SlideShare a Scribd company logo
1 of 17
SPFS
A filesystem for Spectrum Protect
SPFS - Filesystem
A Filesystem for Spectrum Protect.
The product is intended to be used as a backup filesystem with WORM, versioning, encryption, data redundancy, data
reduction techniques, data filtering, data retention functionalities.
The issues All of these databases has one thing in common
- There is no backup agent to protect them with Spectrum Protect
But wait?...
We can present an agentless solution, (“SPFS”).
This can protect ANY kind of databases or applications
And this WITHOUT any need of education.
How sounds that?
DBA’s can use the methodology and technologies that they have the
skills to use.
And still knowing that everything is protected in a securely manner.
SIMPLE TO USE
# cd
# ls
# rm
# cp
# mv
# mysqldump > /backup/my.dmp
…
NO LOCAL EXTRA STORAGE NEEDED
NO EXTRA EDUCATION NEEDED
WORM
“WORM is an abbreviation that means “Write Once Read Many”, and is mostly known to be used for Compact Disks
(CD).”
The WORM functionality means that a client that writes data to a file can only perform this task once, and can not
change the content of that file. But can read the content many times.
A client that tries to change content of a file, will instead create a new version of that file, see versioning below.
The SPFS filesystem is designed to be used as a WORM filesystem.
REMOVINGCONTENT
The data on the SPFS filesystem is secured
A file that are copied to this filesystem can’t be deleted by a client, unless granted by the backup administrator (See
backdel = yes).
BACKUP OBJECTS
ARCHIVE OBJECTS
BACKUPDEL=NO
BACKUPDEL=YES
VERSIONING(-n)
Support for multiple versions of the same file.
Versioning is when a client has multiple version of a file.
Can be practical if a client wants to keep multiple versions of a file, and will still be able to open older versions for
reading, comparing or restoring it’s content.
The functionality of this is similar to VSAM in mainframe (generation data set)
If a client save a file using the same name as an already existing filename; for example “important.txt”; than the
older versions of the file will be visualized by parentheses and a relative version number to the last version of the file
version.
important.txt : is the last version of the file “important.txt”
important.txt(-1): is the version that are 1 version older than last version
important.txt(-2): is the version that are 2 versions older than last version
ENCRYPTION
Data can be encrypted
Encryption is possible in many different levels in the product.
DATA TRANSFER
All communications between the client and the backup server uses encrypted communication protocol.
ENCRYPTED STORAGE
It is possible to enable encryption before the content are physically written to the media (tape, disk or
whatever media is used in the back end storage attached to the backup server).
CLIENT ENCRYPTION
It is possible to enable encryption for all or selective contents on the filesystem before it is being sent to the
backup server.
DATA REDUCTION
Data can be effectively stored using advanced data reduction technique.
It is possible to use data reduction techniques in the product.
DEDUPLICATION
Deduplication is a technique that compares the data chunk with what has already been stored in the backup
system and will instead of storing a duplicate of that content create a relationship to it.
COMPRESSION
Compression is a technique that looks at the content of the data, and try to find repetitive data in the file, and
instead of storing it; store metadata about the content; for example 100x of the word “hello world”
DATA REDUNDANCY
Data can be copied and spread over multiple storage destinations.
The content stored on the backup server can be configured to use extra copies elsewhere.
For example extra copies of storage pools; replication etc.
DATA FILTERING
Possible to reject clients to store certain data files
Filtering is a technique available in the backup tool, where one can configure which content is not allowed to be stored
on the backup server.
This feature is called include exclude rules, and can be stored on the client or on the backup server using client
optionset.
For example:
If you want to reject users to store *.mp3 files on this filesystem, than one can create a client optionset rule to exclude
this content.
● INCLEXCL ‘exclude /.../*.mp3’
DATA RETENTION
Data retention is controlled on the backup server using normal backup administration rules.
It is possible to associate all data or selective data to different retention policies.
For example:
The client wants to have 365 days retention In the “important” catalog, than the backup administrator can associate a
management class that has the retention policy confugured.
● INCLEXCL ‘incude /important/.../* 365DAYS’
PERFORMANCE
The SPFS product is a multithreaded application that uses backend workers with a connection pool.
This means that if there is a connection available in the connection pool that already has a working session on the
Spectrum Protect Server, than that connection will be prioritized to be reused for new file operations.
The SPFS product also has a cache that cache metadata to avoid extra Spectrum Protect API calls to lookup
metadata about files and directories.
There is an asynchronous data transfer queue for each worker which improve write and read performance.
The filesystem also has a readahead feature, that retrieves data from the Spectrum Protect Server even though the
data has not yet been requested by the client.
Possible use cases
DBA - can use the backup and recovery tool as recommended by the vendor without extra education
- Casandra, MongoDB. MariaDB, MySQL, PostgreSQL, Progress OpenEdge, Oracle, DB2, SQL Server, SAP
Adaptive Server Enterprise, SAP IQ Server, SAP SQL Anywhere, SQL Server Express, …
Content Ondemand - can store online documents.
- No need to keep stub files that needs to be synchronized or backed up separately?
What are you waiting for..
● SIMPLE TO USE
● NO LOCAL EXTRA STORAGE NEEDED
● NO EXTRA EDUCATION NEEDED
● FAST
● RELIABLE
● ADVANCED FILTERING
● SPACE EFFICIENT
● SECURITY

More Related Content

What's hot

Understanding das-nas-san
Understanding das-nas-sanUnderstanding das-nas-san
Understanding das-nas-sanAshwin Pawar
 
Net App Unified Storage Architecture
Net App Unified Storage ArchitectureNet App Unified Storage Architecture
Net App Unified Storage Architecturenburgett
 
FAQ on Dedupe NetApp
FAQ on Dedupe NetAppFAQ on Dedupe NetApp
FAQ on Dedupe NetAppAshwin Pawar
 
8 i rman_love_it
8 i rman_love_it8 i rman_love_it
8 i rman_love_itAnil Pandey
 
Raid Levels Technology
Raid Levels TechnologyRaid Levels Technology
Raid Levels TechnologyIshwor Panta
 
ParaScale Cloud Storage Customer overview presentation
ParaScale Cloud Storage Customer overview presentationParaScale Cloud Storage Customer overview presentation
ParaScale Cloud Storage Customer overview presentationParaScale Marketing
 
What is HDFS | Hadoop Distributed File System | Edureka
What is HDFS | Hadoop Distributed File System | EdurekaWhat is HDFS | Hadoop Distributed File System | Edureka
What is HDFS | Hadoop Distributed File System | EdurekaEdureka!
 
Product introduction- Apsara File Storage NAS
Product introduction- Apsara File Storage NASProduct introduction- Apsara File Storage NAS
Product introduction- Apsara File Storage NASJed Concepcion
 
HP Storage Backup (RDX) presentation
HP Storage Backup (RDX) presentation HP Storage Backup (RDX) presentation
HP Storage Backup (RDX) presentation Jaideep Kumar
 
Hadoop World 2010: Productionizing Hadoop: Lessons Learned
Hadoop World 2010: Productionizing Hadoop: Lessons LearnedHadoop World 2010: Productionizing Hadoop: Lessons Learned
Hadoop World 2010: Productionizing Hadoop: Lessons LearnedCloudera, Inc.
 
Storage Area Network (San)
Storage Area Network (San)Storage Area Network (San)
Storage Area Network (San)sankcomp
 
Various raid levels pros & cons
Various raid levels pros & consVarious raid levels pros & cons
Various raid levels pros & consIT Tech
 
Csci12 report aug18
Csci12 report aug18Csci12 report aug18
Csci12 report aug18karenostil
 

What's hot (20)

Understanding das-nas-san
Understanding das-nas-sanUnderstanding das-nas-san
Understanding das-nas-san
 
NetApp & Storage fundamentals
NetApp & Storage fundamentalsNetApp & Storage fundamentals
NetApp & Storage fundamentals
 
Storage basics
Storage basicsStorage basics
Storage basics
 
Network attached stroage
Network attached stroageNetwork attached stroage
Network attached stroage
 
Net App Unified Storage Architecture
Net App Unified Storage ArchitectureNet App Unified Storage Architecture
Net App Unified Storage Architecture
 
FAQ on Dedupe NetApp
FAQ on Dedupe NetAppFAQ on Dedupe NetApp
FAQ on Dedupe NetApp
 
Raid(Storage Technology)
Raid(Storage Technology)Raid(Storage Technology)
Raid(Storage Technology)
 
8 i rman_love_it
8 i rman_love_it8 i rman_love_it
8 i rman_love_it
 
Raid Levels Technology
Raid Levels TechnologyRaid Levels Technology
Raid Levels Technology
 
Directory services
Directory servicesDirectory services
Directory services
 
ParaScale Cloud Storage Customer overview presentation
ParaScale Cloud Storage Customer overview presentationParaScale Cloud Storage Customer overview presentation
ParaScale Cloud Storage Customer overview presentation
 
Storage Basics
Storage BasicsStorage Basics
Storage Basics
 
What is HDFS | Hadoop Distributed File System | Edureka
What is HDFS | Hadoop Distributed File System | EdurekaWhat is HDFS | Hadoop Distributed File System | Edureka
What is HDFS | Hadoop Distributed File System | Edureka
 
Product introduction- Apsara File Storage NAS
Product introduction- Apsara File Storage NASProduct introduction- Apsara File Storage NAS
Product introduction- Apsara File Storage NAS
 
RAID CONCEPT
RAID CONCEPTRAID CONCEPT
RAID CONCEPT
 
HP Storage Backup (RDX) presentation
HP Storage Backup (RDX) presentation HP Storage Backup (RDX) presentation
HP Storage Backup (RDX) presentation
 
Hadoop World 2010: Productionizing Hadoop: Lessons Learned
Hadoop World 2010: Productionizing Hadoop: Lessons LearnedHadoop World 2010: Productionizing Hadoop: Lessons Learned
Hadoop World 2010: Productionizing Hadoop: Lessons Learned
 
Storage Area Network (San)
Storage Area Network (San)Storage Area Network (San)
Storage Area Network (San)
 
Various raid levels pros & cons
Various raid levels pros & consVarious raid levels pros & cons
Various raid levels pros & cons
 
Csci12 report aug18
Csci12 report aug18Csci12 report aug18
Csci12 report aug18
 

Similar to SPFS - A filesystem for Spectrum Protect

Ijaems apr-2016-7 An Enhanced Multi-layered Cryptosystem Based Secure and Aut...
Ijaems apr-2016-7 An Enhanced Multi-layered Cryptosystem Based Secure and Aut...Ijaems apr-2016-7 An Enhanced Multi-layered Cryptosystem Based Secure and Aut...
Ijaems apr-2016-7 An Enhanced Multi-layered Cryptosystem Based Secure and Aut...INFOGAIN PUBLICATION
 
A cloud environment for backup and data storage
A cloud environment for backup and data storageA cloud environment for backup and data storage
A cloud environment for backup and data storageIGEEKS TECHNOLOGIES
 
A cloud enviroment for backup and data storage
A cloud enviroment for backup and data storageA cloud enviroment for backup and data storage
A cloud enviroment for backup and data storageIGEEKS TECHNOLOGIES
 
DataStax | Building a Spark Streaming App with DSE File System (Rocco Varela)...
DataStax | Building a Spark Streaming App with DSE File System (Rocco Varela)...DataStax | Building a Spark Streaming App with DSE File System (Rocco Varela)...
DataStax | Building a Spark Streaming App with DSE File System (Rocco Varela)...DataStax
 
TECHNICAL BRIEF▶ NetBackup 7.6 Deduplication Technology
TECHNICAL BRIEF▶ NetBackup 7.6 Deduplication TechnologyTECHNICAL BRIEF▶ NetBackup 7.6 Deduplication Technology
TECHNICAL BRIEF▶ NetBackup 7.6 Deduplication TechnologySymantec
 
Survey of distributed storage system
Survey of distributed storage systemSurvey of distributed storage system
Survey of distributed storage systemZhichao Liang
 
Streamlining Backup: Enhancing Data Protection with Backup Appliances
Streamlining Backup: Enhancing Data Protection with Backup AppliancesStreamlining Backup: Enhancing Data Protection with Backup Appliances
Streamlining Backup: Enhancing Data Protection with Backup AppliancesMaryJWilliams2
 
Oaklands college: Protecting your data.
Oaklands college: Protecting your data.Oaklands college: Protecting your data.
Oaklands college: Protecting your data.JISC RSC Eastern
 
Deduplication Solutions Are Not All Created Equal: Why Data Domain?
Deduplication Solutions Are Not All Created Equal: Why Data Domain?Deduplication Solutions Are Not All Created Equal: Why Data Domain?
Deduplication Solutions Are Not All Created Equal: Why Data Domain?EMC
 
Managing data to improve disaster recovery preparedness » data center knowledge
Managing data to improve disaster recovery preparedness » data center knowledgeManaging data to improve disaster recovery preparedness » data center knowledge
Managing data to improve disaster recovery preparedness » data center knowledgegeekmodeboy
 
High Availability And Oracle Data Guard 11g R2
High Availability And Oracle Data Guard 11g R2High Availability And Oracle Data Guard 11g R2
High Availability And Oracle Data Guard 11g R2Mario Redón Luz
 
Database system utilities by dinesh
Database system utilities by dineshDatabase system utilities by dinesh
Database system utilities by dineshDinesh Kumar
 
Ibmtsm 100325083335-phpapp01
Ibmtsm 100325083335-phpapp01Ibmtsm 100325083335-phpapp01
Ibmtsm 100325083335-phpapp01Andrew Adam
 
Ibmtsm 100325083335-phpapp01
Ibmtsm 100325083335-phpapp01Ibmtsm 100325083335-phpapp01
Ibmtsm 100325083335-phpapp01Rajesh Kumar
 
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...IRJET Journal
 
StoreGrid : Introduction & Features
StoreGrid : Introduction & FeaturesStoreGrid : Introduction & Features
StoreGrid : Introduction & FeaturesRevolucion
 

Similar to SPFS - A filesystem for Spectrum Protect (20)

Generic RLM White Paper
Generic RLM White PaperGeneric RLM White Paper
Generic RLM White Paper
 
Ijaems apr-2016-7 An Enhanced Multi-layered Cryptosystem Based Secure and Aut...
Ijaems apr-2016-7 An Enhanced Multi-layered Cryptosystem Based Secure and Aut...Ijaems apr-2016-7 An Enhanced Multi-layered Cryptosystem Based Secure and Aut...
Ijaems apr-2016-7 An Enhanced Multi-layered Cryptosystem Based Secure and Aut...
 
A cloud environment for backup and data storage
A cloud environment for backup and data storageA cloud environment for backup and data storage
A cloud environment for backup and data storage
 
A cloud enviroment for backup and data storage
A cloud enviroment for backup and data storageA cloud enviroment for backup and data storage
A cloud enviroment for backup and data storage
 
DataStax | Building a Spark Streaming App with DSE File System (Rocco Varela)...
DataStax | Building a Spark Streaming App with DSE File System (Rocco Varela)...DataStax | Building a Spark Streaming App with DSE File System (Rocco Varela)...
DataStax | Building a Spark Streaming App with DSE File System (Rocco Varela)...
 
TECHNICAL BRIEF▶ NetBackup 7.6 Deduplication Technology
TECHNICAL BRIEF▶ NetBackup 7.6 Deduplication TechnologyTECHNICAL BRIEF▶ NetBackup 7.6 Deduplication Technology
TECHNICAL BRIEF▶ NetBackup 7.6 Deduplication Technology
 
Survey of distributed storage system
Survey of distributed storage systemSurvey of distributed storage system
Survey of distributed storage system
 
Streamlining Backup: Enhancing Data Protection with Backup Appliances
Streamlining Backup: Enhancing Data Protection with Backup AppliancesStreamlining Backup: Enhancing Data Protection with Backup Appliances
Streamlining Backup: Enhancing Data Protection with Backup Appliances
 
AMANDA
AMANDAAMANDA
AMANDA
 
Oaklands college: Protecting your data.
Oaklands college: Protecting your data.Oaklands college: Protecting your data.
Oaklands college: Protecting your data.
 
Deduplication Solutions Are Not All Created Equal: Why Data Domain?
Deduplication Solutions Are Not All Created Equal: Why Data Domain?Deduplication Solutions Are Not All Created Equal: Why Data Domain?
Deduplication Solutions Are Not All Created Equal: Why Data Domain?
 
E045026031
E045026031E045026031
E045026031
 
Managing data to improve disaster recovery preparedness » data center knowledge
Managing data to improve disaster recovery preparedness » data center knowledgeManaging data to improve disaster recovery preparedness » data center knowledge
Managing data to improve disaster recovery preparedness » data center knowledge
 
High Availability And Oracle Data Guard 11g R2
High Availability And Oracle Data Guard 11g R2High Availability And Oracle Data Guard 11g R2
High Availability And Oracle Data Guard 11g R2
 
Database system utilities by dinesh
Database system utilities by dineshDatabase system utilities by dinesh
Database system utilities by dinesh
 
Ibmtsm 100325083335-phpapp01
Ibmtsm 100325083335-phpapp01Ibmtsm 100325083335-phpapp01
Ibmtsm 100325083335-phpapp01
 
Ibmtsm 100325083335-phpapp01
Ibmtsm 100325083335-phpapp01Ibmtsm 100325083335-phpapp01
Ibmtsm 100325083335-phpapp01
 
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...
Methodology for Optimizing Storage on Cloud Using Authorized De-Duplication –...
 
StoreGrid : Introduction & Features
StoreGrid : Introduction & FeaturesStoreGrid : Introduction & Features
StoreGrid : Introduction & Features
 
Deduplication - Remove Duplicate
Deduplication - Remove DuplicateDeduplication - Remove Duplicate
Deduplication - Remove Duplicate
 

Recently uploaded

Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

SPFS - A filesystem for Spectrum Protect

  • 1. SPFS A filesystem for Spectrum Protect
  • 2. SPFS - Filesystem A Filesystem for Spectrum Protect. The product is intended to be used as a backup filesystem with WORM, versioning, encryption, data redundancy, data reduction techniques, data filtering, data retention functionalities.
  • 3. The issues All of these databases has one thing in common - There is no backup agent to protect them with Spectrum Protect But wait?... We can present an agentless solution, (“SPFS”). This can protect ANY kind of databases or applications And this WITHOUT any need of education. How sounds that? DBA’s can use the methodology and technologies that they have the skills to use. And still knowing that everything is protected in a securely manner.
  • 4. SIMPLE TO USE # cd # ls # rm # cp # mv # mysqldump > /backup/my.dmp …
  • 5. NO LOCAL EXTRA STORAGE NEEDED
  • 7. WORM “WORM is an abbreviation that means “Write Once Read Many”, and is mostly known to be used for Compact Disks (CD).” The WORM functionality means that a client that writes data to a file can only perform this task once, and can not change the content of that file. But can read the content many times. A client that tries to change content of a file, will instead create a new version of that file, see versioning below. The SPFS filesystem is designed to be used as a WORM filesystem.
  • 8. REMOVINGCONTENT The data on the SPFS filesystem is secured A file that are copied to this filesystem can’t be deleted by a client, unless granted by the backup administrator (See backdel = yes). BACKUP OBJECTS ARCHIVE OBJECTS BACKUPDEL=NO BACKUPDEL=YES
  • 9. VERSIONING(-n) Support for multiple versions of the same file. Versioning is when a client has multiple version of a file. Can be practical if a client wants to keep multiple versions of a file, and will still be able to open older versions for reading, comparing or restoring it’s content. The functionality of this is similar to VSAM in mainframe (generation data set) If a client save a file using the same name as an already existing filename; for example “important.txt”; than the older versions of the file will be visualized by parentheses and a relative version number to the last version of the file version. important.txt : is the last version of the file “important.txt” important.txt(-1): is the version that are 1 version older than last version important.txt(-2): is the version that are 2 versions older than last version
  • 10. ENCRYPTION Data can be encrypted Encryption is possible in many different levels in the product. DATA TRANSFER All communications between the client and the backup server uses encrypted communication protocol. ENCRYPTED STORAGE It is possible to enable encryption before the content are physically written to the media (tape, disk or whatever media is used in the back end storage attached to the backup server). CLIENT ENCRYPTION It is possible to enable encryption for all or selective contents on the filesystem before it is being sent to the backup server.
  • 11. DATA REDUCTION Data can be effectively stored using advanced data reduction technique. It is possible to use data reduction techniques in the product. DEDUPLICATION Deduplication is a technique that compares the data chunk with what has already been stored in the backup system and will instead of storing a duplicate of that content create a relationship to it. COMPRESSION Compression is a technique that looks at the content of the data, and try to find repetitive data in the file, and instead of storing it; store metadata about the content; for example 100x of the word “hello world”
  • 12. DATA REDUNDANCY Data can be copied and spread over multiple storage destinations. The content stored on the backup server can be configured to use extra copies elsewhere. For example extra copies of storage pools; replication etc.
  • 13. DATA FILTERING Possible to reject clients to store certain data files Filtering is a technique available in the backup tool, where one can configure which content is not allowed to be stored on the backup server. This feature is called include exclude rules, and can be stored on the client or on the backup server using client optionset. For example: If you want to reject users to store *.mp3 files on this filesystem, than one can create a client optionset rule to exclude this content. ● INCLEXCL ‘exclude /.../*.mp3’
  • 14. DATA RETENTION Data retention is controlled on the backup server using normal backup administration rules. It is possible to associate all data or selective data to different retention policies. For example: The client wants to have 365 days retention In the “important” catalog, than the backup administrator can associate a management class that has the retention policy confugured. ● INCLEXCL ‘incude /important/.../* 365DAYS’
  • 15. PERFORMANCE The SPFS product is a multithreaded application that uses backend workers with a connection pool. This means that if there is a connection available in the connection pool that already has a working session on the Spectrum Protect Server, than that connection will be prioritized to be reused for new file operations. The SPFS product also has a cache that cache metadata to avoid extra Spectrum Protect API calls to lookup metadata about files and directories. There is an asynchronous data transfer queue for each worker which improve write and read performance. The filesystem also has a readahead feature, that retrieves data from the Spectrum Protect Server even though the data has not yet been requested by the client.
  • 16. Possible use cases DBA - can use the backup and recovery tool as recommended by the vendor without extra education - Casandra, MongoDB. MariaDB, MySQL, PostgreSQL, Progress OpenEdge, Oracle, DB2, SQL Server, SAP Adaptive Server Enterprise, SAP IQ Server, SAP SQL Anywhere, SQL Server Express, … Content Ondemand - can store online documents. - No need to keep stub files that needs to be synchronized or backed up separately?
  • 17. What are you waiting for.. ● SIMPLE TO USE ● NO LOCAL EXTRA STORAGE NEEDED ● NO EXTRA EDUCATION NEEDED ● FAST ● RELIABLE ● ADVANCED FILTERING ● SPACE EFFICIENT ● SECURITY

Editor's Notes

  1. If the filesystem is mounted as backup; than last version of the file will stay forever in the backup system; until a newer version replaces that version (see versioning below); or if someone removes the file. If the client is not granted to delete a file, and executes the “rm” / “rmdir” or similar tool that removes content, it will instead mark the object as inactive in the backup system. Inactivating an object means that the file will be scheduled to follow normal retention policy set by the backup administrator; more on how this work can be read in the chapter “Configuring retention policies”