Sunteți pe pagina 1din 287

Welcome

Partner Services
Engineering Course
Simpana V10 R2

Biswanath Das
CV Certified Instructor , Solutions Architect & Specialist

No unauthorized use, copy or distribution.

Preliminaries

Who am I?
Who are you?
Why are we here?
How will this course be conducted?

No unauthorized use, copy or distribution.

Audience
Who Should Take this Course?
Design
deployment
How do I become Simpana Certified?
This is not a certified course (yet!) but it does provide
knowledge to enable the student to pass Core and
Implementation & Maintenance certifications.
If not done so, Register NOW!

No unauthorized use, copy or distribution.

Certification
https://ea.commvault.com/Certification/

No unauthorized use, copy or distribution.

Simpana Overview
No unauthorized use, copy or distribution.

Topics

Course Flow
Single Platform
Standard Terminology
Common Technology Engine (CTE)
Classes of product
SnapManagers

No unauthorized use, copy or distribution.

Course Flow
Overview
Simpana Concepts and
terminology

Planning & Design


Discussed & reviewed throughout
Partner Tools

Installation
Installing the core
components, configuring
secondary storage and
basic configuration.

Reference points and further


education

Troubleshooting/Upgrades
What can you do when things go
wrong? Where do you go?

Agents
Installation of clients,
configuring policies,
updating and upgrading.

Configuration Essentials
Defining Storage policies, taking
copies, running and managing
jobs. Monitoring, alerting and
reporting.
No unauthorized use, copy or distribution.

One Platform, One Approach


Unified Data Management & Information Access

Simpana V10 is now rearchitectured to make data


available in a much more
granular way.

database

Protect, manage and access


all data across your enterprise
at an object (rather than job
based) level.

SEARCH

RETAIN

ANALYZE

RECOVER

DISCOVER

ACCESS

No unauthorized use, copy or distribution.

Why is granular access to data a big deal?

No unauthorized use, copy or distribution.

Standard Terminology
What is a

CommVault : Name of the company


Simpana : The name of the software suite
Commserve : the Master component
CommCell : The whole backup environment

Note from BoL - When a feature is classified as Deprecated, it


means it does not exist in the current media kit as an installation
option.
i.e. it could return later.

No unauthorized use, copy or distribution.

Common Technology Engine


CommCell

CommServe
GUI Server
Licensing Manager
Security Manager

Common
Technology
Engine

Meta
Data

Restore/Recall

Agent Host
Job
Results

Client

Data Mover
Library Manager
DDB Manager
Indexing Manager

Data Management

Data Path

Tape
Disk
Index
Library Library
Cache
Content Store

Media Agent
No unauthorized use, copy or distribution.

Content Store

Conceptually, ContentStore combines our


indexing technologies and data packaging
technologies with back-end storage targets
to provide a virtualized storage layer from
which data can be recovered or directly
accessed. **

** Brian Brockway

No unauthorized use, copy or distribution.

Controlled release of features

Features are released in waves. When upgrading you must check known issues in BoL.

No unauthorized use, copy or distribution.

Early Release features


Exercise caution when using early release
features. Details are likely to change.

No unauthorized use, copy or distribution.

Day wise Agenda

Day1 : Introduction , Commcell Architecture , Certification path ,Licensing


Module1 theory : Commserver Roles, Simpana console, Security ,
User/client Groups , Admin settings . Module1 Lab activities
Module 2 theory : Media Agent roles , IndexCache overview,

Day 2 : Module2 : Storage Resources (Disk , Tapelib config) , Module2 Lab


activities , Module3 : Storage Policies , Retention, Deduplication ,
Module3 Lab activities

Day 3 : Module4 : IdataAgent , Filters , Archiving (Onepass) , Module4: Lab


Activites . Module5 : Job management (Backup & Recovery ) ,
Module5 : Lab activities. Module6 : Reports, alerts, monitoring ,
Module6 activities

Day 4 : Module7 : Processes , ports , firewall , Module7 Lab Activities,


Module 8 : Installation , Module8 Activities, Module9 : VSA & Intellisnap ,
Module 9 Activities

Day 5 : Module10 : Log analysis , Troubleshooting , Module10 activities, Module11:


DR , Module11 activities , Advanced features : Ediscovery, Workflow ,
Partner tools, CS installation

No unauthorized use, copy or distribution.

Module1
Commserver , Security & Groups ,
Admin settings
No unauthorized use, copy or distribution.

Topics
System Requirements
Commserve Install

No unauthorized use, copy or distribution.

System Requirements

http://Documentation.commvault.com
Note : BoL is downloadable from this site for storing locally.
No unauthorized use, copy or distribution.

Books OnLine PDF format also

No unauthorized use, copy or distribution.

Help - All help panels linked to BoL

No unauthorized use, copy or distribution.

Installing the CommServe Component


SQL 2008 Ent Service Pack 1
Use Dedicated instance/SQL Server
Locate database on its own fast disk
SQL Memory Usage Throttled automatically
by post install script
Install Directory
Log File Directory
Temp Directory
NOTE : SQL 2012 is supported by upgrading the SQL database
post deployment. Will replace SQL 2008 on a future ISO.
No unauthorized use, copy or distribution.

Installing the CommServe Component

Other Simpana Databases


CVCLOUD : Metrics reporting
SRM : Primary Storage Reporting
WFEngine : Workflow DB
DM2WebServiceDB : Web server DB

No unauthorized use, copy or distribution.

Essential Administration Module

No unauthorized use, copy or distribution.

Topics

Process Explorer
Console
Getting Started
Internal messaging
Licensing
Add/Remove Software Configuration
DR Backup Settings
Email & IIS configuration
ROMS & Diagnostic and Usage

No unauthorized use, copy or distribution.

Process Manager

No unauthorized use, copy or distribution.

CommCell Console

Summary

Job Controller

CommCell Browser
Getting Started

Event Viewer

No unauthorized use, copy or distribution.

Getting Started

No unauthorized use, copy or distribution.

CommCell Messaging
Administrators can send text messages
to logged in users via CommCell | View |
Users Logged in dialog box.

Administrators can also log off other


users.

No unauthorized use, copy or distribution.

Essential Administration Settings


Licensing
Standard Licensing
DR License

Apply Production license


key as soon as possible
after install of
Commserve

No unauthorized use, copy or distribution.

Data Protection CLA Reference


Features

Core

ADM

Enterprise

All File System Agents (except NDMP)


NAS NDMP Support
Application Class 1
Application Class 2
Application Class 3
Deduplication to Disk
Deduplication to Tape
Intellisnap Functionality
OneTouch Functionality
Primary Copy Encryption
Secondary Copy Encryption

Included in CLA Tier


Not Included in base CLA, but available as Add
on
Not included in base CLA, not available as Addon
No unauthorized use, copy or distribution.

Archive CLA Reference


Features

Core

DAR

Enterprise

Primary Encryption
Secondary Encryption
Deduplication to Disk
Deduplication to Tape
Combine with ADM
Combine with Data Protection Core
Combine with Data Protection Enterprise
Data is Available for Content Indexing
Simpana OnePass Technology for File System Data
Simpana OnePass Technology for Exchange Data

Included in CLA Tier


Not Included in base CLA, but available as Add
on
Not included in base CLA, not available as Addon
No unauthorized use, copy or distribution.

Essential Administration Settings


Licensing
Capacity License Agreement
(CLA)

Split by Backup and Archive


Unlimited agents

Application Data
Management (ADM)

Cut down version of CLA.


Reduced price.

Full details of how CLA


calculated in BoL.
Be aware :
If Client_1 has Win FS
full backup of 5TB and
SQL Full backup of
2TB. This equates to
7TB used on the CLA.
No unauthorized use, copy or distribution.

Essential Administration Settings


Add/Remove Software Configuration
Download frequency and method
Local and Distributed Cache Location(s)
60 day retention period for replaced binaries
Intelligent patching
DR Backup Settings
Export & Backup locations
Frequency & Retention
E-Mail & IIS Configuration
SMTP capable Mail host for Alerts and Reports
Online Help URL
IIS host for Report display

No unauthorized use, copy or distribution.

Essential Administration Settings


Remote Operations Management Service (ROMS)
Pro-Active monitoring and problem determination.

No unauthorized use, copy or distribution.

Essential Administration Settings


Diagnostic and Usage
(originally customer survey in v9).
Information uploaded to the CV cloud or local database for reporting.
Metrics Reporting can be configured to generate reports on any of the following
information:
Data protection statistics, which help to identify the clients and policies that need to be
adjusted
Job statistics such as successful backup jobs and strikes over the last week, largest
clients over the last month, and top errors over the last day
Data growth rates
Status of upgraded agents based on the percentage of completed jobs, errors, and
throughput
Worldwide license, data, and growth information for your entire organization.
Whether a CommCell is ready to be upgraded

No unauthorized use, copy or distribution.

Essential Administration Settings


Diagnostic and Usage reports

No unauthorized use, copy or distribution.

Security and Access Module

No unauthorized use, copy or distribution.

Topics

CommCell Console Access


User Management
Client Computer Groups

No unauthorized use, copy or distribution.

CommCell Console Access (Web console, end user


access for laptop users )
Primary
Administrative
Graphical
User Interface

No unauthorized use, copy or distribution.

Command Line Interface


Use for external activity coordination
Create using Save as Script job option
Executable from any CommCell
component
Synchronous or Asynchronous
execution

No unauthorized use, copy or distribution.

User Management (capabilities & entities)


Active Directory
User

Local
User
CommCell
User

CommCell User
Group

Capabilities
Browse
Recover
Report
Management
Library
Administration
End User Access
Search
Job Management
Agent Scheduling
View

Active Directory
Group

CommCell Entities
CommCell
Computer Groups
Clients
Agents
Datasets
Subclients
Libraries
MediaAgent
Policies
41

No unauthorized use, copy or distribution.

Best Practice for your environment:

External users can be given Single Sign on capability


enabling Simpana software acceptance of Active Directory or Domino
Directory Service authentication to validate users.
To enable Single Sign on:
1. From the CommCell Browser, click the Security icon, and click on the
Name Servers
icon.
2. Right-click on the domain for which you wish to enable/disable Single
Sign on, and
select Properties from the popup menu.
3. Select the Enable SSO option.

No unauthorized use, copy or distribution.

Client Computer Groups


Management
Scalability Tool for:

Activity
Security
Operation Window
Reporting
Updates
Job History
Firewall

Security
No unauthorized use, copy or distribution.

Client Computer Groups


Ability to Auto associate clients with a Group

No unauthorized use, copy or distribution.

Module 2
Media Agent , Index cache &
Storage Resources
No unauthorized use, copy or distribution.

Topics

Media Agent Install


IndexCache
Understanding Protected Storage
Media Agents Role in Storage
Working with Disk Libraries
Working with Removable Media Libraries
Understanding Media States
Media Handling

No unauthorized use, copy or distribution.

Installing Media Agents

Verify
Host Name resolution
Client(s) access path
Data Interface Pairs
Data path(s) to library(ies)
GridStor Technology
Index Cache Size and location

No unauthorized use, copy or distribution.

Index Basics
Index Cache is
Used by
indexed-based
Agents
Essential for
performance
Selfmaintained

No unauthorized use, copy or distribution.

Index Sharing
Use local Indexes only
for performance
But restartability could be
compromised
Deprecated Options

Index Cache Server


Additional Copy
Recommend use of
Transaction Logging
Network Share (recommended)
Single Copy
Recommend use of
Intermediate Index cache
No unauthorized use, copy or distribution.

IndexCache

V9: index clean-up used to happen as part of


archive index phase for that specific subclient
and every 24 hours in accordance with the
retention rules which would clean up the aged
index.
V10: clean-up is not based on subclient but
happens every 24 hours in accordance with the
retention rules set up on the MediaAgent.

No unauthorized use, copy or distribution.

IndexCache Cleanup process


When Index Cache Free Space size falls below the value specified in Free Space
Warning, then the following will be performed:

An event message will be generated in the Event Viewer, to indicate that there is Low Disk Space.
An emergency cleanup will be performed in the following sequence:
First, if the indices are older than the number of days specified in the Index retention time in days,
then those indices will be cleaned up.
Even after the above clean up, if the used disk space still exceeds the percentage specified in Index
Cleanup Percent, then the MediaAgent removes index files in the index cache on a least recently used
basis until the used disk space becomes equal to or below the amount specified in the Index Cleanup
Percent.

When Index Cache Free Space size falls below the amount specified in the Minimum
Free Space, then the following will be performed:

MediaAgent will be brought offline.


An emergency clean up will be performed in the following sequence:
First, if the indices are older than the number of days specified in the Index retention time in days,
then those indices will be cleaned up.
Even after the above cleanup, if the used disk space still exceeds the percentage specified in the Index
Cleanup Percent, then the MediaAgent removes index files in the index cache on a least recently used
basis until the used disk space becomes equal to or below the amount specified in the Index Cleanup
Percent.Once the index cleanup percentage is reached the MediaAgent will be brought back online
within 20 minutes.

No unauthorized use, copy or distribution.

IndexCache
Option for more data being collected.
Focus on the ability to retrieve data based on file level
access and not server.
Default Retention period reduced in V10 due to additional
information. - 35 days (v9) to 15 days (v10)

No unauthorized use, copy or distribution.

IndexCache

Sizing more like 2% and not 4% as always


previously stated. But difficult to calculate.
V10 adopts simple approach as shown below.
Figures based on 30 day 4 weekly cycle.

No unauthorized use, copy or distribution.

IndexCache
If job has no data to backup then job will terminate
at the scan phase.

No unauthorized use, copy or distribution.

IndexCache

Ability to search other MAs for missing Indexes.


Previously the IndexCache was Job based but
now in V10 IndexCache is Object based.

No unauthorized use, copy or distribution.

Data path

Understanding Protected Storage


MediaAgent
MediaAgent

Library Manager

Library
Library

Media Manager

Library Controller

Robotic Arm

MasterDrivePool or MountPaths
MasterDrivePool or MountPaths
DrivePool or Mount Path
DrivePool or Mount Path
Drive or Writer
Drive or Writer

Media group
Device group

Read/write device

Scratch Pool or Unused Disk Space

Media source

No unauthorized use, copy or distribution.

Supported Library Types

Disk Library
Tape Library
Blind Library
IP Library
Stand-alone Tape
Library

NAS NDMP
Library
Virtual Tape
Library
Plug & Play
Library
Cloud Library
Removable Disk
Drives

No unauthorized use, copy or distribution.

Media Agents Role in Storage

Data Mover
Device Control
Index Manager
Index Cache
Server host
Deduplication
Database host
Snap Mount host

No unauthorized use, copy or distribution.

Working with Disk Libraries


Types
Direct Attached
Shared
Replicated
Settings
Usage Pattern
Capacity
Allocation
Maintenance

No unauthorized use, copy or distribution.

Working with Removable Media

Libraries

Types
Standalone
Robotic
Shared/Dynamic
Settings
Overwrite Media
Start New Media
Appendable Media
Maintenance

No unauthorized use, copy or distribution.

Working with NDMP Libraries

No unauthorized use, copy or distribution.

Working with Virtual Tape Libraries


Remember to select is a virtual
tape library
This option ignores all the media
and drive usage/cleaning
thresholds that are not
applicable to virtual tape
libraries.
Note that NearStore and
Eternus CS devices require
special attention. Fully
documented in BoL.

No unauthorized use, copy or distribution.

Understanding Media States


Write Ability
Read Ability
Location

Ownership
Capacity

No unauthorized use, copy or distribution.

Media Handling
Need for Unique Identity
Media Handing Prompts
Auto or Manual Discovery

Export Media/Mark Media Exported


VaultTracker

No unauthorized use, copy or distribution.

Module 3
Storage Policies & Deduplication

No unauthorized use, copy or distribution.

Topics

The roll of Storage Policies


Storage Policy Structure
Understanding Retention
Retention Cycles and Days
Retention and Dependent Jobs
Data Aging and Retention Variants
Gridstor
Deduplication
Auxiliary Copies
SILO
Dedupe Building Blocks
SnapProtect Copies
No unauthorized use, copy or distribution.

The Role of Storage Policies

No unauthorized use, copy or distribution.

Storage Policy Structure


Types of Storage Policies
Global Deduplication
Standard
Disaster Recovery
Copy Attributes
Primary
Synchronous
Spool
Selective
Snap
Incremental

No unauthorized use, copy or distribution.

Understanding Retention
Managed at the Storage Policy Copy Level
Retention Criterion
Days
Cycles
Types of Retention
Basic
Archive
Extended
Managed Disk Space
Job Assigned

No unauthorized use, copy or distribution.

Data Aging and Retention Variants


Data Aging runs daily at 12:00pm by Default (noon)
Data pruned if
Exceeds retention criteria
Exceeds Managed Disk Space AND retention criteria
If client moved to different SP, old data managed by days only
Not required for
Auxiliary Copy
Content Indexing
Data Verification
Pruned data is erased on Disk
Tape data available until overwritten
Jobs expire based on job start date/time
Timezone on storage policy is linked to the expiry of jobs
No unauthorized use, copy or distribution.

Understanding GridStor Technology

No unauthorized use, copy or distribution.

Stream Management
Understanding Data
Streams
Job Streams
Device Streams

Configuring Streams
Subclients
MediaAgent / Library /
Mount Path
Storage Policies

Secondary Copy
Streams
Combine to Streams

Job
Streams

Device
Streams

Multi-Stream
Subclient

Disk Library
Writers

Subclients
Tape Library
Single-Stream
Subclient

MediaAgent
Drives

No unauthorized use, copy or distribution.

Storage Policy compression settings

Subclient Default

Dedupe Storage Policy default

Non-Dedupe Storage Policy default

No unauthorized use, copy or distribution.

Simpana Block-level Deduplication :


Dedupe Process :
Compression Signature generation (hash) -> Data block and Hash sent to MA
Block gets loaded in RAM MA combines data into 128 K * BLOCKS DDB is
updated with Block ref count Block sent to Disk library for write into SFILE container

No unauthorized use, copy or distribution.

DEDUPE
- Building blocks
- Partioned Dedupe How does Parallel Dedupe
Work
1

Clients select DataMover (MA) to send data


to based on Gridstor Policy

DataMover uses internal algorithm to select


which Partition to perform the signature
lookup against. If Partition selected is on the
other MA, lookup is performed over the
network

DataMover

DataMover

MediaAgent-1 (Primary)

MediaAgent-2 (Primary)

DDB and Data Mover Role

DDB and Data Mover Role

DDB-G1

50 Mount
Paths 2-8TB

DDB-G2

Partition 2

Global Dedupe Store/Storage Policy

Data transfer
DDB Lookups

If data block already exists, references are


updated in selected partition and metadata
is updated on the mountpath DM has access
to
If data block is new, the signatures are
updated in the selected partition and the
data block is written on the mountpath the
Datamover has write access to

50 Mount
Paths 2-8TB

Partition 1

Algorithm ensures multiple occurrences of the


same block are always looked up against the
same partition

76

Repeat similar process on other clients that


select a different Data Mover using Gridstor

The data is always written by the selected


datamover, although signature lookup could
occur on either partition
No unauthorized use, copy or distribution.

Built-in Resiliency with Parallel Dedupe


Automatic Failover to a different Partition
1
2
3

DataMover

Clients selects an alternate data mover


based on Gridstor policy

Alternate Datamover selects a partition from


the remaining available for lookups

Based on the lookups the alternate MA


writes to its own mountpath

MediaAgent-1 (Primary)

MediaAgent-2 (Primary)

DDB and Data Mover Role

DDB and Data Mover Role

DDB-G1

50 Mount
Paths 2-8TB

DDB-G2

50 Mount
Paths 2-8TB

Partition 1

Partition 2

Global Dedupe Store/Storage Policy

Data transfer

Datamover choose the appropriate DDB


partition for lookups and writes to the data
paths associated with the selected Data
Mover

4
4

DataMover

Clients use Gridstor to pick a data mover

Once the MA and Partition are back online,


the following jobs will select that datamover
and the Partition selection algorithm will
include the rebuilt partition again

Index must be designed to support the


desired availability scenarios (see Indexing
Session)
No unauthorized use, copy or distribution.

Deduplication Node Extended Mode


Hosting Multiple DDBs on a single node
Deduplication Node

Characteristics

Data Ingestion Ports

Spec

DDB-G1

X64 OS
2CPU, Quad Core
48-64 GB RAM
Windows / Linux

MediaAgent
Data Mover
DDB Manager

(300 500
GB)
DDB-G2
(300 500
GB)

Disk Library Targets


Disk Library Target

2 DDBs on the same deduplication Node


50 streams per DDB, 100 streams per node

Use distinct RAID groups


Each DDB volume must meet IOPs requirement
when measured concurrently

Long Term Retention


Cross Node Copy
Backup
Backup

Backup

DDB-G1

DDB-G2

Node 1

DDB-G1

Primary Copy
30 day retention, no
seal

DDB-G2

Secondary Copy
1-5 year retention
Seal 90-100 TB, or 1 yr

DDB-G1

Cross node
DASH Copy

DDB-G2

Selective
DASH
Copy

Node 1

Node 2

80-100 TB FET with typical retention and two copies,


handled with 2 nodes

40 TB FET with 5 year retention requires ~400 TB of


backend disk, even with deduplication
Can be handled with a single dedupe node

Can go higher with SSD drives for DDB


Only add disk capacity in increments of 100 TB
No unauthorized use, copy or distribution.

Ability to easily move Partitions

79

No unauthorized use, copy or distribution.

Best Practices for Parallel Deduplication


Best Practice

Description

Determine right use


case for Parallel
Dedupe

Most useful when you have data of similar data type and dedupe properties that
need capacity and/or throughput that cannot be achieved with a single node.

LAN free clients are constrained by read throughput, increased throughput from
parallel dedupe may not help

Use shared storage


wherever possible
for disk library

NAS shares ensure backups and recoveries continue to work seamlessly, even if
a partition or dedupe node is not available

Configure single
Disk Library
between Grid nodes

A disk library is simply a configuration entity

Mountpaths can be configured for write access to separate MAs in the dedupe
grid (especially when using block storage)

Distribute space
evenly across the
grid nodes

Ensure all MAs have the same number of mountpaths and disk capacity
available

When adding new disk capacity, distribute equally to all MAs in the grid, versus
adding to a single MA.

Use SSD/Flash
based drives for
DDBs whenever
possible

SSDs allows increased capacity, throughput and concurrency per node

Data Aging, DDB reconstruction and DDB backups are significantly faster than
on spinning drives

Dedicated DIPs
between Grid Nodes

Must have dedicated NIC for DDB lookups between the Grid nodes

Configure DIPs on the dedicated NIC for the DDB partition lookups (and index)
80

No unauthorized use, copy or distribution.

Monitoring Deduplication
Feature

Benefit

Alerts on DD
Corruption

Notify when the DDB corruption occurs so any remediation can be performed
before the backups start to pause (or failover to other partition)

Graphical
Dashboards

Graphical Web Reports that monitor each of the DDB performance


characteristic

Dashboard views across all partitions better monitoring

Pre-defined
thresholds for # of
Records

Alert when the DDB record count reaches 60% of max capacity

Stop adding new clients to store when alert is seen

Detailed Reporting
on Dedupe
effectiveness

Report on Deduplication effectiveness for individual stores as well as across all


stores in the cell

Report dedupe effectiveness for primary copies/secondary copies

Custom queries to enable chargeback based on front end size, application size
or baseline size after dedupe for each client (and on each copy, including for
VMs)

Automatic
Performance
Monitoring of DDB
Volume

Run IOMeter periodically to ensure necessary IOPs continue to be available

Wizard driven store


configuration

Use the best setting for a store based on data type and their characteristics
(block size, compression, source vs. target, etc)
81

No unauthorized use, copy or distribution.

Auxiliary Copy Operation


For NON-Dedupe target All
Dedupe data is decrypted and
expanded during copy
For Dedupe target the option to
expand only unique blocks is
available
Dedupe
Copy

Media Agent

Read

Source Media Agent acts as


Client
Aux Copy Manager determines
content and stream sequence
Chunk level copy no data
manipulation

DeCrypt

Re-Hydrate

NON-Dedupe
Copy

**

Write

Dedupe
Copy

Write

Encrypt

*
**

Signature
Comparison

Hash

Encrypted Data Only


Offline Encryption (Optional)

No unauthorized use, copy or distribution.

Using DASH Copy

No unauthorized use, copy or distribution.

Storage Policies - Local cache for DASH


Now available for
DRO as well as
NWO (v9 was NWO
only)

84
No unauthorized use, copy or distribution.

AuxCopy vs. Silo Backup


Considering Space Saving Restore Paths
Full-Form copies with direct
access restore from any copy

Copy 1
Dedupe

AuxCopy rehydrates jobs which


drives higher storage/ handling/
infrastructure costs
Good fit for DataArchiver policies
which require fast granular
recovery from tape or when the
fastest recovery from tape is
needed (immediate DR)

Tiered Dedupe Silo


Copy

Lower infrastructure,
handling and media
costs
Good fit for vaulting
long retention needs

AuxCopy
Job

Reduced form (~5-10% Total Backup Size)


Retention X days
Shortterm / fast recovery

Job

Job

Job

Full form (100% Total Backup Size )


Retention Y days

Copy 1 Dedupe-Store

Works at vols folder


group level
Older volume data sets
restage back to disk for
restore

Copy 2
Sync/Selective Copy

Disk
Dedupe/Silo

Shadow
Instance

Silo Backup
V_1

V_3

V_5

Reduced form (~5-10% Total Backup Size)


Partitioned into volume folders
Retention Y days
Managed Disk Threshold Rules to
Provide Short-Term / fast recovery

Restage

V_5

V_3

V_1

Reduced form (~5-10% Total Backup Size)


Copied volume folders data sets
Retention same as prior

No unauthorized use, copy or distribution.

SILO Backup Mechanics


How does SILO backup work?

DDB1

Vol1

Vol1

Vol2

Vol2

Vol3

Vol3

Vol4

Vol4

Vol5

Vol5

DDB2
Vol6

Vol7

Vol8

Vol9

Vol10

Vol6

Vol7

Vol8

Vol9

Vol10

What marks a Vol full?


Volume data on disk reaches 512 MB (configurable)
OR a job has Start New Media or Mark Active Media
Full.
AND Data inside a volume has not been accessed for 8
hours (configurable)

Nightly backup job writes dedupe data under


Vol folders
Vol folders marked closed when criteria is met
Daily Silo job sweeps closed vols that contain
dedupe data to tape.
After a specific interval, SILO store is sealed
Next job creates a new DDB and dedupe store. A
new baseline copy of data is written and Siloed
A sealed store is eligible for deletion from disk
When free space reaches minimum threshold,
older data starts deleting from the sealed store.

What seals a Silo store?


The SILO is active for 30 days (configurable)
OR dedupe datastore size reaches TB (configurable)
OR User explicitly seals the store from the GUI
OR Software detects a corrupt DDB

No unauthorized use, copy or distribution.

SILO Backup Mechanics


What happens during restore from SILO
Job 30
Day2

Day1

Day3

V
o
l
s

Day30

How much data is restaged when restoring from


SILO tape?
Consider worst case, where a data set changes daily (i.e.
Database) and the backup on day 30 will have links to
segments in volumes for each prior 30 days.
Assume worst case, daily tape export used for compliance
needs (increasing # tapes to touch).
Recovery over the last 30 days would come off disk this
is why you plan and provision to hold in cache.

Are all tapes restaged for a D-30 restore from SILO?


Staging Area
Day 30
Vol

Day Day 3
Vol
Vol

Day 2
Vol

Day 1
Vol

Restore

Restage Day 30 volume containing chunks for data set


being restored
If chunk contains pointers, restore volumes from
previous days containing the referenced data
segments.
Work back through all volumes from previous days that
contain data segments for the data and restage
Read data segments from restaging area and restore

In the worst case, all tapes are mounted and read, but only relevant (512MB) volumes are restaged from the
point in time of the restore back to the start of the store (~30 days)

No unauthorized use, copy or distribution.

Dedupe Building Block Approach


What does this mean?
A certain level of Hardware (Physical layer)
+
A certain software configuration (Logical layer)
=
An expected achievable performance
This modular building block approach can be replicated to scale
up the amount of data that can be captured within the environment.
Hardware agnostic. Just sets out a class of hardware rather than
specific models.

No unauthorized use, copy or distribution.

Dedupe Building Block Approach

No unauthorized use, copy or distribution.

Deduplication - IOMeter
IoMeter Profile: 4K Block Size, 100% Random, 100% Access, 50% Read, 50% Write

No unauthorized use, copy or distribution.

Deduplication Simulation
Stand alone JAVA
Simulator

SIDB2 run in
Simulation mode
No unauthorized use, copy or distribution.

Module 4
iDATA AGENT (iDA)

No unauthorized use, copy or distribution.

Topics

What is supported?
Edge Protection
OnePass - File
OnePass Mail
Virtualisation
CDR
Reference Copy
Installation Methods
Removing Software
Upgrading

No unauthorized use, copy or distribution.

System Requirements
Always CHECK BoL for latest Information

No unauthorized use, copy or distribution.

Topics

Edge Protection (File System Core)

No unauthorized use, copy or distribution.

Edge Protection

No unauthorized use, copy or distribution.

Edge Protection

What is File System Core (a.k.a DLO).


It is a File System iDA with specific features
targeted at end users (rather than server) data
management.
Not designed to be a full OS backup solution
(e.g. no system state backup). Target specific
end user data.
Ability to give end users full or limited control
over their data

No unauthorized use, copy or distribution.

Edge Protection
Extensive scheduling
options to suit end
user working
practices

No unauthorized use, copy or distribution.

Edge protection
Automatic Backup Based on Content Modification
Job only launched if files to backup are detected

No unauthorized use, copy or distribution.

Edge protection Recovery using plug-in


Restore files from Windows
Explorer without need for
webconsole

No unauthorized use, copy or distribution.

Smart Content Definition


Smart Content Definition

No unauthorized use, copy or distribution.

Backup and Restore Dropbox Folder


When the Dropbox application is installed,
the user has the option of deciding where to
locate the Dropbox folder, and an
environment variable is defined at the
system level for ease of access.

We can now follow that variable in the


subclient content to backup to the contents of
that folder.

No unauthorized use, copy or distribution.

Data Synchronisation
It is now possible to Sync data on up to 3
users computers (uses backup/restore
process). Sync capabilities:
Two-Way SyncThe computer sends files to and receives
files from other participating computers.
One-Way Sync to other computersThe computer sends
files to but does not receive files from other participating
computers.
One-Way Sync from other computersThe computer does
not send files to but receives files from other participating
computers.
No unauthorized use, copy or distribution.

Webconsole

No unauthorized use, copy or distribution.

Topics

CDR (Continuous Data Replication)

No unauthorized use, copy or distribution.

Continuous Data Replicator CDR

No unauthorized use, copy or distribution.

CDR - Replication Modes


Fundamentals

Continuous Data Replicator (CDR)

Replication is near real time file-based byte-level asynchronous


Changes are tracked through the USN journal on file systems
After initial sync or SmartSync data is moved via replication logs
Block-filter driver & bitmap monitors changes to a volume help ensure
that the next data protection operation can be an incremental
Data transfer is initially read out of a non-persistent snapshot on source
Recovery Points always created on destination

Discrete Data Replicator (DDR, aka SDR)

Replication scheduled file-based byte-level asynchronous


Changes are tracked through the USN journal on file systems
No Block-filter & bitmap!
No Replication logs!
No handling of open files!
No unauthorized use, copy or distribution.

Selecting Data for Backup &


Archiving

No unauthorized use, copy or distribution.

Topics

Client structure
Selecting Agents
Identifying content
File archiving
Filters
Assigning content to secondary storage
Archive Filesystem
Archive - Email

No unauthorized use, copy or distribution.

Understanding Client Structure

Hierarchical Control

Client

Uniquely addressable host

iDataAgent
iDataAgent

File System or Application data

Data Set
Data Set

Backup, Archive, Replication,


or Instance (database)
Data access and collective
view of subclients

Subclient
Subclient

Database, TableSpace,
File group, Datafile, File,
Message, document, or
object level
No unauthorized use, copy or distribution.

Selecting Agents
Creates copy in protected storage
Used to maintain Business Continuity
Moves data to cheaper, long term storage
Maintains transparent accessibility
Maintains copy of data at alternate location
Minimizes large data movement
Creates volume level clone/snapshot
Enables proxy processing of data
No unauthorized use, copy or distribution.

Identifying Data Content


Content is defined by Subclients
Content is mutually exclusive within a Data Set
Default subclient includes undefined content

Content is Identified by Scanning


Scanning determines what objects within the
defined content need to be put in protected
storage

Locked/Open Content handling


Not all content is in a suitable state to be
copied/moved to protected storage

No unauthorized use, copy or distribution.

Identifying Data Content


SubClient Policy Common Content across multiple clients

No unauthorized use, copy or distribution.

Identifying Data Content


On Demand Backupsets

No unauthorized use, copy or distribution.

The Importance of Filters


Filters
Save Backup Time
Save Storage Space
Save Restore Time
Exclusion Filters defined
By Policy
By Subclient
Exceptions to Filters defined
At Subclient Policy > Properties level

No unauthorized use, copy or distribution.

Associating Content to Storage


Streams
Data Paths Priorities
Options
Compression
Encryption
Deduplication
Resource tuning

No unauthorized use, copy or distribution.

Topics

OnePass File

No unauthorized use, copy or distribution.

OnePass File
System
What is it?
A combination of Archiver and Backup.

How does it work?


The data gets backed up only once as part of the backup operation and the
files that meet the archiving rules are stubbed in place. Stubs point to the
data that was already moved as part of the backup.

No unauthorized use, copy or distribution.

OnePass Retention

Subclient Retention period = 10 Days

File System
OnePass Collection

File - Storage Policy 30 Day Retention

No unauthorized use, copy or distribution.

OnePass Retention
File System
OnePass Collection
Stub Operation
Incremental Collection
File - Storage Policy 30 Day Retention

No unauthorized use, copy or distribution.

OnePass Retention
User deletes stub 25 Days after archive
File System
OnePass Collection
Stub Operation
Incremental Collection
Stub Deleted

File - Storage Policy 30 Day Retention


Stub is retained
for 10 days in
storage policy
as defined in
the subclient RP

No unauthorized use, copy or distribution.

OnePass Retention
File System
OnePass Collection
Stub Operation
Incremental Collection
Stub Deleted
Original file is
removed 30
days after
stub is pruned
from storage
policy

File - Storage Policy 30 Day Retention


Data aging and Synthetic
Full job must be completed
for pruning operations to
complete AND check for
deleted stubs in job
advanced settings
No unauthorized use, copy or distribution.

OnePass File System Driverless


What is it?
As OnePass but no driver is installed.

No unauthorized use, copy or distribution.

OnePass File System Driverless

Note that if the driver is


installed these options will
not be visible

No unauthorized use, copy or distribution.

One Pass File System

No unauthorized use, copy or distribution.

One Pass File System

No unauthorized use, copy or distribution.

OnePass - File Retention (Backup)

No unauthorized use, copy or distribution.

OnePass - File Retention (Archive)

No unauthorized use, copy or distribution.

OnePass - File Retention

Deleted files now clearly indicated.

No unauthorized use, copy or distribution.

OnePass File System


Comprehensive recovery filters

No unauthorized use, copy or distribution.

OnePass File System


Easy to select a
given timespan
rather than having
to specify specific
start and end
dates.

No unauthorized use, copy or distribution.

Topics

OnePass - Mail

No unauthorized use, copy or distribution.

OnePass Mail
What is it?
A combination of Archiver and Backup. (Compliance archiver is still the same)

How does it work?


A one-time full backup is completed of the entire mailbox contents or of
specific folders and message types within the mailbox. Once complete an
incremental and synthetic or dash full schedule is employed.

No unauthorized use, copy or distribution.

OnePass Mail
NOTE!!
Messages collected with OnePass are retained by
their Sent/Received time value only. Traditional
job-based retention no longer applies.
Messages are aged purely by their Sent/Received
time regardless of when they are collected and
placed in the ContentStore.
Set SP copy retention period to 0days & 1cycle and
manage by subclient retention.

No unauthorized use, copy or distribution.

OnePass Mail
Source pruning is configured as part of OnePass
subclient policies. Executed as part of the OnePass
operation, source pruning will delete stubs and/or live
Exchange email messages based on the configured
value.

No unauthorized use, copy or distribution.

OnePass Mail
Opening a stub no
longer triggers a recall.
Instead, the stub is
opened and the user
can read through the
contents to determine if
they need to download
the original message,
one or all of the
attachments, forward or
reply, copy the contents,
or otherwise. Download
does trigger a recall.
No unauthorized use, copy or distribution.

OnePass Mail
The Outlook Add-in package has been reduced to 4MB.
All of the buttons, prompts, and menus have been
removed from the Add-in and only the essential
functions remain.
Benefits:
Light weight and easy to deploy.
Removing buttons and menu options from the end
user views cleans up their experience and lowers help
desk calls.
No end user training required
No unauthorized use, copy or distribution.

Stub Recovery
Persistent recovery job
stays active for 24
hours. Need to take a
20sec hit for the first
recall to establish the
pipeline.

No unauthorized use, copy or distribution.

Topics

Reference Copy

No unauthorized use, copy or distribution.

Reference Copy

Using reference copy, you can achieve the


following:
Organize data by keeping contextual information together
Filter and keep similar objects in one bucket
Maintain data integrity as reference copied data is in same format
as source data
Retain data from source backups for longer time
This feature allows you to effectively organize, index and
preserve data in groups for easy access on separate media, for
regulatory compliance or long term retention.

No unauthorized use, copy or distribution.

Reference Copy
Files and mail based on a set
selection criteria are effectively
restored and re-backed up to a new
Storage Policy.

No unauthorized use, copy or distribution.

Module 5
Job Management

No unauthorized use, copy or distribution.

Topics

Creating Jobs
Using Synthetic Full
Using DASH Full
Auxiliary Copy
Using DASH copy
Controlling Jobs
Task Management
Communication Services
Robust Network Layer

No unauthorized use, copy or distribution.

Creating and running Jobs


Job Types
Data Management
Data Recovery
Administrative
Job Initiation
Client, Agent, Data Set, or Subclient level
Independent
Policy based
Command Line

No unauthorized use, copy or distribution.

Using Synthetic Full


DA
Most current version of
objects Present at last backup

Synthetic
Full
Incremental
from client
before or
after
Synthetic
Full

Full

Inc
Tape 1

Inc

Inc

Inc
Tape 2

Tape 3
No unauthorized use, copy or distribution.

Using DASH Full


For Deduplicated disk storage
Only reads/updates hash signatures/references

No unauthorized use, copy or distribution.

Auxiliary Copy
Primary
Job Stream

Aux Copy Stream

(Alternate Source)

Updates Target Copy


Moves only valid data
Sequential or Parallel Streams
Scheduled vs. Inline

No unauthorized use, copy or distribution.

Using DASH Copy

No unauthorized use, copy or distribution.

Restore & Recovery

No unauthorized use, copy or distribution.

Topics

Finding Data to Restore


Restore Methods
Using Indexes
Understanding Archive Recall
Understanding Full System Recovery
DDB Recovery

No unauthorized use, copy or distribution.

Finding Data to Restore


Find
Uses Media Agent indexes
Metadata only
Search
Uses Content Indexes
Metadata and text
Restore Browse
Uses Media Agent indexes
Expanding Hierarchical
data structure

Lost Data

display of

No unauthorized use, copy or distribution.

Restore Methods
Restore (Direct)
Known path and filename.
Supports Wildcards
Restore By Job
Multi-stream restore capable.
Can include aged, killed, or failed jobs
Restore Browse
Questionable path and filename
Key Common Options
Destination, Copy Precedence, Filters, and Mapped Files

No unauthorized use, copy or distribution.

Using Indexes
D:\DIR
Show
1/1/06
1/2/06
1/3/06
1/4/06
Deleted
A.txt
A.txt
B.txt
B.txt
C.txt
C.txt
D.txt
D.txt
E.txt
E.txt
F.txt
F.txt
G.txt
G.txt
H.txt
H.txt

FileName

A.txt

B.txt

C.txt

D.txt

E.txt

F.txt

G.txt

H.txt

Protected
Storage

Exact Index
No unauthorized use, copy or distribution.

Understanding Full System Recovery


Similar/Different Hardware Issues
Configuration and size of Mass Storage devices
Dealing with device driver issues
Windows System State
Optional and partial restore supported
Domain Controller/Active Directory restore modes
UNIX/Linux Root Partition
Default install on different partition
Ref BoL as this will vary with Unix platforms

No unauthorized use, copy or distribution.

Understanding Archive Recall

No unauthorized use, copy or distribution.

Dedupe DB Recovery

Restore DDB from latest backup


Automatically (Default)
Manually
Alternatively, manually seal the store.
Restore and roll forward using information in the DiskLib.

Suggest minimal retention period in DDB storage policy


as only last backup used for recovery.

No unauthorized use, copy or distribution.

Controlling Jobs
Activity

Hierarchical Control Model


CommCell ->Subclient
Task based
Time based
Active Jobs
Job Control
Queue Management
Job Controller
Activity control
Enable / disable activity at all levels
(commserve, client, group, subclient)

Operation
Holiday

Schedule

Window

No unauthorized use, copy or distribution.

Database management
Do FULL Backups of the database with the normal file system iDA.
Incr backups not supported
No index jobs should be running
Just retain last backup (0d 1c)
Only read/write node needs backing up regularly as read only nodes
do not change.

No unauthorized use, copy or distribution.

Module 6
Monitoring, Reports & Alerts

No unauthorized use, copy or distribution.

Topics

Dashboards
Using Alerts
Using Reports
Using VaultTracker
Using the CommCell Console

No unauthorized use, copy or distribution.

Dashboards

No unauthorized use, copy or distribution.

Dashboards

No unauthorized use, copy or distribution.

Using Alerts

No unauthorized use, copy or distribution.

Alerting console alerts


Similar to email but can send alerts
to the Commcell console

No unauthorized use, copy or distribution.

Alerting console alerts

Can override
default
settings

Ret Period
Display
#alerts

No unauthorized use, copy or distribution.

Alerting Subscription based


Alerts used in the Web Console by
end-users.
During configuration, these alerts are
automatically associated to all clients in
the CommCell as well as to their client
owners.

No unauthorized use, copy or distribution.

Alerting Subscription based

No unauthorized use, copy or distribution.

Using Reports

No unauthorized use, copy or distribution.

Reporting - Classic

No unauthorized use, copy or distribution.

Reporting - Web

No unauthorized use, copy or distribution.

Metric reporting
metric reporting
replaces CommNet in
v10

No unauthorized use, copy or distribution.

Reporting - Custom
http://<Web_Client_Name>:<Apache_Port_No>/customreports

No unauthorized use, copy or distribution.

Reporting File Level Analytics

File Level Analytics Report


Much of the information that was available
in file level analytics, is now available in the
new File Level Analytics Report.
Activate Data collection from the
client properties panel.
No unauthorized use, copy or distribution.

Reporting Exchange SRM

No unauthorized use, copy or distribution.

Vault Tracker
2 flavours...Enterprise or Lite
Policy based Tape vaulting
Schedule to automatically eject tapes
Alternative to the more conventional Storage information (pick-list)
reports.

No unauthorized use, copy or distribution.

Module 7
Installation

No unauthorized use, copy or distribution.

Agent Installation
Control installation
by allowing only
authorised users.
Req :
Administrative
Management
capabilities

177
No unauthorized use, copy or distribution.

Installation Types :

Local install
Push Install * most widely used
Silent install (script based install from command line)
Decoupled mode (install without connectivity to CS)
Read-only mode install (does not consume license)

Multi-instance install

No unauthorized use, copy or distribution.

Interactive Install
Run Setup.exe
Use appropriate
installation disk
Installation files
can be copied to
disk and shared
for remote install

No unauthorized use, copy or distribution.

CommCell Console Push Install

180
No unauthorized use, copy or distribution.

Silent Install
Run initially from
interactive Install
Records Install
answers in an
XML file
Answers can be
edited/customized
and then played
using the XML file
Setup.exe /Silent /play "path\filename.xml
as input. >>>
(remove /silent to utilise a GUI)

No unauthorized use, copy or distribution.

AD GPO/SCCM Install

GPO Push Add-ins


SCCM Push Silent install batch file
182
No unauthorized use, copy or distribution.

Custom Package Install


Smaller packages
for easier
distribution
Self-extracting
executable
Re-usable

183
No unauthorized use, copy or distribution.

Decoupled Install
Pre install binaries
Need to run wizard in
Console or use XML
file generated by
Decoupled install
process to
subsequently register
in the SQL database.
Useful when building
servers prior to
shipment to site.
184
No unauthorized use, copy or distribution.

Multi-instance Install
Multi Instancing provides the ability to install two or
more instances of the Agent software in the same
computer. Each instance can operate simultaneously
on the computer, independent of each other.

185
No unauthorized use, copy or distribution.

Update Management
Resource
Maintenance
Advantage

Status
Client Property
CommCell
Configuration
Report

Space Savings
Old versions are
deleted after 60
days
186
No unauthorized use, copy or distribution.

Cluster installs
Cluster installations are now different in v10.
Behave in the same way as DAG / RAC
Install on physical nodes and create a cluster client.

No unauthorized use, copy or distribution.

Removing Software

Uninstalling or Releasing License does


not delete protected data
188
No unauthorized use, copy or distribution.

Upgrading Components
Make current copies of your
DR Backup
Upgrade CommServe first
Upgrade all Media Agents
Patch to ensure all core
components are at same
level.
Upgrade Client Agents as
soon as possible

No unauthorized use, copy or distribution.

Upgrading Components
In-Place
setup.exe will automatically upgrade
existing v8 or v9 components to v10.
Otherwise its a 2 x stage upgrade
Always a top down approach.
Commserve
Media agents
Client iDAs

No unauthorized use, copy or distribution.

Upgrading Components
Out-of-Place
New hardware.
De-Risk upgrade (easier fallback)
Again, top down approach.
Commserve
Media agents
Client iDAs
Unsupported clients leave at existing version.

No unauthorized use, copy or distribution.

Upgrading Components

DBUPGRADE utility
can be installed from
DVD5
No unauthorized use, copy or distribution.

Module 8
Simpana Ports , Processes & Firewall

No unauthorized use, copy or distribution.

Topics
Configuring Firewalls
Installation through a Firewall

No unauthorized use, copy or distribution.

Configuring exclusions for Windows Firewall

No unauthorized use, copy or distribution.

Configuring Communication through


a Firewall Direct 2 way

direct connection setup where the client, CommServe and


MediaAgent open tunnel connections between them
No unauthorized use, copy or distribution.

Configuring Communication through


a Firewall Direct 1 way
direct connection
setup where the client
opens a one way
tunnel connection
towards the
CommServe and the
MediaAgent (or Visaversa)

No unauthorized use, copy or distribution.

Configuring Communication through


a Firewall
CommServe and
MediaAgent are
located inside a
companys internal
network, and the
entire network is
exposed to the
outside world through
a single IP address

No unauthorized use, copy or distribution.

Configuring Communication through


a Firewall
Simpana proxy is a
special proxy
configuration where a
dedicated iDataAgent
is placed in a
Demilitarized Zone
(DMZ), and the
firewall(s) is
configured to allow
connections (from
inside and outside
networks) into the
DMZ. operating
outside to clients
operating inside.

The proxy, which is the agent running in


the DMZ, authenticates, encrypts, and
proxies accepted tunnel connections to
connect the clients
No unauthorized use, copy or distribution.

Configuring Communication through


a Firewall
Supports Direct,
Proxy host or
Port-forwarding
Gateways
All traffic can be
tunneled though a
single port
Certificates used to
authenticate clients
Configurable in GUI
and pushed to remote
components

No unauthorized use, copy or distribution.

Performing Installation through a


Firewall
Configure CommServe
communication to
component first
Use Check Readiness
Use Firewall Certificate
for lock down
Use HTTP/HTTPS Tunnel
for NAT

No unauthorized use, copy or distribution.

Data Interface Pairs

No unauthorized use, copy or distribution.

Communication Services
Static Ports for
Base Services
can be
changed
Dynamic port
usage range
can be defined

No unauthorized use, copy or distribution.

Robust Network Layer


Works through
unreliable
communication links
Set on CommServe,
Media Agent, and
Client

No unauthorized use, copy or distribution.

Configuring Data Encryption


Inline Encryption
Offline - Copy Based
Encryption
Hardware Encryption
Media Password
Best Practices

Client

Storage Policy

Inline Encryption

Client

Storage Policy
CommServe

Auxiliary Encryption

Client

Key
Management

Storage Policy

Hardware Encryption

No unauthorized use, copy or distribution.

Module 9
Virtual Server Agent & Intellisnap

No unauthorized use, copy or distribution.

Topics

Virtualisation

No unauthorized use, copy or distribution.

Virtualisation- VMWare

No unauthorized use, copy or distribution.

Virtualisation Hyper-V

No unauthorized use, copy or distribution.

VMware Converged Management Client


vCenter Cluster Centric Not VSA Centric
Benefits

Easy to configure Virtual


Administrator centric View.
Similar format as DAG or NDMP
Centralized Management No
need to know VSA Proxy details
to manage VM protection policy
Centralized Restore Location
No need to know where the VM
was when performing restore
Easier Operations Mask the
backup infrastructure details
from the operational details
Easier to delegate day to day
operations, key for MSPs

vCenter

No unauthorized use, copy or distribution.

Additional Resiliency
Load Balancing and Client Failover
Description

Associate multiple VSA proxies with subclient


content for Failover and Load Balancing capabilities

Common Index across the multiple VSA Proxies

Benefits

Failover of VSA Proxy If one proxy is not


available, automatically switch to a
different proxy in the group
Common Index across Proxies Enables
VM recovery regardless of where the VM
was at the time of backup and which Proxy
backed it up
Combine with Parallel DB for scalable
and available architecture: VSA/MA on
the same node with parallel DDB, Gridstor
and DDB resiliency offers a truly resilient
and scalable architecture
Pre-defined provisioning policies allow
admin control: Managed VMs
provisioned by CV or using other tools
Built for the cloud: MSP focused
management capabilities

No unauthorized use, copy or distribution.

Enhanced Discovery Options


Combine Multiple Discovery Criteria in a single subclient
Description

Content Selection based on familiar vCenter Views


Allows multiple discovery criteria in a single
subclient, including ability to include/exclude
specific VMs

Benefits

Additional Flexibility and Control in


content selection Choose VMs based on
multiple criteria in the same subclient
Different Discovery criteria for subclients in
the same backupset
Preview Option to ensure protection:
Ensure the discovery criteria selects the
intended VMs
Exclude individual VMDKs or entire
Data Stores: Protect only necessary
content for finer control
Automatically distribute workload
across hosts and datastores: Limits the
burden on any single entity, allowing for
better operations and faster windows
Custom policies: Use Command line
tools to dynamically add VMs to
appropriate subclient and appropriate
policy
No unauthorized use, copy or distribution.

OnePass for Virtualisation

Ability to automatically power


off and optionally relocate
inactive VMs.

No unauthorized use, copy or distribution.

VMWare Plug-in

Plug-in available to allow


recovery of files without
console.

No unauthorized use, copy or distribution.

Virtualization v10
Feature

Benefits

VMware
Converged
Management Client

Eliminate the need for Master VSA

Central location to configure protection policies regardless if the VSAs used


for backup

Use multiple VSA proxies in the same subclient (separate configuration from
data movement)

Dynamic Load
Balancing and
Failover across
multiple VSA
nodes

Distributed backup workload equally across multiple VSAs, datastores and


ESX servers for faster operations and smaller windows

Automatically failover to alternate VSA if one of the VSA is not available,


while preserving index.

Additional
Discovery Options
including custom
discovery criteria

Manual Discovery displays the same view as seen in vCenter (including


folders)

Combine multiple discovery criteria (e.g datastores and cluster) to allow more
fine tuning of protection policies

Parallel IntelliSnap
VMware Snapshot
Operations

Leverage # of readers parameter to allow simultaneous quescing (software


snapshots) of multiple VMs for faster software snap creation/deletion
reducing overall IntelliSnap job time

Minimizes the redo log size for large VMs allowing even larger datastores
and VMs to be protected using IntelliSnap for VSA

Filter individual VMs or entire data stores during backup

Additional Filtering
Options

No unauthorized use, copy or distribution.

Virtualization v10
Feature

Benefits

vCloud Integrated
Backup and
Restores

Collect vCloud metadata during backup of VM/vApp

Recovery vCloud VM/vApp directly to vCloud

Leverage auto-discovery criteria and command line to provide custom SLAs


for customers

Flexible New
Restore Options

Thin Disk Restore for NFS Datastores: Trim unallocated portions in VMDK
and recover only used blocks for faster restore times and lower space
consumption

Recover VMDKs and attach to existing VMs for faster restores

Exclude VMDKs during full VM recovery

Leverage Command line options for creating customer SLA policies

Integrate with End-user facing Web portal to enable customers to create their
own protection and recovery windows.

Push install reduced packages into VMs if necessary that include complex
firewall rules for VMs in different vLANs.

See Virtualization Session 2 for details

Enhanced
Command Line
Operations for
Customizability

No unauthorized use, copy or distribution.

VADP Operational View


Duration and Impact highly correlated to VM I/O Workload
Production

Swap
Space

Data
Store

Data Change
Rate

HI

Freeze
Image

Redirected Data
Changes during freeze

Temp
VMDK

Reconcile
Image

LO

Temp
VMDK

VM Snap

VADP Copy Out

1-2 min

10s min>hour

Change Block Tracking


VADP protection copy

Reconcile
5-30 min
No unauthorized use, copy or distribution.

INTELLISNAP

No unauthorized use, copy or distribution.

Intellisnap Copy Progression

SnapProtectionClient Bundle:

SnapCopy

File System
MediaAgent
Application Agent
SnapProtect

On SAN Array
Native Format
Created with Array Snap/Clone

Indexed Live Copies


Live Vol

8AM

File information in Index Cache


Searchable Snaps

Application Consistent

SnapCopy

2PM

Primary Restore Copy

Snap Specs Defined by Array Vendor


8PM

Backup Copy
Stored anywhere
Indexed traditional copies

Off-Host Licensing:
File System
MediaAgent
Offline Recovery Tools (if applicable)
Active Mining (if applicable)

MA

Backup Copies
Disk

Cloud

Tape

Deduplication, Encryption,
Compression
Content Indexing Aware
Application Consistent

No unauthorized use, copy or distribution.

SnapManagers Clarified

No unauthorized use, copy or distribution.

Intellisnap Supported platforms


Check BoL as support growing....
http://documentation.commvault.com/commvault/release_10_0_0/books_onli
ne_1/english_us/prod_info/snap_protect_support.htm

No unauthorized use, copy or distribution.

IntelliSnap + VADP Operational View


Unlock Power of the HW Snapshot to Collapse the Window
Production

Swap
Space

Data
Store

Data Change
Rate

HW Snap

Redirected Data
Changes during freeze

Freeze
Image

Temp

HI

VMDK
VMDK

LO

Reconcile
Image
Temp

VMDK

Change Block Tracking


VADP protection copy

VMDK

VM
Snap
1-2min

HW
Snap Reconcile

30sec

40s

VADP Copy Out

10s min>hour
No unauthorized use, copy or distribution.

Operational Comparisons
VM
Snap

HI
Workload:
1 VM 80GB
DB server

Load Profile
(Iometer):
4K block size
100% random access
60% read, 40% write

VADP Copy Out

Reconcile

10s min>hour

1-2 min

Method
Scope

VADP
Full

VM Snap Time

0:01:40

Hardware Snap Time

5-30 min

IntelliSnap
Full
0:01:40

VADP IntelliSnap
Incr /CBT
Incr
0:01:40

0:00:30

0:01:40
0:00:30

VADP Copy

0:57:54

0:00:00

0:48:45

0:00:00

Reconcile Time

0:23:55

0:00:38

0:25:55

0:00:38

Total Impact Window

1:23:29

0:02:48

1:16:20

0:02:48

VM
Snap

1-2min

HW
Snap Reconcile

30sec

40s

VADP Copy Out

10s min>hour

No unauthorized use, copy or distribution.

Intellisnap VSA Sizing


Environment

500+ VMs

100-500 VMs

< 100 VMs

Physical VSA/MA
Server Config

8+ cores, 32+ GB RAM, sized for


dedupe

4+ cores, 16 GB RAM,
sized for dedupe

2+ cores, 4-8 GB RAM

I/O Paths

Dedicated I/O to Datastores and


backup disk

Dedicated I/O to Datastores


and backup disk

Shared I/O to datastores and


backup disk

Front end data size with


dedupe per VSA

30-40 TB

Up to 25 TB

Up to 5 TB

Front end data size w/o


dedupe per VSA

Up to 25 TB

Up to 20 TB

Up to 5 TB

IntelliSnap ESX Proxy

Dedicated Proxy

Shared Proxy

Shared Proxy (if necessary)

Virtual VSA/MA (must guarantee resources, no resource overcommit)


VM config

8 + vCPUs, 32-48 GB RAM, sized


for dedupe, lightly loaded ESX, 64
SCSI targets

6+ vCPUs, 16-24 GB RAM,


sized for dedupe, 64 SCSI
targets for VMs

2-4 vCPUs, 8 GB RAM

Front end data size with


dedupe per VSA

Up to 30 TB

Up to 20 TB

Up to 5 TB

Front end data size without


dedupe per VSA

Up to 20 TB

Up to 15 TB

Up to 5 TB

IntelliSnap ESX Proxy

Same ESX as VSA/MA VM (1


VSA/MA on ESX Proxy)

Same ESX as VSA/MA VM


(up to 2 VSA/MA on ESX
Proxy)
No unauthorized use, copy or distribution.

Virtualisation - IntelliSnap, VSA or


iDA?
Use SnapProtect / Intellisnap with VSA when:
You need multiple recovery points per day
You need application consistent backups for VMs with SQL, SharePoint and
Exchange (within the VMs)
You have a high change rate in VMs causes long software snap
reconciliation
You do not require DASH full (only Full and Incremental operations are
supported)

Use regular VSA (VADP) when:

Do not have enough snapshot/clone space for SnapProtect operations


You have limited ESX proxies available
You have a Single recovery point a day
You want to utilize Incremental forever with DASH full

Use iDA in guest when:


When you have Storage presented directly to VM including RDMs, Direct
iSCSI or NFS (Consider using SnapProtect)
When you have Large databases or large number of files in the VM
No unauthorized use, copy or distribution.

Module 10
Troubleshooting & Working with Support

No unauthorized use, copy or distribution.

Working with Support

View job details


View logs associated to job
Event Alerts
Save troubleshooting information to disk
Log files , send logs feature (include DR )
What do you need to do before calling support
Support team structure
BCS
ROMS

No unauthorized use, copy or distribution.

Topics

Understanding Error Codes


Understanding Log Organization
Performing Log Analysis
What happens when things go wrong?
Tools
Disaster Recovery GUI

No unauthorized use, copy or distribution.

Understanding Error Codes

Available in
Job Controller
Event Viewer
Job History
Job Summary Report
Alerts
Link to KB article
Use to search KB for related articles
BoL
No unauthorized use, copy or distribution.

Understanding Error Codes

No unauthorized use, copy or distribution.

Understanding Log Organization


Operation Logs
Found in <Install Path>\Log_Files directory
Self Maintaining
Installation Logs
Found in %TEMP% directory or
%PROGRAMDATA%\Simpana\Log_Files
Most Common Errors
Host name resolution
Insufficient space
Permissions

No unauthorized use, copy or distribution.

Performing Log Analysis

GxTail
Know your Patient
Start at the Top
Isolate the Job
Check Job Phases
Check Communications
Check Data Path Resources
Expand the Scope

No unauthorized use, copy or distribution.

Opening a Trouble Report (TR)

Use Web, E-mail or Phone


Level I triage(90%)
Known problem & solution
Classify problem for escalation
Level II Support experts (9%)
Application/OS experts
Level III Development (1%)
Log interpretation/Patch creation

No unauthorized use, copy or distribution.

Using SQL DBMaintenance

Checks for inconsistences


Re-indexes all database tables
Shrinks database
Troubleshooting
Detect lock timeouts/deadlocks

Best Practices:
Run Full check every 6 months
Run Recommended Check every 46 weeks

No unauthorized use, copy or distribution.

Base Folder and Resource Pack Tools

Process Manage (GxAdmin)


DBMaintenance
IOMeter.org (Base Folder)
CommServe Disaster Recovery GUI (Base Folder)
Media Explorer (Available from Support)
TapeToolGUI (Base Folder)

No unauthorized use, copy or distribution.

Module 11
Disaster Recovery

No unauthorized use, copy or distribution.

CommServe DisasterRecovery
documentation in BoL

No unauthorized use, copy or distribution.

Using
CommServeDisasterRecoveryGUI
Restore the database
for:
CommServe Server
SRM Server
Change the Name of the
CommServe server
Activate License
Perform Post-Recovery
Operations

No unauthorized use, copy or distribution.

Dedupe DB after CommServe


DR import

Real DR:

After a DR import, Pre-sp7 :


The Dedupe DB must be sealed to ensure Commserve and Dedupe databases
are in-sync.

Post SP7 , option to do DDB resync (without the need to seal the DDB) after DR
restore . Works by eliminating additional records in the DDB post DR restore of CS
thus keeping the CS DB and DDB in-sync

Fully Documented in BoL


No unauthorized use, copy or distribution.

eDiscovery

No unauthorized use, copy or distribution.

Topics

Terminology
System Requirements
Installation
Search
Management

No unauthorized use, copy or distribution.

Terminology
Was: Content Indexing & Search (FAST)
Now: Search, Indexing, eDiscovery (Lucene Solr)
(although there are still many references to Content Indexing in BOL)
Administrators
End Users
Compliance Officers

Lucene Library Component


Solr Search Component
No unauthorized use, copy or distribution.

Terminology

No unauthorized use, copy or distribution.

CI Upgrade challenges

Content Indexing
New engine in v10.
Fortunately not that many v9 deployments
using the FAST engine.
3 Options for FAST customers going
forward

No unauthorized use, copy or distribution.

CI Upgrade challenges Gradual Migration


Install the search engine using the latest version.
Re-associate the storage policies to use the current version of search
engine. Once this is done, all the new data will be content indexed on
the current version of search engine.
The index created using the previous version of content indexing
engine will be pruned according to the data aging rules.
You will be able to search the content indexed data on the previous
version of content indexing engine and current version of search
engine.
You can gradually re-pick the jobs that were indexed on the previous
version of content indexing engine to be re-indexed into current
version of search engine.
Once all the jobs are re-indexed into current version of search
engine, previous version of content indexing engine can be
uninstalled.

No unauthorized use, copy or distribution.

CI Upgrade challenges Re-Index


Deconfigure and uninstall the existing previous
version of content indexing engine.
Install the current version of search engine.
In the existing storage policies
select the current version of search engine
re-pick all the jobs on the storage policies
run the content indexing job

No unauthorized use, copy or distribution.

CI Upgrade challenges Park the FAST engine


Install the search engine using the latest version.
Re-associate the storage policies to use the current
version of search engine. Once this is done, all the new
data will be content indexed on the current version of
search engine.
You will be able to search the content indexed data on the
previous version of content indexing engine and current
version of search engine.
The index created using the previous version of content
indexing engine will be pruned according to the data
aging rules.
No unauthorized use, copy or distribution.

Logo

No unauthorized use, copy or distribution.

Multi Engine search


Federated Search
Across engines

CommServe V10
FAST Remains
V8/V9

Email engine

FAST
engine
V8/V9

Compliance engine

V10 with
Lucene
FAST engine will age with the
data

V10 CommServe will


index new data
No re-index required
No unauthorized use, copy or distribution.

Searching

No unauthorized use, copy or distribution.

Content store mail / end user search


Architecture
Disk targets are
recommended for
index operations

Physical Node
Based on Ingest

50k Object/Hr

Each active ingest


node has 6tb for the
index

Search Nodes are


capped at 30M
objects

Ingestion halts at
30M objects or 3TB

Full/Read Only
nodes can be
virtualized and
optimized

Virtual Search
Nodes will affect
search speed

Outlook or Web Console

Index performance
is affected by disk
target performance

Physical or Virtual

Physical Hardware

Search
Node

Search
Node
Read
Only

CS Mail / End User Search Cloud


Max 4 Search Nodes
Compliance Search Cloud
Max 8 Search Nodes

Search
Node
Read
Only

Search
Node
Read
Only

No unauthorized use, copy or distribution.

Storage Policy alignment


1 x Storage Policy to 1 cloud forced and highly recommended, but
can be overridden with approval by Corp.
Do not mix data types. 4 cloud types.
File Data Machine
File Data User
Email End user
Email - Compliance
Mixing data will reduce the performance and thus manageable object
count.

No unauthorized use, copy or distribution.

Installation
NOT SUPPORTED this is not black and white
with Search. Any doubts check with Product
Management.
Note that some code is contained in the media
agent. This is installed automatically but disabled
for Data Movement.
We only use 50% of disk space. Need rest for
housekeeping and optimisation.
Nodes are capped to 30m objects or 3TB
(whichever come first)
Then node is read only and Index can be
moved to a VM.

No unauthorized use, copy or distribution.

commvault-parser-app-0.1.jar
Is a file supported by the engine?
Use this app to test.

No unauthorized use, copy or distribution.

Good statistics available.


Note that only successful objects are monitored
for licensing and capping

No unauthorized use, copy or distribution.

Other features

Predictive typing on previously searched items


Will look inside zip files when indexing
When installed, 2 x new search alerts are
automatically generated
Possible to split the indexes. i.e. search on one
volume (small) and HTML previews on another
(large).
No unauthorized use, copy or distribution.

Design aspects
User locked to engine so plan up front split of mail. i.e. cannot
subsequently have some of USER_A mail in engine 1 and
some later in engine_2.
Space cannot be retrieved. Try to keep like retention periods
together so all data expires close together.
6TB recommendation is a one size fits most recommendation.
Not all customers will fit this profile.

Only successfully indexed data is monitored for capacity


license and for node capping.
All attachments linked with an email are classed as one object.

No unauthorized use, copy or distribution.

Workflow
No unauthorized use, copy or distribution.

Topics

What is workflow?

No unauthorized use, copy or distribution.

Workflow
What does it do?

No unauthorized use, copy or distribution.

Workflow

GUI based workflow designer


Enable massive automation
capability
Customize Simpana to your
unique business processes
Rapidly accelerate time to
develop custom capabilities

Workflow Use Case Examples


File System Backup and Restore: Automates entire
flow of backup, cross-server recovery and notification.

Client Group Policy: Performs mass re-assignment of


clients to backup policies.

Set Global Property: Executes configuration change


across the entire environment.

Laptop Registration: Automates user sign-up ,


registration, and notification.

Execute Process on Group: Runs a command across


a mass group of clients.
No unauthorized use, copy or distribution.

Workflow
GUI based
workflow designer
Enable massive
automation
capability
Customise Simpana
to your unique
business processes
Rapidly accelerate
time to develop
custom capabilities

No unauthorized use, copy or distribution.

Workflow

No unauthorized use, copy or distribution.

Workflow

No unauthorized use, copy or distribution.

Troubleshooting & Working with Support


No unauthorized use, copy or distribution.

Partner Tools

No unauthorized use, copy or distribution.

Topics

Technical Reference Library


Maintenance Advantage
You Tube
Online Forums

No unauthorized use, copy or distribution.

CommVault Technical Reference Library


http://http://partners.commvault.com/innervault/commvalue/technical
_reference_library.asp

Free subscription with


Advanced
Certification
Free for Partners with
CommValue
subscription
Subscriptions
available for
purchase on the web

No unauthorized use, copy or distribution.

Maintenance Advantage
https://ma.commvault.com/

No unauthorized use, copy or distribution.

InnerVault
http://partners.commvault.com/innervault.asp

No unauthorized use, copy or distribution.

Online Forums

No unauthorized use, copy or distribution.

Planning and Design

No unauthorized use, copy or distribution.

Topics

Determine Requirements
Collect Data
Evaluate Options
Best Practices
Propose a solution

No unauthorized use, copy or distribution.

Determine Requirements
List all Business
requirements
Prioritise the list by
Business need
Perceived Risk
Definable
Estimated Cost to
solve

No unauthorized use, copy or distribution.

Collect Data
Storage Management Attributes
Data Availability Requirements
Data Retention Requirements
Data Collection Tools

No unauthorized use, copy or distribution.

Storage Management Attributes


(Analyse customer data)

Size of
Data

Location
of Data

Type of
Data

Rate of
Growth

Storage
Management
Attributes

Rate of
Change

Restore
History

No unauthorized use, copy or distribution.

Data Availability Requirements


(determine accessibility)

Service
Level
Agreement

Business
Continuity

Data
Availability
Requirements

Archive

Disaster
Recovery

No unauthorized use, copy or distribution.

Data Retention Requirements


(how long and where should customer data be stored to meet
business needs)

Legal Requirements

Customer
Confidence

Risk
Assessment

Retention
Policy

Government
Requirements
Cost

Company
Requirements

Reputation

Industry
Requirements

No unauthorized use, copy or distribution.

Data Collection Tools

Hardware Inventories
Software Inventories
Network Diagrams
Historical data for existing backup product
Future Plans

No unauthorized use, copy or distribution.

Identifying Existing Resources


Existing Data Path Architecture
SAN/LAN/WAN
Transition points
Alternate routes
Actual Available Bandwidth
Existing Protected Storage Architecture
Non relocate-able storage
Current and Max Capacity
Compatibility

No unauthorized use, copy or distribution.

Evaluate Options

Simpana Software Modules


Budget limitations
Technology limitations
Time constraints
Purchase vs. Re-purpose
Determine scope category
and scope parameters
Product choices

No unauthorized use, copy or distribution.

Simpana Software Modules


Data Protection
Archive Solutions
Replication
Resource Management
Compliance

No unauthorized use, copy or distribution.

Propose Solution
Recommended Solution
Alternate Solutions
Implementation Plan
Pilot
Parallel
Phased
Plunge

No unauthorized use, copy or distribution.

Architecting a Solution
Locating and sizing Libraries
Locating and sizing Media Agents
Data paths
Can I get there from here?
Design Storage Policies
Validating the solution

No unauthorized use, copy or distribution.

Library Best Practices

Use the correct OEM tape drive driver.


Limit # of drives / bus channel.
Ensure all devices are consistently seen.
Vary chunk size and blocks as necessary.
Raid 5 most common for DiskLibs.
Format DiskLibs to 64KB/sector.

No unauthorized use, copy or distribution.

Design Storage Policies


Determine number of Storage Policies to
optimise storage use without compromising
SLAs
Best use of Deduplication features for optimum
results
Determine number of copies in each storage
policy
Determine data path(s) for each copy for
optimum resilience and performance

No unauthorized use, copy or distribution.

Visualise the solution


Create a Visio diagram with all
Simpana components.
Does it feel right?
Can you see obvious bottlenecks or
incorrectly designed components?

No unauthorized use, copy or distribution.

Thank You

No unauthorized use, copy or distribution.

S-ar putea să vă placă și