Using Veeam and VMware vsphere tags for advanced policy-driven data protection. Luca Dell Oca vexpert, VCAP-DCD, CISSP

Size: px
Start display at page:

Download "Using Veeam and VMware vsphere tags for advanced policy-driven data protection. Luca Dell Oca vexpert, VCAP-DCD, CISSP"

Transcription

1 Using Veeam and VMware vsphere tags for advanced policy-driven data protection Luca Dell Oca vexpert, VCAP-DCD, CISSP

2 Contents 1. Introduction Setting the stage Audience Scope The three steps towards a policy-driven data protection Step 1: Define a desired state Leveraging vsphere tags How to apply tags to virtual machines Apply tags manually Apply tags using automation Tagging using Veeam ONE Step 2: Create the rules Tags creation The No Backup tag Step 3: Apply the rules Jobs based on tags in Veeam Backup & Replication Dealing with backup files Restores Configure roles and scopes Self restore portal for application owners An integrated approach Performance growth Protect the production environment About the Author...25 About Veeam Software

3 1. Introduction Modern data centers are becoming more and more complex, and there are several reasons for this trend. First, there is a business reason behind any technical enhancement, and lately the paramount business requirement is to shrink as much as possible (the so called time to market ). People have become used to the quick deploy time provided by virtualization reducing provision times from weeks and months to days or hours. This has led to the more general concept that any new workload should be immediately available upon request. Cloud-like technologies have further pushed this concept by adding additional elements to the data center such as infinite scalability and self-service. Infinite scalability is more of a perception than a real situation. Beneath different and always increasing layers of abstraction, there is always a physical infrastructure, and regardless of all the provisioning enhancements that latest technologies have allowed (for example hyperconvergence), a system cannot scale infinitely and in a short period of time. What this concept means is that the perception of a user s cloud-like platform is that it is a system that can scale without any apparent limit, regardless of the amount of resources requested. The second concept is self-service. Once there s an infinitely scalable platform to be consumed, a consumer should not be forced to follow a strict provisioning process. This has been used in the past by infrastructure managers with the guarantee of respecting the defined standards and maintaining a tight control on the finite resource to be sure that no additional request could exhaust those resources. But if the underlying platform can scale without (apparent) limits, the user could be easily and safely entitled to consume additional resources without asking for them in advance. Still, some sort of governance needs to be implemented. Workloads should be configured as defined by IT administrators, regardless of who is deploying them. Antivirus, monitoring, backup, patching, every new workload needs to have all the same characteristics of the other ones. But the complexity and growth of these data centers have made manual control of these parameters basically impossible, or at least highly inefficient and prone to errors. If there are thousands of virtual machines, it s pretty certain some of them will be skipped during a patching cycle, some will not be added to the monitoring platform, or they will never be backed up. This scenario has lead infrastructure administrators to introduce control and management mechanisms to their data centers to cope with the new way of consuming resources. First, better and more effective monitoring and capacity planning. Offering on the frontend infinite scalability and self-service, means the backend needs to be carefully designed, planned to scale from the beginning to avoid dangerous forklift upgrades, and most of all, monitored so that administrators can spot in advance trends in resource consumptions and decide for the acquisition and deployment of additional resources in time. 3

4 Second, automation and policy-based management. The need for complete and absolute consistency of a large environment can only be solved via the so called desired-state configuration. Instead of applying configurations manually to guarantee that each virtual machine and application is configured as desired, a preferred solution is to have an automation platform that can (automatically) check each workload against a desired configuration, and in case of a drift, go and correct it. Thanks to this, administrators can rest assured that each parameter will be configured as they want. From a data protection perspective, this also helps avoid what I like to call policy-based anarchy. With just policies and self-service, an environment is not completely manageable, and complete freedom can lead to anarchy. Let me explain this concept: Policies are a great solution to guarantee consistency, and thanks to selfservice, an administrator can let his users/customers decide which policy is better for their workloads. Being the application owners, they probably know better than anyone which policy is best. Let s use a quick example: A data protection plan may offer different RTO values to users, like 24 hours (one backup per day), but also 12h or 4h for more critical workloads. These policies, however, have a cost associated with them: The more retention points needed, the more space on a backup device to be consumed. Also, running data protection activities during working hours (like it s needed when selecting the 4h policy) would lead to additional load and pressure on the production environment that now has to consume resources at the same time to run the workloads and to feed the data protection solution with data to be saved. If users have complete freedom to decide which policy to apply to their workloads, the result may be a depletion of the available resources, both in terms of the data protection solution not able to complete the tasks needed to protect workloads frequently, but also the production environments may suffer. For example, the production storage at some point may not have enough storage power to serve the running workloads and all the read activities happening during the backups. For these reasons, policies should be carefully planned by administrators and offered as a catalog where users can choose from. Additionally, some sort of showback if not chargeback, should be implemented to make users aware of the consequences in terms of IT resources consumption, and ultimately drive them to better decisions. Users could also create a sort of internal service provider where the IT department can ask for an additional budget to be provided by other lines of business if they require additional performances from the data protection solution in use. In addition, the chosen data protection solution should be able to offer at the same time a policy-based framework and technologies to better integrate with the production environment and guarantee service level agreements while operating. Long gone are the days where the backup administrators cared just about their operations in a siloed environment. In a modern data center, where all the components are integrated with each other, every decision made at the data protection level has a consequence on other different components. Veeam Backup & Replication v8, part of Veeam Availability Suite, is perfectly suited for such environments thanks to its advanced capabilities. 4

5 First of all, the scale-out capabilities. Using the same installation and simply adding more processing units (called proxies ), Veeam can scale to protect large environments without suffering a degradation of its performances, and without requiring a painful forklift upgrade to move to a bigger version of the solution. Customers can pick the best-suited hardware to execute Veeam components, such as proxies or repositories. For example, a mix of fast storage arrays backed by SSD and HDD can offer a landing area for recent backups that can be stored and restored at the maximum speed. Additional areas using deduplicated appliances or tapes can lower the price per GB of a secondary location where data needs to have a longer retention at a better price. However, as previously stated, the data protection solution must not be a silo. On the contrary, it has to integrate with the production environment. That s where some of the Veeam technologies comes into play. The support for major vendor s storage snapshots allow backups to complete with a much lower impact on the production storage and virtualized environment. Backups can now be executed during production hours without impacting production workloads. Backup I/O Control (patented) can monitor storage latency in real-time, and be able to throttle backup speeds so that storage latency will never raise above the defined limits. Modern data centers are moving toward an Always-On Business, where less maintenance/backup windows will be available. Being able to run backups in the middle of production hours without damaging the needed performance of a workload is a value that customer cannot ignore. Finally, the topic of this paper: Policy-driven data protection. Thanks to the support for vsphere tags, administrators can define activities that will protect workloads based on the desired state that their users will define for their workloads. Instead of manually selecting virtual machines to be added to given backup jobs, with all the risks of missing or violating a requested policy, administrators can preemptively define backup policies, and let the software apply these policies to virtual machine. Administrators can rest assured that no workload will be forgotten or protected by the wrong policy. In this paper, you will learn how to apply these concepts to your environment using Veeam. 5

6 2. Setting the stage 2.1 Audience This document is intended for use by individuals working in companies using VMware vsphere environments protected by Veeam Availability Suite v8 (or Veeam Backup & Replication v8), and willing to increase their levels of automation and move towards a policy-driven Availability. Regardless of their roles, being it architects, administrators, virtualization specialists, storage or network managers, and data protection admins, this document is a useful source of information for learning how it s possible to leverage the automation capabilities of the involved software components. 2.2 Scope This document describes a scenario involving a VMware vsphere 6.0 virtualized environment and Veeam Backup & Replication v8 (as a stand-alone deployment or as part of Veeam Availability Suite v8). Depending on your business or technology needs, some suggestions may require changes to be applied, and each environment should be carefully evaluated against the official documentation of the involved software solutions mentioned in this document. Deployment, installation and initial configuration of the different software solutions will not be covered in this document; readers are expected to have basic knowledge of each software. When and if needed, additional information should be gathered from different official documentations. This document has been developed on, and the suggested solutions have been tested against: Veeam Backup & Replication v8 Update 2b (build ) VMware vcenter 6.0 (build ) VMware ESXi 6.0 Express Patch 2 (build ) 2.3 The three steps towards a policy-driven data protection No system is born with inner policies, especially existing systems where old ways of doing data protection need to be transformed and updated. It s more of a journey, where an environment can (and should, in my opinion) be migrated towards this new way of dealing with Availability. After I explained in the introduction why you should have a solution based on policies rather than manual jobs, let s see the common steps that this journey involve. 6

7 3. Step 1: Define a desired state The desired state is the state of the object where all the requested conditions are met. One or multiple parameters are set, each of them has different possible values, and the combinations of all the values gives the final desired state. In terms of Availability, when talking about virtual machines (VMs), the desired state can be a combination of: RPO = How frequently a VM has to be protected (either via backup or replication) Application quiescence = Needed YES or NO? Encryption = Does the backup set need to be encrypted Remote replication = Does the VM need to be replicated into a secondary location? And so on. Each possible parameter available in Veeam Backup & Replication can be part of the desired state. The interesting part, however, of the Desired State, is not how it is built, but rather who s in charge of its definition. These parameters are derived from a backup job for example, but in the case of a policy-driven solution, it s not the Backup Administrator to define those parameters, it s the Application Owner. This is an interesting shift from the past, where people in charge of data protection at the time were the managers and consumers of their solutions. Here, we are talking about an Application Owner that defines the configurations he wants, and then another subject that is only responsible for applying them. Application Owners are in charge of defining desired states because they have designed and deployed their own applications, and thus they do know the requirements they have in terms of Availability. A database administrator probably knows better than the Veeam administrators the required parameters for the successful protection of his own databases. The ultimate goal of this type of solution is to offer self-service at any stage of the Availability life cycle, from the very first step of defining the requirements for each workload that has to be protected. 7

8 3.1 Leveraging vsphere tags In a VMware vsphere environment, the easiest and most powerful way to allow application owners to define their own required state is by using tags. First introduced in vsphere 5.5, the release of vsphere 6 tags are now fully consumable via proper API from external components such as Veeam Backup & Replication. In IT, a tag is a non-hierarchical keyword. This kind of metadata helps describe an item and allow it to be found again by browsing or searching. Tags are generally chosen informally and personally by the item's creator or by its viewer, depending on the system. In vsphere, any user with sufficient permissions can tag any object that is available in his console. For the purpose of this document, we will refer to tags applied to virtual machines, but keep in mind tags can be applied to datastores, networks, folders, resource pools, and so on. There are many advantages of tags compared to other classification systems: Any object can have multiple tags. For example, a VM can be tagged as being a production VM or a development VM, or both, while for example when using more rigid solutions like folders, a VM can only belong to a single folder at a certain point in time Tags can be applied by users at any time, while constructs like folders again are usually created and consumed by administrators Searches and filtering can be done using tags, both in single mode or using boolean operators. This gives powerful search capabilities for solutions leveraging tags Finally, a tag is immediate. After assigning a VM, a native property of the VM itself, the tag sticks to this VM until it s removed. It s not a property of the Availability solution in this case. A single VM can have at the same time tags describing the desired state of Availability, but also tags used for the identification of the department using the VM, the Operating System, the running application, and so on For all these reasons, Veeam customers looking for a powerful, policy-driven solution should leverage vsphere tags to described the desired state of their virtual machines. 8

9 3.2 How to apply tags to virtual machines There are different ways to apply tags to virtual machines. Let s take a look at the options Apply tags manually The first and most accessible way to apply tags is to use the vsphere Web Client. From the page of an object, it s easy to apply tags: Fig. 1: Apply tags to a virtual machine from vsphere Web Client 9

10 The Assign link opens the Assign tags wizard, where a user can assign a VM one or more existing tags, or if it has permissions for it, create a new one. Fig. 2: Assign tags to a virtual machine in vsphere Web Client One of the issues that may arise by using this method is the slowness of the process. Each VM needs to be manually tagged, and when the environment becomes too big, the time it takes can be too much. This problem can be minimized to a certain degree because in a multi-tenant environment, each department has to manage tagging only for their own VMs and not all of them. Nevertheless, the effort may still be considerable. The other issue that may arise with manual tagging is related to errors, as in any manual process Apply tags using automation When tagging procedures need to be applied to a large environment, the best solution is to involve automation. Automation applied to IT tasks brings many advantages, and people thinking about introducing policy-based solutions should really look into this. First, automation brings accuracy. Once a procedure is defined into the automation solution, it can be replicated an infinite number of times with the same exact steps, removing any human error. This is paramount when managing a multitude of workloads at the same time. 10

11 Second, automation is faster. A human can execute multiple tasks in a certain amount of time, but software can be way faster in doing the same operations. Third, automation frees time for IT people to do more interesting and rewarding activities while daily maintenance is managed by the automation solution. In terms of vsphere tags, different solutions can be used: VMware vrealize Orchestrator, VMware vrealize Automation, third party software such as Puppet, Chef, Ansible, all are able to interact with vsphere and manage tags among the many capabilities they have. An additional advantage of automation tools when dealing with tags is the possibility to integrate tagging into other workflows. If an environment, for example, already has a process in place to deploy a new virtual machine following a workflow, administrators can think about adding a new additional step in the workflow itself where the user is requested to apply the desired tags to the virtual machine he s deploying. If the step is mandatory, administrators can be assured that the new virtual machine will have proper tags from its initial creation, and no new virtual machine will remain untagged Tagging using Veeam ONE An additional option for tagging is Veeam ONE. Among the many different capabilities that this software has, it can also manage and apply tags to vsphere objects. Fig. 3: Rules in Veeam Business View to manage tags By using the Business View inside Veeam ONE, administrators can classify and organize virtual machines by rules that define a single parameter or a regular expression. Veeam ONE s own tags can be synced with vsphere tags, or it can directly use vsphere tags by importing and consuming them. Either way, the final result is that any tagging in Veeam ONE is replicated into vsphere, so that the tags are always in sync in both consoles. 11

12 4. Step 2: Create the rules Once the desired state has been defined, it s time to translate the requirements in consumable objects in the vsphere environment. That is, it s time to create the needed tags. Before starting the actual process of creation, a proper strategy around tag configuration and consumption is needed. The two major options are a complete freedom in tag creation left to users, or the creation of a defined catalog of tags that users can then consume. In terms of Availability, the second option is preferred. This this way backup and replication jobs can be mapped to specific tags, while a new random tag created by users may be not mapped to any job in the backend. This brings the conversation to another big topic in a policy-based solution: The existence of two different roles involved in the process. Policies, in the form of tags, are consumed in the front-end, but what happens in the back-end? There are going to be two different roles: Users (or tenants) and Providers (or administrators). Each have different duties and tasks that can be summarized like this: Fig. 4: Users and Providers in a policy-based architecture Users, as explained in the previous chapter, interact with the front-end of the architecture. They define the desired state of their workloads, and they apply tags to their own VMs. But policies, in the form of tags and Veeam jobs mapped to those tags, are created in the back-end by Providers, who ultimately are in charge of managing the infrastructure. This separation between front-end and back-end, users and providers, is the very essence of a cloudlike solution as the one described into this document. Users consume resources accessing a multitenant environment leveraging self-service. Providers build, maintain and deliver the infrastructure consumed by users. 12

13 4.1 Tags creation Following the separation of duties, tags are created by Providers. To better organize them, tags are grouped in vsphere in categories: Fig. 5: tags categories in vsphere Thanks to categories, tags can be easily created and classified based on their function. For example, Veeam will consume tags under the RPO and Backup Encryption category, while tags under the VM purpose category are used by users to classify virtual machines based on their role in the environment. You can see in the column named Associable Entities all the categories are related to virtual machines. In theory, tags can be applied to any object, but since the atomic unit of processing data in Veeam is a single VM, it s better to limit the usage of Veeam-related tags to just VMs and not other objects: Fig. 6: Limit tags to be associated to VMs only 13

14 With this configuration, a user is not allowed to tag dynamic containers like resource pools, and this is good. Without this limit, an entire resource pool (or VM folder, or datastore) would be tagged with the same tag, and so granularity of tagging would be lost. Once categories are created, tags are defined and associated to the desired category: Fig. 7: Overview of tags created in vsphere For the purpose of this document, we created 4 different tags related to RPO values. The description has been used to help users choose the right tag for their virtual machines. You can already imagine, by looking at their names, that based on the desired RPO for a given VM, a specific tag will be applied. 4.2 The No Backup tag When in an environment, separation of duties between users and providers is applied. There s a need to guarantee proper interaction between the two. As the final goal of a data protection solution is to protect all the workloads that require protection, providers (the backup administrators) need a way to check that each virtual machine has received proper tags. But since the tagging operation is completely delegated to users, what if a virtual machine has no tag related to Veeam? Was it a miss, or an intentional decision? For this reason, the concept of the No Backup tag is important. Fig. 8: The No Backup tag By creating and offering this special tag to users, providers offer them a way to tag those virtual machines that are not requested to be protected. When a virtual machine is tagged with this tag, providers can be assured the virtual machine was not simply forgotten, but it was a choice of the application owner to not request protection for it. Once the no Backup tag has been applied to all the desired virtual machines, only the non tagged VMs are to be evaluated as missing by the providers. Different tools can be used to track VMs with missing Veeam-related tags, from simple scripts to queries executed using vrealize Automation or other tools. 14

15 This information can also be obtained using Veeam ONE. This solution does not track virtual machines with missing tags, rather it checks directly against both vsphere and Veeam Backup & Replication those VMs that do not have any restore point. This kind of report is important because if a virtual machine has not been tagged, there will be no backup or replication job protecting it, but still the ultimate goal is to protect any workload, regardless if it has been tagged or not. Tagging is a good solution, but it doesn t need to become too rigid, and backup administrators need to apply additional checks to guarantee proper data protection is in place. Fig. 9: Alarm in Veeam ONE showing a virtual machine without any restore point. By leveraging Veeam ONE alarms, administrators can be notified about any virtual machine that doesn t have any restore point stored into Veeam Backup & Replication, and with additional corrective actions, can be automatically configured in the software. For example, administrators can create a new backup job for these unprotected VMs as a temporary solution until proper tagging is applied. Finally, a complete report of unprotected VMs can be created: Fig. 10: Report of unprotected VMs With this report, providers can interact with users and notify them about the missing VMs so users can decide if they want to apply one of the available tags to their VMs, unless the reported VMs are those with the no backup tag. 15

16 5. Step 3: Apply the rules Once the different rules have been created, tags have been created and made available to users, and VMs have been tagged, it s time to work in the back-end to apply those rules. In the back-end, that is Veeam Backup & Replication, policies are consumed using jobs - either backup jobs or replication jobs. As an environment grows in size and complexity, a multitude of jobs become difficult to maintain, especially if they have to deal with single virtual machines per job, or small groups of VMs. Also, in modern environments the list of virtual machines is changing daily as new VMs are constantly deployed, modified, moved, and deleted. Instead of having a fixed list of virtual machines protected in a given job, the ideal situation is to design a solution that can automatically adjust to the changes happening in the environment. And the use of vsphere tags is perfect for this scenario. 5.1 Jobs based on tags in Veeam Backup & Replication When a new job is created in Veeam Backup & Replication, there s a specific way to consume tags. Let s use the example of RPO 4 hours: This tag is designed to label virtual machines that require a backup to happen every 4 hours. When the job wizard arrives to the step of selecting the virtual machines to be protected, instead of selecting single VMs or containers like datastore or resource pool, the Add objects pop-up also has the possibility to browse vsphere tags. Fig. 11: Select tags as a source of a Veeam backup job. 16

17 In this case, the backup administrator will select the RPO 4 hours tag as the object to be protected. Next in the creation wizard, he will configure additional options, but the most important part is that the schedule of the job will be configured to happen every 4 hours, like the tag suggests. Fig. 12: Schedule the job to run automatically every 4 hours. The final result will be an empty job at the beginning, not related to any specific VMs. At each execution of the job, Veeam will poll in real-time from vcenter the list of virtual machines having the RPO 4 Hours tag, and will process all those VMs. From a policy point of view, the result will be that any VM with that tag will be processed according to the policy. And the solution will adjust dynamically to any change. As soon as a VM is tagged, it will be processed by this job, and in the same way as soon as a VM will not have this tag anyone, Veeam will stop processing it, or it will process it according to a different policy. By creating different jobs each mapped to a tag, backup administrators have created not just backup jobs, but effectively backup policies. The no backup tag will not be associated to any backup or replication job. 17

18 5.2 Dealing with backup files Veeam Backup & Replication uses a proprietary file format to store backups. These files make backups completely self-contained since there is no central database storing the information related to the content of the backups themselves. Therefore, backups can be restored into a different location and used even if the central console is lost. Also, files are portable, since even the simple read of their name makes them transparently identifiable, so administrators can move them at will with ease. These files are populated by Veeam Backup & Replication with all the blocks extracted from the vsphere environment during each execution of a backup job, regardless if the job is full or incremental. Thanks to source-side deduplication and compression, duplicated blocks are removed from the backup file, so that its final size is as low as possible, helping customers save space on their backup storage. A single backup job creates one backup file for each execution, and the file itself contains blocks belonging to all the virtual machines processed by the job itself. As said, this is helpful to improve deduplication, but when administrators decide to use tag-based jobs, controlling the final size of the backup file may become an issue since there s no real control available to providers to limit the number of times the same tag will be used by users. The final size of the backup file may become excessive, leading to issues with the available space in a backup repository. For this and other reasons, users should consider to upgrade their Veeam environments to Veeam Backup & Replication v9 when it will be available, because there is a new feature coming that will help in these situations: Per-VM backup chains. With per-vm backup chains, a single job containing multiple VMs will not create any more than a single file. Instead, each VM will be stored into a separated file. In a backup chain made with both full and incremental files, each VM will have its own chain. Without per-vm backup chains, the only other way to obtain the same small files would be to create many small jobs, each containing either one VM, or just a few of them. But this makes the management of the jobs impractical in general, and basically impossible with tags. Per-VM backup chains is a capability of the Veeam backup repository, and it s completely transparent to backup jobs. The backup job can still hold multiple VMs, and the split will be made automatically at the repository. So large jobs colleting several VMs with the same tag will benefit of the per-vm backup chains, without requiring any reconfiguration or additional design. 18

19 6. Restores So far, we described how to automate backup operations. But a cloud-like solution could not be considered complete if restores cannot be delegated in a multi-tenant fashion. Veeam Backup & Replication offers complete support for restore delegation thanks to the Enterprise Manager. Fig. 13: An overview of Veeam Enterprise Manager. Enterprise Manager is a web portal where users can have a quick overview of the environment and execute different activities with the additional advantage of a complete multi-tenant solution. While the console of Veeam Backup & Replication is mainly designed for the administrators, and as such its security is based on the windows rights of the machine where it is installed, Enterprise Manager is a role-based solution, where different users can have different roles, applied to only parts of the vsphere environment. As such, it s a perfect solution to offer self-restore capabilities natively, without third party components. Finally, Enterprise Manager can be accessed natively via its web interface, or via RestFUL API, for those customers willing to integrate it into their custom developed portals. 19

20 6.1 Configure roles and scopes Administrators can configure users access to Enterprise Manager to limit both the parts of the vsphere environment the can work on, and both the activities they can do. Fig. 14: Users and roles in Veeam Enterprise Manager As in any role-based system, each user registered in Enterprise Manager needs to have a role. When a new user is created, either a local user or one from Active Directory, it can have one of three available roles: Fig. 15: Restore options for Restore Operators Restore Operator is definitely the proper way to assign to users/tenants to enable self-service restore. This allows users to see the restore points of their own virtual machines and items stored inside those machines, and start restore operations from there. 20

21 Possible restore options are entire virtual machines, or even only single files or application items, as you can see in fig. 15. In addition to this option, the important part is the configuration of the scope: The part of the vsphere infrastructure the operator has access to. Fig. 16: Possible scopes in Veeam Enterprise Manager Administrators can decide if a Restore Operator is going to obtain access to backups of a dynamic container of the vsphere environment, such as a resource pool or by tags. The first option is good for mapping users belonging, for example, to a different Business Unit: As this unit is probably configured as a resource pool in vsphere, having access only to the backups of VMs belonging to the resource pool makes perfect sense. Or, by using tags as a scope operator can manage a specific type of virtual machine. In our example, the database administrator may have the need to restore data in their databases, regardless of the business unit they belong to. Both options lead to a limited access of the Enterprise Manager, where the operator doesn t see any configuration option (this is in charge of the backup administrators) but has the minimum amount of permissions required to complete a restore. Fig. 17: Restore Operator view in Veeam Enterprise Manager Restore Operators see only the tabs related to VMs and/or files, depending on how their user was configured. With Enterprise Manager, administrators can delegate restores to users and offer a complete self-service solution, without having users themselves access the Veeam Backup & Replication console. 21

22 6.2 Self restore portal for application owners Enterprise Manager is a great solution, but it requires that every user is mapped against a role to obtain access to it. This means there is an additional load on the backup administrators to configure each user, and the need from time to time to change the configurations as people change role in the company, leaves or is hired. If the restore needs are related to Microsoft Windows virtual machines, Enterprise Manager has an additional option: Self restore portal for application owners. The self restore portal is available for file-level restores of Windows virtual machines. When a user is logged into a Windows VM joined to the Active Directory domain, its user is already authenticated when the Self Restore portal is opened. Enterprise Manager reads this information automatically via the browser API, checks if the user is a local administrator of the VM used to reach the portal, and in this way automatic access is granted. Enterprise Manager then shows to the user only the backups where he s recognized as a local administrator. Fig. 18: Veeam Self restore portal for application owners With Self restore portal for application owners, administrators don t have to manage delegations at all since this is done automatically by Enterprise Manager during the access to the special URL ( 22

23 7. An integrated approach So far, we discussed how to properly configure a policy-based Availability solution. But an environment is not made with different silos, rather every different component needs to interact with all the others, so that the overall environment is working at its best. Backup administrators are in reality not only responsible for their own solution. This solution interacts and can affect other components, and for this reason a proper design, deployment and management needs to be done. Otherwise, by only focusing on this single solution, administrators can affect the entire environment with their design choices. Separation of duties between providers and users still means that providers are in charge of the good standing of their environment. Simply defining the policies and letting them be consumed without monitoring for example is dangerous. Policies must be designed following the limits of the available resources. Suppose you have a policy that allows users to run a full backup every hour. What happens if your backup environment cannot guarantee this requirement? Excessive policies like this will ruin the performances of the production environment or the backup environment, leading to damages, downtime, data loss. That s why Veeam Backup & Replication is designed to consider every possible aspect of the environment where it s deployed, and not just offer data protection. 7.1 Performance growth A virtualized environment can start small, and then grow over time. When an administrator designs its policies, those can be easily fulfilled at the beginning, but when the environment grows, and the number of virtual machines to be processed is way bigger than what originally designed for, administrators need to be sure their technology can still offer the same level of service designed at the beginning. Offering an RPO of 4 hours with 50 virtual machines doesn t require the same amount of resources as an environment with 5,000 virtual machines. Veeam Backup & Replication has different scalable components that can be added without modifying the environment to keep performance at pace as the environment grows. If more data needs to be processed, it s as easy as deploying additional proxies and repositories to guarantee that backup performance will still be the same even with 100 times the amount of virtual machines. 23

24 7.2 Protect the production environment An Availability solution is designed to protect a production environment, and for this reason, its first directive should be not to harm the environment it s supposed to protect. A point solution designed to do backups is probably designed with just backups in mind. An Availability solution, on the other hand, will take into account the available resources both in the production and backup environment. As the requirements for better Availability increase, better RPO are requested by users. In terms of backup jobs for example, this means the need to execute them multiple times per day. An architect should ideally design the production environment taking into account the resources needed to run the workloads, AND to feed data to the Availability solution. Think about storage I/O - if Veeam Backup & Replication needs to extract data from the production storage multiple times per day, does this storage array have enough resources to run the virtual machines and feed Veeam at the same time? Or are Veeam jobs going to reduce the performance of the virtual machines because the underlying storage cannot satisfy both requests? Availability also means maintaining performance while data protection activities are executed, and for this reason, Veeam Backup & Replication has a feature called Backup I/O Control. Fig. 19: Veeam Backup I/O Control Backup I/O Control monitors in real-time the latency of vsphere datastores, and every time latency goes above a configured threshold, backup jobs are throttled to guarantee latency never goes above the desired value. Talking in policy terms, it s like having a desired state of the storage performance, and being guaranteed by Veeam that the policy will never be violated. Backup I/O Control is the perfect example of a feature that simple backup solutions will probably never have, but a component that you can expect from a solution that offers complete Availability of the environment it s protecting. 24

25 About the Author Luca Dell Oca (vexpert, VCAP-DCD, CISSP) is an EMEA Evangelist for Veeam Software based in Italy. Luca is a popular blogger and active member of the virtualization community. Luca s career started in information security before focusing on virtualization. His main areas of expertise are VMware and storage design, with a deep focus on Cloud Service Providers and Large Enterprises. Follow Luca on About Veeam Software Veeam recognizes the new challenges companies across the globe face in enabling the Always- On Business, a business that must operate 24/7/365. To address this, Veeam has pioneered a new market of Availability for the Modern Data Center by helping organizations meet recovery time and point objectives (RTPO ) of less than 15 minutes for all applications and data, through a fundamentally new kind of solution that delivers high-speed recovery, data loss avoidance, verified protection, leveraged data and complete visibility Veeam Availability Suite, which includes Veeam Backup & Replication, leverages virtualization, storage, and cloud technologies that enable the modern data center to help organizations save time, mitigate risks, and dramatically reduce capital and operational costs. Founded in 2006, Veeam currently has 29,000 ProPartners and more than 135,000 customers worldwide. Veeam s global headquarters are located in Baar, Switzerland, and the company has offices throughout the world. To learn more, visit 25

26 COMING SOON Using Veeam and VMware vsphere tags for advanced policy-driven data protection NEW Veeam Availability Suite v9 RTPO <15 minutes for ALL applications and data Learn more and preview the upcoming v9 release vee.am/v9 26

Backup and recovery of vsphere VCSA and Platform Services Controllers

Backup and recovery of vsphere VCSA and Platform Services Controllers Backup and recovery of vsphere VCSA and Platform Services Controllers Michael White Global Technical Evangelist, Veeam Contents Introduction... 3 Audience...............................................................................................................3

More information

Configuration Guide for Veeam Backup & Replication with the HPE Hyper Converged 250 System

Configuration Guide for Veeam Backup & Replication with the HPE Hyper Converged 250 System Configuration Guide for Veeam Backup & Replication with the HPE Hyper Converged 250 System 1 + 1 = 3 HPE + Veeam Better Together Contents Intended audience...3 Veeam Backup & Replication overview...3 Adding

More information

Deep Dive - Veeam Backup & Replication with NetApp Storage Snapshots

Deep Dive - Veeam Backup & Replication with NetApp Storage Snapshots Deep Dive - Veeam Backup & Replication with NetApp Storage Snapshots Luca Dell Oca EMEA Evangelist, Product Strategy Specialist for Veeam Software, VMware vexpert, VCAP-DCD, CISSP Modern Data Protection

More information

TOP REASONS TO CHOOSE DELL EMC OVER VEEAM

TOP REASONS TO CHOOSE DELL EMC OVER VEEAM HANDOUT TOP REASONS TO CHOOSE DELL EMC OVER VEEAM 10 This handout overviews the top ten reasons why customers choose Data Protection from Dell EMC over Veeam. Dell EMC has the most comprehensive data protection

More information

Hitchhiker s Guide to Veeam Backup Free Edition

Hitchhiker s Guide to Veeam Backup Free Edition Hitchhiker s Guide to Veeam Backup Free Edition Kirsten Stoner Product Strategy Coordinator Why use Veeam Backup Free Edition? Veeam Backup Free Edition is a powerful, easy-to-use utility that consists

More information

SMASHING THE TOP 7 VIRTUALIZATION SECURITY MYTHS

SMASHING THE TOP 7 VIRTUALIZATION SECURITY MYTHS SMASHING THE TOP 7 VIRTUALIZATION SECURITY MYTHS WHY VIRTUALIZATION? VIRTUALIZATION HAS MANY BUSINESS BENEFITS, INCLUDING THE FOLLOWING: Cost containment: Virtualization reduces the overall hardware footprint,

More information

Configuring EMC Data Domain Boost with Veeam Availability Suite v8

Configuring EMC Data Domain Boost with Veeam Availability Suite v8 Configuring EMC Data Domain Boost with Veeam Availability Suite v8 Rick Vanover VMware vexpert, MCP, MCITP, MCSA and Veeam Product Strategy Specialist Introduction Support for EMC Data Domain Boost is

More information

Data Protection for Virtualized Environments

Data Protection for Virtualized Environments Technology Insight Paper Data Protection for Virtualized Environments IBM Spectrum Protect Plus Delivers a Modern Approach By Steve Scully, Sr. Analyst February 2018 Modern Data Protection for Virtualized

More information

StorageCraft OneXafe and Veeam 9.5

StorageCraft OneXafe and Veeam 9.5 TECHNICAL DEPLOYMENT GUIDE NOV 2018 StorageCraft OneXafe and Veeam 9.5 Expert Deployment Guide Overview StorageCraft, with its scale-out storage solution OneXafe, compliments Veeam to create a differentiated

More information

VMWARE PROTECTION WITH DELL EMC NETWORKER 9

VMWARE PROTECTION WITH DELL EMC NETWORKER 9 VMWARE PROTECTION WITH DELL EMC NETWORKER 9 Solution Overview ABSTRACT This white paper describes the integration of Dell EMC NetWorker with VMware vcenter. It also includes details on the NetWorker architecture

More information

Availability for the Always-On Enterprise

Availability for the Always-On Enterprise Availability for the Always-On Enterprise Accompagnez la digitalisation de votre entreprise avec Veeam Availability Suite 9.5 Thomas Dätwyler Systems Engineer mail thomas.daetwyler@veeam.com skype thomas.daetwyler.veeam

More information

Availability and the Always-on Enterprise: Why Backup is Dead

Availability and the Always-on Enterprise: Why Backup is Dead Availability and the Always-on Enterprise: Why Backup is Dead Backups certainly fit the bill at one time, but data center needs have evolved and expanded. By Nick Cavalancia Every business has experienced

More information

StorageCraft OneBlox and Veeam 9.5 Expert Deployment Guide

StorageCraft OneBlox and Veeam 9.5 Expert Deployment Guide TECHNICAL DEPLOYMENT GUIDE StorageCraft OneBlox and Veeam 9.5 Expert Deployment Guide Overview StorageCraft, with its scale-out storage solution OneBlox, compliments Veeam to create a differentiated diskbased

More information

Hedvig as backup target for Veeam

Hedvig as backup target for Veeam Hedvig as backup target for Veeam Solution Whitepaper Version 1.0 April 2018 Table of contents Executive overview... 3 Introduction... 3 Solution components... 4 Hedvig... 4 Hedvig Virtual Disk (vdisk)...

More information

Data safety for digital business. Veritas Backup Exec WHITE PAPER. One solution for hybrid, physical, and virtual environments.

Data safety for digital business. Veritas Backup Exec WHITE PAPER. One solution for hybrid, physical, and virtual environments. WHITE PAPER Data safety for digital business. One solution for hybrid, physical, and virtual environments. It s common knowledge that the cloud plays a critical role in helping organizations accomplish

More information

NEXT BIG THING. Edgemo Summit Martin Plesner-Jacobsen Team Lead Nordic

NEXT BIG THING. Edgemo Summit Martin Plesner-Jacobsen Team Lead Nordic NEXT BIG THING Edgemo Summit 2016 Martin Plesner-Jacobsen Team Lead Nordic HQ Baar, Switzerland Founded in 2006, Veeam currently has 205,000 customers 41,000 ProPartners 2,200 employees worldwide 205,000+

More information

Remove complexity in protecting your virtual infrastructure with. IBM Spectrum Protect Plus. Data availability made easy. Overview

Remove complexity in protecting your virtual infrastructure with. IBM Spectrum Protect Plus. Data availability made easy. Overview Overview Challenge In your organization, backup management is too complex and consumes too much time and too many IT resources. Solution IBM Spectrum Protect Plus dramatically simplifies data protection

More information

Solution Brief: Commvault HyperScale Software

Solution Brief: Commvault HyperScale Software Solution Brief: Commvault HyperScale Software ENTERPRISE IT SHIFTS Enterprise IT is being transformed with the maturing of public cloud providers that offer compute, storage and application services with

More information

Veeam with Cohesity Data Platform

Veeam with Cohesity Data Platform Veeam with Cohesity Data Platform Table of Contents About This Guide: 2 Data Protection for VMware Environments: 2 Benefits of using the Cohesity Data Platform with Veeam Backup & Replication: 4 Appendix

More information

Understanding Virtual System Data Protection

Understanding Virtual System Data Protection Understanding Virtual System Data Protection Server virtualization is the most important new technology introduced in the data center in the past decade. It has changed the way we think about computing

More information

Availability for the modern datacentre Veeam Availability Suite v9.5

Availability for the modern datacentre Veeam Availability Suite v9.5 Availability for the modern datacentre Veeam Availability Suite v9.5 Jan van Leuken System Engineer Benelux, Veeam Software jan.vanleuken@veeam.com +31 (0)615 83 50 64 Robin van der Steenhoven Territory

More information

What s new. James De Clercq (RealDolmen) Timothy Dewin (Veeam Software)

What s new. James De Clercq (RealDolmen) Timothy Dewin (Veeam Software) What s new James De Clercq (RealDolmen) Timothy Dewin (Veeam Software) http://teeam.eu Veeam One Veeam Management Pack Manage Manage Protect Protect Manage Veeam Protect Manage Availability Suite Veeam

More information

Chapter 11. SnapProtect Technology

Chapter 11. SnapProtect Technology Chapter 11 SnapProtect Technology Hardware based snapshot technology provides the ability to use optimized hardware and disk appliances to snap data on disk arrays providing quick recovery by reverting

More information

Veeam Cloud Connect v9

Veeam Cloud Connect v9 A reference architecture to learn, design, implement and manage your Veeam-powered cloud services Luca Dell Oca EMEA Cloud Architect, Veeam Software, vexpert, VCAP-DCD, CISSP Contents Introduction...4

More information

Introducing VMware Validated Designs for Software-Defined Data Center

Introducing VMware Validated Designs for Software-Defined Data Center Introducing VMware Validated Designs for Software-Defined Data Center VMware Validated Design 4.0 VMware Validated Design for Software-Defined Data Center 4.0 You can find the most up-to-date technical

More information

Migration. 22 AUG 2017 VMware Validated Design 4.1 VMware Validated Design for Software-Defined Data Center 4.1

Migration. 22 AUG 2017 VMware Validated Design 4.1 VMware Validated Design for Software-Defined Data Center 4.1 22 AUG 2017 VMware Validated Design 4.1 VMware Validated Design for Software-Defined Data Center 4.1 You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/

More information

Introducing VMware Validated Designs for Software-Defined Data Center

Introducing VMware Validated Designs for Software-Defined Data Center Introducing VMware Validated Designs for Software-Defined Data Center VMware Validated Design for Software-Defined Data Center 4.0 This document supports the version of each product listed and supports

More information

Storage Considerations for VMware vcloud Director. VMware vcloud Director Version 1.0

Storage Considerations for VMware vcloud Director. VMware vcloud Director Version 1.0 Storage Considerations for VMware vcloud Director Version 1.0 T e c h n i c a l W H I T E P A P E R Introduction VMware vcloud Director is a new solution that addresses the challenge of rapidly provisioning

More information

ECONOMICAL, STORAGE PURPOSE-BUILT FOR THE EMERGING DATA CENTERS. By George Crump

ECONOMICAL, STORAGE PURPOSE-BUILT FOR THE EMERGING DATA CENTERS. By George Crump ECONOMICAL, STORAGE PURPOSE-BUILT FOR THE EMERGING DATA CENTERS By George Crump Economical, Storage Purpose-Built for the Emerging Data Centers Most small, growing businesses start as a collection of laptops

More information

Introducing VMware Validated Designs for Software-Defined Data Center

Introducing VMware Validated Designs for Software-Defined Data Center Introducing VMware Validated Designs for Software-Defined Data Center VMware Validated Design for Software-Defined Data Center 3.0 This document supports the version of each product listed and supports

More information

Dell EMC Extensions for VMware vrealize Automation

Dell EMC Extensions for VMware vrealize Automation Dell EMC Extensions for VMware vrealize Automation Administration Guide Version 1.0 May 2018 H17049.1 Administration Guide Abstract This administration guide describes how to implement and manage Dell

More information

NOW! Manage ALL workloads virtual, physical and cloud from a single console!

NOW! Manage ALL workloads virtual, physical and cloud from a single console! NOW! Manage ALL workloads virtual, physical and cloud from a single console! Veeam Availability Suite 9.5 Update 3 Veeam Agent for Microsoft Windows 2.1 Veeam Agent for Linux v2 Rick Vanover Director of

More information

Maximizing Availability With Hyper-Converged Infrastructure

Maximizing Availability With Hyper-Converged Infrastructure Maximizing Availability With Hyper-Converged Infrastructure With the right solution, organizations of any size can use hyper-convergence to help achieve their most demanding availability objectives. Here

More information

Nutanix Tech Note. Virtualizing Microsoft Applications on Web-Scale Infrastructure

Nutanix Tech Note. Virtualizing Microsoft Applications on Web-Scale Infrastructure Nutanix Tech Note Virtualizing Microsoft Applications on Web-Scale Infrastructure The increase in virtualization of critical applications has brought significant attention to compute and storage infrastructure.

More information

Commvault with Cohesity Data Platform

Commvault with Cohesity Data Platform Commvault with Cohesity Data Platform Table of Contents About This Guide:...1 Data Protection for VMware Environments:...1 Cohesity Data Platform Overview:...1 Commvault Overview:... 2 Benefits of using

More information

The VSS role in vsphere, Hyper-V and agent-assisted backups

The VSS role in vsphere, Hyper-V and agent-assisted backups The VSS role in vsphere, Hyper-V and agent-assisted backups Nick Cavalancia Techvangelism When it comes to Microsoft VSS (Volume Shadow Copy), there s more to backing up VMs (virtual machines) than meets

More information

Protecting Microsoft SharePoint

Protecting Microsoft SharePoint TECHNICAL WHITE PAPER: BACKUP EXEC TM 2014 PROTECTING MICROSOFT SHAREPOINT Backup Exec TM 2014 Technical White Paper Protecting Microsoft SharePoint Technical White Papers are designed to introduce Symantec

More information

Setting Up the Dell DR Series System on Veeam

Setting Up the Dell DR Series System on Veeam Setting Up the Dell DR Series System on Veeam Dell Engineering April 2016 A Dell Technical White Paper Revisions Date January 2014 May 2014 July 2014 April 2015 June 2015 November 2015 April 2016 Description

More information

Veeam Availability Solution for Cisco UCS: Designed for Virtualized Environments. Solution Overview Cisco Public

Veeam Availability Solution for Cisco UCS: Designed for Virtualized Environments. Solution Overview Cisco Public Veeam Availability Solution for Cisco UCS: Designed for Virtualized Environments Veeam Availability Solution for Cisco UCS: Designed for Virtualized Environments 1 2017 2017 Cisco Cisco and/or and/or its

More information

Simple Data Protection for the Cloud Era

Simple Data Protection for the Cloud Era Simple Data Protection for the Era Enterprise Data Protection, Simplified Struggling with data protection? You re not alone. Many storage admins are faced with the challenge of protecting an increasing

More information

Managing Exchange Migration with Enterprise Vault

Managing Exchange Migration with Enterprise Vault WHITE PAPER Managing Exchange Migration with Enterprise Abstract: Many organizations today are considering either replacing their legacy mail system, for example GroupWise or ccmail, with Microsoft Exchange

More information

EMC VIPR SRM: VAPP BACKUP AND RESTORE USING VMWARE VSPHERE DATA PROTECTION ADVANCED

EMC VIPR SRM: VAPP BACKUP AND RESTORE USING VMWARE VSPHERE DATA PROTECTION ADVANCED White paper EMC VIPR SRM: VAPP BACKUP AND RESTORE USING VMWARE VSPHERE DATA PROTECTION ADVANCED Abstract This white paper provides a working example of how to back up and restore an EMC ViPR SRM vapp using

More information

Best practices for protecting Virtualization, SDDC, Cloud, and the Modern Data Center, with NetBackup

Best practices for protecting Virtualization, SDDC, Cloud, and the Modern Data Center, with NetBackup Best practices for protecting Virtualization, SDDC, Cloud, and the Modern Data Center, with NetBackup Alain Pelegrin EMEA NetBackup Solutions Lead TSS IM Technology Practice Olivier Ribouchon Presales

More information

Veeam Cloud Connect. Version 8.0. Administrator Guide

Veeam Cloud Connect. Version 8.0. Administrator Guide Veeam Cloud Connect Version 8.0 Administrator Guide June, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be reproduced,

More information

REFERENCE ARCHITECTURE. Rubrik and Nutanix

REFERENCE ARCHITECTURE. Rubrik and Nutanix REFERENCE ARCHITECTURE Rubrik and Nutanix TABLE OF CONTENTS INTRODUCTION - RUBRIK...3 INTRODUCTION - NUTANIX...3 AUDIENCE... 4 INTEGRATION OVERVIEW... 4 ARCHITECTURE OVERVIEW...5 Nutanix Snapshots...6

More information

Achieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER

Achieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER Achieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER Table of Contents The Digital Transformation 3 Four Must-Haves for a Modern Virtualization Platform 3

More information

Copyright 2012 EMC Corporation. All rights reserved.

Copyright 2012 EMC Corporation. All rights reserved. 1 BACKUP BUILT FOR VMWARE Mark Twomey Technical Director, The Office Of The CTO 2 Agenda Market Forces Optimized VMware Backup Backup And Recovery For VCE Vblock Protecting vcloud Director Customer Success

More information

Deployment Guide For Microsoft Exchange With Cohesity DataProtect

Deployment Guide For Microsoft Exchange With Cohesity DataProtect Deployment Guide For Microsoft Exchange With Cohesity DataProtect This white paper outlines the Cohesity DataProtect deployment guide for Microsoft Exchange Server Data Protection. Table of Contents About

More information

Veeam Availability for Nutanix AHV

Veeam Availability for Nutanix AHV Veeam Availability for Nutanix AHV Patric Hermann Systems Engineer Patric.Hermann@veeam.com HQ in Baar, Switzerland 320,000 Customers worldwide 4,000 additional per month 17.6M+ s protected in 200+ countries

More information

Introducing VMware Validated Design Use Cases

Introducing VMware Validated Design Use Cases Introducing VMware Validated Design Use Cases VMware Validated Designs 4.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Introducing VMware Validated Design Use Cases. Modified on 21 DEC 2017 VMware Validated Design 4.1

Introducing VMware Validated Design Use Cases. Modified on 21 DEC 2017 VMware Validated Design 4.1 Introducing VMware Validated Design Use Cases Modified on 21 DEC 2017 VMware Validated Design 4.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

SharePoint Virtualization and the Benefits of Modern Data Protection with Veeam Explorer for Microsoft SharePoint

SharePoint Virtualization and the Benefits of Modern Data Protection with Veeam Explorer for Microsoft SharePoint SharePoint Virtualization and the Benefits of Modern Data Protection with Veeam Explorer for Microsoft SharePoint Chris Henley Microsoft Certified Professional, MCSE, MCSA and Veeam Product Strategy Specialist

More information

Boost your data protection with NetApp + Veeam. Schahin Golshani Technical Partner Enablement Manager, MENA

Boost your data protection with NetApp + Veeam. Schahin Golshani Technical Partner Enablement Manager, MENA Boost your data protection with NetApp + Veeam Schahin Golshani Technical Partner Enablement Manager, MENA NetApp Product Strategy Market-leading innovations, that are NetApp Confidential Limited Use 3

More information

Deep Dive on SimpliVity s OmniStack A Technical Whitepaper

Deep Dive on SimpliVity s OmniStack A Technical Whitepaper Deep Dive on SimpliVity s OmniStack A Technical Whitepaper By Hans De Leenheer and Stephen Foskett August 2013 1 Introduction This paper is an in-depth look at OmniStack, the technology that powers SimpliVity

More information

VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014

VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Additional Features and Benefits of

More information

IBM Spectrum Protect Plus

IBM Spectrum Protect Plus IBM Spectrum Protect Plus Simplify data recovery and data reuse for VMs, files, databases and applications Highlights Achieve rapid VM, file, database, and application recovery Protect industry-leading

More information

IBM Data Protection for Virtual Environments: Extending IBM Spectrum Protect Solutions to VMware and Hyper-V Environments

IBM Data Protection for Virtual Environments: Extending IBM Spectrum Protect Solutions to VMware and Hyper-V Environments The Challenges ESG Lab Review IBM Data Protection for Virtual Environments: Extending IBM Spectrum Protect Solutions to VMware and Hyper-V Environments Date: August 2015 Author: Vinny Choinski, Senior

More information

De-dupe: It s not a question of if, rather where and when! What to Look for and What to Avoid

De-dupe: It s not a question of if, rather where and when! What to Look for and What to Avoid De-dupe: It s not a question of if, rather where and when! What to Look for and What to Avoid By Greg Schulz Founder and Senior Analyst, the StorageIO Group Author The Green and Virtual Data Center (CRC)

More information

Copyright 2015 EMC Corporation. All rights reserved. Published in the USA.

Copyright 2015 EMC Corporation. All rights reserved. Published in the USA. This solution guide describes the data protection functionality of the Federation Enterprise Hybrid Cloud for Microsoft applications solution, including automated backup as a service, continuous availability,

More information

(TBD GB/hour) was validated by ESG Lab

(TBD GB/hour) was validated by ESG Lab (TBD GB/hour) was validated by ESG Lab Enterprise Strategy Group Getting to the bigger truth. ESG Lab Review Protecting Virtual Environments with Spectrum Protect Plus from IBM Date: November 2017 Author:

More information

The Evolution of IT Resilience & Assurance

The Evolution of IT Resilience & Assurance White Paper The Evolution of IT Resilience & Assurance Executive Summary Protection of business data and applications has evolved dramatically over the past several decades mostly driven by businesses

More information

Evolved Backup and Recovery for the Enterprise

Evolved Backup and Recovery for the Enterprise Evolved Backup and Recovery for the Enterprise with Asigra technology Working gives me confidence in my data protection plan. I know that if I ever need to restore, it will take a few minutes rather than

More information

ENTERPRISE HYBRID CLOUD 4.1.1

ENTERPRISE HYBRID CLOUD 4.1.1 ENTERPRISE HYBRID CLOUD 4.1.1 May 2017 Abstract This guide describes the administration functionality of. Enterprise Hybrid Cloud enables IT organizations to deliver infrastructure, storage, backup, continuous

More information

Optimizing and Managing File Storage in Windows Environments

Optimizing and Managing File Storage in Windows Environments Optimizing and Managing File Storage in Windows Environments A Powerful Solution Based on Microsoft DFS and Virtual File Manager September 2006 TR-3511 Abstract The Microsoft Distributed File System (DFS)

More information

Symantec NetBackup 7 for VMware

Symantec NetBackup 7 for VMware V-Ray visibility into virtual machine protection Overview There s little question that server virtualization is the single biggest game-changing trend in IT today. Budget-strapped IT departments are racing

More information

Tintri Cloud Connector

Tintri Cloud Connector TECHNICAL WHITE PAPER Tintri Cloud Connector Technology Primer & Deployment Guide www.tintri.com Revision History Version Date Description Author 1.0 12/15/2017 Initial Release Bill Roth Table 1 - Revision

More information

Executive Summary SOLE SOURCE JUSTIFICATION. Microsoft Integration

Executive Summary SOLE SOURCE JUSTIFICATION. Microsoft Integration Executive Summary Commvault Simpana software delivers the unparalleled advantages and benefits of a truly holistic approach to data management. It is one product that contains individually licensable modules

More information

VEMBU VS VEEAM Why Vembu is Better. VEMBU TECHNOLOGIES

VEMBU VS VEEAM Why Vembu is Better. VEMBU TECHNOLOGIES VEMBU VS VEEAM Why is Better VEMBU TECHNOLOGIES vs About Technologies is a well known technology innovator in offering Backup & Disaster Recovery () product targeted at IT-Administrators in large, medium

More information

Tech Note: vsphere Replication with vsan First Published On: Last Updated On:

Tech Note: vsphere Replication with vsan First Published On: Last Updated On: Tech Note: vsphere Replication with vsan First Published On: 10-27-2017 Last Updated On: 11-01-2017 1 Table of Contents 1. Introduction 1.1.Introduction 2. vsphere Replication with vsan Datastores 2.1.vSphere

More information

Veeam Backup & Replication for VMware vsphere

Veeam Backup & Replication for VMware vsphere Veeam Backup & Replication for VMware vsphere Version 9.5 Evaluator's Guide December, 2017 2017 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part

More information

White Paper BC/DR in the Cloud Era

White Paper BC/DR in the Cloud Era BC/DR in the Cloud Era Today, enterprises of all sizes are virtualizing their mission-critical applications, either within their own data center, or with an external cloud vendor. One key driver is to

More information

Nutanix White Paper. Hyper-Converged Infrastructure for Enterprise Applications. Version 1.0 March Enterprise Applications on Nutanix

Nutanix White Paper. Hyper-Converged Infrastructure for Enterprise Applications. Version 1.0 March Enterprise Applications on Nutanix Nutanix White Paper Hyper-Converged Infrastructure for Enterprise Applications Version 1.0 March 2015 1 The Journey to Hyper-Converged Infrastructure The combination of hyper-convergence and web-scale

More information

Advanced Architecture Design for Cloud-Based Disaster Recovery WHITE PAPER

Advanced Architecture Design for Cloud-Based Disaster Recovery WHITE PAPER Advanced Architecture Design for Cloud-Based Disaster Recovery WHITE PAPER Introduction Disaster Recovery (DR) is a fundamental tool for mitigating IT and business risks. But because it is perceived as

More information

With Hyperconverged Infrastructure

With Hyperconverged Infrastructure Getting More out of Oracle With Hyperconverged Infrastructure WHITE PAPER When it comes to enterprise databases, there is no bigger player than Oracle. For more than three decades, Oracle has been synonymous

More information

VMWARE CLOUD FOUNDATION: INTEGRATED HYBRID CLOUD PLATFORM WHITE PAPER NOVEMBER 2017

VMWARE CLOUD FOUNDATION: INTEGRATED HYBRID CLOUD PLATFORM WHITE PAPER NOVEMBER 2017 : INTEGRATED HYBRID CLOUD PLATFORM WHITE PAPER NOVEMBER 2017 Table of Contents Executive Summary 3 A Single Architecture for Hybrid Cloud 4 Introducing VMware Cloud Foundation 4 Deploying on Premises 6

More information

TITLE. the IT Landscape

TITLE. the IT Landscape The Impact of Hyperconverged Infrastructure on the IT Landscape 1 TITLE Drivers for adoption Lower TCO Speed and Agility Scale Easily Operational Simplicity Hyper-converged Integrated storage & compute

More information

SRM 8.1 Technical Overview First Published On: Last Updated On:

SRM 8.1 Technical Overview First Published On: Last Updated On: First Published On: 12-23-2016 Last Updated On: 04-17-2018 1 Table of Contents 1. Introduction 1.1.Overview 1.2.Terminology 2. Architectural Overview 2.1.Overview 3. Use Cases 3.1.Overview 3.2.Disaster

More information

Become an Always-On Business. Doug Hazelman VP, Product Strategy Veeam Software

Become an Always-On Business. Doug Hazelman VP, Product Strategy Veeam Software Become an Always-On Business Doug Hazelman VP, Product Strategy Veeam Software Modern Data Center Virtualization Modern storage Cloud 1 Provision IT services faster Strengthen security and control Lower

More information

Case study: Building bi-directional DR. Joep Piscaer, VMware vexpert, VCDX #101

Case study: Building bi-directional DR. Joep Piscaer, VMware vexpert, VCDX #101 Case study: Building bi-directional DR Joep Piscaer, VMware vexpert, VCDX #101 Agenda Introduction Project description, goals, requirements, constraints High level overview: product and component overview

More information

Veeam Backup & Replication Version 6.0

Veeam Backup & Replication Version 6.0 Veeam Backup & Replication Version 6.0 Evaluator s Guide VMware Environments March, 2012 2012 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of

More information

Dell EMC Isilon with Cohesity DataProtect

Dell EMC Isilon with Cohesity DataProtect Dell EMC Isilon with Cohesity DataProtect Abstract This guide outlines the Cohesity DataProtect deployment guide for Dell EMC Isilon Data Protection. Table of Contents About This Guide...2 Intended Audience...2

More information

VMware admins: Can your DR do this?

VMware admins: Can your DR do this? VMware admins: Can your DR do this? Veeam Backup & Replication v6 Rick Vanover vexpert, VCP, MCITP Product Strategy Specialist Twitter @RickVanover Administrative Points on this Webinar Technical content,

More information

Server Fault Protection with NetApp Data ONTAP Edge-T

Server Fault Protection with NetApp Data ONTAP Edge-T Technical Report Server Fault Protection with NetApp Data ONTAP Edge-T Jeff Whitaker, NetApp March 2013 TR-4154 TABLE OF CONTENTS 1 Introduction... 3 2 Backup and Disaster Recovery Technology... 4 2.1

More information

Building Backup-to-Disk and Disaster Recovery Solutions with the ReadyDATA 5200

Building Backup-to-Disk and Disaster Recovery Solutions with the ReadyDATA 5200 Building Backup-to-Disk and Disaster Recovery Solutions with the ReadyDATA 5200 WHITE PAPER Explosive data growth is a challenging reality for IT and data center managers. IDC reports that digital content

More information

Running Splunk on VxRack FLEX

Running Splunk on VxRack FLEX ESG Technical White Paper Running Splunk on VxRack FLEX Background As organizations continue to look for ways to modernize their infrastructures by delivering a cloud-like experience onpremises, hyperconverged

More information

C H A P T E R Overview Figure 1-1 What is Disaster Recovery as a Service?

C H A P T E R Overview Figure 1-1 What is Disaster Recovery as a Service? CHAPTER 1 Cisco Disaster Recovery as a Service Solution (DRaaS) architecture described in this document is designed to provide a new set of related capabilities allowing Virtualized Multi-Tenant Data Center

More information

Executive Summary. The Need for Shared Storage. The Shared Storage Dilemma for the SMB. The SMB Answer - DroboElite. Enhancing your VMware Environment

Executive Summary. The Need for Shared Storage. The Shared Storage Dilemma for the SMB. The SMB Answer - DroboElite. Enhancing your VMware Environment Executive Summary The Need for Shared Storage The Shared Storage Dilemma for the SMB The SMB Answer - DroboElite Enhancing your VMware Environment Ideal for Virtualized SMB Conclusion Executive Summary

More information

The Impact of Hyper- converged Infrastructure on the IT Landscape

The Impact of Hyper- converged Infrastructure on the IT Landscape The Impact of Hyperconverged Infrastructure on the IT Landscape Where else do you consume like this? 3 Focus on innovation, not IT integration BUILD Consumes valuables time and resources Go faster Invest

More information

Veeam ONE. Version 8.0. Deployment Guide

Veeam ONE. Version 8.0. Deployment Guide Veeam ONE Version 8.0 Deployment Guide April, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be reproduced, transmitted,

More information

vrealize Automation Management Pack 2.0 Guide

vrealize Automation Management Pack 2.0 Guide vrealize Automation Management Pack 2.0 Guide This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for

More information

The storage challenges of virtualized environments

The storage challenges of virtualized environments The storage challenges of virtualized environments The virtualization challenge: Ageing and Inflexible storage architectures Mixing of platforms causes management complexity Unable to meet the requirements

More information

SECURE, FLEXIBLE ON-PREMISE STORAGE WITH EMC SYNCPLICITY AND EMC ISILON

SECURE, FLEXIBLE ON-PREMISE STORAGE WITH EMC SYNCPLICITY AND EMC ISILON White Paper SECURE, FLEXIBLE ON-PREMISE STORAGE WITH EMC SYNCPLICITY AND EMC ISILON Abstract This white paper explains the benefits to the extended enterprise of the on-premise, online file sharing storage

More information

StarWind VTL Storage Gateway for Azure and Veeam Installation and Configuration Guide

StarWind VTL Storage Gateway for Azure and Veeam Installation and Configuration Guide One Stop Virtualization Shop StarWind VTL OCTOBER 2018 TECHNICAL PAPER Trademarks StarWind, Starind Software and the StarWind and the StarWind Software logos are registered trademarks of StarWind Software.

More information

Veeam ONE. Version 8.0. User Guide for VMware vsphere Environments

Veeam ONE. Version 8.0. User Guide for VMware vsphere Environments Veeam ONE Version 8.0 User Guide for VMware vsphere Environments July, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication

More information

NetApp AltaVault Cloud-Integrated Storage Appliances

NetApp AltaVault Cloud-Integrated Storage Appliances Technical Report NetApp AltaVault Cloud-Integrated Storage Appliances Solution Deployment: AltaVault Christopher Wong, NetApp November 2017 TR-4417 Abstract This solution deployment guide outlines how

More information

VMware vsphere Data Protection Evaluation Guide REVISED APRIL 2015

VMware vsphere Data Protection Evaluation Guide REVISED APRIL 2015 VMware vsphere Data Protection REVISED APRIL 2015 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Requirements.... 4 Evaluation Workflow... 5 Overview.... 5 Evaluation

More information

Hyperconverged Infrastructure: Cost-effectively Simplifying IT to Improve Business Agility at Scale

Hyperconverged Infrastructure: Cost-effectively Simplifying IT to Improve Business Agility at Scale Enterprise Strategy Group Getting to the bigger truth. White Paper Hyperconverged Infrastructure: Cost-effectively Simplifying IT to Improve Business Agility at Scale By Mike Leone, ESG Senior Analyst;

More information

Protecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery

Protecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery White Paper Business Continuity Protecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery Table of Contents Executive Summary... 1 Key Facts About

More information

VMware vsphere with ESX 6 and vcenter 6

VMware vsphere with ESX 6 and vcenter 6 VMware vsphere with ESX 6 and vcenter 6 Course VM-06 5 Days Instructor-led, Hands-on Course Description This class is a 5-day intense introduction to virtualization using VMware s immensely popular vsphere

More information

Setting Up the DR Series System on Veeam

Setting Up the DR Series System on Veeam Setting Up the DR Series System on Veeam Quest Engineering June 2017 A Quest Technical White Paper Revisions Date January 2014 May 2014 July 2014 April 2015 June 2015 November 2015 April 2016 Description

More information