{"id":5663,"date":"2015-09-20T11:03:40","date_gmt":"2015-09-20T01:03:40","guid":{"rendered":"http:\/\/nsrd.info\/blog\/?p=5663"},"modified":"2015-09-20T15:02:08","modified_gmt":"2015-09-20T05:02:08","slug":"melbourne-dpug-and-vmware-data-protection","status":"publish","type":"post","link":"https:\/\/nsrd.info\/blog\/2015\/09\/20\/melbourne-dpug-and-vmware-data-protection\/","title":{"rendered":"Melbourne DPUG and VMware Data Protection"},"content":{"rendered":"<p>Recently a colleague and I\u00a0initiated the Melbourne Data Protection User Group (DPUG).<\/p>\n<p><a href=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2015\/09\/bigStock-DPUG.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5664\" src=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2015\/09\/bigStock-DPUG.jpg\" alt=\"Pug in a pile of backup tapes\" width=\"600\" height=\"411\" srcset=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2015\/09\/bigStock-DPUG.jpg 600w, https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2015\/09\/bigStock-DPUG-300x206.jpg 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p>If you&#8217;re interested in joining and participating and based in Melbourne, you can find details for the user group over at <a href=\"http:\/\/www.meetup.com\/Melbourne-Data-Protection-User-Group-DPUG\/\" target=\"_blank\">Meetup<\/a>.<\/p>\n<p>Our first presentation was on\u00a0Wednesday 9 September, and EMC Melbourne were kind enough to provide the office space for the session. That being said, DPUG is not about EMC products &#8211; it&#8217;s designed to be\u00a0a vendor neutral community forum to discuss techniques,\u00a0strategies and best practices relating to data\u00a0protection.<\/p>\n<p>Starting DPUG was a healthy reminder that\u00a0<em>data protection<\/em> is an overloaded term in the IT\u00a0industry. To those of us who work within\u00a0data storage and more broadly, IT\u00a0infrastructure,\u00a0<em>data protection<\/em>\u00a0covers concepts such as\u00a0backup and recovery,\u00a0continuous availability, continuous data protection, replication, snapshots and so on. For people who work at the application layer\u00a0or communication\u00a0layer though, data\u00a0protection is almost invariably interpreted to be something like\u00a0<em>security,\u00a0data privacy<\/em>\u00a0or <em>intrusion detection\/threat mitigation<\/em>.\u00a0Data protection is a term we share with other areas of the industry. In the end it&#8217;s\u00a0<em>all<\/em> data protection, but it has two very different areas of focus.<\/p>\n<p>Our first session was about VMware Data Protection.\u00a0We&#8217;re now seeing a\u00a0very high percentage of\u00a0virtualisation within most businesses \u2013 it&#8217;s not uncommon to see\u00a080% or 90% virtualisation now, and many companies are continuing to pursue a strategy of achieving 100% system and infrastructure virtualisation.<\/p>\n<p>In the VMware Data Protection presentation I walked\u00a0the audience through a history of\u00a0how the industry overall has\u00a0protected virtual machines since their inception in the midrange space. First, we started with treating virtual machines like regular hosts \u2013 installing agents on each virtual machine and backing it up as if it were no different from\u00a0a physical host.\u00a0That provides a high degree of granularity and\u00a0flexibility, but as we know, virtualisation is about cooperative resource sharing, whereas traditional backups are about minimising the time it takes to get data from\u00a0the client into the protection storage.\u00a0There&#8217;s not a lot of compatibility between &#8220;cooperative resource sharing&#8221; and &#8220;minimising the time it takes to get data from the client&#8230;&#8221;, and a poorly designed backup strategy using in-guest backup agents can bring\u00a0virtual infrastructure to a screaming halt \u2013 even today.<\/p>\n<p>The next attempt to provide a comprehensive solution for backing up\u00a0virtual machines saw businesses installing\u00a0backup agent software on the hypervisors, and writing custom scripts to snapshot virtual machines prior to copying them to protection storage. This was usually error prone and when you stop to think about how virtual machines are usually just very big files, it meant that a single change within a virtual machine would trigger a new full backup every time. Once technology such as VMotion became available these techniques became difficult if not impossible to maintain \u2013 you could not really predict\u00a0<em>where<\/em> a virtual machine would be for backups at any given time. What&#8217;s more, hypervisors are a bit like NAS appliances \u2013 they&#8217;re designed to do one thing really well, and you shouldn&#8217;t be trying to install third party software on them.<\/p>\n<p>The solution was an API based approach, of course.\u00a0While different in practice, you can equate the API approach of VMware backups to the NDMP approach of NAS. The virtualisation system provides an integration point for backup software to use, and leveraging that, backup\u00a0products are able to streamline the\u00a0data protection process with image level backups\u00a0<em>and<\/em> file level recoveries from those image level backups.<\/p>\n<p>This is something that\u00a0NetWorker for instance has been doing for some time \u2013 most\u00a0recently with VBA.\u00a0VBA is something I&#8217;ve covered a few\u00a0times over\u00a0the last twelve months (<a href=\"https:\/\/nsrd.info\/blog\/2014\/10\/20\/the-current-state-of-virtual-machine-backups-in-networker\/\" target=\"_blank\">Current state of Virtual Machine Backups in NetWorker<\/a>, <a href=\"https:\/\/nsrd.info\/blog\/2015\/01\/10\/networker-8-2-and-vba-instant-access\/\" target=\"_blank\">NetWorker 8.2 and VBA Instant-Access<\/a>, and <a href=\"https:\/\/nsrd.info\/blog\/2015\/02\/25\/testing-and-debugging-an-emergency-restore\/\" target=\"_blank\">Testing and Debugging an Emergency Restore<\/a>, for instance).<\/p>\n<p>VMware offers its own version of VBA as well so that businesses (particularly smaller ones)\u00a0can still protect their environments. It used\u00a0to be split into VDP and VDP\/A, but as of vSphere 6 Essentials,\u00a0those\u00a0options have been combined into a single (free) VDP.\u00a0VDP can&#8217;t do everything VBA can do\u00a0\u2013 for example,\u00a0VDP can&#8217;t:<\/p>\n<ul>\n<li>Perform instant-access to a virtual machine (powering on from\u00a0Data Domain storage)<\/li>\n<li>Perform tape-out<\/li>\n<li>Write to storage other than\u00a0Data\u00a0Domain or internal storage<\/li>\n<\/ul>\n<p>As a means of demonstrating\u00a0some of the advantages of virtual machine image level backups though, VDP is\u00a0useful, and that&#8217;s what I used in the DPUG session earlier this month. And now, after taking the plunge and investing in some screen recording software, I&#8217;ve made three of the demos from the DPUG session available for viewing. If you&#8217;re using VBA already\u00a0you&#8217;ll be familiar with all of these. However, if you&#8217;ve not yet taken the plunge in utilising VBA for your backup environment, check them out \u2013 while the demos show the VMware Data\u00a0Protection Appliance (VDP) in use, they&#8217;re equally applicable and in fact it&#8217;s the same process for a VBA install in each\u00a0situation.<\/p>\n<p>Creating and executing a protection policy:<br \/>\n<iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/rdma1_Ur6C4\" width=\"420\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p>Executing\u00a0an image level\u00a0recovery that makes use of changed block tracking:<br \/>\n<iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/gST0TfKevT0\" width=\"420\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p>Executing a file level recovery from an image level backup:<br \/>\n<iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/g68jGzBAcgA\" width=\"420\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p>Don&#8217;t forget, if you&#8217;re in Melbourne and want to participate in DPUG, <a href=\"http:\/\/www.meetup.com\/Melbourne-Data-Protection-User-Group-DPUG\/\" target=\"_blank\">you&#8217;re more than welcome<\/a> \u2013 regardless of whether you use EMC products or not. We want this to be an open group and look forward to seeing a broad spectrum of regular companies, integrators and vendors\u00a0participating!<\/p>\n<p>Also, if you&#8217;re interested in seeing screencasts for NetWorker related topics on this blog, let me know.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recently a colleague and I\u00a0initiated the Melbourne Data Protection User Group (DPUG). If you&#8217;re interested in joining and participating and&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[5,1181,1213],"tags":[1262,1265,1266,1267,275,282,1261,1264,1263,1260],"class_list":["post-5663","post","type-post","status-publish","format-standard","hentry","category-backup-theory","category-data-domain-2","category-vba","tag-backup-and-recovery","tag-cbt","tag-change-block-tracking","tag-changed-block-tracking","tag-data-domain","tag-data-protection","tag-dpug","tag-file-level-recovery","tag-image-level-backup","tag-vdp"],"aioseo_notices":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/pKpIN-1tl","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/5663","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/comments?post=5663"}],"version-history":[{"count":8,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/5663\/revisions"}],"predecessor-version":[{"id":5672,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/5663\/revisions\/5672"}],"wp:attachment":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/media?parent=5663"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/categories?post=5663"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/tags?post=5663"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}