed, administrators should ensure
171 that legacy mounts are only attempted after the zpool import process
172 finishes at boot time.
173 For example, on machines using systemd, the mount option
175 .Nm x-systemd.requires=zfs-import.target
177 will ensure that the zfs-import completes before systemd attempts mounting
183 Deduplication is the process for removing redundant data at the block level,
184 reducing the total amount of data stored.
185 If a file system has the
187 property enabled, duplicate data blocks are removed synchronously.
189 is that only unique data is stored and common components are shared among files.
191 Deduplicating data is a very resource-intensive operation.
192 It is generally recommended that you have at least 1.25 GiB of RAM
193 per 1 TiB of storage when you enable deduplication.
194 Calculating the exact requirement depends heavily
195 on the type of data stored in the pool.
197 Enabling deduplication on an improperly-designed system can result in
198 performance issues (slow I/O and administrative operations).
199 It can potentially lead to problems importing a pool due to memory exhaustion.
200 Deduplication can consume significant processing power (CPU) and memory as well
201 as generate additional disk I/O.
203 Before creating a pool with deduplication enabled, ensure that you have planned
204 your hardware requirements appropriately and implemented appropriate recovery
205 practices, such as regular backups.
208 property as a less resource-intensive alternative.
210 Block cloning is a facility that allows a file (or parts of a file) to be
212 that is, a shallow copy made where the existing data blocks are referenced
214 Later modifications to the data will cause a copy of the data block to be taken
215 and that copy modified.
216 This facility is used to implement
219 .Qq file-level copy-on-write .
221 Cloned blocks are tracked in a special on-disk structure called the Block
225 Unlike deduplication, this table has minimal overhead, so can be enabled at all
228 Also unlike deduplication, cloning must be requested by a user program.
229 Many common file copying programs, including newer versions of
231 will try to create clones automatically.
237 in the documentation for more information.
239 There are some limitations to block cloning.
240 Only whole blocks can be cloned, and blocks can not be cloned if they are not
241 yet written to disk, or if they are encrypted, or the source and destination
244 The OS may add additional restrictions;
245 for example, most versions of Linux will not allow clones across datasets.