Symantec Reference Architecture for Business Critical Virtualization

Similar documents
Symantec and VMWare why 1+1 makes 3

How Symantec Backup solution helps you to recover from disasters?

Best practices for protecting Virtualization, SDDC, Cloud, and the Modern Data Center, with NetBackup

Enabling Fast Recovery of Your Virtual Environments: NetBackup, Backup Exec & VCS for VMware

IM B09 Best Practices for Backup and Recovery of VMware - DRAFT v1

IM B32: What s New in NetBackup: The Vision and Roadmap

Symantec NetBackup 7 for VMware

Clustering and Storage Management In Virtualized Environments Rasmus Rask Eilersen

EMC Integrated Infrastructure for VMware. Business Continuity

Virtualizing Oracle on VMware

Transforming your IT infrastructure Journey to the Cloud Mike Sladin

Veritas Dynamic Multi-Pathing for VMware 6.0 Chad Bersche, Principal Technical Product Manager Storage and Availability Management Group

ACCELERATE THE JOURNEY TO YOUR CLOUD

Redefine Data Protection: Next Generation Backup And Business Continuity

Understanding Virtual System Data Protection

Discover the Power of your Virtual Environments with Backup Exec Gareth Fraser-King Kelly Smith

Modernize Your Backup and DR Using Actifio in AWS

NetBackup for vcloud Director

VMware - VMware vsphere: Install, Configure, Manage [V6.7]

Remove complexity in protecting your virtual infrastructure with. IBM Spectrum Protect Plus. Data availability made easy. Overview

EMC Business Continuity for Microsoft Applications

SM-B09: Confidently Virtualize Business Critical Applications On VMware, KVM, LPAR and LDOM with ApplicationHA 6.0

Boost your data protection with NetApp + Veeam. Schahin Golshani Technical Partner Enablement Manager, MENA

Redefine Data Protection: Next Generation Backup & Business Continuity Solutions

Introducing VMware Validated Designs for Software-Defined Data Center

Backup and Recovery Best Practices With Tintri VMstore

The 5 Keys to Virtual Backup Excellence

Introducing VMware Validated Designs for Software-Defined Data Center

Taking Control of Your VMware vsphere Environment with Operations Management

Introducing VMware Validated Designs for Software-Defined Data Center

IM-B23: What s New with NetBackup Appliances

EMC Virtual Infrastructure for Microsoft Applications Data Center Solution

1560: Storage Management & Business Continuity Strategy and Futures

XtremIO Business Continuity & Disaster Recovery. Aharon Blitzer & Marco Abela XtremIO Product Management

Managing Data Growth and Storage with Backup Exec 2012

Copyright 2012 EMC Corporation. All rights reserved.

Backup and Recovery Best Practices

EMC Data Domain for Archiving Are You Kidding?

Veritas Storage Foundation for Windows by Symantec

NetBackup Appliance Technical Deep Dive

Securing the Data Center against

Plug-in for VMware vcenter

Veritas Storage Foundation for Windows by Symantec

Symantec Disaster Recovery Orchestrator for Amazon Web Services

Veritas InfoScale 7.0 Virtualization Guide - Linux on ESXi

Stop putting tapes on trucks!

Support for NetBackup 7.x in virtual environments

Stellar performance for a virtualized world

Veritas Storage Foundation for Windows by Symantec

Tivoli Storage Manager for Virtual Environments: Data Protection for VMware Solution Design Considerations IBM Redbooks Solution Guide

The Evolution of Data Center Security, Risk and Compliance

VMWARE PROTECTION WITH DELL EMC NETWORKER 9

The Business Case to deploy NetBackup Appliances and Deduplication

Veeam Availability Solution for Cisco UCS: Designed for Virtualized Environments. Solution Overview Cisco Public

Chapter 10 Protecting Virtual Environments

Next Gen Storage StoreVirtual Alex Wilson Solutions Architect

The vsphere 6.0 Advantages Over Hyper- V

Accelerate the Journey to 100% Virtualization with EMC Backup and Recovery. Copyright 2010 EMC Corporation. All rights reserved.

Transforming Data Protection with HPE: A Unified Backup and Recovery June 16, Copyright 2016 Vivit Worldwide

Symantec NetBackup 5200

Backup Exec 20.1 Licensing Guide


Veritas NetBackup for Microsoft Exchange Server Administrator s Guide

Enhanced Protection and Manageability of Virtual Servers Scalable Options for VMware Server and ESX Server

VMware vsphere 6.5: Install, Configure, Manage (5 Days)

Veritas Backup Exec. Powerful, flexible and reliable data protection designed for cloud-ready organizations. Key Features and Benefits OVERVIEW

Copyright 2012 EMC Corporation. All rights reserved.

A Dell Technical White Paper Dell Virtualization Solutions Engineering

Dell EMC Ready Architectures for VDI

Verron Martina vspecialist. Copyright 2012 EMC Corporation. All rights reserved.

VMware Join the Virtual Revolution! Brian McNeil VMware National Partner Business Manager

IT Infrastructure: Poised for Change

Symantec Protection Center Getting Started Guide. Version 2.0

VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014

Virtual Server Agent v9 with VMware. June 2011

Copyright 2012 EMC Corporation. All rights reserved.

Kaspersky Security for Virtualization Frequently Asked Questions

EMC Backup and Recovery for Microsoft Exchange 2007 SP1. Enabled by EMC CLARiiON CX4-120, Replication Manager, and VMware ESX Server 3.

VMware vsphere 4.0 The best platform for building cloud infrastructures

Dell EMC vsan Ready Nodes for VDI

VMware vsphere 5.5 Professional Bootcamp

Symantec Backup Exec Blueprints

WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group

Simple Data Protection for the Cloud Era

Enterprise Vault Overview Nedeljko Štefančić

Potpuna virtualizacija od servera do desktopa. Saša Hederić Senior Systems Engineer VMware Inc.

IBM Spectrum Protect Plus

NetBackup as a Service

Detail the learning environment, remote access labs and course timings

Veritas Cluster Server 6.0

Services Catalouge.

[VMICMV6.5]: VMware vsphere: Install, Configure, Manage [V6.5]

IM B19 Cloud based DR Andreas Bechter

Technical Session I: Managing Your Data in a Hybrid World

Backup Appliances. Geir Aasarmoen og Kåre Juvkam

Veritas NetBackup Network Ports Reference Guide. Release 8.1.1

Nutanix Tech Note. Virtualizing Microsoft Applications on Web-Scale Infrastructure

VPLEX & RECOVERPOINT CONTINUOUS DATA PROTECTION AND AVAILABILITY FOR YOUR MOST CRITICAL DATA IDAN KENTOR

Microsoft E xchange 2010 on VMware

VMware vsphere: Fast Track [V6.7] (VWVSFT)

Transcription:

Symantec Reference Architecture for Business Critical Virtualization David Troutt Senior Principal Program Manager 11/6/2012 Symantec Reference Architecture 1

Mission Critical Applications Virtualization of Business Critical Applications Development and Test IT Owned Services Small Departmental Servers Business Critical Applications Easy, department level systems already virtualized Next are the Business Critical Applications They are the last to be done because they are the crown jewels of the company They must be protected, they must meet SLA s Symantec is the Solution. % of Physical % of OS 1 Servers running a 2 instances 3 Hypervisor running in a VM 38% 57% 59% Source: VMWare Customer Benchmarking Survey August 2011 % of Apps running in a VM 2

Agenda 1 approach 2 overview 3 technology architecture domains 4 validation 5 conclusion Symantec Reference Architecture 3

approach Symantec Reference Architecture 4

Business Challenges Organizations are striving to leverage the benefits of virtualization: Drive down cost Improve business agility through consolidation Improve resource utilization Benefit from increased automation and efficiency Many business critical applications are considered too large, complex, or high risk, concerns center around: Meeting enterprise level SLAs (Service Level Agreements) for up time Maximizing continuity and recovery Meeting enterprise level security and governance requirements Achieving I/O performance requirements Minimizing storage and related resource costs Minimizing learning the curve by removing one-off point-solutions Symantec Reference Architecture 5

Goal & Objectives Goal: To remove the barriers to virtualization, and provide proven capabilities to help businesses migrate their critical Microsoft applications safely to virtual environments, while managing complexity and risk. Objectives: Optimize I/O performance Provide business critical levels of availability Protect critical servers from security threats Reduce infrastructure costs Improve operations efficiency Symantec Reference Architecture 6

Key Requirements Driving this Architecture Defines optimum configurations that ensure VMware, Microsoft, and Symantec technologies work together for maximum benefit Optimized for large enterprises deploying business critical applications with high transaction rates Benefits of virtualization remain intact and improved upon Minimizing cost of implementation Organizations can expand the scope of a specific implementation of the Symantec Reference Architecture to include multi-instance applications. Based on the most current generally available versions of software Symantec Reference Architecture 7

Introducing the Symantec Reference Architecture SymRA SymRA for Business Critical Virtualization is the blueprint to make it work. Tested framework Meets the business critical application challenges A complete solution Combines key products from Symantec and VMware Enterprise Architecture based on TOGAF Standards Off the shelf products, no custom software required, low TCO, easy expansion Accelerates the design process, reduces costs & risk, speeds implementation Selected resources trained in architecting and implementing this solution Hardware platform flexibility (HP, Dell, EMC, etc.) 8

overview Symantec Reference Architecture 9

Common Architecture Overview Users Visibility, Audit & Reporting Operations Management Primary Site Secondary Site Business Critical Application Business Critical Application Business Critical Application Application Data Clustering Application Data Replication Application Data Virtual Machine Virtual Machine Virtual Machine Security & Compliance Hypervisor Hypervisor Hypervisor Enterprise Dynamic Storage (SAN) Replication SAN/NAS Off-Site Deduplication Enterprise Backup Enterprise Backup Symantec Reference Architecture 10

Symantec Reference Architectures for Business Critical Virtualization The Reference Architectures within this series include supporting environments for: Archiving Security Microsoft applications on VMware Data Protection High Availability Storage Management Symantec Reference Architecture 11

technology architecture domains Symantec Reference Architecture 12

Requirements to Architecture Segment Mapping Concerns I/O Performance High Availability Segment Storage Segment Application Availability Application Recovery Application Visibility Server Security Data Protection Segment Security Segment Archiving Segment Infrastructure costs Management costs 13

Product to Technology Architecture Domain Map Technology / Product Virtualization High Availability Storage Management Data Protection ESXi Security Archiving 3 VMware rd Party Symantec vcenter vshield HA SRM SRA Replication Array-Based Snapshots ApplicationHA Storage Foundation Veritas Operations Manager Veritas Operations Manager Advanced Critical System Protection NetBackup Enterprise Vault 1. 1. Antivirus recommended for Exchange environment. 14

High Availability (& Disaster Recovery) High Availability Objectives Achieved Protect systems at ALL levels (application through ESXi host and data center) Enable quick recovery Ensure live migration of complex systems Provide consolidated monitoring and report of system status and SLAs Approach Taken Implement ApplicationHA on all application virtual machines Integrate with VMware s HA and DR capabilities for local and site level failover Apply multi-tier application management and protection Provide data center level monitoring and reporting of application SLA s Products Used Symantec ApplicationHA VMware HA Veritas Operations Manager VMware SRM SRA (from HP) Array based Site-to-Site replication 15

Achieving Service Level Agreements High Availability Failure Level Application Virtual Server Physical Server Action Taken Symantec ApplicationHA detects and then attempts to restart application services. If services can t be restarted Application HA notifies VMwareHA VMware HA attempts to restart virtual server. ESXi Host is detected as being down by VMware HA which then moves applications to an alternate ESXi Host Data Center VMware SRM detects the data center down, starts applications at DR site. 16

Managing Availability Across Application Tiers High Availability SharePoint Web server Symantec ApplicationHA Veritas Operations Manager USE CASE Service Stop SharePoint App. app app app Symantec ApplicationHA Disaster Recovery Security MS SQL Database Symantec ApplicationHA Service Start Status Summary High Availability 17

Disaster Recovery Logical Architecture Primary Site SRM Server High Availability Secondary Site SRM Server VM1 VM2 VM3 EXCH SQL SP SRM Failover VM1 EXCH VM2 SQL VM3 SP OS OS VMware HA OS Resource Mapping OS OS VMware HA OS ESXi ESXi ESXi ESXi ESXi Non- Replicated Storage SRM Protection Group Replicated Storage Array-based Replication SRM Protection Group Replicated Storage Non- Replicated Storage ESX Boot Vols VM Boot Vols Data Vols Log Vols VM Boot Vols Data Vols Log Vols ESX Boot Vols 18 18

Storage Management Storage Management Objectives achieved Provide for scalable and optimized I/O performance Reduced infrastructure and management costs Provide instant recovery via snapshots Ensure Disaster Recovery with data integrity Approach taken Implement thin provisioning/reclamation to provide capacity on demand Deploy DMP (SFW) to eliminate single points of failure in the I/O path Utilize VOM/VOM Advanced to provide centralized storage management and reporting Use snapshots to facilitate instant point in time recovery Products Used Veritas Storage Foundation for Windows from Symantec Veritas Operations Manager Veritas Operations Manager Advanced 19

Storage Management Logical Architecture Storage Management Physical Server VM1 EXCH VM2 SQL VM3 SP SFW OS SFW OS SFW OS VMware ESXi VMDK Local Storage RDM SAN Shared Storage Non- Replicated Storage SRM Protection Group Replicated Storage Non- Replicated Storage ESX Boot Vols Snap- Shots VM Boot Vols Data Vols Log Vols Snap- Shots 20

Benefits of Choosing Raw Device Mapped Storage Benefits Breaks the 2 TB limit I/O Isolation o Minimize impact on other applications o More predictable performance o Separation of application files types (databases, log files, etc.) Supports advanced storage mgmt. capabilities (e.g. Thin Provisioning) Lower CPU overhead, 5% to 8% Storage Management 21

E N G I N E E R I N G O P E R A T I O N S Managing and Monitoring Storage VOM and VOM Advanced Storage Management IMPROVE SERVICE LEVELS Monitoring, alerting, & built-in health checks Storage capacity planning & reporting Patch reporting & alerting File Systems & Volume Management Information Veritas Operations Manager Symantec Operations Readiness Tools REDUCE COST AND COMPLEXITY Automated detection & mapping of virtual guests and related storage Thin-Pool Monitoring & reclamation reporting ApplicationHA STORAGE FOUNDATION Customer Premises 22

Data Protection Data Protection Objectives Achieved Enable fast recovery of data in the event of data loss or logical corruption Improve performance and scalability by offloading backup processing from application virtual machines Reduce infrastructure and storage costs by eliminating backups of duplicated data Allow for recovery of individual objects (files, mailboxes, etc.) Approach Taken Use VMware and array-based snapshots for off host backups of OS, applications, and data Deploy NetBackup agents on all application virtual machines for granular recovery Utilize NetBackup deduplication to minimize storage and network bandwidth requirements Deploy Granular Restore Technology (NetBackup GRT) for individual object level restores Products Used Symantec NetBackup Enterprise Server Symantec NetBackup 5000 and MSDP (Deduplication) VMware vstorage APIs for Data Protection (VADP) VMware Snapshots Array-based Snapshots (from HP) 23

NetBackup Logical Architecture Data Protection OpsCenter Reporting and Management Server NetBackup Master Server NetBackup Client Hosts (Virtual Machines) NetBackup Media Server Ethernet VM VM VM NetBackup Dedupe Media Server (MSDP) NetBackup Dedupe Appliance SAN Storage VMware ESXi Host Third-Party Storage Appliance SAN Storage Tape Library Tape Library SAN Storage Snapshots 24

Offhost Backup Using vstorage API and Snapshots Data Protection ESXi Host Application Guest SnapShot vstorage API NetBackup Media Server or Appliance RDM VMDK Backup Storage SAN Storage SAN/NAS Storage 25

Protecting I/O Performance via Off-host Backups Data Protection NetBackup Media Server or Appliance ESXi Host NBU Agent Guest Alternate Host ESXi Host NBU Agent Guest Application Backup Storage RDM RDM Snapshot Shared Storage SAN Storage 26

Security Security Objectives Achieved Protect a virtualized environment against intrusion and unauthorized changes Protect against network security threats Lower security management costs Keep security policies relevant to new threats Approach Taken Multiple layers of protection Utilize Symantec Critical System Protection (SCSP) to monitor file systems and processes for unauthorized changes Lockdown system configuration settings, file settings, and use of removable media using SCSP Implement VMware vshield App to enforce firewall security policies Centralize security administration and management via SCSP Implement LiveUpdate to keep security policies current Products Used Symantec Critical System Protection, Symantec LiveUpdate VMware vshield App 27

Security Capability Map by Application Security Functionality Access Control to Applications and Data In Place Data Encryption Tamper Protection (no unauthorized modification) SSL Certificate Protection (no unauthorized access) System Hardening (Prevent 0 day attacks and unauthorized software installation)*** Built in compliance reports Microsoft Applications * Symantec CSP** VMware vshield Network Firewall Hypervisor Level Firewall (Application & System Aware) * Referring specifically to Microsoft SQL Server, Exchange Server and SharePoint ** Symantec Critical System Protection (SCSP) protects physical & virtual systems. Security groups, policy management, logging, and auditing can cross both physical and virtual environments. *** SCSP follows best practices for hardening an ESX server from VMware and ensuring your ESX systems settings are set to be secure and remain secure. 28

Hardening Virtual and Physical Systems Efficiently Security Shield critical physical and virtual systems Apply Isolation Trust Zones Unified Policy and Control Key Functions: System hardening User access control Change monitoring/prevention Guest isolation Network access control IPS / IDS Log retention Removable media control User and application behavior control File integrity monitoring Virtual Physical 29

Lock Down All of the Virtual Environment with CSP Security vcenter Database vsphere Client vcenter Server Datastores ESX/ESXi Host Cluster X X X X X X X Threats Rogue Clients Client Hijacking Disgruntled Admin Mis-configurations SSL certificate Malware Unauthorized Access vcenter Server Datacenter Datastores vsphere Client 30

Archiving Archiving Objectives Achieved Offload aging data and duplicated data from infrastructure, optimizing I/O performance Reduce cost of Tier 1 storage and related infrastructure Provides capability to quickly locate messages and documents for compliance requirements Approach Taken Deploy Enterprise Vault to archive Microsoft Exchange Server and Microsoft SharePoint information Implement ediscovery using Discovery Accelerator to allow for quick searches of archived content Define expiration policies to remove old messages and content from archive stores Products Used Symantec Enterprise Vault Symantec Enterprise Vault Discovery Accelerator 31

Archiving Physical Architecture Archiving 32

validation Symantec Reference Architecture 33

Validation Approach Testing Methodology Focus on Interoperability Placed applications under load during functional testing Use Cases Tested High Availability Recovery at each tier (Application to Data Center) Disaster Recovery Data protection Thin provisioning / reclamation Security Reporting / tracking of events Example Test Lab Symantec Reference Architecture 34

conclusion Symantec Reference Architecture 35

Conclusion Symantec s Reference Architecture solves the problems facing the virtualization of common Microsoft business applications. Improved Availability & Performance Improved Application & Data Protection Reduced Infrastructure & Management Costs Symantec Reference Architecture 36

Next Steps Review the associated white paper: White Paper: Accelerating Virtualization of Tier 1 Applications http://www.symantec.com/virtualization Schedule a meeting with a Symantec technical sales specialist to discuss suitability of this solution. 37

Questions Symantec Reference Architecture 38

Thank you! David Troutt david_troutt@symantec.com 949-836-1174 Copyright 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Symantec Reference Architecture 39