Documente Academic
Documente Profesional
Documente Cultură
Partner Services
Engineering Course
Simpana V10 R2
Biswanath Das
CV Certified Instructor , Solutions Architect & Specialist
Preliminaries
Who am I?
Who are you?
Why are we here?
How will this course be conducted?
Audience
Who Should Take this Course?
Design
deployment
How do I become Simpana Certified?
This is not a certified course (yet!) but it does provide
knowledge to enable the student to pass Core and
Implementation & Maintenance certifications.
If not done so, Register NOW!
Certification
https://ea.commvault.com/Certification/
Simpana Overview
No unauthorized use, copy or distribution.
Topics
Course Flow
Single Platform
Standard Terminology
Common Technology Engine (CTE)
Classes of product
SnapManagers
Course Flow
Overview
Simpana Concepts and
terminology
Installation
Installing the core
components, configuring
secondary storage and
basic configuration.
Troubleshooting/Upgrades
What can you do when things go
wrong? Where do you go?
Agents
Installation of clients,
configuring policies,
updating and upgrading.
Configuration Essentials
Defining Storage policies, taking
copies, running and managing
jobs. Monitoring, alerting and
reporting.
No unauthorized use, copy or distribution.
database
SEARCH
RETAIN
ANALYZE
RECOVER
DISCOVER
ACCESS
Standard Terminology
What is a
CommServe
GUI Server
Licensing Manager
Security Manager
Common
Technology
Engine
Meta
Data
Restore/Recall
Agent Host
Job
Results
Client
Data Mover
Library Manager
DDB Manager
Indexing Manager
Data Management
Data Path
Tape
Disk
Index
Library Library
Cache
Content Store
Media Agent
No unauthorized use, copy or distribution.
Content Store
** Brian Brockway
Features are released in waves. When upgrading you must check known issues in BoL.
Module1
Commserver , Security & Groups ,
Admin settings
No unauthorized use, copy or distribution.
Topics
System Requirements
Commserve Install
System Requirements
http://Documentation.commvault.com
Note : BoL is downloadable from this site for storing locally.
No unauthorized use, copy or distribution.
Topics
Process Explorer
Console
Getting Started
Internal messaging
Licensing
Add/Remove Software Configuration
DR Backup Settings
Email & IIS configuration
ROMS & Diagnostic and Usage
Process Manager
CommCell Console
Summary
Job Controller
CommCell Browser
Getting Started
Event Viewer
Getting Started
CommCell Messaging
Administrators can send text messages
to logged in users via CommCell | View |
Users Logged in dialog box.
Core
ADM
Enterprise
Core
DAR
Enterprise
Primary Encryption
Secondary Encryption
Deduplication to Disk
Deduplication to Tape
Combine with ADM
Combine with Data Protection Core
Combine with Data Protection Enterprise
Data is Available for Content Indexing
Simpana OnePass Technology for File System Data
Simpana OnePass Technology for Exchange Data
Application Data
Management (ADM)
Topics
Local
User
CommCell
User
CommCell User
Group
Capabilities
Browse
Recover
Report
Management
Library
Administration
End User Access
Search
Job Management
Agent Scheduling
View
Active Directory
Group
CommCell Entities
CommCell
Computer Groups
Clients
Agents
Datasets
Subclients
Libraries
MediaAgent
Policies
41
Activity
Security
Operation Window
Reporting
Updates
Job History
Firewall
Security
No unauthorized use, copy or distribution.
Module 2
Media Agent , Index cache &
Storage Resources
No unauthorized use, copy or distribution.
Topics
Verify
Host Name resolution
Client(s) access path
Data Interface Pairs
Data path(s) to library(ies)
GridStor Technology
Index Cache Size and location
Index Basics
Index Cache is
Used by
indexed-based
Agents
Essential for
performance
Selfmaintained
Index Sharing
Use local Indexes only
for performance
But restartability could be
compromised
Deprecated Options
IndexCache
An event message will be generated in the Event Viewer, to indicate that there is Low Disk Space.
An emergency cleanup will be performed in the following sequence:
First, if the indices are older than the number of days specified in the Index retention time in days,
then those indices will be cleaned up.
Even after the above clean up, if the used disk space still exceeds the percentage specified in Index
Cleanup Percent, then the MediaAgent removes index files in the index cache on a least recently used
basis until the used disk space becomes equal to or below the amount specified in the Index Cleanup
Percent.
When Index Cache Free Space size falls below the amount specified in the Minimum
Free Space, then the following will be performed:
IndexCache
Option for more data being collected.
Focus on the ability to retrieve data based on file level
access and not server.
Default Retention period reduced in V10 due to additional
information. - 35 days (v9) to 15 days (v10)
IndexCache
IndexCache
If job has no data to backup then job will terminate
at the scan phase.
IndexCache
Data path
Library Manager
Library
Library
Media Manager
Library Controller
Robotic Arm
MasterDrivePool or MountPaths
MasterDrivePool or MountPaths
DrivePool or Mount Path
DrivePool or Mount Path
Drive or Writer
Drive or Writer
Media group
Device group
Read/write device
Media source
Disk Library
Tape Library
Blind Library
IP Library
Stand-alone Tape
Library
NAS NDMP
Library
Virtual Tape
Library
Plug & Play
Library
Cloud Library
Removable Disk
Drives
Data Mover
Device Control
Index Manager
Index Cache
Server host
Deduplication
Database host
Snap Mount host
Libraries
Types
Standalone
Robotic
Shared/Dynamic
Settings
Overwrite Media
Start New Media
Appendable Media
Maintenance
Ownership
Capacity
Media Handling
Need for Unique Identity
Media Handing Prompts
Auto or Manual Discovery
Module 3
Storage Policies & Deduplication
Topics
Understanding Retention
Managed at the Storage Policy Copy Level
Retention Criterion
Days
Cycles
Types of Retention
Basic
Archive
Extended
Managed Disk Space
Job Assigned
Stream Management
Understanding Data
Streams
Job Streams
Device Streams
Configuring Streams
Subclients
MediaAgent / Library /
Mount Path
Storage Policies
Secondary Copy
Streams
Combine to Streams
Job
Streams
Device
Streams
Multi-Stream
Subclient
Disk Library
Writers
Subclients
Tape Library
Single-Stream
Subclient
MediaAgent
Drives
Subclient Default
DEDUPE
- Building blocks
- Partioned Dedupe How does Parallel Dedupe
Work
1
DataMover
DataMover
MediaAgent-1 (Primary)
MediaAgent-2 (Primary)
DDB-G1
50 Mount
Paths 2-8TB
DDB-G2
Partition 2
Data transfer
DDB Lookups
50 Mount
Paths 2-8TB
Partition 1
76
DataMover
MediaAgent-1 (Primary)
MediaAgent-2 (Primary)
DDB-G1
50 Mount
Paths 2-8TB
DDB-G2
50 Mount
Paths 2-8TB
Partition 1
Partition 2
Data transfer
4
4
DataMover
Characteristics
Spec
DDB-G1
X64 OS
2CPU, Quad Core
48-64 GB RAM
Windows / Linux
MediaAgent
Data Mover
DDB Manager
(300 500
GB)
DDB-G2
(300 500
GB)
Backup
DDB-G1
DDB-G2
Node 1
DDB-G1
Primary Copy
30 day retention, no
seal
DDB-G2
Secondary Copy
1-5 year retention
Seal 90-100 TB, or 1 yr
DDB-G1
Cross node
DASH Copy
DDB-G2
Selective
DASH
Copy
Node 1
Node 2
79
Description
Most useful when you have data of similar data type and dedupe properties that
need capacity and/or throughput that cannot be achieved with a single node.
LAN free clients are constrained by read throughput, increased throughput from
parallel dedupe may not help
NAS shares ensure backups and recoveries continue to work seamlessly, even if
a partition or dedupe node is not available
Configure single
Disk Library
between Grid nodes
Mountpaths can be configured for write access to separate MAs in the dedupe
grid (especially when using block storage)
Distribute space
evenly across the
grid nodes
Ensure all MAs have the same number of mountpaths and disk capacity
available
When adding new disk capacity, distribute equally to all MAs in the grid, versus
adding to a single MA.
Use SSD/Flash
based drives for
DDBs whenever
possible
Data Aging, DDB reconstruction and DDB backups are significantly faster than
on spinning drives
Dedicated DIPs
between Grid Nodes
Must have dedicated NIC for DDB lookups between the Grid nodes
Configure DIPs on the dedicated NIC for the DDB partition lookups (and index)
80
Monitoring Deduplication
Feature
Benefit
Alerts on DD
Corruption
Notify when the DDB corruption occurs so any remediation can be performed
before the backups start to pause (or failover to other partition)
Graphical
Dashboards
Pre-defined
thresholds for # of
Records
Alert when the DDB record count reaches 60% of max capacity
Detailed Reporting
on Dedupe
effectiveness
Custom queries to enable chargeback based on front end size, application size
or baseline size after dedupe for each client (and on each copy, including for
VMs)
Automatic
Performance
Monitoring of DDB
Volume
Use the best setting for a store based on data type and their characteristics
(block size, compression, source vs. target, etc)
81
Media Agent
Read
DeCrypt
Re-Hydrate
NON-Dedupe
Copy
**
Write
Dedupe
Copy
Write
Encrypt
*
**
Signature
Comparison
Hash
84
No unauthorized use, copy or distribution.
Copy 1
Dedupe
Lower infrastructure,
handling and media
costs
Good fit for vaulting
long retention needs
AuxCopy
Job
Job
Job
Job
Copy 1 Dedupe-Store
Copy 2
Sync/Selective Copy
Disk
Dedupe/Silo
Shadow
Instance
Silo Backup
V_1
V_3
V_5
Restage
V_5
V_3
V_1
DDB1
Vol1
Vol1
Vol2
Vol2
Vol3
Vol3
Vol4
Vol4
Vol5
Vol5
DDB2
Vol6
Vol7
Vol8
Vol9
Vol10
Vol6
Vol7
Vol8
Vol9
Vol10
Day1
Day3
V
o
l
s
Day30
Day Day 3
Vol
Vol
Day 2
Vol
Day 1
Vol
Restore
In the worst case, all tapes are mounted and read, but only relevant (512MB) volumes are restaged from the
point in time of the restore back to the start of the store (~30 days)
Deduplication - IOMeter
IoMeter Profile: 4K Block Size, 100% Random, 100% Access, 50% Read, 50% Write
Deduplication Simulation
Stand alone JAVA
Simulator
SIDB2 run in
Simulation mode
No unauthorized use, copy or distribution.
Module 4
iDATA AGENT (iDA)
Topics
What is supported?
Edge Protection
OnePass - File
OnePass Mail
Virtualisation
CDR
Reference Copy
Installation Methods
Removing Software
Upgrading
System Requirements
Always CHECK BoL for latest Information
Topics
Edge Protection
Edge Protection
Edge Protection
Extensive scheduling
options to suit end
user working
practices
Edge protection
Automatic Backup Based on Content Modification
Job only launched if files to backup are detected
Data Synchronisation
It is now possible to Sync data on up to 3
users computers (uses backup/restore
process). Sync capabilities:
Two-Way SyncThe computer sends files to and receives
files from other participating computers.
One-Way Sync to other computersThe computer sends
files to but does not receive files from other participating
computers.
One-Way Sync from other computersThe computer does
not send files to but receives files from other participating
computers.
No unauthorized use, copy or distribution.
Webconsole
Topics
Topics
Client structure
Selecting Agents
Identifying content
File archiving
Filters
Assigning content to secondary storage
Archive Filesystem
Archive - Email
Hierarchical Control
Client
iDataAgent
iDataAgent
Data Set
Data Set
Subclient
Subclient
Database, TableSpace,
File group, Datafile, File,
Message, document, or
object level
No unauthorized use, copy or distribution.
Selecting Agents
Creates copy in protected storage
Used to maintain Business Continuity
Moves data to cheaper, long term storage
Maintains transparent accessibility
Maintains copy of data at alternate location
Minimizes large data movement
Creates volume level clone/snapshot
Enables proxy processing of data
No unauthorized use, copy or distribution.
Topics
OnePass File
OnePass File
System
What is it?
A combination of Archiver and Backup.
OnePass Retention
File System
OnePass Collection
OnePass Retention
File System
OnePass Collection
Stub Operation
Incremental Collection
File - Storage Policy 30 Day Retention
OnePass Retention
User deletes stub 25 Days after archive
File System
OnePass Collection
Stub Operation
Incremental Collection
Stub Deleted
OnePass Retention
File System
OnePass Collection
Stub Operation
Incremental Collection
Stub Deleted
Original file is
removed 30
days after
stub is pruned
from storage
policy
Topics
OnePass - Mail
OnePass Mail
What is it?
A combination of Archiver and Backup. (Compliance archiver is still the same)
OnePass Mail
NOTE!!
Messages collected with OnePass are retained by
their Sent/Received time value only. Traditional
job-based retention no longer applies.
Messages are aged purely by their Sent/Received
time regardless of when they are collected and
placed in the ContentStore.
Set SP copy retention period to 0days & 1cycle and
manage by subclient retention.
OnePass Mail
Source pruning is configured as part of OnePass
subclient policies. Executed as part of the OnePass
operation, source pruning will delete stubs and/or live
Exchange email messages based on the configured
value.
OnePass Mail
Opening a stub no
longer triggers a recall.
Instead, the stub is
opened and the user
can read through the
contents to determine if
they need to download
the original message,
one or all of the
attachments, forward or
reply, copy the contents,
or otherwise. Download
does trigger a recall.
No unauthorized use, copy or distribution.
OnePass Mail
The Outlook Add-in package has been reduced to 4MB.
All of the buttons, prompts, and menus have been
removed from the Add-in and only the essential
functions remain.
Benefits:
Light weight and easy to deploy.
Removing buttons and menu options from the end
user views cleans up their experience and lowers help
desk calls.
No end user training required
No unauthorized use, copy or distribution.
Stub Recovery
Persistent recovery job
stays active for 24
hours. Need to take a
20sec hit for the first
recall to establish the
pipeline.
Topics
Reference Copy
Reference Copy
Reference Copy
Files and mail based on a set
selection criteria are effectively
restored and re-backed up to a new
Storage Policy.
Module 5
Job Management
Topics
Creating Jobs
Using Synthetic Full
Using DASH Full
Auxiliary Copy
Using DASH copy
Controlling Jobs
Task Management
Communication Services
Robust Network Layer
Synthetic
Full
Incremental
from client
before or
after
Synthetic
Full
Full
Inc
Tape 1
Inc
Inc
Inc
Tape 2
Tape 3
No unauthorized use, copy or distribution.
Auxiliary Copy
Primary
Job Stream
(Alternate Source)
Topics
Lost Data
display of
Restore Methods
Restore (Direct)
Known path and filename.
Supports Wildcards
Restore By Job
Multi-stream restore capable.
Can include aged, killed, or failed jobs
Restore Browse
Questionable path and filename
Key Common Options
Destination, Copy Precedence, Filters, and Mapped Files
Using Indexes
D:\DIR
Show
1/1/06
1/2/06
1/3/06
1/4/06
Deleted
A.txt
A.txt
B.txt
B.txt
C.txt
C.txt
D.txt
D.txt
E.txt
E.txt
F.txt
F.txt
G.txt
G.txt
H.txt
H.txt
FileName
A.txt
B.txt
C.txt
D.txt
E.txt
F.txt
G.txt
H.txt
Protected
Storage
Exact Index
No unauthorized use, copy or distribution.
Dedupe DB Recovery
Controlling Jobs
Activity
Operation
Holiday
Schedule
Window
Database management
Do FULL Backups of the database with the normal file system iDA.
Incr backups not supported
No index jobs should be running
Just retain last backup (0d 1c)
Only read/write node needs backing up regularly as read only nodes
do not change.
Module 6
Monitoring, Reports & Alerts
Topics
Dashboards
Using Alerts
Using Reports
Using VaultTracker
Using the CommCell Console
Dashboards
Dashboards
Using Alerts
Can override
default
settings
Ret Period
Display
#alerts
Using Reports
Reporting - Classic
Reporting - Web
Metric reporting
metric reporting
replaces CommNet in
v10
Reporting - Custom
http://<Web_Client_Name>:<Apache_Port_No>/customreports
Vault Tracker
2 flavours...Enterprise or Lite
Policy based Tape vaulting
Schedule to automatically eject tapes
Alternative to the more conventional Storage information (pick-list)
reports.
Module 7
Installation
Agent Installation
Control installation
by allowing only
authorised users.
Req :
Administrative
Management
capabilities
177
No unauthorized use, copy or distribution.
Installation Types :
Local install
Push Install * most widely used
Silent install (script based install from command line)
Decoupled mode (install without connectivity to CS)
Read-only mode install (does not consume license)
Multi-instance install
Interactive Install
Run Setup.exe
Use appropriate
installation disk
Installation files
can be copied to
disk and shared
for remote install
180
No unauthorized use, copy or distribution.
Silent Install
Run initially from
interactive Install
Records Install
answers in an
XML file
Answers can be
edited/customized
and then played
using the XML file
Setup.exe /Silent /play "path\filename.xml
as input. >>>
(remove /silent to utilise a GUI)
AD GPO/SCCM Install
183
No unauthorized use, copy or distribution.
Decoupled Install
Pre install binaries
Need to run wizard in
Console or use XML
file generated by
Decoupled install
process to
subsequently register
in the SQL database.
Useful when building
servers prior to
shipment to site.
184
No unauthorized use, copy or distribution.
Multi-instance Install
Multi Instancing provides the ability to install two or
more instances of the Agent software in the same
computer. Each instance can operate simultaneously
on the computer, independent of each other.
185
No unauthorized use, copy or distribution.
Update Management
Resource
Maintenance
Advantage
Status
Client Property
CommCell
Configuration
Report
Space Savings
Old versions are
deleted after 60
days
186
No unauthorized use, copy or distribution.
Cluster installs
Cluster installations are now different in v10.
Behave in the same way as DAG / RAC
Install on physical nodes and create a cluster client.
Removing Software
Upgrading Components
Make current copies of your
DR Backup
Upgrade CommServe first
Upgrade all Media Agents
Patch to ensure all core
components are at same
level.
Upgrade Client Agents as
soon as possible
Upgrading Components
In-Place
setup.exe will automatically upgrade
existing v8 or v9 components to v10.
Otherwise its a 2 x stage upgrade
Always a top down approach.
Commserve
Media agents
Client iDAs
Upgrading Components
Out-of-Place
New hardware.
De-Risk upgrade (easier fallback)
Again, top down approach.
Commserve
Media agents
Client iDAs
Unsupported clients leave at existing version.
Upgrading Components
DBUPGRADE utility
can be installed from
DVD5
No unauthorized use, copy or distribution.
Module 8
Simpana Ports , Processes & Firewall
Topics
Configuring Firewalls
Installation through a Firewall
Communication Services
Static Ports for
Base Services
can be
changed
Dynamic port
usage range
can be defined
Client
Storage Policy
Inline Encryption
Client
Storage Policy
CommServe
Auxiliary Encryption
Client
Key
Management
Storage Policy
Hardware Encryption
Module 9
Virtual Server Agent & Intellisnap
Topics
Virtualisation
Virtualisation- VMWare
Virtualisation Hyper-V
vCenter
Additional Resiliency
Load Balancing and Client Failover
Description
Benefits
Benefits
VMWare Plug-in
Virtualization v10
Feature
Benefits
VMware
Converged
Management Client
Use multiple VSA proxies in the same subclient (separate configuration from
data movement)
Dynamic Load
Balancing and
Failover across
multiple VSA
nodes
Additional
Discovery Options
including custom
discovery criteria
Combine multiple discovery criteria (e.g datastores and cluster) to allow more
fine tuning of protection policies
Parallel IntelliSnap
VMware Snapshot
Operations
Minimizes the redo log size for large VMs allowing even larger datastores
and VMs to be protected using IntelliSnap for VSA
Additional Filtering
Options
Virtualization v10
Feature
Benefits
vCloud Integrated
Backup and
Restores
Flexible New
Restore Options
Thin Disk Restore for NFS Datastores: Trim unallocated portions in VMDK
and recover only used blocks for faster restore times and lower space
consumption
Integrate with End-user facing Web portal to enable customers to create their
own protection and recovery windows.
Push install reduced packages into VMs if necessary that include complex
firewall rules for VMs in different vLANs.
Enhanced
Command Line
Operations for
Customizability
Swap
Space
Data
Store
Data Change
Rate
HI
Freeze
Image
Redirected Data
Changes during freeze
Temp
VMDK
Reconcile
Image
LO
Temp
VMDK
VM Snap
1-2 min
10s min>hour
Reconcile
5-30 min
No unauthorized use, copy or distribution.
INTELLISNAP
SnapProtectionClient Bundle:
SnapCopy
File System
MediaAgent
Application Agent
SnapProtect
On SAN Array
Native Format
Created with Array Snap/Clone
8AM
Application Consistent
SnapCopy
2PM
Backup Copy
Stored anywhere
Indexed traditional copies
Off-Host Licensing:
File System
MediaAgent
Offline Recovery Tools (if applicable)
Active Mining (if applicable)
MA
Backup Copies
Disk
Cloud
Tape
Deduplication, Encryption,
Compression
Content Indexing Aware
Application Consistent
SnapManagers Clarified
Swap
Space
Data
Store
Data Change
Rate
HW Snap
Redirected Data
Changes during freeze
Freeze
Image
Temp
HI
VMDK
VMDK
LO
Reconcile
Image
Temp
VMDK
VMDK
VM
Snap
1-2min
HW
Snap Reconcile
30sec
40s
10s min>hour
No unauthorized use, copy or distribution.
Operational Comparisons
VM
Snap
HI
Workload:
1 VM 80GB
DB server
Load Profile
(Iometer):
4K block size
100% random access
60% read, 40% write
Reconcile
10s min>hour
1-2 min
Method
Scope
VADP
Full
VM Snap Time
0:01:40
5-30 min
IntelliSnap
Full
0:01:40
VADP IntelliSnap
Incr /CBT
Incr
0:01:40
0:00:30
0:01:40
0:00:30
VADP Copy
0:57:54
0:00:00
0:48:45
0:00:00
Reconcile Time
0:23:55
0:00:38
0:25:55
0:00:38
1:23:29
0:02:48
1:16:20
0:02:48
VM
Snap
1-2min
HW
Snap Reconcile
30sec
40s
10s min>hour
500+ VMs
100-500 VMs
Physical VSA/MA
Server Config
4+ cores, 16 GB RAM,
sized for dedupe
I/O Paths
30-40 TB
Up to 25 TB
Up to 5 TB
Up to 25 TB
Up to 20 TB
Up to 5 TB
Dedicated Proxy
Shared Proxy
Up to 30 TB
Up to 20 TB
Up to 5 TB
Up to 20 TB
Up to 15 TB
Up to 5 TB
Module 10
Troubleshooting & Working with Support
Topics
Available in
Job Controller
Event Viewer
Job History
Job Summary Report
Alerts
Link to KB article
Use to search KB for related articles
BoL
No unauthorized use, copy or distribution.
GxTail
Know your Patient
Start at the Top
Isolate the Job
Check Job Phases
Check Communications
Check Data Path Resources
Expand the Scope
Best Practices:
Run Full check every 6 months
Run Recommended Check every 46 weeks
Module 11
Disaster Recovery
CommServe DisasterRecovery
documentation in BoL
Using
CommServeDisasterRecoveryGUI
Restore the database
for:
CommServe Server
SRM Server
Change the Name of the
CommServe server
Activate License
Perform Post-Recovery
Operations
Real DR:
Post SP7 , option to do DDB resync (without the need to seal the DDB) after DR
restore . Works by eliminating additional records in the DDB post DR restore of CS
thus keeping the CS DB and DDB in-sync
eDiscovery
Topics
Terminology
System Requirements
Installation
Search
Management
Terminology
Was: Content Indexing & Search (FAST)
Now: Search, Indexing, eDiscovery (Lucene Solr)
(although there are still many references to Content Indexing in BOL)
Administrators
End Users
Compliance Officers
Terminology
CI Upgrade challenges
Content Indexing
New engine in v10.
Fortunately not that many v9 deployments
using the FAST engine.
3 Options for FAST customers going
forward
Logo
CommServe V10
FAST Remains
V8/V9
Email engine
FAST
engine
V8/V9
Compliance engine
V10 with
Lucene
FAST engine will age with the
data
Searching
Physical Node
Based on Ingest
50k Object/Hr
Ingestion halts at
30M objects or 3TB
Full/Read Only
nodes can be
virtualized and
optimized
Virtual Search
Nodes will affect
search speed
Index performance
is affected by disk
target performance
Physical or Virtual
Physical Hardware
Search
Node
Search
Node
Read
Only
Search
Node
Read
Only
Search
Node
Read
Only
Installation
NOT SUPPORTED this is not black and white
with Search. Any doubts check with Product
Management.
Note that some code is contained in the media
agent. This is installed automatically but disabled
for Data Movement.
We only use 50% of disk space. Need rest for
housekeeping and optimisation.
Nodes are capped to 30m objects or 3TB
(whichever come first)
Then node is read only and Index can be
moved to a VM.
commvault-parser-app-0.1.jar
Is a file supported by the engine?
Use this app to test.
Other features
Design aspects
User locked to engine so plan up front split of mail. i.e. cannot
subsequently have some of USER_A mail in engine 1 and
some later in engine_2.
Space cannot be retrieved. Try to keep like retention periods
together so all data expires close together.
6TB recommendation is a one size fits most recommendation.
Not all customers will fit this profile.
Workflow
No unauthorized use, copy or distribution.
Topics
What is workflow?
Workflow
What does it do?
Workflow
Workflow
GUI based
workflow designer
Enable massive
automation
capability
Customise Simpana
to your unique
business processes
Rapidly accelerate
time to develop
custom capabilities
Workflow
Workflow
Partner Tools
Topics
Maintenance Advantage
https://ma.commvault.com/
InnerVault
http://partners.commvault.com/innervault.asp
Online Forums
Topics
Determine Requirements
Collect Data
Evaluate Options
Best Practices
Propose a solution
Determine Requirements
List all Business
requirements
Prioritise the list by
Business need
Perceived Risk
Definable
Estimated Cost to
solve
Collect Data
Storage Management Attributes
Data Availability Requirements
Data Retention Requirements
Data Collection Tools
Size of
Data
Location
of Data
Type of
Data
Rate of
Growth
Storage
Management
Attributes
Rate of
Change
Restore
History
Service
Level
Agreement
Business
Continuity
Data
Availability
Requirements
Archive
Disaster
Recovery
Legal Requirements
Customer
Confidence
Risk
Assessment
Retention
Policy
Government
Requirements
Cost
Company
Requirements
Reputation
Industry
Requirements
Hardware Inventories
Software Inventories
Network Diagrams
Historical data for existing backup product
Future Plans
Evaluate Options
Propose Solution
Recommended Solution
Alternate Solutions
Implementation Plan
Pilot
Parallel
Phased
Plunge
Architecting a Solution
Locating and sizing Libraries
Locating and sizing Media Agents
Data paths
Can I get there from here?
Design Storage Policies
Validating the solution
Thank You