Chapter 11. SnapProtect Technology

Size: px
Start display at page:

Download "Chapter 11. SnapProtect Technology"

Transcription

1 Chapter 11 SnapProtect Technology Hardware based snapshot technology provides the ability to use optimized hardware and disk appliances to snap data on disk arrays providing quick recovery by reverting or mounting the snapshots. This protection method significantly reduces protection and recovery times while requiring minimal additional disk storage to maintain snaps. Since minimal storage is required to store snaps, they can frequently be conducted to provide multiple recovery points to minimize potential data loss. Snapshot technology can also be used to snap and replicate data to additional disk storage using minimal bandwidth providing physical data separation and a complete disaster recovery solution. Technology is rapidly evolving and more capabilities are being added to snap hardware with every new generation. However hardware based snapshot technologies operating on their own have several key disadvantages: No application awareness Since the snaps are being performed by the disk themselves there is no awareness of what is actually being snapped. To the disk array data is just seen as blocks and is unaware of the application data the blocks represent. This can cause data integrity issues when snapping application databases. Limited by disk space Snapshots are limited by the amount of snap cache space that is available. As a result, although snapshots are good for short term retention of mission critical data, they provide limited or no long term retention capabilities. No granular recovery Reverting a snapshot is a quick and powerful recovery method in the case where production data corruption occurs but snapshots have traditionally been incapable of providing granular access to objects within the snap. Some hardware vendors provide granular recovery by mounting the snapshot off host where the data can then be mined for recovery. Complex management Although many hardware vendors have developed GUI interfaces to conduct and manage snaps, a great deal of the technology involves specialized training and knowledge of commands and scripting to properly manage the hardware. If multiple vendor hardware is being used, storage administrators must understand each technology which adds considerable complexity and the potential for longer down times when problems occur. Simpana SnapProtect Technology overcomes these limitations by providing a single interface to conduct, manage, revert, and backup snapshots. The following lists the key highlights for the SnapProtect feature:

2 SnapProtect Technology - 2 Application Awareness By using Simpana idataagents to communicate with hosting applications, application consistent snapshots can be performed. The application agent will communicate with the hosting application to quiesce databases prior to the snap occurring. This is a significant benefit when protecting large databases where traditional backup methods are not adequate to meet protection windows. Snapshot backups to reclaim disk cache space By managing the snapshots, Simpana software can also be used to backup the snapped data. As older snapshots are backed up to protected storage, the snaps can be released on the source disk and the space can be freed for new snap operations. Granular recovery - Snapshots can be mounted for Live Browse and indexed during backup operations for granular recovery of objects within the snap. Whether using live browse or a restore from a backup, the method to restore the data is consistent. Using the proper idataagent you can browse the snapped data and select objects for recovery. This process is especially useful when multiple databases or virtual machines are in the same snap and a full revert cannot be done. In this case just the objects required for recovery can be selected and restored. Simplified management Multiple hardware vendors supported by the SnapProtect feature can all be managed through the Simpana interface. Little additional training is involved since the same subclient and storage policy strategies used for backing up data are extended when using snapshots. Just a few additional settings are configured to enable snapshots within the CommCell environment. Note: The Simpana SnapProtect feature is rapidly evolving to incorporate increased capabilities as well as expanded hardware support. Check with CommVault online documentation for current list of supported features and supported vendors. Understanding Hardware Based Snap Technologies A snapshot is a point-in-time view of a volume s block layout at the point the snap was conducted. Depending on the snapshot technology being used the snapshot could be a logical view of the volume or a physical mirror. A logical snapshot will snap and preserve blocks by caching block changes to a separate location on the volume. A mirror will snap a volume and mirror data blocks to a separate volume. Hardware vendors will vary the way snapshot technologies are implemented, but they all incorporate some or all of the methods discussed in this section. Variables such as RAID striping, disk speed, array file system efficiency, cache size and hardware efficiency play a big part in the performance of snapshots. This section is designed as a basic overview of how these technologies work. Snapshots Snapshots are point in time logical views of a volume. The volume block mapping is snapped which represents a point-in-time view of the block structure when the snap occurred. When existing blocks need to be overwritten with new blocks the old blocks are preserved. References to these blocks are recorded to provide a frozen pointin-time snapshot view of the volume. This allows the volume to be reverted back to any point in which a snapshot

3 SnapProtect Technology - 3 was taken. The snapshot can also be mounted off line on a separate host for mining, testing, backing up or restoring data. Although vendors may use their own specific snap methods and different terminology, there are two primary methods for conducting snapshots: Copy on Write Allocated on Write (Write Optimized) Copy on Write The copy on write method uses snapshots to gather reference markers for blocks on the snapped volume. A copy on write cache will be created that will cache the original blocks when the blocks need to be overwritten. This requires a read-write-write operation to complete. When a block update of a snapped volume is required, the original block is read from the source volume. Next the original block is written to the cache location. Once the original block has been cached, the new block is committed to the production volume overwriting the original block. This method has the advantage of keeping production blocks contingent in the volume which provides faster read access. The disadvantage is the read-write-write processes increases I/O load on the disks. The following diagram illustrates the basic concept of Copy-on-Write (COW) Snapshots. When the snapshot is conducted a Copy-on-Write cache is created. When a block update is required the original block is cached and the new block overwrites the original block on the volume.

4 SnapProtect Technology - 4 Allocate on Write (Write Optimized) Allocate on write uses additional space on a volume to write update blocks when the original block is modified. In this case the original block will remain in place and the new block is written to another section of the volume. Markers will be used to reference the new block for read requests of the production data. This has an advantage over copy on write in that there is only a single write operation decreasing I/O load on the disks. The disadvantage is that over time higher fragmentation may exist on the volume. The following diagram illustrates the basic concept of Allocate-on-Write Snapshots. When a block update is required the original block will remain in its location and space will be allocated to write the new block.

5 SnapProtect Technology - 5 Note: It is important to note that Copy-on-Write and Allocate-on-Write may be made more efficient by the methods that hardware vendors use to implement these technologies.

6 SnapProtect Technology - 6 Mirroring A mirror will create a complete copy of all blocks in a volume to a separate volume. This provides physical separation of data by keeping exact copies of data blocks on separate physical disks. An initial mirror will copy all blocks between the source and destination. Once the initial mirror is complete, only changed blocks on the production volume will be replicated to the mirror. At any point the production volume becomes corrupt or fails, the mirror can be broken and the mirrored volume can be mounted to the production host. This method provides a more complete protection strategy since all data is physically copied and not just logically referenced. The following diagram illustrates the basic concept of snap mirroring. The entire volume is mirrored to another volume providing a complete duplicate copy and separation of data. When snapshots occur change blocks are then replicated to the mirror copy. Snap mirrors have several advantages over snapshots. First since all data is mirrored to a separate disk volume, if the source volume is completely unavailable, the mirror can be quickly mounted to the production host. This is a major advantage over snapshots which only logically referenced data. Physically copying data blocks to another volume provides physical separation of data to provide for a better high availability solution. Another advantage of mirroring is since the data is mirrored to another disk it can be copied to an off-site location providing a complete disaster recovery and high availability solution.

7 SnapProtect Technology - 7 Another advantage is when backing up mirrored data. Backups can be conducted from the mirror volume completely eliminating production disks from the backup process. This allows backups to be conducted at any time without effecting production systems. One key disadvantage to mirrors is cost. Since mirrored data is a complete copy of all data, twice as much disk space is required. Due to this fact, mirroring is typically reserved for mission critical data which requires a comprehensive high availability and disaster recovery strategy. There are various methods for implementing mirroring solutions. Different vendors will use specific mirroring methods and refer to them using their own terminology. Although hardware manufacturers may use different methods for determining what data goes where and for how long, the mirror concept will still be applied. How SnapProtect Operations Work This section provides an overview of the architecture, configuration and operations of the SnapProtect feature. It is not intended as a step by step guide. Consult with CommVault online documentation for more detailed guidance. SnapProtect technology operates by interfacing with hardware APIs to conduct and manage snapshots. There are several steps required to implement the SnapProtect feature in a CommCell environment. 1. Deploy & Configure Architecture - A SnapProtect Architecture consists of the following components: a. Supported hardware array or Simpana Continuous Data Replicator installed on the host server. b. Host server running specific file system and application idataagents for the host, VSS provider (for Windows servers), and a Media Agent. The host client must also be enabled for SnapProtect operations. c. Proxy server to manage and backup snapshots running the same OS as the host server and a Media Agent. VMware proxy servers must use a Windows OS and have the Virtual Server Agent (VSA) installed. 2. Configure arrays Array information is set in the Array Management applet in Control Panel. Depending on the vendor different information may be required. 3. Configure storage policies Storage policies are used to centrally manage snapshots of subclient data just like backup data. When configuring storage policies, a snapshot copy is added to the policy. For some vendors, multiple snap copies can be added. NetApp DFM enabled policies currently support multiple snap mirror/vault copies. DFM policies will be covered later in this chapter. 4. Configure subclients The SnapProtect capability is enabled at the client level in the Advanced tab of the client properties. Once enabled for the client, subclients will have a SnapProtect Operations tab that can be used to enable and configure snapshots for the subclient.

8 SnapProtect Technology - 8 SnapProtect Architecture SnapProtect architecture is made up of host servers and proxy servers that work together to provide snap and optional backup operations. Host Server Agent Requirements The host server is the server which has direct access to data on the array. For VMware the host server will be a proxy server with the Virtual Server Agent (VSA) installed since agents cannot be directly installed on ESX hosts. Host servers will require the following agents: Media Agent Provides capabilities to execute array functions and access to snapshots on the host. It can also be used when backing up snapshots to CommVault protected storage if no proxy is being used or if the proxy server is unavailable. SnapProtect SnapProtect options are built into idataagents and do not require additional software to be installed on the host. SnapProtect capabilities are enabled in the Advanced tab of the client properties. This will add a SnapProtect Operations tab to subclients to configure snap operations. File System idataagent provides protection for OS data. Application idataagent provides application integration to perform application consistent snapshots for databases. CommVault VSS Provider used to properly quiesce Microsoft applications for application consistent snapshots. Proxy Server Agent Requirements A proxy server can be used to backup snapshots and as an off host proxy to mount snapshots. The use of a proxy server eliminates load on the host server for snap mining, mounting, and backup operations. The proxy server requires the following agents: OS must be same as host For a mount or backup operation to be performed the snap must be mounted on the proxy. In order for the proxy to recognize the file system, the same OS must be used on the proxy. File System idataagent A file system agent is required for backup operations. When a snapshot is backed up it is treated like a file system backup job. Media Agent Used for array access, mounting snaps on the proxy and data movement from array to CommVault protected storage.

9 SnapProtect Technology - 9 The following diagram illustrates a host server and proxy server architecture for creating, managing and protecting hardware snapshots. Snapshots are conducted by the hardware and managed by the hosting server using the SnapProtect feature. The snapshots can then be mounted and backed up using a proxy server.

10 SnapProtect Technology - 10 SnapProtect Storage Policies Storage policy configurations for snapshots are made by adding a Primary Snap copy. When this is done a snapshot enabled storage policy will have two primary copies, a Primary Snap and Primary Classic. The primary snap copy is used to manage retention for hardware snapshots. The primary classic is used to manage backup copies of snapshot data or other subclient data associated with the storage policy. The following diagram illustrates a snap architecture with a storage policy using a primary snap copy to manage snapshots and a primary classic to manage CommVault protected data. Multi-Purpose Storage Policies A storage policy managing snapshots can also be used to manage regular protected data. All snapshots are managed based on the Primary Snap Copy and all regular protected data is managed by the Primary Classic Copy. This is important to note since data backed up through traditional agents and data backed up from snapshots can all be managed by the primary copy and additional secondary copies. Consolidating data in this way can be a major advantage when considering deduplication and data consolidation to tape media through secondary copies.

11 SnapProtect Technology - 11 Snapshot Retention Just like traditional protection methods, storage policies are used to manage the retention of snapshots. There are three methods retention can be configured for snapshot data: Retain snaps by the number of jobs Days retention Cycles retention Storage policy snap copy allows retention to be set by the number of snaps to retain in addition to standard days and cycles criteria. It is important to note that although snap operations can be scheduled as full, incremental or differential a snapshot will always be the same. The indexing data that CommVault stores for each snapshot will then be used when backup operations of the snapshots are conducted. Retain Snaps by Number of Jobs This feature allows the retention to be based on the number of snap jobs that are conducted. The number of snapshots that can be retained will be based on the incremental block change rate and the amount of snap cache space available. Days Retention The days retention rule will determine how many days of snapshots will be retained. Careful planning should be done before configuring the number of days for snap retention to ensure there is adequate disk cache space. This factor will be determined by the number of snaps performed and the incremental block change rates. Performing hourly snapshots with a high incremental change rate and a two day retention may require more cache space then performing daily snapshots with low change rates and a seven day retention.

12 Cycles Retention SnapProtect Technology - 12 Cycles can also be used to manage snapshots. When using this option it is important to ensure backup copies are properly running to protect all full and incremental jobs. When using cycles to define snapshot retention, the basic retention rules of cycles will apply just as if a backup operation was conducted. This means that if the cycles criteria is set to two then a third full snapshot needs to run before the first full snap and any incremental or differential snaps will be released from the disk. Retention Dependencies If a backup copy operation is enabled for snapshot data the source snapshot will not be deleted until the backup copy successfully completes regardless of the retention settings for the snap copy. If backup copies are going to be conducted, ensure backup copy jobs are properly scheduled or snapshots will not be released. SnapProtect Operations Once the SnapProtect options are configured, snap operations are conducted by scheduling the subclient for protection jobs. The frequency of the schedule will determine when snapshots are conducted which defines recovery points for snapshot data. Backup Types Since backups are scheduled through the regular scheduler the backup options will be the same as a normal backup. It is important to note that full, incremental, or differential snapshots do not affect what is actually snapped since a snapshot just records changed block information. The significance of setting different backup methods is when the snapped data is backed up to CommVault protected storage. If a full snap was conducted then a backup operation will protect all objects snapped. If it was an incremental then the backup copy will perform an incremental. It is also important to note that though various types of snapshots can be conducted, specific snaps can be selected to be copied. For example: Incremental snapshots can be performed every 2 hours and a full snap can be performed at 10 PM. The backup copy can be designated to select just the full snapshot to be copied to protected storage. Running Backup Copies Before backup copies can be run, the storage policy must be enabled for backup copies. This is done by enabling the backup copy in the Snapshot tab of the snap enabled storage policy s properties. Once the backup copies are enabled and configured, there are two ways backup copies can be run. Advanced Backup Options When scheduling the subclient to backup select the Create Backup Copy Immediately in the Advanced Options of the job schedule. Depending on the selection criteria entered for the backup copy in the storage policy properties; as soon as the snapshot is complete the backup copy will run immediately. It is important to note that if the backup copy option is not configured in the snap enabled storage policy, enabling the Create Backup Copy Immediately will have no effect.

13 SnapProtect Technology - 13 Run Backup Copy Backup copies can be scheduled to run by right clicking on the storage policy and selecting All Tasks and Run Backup Copy. Based on the backup copy selection criteria the job will run backing up the appropriate snap at the scheduled time. The following diagram illustrates multiple snapshots being conducted throughout the data to provide short Recovery Point Objectives (RPO). The snapshots can be backed up immediately after the snap has been conducted or based on a backup copy schedule. Selection Rules Snapshots can be run periodically throughout the day to provide frequent recovery points for shorter Recovery Point Objectives (RPOs). It is not necessary to backup all snapshots that are conducted. Where a quick recovery RPO may be defined for two hours, a nightly backup may just require a 24 hour RPO. In the Snapshot tab in the storage policy, backup selection rules can be defined. If snapshots were conducted every two hours and you just wanted to take the last snapshot for the day and back it up, you can select Daily Fulls and select Last Full Backup. The backup copy would use the last full point in time snap as the source and perform a full backup of the volume. It is important to note that by default, All Backups are selected when enabling the backup copy. This means that ALL snapshots will be backed up to protected storage.

14 SnapProtect Technology - 14 The following illustration shows snapshots occurring every two hours. The backup copy will take the last snapshot of the day which occurs at 8 PM. Managing Snapshots There are several methods for working with snapshots. Depending on the type of data being managed, each one of these management methods will have their uses. This section is intended to explain the concepts for working with snapshots. For detailed step-by-step instructions refer to CommVault online documentation. Mounting Snapshots can be mounted and presented back to the host server or to a proxy server. For offline mounts the snapshots can manually be browsed for data contained within the snap. When mounting the snap you select a destination client and path. It is required that the client is properly zoned to see the storage. Once the snap is no longer needed it should be dismounted. It is important to note that when a snapshot is dismounted all changes made to the snap will be lost. Reverting There are two different methods for reverting snapshots, application aware and non-application aware. An application aware revert works by browsing for data using the proper idataagent. For example if you want to restore a SQL database, select the appropriate client, SQL idataagent and right click on the backup set and select Browse Backup Data. Select the proper date and time to browse in the Browse Data Before section to ensure the proper snap is browsed. Select the data to be restored and depending on the data type, various application specific options can be configured to restore data in the proper state. A non-application aware revert is performed by right clicking on the idataagent, selecting All Tasks, and then List Snaps. This will provide a list of snapshots available. Select the snap to be reverted. This method is only recommended for file data or for application data that was offline at the time the snap occurred. For application data it is important that the hosting application be in the proper state prior to the revert process or data corruption can occur.

15 SnapProtect Technology - 15 It is important to note that a snapshot revert will result in all data snapped at the specific point in time being reverted. If there were multiple databases or virtual machines on the volume, a revert operation will bring back ALL databases or virtual machines to the snap point. Carefully consider revert operations and any negative consequences prior to committing the snap back to the production host. Browsing Backup Copies When browsing for backup copies of snapshots it is important to understand the copy precedence defined for the storage policy. By default the copy precedence order for a snap enabled storage policy will be as follows: 1. Primary Snap Copy. 2. Primary (Classic) Copy. 3. Additional copies listed in precedence order by creation order. This means that by default a browse operation will browse the snap copy. If you want to browse the backup copy you can select the Browse from copy precedence in the Advanced tab of the browse options. To browse the primary (classic) copy set the precedence order to 2. You can also configure the precedence order for storage policy copies in the Copy Precedence tab of the storage policy properties. Modifying the precedence order here will specify the default order in which browse operations will occur. Live Browse Browsing the primary snap copy is referred to as a Live Browse. This feature is used to directly browse and recover objects from a snapshot. Live browse does not actually require the snapshot to be indexed as normal backup jobs do. Instead the snap is mounted and presented to the Simpana administrator through the normal browse operations. They will be able to browse the live snapshot and recover items. Once the browse operation is complete the snap will be dismounted. Browsing a snapshot is done by defining the appropriate precedence order. The default precedence order is to browse the primary snap copy first.

16 SnapProtect Technology - 16 NetApp Data Fabric Manager NetApp Data Fabric Manager (DFM) is a complete high availability and disaster recovery solution which implements snapshot and mirroring capabilities in an easy to manage solution. Simpana software can seamlessly integrate with NetApp DFM. This integration allows for a simplified and complete solution for data protection to meet SLAs for mission critical data. NetApp DFM implements snapshots using a Write Optimized approach by writing blocks on the Write Anywhere File Layout (WAFL) file system and managing block pointers for point in time snapshots. In addition to traditional snapshots, data can be replicated to mirror or vault volumes for an on-site and off-site disaster recovery and high availability solution. Snap Mirror Copy Snap Mirror is designed for on-site disaster recovery and high availability. A snap mirror copy will mirror all data blocks from a source volume. For disk failure or corruption the mirror copy can be quickly mounted for continuation of business operations for mission critical systems. The source volume and mirror volume will always maintain the same data with the same retention configurations. Snap Vault Copy Snap Vault copies are designed for off-site disaster recovery and customized data management and retention. This method provides the flexibility of defining specific subclients that will be vaulted and define a separate retention for the vault copy. Where mirror copies maintain exact copies of all data from source volume and both copies will always have the same data and retention based on a snap point, vault copies have greater flexibility in granular selection and retention of data.

17 SnapProtect Technology - 17 DFM Storage Policy Configuration Typically when using snap enabled storage policies, one snap copy can be created. When using the NetApp Data Fabric Manager integration, additional mirror and vault snap copies can be created. The primary snap copy is used to manage snapshots and mirror or vault copies can be created to manage additional copies on NetApp appliances. This integration can be used to provide a complete high availability and disaster recovery solution for on and off-site protection. The following diagram illustrates a DFM enabled storage policy with a primary snap copy, a mirror copy and a vault copy.

18 SnapProtect Technology - 18 Creating a Mirror / Vault Copy To create a Mirror or Vault Copy select the DFM enabled storage policy then All Tasks and Create New Snapshot Copy. In the General tab the Protection Type can be set to Vault/Backup or Mirror. Storage policies enabled for NetApp Data Fabric Manager allow Snap Vault and Snap Mirror copies to be created. For any snapshot copy the data path configuration is used to determine the location for holding index data. This is different from regular storage policies where the data path determines where protect data will be stored. With snapshots the destination for snap data is defined at the hardware level. When defining mirror or vault copies the destination location will be defined in the Provisioning tab. Snap Vault Snap Vault copies have two additional configuration options, subclient selection and custom retention rules. These are configured just like an ordinary secondary copy using the Subclient Association tab and the Retention tab. This provides simple management for vault copies since the vault policy copy will be configured just like an ordinary secondary copy. When a storage policy is enabled as a vault copy the Retention and Associations tab will be enabled. This will allow you to specify which subclient data will be managed by the vault copy and how long it will be retained for.

19 SnapProtect Technology - 19 A Snap Vault copy will have the Retention and Associations tab available to determine what subclient data will be snapped to the vault copy and how long it will be retained for. Specifying Source for Mirror or Vault Copy Another key advantage of using DFM is the ability to specify the source for the mirror or vault copy. This provides a great deal of flexibility in meeting on-site and off-site protection requirements. The SnapProtect feature can be configured to conduct snapshots periodically on a production filer. An on-site Filer can be configured as a mirror for high availability. This filer will mirror data from the production filer. A vault copy can be created to provide off-site DR. The source for the vault copy can be the mirror copy. By using the mirror copy as the source for the vault copy, data processing will be eliminated from the production filer when the vault copy is created. When specifying the source copy a mirror copy can have a source of another mirror, a vault, or the snapshot. The vault copy can only specify a source of a mirror or the snapshot copy. A vault cannot specify another vault at the source.

20 SnapProtect Technology - 20 A DFM enabled storage policy with a primary snap, mirror and vault copy. The source of the mirror copy will be the primary snap and the source of the vault copy will be the mirror copy.

21 Provisioning Policies SnapProtect Technology - 21 A Snap Mirror or Snap Vault copy can be created to manage additional copies of snap data. The Provisioning tab within the snap copy policy is used to determine which NetApp Provisioning Policy will be used and which Resource Pools will be used for the snap copies. The Provisioning tab is used to determine which NetApp Provisioning Policy and which Resource Pool will be used to manage the Snap Mirror or Snap vault copy.

22 SnapProtect Technology - 22 Running Snap Mirror & Vault Copies Since Mirror and Vault copies are added as additional copies within a storage policy, the scheduling mechanism to execute the copies is done through the auxiliary copy scheduler. You can set the auxiliary copy to run immediately, scheduled, through a script or automatically. The automatic copy option is useful if you frequently run snapshots throughout the day and you want the mirror or vault copy to run as soon as possible. The automatic copy has a check interval that is set to 30 minutes by default. The automatic process will run based on the defined interval and check if any source data needs to be copied to the mirror or vault copy. Using the automatic copy option with a short time interval it will keep the vault or mirror copies up to date and minimize the amount of change blocks that are required to be copied each time the job runs. Backup Copies with DFM Using NetApp DFM multiple mirror and vault copies can be created. These copies can be used as the source for backup copies. This is done in the Copy Policy tab of the storage policy copy properties. Use the Source Copy drop down box to select the source of the backup copy. This feature can be used to backup snapshots from mirror or vault copies eliminating the production storage location as the source which can provide better backup performance without impacting production operations. The Copy Policy tab can be used to specify the Source Copy for a backup operation. This is configured just like an ordinary storage policy source copy but in this case the source is a snap copy.

23 SnapProtect Technology - 23 A production filer is being snapped. One mirror copy and one vault copy is also being used. Any of these copies can be used as the source for the backup copy. Alternate Proxy Sources for Backup Copies By default the primary proxy defined in the subclient will be used as the source Media Agent for creating backup copies. If a second proxy server is in closer proximity to the source snap for the backup copy an alternate proxy can be used to copy data to protected storage. This is done by setting the Use Separate Proxy for Snap to Tape option in the subclient SnapProtect tab.

24 SnapProtect Technology - 24 A primary proxy is used to manage snapshots on the production NetApp filer. If data is being mirrored or vaulted to another filer, the Use Separate Proxy for Snap to Tape option can be used if a Media Agent proxy is in closer proximity to the snap source. A primary NetApp filer is mirrored to another filer at a main datacenter. A vault copy is configured to snap mission critical data to an offsite DR facility. A Media Agent at the DR facility can use the vault copy as the source to create backup copies for longer term DR and data preservation. In the storage policy copy the vault copy will be selected as the snap source. In the subclient properties the second proxy will be selected as the Media Agent to copy data to protected storage.

25 SnapProtect Technology - 25 Protecting a VMware SnapProtect technology can integrate with the Simpana Virtual Server Agent to provide hardware and software integration for conducting, managing and backing up virtual machines in a VMware environment. In large virtual environments this integration can provide greater scalability by using hardware snapshots instead of normal VMware software snapshots. SnapProtect & VSA Snap Process The SnapProtect feature requires several components to operate. A VSA agent will be installed on a physical or virtual Windows host. This will be used to communicate with VMware and protect VM snapshots to CommVault protected storage. An ESX proxy server will also be required to mount the snapped virtual machines for the VSA proxy to create backup copies. For most hardware vendors supported by SnapProtect technology the VSA can be installed on a virtual machine running on the ESX proxy server. This VM can also have a Media Agent installed. For the SnapProtect and VSA protection to function properly the process will work using the following workflow: 1. VSA communicates with VMware to initiate software snap process. 2. VMware will quiesce specified virtual machines. 3. The SnapProtect feature initiates a hardware snapshot of the data store. 4. Once the snapshot is complete VSA communicates back to VMware to unquiesce the virtual machines. 5. Virtual machines, which are still quiesced are registered with the ESX proxy server. 6. VSA initiates a backup and indexing option on the virtual machines.

26 The following diagram illustrates the snap and backup process for a VMware environment. SnapProtect Technology - 26 Configuring VSA and SnapProtect Options Before implementing SnapProtect and VSA there are some important issues that should be considered. The first issue is that hardware snapshots will be performed at the data store level. Proper organization of virtual machines in data stores should be designed into the virtual infrastructure. When configuring the VSA agent, subclients should be created for each data store and virtual machine discovery should be set by data store affinity. In the backup set of the VMware instance when the SnapProtect feature will be used, VM discovery can be set to data store affinity. Subclients can then be defined to protect specific data stores.

27 SnapProtect Technology - 27 It is recommended to use Data Store Affinity for rule based discovery when using SnapProtect technology with VMware VSA since the entire store will be snapped and mounted on the ESX proxy when backup operations are conducted. Once the backup set is defined to Data Store Affinity each subclient can be configured to protect specific data stores. This is configured in the Auto Discover tab of the subclient. Different subclients can be configured to snap different data stores. It is important to note that if a subclient defines virtual machines from multiple data stores, all data stores will be snapped when the subclient is backed up. This can result in poor backup performance and disk contention on the production data stores.

28 SnapProtect Technology - 28 The following diagram illustrates a VMware environment with three data stores. Each store is defined in a separate subclient. Another issue is determining which virtual machines should be snapped with the SnapProtect feature. Though higher scalability is a primary reason for using the SnapProtect option for VM protection, equally important is high availability for mission critical virtual machines. By using SnapProtect to manage snapshots, you can use the hardware snaps to restore mission critical machines providing for faster RTOs. You can also conduct periodic snaps throughout the day to lower RPO. For lower priority VMs using the SnapProtect feature may not be the best fit. In this case, using standard VSA software snapshots can be used. In this situation grouping virtual machines into different data stores and not snapping specific stores can provide better scalability. Backing up Virtual Machines When a snapshot is conducted all virtual machines on the data store will be snapped. When using the VSA agent to backup the VMs, specific contents can be defined. It is important to note here that there is a difference in the snap process and backup process. Though there may be 25 virtual machines in the data store, only 10 of them may need to be backed up. The snap process will provide short term retention and fast recovery. The backup process will provide longer term protection and copy options for off-site disaster recovery.

29 SnapProtect Technology - 29 A data store with eight virtual machines is being snapped. Two of the VMs are DNS servers, two are AD servers, and four are file servers. You only need to backup the file servers, the other servers are being snapped for quick recovery purposes. In the Auto Discover tab of the subclient you specify the appropriate data store. In the Contents tab you specify the four file servers for backup operations.

30 Optimizing Backup Performance SnapProtect Technology - 30 When VMware virtual machines are backed up from snapshots, the data store will be mounted on the ESX proxy and the VMs will be registered with VMware. Each virtual machine will be backed up as a single stream. Multiple VMs can be backed up concurrently by increasing the Data Readers option in the General tab of the subclient properties. To optimize performance it is recommended to run multiple subclients simultaneously. Each subclient should be configured with the data readers set between three and five depending on network and disk performance. This method will distribute the backup load between the data stores while minimizing the I/O load on individual data stores. The following diagram shows three data stores, each defined as a separate subclient. The subclients are configured to backup using three data readers each. This allows for nine VMs to be backed up concurrently while distributing the load across multiple data stores. It is important to note that although the backup process is being conducted off host, the snapped data store is still referencing blocks that are on production disks. This could create a bottleneck in backup performance and may affect production operations. By scheduling multiple subclients, each defined to a separate data store, and limiting the number of concurrent VMs being backed up, the disk I/O load is distributed across data stores.

31 SnapProtect Technology - 31 Protecting Virtualized Applications As more applications are moved into the virtual environment, providing adequate protection for application data is becoming a major challenge. Large mission critical databases typically require short Service Level Agreements (SLAs) and traditional backup and recovery methods fall far short of meeting Recovery Time Objective (RTO) and Recovery Point Objective (RPO) requirements. By implementing hardware based snapshot protection and application awareness, mission critical SLAs and data integrity requirements can be met. Protection Applications Using Application idataagents For the most part using application idataagents to protect databases on virtualized servers is the preferred protection method. This provides all the application awareness and application specific configuration options the idataagents provide. This process for implementing this solution is the same as protecting applications on physical servers and will be covered later in this chapter. Using Scripts to Quiesce Applications Another method to protect virtualized application servers is to use scripts to quiesce application data prior to the snapshot process. This method will require careful planning and communication with application administrators to ensure the process works properly. Scripts can be created and placed on each virtual machine. You can use the Pre/Post Process tab to insert scripts Pre-snap and Post-Snap. In this case you can generate a PreSnap process script which will call local scripts on each virtual machine in the data store defined by the subclient. The scripts will be used to quiesce application data within each virtual machine. You can use a PostSnap process script to unquiesce the applications once the snap process completes. PreSnap and PostSnap scripts can be inserted in the subclient Pre/Post Process tab to use scripts to quiesce data prior to backup operations.

32 SnapProtect Technology - 32 This method for protecting application data will require the databases to be in an offline mode for the entire duration of the snap process. This method is useful for applications in which CommVault does not provide application idataagents for. For applications that the CommVault software supports it is recommended to use the application idataagents. Application Consistent Snapshots for Exchange and SQL A normal VM backup using the VSA agent will be protected in a crash consistent state. This works well for file server VMs, but should not be used for virtualized application servers. Traditionally, agents would be installed in the machines or the databases would be quiesced using scripts and regular backups would be used. For Microsoft Exchange and SQL, application consistent backups can be performed using the SnapProtect feature and the VSA agent. To protect SQL and Exchange, a VSS provider will be used to communicate between the VSA and the application to quiesce the databases. In this case, the application is then aware that a snapshot is being performed. VSS will be initiated and the application will be placed in redo log mode. Once the snap is complete the database is unquiesced and for Exchange log files can be truncated. The VM is then registered with the ESX proxy where it can be backed up in an application consistent state. It is important to note that though this is a good solution for small to medium sized databases; it is not recommended for databases larger than 500 GB. It is also not recommended to perform VM backups for applications during periods where high disk I/O is occurring. If the VSS and the snap process fails all data in the VSS cache will be lost.

33 SnapProtect Technology - 33 The following diagram illustrates the snap and backup process for Microsoft SQL and Exchange providing application consistent protection.

34 Application Data on Raw Device Mapping SnapProtect Technology - 34 When the VSA agent protects VMware virtual machines it can perform disk, volume, or file level snapshots of VMDK files. It will not protect any volumes using RDM. This can be used as an advantage when designing solutions for protecting large databases. A VSA agent will be used to snap and backup the virtual disks as VMDK files but will skip RDM volumes. An application agent can then be installed in the VM and subclients can be configured to use the SnapProtect feature for the RDM volumes. The application idataagent will provide communication with the application to provide consistent snaps of application databases. Protecting Applications on Physical Servers A key advantage of Simpana SnapProtect is application aware snapshots. This is performed by installing an application agent on the host systems and configuring subclients to use the SnapProtect feature. When a protection operation is conducted, the application agent will communicate with the application to quiesce required databases. SnapProtect technology will coordinate the hardware snapshot. Using these two components allow for application aware snapshots and provides short RTO by providing quick snap revert operations and a short RPO by using snapshots to create frequent recovery points. The following diagram illustrates the snap process for application databases. Databases can be snapped, reverted, mounted and backed up.

35 SnapProtect Technology - 35 Data Mining Through SnapProtect application awareness and Simpana idataagents, database mining for granular objects is possible for Exchange and SharePoint. This process allows an application database to be snapped and mounted on a proxy host to mine objects eliminating the load on the production server. This is done by snapping the database using SnapProtect technology, the database idataagent, and the granular protection agent for the application. The SnapProtect feature initiates the snapshot process and then mounts the database on a proxy server. The granular agent installed on the proxy then mines the database and backs up individual objects for granular browse and recovery operations. In the following diagram, mailbox level backups are required for an Exchange server. A snapshot of the database is conducted and mounted on an off host proxy server. The proxy server, using the Exchange Mailbox idataagent will mine mailboxes and back them up to CommVault protected storage. The configuration for database mining is set in the subclient of the granular backup agent. It would be configured the same way as a regular agent. This means specific contents can be defined and other contents excluded. In the Contents tab the option Perform backup using mining off snapshot can be used to specify the database client and the proxy to be used.

36 SnapProtect Technology - 36 Subclient configuration for Exchange Mailbox idataagent: Subclient configuration for SharePoint Document level idataagent:

37 SnapProtect Technology - 37 Using SnapProtect & Continuous Data Replicator SnapProtect technology can be used together with the Simpana Continuous Data Replicator (CDR) feature to provide asynchronous replication and point-in-time snapshots of production data. This protection method can be used when hardware arrays are not yet supported with the SnapProtect feature or to replicate data to hardware supported by the SnapProtect feature. Continuous Data replicator provides asynchronous replication and point-intime snapshots which can be integrated with file system or application agents. Once the initial replication of data is complete only changed blocks will be replicated when operations run. Point-in-Time Snapshots To use CDR with the SnapProtect feature, CDR must be installed on the host and target server. Subclients are configured to define data requiring snapshot protection. SnapProtect settings are configured to use Data Replicator as the snap engine. When backups are scheduled to run for the subclient the data will be snapped and copied to a replication folder on the target disk library defined in the storage policy. The snapshots can then be mounted and browsed through Windows Explorer, or data can be browsed and recovered through the CommCell console. This implementation strategy provides a simple method to use the SnapProtect feature without dedicated hardware. Continuous Replication & Snapshots CDR can also be configured to replicate data to a target location where snapshots can be conducted to provide snap recovery points. A replication pair is configured to replicate source data to the target server. On the target server CDR and a file system idataagent will be installed. A subclient is used for the replication target location and the SnapProtect feature is enabled for the subclient using Data Replicator as the snap engine. Once the initial replication is complete, asynchronous replication will be used to replicate block changes from the host to the target. SnapProtect operations will be used to create point-in-time snapshots of the target location. The snapshots can be mounted or browsed for database mining or restores.

38 SnapProtect Technology - 38 The following diagram illustrates using CDR to replicate and snap a production database to a proxy host. The proxy host can then backup the database to protected storage. This method can also be used with a fan-in approach where multiple source locations can use CDR to replicate data to a single target location. Each source will use a separate target folder on the destination and different subclients can be set for each folder. This will allow for different snap scheduling based on RPO requirements. CDR / Hardware Snap Hybrid Protection A powerful and versatile solution is using CDR to replicate application data on unsupported hardware to hardware supported by the SnapProtect feature. This method can be used in many different ways to ensure high availability and proper protection requirements are met. This provides a cost effective method to protect mission critical data without having to upgrade or modify your production environment.

39 SnapProtect Technology - 39 In the following diagram, several mission critical servers with direct attached storage require snapshot protection for high availability. CDR and the SnapProtect feature will be used to replicate application data and create point in time snaps to a supported hardware array. A proxy server managing the array is used to manage and backup the snapshots. The snaps can also be mounted from the array back to the production host application to meet high availability requirements.

Chapter 10 Protecting Virtual Environments

Chapter 10 Protecting Virtual Environments Chapter 10 Protecting Virtual Environments 164 - Protecting Virtual Environments As more datacenters move to virtualize their environments and the number of virtual machines and the physical hosts they

More information

Chapter 9 Protecting Client Data

Chapter 9 Protecting Client Data Chapter 9 Protecting Client Data 152 - Protecting Client Data A client is defined as any production source requiring protection. A server with any Simpana idataagent installed in it is considered a client

More information

Chapter 2 CommVault Data Management Concepts

Chapter 2 CommVault Data Management Concepts Chapter 2 CommVault Data Management Concepts 10 - CommVault Data Management Concepts The Simpana product suite offers a wide range of features and options to provide great flexibility in configuring and

More information

Chapter 4 Data Movement Process

Chapter 4 Data Movement Process Chapter 4 Data Movement Process 46 - Data Movement Process Understanding how CommVault software moves data within the production and protected environment is essential to understanding how to configure

More information

Chapter 3 `How a Storage Policy Works

Chapter 3 `How a Storage Policy Works Chapter 3 `How a Storage Policy Works 32 - How a Storage Policy Works A Storage Policy defines the lifecycle management rules for all protected data. In its most basic form, a storage policy can be thought

More information

Dell Compellent Storage Center with CommVault Simpana 9.0. Best Practices

Dell Compellent Storage Center with CommVault Simpana 9.0. Best Practices Dell Compellent Storage Center with CommVault Simpana 9.0 Best Practices Document revision Date Revision Comments 1/30/2012 A Initial Draft THIS BEST PRACTICES GUIDE IS FOR INFORMATIONAL PURPOSES ONLY,

More information

Chapter 1. Storage Concepts. CommVault Concepts & Design Strategies: https://www.createspace.com/

Chapter 1. Storage Concepts. CommVault Concepts & Design Strategies: https://www.createspace.com/ Chapter 1 Storage Concepts 4 - Storage Concepts In order to understand CommVault concepts regarding storage management we need to understand how and why we protect data, traditional backup methods, and

More information

Administration GUIDE. Virtual Server idataagent (VMware) Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 225

Administration GUIDE. Virtual Server idataagent (VMware) Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 225 Administration GUIDE Virtual Server idataagent (VMware) Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 225 User Guide - Virtual Server idataagent (VMware) Table of Contents System Requirements

More information

Administration GUIDE. IntelliSnap Virtual Server idataagent for VMware. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 277

Administration GUIDE. IntelliSnap Virtual Server idataagent for VMware. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 277 Administration GUIDE IntelliSnap Virtual Server idataagent for VMware Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 277 IntelliSnap User Guide - Virtual Server idataagent for VMware Table of Contents

More information

Chapter 7. GridStor Technology. Adding Data Paths. Data Paths for Global Deduplication. Data Path Properties

Chapter 7. GridStor Technology. Adding Data Paths. Data Paths for Global Deduplication. Data Path Properties Chapter 7 GridStor Technology GridStor technology provides the ability to configure multiple data paths to storage within a storage policy copy. Having multiple data paths enables the administrator to

More information

Virtual Server Agent v9 with VMware. June 2011

Virtual Server Agent v9 with VMware. June 2011 Virtual Server Agent v9 with VMware June 2011 Contents Summary... 3 Backup Transport Methods... 3 Deployment Scenarios... 3 VSA Installation Requirements... 4 VSA Patch Requirements... 4 VDDK Installation...

More information

Backup and Recovery Best Practices with Tintri VMstore and Commvault Simpana Software

Backup and Recovery Best Practices with Tintri VMstore and Commvault Simpana Software TECHNICAL WHITE PAPER Backup and Recovery Best Practices with Tintri VMstore and Commvault Simpana Software Author: Dominic Cheah (TME) August 2015 www.tintri.com Contents Intended Audience... 3 Introduction...

More information

CommVault Simpana 9 Virtual Server - Lab Validation

CommVault Simpana 9 Virtual Server - Lab Validation January 2012 CommVault Simpana 9 Virtual Server - Lab Validation Russ Fellows Evaluator Group Table of Contents Executive Summary... 1 Data Protection Challenges... 2 Overview of Evaluation... 2 Test Objectives...

More information

User Guide - Exchange Database idataagent

User Guide - Exchange Database idataagent Page 1 of 208 User Guide - Exchange Database idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Customized Features for Your Exchange Version Terminology SYSTEM REQUIREMENTS

More information

Virtual Server Agent for VMware VMware VADP Virtualization Architecture

Virtual Server Agent for VMware VMware VADP Virtualization Architecture Virtual Server Agent for VMware VMware VADP Virtualization Architecture Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 18 VMware VADP Virtualization Architecture - Virtual Server Agent for VMware

More information

Chapter 16 Content Based Planning Methodology

Chapter 16 Content Based Planning Methodology Chapter 16 Content Based Planning Methodology 322 - Content Based Planning Methodology This chapter will focus on a content based design approach for business data that takes into account disaster recovery,

More information

Backup and Recovery Best Practices With Tintri VMstore

Backup and Recovery Best Practices With Tintri VMstore Backup and Recovery Best Practices With Tintri VMstore Backup and Recovery Best Practices with Tintri VMstore TECHNICAL BEST PRACTICES PAPER, Revision 1.0, April 10, 2014 Contents Contents Introduction

More information

VMWARE VIRTUAL MACHINE PROTECTION DELL POWERVAULT DL 2100 POWERED BY SYMANTEC

VMWARE VIRTUAL MACHINE PROTECTION DELL POWERVAULT DL 2100 POWERED BY SYMANTEC VMWARE VIRTUAL MACHINE PROTECTION DELL POWERVAULT DL 2100 POWERED BY SYMANTEC The PowerVault DL2100 Powered by Symantec Backup Exec offers the industry s only fully integrated backup-to-disk solution with

More information

Enhanced Protection and Manageability of Virtual Servers Scalable Options for VMware Server and ESX Server

Enhanced Protection and Manageability of Virtual Servers Scalable Options for VMware Server and ESX Server PARTNER SOLUTION BRIEF Enhanced Protection and Manageability of Virtual Servers Scalable Options for VMware Server and ESX Server Companies relying on the benefits of virtualized environments to reduce

More information

Quick Start Guide - Exchange Database idataagent

Quick Start Guide - Exchange Database idataagent Page 1 of 90 Quick Start Guide - Exchange Database idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Customized Features for Your Exchange Version Terminology SYSTEM REQUIREMENTS

More information

Features - Microsoft Data Protection Manager

Features - Microsoft Data Protection Manager Page 1 of 36 Features - Microsoft Data Protection Manager TABLE OF CONTENTS OVERVIEW NEW FEATURES SYSTEM REQUIREMENTS SUPPORTED FEATURES GETTING STARTED - DATA PROTECTION MANAGER DEPLOYMENT GETTING STARTED

More information

Understanding Virtual System Data Protection

Understanding Virtual System Data Protection Understanding Virtual System Data Protection Server virtualization is the most important new technology introduced in the data center in the past decade. It has changed the way we think about computing

More information

BrightStor ARCserve Backup for Windows

BrightStor ARCserve Backup for Windows BrightStor ARCserve Backup for Windows Volume Shadow Copy Service Guide r11.5 D01191-2E This documentation and related computer software program (hereinafter referred to as the "Documentation") is for

More information

VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014

VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Additional Features and Benefits of

More information

Administration GUIDE. OnePass Agent for Exchange Mailbox. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 177

Administration GUIDE. OnePass Agent for Exchange Mailbox. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 177 Administration GUIDE OnePass Agent for Exchange Mailbox Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 177 User Guide - One Pass Agent for Exchange Mailbox Table of Contents Overview Introduction

More information

User Guide - Exchange Mailbox Archiver Agent

User Guide - Exchange Mailbox Archiver Agent Page 1 of 245 User Guide - Exchange Mailbox Archiver Agent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Terminology SYSTEM REQUIREMENTS - EXCHANGE MAILBOX ARCHIVER AGENT DEPLOYMENT

More information

Chapter 15 Technical Planning Methodology

Chapter 15 Technical Planning Methodology Chapter 15 Technical Planning Methodology 294 - Technical Planning Methodology This chapter will focus on a straight forward methodology for implementing storage policies. This approach will allow you

More information

SnapProtect Backups for VMware vsphere

SnapProtect Backups for VMware vsphere Technical Report SnapProtect Backups for VMware vsphere Best Practices Guide Subhash Athri, NetApp September 2015 TR-4456 TABLE OF CONTENTS 1 Introduction... 4 1.1 Objective...4 1.2 Audience...4 2 SnapProtect

More information

Mehmet.Gonullu@Veeam.com Veeam Portfolio - Agentless backup and replication for VMware and Hyper-V - Scalable, powerful, easy-to-use, affordable - Storage agnostic High-speed Recovery instant VM recovery

More information

Quick Start - Virtual Server idataagent (Microsoft/Hyper-V)

Quick Start - Virtual Server idataagent (Microsoft/Hyper-V) Page 1 of 19 Quick Start - Virtual Server idataagent (Microsoft/Hyper-V) TABLE OF CONTENTS OVERVIEW Introduction Key Features Complete Virtual Machine Protection Granular Recovery of Virtual Machine Data

More information

Symantec Backup Exec Blueprints

Symantec Backup Exec Blueprints Symantec Backup Exec Blueprints Blueprint for Large Installations Backup Exec Technical Services Backup & Recovery Technical Education Services Symantec Backup Exec Blueprints 1 Symantec Backup Exec Blueprints

More information

CommVault Galaxy Data Protection 7.0 for Microsoft Exchange Systems

CommVault Galaxy Data Protection 7.0 for Microsoft Exchange Systems BACKUP & RECOVERY ARCHIVE REPLICATION RESOURCE MANAGEMENT SEARCH CommVault Galaxy Data Protection 7.0 for Microsoft Exchange Systems Reliable Data Protection for Exchange Systems and their Environments

More information

Executive Summary SOLE SOURCE JUSTIFICATION. Microsoft Integration

Executive Summary SOLE SOURCE JUSTIFICATION. Microsoft Integration Executive Summary Commvault Simpana software delivers the unparalleled advantages and benefits of a truly holistic approach to data management. It is one product that contains individually licensable modules

More information

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

PASS4TEST. IT Certification Guaranteed, The Easy Way!   We offer free update service for one year PASS4TEST \ http://www.pass4test.com We offer free update service for one year Exam : E20-329 Title : Technology Architect Backup and Recovery Solutions Design Exam Vendor : EMC Version : DEMO Get Latest

More information

SnapProtect Live Browse with Granular Recovery on VMware. May 2017 SL10336 Version 1.1.0

SnapProtect Live Browse with Granular Recovery on VMware. May 2017 SL10336 Version 1.1.0 SnapProtect Live Browse with Granular Recovery on VMware May 2017 SL10336 Version 1.1.0 1 Introduction This lab will guide you through some of the typical SnapProtect v11 operations (also known as CommVault

More information

Server Fault Protection with NetApp Data ONTAP Edge-T

Server Fault Protection with NetApp Data ONTAP Edge-T Technical Report Server Fault Protection with NetApp Data ONTAP Edge-T Jeff Whitaker, NetApp March 2013 TR-4154 TABLE OF CONTENTS 1 Introduction... 3 2 Backup and Disaster Recovery Technology... 4 2.1

More information

VMWARE PROTECTION WITH DELL EMC NETWORKER 9

VMWARE PROTECTION WITH DELL EMC NETWORKER 9 VMWARE PROTECTION WITH DELL EMC NETWORKER 9 Solution Overview ABSTRACT This white paper describes the integration of Dell EMC NetWorker with VMware vcenter. It also includes details on the NetWorker architecture

More information

Protecting Miscrosoft Hyper-V Environments

Protecting Miscrosoft Hyper-V Environments Protecting Miscrosoft Hyper-V Environments Who should read this paper Technical White Papers are designed to introduce Veritas partners and end users to key technologies and technical concepts that are

More information

Administration Guide - NetApp File Archiver

Administration Guide - NetApp File Archiver Page 1 of 100 Administration Guide - NetApp File Archiver TABLE OF CONTENTS OVERVIEW Introduction Key Features Terminology SYSTEM REQUIREMENTS DEPLOYMENT Installation Method 1: Interactive Install Method

More information

Protect 500 VMs in 17 Minutes. A reference architecture for VMware Data Protection using CommVault Simpana IntelliSnap and IBM XIV Storage Arrays

Protect 500 VMs in 17 Minutes. A reference architecture for VMware Data Protection using CommVault Simpana IntelliSnap and IBM XIV Storage Arrays Protect 500 VMs in 17 Minutes A reference architecture for VMware Data Protection using CommVault Simpana IntelliSnap and IBM XIV Storage Arrays Contents Data Management in the Virtual Data Center... 3

More information

Cloudian HyperStore Backup Deployment and Performance Tuning Guide for Commvault

Cloudian HyperStore Backup Deployment and Performance Tuning Guide for Commvault Cloudian HyperStore Backup Deployment and Performance Tuning Guide for Commvault Table of Contents BACKGROUND INFORMATION... 3 CLOUDIAN HYPERSTORE AND COMMVAULT BENEFITS... 3 EXECUTIVE SUMMARY... 3 INTRODUCTION...

More information

Protecting Hyper-V Environments

Protecting Hyper-V Environments TECHNICAL WHITE PAPER: BACKUP EXEC TM 2014 PROTECTING HYPER-V ENVIRONMENTS Backup Exec TM 2014 Technical White Paper Protecting Hyper-V Environments Technical White Papers are designed to introduce Symantec

More information

Dell PowerVault DL2100 Powered by CommVault

Dell PowerVault DL2100 Powered by CommVault Dell PowerVault DL2100 Powered by CommVault A Dell White Paper CENTRALIZED DATA MANAGEMENT FOR REMOTE AND BRANCH OFFICE (ROBO) ENVIRONMENTS CONTENTS EXECUTIVE SUMMARY 3 RETURN ON INVESTMENT OF CENTRALIZING

More information

Using Computer Associates BrightStor ARCserve Backup with Microsoft Data Protection Manager

Using Computer Associates BrightStor ARCserve Backup with Microsoft Data Protection Manager White Paper Using Computer Associates BrightStor ARCserve Backup with Microsoft Data Protection Manager Author(s): Computer Associates International and Microsoft Corporation Published September 2005 Abstract

More information

Converged Virtual Infrastructure

Converged Virtual Infrastructure Converged Virtual Infrastructure Integrated VMware Data Management with EqualLogic and CommVault Simpana Software Jeff Junker Shwethan Shetty Zahid Ilkal Contents Integrated and Scalable Data Protection

More information

SnapManager 7.2 for Microsoft Exchange Server Administration Guide

SnapManager 7.2 for Microsoft Exchange Server Administration Guide SnapManager 7.2 for Microsoft Exchange Server Administration Guide June 2017 215-10626_B0 doccomments@netapp.com Table of Contents 3 Contents Product overview... 8 Backing up and verifying your databases...

More information

6/4/2018 Request for Proposal. Upgrade and Consolidation Storage Backup Network Shares Virtual Infrastructure Disaster Recovery

6/4/2018 Request for Proposal. Upgrade and Consolidation Storage Backup Network Shares Virtual Infrastructure Disaster Recovery 6/4/2018 Request for Proposal Upgrade and Consolidation Storage Backup Network Shares Virtual Infrastructure Disaster Recovery Network Infrastructure Services - Server Team DC WATER & SEWER AUTHORITY (DC

More information

Veritas Storage Foundation for Windows by Symantec

Veritas Storage Foundation for Windows by Symantec Veritas Storage Foundation for Windows by Symantec Advanced online storage management Data Sheet: Storage Management Overview Veritas Storage Foundation 6.0 for Windows brings advanced online storage management

More information

Best practices for protecting Virtualization, SDDC, Cloud, and the Modern Data Center, with NetBackup

Best practices for protecting Virtualization, SDDC, Cloud, and the Modern Data Center, with NetBackup Best practices for protecting Virtualization, SDDC, Cloud, and the Modern Data Center, with NetBackup Alain Pelegrin EMEA NetBackup Solutions Lead TSS IM Technology Practice Olivier Ribouchon Presales

More information

EMC RecoverPoint. EMC RecoverPoint Support

EMC RecoverPoint. EMC RecoverPoint Support Support, page 1 Adding an Account, page 2 RecoverPoint Appliance Clusters, page 3 Replication Through Consistency Groups, page 4 Group Sets, page 22 System Tasks, page 24 Support protects storage array

More information

Remove complexity in protecting your virtual infrastructure with. IBM Spectrum Protect Plus. Data availability made easy. Overview

Remove complexity in protecting your virtual infrastructure with. IBM Spectrum Protect Plus. Data availability made easy. Overview Overview Challenge In your organization, backup management is too complex and consumes too much time and too many IT resources. Solution IBM Spectrum Protect Plus dramatically simplifies data protection

More information

vsphere Replication 6.5 Technical Overview January 08, 2018

vsphere Replication 6.5 Technical Overview January 08, 2018 vsphere Replication 6.5 Technical Overview January 08, 2018 1 Table of Contents 1. VMware vsphere Replication 6.5 1.1.Introduction 1.2.Architecture Overview 1.3.Initial Deployment and Configuration 1.4.Replication

More information

ZYNSTRA TECHNICAL BRIEFING NOTE

ZYNSTRA TECHNICAL BRIEFING NOTE ZYNSTRA TECHNICAL BRIEFING NOTE Backup What is Backup? Backup is a service that forms an integral part of each Cloud Managed Server. Its purpose is to regularly store an additional copy of your data and

More information

Simplify Backups. Dell PowerVault DL2000 Family

Simplify Backups. Dell PowerVault DL2000 Family Simplify Backups Dell PowerVault DL2000 Family SIMPLIFYING I T The Dell PowerVault DL2000 family helps reduce the cost and complexity of backups and restores, freeing up valuable resources that you can

More information

Boost your data protection with NetApp + Veeam. Schahin Golshani Technical Partner Enablement Manager, MENA

Boost your data protection with NetApp + Veeam. Schahin Golshani Technical Partner Enablement Manager, MENA Boost your data protection with NetApp + Veeam Schahin Golshani Technical Partner Enablement Manager, MENA NetApp Product Strategy Market-leading innovations, that are NetApp Confidential Limited Use 3

More information

QUICK START GUIDE Active Directory idataagent

QUICK START GUIDE Active Directory idataagent QUICK START GUIDE Active Directory idataagent Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 39 Quick Start Guide - Active Directory idataagent TABLE OF CONTENTS OVERVIEW SYSTEM REQUIREMENTS SUPPORTED

More information

Managing Native Snapshots

Managing Native Snapshots HX Data Platform Native Snapshots Overview, page 1 Benefits of HX Data Platform Native Snapshots, page 2 Native Snapshot Considerations, page 3 Native Snapshot Best Practices, page 4 Understanding SENTINEL

More information

Backup Solution. User Guide. Issue 01 Date

Backup Solution. User Guide. Issue 01 Date Issue 01 Date 2017-08-30 Contents Contents 1 Introduction... 1 1.1 What Is the Backup Solution?... 1 1.2 Why Choose the Backup Solution?... 2 1.3 Concepts and Principles...3 1.3.1 Basic OBS Concepts...3

More information

Data Management at Cloud Scale CommVault Simpana v10. VMware Partner Exchange Session SPO2308 February 2013

Data Management at Cloud Scale CommVault Simpana v10. VMware Partner Exchange Session SPO2308 February 2013 Data Management at Cloud Scale CommVault Simpana v10 VMware Partner Exchange Session SPO2308 February 2013 Agenda Breakout Session: Wednesday, Feb 27, 11:00 AM - 12:00 PM Data Management at Cloud Scale

More information

Configuration Guide for Veeam Backup & Replication with the HPE Hyper Converged 250 System

Configuration Guide for Veeam Backup & Replication with the HPE Hyper Converged 250 System Configuration Guide for Veeam Backup & Replication with the HPE Hyper Converged 250 System 1 + 1 = 3 HPE + Veeam Better Together Contents Intended audience...3 Veeam Backup & Replication overview...3 Adding

More information

Commvault Snapshot Management Technology: Capabilities and Benefits

Commvault Snapshot Management Technology: Capabilities and Benefits Commvault Snapshot Management Technology: Capabilities and Benefits Enterprises today increasingly turn to array-based snapshots and replication to augment or replace legacy data protection solutions.

More information

Replication is the process of creating an

Replication is the process of creating an Chapter 13 Local tion tion is the process of creating an exact copy of data. Creating one or more replicas of the production data is one of the ways to provide Business Continuity (BC). These replicas

More information

Tintri Cloud Connector

Tintri Cloud Connector TECHNICAL WHITE PAPER Tintri Cloud Connector Technology Primer & Deployment Guide www.tintri.com Revision History Version Date Description Author 1.0 12/15/2017 Initial Release Bill Roth Table 1 - Revision

More information

VMware Backup and Replication using Vembu VMBackup

VMware Backup and Replication using Vembu VMBackup VMware Backup and Replication using Vembu VEMBU TECHNOLOGIES PARTNERS Vembu Technologies Founded in 2002 10+ Years of Experience Headquartered in Chennai 100+ Countries 4000+ Partners 2 60000+ Businesses

More information

VMware Mirage Getting Started Guide

VMware Mirage Getting Started Guide Mirage 5.8 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

Archive 7.0 for File Systems and NAS

Archive 7.0 for File Systems and NAS DATA PROTECTION ARCHIVE REPLICATION RESOURCE MANAGEMENT SEARCH Archive 7.0 for File Systems and NAS Optimize Storage Resources, Automate Data Management and Improve Operational Efficiencies Key u Expand

More information

What's Different in Backup Exec 2012

What's Different in Backup Exec 2012 What's Different in Backup Exec 2012 What's different in Backup Exec 2012 This document includes the following topics: Changes to the user interface for Backup Exec 2012 Changes to terminology for Backup

More information

LiveVault. Agent Guide

LiveVault. Agent Guide LiveVault Software Version: 7.82 Agent Guide Note The guide primarily provides instruction on how to install the LiveVault agent on Windows and Linux servers. Additionally it provides information about

More information

Quick Start Guide TABLE OF CONTENTS COMMCELL ARCHITECTURE OVERVIEW COMMCELL SOFTWARE DEPLOYMENT INSTALL THE COMMSERVE SOFTWARE

Quick Start Guide TABLE OF CONTENTS COMMCELL ARCHITECTURE OVERVIEW COMMCELL SOFTWARE DEPLOYMENT INSTALL THE COMMSERVE SOFTWARE Page 1 of 35 Quick Start Guide TABLE OF CONTENTS This Quick Start Guide is designed to help you install and use a CommCell configuration to which you can later add other components. COMMCELL ARCHITECTURE

More information

Technology Insight Series

Technology Insight Series EMC Avamar for NAS - Accelerating NDMP Backup Performance John Webster June, 2011 Technology Insight Series Evaluator Group Copyright 2011 Evaluator Group, Inc. All rights reserved. Page 1 of 7 Introduction/Executive

More information

Dell PowerVault DL Backup-to-Disk Appliance Powered by CommVault

Dell PowerVault DL Backup-to-Disk Appliance Powered by CommVault Dell PowerVault DL Backup-to-Disk Appliance Powered by CommVault Remote Office Backup Strategy CommVault DL Team Dell CommVault delltechcenter.com commvault.com/dell THIS WHITE PAPER IS FOR INFORMATIONAL

More information

Symantec Backup Exec 10d for Windows Servers AGENTS & OPTIONS MEDIA SERVER OPTIONS KEY BENEFITS AGENT AND OPTION GROUPS DATASHEET

Symantec Backup Exec 10d for Windows Servers AGENTS & OPTIONS MEDIA SERVER OPTIONS KEY BENEFITS AGENT AND OPTION GROUPS DATASHEET DATASHEET Symantec Backup Exec 10d for Windows Servers AGENTS & OPTIONS Designed for disk, Symantec Backup Exec TM 10d for Windows Servers is the Gold Standard in Windows data protection. It provides comprehensive,

More information

VCS-276.exam. Number: VCS-276 Passing Score: 800 Time Limit: 120 min File Version: VCS-276

VCS-276.exam. Number: VCS-276 Passing Score: 800 Time Limit: 120 min File Version: VCS-276 VCS-276.exam Number: VCS-276 Passing Score: 800 Time Limit: 120 min File Version: 1.0 VCS-276 Administration of Veritas NetBackup 8.0 Version 1.0 Exam A QUESTION 1 A NetBackup policy is configured to back

More information

Vembu Technologies. Experience. Headquartered in Chennai Countries

Vembu Technologies. Experience. Headquartered in Chennai Countries Vembu extends Vembu v4.0 Vembu BDRsupport Suite - to Standard edition Vembu Technologies Experience 100+ Countries 2 Headquartered in Chennai Vembu BDR Suite Vembu BDR Suite is a portfolio of products

More information

Glossary of Terms Used in Actifio Products

Glossary of Terms Used in Actifio Products Glossary of s Used in Actifio Products A B C D E F G H I-K L M N-O P-Q R S T U V W-Y Z A Actifio CDS Actifio Connector Actifio Desktop Actifio Global Manager Actifio Sky for AWS Actifio Sky AGM App or

More information

Arcserve Solutions for Amazon Web Services (AWS)

Arcserve Solutions for Amazon Web Services (AWS) Arcserve Solutions for Amazon Web Services (AWS) Introduction The public cloud has become a major factor in all IT decision making due to its endless supply of technical resources at an affordable cost.

More information

File Protection. Whitepaper

File Protection. Whitepaper Whitepaper Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Modes of operation... 2 Single-instance store... 3 Advantages of... 3 2. Backup considerations... 4 Exchange VM support... 4 Restore

More information

XtremIO Business Continuity & Disaster Recovery. Aharon Blitzer & Marco Abela XtremIO Product Management

XtremIO Business Continuity & Disaster Recovery. Aharon Blitzer & Marco Abela XtremIO Product Management XtremIO Business Continuity & Disaster Recovery Aharon Blitzer & Marco Abela XtremIO Product Management Agenda XtremIO Current BC/DR Offerings New BC/DR Offering Benefits of New Offering Technical Overview

More information

Redefining Microsoft Exchange Management

Redefining Microsoft Exchange Management Redefining Microsoft Exchange Management Contact Actifio Support As an Actifio customer, you can get support for all Actifio products through the Support Portal at http://support.actifio.com/. Copyright,

More information

Protecting VMware vsphere/esx Environments with CA ARCserve

Protecting VMware vsphere/esx Environments with CA ARCserve Solution Brief: CA ARCserve R16.5 Complexity ate my budget Protecting VMware vsphere/esx Environments with CA ARCserve Customer Challenges Today, you face demanding service level agreements (SLAs) while

More information

Data Protection for Virtualized Environments

Data Protection for Virtualized Environments Technology Insight Paper Data Protection for Virtualized Environments IBM Spectrum Protect Plus Delivers a Modern Approach By Steve Scully, Sr. Analyst February 2018 Modern Data Protection for Virtualized

More information

Business Continuity and Disaster Recovery. Ed Crowley Ch 12

Business Continuity and Disaster Recovery. Ed Crowley Ch 12 Business Continuity and Disaster Recovery Ed Crowley Ch 12 Topics Disaster Recovery Business Impact Analysis MTBF and MTTR RTO and RPO Redundancy Failover Backup Sites Load Balancing Mirror Sites Disaster

More information

Vembu v4.0 Vembu ImageBackup

Vembu v4.0 Vembu ImageBackup Vembu extends to Vembu v4.0 Vembusupport ImageBackup Vembu Technologies Experience 100+ Countries 2 Headquartered in Chennai Vembu BDR Suite Vembu BDR Suite is a portfolio of products designed to backup

More information

Asigra Cloud Backup Provides Comprehensive Virtual Machine Data Protection Including Replication

Asigra Cloud Backup Provides Comprehensive Virtual Machine Data Protection Including Replication Datasheet Asigra Cloud Backup Provides Comprehensive Virtual Machine Data Protection Including Replication Virtual Machines (VMs) have become a staple of the modern enterprise data center, but as the usage

More information

Commvault and Vormetric SQL Server Protection

Commvault and Vormetric SQL Server Protection Commvault and Vormetric SQL Server Protection P R E P A R E D B Y E S P A U S T I N S M I T H, T I E R II E N T E R P R I S E S U P P O R T T E A M A U G U S T 2 9, 2 0 1 7 Contents Version History...

More information

User Guide. Version 2.1

User Guide. Version 2.1 Kaseya Backup and Disaster Recovery User Guide Version 2.1 August 11, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT

More information

Veritas NetBackup for Microsoft Exchange Server Administrator s Guide

Veritas NetBackup for Microsoft Exchange Server Administrator s Guide Veritas NetBackup for Microsoft Exchange Server Administrator s Guide for Windows Release 8.1.1 Veritas NetBackup for Microsoft Exchange Server Administrator s Guide Last updated: 2018-02-16 Document version:netbackup

More information

Data Protection Guide

Data Protection Guide SnapCenter Software 2.0 Data Protection Guide For Windows File Systems January 2017 215-11356_A0 doccomments@netapp.com Table of Contents 3 Contents Deciding whether to read this information... 5 SnapCenter

More information

The Actifio Glossary A B C D E F G H I-K L M N-O P-Q R S T U V W-Z

The Actifio Glossary A B C D E F G H I-K L M N-O P-Q R S T U V W-Z The Actifio Glossary A B C D E F G H I-K L M N-O P-Q R S T U V W-Z A Actifio CDS Actifio Connector Actifio Desktop Actifio Global Manager Actifio Sky for AWS Actifio Sky AGM App or Application Appliance

More information

VMware Backup and Replication Enterprise Edition

VMware Backup and Replication Enterprise Edition VMware Backup and Replication Enterprise Edition TECHNOLOGY PARTNERS Vembu Technologies 10+ Years of Experience 100+ Countries 2 Headquartered in Chennai Vembu BDR Suite Vembu BDR suite is an one stop

More information

File Protection Whitepaper

File Protection Whitepaper Whitepaper Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Modes of operation... 2 Single-instance store... 3 Advantages of over traditional file copy methods... 3 2. Backup considerations...

More information

A CommVault White Paper: Business Continuity: Architecture Design Guide

A CommVault White Paper: Business Continuity: Architecture Design Guide A CommVault White Paper: Business Continuity: Architecture Design Guide CommVault Corporate Headquarters 2 Crescent Place Oceanport, New Jersey 07757-0900 USA Telephone: 888.746.3849 or 732.870.4000 2007

More information

StorageCraft OneXafe and Veeam 9.5

StorageCraft OneXafe and Veeam 9.5 TECHNICAL DEPLOYMENT GUIDE NOV 2018 StorageCraft OneXafe and Veeam 9.5 Expert Deployment Guide Overview StorageCraft, with its scale-out storage solution OneXafe, compliments Veeam to create a differentiated

More information

IBM Spectrum Protect Version Introduction to Data Protection Solutions IBM

IBM Spectrum Protect Version Introduction to Data Protection Solutions IBM IBM Spectrum Protect Version 8.1.2 Introduction to Data Protection Solutions IBM IBM Spectrum Protect Version 8.1.2 Introduction to Data Protection Solutions IBM Note: Before you use this information

More information

Enabling Fast Recovery of Your Virtual Environments: NetBackup, Backup Exec & VCS for VMware

Enabling Fast Recovery of Your Virtual Environments: NetBackup, Backup Exec & VCS for VMware Enabling Fast Recovery of Your Environments: NetBackup, Backup Exec & VCS for VMware Agenda 1 Symantec and ization 2 NetBackup 6.5 for VMWare 3 Backup Exec & Backup Exec System Recovery for VMWare 4 Veritas

More information

Data Protection at Cloud Scale. A reference architecture for VMware Data Protection using CommVault Simpana IntelliSnap and Dell Compellent Storage

Data Protection at Cloud Scale. A reference architecture for VMware Data Protection using CommVault Simpana IntelliSnap and Dell Compellent Storage Data Protection at Cloud Scale A reference architecture for VMware Data Protection using CommVault Simpana IntelliSnap and Dell Compellent Storage Contents Introduction... 4 Environment... 4 Scenarios...

More information

Agent for VMware. Version

Agent for VMware. Version Agent for VMware Version 6.91.3631 Release Notes, March 7, 2012 CONTENTS 1 OVERVIEW... 3 1.1 Release History... 3 1.2 Supported Platforms... 3 2 FEATURES... 4 2.1 Features and Benefits... 4 3 INSTALLATION

More information

Using Commvault CommCell to Back Up Data in Telefonica Open Cloud. Issue 06. Date 2018/3/16

Using Commvault CommCell to Back Up Data in Telefonica Open Cloud. Issue 06. Date 2018/3/16 Using Commvault CommCell to Back Up Data in Telefonica Open Cloud Issue 06 Date 2018/3/16 Using Commvault Commcell to Back Up Data in Telefonica Contents Contents 1 Overview... 1 1.1 CommCell Environment

More information

Quick Start - BlueArc File Archiver

Quick Start - BlueArc File Archiver Page 1 of 20 Quick Start - BlueArc File Archiver TABLE OF CONTENTS OVERVIEW Introduction Key Features Terminology SYSTEM REQUIREMENTS DEPLOYMENT Installation Method 1: Interactive Install Method 2: Install

More information

Vembu ImageBackup. Microsoft Windows Servers Desktops Laptops VEMBU TECHNOLOGIES PARTNERS.

Vembu ImageBackup. Microsoft Windows Servers Desktops Laptops VEMBU TECHNOLOGIES PARTNERS. Vembu Microsoft Windows Servers Desktops Laptops VEMBU TECHNOLOGIES PARTNERS Vembu Technologies Founded in 2002 10+ Years of Experience Headquartered in Chennai 100+ Countries 4000+ Partners 2 60000+ Businesses

More information