Backup Exec 2012 Agent for VMware and Hyper-V
|
|
- Lily Doyle
- 8 years ago
- Views:
Transcription
1 Backup Exec 2012 Agent for VMware and Hyper-V Technical Feature Brief change without notice. Copyright 2011 Symantec Corporation. All rights reserved. Symantec, the Symantec logo and Backup Exec are trademarks or registered
2 Contents Introduction... 3 Business Value... 4 Underlying Backup Principles... 8 Virtualized Application Protection Virtual Machine Recovery Options Licensing Considerations The Agent for VMware and Hyper-V and Other Backup Exec Agents and Options Backup Exec Management Plug-in for VMware Example Configurations Performance Recommendations Notes and Best Practices For More Information... 40
3 Introduction This technical feature brief is intended to assist partners and service providers as they design and implement Backup Exec 2012 and the Agent for VMware and Hyper-V and make related decisions. The business value and licensing of the Agent for VMware and Hyper-V will be touched upon lightly in this feature brief. This technical feature brief will help partners and service providers as they make design and implementation decisions for Backup Exec 2012 and the Agent for VMware and Hyper-V through the exploration of the following topics: Business Value of the Agent for VMware and Hyper-V Underlying Principles and Technology Licensing Considerations Example Configurations Performance factors Best practices For step by step instructions for installing and managing Backup Exec 2012 and the Agent for VMware and Hyper-V, please refer to the Backup Exec Administrator s Guide. Note: The Agent for VMware and Hyper-V will be commonly referred to as the Virtual Agent in this document.
4 Business Value Virtualization technology has been widely adopted by organizations of all sizes to optimize critical IT assets, such as data and application servers. As a result of this virtualization trend, companies are looking for efficient and effective ways to backup and recover their virtual servers. This includes the virtual machines themselves as well as the critical applications that many of these virtual machines host, such as Microsoft Exchange, SQL Server, SharePoint, and Active Directory. Because virtual host servers are used by many companies to virtualize production servers, the loss of a production virtual host can be even more costly to an organization as losing a standalone physical server, since a single virtual host can be responsible for multiple virtual servers. A lost virtual host can impact productivity for hours or even days while the IT administrator struggles to recover or repair the virtualization infrastructure. Market leaders among virtualization technology include the VMware vsphere platform and the Microsoft Hyper-V platform. Modern backup and recovery solutions designed specifically for VMware and Hyper-V environments are critical to helping organizations quickly recover in the event of a disaster, whether it occurs at the virtual host level, the virtual machine level, the application level, or the file/folder level. The Need for Backup Solutions Designed for Virtual Environments Administrators responsible for the backup and recovery of virtualized environments understand the frustration and difficulty associated with backup technologies that are not specifically designed to protect virtual infrastructures. Administrators who rely upon legacy, misfit solutions to protect their virtual resources face several challenges, such as the following: Impacts to overall performance when agent-based backups inside virtual machines fight for resources Downtime problems resulting from having to shut down virtual machines in order to protect them completely Slow file-by-file backups that capture redundant data in each virtual machine over and over Lengthy restore processes of an entire virtual machine in order to recover a single file Separate backups for virtualized applications like Microsoft SQL, Active Directory, SharePoint, and Exchange Lack of ability to leverage different data transport paths depending upon the needs of an environment Storage management problems from storing backups of large virtual disk files, such as VHD and VMDK Backup Exec 2012 and the Virtual Agent are designed specifically to protect VMware and Hyper-V environments and solve each of the problems listed above. Integration with the Latest Virtualization Technology A significant advantage of Backup Exec 2012 and the Virtual Agent is direct integration with both of the key virtualization platforms found in the market today, VMware vsphere and Microsoft Hyper-V. This integration enables advanced functionality built specifically for the proper and optimized protection of these virtual environments. VMware vsphere Integration Backup Exec 2012 s Virtual Agent integrates with VMware s vstorage APIs for Data Protection (VADP) to eliminate important challenges associated with the backup of VMware virtual machines and to provide faster backup performance with less overall storage consumption. This is accomplished through the following: VMware Ready Certified Integration with VMware vstorage APIs for Data Protection Enables backup of all virtual machines In SAN environments, supports image-level, off-host backups of virtual machines
5 Provides backup of VMware virtual machines over SAN infrastructures Eliminates the shutting down of virtual machines in order to protect them vsphere Changed Block Tracking for Incremental and Differential Backups Differential backups: backup of only what has changed since the last full backup Incremental backups: backup of only what has changed since the last backup Block Optimization Support Intelligent skipping of unused blocks within a virtual disk file Greatly reducing backup sizes and increasing backup speed Integrated V-Ray Granular Recovery Technology From a single-pass backup of a virtual machine, recover: Entire virtual machine Individual files and folders* Entire applications* Granular application objects* * For a list of supported platforms and applications, please refer to the Backup Exec Software SCL Advanced V-Ray Data Deduplication Support VMDK Stream Handler enables increased deduplication efficiency Significant reduction of storage requirements for backup Improved Microsoft VSS Integration Proper protection of applications such as Exchange, SQL, SharePoint and Active Directory Application quiescence and log truncation Microsoft Hyper-V Integration Backup Exec 2012 s Virtual Agent also includes integration with the Microsoft Hyper-V platform to help eliminate these same challenges in Hyper-V environments. This is accomplished through the following: Full Hyper-V Environment Protection Supports protection of Windows 2008 R2 Hyper-V host servers Supports protection of Hyper-V virtual machines Supports Cluster Shared Volume (CSV) configurations or legacy LUN configurations Online Protection of Hyper-V Environments Enables backup of all virtual machines Supports image-level backups of virtual machines In most cases, eliminates the shutting down of virtual machines in order to protect Hyper-V Incremental and Differential Backups Differential backups: backup of only what has changed since the last full backup Incremental backups: backup of only what has changed since the last backup Block Optimization Support Intelligent skipping of unused blocks within a virtual disk file
6 Greatly reducing backup sizes and increasing backup speed Integrated V-Ray Granular Recovery Technology From a single-pass backup of a virtual machine, recover: Entire virtual machine Individual files and folders* Entire applications* Granular application objects* * For a list of supported platforms and applications, please refer to the Backup Exec Software SCL Advanced V-Ray Data Deduplication Support VHD Stream Handler enables increased deduplication efficiency Significant reduction of storage requirements for backup Integration with Microsoft s VSS API Proper protection of applications such as Exchange, SQL, SharePoint and Active Directory Application quiescence and log truncation Complete Virtual and Physical Protection in a Single Solution Backup Exec 2012 and the Virtual Agent deliver cost effective and state-of-the-art solutions for the protection for growing vsphere and Hyper-V virtual environments. This includes the following: One agent delivers image-level protection to an unlimited number of VMware or Hyper-V virtual machines on a single host Comprehensive backup support for both virtual systems and legacy physical systems in one backup solution Support for both disk and tape storage devices Integration with VMware s vstorage APIs for Data Protection (VADP) to maximize backup and recovery performance of VMware environments Integration with the Microsoft Hyper-V platform to ensure optimized backup and recovery of Hyper-V environments Granular application and data recovery for virtual Infrastructures to save time and lower cost Storage savings from the deduplication of all backups from an environment, including virtual and physical backups
7 SAN Offhost Backups of VMware Virtual Environments Figure 1: Protection for Physical and Virtual Environments When used in VMware environments leveraging a SAN infrastructure, Backup Exec 2012 and the Virtual Agent offer the important benefit of off-host backups. In SAN environments, off-host backups alleviate the burden of backup-related I/O operations from the vsphere server hosting production virtual machines and transfer it to the Backup Exec server. This represents a significant advantage of Backup Exec 2012 and the Virtual Agent when compared to many legacy backup products, which commonly protect virtual machines as if they were standalone physical systems. These legacy backup solutions process backups through locally installed agents in each virtual machine, forcing the VMware hypervisor to bear the full processing burden of backup operations while each virtual machine fights for host resources. This can affect performance of production virtual machines on the hypervisor, and slow down backup operations.
8 Underlying Backup Principles Discovering Virtual Machines to Protect VMware Resource Discovery When configuring Backup Exec 2012 to protect VMware resources using the Virtual Agent, vsphere hosts and their virtual machines can be discovered in either of the following two ways: Entering the vsphere hostname or IP address into the Backup Exec interface Connecting to an available vcenter server for the discovery of multiple vsphere hosts and their associated virtual machines Backup Exec 2012 uses VMware Web Services for most communications with vcenter servers for vsphere host and virtual machine discovery operations. The VMware vsphere Web Services SDK was specifically designed to allow management applications to integrate with the vsphere platform. Hyper-V Resource Discovery Figure 2: VMware Virtual Machine Discovery Diagram When configuring Backup Exec 2012 and the Virtual Agent to protect Hyper-V resources, the discovery of Hyper-V hosts and their virtual machines is achieved through the process of deploying the Agent for Windows Systems (AWS) to the Hyper-V host server. After the AWS agent has been deployed to the Hyper-V server and the Virtual Agent has been enabled, both the Hyper-V host itself and the virtual machines can be selected for protection in the Backup Exec interface.
9 Dynamic Inclusion Figure 3: Hyper-V Virtual Machine Discovery Diagram The dynamic inclusion feature of Backup Exec 2012 allows new virtual machines to be automatically discovered and protected by Backup Exec without requiring the administrator to manually adjust existing backup jobs to include new virtual machines. New virtual machines are discovered at job run time and are automatically protected. This dynamic inclusion capability applies to all new virtual machines that are added to a VMware or Hyper-V host after one or more Backup Exec jobs have been configured to protect virtual machines on that VMware or Hyper-V host, regardless of the platform the virtual machine is running. Administrators that do not want certain new virtual machines to be protected by Backup Exec or by a specific backup job can exclude those virtual machines by using the Backup Exec console to edit the corresponding backup job. Virtual Machine Backup Methods When protecting VMware or Hyper-V virtual environments with Backup Exec 2012 and the Vitual Agent, partners and customers have the option to protect virtual machines using any of the following methods: Image-level Backups - capture entire snapshots of virtual machines associated with the virtual host; enables full virtual machine recovery and granular file and folder recovery Agent-assisted Backups (recommended) - a form of image-level backup that includes additional application protection and recovery functionality, including full application recovery and granular application recovery; this is enabled by the Agent for Windows Systems (AWS) being installed into the virtual machine; an agent-assisted backup is not an agent-based backup backups are still image-level Agent-based Backups legacy backup method; backups are captured by a local agent installed to a virtual machine; essentially treats the virtual machine as if it were a standalone physical server; recommended only in situations where image-level backups are not optimal, such as when protecting virtual machines configured with Physical Compatibility Mode RDM disks Image-level, agent-assisted, and agent-based backups can be mixed and matched to meet the needs of an environment. For example, a parter or customer may choose to protect all Windows virtual machines using image-level, agent-assisted backups while protecting Linux-based virtual machines using agent-based backups. Image-level Backups of VMware vsphere Virtual Machines When protecting virtual machines on a VMware vsphere host using the Virtual Agent, image-level backups are captured. This is done via integration with VMware s vstorage APIs for Data Protection (VADP) and communication with the
10 vsphere host. No Backup Exec agent is installed to the vsphere host itself. To ensure security in these configurations, it is recommended that SSL be enabled on the vsphere host to ensure communication traffic between the vsphere host and the Backup Exec server remains secure. The AWS agent can be installed into VMware virtual machines to enable additional backup and recovery functionality. Even in situations where the AWS agent has been installed to a virtual machine, image-level backups are supported. The additional functionality available when the Agent for Windows Systems is present in the protected virtual machine will be discussed later. Image-level Backups of Hyper-V Virtual Machines When protecting virtual machines on a Hyper-V host using the Virtual Agent, image-level backups are captured. A snapshot of the virtual machine is captured on the Hyper-V host, and all virtual machine files from that snapshot, including all VHD files, are transported over the network to the Backup Exec server for storage. In this configuration, the AWS agent is installed to the Hyper-V host and controls transmission of image-level backups from the Hyper-V host to the Backup Exec server. TSL/SSL encryption secures communication between the AWS agent on the Hyper-V host and the Backup Exec server, and a trust relationship is established. In addition, the AWS agent can be installed into Hyper-V virtual machines to enable additional backup and recovery functionality. Even in situations where the AWS agent has been installed to a Hyper-V virtual machine, image-level backups are supported. The additional functionality available when the Agent for Windows Systems is present in the protected virtual machine will be discussed later. Agent-assisted (Form of Image-level) Backups of VMware and Hyper-V Virtual Machines An agent-assisted backup is an image-based backup (described previously) with the AWS agent also installed to the protected virtual machine. This method is recommended for potecting virtualized application servers. Using this backup method, additional application backup and restore functionality is enabled. Within this technical feaeture brief, we will refer to this configuration as an agent-assisted backup. In an agent-assisted configuration, the AWS agent is installed within a virtual machine hosting an application and works hand-in-hand with the image-level backup process to enable additional backup and recovery functionality. The backup is still image-based, but the inclusion of the AWS agent within the virtual machine unlocks other capabilities, such as the following: Automatic discovery of applications inside of a virtual machine Full application recovery (requires Agent for Applications and Databases license) Application granular recovery (requires Agent for Applications and Databases license) o o o o Exchange SQL SharePoint Active Directory Ability to directly recover files and folders directly back to a virtual machine Agent-assisted backups are the recommended backup method for protecting virtualized application servers, as this offers the greatest level of protection and recovery for virtual machines while maintaining the optimization of imagelevel backups. Agent-based Backups of VMware and Hyper-V Virtual Machines
11 While in most VMware and Hyper-V environments image-based backups are optimal, agent-based backups are still supported. An agent-based backup uses the AWS agent installed to a virtual machine to fully control the capture and transmission of backup data from a virtual machine to the Backup Exec server. This process relies upon resources directly allocated to that virtual machine, and is essentially the same backup method used for standalone physical systems. When protecting virtual machines using agent-based backups, TSL/SSL encryption is used and a trust relationship is required between the AWS agent within the virtual machine and Backup Exec server. Backup Data Transport Modes VMware Backup Data Transport Modes When capturing backups of VMware virtual machines, Backup Exec 2012 leverages integration with the VMware vstorage APIs for Data Protection (VADP), enabling the utilization of advanced transport mode. This means that for each virtual machine that is protected by Backup Exec, VMware will determine all the available ways through which the requested backup data could be transported from the vsphere host to the Backup Exec server. After a data request has been made by Backup Exec, the VADP returns a list of transport modes (SAN, NBD, HOTADD, etc) that are supported and available. Based on this list, along with the selections supplied by the user, a transport mode is selected. For SAN environments, it s important to note that if Backup Exec is unable to acess the SAN at the time of a backup operation, it will revert to other available data paths (e.g. ethernet) in order to complete the job successfully. A transport mode is the physical data path used for moving backup data from the source vsphere server to the Backup Exec server. The following transport modes are supported by Backup Exec: SAN Uses iscsi or Fiber Channel shared storage for data transfers HOTADD Uses a virtualized Backup Exec server that exists as a virtual machine NBD Uses the LAN/ethernet for data transfers NBDSSL Uses the encrypted LAN/ethernet for data transfers Ultimately, transport mode selection is determined through a combination of Backup Exec and VMware. When selecting a transport mode, Backup Exec submits a prioritized list (preferred modes first) of the modes we would like to use for the backup job to VMware, and VMware decides what it will use based on the return call from the VMware API. If incorrect or unexpected transport modes are being used for backup or recovery, it may be helpful to disable all transport modes except the desired transport mode as a troubleshooting step. This can be done under Options > Settings > VMware in the Backup Exec interface. If the job fails, review job logs for a better understanding of the root cause. VMware Backup Data Transport Mode Options Users can select one or more transport modes from a list within the Backup Execm 2012 interface and adjust which modes are tried first (move up/move down in screenshot below). The transport mode options can be found by editing the virtual machine backup job and navigating to the Virtual Machines option on the left pane:
12 Hyper-V Backup Data Transport Modes Figure 4: VMware Transport Mode Options The only transport mode available for Hyper-V backups using the Virtual Agent is the network (LAN). Regardless of the backup method selected, Hyper-V virtual machine backup data is transferred from the Hyper-V host through the locally installed AWS agent to the Backup Exec server. TSL/SSL encryption secures communication between the AWS agent on the Hyper-V host and the Backup Exec server, and a trust relationship is established. Virtual Platform Integration Integration with the VMware vstorage APIs for Data Protection (VADP) The Backup Exec 2012 Virtual Agent fully integrates the latest version of VMware s vstorage APIs for Data Protection (VADP) and provides a number of new capabilities, including the following: High overall backup performance, particularly in SAN-based environments Changed-block tracking for fast block-level incremental or differential backups Block optimization, for the ignoring of unused blocks within a virtual disk, improving performance and lowering backup storage requirements Backup and recovery support of both thin and thick-provisioned virtual disks Template virtual machine backup SAN-based backup of virtual machines The Backup Exec 2012 Virtual Agent supports the protection of vsphere 4.0 (including vsphere 4.0 Update1), vsphere 4.1, and vsphere 5.0 virtual machines. No Proxy Server Required A proxy server is not required for the protection of either VMware or Hyper-V virtual machines using the Virtual Agent. Backup data moves directly to the Backup Exec server for storage, without a proxy server in the middle. Elimination of the Proxy Server in VMware Environments The VMware vstorage APIs for Data Protection (VADP) eliminate the need for a proxy server to mediate between a vsphere host and the Backup Exec server. Symantec and VMware have worked closely together to ensure that performance impacts during backup are minimal. As a result, customers using Backup Exec 2012 can expect a significant performance improvement over VCB in both CPU and I/O impacts during backups. Typical CPU utilization ranges between 1-4% throughout the duration of the backup while maintaining constant I/O rates. Backups are based on temporary snapshots, which are low-impact and low in disk-space consumption.
13 Storage Optimization Features Backup Exec 2012 includes a number of storage optimization technologies that offer tremendous benefits to partners and customers looking to control storage costs. These include Block Optimization, Differential and Incremental backups, and Data Deduplication. When used together, backup data requires only a small fraction of disk storage space of what it would require without these optimization technologies. These storage optimization features apply to both VMware virtual machine backups as well as Hyper-V virtual machine backups. Block Optimization Virtual disks, like physical disks, always contain some amount of empty space. The amount of empty space within a virtual disk can vary, and in the case of some virtual machines a significant percentage of the disk may be empty or unused. When protecting virtual machines, backing up a virtual disk without intelligence against what parts of the disk are used and which are unused results in the capturing of needless empty space as if it were actual data. This lengthens backup windows and requires larger amounts of backup storage space to accommodate. The Backup Exec 2012 Virtual Agent includes block optimization technology, which enables the intelligent identification of empty space within a virtual disk file and the protection of only used portions of the virtual disk. For example, if a virtual disk file was 40 GB in total capacity but only contained 15 GB of actual data, Backup Exec will only capture 15 GB of data during a full backup job. This block optimization speeds up backup windows and reduces backup storage requirements. Figure 5: Block Optimization Diagram Block optimization is supported for both VMware vsphere and Microsoft Hyper-V virtual machines. Incremental and Differential Backups Backup Exec 2012 and the Virtual Agent also include changed block tracking (CBT) capabilities. This means that Backup Exec can track what changes have occurred against a virtual machine since the last backup operation at the block level, and only capture the block level changes since the last backup (incremental) or since the last full backup (differential). Differential and incremental backups capture significantly less data than full backups. As a result, incremental and differential backups significantly reduce backup windows and required backup storage when protecting VMware and Hyper-V virtual machines.
14 Figure 6: Changed Block Tracking Incremental and differential backups are supported for both VMware vsphere and Microsoft Hyper-V virtual machines. Data Deduplication Backup Exec 2012 also supports combining the Data Deduplication Option with the Virtual Agent which further reduces storage requirements for virtual machine backup purposes. The Data Deduplication Option enables block-level deduplication of all backups stored to a Backup Exec Deduplication Storage Folder, resulting in a 9-to-1 or greater reduction in storage consumption for backup data. The Deduplication Option includes intelligent stream handlers for both VMware virtual disk files (VMDK) and Hyper-V virtual disk files (VHD) allowing for V-Ray visibility and further storage savings when using both the Virtual Agent and the Deduplication Option together. The Deduplication Option and associated virtual disk stream handler technology will be discussed in further detail later in this document. Support of Virtual Platform Advanced Storage and High Availability Features VMware Storage Distributed Resource Scheduling The Backup Exec 2012 Virtual Agent supports several new features offered in the latest release of the VMware vsphere platform, vsphere 5.0. This includes support for hardware version 8 and Storage Distributed Resource Scheduling (SDRS). The SDRS capabilities of vsphere 5.0 allow virtual administrators to simplify management of datastores through the introduction of datastore clusters, also referred to as pods. In addition, depending upon settings defined by the administrator, SDRS has the capability to automatically move virtual machine disk files to different datastores within a cluster to optimize performance, without interrupting virtual machine operation. This feature works hand in hand with other VMware technologies, such as vmotion.
15 Figure 7: VMware Storage Distributed Resource Scheduling Diagram Backup Exec 2012 and the Virtual Agent fully support virtual machines located within a datastore cluster and enabled for SDRS. If a virtual machine is being actively backed up by Backup Exec or is having data restored to it at the time an SDRS event for that virtual machine occurs, Backup Exec places a temporary lock on the virtual machine delaying the SDRS event until after the operation has completed and the associated virtual machine snapshot has been removed. Once the backup is complete, the virtual machine is unlocked and the SDRS event proceeds normally. Backup Exec does not remove SDRS attributes from a virtual machine during backup or restore operations. In addition, new restore features have been added allowing administrators to restore virtual machines to the cluster level or to specific datastores within a cluster. Microsoft Hyper-V and Cluster Shared Volumes (Windows 2008 R2) A new technology introduced by Microsoft for their Windows 2008 R2 Server platforms is Cluster Shared Volumes. A cluster shared volume is an NTFS volume that can be accessed by all the nodes in a cluster at the same time. One of the prime use cases of a cluster shared volume is to host Hyper-V virtual disk files (VHD files). This new clustering technology from Microsoft allows VHD files to migrate or fail over to other nodes in the cluster during failover situations more quickly, while avoiding volume ownership problems. Figure 8: Hyper-V Cluster Shared Volume Diagram
16 Backup Exec 2012 and the Virtual Agent support the protection of Cluster Shared Volume nodes, as well as highly available virtual machines in a Cluster Shared Volume configuration. Hyper-V Live Migration Support The Backup Exec 2012 Virtual Agent fully supports Live Migration between Hyper-V hosts. As a result, each Hyper-V host system must be licensed with a separate Virtual Agent license as any of the hosts may be used to process the backup or restore request.
17 Virtualized Application Protection Application Protection in a VMware vsphere Environment The Backup Exec 2012 Agent for Applications and Databases plays a critical role in the protection of virtualized applications. This agent is licensed separately from the Virtual Agent, and one license of the Agent for Applications and Databases is required for each virtualized application in an environment for which advanced protection and recovery capabilities are desired. Virtual Machine-level Application Protection through VSS in a VMware Environment The Virtual Agent provides online backups of VMware virtual machines that host Microsoft applications and which utilize the Microsoft VSS framework. VSS-aware applications such as these are protected as part of a normal image-level backup of the entire virtual machine. This process leverages VSS to capture a consistent snapshot of the virtual machine and the VSS-aware applications that it hosts. This VSS snapshot process also automatically truncates transaction logs for Exchange and Active Directory. These virtual machines are not taken offline during this process; normal operations continue. Note: In order for online backups of virtual machines to be possible, VMware Tools must be installed to the virtual machines hosting applications for enhanced VSS provider support. Note: Without adding a license for the Agent for Applications and Databases, and without installing AWS into the virtual machine hosting the VSS-ware application, the virtual machine is still protected using VSS, and the application inside the virtual machine will still be backed up in a consistent state. However, recovery options are limited to restoring the entire virtual machine or granular files and folders. Advanced Application Protection and Recovery in a VMware Environment Advanced protection and recovery of applications that have been virtualized in a VMware environment can be enabled by combining the Agent for Applications and Databases with the Virtual Agent. When these agents are combined, the AWS agent should be installed to each virtual machine hosting a virtualized application to enable advanced protection and recovery capabilities. This agent-assisted configuration continues to provide single-pass, image-based backup protection of the virtual machines hosting applications in a VMware environment. This agent-assisted combination also allows for additional application protection capabilities to be enabled, such as automatic virtualized application discovery and granular application object recovery capabilities. Because of these critical additional features enabled by the Agent for Applications and Databases, it is highly recommended that this agent be used alongside the Virtual Agent when protecting virtualized applications in a VMware environment. Without the addition of the Agent for Applications and Databases and without installing the AWS agent to each virtual machine hosting an application, recovery capabilities are limited to full virtual machine recovery and granular file and folder recovery (without the ability to recover files and folders directly back to the virtual machine from which they were captured). Non-VSS Compliant Virtual Machines and Applications in a VMware Environment Platforms and applications that are not VSS-compliant, such as Linux, cannot be properly protected using VSS. If these virtual machines are protected using the Virtual Agent and image-based backups, backups will be crash consistent, and will be captured without knowledge of any applications that may reside within the virtual machine. The virtual machines are not taken offline during the snapshot and backup process; however, the backups are crash consistent. Administrators using Backup Exec 2012 and the Virtual Agent to protect virtual environments that include one or more virtual machines that are not VSS-compliant should consider using agent-based backups, leveraging the standard AWS
18 agent or Agent for Linux and Unix Servers, to protect non-vss compliant virtual machines. Using the AWS agent or the Agent for Linux and Unix Servers to protect non-vss-compliant virtual machines helps ensure the virtual machines themselves, as well as the applications they contain, are backed up properly. Application Protection in a Microsoft Hyper-V Environment The Backup Exec 2012 Agent for Applications and Databases plays a critical role in the protection of virtualized applications. This agent is licensed separately from the Virtual Agent, and one license of the Agent for Applications and Databases is required for each virtualized application in an environment for which advanced protection and recovery capabilities are desired. Virtual Machine-level Application Protection through VSS in a Hyper-V Environment The Virtual Agent provides online backups of Hyper-V virtual machines that host Microsoft applications and which utilize the Microsoft VSS framework. VSS-aware applications such as these are protected as part of a normal image-level backup of the entire virtual machine. This process leverages VSS to capture a consistent snapshot of the virtual machine and the VSS-aware applications that it hosts. This VSS snapshot process also automatically truncates transaction logs for Exchange and Active Directory. These virtual machines are not taken offline during this process; normal operations continue. Note: In order for online backups of virtual machines to be possible, Hyper-V Integration Services must be installed to the virtual machines hosting applications for enhanced VSS provider support. Note: Without adding a license for the Agent for Applications and Databases, and without installing AWS into the virtual machine hosting the VSS-ware application, the virtual machine is still protected using VSS, and the application inside the virtual machine will still be backed up in a consistent state. However, recovery options are limited to restoring the entire virtual machine or granular files and folders. Advanced Application Protection and Recovery in a Hyper-V Environment Advanced protection and recovery of applications that have been virtualized in a Hyper-V environment can be enabled by combining the Agent for Applications and Databases with the Virtual Agent. When these agents are combined, the AWS agent should be installed to each virtual machine hosting a virtualized application to enable advanced protection and recovery capabilities. This agent-assisted configuration continues to provide single-pass, image-based backup protection of the virtual machines hosting applications in a Hyper-V environment. This agent-assisted combination also allows for additional application protection capabilities to be enabled, such as automatic virtualized application discovery and granular application object recovery capabilities. Because of these critical additional features enabled by the Agent for Applications and Databases, it is highly recommended that this agent be used alongside the Virtual Agent when protecting virtualized applications in a Hyper-V environment. Without the addition of the Agent for Applications and Databases and without installing the AWS agent to each virtual machine hosting an application, recovery capabilities are limited to full virtual machine recovery and granular file and folder recovery (without the ability to recover files and folders directly back to the virtual machine from which they were captured). Non-VSS Compliant Virtual Machines and Applications in a Hyper-V Environment Some platforms and applications are not VSS-compliant, such as Linux, and cannot be properly protected using VSS. If these virtual machines are protected using the Virtual Agent and image-based backups, they may be momentarily placed in a suspended or offline state while the virtual machine snapshot is being captured. When virtual machines are taken offline in order to capture backups they are not placed in a consistent or backup ready state, nor are application logs truncated. Rather, they are protected in a crash-consistent manner.
19 For a list of virtual machine configurations that may be taken offline during such a backup operation, please refer to Microsoft resources. Administrators using Backup Exec 2012 and the Virtual Agent to protect virtual environments that include one or more virtual machines that are not VSS-compliant should consider using agent-based backups, leveraging the standard AWS agent or Agent for Linux and Unix Servers, to protect non-vss compliant virtual machines. Using the AWS agent or the Agent for Linux and Unix Servers to protect non-vss-compliant virtual machines helps ensure the virtual machines themselves, as well as the applications they contain, are backed up properly.
20 Virtual Machine Recovery Options Backup Exec 2012 supports a wide range of recovery options for virtual machines that are protected with the Virtual Agent. Each of these recovery options is possible from a single-pass, image-level backup of either VMware vsphere or Microsoft Hyper-V virtual machines. No additional or separate backup operation is required to achieve additional levels of restore granularity. For virtualized applications, granular application recovery can only be enabled by combining the Virtual Agent with the Agent for Applications and Databases, and by installing AWS to the virtual machines hosting applications in a VMware or Hyper-V environment. The virtual machine recovery options described below apply to VMware virtual machine backups as well as Hyper-V virtual machine backups. Full Virtual Machine Recovery The Virtual Agent supports full virtual machine recovery. This includes all elements of a virtual machine, such as the virtual disk files and any other virtual machine-related files. During a full virtual machine recovery operation, virtual disk files are recovered entirely, including the operating system, applications, and data. Integration with the Microsoft VSS service ensures that VSS-aware applications, such as Exchange and SQL, hosted on VSS-aware platforms, such as Windows 2008, are recovered properly as part of a full virtual machine recovery operation. A virtual machine can be recovered to the original host or can be redirected to an alternate host. Administrators have several options to deal with the power state (on/off) of a virtual machine during recovery operations. For example, administrators can select the following: Whether to automatically power off the target virtual machine during a recovery operation Whether or not to automatically power on a restored virtual machine after a recovery operation Note: In order to redirect a virtual machine to an alternate host during recovery, the alternate host must also be licensed for the Backup Exec 2012 Virtual Agent. Virtual Disk Configurations and Support The Virtual Agent allows administrators to protect virtual machines that are configured with different virtual disk types. The Virtual Agent supports the protection of VMware virtual machines configured with either thick or thin virtual disks. Upon recovery, the administrator has the option of recovering a VMware virtual machine with either a thick or thin virtual disk, and can therefore change the virtual disk type during a recovery operation (e.g. thick to thin or thin to thick). The Virtual Agent supports the protection of Hyper-V virtual machines configured with either dynamically expanding or fixed size VHDs. When recovered, a virtual machine will have the same VHD type as it had when it was backed up (for example, if the virtual machine had fixed size VHDs when it was backed up, it will have fixed size VHDs after it s been recovered). Application Recovery For virtual machines hosting Exchange, SQL, SharePoint, and Active Directory, full recovery at the application level is also supported by the Virtual Agent, but only when the Virtual Agent is combined with the Agent for Applications and Databases and the AWS agent is installed to the virtual machine hosting the application. This allows administrators to recover a full application instance if a full virtual machine recovery is not necessary or is not desired. Exchange, SQL, SharePoint, and Active Directory backups are fully VSS-compliant in accordance with Microsoft best practices, ensuring the applications will operate and function properly after recovery.
21 To enable application-level recovery, the Backup Exec 2012 Agent for Applications and Databases must be licensed for the virtual machine hosting the application and the AWS agent must be installed to the virtual machine hosting the application. Note: application-level recovery is not supported for virtualized applications in a distributed configuration. Granular Application Recovery The Backup Exec 2012 Virtual Agent enables administrators to recover granular application objects from single-pass backups of VMware and Hyper-V virtual machines when the Virtual Agent is combined with the Agent for Applications and Databases and the AWS agent is installed to the virtual machine hosting the application. Example granular application objects that can be recovered in this configuration include Exchange mailboxes, s, attachments, and calendar items, Active Directory objects such as user and computer objects, SharePoint documents, SQL databases, and more. A separate database-level or object-level backup is not required for granular application recovery; the same single-pass, image-based backup is harvested for granular application object recovery operations. To enable granular application object recovery, the Backup Exec 2012 Agent for Applications and Databases must be licensed for the virtual machine hosting the application and the AWS agent must be installed to the virtual machine. Granular File and Folder Recovery Figure 9: Granular Recovery for Virtualized Applications Granular file and folder recovery is also supported for virtual machines protected using the Virtual Agent, and is done from the same single-pass, image-level backups used for other recovery options. It is not necessary to have the AWS agent installed to the virtual machine in order for granular files and folder recovery to be possible. However, having the AWS agent installed to the virtual machine is required in order to recover files and folders directly back to the source virtual machine.
22 Optionally, or if the AWS agent is not installed to the original machine from which backups were captured, files and folders can be recovered to a local directory on the Backup Exec server, and moved back to the original virtual machine using other methods.
23 Licensing Considerations Another key advantage to using Backup Exec 2012 and the Virtual Agent when compared to other solutions in the market is its simplified licensing system. A single license of the Virtual Agent allows for full image-level protection of all virtual machines on a single hypervisor host, as well as full virtual machine recovery and granular file and folder recovery. This single license provides protection for all virtual machines associated with the hypervisor, regardless of how many virtual machines a hypervisor is hosting or how many CPU cores the server contains. The Agent for Applications and Databases, which enables advanced application protection and recoveroy capabilities, is licensed separately. Example Licensing Scenarios To better illustrate how to properly license the Virtual Agent alongside other Backup Exec 2012 components in both VMware and Hyper-V environments, a few example scenarios are shown below. Example VMware Licensing Environment Here is an example VMware virtual environment protected by Backup Exec: Figure 10: Example VMware Environment for Licensing Purposes The above environment includes a Backup Exec server, a vsphere server, and four virtual machines. The four virtual machines above can be described as follows (from left to right): Exchange server Active Directory SQL Server File Server This environment would require the following Backup Exec 2012 licenses in order to be both fully protected and fully in compliance with license requirements: Backup Exec Licensable Component Required Licenses Backup Exec Server 1 Agent for VMware and Hyper-V (Virtual Agent) 1 Agent for Applications and Databases 3
24 Agent for Windows Systems (AWS) 0 In this example diagram, the four virtual machines on the vsphere host are licensed for all Backup Exec protection and recovery capabilities. This includes VSS-aware protection for all virtual machines (including automatic application discovery), full virtual machine recovery, application recovery, granular application recovery, and granular file and folder recovery. Note that although the AWS agent is shown in this diagram to enable agent-assisted protection which offers application discovery, granular application recovery, and direct-to-source granular file recovery, no AWS agent licenses are required as these are included for all virtual machines on the host in the Virtual Agent license. Also note that no AWS agent, or any other agent, is resident on the VMware vsphere server. The Backup Exec server interacts with VMware hosts directly through the vstorage APIs for Data Protection (VADP) and does not require an agent to be present on the host. Other options that unlock additional Backup Exec 2012 capabilities, such as the Deduplication Option, are licensed separately (not shown in this diagram). Example Hyper-V Licensing Environment Here is an example Hyper-V virtual environment protected by Backup Exec: Figure 11: Example Hyper-V Environment for Licensing Purposes The above environment includes a Backup Exec server, a Hyper-V server, and four virtual machines. The four virtual machines above can be described as follows (from left to right): Exchange server Active Directory SQL Server File Server This environment would require the following Backup Exec 2012 licenses in order to be both fully protected and fully in compliance with license requirements: Backup Exec Licensable Component Required Licenses Backup Exec Server 1
25 Agent for VMware and Hyper-V (Virtual Agent) 1 Agent for Applications and Databases 3 Agent for Windows Systems (AWS) 0 In this example diagram, the four virtual machines on the Hyper-V host are licensed for all Backup Exec protection and recovery capabilities. This includes VSS-aware protection for all virtual machines (including automatic application discovery), full virtual machine recovery, application recovery, granular application recovery, and granular file and folder recovery. Note that although the AWS agent is shown in this diagram to enable agent-assisted protection which offers application discovery, granular application recovery, and direct-to-source granular file recovery, no AWS agent licenses are required as these are included for all virtual machines on the host in the Virtual Agent license. Also note that the AWS agent on the Hyper-V server is included in the license for the Virtual Agent. The Backup Exec server interacts with the AWS agent on the host Hyper-V host to both protect the Hyper-V host itself (if desired) and to transfer virtual machine image-based backups (captured from snapshots generated on the Hyper-V host) to the Backup Exec server for storage. Other options that unlock additional Backup Exec 2012 capabilities, such as the Deduplication Option, are licensed separately (not shown in this diagram).
26 The Agent for VMware and Hyper-V and Other Backup Exec Agents and Options Agent for Windows Systems The Backup Exec 2012 Virtual Agent enables what is generally known in the industry as agent-less backup. This means that backups of virtual machines are captured at the image level though interaction with the hypervisor host and the generation of virtual machine snapshots. Backups are not generated through an agent operation installed to and active within the virtual machine itself. However, if the Agent for Windows Systems (AWS) is installed into virtual machines, additional and supporting backup functionality can be enabled. This does not cause Backup Exec to revert backup to agent-based backups; image-based backups continue. However, having AWS inside of a virtual machine can enable additional functionality, such as the following: Direct recovery of files and folders to the virtual machine containing the AWS agent Automatic discovery of applications within a virtual machine (requires Agent for Applications and Databases) Application-level recovery (requires Agent for Applications and Databases) Granular recovery of application objects (requires Agent for Applications and Databases) Installing the AWS agent into a virtual machine while still capturing image-based backups of virtual machines is referred to in this document as agent-assisted backups. The user maintains the benefits of image-based backups (off host backups in the case of VMware) while also enjoying the benefits of having a software agent resident within the virtual machine for advanced protection and recovery capabilities. Agent for Applications and Databases Another key component of the Backup Exec 2012 portfolio designed to work hand-in-hand with the Agent VMware and Hyper-V is the Agent for Applications and Databases. The Agent for Applications and Databases is licensed separately from the Virtual Agent, and requires the AWS agent to be installed inside of the virtual machine hosting the application. One of the most important features enabled by the Agent for Applications and Databases is granular application recovery. The granular application recovery technology enabled by the Agent for Applications and Databases does not require an additional or separate backup operation to function. Granular application objects are harvested from the same imagebased backup that is used for other types of recovery, such as full virtual machine recovery. The Agent for Applications and Databases supports key Microsoft applications hosted on virtual machines, including: Exchange SharePoint SQL Server Active Directory The Backup Exec 2012 Virtual Agent can interact with these applications when the Backup Exec Agent for Windows Systems (AWS) is installed inside of the virtual machine hosting the application and the Agent for Applications and Databases has been licensed on the Backup Exec server. For specific details about the applications supported by Backup Exec and the Agent for Applications and Databases, please refer to the Backup Exec Software Compatibility List (SCL) available online. Data Deduplication Option
27 The Backup Exec 2012 Virtual Agent can be used in conjunction with the Backup Exec 2012 Deduplication Option to realize significant backup data storage savings. When the Backup Exec 2012 Deduplication Option is added to the environment, deduplication technology is employed against the Deduplication Storage Folder where backups are stored. The Backup Exec 2012 Deduplication Option enables several capabilities that can greatly benefit Administrators looking to control storage growth associated with backup operations. There are three different methods of deduplication that are available with the Deduplication Option: Client Deduplication Server Deduplication Appliance Deduplication Client Deduplication Client-side deduplication uses a process whereby deduplication calculations, meaning the identification of unique and non-unique blocks and the skipping of non-unique blocks, is driven by the local Backup Exec Agent for Windows Systems (AWS) or Agent for Linux locally installed to the protected server. The advantage of using this method is that only the unique blocks of data are transferred to the Backup Exec server, greatly reducing the data traffic impact on network or LAN. Server Deduplication The server-side deduplication method uses a process where all backup data is transferred to the Backup Exec server before deduplication calculations are made. Once backup data has arrived at the Backup Exec server, blocks are fingerprinted and identified as unique or non-unique, and either kept or skipped respectively. In most environments, server-side deduplication is optimal for backups of VMware environments using the Virtual Agent. Appliance Deduplication The appliance deduplication method leverages a 3 rd -party deduplication device (for example, an ExaGrid EX series or a Quantum DXi 7500) to handle all aspects of deduplication. Backup data is transferred to the appliance device for storage, while catalog information is transferred to the Backup Exec server. Flexible Deduplication Choices Different deduplication methods can be mixed and matched to better service the configuration needs of Backup Exec customers. Figure 12: Integrated Block-level Deduplication for Backups Configurations are not restricted to a single deduplication method for a particular environment. Some protected servers will be better matched for one type of deduplication or another, and Backup Exec administrators have the flexibility to mix and match deduplication methods in order to tailor protection to meet the specific needs of their environment. VMDK and VHD Stream Handlers
28 Backup Exec 2012 includes stream handler technology designed specifically for backups of VMware and Hyper-V virtual machines. Stream handler technology operates invisibly to Backup Exec, meaning no additional management or configuration adjustments are required on the part of the administrator. The stream handlers enable variable-length segmenting of VMware (VMDK) and Hyper-V (VHD) disk files during deduplication calculations. This aligns deduplication blocks to file extent boundaries, and data changes over time within VMDK and VHD files result in fewer unique blocks. This translates into better storage savings across both VMware and Hyper-V backups when using the Backup Exec 2012 Virtual Agent in conjunction with the Backup Exec 2012 Deduplication Option. Figure 13: VMware (VMDK) and Hyper-V (VHD) Stream Handler Diagram Combining the Virtual Agent with the Deduplication Option can offer significant storage savings for Backup Exec administrators, allowing them to reduce sorage costs by getting the most out of the backup storage resources at their disposal.
29 Backup Exec Management Plug-in for VMware Overview In early 2011, Symantec released the Backup Exec Management Plug-in for VMware. This management plug-in is offered at no charge and is available for download from the Backup Exec Technical Support web portal. The Backup Exec Management Plug-in for VMware allows administrators of VMware virtual environments that are protected by Backup Exec and the Virtual Agent to utilize the vsphere client application to perform status monitoring, virtual machine validation, and virtual machine auto recovery tasks without having to visit the Backup Exec server console. This includes the following: Monitor backup status of VMware virtual machines protected by Backup Exec Resource-centric view of the backup status of protected virtual machines Perform virtual machine validation tasks Configure Backup Exec integration with ApplicationHA for automatic virtual machine recovery* * ApplicationHA is a separate product from Symantec and is not a component of Backup Exec. ApplicationHA is purchased and configured separately. The information that is displayed in the vsphere client interface is retrieved from the Backup Exec server that controls the backup jobs protecting VMware virtual machines. The Backup Exec Management Plug-in for VMware is installed to a system that also runs the VMware vsphere client, and supports both vcenter server environments and standalone vsphere hosts. The Backup Exec management information is displayed within the context of the vsphere client application on a separate Symantec Backup Exec tab. This new management plug-in requires and VMware vsphere 4.0 or 5.0 components (or later). For more information on the versions of Backup Exec and VMware vsphere that are supported by this management plug-in, please refer to the Backup Exec Software Compatibility list, available on-line. Login Users of the Backup Exec Management Plug-in for VMware will be required to log into the associated Backup Exec server. This can be done by specifying the server s hostname or IP address. The credentials should represent a user that is a member of the Backup Exec Operators group. Monitoring In the plug-in display, the administrator is able to view all the Backup Exec backup jobs that protect virtual machines in the VMware environment. For environments with multiple Backup Exec servers running jobs that protect VMware virtual machines, the administrator can connect to one Backup Exec server at a time to monitor the status of VMware backup jobs processed by that server. Additional views are also offered, such as a view that shows unprotected virtual machines or virtual machines that are protected by a different Backup Exec server.
30 Virtual Machine Validator Figure 14: Backup Exec Management Plug-in for VMware A new feature of the Backup Exec Management Plug-in for VMware is the Virtual Machine Validator. This feature enables administrators to validate the integrity of VMware virtual machine backups captured using Backup Exec and the Agent for VMware. The Virtual Machine Validator functionality is available through the vsphere client application. Like the Management Plug-in for VMware itself, the Virtual Machine Validator feature is available at no additional charge to Backup Exec customers. The Virtual Machine Validator operates by leveraging VMware Workstation to mount a backup of a virtual machine from backup storage and launch it. Once the virtual machine has booted, the Virtual Machine Validator connects to the local VMware Tools application inside of the virtual machine to ensure the backup of the virtual machine booted properly and verify that it is valid. If desired, custom scripts can also be executed within the virtual machine for further validation. Validation events are initiated from the vsphere client interface, using the Backup Exec Management Plug-in for VMware. When the plug-in has been installed, a Symantec Backup Exec tab will appear in the vsphere client interface. The administrator can perform verify tasks using the options available at this tab. Figure 15: VMware Virtual Machine Validator Diagram
31 Results from virtual machine validation tests are published back to the Management Plug-in for VMware and displayed in the Symantec Backup Exec tab in the vsphere client. The new Virtual Machine Validator feature of the Backup Exec Management Plug-in for VMware supports different network configuration settings allowing administrators to validate individual virtual machines or validate multiple virtual machines in a private network environment. Virtual Machine Validator Notes: Validation tasks can only be run against GRT-enabled VMware backups Validation tasks can only be run against VMware backups stored to disk or Deduplication Storage Folders (cannot be run against backup sets stored to tape) Validation tasks cannot be run against backup sets that have been transferred to remote Backup Exec servers through optimized duplication It is recommended that VMware Workstation be installed to a standalone system and not the same system to which the Backup Exec server has been installed For additional information on supported platforms and other requirements for the Virtual Machine Validator, please refer to the Backup Exec Administrator s Guide and the Backup Exec Software Compatibility List. Virtual Machine Auto Recovery Another key element of the Backup Exec Management Plug-in for VMware is integration with the SymantecHA product to offer automated recovery of VMware virtual machines hosting applications that have become unresponsive. The ApplicationHA solution monitors the status of applications hosted on VMware virtual machines and includes functionality to automatically bring the application back on-line in the event that the application stops functioning properly. When the monitoring functionality of ApplicationHA determines that an application hosted on a VMware virtual machine has become unresponsive, it will first attempt to restart the application and its associated services. If one or more application restarts do not bring the application coming back online, ApplicationHA will then restart or reset the virtual machine itself. If the virtual machine restart also does not bring the application back online, integration between Backup Exec and ApplicationHA through the management plug-in enables the full virtual machine to be restored by Backup Exec from a recent backup. Figure 16: VMware Virtual Machine Auto Recovery Configuration Options
32 Selecting the Auto Recovery button in the management plug-in interface allows the administrator to configure what virtual machines being protected by Backup Exec are eligible for auto recovery and the rules governing the auto recovery process. The Backup Exec Management Plug-in for VMware is available to be downloaded from the following location:
33 Example Configurations Configurations of Backup Exec 2012 in virtual environments will vary depending on the size, configuration, and complexity of the virtual environment that is being protected. In this section, we will review some basic configuration examples for both VMware and Hyper-V environments. Example Backup Exec Configurations for VMware Environments Basic VMware Environment with a Single vsphere Server In this example, Backup Exec 2012 is protecting a single vsphere server with a small number of virtual machines. In this example, Backup Exec is installed to a separate physical server (usually offers the best performance), but Backup Exec could optionally be installed as another guest virtual machine on the vsphere host. In such configurations, backup data will be stored to the virtual disk files of the virtual machine hosting the Backup Exec server. This example also shows the virtual machines being protected as residing on a shared SAN storage array. When a vsphere configuration utilizes shared SAN storage, and the Backup Exec server is connected to the SAN infrastructure, VMware virtual machine backup data can be transported to the backup destination over the SAN which can offer significant performance benefits. Figure 17: Basic VMware Environment with a Single vsphere Server Advanced VMware vcenter Environment (Multiple vsphere Hosts) In this example, Backup Exec 2012 is protecting a more complex VMware vsphere environment that includes multiple vsphere servers and a vcenter server. In configurations such as these, Backup Exec can discover and protect virtual machines through the vcenter server itself and it is not necessary to perform discovery operations at the vsphere server level. In this example, Backup Exec is installed to a separate physical machine, which is recommended for larger VMware vsphere environments. This example also shows the virtual machines being protected as residing on a shared SAN storage array. When a vsphere configuration utilizes shared SAN storage, and the Backup Exec server is connected to the SAN infrastructure, backup data can be transported over the SAN which can offer significant performance benefits compared to transporting backup data over the LAN.
34 Figure 18: Advanced VMware vcenter Environment Example Backup Exec Configurations for Hyper-V Environments Basic Hyper-V Environment with a Single Hyper-V Server In this example, Backup Exec 2012 is protecting a single Hyper-V server with a small number of virtual machines. In this example, Backup Exec is installed to a separate physical server, but Backup Exec could optionally be installed to the Hyper-V host itself. For smaller environments, installing Backup Exec to the Hyper-V host itself will commonly offer the best performance, since backup storage devices will be local to the Hyper-V server and backup data will not have to travel over the LAN before being stored. Figure 19: Basic Hyper-V Environment with a Single Hyper-V Server Basic Hyper-V Environment with a Single Hyper-V Server hosting Backup Exec as a Virtual Machine In this example, Backup Exec 2012 is protecting a single Hyper-V server with a small number of virtual machines. In this example, Backup Exec is installed to one of the virtual machines hosted on the Hype-V host, and not on a separate backup server. In such configurations, backup data will be stored to the virtual disk files of the virtual machine hosting the Backup Exec server.
35 Figure 20: Hyper-V Environment with Backup Exec in a Virtual Machine Advanced Hyper-V Environment (Multiple Hyper-V Servers) In this example, Backup Exec 2012 is protecting a more complex Hyper-V environment that includes multiple Hyper-V servers. In configurations such as these, Backup Exec discovers both the Hyper-V host and the virtual machines through the process of deploying the Agent for Windows Systems (AWS) to the Hyper-V server. In this example Backup Exec is installed to a separate physical machine, which is recommended for larger Hyper-V environments. It s important to note that in Hyper-V environments backup data is captured and transferred to the Backup Exec server over the LAN, through communication between the Backup Exec server and the AWS agent on the Hyper-V host. Figure 21: Advanced Hyper-V Environment
Backup Exec 15: Protecting Microsoft Hyper-V
TECHNICAL BRIEF: BACKUP EXEC 15: PROTECTING MICROSOFT HYPER-V........................................ Backup Exec 15: Protecting Microsoft Hyper-V Who should read this paper Technical White Papers are
More informationProtecting Miscrosoft Hyper-V Environments
Protecting Miscrosoft Hyper-V Environments Who should read this paper Technical White Papers are designed to introduce Veritas partners and end users to key technologies and technical concepts that are
More informationBackup Exec 15: Protecting VMware
TECHNICAL BRIEF: BACKUP EXEC 15: PROTECTING VMWARE........................................ Backup Exec 15: Protecting VMware Who should read this paper Technical White Papers are designed to introduce
More informationHow To Protect Your Virtual Environment With Backupexec 15 And Backupexec.15
Protecting VMware Environments Who should read this paper Technical White Papers are designed to introduce Veritas partners and end users to key technologies and technical concepts that are associated
More informationBackup Exec 2014: Protecting VMware
TECHNICAL BRIEF: BACKUP EXEC 2014: PROTECTING VMWARE........................................ Backup Exec 2014: Protecting VMware Who should read this paper Technical White Papers are designed to introduce
More informationBackup Exec 3600 R3 Appliance
TECHNICAL WHITE PAPER: BACKUP EXEC TM 3600 R3 APPLIANCE Backup Exec 2014 Technical White Paper Backup Exec 3600 R3 Appliance Technical White Papers are designed to introduce Symantec partners and end users
More informationSymantec Backup Exec 2010 Agent for VMware Virtual Infrastructure FAQ
Symantec Backup Exec 2010 Agent for VMware Virtual Infrastructure FAQ Updated May 10, 2010 Contents Overview... 1 Virtual Machine Backup... 4 VMware vstorage API for Data Protection Support... 6 VMware
More informationBackup and Recovery in the Virtual Age. Scott Baker and Bahar Shah
Backup and Recovery in the Virtual Age Scott Baker and Bahar Shah Trends Symantec V-Ray Server virtualization is the single biggest game-changing trend in IT today Virtual environments are becoming the
More informationBackup Exec 2012 Agents and Options
Backup Exec 2012 Agents and Options Markku A Suistola Principal Presales Consultant Backup Exec 2012 Backup Exec 2012 Architecture Overview Understanding the technology workflow 2 Backup Exec 2012 Core
More informationNetBackup for VMware Data Recovery Services to End the Dark Ages of Virtualization
NetBackup for VMware Data Recovery Services to End the Dark Ages of Virtualization VADP vstorage APIs for Data Protection Centralized Efficient Off-host LAN free Challenges Dynamic Environment Performance
More informationBackup Exec 2014: Protecting Microsoft SharePoint
TECHNICAL BRIEF: BACKUP EXEC 2014: PROTECTING MICROSOFT SHAREPOINT........................................ Backup Exec 2014: Protecting Microsoft SharePoint Who should read this paper Technical White Papers
More informationSymantec Backup Exec 2014
Symantec Backup Exec 2014 Maxim Tsvetaev Principal Systems Engineer Backup Exec 2014 1 Today s Top Backup and Recovery Challenges Reducing Costs and Complexity Protecting Virtual Machines Meeting Backup
More informationVMware Virtual Machine Protection
VMware Virtual Machine Protection PowerVault DL Backup to Disk Appliance Dell Symantec Symantec DL Appliance Team VMware Virtual Machine Protection The PowerVault DL Backup-to-Disk Appliance Powered by
More informationBackup Exec 15: Protecting Microsoft Exchange
TECHNICAL BRIEF: BACKUP EXEC 15: PROTECTING MICROSOFT EXCHANGE........................................ Backup Exec 15: Protecting Microsoft Exchange Who should read this paper Technical White Papers are
More informationVeritas Backup Exec : Protecting Microsoft SharePoint
Veritas Backup Exec : Protecting Microsoft SharePoint Who should read this paper Technical White Papers are designed to introduce IT professionals to key technologies and technical concepts that are associated
More informationBackup Exec 12.5 Agent for Microsoft Virtual Servers FAQ
Backup Exec 12.5 Agent for Microsoft Virtual Servers FAQ Contents Overview... 1 Supported Configurations... 3 Backup... 5 Database and Application Protection... 7 Virtual Machine Recovery... 8 Licensing...
More informationSymantec Backup Exec 3600 Appliance
WHITE PAPER: SYMANTEC BACKUP EXEC 3600 APPLIANCE Symantec Backup Exec 3600 Appliance Simple, Quick, Secure Data Backup and Recovery Small and medium-sized businesses cannot survive without their data.
More informationSymantec NetBackup 7.1 What s New and Version Comparison Matrix
Symantec 7.1 What s New and Version Comparison Matrix Symantec 7 allows customers to standardize backup and recovery operations across physical and virtual environments with fewer resources and less risk
More informationWHITE PAPER: customize. Comprehensive Backup and Recovery of VMware Virtual Infrastructure Symantec Backup Exec 12.5 for Windows Servers
WHITE PAPER: customize Symantec Solutions for Windows Confidence in a connected world. Comprehensive Backup and Recovery of VMware Virtual Infrastructure Symantec Backup Exec 12.5 for Windows Servers White
More informationBackup Exec 15 Agents and Options
DATA PROTECTION Backup Exec 15 Agents and Options Enhance and extend Backup Exec features, capabilities, and platform support Overview enhance and extend Backup Exec features, capabilities, and platform
More informationDell PowerVault DL2200 & BE 2010 Power Suite. Owen Que. Channel Systems Consultant Dell
Dell PowerVault DL2200 & BE 2010 Power Suite Owen Que Channel Systems Consultant Dell Dell PowerVault DL2200 powered by Symantec Backup Exec 2010 1 Replace Tape with Deduplication Customer Storage Challenge
More informationBackup Exec 15: Protecting Microsoft SQL
TECHNICAL BRIEF: BACKUP EXEC 15: PROTECTING MICROSOFT SQL........................................ Backup Exec 15: Protecting Microsoft SQL Who should read this paper Technical White Papers are designed
More informationBackup Exec 2014: Protecting Microsoft SQL
TECHNICAL BRIEF: BACKUP EXEC 2014: PROTECTING MICROSOFT SQL........................................ Backup Exec 2014: Protecting Microsoft SQL Who should read this paper Technical White Papers are designed
More informationSymantec Backup Exec 2014 Agents and Options
Symantec Backup Exec 2014 Agents and Options Data Sheet: Data Protection Overview enhance and extend Backup Exec features, capabilities, and platform support. Whether you need to protect VMware vsphere,
More informationBackup Exec 12.5 Agent for VMware Virtual Infrastructure FAQ
Backup Exec 12.5 Agent for VMware Virtual Infrastructure FAQ Contents Overview... 1 Supported Configurations... 3 Backup... 6 Database and Application Protection... 9 Virtual Machine Recovery... 10 Licensing...
More informationNetBackup 7.6 Best Practices: Protecting Virtual Environments Suwat Saelim
NetBackup 7.6 Best Practices: Protecting Virtual Environments Suwat Saelim Sr. Technical Consultant Virtualization Environments 2 General Concepts for Better Virtualization Backups Understand virtualization
More informationSymantec Backup Exec 2012
Better backup for all Data Sheet: Backup and Disaster Recovery Overview is one integrated product that protects virtual and physical environments, simplifies both backup and disaster recovery, and recovers
More informationVeritas Backup Exec 15: Protecting Microsoft SQL
Veritas Backup Exec 15: Protecting Microsoft SQL Who should read this paper Technical White Papers are designed to introduce IT professionals to key technologies and technical concepts that are associated
More informationSymantec Backup Exec 2010 R2 Agent for Microsoft Hyper-V FAQ
Symantec Backup Exec 2010 R2 Agent for Microsoft Hyper-V FAQ Updated July 26th, 2010 Contents Overview... 1 Virtual Machine Backup... 3 Cluster Shared Volume Support... 5 Database and Application Protection...
More informationSymantec NetBackup 7 Clients and Agents
Complete protection for your information-driven enterprise Overview Symantec NetBackup provides a simple yet comprehensive selection of innovative clients and agents to optimize the performance and efficiency
More informationOptimized data protection through one console for physical and virtual systems, including VMware and Hyper-V virtual systems
Symantec Backup Exec 12.5 for Windows Small Business Server Premium and Standard Editions Comprehensive data protection and system recovery for Microsoft Windows Small Business Server Overview Symantec
More informationSymantec NetBackup Blueprints
Symantec NetBackup Blueprints Blueprint for Microsoft Hyper-V Symantec Backup and Recovery Technical Services Symantec NetBackup Blueprints 1 Symantec NetBackup Blueprints Preface/disclaimer Notice This
More informationTurbo Charge Your Data Protection Strategy
Turbo Charge Your Data Protection Strategy Data protection for the hybrid cloud 1 WAVES OF CHANGE! Data GROWTH User EXPECTATIONS Do It YOURSELF Can t Keep Up Reliability and Visibility New Choices and
More informationBackup Exec 2010 Deduplication Protect More, Store Less, Save More
Backup Exec 2010 Deduplication Protect More, Store Less, Save More Lim Andre Xavier Regional Product Manager Asia Pacific & Japan Information Management Group - SMB 2 3 Symantec Backup Exec 2010 Agenda
More informationDESIGN AND IMPLEMENTATION GUIDE EMC DATA PROTECTION OPTION NS FOR VSPEXX PRIVATE CLOUD EMC VSPEX December 2014
DESIGN AND IMPLEMENTATION GUIDE EMC DATA PROTECTION OPTIONS FOR VSPEX PRIVATE CLOUD EMC VSPEX December 2014 Copyright 2013-2014 EMC Corporation. All rights reserved. Published in USA. Published December,
More informationVirtual Server Agent v9 with VMware. March 2011
Virtual Server Agent v9 with VMware March 2011 Contents Summary... 3 Backup Transport Methods... 3 Deployment Scenarios... 3 VSA Installation Requirements... 4 VSA Patch Requirements... 4 VDDK Installation...
More informationBoost your storage buying power... use ours!
TM TM Data Sheets : White Papers : Case Studies For over a decade Coolspirit have been supplying the UK s top organisations with storage products and solutions so be assured we will meet your requirements
More informationVirtually Effortless Backup for VMware Environments
A White Paper ly Effortless for Environments Abstract: and disaster recovery (DR) strategies protect data from corruption and failures and ensure that if these types of events occur, companies aren t forced
More informationProtecting the Microsoft Data Center with NetBackup 7.6
Protecting the Microsoft Data Center with NetBackup 7.6 Amit Sinha NetBackup Product Management 1 Major Components of a Microsoft Data Center Software Hardware Servers Disk Tape Networking Server OS Applications
More informationMore enhanced features.
More enhanced features. Saves time and lowers cost. Upgrade today for complete data and system protection across your virtual and physical server environments. Symantec Backup Exec 12.5 NEW agents for
More informationDell NetVault Backup Plug-in for VMware 10.0.1. User s Guide
Dell NetVault Backup Plug-in for VMware 10.0.1 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationVMware vsphere Data Protection 6.0
VMware vsphere Data Protection 6.0 TECHNICAL OVERVIEW REVISED FEBRUARY 2015 Table of Contents Introduction.... 3 Architectural Overview... 4 Deployment and Configuration.... 5 Backup.... 6 Application
More informationData Sheet: Backup & Recovery Symantec Backup Exec 12.5 for Windows Servers The gold standard in Windows data protection
The gold standard in Windows data protection Overview Symantec Backup Exec 12.5 delivers market-leading backup and recovery protection from server to desktop, providing complete data protection for the
More informationDistributed Backup with the NetVault Plug-in for VMware for Scale and Performance
Distributed Backup with the NetVault Plug-in for VMware for Scale and Performance Table of contents Introduction...3 Background...3 Problem...4 Solution...4 NetVault VMware Plug-in Configuration...5 NetVault
More informationVMware vsphere Data Protection Evaluation Guide REVISED APRIL 2015
VMware vsphere Data Protection REVISED APRIL 2015 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Requirements.... 4 Evaluation Workflow... 5 Overview.... 5 Evaluation
More informationSymantec NetBackup for VMware Administrator's Guide. Release 7.6
Symantec NetBackup for VMware Administrator's Guide Release 7.6 Symantec NetBackup for VMware Guide The software described in this book is furnished under a license agreement and may be used only in accordance
More informationVeeam Backup & Replication
Veeam Backup & Replication Version 7.0 Evaluator s Guide Hyper-V Environments August, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part
More informationVMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014
VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Additional Features and Benefits of
More informationVMware vsphere Data Protection 6.1
VMware vsphere Data Protection 6.1 Technical Overview Revised August 10, 2015 Contents Introduction... 3 Architecture... 3 Deployment and Configuration... 5 Backup... 6 Application Backup... 6 Backup Data
More informationBackup Exec 2014: Deduplication Option
TECHNICAL BRIEF: BACKUP EXEC 2014: DEDUPLICATION OPTION........................................ Backup Exec 2014: Deduplication Option Who should read this paper Technical White Papers are designed to
More informationBackup and Recovery Best Practices With CommVault Simpana Software
TECHNICAL WHITE PAPER Backup and Recovery Best Practices With CommVault Simpana Software www.tintri.com Contents Intended Audience....1 Introduction....1 Consolidated list of practices...............................
More informationBackup and Recovery Best Practices With Tintri VMstore
Backup and Recovery Best Practices With Tintri VMstore Backup and Recovery Best Practices with Tintri VMstore TECHNICAL BEST PRACTICES PAPER, Revision 1.0, April 10, 2014 Contents Contents Introduction
More informationIntroduction. Setup of Exchange in a VM. VMware Infrastructure
Introduction VMware Infrastructure is deployed in data centers for deploying mission critical applications. Deployment of Microsoft Exchange is a very important task for the IT staff. Email system is an
More informationSolution Overview VMWARE PROTECTION WITH EMC NETWORKER 8.2. White Paper
White Paper VMWARE PROTECTION WITH EMC NETWORKER 8.2 Solution Overview Abstract This white paper describes the integration of EMC NetWorker with VMware vcenter. It also includes details on the NetWorker
More informationRedefining Microsoft SQL Server Data Management. PAS Specification
Redefining Microsoft SQL Server Data Management APRIL Actifio 11, 2013 PAS Specification Table of Contents Introduction.... 3 Background.... 3 Virtualizing Microsoft SQL Server Data Management.... 4 Virtualizing
More informationBackup Exec 15: Deduplication Option
TECHNICAL BRIEF: BACKUP EXEC 15: DEDUPLICATION OPTION........................................ Backup Exec 15: Deduplication Option Who should read this paper Technical White Papers are designed to introduce
More informationVirtual Machine Protection with Symantec NetBackup 7
Overview There s little question that server virtualization is the single biggest game-changing trend in IT today. Budget-strapped IT departments are racing to embrace the promise of virtualization for
More informationVMware Backup, Archive, and Disaster Recovery: Next Generation VMware Data Protection. 7 Technology Circle Suite 100 Columbia, SC 29203
VMware Backup, Archive, and Disaster Recovery: Next Generation VMware Data Protection 7 Technology Circle Suite 100 Columbia, SC 29203 Phone: 866.359.5411 E-Mail: sales@unitrends.com URL: www.unitrends.com
More informationVMware VDR and Cloud Storage: A Winning Backup/DR Combination
VMware VDR and Cloud Storage: A Winning Backup/DR Combination 7/29/2010 CloudArray, from TwinStrata, and VMware Data Recovery combine to provide simple, fast and secure backup: On-site and Off-site The
More informationCA ARCserve Family r15
CA ARCserve Family r15 Rami Nasser EMEA Principal Consultant, Technical Sales Rami.Nasser@ca.com The ARCserve Family More than Backup The only solution that: Gives customers control over their changing
More informationSymantec NetBackup for VMware Administrator's Guide. Release 7.5
Symantec NetBackup for VMware Administrator's Guide Release 7.5 21220080 Symantec NetBackup for VMware Guide The software described in this book is furnished under a license agreement and may be used only
More informationBackupEnabler: Virtually effortless backups for VMware Environments
White Paper BackupEnabler: Virtually effortless backups for VMware Environments Contents Abstract... 3 Why Standard Backup Processes Don t Work with Virtual Servers... 3 Agent-Based File-Level and Image-Level
More informationSymantec NetBackup 7.5 for VMware
V-Ray visibility into virtual machine protection Solution Overview: Data Protection Overview There is little question that server virtualization is the single biggest game-changing trend in IT today. Budget-strapped
More informationVeritas Backup Exec 15: Deduplication Option
Veritas Backup Exec 15: Deduplication Option Who should read this paper Technical White Papers are designed to introduce IT professionals to key technologies and technical concepts that are associated
More informationVeeam Backup & Replication for VMware
Veeam Backup & Replication for VMware Version 8.0 Evaluator s Guide May, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication
More informationHyper-V backup implementation guide
Hyper-V backup implementation guide A best practice guide for Hyper-V backup administrators. www.backup-assist.ca Contents 1. Planning a Hyper-V backup... 2 Hyper-V backup considerations... 2 2. Hyper-V
More informationESG Lab Review. The Challenges
ESG Lab Review Protecting Virtual Environments with Symantec Backup Exec 2014 Date: November 2014 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Senior Lab Analyst Abstract: This ESG Lab review documents
More informationTop 10 Do s/don ts of Data Protection for VMware vsphere
September 8, 2014 Top 10 Do s/don ts of Data Protection for VMware vsphere Dominic Cheah Technical Marketing Engineer Agenda Exploring Data Protection for VMware vsphere vsphere Snapshots, Cloning, and
More informationCA arcserve Unified Data Protection virtualization solution Brief
CA arcserve Unified Data Protection virtualization solution Brief Server and desktop virtualization have become very pervasive in most organizations, and not just in the enterprise. Everybody agrees that
More informationSymantec NetBackup 7.5 Technical Brief
TECHNICAL BRIEF: SYMANTEC NETBACKUP 7.5 TECHNICAL BRIEF........................................ Symantec NetBackup 7.5 Technical Brief Who should read this paper This document is intended for backup administrators
More informationBusiness Process Desktop: Acronis backup & Recovery 11.5 Deployment Guide
WHITE Deployment PAPERGuide Business Process Desktop: Acronis backup & Recovery 11.5 Deployment Guide An Acronis White Paper Copyright Acronis, Inc., 2000 2011 Deployment Guide Table of contents About
More informationBackup Exec 15: Administration
Course Code: VERIDP0137 Vendor: Veritas Course Overview Duration: 5 RRP: 2,540 Backup Exec 15: Administration Overview The Symantec Backup Exec 15: Administration course is designed for the data protection
More informationTECHNICAL PAPER. Veeam Backup & Replication with Nimble Storage
TECHNICAL PAPER Veeam Backup & Replication with Nimble Storage Document Revision Date Revision Description (author) 11/26/2014 1. 0 Draft release (Bill Roth) 12/23/2014 1.1 Draft update (Bill Roth) 2/20/2015
More informationW H I T E P A P E R. Optimized Backup and Recovery for VMware Infrastructure with EMC Avamar
W H I T E P A P E R Optimized Backup and Recovery for VMware Infrastructure with EMC Avamar Contents Introduction...1 VMware Infrastructure Overview...1 VMware Consolidated Backup...2 EMC Avamar Overview...3
More informationST0-141 Q&A. DEMO Version
Symantec Backup Exec 2012 Technical Assessment Q&A DEMO Version Copyright (c) 2012 Chinatag LLC. All rights reserved. Important Note Please Read Carefully For demonstration purpose only, this free version
More informationBackup and Recovery Best Practices With vsphere Data Protection Advanced
TECHNICAL WHITE PAPER Backup and Recovery Best Practices With vsphere Data Protection Advanced www.tintri.com Contents Intended Audience....1 Introduction....1 Consolidated list of practices...............................
More informationHow To Backup A Virtual Machine With Thinware Vbackup
vbackup Administrator s Guide Thinware vbackup 4.0.1 Thinware vbackup Administrator s Guide Thinware vbackup Administrator s Guide Revision: 4.0.1-1 The latest product updates and most up-to-date documentation
More informationSymantec NetBackup 7.5 Clients and Agents
Complete protection for your information-driven enterprise Data Sheet: Data Protection Overviewview Symantec NetBackup provides a simple yet comprehensive selection of innovative clients and agents to
More informationConfidence in a connected world. Veritas NetBackup 6.5 for VMware 3.x Best Practices
WHITE PAPER: Best Practices Confidence in a connected world. Veritas NetBackup 6.5 for VMware 3.x Best Practices White Paper: Best Practices Veritas NetBackup 6.5 for VMware 3.x Best Practices November
More informationHow To Improve Backup Exec 2014
Backup Exec 2014 Olivier Bogaerts Sr Presales Consultant Today s IT Challenge Virtualization, data growth, low downtime tolerance Technical Overview: Backup Exec 2014 2 Today s IT Challenge Infrastructure
More informationBACKUP ESSENTIALS FOR PROTECTING YOUR DATA AND YOUR BUSINESS. Disasters happen. Don t wait until it s too late.
BACKUP ESSENTIALS FOR PROTECTING YOUR DATA AND YOUR BUSINESS Disasters happen. Don t wait until it s too late. OVERVIEW It s inevitable. At some point, your business will experience data loss. It could
More informationSymantec Backup Exec 2010
Reliable Backup and Recovery Designed for Your Growing Business Overview delivers market leading backup and recovery protection from server to desktop. Easily protect more data while you reduce storage
More informationIntroduction to VMware vsphere Data Protection TECHNICAL WHITE PAPER
Introduction to VMware vsphere Data Protection TECHNICAL WHITE PAPER Table of Contents Introduction.... 3 Architectural Overview... 3 Deployment and Configuration.... 5 Administration.... 5 Backup....
More informationRedefining Microsoft Exchange Data Management
Redefining Microsoft Exchange Data Management FEBBRUARY, 2013 Actifio PAS Specification Table of Contents Introduction.... 3 Background.... 3 Virtualizing Microsoft Exchange Data Management.... 3 Virtualizing
More informationSymantec NetBackup deduplication general deployment guidelines
TECHNICAL BRIEF: SYMANTEC NETBACKUP DEDUPLICATION GENERAL......... DEPLOYMENT............. GUIDELINES.................. Symantec NetBackup deduplication general deployment guidelines Who should read this
More informationCA arcserve r16.5 Hybrid data protection
CA arcserve r16.5 Hybrid data protection Whether you re protecting the data center, remote offices or desktop resources, you need a solution that helps you meet today s demanding service-level agreements
More informationRED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES
RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS Server virtualization offers tremendous benefits for enterprise IT organizations server
More informationBackup Exec 2010 R2 Key Sales Plays Safe, Secure, Sold
Backup Exec 2010 R2 Key Sales Plays Safe, Secure, Sold Udi Taboch CTO, ABnet Communications How Do Businesses Ensure Easy Recovery of Critical Data While Minimizing Storage Costs? Only 27% of SMBs believe
More informationVirtual Server System and Data Protection, Recovery and Availability with CA ARCserve r16
Virtual Server System and Data Protection, Recovery and Availability with CA ARCserve r16 1 Table of Contents Introduction... 3 Key challenges for protecting virtual servers... 3 Backup and recovery...
More informationSymantec NetBackup Blueprints
Symantec NetBackup Blueprints Blueprint for Microsoft Exchange Symantec Backup and Recovery Technical Services Symantec NetBackup Blueprints 1 Symantec NetBackup Blueprints Preface/disclaimer Notice This
More informationSymantec Backup Exec Blueprints
Symantec Backup Exec Blueprints Blueprint for SQL Backup Exec Technical Services Backup & Recovery Technical Education Services Symantec Backup Exec Blueprints 1 Symantec Backup Exec Blueprints Preface/disclaimer
More informationBDR TM for VMware. VMware BACKUP WITH VEMBU. VEMBU TECHNOLOGIES www.vembu.com TRUSTED BY OVER 25,000 BUSINESSES
BDR TM for VMware VMware BACKUP WITH VEMBU VEMBU TECHNOLOGIES www.vembu.com Copyright Information Information in this document is subject to change without notice. The entire risk of the use or the results
More informationA Practical Guide to Protecting and. Virtual Environment for Rapid Recovery
A Practical Guide to Protecting and Leveraging Your Virtual Environment for Rapid Recovery TABLE OF CONTENTS PAGE 03 PART 1 Common roadblocks to broadly rolling out virtualization PAGE 05 PART 2 The challenges
More informationSymantec NetBackup for VMware Administrator's Guide
Symantec NetBackup for VMware Administrator's Guide UNIX, Windows, and Linux Release 7.0 20654026 Symantec NetBackup for VMware Guide The software described in this book is furnished under a license agreement
More informationProtecting Microsoft Hyper-V 3.0 Environments with CA ARCserve
Solution Brief: CA ARCserve R16.5 Complexity ate my budget Protecting Microsoft Hyper-V 3.0 Environments with CA ARCserve Customer Challenges Today, you face demanding service level agreements (SLAs) while
More informationReal-time Protection for Hyper-V
1-888-674-9495 www.doubletake.com Real-time Protection for Hyper-V Real-Time Protection for Hyper-V Computer virtualization has come a long way in a very short time, triggered primarily by the rapid rate
More informationTABLE OF CONTENTS. Administration Guide - Virtual Server idataagent (VMware) Page 1 of 176 OVERVIEW
Page 1 of 176 Administration Guide - Virtual Server idataagent (VMware) TABLE OF CONTENTS OVERVIEW Introduction Key Features Complete Virtual Machine Protection Granular Recovery of Virtual Machine Data
More information[VADP OVERVIEW FOR NETBACKUP]
2013 Ram Nagalla [VADP OVERVIEW FOR NETBACKUP] Understanding the concept of VADP backup in Netbackup and brief description about the different configuration scenarios. Index 1) Overview. 2 2) Compatibility
More informationInstant Recovery for VMware
NETBACKUP 7.6 FEATURE BRIEFING INSTANT RECOVERY FOR VMWARE NetBackup 7.6 Feature Briefing Instant Recovery for VMware Version number: 1.0 Issue date: 2 nd August 2013 This document describes a feature
More informationBusiness Application Continuity CA ARCserve Backup CA ARCserve D2D CA ARCserve Replication and High Availability
Business Application Continuity CA ARCserve Backup CA ARCserve D2D CA ARCserve Replication and High Availability Tamas.Jung@ca.com CEE RMDM Technical Sales CA Recovery Management R 15 Total protection
More information