SlideShare une entreprise Scribd logo
1  sur  10
Télécharger pour lire hors ligne
White Paper




Understanding EMC Avamar with
EMC Data Protection Advisor
Applied Technology




                     Abstract
                     EMC® Data Protection Advisor provides a comprehensive set of
                     features that reduce the complexity of managing data protection
                     environments, improve compliance with business and
                     regulatory requirements, and reduce the risk of data loss. This
                     white paper outlines how Data Protection Advisor helps you gain
                     control of your EMC Avamar® backup environment, by better
                     understanding what is working well and what is not, giving you a
                     proactive approach to managing your environment.

                     July 2012
Copyright © 2012 EMC Corporation. All Rights Reserved.

  EMC believes the information in this publication is accurate as
  of its publication date. The information is subject to change
  without notice.

  The information in this publication is provided “as is.” EMC
  Corporation makes no representations or warranties of any kind
  with respect to the information in this publication, and
  specifically disclaims implied warranties of merchantability or
  fitness for a particular purpose.

  Use, copying, and distribution of any EMC software described in
  this publication requires an applicable software license.

  For the most up-to-date listing of EMC product names, see EMC
  Corporation Trademarks on EMC.com.

  VMware is a registered trademark of VMware, Inc. in the United
  States and/or other jurisdictions. All other trademarks used
  herein are the property of their respective owners.

  Part Number h6108.2




Understanding EMC Avamar with EMC Data Protection Advisor – Applied   2
                                                        Technology
Table of Contents
Executive summary.................................................................................................. 4
   Audience ............................................................................................................................ 4
Introduction ............................................................................................................ 4
DPA licensing with Avamar ...................................................................................... 4
EMC Avamar ............................................................................................................ 5
EMC Avamar ............................................................................................................ 5
How does it work ..................................................................................................... 6
Avamar Server component ....................................................................................... 8
DPA 5.8 and Avamar 6.0 .......................................................................................... 9
Improved Avamar Reporting ..................................................................................... 9
Conclusion ............................................................................................................ 10
References ............................................................................................................ 10




                             Understanding EMC Avamar with EMC Data Protection Advisor – Applied                                             3
                                                                                     Technology
Executive summary
EMC® Data Protection Advisor (DPA) provides a unified data protection management
window by collecting, monitoring, analyzing, and reporting on information from the
entire data protection infrastructure. When EMC Avamar® is introduced into an
environment, typically two or more backup solutions are being managed, so DPA
eliminates the need for multiple interfaces.
EMC Avamar Data Store is a fully integrated, software/hardware, backup and recovery
solution that also includes data deduplication. Avamar’s deduplication begins at the
client to be backed up. Avamar detects sub-file-level data changes and backs them
up only if they have not already been backed up. This results in only the changed
data being moved, enabling savings in the areas of time, processing, bandwidth, and
storage requirements.
EMC Data Protection Advisor enhances the abilities of Avamar monitoring and
reporting, through its central historical repository, analysis engine, and robust
reporting.

Audience
This white paper is intended for Data Protection Advisor professionals to provide
insight into what Avamar is all about and how Data Protection Advisor extends
reporting of Avamar environments.


Introduction
This white paper describes the EMC Avamar technology, including its architecture and
various components. It then details how EMC Data Protection Advisor can extend
Avamar by showing some of the different options available.


DPA licensing with Avamar
With DPA 5.8, DPA licenses Avamar environments based on the capacity of each grid.
Customers who use DPA to monitor a variety of backup applications, including
Avamar, will require both a DPA Backup Capacity license and Client license.
For example, a customer with a 2 TB Avamar grid will require a corresponding 2 TB
DPA Backup Capacity license, regardless of the number of Avamar clients.
Avamar clients managed through EMC NetWorker® do not require a DPA Backup
Capacity license as they are included as clients of the NetWorker server.




                   Understanding EMC Avamar with EMC Data Protection Advisor – Applied   4
                                                                           Technology
EMC Avamar
As mentioned previously, Avamar’s source-based deduplication begins at the client
by detecting sub-file-level data changes and backing up only changed blocks of data.
This results in only the changed data being transmitted over the network for backup
and in huge savings with both the time taken to back up and with network bandwidth
requirements. A backup client must be backed up in full once, and thereafter only
changes are backed up to the Avamar Data Store.
Each backup job is treated as a full-level backup since Avamar can recover the client
in its entirety from any backup, even though only incremental changes are saved from
each backup.
Besides deduplicating data at the backup client level, Avamar also deduplicates data
across clients and sites, a process that is known as global deduplication. This means
that Avamar stores duplicate data/sub-file chunks of data only once. For example,
since the majority of the C:WINDOWS subdirectory and its contents will be exactly
the same across all Windows backup clients, Avamar needs to store this only once
but can allow any client to restore from it.
In environments where clients have been virtualized using VMware, Avamar also
provides the same significant savings. With traditional backup solutions, virtual
machines need to move weekly full and daily incremental backups through the
VMware host’s physical resources (NIC, CPU memory, and so on), which can become
overloaded and cause backup overruns and breached SLAs. With Avamar, sending
only changed segments of data can potentially provide a 300 percent daily reduction
in network resource usage compared to traditional backups. Avamar also does
remote replication over standard wide area network (WAN) connections, thus
providing disaster recovery replication without transporting tapes from one site to
another. For full virtual machine backups, Avamar can also deduplicate data stored
in virtual disks (VMware *.vmdk files), significantly reducing storage consumption
and enabling replication of virtual disks across congested WANs.


EMC Avamar
Avamar’s deduplication begins at the client to be backed up. Avamar detects sub-file-
level data changes and backs it up only if that sub-file (chunk) has not already been
backed up. This results in only the “changed” data being transmitted over the
network for backup, and also in sizable reductions on the time taken to conduct
backup coupled with meeting a highly efficient bandwidth utilization requirement.
This implies that a backup client needs to be “backed up” in FULL at least once, and
thereafter only “changes” are backed up to the Data Store.
This implies a traditional INCREMENTAL backup; however, each backup “job” is
treated, and is, a FULL level backup as Avamar has the ability to recover the client in
its entirety.




                   Understanding EMC Avamar with EMC Data Protection Advisor – Applied    5
                                                                           Technology
Besides deduplicating at the backup client level, Avamar also deduplicates across
clients and sites – this is also known as global deduplication. This means that
duplicate data/sub-file chunks of data will only be stored once on the Avamar Data
Store or grid. A typical example would be the C:WINDOWS sub-directory and its
contents; this global deduplication benefit will the same across all Windows backup
clients and thus Avamar only needs to store this directory once but the effect also
allows any client to restore from it. As an example, a company logo and
confidentiality statement that are stamped on every customer-facing presentation are
stored only once on the grid but are available for all restores of that presentation no
matter which business unit or division. In summary, global deduplication has no
digital borders – global commonality is restricted only to the size of the Avamar grid.


How does it work
Avamar eliminates redundancy in backup data at the source, that is, before the data
is transferred across the LAN or WAN during backups. Avamar agents are deployed
on the systems to be protected (for example, physical or virtual servers, Network Data
Management Protocol (NDMP) filers, desktops, laptops) to identify and filter over time
duplicate data segments stored in files within a single host and across multiple
systems. This ensures that each unique data segment is backed up only once across
the enterprise. As a result, copied or edited files, shared applications, embedded
attachments, and even daily changing databases generate only a small amount of
day-to-day backup data.
By moving only new, unique sub-file data segments, Avamar reduces the daily
network bandwidth required and storage by up to 500x. By storing just a single
instance of each sub-file data segment globally, Avamar also reduces total back-end
disk storage by up to 50x for cost-effective, long-term, disk-based recovery.
A key factor for eliminating redundant data at a sub-file (or segment) level is the
method for determining segment size. Snapshot or replication technologies
commonly use fixed-block/fixed-length segments. Unfortunately, even small changes
to a dataset (for example, inserting data at the head of the file) can change all fixed-
length segments after that insertion thus wiping out all deduplication in that dataset;
this condition is called offset. In contrast, Avamar uses an intelligent method for
determining segment size that inspects each segment in the data.
Avamar’s patented method for determining segment size is designed to yield optimal
efficiency across all systems in an enterprise. Avamar’s algorithm analyzes the binary
structure of a dataset to determine segment boundaries that are context-dependent,
so that Avamar’s client agents can identify the exact same segments for any dataset,
no matter where that dataset is stored in the enterprise. Avamar’s segments average
24 KB in size and are then compressed prior to LAN or WAN transmission to an
average of just 12 KB. By analyzing the binary structure, Avamar’s method works for
all file types and sizes.
For each 24 KB segment, Avamar generates a unique 20-byte ID, using the SHA-1
encryption algorithm. This unique ID is like a fingerprint for that segment. Avamar



                   Understanding EMC Avamar with EMC Data Protection Advisor – Applied     6
                                                                           Technology
software then uses this unique ID to determine whether a data segment has been
stored before. Files, directories, entire file systems, and even databases can be
quickly and efficiently stored with a hierarchical map of these unique IDs.
In summary, the benefits of Avamar are:
   •   A reduction in daily network bandwidth and backup storage by up to 500x.
   •   Daily full level backups across existing LAN/WAN bandwidths.
   •   Up to 10x faster backup performance.
   •   Total back-end disk backup storage reduction of up to 50 percent.
   •   Up to 85 percent reduction in total client CPU utilization. Avamar clients run in
       low priority (or “nice” mode in UNIX) to avoid resource contention. While
       Avamar clients typically use 15 percent more CPU than traditional backup
       agents during backup operations, Avamar reduces the window required for
       backup operations by up to 10x, thus reducing overall CPU utilization.
   •   Immediate single-step recovery. Avamar stores all backups as virtual full
       images, which can be immediately recovered in a single step to either their
       original destination or any other IP-addressable node that role-based access
       control permits. It is not necessary to restore data from full and incremental
       backups to reach the desired recovery point.
Avamar Data Stores can be deployed in either single-node or scalable multinode
configurations depending on the performance and capacity required. Built-in software
includes a replication software module for efficient replication of Avamar Servers
across WAN sites or any IP-based circuits.
Avamar Data Store multinode configurations use a Redundant Array of Independent
Nodes (RAIN) architecture, thus providing scalability, optimization, and resilience to
individual node failure – RAIN does not support single-node configurations but is
available in the Data Store and the previously mentioned configurations.
Avamar Data Stores are offered in two primary classes: 3.3 and 2 TB high-density
nodes and 1 TB standard density nodes (high and standard density nodes cannot be
mixed in a single Avamar Data Store to ensure that RAIN reconciles all disk
geometries of each potential data store that it protects in the grid).


                       Maximum configuration          Single node configuration
                       (16 storage nodes)             (standard density/high
                                                      density)
Licensed capacity 16 TB / 32 TB / 52.8 TB             1.0 TB / 2.0 TB / 3.3 TB
Equivalent           .55 PB / 1.1 PB / 2.4 PB         35 TB / 70 TB / 105 TB
cumulative,
traditional backup
storage
Table 1. Comparison of single- and multimode configurations




                   Understanding EMC Avamar with EMC Data Protection Advisor – Applied     7
                                                                           Technology
Gigabit Ethernet is used with TCP/IP protocols. Avamar 6.0 bonds these interfaces for
additional performance.
Avamar Data Store is available in various models:
   •   A scalable multinode (6-18 nodes, including spare and utility using RAIN
       technology, expandable in single same-size node increments) providing
       upgrade and high-availability options.
   •   One- and two-node, fixed capacity models (ideal for remote offices or smaller
       data center environments)


Avamar Servers are delivered with a supported operating system pre-installed
(primarily a certified Intel x86 server running Red Hat Enterprise Linux 4 for Avamar
versions 3-5, SUSE LINUX Enterprise 11.1 for Avamar 6.0), all with fully tested
hardware from the factory. The Avamar software is installed onsite after hardware
installation using kick-start media that has all the approved drivers, RPMs, and so on.
Supportability features include remote access and management, email-home
capabilities, and enabled SNMP. Avamar 6.0 goes one step further by including EMC
Secure Remote Services (ESRS) with a secured VPN configured to alert both customer
and EMC of disk failures, security patches, and remote support. ESRS also delivers
the ability to move patches and updates to the server and install them.
Avamar supports all major operating systems and provides dedicated agents for
protecting databases and network-attached storage with NDMP for both EMC
Celerra® (including the new EMC VNX™ system) and NetApp systems.


Avamar Server component
Avamar Servers store client backups and manage the policies for scheduling and for
determining datasets and retention periods. An Avamar backup provides a point-in-
time full copy of data that can be restored on demand. In multinode Avamar Server
environments, the components of the Avamar Server are segregated across multiple
servers for scalability and performance.
The two primary node types configured in a multimode Avamar Server are:
   •   Storage node – stores the actual backup data. Storage nodes can be added to
       an Avamar Server over time with no downtime required. Avamar clients
       connect directly with the storage node, and client connections and data are
       load balanced across storage nodes.
   •   Utility node –schedules and manages background Avamar Server jobs. One
       utility node is configured per Avamar Server.


The NDMP Accelerator node is an optional generic utility-like node running Red
Hat/SLES that works with NDMP in order to provide protection for NAS filers.




                   Understanding EMC Avamar with EMC Data Protection Advisor – Applied    8
                                                                           Technology
For integration with reporting tools, Avamar uses a Postgres SQL database to store
information about backup activities and policies. This database can by probed by
standard ODBC calls using a published schema.


DPA 5.8 and Avamar 6.0
To gather data from EMC Avamar, DPA connects directly to the Avamar database via
the mcdb database on the default port (5555) for Avamar, If these parameters were
modified, change the Avamar Config and Avamar Job Monitor requests to override
these DPA defaults to match the new Avamar parameter settings. When DPA connects
to the database, it uses the viewuser account to log in to the database. If the Avamar
installation was modified so that “viewuser” does not have permission to log in to the
database, or the password for this user has been modified, change the user and
password in the Default Avamar Credentials to reflect the username and password
that should be used to connect to the database.
The Collector must be installed on a host that is in the same time zone as the Avamar
server.


Improved Avamar Reporting
DPA 5.8 includes new features that enhance the reporting capabilities for Avamar
environments:
   •   Backup Job Report – The following figure is an example of the updated Backup
       jobs report. This report now includes fields such as backup path, error
       summary code, and status of the code. This allows administrators to manage
       backups more effectively.




Figure 1. Example updated Backup Jobs Report

   •   Used Capacity Report - The following figure is a sample Used Capacity Report,
       which contains the total used capacity of the Avamar grid. In addition it also
       indicates utilization of each Avamar Server.




                  Understanding EMC Avamar with EMC Data Protection Advisor – Applied    9
                                                                          Technology
Figure 2. Used Capacity Report


   •   Restore Job Report - The following figure is a sample Restore Job Report, which
       now lists Job ID, backup number, backup label, recorded data time, number
       files and bytes scanned.




Conclusion
With the addition of these new reports to DPA, Avamar allows customers to more
effectively manage their environments. In addition administrators can accurately
understand consumption of each Avamar grid and appropriately make retention and
management decisions more accurately. While DPA can be useful in an Avamar-only
environment, its value increases when an environment has multiple backup
solutions, multiple sites, or multiple business units. This paper does not cover all
reports that are available within DPA, but it does highlight areas of interest when
using DPA with EMC Avamar.


References
The following can provide additional information and can be found on Powerlink®,
EMC’s password-protected customer- and partner-only intranet.
   •   EMC Data Protection Advisor Reference Guide
   •   EMC Data Protection Advisor Administration Guide
   •   EMC Data Protection Advisor Installation Guide
   •   EMC Data Protection Advisor User Guide
   •   EMC Data Protection Advisor Compatibility Matrix
For access to evaluation licenses go to the Data Protection Advisor page on EMC.com




                  Understanding EMC Avamar with EMC Data Protection Advisor – Applied    10
                                                                          Technology

Contenu connexe

Tendances

VMware View – Storage Considerations
VMware View – Storage ConsiderationsVMware View – Storage Considerations
VMware View – Storage ConsiderationsCalin Damian Tanase
 
White Paper: EMC Infrastructure for VMware Cloud Environments
White Paper: EMC Infrastructure for VMware Cloud Environments  White Paper: EMC Infrastructure for VMware Cloud Environments
White Paper: EMC Infrastructure for VMware Cloud Environments EMC
 
White Paper: Deploying and Implementing RecoverPoint in a Virtual Machine for...
White Paper: Deploying and Implementing RecoverPoint in a Virtual Machine for...White Paper: Deploying and Implementing RecoverPoint in a Virtual Machine for...
White Paper: Deploying and Implementing RecoverPoint in a Virtual Machine for...EMC
 
V sphere 5 roadshow final
V sphere 5 roadshow finalV sphere 5 roadshow final
V sphere 5 roadshow finalbluechipper
 
How to achieve better backup with Symantec
How to achieve better backup with SymantecHow to achieve better backup with Symantec
How to achieve better backup with SymantecArrow ECS UK
 
EMC Deduplication Fundamentals
EMC Deduplication FundamentalsEMC Deduplication Fundamentals
EMC Deduplication Fundamentalsemcbaltics
 
Flash Ahead: IBM Flash System Selling Point
Flash Ahead: IBM Flash System Selling PointFlash Ahead: IBM Flash System Selling Point
Flash Ahead: IBM Flash System Selling PointCTI Group
 
IBM SONAS and VMware vSphere 5 scale-out cloud foundation: A reference guide ...
IBM SONAS and VMware vSphere 5 scale-out cloud foundation: A reference guide ...IBM SONAS and VMware vSphere 5 scale-out cloud foundation: A reference guide ...
IBM SONAS and VMware vSphere 5 scale-out cloud foundation: A reference guide ...IBM India Smarter Computing
 
Top Ten Private Cloud Risks
Top Ten Private Cloud RisksTop Ten Private Cloud Risks
Top Ten Private Cloud RisksSymantec
 
Efficient Data Protection – Backup in VMware environments
Efficient Data Protection – Backup in VMware environmentsEfficient Data Protection – Backup in VMware environments
Efficient Data Protection – Backup in VMware environmentsKingfin Enterprises Limited
 
Networker integration for optimal performance
Networker integration for optimal performanceNetworker integration for optimal performance
Networker integration for optimal performanceMohamed Sohail
 
White Paper: Using VPLEX Metro with VMware High Availability and Fault Tolera...
White Paper: Using VPLEX Metro with VMware High Availability and Fault Tolera...White Paper: Using VPLEX Metro with VMware High Availability and Fault Tolera...
White Paper: Using VPLEX Metro with VMware High Availability and Fault Tolera...EMC
 
Backup Exec Blueprints▶ Deduplication
Backup Exec Blueprints▶ DeduplicationBackup Exec Blueprints▶ Deduplication
Backup Exec Blueprints▶ DeduplicationSymantec
 
Storage Architectures And Options
Storage Architectures And OptionsStorage Architectures And Options
Storage Architectures And OptionsAlan McSweeney
 
Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...
Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...
Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...Paula Koziol
 
VMWare Forum Winnipeg - 2012
VMWare Forum Winnipeg  - 2012VMWare Forum Winnipeg  - 2012
VMWare Forum Winnipeg - 2012asedha
 

Tendances (20)

FAST VP Step by Step Module 2
FAST VP Step by Step Module 2FAST VP Step by Step Module 2
FAST VP Step by Step Module 2
 
VMware View – Storage Considerations
VMware View – Storage ConsiderationsVMware View – Storage Considerations
VMware View – Storage Considerations
 
Vmware powerpoint1752
Vmware powerpoint1752Vmware powerpoint1752
Vmware powerpoint1752
 
White Paper: EMC Infrastructure for VMware Cloud Environments
White Paper: EMC Infrastructure for VMware Cloud Environments  White Paper: EMC Infrastructure for VMware Cloud Environments
White Paper: EMC Infrastructure for VMware Cloud Environments
 
White Paper: Deploying and Implementing RecoverPoint in a Virtual Machine for...
White Paper: Deploying and Implementing RecoverPoint in a Virtual Machine for...White Paper: Deploying and Implementing RecoverPoint in a Virtual Machine for...
White Paper: Deploying and Implementing RecoverPoint in a Virtual Machine for...
 
V sphere 5 roadshow final
V sphere 5 roadshow finalV sphere 5 roadshow final
V sphere 5 roadshow final
 
How to achieve better backup with Symantec
How to achieve better backup with SymantecHow to achieve better backup with Symantec
How to achieve better backup with Symantec
 
EMC Deduplication Fundamentals
EMC Deduplication FundamentalsEMC Deduplication Fundamentals
EMC Deduplication Fundamentals
 
Flash Ahead: IBM Flash System Selling Point
Flash Ahead: IBM Flash System Selling PointFlash Ahead: IBM Flash System Selling Point
Flash Ahead: IBM Flash System Selling Point
 
Webinar presentation
Webinar presentationWebinar presentation
Webinar presentation
 
IBM SONAS and VMware vSphere 5 scale-out cloud foundation: A reference guide ...
IBM SONAS and VMware vSphere 5 scale-out cloud foundation: A reference guide ...IBM SONAS and VMware vSphere 5 scale-out cloud foundation: A reference guide ...
IBM SONAS and VMware vSphere 5 scale-out cloud foundation: A reference guide ...
 
Top Ten Private Cloud Risks
Top Ten Private Cloud RisksTop Ten Private Cloud Risks
Top Ten Private Cloud Risks
 
Efficient Data Protection – Backup in VMware environments
Efficient Data Protection – Backup in VMware environmentsEfficient Data Protection – Backup in VMware environments
Efficient Data Protection – Backup in VMware environments
 
Networker integration for optimal performance
Networker integration for optimal performanceNetworker integration for optimal performance
Networker integration for optimal performance
 
White Paper: Using VPLEX Metro with VMware High Availability and Fault Tolera...
White Paper: Using VPLEX Metro with VMware High Availability and Fault Tolera...White Paper: Using VPLEX Metro with VMware High Availability and Fault Tolera...
White Paper: Using VPLEX Metro with VMware High Availability and Fault Tolera...
 
Solution Brief HPE StoreOnce backup with Veeam
Solution Brief HPE StoreOnce backup with VeeamSolution Brief HPE StoreOnce backup with Veeam
Solution Brief HPE StoreOnce backup with Veeam
 
Backup Exec Blueprints▶ Deduplication
Backup Exec Blueprints▶ DeduplicationBackup Exec Blueprints▶ Deduplication
Backup Exec Blueprints▶ Deduplication
 
Storage Architectures And Options
Storage Architectures And OptionsStorage Architectures And Options
Storage Architectures And Options
 
Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...
Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...
Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...
 
VMWare Forum Winnipeg - 2012
VMWare Forum Winnipeg  - 2012VMWare Forum Winnipeg  - 2012
VMWare Forum Winnipeg - 2012
 

Similaire à White Paper: Understanding EMC Avamar with EMC Data Protection Advisor — Applied Technology

EMC for Network Attached Storage (NAS) Backup and Recovery Using NDMP
EMC for Network Attached Storage (NAS) Backup and Recovery Using NDMPEMC for Network Attached Storage (NAS) Backup and Recovery Using NDMP
EMC for Network Attached Storage (NAS) Backup and Recovery Using NDMPEMC
 
Avamar Presentatie Q3 2010
Avamar Presentatie Q3 2010Avamar Presentatie Q3 2010
Avamar Presentatie Q3 2010Jo Verstappen
 
White Paper: Introduction to VFCache
White Paper: Introduction to VFCache   White Paper: Introduction to VFCache
White Paper: Introduction to VFCache EMC
 
White Paper: EMC Backup-as-a-Service
White Paper: EMC Backup-as-a-Service   White Paper: EMC Backup-as-a-Service
White Paper: EMC Backup-as-a-Service EMC
 
Backup exec 2014 deduplication option white paper
Backup exec 2014 deduplication option white paperBackup exec 2014 deduplication option white paper
Backup exec 2014 deduplication option white paperSymantec
 
White Paper: Optimizing Primary Storage Through File Archiving with EMC Cloud...
White Paper: Optimizing Primary Storage Through File Archiving with EMC Cloud...White Paper: Optimizing Primary Storage Through File Archiving with EMC Cloud...
White Paper: Optimizing Primary Storage Through File Archiving with EMC Cloud...EMC
 
DATA STORAGE REPLICATION aCelera and WAN Series Solution Brief
DATA STORAGE REPLICATION aCelera and WAN Series Solution BriefDATA STORAGE REPLICATION aCelera and WAN Series Solution Brief
DATA STORAGE REPLICATION aCelera and WAN Series Solution Brief Array Networks
 
Backup and Recovery Solution for VMware vSphere on EMC Isilon Storage
Backup and Recovery Solution for VMware vSphere on EMC Isilon Storage Backup and Recovery Solution for VMware vSphere on EMC Isilon Storage
Backup and Recovery Solution for VMware vSphere on EMC Isilon Storage EMC
 
Deduplication Solutions Are Not All Created Equal: Why Data Domain?
Deduplication Solutions Are Not All Created Equal: Why Data Domain?Deduplication Solutions Are Not All Created Equal: Why Data Domain?
Deduplication Solutions Are Not All Created Equal: Why Data Domain?EMC
 
White Paper: Backup and Recovery of the EMC Greenplum Data Computing Applianc...
White Paper: Backup and Recovery of the EMC Greenplum Data Computing Applianc...White Paper: Backup and Recovery of the EMC Greenplum Data Computing Applianc...
White Paper: Backup and Recovery of the EMC Greenplum Data Computing Applianc...EMC
 
EMC - 10martie2011
EMC - 10martie2011EMC - 10martie2011
EMC - 10martie2011Agora Group
 
EMC VNX FAST VP
EMC VNX FAST VP EMC VNX FAST VP
EMC VNX FAST VP EMC
 
Aspirus Enterprise Backup Assessment And Implementation Of Avamar
Aspirus Enterprise Backup Assessment And Implementation Of AvamarAspirus Enterprise Backup Assessment And Implementation Of Avamar
Aspirus Enterprise Backup Assessment And Implementation Of Avamartomwhalen
 
Security Grade Servers and Storage - Quantifying Value
Security Grade Servers and Storage - Quantifying ValueSecurity Grade Servers and Storage - Quantifying Value
Security Grade Servers and Storage - Quantifying ValueJan Robin
 
Why Security-Grade Servers and Storage?
Why Security-Grade Servers and Storage?Why Security-Grade Servers and Storage?
Why Security-Grade Servers and Storage?Jan Robin
 
Veeam Availability top 10 reasons to choose veeam - long
Veeam Availability top 10 reasons to choose veeam - longVeeam Availability top 10 reasons to choose veeam - long
Veeam Availability top 10 reasons to choose veeam - longS. Hanau
 

Similaire à White Paper: Understanding EMC Avamar with EMC Data Protection Advisor — Applied Technology (20)

EMC for Network Attached Storage (NAS) Backup and Recovery Using NDMP
EMC for Network Attached Storage (NAS) Backup and Recovery Using NDMPEMC for Network Attached Storage (NAS) Backup and Recovery Using NDMP
EMC for Network Attached Storage (NAS) Backup and Recovery Using NDMP
 
Avamar Presentatie Q3 2010
Avamar Presentatie Q3 2010Avamar Presentatie Q3 2010
Avamar Presentatie Q3 2010
 
White Paper: Introduction to VFCache
White Paper: Introduction to VFCache   White Paper: Introduction to VFCache
White Paper: Introduction to VFCache
 
White Paper: EMC Backup-as-a-Service
White Paper: EMC Backup-as-a-Service   White Paper: EMC Backup-as-a-Service
White Paper: EMC Backup-as-a-Service
 
Avamar 7 2010
Avamar 7 2010Avamar 7 2010
Avamar 7 2010
 
Avamar-7_2010.ppt
Avamar-7_2010.pptAvamar-7_2010.ppt
Avamar-7_2010.ppt
 
Backup exec 2014 deduplication option white paper
Backup exec 2014 deduplication option white paperBackup exec 2014 deduplication option white paper
Backup exec 2014 deduplication option white paper
 
White Paper: Optimizing Primary Storage Through File Archiving with EMC Cloud...
White Paper: Optimizing Primary Storage Through File Archiving with EMC Cloud...White Paper: Optimizing Primary Storage Through File Archiving with EMC Cloud...
White Paper: Optimizing Primary Storage Through File Archiving with EMC Cloud...
 
DATA STORAGE REPLICATION aCelera and WAN Series Solution Brief
DATA STORAGE REPLICATION aCelera and WAN Series Solution BriefDATA STORAGE REPLICATION aCelera and WAN Series Solution Brief
DATA STORAGE REPLICATION aCelera and WAN Series Solution Brief
 
Backup and Recovery Solution for VMware vSphere on EMC Isilon Storage
Backup and Recovery Solution for VMware vSphere on EMC Isilon Storage Backup and Recovery Solution for VMware vSphere on EMC Isilon Storage
Backup and Recovery Solution for VMware vSphere on EMC Isilon Storage
 
Deduplication Solutions Are Not All Created Equal: Why Data Domain?
Deduplication Solutions Are Not All Created Equal: Why Data Domain?Deduplication Solutions Are Not All Created Equal: Why Data Domain?
Deduplication Solutions Are Not All Created Equal: Why Data Domain?
 
White Paper: Backup and Recovery of the EMC Greenplum Data Computing Applianc...
White Paper: Backup and Recovery of the EMC Greenplum Data Computing Applianc...White Paper: Backup and Recovery of the EMC Greenplum Data Computing Applianc...
White Paper: Backup and Recovery of the EMC Greenplum Data Computing Applianc...
 
EMC - 10martie2011
EMC - 10martie2011EMC - 10martie2011
EMC - 10martie2011
 
EMC VNX FAST VP
EMC VNX FAST VP EMC VNX FAST VP
EMC VNX FAST VP
 
Aspirus Enterprise Backup Assessment And Implementation Of Avamar
Aspirus Enterprise Backup Assessment And Implementation Of AvamarAspirus Enterprise Backup Assessment And Implementation Of Avamar
Aspirus Enterprise Backup Assessment And Implementation Of Avamar
 
Whitepaper
WhitepaperWhitepaper
Whitepaper
 
Security Grade Servers and Storage - Quantifying Value
Security Grade Servers and Storage - Quantifying ValueSecurity Grade Servers and Storage - Quantifying Value
Security Grade Servers and Storage - Quantifying Value
 
Why Security-Grade Servers and Storage?
Why Security-Grade Servers and Storage?Why Security-Grade Servers and Storage?
Why Security-Grade Servers and Storage?
 
Veeam Availability top 10 reasons to choose veeam - long
Veeam Availability top 10 reasons to choose veeam - longVeeam Availability top 10 reasons to choose veeam - long
Veeam Availability top 10 reasons to choose veeam - long
 
2009-dec02_EMC2
2009-dec02_EMC22009-dec02_EMC2
2009-dec02_EMC2
 

Plus de EMC

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDEMC
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote EMC
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOEMC
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremioEMC
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lakeEMC
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereEMC
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History EMC
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewEMC
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeEMC
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic EMC
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityEMC
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeEMC
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015EMC
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesEMC
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsEMC
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookEMC
 

Plus de EMC (20)

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
 

Dernier

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 

Dernier (20)

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 

White Paper: Understanding EMC Avamar with EMC Data Protection Advisor — Applied Technology

  • 1. White Paper Understanding EMC Avamar with EMC Data Protection Advisor Applied Technology Abstract EMC® Data Protection Advisor provides a comprehensive set of features that reduce the complexity of managing data protection environments, improve compliance with business and regulatory requirements, and reduce the risk of data loss. This white paper outlines how Data Protection Advisor helps you gain control of your EMC Avamar® backup environment, by better understanding what is working well and what is not, giving you a proactive approach to managing your environment. July 2012
  • 2. Copyright © 2012 EMC Corporation. All Rights Reserved. EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. The information in this publication is provided “as is.” EMC Corporation makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. For the most up-to-date listing of EMC product names, see EMC Corporation Trademarks on EMC.com. VMware is a registered trademark of VMware, Inc. in the United States and/or other jurisdictions. All other trademarks used herein are the property of their respective owners. Part Number h6108.2 Understanding EMC Avamar with EMC Data Protection Advisor – Applied 2 Technology
  • 3. Table of Contents Executive summary.................................................................................................. 4 Audience ............................................................................................................................ 4 Introduction ............................................................................................................ 4 DPA licensing with Avamar ...................................................................................... 4 EMC Avamar ............................................................................................................ 5 EMC Avamar ............................................................................................................ 5 How does it work ..................................................................................................... 6 Avamar Server component ....................................................................................... 8 DPA 5.8 and Avamar 6.0 .......................................................................................... 9 Improved Avamar Reporting ..................................................................................... 9 Conclusion ............................................................................................................ 10 References ............................................................................................................ 10 Understanding EMC Avamar with EMC Data Protection Advisor – Applied 3 Technology
  • 4. Executive summary EMC® Data Protection Advisor (DPA) provides a unified data protection management window by collecting, monitoring, analyzing, and reporting on information from the entire data protection infrastructure. When EMC Avamar® is introduced into an environment, typically two or more backup solutions are being managed, so DPA eliminates the need for multiple interfaces. EMC Avamar Data Store is a fully integrated, software/hardware, backup and recovery solution that also includes data deduplication. Avamar’s deduplication begins at the client to be backed up. Avamar detects sub-file-level data changes and backs them up only if they have not already been backed up. This results in only the changed data being moved, enabling savings in the areas of time, processing, bandwidth, and storage requirements. EMC Data Protection Advisor enhances the abilities of Avamar monitoring and reporting, through its central historical repository, analysis engine, and robust reporting. Audience This white paper is intended for Data Protection Advisor professionals to provide insight into what Avamar is all about and how Data Protection Advisor extends reporting of Avamar environments. Introduction This white paper describes the EMC Avamar technology, including its architecture and various components. It then details how EMC Data Protection Advisor can extend Avamar by showing some of the different options available. DPA licensing with Avamar With DPA 5.8, DPA licenses Avamar environments based on the capacity of each grid. Customers who use DPA to monitor a variety of backup applications, including Avamar, will require both a DPA Backup Capacity license and Client license. For example, a customer with a 2 TB Avamar grid will require a corresponding 2 TB DPA Backup Capacity license, regardless of the number of Avamar clients. Avamar clients managed through EMC NetWorker® do not require a DPA Backup Capacity license as they are included as clients of the NetWorker server. Understanding EMC Avamar with EMC Data Protection Advisor – Applied 4 Technology
  • 5. EMC Avamar As mentioned previously, Avamar’s source-based deduplication begins at the client by detecting sub-file-level data changes and backing up only changed blocks of data. This results in only the changed data being transmitted over the network for backup and in huge savings with both the time taken to back up and with network bandwidth requirements. A backup client must be backed up in full once, and thereafter only changes are backed up to the Avamar Data Store. Each backup job is treated as a full-level backup since Avamar can recover the client in its entirety from any backup, even though only incremental changes are saved from each backup. Besides deduplicating data at the backup client level, Avamar also deduplicates data across clients and sites, a process that is known as global deduplication. This means that Avamar stores duplicate data/sub-file chunks of data only once. For example, since the majority of the C:WINDOWS subdirectory and its contents will be exactly the same across all Windows backup clients, Avamar needs to store this only once but can allow any client to restore from it. In environments where clients have been virtualized using VMware, Avamar also provides the same significant savings. With traditional backup solutions, virtual machines need to move weekly full and daily incremental backups through the VMware host’s physical resources (NIC, CPU memory, and so on), which can become overloaded and cause backup overruns and breached SLAs. With Avamar, sending only changed segments of data can potentially provide a 300 percent daily reduction in network resource usage compared to traditional backups. Avamar also does remote replication over standard wide area network (WAN) connections, thus providing disaster recovery replication without transporting tapes from one site to another. For full virtual machine backups, Avamar can also deduplicate data stored in virtual disks (VMware *.vmdk files), significantly reducing storage consumption and enabling replication of virtual disks across congested WANs. EMC Avamar Avamar’s deduplication begins at the client to be backed up. Avamar detects sub-file- level data changes and backs it up only if that sub-file (chunk) has not already been backed up. This results in only the “changed” data being transmitted over the network for backup, and also in sizable reductions on the time taken to conduct backup coupled with meeting a highly efficient bandwidth utilization requirement. This implies that a backup client needs to be “backed up” in FULL at least once, and thereafter only “changes” are backed up to the Data Store. This implies a traditional INCREMENTAL backup; however, each backup “job” is treated, and is, a FULL level backup as Avamar has the ability to recover the client in its entirety. Understanding EMC Avamar with EMC Data Protection Advisor – Applied 5 Technology
  • 6. Besides deduplicating at the backup client level, Avamar also deduplicates across clients and sites – this is also known as global deduplication. This means that duplicate data/sub-file chunks of data will only be stored once on the Avamar Data Store or grid. A typical example would be the C:WINDOWS sub-directory and its contents; this global deduplication benefit will the same across all Windows backup clients and thus Avamar only needs to store this directory once but the effect also allows any client to restore from it. As an example, a company logo and confidentiality statement that are stamped on every customer-facing presentation are stored only once on the grid but are available for all restores of that presentation no matter which business unit or division. In summary, global deduplication has no digital borders – global commonality is restricted only to the size of the Avamar grid. How does it work Avamar eliminates redundancy in backup data at the source, that is, before the data is transferred across the LAN or WAN during backups. Avamar agents are deployed on the systems to be protected (for example, physical or virtual servers, Network Data Management Protocol (NDMP) filers, desktops, laptops) to identify and filter over time duplicate data segments stored in files within a single host and across multiple systems. This ensures that each unique data segment is backed up only once across the enterprise. As a result, copied or edited files, shared applications, embedded attachments, and even daily changing databases generate only a small amount of day-to-day backup data. By moving only new, unique sub-file data segments, Avamar reduces the daily network bandwidth required and storage by up to 500x. By storing just a single instance of each sub-file data segment globally, Avamar also reduces total back-end disk storage by up to 50x for cost-effective, long-term, disk-based recovery. A key factor for eliminating redundant data at a sub-file (or segment) level is the method for determining segment size. Snapshot or replication technologies commonly use fixed-block/fixed-length segments. Unfortunately, even small changes to a dataset (for example, inserting data at the head of the file) can change all fixed- length segments after that insertion thus wiping out all deduplication in that dataset; this condition is called offset. In contrast, Avamar uses an intelligent method for determining segment size that inspects each segment in the data. Avamar’s patented method for determining segment size is designed to yield optimal efficiency across all systems in an enterprise. Avamar’s algorithm analyzes the binary structure of a dataset to determine segment boundaries that are context-dependent, so that Avamar’s client agents can identify the exact same segments for any dataset, no matter where that dataset is stored in the enterprise. Avamar’s segments average 24 KB in size and are then compressed prior to LAN or WAN transmission to an average of just 12 KB. By analyzing the binary structure, Avamar’s method works for all file types and sizes. For each 24 KB segment, Avamar generates a unique 20-byte ID, using the SHA-1 encryption algorithm. This unique ID is like a fingerprint for that segment. Avamar Understanding EMC Avamar with EMC Data Protection Advisor – Applied 6 Technology
  • 7. software then uses this unique ID to determine whether a data segment has been stored before. Files, directories, entire file systems, and even databases can be quickly and efficiently stored with a hierarchical map of these unique IDs. In summary, the benefits of Avamar are: • A reduction in daily network bandwidth and backup storage by up to 500x. • Daily full level backups across existing LAN/WAN bandwidths. • Up to 10x faster backup performance. • Total back-end disk backup storage reduction of up to 50 percent. • Up to 85 percent reduction in total client CPU utilization. Avamar clients run in low priority (or “nice” mode in UNIX) to avoid resource contention. While Avamar clients typically use 15 percent more CPU than traditional backup agents during backup operations, Avamar reduces the window required for backup operations by up to 10x, thus reducing overall CPU utilization. • Immediate single-step recovery. Avamar stores all backups as virtual full images, which can be immediately recovered in a single step to either their original destination or any other IP-addressable node that role-based access control permits. It is not necessary to restore data from full and incremental backups to reach the desired recovery point. Avamar Data Stores can be deployed in either single-node or scalable multinode configurations depending on the performance and capacity required. Built-in software includes a replication software module for efficient replication of Avamar Servers across WAN sites or any IP-based circuits. Avamar Data Store multinode configurations use a Redundant Array of Independent Nodes (RAIN) architecture, thus providing scalability, optimization, and resilience to individual node failure – RAIN does not support single-node configurations but is available in the Data Store and the previously mentioned configurations. Avamar Data Stores are offered in two primary classes: 3.3 and 2 TB high-density nodes and 1 TB standard density nodes (high and standard density nodes cannot be mixed in a single Avamar Data Store to ensure that RAIN reconciles all disk geometries of each potential data store that it protects in the grid). Maximum configuration Single node configuration (16 storage nodes) (standard density/high density) Licensed capacity 16 TB / 32 TB / 52.8 TB 1.0 TB / 2.0 TB / 3.3 TB Equivalent .55 PB / 1.1 PB / 2.4 PB 35 TB / 70 TB / 105 TB cumulative, traditional backup storage Table 1. Comparison of single- and multimode configurations Understanding EMC Avamar with EMC Data Protection Advisor – Applied 7 Technology
  • 8. Gigabit Ethernet is used with TCP/IP protocols. Avamar 6.0 bonds these interfaces for additional performance. Avamar Data Store is available in various models: • A scalable multinode (6-18 nodes, including spare and utility using RAIN technology, expandable in single same-size node increments) providing upgrade and high-availability options. • One- and two-node, fixed capacity models (ideal for remote offices or smaller data center environments) Avamar Servers are delivered with a supported operating system pre-installed (primarily a certified Intel x86 server running Red Hat Enterprise Linux 4 for Avamar versions 3-5, SUSE LINUX Enterprise 11.1 for Avamar 6.0), all with fully tested hardware from the factory. The Avamar software is installed onsite after hardware installation using kick-start media that has all the approved drivers, RPMs, and so on. Supportability features include remote access and management, email-home capabilities, and enabled SNMP. Avamar 6.0 goes one step further by including EMC Secure Remote Services (ESRS) with a secured VPN configured to alert both customer and EMC of disk failures, security patches, and remote support. ESRS also delivers the ability to move patches and updates to the server and install them. Avamar supports all major operating systems and provides dedicated agents for protecting databases and network-attached storage with NDMP for both EMC Celerra® (including the new EMC VNX™ system) and NetApp systems. Avamar Server component Avamar Servers store client backups and manage the policies for scheduling and for determining datasets and retention periods. An Avamar backup provides a point-in- time full copy of data that can be restored on demand. In multinode Avamar Server environments, the components of the Avamar Server are segregated across multiple servers for scalability and performance. The two primary node types configured in a multimode Avamar Server are: • Storage node – stores the actual backup data. Storage nodes can be added to an Avamar Server over time with no downtime required. Avamar clients connect directly with the storage node, and client connections and data are load balanced across storage nodes. • Utility node –schedules and manages background Avamar Server jobs. One utility node is configured per Avamar Server. The NDMP Accelerator node is an optional generic utility-like node running Red Hat/SLES that works with NDMP in order to provide protection for NAS filers. Understanding EMC Avamar with EMC Data Protection Advisor – Applied 8 Technology
  • 9. For integration with reporting tools, Avamar uses a Postgres SQL database to store information about backup activities and policies. This database can by probed by standard ODBC calls using a published schema. DPA 5.8 and Avamar 6.0 To gather data from EMC Avamar, DPA connects directly to the Avamar database via the mcdb database on the default port (5555) for Avamar, If these parameters were modified, change the Avamar Config and Avamar Job Monitor requests to override these DPA defaults to match the new Avamar parameter settings. When DPA connects to the database, it uses the viewuser account to log in to the database. If the Avamar installation was modified so that “viewuser” does not have permission to log in to the database, or the password for this user has been modified, change the user and password in the Default Avamar Credentials to reflect the username and password that should be used to connect to the database. The Collector must be installed on a host that is in the same time zone as the Avamar server. Improved Avamar Reporting DPA 5.8 includes new features that enhance the reporting capabilities for Avamar environments: • Backup Job Report – The following figure is an example of the updated Backup jobs report. This report now includes fields such as backup path, error summary code, and status of the code. This allows administrators to manage backups more effectively. Figure 1. Example updated Backup Jobs Report • Used Capacity Report - The following figure is a sample Used Capacity Report, which contains the total used capacity of the Avamar grid. In addition it also indicates utilization of each Avamar Server. Understanding EMC Avamar with EMC Data Protection Advisor – Applied 9 Technology
  • 10. Figure 2. Used Capacity Report • Restore Job Report - The following figure is a sample Restore Job Report, which now lists Job ID, backup number, backup label, recorded data time, number files and bytes scanned. Conclusion With the addition of these new reports to DPA, Avamar allows customers to more effectively manage their environments. In addition administrators can accurately understand consumption of each Avamar grid and appropriately make retention and management decisions more accurately. While DPA can be useful in an Avamar-only environment, its value increases when an environment has multiple backup solutions, multiple sites, or multiple business units. This paper does not cover all reports that are available within DPA, but it does highlight areas of interest when using DPA with EMC Avamar. References The following can provide additional information and can be found on Powerlink®, EMC’s password-protected customer- and partner-only intranet. • EMC Data Protection Advisor Reference Guide • EMC Data Protection Advisor Administration Guide • EMC Data Protection Advisor Installation Guide • EMC Data Protection Advisor User Guide • EMC Data Protection Advisor Compatibility Matrix For access to evaluation licenses go to the Data Protection Advisor page on EMC.com Understanding EMC Avamar with EMC Data Protection Advisor – Applied 10 Technology