confidential1 introducing the next generation of enterprise protection storage enterprise...

26
Confidential 1 Introducing the Next Generation of Enterprise Protection Storage Enterprise Scalability Enhancements

Upload: roy-carroll

Post on 12-Jan-2016

228 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Confidential1 Introducing the Next Generation of Enterprise Protection Storage Enterprise Scalability Enhancements

Confidential1

Introducing the Next Generation of Enterprise Protection Storage

Enterprise Scalability Enhancements

Page 2: Confidential1 Introducing the Next Generation of Enterprise Protection Storage Enterprise Scalability Enhancements

Confidential2

Tape Under Siege

Audio

Video

DataProtection

Page 3: Confidential1 Introducing the Next Generation of Enterprise Protection Storage Enterprise Scalability Enhancements

Confidential3

Barriers to Disk Recovery Storage: Capacity, Cost

Primary Data

Secondary Data5x - 10x Primary

Page 4: Confidential1 Introducing the Next Generation of Enterprise Protection Storage Enterprise Scalability Enhancements

Confidential4

What is a Data Domain Restorer (DDR)?

Data Domain is a Backup Device

Integrates into Existing Backup Software

Compression Engine

Replication Engine

Reliable

Page 5: Confidential1 Introducing the Next Generation of Enterprise Protection Storage Enterprise Scalability Enhancements

Confidential5

What is a Data Domain Restorer (DDR)?

A (Fileserver or VTL) for backup images & “tape” archives tar/cpio/etc. files (including images from Symantec, Legato, …) NDMP dump images Database dumps Copies of critical files Network (gig-E) attached

A very efficient compression engine Avoid writing previously compressed data Let the DDR do the compression

Optimized for a small number of read/write streamsOptimized for large files (multi-megabyte and up)Not primary storage!Not a general purpose fileserver or SAN filesystem!

Page 6: Confidential1 Introducing the Next Generation of Enterprise Protection Storage Enterprise Scalability Enhancements

Confidential6

Integrates into Existing Backup Infrastructure

GalaxyNetWorker® Backup Exec™ NetBackup™

Oracle RMAN

Gigabit Ethernet Interfaces

or

Fiber Channel Interfaces

NFS or CIFS with Gigabit Ethernet Interfaces

Fast Block Copy withFiber Channel Interfaces

Data ProtectorNetVault

Filesystem VTL

FileSystem

Device

Disk Storage Unit

Backup-To-Disk Device

Page 7: Confidential1 Introducing the Next Generation of Enterprise Protection Storage Enterprise Scalability Enhancements

Confidential7

Data Domain Value Statement

Retention

Replication

Reliability

Page 8: Confidential1 Introducing the Next Generation of Enterprise Protection Storage Enterprise Scalability Enhancements

Confidential8

Data Domain Value Statement

Retention (Capacity Optimized Storage)

Replication (Wan Vaulting)

Reliability (Data Invulnerability)

Page 9: Confidential1 Introducing the Next Generation of Enterprise Protection Storage Enterprise Scalability Enhancements

Confidential9

Data Domain Key Technology

Retention (Capacity Optimized Storage)

Page 10: Confidential1 Introducing the Next Generation of Enterprise Protection Storage Enterprise Scalability Enhancements

Confidential10

Capacity Optimized Storage

100 TB

100 TB

Traditional Storage Capacity Optimized Storage

Page 11: Confidential1 Introducing the Next Generation of Enterprise Protection Storage Enterprise Scalability Enhancements

Confidential11

Example of Capacity Optimized Storage

AA B BC D E F DF

Full #1

C D G

Incr #1

C HG

Incr #2

B BC ED DI HGF F

Full #2

A

B C D E FA

BC D EFA

= New unique data

= Repeat data

= Pointer to unique data segment

= Compressed unique data on disk

G

G H

H

I

I

Page 12: Confidential1 Introducing the Next Generation of Enterprise Protection Storage Enterprise Scalability Enhancements

Confidential12

First full backup: 2-4x data reduction

File-level incrementals: 6-8x

Subsequent full backups: 20-60x

Aggregate with Weekly Fulls, Daily Incrementals: ~20x

Weeks in use

Data

Sto

red

in

TB

Traditional Storage

Capacity Optimized

1 TB data set1 full + 6 incr / week

Capacity Optimization: Over time

Disk Savings

0

10

20

30

1 3 5 7 9 11 13 15 17 19

Page 13: Confidential1 Introducing the Next Generation of Enterprise Protection Storage Enterprise Scalability Enhancements

Confidential13

Capacity Optimization: Review

Overall compression = Global * Local Global compression: Replace non-unique segments with

references (2:1 to 100:1 or more common) Local compression: LZ compression of unique segments and

other metadata (2:1 common)

The more redundancy the better Fulls compress more than incrementals, but ~7:1 compression of incrementals/snapshots common

• COS eliminates redundant patterns• Incrementals/snapshots contain only changed blocks• COS eliminates redundancy BETWEEN changed blocks

Page 14: Confidential1 Introducing the Next Generation of Enterprise Protection Storage Enterprise Scalability Enhancements

Confidential14

Data Domain Value Statement

Replication (Wan Vaulting)

Page 15: Confidential1 Introducing the Next Generation of Enterprise Protection Storage Enterprise Scalability Enhancements

Confidential15

Wan Vaulting - General Information

Functionality: WAN and LAN asynchronous replication

Target Usage: Remote Office Backup/Recovery and Disaster Recovery

Two Types – both included with Replicator license

Collection Replication - one system R/W and another R/O

Directory Replication - both systems can be R/W

Page 16: Confidential1 Introducing the Next Generation of Enterprise Protection Storage Enterprise Scalability Enhancements

Confidential16

Collection Replication – Full system replication

Retention/Restore

Clients ServerPrimarystorage

Backup/mediaserver

WAN

OnsiteRetentionStorage

Offsite Disaster Recovery

Storage

Archive to tapeAs required

Backup Replication DR

Page 17: Confidential1 Introducing the Next Generation of Enterprise Protection Storage Enterprise Scalability Enhancements

Confidential17

Selective by Data Set (vs. System to System)

Directory Replication – Flexible

VtcDir A Oracle Email VtcEmail Dir S Oracle

Source Destination

WAN

Dir C Oracle /Home Dir B /Home OracleWAN

Bidirectional (Backup & Replicate to same node)

WAN

Remote Office 1 – DD410

Remote Office 2 – DD430

Dir 1

Dir 3Dir 1Dir 2Dir 3Dir A

Remote Office 3 – DD430

Data Center Hub – DD460

Deduplicates across all inbound data streams

Many-to-1, Remote Office Data Protection

Dir 2

Page 18: Confidential1 Introducing the Next Generation of Enterprise Protection Storage Enterprise Scalability Enhancements

Confidential18

HBA

SAN

LAN

VirtualTape

Dir C

Dir S

HBA

Directory Replication

Simultaneous, multi-purpose DDR usage Local and remote office backup, recovery, de-stage to tape and DR

Simultaneous, multiprotocol replication NFS, CIFS, NDMP and Virtual Tape Library (at GA) Up to 8 total source and destinations per DDR

Dir S

vtc

Tape Pool 1 Tape Pool 2

/backup

Dir A

Dir N

Dir X

Dir Y

Dir C

Dir TDir C

vtc

Tape Pool 1 Tape Pool 2

/backup

Dir A

Dir N

Dir X

Dir Y

Dir S

Dir T

LAN orWAN

Source Destination

SAN

LANNFSCIFSNDMP

VirtualTape

Dir X

Tape Pool 2

Dir N

Dir X

Tape Pool 2Dir N Tape Pool 1

Dir C

Dir S Dir S Tape Pool 1

Dir CDir X

Tape Pool 2Dir N

Dir C

Tape Pool 1Dir S

Dir X

Tape Pool 2Dir N Tape Pool 2Dir N

Tape Pool 1

Port 2051 Port 2051

NFSCIFS

NDMP

Page 19: Confidential1 Introducing the Next Generation of Enterprise Protection Storage Enterprise Scalability Enhancements

Confidential19

Data Domain Value Statement

Reliability (Data Invulnerability)

Page 20: Confidential1 Introducing the Next Generation of Enterprise Protection Storage Enterprise Scalability Enhancements

Confidential20

Verifies Recoverability at Backup Time

Conventional file systems have no online consistency checks Would discover problems only during restore

DD OS tests full data path asynchronously quickly after backups File system consistency Data integrity on disk

Continuous, proactive online verification and correction ongoing

All verification is automatic and requires no manual intervention

Data 1 Strong checksum

2 Complete write to disk

3 Read back through filesystem

4 Compare to checksum

Page 21: Confidential1 Introducing the Next Generation of Enterprise Protection Storage Enterprise Scalability Enhancements

Confidential21

Data Invulnerability Storage Foundation

NVRAM support: powerfail-safe disk buffer Protects against lost data in powerfail and software crashes Fast consistency & integrity check after a system fault Fast recovery after a system fault

DD OS RAID 6 mirroring protects disks Corrects block errors with redundant parity information

System management simplicity Recovery copies managed by backup software Easy integration with tape systems for offsite storage Manage the system with 21 commands E-mail ‘phone-home’ diagnostics

Page 22: Confidential1 Introducing the Next Generation of Enterprise Protection Storage Enterprise Scalability Enhancements

Confidential22

Data Domain Cost Savings

Capacity Optimized Storage Global Compression

Capacity Optimized Replication 95% Reduction in Bandwidth Requirements

Integrates with Existing Backup Infrastructure Ease of Integration Minimize training

Page 23: Confidential1 Introducing the Next Generation of Enterprise Protection Storage Enterprise Scalability Enhancements

Confidential23

Next Generation Enterprise Protection Storage

DD410

DD460/DD460g

DD430

NEW: DDX Array Series

Appliance & GatewaySeries

Up to 16 ControllersInternal or External

Storage

DD560/g

Data Domain Operating System 4.0 (64-bit)

Data Domain Enterprise Manager

DDXDD460/gDD430DD410 DD560/g

Data Domain Operating System 4.0 (64-bit)

Data Domain Enterprise Manager

DDXDD460/gDD430DD410

NEW: DD560/DD560g

Page 24: Confidential1 Introducing the Next Generation of Enterprise Protection Storage Enterprise Scalability Enhancements

Confidential24

Data Domain Enterprise Manager

• Group summary• Click through to controller• Browser / Javascript

Page 25: Confidential1 Introducing the Next Generation of Enterprise Protection Storage Enterprise Scalability Enhancements

Confidential25

Capacity Optimized Storage Appliances

DD410 (Remote Office)

•1.25 TB (raw)•0.7TB (useable)•Backup capacity 15-55 TB•8 160 GB SATA drives•RAID 6•CPU Xeon 3.0Ghz•Linux OS•NFS/CIFS•160 GB/hour

DD430 (Departmental)

•3.2 TB (raw)•1.9 TB (useable)•Backup capacity 40-100 TB•8 400 GB SATA drives•RAID 6•CPU Xeon 3.2Ghz•Linux OS•NFS/CIFS•220 GB/hour

•DD460 (Enterprise)

•6.4 TB (raw)•3.9TB (useable)•Backup capacity 80-230 TB•15 400 GB SATA drives•RAID 6•CPU 2X Xeon 3.2Ghz•Linux OS•NFS/CIFS (FC Optional)•290 GB/hour

Models Differ Only in Disk and CPU Type and Number

~ 700GB ~ 2 TB ~ 4 TB

•DD560 (Enterprise)

•7.5 TB (raw)•5.15-16.3TB (useable)•Backup capacity 400-980 TB•15 500 GB SATA drives•RAID 6•CPU 2X Xeon 3.6Ghz•Linux OS•NFS/CIFS (FC Optional)•400 GB/hour

~5 to 16 TB

5.25” by 19” by 22.5”

Page 26: Confidential1 Introducing the Next Generation of Enterprise Protection Storage Enterprise Scalability Enhancements

Confidential26

Introducing the DD560 Appliance

DD560 4x storage increase

• 500 GB disk drives• 5 TB useable 16.3TB w/ ES20 expansion shelves

• 100 TB to 980 TB virtual storage• Much longer retention

20%-25% faster throughput• 400GB/hr • Improved aggregate CIFS throughput• Improved multi-stream backup / recovery throughput

5.58TB Usable 5.58TB Usable5.15TB Usable