SlideShare uma empresa Scribd logo
1 de 67
Data Domain Advanced
Features and Functions
1
Velocity Partner Accreditation
Module Objectives
2
Upon completion of this module, you will be able to:
• Describe VTL and VTL library planning
• Describe snapshots, fastcopy, and data retention
• Describe data replication and recovery
• Describe DD Boost and integration with EMC
NetWorker
• Describe capacity and throughput planning
• Describe Data Domain system monitoring tools
Lesson: Virtual Tape Library (VTL)
EMC CONFIDENTIAL—INTERNAL USE ONLY. 3
Upon completion of this lesson, you will be able to:
• Describe a Data Domain VTL
• Describe VTL library planning
VTL Definition
Application/
media backup
server
Backup Cache
Retention/
restore/
cloning
Disaster recovery/
archive/
offsite storage
Why should you use a VTL?
EMC CONFIDENTIAL—INTERNAL USE ONLY. 4
Configuration Terms
EMC CONFIDENTIAL—INTERNAL USE ONLY. 5
Barcode • Unique ID assigned to virtual tape when you create it
• In the Data Domain OS aka: label, tape label
CAP • Cartridge access port (CAP), emulated tape enter/eject point for
moving tape to/from a library
• In the Data Domain OS aka: mail slot
Library •Emulates physical tape library with tape drives, changer, CAPs, and
slots (cartridge slots)
• In the Data Domain OS aka: autoloader, tape silo, tape mount, tape
jukebox, vault
Pool Collection of tapes that map to a directory on a file system, used to
replicate tapes to a destination
Tapes •Represented in a system as files. You can export/import from a vault to
a library, move within a library across drives, slots, and CAPs
• In the Data Domain OS aka: cartridge
Vault Unused tapes stored in vault, tapes are in library/vault
VTL Library Planning
•256 virtual tape drives
(DD880 only)
• 128 virtual LTO-1, LTO-2,
LTO-3 tape drives
(all other models)
Robot loadschanges
tape cartridge
Up to 1,00,000
tape cartridges
in virtual vault
Fibre channel
VTL
• 64 virtual libraries
• 20,000 slots per library
• 100 CAPs per library
• 1000 CAPs per system
• 800 GiB per tape
EMC CONFIDENTIAL—INTERNAL USE ONLY. 6
Capacity Planning
EMC CONFIDENTIAL—INTERNAL USE ONLY. 7
• More planning needed at installation
• Expired tapes NOT deleted, space not reclaimed till
tape is overwritten/deleted
• Always create more slots that you need
• Load tapes when you need them
• Stop loading tapes once retention requirements are
met
Lesson: Fastcopy, Snapshots, and Data
EMC CONFIDENTIAL—INTERNAL USE ONLY. 8
Retention
Upon completion of this lesson, you will be able to:
• Describe Data Domain fastcopy
• Describe Data Domain snapshots
• Describe Data Domain data retention
• Explain the Data Domain cleaning process
Fastcopy
EMC CONFIDENTIAL—INTERNAL USE ONLY. 9
Copy
If you change source or target directory
while copying, they will not be equal.
Source
directory
Target
directory
Snapshots
Original copy Snapshot copy
/data/ coll /backup
/data/ coll /backup/files
/data/ coll /backup / .snapshot
/data/ coll /backup/files/ .snapshot
Snapshot taken at 22:24 GMT 22:24 GMT snapshot saved
EMC CONFIDENTIAL—INTERNAL USE ONLY. 10
Retention Lock
Archive software
or user initiates
Prevents retention-locked files from being deleted/modified for up to 70 years
Licensed feature
Retention locked files can be stored, encrypted, and replicated
EMC CONFIDENTIAL—INTERNAL USE ONLY. 11
Retention Lock Flow
1. License/enable retention lock
2. Set min/max retention period3. Create file
4. Lock file (set retention period)
- Extend retention-locked file
- Delete expired retention-locked file
5. Transfer file to Data Domain system
EMC CONFIDENTIAL—INTERNAL USE ONLY. 12
currenttime
Configure Client File Retention Period
minimum retention period valid atime period
maximum retention period
2. Data Domain system administrator sets min/max retention periods on Data Domain system
1. User creates file and sets last access time (atime) to desired retention period
Client must initiate retention lock
3. File either committed as a retention-locked file or ignored
EMC CONFIDENTIAL—INTERNAL USE ONLY. 13
File System Cleaning
FileA deleted with no retention lock
File B deleted, retention lock initiated
FileA deleted at next cleaning
File B maintained until retention lock period ends
SW backups to Data Domain
EMC CONFIDENTIAL—INTERNAL USE ONLY. 14
Cleaning reclaims physical storage occupied by deleted objects
Cleaning
Disk blocks
What?
 Reclaim space
Disk block
Disk block
Why?
 House keeping (reclaim “dead” segments)
 Performance (rewrite duplicate data)
House keeping
Performance tuning
Container 1
Container 2
Container 2Container 3
dead copy Forward valid
Container 1
or
Free space
Free space
EMC CONFIDENTIAL—INTERNAL USE ONLY. 15
Lesson: Replication and Recovery
EMC CONFIDENTIAL—INTERNAL USE ONLY. 16
Upon completion of this lesson, you will be able to:
• Describe the types of Data Domain replication
• Identify how replication improves storage
• Describe the data recovery process
Data Replication
New deduplicated compressed data is automatically replicated to destination
WAN
LAN
Source Destination
EMC CONFIDENTIAL—INTERNAL USE ONLY. 17
Data Domain Replication Types
EMC CONFIDENTIAL—INTERNAL USE ONLY. 18
• Collection: for entire site backup
• Directory: for partial site backup
• Pool: for VTL files/tape backup
Data Domain Collection Replication
/backup /backup
EMC CONFIDENTIAL—INTERNAL USE ONLY. 19
Source Destination
•Immediate accessibility
• Read only
•User accounts/passwords
replicated from source
• Works with encrypted files
• Works with retention lock
Recovers
entire system
Data Domain Directory Replication
/backup/dir a
Source
• Destination must have
available storage
• CIFS and NFS clients ok
• Do not mix CIFS/NFS
data in same directory
• Destination directory
created automatically
• Works with encryption
• Works with retention
lock
/backup/dir b
/backup/dir a
/backup/dir b
Destination
Destination
Recovers selected data
EMC CONFIDENTIAL—INTERNAL USE ONLY. 20
Data Domain Pool Replication
Source
Destination
• Works like directory replication
• Destination doesn’t require VTL license
pool 1
pool 3
pool 2
pool 1
pool 3
pool 2
EMC CONFIDENTIAL—INTERNAL USE ONLY. 21
Replication Context
WAN
Source Destination
EMC CONFIDENTIAL—INTERNAL USE ONLY. 22
Replication Topologies
Sourc
e
Source
Sourc
e
Destination
Destination
Destination
Sourc
e
Source
Source
Destination
Destination
Destination
1 to 1
1 to many
Bi-directional
Many to 1
Cascaded Cascaded 1-to-many
Primary
source/
Destination
Primary
source/
destination
EMC CONFIDENTIAL—INTERNAL USE ONLY. 23
Recover Data
Backup
serverFile serverClients
On site
Off site
disaster recovery
WAN
Replication
In case of disaster,
recover off-site replica
EMC CONFIDENTIAL—INTERNAL USE ONLY. 24
You can configure a Data Domain system to store
backup data and retain onsite for 30-90 days
Why Resynchronize Recovered Data?
WAN
Source
Resynchronization
Destination
Recreate deleted context Out of space
Convert collection to
directory replication
EMC CONFIDENTIAL—INTERNAL USE ONLY. 25
Lesson: Data Domain Boost
EMC CONFIDENTIAL—INTERNAL USE ONLY. 26
Upon completion of this lesson, you will be able to:
• Describe DD Boost
• Describe replica awareness
• Describe how DD Boost works with EMC NetWorker
• Describe supported network topologies
• Describe DD Boost advanced load balancing and link
failover feature
DD Boost
EMC CONFIDENTIAL—INTERNAL USE ONLY. 27
• Provides standard/centralized management features
through backup software
• Works with industry standard backup software
– EMC Networker
– Symantec NetBackup (Data Domain plug-in required)
– Symantec Backup Exec (Data Domain plug-in required)
• Enables advanced load balancing and failover
• Requires licenses on Data Domain System
– DD Boost
– Replication (if used) Note: Your backup software might require
license to enable the feature. Verify your backup software
documents.
DD Boost (contd.)
Backup Server
OST
plug-in
DD
Boost
Clients
Clients send
data to backup
server
Less data sent
over LAN
Deduplication/compression
occur in backup server
LANLAN
Optimized
protocol
for high
throughput
Manages connections
between backup applications
and Data Domain systems with DD Boost
Deduped Data
Stored
EMC CONFIDENTIAL—INTERNAL USE ONLY. 28
Replica Awareness
Backup
Server
WAN
replication
Backup site Disaster recovery site
Initiates and tracks
replication for easy
management and
disaster recovery
You manage replication from
backup server console
OST
plug-in
Archive to tape as needed
DD
Boost
DD
Boost
EMC CONFIDENTIAL—INTERNAL USE ONLY. 29
DD Boost Advantage
• Without DD Boost
– Backup server(s) not aware of
Data Domain replica(s)
– Recovery is manual process
• With DD Boost
– Backup server dedupes data
and minimizes network
bandwidth use
– Replication and recovery are
centrally configured and
monitored
Backup
Replication
Optimized
deduplication
Replication
engine
Backup
server
DD Boost server
DD Boost server
WithoutOST
Manually
configured replication
With DD Boost
OST
plug-in
EMC CONFIDENTIAL—INTERNAL USE ONLY. 30
NetWorker – Work Flow
Start clone
(Clone 1)
4
NetWorker
Server
Control
Data
Local
Data Domain system
Remote
Data Domain system
5
Data
transfer
6
Done (Clone 1)
Clone 1
Save
Set 1
7
Clone 1
update
control
data
Clone 1
Save
Set 1
New data backup
(Save Set 1)
1
2
Done (Save Set 1)
Save Set 1
update
control data
3
EMC CONFIDENTIAL—INTERNAL USE ONLY. 31
Lesson: Capacity and Throughput Planning
EMC CONFIDENTIAL—INTERNAL USE ONLY. 32
Upon completion of this lesson, you will be able to:
• Describe capacity planning and its importance
• Describe throughput planning and its importance
Monitor File System Space Use
EMC CONFIDENTIAL—INTERNAL USE ONLY. 33
• Factors that effect how fast data on disk grows
– Size of data sets getting backed up
– Compressability of data getting backed up
– Retention period specified in backup software
• Monitor disk use closely when you back up large data
sets that show low compression factors and have
large retention times
• You can get more accurate space-use view from CLI
• Use filesys show space to monitor post-compression
data growth
Space Graph
Cumulative physical data
written to DDSAmount of Data within
Backup Application
Compression Ratio:
Pre-compression/ Data Collection
Available Space on DDS
EMC CONFIDENTIAL—INTERNAL USE ONLY. 34
Space Graph (contd.)
What does the saw-tooth line for compression ratio represent?
EMC CONFIDENTIAL—INTERNAL USE ONLY. 35
Compression Factor Calculation
Original bytes
Data Domain system data written
ompression factor
C
What does cleaning do to this equation?
It decreases the Data Domain system data written (denominator)
and thus increases the compression factor.
EMC CONFIDENTIAL—INTERNAL USE ONLY. 36
How much?
•Data size (TB)
• Data type
• Full backup size
•Compression rate
(deduplication)
Capacity Planning: Determine Capacity
Needs
Capacity
needs
How long?
• Retention policy
(duration)
• Schedule
EMC CONFIDENTIAL—INTERNAL USE ONLY. 37
Determine Capacity Needs (contd.)
EMC CONFIDENTIAL—INTERNAL USE ONLY. 38
• Data Domain system internal indexes and other
components use variable storage amounts
depending on data type and file sizes
• If different data sets are sent to identical systems,
one system may, over time, have room for
more/less backup data than another
• Challenging data types
– Pre-compressed (multimedia, .zip, and .tiff)
– Encrypted
Compression Requirements with Variables
EMC CONFIDENTIAL—INTERNAL USE ONLY. 39
• 5x – Nearline and archive
Incremental + weekly full backup with two weeks retention
–
Daily full backup with one week retention
–
Nearline and archival use compression tends to be capped here
–
• 10x – Overall compression
Incremental + weekly full backup with one month of retention
–
Daily full backup with two-three weeks retention
–
• 20x – Overall compression
Incremental + weekly full backup with two-three months retention
–
Daily full backup with three-four weeks retention
–
Calculate Required Capacity
1st full backup
Incremental
backup 4
Weekly full
backup
number of
weeks
Required
capacity
Total space required
Required
capacity
EMC CONFIDENTIAL—INTERNAL USE ONLY. 40
Calculate Required Throughput
Largest backup
Backup time window
6 TB
10 hrs
Example
Required throughput
600 GB/hr
EMC CONFIDENTIAL—INTERNAL USE ONLY. 41
System Model Capacity and Performance
• Maximum capacity is amount of usable data storage
space
• Maximum capacity based on max number of drives
supported by a model
• Maximum throughput is achieved using either VTL
interface and 4Gbps Fibre Channel or DD Boost and
10Gb Ethernet
• Current model throughput and capacity specifications
http://www.datadomain.com/products/
EMC CONFIDENTIAL—INTERNAL USE ONLY. 42
Select Model
Maximum throughput
• Be conservative when determining which model to use
• Use 75-85% of model capacity and throughput
(factor 15-25% buffer for capacity and throughput)
Required capacity
Maximum logical capacity
Required throughput
Capacity %
Throughput %
100
EMC CONFIDENTIAL—INTERNAL USE ONLY. 43
100
Calculate Capacity Buffer for Selected
Models
Required capacity
Maximum capacity
DD140 example
840 GB
860 GB
840 GB
1650 GB
DD610 example
97%
51%
100%
100%
100%
% of Maximum capacity
3% Buffer not ok
51% Buffer ok
EMC CONFIDENTIAL—INTERNAL USE ONLY. 44
Match Required Capacity to Model
Specifications
OR?
1,650 GB with 7 drives
DD610DD140
860 GB
For example
Required capacity = 840 GB
Ensure capacity buffer is big enough
EMC CONFIDENTIAL—INTERNAL USE ONLY. 45
Calculate Performance Buffer for Selected
Models
Required throughput
Maximum throughput
DD610 example
600 GB/hr
675 GB/hr
600 GB/hr
1126 GB/hr
DD630 example
89%
53%
100%
100%
100%
% of Maximum throughput
11% Buffer not ok
47% Buffer ok
EMC CONFIDENTIAL—INTERNAL USE ONLY. 46
Match Required Capacity to Model
Specifications
OR?
1.1 GB/hr
DD630DD 610
860 GB/hr
For example
Required throughput = 600 GB/hr
Ensure performance buffer is big enough
47
Lesson: System Monitoring Tools
48
Upon completion of this lesson, you will be able to:
• Describe Data Domain system monitoring tools
– SNMP
– syslog
– autosupport
– SUP
Alert
Monitoring a Data Domain System
Data Domain
system administrator
Daily
alerts and
autosupport reports
Daily
alerts and
autosupport reports
Data Domain
technical support
2. syslog 3. autosupport 4. SUB1. SNMP
49
SNMP
50
• You can monitor a Data Domain system via SNMP utilities
• You can integrate the Data Domain Management
Information Base (MIB) into SNMP monitoring
Syslog (Remote Logging)
syslog server
LAN
Port 514
System messages
Port 514
Sends system messages to remote syslog server
Uses TCP port 514
You collect logs
51
-
Autosupport
52
• Easy to install – just once at system setup
• Helps solve/prevent system problems
– Provides timely notification of significant issues
– Enables rapid response time to address or prevent problems
– Includes critical system data to aid support case triage and
management
Autosupport System
autosupport@
autosupport.datadomain.com
System history
Warnings
Integration to
other systems
Reports
Data Domain technical support
(support case)
Other vendors
Daily alert summary
Reboots
via SMTP Summary
autosupport report
53
Detailed autosupport report
Autosupport Types
autosupport
types
54
Non scheduledScheduled
Detailed
autosupport
report
sent 6 am
Daily alert
summary
email
sent 8 am
Alerts
• warning
• failure
Reboots
Autosupport Via Enterprise Manager
• Data Domain systems provide alerts,
autosupport reports, and logs
• Access through Enterprise Manager
55
Autosupport Reports
• Using SMTP, sent to Data Domain
technical support daily at 6 am
local time (default)
• Contains system ID, uptime
information, system command
outputs, runtime parameters, logs,
system settings, status and performance
data, and other debugging information
• Long text report (500-800K)
• Sections parsed into data warehouse
for analysis and reporting
Subscribers
receive daily
detailed
reports
56
Detailed Autosupport Report Contents
57
Daily Summary Autosupport
Provides
summary
autosupport
report
Tells you if the
system is ok or
not. If not, no
email receipt is
received
Sent daily at
8 am
Uses
autosupport
email
distribution list
This is an example
of an alert
58
Alerts
Unique numerical ID
Physical component where alert
occurred
Subsystem where
alert occurred
Alert severity
Date and time alert occurred
59
Alerts Notification
Terse description of event
Has separate email distribution list
Creates support case
Sent immediately upon detection
60
Logs
Every Sunday at 3 am
1. New log file opened
2. Old log file renamed
CLI: log view filename
61
Support Upload Bundle (SUB)
62
• Large (multi-GB sized) tar file
• Contains
– OS settings and log files
– System files (not customer data files) identified as needed
for system diagnosis by Data Domain support and
engineering
• Used to triage and diagnose a Data Domain system in the field
• CLI commands used to generate and optionally send (via http)
SUB to Data Domain support site
• Generated by sysadmin on Data Domain system via GUI/CLI
Module Summary
63
Key points covered in this module include:
• VTL and VTL library planning
• Snapshots, fastcopy, and data retention
• Data replication and recovery
• DD Boost and integration with EMC NetWorker
• Capacity and throughput planning
• Data Domain system monitoring tools
Product Demo
Click the link below to view a demonstration on Data
Domain.
Launch Demo
64
EMC CONFIDENTIAL—INTERNAL USE ONLY. 65
PROPERTIES
On passing, 'Finish' button:
On failing, 'Finish' button:
Allow user to leave quiz:
User may view slides after quiz:
User may attempt quiz:
Goes to Next Slide
Goes to Next Slide
At any time
At any time
Unlimited times
67
THANK YOU

Mais conteúdo relacionado

Mais procurados

Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesSpiceworks
 
Intel - optimizing ceph performance by leveraging intel® optane™ and 3 d nand...
Intel - optimizing ceph performance by leveraging intel® optane™ and 3 d nand...Intel - optimizing ceph performance by leveraging intel® optane™ and 3 d nand...
Intel - optimizing ceph performance by leveraging intel® optane™ and 3 d nand...inwin stack
 
Introduction to Data Engineer and Data Pipeline at Credit OK
Introduction to Data Engineer and Data Pipeline at Credit OKIntroduction to Data Engineer and Data Pipeline at Credit OK
Introduction to Data Engineer and Data Pipeline at Credit OKKriangkrai Chaonithi
 
virtualization and hypervisors
virtualization and hypervisorsvirtualization and hypervisors
virtualization and hypervisorsGaurav Suri
 
03 backup-and-recovery
03 backup-and-recovery03 backup-and-recovery
03 backup-and-recoveryhunny garg
 
Vce vxrail-customer-presentation new
Vce vxrail-customer-presentation newVce vxrail-customer-presentation new
Vce vxrail-customer-presentation newJennifer Graham
 
Data center
Data centerData center
Data centergssmedia
 
Bringing NetApp Data ONTAP & Apache CloudStack Together
Bringing NetApp Data ONTAP & Apache CloudStack TogetherBringing NetApp Data ONTAP & Apache CloudStack Together
Bringing NetApp Data ONTAP & Apache CloudStack TogetherDavid La Motta
 
IBM Storage for AI and Big Data
IBM Storage for AI and Big DataIBM Storage for AI and Big Data
IBM Storage for AI and Big DataTony Pearson
 
Object storage의 이해와 활용
Object storage의 이해와 활용Object storage의 이해와 활용
Object storage의 이해와 활용Seoro Kim
 
VxRail Appliance - Modernize your infrastructure and accelerate IT transforma...
VxRail Appliance - Modernize your infrastructure and accelerate IT transforma...VxRail Appliance - Modernize your infrastructure and accelerate IT transforma...
VxRail Appliance - Modernize your infrastructure and accelerate IT transforma...Maichino Sepede
 
Network Attached Storage (NAS)
Network Attached Storage (NAS)Network Attached Storage (NAS)
Network Attached Storage (NAS)sandeepgodfather
 
01_DP-300T00A-Intro.pptx
01_DP-300T00A-Intro.pptx01_DP-300T00A-Intro.pptx
01_DP-300T00A-Intro.pptxKareemBullard1
 
Introducing Azure SQL Database
Introducing Azure SQL DatabaseIntroducing Azure SQL Database
Introducing Azure SQL DatabaseJames Serra
 
Deep Dive: a technical insider's view of NetBackup 8.1 and NetBackup Appliances
Deep Dive: a technical insider's view of NetBackup 8.1 and NetBackup AppliancesDeep Dive: a technical insider's view of NetBackup 8.1 and NetBackup Appliances
Deep Dive: a technical insider's view of NetBackup 8.1 and NetBackup AppliancesVeritas Technologies LLC
 
1- Introduction of Azure data factory.pptx
1- Introduction of Azure data factory.pptx1- Introduction of Azure data factory.pptx
1- Introduction of Azure data factory.pptxBRIJESH KUMAR
 

Mais procurados (20)

Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup Strategies
 
Intel - optimizing ceph performance by leveraging intel® optane™ and 3 d nand...
Intel - optimizing ceph performance by leveraging intel® optane™ and 3 d nand...Intel - optimizing ceph performance by leveraging intel® optane™ and 3 d nand...
Intel - optimizing ceph performance by leveraging intel® optane™ and 3 d nand...
 
Failover cluster
Failover clusterFailover cluster
Failover cluster
 
Introduction to Data Engineer and Data Pipeline at Credit OK
Introduction to Data Engineer and Data Pipeline at Credit OKIntroduction to Data Engineer and Data Pipeline at Credit OK
Introduction to Data Engineer and Data Pipeline at Credit OK
 
Netapp Storage
Netapp StorageNetapp Storage
Netapp Storage
 
virtualization and hypervisors
virtualization and hypervisorsvirtualization and hypervisors
virtualization and hypervisors
 
03 backup-and-recovery
03 backup-and-recovery03 backup-and-recovery
03 backup-and-recovery
 
Data center
Data centerData center
Data center
 
Vce vxrail-customer-presentation new
Vce vxrail-customer-presentation newVce vxrail-customer-presentation new
Vce vxrail-customer-presentation new
 
Data center
Data centerData center
Data center
 
Bringing NetApp Data ONTAP & Apache CloudStack Together
Bringing NetApp Data ONTAP & Apache CloudStack TogetherBringing NetApp Data ONTAP & Apache CloudStack Together
Bringing NetApp Data ONTAP & Apache CloudStack Together
 
IBM Storage for AI and Big Data
IBM Storage for AI and Big DataIBM Storage for AI and Big Data
IBM Storage for AI and Big Data
 
Object storage의 이해와 활용
Object storage의 이해와 활용Object storage의 이해와 활용
Object storage의 이해와 활용
 
VxRail Appliance - Modernize your infrastructure and accelerate IT transforma...
VxRail Appliance - Modernize your infrastructure and accelerate IT transforma...VxRail Appliance - Modernize your infrastructure and accelerate IT transforma...
VxRail Appliance - Modernize your infrastructure and accelerate IT transforma...
 
Network Attached Storage (NAS)
Network Attached Storage (NAS)Network Attached Storage (NAS)
Network Attached Storage (NAS)
 
01_DP-300T00A-Intro.pptx
01_DP-300T00A-Intro.pptx01_DP-300T00A-Intro.pptx
01_DP-300T00A-Intro.pptx
 
Google File System
Google File SystemGoogle File System
Google File System
 
Introducing Azure SQL Database
Introducing Azure SQL DatabaseIntroducing Azure SQL Database
Introducing Azure SQL Database
 
Deep Dive: a technical insider's view of NetBackup 8.1 and NetBackup Appliances
Deep Dive: a technical insider's view of NetBackup 8.1 and NetBackup AppliancesDeep Dive: a technical insider's view of NetBackup 8.1 and NetBackup Appliances
Deep Dive: a technical insider's view of NetBackup 8.1 and NetBackup Appliances
 
1- Introduction of Azure data factory.pptx
1- Introduction of Azure data factory.pptx1- Introduction of Azure data factory.pptx
1- Introduction of Azure data factory.pptx
 

Destaque

Data Domain Architecture
Data Domain ArchitectureData Domain Architecture
Data Domain Architecturekoesteruk22
 
EMC Dteata domain advanced command troubleshoot
EMC Dteata domain advanced command troubleshootEMC Dteata domain advanced command troubleshoot
EMC Dteata domain advanced command troubleshootsolarisyougood
 
Data Domain Backup & Recovery
Data Domain Backup & RecoveryData Domain Backup & Recovery
Data Domain Backup & Recoverynetlogix
 
Vijay_6+Exp_EMC NAS SAN FC CELERRA VNX VNX2 VMWARE iSCS IIP SAN CLARIION VNX...
Vijay_6+Exp_EMC NAS SAN FC CELERRA  VNX VNX2 VMWARE iSCS IIP SAN CLARIION VNX...Vijay_6+Exp_EMC NAS SAN FC CELERRA  VNX VNX2 VMWARE iSCS IIP SAN CLARIION VNX...
Vijay_6+Exp_EMC NAS SAN FC CELERRA VNX VNX2 VMWARE iSCS IIP SAN CLARIION VNX...Vijay Ramamurthy
 
666 vnx unifiedimp_m13 configuring cifs
666 vnx unifiedimp_m13 configuring cifs666 vnx unifiedimp_m13 configuring cifs
666 vnx unifiedimp_m13 configuring cifsxigua_521
 
Using FCS Networker
Using FCS NetworkerUsing FCS Networker
Using FCS NetworkerLyman Lycan
 
EMC NetWorker Module for Microsoft SQL Server Release 5.1 ...
EMC NetWorker Module for Microsoft SQL Server Release 5.1 ...EMC NetWorker Module for Microsoft SQL Server Release 5.1 ...
EMC NetWorker Module for Microsoft SQL Server Release 5.1 ...webhostingguy
 
DataDomain brochure
DataDomain brochureDataDomain brochure
DataDomain brochureCommaGroup
 
Net Worker 9 : une solution orientée Backup As a Service
Net Worker 9 : une solution orientée Backup As a ServiceNet Worker 9 : une solution orientée Backup As a Service
Net Worker 9 : une solution orientée Backup As a ServiceRSD
 
Become the Ultimate Networker
Become the Ultimate NetworkerBecome the Ultimate Networker
Become the Ultimate NetworkerPaul Maynard
 
Implementing an NDMP backup solution using EMC NetWorker on IBM Storwize V700...
Implementing an NDMP backup solution using EMC NetWorker on IBM Storwize V700...Implementing an NDMP backup solution using EMC NetWorker on IBM Storwize V700...
Implementing an NDMP backup solution using EMC NetWorker on IBM Storwize V700...IBM India Smarter Computing
 
AWS Partner Presentation – Panzura – AWS Cloud Storage for the Enterprise 2012
AWS Partner Presentation – Panzura – AWS Cloud Storage for the Enterprise 2012AWS Partner Presentation – Panzura – AWS Cloud Storage for the Enterprise 2012
AWS Partner Presentation – Panzura – AWS Cloud Storage for the Enterprise 2012Amazon Web Services
 
Panzura Global Storage System
Panzura Global Storage SystemPanzura Global Storage System
Panzura Global Storage SystemPanzura
 
7 Ways to Think Out of the Box
7 Ways to Think Out of the Box7 Ways to Think Out of the Box
7 Ways to Think Out of the Box24Slides
 
White Paper: Deploying and Implementing RecoverPoint in a Virtual Machine for...
White Paper: Deploying and Implementing RecoverPoint in a Virtual Machine for...White Paper: Deploying and Implementing RecoverPoint in a Virtual Machine for...
White Paper: Deploying and Implementing RecoverPoint in a Virtual Machine for...EMC
 
Emc data domain® boost integration guide
Emc data domain® boost integration guideEmc data domain® boost integration guide
Emc data domain® boost integration guideArvind Varade
 
Deduplication Solutions Are Not All Created Equal: Why Data Domain?
Deduplication Solutions Are Not All Created Equal: Why Data Domain?Deduplication Solutions Are Not All Created Equal: Why Data Domain?
Deduplication Solutions Are Not All Created Equal: Why Data Domain?EMC
 
EMC Deduplication Fundamentals
EMC Deduplication FundamentalsEMC Deduplication Fundamentals
EMC Deduplication Fundamentalsemcbaltics
 

Destaque (20)

Data Domain Architecture
Data Domain ArchitectureData Domain Architecture
Data Domain Architecture
 
EMC Dteata domain advanced command troubleshoot
EMC Dteata domain advanced command troubleshootEMC Dteata domain advanced command troubleshoot
EMC Dteata domain advanced command troubleshoot
 
Data Domain Backup & Recovery
Data Domain Backup & RecoveryData Domain Backup & Recovery
Data Domain Backup & Recovery
 
Dyrrahsped Sh.p.k
Dyrrahsped Sh.p.kDyrrahsped Sh.p.k
Dyrrahsped Sh.p.k
 
Vijay_6+Exp_EMC NAS SAN FC CELERRA VNX VNX2 VMWARE iSCS IIP SAN CLARIION VNX...
Vijay_6+Exp_EMC NAS SAN FC CELERRA  VNX VNX2 VMWARE iSCS IIP SAN CLARIION VNX...Vijay_6+Exp_EMC NAS SAN FC CELERRA  VNX VNX2 VMWARE iSCS IIP SAN CLARIION VNX...
Vijay_6+Exp_EMC NAS SAN FC CELERRA VNX VNX2 VMWARE iSCS IIP SAN CLARIION VNX...
 
666 vnx unifiedimp_m13 configuring cifs
666 vnx unifiedimp_m13 configuring cifs666 vnx unifiedimp_m13 configuring cifs
666 vnx unifiedimp_m13 configuring cifs
 
Using FCS Networker
Using FCS NetworkerUsing FCS Networker
Using FCS Networker
 
EMC NetWorker Module for Microsoft SQL Server Release 5.1 ...
EMC NetWorker Module for Microsoft SQL Server Release 5.1 ...EMC NetWorker Module for Microsoft SQL Server Release 5.1 ...
EMC NetWorker Module for Microsoft SQL Server Release 5.1 ...
 
DataDomain brochure
DataDomain brochureDataDomain brochure
DataDomain brochure
 
Net Worker 9 : une solution orientée Backup As a Service
Net Worker 9 : une solution orientée Backup As a ServiceNet Worker 9 : une solution orientée Backup As a Service
Net Worker 9 : une solution orientée Backup As a Service
 
Become the Ultimate Networker
Become the Ultimate NetworkerBecome the Ultimate Networker
Become the Ultimate Networker
 
Implementing an NDMP backup solution using EMC NetWorker on IBM Storwize V700...
Implementing an NDMP backup solution using EMC NetWorker on IBM Storwize V700...Implementing an NDMP backup solution using EMC NetWorker on IBM Storwize V700...
Implementing an NDMP backup solution using EMC NetWorker on IBM Storwize V700...
 
VCE VBLOCK SYSTEMS
VCE VBLOCK SYSTEMSVCE VBLOCK SYSTEMS
VCE VBLOCK SYSTEMS
 
AWS Partner Presentation – Panzura – AWS Cloud Storage for the Enterprise 2012
AWS Partner Presentation – Panzura – AWS Cloud Storage for the Enterprise 2012AWS Partner Presentation – Panzura – AWS Cloud Storage for the Enterprise 2012
AWS Partner Presentation – Panzura – AWS Cloud Storage for the Enterprise 2012
 
Panzura Global Storage System
Panzura Global Storage SystemPanzura Global Storage System
Panzura Global Storage System
 
7 Ways to Think Out of the Box
7 Ways to Think Out of the Box7 Ways to Think Out of the Box
7 Ways to Think Out of the Box
 
White Paper: Deploying and Implementing RecoverPoint in a Virtual Machine for...
White Paper: Deploying and Implementing RecoverPoint in a Virtual Machine for...White Paper: Deploying and Implementing RecoverPoint in a Virtual Machine for...
White Paper: Deploying and Implementing RecoverPoint in a Virtual Machine for...
 
Emc data domain® boost integration guide
Emc data domain® boost integration guideEmc data domain® boost integration guide
Emc data domain® boost integration guide
 
Deduplication Solutions Are Not All Created Equal: Why Data Domain?
Deduplication Solutions Are Not All Created Equal: Why Data Domain?Deduplication Solutions Are Not All Created Equal: Why Data Domain?
Deduplication Solutions Are Not All Created Equal: Why Data Domain?
 
EMC Deduplication Fundamentals
EMC Deduplication FundamentalsEMC Deduplication Fundamentals
EMC Deduplication Fundamentals
 

Semelhante a EMC Data domain advanced features and functions

Presentation announcing oracle secure backup 10.3
Presentation   announcing oracle secure backup 10.3Presentation   announcing oracle secure backup 10.3
Presentation announcing oracle secure backup 10.3xKinAnx
 
VMworld 2015: The Future of Software- Defined Storage- What Does it Look Like...
VMworld 2015: The Future of Software- Defined Storage- What Does it Look Like...VMworld 2015: The Future of Software- Defined Storage- What Does it Look Like...
VMworld 2015: The Future of Software- Defined Storage- What Does it Look Like...VMworld
 
Ambedded - how to build a true no single point of failure ceph cluster
Ambedded - how to build a true no single point of failure ceph cluster Ambedded - how to build a true no single point of failure ceph cluster
Ambedded - how to build a true no single point of failure ceph cluster inwin stack
 
NetBackup Appliance Family presentation
NetBackup Appliance Family presentationNetBackup Appliance Family presentation
NetBackup Appliance Family presentationSymantec
 
Exploring the Oracle Database Architecture.ppt
Exploring the Oracle Database Architecture.pptExploring the Oracle Database Architecture.ppt
Exploring the Oracle Database Architecture.pptMohammedHdi1
 
exploring-the-oracle-database-architecture.ppt
exploring-the-oracle-database-architecture.pptexploring-the-oracle-database-architecture.ppt
exploring-the-oracle-database-architecture.pptAmitavaRoy49
 
Inter connect2016 yss1841-cloud-storage-options-v4
Inter connect2016 yss1841-cloud-storage-options-v4Inter connect2016 yss1841-cloud-storage-options-v4
Inter connect2016 yss1841-cloud-storage-options-v4Tony Pearson
 
Benchmark emc vnx7500, emc fast suite, emc snap sure and oracle rac on v-mware
Benchmark   emc vnx7500, emc fast suite, emc snap sure and oracle rac on v-mwareBenchmark   emc vnx7500, emc fast suite, emc snap sure and oracle rac on v-mware
Benchmark emc vnx7500, emc fast suite, emc snap sure and oracle rac on v-mwaresolarisyougood
 
Huawei Symantec Oceanspace VTL3500 Overview
Huawei Symantec Oceanspace VTL3500 OverviewHuawei Symantec Oceanspace VTL3500 Overview
Huawei Symantec Oceanspace VTL3500 OverviewUtopia Media
 
1Z0-027 Exam-Oracle Exadata Database Machine Administration, Software Release
1Z0-027 Exam-Oracle Exadata Database Machine Administration, Software Release1Z0-027 Exam-Oracle Exadata Database Machine Administration, Software Release
1Z0-027 Exam-Oracle Exadata Database Machine Administration, Software ReleaseIsabella789
 
Top 20 FAQs on the Autonomous Database
Top 20 FAQs on the Autonomous DatabaseTop 20 FAQs on the Autonomous Database
Top 20 FAQs on the Autonomous DatabaseSandesh Rao
 
”Bare-Metal Container" presented at HPCC2016
”Bare-Metal Container" presented at HPCC2016”Bare-Metal Container" presented at HPCC2016
”Bare-Metal Container" presented at HPCC2016Kuniyasu Suzaki
 
(CMP402) Amazon EC2 Instances Deep Dive
(CMP402) Amazon EC2 Instances Deep Dive(CMP402) Amazon EC2 Instances Deep Dive
(CMP402) Amazon EC2 Instances Deep DiveAmazon Web Services
 
FalconStor NSS Presentation
FalconStor NSS PresentationFalconStor NSS Presentation
FalconStor NSS Presentationrpsprowl
 
Pros and Cons of Erasure Coding & Replication vs. RAID in Next-Gen Storage
Pros and Cons of Erasure Coding & Replication vs. RAID in Next-Gen StoragePros and Cons of Erasure Coding & Replication vs. RAID in Next-Gen Storage
Pros and Cons of Erasure Coding & Replication vs. RAID in Next-Gen StorageEric Carter
 
Oracle Backup Solutions Overview August 2018
Oracle Backup Solutions Overview August 2018Oracle Backup Solutions Overview August 2018
Oracle Backup Solutions Overview August 2018Dan Glasscock
 
Data center disaster recovery.ppt
Data center disaster recovery.ppt Data center disaster recovery.ppt
Data center disaster recovery.ppt omalreda
 

Semelhante a EMC Data domain advanced features and functions (20)

Presentation announcing oracle secure backup 10.3
Presentation   announcing oracle secure backup 10.3Presentation   announcing oracle secure backup 10.3
Presentation announcing oracle secure backup 10.3
 
VMworld 2015: The Future of Software- Defined Storage- What Does it Look Like...
VMworld 2015: The Future of Software- Defined Storage- What Does it Look Like...VMworld 2015: The Future of Software- Defined Storage- What Does it Look Like...
VMworld 2015: The Future of Software- Defined Storage- What Does it Look Like...
 
Ambedded - how to build a true no single point of failure ceph cluster
Ambedded - how to build a true no single point of failure ceph cluster Ambedded - how to build a true no single point of failure ceph cluster
Ambedded - how to build a true no single point of failure ceph cluster
 
Les 02 config
Les 02 configLes 02 config
Les 02 config
 
NetBackup Appliance Family presentation
NetBackup Appliance Family presentationNetBackup Appliance Family presentation
NetBackup Appliance Family presentation
 
Exploring the Oracle Database Architecture.ppt
Exploring the Oracle Database Architecture.pptExploring the Oracle Database Architecture.ppt
Exploring the Oracle Database Architecture.ppt
 
exploring-the-oracle-database-architecture.ppt
exploring-the-oracle-database-architecture.pptexploring-the-oracle-database-architecture.ppt
exploring-the-oracle-database-architecture.ppt
 
2009-dec02_EMC2
2009-dec02_EMC22009-dec02_EMC2
2009-dec02_EMC2
 
Inter connect2016 yss1841-cloud-storage-options-v4
Inter connect2016 yss1841-cloud-storage-options-v4Inter connect2016 yss1841-cloud-storage-options-v4
Inter connect2016 yss1841-cloud-storage-options-v4
 
Benchmark emc vnx7500, emc fast suite, emc snap sure and oracle rac on v-mware
Benchmark   emc vnx7500, emc fast suite, emc snap sure and oracle rac on v-mwareBenchmark   emc vnx7500, emc fast suite, emc snap sure and oracle rac on v-mware
Benchmark emc vnx7500, emc fast suite, emc snap sure and oracle rac on v-mware
 
Huawei Symantec Oceanspace VTL3500 Overview
Huawei Symantec Oceanspace VTL3500 OverviewHuawei Symantec Oceanspace VTL3500 Overview
Huawei Symantec Oceanspace VTL3500 Overview
 
1Z0-027 Exam-Oracle Exadata Database Machine Administration, Software Release
1Z0-027 Exam-Oracle Exadata Database Machine Administration, Software Release1Z0-027 Exam-Oracle Exadata Database Machine Administration, Software Release
1Z0-027 Exam-Oracle Exadata Database Machine Administration, Software Release
 
Top 20 FAQs on the Autonomous Database
Top 20 FAQs on the Autonomous DatabaseTop 20 FAQs on the Autonomous Database
Top 20 FAQs on the Autonomous Database
 
Less01_Architecture.ppt
Less01_Architecture.pptLess01_Architecture.ppt
Less01_Architecture.ppt
 
”Bare-Metal Container" presented at HPCC2016
”Bare-Metal Container" presented at HPCC2016”Bare-Metal Container" presented at HPCC2016
”Bare-Metal Container" presented at HPCC2016
 
(CMP402) Amazon EC2 Instances Deep Dive
(CMP402) Amazon EC2 Instances Deep Dive(CMP402) Amazon EC2 Instances Deep Dive
(CMP402) Amazon EC2 Instances Deep Dive
 
FalconStor NSS Presentation
FalconStor NSS PresentationFalconStor NSS Presentation
FalconStor NSS Presentation
 
Pros and Cons of Erasure Coding & Replication vs. RAID in Next-Gen Storage
Pros and Cons of Erasure Coding & Replication vs. RAID in Next-Gen StoragePros and Cons of Erasure Coding & Replication vs. RAID in Next-Gen Storage
Pros and Cons of Erasure Coding & Replication vs. RAID in Next-Gen Storage
 
Oracle Backup Solutions Overview August 2018
Oracle Backup Solutions Overview August 2018Oracle Backup Solutions Overview August 2018
Oracle Backup Solutions Overview August 2018
 
Data center disaster recovery.ppt
Data center disaster recovery.ppt Data center disaster recovery.ppt
Data center disaster recovery.ppt
 

Mais de solarisyougood

Emc recoverpoint technical
Emc recoverpoint technicalEmc recoverpoint technical
Emc recoverpoint technicalsolarisyougood
 
Emc vmax3 technical deep workshop
Emc vmax3 technical deep workshopEmc vmax3 technical deep workshop
Emc vmax3 technical deep workshopsolarisyougood
 
EMC Atmos for service providers
EMC Atmos for service providersEMC Atmos for service providers
EMC Atmos for service providerssolarisyougood
 
Cisco prime network 4.1 technical overview
Cisco prime network 4.1 technical overviewCisco prime network 4.1 technical overview
Cisco prime network 4.1 technical overviewsolarisyougood
 
Designing your xen desktop 7.5 environment with training guide
Designing your xen desktop 7.5 environment with training guideDesigning your xen desktop 7.5 environment with training guide
Designing your xen desktop 7.5 environment with training guidesolarisyougood
 
Ibm aix technical deep dive workshop advanced administration and problem dete...
Ibm aix technical deep dive workshop advanced administration and problem dete...Ibm aix technical deep dive workshop advanced administration and problem dete...
Ibm aix technical deep dive workshop advanced administration and problem dete...solarisyougood
 
Ibm power ha v7 technical deep dive workshop
Ibm power ha v7 technical deep dive workshopIbm power ha v7 technical deep dive workshop
Ibm power ha v7 technical deep dive workshopsolarisyougood
 
Power8 hardware technical deep dive workshop
Power8 hardware technical deep dive workshopPower8 hardware technical deep dive workshop
Power8 hardware technical deep dive workshopsolarisyougood
 
Power systems virtualization with power kvm
Power systems virtualization with power kvmPower systems virtualization with power kvm
Power systems virtualization with power kvmsolarisyougood
 
Power vc for powervm deep dive tips & tricks
Power vc for powervm deep dive tips & tricksPower vc for powervm deep dive tips & tricks
Power vc for powervm deep dive tips & trickssolarisyougood
 
Ibm flash system v9000 technical deep dive workshop
Ibm flash system v9000 technical deep dive workshopIbm flash system v9000 technical deep dive workshop
Ibm flash system v9000 technical deep dive workshopsolarisyougood
 
Emc vnx2 technical deep dive workshop
Emc vnx2 technical deep dive workshopEmc vnx2 technical deep dive workshop
Emc vnx2 technical deep dive workshopsolarisyougood
 
Emc isilon technical deep dive workshop
Emc isilon technical deep dive workshopEmc isilon technical deep dive workshop
Emc isilon technical deep dive workshopsolarisyougood
 
Emc ecs 2 technical deep dive workshop
Emc ecs 2 technical deep dive workshopEmc ecs 2 technical deep dive workshop
Emc ecs 2 technical deep dive workshopsolarisyougood
 
Cisco mds 9148 s training workshop
Cisco mds 9148 s training workshopCisco mds 9148 s training workshop
Cisco mds 9148 s training workshopsolarisyougood
 
Cisco cloud computing deploying openstack
Cisco cloud computing deploying openstackCisco cloud computing deploying openstack
Cisco cloud computing deploying openstacksolarisyougood
 
Se training storage grid webscale technical overview
Se training   storage grid webscale technical overviewSe training   storage grid webscale technical overview
Se training storage grid webscale technical overviewsolarisyougood
 
Vmware 2015 with vsphereHigh performance application platforms
Vmware 2015 with vsphereHigh performance application platformsVmware 2015 with vsphereHigh performance application platforms
Vmware 2015 with vsphereHigh performance application platformssolarisyougood
 

Mais de solarisyougood (20)

Emc vipr srm workshop
Emc vipr srm workshopEmc vipr srm workshop
Emc vipr srm workshop
 
Emc recoverpoint technical
Emc recoverpoint technicalEmc recoverpoint technical
Emc recoverpoint technical
 
Emc vmax3 technical deep workshop
Emc vmax3 technical deep workshopEmc vmax3 technical deep workshop
Emc vmax3 technical deep workshop
 
EMC Atmos for service providers
EMC Atmos for service providersEMC Atmos for service providers
EMC Atmos for service providers
 
Cisco prime network 4.1 technical overview
Cisco prime network 4.1 technical overviewCisco prime network 4.1 technical overview
Cisco prime network 4.1 technical overview
 
Designing your xen desktop 7.5 environment with training guide
Designing your xen desktop 7.5 environment with training guideDesigning your xen desktop 7.5 environment with training guide
Designing your xen desktop 7.5 environment with training guide
 
Ibm aix technical deep dive workshop advanced administration and problem dete...
Ibm aix technical deep dive workshop advanced administration and problem dete...Ibm aix technical deep dive workshop advanced administration and problem dete...
Ibm aix technical deep dive workshop advanced administration and problem dete...
 
Ibm power ha v7 technical deep dive workshop
Ibm power ha v7 technical deep dive workshopIbm power ha v7 technical deep dive workshop
Ibm power ha v7 technical deep dive workshop
 
Power8 hardware technical deep dive workshop
Power8 hardware technical deep dive workshopPower8 hardware technical deep dive workshop
Power8 hardware technical deep dive workshop
 
Power systems virtualization with power kvm
Power systems virtualization with power kvmPower systems virtualization with power kvm
Power systems virtualization with power kvm
 
Power vc for powervm deep dive tips & tricks
Power vc for powervm deep dive tips & tricksPower vc for powervm deep dive tips & tricks
Power vc for powervm deep dive tips & tricks
 
Ibm flash system v9000 technical deep dive workshop
Ibm flash system v9000 technical deep dive workshopIbm flash system v9000 technical deep dive workshop
Ibm flash system v9000 technical deep dive workshop
 
Emc vnx2 technical deep dive workshop
Emc vnx2 technical deep dive workshopEmc vnx2 technical deep dive workshop
Emc vnx2 technical deep dive workshop
 
Emc isilon technical deep dive workshop
Emc isilon technical deep dive workshopEmc isilon technical deep dive workshop
Emc isilon technical deep dive workshop
 
Emc ecs 2 technical deep dive workshop
Emc ecs 2 technical deep dive workshopEmc ecs 2 technical deep dive workshop
Emc ecs 2 technical deep dive workshop
 
Emc vplex deep dive
Emc vplex deep diveEmc vplex deep dive
Emc vplex deep dive
 
Cisco mds 9148 s training workshop
Cisco mds 9148 s training workshopCisco mds 9148 s training workshop
Cisco mds 9148 s training workshop
 
Cisco cloud computing deploying openstack
Cisco cloud computing deploying openstackCisco cloud computing deploying openstack
Cisco cloud computing deploying openstack
 
Se training storage grid webscale technical overview
Se training   storage grid webscale technical overviewSe training   storage grid webscale technical overview
Se training storage grid webscale technical overview
 
Vmware 2015 with vsphereHigh performance application platforms
Vmware 2015 with vsphereHigh performance application platformsVmware 2015 with vsphereHigh performance application platforms
Vmware 2015 with vsphereHigh performance application platforms
 

Último

Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 

EMC Data domain advanced features and functions

  • 1. Data Domain Advanced Features and Functions 1 Velocity Partner Accreditation
  • 2. Module Objectives 2 Upon completion of this module, you will be able to: • Describe VTL and VTL library planning • Describe snapshots, fastcopy, and data retention • Describe data replication and recovery • Describe DD Boost and integration with EMC NetWorker • Describe capacity and throughput planning • Describe Data Domain system monitoring tools
  • 3. Lesson: Virtual Tape Library (VTL) EMC CONFIDENTIAL—INTERNAL USE ONLY. 3 Upon completion of this lesson, you will be able to: • Describe a Data Domain VTL • Describe VTL library planning
  • 4. VTL Definition Application/ media backup server Backup Cache Retention/ restore/ cloning Disaster recovery/ archive/ offsite storage Why should you use a VTL? EMC CONFIDENTIAL—INTERNAL USE ONLY. 4
  • 5. Configuration Terms EMC CONFIDENTIAL—INTERNAL USE ONLY. 5 Barcode • Unique ID assigned to virtual tape when you create it • In the Data Domain OS aka: label, tape label CAP • Cartridge access port (CAP), emulated tape enter/eject point for moving tape to/from a library • In the Data Domain OS aka: mail slot Library •Emulates physical tape library with tape drives, changer, CAPs, and slots (cartridge slots) • In the Data Domain OS aka: autoloader, tape silo, tape mount, tape jukebox, vault Pool Collection of tapes that map to a directory on a file system, used to replicate tapes to a destination Tapes •Represented in a system as files. You can export/import from a vault to a library, move within a library across drives, slots, and CAPs • In the Data Domain OS aka: cartridge Vault Unused tapes stored in vault, tapes are in library/vault
  • 6. VTL Library Planning •256 virtual tape drives (DD880 only) • 128 virtual LTO-1, LTO-2, LTO-3 tape drives (all other models) Robot loadschanges tape cartridge Up to 1,00,000 tape cartridges in virtual vault Fibre channel VTL • 64 virtual libraries • 20,000 slots per library • 100 CAPs per library • 1000 CAPs per system • 800 GiB per tape EMC CONFIDENTIAL—INTERNAL USE ONLY. 6
  • 7. Capacity Planning EMC CONFIDENTIAL—INTERNAL USE ONLY. 7 • More planning needed at installation • Expired tapes NOT deleted, space not reclaimed till tape is overwritten/deleted • Always create more slots that you need • Load tapes when you need them • Stop loading tapes once retention requirements are met
  • 8. Lesson: Fastcopy, Snapshots, and Data EMC CONFIDENTIAL—INTERNAL USE ONLY. 8 Retention Upon completion of this lesson, you will be able to: • Describe Data Domain fastcopy • Describe Data Domain snapshots • Describe Data Domain data retention • Explain the Data Domain cleaning process
  • 9. Fastcopy EMC CONFIDENTIAL—INTERNAL USE ONLY. 9 Copy If you change source or target directory while copying, they will not be equal. Source directory Target directory
  • 10. Snapshots Original copy Snapshot copy /data/ coll /backup /data/ coll /backup/files /data/ coll /backup / .snapshot /data/ coll /backup/files/ .snapshot Snapshot taken at 22:24 GMT 22:24 GMT snapshot saved EMC CONFIDENTIAL—INTERNAL USE ONLY. 10
  • 11. Retention Lock Archive software or user initiates Prevents retention-locked files from being deleted/modified for up to 70 years Licensed feature Retention locked files can be stored, encrypted, and replicated EMC CONFIDENTIAL—INTERNAL USE ONLY. 11
  • 12. Retention Lock Flow 1. License/enable retention lock 2. Set min/max retention period3. Create file 4. Lock file (set retention period) - Extend retention-locked file - Delete expired retention-locked file 5. Transfer file to Data Domain system EMC CONFIDENTIAL—INTERNAL USE ONLY. 12
  • 13. currenttime Configure Client File Retention Period minimum retention period valid atime period maximum retention period 2. Data Domain system administrator sets min/max retention periods on Data Domain system 1. User creates file and sets last access time (atime) to desired retention period Client must initiate retention lock 3. File either committed as a retention-locked file or ignored EMC CONFIDENTIAL—INTERNAL USE ONLY. 13
  • 14. File System Cleaning FileA deleted with no retention lock File B deleted, retention lock initiated FileA deleted at next cleaning File B maintained until retention lock period ends SW backups to Data Domain EMC CONFIDENTIAL—INTERNAL USE ONLY. 14 Cleaning reclaims physical storage occupied by deleted objects
  • 15. Cleaning Disk blocks What?  Reclaim space Disk block Disk block Why?  House keeping (reclaim “dead” segments)  Performance (rewrite duplicate data) House keeping Performance tuning Container 1 Container 2 Container 2Container 3 dead copy Forward valid Container 1 or Free space Free space EMC CONFIDENTIAL—INTERNAL USE ONLY. 15
  • 16. Lesson: Replication and Recovery EMC CONFIDENTIAL—INTERNAL USE ONLY. 16 Upon completion of this lesson, you will be able to: • Describe the types of Data Domain replication • Identify how replication improves storage • Describe the data recovery process
  • 17. Data Replication New deduplicated compressed data is automatically replicated to destination WAN LAN Source Destination EMC CONFIDENTIAL—INTERNAL USE ONLY. 17
  • 18. Data Domain Replication Types EMC CONFIDENTIAL—INTERNAL USE ONLY. 18 • Collection: for entire site backup • Directory: for partial site backup • Pool: for VTL files/tape backup
  • 19. Data Domain Collection Replication /backup /backup EMC CONFIDENTIAL—INTERNAL USE ONLY. 19 Source Destination •Immediate accessibility • Read only •User accounts/passwords replicated from source • Works with encrypted files • Works with retention lock Recovers entire system
  • 20. Data Domain Directory Replication /backup/dir a Source • Destination must have available storage • CIFS and NFS clients ok • Do not mix CIFS/NFS data in same directory • Destination directory created automatically • Works with encryption • Works with retention lock /backup/dir b /backup/dir a /backup/dir b Destination Destination Recovers selected data EMC CONFIDENTIAL—INTERNAL USE ONLY. 20
  • 21. Data Domain Pool Replication Source Destination • Works like directory replication • Destination doesn’t require VTL license pool 1 pool 3 pool 2 pool 1 pool 3 pool 2 EMC CONFIDENTIAL—INTERNAL USE ONLY. 21
  • 22. Replication Context WAN Source Destination EMC CONFIDENTIAL—INTERNAL USE ONLY. 22
  • 23. Replication Topologies Sourc e Source Sourc e Destination Destination Destination Sourc e Source Source Destination Destination Destination 1 to 1 1 to many Bi-directional Many to 1 Cascaded Cascaded 1-to-many Primary source/ Destination Primary source/ destination EMC CONFIDENTIAL—INTERNAL USE ONLY. 23
  • 24. Recover Data Backup serverFile serverClients On site Off site disaster recovery WAN Replication In case of disaster, recover off-site replica EMC CONFIDENTIAL—INTERNAL USE ONLY. 24 You can configure a Data Domain system to store backup data and retain onsite for 30-90 days
  • 25. Why Resynchronize Recovered Data? WAN Source Resynchronization Destination Recreate deleted context Out of space Convert collection to directory replication EMC CONFIDENTIAL—INTERNAL USE ONLY. 25
  • 26. Lesson: Data Domain Boost EMC CONFIDENTIAL—INTERNAL USE ONLY. 26 Upon completion of this lesson, you will be able to: • Describe DD Boost • Describe replica awareness • Describe how DD Boost works with EMC NetWorker • Describe supported network topologies • Describe DD Boost advanced load balancing and link failover feature
  • 27. DD Boost EMC CONFIDENTIAL—INTERNAL USE ONLY. 27 • Provides standard/centralized management features through backup software • Works with industry standard backup software – EMC Networker – Symantec NetBackup (Data Domain plug-in required) – Symantec Backup Exec (Data Domain plug-in required) • Enables advanced load balancing and failover • Requires licenses on Data Domain System – DD Boost – Replication (if used) Note: Your backup software might require license to enable the feature. Verify your backup software documents.
  • 28. DD Boost (contd.) Backup Server OST plug-in DD Boost Clients Clients send data to backup server Less data sent over LAN Deduplication/compression occur in backup server LANLAN Optimized protocol for high throughput Manages connections between backup applications and Data Domain systems with DD Boost Deduped Data Stored EMC CONFIDENTIAL—INTERNAL USE ONLY. 28
  • 29. Replica Awareness Backup Server WAN replication Backup site Disaster recovery site Initiates and tracks replication for easy management and disaster recovery You manage replication from backup server console OST plug-in Archive to tape as needed DD Boost DD Boost EMC CONFIDENTIAL—INTERNAL USE ONLY. 29
  • 30. DD Boost Advantage • Without DD Boost – Backup server(s) not aware of Data Domain replica(s) – Recovery is manual process • With DD Boost – Backup server dedupes data and minimizes network bandwidth use – Replication and recovery are centrally configured and monitored Backup Replication Optimized deduplication Replication engine Backup server DD Boost server DD Boost server WithoutOST Manually configured replication With DD Boost OST plug-in EMC CONFIDENTIAL—INTERNAL USE ONLY. 30
  • 31. NetWorker – Work Flow Start clone (Clone 1) 4 NetWorker Server Control Data Local Data Domain system Remote Data Domain system 5 Data transfer 6 Done (Clone 1) Clone 1 Save Set 1 7 Clone 1 update control data Clone 1 Save Set 1 New data backup (Save Set 1) 1 2 Done (Save Set 1) Save Set 1 update control data 3 EMC CONFIDENTIAL—INTERNAL USE ONLY. 31
  • 32. Lesson: Capacity and Throughput Planning EMC CONFIDENTIAL—INTERNAL USE ONLY. 32 Upon completion of this lesson, you will be able to: • Describe capacity planning and its importance • Describe throughput planning and its importance
  • 33. Monitor File System Space Use EMC CONFIDENTIAL—INTERNAL USE ONLY. 33 • Factors that effect how fast data on disk grows – Size of data sets getting backed up – Compressability of data getting backed up – Retention period specified in backup software • Monitor disk use closely when you back up large data sets that show low compression factors and have large retention times • You can get more accurate space-use view from CLI • Use filesys show space to monitor post-compression data growth
  • 34. Space Graph Cumulative physical data written to DDSAmount of Data within Backup Application Compression Ratio: Pre-compression/ Data Collection Available Space on DDS EMC CONFIDENTIAL—INTERNAL USE ONLY. 34
  • 35. Space Graph (contd.) What does the saw-tooth line for compression ratio represent? EMC CONFIDENTIAL—INTERNAL USE ONLY. 35
  • 36. Compression Factor Calculation Original bytes Data Domain system data written ompression factor C What does cleaning do to this equation? It decreases the Data Domain system data written (denominator) and thus increases the compression factor. EMC CONFIDENTIAL—INTERNAL USE ONLY. 36
  • 37. How much? •Data size (TB) • Data type • Full backup size •Compression rate (deduplication) Capacity Planning: Determine Capacity Needs Capacity needs How long? • Retention policy (duration) • Schedule EMC CONFIDENTIAL—INTERNAL USE ONLY. 37
  • 38. Determine Capacity Needs (contd.) EMC CONFIDENTIAL—INTERNAL USE ONLY. 38 • Data Domain system internal indexes and other components use variable storage amounts depending on data type and file sizes • If different data sets are sent to identical systems, one system may, over time, have room for more/less backup data than another • Challenging data types – Pre-compressed (multimedia, .zip, and .tiff) – Encrypted
  • 39. Compression Requirements with Variables EMC CONFIDENTIAL—INTERNAL USE ONLY. 39 • 5x – Nearline and archive Incremental + weekly full backup with two weeks retention – Daily full backup with one week retention – Nearline and archival use compression tends to be capped here – • 10x – Overall compression Incremental + weekly full backup with one month of retention – Daily full backup with two-three weeks retention – • 20x – Overall compression Incremental + weekly full backup with two-three months retention – Daily full backup with three-four weeks retention –
  • 40. Calculate Required Capacity 1st full backup Incremental backup 4 Weekly full backup number of weeks Required capacity Total space required Required capacity EMC CONFIDENTIAL—INTERNAL USE ONLY. 40
  • 41. Calculate Required Throughput Largest backup Backup time window 6 TB 10 hrs Example Required throughput 600 GB/hr EMC CONFIDENTIAL—INTERNAL USE ONLY. 41
  • 42. System Model Capacity and Performance • Maximum capacity is amount of usable data storage space • Maximum capacity based on max number of drives supported by a model • Maximum throughput is achieved using either VTL interface and 4Gbps Fibre Channel or DD Boost and 10Gb Ethernet • Current model throughput and capacity specifications http://www.datadomain.com/products/ EMC CONFIDENTIAL—INTERNAL USE ONLY. 42
  • 43. Select Model Maximum throughput • Be conservative when determining which model to use • Use 75-85% of model capacity and throughput (factor 15-25% buffer for capacity and throughput) Required capacity Maximum logical capacity Required throughput Capacity % Throughput % 100 EMC CONFIDENTIAL—INTERNAL USE ONLY. 43 100
  • 44. Calculate Capacity Buffer for Selected Models Required capacity Maximum capacity DD140 example 840 GB 860 GB 840 GB 1650 GB DD610 example 97% 51% 100% 100% 100% % of Maximum capacity 3% Buffer not ok 51% Buffer ok EMC CONFIDENTIAL—INTERNAL USE ONLY. 44
  • 45. Match Required Capacity to Model Specifications OR? 1,650 GB with 7 drives DD610DD140 860 GB For example Required capacity = 840 GB Ensure capacity buffer is big enough EMC CONFIDENTIAL—INTERNAL USE ONLY. 45
  • 46. Calculate Performance Buffer for Selected Models Required throughput Maximum throughput DD610 example 600 GB/hr 675 GB/hr 600 GB/hr 1126 GB/hr DD630 example 89% 53% 100% 100% 100% % of Maximum throughput 11% Buffer not ok 47% Buffer ok EMC CONFIDENTIAL—INTERNAL USE ONLY. 46
  • 47. Match Required Capacity to Model Specifications OR? 1.1 GB/hr DD630DD 610 860 GB/hr For example Required throughput = 600 GB/hr Ensure performance buffer is big enough 47
  • 48. Lesson: System Monitoring Tools 48 Upon completion of this lesson, you will be able to: • Describe Data Domain system monitoring tools – SNMP – syslog – autosupport – SUP
  • 49. Alert Monitoring a Data Domain System Data Domain system administrator Daily alerts and autosupport reports Daily alerts and autosupport reports Data Domain technical support 2. syslog 3. autosupport 4. SUB1. SNMP 49
  • 50. SNMP 50 • You can monitor a Data Domain system via SNMP utilities • You can integrate the Data Domain Management Information Base (MIB) into SNMP monitoring
  • 51. Syslog (Remote Logging) syslog server LAN Port 514 System messages Port 514 Sends system messages to remote syslog server Uses TCP port 514 You collect logs 51 -
  • 52. Autosupport 52 • Easy to install – just once at system setup • Helps solve/prevent system problems – Provides timely notification of significant issues – Enables rapid response time to address or prevent problems – Includes critical system data to aid support case triage and management
  • 53. Autosupport System autosupport@ autosupport.datadomain.com System history Warnings Integration to other systems Reports Data Domain technical support (support case) Other vendors Daily alert summary Reboots via SMTP Summary autosupport report 53 Detailed autosupport report
  • 54. Autosupport Types autosupport types 54 Non scheduledScheduled Detailed autosupport report sent 6 am Daily alert summary email sent 8 am Alerts • warning • failure Reboots
  • 55. Autosupport Via Enterprise Manager • Data Domain systems provide alerts, autosupport reports, and logs • Access through Enterprise Manager 55
  • 56. Autosupport Reports • Using SMTP, sent to Data Domain technical support daily at 6 am local time (default) • Contains system ID, uptime information, system command outputs, runtime parameters, logs, system settings, status and performance data, and other debugging information • Long text report (500-800K) • Sections parsed into data warehouse for analysis and reporting Subscribers receive daily detailed reports 56
  • 58. Daily Summary Autosupport Provides summary autosupport report Tells you if the system is ok or not. If not, no email receipt is received Sent daily at 8 am Uses autosupport email distribution list This is an example of an alert 58
  • 59. Alerts Unique numerical ID Physical component where alert occurred Subsystem where alert occurred Alert severity Date and time alert occurred 59
  • 60. Alerts Notification Terse description of event Has separate email distribution list Creates support case Sent immediately upon detection 60
  • 61. Logs Every Sunday at 3 am 1. New log file opened 2. Old log file renamed CLI: log view filename 61
  • 62. Support Upload Bundle (SUB) 62 • Large (multi-GB sized) tar file • Contains – OS settings and log files – System files (not customer data files) identified as needed for system diagnosis by Data Domain support and engineering • Used to triage and diagnose a Data Domain system in the field • CLI commands used to generate and optionally send (via http) SUB to Data Domain support site • Generated by sysadmin on Data Domain system via GUI/CLI
  • 63. Module Summary 63 Key points covered in this module include: • VTL and VTL library planning • Snapshots, fastcopy, and data retention • Data replication and recovery • DD Boost and integration with EMC NetWorker • Capacity and throughput planning • Data Domain system monitoring tools
  • 64. Product Demo Click the link below to view a demonstration on Data Domain. Launch Demo 64
  • 66. PROPERTIES On passing, 'Finish' button: On failing, 'Finish' button: Allow user to leave quiz: User may view slides after quiz: User may attempt quiz: Goes to Next Slide Goes to Next Slide At any time At any time Unlimited times