SlideShare a Scribd company logo
1 of 66
vRanger Technical Deck Library 5/24/2010
Image-level backups and the virtual environment Why is it important? 5/24/2010 2
What is an Image? A VMware Snapshot is a recording of all the changes that occurred since the VM was created Snapshots can be created on running VMs Changes/deltas tracked separately & merged later vRanger creates an Image based on snapshot technology combination of the snapshot & tracked changes Exact representation of the VM at time of backup 5/24/2010 3
What is a VM Image? A VM image contains: Hypervisor Configuration OS, App Data A VM image can be reconstituted on any system running the correct hypervisor base. Reconstitution enables point-in-time DR. 5/24/2010 4
What is Image-Based BR? Image-Based Backup & Recovery (BR): Creates images using HV snapshot technology Backs up and recovers images  Enables reconstitution of images into servers 5/24/2010 5
What is Image-Based BR: Backup Creating a snapshot is fast, but: Images can be large Diffs, compression and dedup are must haves File-based backups of VMs work, but: Backups may be slower (copy instead of snapshot) Reconstitution is not automatic Limited scalability (may require proxies) Limited compression of large VM files 5/24/2010 6
Are Image-Based Backups Safe? YES!!!Applications and Data are secure through entire process.   The snapshot process: Does not disrupt a running VM Keeps apps in the image consistent Can be integrated with VSS for added integrity 5/24/2010 7
What is Image-Based BR: Recovery Three things are recoverable from an image: Image (reconstituted server) File Object (e.g.: email) Files and objects can be recovered without image reconstitution. Recovered Object Stored Image Recovered File 5/24/2010 8
What is Image-Based BR: Recovery Image portability enables multiple “where” recovery options: Restore on-premise Restore to cloud Restore to dissimilar hardware Non-virtualized systems can be converted to images using P2V tools: Backup physical systems using image BR Recover a physical box into a VM 5/24/2010 9
Image-Based BR Scenarios Lab Automation: Maintaining test images Replication: Maintaining synchronized failover environments Data Security: Protect data and meet compliance requirements Disaster Recovery: Recreate production environments 5/24/2010 10
How it works vRanger Pro 4 5/24/2010 11
How vRanger Works Source Target vRanger 1 Installs and discovers the environment in minutes. 5/24/2010 12
How vRanger Works Source Target Direct To Target Backup Jobs vRanger 1 2 Installs and discovers the environment in minutes. SOURCES transmit images to TARGETS without proxying. We call this Direct To Target. 5/24/2010 13
How vRanger Works Source Target Direct To Target Backup Restore Jobs Restore vRanger 1 2 3 Installs and discovers the environment in minutes. SOURCES transmit images to TARGETS without proxying. We call this Direct To Target. SOURCES and vRanger restore directly from TARGETS. 5/24/2010 14
How vRanger Works Source Target Direct To Target Backup Restore Jobs Restore vRanger Direct to Target Benefits: ,[object Object]
 Shorter Windows: 	Parallel backups within and across sources
 Fewer Resources: 	Data is dedup’d before going on the wire
 Flexible: 		Intelligent mgmt of jobs on sources5/24/2010 15
How vRanger Works: Backup (1..3) vRanger uses a patented binary injection process to implement Direct-To-Target. 1 vRanger Source Target The latest vRanger libraries are injected into source’s runtime. The runtime manages connections to targets. Other Processes Repository Binary Runtime Inject Comm 2 vRanger VCenter Source SAN / NAS Req vRanger issues  snapshot requests to vCenter or ESX host. Snap or ESX Host Req 5/24/2010 16
How vRanger Works: Backup (2..3) 3 Source Target The vRanger source binary grabs the snapshot from storage.   Other Processes Binary Runtime Repository Grab SnapshotsDedup, CompressEncryptReconstitute Image Send 4 We perform intelligent middleman logic including dedup, compression, encryption, and target connection mgmt. Grab SAN / NAS Storage Snapshot Files.VMDK.VHD 5/24/2010 17
Shorten Backup Window: Parallel Backups vRanger provides: Simultaneous backups on each host Simultaneous backups across hosts Source 1 Target Binary Runtime Send Repository Connection  MgmtThreaded Access Send Source 2 Binary Runtime Send Connection  MgmtThreaded Access Send 5/24/2010 18
How vRanger Works: Backup (3..3) vRanger supports two types of modes: 5/24/2010 19
CBT and ABM vRanger Pro 4 5/24/2010 20
How CBT and ABM work together A typical disk layout Active Block White Space Changed Block Deleted Data
Without ABM or CBT ,[object Object]
 engine removes only the whitespace
applies to both 3.5 and 4.0 hosts1 Active Block White Space Changed Block Deleted Data
With ABM ,[object Object]
 Active Block Mapping (ABM) selects only active blocks.
 Blocks occupied by deleted data not backed-up.2 Active Block White Space Changed Block Deleted Data
At the next backup… 3 Typical disk layout for subsequent backup pass Active Block White Space Changed Block Deleted Data
CBT and Incremental/Differentials ,[object Object]
Without ABM both active and deleted changed blocks are backed up4 Active Block White Space Changed Block Deleted Data
ABM on Incremental/Differentials 5 ,[object Object]
 With ABM, only Active changed blocks are backed-upActive Block White Space Changed Block Deleted Data
Both on Incremental/Differentials ,[object Object]
(Only supported on ESX 4 hosts)
Blocks backed-up does not change, but
scan times are muchlower,
resulting in much faster backups6 Active Block White Space Changed Block Deleted Data
Change Block Tracking (CBT) a vStorage API feature Eliminates change-scanning during inc/diff’s Reduces data to be backed-up Shortens backup window
Why CBT? Large disks Removes scan time needed to ID changes Network based VMFS Scanning for change slower on network based VMFS:  CBT helps dramatically Example: A 94 minute backup of 2.8 GB could be dramatically reduced to only 3 minutes
CBT Support in vSphere Most VMs supported on ESX4 vSphere API has flag indicating VM support VMs must: Be Hardware Version 7 Be able to add Snapshots to the VMDK’s No independent disks or RDM LUNs Have a stun or unstun cycle to enable or disable No support on ESX3
Activating CBT CBT must be turned on, in vSphere Disabled by default Is enabled per VM, on an individual basis ,[object Object],PowerShell script exists to Bulk-enable CBT
Active Block Mapping (ABM) What is it? A tool that reads the Windows NTFS file system in a VMDK and identifies  blocks that are actually used by the OS vs.  blocks have been deleted to recycle bin Benefit Faster incremental/differential backups: Only blocks that are actually used are read.
ABM:  Details Activated in a backup job as an option. New jobs:  on by default (remains off on jobs migrated from earlier versions) While CBT is VM-specific, ABM is Job-specific Can be used in conjunction with CBT
ABM, CBT and Backup Mode If ABM and CBT are both enabled ABM is always used on fulls incremental or differential use both the AB and CB filter. If only ABM is enabled ABM works regardless of backup type
ABM – Restore Behavior Note that undeleted programs will not work on a restored VM that was backed up with ABM. Deleted files from recycle bin are not available after a VM is restored from a save-point.
ABM:  Support Windows XP - Windows 2008 R2 Windows NTFS only Basic disks only Supported only on ESX and LAN backups ABM not currently supported for vStorage API(vRanger: LAN-free and ESXi backups) Note:  master file table needs to be ‘clean’ ‘file table not supported’ error: run chckdsk
LAN-Free and ESXi backups vRanger Pro 4 5/24/2010 37
How It Works:  Network Backups 5/24/2010 38
ESX Network backups Direct to target To Backup Repository vCenter vRanger  Pro  Mmgt Connection vStorage API uses this connection for Network transport backups  ESX Host Nic 0 Compressed Service Console Storage Connections  (Ethernet or FC) 5/24/2010 39
How It Works:LAN-Free & ESXi Network Backups 5/24/2010 40
vStorage API for data protection ESXi Network backups To Backup Repository vCenter vRanger  Pro  Compressed Uncompressed Mmgt Connection vStorage API uses this connection for Network transport backups          ESXi Host Nic 0 Storage Connections  (Ethernet or FC) 5/24/2010 41
Requirements for LAN free backups vRanger Pro installed on a physical proxy server One proxy per set of VMFS luns VMFS luns zoned so vRanger Pro can see and read them VCB application is no longer used Works with ESX 3.0.2 - ESX 4 (vSphere) ESX 4 hosts require minimum “Essentials” license to use the vStorage API. 5/24/2010 42
vRanger Pro  LAN free jobs 5/24/2010 43 Compatible with 3.0.2 – 4.x ESX hosts Compatible with 3.5 – 4.x ESXi hosts
How vRanger Pro proxy should see disks 5/24/2010 44
Job Option for LAN free backups 5/24/2010 45
vRanger Pro Architecture for LAN free backups ESX Host ESX Host Fibre Channel Switch Lun 0 Lun 1 Lun 2 SAN Storage 5/24/2010 46
vRanger Pro Architecture for LAN free backups vRanger Server  ESX Host ESX Host Fibre Channel Switch Lun 0 Lun 1 Lun 2 SAN Storage 5/24/2010 47
vRanger  Pro Architecture for LAN free backups iSCSI Switch(s) vRanger Server  ESX Host ESX Host The storage is presented to both the ESX hosts and the vRanger Pro server. Lun 1 Lun 2 Lun 0 SAN Storage 5/24/2010 48
vRanger  Pro Architecture for LAN free backups Read Only Access FC / iSCSI Switch(s) ESX Host ESX Host vRanger  Server  The storage is presented to both the ESX hosts and the vRanger server. Lun 1 Lun 2 Lun 0 SAN Storage 5/24/2010 49
vRanger Pro Architecture for LAN free backups using a FC SAN Prod Network – to vCenter To Backup Repository Shared Storage (VMs) vRanger Pro (Proxy) Nic0 HBA2 HBA1 Lun 10 Lun 12 Lun 11 SAN Storage Lun 0 Lun 1 Lun 2 SAN Storage 5/24/2010 50
vRanger Pro Architecture for LAN free backups using an iSCSI SAN Shared Storage (VMs) Prod Network – to vCenter To Backup Repository vRanger Pro  (Proxy) Nic0 Nic1 Nic2 Lun 0 Lun 1 Lun 10 Lun 12 Lun 11 Lun 2 SAN Storage SAN Storage 5/24/2010 51
vRanger Pro Architecture for LAN free backups using an iSCSI SAN (2) Shared Storage (VMs) Prod Network – to vCenter To Backup Repository Device A          Nic0          Nic1 Nic2 Nic3 Nic5 Nic4 vRanger  Pro (Proxy) To Backup Repository Device B 5/24/2010 52
Data Flows with LAN freebackups Prod Network – to vCenter Nic 0 Shared Storage (VMs) Reads Reads Reads vRanger Pro (Proxy) To Backup Repository Lun 0 Lun 10 Lun 12 Lun 11 Lun 1 Lun 2 SAN Storage SAN Storage 5/24/2010 53

More Related Content

What's hot

Cvc2009 Moscow Xen App5 Fp1 Fabian Kienle Final
Cvc2009 Moscow Xen App5 Fp1 Fabian Kienle FinalCvc2009 Moscow Xen App5 Fp1 Fabian Kienle Final
Cvc2009 Moscow Xen App5 Fp1 Fabian Kienle FinalLiudmila Li
 
Exadata db node update
Exadata db node updateExadata db node update
Exadata db node updatepat2001
 
2017.06.19 Paul Woodward - ExploreVM VMware 101
2017.06.19   Paul Woodward - ExploreVM VMware 1012017.06.19   Paul Woodward - ExploreVM VMware 101
2017.06.19 Paul Woodward - ExploreVM VMware 101Paul Woodward Jr
 
GlassFish Update and Directions - Karim Mazouni - November 2007
GlassFish Update and Directions - Karim Mazouni - November 2007GlassFish Update and Directions - Karim Mazouni - November 2007
GlassFish Update and Directions - Karim Mazouni - November 2007JUG Lausanne
 
XPDS16: Xen Scalability Analysis - Weidong Han, Zhichao Huang & Wei Yang, Huawei
XPDS16: Xen Scalability Analysis - Weidong Han, Zhichao Huang & Wei Yang, HuaweiXPDS16: Xen Scalability Analysis - Weidong Han, Zhichao Huang & Wei Yang, Huawei
XPDS16: Xen Scalability Analysis - Weidong Han, Zhichao Huang & Wei Yang, HuaweiThe Linux Foundation
 
PV-Drivers for SeaBIOS using Upstream Qemu
PV-Drivers for SeaBIOS using Upstream QemuPV-Drivers for SeaBIOS using Upstream Qemu
PV-Drivers for SeaBIOS using Upstream QemuThe Linux Foundation
 
Veeamvpower
VeeamvpowerVeeamvpower
Veeamvpowertoreil
 
kexec / kdump implementation in Linux Kernel and Xen hypervisor
kexec / kdump implementation in Linux Kernel and Xen hypervisorkexec / kdump implementation in Linux Kernel and Xen hypervisor
kexec / kdump implementation in Linux Kernel and Xen hypervisorThe Linux Foundation
 
XPDS16: CPUID handling for guests - Andrew Cooper, Citrix
XPDS16:  CPUID handling for guests - Andrew Cooper, CitrixXPDS16:  CPUID handling for guests - Andrew Cooper, Citrix
XPDS16: CPUID handling for guests - Andrew Cooper, CitrixThe Linux Foundation
 
Comparação entre XenServer 6.2 e VMware VSphere 5.1 - Comparison of Citrix Xe...
Comparação entre XenServer 6.2 e VMware VSphere 5.1 - Comparison of Citrix Xe...Comparação entre XenServer 6.2 e VMware VSphere 5.1 - Comparison of Citrix Xe...
Comparação entre XenServer 6.2 e VMware VSphere 5.1 - Comparison of Citrix Xe...Lorscheider Santiago
 
Rootlinux17: An introduction to Xen Project Virtualisation
Rootlinux17:  An introduction to Xen Project VirtualisationRootlinux17:  An introduction to Xen Project Virtualisation
Rootlinux17: An introduction to Xen Project VirtualisationThe Linux Foundation
 
제4회 한국IBM과 함께하는 난공불락 오픈소스 인프라 세미나-Asible
제4회 한국IBM과 함께하는 난공불락 오픈소스 인프라 세미나-Asible제4회 한국IBM과 함께하는 난공불락 오픈소스 인프라 세미나-Asible
제4회 한국IBM과 함께하는 난공불락 오픈소스 인프라 세미나-AsibleTommy Lee
 
VMworld 2013: Virtualizing and Tuning Large Scale Java Platforms
VMworld 2013: Virtualizing and Tuning Large Scale Java Platforms VMworld 2013: Virtualizing and Tuning Large Scale Java Platforms
VMworld 2013: Virtualizing and Tuning Large Scale Java Platforms VMworld
 
V mware v center configuration manager - what_s new customer presentation
V mware v center configuration manager - what_s new customer presentationV mware v center configuration manager - what_s new customer presentation
V mware v center configuration manager - what_s new customer presentationsolarisyourep
 
Application Live Migration in LAN/WAN Environment
Application Live Migration in LAN/WAN EnvironmentApplication Live Migration in LAN/WAN Environment
Application Live Migration in LAN/WAN EnvironmentMahendra Kutare
 
XPDS16: Xen Orchestra: building a Cloud on top of Xen - Olivier Lambert & Jul...
XPDS16: Xen Orchestra: building a Cloud on top of Xen - Olivier Lambert & Jul...XPDS16: Xen Orchestra: building a Cloud on top of Xen - Olivier Lambert & Jul...
XPDS16: Xen Orchestra: building a Cloud on top of Xen - Olivier Lambert & Jul...The Linux Foundation
 

What's hot (19)

LFCOLLAB15: Xen 4.5 and Beyond
LFCOLLAB15: Xen 4.5 and BeyondLFCOLLAB15: Xen 4.5 and Beyond
LFCOLLAB15: Xen 4.5 and Beyond
 
Cvc2009 Moscow Xen App5 Fp1 Fabian Kienle Final
Cvc2009 Moscow Xen App5 Fp1 Fabian Kienle FinalCvc2009 Moscow Xen App5 Fp1 Fabian Kienle Final
Cvc2009 Moscow Xen App5 Fp1 Fabian Kienle Final
 
Exadata db node update
Exadata db node updateExadata db node update
Exadata db node update
 
2017.06.19 Paul Woodward - ExploreVM VMware 101
2017.06.19   Paul Woodward - ExploreVM VMware 1012017.06.19   Paul Woodward - ExploreVM VMware 101
2017.06.19 Paul Woodward - ExploreVM VMware 101
 
2 srs
2 srs2 srs
2 srs
 
Xen RAS Status and Progress
Xen RAS Status and ProgressXen RAS Status and Progress
Xen RAS Status and Progress
 
GlassFish Update and Directions - Karim Mazouni - November 2007
GlassFish Update and Directions - Karim Mazouni - November 2007GlassFish Update and Directions - Karim Mazouni - November 2007
GlassFish Update and Directions - Karim Mazouni - November 2007
 
XPDS16: Xen Scalability Analysis - Weidong Han, Zhichao Huang & Wei Yang, Huawei
XPDS16: Xen Scalability Analysis - Weidong Han, Zhichao Huang & Wei Yang, HuaweiXPDS16: Xen Scalability Analysis - Weidong Han, Zhichao Huang & Wei Yang, Huawei
XPDS16: Xen Scalability Analysis - Weidong Han, Zhichao Huang & Wei Yang, Huawei
 
PV-Drivers for SeaBIOS using Upstream Qemu
PV-Drivers for SeaBIOS using Upstream QemuPV-Drivers for SeaBIOS using Upstream Qemu
PV-Drivers for SeaBIOS using Upstream Qemu
 
Veeamvpower
VeeamvpowerVeeamvpower
Veeamvpower
 
kexec / kdump implementation in Linux Kernel and Xen hypervisor
kexec / kdump implementation in Linux Kernel and Xen hypervisorkexec / kdump implementation in Linux Kernel and Xen hypervisor
kexec / kdump implementation in Linux Kernel and Xen hypervisor
 
XPDS16: CPUID handling for guests - Andrew Cooper, Citrix
XPDS16:  CPUID handling for guests - Andrew Cooper, CitrixXPDS16:  CPUID handling for guests - Andrew Cooper, Citrix
XPDS16: CPUID handling for guests - Andrew Cooper, Citrix
 
Comparação entre XenServer 6.2 e VMware VSphere 5.1 - Comparison of Citrix Xe...
Comparação entre XenServer 6.2 e VMware VSphere 5.1 - Comparison of Citrix Xe...Comparação entre XenServer 6.2 e VMware VSphere 5.1 - Comparison of Citrix Xe...
Comparação entre XenServer 6.2 e VMware VSphere 5.1 - Comparison of Citrix Xe...
 
Rootlinux17: An introduction to Xen Project Virtualisation
Rootlinux17:  An introduction to Xen Project VirtualisationRootlinux17:  An introduction to Xen Project Virtualisation
Rootlinux17: An introduction to Xen Project Virtualisation
 
제4회 한국IBM과 함께하는 난공불락 오픈소스 인프라 세미나-Asible
제4회 한국IBM과 함께하는 난공불락 오픈소스 인프라 세미나-Asible제4회 한국IBM과 함께하는 난공불락 오픈소스 인프라 세미나-Asible
제4회 한국IBM과 함께하는 난공불락 오픈소스 인프라 세미나-Asible
 
VMworld 2013: Virtualizing and Tuning Large Scale Java Platforms
VMworld 2013: Virtualizing and Tuning Large Scale Java Platforms VMworld 2013: Virtualizing and Tuning Large Scale Java Platforms
VMworld 2013: Virtualizing and Tuning Large Scale Java Platforms
 
V mware v center configuration manager - what_s new customer presentation
V mware v center configuration manager - what_s new customer presentationV mware v center configuration manager - what_s new customer presentation
V mware v center configuration manager - what_s new customer presentation
 
Application Live Migration in LAN/WAN Environment
Application Live Migration in LAN/WAN EnvironmentApplication Live Migration in LAN/WAN Environment
Application Live Migration in LAN/WAN Environment
 
XPDS16: Xen Orchestra: building a Cloud on top of Xen - Olivier Lambert & Jul...
XPDS16: Xen Orchestra: building a Cloud on top of Xen - Olivier Lambert & Jul...XPDS16: Xen Orchestra: building a Cloud on top of Xen - Olivier Lambert & Jul...
XPDS16: Xen Orchestra: building a Cloud on top of Xen - Olivier Lambert & Jul...
 

Similar to Vizioncore vRanger 4.5 Technical Overview

Why virtual machine backups are different by David Davis
Why virtual machine backups are different by David DavisWhy virtual machine backups are different by David Davis
Why virtual machine backups are different by David DavisVeeam Software
 
PHDVirtual Backups for VMware
PHDVirtual Backups for VMwarePHDVirtual Backups for VMware
PHDVirtual Backups for VMwareDevansh Chowdhary
 
What's new in Veeam 7 - Was ist neu in Veeam 7
What's new in Veeam 7 - Was ist neu in Veeam 7What's new in Veeam 7 - Was ist neu in Veeam 7
What's new in Veeam 7 - Was ist neu in Veeam 7Osys AG
 
VMworld 2013: VMware vSphere Replication: Technical Walk-Through with Enginee...
VMworld 2013: VMware vSphere Replication: Technical Walk-Through with Enginee...VMworld 2013: VMware vSphere Replication: Technical Walk-Through with Enginee...
VMworld 2013: VMware vSphere Replication: Technical Walk-Through with Enginee...VMworld
 
VMworld 2013: Protection for All - VMware vSphere Replication & SRM Technical...
VMworld 2013: Protection for All - VMware vSphere Replication & SRM Technical...VMworld 2013: Protection for All - VMware vSphere Replication & SRM Technical...
VMworld 2013: Protection for All - VMware vSphere Replication & SRM Technical...VMworld
 
Vmware srm 6.1
Vmware srm 6.1Vmware srm 6.1
Vmware srm 6.1faz4eva_27
 
VMWARE Professionals - Availability and Resiliency
VMWARE Professionals -  Availability and ResiliencyVMWARE Professionals -  Availability and Resiliency
VMWARE Professionals - Availability and ResiliencyPaulo Freitas
 
Vizioncore Economical Disaster Recovery through Virtualization
Vizioncore Economical Disaster Recovery through VirtualizationVizioncore Economical Disaster Recovery through Virtualization
Vizioncore Economical Disaster Recovery through Virtualization1CloudRoad.com
 
StartUpOpen 2011 - Projekat13
StartUpOpen 2011 - Projekat13StartUpOpen 2011 - Projekat13
StartUpOpen 2011 - Projekat13BlogOpen
 
V Mwarev Storage Intregration
V Mwarev Storage IntregrationV Mwarev Storage Intregration
V Mwarev Storage Intregrationmikhail.mikheev
 
Veeam back up and replication presentation
Veeam back up and replication presentation Veeam back up and replication presentation
Veeam back up and replication presentation BlueChipICT
 
Nov 2014 2 blu pointe continuity cloudrar-master
Nov 2014 2 blu pointe continuity cloudrar-master Nov 2014 2 blu pointe continuity cloudrar-master
Nov 2014 2 blu pointe continuity cloudrar-master Ron_Roberts
 
VMworld 2015: Managing vSphere 6 Deployments and Upgrades
VMworld 2015: Managing vSphere 6 Deployments and Upgrades VMworld 2015: Managing vSphere 6 Deployments and Upgrades
VMworld 2015: Managing vSphere 6 Deployments and Upgrades VMworld
 
VMware vSphere 4.1 deep dive - part 1
VMware vSphere 4.1 deep dive - part 1VMware vSphere 4.1 deep dive - part 1
VMware vSphere 4.1 deep dive - part 1Louis Göhl
 
Luca dell'oca - italian vmug usercon 2017
Luca dell'oca - italian vmug usercon 2017 Luca dell'oca - italian vmug usercon 2017
Luca dell'oca - italian vmug usercon 2017 VMUG IT
 
Efficient Data Protection – Backup in VMware environments
Efficient Data Protection – Backup in VMware environmentsEfficient Data Protection – Backup in VMware environments
Efficient Data Protection – Backup in VMware environmentsKingfin Enterprises Limited
 
The Pensions Trust - VM Backup Experiences
The Pensions Trust - VM Backup ExperiencesThe Pensions Trust - VM Backup Experiences
The Pensions Trust - VM Backup Experiencesglbsolutions
 

Similar to Vizioncore vRanger 4.5 Technical Overview (20)

Why virtual machine backups are different by David Davis
Why virtual machine backups are different by David DavisWhy virtual machine backups are different by David Davis
Why virtual machine backups are different by David Davis
 
PHDVirtual Backups for VMware
PHDVirtual Backups for VMwarePHDVirtual Backups for VMware
PHDVirtual Backups for VMware
 
What's new in Veeam 7 - Was ist neu in Veeam 7
What's new in Veeam 7 - Was ist neu in Veeam 7What's new in Veeam 7 - Was ist neu in Veeam 7
What's new in Veeam 7 - Was ist neu in Veeam 7
 
VMworld 2013: VMware vSphere Replication: Technical Walk-Through with Enginee...
VMworld 2013: VMware vSphere Replication: Technical Walk-Through with Enginee...VMworld 2013: VMware vSphere Replication: Technical Walk-Through with Enginee...
VMworld 2013: VMware vSphere Replication: Technical Walk-Through with Enginee...
 
VMworld 2013: Protection for All - VMware vSphere Replication & SRM Technical...
VMworld 2013: Protection for All - VMware vSphere Replication & SRM Technical...VMworld 2013: Protection for All - VMware vSphere Replication & SRM Technical...
VMworld 2013: Protection for All - VMware vSphere Replication & SRM Technical...
 
Vmware srm 6.1
Vmware srm 6.1Vmware srm 6.1
Vmware srm 6.1
 
VMWARE Professionals - Availability and Resiliency
VMWARE Professionals -  Availability and ResiliencyVMWARE Professionals -  Availability and Resiliency
VMWARE Professionals - Availability and Resiliency
 
Vizioncore Economical Disaster Recovery through Virtualization
Vizioncore Economical Disaster Recovery through VirtualizationVizioncore Economical Disaster Recovery through Virtualization
Vizioncore Economical Disaster Recovery through Virtualization
 
StartUpOpen 2011 - Projekat13
StartUpOpen 2011 - Projekat13StartUpOpen 2011 - Projekat13
StartUpOpen 2011 - Projekat13
 
V Mwarev Storage Intregration
V Mwarev Storage IntregrationV Mwarev Storage Intregration
V Mwarev Storage Intregration
 
Veeam back up and replication presentation
Veeam back up and replication presentation Veeam back up and replication presentation
Veeam back up and replication presentation
 
Nov 2014 2 blu pointe continuity cloudrar-master
Nov 2014 2 blu pointe continuity cloudrar-master Nov 2014 2 blu pointe continuity cloudrar-master
Nov 2014 2 blu pointe continuity cloudrar-master
 
VMworld 2015: Managing vSphere 6 Deployments and Upgrades
VMworld 2015: Managing vSphere 6 Deployments and Upgrades VMworld 2015: Managing vSphere 6 Deployments and Upgrades
VMworld 2015: Managing vSphere 6 Deployments and Upgrades
 
VMware vSphere 4.1 deep dive - part 1
VMware vSphere 4.1 deep dive - part 1VMware vSphere 4.1 deep dive - part 1
VMware vSphere 4.1 deep dive - part 1
 
Nakivo overview
Nakivo overviewNakivo overview
Nakivo overview
 
VBR v8 Overview-handout
VBR v8 Overview-handoutVBR v8 Overview-handout
VBR v8 Overview-handout
 
Luca dell'oca - italian vmug usercon 2017
Luca dell'oca - italian vmug usercon 2017 Luca dell'oca - italian vmug usercon 2017
Luca dell'oca - italian vmug usercon 2017
 
Efficient Data Protection – Backup in VMware environments
Efficient Data Protection – Backup in VMware environmentsEfficient Data Protection – Backup in VMware environments
Efficient Data Protection – Backup in VMware environments
 
The Pensions Trust - VM Backup Experiences
The Pensions Trust - VM Backup ExperiencesThe Pensions Trust - VM Backup Experiences
The Pensions Trust - VM Backup Experiences
 
ClearCase Basics
ClearCase BasicsClearCase Basics
ClearCase Basics
 

Recently uploaded

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseWSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingWSO2
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...caitlingebhard1
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaWSO2
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 

Recently uploaded (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 

Vizioncore vRanger 4.5 Technical Overview

  • 1. vRanger Technical Deck Library 5/24/2010
  • 2. Image-level backups and the virtual environment Why is it important? 5/24/2010 2
  • 3. What is an Image? A VMware Snapshot is a recording of all the changes that occurred since the VM was created Snapshots can be created on running VMs Changes/deltas tracked separately & merged later vRanger creates an Image based on snapshot technology combination of the snapshot & tracked changes Exact representation of the VM at time of backup 5/24/2010 3
  • 4. What is a VM Image? A VM image contains: Hypervisor Configuration OS, App Data A VM image can be reconstituted on any system running the correct hypervisor base. Reconstitution enables point-in-time DR. 5/24/2010 4
  • 5. What is Image-Based BR? Image-Based Backup & Recovery (BR): Creates images using HV snapshot technology Backs up and recovers images Enables reconstitution of images into servers 5/24/2010 5
  • 6. What is Image-Based BR: Backup Creating a snapshot is fast, but: Images can be large Diffs, compression and dedup are must haves File-based backups of VMs work, but: Backups may be slower (copy instead of snapshot) Reconstitution is not automatic Limited scalability (may require proxies) Limited compression of large VM files 5/24/2010 6
  • 7. Are Image-Based Backups Safe? YES!!!Applications and Data are secure through entire process. The snapshot process: Does not disrupt a running VM Keeps apps in the image consistent Can be integrated with VSS for added integrity 5/24/2010 7
  • 8. What is Image-Based BR: Recovery Three things are recoverable from an image: Image (reconstituted server) File Object (e.g.: email) Files and objects can be recovered without image reconstitution. Recovered Object Stored Image Recovered File 5/24/2010 8
  • 9. What is Image-Based BR: Recovery Image portability enables multiple “where” recovery options: Restore on-premise Restore to cloud Restore to dissimilar hardware Non-virtualized systems can be converted to images using P2V tools: Backup physical systems using image BR Recover a physical box into a VM 5/24/2010 9
  • 10. Image-Based BR Scenarios Lab Automation: Maintaining test images Replication: Maintaining synchronized failover environments Data Security: Protect data and meet compliance requirements Disaster Recovery: Recreate production environments 5/24/2010 10
  • 11. How it works vRanger Pro 4 5/24/2010 11
  • 12. How vRanger Works Source Target vRanger 1 Installs and discovers the environment in minutes. 5/24/2010 12
  • 13. How vRanger Works Source Target Direct To Target Backup Jobs vRanger 1 2 Installs and discovers the environment in minutes. SOURCES transmit images to TARGETS without proxying. We call this Direct To Target. 5/24/2010 13
  • 14. How vRanger Works Source Target Direct To Target Backup Restore Jobs Restore vRanger 1 2 3 Installs and discovers the environment in minutes. SOURCES transmit images to TARGETS without proxying. We call this Direct To Target. SOURCES and vRanger restore directly from TARGETS. 5/24/2010 14
  • 15.
  • 16. Shorter Windows: Parallel backups within and across sources
  • 17. Fewer Resources: Data is dedup’d before going on the wire
  • 18. Flexible: Intelligent mgmt of jobs on sources5/24/2010 15
  • 19. How vRanger Works: Backup (1..3) vRanger uses a patented binary injection process to implement Direct-To-Target. 1 vRanger Source Target The latest vRanger libraries are injected into source’s runtime. The runtime manages connections to targets. Other Processes Repository Binary Runtime Inject Comm 2 vRanger VCenter Source SAN / NAS Req vRanger issues snapshot requests to vCenter or ESX host. Snap or ESX Host Req 5/24/2010 16
  • 20. How vRanger Works: Backup (2..3) 3 Source Target The vRanger source binary grabs the snapshot from storage. Other Processes Binary Runtime Repository Grab SnapshotsDedup, CompressEncryptReconstitute Image Send 4 We perform intelligent middleman logic including dedup, compression, encryption, and target connection mgmt. Grab SAN / NAS Storage Snapshot Files.VMDK.VHD 5/24/2010 17
  • 21. Shorten Backup Window: Parallel Backups vRanger provides: Simultaneous backups on each host Simultaneous backups across hosts Source 1 Target Binary Runtime Send Repository Connection MgmtThreaded Access Send Source 2 Binary Runtime Send Connection MgmtThreaded Access Send 5/24/2010 18
  • 22. How vRanger Works: Backup (3..3) vRanger supports two types of modes: 5/24/2010 19
  • 23. CBT and ABM vRanger Pro 4 5/24/2010 20
  • 24. How CBT and ABM work together A typical disk layout Active Block White Space Changed Block Deleted Data
  • 25.
  • 26. engine removes only the whitespace
  • 27. applies to both 3.5 and 4.0 hosts1 Active Block White Space Changed Block Deleted Data
  • 28.
  • 29. Active Block Mapping (ABM) selects only active blocks.
  • 30. Blocks occupied by deleted data not backed-up.2 Active Block White Space Changed Block Deleted Data
  • 31. At the next backup… 3 Typical disk layout for subsequent backup pass Active Block White Space Changed Block Deleted Data
  • 32.
  • 33. Without ABM both active and deleted changed blocks are backed up4 Active Block White Space Changed Block Deleted Data
  • 34.
  • 35. With ABM, only Active changed blocks are backed-upActive Block White Space Changed Block Deleted Data
  • 36.
  • 37. (Only supported on ESX 4 hosts)
  • 38. Blocks backed-up does not change, but
  • 39. scan times are muchlower,
  • 40. resulting in much faster backups6 Active Block White Space Changed Block Deleted Data
  • 41. Change Block Tracking (CBT) a vStorage API feature Eliminates change-scanning during inc/diff’s Reduces data to be backed-up Shortens backup window
  • 42. Why CBT? Large disks Removes scan time needed to ID changes Network based VMFS Scanning for change slower on network based VMFS: CBT helps dramatically Example: A 94 minute backup of 2.8 GB could be dramatically reduced to only 3 minutes
  • 43. CBT Support in vSphere Most VMs supported on ESX4 vSphere API has flag indicating VM support VMs must: Be Hardware Version 7 Be able to add Snapshots to the VMDK’s No independent disks or RDM LUNs Have a stun or unstun cycle to enable or disable No support on ESX3
  • 44.
  • 45. Active Block Mapping (ABM) What is it? A tool that reads the Windows NTFS file system in a VMDK and identifies blocks that are actually used by the OS vs. blocks have been deleted to recycle bin Benefit Faster incremental/differential backups: Only blocks that are actually used are read.
  • 46. ABM: Details Activated in a backup job as an option. New jobs: on by default (remains off on jobs migrated from earlier versions) While CBT is VM-specific, ABM is Job-specific Can be used in conjunction with CBT
  • 47. ABM, CBT and Backup Mode If ABM and CBT are both enabled ABM is always used on fulls incremental or differential use both the AB and CB filter. If only ABM is enabled ABM works regardless of backup type
  • 48. ABM – Restore Behavior Note that undeleted programs will not work on a restored VM that was backed up with ABM. Deleted files from recycle bin are not available after a VM is restored from a save-point.
  • 49. ABM: Support Windows XP - Windows 2008 R2 Windows NTFS only Basic disks only Supported only on ESX and LAN backups ABM not currently supported for vStorage API(vRanger: LAN-free and ESXi backups) Note: master file table needs to be ‘clean’ ‘file table not supported’ error: run chckdsk
  • 50. LAN-Free and ESXi backups vRanger Pro 4 5/24/2010 37
  • 51. How It Works: Network Backups 5/24/2010 38
  • 52. ESX Network backups Direct to target To Backup Repository vCenter vRanger Pro Mmgt Connection vStorage API uses this connection for Network transport backups ESX Host Nic 0 Compressed Service Console Storage Connections (Ethernet or FC) 5/24/2010 39
  • 53. How It Works:LAN-Free & ESXi Network Backups 5/24/2010 40
  • 54. vStorage API for data protection ESXi Network backups To Backup Repository vCenter vRanger Pro Compressed Uncompressed Mmgt Connection vStorage API uses this connection for Network transport backups ESXi Host Nic 0 Storage Connections (Ethernet or FC) 5/24/2010 41
  • 55. Requirements for LAN free backups vRanger Pro installed on a physical proxy server One proxy per set of VMFS luns VMFS luns zoned so vRanger Pro can see and read them VCB application is no longer used Works with ESX 3.0.2 - ESX 4 (vSphere) ESX 4 hosts require minimum “Essentials” license to use the vStorage API. 5/24/2010 42
  • 56. vRanger Pro LAN free jobs 5/24/2010 43 Compatible with 3.0.2 – 4.x ESX hosts Compatible with 3.5 – 4.x ESXi hosts
  • 57. How vRanger Pro proxy should see disks 5/24/2010 44
  • 58. Job Option for LAN free backups 5/24/2010 45
  • 59. vRanger Pro Architecture for LAN free backups ESX Host ESX Host Fibre Channel Switch Lun 0 Lun 1 Lun 2 SAN Storage 5/24/2010 46
  • 60. vRanger Pro Architecture for LAN free backups vRanger Server ESX Host ESX Host Fibre Channel Switch Lun 0 Lun 1 Lun 2 SAN Storage 5/24/2010 47
  • 61. vRanger Pro Architecture for LAN free backups iSCSI Switch(s) vRanger Server ESX Host ESX Host The storage is presented to both the ESX hosts and the vRanger Pro server. Lun 1 Lun 2 Lun 0 SAN Storage 5/24/2010 48
  • 62. vRanger Pro Architecture for LAN free backups Read Only Access FC / iSCSI Switch(s) ESX Host ESX Host vRanger Server The storage is presented to both the ESX hosts and the vRanger server. Lun 1 Lun 2 Lun 0 SAN Storage 5/24/2010 49
  • 63. vRanger Pro Architecture for LAN free backups using a FC SAN Prod Network – to vCenter To Backup Repository Shared Storage (VMs) vRanger Pro (Proxy) Nic0 HBA2 HBA1 Lun 10 Lun 12 Lun 11 SAN Storage Lun 0 Lun 1 Lun 2 SAN Storage 5/24/2010 50
  • 64. vRanger Pro Architecture for LAN free backups using an iSCSI SAN Shared Storage (VMs) Prod Network – to vCenter To Backup Repository vRanger Pro (Proxy) Nic0 Nic1 Nic2 Lun 0 Lun 1 Lun 10 Lun 12 Lun 11 Lun 2 SAN Storage SAN Storage 5/24/2010 51
  • 65. vRanger Pro Architecture for LAN free backups using an iSCSI SAN (2) Shared Storage (VMs) Prod Network – to vCenter To Backup Repository Device A Nic0 Nic1 Nic2 Nic3 Nic5 Nic4 vRanger Pro (Proxy) To Backup Repository Device B 5/24/2010 52
  • 66. Data Flows with LAN freebackups Prod Network – to vCenter Nic 0 Shared Storage (VMs) Reads Reads Reads vRanger Pro (Proxy) To Backup Repository Lun 0 Lun 10 Lun 12 Lun 11 Lun 1 Lun 2 SAN Storage SAN Storage 5/24/2010 53
  • 67. Data Flows with LAN free Backups Prod Network – to vCenter Nic 0 Shared Storage (VMs) Reads Reads Reads vRanger Pro (Proxy) To Backup Repository Lun 0 Lun 10 Lun 12 Lun 11 Lun 1 Lun 2 SAN Storage SAN Storage 5/24/2010 54
  • 68. Data Flows with LAN FREE Backups Prod Network – to vCenter Nic0 Shared Storage (VMs) Reads Reads Reads Writes Writes Writes vRanger Pro (Proxy) Read Connection Lun 0 Lun 10 Backup Repository Lun 12 Lun 11 Lun 1 Lun 2 Write Connection SAN Storage SAN Storage 5/24/2010 55
  • 69. Other topics Additional Information 5/24/2010 56
  • 70. Custom Backup Groups Goal: more flexibility for backup jobs Groups disparate VMs, hosts, folders Separate structure from Virtual Center Accessible in “My Inventory” view
  • 71. Thin Disk Support: Details vSphere-only feature ESX4 to ESX3 restoration isn’t supported GUI indicates if a disk is ‘Flat’ or ‘Thin’. Support for backup and restore Only blocks w/ data are restored
  • 72. Encrypted Repositories What it is All save point in the repository is encrypted. Password is specified as part of the repository configuration. All save point in the repository will have the same password. Benefit Save point cannot be restored by unauthorized entities (i.e. those without the password) AES 256 Encryption No “backdoors”
  • 73. Are Their Disks That Can’t Be Backed-Up? Independent, persistent disks Physical RDM Cannot create snapshots for these disks. They are automatically skipped and do not cause a job failure w/ the caveat that the VM has at least one, snap-shotable disk available to vR 5/24/2010 60
  • 74. Supported environments The Fine Print 5/24/2010 61
  • 76. screenshots vRanger Pro 4 5/24/2010 63
  • 78. Job Status Monitor 5/24/2010 65
  • 80. Instant File Level Restore 5/24/2010 67

Editor's Notes

  1. This section is intended to give a background in image-level backups, and how they’re especially relevant in the virtual environment. Some prospects will be unfamiliar with image-level, especially if they are using traditional, file-level backup applications.
  2. The process runs as such:A Virtual Machine snap shot freezes its “VMDK” on the VMFS storage to a point in time.All change are then written to an alternative VMDK called a delta for the life span of the VMware snap shot When vRanger creates a backup job it executes 1, backups up the VMDK, and sends the API commands to merge 2 back into the original VMDK again. 
  3. An image of a VM is very versatile – it contains ALL of the information necessary to reconstitute that VM anytime, anywhere. Very important is the hypervisor configuration – info on how the VM is configured to run within the virtual env.
  4. When we discuss “image-based BR” it is the concept of harnessing the snapshots available w/in a HV, saving them to remote repositories, and then being able to restore them back to fully-operational VMs. (at the original, or alternate locations w/in the virtual environment)“HV” = hypervisor
  5. Lot of data is required for image-level: differential/incremental backups, compression and block-level data dedup are required to make this work in a practical manner. Therefore compression and space-saving functions are necessary (as vR has or will have through the 4.x releases)File-based has inherent limitations – it works, but requires extra complexities in either the SW or the workflow to overcome.
  6. Addresses any fears over image-based transactions. Image-based BR is based on the HV’s snapshotting technology, which is specifically designed by the HV platform vendor for consistency and integrity
  7. Image-based backups offer very flexible and efficient recovery scenarios: a wide spectrum of recovery options are avail (image-file-object) and can be accomplished w/o full image reconstitution (vR feature)
  8. In addition to the flexibilities mentioned earlier, image-based BR in a virt. Environment also gives you additional benefits of:Restoring any-WHERE: the original VM/file location is no longer a pre-requisite to the restore process. Image-based BR allows organizations to skirt the restrictions of re-creating their environment exactly as it was, before the event. Dissimilar environments and hardware can be utilized now.In addition, physical systems can be restored quickly and easily into virt. Environments, with P2V tools (avail now in vR 3.x, coming to the 4.x platform in 2010)
  9. At the image-level:Whatever time it takes to copy and uncompress the informationis the restore timeDirect-to-Targetfaster than streamed media and multiple VM’s can be restored simultaneously from multiple targets with vRanger Pro in the event of a multi-VM failureThe ENTIRE VM, including those settings “outside of the VM” are restored
  10. This section details in graphic form how vRanger works
  11. vRanger is a Windows .NET application that can be installed either in a VM or physical machine, running a windows OS. During the wizard-based install, it automatically discovers the virtual environment – making it ready to backup the entire virtual environment
  12. During a backup job, vRanger executes on backup jobs created by the user. When a job launches, it copies data directly from the source VMs to the target repository. There are no proxies involved in the backup process: data travels directly from source to target, making for an extremely efficient transfer.
  13. During the recovery process, the opposite occurs: data from backed-up images in the target repository is transmitted directly to a recovery point. If anything less than an entire VM is required, the recovery tools grab images, files, or objects WITHOUT image reconstitution, and present them to vRanger for saving to alternate locations.
  14. The benefits of Direct to Target architecture are numerous and a direct value-add to the BR process. The process is faster, more efficient, and less complex to operate and maintain.
  15. This slide is a more detailed version of the backup process: When a backup job is initiated, vRanger libraries are injected as a binary runtime onto the source machines. The runtime then manages its connections to the target repositories.vR requests a that the virtual platform (ESX) create a snapshot of the contents of the VM. (either through vCenter or directly to the host, depending on the ESX version)
  16. 3) Once the snapshot has been saved into the source storage environment, the vRanger binary can read from the snapshot files4) finally, vRanger performs several space-saving and value-add functions (i.e.. Compression, encryption, deduplication) and saves a image of the snapshot (or a delta of changes, if an incremental or differential backup is performed)
  17. The entire backup process described in the previous slides can be repeated, simultaneously, across multiple backup streams. vRanger Pro 4 has a Smart Backup Manager that can harness the full processing power of your ESX environment to send multiple backup streams at once. This allows the backups to be completed faster, and preserves or improves upon backup windows.
  18. FC = FibreChannelTo elaborate on how vR works, there are 2 fundamental types of operating modes for vR:‘hypervisor console’ is the traditional method, that has been described in previous slides. The ESX console hosts vR, to drive backups across the environment. This method, has been proven over years of vR releases.LAN-free: for those customers wishing to offload backup traffic to an alternate, FC network. Leverages the newer, more efficient vStorage API, as opposed to the older VCB technology. vR must be installed on a windows physical host for this
  19. Since the 4.0 release ofvR, we have been able to skip whitespace on backups – across all ESX hosts
  20. Enabling ABM allows backup of only active blocks Blocks occupied by deleted data are not replicated
  21. At the next backup pass, vR will encounter multiple types of blocks on a virtual disk: active, but not changedActive and changedDeleted dataWhite space
  22. At this point, with only CBT enabled on a diff/incremental backup:Differential backup will only selected those blocks that have changedboth active and deleted changed blocks will be selected for backup.
  23. If on the other hand ABM is enabled, only changed active blocks are backed up. Obviously, less data is backed up, but performance can be improved dramatically by taking it to the next level…
  24. Thebackedup blocks are the same as previous slide – only changed blocks, However, scan times are much lower resulting in significant faster performance and shorter windows.
  25. This feature is part of the vStorage APIs for Data Protection (VADP) which allows 3rd party vendors to no longer scan for changes when performing incremental’s or differentials backups. This is a key feature for a shorting the backup window, which is a key story for 4.x.Reduces the amount of data that must be sent to repositoryShortens backup windows
  26. Large disksRemoves the Scan time needed to find changed in-between backups.(however, it Does not change the amount of time it takes to compress and send data to the target.)Network based VMFSSince CBT removes the need to scan VMDK’s this helps a large amount on network based VMFS. Scanning for change is slower on network based VMFS.As an example, for this vizioncore backup:Start Time: 2/11/2010 10:09:27 PMEnd Time: 2/11/2010 11:43:33 PMDuration: 94 minute(s)Archive Size: 2.82 GBThe New Duration could be down to 3 minutes
  27. VM’s hosted on ESX4, depending on the VM configuration, may support change tracking. The vSphere API has a flag that indicates whether or not a particular VM is change tracking capable.VM’s hosted on ESX3 do not support change tracking.
  28. Vsphere : CBT must be turned on first. Not on by default. Is enabled per VM. Bulk-enable script:http://vcommunity.vizioncore.com/administration/vecoshell/b/weblog/archive/2010/04/19/bulk-enabling-cbt-for-vms.aspx This site discusses: http://itknowledgeexchange.techtarget.com/virtualization-pro/what-is-changed-block-tracking-in-vsphere/Otherwise, a backup job just works w/ CBT, as long as it’s been enabled on the individ. VMIF CBT or ABM fail for any reason, job still completes: this will show up though only in the logs. (this is future feature request)Screenshot credit: http://www.punchingclouds.com/wp-content/uploads/2009/12/Screen-shot-2009-12-09-at-6.38.44-PM.png
  29. FDAF: https://sharepoint.vizioncore.com/sites/Architecture/Sportster/RNGR-00008-ActiveBlocks.docx
  30. On backup execution, if ABM is enabled, If CBT is enabled on the VM (status persisted in vRanger database) to be backed upIf no space saving technology is chosen for the job, ABM shall always be used on all full backups. If incremental or differential is selected, ABM shall only be used on the initial full backup; any incremental or differential thereafter shall use both the AB and CB filter.If CBT is not enabled on the VM to be backed up, ABM shall always be used regardless of the space saving technology choiceABM shall be applied only to Windows guest OSes when it is enabled
  31. Restore, VMDK is filled with Zero’s before restore started, only Active Data Blocks are restored to VMDK, not deleted blocks and we don’t spend time writing zero’s.Undeleted programs will not work on a restore VM that was backed up with ABM.
  32. With the release of vRanger Pro 4.2, two new features have been added to the product.The first is support for licensed ESXi hosts. vRanger Pro is now able to backup VM’s running on ESXi hosts. The requirements to use an ESXi host are it must be licensed (not the free version). Typically this will mean that the ESXi server is managed by vCenter, but as long as it is licensed, it does not need to be managed by vCenter. You will have to discover and add the ESXi hosts individually within vRanger if they are not managed by vCenter.The second feature is support for LAN free backup options. vRanger Pro can now utilize Fibre Channel or iSCSI networks allowing administrators to separate backup traffic and not put any additional load on your ESX hosts. For this release, the LAN free option does not include a direct to target option. From a vRanger Pro user or admin point of view, support for ESXi involves no changes to how you use vRanger. You license your ESXi hosts in vRanger Pro the same as you would an ESX host and you configure your jobs the same way.For the remainder of this course update, we will focus on the LAN free feature that is now available in vRanger Pro.
  33. This is a review: simply another way to diagramvR Direct To Target: backups across the network
  34. This slide illustrates how vRanger Pro performs backups on an ESX host for comparison purposes. During backup, the vRanger Pro backup agent is injected into the service console OS, reads the VM’s disk, discards the empty blocks, compresses the data and then sends the compressed data directly to the backup respository, bypassing the vRanger Pro server. The agent does not remain resident in memory after the backup completes.
  35. The current (intro. At 4.2) implementation of LAN-free, vR does act as a proxy for the backup traffic that comes from the repository, across the vR physical machine, and then finally to the target repository. That being said, the traffic goes across the FibreChannel network, off of the LAN, and has tested internally at fast rates of ~ 174 MB/sESXi backups work the same wayNetwork mode Backup - ESXi – All traffic from the ESXi host to the vRanger server will be uncompressed, compressed on the vRanger server then streamed to the repository – one step process.Network mode Restore – ESXi – The backup archive will be streamed from the repository in its compressed form to the vRanger server, while being streamed uncompression will occur from the vRanger server to the ESXi host.
  36. This diagram illustrates how vRanger Pro performs backups on ESXi hosts. vRanger Pro utilizes the vStorage API to perform these backups.The backup traffic travels over the management connection of the ESXi host using the network transport method (NBD) of the vStorage API.The traffic between the ESXi host and the vRanger Pro server will be uncompressed, and then the vRanger Pro server will compress the traffic and send it to the backup respository. To improve performance vRanger Pro server discards empty blocks (“0’s”), compresses it and sends it to the backup repository “on the fly”, the only time the data is written to disk is on the backup respository.
  37. You should read and understand all of the documentation published by Vizioncore for vRanger before implementing LAN FREE backups so as to avoid configuration errors. This slide highlights some important considerations for those organizations considering implementing LAN FREE backups with vRanger Pro 4.As in vRanger Pro 3 with VCB, you will need to install vRanger Pro on the physical proxy that is zoned and given access to the VMFS luns shared by your ESX hosts.Only one proxy should be used with a given set of VMFS luns.There is no need for the VCB application on the proxy server, the vStorage libraries are distributed with the vRanger Pro application. This means there is one less application to manage and maintain.The vStorage storage APIs are compatible with ESX 3.0.2 and later releases. In order to use the vStorage API for backups or replication, the ESX hosts require a minimum license level of “Essentials”. This is a VMware requirement.
  38. vRanger Pro 4.2 jobs that have the “Use fiber or iSCSI” option selected will use the vStorage API to access a VM’s disks to read the VM’s data to perform the backup. Using the vStorage API, the data will be uncompressed as it travels from the storage device to the vRanger Pro server.At the vRanger server it the empty blocks will be ignored, and the data will be compressed and then sent to the storage repository.
  39. This shows the physical proxy server where vRanger is installed and how it sees the storage when everything is connected and working.Disk 0 is the local disk where the OS and vRanger Pro application are installed.Disks 1-4 are the VMFS luns that are shared by the ESX hosts and the physical proxy server where vRanger Pro is installed.Disk 5 in this case, is the storage repository, in this case an iSCSI lun formatted with NTFS.Notice that for the VMFS luns that the partition is unknown. This is because it is formatted with VMFS and not NTFS. You should read and understand the documentation for proper configuration of the proxy server. (For example, disable auto mount so the Windows OS on the proxy server does not try to write a disk signature to the shared storage (VMFS) luns and corrupt the disks).
  40. To use the LAN free option, edit or create a new job and select the “Use Fiber or iSCSI” option in your backup job.Also notice the setting below it which is to perform a Network backup if the Fiber or iSCSI attempt fails. This is selected by default and should be de-selected if you do not want this option enabled.
  41. This diagram shows a typical environment where the ESX hosts are connected to a FC switch which connects to the FC storage device.For illustration purposes we only show one switch, when many environments use redundant switches to provide multipathing failover protection.To be able to implement LAN free backups with the same functionality as VCB, you will need to implement a physical proxy that uses the FC infrastructure and is zoned and given access to the shared storage where the VMs are stored. This part of the setup is the same as VCB and all the best practices from VCB days still apply.
  42. So here we see the physical proxy server added to the environment. This is where vRanger Pro will be installed. There is no need to install anything besides vRanger Pro, it contains all of the dll’s necessary to use the vStorage APIs. So this is a simpler implementation to install and configure as well as maintain.
  43. Similar to a Fibre Channel network, the iSCSI network architecture has the same basic requirements of allowing connectivity to the iSCSI SAN storage device and granting access to the LUNS where the VMs are stored. With an iSCSI network, implementations will require that the vRanger proxy server connections to be in the same vlan (where vlans are used) as the ESX connections to the shared storage.
  44. If your storage device provides the ability to provide very granular access, the vRanger Pro server only needs read only access to the shared storage where the VMs are stored. This is not a requirement, but a best practice when possible.
  45. This diagram illustrates an environment where the VMs are stored on a FC SAN and the storage repository for backups are also on a FC SAN.To improve performance, use one HBA to read the source VMs’ disks and a second HBA to write to the repository. This will allow you to scale the number of concurrent backups and reduce your overall backup window.
  46. This diagram illustrates an environment where the VMs are stored on a iSCSI SAN and the storage repository for backups is an iSCSI SAN. So we see an NIC connection where the physical vRanger proxy server reads the VMs’ data, and a second NIC where the compressed data is sent to the repository to store the archives. In a small environment, this could be a typical design.
  47. In a large production environment, organizations can utilize multiple connections to the shared storage. If you have additional NICs in your vRanger Pro proxy server to use for the connection(s) to the backup repository(s), this can also improve your backup performance and shorten your backup window. Having your different storage repository devices available on different subnets for your vRanger Pro server will simplify analyzing performance and identifying bottlenecks. Limiting the number of hops between your vRanger server to the storage repository, and ideally using a separate storage network infrastructure are also best practices for performance and security reasons.
  48. Now lets take a look on how the data flows when you use the LAN free option in vRanger Pro. First, the data will be read from the shared storage using vRanger Pro’s connection to the shared storage. As the data is read, the vRanger Pro compression engine will gather and compress the data stream to conserve space on the storage repository and also lower the amount of traffic on that connection. Consequently, there will always be more traffic occurring on the read connections as compared to the write connections.
  49. Here we see data that has been collected on the vRanger Pro server. > Now we will see the illustration as is shows the data being compressed, this all happens continuously throughout the backup process. <Next slide>
  50. >Here you should notice that the data blocks have changed color > to indicate that there are now in a compressed state and will travel over the write connection where they will be stored on your backup repository.So as you can see, if you add more read and write connections, you should be able to increase the speed of your individual backups, be able to run more jobs in parallel, and reduce your backup windows. At some point you may saturate some resource. It may be a nic or hba, or a group of disks, a port buffer or physical link, or the physical resources on your vRanger Proxy server.So measuring performance to get some baseline performance data as you begin to implement and then continuing to gather some performance data as you change configurations and increase the backup loads will help you determine if there are factors in your environment that are creating performance bottlenecks.
  51. This is a new window that appears in the vRanger “My Inventory” view. It allows a user to group disparate VMs, hosts, and folders together, for the purpose of creating backup jobs on those particular assets. This gives you more flexibility for setting up your backup jobs.Can include any VC object, DC, Clusters, VM’s, foldersObject can be static or dynamic.
  52. Restore, VMDK is filled with Zero’s before restore started, only Blocks with data are restored to VMDK, this way we won’t spend time writing zero’s and inflating a thin disk.In the event you (or support) performs a manual restore and end up with a flat disk you can clone a VM or migrate a VM from flat too thin to change its type.
  53. When creating a backup, The user provided encryption password shall meet the following complexity requirements:Contains at least six charactersContains characters from three of the following categoriesUppercase alphabet characters (A-Z)Uppercase alphabet characters (a-z)Arabic numerals(0-9)Non-alphanumeric characters (for example, !$#%)RestoreOn restore you will be asked for this passwordImporting a repositorySave point Manifest restoreManual restore
  54. Wizard-driven, GUI interface for creating backup jobs
  55. Intuitive, graphic interface for at-a-glance feedback on current jobs
  56. Summary screen of a restore job: -description,The savepoints used to restore any scheduling infoOptions used
  57. A simple, straight-forward interface for FLR: select the files from the savepoint on the leftChoose your destination on the rightStatus/progress is shown at bottom
  58. configuration options, gives users complete control over the process:Max num of tasks running at one timeMax num of tasks off a LUNMax num of tasks on a hostMax num of tasks per repositoryTimeout value (in hours) for a taskMin space needed on hostsThese settings that tweak the Smart Backup Manager, allow for a user to either increase or decrease vR’s activity, based on their specific environmental requirements