Reworking Data Protection for a Virtualized Environment


Published on

Server virtualization puts a strain on backup and recovery processes for virtual machines and applications. Discover how four key capabilities enhance data protection efficiency and performance in highly virtualized IT environments.

By Jason Buffington

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Reworking Data Protection for a Virtualized Environment

  1. 1. Converged infrastructure and data management Special section Reworking data protection for a virtualized environment By Jason Buffington Server virtualization puts a strain on backup and recovery processes for virtual machines and applications. Discover how four key capabilities enhance data protection efficiency and performance in highly virtualized IT environments. W hen IT professionals who work at large and midsize organizations are asked to list their organizations’ IT priorities, “improving data backup and recovery” consistently ranks near — or at — the top of the most-cited priorities they mention.1 But backup and recovery are not alone at the top of people’s minds in terms of strategic importance. The urgency that organizations feel about data protection is influenced by another phenomenon: increases in server virtualization. Both a tactical association and a strategic association exist between backup and virtualization. As virtualization becomes ever more of a mainstay in data centers, traditional approaches for backing up an IT environment pose a data protection challenge that continues to escalate, growing in proportion to the pace at which IT environments become virtualized. Accordingly, if tasked with managing what has turned into a highly virtualized IT environment, IT professionals must take the time to reassess their organizations’ data protection strategies. 1 “Research Report: 2013 IT Spending Intentions Survey,” by Jennifer Gahm, Bill Lundell and John McKnight, Enterprise Strategy Group, January 2013,; “Research Report: 2012 IT Spending Intentions Survey,” by Jennifer Gahm, Kristine Kao, Bill Lundell and John McKnight, Enterprise Strategy Group, January 2012,; “Research Report: 2011 IT Spending Intentions Survey,” by Jennifer Gahm, Bill Lundell and John McKnight, Enterprise Strategy Group, January 2011,; “Research Report: 2010 IT Spending Intentions Survey,” by Jennifer Gahm, Bill Lundell and John McKnight, Enterprise Strategy Group, January 2010, Reprinted from Dell Power Solutions, 2013 Issue 3. Copyright © 2013 Dell Inc. All rights reserved. | 2013 Issue 03 27
  2. 2. Special section Converged infrastructure and data management Old backup processes, new virtual machines reported that virtual server backup/recovery is Imagine looking at a performance meter for a among their top 10 challenges, with 9 percent traditional physical server, which shows lines calling it their “most significant data protection indicating routine, periodic spikes in processor and challenge.”2 Among specific concerns, ESG storage read/write activity. Now, imagine looking found that basic recoverability of data was most at that meter as the server is being backed up. It commonly mentioned, followed by the ability would definitely display heightened I/O activity to validate the success of backup and recovery tied to both processor and storage, either rapidly operations (see figure on next page). spiking or just pegged to the top of the meter. This Unreliable and complicated backups, relatively heightened activity occurs because a combined with a lack of assurance in protection, traditional backup application basically orders the recoverability and monitoring, continue to plague physical server to “give me all the data you have, backup administration of virtualized environments. as fast as possible.” Such a command is achievable This situation often results in consistently high for physical servers because they typically are levels of data protection–focused investment underutilized and usually have plenty of excess appearing prominently alongside high levels of processing headroom to accommodate resource- server virtualization investment. intensive backup operations. To bring their organizations’ data protection The situation is dramatically different when Insights on keeping data safe strategies in line with the requirements of a one physical server hosts many virtual machines virtualized environment, IT professionals should inside it. Although one virtual machine consumes consider four important capabilities when the same underutilized resources that it might assessing and implementing backup solutions. Visit the Technical Optimist blog to get fresh ideas on what IT professionals should be looking for to protect their virtualized environments. have on its own physical server, other virtual machines consume the rest of the resources. In 1. Embrace source-side deduplication a well-managed virtualization host, a majority of Virtual machines that use the same or similar the resources are in use, as they should be, which operating systems and that host similar applications means the extra headroom that legacy backup generate many redundant binaries. Source-side applications assume will be there is not available. deduplication — through VMware® changed-block Ultimately, traditional approaches do not work tracking, file-system filtering, Microsoft® NT File in a highly virtualized environment. And because System journaling and other means — is especially inefficient backup is not acceptable, IT professionals valuable to help eliminate those redundancies. who manage highly virtualized environments need The key is to get the deduplication process to rethink their data protection strategies. The as close to the virtual machines as possible. advantages that make server virtualization appealing — Conversely, a process that uses only storage- the device consolidation and footprint reduction, the centric deduplication results in data from all the near-instant server setup, the power and cooling virtual machines flowing from the host to the savings, and the simplified disaster recovery backup server — consuming compute, storage testing, to name a few — also create challenges in and networking resources. The data ends up in a protecting what is really important: the information. deduplication storage device, which then discards much of the data because it is a version of data Key considerations in reshaping a data protection strategy The Enterprise Strategy Group (ESG) routinely already received during backup operations for similar applications and other virtual machines. In contrast, when the deduplication surveys IT professionals about how easy or discernment process is positioned as close difficult it is for them to implement backup and as possible to production workloads, less recovery processes for virtualized servers. In one redundant data is moving across the network survey, 87 percent of responding IT managers only to be rejected. Instead, the overall backup 2 Source: 28 ESG Research, “Virtual Server Data Protection,” September 2011. 2013 Issue 03 | Reprinted from Dell Power Solutions, 2013 Issue 3. Copyright © 2013 Dell Inc. All rights reserved.
  3. 3. Which of the following would you characterize as challenges for protecting your organization’s virtual server environment? Which would you consider to be your organization’s primary virtual server data protection challenge? (Percent of respondents, N = 325)* Recoverability of data Validating backup success 44% 11% Validating recovery success 44% 10% Identifying factors impacting the performance of backup operations 27% 9% Simplified views across virtual infrastructure 27% 9% Response time for troubleshooting backup failures, policy violations, etc. 33% 8% Gaps in protection 28% 6% Validating or demonstrating service-level agreement (SLA) compliance 28% 6% Understanding the capacity impact of backup operations 22% 5% Understanding the impact of backup operations on the performance of applications/workloads sharing physical resources 22% 3% Tracking capacity trends and consumption Identifying inefficiencies and bottlenecks in the backup process 41% 21% 22% 3% 21% 1% Don’t know Primary virtual server data protection challenge 5% 5% 0% All virtual server data protection challenges 10% 20% 30% 40% 50% *Source: Research Report, "Trends for Protecting Highly Virtualized and Private Cloud Environments," by Jason Buffington and Bill Lundell, Enterprise Strategy Group, June 2013, Data protection challenges in a virtual server environment infrastructure is reduced. That is source-side hypervisors, deduplication may not be possible deduplication, and it is a huge win. across those hypervisors. As a result, far too much data may be sent to deduplicated storage, which 2. Make sure deduplication is global just discards it — after creating a huge I/O penalty across hypervisors for the IT environment along the way. Consider an environment with 20 hypervisors from In 2012, ESG conducted a study on storage one vendor, each running 20 virtual machines. infrastructure spending.3 IT professionals who Many deduplication methods could help reduce were buying a large amount of disk were asked those 20 virtual machines per host down to a how they planned to use all of it. The most single set of application binaries. On the other frequently mentioned answer was that the disk hand, in a situation with 20 hosts on different supported a data protection solution. It may be 3 Research Brief, “2012 Storage Infrastructure Spending Trends,” by Bill Lundell, Terri McClure and Mark Peters, Enterprise Strategy Group, March 2012, Reprinted from Dell Power Solutions, 2013 Issue 3. Copyright © 2013 Dell Inc. All rights reserved. | 2013 Issue 03 29
  4. 4. Special section Converged infrastructure and data management reasonable to conclude, then, that taking advantage functioning. The most efficient management and of global source-side deduplication significantly monitoring solutions are those that integrate either helps reduce storage spending. at the hypervisor layer or within the private cloud management interface. This integration minimizes 3. Look for robust post-process the number of management consoles needed to application handling determine whether the provisioned virtual machines Some vendors sell backup applications that are agent- are being protected adequately. based; others provide agentless technologies that, despite the name, insert a small executable file inside The path to virtualization protection the virtual machine to support certain situations. In general, ESG has been seeing an uptick in Regardless of the terminology, the important organizations preferring to use a unified solution to distinction in backing up virtualized servers is whether protect both physical and virtual servers, rather than the widgets, agents or modules behave like traditional running a separate solution just for protecting virtual physical backup agents (bad) or simply help with machines. Although backup vendors on both sides of application quiescing in support of virtual machine– the unified-versus-separate argument are still actively centric backup behavior (good). Not many use-case innovating, the real battleground of virtualization scenarios exist that warrant putting agents inside protection is not centered on the unified-versus- virtual machines for backing up data the traditional separate issue or whether one can back up a virtual way. So for most scenarios, the important function of machine. It is centered on how agile IT can be in agents is to support application management to help recovering the data, the whole virtual machine or a ensure a recoverable backup. set of virtual machines. For example, can IT restore a With some backup products, the hypervisors’ whole virtual machine without needing to put it back application programming interfaces enable the on the original host? Or accomplish item-level, file- backup software to freeze the storage for an level and even message-level recovery from within a adequate backup of the application itself, but a virtual machine? mechanism is still needed to notify applications that Four key data protection capabilities — source- they can truncate their backup-transaction logs, side deduplication, global deduplication across reset their checkpoints and go back to doing work. hypervisors, robust post-process application In the end, it does not matter if the backup vendor handling, and integrated monitoring and refers to that activity as agent-based or agentless. management — offer an indication of where The important outcome is to end up with virtualized virtualization protection is today: in the midst of applications that are properly groomed for overall continuing advances that IT administrators soon continued, consistent operational efficiency. won’t want to live without. And they even provide a glimpse into how it is going to keep evolving, with 4. Emphasize integrated monitoring multihypervisor strategies becoming pervasive and and management with the unified-versus-separate physical and virtual Many organizations spend time and money server protection debate continuing to grow. establishing a highly virtualized, easily managed private cloud infrastructure that enables them to provision virtual machines on the fly — and then find themselves needing to step completely out of that world to configure the backup of those virtual machines. The goal is to achieve as Author Jason Buffington is senior analyst at the Enterprise Strategy Group, focusing primarily on data protection, Microsoft® Windows Server® infrastructure, management and virtualization. Follow Jason on Twitter @JBuff. much integrated visibility as possible, at best to include integrated management but at least to offer integrated monitoring so that administrators can observe how the environment’s many separate but often interrelated data protection processes are 30 2013 Issue 03 | Learn more Enterprise Strategy Group: Reprinted from Dell Power Solutions, 2013 Issue 3. Copyright © 2013 Dell Inc. All rights reserved.