{"id":5551,"date":"2015-05-13T19:47:02","date_gmt":"2015-05-13T09:47:02","guid":{"rendered":"http:\/\/nsrd.info\/blog\/?p=5551"},"modified":"2018-12-11T12:58:06","modified_gmt":"2018-12-11T02:58:06","slug":"one-target-to-rule-them-all","status":"publish","type":"post","link":"https:\/\/nsrd.info\/blog\/2015\/05\/13\/one-target-to-rule-them-all\/","title":{"rendered":"One target to rule them all"},"content":{"rendered":"<h3>Introduction<a href=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2015\/02\/data-domain.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5435\" src=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2015\/02\/data-domain.jpg\" alt=\"Data Domain\" width=\"600\" height=\"291\" srcset=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2015\/02\/data-domain.jpg 600w, https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2015\/02\/data-domain-300x146.jpg 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><\/h3>\n<p>It&#8217;s&nbsp;true there are some&nbsp;data types that&nbsp;broadly aren&#8217;t suitable to sending to Data&nbsp;Domain \u2013 any&nbsp;more than they&#8217;re suitable&nbsp;for sending to any other deduplication appliance or system within any environment. Large imaging&nbsp;data and video files will yield minimal deduplication except over successive backups (assuming&nbsp;static data), and&nbsp;compressed and\/or encrypted&nbsp;data aren&#8217;t all suited&nbsp;either.<\/p>\n<p>But the majority of data within most organisations&nbsp;<em>is<\/em> suited for writing to Data&nbsp;Domain systems.<\/p>\n<p>Years ago when EMC purchased Data&nbsp;Domain, I don&#8217;t think anyone anticipated just what they had in mind for the appliance. I certainly didn&#8217;t \u2013 and I&#8217;d been involved in the backup industry for&nbsp;probably&nbsp;15 years at that point. Deduplication had been kicking around for several&nbsp;years, but it hadn&#8217;t been mainstreamed&nbsp;to the degree EMC has achieved.<\/p>\n<p>The numbers practically speak for themselves. Data&nbsp;Domain represents an overwhelming lions share of the deduplication appliance space \u2013 but I&#8217;m not going to quote numbers here. I&#8217;m going&nbsp;to talk about the architectural vision of Data Domain.<\/p>\n<p>As a target-only appliance, Data&nbsp;Domain represents considerable&nbsp;advantage to any business that deploys it, but that&#8217;s&nbsp;just the tip of the iceberg. The real&nbsp;<em>magic<\/em> happens when we start to consider&nbsp;the simple fact that a Data Domain is&nbsp;<em>not<\/em> a dumb appliance.&nbsp;EMC have chosen to harness&nbsp;the&nbsp;platform to deliver maximum bang for buck for&nbsp;any company that walks down that path.<\/p>\n<h3>May the source be with you<\/h3>\n<p>Target based deduplication works&nbsp;brilliantly for&nbsp;drastically reducing the total amount of data stored, but it still&nbsp;results in that data being&nbsp;<em>sent<\/em>.&nbsp;Avamar&nbsp;demonstrates this overwhelmingly \u2013 its source based deduplication backup process is unbelievably efficient and powerful&nbsp;and is a powerfully attractive choice&nbsp;for many businesses, particularly&nbsp;those&nbsp;in the&nbsp;<span style=\"text-decoration: underline;\"><em>x<\/em><\/span>aaS&nbsp;industry.<\/p>\n<p>Data Domain&#8217;s Boost&nbsp;functionality extends its deduplication technology&nbsp;up to the origin of the data. For products like NetWorker, Avamar and VDP\/VDPA, this goes right to the source. (For third party products such as&nbsp;NetBackup, it covers the media servers.)<\/p>\n<p>If Boost had stopped at NetWorker and Avamar integration, it would have been a remarkably powerful efficiency hook for many businesses, but&nbsp;there&#8217;s more power to be had.&nbsp;The extension&nbsp;of Data Domain&nbsp;Boost to include support for&nbsp;enterprise applications such as Oracle, SQL Server, SAP, etc., provides unparalleled extensibility in the backup space to organisations. It also means that businesses who have deployed other backup technologies but leverage the power of Data Domain deduplication in their data protection strategy can get direct client deduplication performance&nbsp;for what is often their most mission critical systems and applications.<\/p>\n<p>I&#8217;m the first to&nbsp;admit that I&#8217;ve spent years trying to&nbsp;convince DBAs to hand over control of their application backups to NetWorker administrators. It&#8217;s a discussion I&#8217;ve won as much as I&#8217;ve lost, but the Data Domain plugins for&nbsp;databases have&nbsp;proven one key lesson:&nbsp;when I&#8217;ve&nbsp;&#8216;lost&#8217; that discussion it&#8217;s not been through lack of conviction, but through lack of <em>process<\/em>. DBAs are all for efficiencies in the backup process, but given the enterprise criticality of databases in so many organisations,&nbsp;much of&nbsp;the push back on backup centralisation has been from a lack of&nbsp;<em>control<\/em> of the process.<\/p>\n<p>The Boost application plugins get past that by allowing a business to make the decision&nbsp;to integrate their&nbsp;application backups into centralised backup&nbsp;storage while allowing for highly granular control of the backup process through the agreed and trusted scheduling&nbsp;methods that offer considerably more granular and&nbsp;flexible controls. Backup products offer scheduling, of course, but they&#8217;re not meant to be the&nbsp;bees knees of scheduling that you&#8217;ll find in products devoted&nbsp;<em>solely<\/em> to that purpose. <em>That&#8217;s<\/em> what DBAs have mostly resisted. (This, for what it&#8217;s worth, is the difference between&nbsp;<em>app-centric<\/em>&nbsp;aspects to backup and recovery and a&nbsp;<em>decentralised<\/em> backup&nbsp;&#8216;system&#8217;.)<\/p>\n<p>Here&#8217;s where we&#8217;re at with Data Domain \u2013&nbsp;it now sits at&nbsp;a nexus in the&nbsp;Data Centre for data&nbsp;protection and nearline archival storage:<\/p>\n<p><a href=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2015\/05\/May-the-source-be-with-you.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-5561\" src=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2015\/05\/May-the-source-be-with-you.jpg\" alt=\"May the source be with you\" width=\"800\" height=\"616\" srcset=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2015\/05\/May-the-source-be-with-you.jpg 1009w, https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2015\/05\/May-the-source-be-with-you-300x231.jpg 300w, https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2015\/05\/May-the-source-be-with-you-900x693.jpg 900w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/a><\/p>\n<p>(Yes, it&#8217;s even very well suited for archival workloads.)<\/p>\n<p>NetWorker, Avamar, VDP\/VDPA,&nbsp;Client Direct, Enterprise Apps \u2013 I could go on \u2013 Data Domain sits at the centre ready to receive the data&nbsp;you want to send to it.<\/p>\n<p>But that diagram isn&#8217;t&nbsp;<em>quite<\/em> complete. To truly get the&nbsp;maximised efficiency out of Data Domain, the picture really should look more like this:<\/p>\n<p><a href=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2015\/05\/Protecting-the-Protection.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-5562\" src=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2015\/05\/Protecting-the-Protection-1024x553.jpg\" alt=\"Protecting the Protection\" width=\"695\" height=\"375\" srcset=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2015\/05\/Protecting-the-Protection-1024x553.jpg 1024w, https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2015\/05\/Protecting-the-Protection-300x162.jpg 300w, https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2015\/05\/Protecting-the-Protection-900x486.jpg 900w, https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2015\/05\/Protecting-the-Protection.jpg 1440w\" sizes=\"auto, (max-width: 695px) 100vw, 695px\" \/><\/a><\/p>\n<p>That&#8217;s right \u2013 logically, a Data Domain solution will have at least&nbsp;<em>two<\/em> Data Domains in it, so that whatever you&#8217;re protecting via the Data Domain will itself be protected. Now, by itself, Data Domain offers excellent protection for the&nbsp;data you&#8217;re&nbsp;storing, but unlike what most people think of on this front,&nbsp;RAID-6 storage protection is just the tip of the iceberg. RAID-6 is nice \u2013 it protects you from two&nbsp;drive failures at any point. On top of that though, you have the Data Invulnerability Architecture that you&#8217;ll hear EMC folks talk about quite regularly \u2013 that&#8217;s the magic sauce. The Data Domain doesn&#8217;t just sit there storing your data: it stores it, it checks it, it reads it again, and it checks it as part of regular verification. (If&nbsp;you want to compare it to tape, imagine having a&nbsp;tape library big enough to store every tape you keep for retention and constantly sits there loading all the tapes and confirming all the data can be read back.)<\/p>\n<p>But we all know in the data protection world that you still need that&nbsp;<em>added<\/em> protection of keeping a second copy&nbsp;of that data, regardless of whether that&#8217;s for compliance or for true disaster protection.&nbsp;In terms of absolute efficiency, the&nbsp;absolute&nbsp;<em>best<\/em> way you&#8217;ll get a secondary copy of that data is via the global&nbsp;deduplicated replication offered between two&nbsp;Data Domains. (For what it&#8217;s worth, that&#8217;s&nbsp;where some companies make&nbsp;the mistake of deploying tape as their secondary copy from&nbsp;an original backup target of Data Domain: what&#8217;s the point of deploying efficient deduplication if the first thing you&#8217;re going to do is&nbsp;<em>rehydrate<\/em> all&nbsp;the content again?)<\/p>\n<h4>Aside: Coming back to encryption and compression<\/h4>\n<p>Earlier I said that compressed and encrypted workloads aren&#8217;t necessarily suited to Data Domain. That&#8217;s true,&nbsp;<em>but<\/em> that usually reflects an opportunity to revisit the&nbsp;process and thinking behind those workloads.<\/p>\n<p>Compression is typically used in a data streaming activity for data protection because of a requirement to minimise the&nbsp;amount of data going across the network. Boost eliminates that need by doing something better than compression at&nbsp;the client side \u2013 deduplication. Deduplication doesn&#8217;t just compress the original data, but it substantially reduces the original data by not even bothering to send data that already exists at the target. For instance,&nbsp;if&nbsp;I turn my attention to Oracle, the two most common reasons why DBAs will create compressed Oracle backups are:<\/p>\n<p>(a) They&#8217;re writing them to primary storage and trying to minimise the footprint, or<\/p>\n<p>(b)&nbsp;They&#8217;re&nbsp;writing them to NAS or some other form of network storage, and want to minimise the amount of data sent over busy links.<\/p>\n<p>Both of those are squarely addressed by Data&nbsp;Domain:<\/p>\n<ul>\n<li>For (a), the footprint is automatically reduced by writing it&nbsp;in uncompressed format&nbsp;to the Data Domain. It handles the deduplication automatically. In fact, it&#8217;ll be a lot more space efficient than say, the three most recent&nbsp;database backups being written to Tier-1\/Primary&nbsp;storage.<\/li>\n<li>For (b), because only unique data is sent over the network, and that data is compressed by Boost before it&#8217;s sent over the network, you&#8217;re still ending up with a more efficient network transfer than writing a compressed copy over the network.<\/li>\n<\/ul>\n<p>Encryption might be considered a trickier subject, but it&#8217;s not really. There&#8217;s two types of encryption a business might&nbsp;require \u2013 at rest, or in-flight. Data Domain has supported&nbsp;encryption at&nbsp;rest for quite a long time, and the recent support for&nbsp;in-flight encryption has completed that piece of the puzzle. (That in-flight encryption is integrated in such a way that it still allows for local\/source deduplication and associated pre-send compression, too.)<\/p>\n<h3>What all this means<\/h3>\n<p>When EMC first acquired Data&nbsp;Domain, they&nbsp;acquired a&nbsp;solid product&nbsp;that had already established excellent customer trust&nbsp;built from high reliability and performance. While both of those features have continued to grow (not to mention capacity &#8230; have you&nbsp;<em>seen<\/em> the specs on the <a href=\"http:\/\/www.techchannelmea.com\/storage\/emc-unveils-data-domain-dd9500\">Data Domain 9500<\/a>?),&nbsp;those&nbsp;features alone don&#8217;t make&nbsp;for a highly extensible product (just a reliable big bucket of storage). The extensibility comes from the vertical integration right up into the application stack, and the horizontal integration across a&nbsp;multitude of use cases.<\/p>\n<p>Last year&#8217;s <a href=\"https:\/\/nsrd.info\/blog\/2015\/02\/15\/2014-networker-usage-report\/\" target=\"_blank\">survey results<\/a> revealed a&nbsp;very high number of NetWorker&nbsp;environments leveraging Data Domain&nbsp;within their environment, but what we see if we step back a little bit from a single-product focus is that Data&nbsp;Domain&nbsp;is a&nbsp;<em>strategic<\/em> investment in the enterprise, able to be&nbsp;utilised for a plethora of&nbsp;scenarios across the board.<\/p>\n<p>So there&#8217;s two lessons \u2013 one for those with Data Domain already, and one for those&nbsp;preparing to&nbsp;jump into deduplication: if you&#8217;ve already got Data Domain in your environment, start looking at its integration points and talking to either EMC or your supplier about where else Data Domain&nbsp;can offer synergies, and if you&#8217;re looking at deploying, keep in mind that it&#8217;s a highly flexible&nbsp;appliance capable of fitting in to multiple workloads.<\/p>\n<p>Either way, that&#8217;s how you achieve an excellent return on investment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction It&#8217;s&nbsp;true there are some&nbsp;data types that&nbsp;broadly aren&#8217;t suitable to sending to Data&nbsp;Domain \u2013 any&nbsp;more than they&#8217;re suitable&nbsp;for sending to&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[3,5],"tags":[275,282],"class_list":["post-5551","post","type-post","status-publish","format-standard","hentry","category-architecture","category-backup-theory","tag-data-domain","tag-data-protection"],"aioseo_notices":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/pKpIN-1rx","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/5551","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/comments?post=5551"}],"version-history":[{"count":13,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/5551\/revisions"}],"predecessor-version":[{"id":7430,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/5551\/revisions\/7430"}],"wp:attachment":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/media?parent=5551"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/categories?post=5551"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/tags?post=5551"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}