EMC Solutions for Virtualized Environments Dumitru Taraianu Presales, EMC 1
VMWare Present & Future Present Agent installed in each host ESX Console-level backup VCB Future vstorage API for Data Protection Data deduplication? How about NOT doing any backup? Assessments 2
Digital Information Created and Replicated Worldwide 2,500 Exabytes 2,000 1,500 1,000 500 5 -FOLD growth in4 YEARS DVD RFID digital TV MP3 players digital cameras camera phones, VoIP medical imaging, laptops, 487 data center applications, games Exabytes satellite images, GPS, ATMs, scanners sensors, digital radio, DLP theaters, telematics peer-to-peer, e-mail, instant messaging, videoconferencing, CAD/CAM, toys, industrial machines, security systems, appliances 2,502 Exabytes 0 2008 2009 2010 2011 2012 Source: IDC Digital Universe White Paper, Sponsored by EMC, May 2009 3
Digital Information Created and Replicated Worldwide 1 EB = 1,000,000,000,000,000,000 B = 10 18 bytes In principle, the 64-bit microprocessors found in many computers can address up to 16 exabytes of memory. A popular expression claims that "all words ever spoken by human beings" could be stored in approximately 5 exabytes of data, Source: IDC Digital Universe White Paper, Sponsored by EMC, May 2009 4
the classic way TREATING VIRTUAL MACHINES AS PHYSICAL MACHINES (GUEST) USING A BACKUP AGENT ON THE ESX SERVICE CONSOLE Agent VMware Virtualization Layer x86 Architecture Agent Tape Array VMware Virtualization Layer x86 Architecture Agent Service Console Tape Array CPUMemory NIC CPUMemory NIC USING VMWARE CONSOLIDATED BACKUP (VCB) Virtual Machines Centralized Data Mover Proxy ESX Physical SAN Storage SNAPSHOT SNAPSHOT SNAPSHOT MOUNT 5
NetWorker and VMware Protection IN-GUEST ESX CONSOLE VCB Agent VMware Virtualization Layer x86 Architecture CPU Memory NIC Agent Tape Array VMware Virtualization Layer x86 Architecture CPU Memory NIC Agent Service Console Tape Array Virtual Machines ESX Physical SAN Storage Centralized Data Mover Proxy MOUNT SNAPSHOT SNAPSHOT SNAPSHOT Solutions for every stage of VMware adoption Granular and application consistent virtual machine backup at the guest level Image-level backup at the ESX Service Console level Snapshot-based backup with VMware Consolidated (VCB) Choose traditional or deduplication backup Traditional operations deliver VMware protection with disk and tape Source-based deduplication reduces impact of backup ideal for virtual machine backup 6
NetWorker and VMware Guest Individual backup for each virtual machine VMs treated like any other physical machine NetWorker client and module software installed on each guest sent via LAN to backup server or storage node NW 7.4.1 VMware Hardware CPU Memory NW 7.4.1 NW 7.4.1 NIC NetWorker, VTL, Tape Storage Node Simple integration and familiar workflows Traditional or deduplication backup Enables traditional backup approach for application consistent backup Deduplication support with file-level backup Physical 7
NetWorker and VMware Console NetWorker client software installed on the VMware console (Linux) Enables virtual machine image (.vmdk) level backup and recovery sent via LAN to backup server or storage node No proxy or SAN required No file level backup Supports traditional and deduplication backup workflows VMware Virtualization Layer x86 Architecture CPU Memory NIC Physical Service Console NetWorker, VTL, Tape Storage Node 8
NetWorker and VMware Consolidated Centralized Proxy-based backup for VMware Infrastructure 3 Leverages NetWorker Interoperability Module distributed by VMware Image or File Level options Full-Image VM backup of any supported guest operating system File-Level backup for Windows s Application crash consist Reduces backup load on ESX Eliminates LAN backup traffic by moving data directly from SAN Simplifies backup and reduces licensing costs Use a single client license for proxy Optional Storage Node for LAN-Free data flow Supports traditional and deduplication backup workflows Virtual Machines ESX Physical SAN Storage Centralized Data Mover Proxy SNAPSHOT SNAPSHOT SNAPSHOT MOUNT 9
Auto-discovery of VMware Environments NetWorker connects with VMware Virtual Center to automatically discover virtual machines Sends notification of unprotected VMs Simplifies management of VMware environments Prevents missing backups of new virtual machines 10
VMware Visualization Graphical Mapping of the Virtual Environment Graphical representation of the virtual backup environment Shows the relationship between virtual clients and backup groups Unique icons indicate protection type configured Protected as guest Protected with VCB Unprotected Interactive controls allows user to customize and search the map Zoom, find, filter, etc. Simplifies management of large VMware environments 11
NetWorker Licensing for VMware Simplified, Less Costly Licensing for Virtual Environments OLD NEW Scenario A: Scenario B: Scenario A: Scenario B: 5 VMs protected per ESX host Exchange and SQL each on two VMs per host 5 VMs protected per ESX host Exchange and SQL each on two VMs per host Exch Exch SQL SQL Exch Exch SQL SQL 5 Client Licenses 4 Client Licenses + 2 NetWorker Module for Exchange License + 2 NetWorker Module for SQL License 1 Virtual Edition Client License 1 Virtual Edition Client License + 1 NetWorker Module for Exchange License + 1 NetWorker Module for SQL License 12
How Source Based Deduplication Works ❶ First Instance VMDK1 ❷ Duplicate Instance VMDK1 ❸ Modified Instance VMDK2 VM VM VM Para VM Management VM VM VM Para VM Management VM VM VM Para VM Management VMware Hypervisor VMvisor Virtual Services Resource Management Storage File System Networking VMware Hypervisor VMvisor Virtual Services Resource Management Storage File System Networking VMware Hypervisor VMvisor Virtual Services Resource Management Storage File System Networking Hardware Hardware Hardware CPU Memory NIC CPU Memory NIC CPU Memory NIC Only unique data segments are backed up A B C D Data already backed up, so only a unique ID pointer is stored (20 bytes) A B C D E E New data segment identified and backed up Deduplication Node (stored backup data) 13
Avamar Virtual Edition for VMware Avamar Software Deployed as a Virtual Appliance Industry s first de-duplication virtual appliance for backup, recovery, and disaster recovery No other VMware backup and recovery product encapsulates both backup and disaster recovery Leverages existing servers and storage Can utilize any storage (SAN, NAS, or DAS) Replication (of applications and storage) eliminates shipping tapes Replicate between Avamar virtual machines, or from Avamar virtual machines to Avamar Data Store or other server solutions Facilitates rapid, cost-effective deployment and return on investment Application Operating System ESX Hardware CPU Memory Avamar VM Operating System Avamar VM Operating System NIC 14
vstorage APIs for Data Protection The vstorage APIs for Data Protection enable backup software to protect system, application, and user data in your virtual machines in a simple and scalable way. These APIs enable backup software to: Perform full, differential, and incremental image backup and restore of virtual machines. Perform file-level backup of virtual machines using supported Windows and Linux operating systems Ensure data consistency by using Microsoft Volume Shadow Copy Services (VSS) for virtual machines running supported Microsoft Windows operating systems 15
VMWare Data Recovery http://www.vmware.com/files/pdf/vmware_data_recovery_faq_4.21.09.pdf VMware Data Recovery is a separate product that is built on the VMware vstorage APIs for Data Protection(VADP). Is VMware Data Recovery the replacement for VMware Consolidated (VCB)? VMware Data Recovery is not the replacement product for VCB. Both products will coexist. Define jobs: select sources, destination, backup window and retention policy target Virtual disks and CIFS share Full and incremental backups VM. (Note that after the initial full backups, all other backups are incremental) Restore Full VM restore; create or overwrite entire VM Overwrite single disk Power on VM after restore 16
How about NOT doing any backup? 17
EMC Consulting Virtualization Framework EMC Strategy for Virtualization Examine and analyze an enterprise s current infrastructure, business objectives, operational capabilities, and business processes. Gap analysis, develops a recommended action plan, and document an enterprise strategy for EMC s customer. EMC Design for Virtualization Infrastructure and Operations Detailed design service leading to enterprise scale implementation Develops a detailed design and migration plan for virtualization based on the developed strategy, business requirements, and future goals. EMC Assessments for /Deduplication Detailed reports on current backup infrastructure status Deduplication analysis for your data 18
^ 19