WAN Optimized Replication of Backup Datasets Using Stream-Informed Delta Compression

Similar documents
Delta Compressed and Deduplicated Storage Using Stream-Informed Locality

Deduplication Storage System

MIGRATORY COMPRESSION Coarse-grained Data Reordering to Improve Compressibility

The Logic of Physical Garbage Collection in Deduplicating Storage

Reducing Replication Bandwidth for Distributed Document Databases

Deduplication File System & Course Review

Sparse Indexing: Large-Scale, Inline Deduplication Using Sampling and Locality

A DEDUPLICATION-INSPIRED FAST DELTA COMPRESSION APPROACH W EN XIA, HONG JIANG, DA N FENG, LEI T I A N, M I N FU, YUKUN Z HOU

ChunkStash: Speeding Up Storage Deduplication using Flash Memory

Accelerating Restore and Garbage Collection in Deduplication-based Backup Systems via Exploiting Historical Information

Characteristics of Backup Workloads in Production Systems

DEC: An Efficient Deduplication-Enhanced Compression Approach

DELL EMC DATA DOMAIN SISL SCALING ARCHITECTURE

A Survey and Classification of Storage Deduplication Systems

Design Tradeoffs for Data Deduplication Performance in Backup Workloads

EMC DATA DOMAIN OPERATING SYSTEM

Business Benefits of Policy Based Data De-Duplication Data Footprint Reduction with Quality of Service (QoS) for Data Protection

Cost-Efficient Remote Backup Services for Enterprise Clouds

White paper ETERNUS CS800 Data Deduplication Background

EMC DATA DOMAIN PRODUCT OvERvIEW

An Application Awareness Local Source and Global Source De-Duplication with Security in resource constraint based Cloud backup services

DELL EMC DATA DOMAIN EXTENDED RETENTION SOFTWARE

Technology Insight Series

Veeam and HP: Meet your backup data protection goals

Copyright 2010 EMC Corporation. Do not Copy - All Rights Reserved.

Tintri & Veeam VM Backup & Replication Best Practices. John Phillips Strategic Alliances and Technical Marketing Ryan Post Systems Engineer

White Paper Simplified Backup and Reliable Recovery

See what s new: Data Domain Global Deduplication Array, DD Boost and more. Copyright 2010 EMC Corporation. All rights reserved.

DASH COPY GUIDE. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 31

EMC Data Domain for Archiving Are You Kidding?

Protect enterprise data, achieve long-term data retention

Online Version Only. Book made by this file is ILLEGAL. Design and Implementation of Binary File Similarity Evaluation System. 1.

Reducing The De-linearization of Data Placement to Improve Deduplication Performance

RecoverPoint Operations

Speeding Up Cloud/Server Applications Using Flash Memory

Rhinoback Online Backup. In-File Delta

Setting Up the DR Series System on Veeam

StorageCraft OneXafe and Veeam 9.5

The Google File System

Technology Insight Series

Oracle Advanced Compression. An Oracle White Paper June 2007

File Systems Management and Examples

CSE 124: Networked Services Lecture-16

PracticeDump. Free Practice Dumps - Unlimited Free Access of practice exam

dedupv1: Improving Deduplication Throughput using Solid State Drives (SSD)

Chapter 4 Data Movement Process

A study of practical deduplication

Setting Up the Dell DR Series System on Veeam

The World s Fastest Backup Systems

Data Deduplication Methods for Achieving Data Efficiency

Kevin Russell ExaGrid Systems. Platinum sponsors:

Deduplication and Its Application to Corporate Data

Cheetah: An Efficient Flat Addressing Scheme for Fast Query Services in Cloud Computing

COS 318: Operating Systems. NSF, Snapshot, Dedup and Review

Balakrishnan Nair. Senior Technology Consultant Back Up & Recovery Systems South Gulf. Copyright 2011 EMC Corporation. All rights reserved.

IBM Tivoli Storage Manager Version Introduction to Data Protection Solutions IBM

Configuring Short RPO with Actifio StreamSnap and Dedup-Async Replication

EMC RecoverPoint. EMC RecoverPoint Support

StorageCraft OneBlox and Veeam 9.5 Expert Deployment Guide

Scale-out Object Store for PB/hr Backups and Long Term Archive April 24, 2014

Can t We All Get Along? Redesigning Protection Storage for Modern Workloads

VCS-276.exam. Number: VCS-276 Passing Score: 800 Time Limit: 120 min File Version: VCS-276

Case study: Building bi-directional DR. Joep Piscaer, VMware vexpert, VCDX #101

Virtualization Technique For Replica Synchronization

Chapter 3 `How a Storage Policy Works

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

IBM Spectrum Protect Version Introduction to Data Protection Solutions IBM

Scale-out Data Deduplication Architecture

EaSync: A Transparent File Synchronization Service across Multiple Machines

Frequency Based Chunking for Data De-Duplication

VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014

HP Designing and Implementing HP Enterprise Backup Solutions. Download Full Version :

GFS: The Google File System. Dr. Yingwu Zhu

ECE 2300 Digital Logic & Computer Organization. More Caches

Dell DR4100. Disk based Data Protection and Disaster Recovery. April 3, Birger Ferber, Enterprise Technologist Storage EMEA

Construct a High Efficiency VM Disaster Recovery Solution. Best choice for protecting virtual environments

Parallelizing Inline Data Reduction Operations for Primary Storage Systems

Global Headquarters: 5 Speen Street Framingham, MA USA P F

HP StoreOnce: reinventing data deduplication

Backup for VMware ESX Environments with Veritas NetBackup PureDisk from Symantec

Lazy Exact Deduplication

HYDRAstor: a Scalable Secondary Storage

Data Reduction Meets Reality What to Expect From Data Reduction

DELL EMC DATA DOMAIN OPERATING SYSTEM

The 5 Keys to Virtual Backup Excellence

Hyper-converged Secondary Storage for Backup with Deduplication Q & A. The impact of data deduplication on the backup process

WHITE PAPER. DATA DEDUPLICATION BACKGROUND: A Technical White Paper

TransferSoft Launches HyperTransfer for OEMs Most Comprehensive and Efficient Enterprisee Data Transfer Software Suite in the Industry

HEAD HardwarE Accelerated Deduplication

GFS: The Google File System

The Google File System

Setting Up Quest QoreStor with Veeam Backup & Replication. Technical White Paper

Google File System. Arun Sundaram Operating Systems

The Google File System (GFS)

DELL EMC DATA DOMAIN OPERATING SYSTEM

VMware vsphere Data Protection Evaluation Guide REVISED APRIL 2015

TIBX NEXT-GENERATION ARCHIVE FORMAT IN ACRONIS BACKUP CLOUD

The Google File System

Opendedupe & Veritas NetBackup ARCHITECTURE OVERVIEW AND USE CASES

Your World is Hybrid: Protecting your VMs with Veeam and HPE Storage. Federico Venier HPE Storage Technical marketing

Transcription:

WAN Optimized Replication of Backup Datasets Using Stream-Informed Delta Compression Philip Shilane, Mark Huang, Grant Wallace, & Windsor Hsu Backup Recovery Systems Division EMC Corporation

Introduction 80% of our customers replicate most of their data off-site for disaster recovery WAN bandwidth often limits throughput Data reduction techniques increase effective throughput Deduplication and local compression are effective Delta compression with stream-informed caching adds 2X additional compression Remote Office Backup System Central Office Backup System

Example Of Deduplication And Delta Compression Chunk fp Sketches based on Broder [97 & 00]

Example Of Deduplication And Delta Compression Chunk fp sk Maximal Value 1 Maximal Value 2 Maximal Value 3 Maximal Value 4 Sketches based on Broder [97 & 00] super_feature = Rabin_fp(feature 1 feature 4 ) sketch is one or more super_features

Example Of Deduplication And Delta Compression Chunk fp sk Chunk fp (duplicate of earlier chunk) Sketches based on Broder [97 & 00] super_feature = Rabin_fp(feature 1 feature 4 ) sketch is one or more super_features

Example Of Deduplication And Delta Compression Chunk fp sk Chunk fp sk (similar to earlier chunk) Regions of difference Maximal Value 1 Maximal Value 2 Maximal Value 3 Maximal Value 4 Sketches based on Broder [97 & 00] super_feature = Rabin_fp(feature 1 feature 4 ) sketch is one or more super_features

Example Of Deduplication And Delta Compression Chunk fp sk Chunk fp sk (similar to earlier chunk) Regions of difference Transmit fp and differences Sketches based on Broder [97 & 00]

Sketch Index Options Full index (simple idea) Requires IO Difficult to update Finds all similarity matches 256 TB capacity 8 KB chunks 16 byte record 0.5 TB index per super-feature

Sketch Index Options Full index (simple idea) Requires IO Difficult to update Finds all similarity matches Partial index (slightly better?) Load and evict with LRU policy Not persistent Must be as large as full backup 256 TB capacity 8 KB chunks 16 byte record 0.5 TB index per super-feature

Sketch Index Options Partial index would have to hold a full backup 256 to TB be capacity effective 8 KB chunks 16 byte record Full index (simple idea) Requires IO Difficult to update Finds all similarity matches Partial index (slightly better?) Load and evict with LRU policy Not persistent Must be as large as full backup 0.5 TB index per super-feature Stream-informed cache (our contribution) Experimentally demonstrate that delta locality closely matches deduplication locality for backup datasets Updates handled by fingerprint system Little extra memory Finds most similarity matches

Sketch Index Options Full index (simple idea) Requires IO Difficult to update Finds all similarity matches Partial index (slightly better?) Load and evict with LRU policy Not persistent Must be as large as full backup 256 TB capacity 8 KB chunks 16 byte record 0.5 TB index per super-feature Partial index has to be large enough to index entire primary storage system

Sketch Index Options Full index (simple idea) Requires IO Difficult to update Finds all similarity matches Partial index (slightly better?) Load and evict with LRU policy Not persistent Must be as large as full backup 256 TB capacity 8 KB chunks 16 byte record 0.5 TB index per super-feature Partial index has to be large enough to index entire primary storage system Stream-informed cache (our contribution) Experimentally demonstrate that delta locality closely matches deduplication locality for backup datasets Updates handled by fingerprint system Little extra memory Finds most similarity matches

Stream-Informed Locality Similarity search can leverage deduplication locality Sketch cache loaded based on fingerprint cache Fingerprint and Sketch Cache

Stream-Informed Locality Similarity search can leverage deduplication locality Sketch cache loaded based on fingerprint cache Full 1 A B C Fingerprint and Sketch Cache fp A fp B fp C sk A sk B sk C

Stream-Informed Locality Similarity search can leverage deduplication locality Sketch cache loaded based on fingerprint cache Full 1 A B C Fingerprint and Sketch Cache Container 1 fp A fp B fp C sk A sk B sk C

Stream-Informed Locality Similarity search can leverage deduplication locality Sketch cache loaded based on fingerprint cache Full 1 A B C D E F Fingerprint and Sketch Cache Container 1 fp A sk A fp D sk D fp B sk B fp E sk E fp C sk C fp F sk F

Stream-Informed Locality Similarity search can leverage deduplication locality Sketch cache loaded based on fingerprint cache Full 1 A B C D E F Fingerprint and Sketch Cache Container 1 Container 2 fp A sk A fp D sk D fp B sk B fp E sk E fp C sk C fp F sk F

Stream-Informed Locality Similarity search can leverage deduplication locality Sketch cache loaded based on fingerprint cache Full 1 A B C D E F Store containers to disk Fingerprint and Sketch Cache Container 1 Container 2 fp A sk A fp D sk D fp B sk B fp E sk E fp C sk C fp F sk F

Stream-Informed Locality Similarity search can leverage deduplication locality Sketch cache loaded based on fingerprint cache Full 1 Full 2 A A B C D E F Fingerprint and Sketch Cache

Stream-Informed Locality Similarity search can leverage deduplication locality Sketch cache loaded based on fingerprint cache Full 1 Full 2 A A B C D E F Load container from disk Fingerprint and Sketch Cache

Stream-Informed Locality Similarity search can leverage deduplication locality Sketch cache loaded based on fingerprint cache Full 1 A B C D E F Full 2 A Load container from disk Fingerprint and Sketch Cache Container 1 fp A fp B fp C sk A sk B sk C

Stream-Informed Locality Similarity search can leverage deduplication locality Sketch cache loaded based on fingerprint cache Full 1 A B C D E F Full 2 A B C Fingerprint and Sketch Cache Container 1 fp A fp B fp C sk A sk B sk C

Stream-Informed Locality Similarity search can leverage deduplication locality Sketch cache loaded based on fingerprint cache Full 1 A B C D E F Full 2 A B C D Load container from disk Fingerprint and Sketch Cache Container 1 fp A fp B fp C sk A sk B sk C

Stream-Informed Locality Similarity search can leverage deduplication locality Sketch cache loaded based on fingerprint cache Full 1 A B C D E F Full 2 A B C D E F Fingerprint and Sketch Cache Container 1 Container 2 E is similar to previous chunk E and is a sketch match fp A sk A fp D sk D fp B sk B fp E sk E fp C sk C fp F sk F

Replication With Deduplication Remote Office Central Office

Replication With Deduplication Send chunk fingerprints Remote Office fp() fp() fp() Central Office

Replication With Deduplication Send chunk fingerprints Remote Office fp() fp() fp() Reply with list of missing fingerprints fp() fp() Central Office

Replication With Deduplication Send chunk fingerprints Remote Office fp() fp() fp() Reply with list of missing fingerprints fp() fp() Central Office Send missing chunks

Replication With Deduplication Send chunk fingerprints Remote Office fp() fp() fp() Reply with list of missing fingerprints fp() fp() Central Office Send missing chunks

Replication With Deduplication And Delta Remote Office Central Office m

Replication With Deduplication And Delta Remote Office Send chunk fingerprints fp() fp() fp() fp() fp(m) Central Office m

Replication With Deduplication And Delta Remote Office Reply with list of missing fingerprints fp() fp(m) Central Office m

Replication With Deduplication And Delta Remote Office Central Office Send sketches m sk() sk(m)

Replication With Deduplication And Delta Ø m Remote Office Central Office Send sketches m sk() sk(m)

Replication With Deduplication And Delta Ø m Remote Office Central Office m Reply with list of fingerprints for similar chunks Ø m

Replication With Deduplication And Delta Remote Office Central Office m Send missing chunks and delta encodings () +m

Replication With Deduplication And Delta Remote Office Central Office m Send missing chunks and delta encodings m () +m

Replication With Deduplication And Delta Remote Office Central Office m Send missing chunks and delta encodings m () +m

Replication With Deduplication And Delta Remote Office Central Office m Send missing chunks and delta encodings () +m () +m

Replication With Deduplication And Delta Remote Office Central Office m Send missing chunks and delta encodings () +m () () +m +m

Replication With Deduplication And Delta Remote Office Central Office m Send missing chunks and delta encodings () +m () () +m +m

Replication With Deduplication And Delta Remote Office Central Office m Send missing chunks and delta encodings () +m () +m m

Replication With Deduplication And Delta Remote Office Central Office m m Send missing chunks and delta encodings () +m () +m m

Properties Of Stream-Informed Delta Compression Pros: Eliminates on-disk sketch index Improves performance fewer disk reads than using a sketch index Small memory footprint Improves compression Cons: Dependent on stream locality and caching to find similar chunks Requires read IO and CPU to process delta chunks

Datasets Dataset Type Backup Policy TB Months Source Code Version control repository Weekly full Daily incremental 4.6 6 Workstations 16 desktops Weekly full Daily incremental 4.9 6 Email MS Exchange server Daily full 5.2 7 System Logs Server s /var directory Weekly full Daily incremental 5.4 4 Home Directories Engineers home directories Weekly full Daily incremental 12.9 3

Index VS Stream-Informed Cache Cache sized at 12 MB per stream Deduplication 1 super-feature 2 super-features 3 super-features 4 super-features

Index VS Stream-Informed Cache Cache sized at 12 MB per stream For one super-feature, compression is within 14% of using an index Deduplication 1 super-feature 2 super-features 3 super-features 4 super-features

Index VS Stream-Informed Cache Cache sized at 12 MB per stream For one super-feature, compression is within 14% of using an index Two super-features in a cache is better than an index with one Deduplication 1 super-feature 2 super-features 3 super-features 4 super-features

Index VS Stream-Informed Cache Cache sized at 12 MB per stream For one super-feature, compression is within 14% of using an index Two super-features in a cache is better than an index with one Deduplication 1 super-feature 2 super-features 3 super-features 4 super-features

Index VS Stream-Informed Cache Cache sized at 12 MB per stream For one super-feature, compression is within 14% of using an index Two super-features in a cache is better than an index with one Deduplication 1 super-feature 2 super-features 3 super-features 4 super-features

Index VS Stream-Informed Cache Cache sized at 12 MB per stream For one super-feature, compression is within 14% of using an index Two super-features in a cache is better than an index with one Deduplication 1 super-feature 2 super-features 3 super-features 4 super-features

Index VS Stream-Informed Cache Cache sized at 12 MB per stream For one super-feature, compression is within 14% of using an index Two super-features in a cache is better than an index with one 1. Deduplication is slightly different because of different implementations 2. Delta compression in a cache was higher than a full index because of better delta encoding with a candidate in the cache Deduplication 1 super-feature 2 super-features 3 super-features 4 super-features

Delta Compression Typical delta improvement is 2X beyond deduplication and GZ compression Choose GZ or Delta with GZ Dataset Deduplication GZ Delta w/ GZ Delta Improv. Source Code 24.9X 7.2X 14.9X 2.1X Workstations 5.7X 2.8X 8.8X 3.1X Email 6.9X 3.1X 5.8X 1.9X System Logs 57.9X 4.6X 10.2X 2.2X Home Directories 31.7X 3.1X 5.5X 1.8X Compression factors are presented after first week of seeding.

Network Throughput Effective throughput is 1-2 orders of magnitude faster

Overheads And Limitations Sketches take up about 20 bytes per non-duplicate chunk Uses read IO and CPU on source and destination Sketching is a 20% slowdown on writes, but only for non-duplicates Scales linearly at destination with number of streams

Overheads And Limitations Sketches take up about 20 bytes per non-duplicate chunk Resource utilization during replication Uses read IO and CPU on source and destination Sketching is a 20% slowdown on writes, but only for non-duplicates Scales linearly at destination with number of streams Shared sketch cache affects compression System sized to handle 20 streams Number of systems replicating to a single destination With 25 streams compression loss of 0-12% With 50 streams compression loss of 0-27%

Overheads And Limitations Sketches take up about 20 bytes per non-duplicate chunk Uses read IO and CPU on source and destination Sketching is a 20% slowdown on writes, but only for non-duplicates Scales linearly at destination with number of streams Shared sketch cache affects compression System sized to handle 20 streams With 25 streams compression loss of 0-12% With 50 streams compression loss of 0-27%

Customer Results Median customer has 2X delta compression beyond deduplication

Related Work Optimized network transfer Spring00, Muthitacharoen01, Eshghi07, and Park07 File synchronization Tridgell00, Suel04 Delta compression Burns97, Mogul97, Hunt98, Chan99, MacDonald00, Suel02, Trendafilov02, and Chen04 Similarity detection Brin94, Manber94, Broder[97 & 00], Douglis03, Kulkarni04, You04, Jain05, and Aronovich09 Deduplicated storage Policroniades04, and Bobbarjung06 Stream-informed deduplication Zhu08, Bhagwat09, Lillibridge09, Min10, Guo11, and Xia11

Conclusion Delta locality closely matches deduplication locality for backup datasets Good scalability Stream-informed delta compression is effective with a small cache CPU and IO utilization is low Product allows customers to replicate and protect twice as much data across a WAN

Questions?