White Paper: EMC VNXe Data Protection — A Detailed Review
Upcoming SlideShare
Loading in...5
×
 

White Paper: EMC VNXe Data Protection — A Detailed Review

on

  • 3,002 views

This White Paper details the integrated features that can be positioned for business continuity in the EMC VNXe series platforms. Data protection features include snapshots, replication, and NDMP ...

This White Paper details the integrated features that can be positioned for business continuity in the EMC VNXe series platforms. Data protection features include snapshots, replication, and NDMP backups.

Statistics

Views

Total Views
3,002
Views on SlideShare
3,002
Embed Views
0

Actions

Likes
0
Downloads
52
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

White Paper: EMC VNXe Data Protection — A Detailed Review   White Paper: EMC VNXe Data Protection — A Detailed Review Document Transcript

  • White PaperEMC VNXe DATA PROTECTIONOverview Abstract This white paper details the integrated features that can be positioned for business continuity in the EMC® VNXe™ series platforms. Data protection features include snapshots, replication, and NDMP backups. March 2012
  • Copyright © 2012 EMC Corporation. All Rights Reserved.EMC believes the information in this publication is accurate asof its publication date. The information is subject to changewithout notice.The information in this publication is provided “as is.” EMCCorporation makes no representations or warranties of any kindwith respect to the information in this publication, andspecifically disclaims implied warranties of merchantability orfitness for a particular purpose.Use, copying, and distribution of any EMC software described inthis publication requires an applicable software license.For the most up-to-date listing of EMC product names, see EMCCorporation Trademarks on EMC.com.Part Number h8219.2 EMC VNXe Data Protection – Overview 2
  • Table of ContentsExecutive summary.................................................................................................. 4 Audience ............................................................................................................................ 4Terminology ............................................................................................................ 4VNXe data protection ............................................................................................... 5EMC Replication Manager overview .......................................................................... 6Snapshots .............................................................................................................. 6 Shared Folders and NFS datastore snapshots ..................................................................... 7 iSCSI snapshots ................................................................................................................. 9Protection Storage ................................................................................................. 10 Scheduling ....................................................................................................................... 13Replication ............................................................................................................ 15 Managing replication sessions ......................................................................................... 17 Synchronization Frequency............................................................................................... 17 Failover and failback operations ....................................................................................... 18Backup and recovery ............................................................................................. 20Conclusion ............................................................................................................ 22References ............................................................................................................ 23 EMC VNXe Data Protection – Overview 3
  • Executive summaryA small to medium sized organization’s data is one of its most valuable assets.Therefore, the company’s highest priorities must include safeguarding its data.EMC® VNXe™ Series provides integrated features for customers to meet their goalsof business continuity and data protection. This white paper describes the relevanttechnologies for different business continuity and data protection situations.Customers are concerned about data availability at all times. Outages, whatever thecause, are extremely costly. Further, data outages affect customers of all sizes.Systems and storage administrators have become aware of the importance of dataavailability while hit with shrinking IT budgets. The difficulty they face is in decidingwhich technology to apply to their situation.While considering data protection tools, customers must evaluate which aspect ofdata protection they need. Is security of data and risk mitigation needed? Do theyneed highly available data during normal business operations, so that the failure of adevice does not affect the availability of their business function? Or do they needdata backup and recovery? All these aspects constitute the overall umbrella ofbusiness continuity and data protection.AudienceThis white paper is intended for EMC customers, partners, and employees looking tounderstand features that exist in the EMC VNXe product that can provide maximumdata availability.Terminology• Common Internet File System (CIFS) – An access protocol that allows users to access files and folders from Windows hosts located on a network. User authentication is maintained through Active Directory and file access is determined by directory access controls.• iSCSI protocol – The iSCSI (internet small computer system interface) protocol provides a mechanism for accessing raw block-level data storage over network connections. The iSCSI protocol is based on a network-standard client/server model with iSCSI initiators (hosts) acting as storage clients and iSCSI targets acting as storage servers. Once a connection is established between an iSCSI host and the iSCSI server, the host can request storage resources and services from the server.• iSCSI server – A VNXe server that uses the iSCSI protocol to manage Microsoft Exchange storage groups, generic storage virtual disks, Hyper-V datastores, and/or VMFS-based VMware datastores. EMC VNXe Data Protection – Overview 4
  • • Local replication – Local replication occurs between two storage servers within the same VNXe system. After the local replication session is established, a read- only copy of the source storage resource is created on the destination storage server.• Network-attached storage (NAS) – File-based storage for a wide range of clients and applications that access storage over network connections. Protocol-specific file systems are located and managed on the storage system, which transfers data to hosts over TCP/IP using CIFS and NFS file sharing protocols.• Network Data Management Protocol (NDMP) – A standard for backing up file servers on a network. It allows centralized applications to back up file systems running in a customer environment.• Network File System (NFS) – An access protocol that allows users to access files and folders from Linux/UNIX hosts located on a network.• Remote replication – The replication of stored data from one VNXe system to another (remote) VNXe™ system or VNX/Celerra® system.• Shared Folder server – A VNXe server that uses either the CIFS or NFS protocol to catalog, organize, and transfer files within designated shares. A shared folder server is required to create shared folders that contain CIFS or NFS shares, or NFS VMware datastores.• Snapshot – A read-only, point-in-time copy of data stored on the storage system. Administrators can recover files and folders from snapshots.• Storage resource – An addressable and configurable storage instance associated with a specific quantity of storage, storage server, storage pool, and protocol (iSCSI or NAS).• Unisphere™ – A web-based management interface for creating storage resources, configuring and scheduling protection for stored data, and managing and monitoring other storage operations.VNXe data protectionData protection for the VNXe is summarized in three categories: snapshots,replication, and traditional NDMP backups. The various application-awarecapabilities may add application knowledge and custom functionality but are stillbased on the basic network-attached storage (NAS) and iSCSI protection concepts.VNXe includes data protection functionality that revolves around the concepts ofprotection and recovery for shared folder, application, or generic iSCSI LUN storage.EMC Replication Manager (RM) is leveraged for iSCSI data protection. EMC VNXe Data Protection – Overview 5
  • EMC Replication Manager overview Replication Manager manages EMC point-in-time replication technologies and coordinates the entire data replication process from discovery and configuration to the management of multiple disk-based replicas. This enables organizations to meet service-level agreements for reduced recovery point objectives (RPOs) and recovery time objectives (RTOs). Running on a separate Microsoft Windows server, it provides a graphical user interface for managing the replication and snapshots of iSCSI LUNs.1 Snapshots A snapshot is a virtual point-in-time image of the data within a storage resource that has changed since the last snapshot. Snapshots provide a record of the content in the targeted storage resource at a particular date and time, but they are not full copies of the data. Periodically creating snapshots of storage provides an effective technique for meeting data protection and recovery requirements. Based on the importance and volatility of data within a VNXe storage resource, administrators can define recurring schedules that specify times and intervals for VNXe snapshot operations. VNXe provides tools for performing manual (on-demand) snapshots, configuring snapshot schedules, and performing snapshot restore operations and snapshot recovery operations. Administrators can choose default or customize snapshot schedules that specify regular times to perform snapshot operations (automatic snapshot creation and deletion). You can select the intervals, times, days, and dates at which snapshot operations occur. A collection of rules within the schedule specify the interval, frequency, and time that snapshots are taken. VNXe calculates the amount of storage protection space needed based on the complexity of the protection schedule chosen by the administrator. This value can be adjusted if desired. The VNXe system also allows administrators to manually create snapshots that contain on-demand images of specific storage resources at a particular time. You can create a manual snapshot by navigating to the Snapshots tab in the Details section of the given storage resource, and by clicking the Take Snapshot Now button (shown in Figure 1). This feature is useful in various situations, such as taking snapshots of data that will be unavailable for a period of time, that will be subject to unusual circumstances or risks, or that is used for testing or debugging purposes.1 Snapshots created with Replication Manager can be viewed and deleted in Unisphere. EMC VNXe Data Protection – Overview 6
  • Figure 1 Manual snapshot of the storage resourceWhen administrators need to restore a VNXe storage resource to its state at aparticular date and time, they can restore the storage resource from a particularsnapshot. It is important to note that modifications to files after the particularsnapshot was created will be lost.Hosts connected to the storage resource continue to have access to the restoreddata. The snapshot schedule automatically resumes.Shared Folders and NFS datastore snapshotsSnapshots for Shared Folder and VMware NFS datastores are performed on the entirefolder or datastore; you cannot take a partial snapshot of these resources. Snapshotsare based on a copy-on-first-modify principle. Figure 2 illustrates the live view andsnapshot view of the snapshot window if the block is modified after the checkpoint iscreated. The production data and snapshot data are maintained separately. It isimportant to note that these snapshots are read-only. Data must be restored before itcan be edited. EMC VNXe Data Protection – Overview 7
  • Figure 2 Two views of the data during a snapshot windowEnd users, if they have the proper access permissions, can restore a file that wasaccidentally deleted by accessing the snapshots from a host that is mounted (NFS) ormapped (CIFS) to the share by adding “.ckpt” to the end of the share path. Thisdirects them to the hidden snapshot directory. If users are mapped to a CIFS sharedfolder, they have the option to access the snapshot through Microsoft Explorer underthe Previous Versions tab in the share’s Properties window to perform the restore.This leverages Microsoft’s Volume Shadow Copy Service (VSS) technology.Alternatively, snapshot restores of shared folders can also be performed withinUnisphere to retrieve data recorded on a specific date and time (see Figure 3). Withthis approach, note that the complete snapshot is restored, bringing the whole filesystem back to a given point in time. EMC VNXe Data Protection – Overview 8
  • Figure 3 Restore a file from a previous snapshot of a Shared FolderWhen administrators schedule snapshot creation of a shared folder, if the protectionstorage runs out, the oldest snapshot is inactivated and deleted to make space forany new snapshots.iSCSI snapshotsReplication Manager is used to create or schedule application-consistent snapshotsfor iSCSI storage resource, where the application data is halted to ensure that itremains consistent with the application. Snapshots created with ReplicationManager can be viewed and deleted from Unisphere. However, protection schedulesare only visible in Replication Manager.Creating snapshots in Replication Manager involves the following:  Provisioning an iSCSI storage resource (including generic iSCSI, Exchange, VMware VMFS, or Hyper-V) and enabling protection storage, where snapshots will be stored.  Obtaining an EMC Replication Manager license.  Installing and configuring Replication Manager on a host with a network connection to the VNXe system.  Creating an application set to specify the storage resource to protect in Replication Manger.  Creating a snapshot, or scheduling snapshots, of the application set. EMC VNXe Data Protection – Overview 9
  •  Viewing details about the storage resource and the snapshots in Unisphere.Data on an iSCSI snapshot is accessible only if that snapshot is promoted. Promotingand demoting of an iSCSI snapshot can be performed within Unisphere.When the allocated protection storage runs out of space, iSCSI snapshots do notrecycle themselves as exhibited with NAS snapshots. In the case of thin-provisionedstorage, the space containing the iSCSI LUN and snapshots will auto-extend untilthere is no space left in the pool. The administrator can modify the maximum spaceallowed for an iSCSI LUN’s snapshot. The VNXe system will not create any newsnapshots until this space is freed, and an alert notifying the administrator of thisissue. All snapshot-related operations are executed at the application instance level.For example, in the case that there are multiple vdisks under particular generic iSCSIstorage, the snapshot creation works on all of them. The user cannot selectively takesnapshots of the storage.Administrators must keep in mind that once a snapshot is used to restore data, allsnapshots that were taken after that particular snapshot are destroyed and cannot berecovered in iSCSI storage resources. This is a different behavior from the SharedFolders and VMware NFS datastores, where all snapshots remain on the system.Protection StorageYou can create protection storage when you use the provisioning wizards to createstorage resources, or you can create protection storage after you create other storage.As shown in Figure 4, you can choose to do the following:  Not configure protection storage  Configure protection storage without configuring a snapshot schedule  Configure protection and create a snapshot scheduleWhen you create protection storage, it is automatically provisioned to storesnapshots, and to restore or recover primary storage. Protection storage is separatefrom the primary storage that is used for storing host, user, or application data. Ifprotection storage is reserved for a particular storage resource, then the VNXe systemautomatically allocates a minimum amount of protection storage to support manualsnapshots of the primary data. EMC VNXe Data Protection – Overview 10
  • Figure 4 Configuring protection storage with a snapshot scheduleThe protection storage for a resource can be increased without affecting its primarystorage. For iSCSI storage resources, VMFS datastores, and Hyper-V storage,administrators can set different host access permissions for primary storage andprotection storage. You can also auto-adjust the size of protection storage, dependingon the size of primary storage. When enabled, VNXe adjusts the protection storagesize proportionately to any change to the size of the primary storage. For thick, ornon-thin provisioned, storage resources, it is important to note that administratorscannot reduce the size of protection storage once it has been created.When provisioning Shared Folder or VMware NFS Datastore storage resources, theminimum size of the reserved protection storage is dependent on the primary storagesize. The algorithm for protection size is as follows: If the primary storage size is less than or equal to 20 GB, the minimum protection size allocated is equal to the primary storage size. If the primary storage size is greater than 20 GB, the minimum protection size allocated is either 5% of the primary storage size or 20 GB (whichever size is greater).For example, if an administrator specifies 15 GB for the primary storage, the VNXesystem allocates a minimum of 15 GB of reserved protection storage, resulting in anallocation of 30 GB for the storage resource. If the administrator specifies 450 GB forthe primary storage, the VNXe system allocates a minimum of 22.5 GB of reservedprotection storage, resulting in an allocation of 472.5 GB for the storage resource.With auto-adjust selected, if the primary storage size increases from 500 GB to 750GB, and there is reserved protection storage of 5 percent, then the total amount ofstorage allocated for the resource increases automatically from 525 GB to 787.5 GB.In this example, the protection storage size increased from 25 GB to 37.5 GB.When provisioning thick iSCSI storage resources, VMFS datastores, and Hyper-Vstorage, the minimum protection size is 105 percent and the recommendedprotection size is 135 percent of the size of the allocated storage depending onwhether a protection schedule is being configured. The recommended protection sizeis based on the primary storage size. Administrators should use the recommended EMC VNXe Data Protection – Overview 11
  • protection size because depleted protection resources can lead to data loss in thestorage resource primary or protection data. Figure 5 shows the “Configure ProtectionStorage Size” wizard pane when provisioning Generic iSCSI Storage. Choosing toconfigure the storage resource with 10GB of primary storage, the wizard presents tothe user a minimum protection size of 10.500 GB and recommended protection sizeof 13.500 GB. Figure 5 Setting the Protection storage sizeTable 1 displays the amount of protection storage that is provisioned relative to thesize of the primary storage. With Microsoft Exchange storage provisioning, you createprotection schedules in the Replication Manager interface. EMC VNXe Data Protection – Overview 12
  • Table 1 Protection Size based on Primary storage Protection Protection Size Protection Size Size Allow Protection Allow Protection (Snapshot Application No Protection (No Snapshot Schedule) Schedule Configured) Default/ Default/ Min/Default Min Min Recommended Recommended Shared Folder 0% 5% 5% 5%* 35% Generic iSCSI 0% 105% 105% 105% 135%(w/o Thin Provisioning ) Generic iSCSI 0% 5% 5% 5% 35% (w/Thin Provisioning) VMware (VMFS 0% 105% 105% 105% 135%w/o Thin Provisioning) VMware (VMFS w/Thin 0% 5% 5% 5% 35% Provisioning) VMware (NFS) 0% 5% 5% 5%* 35% Hyper-V 0% 105% 105% 105% 135%(w/o Thin Provisioning ) Hyper-V 0% 5% 5% 5% 35% (w/Thin Provisioning) Exchange 0% 105% 135% NA NA(w/o Thin Provisioning ) Exchange 0% 5% 35% NA NA (w/Thin Provisioning) *The minimum protection size of 5% can be overridden (to 20GB) based on the primary storage size. Scheduling Snapshot protection schedules are made up of one or more rules that determine how often and at what times regular snapshot operations occur. Each snapshot rule defines a snapshot type (interval), snapshot frequency, and snapshot time, and also specifies the duration to keep the snapshot. VNXe protection rule types include: • Hourly (several times a day) • Daily (every day) • At daily intervals (every n number of days) EMC VNXe Data Protection – Overview 13
  • • On specific days of the week • On specific days of the monthThese rules are displayed when you configure protection storage with a snapshotschedule. The daily protection rule is shown in Figure 6. Figure 6 Modifying the protection scheduleFor each storage resource provisioned you can select one of the predefined schedules(listed in Table 2), or create one or more customized schedules.Table 2 Predefined snapshot schedule options Schedule Name Take Snapshots Keep Snapshots Default Protection Once every day 2 days More Protection Once every day 7 days Less Protection Once every day 1 daysAn administrator can create a custom protection schedule by combining a number ofrules in order to obtain short-term storage protection (hourly/daily snapshots), long-term storage protection (weekly/monthly snapshots), or both. However, the morefrequently the schedule takes snapshots, the more storage resources are consumed.To limit the storage consumed by snapshots, the VNXe system allows the creation ofa protection reserve that allocates a specific quantity of resources for snapshotoperations. EMC VNXe Data Protection – Overview 14
  • ReplicationThe ability to quickly recover data and access from a catastrophic failure at acompany site is crucial to business operations. The decreasing cost of disk storagemakes the use of replication technologies more attractive for enabling real-timebackup and recovery. Application images can instantly be transferred betweenservers and between sites. It is particularly useful for organizations that have thecombination of a remote office or branch office (ROBO) network schemeimplemented. Data housed at the primary site can easily be copied and accessed viareplicas at another site.Replication is a process in which storage data is duplicated either locally or to aremote network device. It produces a read-only, point-in-time copy of source storagedata and periodically updates the copy, keeping it consistent with the source data. Incase the main storage backup system fails, storage replication provides an enhancedlevel of redundancy. This minimizes the downtime-associated costs of a systemfailure and simplifies the recovery process for a natural or human-caused disaster.VNXe replication provides asynchronous replication tools for creating point-in-timecopies of storage resources. This is a complete copy of the data, unlike a snapshot ofthe data, in which only the changes to the data are saved.There are two types of replication: • Local — Local replication occurs within the same VNXe system. • Remote — Remote replication occurs between the source VNXe system and the remote VNXe, VNX, or Celerra system.Once a storage resource has been created, a replication session can be made toeither its peer storage processor or to a remote system. The replication session canbe initiated via the options at the end of the storage provisioning wizard (shown inFigure 7). Figure 7 Configure a replication session at the end of the wizard EMC VNXe Data Protection – Overview 15
  • As of release VNXe OE 2.2.x, replication sessions for Generic iSCSI storage resources can be established within Unisphere.2 Once the iSCSI storage resource is created, options are presented at the end of the Generic Storage Wizard (shown in Figure 8). Figure 8 Configure iSCSI replication session at the end of the wizard In addition, there is the option to configure a local or remote replication session at a later time by navigating to the Details page of the storage resource (shown in Figure 9). Figure 9 Configure a replication session in the Details page Replication lets the administrator automatically maintain a complete second copy of the storage resource on the local system. This local copy is a complete copy of the data, unlike a snapshot of the data, in which only changes to the data are saved. For Generic iSCSI storage replication, Unisphere ensure the mapping between source and destination VNXe systems. In certain cases, new virtual disks may have been added the source VNXe system since setting up the replication session or the VNXe system may not have been able to set up replication sessions to all the individual virtual disks. In these cases, warning messages are displayed in Unisphere notifying users that an update is needed. The session status will change to “Update Needed”, prompting the user to take action. Administrators also have the option to delete the replication session from the Details page of the iSCSI storage resource.2 After the replication session has been created, you will need to discover the session and set up replication from ReplicationManager. EMC VNXe Data Protection – Overview 16
  • Managing replication sessionsAdministrators manage replication sessions for VNXe for different storage resourcesin Unisphere or Replication Manager.Administrators manage file-level replication entirely within the VNXe environment.VNXe supports the following types of storage resources for NAS replication: Shared folder - Shared folder replication produces a read-only, point-in-time copy of a source production file system at a destination and periodically updates this copy, making it consistent with the source file system. VMware NFS datastore - VMware replication supports NFS datastores. The replication session creates a point-in-time copy of VMware data and copies it to the destination. Only the data in the datastore is replicated to the destination, not the datastore itself.For block-level (or iSCSI) replication, administrators use Replication Manager tocreate, schedule, and manage replications.VNXe supports the following types of storage resources for iSCSI replication:  Microsoft Exchange  VMware VMFS datastore  Microsoft Hyper-V  Generic iSCSIAdministrators can use Replication Manager to replicate data from a storage resource to thelocal system or a remote system. During replication, Replication Manager creates a snapshot ofthe storage resource.Synchronization FrequencyIn a VNXe system, for file replication, administrators can control the frequency atwhich the source and destination systems are synchronized. The value can be setbetween 5 and 1,440 minutes (24 hours). The default value is 60 minutes, or 1 houras shown in Figure 10. Settings greater than 6 hours will result in a warning to theuser that they should increase their Protection Reserve storage amount to a sizeequal to 10 percent of the application’s size. The default 5 percent reserved fromprotection storage (given no protection schedule was chosen) will otherwise besufficient for settings of 6 hours or less. EMC VNXe Data Protection – Overview 17
  • Figure 10 Recovery point objective (RPO) for a replication sessionAdministrators can automate the synchronization of replication sessions by usingthe scheduling mechanism in Replication Manager. Replication sessions are set up asa “manual refresh”. To meet an organization’s targeted RPO, an administrator needsto schedule or manually run a job.Failover and failback operationsOnce a replication connection has been established between the source anddestination system, the following operations can be executed on the replicated datasets:• Failover – In a failover scenario, the production site becomes unavailable and inaccessible, typically as the result of a disaster or unexpected outage. In response, the user can execute a failover from the destination system. The execution of a replication failover is not an automatic occurrence—it requires manual execution. A failover operation is asynchronous and will result in data loss if the data has not been synchronized between the source and destination prior to executing the failover. The "Sync Now" function can be used, if possible, to synchronize the production with the destination prior to executing failover to avoid losing data. During the failover process, read/write access is provided to the destination application. When the production application becomes reachable, only read operations are allowed. After the production site has been restored to service, the original replication session can be restarted by executing a failback on the production application.• Switchover – The switchover feature is typically used for disaster scenario testing or data migrations. The switchover differs from the failover in that it synchronizes the production application with the destination using the differential snapshot from the source. Switchover stops the replication session and does not restart the replication session. This option should be used if the source site is available but administrators want to activate the destination as read/write. This command should be executed from the source system only. This command pauses replication, mounts the source object as read-only, and mounts the destination object as read/write so that it can act as the new source object. EMC VNXe Data Protection – Overview 18
  • • Failback – Following a switchover or failover, the user can execute a failback to restore the source as the read/write production application and to resume the replication session. Failback can only be initiated from the production side. The failback is performed from the Replication tab on the production application. Failback resumes the replication session without losing the data written to the destination while in a failed over or switched over state. It does this by synchronizing the applications as part of the failover process. A local replication is initiated by clicking System > System Replication in the menu taskbar, selecting a replication session and by clicking the Failover button at the bottom of the screen.If you initiate the local replication on the source VNXe system, the Failover dialog boxshown in Figure 11 appears. You can select Sync Before Failover to start a switchover,or select the Failover Without Sync option to start a failover. However, if you initiatethe local replication on the destination VNXe system, the Failover dialog box onlyallows you to initiate a failover operation; it does not allow you to initiate aswitchover. Figure 11 Remote failover dialog box when initiated on the source systemA remote replication is initiated by clicking System > System Replication in the menutaskbar, selecting a replication session, and by clicking the Failover button at thebottom of the screen. If an administrator initiates a remote replication on the sourceVNXe system, the Failover dialog box allows them to initiate a switchover operation. Ifthe administrator initiates a remote replication on the destination VNXe system, theFailover dialog box allows them to initiate a failover operation. EMC VNXe Data Protection – Overview 19
  • For block-level replication, an administrator manually performs failover and failbackoperations using the Failover option in Replication Manager. Figure 12 displays afailover of a replication session from VNX to VNXe. Figure 12 Failing over a replication sessionOnce the failover is complete, replication can be started manually, or you can waituntil the next scheduled replication job runs.The steps for the failback of a replication session are similar to the steps for thefailover.For additional information about how to configure and use Replication Manager, referto Replicating VNXe iSCSI to VNX using Replication Manager 5.3.2 – Technical Noteson EMC Online Support (https://support.emc.com) > VNXe Product Page.Backup and recoveryThe inability to recover company data after a critical failure can put an entire companyat risk, with catastrophic consequences for employees, shareholders, and customersalike. In a typical data center, backups need to be performed on multiple applicationservers and successful backups are critical to the recoverability of data and systemsenabling the business to run.NDMP backup functionality in VNXe systems helps simplify backup and restoreoperations in a customer environment. VNXe systems support NDMP v2-v4 over thenetwork; two-way NDMP backup configuration (commonly referred to as direct-attachbackup) is not supported. Instead, administrators configure a three-wayheterogeneous backup where the tape drives are connected to a media server, alsoreferred to as a Data Management Application (DMA) server, and the VNXe system EMC VNXe Data Protection – Overview 20
  • communicates with this media server over the network (see Figure 13). The followingoutlines the workflow of this NDMP design: 1. On the VNXe, enable NDMP and set a password for the NDMP account. The NDMP account credentials on the backup solution server and VNXe system must match. 2. The backup administrator requests data to be backed up. 3. The request is sent to the storage processor. 4. From the storage processor’s configuration, the VNXe system forwards data for backup to a DMA server. 5. The data is fed through a non-production network between the storage processor and DMA server. From there, the data is sent from the DMA server to a tape device to get written onto tape. Figure 13 Three-way heterogeneous backup configurationWith this implementation, VNXe systems store the application data at a centrallocation, where the data can be backed up, and restored if required. Consequently,other storage systems can communicate with this DMA server and utilize itsresources.The following backup and recovery products are supported by VNXe systems toachieve the tasks above: • EMC NetWorker® • EMC NetWorker® FastStart • EMC Avamar 6.0 EMC VNXe Data Protection – Overview 21
  • • EMC DataDomain 5.03 • CommVault Simpana • Symantec Backup Exec • Symantec NetBackup with NDMP For additional information, refer to the EMC Simple Support Matrix for EMC VNXe Series on EMC Online Support (https://support.emc.com) > VNXe Product Page. Conclusion System and data availability is a top-most priority for customers. Outages are costly to businesses if not resolved immediately. This is particularly the case with small to medium size businesses. VNXe systems can ease these customers’ concerns and increase the availability of their storage. VNXe systems enable administrators to protect data against localized failures, outages, and disasters through snapshots, replication, and NDMP backups. With snapshots, end users can recover files or directories deleted from a previous point in time from their local desktops. Snapshots are easily maintained via protection schedules. Administrators can also create a manual snapshot when appropriate, making it much easier to fulfill restore requests. Data and application consistency via replication ensures that administrators will be able to recover and restart the application from the copy in the event of a service interruption. Replicating data remotely ensures disaster recovery protection for production applications. Further, these replicas can be repurposed for backup acceleration and restoration of data, or to simplify and automate data refreshes for testing and reporting. Implementing these measures in combination significantly decreases costs and alleviates staff resources. NDMP functionality offers you the flexibility to back up data using different combinations of compliant network-attached file servers, backup devices (such as tape drives), and NDMP-compliant management applications. In addition, it provides centralized control of company-wide data backup management.3 EMC DataDomain 5.0 is supported in a configuration where the DataDomain device is connected to the LAN and acts as anNDMP Tape Server. EMC VNXe Data Protection – Overview 22
  • ReferencesThe following can be found on EMC Online Support (https://support.emc.com) > VNXeProduct Page: EMC VNXe Storage Systems – A Detailed Review EMC Unisphere for VNXe: Next-Generation Storage Management – A Detailed Review EMC Simple Support Matrix for EMC VNXe Series Replicating VNXe iSCSI to VNX using Replication Manager 5.3.2 – Technical Notes EMC VNXe Data Protection – Overview 23