Application and Database Protection in a VMware vsphere Environment

Similar documents
Application and Database Protection in a VMware vsphere Environment

Netcool/Impact Version Release Notes GI

A Quick Look at IBM SmartCloud Monitoring. Author: Larry McWilliams, IBM Tivoli Integration of Competency Document Version 1, Update:

IBM License Metric Tool Enablement Guide

IBM Maximo Calibration Version 7 Release 5. Installation Guide

Tivoli Access Manager for Enterprise Single Sign-On

IBM Operations Analytics - Log Analysis: Network Manager Insight Pack Version 1 Release 4.1 GI IBM

Platform LSF Version 9 Release 1.1. Migrating on Windows SC

Migrating Classifications with Migration Manager

IBM. Networking INETD. IBM i. Version 7.2

CONFIGURING SSO FOR FILENET P8 DOCUMENTS

IBM Operational Decision Manager Version 8 Release 5. Configuring Operational Decision Manager on Java SE

Getting Started with InfoSphere Streams Quick Start Edition (VMware)

Platform LSF Version 9 Release 1.3. Migrating on Windows SC

Using application properties in IBM Cúram Social Program Management JUnit tests

iscsi Configuration Manager Version 2.0

Installing Watson Content Analytics 3.5 Fix Pack 1 on WebSphere Application Server Network Deployment 8.5.5

IBM Maximo for Service Providers Version 7 Release 6. Installation Guide

Determining dependencies in Cúram data

IBM Endpoint Manager Version 9.1. Patch Management for Ubuntu User's Guide

IBM emessage Version 8.x and higher. Account Startup Overview

Tivoli Storage Manager for Virtual Environments: Data Protection for VMware Solution Design Considerations IBM Redbooks Solution Guide

Build integration overview: Rational Team Concert and IBM UrbanCode Deploy

IBM Kenexa LCMS Premier on Cloud. Release Notes. Version 9.3

Best practices. Starting and stopping IBM Platform Symphony Developer Edition on a two-host Microsoft Windows cluster. IBM Platform Symphony

IBM Maximo Spatial Asset Management Version 7 Release 6. Installation Guide IBM

IBM Storage Management Pack for Microsoft System Center Operations Manager (SCOM) Version Release Notes

IBM Tivoli Monitoring for Databases. Release Notes. Version SC

IBM XIV Provider for Microsoft Windows Volume Shadow Copy Service. Version 2.3.x. Installation Guide. Publication: GC (August 2011)

Proposal for a Tivoli Storage Manager Client system migration from Solaris with VxFS to Linux with GPFS or AIX with GPFS or JFS2

IBM Spectrum LSF Process Manager Version 10 Release 1. Release Notes IBM GI

IBM Maximo for Aviation MRO Version 7 Release 6. Installation Guide IBM

IBM Operational Decision Manager. Version Sample deployment for Operational Decision Manager for z/os artifact migration

IBM Cloud Orchestrator. Content Pack for IBM Endpoint Manager for Software Distribution IBM

Installing and Configuring Tivoli Monitoring for Maximo

IBM Security QRadar Version Forwarding Logs Using Tail2Syslog Technical Note

IBM. IBM i2 Enterprise Insight Analysis Understanding the Deployment Patterns. Version 2 Release 1 BA

IBM Content Analytics with Enterprise Search Version 3.0. Expanding queries and influencing how documents are ranked in the results

IBM Copy Services Manager Version 6 Release 1. Release Notes August 2016 IBM

Tivoli Endpoint Manager for Patch Management - AIX. User s Guide

IBM Security QRadar Version Customizing the Right-Click Menu Technical Note

IBM Storage Driver for OpenStack Version Release Notes

Release Notes. IBM Tivoli Identity Manager Rational ClearQuest Adapter for TDI 7.0. Version First Edition (January 15, 2011)

Version 9 Release 0. IBM i2 Analyst's Notebook Premium Configuration IBM

IBM Maximo Spatial Asset Management Version 7 Release 5. Installation Guide

IBM Storage Device Driver for VMware VAAI. Installation Guide. Version 1.1.0

Version 2 Release 1. IBM i2 Enterprise Insight Analysis Understanding the Deployment Patterns IBM BA

Patch Management for Solaris

IBM LoadLeveler Version 5 Release 1. Documentation Update: IBM LoadLeveler Version 5 Release 1 IBM

IBM Cognos Dynamic Query Analyzer Version Installation and Configuration Guide IBM

Version 9 Release 0. IBM i2 Analyst's Notebook Configuration IBM

IBM OpenPages GRC Platform - Version Interim Fix 1. Interim Fix ReadMe

Limitations and Workarounds Supplement

Tivoli Access Manager for Enterprise Single Sign-On

IBM Tivoli Netcool/Impact 7.1 Sizing and Tuning Guide

Best practices. Reducing concurrent SIM connection requests to SSM for Windows IBM Platform Symphony

IBM Geographically Dispersed Resiliency for Power Systems. Version Release Notes IBM

IBM License Metric Tool Version Readme File for: IBM License Metric Tool, Fix Pack TIV-LMT-FP0001

Tivoli Access Manager for Enterprise Single Sign-On

Integrated use of IBM WebSphere Adapter for Siebel and SAP with WPS Relationship Service. Quick Start Scenarios

IBM Extended Command-Line Interface (XCLI) Utility Version 5.2. Release Notes IBM

Networking Bootstrap Protocol

Best practices. Linux system tuning for heavilyloaded. IBM Platform Symphony

IBM. Avoiding Inventory Synchronization Issues With UBA Technical Note

IBM i2 ibridge 8 for Oracle

IBM Storage Management Pack for Microsoft System Center Operations Manager (SCOM) Version Release Notes IBM

Implementing Enhanced LDAP Security

Integrating IBM Rational Build Forge with IBM Rational ClearCase and IBM Rational ClearQuest

IBM OpenPages GRC Platform Version 7.0 FP2. Enhancements

IBM Cloud Object Storage System Version Time Synchronization Configuration Guide IBM DSNCFG_ K

Release Notes. IBM Tivoli Identity Manager Universal Provisioning Adapter. Version First Edition (June 14, 2010)

IBM Tivoli Directory Server Version 5.2 Client Readme

Release Notes. IBM Tivoli Identity Manager Oracle PeopleTools Adapter. Version First Edition (May 29, 2009)

IBM i Version 7.2. Systems management Logical partitions IBM

IBM Watson Explorer Content Analytics Version Upgrading to Version IBM

IBM XIV Host Attachment Kit for HP-UX Version Release Notes

Migrating on UNIX and Linux

Continuous Availability with the IBM DB2 purescale Feature IBM Redbooks Solution Guide

IBM Rational Development and Test Environment for System z Version Release Letter GI

IBM. Release Notes November IBM Copy Services Manager. Version 6 Release 1

IBM. Networking Open Shortest Path First (OSPF) support. IBM i. Version 7.2

IBM WebSphere Sample Adapter for Enterprise Information System Simulator Deployment and Testing on WPS 7.0. Quick Start Scenarios

IBM Netcool/OMNIbus 8.1 Web GUI Event List: sending NodeClickedOn data using Netcool/Impact. Licensed Materials Property of IBM

IBM Storage Driver for OpenStack Version Installation Guide SC

IBM Storage Host Attachment Kit for HP-UX Version Release Notes IBM

IBM License Metric Tool Version 9.0 (includes version 9.0.1, and ) Tuning Performance Guide

IBM Spectrum LSF Version 10 Release 1. Readme IBM

IBM FlashSystem V MTM 9846-AC3, 9848-AC3, 9846-AE2, 9848-AE2, F, F. Quick Start Guide IBM GI

IBM Security QRadar Version 7 Release 3. Community Edition IBM

Limitations and Workarounds Supplement

IBM XIV Host Attachment Kit for HP-UX Version Release Notes

IBM Maximo Calibration Version 7 Release 6. Installation Guide

Tivoli Access Manager for Enterprise Single Sign-On

Version 1.2 Tivoli Integrated Portal 2.2. Tivoli Integrated Portal Customization guide

Performance Tuning Guide

Readme File for Fix Pack 1

Release Notes. IBM Security Identity Manager GroupWise Adapter. Version First Edition (September 13, 2013)

ServeRAID-MR10i SAS/SATA Controller IBM System x at-a-glance guide

IBM Storage Driver for OpenStack Version Release Notes

Installing on Windows

Transcription:

IBM Tivoli Storage Manager Application and Database Protection in a VMware September 5, 2013 1.2 Authors: Jason Basler, Dave Cannon, Jim Smith, Greg Van Hise, Chris Zaremba Page 1 of 13

Note: Before using this information and the product it supports, read the information in the Notices section. Revision History Revision Number Revision Date Summary of Changes 1.0 2/21/13 Initial document based on data as previously documented in tabular format 1.1 7/15/13 Updated recommendations for Microsoft Active Directory based on Windows Server 2012 VM-Generation ID Support in vsphere 1.2 8/5/13 Minor update Changes marked Copyright International Business Machines Corporation 2013. US Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Page 2 of 13

Page 3 of 13

Contents Contents... 4 1. Introduction... 5 1.1 Hybrid Solutions... 5 1.2 Supported Products... 5 2. Microsoft SQL... 6 3. Microsoft Exchange... 7 4. File/Web/Print Server/Workstation (Unstructured Data)... 8 5. Microsoft Active Directory... 9 6. Other Applications and Databases... 10 Page 4 of 13

1. Introduction The purpose of this document is to provide high-level recommendations for using the appropriate IBM Tivoli Storage Manager and IBM Tivoli FlashCopy Manager solutions to protect virtual machines deployed in a VMware vsphere environment. This document focuses specifically on data protection for database and application products which are typically hosted in VMware virtual server environments and gives guidance on choosing between two generic types of data protection: Off-host data protection solutions which feature a backup/recovery agent which can be hosted off of the hypervisor host, specifically Tivoli Storage Manager for Virtual Environments Data Protection for VMware and Tivoli Storage Manager for In-guest data protection solutions which require the deployment of a backup/recovery agent in the guest machine: e.g., Tivoli Storage Manager for Mail Data Protection for Microsoft Exchange or Tivoli Storage Manager for Databases Data Protection for Microsoft SQL There are several considerations which need to be taken into account when choosing the appropriate data protection solution including recovery time objectives (RTO), recovery point objectives (RPO), type of storage (e.g., virtual disks vs. raw device mapping [RDM] disks), storage vendor, data layout, Tivoli Storage Manager server configuration, long-term recovery requirements, etc. While this document does not intend to provide exhaustive details on all of these factors, it is meant as a starting point in evaluating different options available. 1.1 Hybrid Solutions Use of off-host data protection and in-guest data protection techniques are not mutually exclusive. In many cases, especially for faster recovery of an entire virtual machine including the hosted database or application, it may be desirable to use both techniques, specifically by using the in-guest data protection agent to protect the database or application-specific data and off-host data protection the virtual machine s operating system. Consider a Microsoft SQL deployment in a virtual machine which has its database and log data segregated (i.e., on a separate set of virtual disks) from the operating system data. It is possible to configure an in-guest agent (Tivoli Storage Manager for Databases Data Protection for Microsoft SQL) to protect the SQL data and an off-host agent (e.g., Tivoli Storage Manager for Virtual Environments Data Protection for VMware) to protect only the operating system data. Although this document will not go into further detail on how this can be accomplished, keep in mind that such solutions are available whenever in-guest data protection techniques are discussed unless otherwise specifically noted. 1.2 Supported Products This document is intended to be used with the following product versions: - IBM Tivoli Storage Manager for Virtual Environments Data Protection for VMware V6.4 - IBM Tivoli V3.2 Page 5 of 13

2. Microsoft SQL SQL Server deployments that meet all the following conditions: No Clustering use case in-guest data protection off-host data protection Use of an in-guest backup agent is not recommended. VM level backups will Data Protection for VMware or provide sufficient protection. No need for recovery to an arbitrary PIT via transaction logs No need to restore individual DBs or have native SQL backups to virtual disk within the VM SQL Server deployments that meet any of the following conditions: Clustered servers (MSCS or VCS) Always On Availability Groups deployed Recovery to a arbitrary PIT via transaction logs is required Recovery of a single database without disrupting other databases on the same server is required In-guest agent: Data Protection for Microsoft SQL or FlashCopy Manager for Windows Use of an in-guest backup agent is recommended. Off-host data protection for SQL databases is dependent on the recovery mode that has been configured: For SQL databases configured in simple recovery mode, either Data Protection for VMware or is recommended. For SQL databases configured in standard recovery mode, Data Protection for VMware is recommended as it provides the ability to truncate logs after a successful backup operation. FlashCopy Manager are not recommended for these type of SQL deployments and use cases: Page 6 of 13

3. Microsoft Exchange use case in-guest data protection off-host data protection Data Protection for Microsoft Exchange Data Protection for VMware or FlashCopy Manager for Windows Exchange single-instance deployments that meet all the following conditions: No clustering No Database Availability Group (DAG) configurations No special RPO requirements which would necessitate log recovery Exchange deployments for which any of the following conditions exist: If you have deployed FlashCopy Manager for VMware to protect your virtual machine environment, in-guest backups are recommended. Data Protection for Microsoft Exchange or FlashCopy Manager for Windows Clustered servers Database Availability Group (DAG) configurations In-guest backups are recommended RPO requirements which necessitate log recovery In-guest backups provide the following advantages: Data Protection for VMware is recommended for stand-alone instances of Exchange Exchange transaction logs can be configured to be truncated after a successful backup operation IBM Tivoli Storage Manager FastBack for Exchange can be used in conjunction with full VM backups to achieve message level recovery FlashCopy Manager are not recommended for these type of Exchange deployments and use cases: Recovery of individual databases and/or servers can be coordinated with other resources (e.g., for clustered servers or DAG configurations) Recovery to specific point-in-time states based on log recovery can be achieved to satisfy RPO requirements Message level recovery can be achieved through the native inguest agent interfaces Page 7 of 13

4. File/Web/Print Server/Workstation (Unstructured Data) Microsoft Windows and Linux virtual servers (unstructured data) On an exception basis, consider inguest backups of Windows virtual machines hosting file/web servers (unstructured) data for the following use cases. Windows Backup-Archive client or Linux Backup-Archive client Data Protection for VMware or /or are the recommended solutions for Windows virtual machines hosting file/web servers (unstructured data). Deployment of the Windows Backup- Archive client should be considered for virtual machines that have specific backup policies on individual files/directories which cannot be satisfied by off-host backup or when administrators expect to receive a large volume of file-level restore requests. The in-guest backup should be limited to only the files/directories with special policy/management considerations. FlashCopy Manager for Windows or FlashCopy Manager for Linux These solutions provide several advantages versus in-guest backups including: Incremental forever backup provides efficient, block-level backup of virtual machine guests Block-level backups can serve for recovery of entire machine, single disk, or individual files/directories (single-pass backup) No additional management of inguest agent Other operating systems (unstructured data) Deployment of FlashCopy Manager for Windows should be considered for achieving recovery point objectives (RPO) which could not be adequately achieved using off-host backups. Note that FlashCopy Manager for Windows can only be used for RDM disks in physical-compatibility mode or iscsi attached disks. Backup-Archive client Deployment of the Backup-Archive client should be considered for virtual machines that are hosting operating systems other than Windows-based or Linux-based operating systems and there is a requirement for individual file recovery. This would also be recommended for legacy deployments of Windows and Linux that are no longer supported by the Data Protection for VMware Recovery agent, e.g., Windows 2000. Data Protection for VMware or /or are the recommended solutions for Windows virtual machines hosting file/web servers (unstructured data). The advantages of these solutions are the same as those listed above. Page 8 of 13

5. Microsoft Active Directory use case in-guest data protection off-host data protection Windows 2012 Server Windows Backup-Archive client Active Directory - stand-alone domain controller configuration Windows 2012 Server Active Directory - multiple domain controller configuration In-guest backup of Microsoft Active Directory is only recommended if the customer requires object-level recovery of Active Directory objects which is only available in the Backup-Archive client Windows Backup-Archive client In-guest backup of Microsoft Active Directory is only recommended if the customer requires object-level recovery of Active Directory objects which is only available in the Backup-Archive client Data Protection for VMware or /or are the recommended solutions for Active Directory servers deployed on stand-alone domain controllers Data Protection for VMware or /or are the recommended solutions for Active Directory servers deployed on domain controllers Windows 2008 / 2003 Server Active Directory - stand-alone domain controller configuration Windows 2008 / 2003 Server Active Directory - multiple domain controller configuration Windows Backup-Archive client In-guest backup of Microsoft Active Directory is only recommended if the customer requires object-level recovery of Active Directory objects which is only available in the Backup-Archive client Windows Backup-Archive client In-guest backups of Microsoft Active Directory is recommended when protecting Active Directory deployments on multiple domain controllers * Note - requires ESXi 5.0 Update 2 or ESXi 5.1 (or higher) Data Protection for VMware or /or are the recommended solutions for Active Directory servers deployed on stand-alone domain controllers are not recommended for this type of Active Directory deployment: The Windows Backup-Archive will notify all participating domain controllers during a recovery operation so that the Active Directory synchronization mechanism is properly notified. Object-level recovery of Active Directory objects is supported. Page 9 of 13

6. Other Applications and Databases use case in-guest data protection off-host data protection IBM DB2 for Linux, UNIX, and Windows Native DB2 Tivoli Storage Manager Agent or FlashCopy Manager for DB2 (support pending) are not recommended for protecting DB2. IBM Lotus Domino Microsoft SharePoint Oracle Database In-guest backups are recommended Data Protection for Lotus Domino In-guest backups are recommended. AvePoint DocAve In-guest backups are recommended. are not recommended for protecting Lotus Domino. are not recommended for protecting Microsoft SharePoint Data Protection for Oracle or are not FlashCopy Manager for Oracle (support recommended for protecting Oracle pending) Database applications. In-guest backups are recommended. SAP ERP Data Protection for SAP or FlashCopy Manager for Oracle (with SAP Environments) (support pending) or FlashCopy Manager for DB2 (support pending) are not recommended for protecting SAP applications. In-guest backups are recommended. Page 10 of 13

Notices This information was developed for products and services offered in the U.S.A. IBM may not offer the products, services, or features discussed in this document in other countries. Consult your local IBM representative for information on the products and services currently available in your area. Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM product, program, or service may be used. Any functionally equivalent product, program, or service that does not infringe any IBM intellectual property right may be used instead. However, it is the user's responsibility to evaluate and verify the operation of any non-ibm product, program, or service. IBM may have patents or pending patent applications covering subject matter described in this document. The furnishing of this document does not give you any license to these patents. You can send license inquiries, in writing, to: IBM Director of Licensing IBM Corporation North Castle Drive Armonk, NY 10504-1785 U.S.A. For license inquiries regarding double-byte (DBCS) information, contact the IBM Intellectual Property Department in your country or send inquiries, in writing, to: Intellectual Property Licensing Legal and Intellectual Property Law IBM Japan, Ltd. 1623-14, Shimotsuruma, Yamato-shi Kanagawa 242-8502 Japan The following paragraph does not apply to the United Kingdom or any other country where such provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement might not apply to you. This information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice. Any references in this information to non-ibm websites are provided for convenience only and do not in any manner serve as an endorsement of those websites. The materials at those websites are not part of the materials for this IBM product and use of those websites is at your own risk. IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation to you. Licensees of this program who wish to have information about it for the purpose of enabling: (i) the exchange of information between independently created programs and other programs (including this one) and (ii) the mutual use of the information which has been exchanged, should contact: Page 11 of 13

IBM Corporation 2Z4A/101 11400 Burnet Road Austin, TX 78758 U.S.A. Such information may be available, subject to appropriate terms and conditions, including in some cases payment of a fee. The licensed program described in this document and all licensed material available for it are provided by IBM under terms of the IBM Customer Agreement, IBM International Program License Agreement or any equivalent agreement between us. Any performance data contained herein was determined in a controlled environment. Therefore, the results obtained in other operating environments may vary significantly. Some measurements may have been made on development-level systems and there is no guarantee that these measurements will be the same on generally available systems. Furthermore, some measurement may have been estimated through extrapolation. Actual results may vary. Users of this document should verify the applicable data for their specific environment. Information concerning non-ibm products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products and cannot confirm the accuracy of performance, compatibility or any other claims related to non-ibm products. Questions on the capabilities of non-ibm products should be addressed to the suppliers of those products. All statements regarding IBM's future direction or intent are subject to change or withdrawal without notice, and represent goals and objectives only. This information is for planning purposes only. The information herein is subject to change before the products described become available. This information contains examples of data and reports used in daily business operations. To illustrate them as completely as possible, the examples include the names of individuals, companies, brands, and products. All of these names are fictitious and any similarity to the names and addresses used by an actual business enterprise is entirely coincidental. COPYRIGHT LICENSE: This information contains sample application programs in source language, which illustrate programming techniques on various operating platforms. You may copy, modify, and distribute these sample programs in any form without payment to IBM, for the purposes of developing, using, marketing or distributing application programs conforming to the application programming interface for the operating platform for which the sample programs are written. These examples have not been thoroughly tested under all conditions. IBM, therefore, cannot guarantee or imply reliability, serviceability, or function of these programs. You may copy, modify, and distribute these sample programs in any form without payment to IBM for the purposes of developing, using, marketing, or distributing application programs conforming to IBM s application programming interfaces. Each copy or any portion of these sample programs or any derivative work must include a copyright notice as follows: (your company name) (year). Portions of this code are derived from IBM Corp. Sample Programs. Copyright IBM Corp. _enter the year or years_. All rights reserved. If you are viewing this information in softcopy form, the photographs and color illustrations might not be displayed. Page 12 of 13

Trademarks IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at Copyright and trademark information at www.ibm.com/legal/copytrade.shtml. Java and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its affiliates. Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other countries, or both. Page 13 of 13