SlideShare uma empresa Scribd logo
1 de 9
Baixar para ler offline
White
Paper

Backup and Recovery of Large Scale
VMware environments

By Mark Bowker


October, 2010




This ESG White Paper was commissioned by EMC
and is distributed under license from ESG.

© 2010, Enterprise Strategy Group, Inc. All Rights Reserved
White Paper: Backup and Recovery of Large Scale VMware Environments                                                                                    2


Contents
   Introduction .................................................................................................................................................. 3
     Virtualization Priorities ............................................................................................................................................. 3
     Virtualization Acceleration ....................................................................................................................................... 4
     Data Protection at Scale ........................................................................................................................................... 5
   VMware Enables Faster Recovery ................................................................................................................ 5
   EMC Avamar Eases Data Protection for Large Virtual Deployments ........................................................... 6
     Management ............................................................................................................................................................ 6
   Virtual Computing Environment Coalition Vblocks ...................................................................................... 7
   The Bigger Truth ........................................................................................................................................... 8




All trademark names are property of their respective companies. Information contained in this publication has been obtained by sources The
Enterprise Strategy Group (ESG) considers to be reliable but is not warranted by ESG. This publication may contain opinions of ESG, which are
subject to change from time to time. This publication is copyrighted by The Enterprise Strategy Group, Inc. Any reproduction or redistribution of
this publication, in whole or in part, whether in hard-copy format, electronically, or otherwise to persons not authorized to receive it, without the
express consent of the Enterprise Strategy Group, Inc., is in violation of U.S. copyright law and will be subject to an action for civil damages and, if
applicable, criminal prosecution. Should you have any questions, please contact ESG Client Relations at (508) 482-0188.




                                             © 2010, Enterprise Strategy Group, Inc. All Rights Reserved.
White Paper: Backup and Recovery of Large Scale VMware Environments                                             3


Introduction
Rapid growth in the adoption of server virtualization at scale is continuing with more and more organizations
deploying server virtualization as a strategy for consolidation, cost reduction, higher resource utilization, and
greater efficiency. Phased adoption seems to be the standard—organizations begin with IT-based applications
residing in the data center (“Stage 1”) and, after they discover the benefits and become more comfortable with the
technology, begin to expand virtualization deployments. As they migrate into later stages and start virtualizing user-
facing applications, new challenges arise. For these applications, consolidation is not the focus; high availability and
data protection rise to the top of the priority list. As a result, any task that can slow down productivity or limit
scalability, such as IO-intensive backup, must be examined carefully.
Traditional backup processes aren’t always the best solution in virtual deployments. They weren’t built for the
extreme data redundancy and hefty server loads of consolidated environments. In a traditional data center,
physical servers host individual applications; server resources are significantly underutilized, but that leaves plenty
of processing power for backup. In a consolidated virtual server implementation, however, multiple virtual
machines (VMs) share the same physical hardware; resources are better utilized, which is cost efficient but leaves
fewer resources for backup. There is also more data to back up due to redundant OS images, application profiles,
and data with fewer resources to do so: an obvious bottleneck. This is exacerbated as virtual environments scale
with hundreds, or even thousands, of virtual machines sharing a common resource pool. These deployments need a
backup/recovery solution built to handle their needs. The best advice is to plan for data protection when
strategizing for future virtualization growth instead of waiting to face problems in real time and risking a
breakdown of virtualization goals.

Virtualization Priorities
ESG research indicates that expanding virtualization is a top IT priority. When asked about their most important IT
priorities for 2010, 33% of respondents to a recent ESG survey said they planned to increase use of server
virtualization—representing the largest percentage of responses (see Figure 1). 1
     Figure 1. Most Important IT Priorities for 2010

                       What are your organization’s most important IT priorities over the next 12-18
                           months? (Percent of respondents, N=515, ten responses accepted)

                    Increase use of server virtualization                                                              33%
                          Information security initiatives                                                       28%
                     Improve data backup and recovery                                                           27%
                        Upgrade network infrastructure                                                          27%
                                     Manage data growth                                                    25%
           Major application deployments or upgrades                                                      24%
                                Data center consolidation                                              23%
       Business continuity/disaster recovery programs                                               21%
                  Large-scale desktop/laptop PC refresh                                          20%
                       Regulatory compliance initiatives                                       19%

                                                              0%       5%       10%   15%     20%      25%       30%   35%

                                                                                            Source: Enterprise Strategy Group, 2010.

1
    Source: ESG Research Report, 2010 IT Spending Intentions Survey, January 2010.


                                       © 2010, Enterprise Strategy Group, Inc. All Rights Reserved.
White Paper: Backup and Recovery of Large Scale VMware Environments                                            4

Drilling down further, survey respondents were asked what they considered to be their top server virtualization
initiatives for 2010. As Figure 2 shows, the top four responses were focused on expanding virtualization
deployments and improving data protection, particularly backup and recovery of virtual machines. 2 As the ratio of
VMs to hosts increases and more applications are virtualized, backups will take longer and consume more
resources. Reducing the amount of data being backed up is essential to ensuring uncompromised production
operations. ESG believes that most organizations will struggle to expand virtualization deployments without first
improving virtual machine backup and recovery.
      Figure 2. Top Server Virtualization Priorities for 2010

                         Which of the following would you consider to be your organization’s top server
                        virtualization initiatives for 2010? (Percent of respondents, N=345, five responses
                                                               accepted)
                   Consolidate more physical servers onto virtualization
                                       platforms
                                                                                                                      48%

                       Improve backup and recovery of virtual machines                                       37%

             Expand number of applications running on virtual machines                                       36%

            Make use of virtual machine replication for disaster recovery                                  32%

                          Increase security of virtual server environment                       23%
                     Improve operational processes for managing virtual
                                         environments
                                                                                               21%
                      Move more applications from test/development to
                                    production environment
                                                                                               21%
               Deploy a storage virtualization solution to support virtual
                                   server environment
                                                                                           18%
              Implement virtual machine mobility / HA (high availability)
                                      functionality
                                                                                           18%
               Integrate virtual environments into existing management
                                  software frameworks
                                                                                        15%
                  Purchase third-party management software for virtual
                                        environments
                                                                                   9%

                       Evaluate alternative hypervisor solutions/vendors           8%

                                                                             0%   10%    20%         30%     40%    50%      60%

                                                                                               Source: Enterprise Strategy Group, 2010.

Virtualization Acceleration
There tends to be inflection points in the virtualization adoption curve where the number of virtual machines jumps
from tens to hundreds to thousands. In a virtualization deployment, backup and recovery can be the limiting
factors: with ten VMs, things look manageable and most organizations can get by with existing tools and processes.
But when you approach 100 and then 1,000 VMs, backup and recovery becomes more daunting.
Very large virtualization deployments of thousands of VMs are currently few and far between, but their numbers
are definitely growing. Fueled by the industry push toward IT as a service models and promises of agile IT services
at lower costs, more and more organizations will find themselves facing these inflection points. In fact, ESG
research shows a 49% increase in the percentage of virtual machines running in a production environment over the
next 24 months. The question is: Will organizations consider the challenges and plan accordingly up front or wait
until backups for 100 virtual machines running business applications are exceeding backup windows?

2
    Ibid.


                                          © 2010, Enterprise Strategy Group, Inc. All Rights Reserved.
White Paper: Backup and Recovery of Large Scale VMware Environments                                                    5

Data Protection at Scale
Traditional data protection models were designed for a physical infrastructure in which isolated applications were
matched with hardware and backed up individually. If the backup were to interfere, only that one application would
be affected. However, now that multiple virtual machines can reside on each physical server, the backup process
becomes more complicated and contention for resources can cause slowdowns and interruptions to multiple
applications simultaneously. In order to scale virtualization deployments effectively, traditional data protection
models must be overhauled. Backup and recovery must be transformed from tape-based storage to capacity-
optimized disk as tape simply cannot deliver the performance and availability new consolidated data loads require.
Scaling a virtual environment can be easier if its impact on backup and recovery is considered in advance. By
proactively building a backup and recovery strategy into the overall virtualization plan, an organization can save
itself some headaches.
    Figure 3. Considerations for Backup and Restore at Scale in VMware Environments

                                                                                      • Physical and virtual
                                                        Cost Effective                • Integrated into converged infrastructure
                                                                                       offerings

                                                                                      • Integration with virtualization platform
                                                        Management                    • Problem identification/ resolution

                                                                                      • Capacity efficiency
                                                          Retention                   • Maintain multiple retention periods
                                                                                      • Structured and unstructured data
                                                                                      • File, image, and site recovery
                                                   Restore Performance                • Application consistency
                                                                                      • Improved RTOs (recovery time objectives)

                                                                                      • Maintain backup windows with scale
                                                   Backup Performance                 • Improve RPO (recovery point objective)

                                                                                      • Consistent performance at scale
                                                   Production Platform                • Virtualization integration
                                                      Infrastructure                  • Backup and recovery to disk




                                                                                           Source: Enterprise Strategy Group, 2010.

VMware Enables Faster Recovery
While backup in a virtual server environment can be challenging, virtualization actually enables faster recovery in
terms of provisioning and getting data back online. In a VMware implementation, a virtual machine workload is
encapsulated into a single file containing the operating system, applications, and data; this file can be
moved/copied anywhere. If it is copied to another server while the first is backed up, very little production time is
lost because the backup no longer interferes with productivity—a VM is not dependent upon particular hardware.
In addition, because the entire application stack the user needs is encapsulated in a VM, it is simpler and faster to
recover. Instead of a sequential recovery process—operating system, then application, then data—everything is
recovered in one (using application-specific guest OS agents) or two (using image-level backup and virtual proxy
servers) steps. 3

3
 This is described in greater detail in a previous ESG publication on EMC Avamar: ESG White Paper, Improving Backup and Recovery for
VMware vSphere Environments, July 2010. All subsequent references to ESG publications come from this source unless otherwise stated.


                                    © 2010, Enterprise Strategy Group, Inc. All Rights Reserved.
White Paper: Backup and Recovery of Large Scale VMware Environments                                        6

In addition, advances in VMware offerings such as the vStorage API for Data Protection (VADP) and vSphere change
block tracking (CBT) have greatly improved backup processes. VADP allows a live system image snapshot to be
captured without impacting applications or putting too much pressure on the host server CPU. It also enables
virtual (instead of physical) proxy servers. CBT, by tracking changed blocks of a VM virtual disk, enables backup and
copying only of changed blocks, reducing backup time and network traffic. These improvements can make a
tremendous difference in backup time and storage capacity as an environment grows.

EMC Avamar Eases Data Protection for Large Virtual Deployments
As virtualized deployments scale, it’s important to know what to expect in order to plan for and avoid problems. A
key part of virtualization scaling includes dealing with a mix of business applications, not just IT system workloads.
The farther along in its virtualization journey an organization gets, the greater its data protection needs will be
because the applications tend to be larger, more difficult to manage, and focused on different priorities. Stage 1
involves virtualizing test beds and unstructured data applications. Once an organization reaches Microsoft
Exchange, SAP, Oracle databases, and desktop virtualization solutions, backup becomes much more important.
Tools and solutions that can meet the service level expectations of business users are needed—applications must
be fully protected, often remotely replicated, and yet remain constantly available.
Expanded virtualization results in net growth of storage volumes. Daily incremental and weekly full backups create
a lot of duplicate data as each VM’s backup job includes OS, application, and file data. How do you continue to fully
protect data and still minimize the CPU, bandwidth, and storage needed? Scaling creates more opportunities for
resource contention as virtual workloads compete for limited, shared resources. So, the smaller the backup load,
the better.
EMC Avamar delivers highly efficient, deduplicated backup and recovery, which is a must for rapidly expanding
virtual server environments. Because reliable data protection is imperative for a virtualization strategy, Avamar can
actually help accelerate VMware adoption as it meets all the requirements for optimizing backup and recovery in a
virtual environment.

Management
EMC Avamar supports both guest- and image-level backups with support for VMware’s vStorage API for Data
Protection; minimizes the backup load; enables cost-efficiency in management, licensing, bandwidth, and storage;
and leverages the full hypervisor feature set. In addition, Avamar is integrated with VMware vSphere, so it can be
monitored and managed via vCenter. As a result, IT can monitor backup and recovery operations in the Activity
Monitor and view virtual machine protection policies (“guest,” “image,” and “none”) as well as the date and time of
the most recent backup. This makes it very easy for operators to identify newly created VMs that may not be
adequately protected. From vCenter, virtual machines may be added and backup policies defined for them.
For image-level backup, Avamar’s architecture leverages a proxy pool that scales up and down based on backup and
restore demands. This allows the backup job to be sent to the first available proxy server as opposed to waiting for
a dedicated proxy server. There are no hard assignments of virtual machines to proxy servers or mapping of storage
LUNs to proxy servers.
These features:
    •   Help improve backup performance
    •   Scale up with performance upon demand to help quickly onboard new applications
    •   Scale out to meet the needs of large VMware environments
    •   Are tightly integrated with the management platform for rapid change integration
The enabling technology for Avamar is source-based deduplication. Instead of copying all data during every daily
full backup, Avamar only copies new, unique, sub-file, variable-length data segments. Compared to traditional full
backup methods, Avamar can reduce the daily impact on virtual and physical infrastructure. Traditional backup


                               © 2010, Enterprise Strategy Group, Inc. All Rights Reserved.
White Paper: Backup and Recovery of Large Scale VMware Environments                                     7

software moves approximately 200% of primary backup data weekly; Avamar moves far less over that same period.
Avamar’s global data deduplication can eliminate the cost of storing and moving redundant data across thousands
of geographically separate VMs.
The implications for resource contention, network bandwidth, and storage requirements are obvious: deduplication
at the source reduces all of these factors. What makes it so important in a growing virtual environment is that it
enables greater levels of server consolidation and actually makes expansion possible for many organizations.
Without it, they suffer backup bottlenecks, bandwidth problems, contention for server resources, and missed
backup windows. IT can also benefit from minimizing the resources required for the backup and restore process
and confidently predict utilization based on application workload without having to factor in the impacts of backups
and restores on the virtualization platform.
What makes Avamar an efficient, client-based data deduplication engine is its intelligent algorithms for sub-file,
variable-length data segments. Other solutions that use fixed-block or fixed-length data segments to deduplicate
can be fooled by logical data shifts, such as inserting data into the beginning of a file. Avamar’s algorithms quickly
determine logical boundary points and redundant data segments. Because it so dramatically reduces the amount of
data copied, organizations can retain full backups on disk for longer periods of time, making data more quickly
recoverable. Avamar also provides single-step recovery, completely eliminating the tasks of restoring a previous full
backup plus subsequent incremental backups. Avamar’s support for VMware’s change block tracking, coupled with
its own inherent capability to reconcile changed data into recoverable backup images, gives it a recovery
performance advantage over most traditional approaches. In addition, Avamar can offer granular, file-level
recovery from image-level backups by opening the image and leveraging its own integrated file system to present
the directory structure to the administrator. Finally, with Avamar, administrators have the flexibility to recover data
to the originating virtual machine or to create, provision, and recover data to a brand new virtual machine—all
managed from within the Avamar user interface. For disaster recovery, Avamar provides secure, efficient, virtual-
to-virtual or virtual-to-physical replication.
Avamar itself scales using a grid architecture, offering linear increases in both performance and capacity as nodes
are added. Each node increases CPU, memory, IO, and capacity for the entire grid.
Avamar offers equivalent benefits to both physical and virtual environments and supports all major proprietary and
open-source operating systems. It includes support for major database and messaging applications from IBM,
Microsoft, and Oracle as well as NDMP for NAS filers. Avamar’s interoperability enhances its scalability;
organizations are not restricted as they expand their virtual server environments.

Virtual Computing Environment Coalition Vblocks
Virtualization across the data center creates the need for tighter integration among servers, networks, and storage.
This is even more the case in large scale virtualized environments. As a result, more and more organizations and
service providers are using converged infrastructure units, such as the Vblock from the Virtual Computing
Environment (VCE) coalition (VMware, Cisco, and EMC), to deliver IT services. These pre-integrated bundles of
compute, network, and storage resources offer a different consumption model for IT services that can dramatically
simplify delivery and accommodate massive scaling of virtualized environments. With Vblocks, IT gains visibility into
the complete infrastructure and can more easily maintain performance, troubleshoot, and proactively respond to
problems. Capacity can also be served up much faster to keep up with rapid growth. The massive scale of
virtualization results not only in data growth, but also in greater power consumption and management complexity;
Vblocks reduce power consumption and simplify management. As server virtualization deployments focus on SAP,
Oracle, and Windows workloads, Vblocks can help speed deployment and time to value.
Vblocks can contain thousands of virtual machines with a mix of application workloads and data sizes. The high-end
configuration, Vblock 2, is in intended for 3,000 to 6,000 VMs while the mid-sized Vblock 1 is designed for 800 to
3,000 VMs. All Vblocks are built with VMware vSphere 4, Cisco compute and networking equipment, and EMC
storage. The three industry leaders have gone to great lengths to provide integrated tools, services, and support to
ensure that IT services are delivered fast without hiccups and bottlenecks. However, if not considered in advance,



                               © 2010, Enterprise Strategy Group, Inc. All Rights Reserved.
White Paper: Backup and Recovery of Large Scale VMware Environments                                   8

the data protection needs of these Vblocks could cause performance problems—exactly what the VCE vendors have
worked so hard to avoid.
Avamar fits well into this type of scenario. Pre-integrated units consolidate a lot of IT resources; Avamar can reduce
the amount of network bandwidth and storage Vblocks need for backup. Avamar also adds another benefit:
business users often need to be convinced to allow their production applications to be virtualized to build comfort
in the virtualized platform. They have similar concerns about converged units such as the Vblock as they are wary of
change and its potential impact on productivity. Avamar, with its ability to eliminate backup resource contention,
bottlenecks, and performance problems, can actually help demonstrate to business owners the value of the Vblock
infrastructure as it has no negative impact on application performance in large scale environments. Whether the
“infrastructure-as-a-service” is coming from an internal IT department or a service provider, Avamar can help
deliver guaranteed performance, availability, and data protection that build user confidence.

The Bigger Truth
Backup redesign is a must if customers are to reach their virtualization goals—without it, scaling the virtual server
environment is nearly impossible. Next-generation backup applications must align with the next generation of IT by
doing more than just escalating server virtualization; they need to support resource and management
consolidation, infrastructure-as-a-service, “cloud” services, and pre-integrated infrastructure bundles. Backup and
recovery processes built for the physical world will not provide the required data protection, application
performance, or storage optimization needed in these new environments. Only with a backup process that is built
for this kind of infrastructure can organizations reap the operational benefits and ROI of large-scale deployments.
VMware recognized this and, as a result, introduced APIs for data protection and change block tracking to keep
data protection of larger systems from being a bottleneck. The combination of VMware enhancements with
Avamar’s architecture creates an exceptional solution. With Avamar, data is captured, transferred, and stored more
efficiently because it takes advantage of vSphere enhancements. Avamar adds another efficiency dimension by
taking innovative approaches to economize and streamline backup and recovery processes. It drives higher VM to
ESX server ratios, supports all methods available (including guest and image backup plus remote office backup), and
optimizes capacity.
When it comes to data protection, IT organizations can either proactively build a solution such as Avamar into their
virtualization plans or wait for problems to emerge and then fix the backup process and restore user confidence in
the virtual infrastructure at the same time. In standard environments, a backup and recovery solution based on
deduplication is extremely helpful; in a very large virtualized infrastructure, it’s an absolute necessity.




                               © 2010, Enterprise Strategy Group, Inc. All Rights Reserved.
20 Asylum Street | Milford, MA 01757 | Tel:508.482.0188 Fax: 508.482.0218 | www.enterprisestrategygroup.com

Mais conteúdo relacionado

Mais procurados

Solution magazine 2012_final_nl
Solution magazine 2012_final_nlSolution magazine 2012_final_nl
Solution magazine 2012_final_nlTTEC
 
Cisco Presentation
Cisco PresentationCisco Presentation
Cisco PresentationRBratton
 
Leveraging Cloud for Non-Production Environments
Leveraging Cloud for Non-Production EnvironmentsLeveraging Cloud for Non-Production Environments
Leveraging Cloud for Non-Production EnvironmentsCognizant
 
Essential Arb 2
Essential Arb 2Essential Arb 2
Essential Arb 2hinser14
 
Sentry Insurance Eprint
Sentry Insurance EprintSentry Insurance Eprint
Sentry Insurance EprintKristin Yokota
 
Will You Be Prepared When The Next Disaster Strikes - Whitepaper
Will You Be Prepared When The Next Disaster Strikes - WhitepaperWill You Be Prepared When The Next Disaster Strikes - Whitepaper
Will You Be Prepared When The Next Disaster Strikes - WhitepaperChristian Caracciolo
 
Automation white paper-nextgendc
Automation white paper-nextgendcAutomation white paper-nextgendc
Automation white paper-nextgendcMike Kuhn
 
Emulex and Enterprise Strategy Group Present Why I/O is Strategic for Virtual...
Emulex and Enterprise Strategy Group Present Why I/O is Strategic for Virtual...Emulex and Enterprise Strategy Group Present Why I/O is Strategic for Virtual...
Emulex and Enterprise Strategy Group Present Why I/O is Strategic for Virtual...Emulex Corporation
 
Mesabi Group paper: Rethink Data Protection and Retention Now Merchandising
Mesabi Group paper: Rethink Data Protection and Retention Now Merchandising Mesabi Group paper: Rethink Data Protection and Retention Now Merchandising
Mesabi Group paper: Rethink Data Protection and Retention Now Merchandising IBM India Smarter Computing
 
Accelerating the Speed of Innovation - Jason Waxman, Intel
Accelerating the Speed of Innovation - Jason Waxman, IntelAccelerating the Speed of Innovation - Jason Waxman, Intel
Accelerating the Speed of Innovation - Jason Waxman, IntelOpen Data Center Alliance
 
Kusnetzky Group: Maximizing the Benefits of Virtualization with Real-time Co...
Kusnetzky Group:  Maximizing the Benefits of Virtualization with Real-time Co...Kusnetzky Group:  Maximizing the Benefits of Virtualization with Real-time Co...
Kusnetzky Group: Maximizing the Benefits of Virtualization with Real-time Co...IBM India Smarter Computing
 
Smau Bari 2012 Roberto Cherubini
Smau Bari 2012   Roberto CherubiniSmau Bari 2012   Roberto Cherubini
Smau Bari 2012 Roberto CherubiniSMAU
 
Net App Scores 100% For Midrange Storage Market Solutions
Net App Scores 100% For Midrange Storage Market SolutionsNet App Scores 100% For Midrange Storage Market Solutions
Net App Scores 100% For Midrange Storage Market SolutionsMichael Hudak
 
Reaching For The Cloud Wp101366
Reaching For The Cloud Wp101366Reaching For The Cloud Wp101366
Reaching For The Cloud Wp101366Erik Ginalick
 
The Zen and Art of IT Management (VM World Keynote 2012)
The Zen and Art of IT Management (VM World Keynote 2012)The Zen and Art of IT Management (VM World Keynote 2012)
The Zen and Art of IT Management (VM World Keynote 2012)CA Technologies
 
Security for v mware
Security for v mwareSecurity for v mware
Security for v mwareReadWrite
 
BeyeUniversity Certificate - Intro to Data Virtualization from Composite Soft...
BeyeUniversity Certificate - Intro to Data Virtualization from Composite Soft...BeyeUniversity Certificate - Intro to Data Virtualization from Composite Soft...
BeyeUniversity Certificate - Intro to Data Virtualization from Composite Soft...Dean Pangelinan
 
Webinar Deck: What's Driving Enterprise Cloud Adoption? The Buyers Speak Out
Webinar Deck: What's Driving Enterprise Cloud Adoption?The Buyers Speak OutWebinar Deck: What's Driving Enterprise Cloud Adoption?The Buyers Speak Out
Webinar Deck: What's Driving Enterprise Cloud Adoption? The Buyers Speak OutEverest Group
 

Mais procurados (20)

Solution magazine 2012_final_nl
Solution magazine 2012_final_nlSolution magazine 2012_final_nl
Solution magazine 2012_final_nl
 
Cisco Presentation
Cisco PresentationCisco Presentation
Cisco Presentation
 
Leveraging Cloud for Non-Production Environments
Leveraging Cloud for Non-Production EnvironmentsLeveraging Cloud for Non-Production Environments
Leveraging Cloud for Non-Production Environments
 
Essential Arb 2
Essential Arb 2Essential Arb 2
Essential Arb 2
 
Sentry Insurance Eprint
Sentry Insurance EprintSentry Insurance Eprint
Sentry Insurance Eprint
 
Will You Be Prepared When The Next Disaster Strikes - Whitepaper
Will You Be Prepared When The Next Disaster Strikes - WhitepaperWill You Be Prepared When The Next Disaster Strikes - Whitepaper
Will You Be Prepared When The Next Disaster Strikes - Whitepaper
 
Automation white paper-nextgendc
Automation white paper-nextgendcAutomation white paper-nextgendc
Automation white paper-nextgendc
 
Emulex and Enterprise Strategy Group Present Why I/O is Strategic for Virtual...
Emulex and Enterprise Strategy Group Present Why I/O is Strategic for Virtual...Emulex and Enterprise Strategy Group Present Why I/O is Strategic for Virtual...
Emulex and Enterprise Strategy Group Present Why I/O is Strategic for Virtual...
 
Mesabi Group paper: Rethink Data Protection and Retention Now Merchandising
Mesabi Group paper: Rethink Data Protection and Retention Now Merchandising Mesabi Group paper: Rethink Data Protection and Retention Now Merchandising
Mesabi Group paper: Rethink Data Protection and Retention Now Merchandising
 
Accelerating the Speed of Innovation - Jason Waxman, Intel
Accelerating the Speed of Innovation - Jason Waxman, IntelAccelerating the Speed of Innovation - Jason Waxman, Intel
Accelerating the Speed of Innovation - Jason Waxman, Intel
 
Patch Management
Patch ManagementPatch Management
Patch Management
 
Kusnetzky Group: Maximizing the Benefits of Virtualization with Real-time Co...
Kusnetzky Group:  Maximizing the Benefits of Virtualization with Real-time Co...Kusnetzky Group:  Maximizing the Benefits of Virtualization with Real-time Co...
Kusnetzky Group: Maximizing the Benefits of Virtualization with Real-time Co...
 
Smau Bari 2012 Roberto Cherubini
Smau Bari 2012   Roberto CherubiniSmau Bari 2012   Roberto Cherubini
Smau Bari 2012 Roberto Cherubini
 
Barqa Edinburgh Final
Barqa Edinburgh FinalBarqa Edinburgh Final
Barqa Edinburgh Final
 
Net App Scores 100% For Midrange Storage Market Solutions
Net App Scores 100% For Midrange Storage Market SolutionsNet App Scores 100% For Midrange Storage Market Solutions
Net App Scores 100% For Midrange Storage Market Solutions
 
Reaching For The Cloud Wp101366
Reaching For The Cloud Wp101366Reaching For The Cloud Wp101366
Reaching For The Cloud Wp101366
 
The Zen and Art of IT Management (VM World Keynote 2012)
The Zen and Art of IT Management (VM World Keynote 2012)The Zen and Art of IT Management (VM World Keynote 2012)
The Zen and Art of IT Management (VM World Keynote 2012)
 
Security for v mware
Security for v mwareSecurity for v mware
Security for v mware
 
BeyeUniversity Certificate - Intro to Data Virtualization from Composite Soft...
BeyeUniversity Certificate - Intro to Data Virtualization from Composite Soft...BeyeUniversity Certificate - Intro to Data Virtualization from Composite Soft...
BeyeUniversity Certificate - Intro to Data Virtualization from Composite Soft...
 
Webinar Deck: What's Driving Enterprise Cloud Adoption? The Buyers Speak Out
Webinar Deck: What's Driving Enterprise Cloud Adoption?The Buyers Speak OutWebinar Deck: What's Driving Enterprise Cloud Adoption?The Buyers Speak Out
Webinar Deck: What's Driving Enterprise Cloud Adoption? The Buyers Speak Out
 

Destaque

EMC IT's Journey to Cloud : BUSINESS PRODUCTION BACKUP & RECOVERY SYSTEMS
EMC IT's Journey to Cloud : BUSINESS PRODUCTION BACKUP & RECOVERY SYSTEMSEMC IT's Journey to Cloud : BUSINESS PRODUCTION BACKUP & RECOVERY SYSTEMS
EMC IT's Journey to Cloud : BUSINESS PRODUCTION BACKUP & RECOVERY SYSTEMSEMC
 
Accel - EMC - Data Domain Series
Accel - EMC - Data Domain SeriesAccel - EMC - Data Domain Series
Accel - EMC - Data Domain Seriesaccelfb
 
Aspirus Enterprise Backup Assessment And Implementation Of Avamar
Aspirus Enterprise Backup Assessment And Implementation Of AvamarAspirus Enterprise Backup Assessment And Implementation Of Avamar
Aspirus Enterprise Backup Assessment And Implementation Of Avamartomwhalen
 
BENIN, 25 – 28 April 2016 National Broadband Plans
BENIN, 25 – 28 April 2016 National Broadband PlansBENIN, 25 – 28 April 2016 National Broadband Plans
BENIN, 25 – 28 April 2016 National Broadband PlansRene Summer
 
Day 9 westward expansion, women religion
Day 9 westward expansion, women religionDay 9 westward expansion, women religion
Day 9 westward expansion, women religionTravis Klein
 
02 allocative efficiency
02 allocative efficiency02 allocative efficiency
02 allocative efficiencyTravis Klein
 
Facebook Regisrtration Plugin (Plugin)
Facebook Regisrtration Plugin (Plugin)Facebook Regisrtration Plugin (Plugin)
Facebook Regisrtration Plugin (Plugin)therealnicdev
 
RSA Discovers Massive Boleto Fraud Ring in Brazil
RSA Discovers Massive Boleto Fraud Ring in BrazilRSA Discovers Massive Boleto Fraud Ring in Brazil
RSA Discovers Massive Boleto Fraud Ring in BrazilEMC
 
MGH Physical, Occupational Therapists Celebrate in October and April
MGH Physical, Occupational Therapists Celebrate in October and April MGH Physical, Occupational Therapists Celebrate in October and April
MGH Physical, Occupational Therapists Celebrate in October and April Laurel Blond
 
Seize ICT enabledTransformation
Seize ICT enabledTransformationSeize ICT enabledTransformation
Seize ICT enabledTransformationRene Summer
 
Mon wars of religion
Mon wars of religionMon wars of religion
Mon wars of religionTravis Klein
 
โรคขาดโปรตีน
โรคขาดโปรตีนโรคขาดโปรตีน
โรคขาดโปรตีนThanaporn Srithananun
 
Holy Trinity School HSA Overview 2012
Holy Trinity School HSA Overview 2012Holy Trinity School HSA Overview 2012
Holy Trinity School HSA Overview 2012htisnj
 

Destaque (20)

EMC IT's Journey to Cloud : BUSINESS PRODUCTION BACKUP & RECOVERY SYSTEMS
EMC IT's Journey to Cloud : BUSINESS PRODUCTION BACKUP & RECOVERY SYSTEMSEMC IT's Journey to Cloud : BUSINESS PRODUCTION BACKUP & RECOVERY SYSTEMS
EMC IT's Journey to Cloud : BUSINESS PRODUCTION BACKUP & RECOVERY SYSTEMS
 
Accel - EMC - Data Domain Series
Accel - EMC - Data Domain SeriesAccel - EMC - Data Domain Series
Accel - EMC - Data Domain Series
 
Avamar 7 2010
Avamar 7 2010Avamar 7 2010
Avamar 7 2010
 
Aspirus Enterprise Backup Assessment And Implementation Of Avamar
Aspirus Enterprise Backup Assessment And Implementation Of AvamarAspirus Enterprise Backup Assessment And Implementation Of Avamar
Aspirus Enterprise Backup Assessment And Implementation Of Avamar
 
Monitoring and operating a private cloud with system center 2012
Monitoring and operating a private cloud with system center 2012Monitoring and operating a private cloud with system center 2012
Monitoring and operating a private cloud with system center 2012
 
BENIN, 25 – 28 April 2016 National Broadband Plans
BENIN, 25 – 28 April 2016 National Broadband PlansBENIN, 25 – 28 April 2016 National Broadband Plans
BENIN, 25 – 28 April 2016 National Broadband Plans
 
Day 9 westward expansion, women religion
Day 9 westward expansion, women religionDay 9 westward expansion, women religion
Day 9 westward expansion, women religion
 
02 allocative efficiency
02 allocative efficiency02 allocative efficiency
02 allocative efficiency
 
Facebook Regisrtration Plugin (Plugin)
Facebook Regisrtration Plugin (Plugin)Facebook Regisrtration Plugin (Plugin)
Facebook Regisrtration Plugin (Plugin)
 
RSA Discovers Massive Boleto Fraud Ring in Brazil
RSA Discovers Massive Boleto Fraud Ring in BrazilRSA Discovers Massive Boleto Fraud Ring in Brazil
RSA Discovers Massive Boleto Fraud Ring in Brazil
 
MGH Physical, Occupational Therapists Celebrate in October and April
MGH Physical, Occupational Therapists Celebrate in October and April MGH Physical, Occupational Therapists Celebrate in October and April
MGH Physical, Occupational Therapists Celebrate in October and April
 
отчётммо 3
отчётммо  3отчётммо  3
отчётммо 3
 
Seize ICT enabledTransformation
Seize ICT enabledTransformationSeize ICT enabledTransformation
Seize ICT enabledTransformation
 
Mon wars of religion
Mon wars of religionMon wars of religion
Mon wars of religion
 
โรคขาดโปรตีน
โรคขาดโปรตีนโรคขาดโปรตีน
โรคขาดโปรตีน
 
Pitch
PitchPitch
Pitch
 
Holy Trinity School HSA Overview 2012
Holy Trinity School HSA Overview 2012Holy Trinity School HSA Overview 2012
Holy Trinity School HSA Overview 2012
 
ไทย 52
ไทย 52ไทย 52
ไทย 52
 
Fri maya art
Fri maya artFri maya art
Fri maya art
 
Recording Reccy
Recording ReccyRecording Reccy
Recording Reccy
 

Semelhante a Whitepaper : ESG Whitepaper: Backup and Recovery of Large Scale VMware Environments

White Paper: Integrated Computing Platforms - Infrastructure Builds for Tomor...
White Paper: Integrated Computing Platforms - Infrastructure Builds for Tomor...White Paper: Integrated Computing Platforms - Infrastructure Builds for Tomor...
White Paper: Integrated Computing Platforms - Infrastructure Builds for Tomor...EMC
 
Esg lab review oracle 2500 m2 mixed workload oct 12
Esg lab review oracle 2500 m2 mixed workload oct 12Esg lab review oracle 2500 m2 mixed workload oct 12
Esg lab review oracle 2500 m2 mixed workload oct 12MALIK7868
 
Securing Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data ProtectionSecuring Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data ProtectionLumension
 
Virtualization 2.0: The Next Generation of Virtualization
Virtualization 2.0: The Next Generation of VirtualizationVirtualization 2.0: The Next Generation of Virtualization
Virtualization 2.0: The Next Generation of VirtualizationEMC
 
VMworld 2013: Virtualization 101
VMworld 2013: Virtualization 101 VMworld 2013: Virtualization 101
VMworld 2013: Virtualization 101 VMworld
 
Cloud Privada: más que solo virtualización
Cloud Privada: más que solo virtualizaciónCloud Privada: más que solo virtualización
Cloud Privada: más que solo virtualizaciónAlejandro Marin
 
See How Virtualization is a key Technology to help Datacenters Move: Whitepaper
See How Virtualization is a key Technology to help Datacenters Move: WhitepaperSee How Virtualization is a key Technology to help Datacenters Move: Whitepaper
See How Virtualization is a key Technology to help Datacenters Move: WhitepaperMicrosoft Private Cloud
 
Communicating Virtualization to Non-IT Audiences
Communicating Virtualization to Non-IT AudiencesCommunicating Virtualization to Non-IT Audiences
Communicating Virtualization to Non-IT AudiencesAkweli Parker
 
Axiom Virtualization Overview
Axiom Virtualization OverviewAxiom Virtualization Overview
Axiom Virtualization Overviewsmoots
 
Idc White Paper For Ibm On Virtualization Srvcs
Idc White Paper For Ibm On Virtualization SrvcsIdc White Paper For Ibm On Virtualization Srvcs
Idc White Paper For Ibm On Virtualization Srvcslambertt
 
Data Center Operational Efficiency Roundtable
Data Center Operational Efficiency RoundtableData Center Operational Efficiency Roundtable
Data Center Operational Efficiency RoundtableHerb Hernandez
 
Virtualization for Midsize Businesses: Keep Your Foot on the Accelerator
Virtualization for Midsize Businesses: Keep Your Foot on the AcceleratorVirtualization for Midsize Businesses: Keep Your Foot on the Accelerator
Virtualization for Midsize Businesses: Keep Your Foot on the AcceleratorIBM India Smarter Computing
 
It optimisation & virtualisation
It optimisation & virtualisationIt optimisation & virtualisation
It optimisation & virtualisationVincent Kwon
 
Symantec ApplicationHA June 2011
Symantec ApplicationHA June 2011Symantec ApplicationHA June 2011
Symantec ApplicationHA June 2011Symantec
 
Symantec ApplicationHA June 2011
Symantec ApplicationHA June 2011Symantec ApplicationHA June 2011
Symantec ApplicationHA June 2011Symantec
 
Delivering Essentials for Albertsons: VMware TAS’s Critical Role During the C...
Delivering Essentials for Albertsons: VMware TAS’s Critical Role During the C...Delivering Essentials for Albertsons: VMware TAS’s Critical Role During the C...
Delivering Essentials for Albertsons: VMware TAS’s Critical Role During the C...VMware Tanzu
 
The business case for standardizing on a single modern browser
The business case for standardizing on a single modern browserThe business case for standardizing on a single modern browser
The business case for standardizing on a single modern browserDavid J Rosenthal
 
Virtualization Leadership Presentation - LONG and SHORT (April 2010)
Virtualization Leadership Presentation - LONG and SHORT (April 2010)Virtualization Leadership Presentation - LONG and SHORT (April 2010)
Virtualization Leadership Presentation - LONG and SHORT (April 2010)IBM India Smarter Computing
 
The Evolution Of Server Virtualization By Hitendra Molleti
The Evolution Of Server Virtualization By Hitendra MolletiThe Evolution Of Server Virtualization By Hitendra Molleti
The Evolution Of Server Virtualization By Hitendra MolletiHitendra Molleti
 

Semelhante a Whitepaper : ESG Whitepaper: Backup and Recovery of Large Scale VMware Environments (20)

White Paper: Integrated Computing Platforms - Infrastructure Builds for Tomor...
White Paper: Integrated Computing Platforms - Infrastructure Builds for Tomor...White Paper: Integrated Computing Platforms - Infrastructure Builds for Tomor...
White Paper: Integrated Computing Platforms - Infrastructure Builds for Tomor...
 
Esg lab review oracle 2500 m2 mixed workload oct 12
Esg lab review oracle 2500 m2 mixed workload oct 12Esg lab review oracle 2500 m2 mixed workload oct 12
Esg lab review oracle 2500 m2 mixed workload oct 12
 
Securing Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data ProtectionSecuring Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data Protection
 
Virtualization 2.0: The Next Generation of Virtualization
Virtualization 2.0: The Next Generation of VirtualizationVirtualization 2.0: The Next Generation of Virtualization
Virtualization 2.0: The Next Generation of Virtualization
 
VMworld 2013: Virtualization 101
VMworld 2013: Virtualization 101 VMworld 2013: Virtualization 101
VMworld 2013: Virtualization 101
 
Yes to virtualization projects but dont virtualize waste
Yes to virtualization projects but dont virtualize wasteYes to virtualization projects but dont virtualize waste
Yes to virtualization projects but dont virtualize waste
 
Cloud Privada: más que solo virtualización
Cloud Privada: más que solo virtualizaciónCloud Privada: más que solo virtualización
Cloud Privada: más que solo virtualización
 
See How Virtualization is a key Technology to help Datacenters Move: Whitepaper
See How Virtualization is a key Technology to help Datacenters Move: WhitepaperSee How Virtualization is a key Technology to help Datacenters Move: Whitepaper
See How Virtualization is a key Technology to help Datacenters Move: Whitepaper
 
Communicating Virtualization to Non-IT Audiences
Communicating Virtualization to Non-IT AudiencesCommunicating Virtualization to Non-IT Audiences
Communicating Virtualization to Non-IT Audiences
 
Axiom Virtualization Overview
Axiom Virtualization OverviewAxiom Virtualization Overview
Axiom Virtualization Overview
 
Idc White Paper For Ibm On Virtualization Srvcs
Idc White Paper For Ibm On Virtualization SrvcsIdc White Paper For Ibm On Virtualization Srvcs
Idc White Paper For Ibm On Virtualization Srvcs
 
Data Center Operational Efficiency Roundtable
Data Center Operational Efficiency RoundtableData Center Operational Efficiency Roundtable
Data Center Operational Efficiency Roundtable
 
Virtualization for Midsize Businesses: Keep Your Foot on the Accelerator
Virtualization for Midsize Businesses: Keep Your Foot on the AcceleratorVirtualization for Midsize Businesses: Keep Your Foot on the Accelerator
Virtualization for Midsize Businesses: Keep Your Foot on the Accelerator
 
It optimisation & virtualisation
It optimisation & virtualisationIt optimisation & virtualisation
It optimisation & virtualisation
 
Symantec ApplicationHA June 2011
Symantec ApplicationHA June 2011Symantec ApplicationHA June 2011
Symantec ApplicationHA June 2011
 
Symantec ApplicationHA June 2011
Symantec ApplicationHA June 2011Symantec ApplicationHA June 2011
Symantec ApplicationHA June 2011
 
Delivering Essentials for Albertsons: VMware TAS’s Critical Role During the C...
Delivering Essentials for Albertsons: VMware TAS’s Critical Role During the C...Delivering Essentials for Albertsons: VMware TAS’s Critical Role During the C...
Delivering Essentials for Albertsons: VMware TAS’s Critical Role During the C...
 
The business case for standardizing on a single modern browser
The business case for standardizing on a single modern browserThe business case for standardizing on a single modern browser
The business case for standardizing on a single modern browser
 
Virtualization Leadership Presentation - LONG and SHORT (April 2010)
Virtualization Leadership Presentation - LONG and SHORT (April 2010)Virtualization Leadership Presentation - LONG and SHORT (April 2010)
Virtualization Leadership Presentation - LONG and SHORT (April 2010)
 
The Evolution Of Server Virtualization By Hitendra Molleti
The Evolution Of Server Virtualization By Hitendra MolletiThe Evolution Of Server Virtualization By Hitendra Molleti
The Evolution Of Server Virtualization By Hitendra Molleti
 

Mais de EMC

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDEMC
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote EMC
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOEMC
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremioEMC
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lakeEMC
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereEMC
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History EMC
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewEMC
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeEMC
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic EMC
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityEMC
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeEMC
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015EMC
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesEMC
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsEMC
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookEMC
 

Mais de EMC (20)

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
 

Último

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Último (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Whitepaper : ESG Whitepaper: Backup and Recovery of Large Scale VMware Environments

  • 1. White Paper Backup and Recovery of Large Scale VMware environments By Mark Bowker October, 2010 This ESG White Paper was commissioned by EMC and is distributed under license from ESG. © 2010, Enterprise Strategy Group, Inc. All Rights Reserved
  • 2. White Paper: Backup and Recovery of Large Scale VMware Environments 2 Contents Introduction .................................................................................................................................................. 3 Virtualization Priorities ............................................................................................................................................. 3 Virtualization Acceleration ....................................................................................................................................... 4 Data Protection at Scale ........................................................................................................................................... 5 VMware Enables Faster Recovery ................................................................................................................ 5 EMC Avamar Eases Data Protection for Large Virtual Deployments ........................................................... 6 Management ............................................................................................................................................................ 6 Virtual Computing Environment Coalition Vblocks ...................................................................................... 7 The Bigger Truth ........................................................................................................................................... 8 All trademark names are property of their respective companies. Information contained in this publication has been obtained by sources The Enterprise Strategy Group (ESG) considers to be reliable but is not warranted by ESG. This publication may contain opinions of ESG, which are subject to change from time to time. This publication is copyrighted by The Enterprise Strategy Group, Inc. Any reproduction or redistribution of this publication, in whole or in part, whether in hard-copy format, electronically, or otherwise to persons not authorized to receive it, without the express consent of the Enterprise Strategy Group, Inc., is in violation of U.S. copyright law and will be subject to an action for civil damages and, if applicable, criminal prosecution. Should you have any questions, please contact ESG Client Relations at (508) 482-0188. © 2010, Enterprise Strategy Group, Inc. All Rights Reserved.
  • 3. White Paper: Backup and Recovery of Large Scale VMware Environments 3 Introduction Rapid growth in the adoption of server virtualization at scale is continuing with more and more organizations deploying server virtualization as a strategy for consolidation, cost reduction, higher resource utilization, and greater efficiency. Phased adoption seems to be the standard—organizations begin with IT-based applications residing in the data center (“Stage 1”) and, after they discover the benefits and become more comfortable with the technology, begin to expand virtualization deployments. As they migrate into later stages and start virtualizing user- facing applications, new challenges arise. For these applications, consolidation is not the focus; high availability and data protection rise to the top of the priority list. As a result, any task that can slow down productivity or limit scalability, such as IO-intensive backup, must be examined carefully. Traditional backup processes aren’t always the best solution in virtual deployments. They weren’t built for the extreme data redundancy and hefty server loads of consolidated environments. In a traditional data center, physical servers host individual applications; server resources are significantly underutilized, but that leaves plenty of processing power for backup. In a consolidated virtual server implementation, however, multiple virtual machines (VMs) share the same physical hardware; resources are better utilized, which is cost efficient but leaves fewer resources for backup. There is also more data to back up due to redundant OS images, application profiles, and data with fewer resources to do so: an obvious bottleneck. This is exacerbated as virtual environments scale with hundreds, or even thousands, of virtual machines sharing a common resource pool. These deployments need a backup/recovery solution built to handle their needs. The best advice is to plan for data protection when strategizing for future virtualization growth instead of waiting to face problems in real time and risking a breakdown of virtualization goals. Virtualization Priorities ESG research indicates that expanding virtualization is a top IT priority. When asked about their most important IT priorities for 2010, 33% of respondents to a recent ESG survey said they planned to increase use of server virtualization—representing the largest percentage of responses (see Figure 1). 1 Figure 1. Most Important IT Priorities for 2010 What are your organization’s most important IT priorities over the next 12-18 months? (Percent of respondents, N=515, ten responses accepted) Increase use of server virtualization 33% Information security initiatives 28% Improve data backup and recovery 27% Upgrade network infrastructure 27% Manage data growth 25% Major application deployments or upgrades 24% Data center consolidation 23% Business continuity/disaster recovery programs 21% Large-scale desktop/laptop PC refresh 20% Regulatory compliance initiatives 19% 0% 5% 10% 15% 20% 25% 30% 35% Source: Enterprise Strategy Group, 2010. 1 Source: ESG Research Report, 2010 IT Spending Intentions Survey, January 2010. © 2010, Enterprise Strategy Group, Inc. All Rights Reserved.
  • 4. White Paper: Backup and Recovery of Large Scale VMware Environments 4 Drilling down further, survey respondents were asked what they considered to be their top server virtualization initiatives for 2010. As Figure 2 shows, the top four responses were focused on expanding virtualization deployments and improving data protection, particularly backup and recovery of virtual machines. 2 As the ratio of VMs to hosts increases and more applications are virtualized, backups will take longer and consume more resources. Reducing the amount of data being backed up is essential to ensuring uncompromised production operations. ESG believes that most organizations will struggle to expand virtualization deployments without first improving virtual machine backup and recovery. Figure 2. Top Server Virtualization Priorities for 2010 Which of the following would you consider to be your organization’s top server virtualization initiatives for 2010? (Percent of respondents, N=345, five responses accepted) Consolidate more physical servers onto virtualization platforms 48% Improve backup and recovery of virtual machines 37% Expand number of applications running on virtual machines 36% Make use of virtual machine replication for disaster recovery 32% Increase security of virtual server environment 23% Improve operational processes for managing virtual environments 21% Move more applications from test/development to production environment 21% Deploy a storage virtualization solution to support virtual server environment 18% Implement virtual machine mobility / HA (high availability) functionality 18% Integrate virtual environments into existing management software frameworks 15% Purchase third-party management software for virtual environments 9% Evaluate alternative hypervisor solutions/vendors 8% 0% 10% 20% 30% 40% 50% 60% Source: Enterprise Strategy Group, 2010. Virtualization Acceleration There tends to be inflection points in the virtualization adoption curve where the number of virtual machines jumps from tens to hundreds to thousands. In a virtualization deployment, backup and recovery can be the limiting factors: with ten VMs, things look manageable and most organizations can get by with existing tools and processes. But when you approach 100 and then 1,000 VMs, backup and recovery becomes more daunting. Very large virtualization deployments of thousands of VMs are currently few and far between, but their numbers are definitely growing. Fueled by the industry push toward IT as a service models and promises of agile IT services at lower costs, more and more organizations will find themselves facing these inflection points. In fact, ESG research shows a 49% increase in the percentage of virtual machines running in a production environment over the next 24 months. The question is: Will organizations consider the challenges and plan accordingly up front or wait until backups for 100 virtual machines running business applications are exceeding backup windows? 2 Ibid. © 2010, Enterprise Strategy Group, Inc. All Rights Reserved.
  • 5. White Paper: Backup and Recovery of Large Scale VMware Environments 5 Data Protection at Scale Traditional data protection models were designed for a physical infrastructure in which isolated applications were matched with hardware and backed up individually. If the backup were to interfere, only that one application would be affected. However, now that multiple virtual machines can reside on each physical server, the backup process becomes more complicated and contention for resources can cause slowdowns and interruptions to multiple applications simultaneously. In order to scale virtualization deployments effectively, traditional data protection models must be overhauled. Backup and recovery must be transformed from tape-based storage to capacity- optimized disk as tape simply cannot deliver the performance and availability new consolidated data loads require. Scaling a virtual environment can be easier if its impact on backup and recovery is considered in advance. By proactively building a backup and recovery strategy into the overall virtualization plan, an organization can save itself some headaches. Figure 3. Considerations for Backup and Restore at Scale in VMware Environments • Physical and virtual Cost Effective • Integrated into converged infrastructure offerings • Integration with virtualization platform Management • Problem identification/ resolution • Capacity efficiency Retention • Maintain multiple retention periods • Structured and unstructured data • File, image, and site recovery Restore Performance • Application consistency • Improved RTOs (recovery time objectives) • Maintain backup windows with scale Backup Performance • Improve RPO (recovery point objective) • Consistent performance at scale Production Platform • Virtualization integration Infrastructure • Backup and recovery to disk Source: Enterprise Strategy Group, 2010. VMware Enables Faster Recovery While backup in a virtual server environment can be challenging, virtualization actually enables faster recovery in terms of provisioning and getting data back online. In a VMware implementation, a virtual machine workload is encapsulated into a single file containing the operating system, applications, and data; this file can be moved/copied anywhere. If it is copied to another server while the first is backed up, very little production time is lost because the backup no longer interferes with productivity—a VM is not dependent upon particular hardware. In addition, because the entire application stack the user needs is encapsulated in a VM, it is simpler and faster to recover. Instead of a sequential recovery process—operating system, then application, then data—everything is recovered in one (using application-specific guest OS agents) or two (using image-level backup and virtual proxy servers) steps. 3 3 This is described in greater detail in a previous ESG publication on EMC Avamar: ESG White Paper, Improving Backup and Recovery for VMware vSphere Environments, July 2010. All subsequent references to ESG publications come from this source unless otherwise stated. © 2010, Enterprise Strategy Group, Inc. All Rights Reserved.
  • 6. White Paper: Backup and Recovery of Large Scale VMware Environments 6 In addition, advances in VMware offerings such as the vStorage API for Data Protection (VADP) and vSphere change block tracking (CBT) have greatly improved backup processes. VADP allows a live system image snapshot to be captured without impacting applications or putting too much pressure on the host server CPU. It also enables virtual (instead of physical) proxy servers. CBT, by tracking changed blocks of a VM virtual disk, enables backup and copying only of changed blocks, reducing backup time and network traffic. These improvements can make a tremendous difference in backup time and storage capacity as an environment grows. EMC Avamar Eases Data Protection for Large Virtual Deployments As virtualized deployments scale, it’s important to know what to expect in order to plan for and avoid problems. A key part of virtualization scaling includes dealing with a mix of business applications, not just IT system workloads. The farther along in its virtualization journey an organization gets, the greater its data protection needs will be because the applications tend to be larger, more difficult to manage, and focused on different priorities. Stage 1 involves virtualizing test beds and unstructured data applications. Once an organization reaches Microsoft Exchange, SAP, Oracle databases, and desktop virtualization solutions, backup becomes much more important. Tools and solutions that can meet the service level expectations of business users are needed—applications must be fully protected, often remotely replicated, and yet remain constantly available. Expanded virtualization results in net growth of storage volumes. Daily incremental and weekly full backups create a lot of duplicate data as each VM’s backup job includes OS, application, and file data. How do you continue to fully protect data and still minimize the CPU, bandwidth, and storage needed? Scaling creates more opportunities for resource contention as virtual workloads compete for limited, shared resources. So, the smaller the backup load, the better. EMC Avamar delivers highly efficient, deduplicated backup and recovery, which is a must for rapidly expanding virtual server environments. Because reliable data protection is imperative for a virtualization strategy, Avamar can actually help accelerate VMware adoption as it meets all the requirements for optimizing backup and recovery in a virtual environment. Management EMC Avamar supports both guest- and image-level backups with support for VMware’s vStorage API for Data Protection; minimizes the backup load; enables cost-efficiency in management, licensing, bandwidth, and storage; and leverages the full hypervisor feature set. In addition, Avamar is integrated with VMware vSphere, so it can be monitored and managed via vCenter. As a result, IT can monitor backup and recovery operations in the Activity Monitor and view virtual machine protection policies (“guest,” “image,” and “none”) as well as the date and time of the most recent backup. This makes it very easy for operators to identify newly created VMs that may not be adequately protected. From vCenter, virtual machines may be added and backup policies defined for them. For image-level backup, Avamar’s architecture leverages a proxy pool that scales up and down based on backup and restore demands. This allows the backup job to be sent to the first available proxy server as opposed to waiting for a dedicated proxy server. There are no hard assignments of virtual machines to proxy servers or mapping of storage LUNs to proxy servers. These features: • Help improve backup performance • Scale up with performance upon demand to help quickly onboard new applications • Scale out to meet the needs of large VMware environments • Are tightly integrated with the management platform for rapid change integration The enabling technology for Avamar is source-based deduplication. Instead of copying all data during every daily full backup, Avamar only copies new, unique, sub-file, variable-length data segments. Compared to traditional full backup methods, Avamar can reduce the daily impact on virtual and physical infrastructure. Traditional backup © 2010, Enterprise Strategy Group, Inc. All Rights Reserved.
  • 7. White Paper: Backup and Recovery of Large Scale VMware Environments 7 software moves approximately 200% of primary backup data weekly; Avamar moves far less over that same period. Avamar’s global data deduplication can eliminate the cost of storing and moving redundant data across thousands of geographically separate VMs. The implications for resource contention, network bandwidth, and storage requirements are obvious: deduplication at the source reduces all of these factors. What makes it so important in a growing virtual environment is that it enables greater levels of server consolidation and actually makes expansion possible for many organizations. Without it, they suffer backup bottlenecks, bandwidth problems, contention for server resources, and missed backup windows. IT can also benefit from minimizing the resources required for the backup and restore process and confidently predict utilization based on application workload without having to factor in the impacts of backups and restores on the virtualization platform. What makes Avamar an efficient, client-based data deduplication engine is its intelligent algorithms for sub-file, variable-length data segments. Other solutions that use fixed-block or fixed-length data segments to deduplicate can be fooled by logical data shifts, such as inserting data into the beginning of a file. Avamar’s algorithms quickly determine logical boundary points and redundant data segments. Because it so dramatically reduces the amount of data copied, organizations can retain full backups on disk for longer periods of time, making data more quickly recoverable. Avamar also provides single-step recovery, completely eliminating the tasks of restoring a previous full backup plus subsequent incremental backups. Avamar’s support for VMware’s change block tracking, coupled with its own inherent capability to reconcile changed data into recoverable backup images, gives it a recovery performance advantage over most traditional approaches. In addition, Avamar can offer granular, file-level recovery from image-level backups by opening the image and leveraging its own integrated file system to present the directory structure to the administrator. Finally, with Avamar, administrators have the flexibility to recover data to the originating virtual machine or to create, provision, and recover data to a brand new virtual machine—all managed from within the Avamar user interface. For disaster recovery, Avamar provides secure, efficient, virtual- to-virtual or virtual-to-physical replication. Avamar itself scales using a grid architecture, offering linear increases in both performance and capacity as nodes are added. Each node increases CPU, memory, IO, and capacity for the entire grid. Avamar offers equivalent benefits to both physical and virtual environments and supports all major proprietary and open-source operating systems. It includes support for major database and messaging applications from IBM, Microsoft, and Oracle as well as NDMP for NAS filers. Avamar’s interoperability enhances its scalability; organizations are not restricted as they expand their virtual server environments. Virtual Computing Environment Coalition Vblocks Virtualization across the data center creates the need for tighter integration among servers, networks, and storage. This is even more the case in large scale virtualized environments. As a result, more and more organizations and service providers are using converged infrastructure units, such as the Vblock from the Virtual Computing Environment (VCE) coalition (VMware, Cisco, and EMC), to deliver IT services. These pre-integrated bundles of compute, network, and storage resources offer a different consumption model for IT services that can dramatically simplify delivery and accommodate massive scaling of virtualized environments. With Vblocks, IT gains visibility into the complete infrastructure and can more easily maintain performance, troubleshoot, and proactively respond to problems. Capacity can also be served up much faster to keep up with rapid growth. The massive scale of virtualization results not only in data growth, but also in greater power consumption and management complexity; Vblocks reduce power consumption and simplify management. As server virtualization deployments focus on SAP, Oracle, and Windows workloads, Vblocks can help speed deployment and time to value. Vblocks can contain thousands of virtual machines with a mix of application workloads and data sizes. The high-end configuration, Vblock 2, is in intended for 3,000 to 6,000 VMs while the mid-sized Vblock 1 is designed for 800 to 3,000 VMs. All Vblocks are built with VMware vSphere 4, Cisco compute and networking equipment, and EMC storage. The three industry leaders have gone to great lengths to provide integrated tools, services, and support to ensure that IT services are delivered fast without hiccups and bottlenecks. However, if not considered in advance, © 2010, Enterprise Strategy Group, Inc. All Rights Reserved.
  • 8. White Paper: Backup and Recovery of Large Scale VMware Environments 8 the data protection needs of these Vblocks could cause performance problems—exactly what the VCE vendors have worked so hard to avoid. Avamar fits well into this type of scenario. Pre-integrated units consolidate a lot of IT resources; Avamar can reduce the amount of network bandwidth and storage Vblocks need for backup. Avamar also adds another benefit: business users often need to be convinced to allow their production applications to be virtualized to build comfort in the virtualized platform. They have similar concerns about converged units such as the Vblock as they are wary of change and its potential impact on productivity. Avamar, with its ability to eliminate backup resource contention, bottlenecks, and performance problems, can actually help demonstrate to business owners the value of the Vblock infrastructure as it has no negative impact on application performance in large scale environments. Whether the “infrastructure-as-a-service” is coming from an internal IT department or a service provider, Avamar can help deliver guaranteed performance, availability, and data protection that build user confidence. The Bigger Truth Backup redesign is a must if customers are to reach their virtualization goals—without it, scaling the virtual server environment is nearly impossible. Next-generation backup applications must align with the next generation of IT by doing more than just escalating server virtualization; they need to support resource and management consolidation, infrastructure-as-a-service, “cloud” services, and pre-integrated infrastructure bundles. Backup and recovery processes built for the physical world will not provide the required data protection, application performance, or storage optimization needed in these new environments. Only with a backup process that is built for this kind of infrastructure can organizations reap the operational benefits and ROI of large-scale deployments. VMware recognized this and, as a result, introduced APIs for data protection and change block tracking to keep data protection of larger systems from being a bottleneck. The combination of VMware enhancements with Avamar’s architecture creates an exceptional solution. With Avamar, data is captured, transferred, and stored more efficiently because it takes advantage of vSphere enhancements. Avamar adds another efficiency dimension by taking innovative approaches to economize and streamline backup and recovery processes. It drives higher VM to ESX server ratios, supports all methods available (including guest and image backup plus remote office backup), and optimizes capacity. When it comes to data protection, IT organizations can either proactively build a solution such as Avamar into their virtualization plans or wait for problems to emerge and then fix the backup process and restore user confidence in the virtual infrastructure at the same time. In standard environments, a backup and recovery solution based on deduplication is extremely helpful; in a very large virtualized infrastructure, it’s an absolute necessity. © 2010, Enterprise Strategy Group, Inc. All Rights Reserved.
  • 9. 20 Asylum Street | Milford, MA 01757 | Tel:508.482.0188 Fax: 508.482.0218 | www.enterprisestrategygroup.com