Data Protection Advisor Fundamentals SRG PDF
Data Protection Advisor Fundamentals SRG PDF
Data Protection Advisor Fundamentals SRG PDF
Copyright © 2017 Dell Inc. or its subsidiaries. All Rights Reserved. Dell, EMC, and other trademarks are trademarks
of Dell Inc. or its subsidiaries. Other trademarks may be the property of their respective owners. Published in the
USA.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS IS.” DELL EMC MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO
THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR
PURPOSE.
Use, copying, and distribution of any DELL EMC software described in this publication requires an applicable software license. The trademarks, logos, and service marks
(collectively "Trademarks") appearing in this publication are the property of DELL EMC Corporation and other parties. Nothing contained in this publication should be construed
as granting any license or right to use any Trademark without the prior written permission of the party that owns the Trademark.
AccessAnywhere Access Logix, AdvantEdge, AlphaStor, AppSync ApplicationXtender, ArchiveXtender, Atmos, Authentica, Authentic Problems, Automated Resource Manager,
AutoStart, AutoSwap, AVALONidm, Avamar, Aveksa, Bus-Tech, Captiva, Catalog Solution, C-Clip, Celerra, Celerra Replicator, Centera, CenterStage, CentraStar, EMC
CertTracker. CIO Connect, ClaimPack, ClaimsEditor, Claralert ,CLARiiON, ClientPak, CloudArray, Codebook Correlation Technology, Common Information Model, Compuset,
Compute Anywhere, Configuration Intelligence, Configuresoft, Connectrix, Constellation Computing, CoprHD, EMC ControlCenter, CopyCross, CopyPoint, CX, DataBridge ,
Data Protection Suite. Data Protection Advisor, DBClassify, DD Boost, Dantz, DatabaseXtender, Data Domain, Direct Matrix Architecture, DiskXtender, DiskXtender 2000, DLS
ECO, Document Sciences, Documentum, DR Anywhere, DSSD, ECS, elnput, E-Lab, Elastic Cloud Storage, EmailXaminer, EmailXtender , EMC Centera, EMC ControlCenter,
EMC LifeLine, EMCTV, Enginuity, EPFM. eRoom, Event Explorer, FAST, FarPoint, FirstPass, FLARE, FormWare, Geosynchrony, Global File Virtualization, Graphic
Visualization, Greenplum, HighRoad, HomeBase, Illuminator , InfoArchive, InfoMover, Infoscape, Infra, InputAccel, InputAccel Express, Invista, Ionix, Isilon, ISIS,Kazeon, EMC
LifeLine, Mainframe Appliance for Storage, Mainframe Data Library, Max Retriever, MCx, MediaStor , Metro, MetroPoint, MirrorView, Mozy, Multi-Band
Deduplication,Navisphere, Netstorage, NetWitness, NetWorker, EMC OnCourse, OnRack, OpenScale, Petrocloud, PixTools, Powerlink, PowerPath, PowerSnap, ProSphere,
ProtectEverywhere, ProtectPoint, EMC Proven, EMC Proven Professional, QuickScan, RAPIDPath, EMC RecoverPoint, Rainfinity, RepliCare, RepliStor, ResourcePak,
Retrospect, RSA, the RSA logo, SafeLine, SAN Advisor, SAN Copy, SAN Manager, ScaleIO Smarts, Silver Trail, EMC Snap, SnapImage, SnapSure, SnapView, SourceOne,
SRDF, EMC Storage Administrator, StorageScope, SupportMate, SymmAPI, SymmEnabler, Symmetrix, Symmetrix DMX, Symmetrix VMAX, TimeFinder, TwinStrata, UltraFlex,
UltraPoint, UltraScale, Unisphere, Universal Data Consistency, Vblock, VCE. Velocity, Viewlets, ViPR, Virtual Matrix, Virtual Matrix Architecture, Virtual Provisioning, Virtualize
Everything, Compromise Nothing, Virtuent, VMAX, VMAXe, VNX, VNXe, Voyence, VPLEX, VSAM-Assist, VSAM I/O PLUS, VSET, VSPEX, Watch4net, WebXtender, xPression,
xPresso, Xtrem, XtremCache, XtremSF, XtremSW, XtremIO, YottaYotta, Zero-Friction Enterprise Storage.
DPA is architected for future growth, as well as for large, complex environments with more immediate
scalability and recovery requirements. It transforms volumes of disparate data into actionable business
information that allows companies to lower costs through the improved use of their infrastructure, avoiding
unnecessary purchases and reducing manual effort; improves compliance and lowers risk through better
visibility and assurance that critical data is protected; and reduces complexity with a single console to
provide an integrated, automated view.
The company saw payback from using Data Protection Advisor in 12 months or less, with ongoing total
cost of ownership benefits.
DPA enables unified, cross-domain event correlation analysis which provides insight into the entire data
protection path to ensure each component is working correctly. I also provides higher-level decision
support based on defined policies.
Built for cloud infrastructure, Data Protection Advisor offers scalable, centralized multi-tenant data
protection management. It provides significant cost reduction by supporting thousands of tenants on a
single DPA instance without performance degradation.
It also ensures service level attainment by enabling administrators to maintain performance as resource
requirements change.
Data Protection Advisor automates data collection across the data protection infrastructure and analyzes it
for backup failures, performance issues, and replication gaps, presenting it in meaningful formats to
various levels within the business to make informed decisions.
Visibility is crucial to protecting data in dynamic virtualized environments and ensuring compliance with
SLAs. Because virtual machines can be created, moved, or removed on the fly, it is a constant challenge
to understand where a specific system may be located at any particular time, what might by impacting
performance, or if the system is protected. Data Protection Advisor automatically notifies administrators of
unprotected virtual machines by discovering the virtualized environment and reporting on new systems
that may yet to have its applications and data protected.
Here are some statistics of success achieved after the deployment of Data Protection Advisor at the multi-
national company:
• Hardware budget reduction up to 60 percent
• Increased backup success rate
• Zero service level agreement penalties
• Increased audit success rate
DPA presents unified information about your entire backup and recovery environment, which enables you
to stay aware of current and potential problems without requiring you to run scripts or analyze large
amounts of data thus providing centralized monitoring capability. Many standard reports are available for
Data Protection Advisor’s performance monitoring on an Avamar grid. Whenever possible, it is preferable
to have Data Protection Advisor’s presence in the environment prior to an Avamar deployment, so that you
can see the performance differences of pre and post Avamar installations.
DPA’s capacity forecasting is a vital feature for a backup-to-disk-based grid such as Avamar. Being able
to project growth and comparing it against established service-level agreements or SLAs, is vital towards
ensuring a healthy virtualized environment. Threshold triggers can be used for both actual and predicted
values, allowing for reactive and proactive management of Avamar.
Data Protection Advisor works with Data Domain to gather key data and provide insight into performance
problems with the environment. Similarly, Data Protection Advisor provides insight into resource utilization
and capacity planning, which is vital in dynamic virtual environments. Virtual environments leverage
resource pools. When too many requests for the same resources occur, the environment can experience a
performance impact. Data protection Advisor allows the administrator to track utilization over time, as well
as generate predictive trend alerts such as space restrictions.
Data Protection Advisor has extended its core capabilities to the virtual world, improving visibility and
management for VMware environments. DPA provides monitoring, alerting, troubleshooting, optimization,
capacity planning, and reporting for virtualized backup environments.
Specifically, when it comes to DPA’s capabilities for VMware, the product is able to discover the virtualized
environment and report on new systems that may not yet have its applications and data protected. It can
review compliance with SLAs and provide alerting for failures such as resource thresholds. DPA can help
customers to troubleshoot issues of performance across domains like hosts, storage, and networking. It
can also help customers to plan for the future growth of their virtualized environment.
The Application Server runs the DPA software in the data protection environment.
The Datastore is a repository to store and manage the data collection for reporting and analysis.
Data Collection Agent is used to collect data from the monitored applications and devices. The data
collected from the monitored application is analyzed and processed by DPA to generate reports. The
number and location of these agents are influenced by the number and type of objects being monitored
and location of these objects. The data collection can be remote as well.
The DPA’s simple split-install deployments are architected for future growth, as well as for large complex
environments with immediate scalability and recovery requirements.
Clustering application nodes enables DPA to meet very high throughput requirements and enables easy
scaling of DPA to handle changing workloads and rapidly changing requirements of fast growing
environments. However, since the implementation of clustered application nodes requires additional
hardware and configuration, clustering is not appropriate for all environments.
One of the advantages of clustering, is the ability to perform load balancing across a group of DPA
Application nodes. As a new session is established with DPA, the customer provided load balancing
switch directs traffic to one of the DPA application nodes in the cluster based on a predefined algorithm.
By doing this, the load is spread over the nodes in the cluster while improving the quality of service.
A migration tool included with DPA enables customers to migrate later DPA (v5.8.x) databases to the new
embedded datastore.
When planning a DPA deployment, you must determine whether the datastore will be protected using a
traditional backup restore or whether datastore replication is required in order to meet Recovery Time
Objectives (RTO) and Recovery Point Objectives (RPO).
Datastore Replication provides automatic, continuous replication allowing for failover from the Master
datastore to the replica, or Slave datastore. In the event of failure of the Master Datastore, the Slave can
be updated to the Master role and the application objects can be configured to use this new Master.
Reconfiguration normally does not take no more than a few minutes to take effect.
Datastore Replication provides automatic, continuous replication allowing for failover from the Master
datastore to the replica, or Slave datastore. In the event of failure of the Master Datastore, the Slave can
be updated to the Master role and the application objects can be configured to use this new Master.
Reconfiguration normally does not take no more than a few minutes to take effect.
Event-based rules trigger an alert in response to data that is streaming into the DPA server. Schedule-
based rules periodically compare data in the DPA datastore against rules to detect a match. Alerts can
contain dynamic textual information and might include populated links to reports. Only analysis policies
can generate alerts.
The EMC Data Protection Advisor Software Compatibility Guide provides a comprehensive listing of
system requirements.
The EMC Data Protection Advisor Software Compatibility Guide provides a comprehensive listing of
system requirements.
Application owners only have the ability to modify host configurations and run, print, email, and save
reports.
Users in the system only have the ability to run, print, and save reports. User account passwords are
stored in the DPA Datastore only when the internal authentication method is configured.
If LDAP authentication is used, when a user logs in to Data Protection Advisor (DPA) the DPA Server
service communicates with the LDAP server, verifies that the user exists, and authenticates the password
against that user stored in LDAP. User passwords do not need to be stored in the DPA database.
DPA supports Microsoft Active Directory and OpenLDAP as LDAP servers. If you have installed DPA on a
UNIX environment and are authenticating to a Microsoft Active Directory LDAP server, you cannot
connect to the Windows machine using SSL.
To configure anonymous bind, ensure that the anonymous bind checkbox is checked in the Manage
External Authentication tab.
Show Setup Guide presents the minimal steps to take when setting up the system for the first time. The
Setup Guide starts automatically at Startup. This option can be disabled.
Run Discovery Wizard defines objects to be monitored. Objects discovered include data protection hosts,
devices, and applications. Expanding each Object Type will display the specific objects that can be
discovered.
Configure Report Settings is used for deduplication, SLA reporting, demo time, large report, and scaling.
Configure System Settings allows the admin to modify default system settings such as DPA agents,
Server, Replication Analysis, and Agentless Discovery.
Manage Custom Resolutions allows you to create up to five custom backup and restore resolution fields
that allow you to add a resolution to a failed job, and then at a later date view the resolution to see what
caused the failure.
For example, you can create a field as a reference to an external ticketing system that includes further
resolution information for failed backups. Administrators can control the format of a custom field and make
the field mandatory or optional.
Manage Custom Attributes is used to create, edit, and delete custom attributes that you can assign to
objects. Object attributes extend the information that DPA holds about an object. After a custom attribute
is created, the attribute can be enabled for any valid objects as per custom attribute settings and a value
can be assigned.
Manage licenses is used to add, view, and delete licenses. DPA is bundled with a 60-day evaluation
license. The evaluation license is created from the time of DPA installation, is valid for up to 60 days, and
allows access to all features. If you import a license during the 60-day evaluation license period, the
evaluation license is removed and you have access to DPA features according to license you imported.
Manage Schedules is used to define when to run a scheduled report or generate a dashboard viewlet, or
to define the backup window specified in the Protection Policy. Several predefined schedules are installed
with Data Protection Advisor and you may create custom schedules.
Manage Time Periods is used to create, edit, and delete predefined system time periods. When you run a
report or create a scheduled report, you must decide the period of time over which the report is run.
Command line can be used for operations like Application, Datastore, Service, and Loading historical
backup data. A Dell EMC Technical Support Engineer may ask you to source the DPA config file before
running any agent binaries (including DPA Agent request in debug mode and backup job), and any
command line operations on UNIX.
Data Protection Advisor for VMware environments is licensed by VMware ESX server. However, it is
intended to be sold as a complement to Data Protection Advisor backup environments. When licensed in
VMware environments, Data Protection Advisor identifies which virtual machines within the ESX server
are being backed up and which are not, as well as bottlenecks in the physical infrastructure.
Additionally, the details captured by Data Protection Advisor enables activities such as performance tuning
of ESX servers and adjusting backup schedules to reduce impact on production servers.
In DPA 6.1 and higher, no license is required for VNX file, Celerra, and CLARiiON functionality. DPA will
require licenses for Symmetrix, VNX block, and any other block storage array. Licensing is based on the
number of block storage arrays in the environment on both source and target sites.
Flexibility is provided by assigning resources their own URIs (unique universal resource indicators).
Because the GET, POST, PUT, and DELETE operations have a specific meaning, REST avoids
ambiguity.
The DPA REST API is a RESTful interface that allows programmers to access information that has been
collected, stored, and managed by DPA. By using the REST API to retrieve data discovered and
calculated by DPA, application developers can build their own applications and mashups that leverage this
information.
The REST API provides a more robust and expansive API with increased functionality that allows
programmers to extract DPA data via any tool or programming language that supports RESTful API calls.
Using REST API, you can Retrieve an “all jobs” report for last month from a host by defining the data
required in a DPA report and extracting the report data via a REST API call.
For more detailed information, download the Dell EMC Data Protection Advisor Programmers' Guide to
Using DPA REST API from support.emc.com.
4. From the Select Dashboard Template window select System Dashboard Template and you can view
the list of all the system templates that are available.
1. Open a created template and click Edit Dashboard and select Dashboard Format.
3. On the right side you will get options to customize the viewlet as per your requirement.
It also provides end-to-end visibility and unified cross-domain analysis of data, which helps in establishing
an efficient Decision Support System(DSS).
Since analysis engine looks across the entire data protection environment, it can help to identify trends
and enable administrators to plan for future.
An Analysis policy can be applied at group level or at object level. All objects, that do not already have an
assigned policy, inherit any policy associated with its group. Specifying a policy on an object within a
group will override the setting of the group for that object.
• Event-based rule: It trigger an alert in response to data that is streaming into the DPA.
• Schedule-based: Periodically compares the collected data against rules to detect a match.
Alerts can contain dynamic textual information and might include populated links to reports.
Properties includes a description of what caused the alert, a possible resolution, and any notes associated
with the alert. The description and resolution are part of the rule that generated the alert.
Policy displays the policy details that includes the rule which generated the alert.
Groups displays the groups in the inventory that are affected by the alert.
• You Acknowledge new alerts that are generated and change its status to open.
• Once the alert is resolved you can close it, which indicates that the issue that generated the alert is
resolved.
• Edit or change the policy associated with an alert to suit the requirement. When you select Edit Policy
option it opens the policy with the rule that generated the alert.
Note: Freeze auto refresh to ensure that the alert that you are currently addressing is not moved down the
list of alerts and out of view.
Through the Replication Analysis section, a storage administrator can analyze and view the status of
replication operations, recoverability, and the storage mapping for objects and individual arrays, file
systems, and applications.
The Scope lists the servers, applications, and storage devices that are configured in DPA.
The Replication Gaps panel displays all the replication errors and detailed information in the columns.
Now, let’s look at the scenario in the next slide to understand how DPA plays a vital role in an IT
environment.
Solution: Install DPA client on the Data Domain system and with the help of DPA’s analysis engine a
report can be generated predicting the tentative dates for the system to reach the threshold and a policy
can be created to generate an alert once the system reaches the threshold.
The reports generated by DPA retrieves information about the environment and helps you to review and
analyze the activities in the environment. Using these reports, you can identify outages in the environment,
diagnose problems, plan to mitigate the risks, and forecast future trends. The generated reports can be
customized to display in dashboard to ease the data management process.
Through the Reports area, you can create and run various types of reports or customize the reports to
meet the enterprise requirements.
On-demand reports can be run at any time as per the users requirement. They are ad hoc reports and you
can run with the currently available data and view immediately.
The on-demand reports are very useful in daily operations where you can run any report at any time, from
the various types of reports that DPA offers. By running an on-demand report, you can:
• Generate a point-in-time report.
• Run from several predefined or scheduled reports.
A scheduled report is a report that the DPA Server runs at a scheduled time and publishes the results in
one or more formats. The Scheduled Run Reports is available only if Manage scheduled reports
privilege is assigned to the user’s role. By scheduling a report, you can:
• Automate the generation of report and schedule the report generation frequency.
• Configure the email addresses of users to whom the report must be sent.
• Publish to SharePoint server.
Federated Reporting merges all of the DPA servers into one supertree structure on a DPA server that you
have designated as the Federated DPA server from which to run the Federated report. Federated
Reporting allows you to run a report on the Federated DPA server and utilize the new Federated data
source across the super tree structure. Federated DPA server sends the run report request to the
individual Regional DPA servers. The results from each of the Regional DPA servers are sent back to the
Federated DPA server as a single report from the output of the Federated data source.