CV10 Virtual Data Management Student Guide
CV10 Virtual Data Management Student Guide
CV10 Virtual Data Management Student Guide
Management
Student Guide
2|
Copyright
1999-2014 CommVault Systems, Inc. All rights reserved
CommVault, CommVault and logo, the CV logo, CommVault Systems, Solving Forward, SIM,
Singular Information Management, Simpana, CommVault Galaxy, Unified Data Management, QiNetix,
Quick Recovery, QR, CommNet, GridStor, Vault Tracker, InnerVault, QuickSnap, QSnap, Recovery
Director, CommServe, CommCell, IntelliSnap, ROMS, Simpana OnePass, CommVault Edge and
CommValue, are trademarks or registered trademarks of CommVault Systems, Inc. All other third party
brands, products, service names, trademarks, or registered service marks are the property of and used to
identify the products or services of their respective owners. All specifications are subject to change
without notice.
All right, title and intellectual property rights in and to the Manual is owned by CommVault. No rights
are granted to you other than a license to use the Manual for your personal use and information. You may
not make a copy or derivative work of this Manual. You may not sell, resell, sublicense, rent, loan or
lease the Manual to another party, transfer or assign your rights to use the Manual or otherwise exploit or
use the Manual for any purpose other than for your personal use and reference. The Manual is provided
"AS IS" without a warranty of any kind and the information provided herein is subject to change without
notice.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
|3
Table of Contents
(R10.2)
Preliminaries................................................................................................................................................ 8
Course Building Blocks ................................................................................................................................ 9
Course Objective ....................................................................................................................................... 10
Common Technology Engine ..................................................................................................................... 11
Training Environment ................................................................................................................................ 12
Education Advantage ................................................................................................................................ 13
4|
Virtual Server Configuration (V10) ............................................................................................................ 48
Virtual Server Agent Host .......................................................................................................................... 49
Virtualization Clients ................................................................................................................................. 50
Configuring the Virtual Server Agent ........................................................................................................ 51
Discovering Virtual Machines .................................................................................................................... 52
Configuring Subclients ............................................................................................................................... 53
Transport Modes ....................................................................................................................................... 55
SAN Transport Mode ................................................................................................................................. 56
Hot-Add Transport Mode .......................................................................................................................... 57
LAN (NBD) Transport Mode....................................................................................................................... 58
Transport Mode Summary ........................................................................................................................ 60
IntelliSnap Technology .............................................................................................................................. 61
IntelliSnap Architecture........................................................................................................................... 62
Incremental Snapshots .............................................................................................................................. 65
SnapVault/SnapMirror Whats the difference? ..................................................................................... 67
Virtual Machine Recovery ......................................................................................................................... 69
Restore Types ............................................................................................................................................ 70
File Level Recovery .................................................................................................................................... 72
Restoring Multiple Virtual Machines......................................................................................................... 73
Restore VM to Different Destinations ....................................................................................................... 74
Using Web Console for Restores ............................................................................................................... 76
Using VM Plugin ........................................................................................................................................ 77
Module Review.......................................................................................................................................... 78
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
|5
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
6|
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Introduction | 7
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
8 | Introduction
Preliminaries
Who am I?
Who are you?
Why are we here?
How will this course be conducted?
Preliminaries
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Introduction | 9
Monitoring
VM Life Cycle
VirtualizeMe
Virtual Server Agent
Basic Concepts & Terminology
Virtual Environments
No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
10 | Introduction
Course Objective
Course Objective
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Introduction | 11
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
12 | Introduction
Training Environment
Training Environment
The CommVault Virtual Training environment, when available, can be used by students to
perform course activities or explore the products user interface. The training environments are
NOT fully resourced, nor are all components installed or available. All course activities are
supported, but due to host memory (RAM and disk space) constraints, only a limited number of
Virtual Machines can be operational at the same time and few tasks beyond the activities listed
in the course manual can be performed. Please discuss with your instructor what other
activity/tasks you can do.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Introduction | 13
Education Advantage
Track Career
Paths
Self Assessment
Register for
Courses
Track
Certification
Progress
Leave feedback
Education Advantage
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
14 | Introduction
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Module 1
Understanding Virtual
Environments
No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Topics
Virtual Software
Virtual Software Overview
Why focus on VMware
Topics
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
VIRTUAL SOFTWARE
Virtual Software
As is often the case, virtual environments are built for application performance and end user
experience without regard for data protection/management requirements. There is nothing
wrong with this, but it does make achieving the best data protection/management experience a
bit harder.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Free Hypervisor
VMware
ESXi
Microsoft
Hyper-V Server
Citrix
XenServer (Free
Edition)
Microsoft Server 2008 XenServer Advanced,
R2
Enterprise, and
Platinum Editions
Hyper-V Snap-in or
XenCenter and 3rd
System Center Virtual Party
Machine Manager
(SCVMM)
Paid Virtualization
vSphere
Management
vCenter
Interface
vSphere Agent
Virtual Machine
ConnectionTool (RDP)
Integration
VMware Tools
Integration Tools
XenCenter or Xen
Server Console
(limited)
XEN Tools
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Throughput (MB/Sec)
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Optimizing Performance
Disk Read
No unauthorized use, copy or distribution.
Optimizing Performance
In a SAN environment, the smallest hardware unit used by a SAN storage array to build a LUN
out of multiple physical disks is a called a chunk or a stripe. To optimize I/O, chunks are usually
much larger than sectors. Thus a SCSI I/O request that intends to read a sector in reality reads
one chunk.
On top of this, lies the Virtual File system which is formatted in blocks ranging from 1MB to
8MB. Lastly, the file system used by the guest operating system optimizes I/O by grouping
sectors into so called clusters (allocation units).
Storage structure alignment for better performance needs to address all the above layers. An
unaligned structure may cause many additional I/O operations when only one cluster is ready
by the guest operating system, but multiple blocks from the virtual file system and possibly
more chunks from the storage array are required.
As shown by the graph - for random reads/writes, the performance gained by alignment is
insignificant. However, for sequential reads/writes (e.g. those performed by backups) - the
performance/throughput improvement is significant.
VMFS volumes created with the Virtual Infrastructure Client (vSphere Client) are automatically
aligned along the 64KB boundary.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Windows 2012, 2008, and Windows 7 will automatically align partitions properly using the GUI
disk management tools. For prior versions of Windows, there is an additional layer of NTFS
partitioning that requires alignment using the diskpart.exe tool.
For Linux platforms, alignment can be done using fdisk.
WARNING: Due to the destructive nature of the alignment procedures, alignment is always
performed BEFORE data is placed on the volume. Alignment of the OS partition is unnecessary.
Only alignment of the data partitions is recommended. Weigh the benefits versus the cost of
performing alignment before attempting an alignment retro-fit.
In the case of dynamically expanding and differencing virtual disks, proper alignment cannot be
guaranteed and there is a performance penalty. Therefore, we recommend using fixed-size
(thick) virtual disks within a Hypervisor environment whenever possible. Avoid using
dynamically expanding and/or differencing virtual disks unless a good reason is found for their
use.
Alignment issues also exist with Hyper-V and XenServer. As these vendors use native file
systems, only the storage and the guest file system require alignment.
See VMwares Recommendations for Aligning VMFS partitions and NetApps Best Practices
for File System Alignment in Virtual Environments.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Hypervisor
Virtual Machines
VMDK/VHD Files
Linked/Mapped LUNs
RAW LUNs
Virtual/Native File System
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Physical Disks
Virtual Machine disks exist as either files on a native or hypervisor managed file system or as
Raw LUN(s) presented by the storage server. The Virtual Server Agent cannot backup physical
Raw LUN(s). In this situation, you would need to use a backup agent within the guest operating
system.
According to studies, Raw LUN/Physical/Pass-through Disk performance is only marginally
better than using a Disk File (.vmdk; .vhd). From a management aspect, using a Raw LUN is
much more difficult.
So why use Raw LUNs?
Three common reasons for using Raw LUNs:
Virtual disk file becomes too large to effectively manage (i.e. > 1TB).
Leverage native SAN tools (Hardware Snapshot, Backups).
Virtualized Microsoft Clusters (MSCS) are a requirement.
For VMware this means you can create a VMFS file system (VMware proprietary cluster file
system) and then create VMDK files to be assigned to virtual machines. With ESXi 5.0, if you
create a new VMFS5 datastore, the device is formatted with GUID Partition Table (GPT). The
GPT format enables you to create datastores up to 64TB. Alternatively you can assign RDM or
Raw Device Mappings which are essentially Raw LUNs that are assigned to the Guest without
any intervention from the hypervisor.
For Microsoft this means you can create an NTFS file system and then create VHD files to be
assigned to virtual machines. Alternatively you can assign Physical Hard Disk or Linked Disk
which is a pass-through to the LUN similar to the VMware RDM.
With Windows Server 2008 R2 Microsoft introduced a "clustered file system" called CSV (Cluster
Shared Volumes). In the strictest terms, VMFS and CSV are not clustered file systems as they
lack some of the scalability functionalities typical of such technologies. However, for the
purpose of this training we will refer to them as the Virtual File System (VFS) in which multiple
hosts can access the same LUN at the same time to store virtual machines instantiated on
different servers.
XenServer does not impose its own file system on storage systems but, instead, leverages the
native storage capabilities more directly. For example, with a file-based shared storage system
such as NFS, XenServer VMs are stored directly using Microsoft VHD (Virtual Hard Disk) format.
With block-based storage such as iSCSI or Fibre Channel SANs, XenServer extends VHD with the
open LVM (Logical Volume Manager) standard for volume management.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Hyper-V Limitations
Physical disks that are directly attached to a virtual machine or iSCSI disks attached within the
guest OS cannot be backed up by the Hyper-V VSS writer. As a result, this type of disk will not be
included in any backup performed by the CommVault software. In this situation, you would
need to use a backup agent within the guest operating system.
All disks being used by the virtual machine are configured within the guest operating system as
NTFS-formatted basic disks. Virtual machines that use storage on which the physical partitions
have been formatted as dynamic disks or the FAT32 file system prevent an online backup from
being performed. This is not the same as dynamically expanding virtual hard disks, which are
fully supported by backup and restore operations.
Volume Shadow Copy Service must be enabled on all volumes used by the virtual machine with
a specific configuration. Each volume must also serve as the storage location for shadow copies
of the volume. For example, the shadow copy storage for volume C: must be located on C:.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Key issues:
Disk capacity utilization will be much higher in a thin model compared with the
traditional/thick model.
Thin disks suffer slight performance impact from overhead in expanding disk to
accommodate more data.
Thin disks can cause big problems in your environment if left unmonitored. Essentially thin
disk technology allows you to overcommit disk space.
Thin disks grow or inflate as data is written to previously unwritten disk blocks, but they
do not automatically shrink or deflate when data is deleted.
Avoid doing disk defragmentation on VMs with thin disks. This will cause the VM disk file
to grow quickly.
Simpana software supports backing up both thick and thin disks.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
For CBT to identify altered disk sectors since the last change ID, the following items are
required:
The host must be ESX/ESXi 4.0 or later.
The virtual machine owning the disks to be tracked must be hardware version 7 or later.
I/O operations must go through the ESX/ESXi storage stack. So NFS is supported, as is RDM
in virtual compatibility mode, but not RDM in physical compatibility mode. Of course
VMFS is supported, whether backed by SAN, iSCSI, or local disk.
CBT must be enabled for the virtual machine.
Virtual machine storage must not be (persistent or non-persistent) independent disk,
meaning unaffected by snapshots.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
VSS Consistency
VSS Consistency
The use of VSS for backup consistency has been made optional in Simpana software version
10. There are other means available to ensure data consistency. VSS initiation requires that the
disk be in a stable state. In some cases where multiple Virtual Machines are on the same disk,
this stable state may be hard to achieve. Ultimately, backup jobs may timeout waiting for VSS to
perform its function. As such, Simpana Software Version 10 introduced an Advanced Client
property to disable VSS action. In Simpana Software version 9, this capability is available via
registry value.
Data consistency is available at different levels.
Crash Consistent
Its about the same as if you pulled out the power plug. (Not really, if VM Tools is installed the
host then VSS will issue a File System level quiesce to the guest VSS service) Still, successful
recovery is dependent upon the level and type of activity in progress at the time of the
snapshot and the resilience of the file system/application to recover from this abrupt
termination. In all cases, the integration tools (VM Tools, Backup Integration Service, Xen Tools)
need to be installed in the guest VM.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Multiple Servers
Multiple Data Stores
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Module Review
Why are Fibre Channel Drives preferred over SATA
drives for VM storage?
What tools can be used for disk alignment?
Under what conditions would you use RAW disks?
Thick or Thin? Which is recommended for Virtual
Machines servers in a production environment?
Whats the fallback method for Change Block Tracking?
What are the three (3) types of VSS consistency?
Module Review
Why are Fibre Channel Drives preferred over SATA drives for VM storage?
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Module 2
Virtual Server Agent
No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Topics
Overview
VSA Overview
VSA Configuration v9
VSA Configuration v10
Virtual Server Agent Hosts
Virtualization Clients
Restore Types
File Level Recovery
Restoring Multiple Virtual
Machines
Restoring VM to Different
Destinations
Using Web Console for Restores
Using VM Plugin
Topics
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
OVERVIEW
Overview
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
VSA Overview
VSA Overview
Simpana Softwares Virtual Server Agent (VSA) enables the protection of Virtual Machines
through the supporting hypervisor software. In Version 9 of Simpana Software, the interaction
of the VSA with the virtual manager/hypervisor environment was defined in what is called an
Instance. One or more Instances could be hosted by a single VSA.
Simpana Software Version 10 freed the static link between the VSA and the instance and
replaced it with a Virtualization Client that can be hosted on multiple VSA hosts. This multiple
host capability facilitates data path management and load balancing for large virtual
environments.
Simpana Software Version 10 also pushed automatic content discovery down to the subclient
level. This enables the transparent handling of Virtual Machines that move between hypervisor
hosts and subsequently different subclients and data paths.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Microsoft Hyper-V
Install on Hyper-V
host
Virtualization Clients
Virtual Server Agent supports:
VMware
vCloud; vSphere; vCenter; ESX Server
Microsoft Hyper-V
Hyper-V Server; Windows 2008 R2
Install/Operational Permissions
Administrative or equivalent
Virtualization Clients
Each Virtual Server Agent can support multiple Instances/Virtualization Clients of the same, or
different type. Each Virtualization Client requires a user account/password in order to interact
with the Hypervisor/Management software. The user account must have certain privileges in
order to perform the required actions. Normally, the administrator account has the required
permissions. If another account is used, be sure it has all the necessary permissions.
These are the permission requirements for VMware. For Microsoft Hyper-V the system
Administrator user or equivalent is required.
The Virtualization Client requires user accounts that have sufficient privileges for the software
to:
Access the Virtual Center and ESX Servers
Access virtual machines
Access volumes, files, and folders within virtual machines
An administrative account configured with the VCB Role and the following additional privileges
can be used:
Virtual Machine
Resource
Datastore
Consult CommVaults documentation for details and latest updates.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
VM Name/Pattern
Host
DataStore
Guest OS
Guest DNS Hostname
Browse (manual selection)
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Configuring Subclients
The number of data readers determines the concurrency/resource demand placed on the
storage and transport paths. The recommendation is to have no more than 4-5 data readers per
datastore/RAID set. This may vary depending on resources and competing activities.
Each data reader will be associated with a Virtual Machine. Competing actions such as
snapshots are staggered/coordinated between data readers.
What Gets Backed Up
The Virtual Server iDataAgent backs up the following:
Windows Virtual Machines
Linux Virtual Machines of ext2 and ext3 file system types
Stand-alone ESXi with standard license level
Volumes
Files/folders
Virtual RDMs
Proxy Server
Proxy Server is a Windows host with the Virtual Server Agent installed. The Proxy Server is used
to define the backup/restore datapath and to provide a mount location for granular indexing.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
VSA Manager
VSA Manager is a concept/configuration that centralizes control of multiple Virtual Server
Agents. The VSA agent assigned as Manager does not actually back up virtual machines. Rather
it designates the backup role to the other VSA Agents. This designation of roles is accomplished
by associating each subclient to a different proxy server.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Transport Modes
Transport Modes
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
If the ESX/ESXi host and backup server are on a private network, you can use unencrypted
data transfer, which is faster and consumes fewer resources than NBDSSL. If you need to
protect sensitive information, you have the option of transferring virtual machine data in an
encrypted form.
NFC Session Limits
NBD employs the VMware network file copy (NFC) protocol. NFC Session Connection Limits
below shows limits on the number of network connections for various host types. These are
host limits, not per process limits, and do not apply to SAN or Hot-Add.
NFC Session Connection Limits
Host Platform When Connecting
Limits
vSphere 4
vSphere 4
vSphere 5
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
INTELLISNAP TECHNOLOGY
IntelliSnap Technology
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
IntelliSnap Architecture
IntelliSnap Architecture
Virtual Server Agent is installed on a Virtual Machine hosted by an ESX server that is not a
member of an ESX cluster and has access to the hardware array containing the Virtual Machines
you intend to IntelliSnap feature.
The IntelliSnap feature for Virtual Servers is enabled in the Advanced tab of the Virtual Server
Agents parent Clients Properties.
Subclient associated Storage Policy must have a Primary Snap Copy configured.
A Backup/Snapshot job is scheduled using the CommCell Console. When the backup job is
started:
The array is accessed to create a snapshot.
The snapshot is mounted on the proxy or source computer for post backup (optional granular
indexing) operations.
The snapshot is unmounted.
A Media Agent is required on the proxy if you wish to mount the snap on.
This snapshot is used for backup copy operations. This can also be used for restore/mount
operations.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
If backing up to tape or for that matter, any device, you may not be able to (or want to) access
the device from the virtual machine. In this case you can select the option to Use Separate
Proxy for Snap to Tape and designate another proxy host with a Media Agent installed upon
which to mount the snapshot and perform the backup.
Data Aging:
The jobs for the snapshot are pruned based on the retention policy of the snapshot copy.
The snapshots related to the pruned jobs are deleted from the array periodically.
Limitations
Snapshots can affect virtual machine performance and do not support some disk types or
virtual machines configured with bus sharing. Snapshots are useful as short-term solutions for
capturing point-in-time virtual machine states and are not appropriate for long-term virtual
machine backups.
VMware does not support snapshots of raw disks, RDM physical mode disks, or guest
operating systems that use an iSCSI initiator in the guest.
Virtual machines with independent disks must be powered off before you take a snapshot.
Snapshots of powered-on or suspended virtual machines with independent disks are not
supported.
Snapshots are not supported with PCI vSphere Direct Path I/O devices.
VMware does not support snapshots of virtual machines configured for bus sharing. If you
require bus sharing, consider running backup software in your guest operating system as an
alternative solution. If your virtual machine currently has snapshots that prevent you from
configuring bus sharing, delete (consolidate) the snapshots.
Snapshots provide a point-in-time image of the disk that backup solutions can use, but
snapshots are not meant to be a robust method of backup and recovery. If the files
containing a virtual machine are lost, its snapshot files are also lost. Also, large numbers of
snapshots are difficult to manage, consume large amounts of disk space, and are not
protected in the case of hardware failure.
Backup solutions, such as Simpana, use the snapshot mechanism to freeze the state of the
virtual machine. The backup method has additional capabilities that mitigate the limitations
of snapshots.
Snapshots can negatively affect the performance of a virtual machine. Performance
degradation is based on how long the snapshot or snapshot tree is in place, the depth of the
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
tree, and how much the virtual machine and its guest operating system have changed from
the time you took the snapshot. Also, you might see a delay in the amount of time it takes
the virtual machine to power-on. Do not run production virtual machines from snapshots on
a permanent basis.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Incremental Snapshots
Incremental Snapshots
Snapshots by design typically trap changed blocks so they appear as a "block differential". There
is no such thing as an "incremental snapshot". Every snapshot is a point-in-time representation
of an entire volume. This is true for all Copy-on-Write (COW) snapshots.
When you run the Simpana VSA backup job using an "incremental type", we snapshot the
virtual machines - and when we extract the blocks to the backup copy we only take the
incremental changes and index that data. This means you can still select a Full or Incremental on
the IntelliSnap job. However, when you do this, the setting actually applies to the backup job
that copies the content of a snapshot to a secondary copy.
When you back up a snapshot, you either have a previously saved snapshot or you do not. If you
have a saved snapshot, it identifies the last time a backup was taken, and tells the changed
block tracking logic to identify changes that have occurred since the time indicated by the
ChangeId tracking number of that snapshot. If you do not have a saved snapshot, then changed
block tracking does not apply.
For arrays that leverage clones, we cannot incrementally update clone copies.
We leverage VADP (vStorage API for Data Protection) and CBT when performing incremental
backups from a hardware snapshot copy. This ensures that all of the complications arising from
multiple ESX servers placing exclusive SCSI-3 locks during VADP snapshots are completely
eliminated, leading to much faster backups and low impact backups.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Synthetic Fulls are NOT supported when creating backup copies on disk or tape from snapshots.
Synthetic Fulls (or DASH Fulls) ARE supported for non-SPE, VADP backups only.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
SnapVault, several versions of the source data can be kept at the destination. Independent
retention.
For volume SnapMirror the source and the destination volumes must be the same size.
For SnapVault the source volume can be larger than the destination volume.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Restore Types
Available Types: Disk, Volume, File
Restore Types
Virtual Machine data can be restored in various forms from a complete Virtual Machine to a
physical/logical file to a single file from within the virtual machine. Restoring folders/files from
within a Virtual Machine requires that the Advanced backup option, Granular Recovery was
selected (default).
Volumes can be restored to a physical volume, a VMDK file, or a VHD file format. Volume
restores are supported for Windows-based VMware Virtual Servers and must have been
formatted with the NTFS file system.
For File-level restores, the following apply:
The Media Agent must be a Windows-based computer when restoring from Windows
servers.
The Index Cache must be on an NTFS disk.
To perform Linux file-level restores, the LinuxMetadataSupport registry key must first be
configured on the computer on which the Virtual Server iDataAgent is installed prior to
performing the backup.
By default the disk is restored with its original provisioning type, as it was at the time of backup.
Thin disks can be restored as Thick disk, but Thick disks cannot be restored as Thin disks.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Client
Virtual Center
ESX Server
DataStore
Resource Pool
Name
desired location to which the virtual machine will be restored. After restore, the virtual machine
is automatically associated to the new data store selected.
Different Resource Pool
By default, when a virtual machine is restored it will be restored to its original resource pool.
You can select a specific resource pool/vApp on the host into which the virtual machine can be
restored. vApp is a customized form of a resource pool.
Different Name
By default, the Virtual Machine is restored with the original name, exactly as it was at the time
of backup. This can be changed to a more appropriate name
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Using VM Plugin
Manage VMs and
File Level
Recoveries from
one place
Works with
snapshots or
VADP backups
File system data
only
Using VM Plugin
The VM File Recovery Plugin is a selectable option available during the VSAs Instance
configuration with vCenter target.
The VM File Recovery Plugin provides VMware administrators and virtual machine users with a
link to the Web Console for restoring files from virtual machine backups. Files can be recovered
directly from the vCenter/vSphere client.
Only File System data is recoverable via this method. Application data must be recovered using
the features and capabilities of the CommCell Console.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Module Review
What three (3) Instance types are supported by the
Virtual Server Agent?
What is the recommended VM affinity setting?
What are the (3) primary Transport Modes supported?
Where is the Virtual Server Agent located to support
IntelliSnap backups?
At what level can you Browse and select to restore one
or more Virtual Machines?
Module Review
What three (3) Instance types are supported by the Virtual Server Agent?
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
At what level can you Browse and select to restore one or more Virtual Machines?
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Virtualize Me | 81
Module 3
Virtualize Me
No unauthorized use, copy or distribution.
Module 3 Virtualize Me
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
82 | Virtualize Me
Topics
Virtualize Me Overview
Installation
Configuration
Virtualize a Client
Topics
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Virtualize Me | 83
Virtualize Me Overview
Virtualize Me Overview
Simpana softwares Virtualize Me feature enables you to use Virtualization with Simpanas
1-Touch bare metal restore feature to virtualize any Windows or Linux client.
With Virtualize Me, the user has the option to create a Virtual machine from a backup of a
physical machine. This process can improve reliability when converting a physical to a virtual
machine by restoring offline from a previous backup rather than converting an existing physical
machine to a virtual machine.
Virtualize Me is supported for all current Windows operating systems with the exception of
Windows XP. It is also supported for Red Hat and SuSe Linux server versions. Once Virtualize
Me is configured it creates a base client image on the ESX server with a file system iDataAgent
installed. The process then restores the machine configuration and does a full system recovery.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
84 | Virtualize Me
Installation
Install 1-Touch Server (Windows only)
Install Virtual Server Agent
Windows install
Installation
Install a 1-Touch Server
The 1-Touch server must be installed from DVD 2 of the Disc set:
The install must use the DVD Media release dated 10/21/2011 or later, for Simpana 9 with
service pack 4.
To perform a disk install of 1-touch, insert the CD and run the setup.exe program. This will install
the 1-Touch Server to the directory that you choose. The default install is to your CommVault
directory. Note that you will be required to reboot the 1-Touch Server after the installation.
View the 1-Touch Server Software installation in the online documentation for details on
installing the 1-Touch Server.
There is no indication/icon/task for the 1-Touch Server for Windows on the CommCell
Console. The presence of a SystemRecovery folder on the server and the 1-Touch.exe
executable in the ..\Galaxy\Base directory is the only indication of a 1-Touch Server installation.
Note that the 1-Touch server install is only required for Windows systems, and is only used to
create the Boot DVD image. The method for creating a Boot DVD is described in Books Online.
Install the Virtual Server iDataAgent
Virtualize Me requires the Virtual Server iDataAgent be installed on the client with Simpana 9
Service pack 4. The installation can be performed via local DVD install, or remotely using the
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Virtualize Me | 85
console install method. If you are using other application agents, they must be installed
separately after the Virtualize Me operation completes.
For more detailed information about installing the Virtual server agent for VMware, and various
transport modes that are available, please view the section on the Virtual Server iDataAgent in
Books Online.
The virtual Server iDataAgent can be installed using a local or push install method.
Install the File System iDataAgent
Virtualize Me requires only the File System iDataAgent be installed on the client. The client
must be running Simpana 9 with Service pack 4 in order to perform a Virtualize Me recovery.
The installation can be performed via local DVD install, or remotely using the console install
method. If you are using other application agents, they must be installed separately after the
Virtualize Me operation completes.
To perform a disk install of the file system agent, insert the DVD and run the setup.exe program
for Windows or cvpkgadd for Linux. This will install the file system agent to the directory that
you choose. The default install is to your CommVault directory. View the online documentation
for more details and instructions on how to install a file system agent for Windows or Linux.
To perform a console based install, from the console tools menu, select Add/Remove
SoftwareInstall Software. The installer wizard runs through the same basic process as a local
install. If you will be installing the agent on all of the available servers you can select automatic
install (Uses AD to collect a list of available servers) or manually select servers. The installation
completes silently and can be viewed from the Job Manager in the CommCell Console. View
the online documentation for more details and instructions on how to install a file system agent
for Windows or Linux.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
86 | Virtualize Me
Configuration
Configure the 1-Touch Server
Configure the Virtual Server iDataAgent for a vCenter or
ESX Host
Create an Instance
Define a vCenter host
Configuration
Once you have satisfied the install and pre-configuration requirements, the following steps can
be taken to configure Virtualize Me:
Configure the 1-Touch Server
For Windows systems, the 1-Touch server must be running Service Pack 4 at a minimum to
enable Virtualize Me. Install Service Pack 4 on the 1-Touch server per the installation methods
found in the Books Online for installing updates. Also you must update the 1-Touch cache. This
adds Service Pack 4 to the files used to build the Boot ISO that is used in the Virtualize Me
process. Note: If you do not update the 1-Touch cache, WinPE will not be able to start on the
VM that is created on the ESX server and the job will not complete.
Configure the Virtual Server iDataAgent for a vCenter or ESX Host
The first step in configuration for Virtualize Me is to configure vCenter/ESX for the virtual server
iDataAgent. To configure, you must create an instance for the virtual server agent and select
the vendor type VMware from the dropdown list of vendors. Once the vendor is selected you
must enter the vCenter hostname. Note here that even if you are not using vCenter, you must
select the vCenter option to configure this instance for Virtualize Me. You also need to select
the change button and enter a user name and password that has access to the vCenter or ESX
server. After the instance is created, the ESX server will show up under the Virtualize Me option
on the client to be virtualized.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Virtualize Me | 87
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
88 | Virtualize Me
Virtualize a Client
Virtualize a Windows or Linux Client
Virtualize a Client
Virtualize a Windows or Linux Client
Note: The physical machine cannot be in a running state on the same network that the Virtual
Machine is being created on. If it is, the job will go into a pending state with an application
error.
The Windows client virtualization is run from the Client level in the CommCell console by right
clicking the client, and selecting All Tasks Virtualize Me. The Virtualize Me job runs in three
phases.
The Virtualize Me job runs in the following order:
To start the job, from the Virtualize Me window, select the vCenter, ESX Server and Data Store to
put the VM on, and the path to a Data Store containing the ISO with the 1-Touch boot image on
it. Select whether to schedule or run the job immediately.
When the Virtualize Me job is running, the first phase of the job is Provision VM. This creates a
new VM on the ESX Server and starts it. The 1-Touch process then detects and starts the
network interface and installs the File System iDataAgent on the VM.
The next phase is the Configuration Restore. In this phase the virtualized system is being
restored from a backup image. This phase runs as a subordinate job of the Virtualize Me job.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Virtualize Me | 89
You will see it run as a separate job in the Job Controller window. The Configuration Restore is a
restore of the physical machine configuration such as drives, drive mapping, and partitioning.
The next phase of the Virtualize Me job is the Full Machine Restore. The Full Machine restore
also runs as a subordinate job of the Virtualize Me job. This phase is the actual restore of the
client system state and file system from the backup of the client.
Once the Full Machine Restore completes, the Virtualize me job will also complete and the VM
will automatically restart into a running state on the ESX server.
Note: You cannot suspend or kill a Virtualize Me job while subordinate jobs are running. Once
the sub jobs are started the Virtualize Me job will run through to completion.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
90 | Virtualize Me
Module Review
What Simpana software component is required in
order to use the Virtualize Me feature?
What is the minimum Service Pack Level required in
order to use the Virtualize Me feature?
For Windows Clients, what must be in the backup in
order to use the Virtualize Me feature?
Where must the Boot ISO image be located in order to
use the Virtualize Me?
Module Review
What Simpana software component is required in order to use the Virtualize.Me feature?
What is the minimum Service Pack Level required in order to use the Virtualize.Me feature?
For Windows Clients, what must be in the backup in order to use the Virtualize.Me feature?
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Virtualize Me | 91
Where must the Boot ISO image be located in order to use the Virtualize.Me?
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Module 4
VM Life Cycle
Management
No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Topics
Topics
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Select DataStores
Select DataStores
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Select Templates
Select Templates
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Enter Resources
Enter Resources
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Summary
Summary
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Confirm Settings
Confirm Settings
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Restart
Renew
Power Off
Delete
Suspend
Edit
Revert
View Snapshot
Create Snapshot
Clone
important files are permanently deleted, the operating system becomes corrupted, etc.), you
can revert a virtual machine to its snapshot, thereby bringing the virtual machine back to the
state it was in when the snapshot was taken. You can also revert from a snapshot if you no
longer wish to use the virtual machine in its snapshot state.
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
Module Review
What three(3) primary tasks does the VM Life Cycle Policy feature
enable for VM users?
Besides the Virtual Server Agent, what other Simpana software
components are required for this feature?
What Configuration parameters can be defined using a VM Life
Cycle Policy?
What capabilities must the associated CommCell User Group
have for users to access this feature?
Module Review
What three(3) primary tasks does the VM Life Cycle Policy feature enable for VM users?
Besides the Virtual Server Agent, what other Simpana software components are required for
this feature?
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.
What capabilities must the associated CommCell User Group have for users to access this
feature?
www.commvault.com
The Information contained in this document is subject to change without notice. No unauthorized use, copy or distribution.