Chapter 10 Protecting Virtual Environments

Size: px
Start display at page:

Download "Chapter 10 Protecting Virtual Environments"

Transcription

1 Chapter 10 Protecting Virtual Environments

2 164 - Protecting Virtual Environments As more datacenters move to virtualize their environments and the number of virtual machines and the physical hosts they run on grows, a comprehensive protection strategy is required to ensure proper protection. This is a complex problem as the number of virtual machines continues to increase and their backup windows continue to shrink. The following chapter describes various strategies for protecting virtual environments using the Simpana Virtual Server Agent (VSA) and standard file system and application agents. Note: This is a guide for planning and designing strategies for protecting virtual environments. This is not a detailed engineering guide and CommVault STRONGLY recommends working with CommVault to properly plan, implement, and optimize Simpana for your virtual environment. Simpana Virtual Protection Methods There are two primary methods CommVault software can use to protect virtual environments: 1. Virtual Server Agent (VSA) 2. idataagents installed within virtual machines Which method is best to use depends on the virtual infrastructure, type of virtual machines being protected and the data contained within the virtual machines. In most cases using the Virtual Server Agent will be the preferred protection method. For specific virtual machines using an idataagent inside the VMs will be the preferred method. In other cases using a combination of both the VSA and idataagents in the VMs could be used.

3 Protecting Virtual Environments The following table highlights basic capabilities and limitations for using the Virtual Server Agent and idataagents. Feature / Capability Virtual Server Agent idataagent in VM Overview Provides disk level protection with granular browse and recovery. For VMware backups volume and file/folder protection is also supported. Backs up data using agent communication directly to file system or application. This method for protecting VMs operates just like a physical client in a CommCell environment. Recovery performance of virtual machine Provides fast recovery performance by recovering entire disk files. Using full system restore or 1-Touch for VM recovery. This process would be slower than restoring virtual disks with VSA since it would be an object level restore. Recovery of virtual disk volumes Volume level restores only in VMware. For Xen and Hyper-V file level browse and recovery would be used to recover full volumes. Browse and restore or restore by job if volume was defined as separate subclient. Granular browse capability Granular browse is possible by indexing virtual machines at time of backup. Indexing VM backups is enabled by default. Provides the same browse and recovery features as a physical client. All agent capabilities are supported when installed in VM. Application Protection Only provides crash consistent protection of application data. Scripts can be used to quiesce application data prior to VSA backup for application consistent protection. Provides application consistent protection for database and log files by directly communicating with application to properly quiesce data. Application protection with SnapProtect option Provides application consistent snapshot and backup protection for MS-SQL and Exchange. Provides full integration with SnapProtect feature for application consistent snapshot and backup protection on all supported idataagents.

4 166 - Protecting Virtual Environments Crash Consistent and Application Consistent Protection When choosing to use the Virtual Server Agent and/or idataagents inside of VMs it is important to consider what is being protected. The state of the data at the time of backup is critical to be able to properly restore the data. There are two possible states that data can be in at the time of backup, Crash Consistent or Application Consistent. Crash Consistent Crash Consistent backups are based on point-in-time snapshot and backup operations of a virtual machine that allows the VM to be restored to the point in which it was snapped. When the snapshot occurs all blocks on the virtual disks are frozen for a consistent point-in-time view. There are several issues when performing crash consistent snapshot and backup operations. The first issue is that if an application is running on the virtual machine it is not aware the snapshot is being taken. VSA communicates with the hosting hypervisor to initiate snapshots at the VM level and there is no communication with the application. Any I/O processes being conducted by the application will continue without any knowledge that the snap has been performed. This may cause issues if a VM hosting an application has high disk I/O activity at the time the snap occurred. The other issue is data integrity. Crash consistent means when a snap occurs, a logical view of the virtual disk block structure is preserved for the backup operation. The crash consistent view would be the same as if you turned the power off on an application server without properly shutting down the application. In this case, maintenance may need to be performed on the application databases before they would be usable and there is the possibility of data corruption. Crash consistent backups can work well for disk volumes containing file data but this is not recommended for protecting application databases. Crash Consistent backup performs a snapshot and backup of the disk at a point in time. The application is not aware that this is being performed and data integrity is not guaranteed.

5 Application Consistent Protecting Virtual Environments With Application Consistent protection, the application itself is aware that it is being snapped. This awareness allows for the data to be protected and restored in a consistent and usable state. Application aware protection works by communicating with the application to quiesce data or by using scripts to properly quiesce the data. Application consistent protection is not critical for file data but is absolutely critical for application databases. There are three methods to provide application consistent protection: Simpana application idataagents An idataagent installed in the VM will directly communicate with application running in the VM. Prior to the snap operation the agent will communicate with the application to properly quiesce databases. For large databases this is the preferred method for providing application consistent point in time snap and backup operations. Using application agents in the VM also provide database and log backup operations and a simplified restore method using the standard browse and recovery options in the CommCell GUI. Scripting database shutdowns Using external scripts which can be inserted in the Pre/Post processes of a subclient, application data can be placed in an offline state to allow for a consistent point-in-time snap and backup operation. This will require the application to remain in the offline state for the entire time of the snapshot operation. When the VM is recovered the application will have to be restarted after the restore operation completes. This method is only recommended when Simpana agents are not available for the application. VSA and SnapProtect For Microsoft SQL and Exchange virtual machines, application aware protection can be performed using the VSA agent and Simpana SnapProtect feature. This concept requires additional configurations and is covered in detail in the SnapProtect chapter. Application Consistent backup performs a snapshot and backup of the application data at a specified point in time. The application is aware that this is being performed and will quiesce data.

6 168 - Protecting Virtual Environments Agent Based Protection Agent based protection uses Simpana idataagents installed directly in the virtual machine. When an agent is installed in the VM, it will appear in the CommCell console just like a regular client and the functionality will be exactly the same as an agent installed on a physical host. The main advantage with this configuration is that all the features available with Simpana agents can be used to protect data on the VM. For applications, using idataagents provide complete application awareness of all data protection operations. When using idataagents in VMs, data will be backed up through a Media Agent to protected storage. The Media Agent can be locally installed on the virtual machine if the machine has direct access to storage or data can be moved over the network to a dedicated Media Agent. Agent based VM protection installs Simpana agents directly in the VM. This allows file systems and applications to be protected using all the features Simpana agents offer.

7 Protecting Virtual Environments One issue when using idataagents in virtual machines is when the virtual machine needs to be restored. Since the idataagent protects all data at the object level, the machine will need to be restored object by object. Compare this method to using the VSA backup process which can restore the entire virtual machine at the disk level. When protecting large databases which are backed up as single objects, idataagents can be a good solution. When backing up file servers with large amounts of smaller objects, idataagents within the virtual machine would not be a good solution. With Simpana v9 Client Side Deduplication, data moved over the network is dramatically reduced once the first full backup is completed. This provides an efficient method of backing up large amounts of data and is recommended to improve backup performance when using agents inside of VMs. It s important to note that when using client side deduplication in a virtual machine, all blocks will be hashed on the client. This processing will be done using the hosting server s resources which may negatively impact performance when too many VMs are being backed up concurrently. Carefully consider on which VMs you want to use idataagents and schedule backup operations during off-peak hours when physical hosts have adequate resources to process and protect data. File System idataagents To protect an entire virtual machine or specific volumes on a VM, using the VSA is the preferred protection method. If the VM only requires specific files or folders to be protected, or if specific data on the VM requires special protection requirements such as scripting or filtering, a File System idataagent can be used. In the following example a mission critical subclient has been defined to protect a small amount of data on a virtual machine. The virtual machine is not required for protection since a template can be used to recreate the VM in the event of full system failure. Using this method on VMs with small amounts of data requiring protection can improve overall performance by reducing the total amount of data that must be protected. Granular Application Agents Granular application agents provide the ability to protect objects within an application database providing granular processing of application data. For example, Exchange data can be protected at the mailbox level by

8 170 - Protecting Virtual Environments using the Simpana Mailbox idataagent, Mailbox Archiving idataagent, or Compliance Archiving idataagent. Each one of these agents provides object level protection that provides individual object recovery, content indexing, or ediscovery search capabilities. Data protected by these agents can also be independently managed by subclients providing data lifecycle management capabilities that are not possible with the VSA agent. Database Application Agents Simpana database agents provide advanced protection features that would not be available when using VSA. Separate protection of database and logs can be performed. Options to truncate logs or replay logs to a specific point in time can be used to better manage database protection. Using database idataagents in virtual machines provides application consistent database protection and is a preferred protection method. The following diagram illustrates the use of agents in a virtual machine to provide application consistent database and log backups. Using this method can allow for shorter Recovery Point Objectives (RPOs) since log files can frequently be backed up throughout the day. This level of granular protection is not possible when using the VSA agent alone. Virtual Server Agent (VSA)

9 Protecting Virtual Environments The Simpana Virtual Server Agent (VSA) interacts with the hosting hypervisor to provide protection at the virtual machine level. This means agents do not need to be installed directly on the virtual machines, although installing restore-only idataagents will provide a simplified method for restoring data back to the VM. Simpana software currently supports VMware, Hyper-V, and Xen server with the Virtual Server Agent. Depending on the hypervisor application being used and the virtual machine s operating system, different features and capabilities will be available. The Simpana VSA interfaces with the hypervisor s APIs and provides capabilities inherent to the application. As hypervisor capabilities improve, the Simpana VSA agent will be enhanced to take advantage of new capabilities. Backup Levels Virtual machines are protected by VSA by invoking the hypervisor application to snap the VM. When the snapshot is taken the VM can be backed up in a crash consistent point it time state. The VSA can backup machines at the disk, volume, or file level depending on the hypervisor s capabilities. The following table shows support at various backup levels: Application Disk Level Volume Level File Level VMware YES YES YES Hyper-V YES NO NO XEN Server YES NO NO Disk Level Disk level backups will protect all disks for a virtual machine and VM boot data. The entire VM can be recovered and optionally automatically turned on after recovery. For VMware, disk volumes can also be independently recovered. If Enable Granular Recovery is selected in Advanced Backup Options, files and folders can be browsed and recovered. Volume Level Volume level backups allow you to select which virtual disks to backup. This is currently only supported with VMware. This is best used when only specific data volumes need to be protected. System drives backed up at the volume level will not be bootable with a direct restore of the volume. To select which volumes will be backed up, use the subclient Filters tab to filter out volumes not to be backed up. File Level File level backups allow individual folders or files to be protected. Consider using this on virtual machines where a base image can be retained and only small amounts of data changes on a regular basis. Use the Filter tab to filter out all data that does not require protection. Use the Filter exceptions to define data that does require

10 172 - Protecting Virtual Environments protection. For example: Filter the C:\ drive and set an exception rule for C:\Users. This will only backup the Users folder on the C drive. When a file level backup is configured, the entire volume that contains the files or folders is snapped. During the data movement process the VSA will filter out data that does not require protection. Because of this process, it would be recommended to install a File System idataagent on the VM if only a small portion of a large volume requires protection. How VSA Works VSA works by communicating with the hosting hypervisor to initiate software snapshots of virtual machines. Once the VMs are snapped, VSA will back them up to protected storage. The following steps are used to protect VMs in a virtual environment: 1. CommServe server communicates with VSA to initiate a data protection job. 2. VSA communicates with the hypervisor application to request software snapshots for virtual machines defined in the subclient. 3. The hypervisor will quiesce the virtual machines and perform software snapshots of the VMs. 4. The virtual application will communicate back to VSA that the VMs have been quiesced. 5. VSA will back up the virtual machines to CommVault protected storage. 6. If configured the virtual machines will be indexed for granular browse and recovery of objects in the virtual disks. 7. VSA will then communicate back to the hosting virtual application that the backup process has completed. 8. The VMs snapshots will then be released.

11 Protecting Virtual Environments The following diagram illustrates the VSA software snapshot and backup process in a VMware environment using a VSA proxy server. Hypervisor and VSA Architecture Depending on the hypervisor application various methods can be used to deploy the VSA agent. VMware & VSA When protecting VMware environments different Transport Modes can be used to move VMs to protected storage. There are three primary Transport Modes that can be used: SAN Mode Hot Add Mode NBD (Network Based) Mode Each of these modes has their advantages and disadvantages. Variables such as physical architecture, source data location, ESX resources, network resources and VSA proximity to Media Agents and storage will all have an effect on determining which mode is best to use. It is also recommended to consult with CommVault for design guidance when deploying Simpana software in a VMware environment.

12 174 - Protecting Virtual Environments SAN Transport Mode can be used on a VSA proxy with direct access to snapshot VMs in the source storage location. This mode can provide a major advantage regarding performance and load reduction on the ESX server. Virtual machines will be backed up through the VSA and to the Media Agent. If the VSA is installed on a proxy server configured as a Media Agent with direct access to storage, LAN-Free backups can be performed. This eliminates data movement through the ESX server and if there is a LAN-Free path to storage, data traffic over the network is eliminated. The following diagram illustrates the ability to use a VSA proxy using SAN Transport Mode when protecting VMware environments. This allows the backup process of virtual machines to be conducted on the proxy server eliminating the load on the ESX servers. If the VSA has direct access to protected storage installing a Media Agent on the proxy will provide LAN-Free backups. Hot Add Mode uses a virtual VSA in the VMware environment. This will require all data to be processed and moved through the VM on the ESX server. Depending on the storage target the Media Agent can also be installed on the virtual machine. Some disk storage and tape libraries in SAN environments cannot be zoned to virtual machines. This configuration would require data to be moved from the virtual VSA to a physical Media Agent during data protection jobs. In certain environments with enough processing power on ESX hosts and a need to consolidate physical hardware using a virtual VSA method could be used. By implementing this method with client side deduplication bandwidth consumption will be greatly reduced after the initial protection of virtual machines. This method will require all data blocks to be hashed and processes on the virtual VSA proxy which will require significant CPU and memory resources. To reduce memory and disk requirements a dedicated LAN based Media Agent can be used for the deduplication database.

13 Protecting Virtual Environments The following diagram shows Hot Add Mode VSA proxy being installed as a VM. This method will require all protection processing to be conducted on the virtual machines placing the load on the ESX server.

14 176 - Protecting Virtual Environments NBD Network Mode will use a VSA proxy installed on a physical host. VSA will connect to VMware and snapshots will be moved from the VMware environment over the network and to the VSA proxy. This method will require adequate network resources and it is recommended to use a dedicated backup network when using the NBD mode. The following diagram illustrates the NBD Transport Mode using a physical VSA proxy to move VM data over the network to protected storage.

15 Microsoft Hyper-V VSA Protecting Virtual Environments Microsoft Hyper-V allows the VSA to be installed directly on the hosting server. Data is processed and moved to a Media Agent. If the Hyper-V server has direct access to protected storage, a Media Agent can be installed to provide LAN-Free backups. The following diagram shows the VSA being installed directly on the Hyper-V physical server.

16 178 - Protecting Virtual Environments Xen Server VSA The VSA agent is installed on a dedicated virtual machine hosted on the Xen server. Data is processed by the VSA and moved to a Media Agent. The following diagram shows the VSA installed on a virtual machines in the Xen environment.

17 Protecting Virtual Environments Hardware Snapshots with SnapProtect The Simpana v9 SnapProtect feature provides integration with hardware vendors or Simpana s Continuous Data Replicator (CDR) to conduct, manage, and backup snapshots. This technology can be used to snap VMs at the data store level and back them up to protected storage. The process for protecting virtual machines is similar to performing snapshots with the VSA agent directly interfacing with the hosting hypervisor application. VSA will first quiesce the virtual machine and then the SnapProtect feature will use vendor API s to perform a hardware snapshot of the data store. The data store will then be mounted on an ESX proxy and all VMs registered. The VMs can then be backed up and indexes generated for granular level recovery. The snapshots can also be maintained for live browse and recovery. The backup copies can be used for longer term retention and granular browse and recovery. The following diagram illustrates SnapProtect and VSA integration. VSA will communicate with the hypervisor to quiesce VMs that will be protected. After the VMs are in quiescent state the SnapProtect feature will initiate a hardware snapshot by communicating with hardware through APIs. Once the snap process is complete the ESX proxy will mount the snap and the VSA agent will backup VMs.

18 180 - Protecting Virtual Environments Using the VSA and SnapProtect agent provides a high availability, disaster recovery, and data recovery solution. Specific configuration and hardware are required to implement this solution method. For more information on SnapProtect configurations and VSA see the SnapProtect chapter. Application Data on Raw Device Mapping (RDM) Volumes When the VSA agent protects VMware virtual machines it can perform disk, volume, or file level software snapshots of VMDK files. It will not protect any volumes using RDM. This can be used as an advantage when designing solutions for protecting large databases. A VSA agent will be used to snap and backup the virtual disks as VMDK files but will skip RDM volumes. An application agent can then be installed in the VM and subclients can be configured to protect databases on RDM volumes. The application idataagent will provide communication to provide consistent point-in-time backups of application data. Configuring the Virtual Server Agent Once the Virtual Server Agent is installed on the physical or virtual host, there are several components that need to be configured: Instances are used to connect to the virtual environment. Depending on the hypervisor application, different instance options will be available. Backup Sets are used to define how virtual machines will be discovered and managed. The available options will be based on the hypervisor application being used. Subclients are used to define which virtual machines will be protected and depending on the hypervisor application different subclient settings will be available. Instances When the Virtual Serve Agent is initially installed, instances will have to be configured. The VSA can be configured with different instances to manage multiple virtual environments through a single master VSA client. Using a master VSA will provide greater flexibility and simplified administration in large virtual environments. One or more instances can be configured for Hyper-V, Xen, or VMware. For VMware the instance can be configured for VCenter or an ESX host. Multiple instances can be defined for each of the three hypervisors.

19 Protecting Virtual Environments The following diagram shows three VSA instances. Two instances are for VMware VCenter and the third is for Hyper-V. Backup Set The backup set is used to configure the discovery methods for virtual machines. For VMware it can also be used to select vstorage or VCB for protection types depending on the version of VMware being used. By default the protection mode will automatically be detected. This process will first attempt to use vstorage APIs and will fail back to VCB if vstorage is not available.

20 182 - Protecting Virtual Environments Backup sets can be configured for VMware, Hyper-V and Xen. Depending on the hypervisor defined in the instance specific options will be available in the backup set properties.

21 Discovery Rules for VMware Protecting Virtual Environments For VMware discovery rules can be configured based on how virtual machines will be grouped when configuring subclients. When a discovery rule is selected an Auto Discover tab will be enabled in the subclient to correspond to the rule selected. For example, if the discovery rules are set to data store affinity, the Auto Discover tab will allow the selection of specific data stores the subclient can use when discovering and protecting virtual machines. Depending on the VMware infrastructure and methods used to protect VMs, proper configuration of discovery rules and subclients will provide greater scalability and backup performance. In the following example the SnapProtect feature is being used to mount data stores to back up virtual machines. A subclient is used to define VMs from different data stores requiring all data stores to be mounted prior to VM backup operations. This design can have a negative impact on backup performance and may degrade performance in the production environment.

22 184 - Protecting Virtual Environments This illustration shows multiple data stores, each defined in a separate subclient. When a backup job runs for the subclient only one data store will require mounting.

23 Protecting Virtual Environments Subclients Subclients are used to define the virtual machines that will be protected. Virtual machines are defined within a specific subclient by discovering virtual machines within the backup set. This is done in the Content tab by selecting the Discover button. Virtual machines can be assigned to different subclients using the Subclient Name drop down box. The virtual machines can also be set to Do not back up. Depending on the hypervisor application, different methods can be used to configure subclient content for virtual machines. The following diagram shows three subclients. The default subclient will discover and manage any virtual machines not associated with any custom subclients. A mission critical and an IT system subclient will be used to group and manage virtual machines. Auto Discover for VMware Based on the discovery rules in a VMware backup set, the Auto Discover tab will be used to determine the source for virtual machine discovery. The Auto Discover tab can be defined with one or more sources for the VMs. Sources such as data store affinity, ESX server affinity, or match host name by regular expressions, etc can be configured. Using auto discovery modes will allow VM groupings into different subclients to provide better organization and scalability of VM protection. Depending on the VMware architecture specific modes are recommended to provide the best overall performance. In large VMware environments CommVault professional services should be involved to ensure proper configuration and scaling.

24 186 - Protecting Virtual Environments Data Readers Data readers determine the number of concurrent VM backups that will run for a subclient. The default number of readers is 1. Each virtual machine will back up as a single stream so increasing the data readers will allow multiple VMs to be snapped and backed up concurrently. Consider disk performance, disk I/O and network bandwidth before modifying this setting. Setting this number too high could result in poor backup performance and may cause snapshots to fail. The following example shows three subclients each set to use three data readers. If the subclients are backed up at the same time, a total number of nine concurrent streams will be used.

25 Use Proxy (VMware) Protecting Virtual Environments VMware VSA allows physical proxy servers to be used when backing up virtual machines. This provides for greater scalability in larger virtual environments by using multiple VSA proxies to protect VMs. The subclient option Use Proxy is used to assign a specific proxy to the subclient. This allows the CommVault administrator to configure an entire VMware environment from a single spot when multiple VSA proxies are being used. When a VSA agent is installed on a proxy, each proxy will appear in the CommCell console. By using a master VSA, a single configuration point can be used to configure the entire virtual environment. This greatly simplifies administration since a single backup set can be used on the master VSA preventing virtual machines from being defined in multiple subclients. This is based on the CommVault coded rule that data is mutually exclusive to the subclient in which it is defined within a backup set. If configurations were done on each VSA proxy individually they would all contain their own backup sets which could result VMs being protected multiple time. The following diagram shows three Media Agent / VSA proxies being used to protect virtual machines. Three subclients are being used, each one directed to use a different proxy.

26 188 - Protecting Virtual Environments Backup Type For Hyper-V and Xen server all virtual machines are snapped and protected at the disk level. For VMware protection can be provided at the disk, volume, or file level. VMware backup type selection for disk, volume or file level can be set for each subclient. Consider the following before configuring this option: Only disk level snapshots are bootable immediately after restore. For volume level snapshots us the Filters tab to exclude volumes from backup. File level snapshots will snap the entire volume but only back up selected files/folder. In this case it may be preferred to use a file system agent in the virtual machine to back up just the required data. Only virtual disk files will be protected with the VSA backup. Raw Device Mapping (RDM) volumes will not be backed up. Transport Mode for VMware Depending on the location of the VSA a subclient allows specific transport modes to be selected. For a virtual VSA the Hot Add mode will be used, for a physical VSA with SAN access to snapshots the SAN mode will be used and for a network based VSA the NBD (network) mode will be used.

27 Protecting Virtual Environments The following diagram illustrates the three primary transport modes that can be configured for a subclient. Depending on access to storage Media Agent software can also be installed on the VSA server. SnapProtect Operations When integrating the SnapProtect feature with supported hardware snapshot disk technologies, the VSA, SnapProtect and supported hardware all integrate for virtual machine protection. Select the snap engine to be used in the SnapProtect Operations tab. Once the hardware snap has been taken it can be mounted on an ESX proxy and backed up to protected storage. This method is used when performing application consistent backups of Exchange or SQL virtual machines. The proxy is specified in the Proxy ESX Server configuration box. The Application aware backup for granular recovery option can be enabled and the option to truncate exchange logs can also be selected to provide full application awareness and log truncation for Exchange virtual servers. For more information on snapshots in virtual environments see the SnapProtect Technology chapter.

28 190 - Protecting Virtual Environments Enable Granular Recovery During the backup of the virtual machines, indexes can be generated from disk metadata. This allows for granular browse and recovery of objects within the virtual machine. The option Enable Granular Recovery in the Advanced Backup options is used to determine if indexes will be generated. This setting is enabled by default. CommVault recommends using the granular recovery option for all virtual machines. To provide in-place recovery of objects into the virtual machine, a Restore Only idataagent can be installed on the virtual machine. Enable Granular Recovery is used to generate indexes during backup operations of virtual machines. This setting is enabled by default.

29 Protecting Virtual Environments VSA Backup Performance Before discussing methods for improving virtual machine backups it is important to note that CommVault can only move data as fast as the physical environment will allow. The virtual architecture, network bandwidth, and storage performance all play key roles in VM backup performance. Ensure that the environment is adequately scaled to meet protection windows. Consult with CommVault prior to deploying Simpana software in a virtual environment. Consider the following key points as a basic starting point when addressing protection of a virtual environment: Does the VM require regular protection? How long will the VM be needed for? How often does data on the VM change? Is the data on the VM static or dynamic? Does the entire VM require protection or just specific data? Should the VM be protected with VSA or agents installed in the VM? Understanding Protection Needs Before you start designing your virtual protection strategies you first need to know what it is your protecting and what type of protection is needed. Details of each virtual machine should be documented. A strong Change Management policy is essential, and though IT administrators may dread the enormous amount of documentation they must create and maintain, this information can greatly affect your protection strategies. To properly inventory your virtual environment, consider different virtual machines and the functions they provide. Determine if servers are static or dynamic. Do they provide a unique service, or are there many instances of the same system (such as domain controllers or web servers). Determine if they are production or test and development systems. Documenting the different services these systems provide can later be used to determine protection strategies. Business Function What purpose does the virtual machine serve? Does it serve an IT function such as a Domain Controller or is it a business system such as a document server? If it s a business system, what business unit owns the machine? Is it a production, test, or development server? What other servers is it dependent on? This information will provide guidance on whether the entire VM requires protection using VSA or just specific data on the machine requires protection. Example 1: If a VM approximately 20GB in size only requires protection of a folder 500 MB in size, a file system idataagent may be used to protect the data. If the VM was created from a template it could quickly be recreated. In this case the 500 MB folder is the critical data that requires protection and not the entire VM.

30 192 - Protecting Virtual Environments Example 2: A business function is running on a VM that provides a service to a department within your organization. The VM is static and no user data is stored in the VM. In this case using the VSA to snap and backup the VM on a weekly or even monthly basis may provide adequate protection. Using a separate subclient to define this VM and other VMs requiring the same protection can be used to set a separate schedule using weekly or monthly intervals. IT Function For IT virtual machines consider its IT function. Is it a static box where data rarely changes? Is it a redundant box for scaling or high availability where other virtual machines provide the same functionality? If other systems depend on the virtual machine, how critical is it that this machine is available. Test & Development Very often when applications are being developed in house, virtual machines are requested for testing or development. This results in requests for machines that may be used for a short time, and then never used again. Keeping track of who requested the machine and how long they need it for is critical in determining whether the machine actually requires protection. CommVault Strategies for Improving VM Backups In most cases using the Virtual Server Agent will provide the best backup and recovery performance. When protecting applications running on virtual servers, application agents installed within the VM can provide better backup and restore performance as well as application consistent protection of database and log files. The following section covers several scenarios that can be used to optimize backup performance in a virtual environment. VSA Protection with Deduplication and DASH Full When using Client Side Deduplication, once an initial full backup is completed only changed blocks will be protected. During an incremental backup, all changed blocks are copied and deduplicated on the VSA server. During a subsequent full backup the entire VM is snapped and backed up through the VSA. Most of the blocks will already exist in storage so network bandwidth and storage requirements will be minimal. However, the entire VM will have to be processed by the VSA. This will require each block for the VM being hashed and compared in the deduplication database. A DASH-Full can be used to eliminate the snap and deduplication process on the VSA. A DASH-Full is actually a Read Optimized Synthetic Full backup. A traditional Synthetic Full would read backup chunks, verify the chunk and write it back to storage in a new location. With deduplication, reading and writing chunks is an unneeded step. Since the data blocks for the VM already exists in storage they would be discarded during the Synthetic Full operation. A DASH-Full updates record information in the deduplication database and generates a new index file to signify the start of a new cycle without actually reading the data. This can significantly reduce backup times when compared to traditional full or synthetic full backups.

31 Protecting Virtual Environments The following diagram illustrates using deduplication and DASH Full backups to greatly reduce backup windows and data movement. Once the initial full backup is done, only incremental backups will be run on production data, and DASH Full backups will be used to consolidate cycles for retention and aging purposes. This method provides the ability to protect large amounts of data in very short protection windows.

32 194 - Protecting Virtual Environments DR Protection Using DASH Copy A primary advantage of server virtualization is the hardware consolidation of data centers. This also makes disaster recovery hot sites more practical. New features in Simpana 9 provide the key components to provide a complete end to end DR solution. DASH-Copy provides the ability to selectively copy deduplicated data between site locations which dramatically reduces bandwidth required to copy data to an alternate site. This operation is more efficient than traditional site replication because only required data blocks at the DR site are copied. This is done by configuring secondary copies and using subclient Associations to copy only relevant data to the DR site. In addition to this functionality, separate retention can be configured for each site. The following diagram shows that using deduplication and DASH copies can provide for a sound disaster recovery solution. Once the initial full is copied to the off-site location, only change blocks will be copied during the DASH copy operations.

33 Stagger Schedule Subclients Protecting Virtual Environments In large virtual environments, hundreds or even thousands of virtual machines may require protection. This can make it impractical to meet backup windows. Spreading the backup windows for full and incremental backups over a longer time period can help meet operation windows. To do this create multiple subclients and set different schedules for each subclient to spread full and incremental backups throughout a backup cycle. The following diagram shows seven subclients being used to stagger schedule backups during a weekly cycle. A full backup will be conducted for each subclient based on the different days of the week. Incremental backups will be conducted on the other days of the week. Schedule VSA Agent Subclients FRI SAT SUN MON TUE WED Friday Saturday Sunday Monday Tuesday Wednesday Thursday FULL FULL FULL FULL FULL FULL THU FULL

34 196 - Protecting Virtual Environments Using Multiple VSA Proxies with VMware In large VMware environments, several VSA proxies can be used to load balance virtual machine backups. Installing VSA on multiple Media Agents will allow more virtual machines to be simultaneously backed up. Careful planning is required based on disk performance to determine how many virtual machines can be snapped and protected at any given time. With Simpana 9 all virtual machines and VSA proxies can be assigned from a master VSA in the CommCell Console. This allows large environments using multiple proxies to be configured in a single location. Each subclient can define its own virtual machines and a different proxy can be configured for each subclient. The following diagram shows three Media Agent / VSA proxies being used to protect virtual machines. Three subclients are being used, each one directed to use a different proxy.

35 Using an Application idataagent Protecting Virtual Environments Application agents in virtual machines can be used in certain cases to provide better backup and recovery performance. An application idataagent can be used to provide database and log backups where a VSA agent would backup the VM in its entirety. To limit the amount of data transmitted over the network and storage requirements for duplicate blocks, client side deduplication can be used. Using application agents within the VM will allow full database and log backups to be conducted based on RPO and RTO requirements. A DASH-Copy can be used to copy deduplicated data to an off-site location for disaster recovery purposes. The following diagram shows the use of idataagents inside of virtual machines to provide data protection. Although the VSA is a preferred method for protecting virtual machines, using idataagent in special situations can provide better protection.

36

Chapter 11. SnapProtect Technology

Chapter 11. SnapProtect Technology Chapter 11 SnapProtect Technology Hardware based snapshot technology provides the ability to use optimized hardware and disk appliances to snap data on disk arrays providing quick recovery by reverting

More information

Chapter 9 Protecting Client Data

Chapter 9 Protecting Client Data Chapter 9 Protecting Client Data 152 - Protecting Client Data A client is defined as any production source requiring protection. A server with any Simpana idataagent installed in it is considered a client

More information

Dell Compellent Storage Center with CommVault Simpana 9.0. Best Practices

Dell Compellent Storage Center with CommVault Simpana 9.0. Best Practices Dell Compellent Storage Center with CommVault Simpana 9.0 Best Practices Document revision Date Revision Comments 1/30/2012 A Initial Draft THIS BEST PRACTICES GUIDE IS FOR INFORMATIONAL PURPOSES ONLY,

More information

Chapter 2 CommVault Data Management Concepts

Chapter 2 CommVault Data Management Concepts Chapter 2 CommVault Data Management Concepts 10 - CommVault Data Management Concepts The Simpana product suite offers a wide range of features and options to provide great flexibility in configuring and

More information

Chapter 3 `How a Storage Policy Works

Chapter 3 `How a Storage Policy Works Chapter 3 `How a Storage Policy Works 32 - How a Storage Policy Works A Storage Policy defines the lifecycle management rules for all protected data. In its most basic form, a storage policy can be thought

More information

Virtual Server Agent v9 with VMware. June 2011

Virtual Server Agent v9 with VMware. June 2011 Virtual Server Agent v9 with VMware June 2011 Contents Summary... 3 Backup Transport Methods... 3 Deployment Scenarios... 3 VSA Installation Requirements... 4 VSA Patch Requirements... 4 VDDK Installation...

More information

Virtual Server Agent for VMware VMware VADP Virtualization Architecture

Virtual Server Agent for VMware VMware VADP Virtualization Architecture Virtual Server Agent for VMware VMware VADP Virtualization Architecture Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 18 VMware VADP Virtualization Architecture - Virtual Server Agent for VMware

More information

Chapter 7. GridStor Technology. Adding Data Paths. Data Paths for Global Deduplication. Data Path Properties

Chapter 7. GridStor Technology. Adding Data Paths. Data Paths for Global Deduplication. Data Path Properties Chapter 7 GridStor Technology GridStor technology provides the ability to configure multiple data paths to storage within a storage policy copy. Having multiple data paths enables the administrator to

More information

CommVault Simpana 9 Virtual Server - Lab Validation

CommVault Simpana 9 Virtual Server - Lab Validation January 2012 CommVault Simpana 9 Virtual Server - Lab Validation Russ Fellows Evaluator Group Table of Contents Executive Summary... 1 Data Protection Challenges... 2 Overview of Evaluation... 2 Test Objectives...

More information

Administration GUIDE. Virtual Server idataagent (VMware) Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 225

Administration GUIDE. Virtual Server idataagent (VMware) Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 225 Administration GUIDE Virtual Server idataagent (VMware) Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 225 User Guide - Virtual Server idataagent (VMware) Table of Contents System Requirements

More information

Executive Summary SOLE SOURCE JUSTIFICATION. Microsoft Integration

Executive Summary SOLE SOURCE JUSTIFICATION. Microsoft Integration Executive Summary Commvault Simpana software delivers the unparalleled advantages and benefits of a truly holistic approach to data management. It is one product that contains individually licensable modules

More information

Chapter 1. Storage Concepts. CommVault Concepts & Design Strategies: https://www.createspace.com/

Chapter 1. Storage Concepts. CommVault Concepts & Design Strategies: https://www.createspace.com/ Chapter 1 Storage Concepts 4 - Storage Concepts In order to understand CommVault concepts regarding storage management we need to understand how and why we protect data, traditional backup methods, and

More information

Chapter 4 Data Movement Process

Chapter 4 Data Movement Process Chapter 4 Data Movement Process 46 - Data Movement Process Understanding how CommVault software moves data within the production and protected environment is essential to understanding how to configure

More information

Administration GUIDE. IntelliSnap Virtual Server idataagent for VMware. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 277

Administration GUIDE. IntelliSnap Virtual Server idataagent for VMware. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 277 Administration GUIDE IntelliSnap Virtual Server idataagent for VMware Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 277 IntelliSnap User Guide - Virtual Server idataagent for VMware Table of Contents

More information

Backup and Recovery Best Practices with Tintri VMstore and Commvault Simpana Software

Backup and Recovery Best Practices with Tintri VMstore and Commvault Simpana Software TECHNICAL WHITE PAPER Backup and Recovery Best Practices with Tintri VMstore and Commvault Simpana Software Author: Dominic Cheah (TME) August 2015 www.tintri.com Contents Intended Audience... 3 Introduction...

More information

Enhanced Protection and Manageability of Virtual Servers Scalable Options for VMware Server and ESX Server

Enhanced Protection and Manageability of Virtual Servers Scalable Options for VMware Server and ESX Server PARTNER SOLUTION BRIEF Enhanced Protection and Manageability of Virtual Servers Scalable Options for VMware Server and ESX Server Companies relying on the benefits of virtualized environments to reduce

More information

Chapter 15 Technical Planning Methodology

Chapter 15 Technical Planning Methodology Chapter 15 Technical Planning Methodology 294 - Technical Planning Methodology This chapter will focus on a straight forward methodology for implementing storage policies. This approach will allow you

More information

User Guide - Exchange Database idataagent

User Guide - Exchange Database idataagent Page 1 of 208 User Guide - Exchange Database idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Customized Features for Your Exchange Version Terminology SYSTEM REQUIREMENTS

More information

Vembu BDR Suite. Free vs Paid Edition. Backup & Disaster Recovery. VEMBU TECHNOLOGIES TRUSTED BY OVER 60,000 BUSINESSES

Vembu BDR Suite. Free vs Paid Edition. Backup & Disaster Recovery. VEMBU TECHNOLOGIES  TRUSTED BY OVER 60,000 BUSINESSES Vembu BDR Suite Free vs Paid Edition VEMBU TECHNOLOGIES www.vembu.com Free vs Paid Edition The Free Edition of Vembu BDR suite products comprises of mandate features which ensure data protection for both

More information

Understanding Virtual System Data Protection

Understanding Virtual System Data Protection Understanding Virtual System Data Protection Server virtualization is the most important new technology introduced in the data center in the past decade. It has changed the way we think about computing

More information

Chapter 16 Content Based Planning Methodology

Chapter 16 Content Based Planning Methodology Chapter 16 Content Based Planning Methodology 322 - Content Based Planning Methodology This chapter will focus on a content based design approach for business data that takes into account disaster recovery,

More information

Discover the Power of your Virtual Environments with Backup Exec Gareth Fraser-King Kelly Smith

Discover the Power of your Virtual Environments with Backup Exec Gareth Fraser-King Kelly Smith Discover the Power of your Virtual Environments with Backup Exec 2012 Gareth Fraser-King Kelly Smith The Symantec V-Ray Advantage Symantec V-Ray technologies provide: Patented visibility into virtual machines

More information

Backup and Recovery Best Practices With Tintri VMstore

Backup and Recovery Best Practices With Tintri VMstore Backup and Recovery Best Practices With Tintri VMstore Backup and Recovery Best Practices with Tintri VMstore TECHNICAL BEST PRACTICES PAPER, Revision 1.0, April 10, 2014 Contents Contents Introduction

More information

Backup & Disaster Recovery. Vembu BDR Suite. Free vs Paid Edition. VEMBU TECHNOLOGIES Copyright Vembu Technologies. All Rights Reserved

Backup & Disaster Recovery. Vembu BDR Suite. Free vs Paid Edition. VEMBU TECHNOLOGIES  Copyright Vembu Technologies. All Rights Reserved Vembu BDR Suite Free vs Paid Edition VEMBU TECHNOLOGIES www.vembu.com Free vs Paid Edition The Free Edition of Vembu BDR suite of products contains the mandate features which ensures data protection for

More information

VMWARE PROTECTION WITH DELL EMC NETWORKER 9

VMWARE PROTECTION WITH DELL EMC NETWORKER 9 VMWARE PROTECTION WITH DELL EMC NETWORKER 9 Solution Overview ABSTRACT This white paper describes the integration of Dell EMC NetWorker with VMware vcenter. It also includes details on the NetWorker architecture

More information

Administration GUIDE. OnePass Agent for Exchange Mailbox. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 177

Administration GUIDE. OnePass Agent for Exchange Mailbox. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 177 Administration GUIDE OnePass Agent for Exchange Mailbox Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 177 User Guide - One Pass Agent for Exchange Mailbox Table of Contents Overview Introduction

More information

Features - Microsoft Data Protection Manager

Features - Microsoft Data Protection Manager Page 1 of 36 Features - Microsoft Data Protection Manager TABLE OF CONTENTS OVERVIEW NEW FEATURES SYSTEM REQUIREMENTS SUPPORTED FEATURES GETTING STARTED - DATA PROTECTION MANAGER DEPLOYMENT GETTING STARTED

More information

VMware Backup and Replication Enterprise Edition

VMware Backup and Replication Enterprise Edition VMware Backup and Replication Enterprise Edition TECHNOLOGY PARTNERS Vembu Technologies 10+ Years of Experience 100+ Countries 2 Headquartered in Chennai Vembu BDR Suite Vembu BDR suite is an one stop

More information

Quick Start - Virtual Server idataagent (Microsoft/Hyper-V)

Quick Start - Virtual Server idataagent (Microsoft/Hyper-V) Page 1 of 19 Quick Start - Virtual Server idataagent (Microsoft/Hyper-V) TABLE OF CONTENTS OVERVIEW Introduction Key Features Complete Virtual Machine Protection Granular Recovery of Virtual Machine Data

More information

Protect 500 VMs in 17 Minutes. A reference architecture for VMware Data Protection using CommVault Simpana IntelliSnap and IBM XIV Storage Arrays

Protect 500 VMs in 17 Minutes. A reference architecture for VMware Data Protection using CommVault Simpana IntelliSnap and IBM XIV Storage Arrays Protect 500 VMs in 17 Minutes A reference architecture for VMware Data Protection using CommVault Simpana IntelliSnap and IBM XIV Storage Arrays Contents Data Management in the Virtual Data Center... 3

More information

VMware Backup and Replication using Vembu VMBackup

VMware Backup and Replication using Vembu VMBackup VMware Backup and Replication using Vembu VEMBU TECHNOLOGIES PARTNERS Vembu Technologies Founded in 2002 10+ Years of Experience Headquartered in Chennai 100+ Countries 4000+ Partners 2 60000+ Businesses

More information

User Guide. Version R95. English

User Guide. Version R95. English Cloud Backup User Guide Version R95 English September 11, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS

More information

VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014

VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Additional Features and Benefits of

More information

Cloudian HyperStore Backup Deployment and Performance Tuning Guide for Commvault

Cloudian HyperStore Backup Deployment and Performance Tuning Guide for Commvault Cloudian HyperStore Backup Deployment and Performance Tuning Guide for Commvault Table of Contents BACKGROUND INFORMATION... 3 CLOUDIAN HYPERSTORE AND COMMVAULT BENEFITS... 3 EXECUTIVE SUMMARY... 3 INTRODUCTION...

More information

Copyright 2012 EMC Corporation. All rights reserved.

Copyright 2012 EMC Corporation. All rights reserved. 1 BACKUP BUILT FOR VMWARE Mark Twomey Technical Director, The Office Of The CTO 2 Agenda Market Forces Optimized VMware Backup Backup And Recovery For VCE Vblock Protecting vcloud Director Customer Success

More information

Protecting Miscrosoft Hyper-V Environments

Protecting Miscrosoft Hyper-V Environments Protecting Miscrosoft Hyper-V Environments Who should read this paper Technical White Papers are designed to introduce Veritas partners and end users to key technologies and technical concepts that are

More information

Simplify Backups. Dell PowerVault DL2000 Family

Simplify Backups. Dell PowerVault DL2000 Family Simplify Backups Dell PowerVault DL2000 Family SIMPLIFYING I T The Dell PowerVault DL2000 family helps reduce the cost and complexity of backups and restores, freeing up valuable resources that you can

More information

Remove complexity in protecting your virtual infrastructure with. IBM Spectrum Protect Plus. Data availability made easy. Overview

Remove complexity in protecting your virtual infrastructure with. IBM Spectrum Protect Plus. Data availability made easy. Overview Overview Challenge In your organization, backup management is too complex and consumes too much time and too many IT resources. Solution IBM Spectrum Protect Plus dramatically simplifies data protection

More information

Protecting VMware Environments

Protecting VMware Environments Protecting VMware Environments Who should read this paper Technical White Papers are designed to introduce Veritas partners and end users to key technologies and technical concepts that are associated

More information

Configuration Guide for Veeam Backup & Replication with the HPE Hyper Converged 250 System

Configuration Guide for Veeam Backup & Replication with the HPE Hyper Converged 250 System Configuration Guide for Veeam Backup & Replication with the HPE Hyper Converged 250 System 1 + 1 = 3 HPE + Veeam Better Together Contents Intended audience...3 Veeam Backup & Replication overview...3 Adding

More information

Dell PowerVault DL2100 Powered by CommVault

Dell PowerVault DL2100 Powered by CommVault Dell PowerVault DL2100 Powered by CommVault A Dell White Paper CENTRALIZED DATA MANAGEMENT FOR REMOTE AND BRANCH OFFICE (ROBO) ENVIRONMENTS CONTENTS EXECUTIVE SUMMARY 3 RETURN ON INVESTMENT OF CENTRALIZING

More information

Vembu BDR Suite vs HPE VM Explorer

Vembu BDR Suite vs HPE VM Explorer vs VEMBU TECHNOLOGIES www.vembu.com About Vembu Vembu Technologies is a well known technology innovator in offering (BDR) product targeted at IT-Administrators in large, medium and small businesses to

More information

Quick Start Guide - Exchange Database idataagent

Quick Start Guide - Exchange Database idataagent Page 1 of 90 Quick Start Guide - Exchange Database idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Customized Features for Your Exchange Version Terminology SYSTEM REQUIREMENTS

More information

StorageCraft OneXafe and Veeam 9.5

StorageCraft OneXafe and Veeam 9.5 TECHNICAL DEPLOYMENT GUIDE NOV 2018 StorageCraft OneXafe and Veeam 9.5 Expert Deployment Guide Overview StorageCraft, with its scale-out storage solution OneXafe, compliments Veeam to create a differentiated

More information

Converged Virtual Infrastructure

Converged Virtual Infrastructure Converged Virtual Infrastructure Integrated VMware Data Management with EqualLogic and CommVault Simpana Software Jeff Junker Shwethan Shetty Zahid Ilkal Contents Integrated and Scalable Data Protection

More information

Protecting Hyper-V Environments

Protecting Hyper-V Environments TECHNICAL WHITE PAPER: BACKUP EXEC TM 2014 PROTECTING HYPER-V ENVIRONMENTS Backup Exec TM 2014 Technical White Paper Protecting Hyper-V Environments Technical White Papers are designed to introduce Symantec

More information

Mehmet.Gonullu@Veeam.com Veeam Portfolio - Agentless backup and replication for VMware and Hyper-V - Scalable, powerful, easy-to-use, affordable - Storage agnostic High-speed Recovery instant VM recovery

More information

VMWARE VIRTUAL MACHINE PROTECTION DELL POWERVAULT DL 2100 POWERED BY SYMANTEC

VMWARE VIRTUAL MACHINE PROTECTION DELL POWERVAULT DL 2100 POWERED BY SYMANTEC VMWARE VIRTUAL MACHINE PROTECTION DELL POWERVAULT DL 2100 POWERED BY SYMANTEC The PowerVault DL2100 Powered by Symantec Backup Exec offers the industry s only fully integrated backup-to-disk solution with

More information

Symantec Reference Architecture for Business Critical Virtualization

Symantec Reference Architecture for Business Critical Virtualization Symantec Reference Architecture for Business Critical Virtualization David Troutt Senior Principal Program Manager 11/6/2012 Symantec Reference Architecture 1 Mission Critical Applications Virtualization

More information

StorageCraft OneBlox and Veeam 9.5 Expert Deployment Guide

StorageCraft OneBlox and Veeam 9.5 Expert Deployment Guide TECHNICAL DEPLOYMENT GUIDE StorageCraft OneBlox and Veeam 9.5 Expert Deployment Guide Overview StorageCraft, with its scale-out storage solution OneBlox, compliments Veeam to create a differentiated diskbased

More information

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

PASS4TEST. IT Certification Guaranteed, The Easy Way!   We offer free update service for one year PASS4TEST \ http://www.pass4test.com We offer free update service for one year Exam : E20-329 Title : Technology Architect Backup and Recovery Solutions Design Exam Vendor : EMC Version : DEMO Get Latest

More information

Data Protection at Cloud Scale. A reference architecture for VMware Data Protection using CommVault Simpana IntelliSnap and Dell Compellent Storage

Data Protection at Cloud Scale. A reference architecture for VMware Data Protection using CommVault Simpana IntelliSnap and Dell Compellent Storage Data Protection at Cloud Scale A reference architecture for VMware Data Protection using CommVault Simpana IntelliSnap and Dell Compellent Storage Contents Introduction... 4 Environment... 4 Scenarios...

More information

CommVault Galaxy Data Protection 7.0 for Microsoft Exchange Systems

CommVault Galaxy Data Protection 7.0 for Microsoft Exchange Systems BACKUP & RECOVERY ARCHIVE REPLICATION RESOURCE MANAGEMENT SEARCH CommVault Galaxy Data Protection 7.0 for Microsoft Exchange Systems Reliable Data Protection for Exchange Systems and their Environments

More information

Securing the Data Center against

Securing the Data Center against Securing the Data Center against vulnerabilities & Data Protection Agenda Virtual Virtualization Technology How Virtualization affects the Datacenter Security Keys to a Secure Virtualized Deployment and

More information

VMware Backup Free Edition Using Vembu VMBackup

VMware Backup Free Edition Using Vembu VMBackup VMware Backup Free Edition Using Vembu VMBackup VEMBU TECHNOLOGIES PARTNERS Vembu Technologies Founded in 2002 10+ Years of Experience Headquartered in Chennai 100+ Countries 4000+ Partners 2 60000+ Businesses

More information

Symantec NetBackup 7 for VMware

Symantec NetBackup 7 for VMware V-Ray visibility into virtual machine protection Overview There s little question that server virtualization is the single biggest game-changing trend in IT today. Budget-strapped IT departments are racing

More information

Technology Insight Series

Technology Insight Series EMC Avamar for NAS - Accelerating NDMP Backup Performance John Webster June, 2011 Technology Insight Series Evaluator Group Copyright 2011 Evaluator Group, Inc. All rights reserved. Page 1 of 7 Introduction/Executive

More information

Archive 7.0 for File Systems and NAS

Archive 7.0 for File Systems and NAS DATA PROTECTION ARCHIVE REPLICATION RESOURCE MANAGEMENT SEARCH Archive 7.0 for File Systems and NAS Optimize Storage Resources, Automate Data Management and Improve Operational Efficiencies Key u Expand

More information

Bacula Systems Virtual Machine Performance Backup Suite

Bacula Systems Virtual Machine Performance Backup Suite Bacula Systems Virtual Machine Performance Backup Suite Bacula Systems VM Performance Backup Suite is part of Bacula Enterprise Edition. It comprises of modules that can be utilized to perfectly fit any

More information

User Guide - Exchange Mailbox Archiver Agent

User Guide - Exchange Mailbox Archiver Agent Page 1 of 245 User Guide - Exchange Mailbox Archiver Agent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Terminology SYSTEM REQUIREMENTS - EXCHANGE MAILBOX ARCHIVER AGENT DEPLOYMENT

More information

Quick Start Guide TABLE OF CONTENTS COMMCELL ARCHITECTURE OVERVIEW COMMCELL SOFTWARE DEPLOYMENT INSTALL THE COMMSERVE SOFTWARE

Quick Start Guide TABLE OF CONTENTS COMMCELL ARCHITECTURE OVERVIEW COMMCELL SOFTWARE DEPLOYMENT INSTALL THE COMMSERVE SOFTWARE Page 1 of 35 Quick Start Guide TABLE OF CONTENTS This Quick Start Guide is designed to help you install and use a CommCell configuration to which you can later add other components. COMMCELL ARCHITECTURE

More information

Vembu ImageBackup. Microsoft Windows Servers Desktops Laptops VEMBU TECHNOLOGIES PARTNERS.

Vembu ImageBackup. Microsoft Windows Servers Desktops Laptops VEMBU TECHNOLOGIES PARTNERS. Vembu Microsoft Windows Servers Desktops Laptops VEMBU TECHNOLOGIES PARTNERS Vembu Technologies Founded in 2002 10+ Years of Experience Headquartered in Chennai 100+ Countries 4000+ Partners 2 60000+ Businesses

More information

6/4/2018 Request for Proposal. Upgrade and Consolidation Storage Backup Network Shares Virtual Infrastructure Disaster Recovery

6/4/2018 Request for Proposal. Upgrade and Consolidation Storage Backup Network Shares Virtual Infrastructure Disaster Recovery 6/4/2018 Request for Proposal Upgrade and Consolidation Storage Backup Network Shares Virtual Infrastructure Disaster Recovery Network Infrastructure Services - Server Team DC WATER & SEWER AUTHORITY (DC

More information

SnapProtect Backups for VMware vsphere

SnapProtect Backups for VMware vsphere Technical Report SnapProtect Backups for VMware vsphere Best Practices Guide Subhash Athri, NetApp September 2015 TR-4456 TABLE OF CONTENTS 1 Introduction... 4 1.1 Objective...4 1.2 Audience...4 2 SnapProtect

More information

Implementation & Maintenance Student Guide

Implementation & Maintenance Student Guide Implementation & Maintenance Student Guide 2 Copyright Information in this document, including URL and other website references, represents the current view of CommVault Systems, Inc. as of the date of

More information

Real-time Protection for Microsoft Hyper-V

Real-time Protection for Microsoft Hyper-V Real-time Protection for Microsoft Hyper-V Introduction Computer virtualization has come a long way in a very short time, triggered primarily by the rapid rate of customer adoption. Moving resources to

More information

SnapProtect Live Browse with Granular Recovery on VMware. May 2017 SL10336 Version 1.1.0

SnapProtect Live Browse with Granular Recovery on VMware. May 2017 SL10336 Version 1.1.0 SnapProtect Live Browse with Granular Recovery on VMware May 2017 SL10336 Version 1.1.0 1 Introduction This lab will guide you through some of the typical SnapProtect v11 operations (also known as CommVault

More information

VPLEX & RECOVERPOINT CONTINUOUS DATA PROTECTION AND AVAILABILITY FOR YOUR MOST CRITICAL DATA IDAN KENTOR

VPLEX & RECOVERPOINT CONTINUOUS DATA PROTECTION AND AVAILABILITY FOR YOUR MOST CRITICAL DATA IDAN KENTOR 1 VPLEX & RECOVERPOINT CONTINUOUS DATA PROTECTION AND AVAILABILITY FOR YOUR MOST CRITICAL DATA IDAN KENTOR PRINCIPAL CORPORATE SYSTEMS ENGINEER RECOVERPOINT AND VPLEX 2 AGENDA VPLEX Overview RecoverPoint

More information

Vembu VMBackup VEMBU TECHNOLOGIES PARTNERS.

Vembu VMBackup VEMBU TECHNOLOGIES PARTNERS. Vembu VMBackup VMware vsphere Microsoft Hyper-V VEMBU TECHNOLOGIES PARTNERS Vembu Technologies Founded in 2002 10+ Years of Experience Headquartered in Chennai 100+ Countries 4000+ Partners 2 60000+ Businesses

More information

vranger Evaluation Guide

vranger Evaluation Guide vranger Evaluation Guide Contents Contents... 2 Overview... 3 About Quest Software... 3 About This Guide... 3 The Virtual Infrastructure... 4 Supported VMware Platforms... 4 Recommended Service Console

More information

Commvault with Nutanix and vsphere. Nutanix Best Practices

Commvault with Nutanix and vsphere. Nutanix Best Practices Commvault with Nutanix and vsphere Nutanix Best Practices Version 1.2 April 2017 BP-2045 Copyright Copyright 2017 Nutanix, Inc. Nutanix, Inc. 1740 Technology Drive, Suite 150 San Jose, CA 95110 All rights

More information

Backup Solution. User Guide. Issue 01 Date

Backup Solution. User Guide. Issue 01 Date Issue 01 Date 2017-08-30 Contents Contents 1 Introduction... 1 1.1 What Is the Backup Solution?... 1 1.2 Why Choose the Backup Solution?... 2 1.3 Concepts and Principles...3 1.3.1 Basic OBS Concepts...3

More information

Microsoft E xchange 2010 on VMware

Microsoft E xchange 2010 on VMware : Microsoft E xchange 2010 on VMware Availability and R ecovery Options This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more

More information

Tintri Cloud Connector

Tintri Cloud Connector TECHNICAL WHITE PAPER Tintri Cloud Connector Technology Primer & Deployment Guide www.tintri.com Revision History Version Date Description Author 1.0 12/15/2017 Initial Release Bill Roth Table 1 - Revision

More information

1 Quantum Corporation 1

1 Quantum Corporation 1 1 Tactics and Tips for Protecting Virtual Servers Mark Eastman Director, Solutions Marketing April 2008 VMware Changing the Way Data Protection is Done No longer 1 server, 1 backup paradigm App Virtual

More information

VMware Exam VCP-511 VMware Certified Professional on vsphere 5 Version: 11.3 [ Total Questions: 288 ]

VMware Exam VCP-511 VMware Certified Professional on vsphere 5 Version: 11.3 [ Total Questions: 288 ] s@lm@n VMware Exam VCP-511 VMware Certified Professional on vsphere 5 Version: 11.3 [ Total Questions: 288 ] VMware VCP-511 : Practice Test Question No : 1 Click the Exhibit button. An administrator has

More information

ECE Enterprise Storage Architecture. Fall 2018

ECE Enterprise Storage Architecture. Fall 2018 ECE590-03 Enterprise Storage Architecture Fall 2018 Business Continuity: Disaster Recovery Tyler Bletsch Duke University Includes material adapted from the course Information Storage and Management v2

More information

DASH COPY GUIDE. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 31

DASH COPY GUIDE. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 31 DASH COPY GUIDE Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 31 DASH Copy Guide TABLE OF CONTENTS OVERVIEW GETTING STARTED ADVANCED BEST PRACTICES FAQ TROUBLESHOOTING DASH COPY PERFORMANCE TUNING

More information

Protecting VMware vsphere/esx Environments with CA ARCserve

Protecting VMware vsphere/esx Environments with CA ARCserve Solution Brief: CA ARCserve R16.5 Complexity ate my budget Protecting VMware vsphere/esx Environments with CA ARCserve Customer Challenges Today, you face demanding service level agreements (SLAs) while

More information

Acronis Backup & Recovery 11.5

Acronis Backup & Recovery 11.5 Acronis Backup & Recovery 11.5 Installation Guide Applies to the following editions: Update 2 Advanced Server Server for Windows Virtual Edition Server for Linux Advanced Server SBS Edition Workstation

More information

EMC RecoverPoint. EMC RecoverPoint Support

EMC RecoverPoint. EMC RecoverPoint Support Support, page 1 Adding an Account, page 2 RecoverPoint Appliance Clusters, page 3 Replication Through Consistency Groups, page 4 Group Sets, page 22 System Tasks, page 24 Support protects storage array

More information

Symantec Backup Exec 10d for Windows Servers AGENTS & OPTIONS MEDIA SERVER OPTIONS KEY BENEFITS AGENT AND OPTION GROUPS DATASHEET

Symantec Backup Exec 10d for Windows Servers AGENTS & OPTIONS MEDIA SERVER OPTIONS KEY BENEFITS AGENT AND OPTION GROUPS DATASHEET DATASHEET Symantec Backup Exec 10d for Windows Servers AGENTS & OPTIONS Designed for disk, Symantec Backup Exec TM 10d for Windows Servers is the Gold Standard in Windows data protection. It provides comprehensive,

More information

White Paper. A System for Archiving, Recovery, and Storage Optimization. Mimosa NearPoint for Microsoft

White Paper. A System for  Archiving, Recovery, and Storage Optimization. Mimosa NearPoint for Microsoft White Paper Mimosa Systems, Inc. November 2007 A System for Email Archiving, Recovery, and Storage Optimization Mimosa NearPoint for Microsoft Exchange Server and EqualLogic PS Series Storage Arrays CONTENTS

More information

A CommVault White Paper: VMware Consolidated Backup (VCB) Certification Information Kit

A CommVault White Paper: VMware Consolidated Backup (VCB) Certification Information Kit A CommVault White Paper: VMware Consolidated Backup (VCB) Certification Information Kit CommVault Corporate Headquarters 2 Crescent Place Oceanport, New Jersey 07757-0900 USA Telephone: 888.746.3849 or

More information

Protecting Microsoft Exchange

Protecting Microsoft Exchange TECHNICAL WHITE PAPER: BACKUP EXEC TM 2014 PROTECTING MICROSOFT EXCHANGE Backup Exec TM 2014 Technical White Paper Protecting Microsoft Exchange Technical White Papers are designed to introduce Symantec

More information

Enabling Fast Recovery of Your Virtual Environments: NetBackup, Backup Exec & VCS for VMware

Enabling Fast Recovery of Your Virtual Environments: NetBackup, Backup Exec & VCS for VMware Enabling Fast Recovery of Your Environments: NetBackup, Backup Exec & VCS for VMware Agenda 1 Symantec and ization 2 NetBackup 6.5 for VMWare 3 Backup Exec & Backup Exec System Recovery for VMWare 4 Veritas

More information

Virtualization with VMware ESX and VirtualCenter SMB to Enterprise

Virtualization with VMware ESX and VirtualCenter SMB to Enterprise Virtualization with VMware ESX and VirtualCenter SMB to Enterprise This class is an intense, five-day introduction to virtualization using VMware s immensely popular Virtual Infrastructure suite including

More information

Commvault Backup to Cloudian Hyperstore CONFIGURATION GUIDE TO USE HYPERSTORE AS A STORAGE LIBRARY

Commvault Backup to Cloudian Hyperstore CONFIGURATION GUIDE TO USE HYPERSTORE AS A STORAGE LIBRARY Commvault Backup to Cloudian Hyperstore CONFIGURATION GUIDE TO USE HYPERSTORE AS A STORAGE LIBRARY CONTENTS EXECUTIVE SUMMARY... 2 SOLUTION OVERVIEW... 3 USE CASES... 4 SOLUTION COMPONENTS... 5 Commvault

More information

VCS-276.exam. Number: VCS-276 Passing Score: 800 Time Limit: 120 min File Version: VCS-276

VCS-276.exam. Number: VCS-276 Passing Score: 800 Time Limit: 120 min File Version: VCS-276 VCS-276.exam Number: VCS-276 Passing Score: 800 Time Limit: 120 min File Version: 1.0 VCS-276 Administration of Veritas NetBackup 8.0 Version 1.0 Exam A QUESTION 1 A NetBackup policy is configured to back

More information

Symantec Backup Exec Blueprints

Symantec Backup Exec Blueprints Symantec Backup Exec Blueprints Blueprint for Large Installations Backup Exec Technical Services Backup & Recovery Technical Education Services Symantec Backup Exec Blueprints 1 Symantec Backup Exec Blueprints

More information

Tivoli Storage Manager for Virtual Environments: Data Protection for VMware Solution Design Considerations IBM Redbooks Solution Guide

Tivoli Storage Manager for Virtual Environments: Data Protection for VMware Solution Design Considerations IBM Redbooks Solution Guide Tivoli Storage Manager for Virtual Environments: Data Protection for VMware Solution Design Considerations IBM Redbooks Solution Guide IBM Tivoli Storage Manager for Virtual Environments (referred to as

More information

VMware vsphere with ESX 4 and vcenter

VMware vsphere with ESX 4 and vcenter VMware vsphere with ESX 4 and vcenter This class is a 5-day intense introduction to virtualization using VMware s immensely popular vsphere suite including VMware ESX 4 and vcenter. Assuming no prior virtualization

More information

Vembu BDR Suite Free Edition

Vembu BDR Suite Free Edition Vembu BDR Suite Free Edition VEMBU TECHNOLOGIES PARTNERS Vembu Technologies Founded in 2002 10+ Years of Experience 100+ Countries Headquartered in Chennai 4000+ Partners 60000+ Businesses Few of our Customers

More information

Agent for VMware. Version

Agent for VMware. Version Agent for VMware Version 6.91.3631 Release Notes, March 7, 2012 CONTENTS 1 OVERVIEW... 3 1.1 Release History... 3 1.2 Supported Platforms... 3 2 FEATURES... 4 2.1 Features and Benefits... 4 3 INSTALLATION

More information

Tivoli Storage Manager for Virtual Environments

Tivoli Storage Manager for Virtual Environments Tivoli Storage Manager for Virtual Environments Eric Stouffer (ecs@us.ibm.com) IBM Advanced Technical Skills TSM Advanced Technical Support Team Dave Canan ddcanan@us.ibm.com Dave Daun djdaun@us.ibm.com

More information

IM B09 Best Practices for Backup and Recovery of VMware - DRAFT v1

IM B09 Best Practices for Backup and Recovery of VMware - DRAFT v1 IM B09 Best Practices for Backup and Recovery of VMware - DRAFT v1 George Winter, Symantec Corporation Technical Product Manager David Hendrix, FedEx Corporation Technical Principal Abdul Rasheed, Symantec

More information

Arcserve Unified Data Protection Virtualization Solution Brief

Arcserve Unified Data Protection Virtualization Solution Brief Arcserve Unified Data Protection Virtualization Solution Brief Server and desktop virtualization have become very pervasive in most organizations, and not just in the enterprise. Everybody agrees that

More information

Microsoft Hyper-V backup using Vembu VMBackup

Microsoft Hyper-V backup using Vembu VMBackup Microsoft Hyper-V backup using Vembu VMBackup VEMBU TECHNOLOGIES PARTNERS Vembu Technologies Founded in 2002 10+ Years of Experience Headquartered in Chennai 100+ Countries 4000+ Partners 2 60000+ Businesses

More information

Commvault and Vormetric SQL Server Protection

Commvault and Vormetric SQL Server Protection Commvault and Vormetric SQL Server Protection P R E P A R E D B Y E S P A U S T I N S M I T H, T I E R II E N T E R P R I S E S U P P O R T T E A M A U G U S T 2 9, 2 0 1 7 Contents Version History...

More information

Veeam Backup & Replication Version 6.0

Veeam Backup & Replication Version 6.0 Veeam Backup & Replication Version 6.0 Evaluator s Guide VMware Environments March, 2012 2012 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of

More information