Protection Manager software provides rapid, application-aware backup and recovery of Microsoft Exchange Server 2003. It uses Microsoft's Volume Shadow Copy Service (VSS) to create consistent point-in-time snapshots of Exchange data instantly without interrupting users. Protection Manager maintains a repository of Exchange resources and relationships to simplify backup and recovery operations and reduce the risk of errors. Example functions include scheduling rotating disk-to-disk backups across multiple volumes, recovering to specific points in time, and integrating with tape backup systems for longer term retention.
METASUITE is a data integration software that extracts, transforms, and loads large amounts of data from various sources into targets like data warehouses. It provides a single solution for all data integration functions through an easy to use visual interface. The software utilizes a metadata-driven approach to manage changes and maintain data integration processes. It also offers powerful filtering, transformation and data quality control capabilities.
The document provides an overview of the windream ECM system and its various products and solutions:
1) The windream ECM system is available in two editions - the Standard Edition for smaller companies and the Business Edition for large companies. It allows for document management, retrieval, and administration of document properties.
2) The latest version, windream 6, features enhancements such as an intelligent search navigator, live chat functionality for document discussions, integration with Outlook, and multi-language support.
3) The windream Archive provides integrated archiving functionality and supports various hardware storage technologies to ensure data security and retrieval. It is fully integrated with the ECM system.
This document provides a blueprint for a fault tolerant NAS configuration using Symantec File Store with VMware and NEC hardware. It discusses the growth of unstructured data and need for scalable, reliable storage. The configuration outlined uses Symantec File Store software running on VMware virtual machines to manage file systems stored on NEC servers and storage arrays. NetBackup is used to backup the file systems to a separate backup site for disaster recovery purposes. The blueprint defines the typical hardware and software components, use cases, and operational procedures for this file storage system architecture.
WHITE PAPER▶ Protecting Microsoft SQL with Backup Exec 15Symantec
Symantec Backup Exec
Backup Exec™ 15 delivers powerful, flexible, and easy-to-use backup and recovery that is designed for your entire infrastructure regardless of platform: virtual, physical or cloud. With Backup Exec you can meet recovery time and recovery point objectives (RTO and RPO) by reducing the time it takes to back up and recover your data. In a matter of minutes, you can recover anything including VMs, applications, databases, files, folders and granular application objects. Protect one to thousands of virtual machines and servers all from the same user console for optimal performance and efficiency.
Wellmont Health System - EMC Customer ProfileDarren Ramsey
Multiple tiers of EMC storage, representing over 500 terabytes of capacity, reside within Wellmont Health System’s three data centers. This tiered storage approach enables the organization’s IT team to provision the right kind of storage to accommodate different application service-level needs for the highest efficiency possible—all while ensuring non-stop access to information by those entrusted with patient care. A pair of EMC® Connectrix® (Cisco MDS 9000 family) directors at both the Kingsport corporate data center (CORP) and the Bristol Regional Medical Center data center (BRMC), along with two EMC Connectrix switches at the Holston Valley Medical Center (HVMC) form a high-performance, highly reliable eight Gigabit ring of connectivity between the sites.
This document describes LinkedIn's Databus, a distributed change data capture system that reliably captures and propagates changes from primary data stores. It has four main components - a fetcher that extracts changes from data sources, a log store that caches changes, a snapshot store that maintains a moving snapshot, and a subscription client that pulls changes. Databus uses a pull-based model where consumers pull changes based on a monotonically increasing system change number. It supports capturing transaction boundaries, commit order, and consistent states to preserve consistency from the data source.
Microsoft India - File classification infrastructure whitepaperguest7d9171
FCI provides capabilities for classifying files based on location, content and manual tagging. Classification properties can be used to automate file management tasks like expiration and movement. FCI integrates with SharePoint and provides APIs for external applications. It allows organizations to gain insight into their data and reduce costs while mitigating risks through policy-based file management. Examples show how FCI can be used for automated file expiration, detecting sensitive data, and improving backup strategies.
This document discusses database administration and security. It defines the roles of data administrator and database administrator, and their respective responsibilities in managing corporate data and databases. The document outlines threats to database security, such as hacking and hardware failure, and countermeasures like authorization, backups, and RAID technology to improve reliability. Maintaining database security is important to prevent issues like data theft, fraud, and loss of integrity or availability.
METASUITE is a data integration software that extracts, transforms, and loads large amounts of data from various sources into targets like data warehouses. It provides a single solution for all data integration functions through an easy to use visual interface. The software utilizes a metadata-driven approach to manage changes and maintain data integration processes. It also offers powerful filtering, transformation and data quality control capabilities.
The document provides an overview of the windream ECM system and its various products and solutions:
1) The windream ECM system is available in two editions - the Standard Edition for smaller companies and the Business Edition for large companies. It allows for document management, retrieval, and administration of document properties.
2) The latest version, windream 6, features enhancements such as an intelligent search navigator, live chat functionality for document discussions, integration with Outlook, and multi-language support.
3) The windream Archive provides integrated archiving functionality and supports various hardware storage technologies to ensure data security and retrieval. It is fully integrated with the ECM system.
This document provides a blueprint for a fault tolerant NAS configuration using Symantec File Store with VMware and NEC hardware. It discusses the growth of unstructured data and need for scalable, reliable storage. The configuration outlined uses Symantec File Store software running on VMware virtual machines to manage file systems stored on NEC servers and storage arrays. NetBackup is used to backup the file systems to a separate backup site for disaster recovery purposes. The blueprint defines the typical hardware and software components, use cases, and operational procedures for this file storage system architecture.
WHITE PAPER▶ Protecting Microsoft SQL with Backup Exec 15Symantec
Symantec Backup Exec
Backup Exec™ 15 delivers powerful, flexible, and easy-to-use backup and recovery that is designed for your entire infrastructure regardless of platform: virtual, physical or cloud. With Backup Exec you can meet recovery time and recovery point objectives (RTO and RPO) by reducing the time it takes to back up and recover your data. In a matter of minutes, you can recover anything including VMs, applications, databases, files, folders and granular application objects. Protect one to thousands of virtual machines and servers all from the same user console for optimal performance and efficiency.
Wellmont Health System - EMC Customer ProfileDarren Ramsey
Multiple tiers of EMC storage, representing over 500 terabytes of capacity, reside within Wellmont Health System’s three data centers. This tiered storage approach enables the organization’s IT team to provision the right kind of storage to accommodate different application service-level needs for the highest efficiency possible—all while ensuring non-stop access to information by those entrusted with patient care. A pair of EMC® Connectrix® (Cisco MDS 9000 family) directors at both the Kingsport corporate data center (CORP) and the Bristol Regional Medical Center data center (BRMC), along with two EMC Connectrix switches at the Holston Valley Medical Center (HVMC) form a high-performance, highly reliable eight Gigabit ring of connectivity between the sites.
This document describes LinkedIn's Databus, a distributed change data capture system that reliably captures and propagates changes from primary data stores. It has four main components - a fetcher that extracts changes from data sources, a log store that caches changes, a snapshot store that maintains a moving snapshot, and a subscription client that pulls changes. Databus uses a pull-based model where consumers pull changes based on a monotonically increasing system change number. It supports capturing transaction boundaries, commit order, and consistent states to preserve consistency from the data source.
Microsoft India - File classification infrastructure whitepaperguest7d9171
FCI provides capabilities for classifying files based on location, content and manual tagging. Classification properties can be used to automate file management tasks like expiration and movement. FCI integrates with SharePoint and provides APIs for external applications. It allows organizations to gain insight into their data and reduce costs while mitigating risks through policy-based file management. Examples show how FCI can be used for automated file expiration, detecting sensitive data, and improving backup strategies.
This document discusses database administration and security. It defines the roles of data administrator and database administrator, and their respective responsibilities in managing corporate data and databases. The document outlines threats to database security, such as hacking and hardware failure, and countermeasures like authorization, backups, and RAID technology to improve reliability. Maintaining database security is important to prevent issues like data theft, fraud, and loss of integrity or availability.
The document contains several Bible verses discussing God's unchanging nature but also his ability to bring about change and new things. It encourages readers to present themselves as living sacrifices to God by transforming their minds and discerning God's will, which is good. The closing message tells readers not to check out but to change by changing their oil, gears, and direction.
Jesus tells a parable about two builders, one who builds his house on rock and one who builds on sand. When storms come, the house built on rock remains standing while the house built on sand collapses. The passage encourages Christians to hear Jesus' words and put them into practice for stability, rather than just hearing without doing. Building one's life on obedience to Christ's teachings through both hearing and doing results in wisdom.
This document summarizes a webcast about managing data replication with Hitachi solutions. It discusses how Hitachi's Business Continuity Manager (BCM) and Replication Monitor software provide centralized management and monitoring of replication across mainframe and open systems environments. BCM automates replication configuration and monitoring for Hitachi storage arrays. Replication Monitor provides a single interface to view replication status across all arrays. The document provides examples of how BCM and Replication Monitor simplify replication management compared to traditional point-to-point remote copy methods. It also announces upcoming webcast sessions on related topics.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive function. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms for those who already suffer from conditions like anxiety and depression.
The main components of a computer include the motherboard, CPU, power supply, memory, drives (hard drive, optical drives), expansion slots/cards, and fans. The motherboard is the central component that connects all other parts together. The CPU is located under a heatsink and fan on the motherboard. The power supply provides power to all components via power leads. Memory (RAM) is used to run programs and the operating system. Drives include storage drives in drive bays and ports in the front of the case. Expansion cards plug into slots on the motherboard. Fans cool components and circulate air.
Hitachi offers storage-based remote copy technologies and Hitachi Business Continuity Manager software to enable disaster recovery. The document introduces Hitachi's remote copy technologies, including TrueCopy synchronous and asynchronous replication and Universal Replicator. It also describes Hitachi Business Continuity Manager software, which provides improved management of remote copy configurations compared to traditional command line tools. The software allows grouping of copy pairs, simplified operations, and detection of errors to help customers easily construct and operate reliable disaster recovery systems.
El documento contiene 10 problemas de matemáticas resueltos por Edgar Oscar Quiñones Díaz. Los problemas incluyen cálculos sobre promedios de goles, porcentajes, descuentos y más. En el último problema, se determina que el precio inicial del electrodoméstico en la Tienda B era de 1350 soles para que el precio final fuera el mismo que en la Tienda A.
Este documento describe 8 sesiones de un proyecto de aprendizaje sobre la elaboración de revistas. Cada sesión explora un aspecto del proceso de producción y comercialización de revistas, y genera un producto como resultado. Los temas cubiertos incluyen el análisis del mercado, diseño técnico, planificación, costos, procesos de producción, control de calidad y promoción de ventas. El objetivo general es enseñar a los estudiantes todos los pasos requeridos para crear y distribuir una revista de manera exit
El documento presenta definiciones de rotación y traslación. Explica que una rotación implica girar una figura alrededor de un punto central manteniendo su forma y tamaño, mientras que una traslación implica deslizar una figura en línea recta también manteniendo su forma y tamaño. Luego presenta ejemplos de problemas resueltos relacionados con estas transformaciones geométricas.
El documento presenta 5 problemas matemáticos resueltos por Edgar Oscar Quiñones Díaz. El primer problema involucra calcular cuántas monedas de 5 soles recibió como vuelto después de comprar arroz por 7 soles con un billete de 50 soles y recibir 4 monedas de 2 soles. El segundo problema involucra calcular la edad de José basado en las edades relativas de él y sus hermanos David y Carmen. El tercer problema calcula cuánto dinero ahorrará María al comprar bolsas de 5 kilos en
Este documento contiene las preguntas 11-15 y sus respectivas soluciones de un examen de matemáticas de nivel 2. La pregunta 11 trata sobre determinar el número de ovejas que tiene Sonia si puede separarlas en grupos de 5 pero no de 2 o 3. La pregunta 12 calcula el diámetro aproximado de una pista circular para maratones. La pregunta 13 determina el monto total M que debe pagar Ramiro para ser miembro de un club por n meses con descuento. La pregunta 14 calcula la cantidad inicial de gasolina en un tanque
1) Air pollution is introduced by human activities and can harm humans, plants and animals. It includes particulate matter from fuel combustion and noxious gases from sources like industry that can form smog and acid rain.
2) Carbon dioxide and sulfur dioxide are significant air pollutants. Carbon dioxide is emitted from human activities while sulfur dioxide comes from burning fossil fuels. These gases can react in the atmosphere.
3) Air pollution negatively impacts human health by damaging lung tissue and increasing risks of cardiovascular issues. It also harms the environment long-term.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive function. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms for those who already suffer from conditions like anxiety and depression.
Lifenow is a nonprofit organization dedicated to improving lives. They provide resources and support to help people overcome challenges and achieve their goals. Their website contains information on their programs and services, which are focused on health, education, community building, and empowering individuals to reach their full potential.
The story is about a woman named Sarah who lost her husband and home in a fire. After the fire, Sarah was devastated and lost. However, over time she began to rebuild her life and found love, friendship and purpose again. Through hard work and perseverance, Sarah was able to find beauty even after experiencing terrible loss and tragedy.
Protecting Microsoft Exchange with the NEW Backup Exec 15Symantec
Email has become an indispensable way of communicating and transferring data in the modern electronic age. In the year 2010, it was estimated that almost 300 billion emails were sent each day, and around 90 trillion emails were sent every year. Considering the rate at which data continues to increase year-over-year, the number of emails sent today is likely significantly greater. Email is used for many forms of communication, including business critical communications for companies of all sizes.
Companies rely heavily upon email systems to conduct day-to-day business operations, and any significant period where access to email is lost is considered to be highly intolerable.
Microsoft Exchange
All email solutions used by modern businesses are based upon a server infrastructure hosting an email software system. Whether hosted locally on physical or virtualized servers, hosted by a partner, or hosted in the cloud, these email software systems support the incredible amount of email transmissions that happen every day, and can be implemented in many different sizes and configurations. Perhaps the most common and popular email system used in the industry today is Microsoft Exchange.
Because Microsoft Exchange plays such a critical role in the ability for organizations to conduct day-to-day business, it’s equally critical that companies employ protection solutions that enable them to quickly and easily recover their Exchange system should a data loss or disaster event occur.
Symantec Backup Exec
Backup Exec™ 15 delivers powerful, flexible, and easy-to-use backup and recovery that is designed for your entire infrastructure regardless of platform: virtual, physical or cloud. With Backup Exec you can meet recovery time and recovery point objectives (RTO and RPO) by reducing the time it takes to backup and recover your data. In a matter of minutes, you can recover anything including VMs, applications, databases, files, folders and granular application objects. Protect one to thousands of virtual machines and servers all from the same user console for optimal performance and efficiency.
Backup Exec 2014 Technical White Paper - Protecting Microsoft ExchangeSymantec
This highly technical, yet still quite understandable white paper is intended to assist technical personnel as they design and implement Backup Exec™ 2014 and the Agent for Microsoft Exchange and make related decisions. The business value of the Agent for Microsoft Exchange will also be discussed in this white paper.
This white paper includes the following topics:
Business Value
● Exchange Protection Methods and Technology
● Backup Exec and Exchange High Availability Configurations
● Exchange Recovery Methods and Technology
● Managing Backup Exec Rights and Permissions in Exchange Environments
● Example Backup Exec Configurations for Protecting Exchange Exchange Protection Notes and Best Practices
● Additional Resources
Email is Business Critical
Email has become an indispensable way of communicating and transferring data in the modern electronic age. In the year 2010, it was estimated that almost 300 billion emails were sent each day, and around 90 trillion emails were sent every year. Considering the rate at which data continues to increase year-over-year, the number of emails sent today is likely significantly greater. Email is used for many forms of communication, including business critical communications for companies of all sizes.
Companies rely heavily upon email systems to conduct day-to-day business operations, and any significant period where access to email is lost is considered to be highly intolerable.
Microsoft Exchange
All email solutions used by modern businesses are based upon a server infrastructure hosting an email software system. Whether hosted locally on physical or virtualized servers, hosted by a partner, or hosted in the cloud, these email software systems support the incredible amount of email transmissions that happen every day, and can be implemented in many different sizes and configurations. Perhaps the most common and popular email system used in the industry today is Microsoft Exchange.
Because Microsoft Exchange plays such a critical role in the ability for organizations to conduct day-to-day business, it’s equally critical that companies employ protection solutions that enable them to quickly and easily recover their Exchange system should a data loss or disaster event occur.
The document discusses a data protection solution from Tributary Systems and IBM that combines Tributary's Storage Director software with IBM servers and storage platforms. This solution provides virtualized backup storage that allows data from any system to be stored on any backend storage, improving flexibility, utilization and efficiency. It also simplifies management and enables policies to store different data types in optimal locations.
Why is Virtualization Creating Storage Sprawl? By Storage SwitzerlandINFINIDAT
Desktop and server virtualization have brought many benefits to the data center. These two initiatives have allowed IT to respond quickly to the needs of the organization while driving down IT costs, physical footprint requirements and energy demands. But there is one area of the data center that has actually increased in cost since virtualization started to make its way into production… storage. Because of virtualization, more data centers need "ash to meet the random I/O nature of the virtualized environment, which of course is more expensive, on a dollar per GB basis, than hard disk drives. The single biggest problem however is the signi!cant increase in the number of discrete storage systems that service the environment. This “storage sprawl” threatens the return on investment (ROI) of virtualization projects and makes storage more complex to manage.
Learn more at www.infinidat.com.
Micro Focus Data Protector is an enterprise backup and disaster recovery solution that protects data across physical, virtual, and cloud environments through a scalable architecture. It provides application-aware backup and recovery for workloads including Microsoft 365, virtual machines, databases, and file systems. Data Protector offers capabilities for backup storage integration, disaster recovery automation, cloud backup targets, and predictive analytics for monitoring backup environments.
The document contains several Bible verses discussing God's unchanging nature but also his ability to bring about change and new things. It encourages readers to present themselves as living sacrifices to God by transforming their minds and discerning God's will, which is good. The closing message tells readers not to check out but to change by changing their oil, gears, and direction.
Jesus tells a parable about two builders, one who builds his house on rock and one who builds on sand. When storms come, the house built on rock remains standing while the house built on sand collapses. The passage encourages Christians to hear Jesus' words and put them into practice for stability, rather than just hearing without doing. Building one's life on obedience to Christ's teachings through both hearing and doing results in wisdom.
This document summarizes a webcast about managing data replication with Hitachi solutions. It discusses how Hitachi's Business Continuity Manager (BCM) and Replication Monitor software provide centralized management and monitoring of replication across mainframe and open systems environments. BCM automates replication configuration and monitoring for Hitachi storage arrays. Replication Monitor provides a single interface to view replication status across all arrays. The document provides examples of how BCM and Replication Monitor simplify replication management compared to traditional point-to-point remote copy methods. It also announces upcoming webcast sessions on related topics.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive function. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms for those who already suffer from conditions like anxiety and depression.
The main components of a computer include the motherboard, CPU, power supply, memory, drives (hard drive, optical drives), expansion slots/cards, and fans. The motherboard is the central component that connects all other parts together. The CPU is located under a heatsink and fan on the motherboard. The power supply provides power to all components via power leads. Memory (RAM) is used to run programs and the operating system. Drives include storage drives in drive bays and ports in the front of the case. Expansion cards plug into slots on the motherboard. Fans cool components and circulate air.
Hitachi offers storage-based remote copy technologies and Hitachi Business Continuity Manager software to enable disaster recovery. The document introduces Hitachi's remote copy technologies, including TrueCopy synchronous and asynchronous replication and Universal Replicator. It also describes Hitachi Business Continuity Manager software, which provides improved management of remote copy configurations compared to traditional command line tools. The software allows grouping of copy pairs, simplified operations, and detection of errors to help customers easily construct and operate reliable disaster recovery systems.
El documento contiene 10 problemas de matemáticas resueltos por Edgar Oscar Quiñones Díaz. Los problemas incluyen cálculos sobre promedios de goles, porcentajes, descuentos y más. En el último problema, se determina que el precio inicial del electrodoméstico en la Tienda B era de 1350 soles para que el precio final fuera el mismo que en la Tienda A.
Este documento describe 8 sesiones de un proyecto de aprendizaje sobre la elaboración de revistas. Cada sesión explora un aspecto del proceso de producción y comercialización de revistas, y genera un producto como resultado. Los temas cubiertos incluyen el análisis del mercado, diseño técnico, planificación, costos, procesos de producción, control de calidad y promoción de ventas. El objetivo general es enseñar a los estudiantes todos los pasos requeridos para crear y distribuir una revista de manera exit
El documento presenta definiciones de rotación y traslación. Explica que una rotación implica girar una figura alrededor de un punto central manteniendo su forma y tamaño, mientras que una traslación implica deslizar una figura en línea recta también manteniendo su forma y tamaño. Luego presenta ejemplos de problemas resueltos relacionados con estas transformaciones geométricas.
El documento presenta 5 problemas matemáticos resueltos por Edgar Oscar Quiñones Díaz. El primer problema involucra calcular cuántas monedas de 5 soles recibió como vuelto después de comprar arroz por 7 soles con un billete de 50 soles y recibir 4 monedas de 2 soles. El segundo problema involucra calcular la edad de José basado en las edades relativas de él y sus hermanos David y Carmen. El tercer problema calcula cuánto dinero ahorrará María al comprar bolsas de 5 kilos en
Este documento contiene las preguntas 11-15 y sus respectivas soluciones de un examen de matemáticas de nivel 2. La pregunta 11 trata sobre determinar el número de ovejas que tiene Sonia si puede separarlas en grupos de 5 pero no de 2 o 3. La pregunta 12 calcula el diámetro aproximado de una pista circular para maratones. La pregunta 13 determina el monto total M que debe pagar Ramiro para ser miembro de un club por n meses con descuento. La pregunta 14 calcula la cantidad inicial de gasolina en un tanque
1) Air pollution is introduced by human activities and can harm humans, plants and animals. It includes particulate matter from fuel combustion and noxious gases from sources like industry that can form smog and acid rain.
2) Carbon dioxide and sulfur dioxide are significant air pollutants. Carbon dioxide is emitted from human activities while sulfur dioxide comes from burning fossil fuels. These gases can react in the atmosphere.
3) Air pollution negatively impacts human health by damaging lung tissue and increasing risks of cardiovascular issues. It also harms the environment long-term.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive function. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms for those who already suffer from conditions like anxiety and depression.
Lifenow is a nonprofit organization dedicated to improving lives. They provide resources and support to help people overcome challenges and achieve their goals. Their website contains information on their programs and services, which are focused on health, education, community building, and empowering individuals to reach their full potential.
The story is about a woman named Sarah who lost her husband and home in a fire. After the fire, Sarah was devastated and lost. However, over time she began to rebuild her life and found love, friendship and purpose again. Through hard work and perseverance, Sarah was able to find beauty even after experiencing terrible loss and tragedy.
Protecting Microsoft Exchange with the NEW Backup Exec 15Symantec
Email has become an indispensable way of communicating and transferring data in the modern electronic age. In the year 2010, it was estimated that almost 300 billion emails were sent each day, and around 90 trillion emails were sent every year. Considering the rate at which data continues to increase year-over-year, the number of emails sent today is likely significantly greater. Email is used for many forms of communication, including business critical communications for companies of all sizes.
Companies rely heavily upon email systems to conduct day-to-day business operations, and any significant period where access to email is lost is considered to be highly intolerable.
Microsoft Exchange
All email solutions used by modern businesses are based upon a server infrastructure hosting an email software system. Whether hosted locally on physical or virtualized servers, hosted by a partner, or hosted in the cloud, these email software systems support the incredible amount of email transmissions that happen every day, and can be implemented in many different sizes and configurations. Perhaps the most common and popular email system used in the industry today is Microsoft Exchange.
Because Microsoft Exchange plays such a critical role in the ability for organizations to conduct day-to-day business, it’s equally critical that companies employ protection solutions that enable them to quickly and easily recover their Exchange system should a data loss or disaster event occur.
Symantec Backup Exec
Backup Exec™ 15 delivers powerful, flexible, and easy-to-use backup and recovery that is designed for your entire infrastructure regardless of platform: virtual, physical or cloud. With Backup Exec you can meet recovery time and recovery point objectives (RTO and RPO) by reducing the time it takes to backup and recover your data. In a matter of minutes, you can recover anything including VMs, applications, databases, files, folders and granular application objects. Protect one to thousands of virtual machines and servers all from the same user console for optimal performance and efficiency.
Backup Exec 2014 Technical White Paper - Protecting Microsoft ExchangeSymantec
This highly technical, yet still quite understandable white paper is intended to assist technical personnel as they design and implement Backup Exec™ 2014 and the Agent for Microsoft Exchange and make related decisions. The business value of the Agent for Microsoft Exchange will also be discussed in this white paper.
This white paper includes the following topics:
Business Value
● Exchange Protection Methods and Technology
● Backup Exec and Exchange High Availability Configurations
● Exchange Recovery Methods and Technology
● Managing Backup Exec Rights and Permissions in Exchange Environments
● Example Backup Exec Configurations for Protecting Exchange Exchange Protection Notes and Best Practices
● Additional Resources
Email is Business Critical
Email has become an indispensable way of communicating and transferring data in the modern electronic age. In the year 2010, it was estimated that almost 300 billion emails were sent each day, and around 90 trillion emails were sent every year. Considering the rate at which data continues to increase year-over-year, the number of emails sent today is likely significantly greater. Email is used for many forms of communication, including business critical communications for companies of all sizes.
Companies rely heavily upon email systems to conduct day-to-day business operations, and any significant period where access to email is lost is considered to be highly intolerable.
Microsoft Exchange
All email solutions used by modern businesses are based upon a server infrastructure hosting an email software system. Whether hosted locally on physical or virtualized servers, hosted by a partner, or hosted in the cloud, these email software systems support the incredible amount of email transmissions that happen every day, and can be implemented in many different sizes and configurations. Perhaps the most common and popular email system used in the industry today is Microsoft Exchange.
Because Microsoft Exchange plays such a critical role in the ability for organizations to conduct day-to-day business, it’s equally critical that companies employ protection solutions that enable them to quickly and easily recover their Exchange system should a data loss or disaster event occur.
The document discusses a data protection solution from Tributary Systems and IBM that combines Tributary's Storage Director software with IBM servers and storage platforms. This solution provides virtualized backup storage that allows data from any system to be stored on any backend storage, improving flexibility, utilization and efficiency. It also simplifies management and enables policies to store different data types in optimal locations.
Why is Virtualization Creating Storage Sprawl? By Storage SwitzerlandINFINIDAT
Desktop and server virtualization have brought many benefits to the data center. These two initiatives have allowed IT to respond quickly to the needs of the organization while driving down IT costs, physical footprint requirements and energy demands. But there is one area of the data center that has actually increased in cost since virtualization started to make its way into production… storage. Because of virtualization, more data centers need "ash to meet the random I/O nature of the virtualized environment, which of course is more expensive, on a dollar per GB basis, than hard disk drives. The single biggest problem however is the signi!cant increase in the number of discrete storage systems that service the environment. This “storage sprawl” threatens the return on investment (ROI) of virtualization projects and makes storage more complex to manage.
Learn more at www.infinidat.com.
Micro Focus Data Protector is an enterprise backup and disaster recovery solution that protects data across physical, virtual, and cloud environments through a scalable architecture. It provides application-aware backup and recovery for workloads including Microsoft 365, virtual machines, databases, and file systems. Data Protector offers capabilities for backup storage integration, disaster recovery automation, cloud backup targets, and predictive analytics for monitoring backup environments.
WHITE PAPER▶ Protecting VMware Environments with Backup Exec 15Symantec
Backup Exec 15 provides powerful data protection for VMware environments through three key capabilities:
1. It integrates directly with VMware vSphere through the vStorage APIs, allowing for high-performance full, differential, and incremental backups of virtual machines without requiring agents inside the VMs or a proxy server.
2. From a single backup, it allows recovery of an entire virtual machine, individual files and folders within VMs, or applications and application objects through granular recovery technology.
3. It utilizes various storage optimization techniques including block-level deduplication, changed block tracking, and block-level optimization to reduce backup storage requirements and backup times for virtual machine data.
e²gen Message Management Overview
e²gen message management (MM) is a multibank, multicurrency solution that provides 24 x 7 payments processing capabilities. It provides an integrated user desktop for the management of all message types passing through your banking systems, such as SWIFT or preparatory internal standards of an organisation.
The user desktop features a queuing and viewing environment, automatic message routing, processing and printing amongst other functionality. Any messages that need to be manually created can be controlled as required.
Providing the foundation layer for the e²gen product range, MM integrates your Back Office System with third party applications and external messaging services, MM is a single integrated solution that;
• Simplifies your institutions IT architecture
• Initiates End of and Start of Day processing
• Provides Back up
•Provides Disaster Recovery and high availability
• Reduces operational overhead
This core module provides an exceptions processing environment, alerting users via email notification to any exceptions that need to be managed. SWIFT query and answer and internal query and answer management is a standard feature. Additionally, MM saves messages for the length of time required by your institution and can be purged from the on-line archive. Comprehensive search facilities allow users to locate and display any related messages in the system as well as being able to provide an intuitive and well commended auditing system.
e²gen Message Management communicates with industry standard message services such as SWIFT Alliance by the use of e²gen gateway processes. Proprietary messages services are configurable. e²gen business processing modules integrate with MM allowing the solution to be configured to meet specific business requirements, its integration adapters are also available for third part products, such as Reuters, OMGEO, local clearing etc
BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value S...dbpublications
This document summarizes a research paper about Big File Cloud (BFC), a high-performance distributed big-file cloud storage system based on a key-value store. BFC addresses challenges in designing an efficient storage engine for cloud systems requiring support for big files, lightweight metadata, low latency, parallel I/O, deduplication, distribution, and scalability. It proposes a lightweight metadata design with fixed-size metadata regardless of file size. It also details BFC's architecture, logical data layout using file chunks, metadata and data storage, distribution and replication, and uploading/deduplication algorithms. The results can be used to build scalable distributed data cloud storage supporting files up to terabytes in size.
Informatica provides the market's leading data integration platform. Tested on nearly 500,000 combinations of platforms and applications, the data integration platform inter operates with the broadest possible range of disparate standards, systems, and applications. This unbiased and universal view makes Informatica unique in today's market as a leader in the data integration platform. It also makes Informatica the ideal strategic platform for companies looking to solve data integration issues of any size.
Catalogic ECX: Snapshot and Replication Automation for Pure StorageCatalogic Software
Catalogic ECX in-place copy data management for Pure Storage simplifies and automates operation of your Pure Storage FlashArray infrastructure through comprehensive management of Pure Storage FlashRecover snapshots and replication. By providing an application- and VM-aware copy management software layer, ECX reduces copy sprawl, simplifies data protection and disaster recovery, and delivers value-adding use cases such as automated infrastructure deployment for Dev-Test or DevOps.
Data protection and recovery has become exceedingly complex and costly as IT environments have become larger and more distributed, virtualized, and more critical to the survival of the business. This presentation describes how IBM is addressing these challenges by simplifying and unifying data protection.
Edison IBM FlashSystem and Tributary White Paper FinalEd Ahl
This document discusses a new data protection solution combining IBM FlashSystem flash storage with Tributary Systems' Storage Director software. Storage Director virtualizes tape storage and applies data protection services. Using IBM FlashSystem as its cache improves Storage Director's performance dramatically by replacing mechanical disks with fast flash storage. Tests show the solution reduces batch processing times, allows multiple simultaneous access to data, and cuts effective flash storage costs through data compression. The combination delivers "tape at the speed of flash" for improved data protection and lower costs.
The document summarizes a test of the EMC XtremIO storage array's ability to scale mixed database workloads in a VMware vSphere environment. Key findings:
- The array supported 3 production databases (Oracle, SQL Server, DB2) using only 664GB of physical storage while delivering over 116,000 IOPS with sub-millisecond latency.
- As additional copies of the databases were added, physical storage usage increased only slightly, while addressable capacity grew significantly due to data reduction technologies. This resulted in over 5,600GB of storage savings with 9 VMs.
- IOPS demands increased linearly as VMs were added, and latency remained under 1ms, showing the
This document provides an overview and instructions for deploying Microsoft Exchange Server iDataAgents. It outlines various installation options depending on factors like the Exchange server version, whether installing on the Exchange server or another computer, and whether in a 32-bit or 64-bit environment. Tables provide the specific installation procedure to use based on these criteria. Following the correct procedure ensures installing the appropriate agents for the environment.
Breaking Boundaries: Overcoming Traditional Backup Limitations with Innovativ...MaryJWilliams2
Explore innovative approaches to data backup with our detailed PDF submission. Learn how modern solutions address the limitations of traditional backup methods, ensuring data resilience and efficiency. Gain insights into overcoming challenges and embracing new technologies for enhanced data protection. To Know more: https://stonefly.com/white-papers/overcoming-traditional-backup-limitations/
The document discusses key concepts related to cloud computing including cloud deployment and service models, cloud storage, using cloud as a parallel computing platform, and benefits of cloud infrastructure. It describes public, private, hybrid, and community cloud deployment models. It also explains different types of cloud storage including block, file, and object storage and advantages of cloud storage. Finally, it discusses using cloud resources for parallel computing and different parallel computing techniques and software solutions.
This whitepaper will help you understand how to realize measurable cost savings and superior ROI by using a comprehensive storage management solution. For more information on IBM Software Solutions, please visit: http://bit.ly/16Tj2M0
The document provides an overview of Informatica PowerCenter components and functions. It discusses:
- The Informatica repository which stores all metadata created in the client tools.
- The main components of PowerCenter which are the Repository Manager, Designer, and Workflow Manager.
- How the Designer is used to connect to sources and targets, build mappings and transformations, and create sessions.
- How the Workflow Manager is used to create workflows containing tasks like sessions that are run by the Informatica Server to extract, transform and load data.
The document provides an introduction to Java Enterprise Edition (Java EE). It discusses key concepts such as distributed systems, middleware, the Java EE platform, and Java EE application servers. The Java EE platform consists of the Java SE APIs, Java EE APIs, and a Java EE application server. Applications are built using Java EE components like EJBs and servlets that run within a managed environment provided by the application server.
Similar to wp_209_hicommand_protection_manager (20)
2. Executive Summary
Organizations using Microsoft Exchange for e-mail services depend on Exchange
backup and recovery to recover mailbox stores quickly, with minimal data loss, in case
of unplanned downtime. Exchange’s traditional tape-based techniques suffer from
serious limitations, however. Hitachi HiCommand® Protection Manager software for
Microsoft Exchange alleviates this situation, offering rapid, simple backup and
recovery for Microsoft Exchange.
This paper discusses the advantages of using Protection Manager software, including
its integration of proven Hitachi replication technologies with application-aware
backup and recovery and its use of Microsoft’s Volume Shadow Copy Service (VSS) to
create consistent point-in-time images instantly, without interrupting end user access.
With Protection Manager software, administrators can back up Exchange data within
a storage system or across multiple storage systems.
In addition to covering these benefits, this paper provides a technical overview of
Protection Manager software, including an examination of the product’s functionality,
detailed descriptions of its integration with the Microsoft VSS service, and
performance examples of Exchange backup and recovery.
3. Contents
Overview ................................................................................................................................................1
Microsoft Exchange Data Storage Concepts ........................................................................................2
Transactional Consistency...................................................................................................................................................3
File Directories and LUNs.....................................................................................................................................................3
Performing Exchange Backups with Protection Manager Software..................................................5
Generation Name.....................................................................................................................................................................6
Backup Mode .............................................................................................................................................................................8
Source Storage Group...........................................................................................................................................................8
How Protection Manager Works with VSS...............................................................................................................10
Exchange Server Recovery ..................................................................................................................12
Other Recovery Modes.......................................................................................................................................................15
Backup and Recovery Performance....................................................................................................15
System Configuration.........................................................................................................................................................15
Exchange Database Configuration..............................................................................................................................17
Backup Performance ...........................................................................................................................18
Recovery Performance.......................................................................................................................................................18
Summary ..............................................................................................................................................19
Appendix A: References ......................................................................................................................20
4. 1
Hitachi HiCommand®
Protection
Manager Software for Microsoft
Exchange Server 2003
An Application Brief
By Koichiro Nakajima
Overview
E-mail is the primary communications channel for organizations of all sizes today. It is highly visible to
employees, customers, and partners, alike, and downtime can have an enormous impact on productivity.
Many organizations rely on Microsoft Exchange for e-mail services, so Exchange backup and recovery is
a mission-critical operation. If unplanned downtime occurs, Exchange administrators need to recover
mailbox stores quickly, with minimal data loss. Traditional, tape-based techniques no longer meet
service-level realities; with today’s shrinking backup windows, they cannot complete their task, and
recovery is only as fast as what the tape technology can support. As Exchange data stores continue to
grow, these limitations become more serious.
Hitachi HiCommand® Protection Manager software offers rapid, simple backup and recovery for
Microsoft Exchange. Protection Manager software integrates proven Hitachi replication technologies
with application-aware backup-and-recovery capabilities. It uses Microsoft-provided interfaces (Volume
Shadow Copy Service, or VSS) to create consistent images in seconds for rapid disk-to-disk backups
without interrupting end user access. The product encapsulates knowledge about Exchange and the
storage-based replication software, simplifying backup-and-recovery operations and reducing the
possibility of human error.
Using Protection Manager software, administrators can back up Exchange data within a storage system
or across multiple storage systems. Disk-based backups shrink backup windows to only seconds while
enabling rapid recovery. Protection Manager software can also be used as part of a three-tier, disk-to-
disk-to-tape backup strategy through integration with third-party backup-and-recovery software.
Protection Manager software supports a wide range of Hitachi storage systems, including the following:
: : Hitachi TagmaStore™ Universal Storage Platform
: : Hitachi TagmaStore Network Storage Controller
: : Hitachi TagmaStore Adaptable Modular Storage
: : Hitachi TagmaStore Workgroup Modular Storage
: : Hitachi Lightning 9900™ V Series enterprise storage
: : Hitachi Thunder 9500™ V Series modular storage
5. 2
In addition, Protection Manager software supports a range of proven replication technologies, including
Hitachi ShadowImage™ In-System Replication software, Hitachi Copy-on-Write Snapshot software,
Hitachi TrueCopy™ Remote Replication software, and Hitachi Universal Replicator software. Integration
of Protection Manager software with Microsoft Cluster Server enables highly available Exchange
operations during backup-and-recovery processes.
Protection Manager software shrinks backup windows and enables organizations to recover Exchange
data quickly, with minimal data loss. It also protects organizations from human error in backup or
recovery operations—reducing the risk of data loss or extended downtime.
This paper provides a technical overview of Hitachi HiCommand Protection Manager software
for Microsoft Exchange. It describes the product functionality, offering detailed descriptions of
the integration with the Microsoft VSS service and performance examples for Exchange backup
and recovery.
Microsoft Exchange Data Storage Concepts
This section summarizes key Microsoft Exchange data storage concepts to provide a context for the
following discussion of how Protection Manager software performs Exchange backup-and-recovery
operations. For more information on Exchange storage and backup-and-recovery capabilities, see the
references listed at the end of this paper.
The core data storage repository service for Microsoft Exchange Server 2003 is the Microsoft Exchange
Information Store service (store.exe), which hosts mailbox and public folders. Its primary responsibility is
maintaining Exchange databases and managing transactions to give other services and messaging
clients access to mailboxes and public folders. Exchange data is organized into logical components that
rely on several physical entities, which are shown in Tables 1 and 2.
Table 1. Exchange Data—Organized into Logical Components
Storage group A collection of mailbox stores and public folder stores that share a single set of
transaction logs. A storage group typically constitutes a single unit for backup-and-
recovery purposes. Exchange Server 2003 Enterprise Edition supports as many as four
storage groups on a single server.
Mailbox store (or
private store database)
Databases containing mailboxes and message queues, holding data private to
individuals. Exchange Server 2003 supports as many as five mailbox stores (or four, plus
one public folder store) for each storage group.
Public folder store A database storing public folders, with data public to all users with mailboxes and
appropriate permissions.
6. 3
Table 2. Exchange Physical Components—Relying on Several Physical Entities
Database files (.edb and
.stm files)
Each Exchange database resides in two files: an ESE database file (.edb extension) and a
streaming database file (.stm extension). For backup-and-recovery purposes, these pairs
must always be written or restored together.
Transaction log (.log
file)
A log of all changes to the database, grouped by “transactions” that must be committed
all together or not at all. The transaction log is essential for maintaining database
consistency and for recovering Exchange data from backups without data loss.
Checkpoint file (.chk
file)
A file that determines which transactions require processing to move them from the
transaction log files to the databases. It is updated when the Extensible Storage Engine
(ESE) writes a transaction to a database file on a disk. This update always points the
checkpoint file to the last transaction transferred successfully to the database and
provides a fast recovery mechanism.
Transactional Consistency
The Microsoft Exchange repository is a transactional database. When changes are written to the
database, they are first recorded in a transaction log and then, over time, written to disk. Things that
must occur together are grouped into a single transaction. Exchange does not allow just part of the
transaction to occur. If the entire transaction cannot be completed successfully or if a system failure
prevents the entire transaction from being committed, Exchange uses the transaction log to “roll back”
the change, so that that database is always in a consistent state.
When recovering Exchange data, you can restore the most recent backup image and then replay
transaction logs to bring the database to a current and consistent state. (This is referred to as a roll-
forward recovery.) However, playing transaction logs takes time—the more you have to play, the longer
the recovery. For this reason, it is helpful to maintain recent backup images.
File Directories and LUNs
For each storage group, Exchange Server creates a data directory containing the database and log files
for the databases within that group.
For performance and availability purposes, you will typically store the database files and log files on
separate LUNs. Log files experience sequential writes, whereas database files need high performance for
random access, so performance is best when they are separate.
You also want the log files and database files on separate LUNs for backup-and-recovery purposes,
because Protection Manager software operates on a LUN basis. There are several situations in which you
might want to recover one set of files without the other. For example:
: : A point-in-time recovery overwrites the log files with backed-up files, restoring the database to a
consistent image representing a point in the past.
: : A roll-forward recovery (to the time of failure) typically restores the database files without changing
the production log files. The recovery process applies the logs to the restored image to bring the
database up to the point of failure, without data loss.
For more information on best practices for Exchange storage design using Hitachi storage, see the
paper “Best Practices for Hitachi Storage Supporting Microsoft Exchange,” available on the Hitachi Data
Systems Web site (www.hds.com).
7. 4
HiCommand Protection Manager Software Provides an Application Optimized Storage™ Solution,
Protection for Microsoft Exchange
Exchange backup and recovery can be complex in any situation. When you add specialized storage
functions such as split mirrors, the complexity increases. Exchange or backup administrators typically
understand what needs to be protected but may not be proficient with the storage system functionality.
Storage administrators understand storage system configuration and functions but don’t necessarily
understand which files map to which Exchange components or which are required for a recovery.
This gap between storage and Exchange administration makes the ongoing management of backups
challenging and is hazardous during recovery operations, which are typically performed under pressure.
Without a good understanding of both the database structure and the storage, it’s possible to make
costly mistakes such as overwriting necessary transaction files or restoring from the wrong resource.
Mistakes can result in delayed recovery or loss of data.
Protection Manager software bridges this gap with an Application Optimized Storage™ solution
that couples advanced storage functionality with an understanding of the database components
and their backup status. Protection Manager software discovers Exchange resources and their
relationships, including:
: : Exchange instances
: : Storage groups within instances
: : Databases within storage groups
: : Physical files constituting databases
: : Mount points
: : Device objects
: : LDEVs
: : Copy pairs and pair names
Typically, Exchange administrators document and maintain these relationships by using scripts or
spreadsheets—manual processes with little visibility to others in the organization and a significant
potential for human error.
Protection Manager software maintains the resource map and the relationships in a repository called
the Dictionary Map file, as shown in Figure 1.
8. 5
Figure 1. Dictionary Map File
The Dictionary Map file maps resources and relationships.
Protection Manager software refers to this repository when performing backup-and-recovery operations.
By maintaining up-to-date information about database structure and backup status, Protection Manager
software reduces the potential for human error. This protection is particularly valuable during high-
pressure recovery operations, when the administrator who typically maintains the Exchange
environment may not be easily available.
Performing Exchange Backups with Protection
Manager Software
This section illustrates how Protection Manager software simplifies and automates Exchange backup by
stepping through a sample backup operation.
The Protection Manager console displays a list of the servers and applications it recognizes as backup
targets, as shown in Figure 2.
(Protection Manager software also supports backup and recovery operations for NTFS file systems and
Microsoft SQL Server databases.)
9. 6
Figure 2. Protection Manager Console
Use the Protection Manager console to select the file system or application to back up.
Once you select a resource and click the Backup button, Protection Manager software gives you the
opportunity to specify the backup objects and method, as shown in Figure 3.
The backup options include the generation (where the backup will be written), the backup mode, and
the backup sources.
Generation Name
The options for backup generation are:
: : Local. The backup image is saved on the same storage system.
: : Remote. The backup image is saved on a different storage system.
Whether you choose local or remote, you can select the backup generation name from the drop-down
list. Protection Manager software can rotate between multiple backup generations. Selecting default
from the list overwrites the oldest backup image; you can also select a specific secondary volume as a
backup destination.
10. 7
Figure 3. Protection Manager Software Graphical Interface
Use the Protection Manager software graphical interface to enter backup options.
Hitachi Data Systems recommends configuring three secondary volumes for backups and rotating them
in a round-robin fashion each day, as illustrated in Figure 4.
Figure 4. Rotating Three Secondary Volumes
Production
Volume
Secondary
Volume – 1
Secondary
Volume – 0
Secondary
Volume – 2
Hitachi Data Systems recommends rotating backup generations.
This approach ensures that you always have a backup image that is no more than 24 hours old. It also
speeds recovery by minimizing the number or size of transaction logs you need to replay on recovery.
11. 8
Backup Mode
Protection Manager software supports three backup modes, as shown in Table 3.
Table 3. Supported Backup Modes
Cold Taken while the Microsoft Exchange backup server is offline, a cold backup dismounts mailbox
stores and then backs up the production volume to a secondary volume. Users cannot access
the Exchange database during the backup. The total outage is relatively short for a disk-to-disk
backup operation. A cold backup ensures a consistent backup image. This is a good option for
Exchange Server 2000, which does not support VSS snapshots.
Online An online backup resynchronizes and splits mirrored volume pairs on the storage system,
without first freezing I/O. The backup finishes very rapidly without dismounting the mailbox
stores. However, the backup image can potentially contain incompletely written blocks (“torn
writes”), which creates consistency problems. Microsoft developed VSS support in response to
this problem; use online (non-VSS) backups with caution, and not at all if you can use VSS
backups.
Microsoft
Volume Shadow
Copy Service
(VSS)
This mode uses the VSS framework available with Exchange Server 2003 and Windows Server
2003 to create a consistent online backup image. Protection Manager software works with
Exchange to pause write I/Os from the database and purge the cache buffer before making the
backup image, ensuring a consistent image without torn writes. Exchange remains online for
end user access.
You can also choose to delete (truncate) the transaction log for a full backup or to leave the transaction
log intact (a copy backup).
Source Storage Group
Protection Manager software lets you select an entire Exchange server or an individual storage group.
The example shown in this paper performs a local VSS backup of a single storage group, using the log
truncate option.
Protection Manager software prompts you to confirm the backup before it begins, as shown in Figure 5.
12. 9
Figure 5. Protection Manager Confirmation Screen
The backup confirmation screen of Protection Manager software prompts you to confirm the backup before it begins.
Click OK to begin the backup. Protection Manager software displays the backup progress screen, as
shown in Figure 6.
Figure 6. Protection Manager Backup Progress Screen
Once you have chosen to begin the backup, view the backup progress screen to monitor developments.
13. 10
Backup Workflow
In the overall backup process, Protection Manager software:
1. Refers to the Dictionary Map file to identify the backup targets and secondary volumes
2. Starts a resynchronization of primary and secondary volumes (so they will be identical before the
snapshot is taken)
3. Initializes the VSS session (described in the next section)
4. Collects the XML file defining the backup from the VSS session
5. Mounts the secondary volume and imports the snapshot and the XML file to the VSS import server
6. Invokes the Microsoft ESEUTIL utility to verify the database and transaction log files in the
secondary volume
7. Truncates production transaction logs if the backup was successful and if the delete transaction log
option was selected
8. Generates the backup catalog information and completes the entire backup process
Using VSS backups with Protection Manager software has no impact on cluster resources where the
production server resides.
How Protection Manager Works with VSS
Microsoft VSS is the framework for creating consistent point-in-time copies of data (known as shadow
copies or snapshots) on Microsoft Windows Server 2003.
Before the introduction of the VSS technology, there was no way to be certain of producing a clean
(uncorrupted and consistent) snapshot of a volume supporting an online Exchange instance. Online
snapshots taken without VSS can contain “torn writes,” in which the system has not completely written
a block of data to disk at the time of the snapshot.
VSS creates consistent snapshots by coordinating across applications, backup applications, and storage.
Using VSS, an application flushes all partially committed data from memory and freezes write I/Os
during the moment of the backup—creating consistent, high-fidelity backup images as of that point in
time.
The major components of the VSS framework are shown in Table 4.
Table 4. Major VSS Framework Components
VSS coordinator This is the service in Windows Server 2003 that coordinates all snapshot components.
VSS requestor This application requests and initializes the creation of the volume shadow copy. Protection
Manager software is the VSS requestor.
VSS writer This application component stores persistent information on volumes participating in
shadow copy creation. Exchange Server 2003 is the VSS writer in this case.
Hardware provider This component creates and maintains the shadow copies. The Hitachi Command Control
Interface (CCI) software for the RAID Manager includes a RAID Manager shadow copy
provider module that serves this function, integrating VSS with the storage system–based
replication functions.
14. 11
The overall VSS process is as follows:
1. Protection Manager software (the requestor) notifies the VSS coordinator of the pending snapshot;
the coordinator determines the appropriate writers, gathers the metadata for the writers, and
prepares for the shadow copy creation.
2. The VSS coordinator notifies Exchange Server to prepare for the shadow copy creation.
3. Exchange Server prepares the data by completing open transactions and/or flushing caches. It
creates an XML description of the backup components and defines the recovery method. When the
data is prepared, it notifies the VSS coordinator.
4. The coordinator contacts Protection Manager software, which initiates the “commit” shadow copy
phase through the coordinator.
5. The VSS coordinator tells Exchange to quiesce the data and temporarily freeze all write I/Os for the
several seconds required to create the shadow copy of the volumes. (Read I/O is still possible.) The
VSS coordinator flushes the file system buffer and freezes the file system, ensuring that the file
system metadata is consistent.
6. The VSS coordinator service tells the provider (the Hitachi RAID Manager shadow copy provider) to
create the shadow copy; the provider splits the production volume and secondary volume (the
shadow copy). This step occurs in less than 10 seconds.
7. Once the shadow copy is created, the VSS coordinator service thaws the file system. It releases
Exchange from the temporary write I/O freeze; all queued writes are completed.
8. The coordinator queries Exchange to confirm that write I/Os were successfully held during the
shadow copy creation. If they were not, the copy could be inconsistent. If that is the case, the
shadow copy is deleted and the requestor is notified. Protection Manager software will either retry
the process or notify the user, depending on a configurable retry setting. If it was successful, the
process continues as described below.
9. The VSS coordinator creates an XML document file describing the snapshot set for exporting the
transportable shadow copy.
10. On the VSS import server, the RAID Manager shadow copy provider unmasks the disk designated
by the VSS coordinator to the LUN. (All the following steps take place on the VSS import server.)
11. The VSS coordinator discovers the new LUN and gives the location information of the shadow copy
back to the requestor (Protection Manager software).
12. Protection Manager software mounts the shadow copy volume to the VSS maintenance server,
invokes ESEUTIL, and verifies the backup image.
13. If ESEUTIL returns successfully, Protection Manager software completes the backup process and
brings the shadow copy volume back to its normal secondary-volume state. Also, it performs log
truncation at this stage if that is specified in the backup configuration. If ESEUTIL returns an error
code, Protection Manager software retries the entire backup from the beginning. By default, it
retries three times.
15. 12
Exchange Server Recovery
Protection Manager software can recover Exchange Server data at the storage group level and the
database level, offering two recovery modes:
: : Point-in-time mode. This restores the database to the point of the last backup (by restoring
transaction logs and not rolling forward)
: : Roll-forward mode. This restores the database to the point of failure (by replaying the production
transaction logs)
Again, the best way to illustrate the simplicity of recovery is to step through a sample recovery session.
Using the Protection Manager console, an administrator would select the Backup Catalog View to
initiate a recovery, as shown in Figure 7. This screen displays a list of backups.
Figure 7. Protection Manager Backup Catalog View
Select the Backup Catalog View to see a listing of available backups.
To see more detail about any specific backup, select the entry from the list and click Show Backup
Detail Information.
With the backup selected, clicking the Restore button displays the Restore dialog box, as shown in
Figure 8.
16. 13
Figure 8. Protection Manager Restore Dialog Box—Two Views
Enter restore options in the dialog box.
Enter restore options in the dialog box (database selection view).
Select the Source Storage Group, and choose whether to perform a roll-forward recovery. When you
select the Source Storage Group, the Restore screen shows databases within the storage group and you
can select only a certain database for recovery.
If you click OK, Protection Manager software displays a confirmation dialog box. Click OK again to begin
the recovery. Protection Manager software then displays a progress screen, as shown in Figure 9.
17. 14
Figure 9. Protection Manager Restore Progress Dialog Box
When you click OK to begin recovery, the restore progress screen is displayed.
Note: Protection Manager software works with Microsoft Cluster Server (MSCS) to keep all cluster
resources online during recovery, even the physical disk resources containing the storage group being
restored, yet it prevents the Exchange virtual server from failing over to another node supporting
Extended Maintenance Mode. Because of this integration, users can continue to access Exchange Server
and use e-mail for the other storage groups not being restored.
Until recently, you had to bring physical disk resource offline after restore; otherwise, MSCS would
initiate a failover. Now, with HDS assistance, Microsoft has introduced a new Extended Maintenance
Mode which allows change SCSI reserve interval. This allows us to take a disk offline without MSCS
noticing. Therefore, failover doesn’t occur.
18. 15
Figure 10. Protection Manager Cluster Administrator Screen
Cluster resources remain online during recovery.
Other Recovery Modes
Mailbox or e-mail recovery: Users sometimes mistakenly delete a mailbox or a single e-mail message.
Hitachi Data Systems recommends that you use Exchange Server’s native recovery capabilities to
address these problems. By default, Exchange retains deleted e-mails for up to seven days and
mailboxes up to 30 days. See the Exchange Server documentation for details on how to restore
e-mail messages and mailboxes.
Recovery storage group: Exchange Server 2003 offers a Recovery Storage Group feature. The Hitachi
Data Systems Global Solution Services organization provides a solution service for restoring a
Protection Manager software backup to a Recovery Storage Group, enabling single e-mail message
recovery with Exmerge.
Backup and Recovery Performance
Hitachi Data Systems ran performance tests to illustrate the performance characteristics of Exchange
backups using Protection Manager software. This section describes those results.
System Configuration
Protection Manager software supports most Hitachi storage systems using Hitachi storage system–
based replication, such as Hitachi ShadowImage In-System Replication software.
To enable high-availability Exchange environments, Protection Manager software supports MSCS and
Hitachi Dynamic Link Manager™ path manager software.
Hitachi Data Systems used the configuration shown in Table 5 to test Protection Manager backup-and-
recovery performance.
19. 16
Table 5. Backup-and-Recovery Performance Testing Configuration
Hitachi HiCommand®
Suite software
HiCommand Protection Manager software,
V4.1, for Microsoft Exchange
Storage system Hitachi TagmaStore™ Universal Storage Platform configured with:
: : LDEV Open V storage configuration
: : 400GB primary-volume LUN (8 x 50GB LUNs)
: : 1.2TB secondary-volume LUN (24 x 50GB LUNs)
Hitachi ShadowImage™ In-System Replication software
: : 3 generation backups configured
The Exchange servers were configured in a two-node mutual standby cluster, with the characteristics
outlined in Table 6.
Table 6. Exchange Server Testing Configuration
Hardware Dell PowerEdge 2650 with:
: : Intel Xeon 3.06GHz CPU
: : 3.75GB of RAM
: : Emulex L8000 host bus adapter
Installed software Microsoft Windows Server 2003 Enterprise Edition SP1
Microsoft Exchange Server 2003 Enterprise Edition SP1
Hitachi HiCommand® Protection Manager software, V4.1,
for Microsoft Exchange
Hitachi RAID Manager shadow copy provider
RAID Manager Command Control Interface (CCI)
A third server functioned as the import/export server and was not part of the cluster, as shown in Figure
11. The hardware components were the same as the cluster nodes. The software components for the
import/export server included Protection Manager software, RAID Manager CCI, and Hitachi RAID
Manager shadow copy provider.
20. 17
Figure 11. Server Configuration for Protection Manager Software Backup-and-Recovery
Performance Testing
Fibre Channel Switch
LAN
Exchange
Node 1
Hitachi TagmaStore™
Universal Storage Platform
Exchange
Node 2
VSS
Import Server
Domain
Controller
The VSS Import Server was not part of the cluster in the server configuration for testing.
Exchange Database Configuration
The test environment was configured with two Exchange Server 2003 virtual servers (EVSs) on two
nodes of a mutual standby cluster. Each EVS had two storage groups, with five databases in one and
four databases plus a public folder in the other storage group. The user load was simulated by Microsoft
LoadSim 2003 with the standard MMB3 profile, with simulated loads on the Exchange virtual server, as
shown in Table 7.
Table 7. Simulated Loads on Exchange Virtual Server
Number of users Microsoft Exchange data size
1,000 100GB
2,000 200GB database
3,200 330GB database
The backup tests split out the time spent running ESEUTIL for database verification, which is by far the
longest part of the backup operation. Performance was also compared with that of the native Microsoft
Windows NT backup utility.
21. 18
Backup Performance
The total elapsed backup times for the various tests are shown in Table 8.
Table 8. Backup Performance Test Results
Elapsed time, in minutes: seconds 1,000 users 2,000 users 3,200 users
Hitachi HiCommand® Protection
Manager software backup time
3:36 3:33 3:35
ESEUTIL verification time 29:31 44:43 70:51
Total elapsed time 33:27 48:16 74:26
You can see from Table 8 and Figure 12 that a large part of the backup time was the verification process
with ESEUTIL. The Protection Manager software backup time was quite consistent across the different
numbers of users and amount of data being backed up.
Figure 12. Backup Performance Test Time Results
0
500.00
1,000.00
1,500.00
2,000.00
2,500.00
3,000.00
3,500.00
4,000.00
4,500.00
1,000 Users 2,000 Users 3,200 Users
Hitachi HiCommand®
Protection Manager Backup Time
ESEUTIL Verification Time
A large part of backup time is attributable to the ESEUTIL verification process.
In contrast, NT backup for 3,200 users took 11 hours and 54 minutes, even backing up to the local disk
as its destination medium. Protection Manager software shrank the backup window by almost 10.5
hours, even accounting for the ESEUTIL elapsed time.
Recovery Performance
In many recovery situations you recover a single storage group at a time. Users of other storage groups
can remain connected during the recovery operation, but there are situations in which you need to
restore the entire Exchange store.
22. 19
For recovering a full, 3,200-user Exchange environment, Protection Manager software was significantly
faster than the NT Backup utility, as shown in Table 9.
Table 9: Recovery Performance Test Results
Hitachi HiCommand® Protection Manager
software roll-forward recovery
5 minutes, 40 seconds
Windows NT Backup recovery 209 minutes
The Protection Manager software recovery finishes in a fraction of the time of the NT Backup recovery.
These recoveries were performed from disk-based images. In a traditional, tape-based backup
environment, the recovery would be much longer, because the tape library must find and load the
appropriate tape, and reading data from tape is substantially slower than disk-based access.
Also, with a traditional backup infrastructure, combining a full backup image set with incremental or
differential backups, the recovery scenario without Protection Manager software is likely to be much
longer. One of the benefits of Protection Manager software is that it enables you to make frequent full
backups for faster recovery.
Summary
Hitachi HiCommand Protection Manager software takes Microsoft Exchange backup and recovery to a
new level of performance and accuracy.
: : Disk-to-disk backup capability offers very short backup windows and rapid recoveries. If only a
single storage group is affected by a problem, users with mailboxes on other storage groups can
continue business as usual during the recovery process.
: : Integration with the Microsoft Volume Shadow Copy Service creates consistent point-in-time
images of Exchange Server 2003 volumes. Because you can generate these images so quickly and
efficiently, it is possible to maintain more backup images on disk, enabling very rapid recovery.
: : The easy-to-use user interface simplifies the processes of both backup and recovery—reducing the
possibility of error even during crisis-driven recovery.
By speeding Exchange recovery (and therefore reducing downtime), Protection Manager software can
deliver a rapid return on investment.
23. 20
Appendix A: References
: : Hitachi HiCommand Protection Manager software product manual
: : Hitachi RAID Manager shadow copy provider manual
: : Exchange Information Store Service Architecture
http://www.microsoft.com/technet/prodtechnol/exchange/guides/E2k3TechRef/b5b94b4d-02d3-
49e4-959f-b8bcf53d340b.mspx
: : Volume Shadow Copy Service Technical Reference
http://www.microsoft.com/technet/prodtechnol/windowsserver2003/library/TechRef/7cb7e9f7-
2090-4c88-8d14-270c749fddb5.mspx
: : How to Recover a Deleted Mailbox in Exchange
http://support.microsoft.com/default.aspx?scid=kb;en-us;274343
: : Understanding Deleted Item Recovery
http://support.microsoft.com/kb/228934/
: : Best Practices for Hitachi Storage Supporting Microsoft Exchange Server 2003
http://www.hds.com/pdf/wp_195_exchange_best_practices.pdf