+ All Categories
Home > Software > Esg solution showcase considerations for protecting converged systems and the veritas solution

Esg solution showcase considerations for protecting converged systems and the veritas solution

Date post: 14-Feb-2017
Category:
Upload: fernando-alves
View: 176 times
Download: 1 times
Share this document with a friend
7
This ESG Solution Showcase was commissioned by Veritas and is distributed under license from ESG. © 2016 by The Enterprise Strategy Group, Inc. All Rights Reserved. Introduction Arguably, nothing in the last decade has been more transformative to how IT is delivered than server virtualization. As Figure 1 illustrates, the industry has evolved from simply installing hypervisors on traditional servers, through deploying blades and chassis, and most recently, to leveraging what many consider epitomes of the IT infrastructure building block: the hyperconverged appliance and the converged-systems rack architecture. FIGURE 1. The Evolution of Server Virtualization Infrastructure Source: Enterprise Strategy Group, 2016 But the journey toward a more agile, virtualized state isn’t complete. Increasing the use of server virtualization remains one of the most-cited IT spending priorities among ESG survey respondents (see Figure 2). 1 1 Source: ESG Research Report, 2016 IT Spending Intentions Survey, to be published. Data Protection Considerations for Converged Infrastructure – and the Veritas Solution Date: February 2016 Author: Jason Buffington, Principal Analyst Abstract: “When you modernize production, you must modernize protection.” That claim is true in most IT transformational discussions. But it’s especially true when you’re trying to determine how your data protection strategies and methods should evolve as you embrace converged infrastructure and hyperconverged (CI/HC) systems. Solution Showcase Enterprise Strategy Group | Getting to the bigger truth.
Transcript

This ESG Solution Showcase was commissioned by Veritas and is distributed under license from ESG.

© 2016 by The Enterprise Strategy Group, Inc. All Rights Reserved.

Introduction

Arguably, nothing in the last decade has been more transformative to how IT is delivered than server virtualization. As

Figure 1 illustrates, the industry has evolved from simply installing hypervisors on traditional servers, through deploying

blades and chassis, and most recently, to leveraging what many consider epitomes of the IT infrastructure building block:

the hyperconverged appliance and the converged-systems rack architecture.

FIGURE 1. The Evolution of Server Virtualization Infrastructure

Source: Enterprise Strategy Group, 2016

But the journey toward a more agile, virtualized state isn’t complete. Increasing the use of server virtualization remains one

of the most-cited IT spending priorities among ESG survey respondents (see Figure 2).1

1 Source: ESG Research Report, 2016 IT Spending Intentions Survey, to be published.

Data Protection Considerations for Converged Infrastructure – and the Veritas Solution Date: February 2016 Author: Jason Buffington, Principal Analyst

Abstract: “When you modernize production, you must modernize protection.” That claim is true in most IT transformational discussions. But it’s especially true when you’re trying to determine how your data protection strategies and methods should evolve as you embrace converged infrastructure and hyperconverged (CI/HC) systems.

Solution Showcase

Enterprise Strategy Group | Getting to the bigger truth.™

Solution Showcase: Data Protection Considerations for Converged and Hyperconverged Systems 2

© 2016 by The Enterprise Strategy Group, Inc. All Rights Reserved.

As Figure 2 also shows, improving backup and recovery is another consistently top-cited priority. In fact, in ESG’s 2012,

2013, 2014, and 2015 IT spending intentions research, increasing server virtualization and improving backup were both

always in the top-five most-cited IT priorities lists.

FIGURE 2. Top Ten IT Spending Priorities for 2016

Source: Enterprise Strategy Group, 2016

When You Modernize Production, You Must Modernize Protection

If your environment is only 20% virtualized, you can likely protect it with any mediocre backup approach you might still

have running. When you’re 50% virtualized, you may start feeling encumbered by those older backup approaches. By the

time you’re 70% or more virtualized, mediocre approaches to backup will probably hinder your virtualization

infrastructure. Said another way, as the density of virtual machines per host increases, such approaches to backup will

negatively impact the VMs being protected and the underlying hosts and storage systems. This assertion is not conjecture;

it reflects a difference in architectural approach known to affect IT systems significantly:

Legacy-style, agent-based technologies running within each OS (physical or virtual) responsible for gathering and

transmitting data to and from the backup server create significant spikes in CPU and storage within the OS when

backup operations are in progress. Physical servers are often underutilized and therefore tolerate the spikes without

ramifications. OSs within virtual servers do not have spare capacity. In dense environments such as converged or

hyperconverged (C/HC) systems, CPU, storage, and memory can be oversubscribed because the underlying resources

allocate and share them dynamically. Spikes that rapidly require resources within one VM can strain the remaining

available resources for all other VMs in that host, as well as the host’s own resources.

Modern host-based technologies protect VMs from the host’s perspective instead. By interacting with mature APIs

within the host hypervisor—i.e., VMware vSphere API for Data Protection (VADP) or Microsoft Hyper-V Volume

Shadow Copy Services (VSS)—VMs can be reliably protected without creating huge spikes that impact the

environment. Some kind of agent, helper, or assistance module running in each VM may still be required to ensure

that the data in the VM is ready to be backed up (often invoking VSS calls within each VM or other application-centric

operation). The difference centers on whether the data is then transmitted from within the virtualized OS using an

agent approach (“bad agent”) or the VM is protected as a whole from the host’s APIs (“good agent”).

18%

19%

20%

20%

20%

20%

21%

22%

23%

37%

Business continuity/disaster recovery programs

Improving collaboration capabilities

Desktop virtualization

Increasing use of server virtualization

Major application deployments or upgrades

Improving data backup and recovery

Data integration

Managing data growth

Business intelligence/data analytics initiatives

Cybersecurity initiatives

Top 10 most important IT priorities over the next 12 months. (Percent of respondents, N=633, ten responses accepted)

Solution Showcase: Data Protection Considerations for Converged and Hyperconverged Systems 3

© 2016 by The Enterprise Strategy Group, Inc. All Rights Reserved.

To Be Clear, You Will Modernize Your Protection

Unless you are using a version of a unified data protection solution that is currently shipping (i.e., with a shipping date of

2014 or later), you will almost undoubtedly be updating your data protection solution as part of your embrace of C/HC

systems. The only two questions are when and how.

Proactive protection modernization means that selecting and modernizing your data protection tools supports your

broader IT strategy—enacted as part of modernizing your production infrastructure. Being proactive enables vAdmins,

backup specialists, and IT architects to communicate and collaborate on what SLAs are required and what kinds of recovery

agility are needed by the business units. Once those specifications are identified, a plan is developed and executed, which

includes deploying data protection solution(s) as part of the virtualization infrastructure deployment.

Reactive protection modernization is when an organization attempts to use its mediocre outdated backup solution for its

highly virtualized environment, causing significant I/O impact among the VMs and dissatisfaction among the vAdmins, IT

architects, and end-users. IT is then forced to deal with that issue via a hastily upgraded backup implementation, which can

affect other data protection scenarios until the entire environment is upgraded to a new solution. Considering the urgency

and the anxiety likely present across the broader IT team, an organization may find itself faced with two drastic choices:

Option 1: Upgrade the mediocre outdated backup solution to its currently shipping version, which almost certainly

utilizes the modern VADP and VSS APIs that enable reliable backups of VMs from their hosts.

Option 2: Deploy a VM-specific data protection tool to complement the existing unified protection tool.

Each of the reactionary tactics has its own set of challenges and benefits:

Option 1 (upgrade the unified solution) enables the IT team to continue to use the framework and solution

architecture that it is familiar with, leveraging whatever scale, agility, or heterogeneous considerations that originally

drove it to adopt that platform. However, it may cause “change control” or other unseen aftereffects throughout the

environment depending on both the hardware and software being used.

Option 2 (deploy a VM-specific solution) introduces a separate UI, toolset, schedule, and storage scenario(s), but the

efficiency impact will vary based on who is managing the VM backups, e.g., vAdmin versus backup admin, and

performance may vary based on how much the environment is virtualized

For many organizations with potentially aging unified solutions today, the best possible option is the proactive one.

What to Look for in Modern Virtualization Protection

According to recent ESG research, five of the top six reported challenges in protecting virtualized environments are

visibility related (see Figure 3).2 The implication is that many data protection tools (mostly those using antiquated

approaches) are not virtualization savvy.

Aside from the most-mentioned challenge (recoverability of data), the next five most-cited challenges appear to indicate

that many backup tools can’t discern whether backup/recovery operations are successful or not. They can’t see where

problems are occurring. Or they can’t depict how the backups are affecting the virtual infrastructure (and vice versa).

2 Source: ESG Research Report, Trends in Protecting Virtualized Environments, August 2015.

Philip.Wandrei
Typewritten Text
Philip.Wandrei
Typewritten Text
Philip.Wandrei
Typewritten Text
.
Philip.Wandrei
Typewritten Text

Solution Showcase: Data Protection Considerations for Converged and Hyperconverged Systems 4

© 2016 by The Enterprise Strategy Group, Inc. All Rights Reserved.

In other words, even if the VMs are being backed up successfully, IT operators won’t know it, and therefore they’ll have

doubts. Those doubts will eventually lead them to replace the solution with one that not only performs better, but also

communicates its effectiveness.

FIGURE 3. Top Ten Challenges in Protecting Virtual Environments

Source: Enterprise Strategy Group, 2016

A key differentiator to look for is the VM/host savviness of the backup policies, dashboard, and workflow integration with

whichever hypervisor or systems management framework(s) is in use or planned.

ESG research (see Figure 4) also reveals the most important virtualization-specific features sought by responding

organizations assessing new data protection solutions, including unified solutions and VM-specific solutions.3

3 ibid.

29%

29%

30%

31%

31%

32%

32%

39%

39%

45%

6%

8%

6%

5%

6%

6%

7%

8%

9%

15%

0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50%

Ensuring application consistency

Response time for troubleshooting backup failures, policyviolations, etc.

Gaps in protection

Understanding the impact of backup operations on theperformance of applications sharing physical resources

Simplified views across virtual infrastructure

Tracking capacity trends and consumption

Identifying inefficiencies and bottlenecks in the backupprocess

Validating recovery success

Validating backup success

Recoverability of data

Primary virtualserver dataprotectionchallenge

All virtual serverdata protectionchallenges

Which of the following would you characterize as challenges for protecting your organization’s virtual server environment? Which would you consider to be your organization’s primary virtual server data

protection challenge? (Percent of respondents, N=375)

Solution Showcase: Data Protection Considerations for Converged and Hyperconverged Systems 5

© 2016 by The Enterprise Strategy Group, Inc. All Rights Reserved.

FIGURE 4. Primary VM-specific Capabilities Important for Choosing a New Data Protection Product

Source: Enterprise Strategy Group, 2016

Interestingly, both the top-cited challenge protecting virtualized environments (shown in Figure 3) and the most-cited

important feature for choosing a data protection product (shown in Figure 4) relate to recovery of data.

In contrast, the next five most-cited challenges relate to management/monitoring, which can cause dissatisfaction. But the

next five most-cited sought-after features all deal with functionality (i.e., cloud integration, replication, deduplication, and

overall efficiency). Pragmatically speaking, Figure 4 provides some of the key features to look for:

Instant or Rapid VM Recovery—gone are the days when business leaders would wait for “restores” before IT could

begin to “recover” the business process.

Ability to Use Cloud Services—for data survivability in non-regulated industries, BC/DR preparedness, etc.

More Continuous Protection—to reduce data loss between backup windows. It is often achieved by combining

snapshot, replication, and backup policies under a single management framework.

11%

13%

13%

14%

14%

14%

15%

16%

17%

17%

18%

19%

22%

27%

29%

0% 5% 10% 15% 20% 25% 30% 35%

Granular recovery of data objects (e.g. SharePoint/Exchange)from VM-backup

Granular recovery of files from within VM-based backups

Ability to recover one hypervisor’s VM into a different hypervisor

Integration with hardware-based deduplication arrays

Integrated protection with storage-snapshots

Ability to protect IaaS-hosted VMs (e.g. Amazon or MicrosoftAzure)

Ability to use tape for long-term retention of VM-centric data

Management of backups/recoveries from within Hyper-V/SysCtr UIs

Management of backups/recoveries from within vCentermanagement UIs

Application consistency within VMs

Ability to use cloud-services for BC/DR (e.g. DRaaS)

Built-in software-based deduplication

Continuous or near-continuous data protection (i.e.,journaling/replication)

Ability to use cloud services for offsite protection

“Instant” or rapid recovery of VMs directly from the backup server/appliance

Which virtual machine-specific protection capabilities are primary factors for choosing new data protection product considerations? (Percent of respondents, N=375, three responses accepted)

Solution Showcase: Data Protection Considerations for Converged and Hyperconverged Systems 6

© 2016 by The Enterprise Strategy Group, Inc. All Rights Reserved.

These features align with the broader data protection mandates set by IT leadership in 2015 as reported by ESG survey

respondents (see Figure 5).4

FIGURE 5. Top Five Data Protection Mandates from IT Leadership in 2015

Source: Enterprise Strategy Group, 2016

How Veritas NetBackup Addresses Protection and Recovery of CI/HC Environments

Veritas, one of the long-standing leader brands in enterprise data protection, continues to address the needs of

organizations that demand heterogeneous protection and recovery at true enterprise scale. By fully utilizing the VMware

APIs for Data Protection (VADP), Microsoft Volume ShadowCopy Services (VSS), and the Microsoft System Center Virtual

Machine Manager (SCVMM), NetBackup 7.7 continues Veritas’ vision to ensure that all IT platforms are protected with the

same rigor for data retention and recoverability. Additionally, it continues to still ensure an optimized (VMware) platform

experience that should assure both vAdmins and data protection specialists that their VMs are as well protected and

reliably recoverable as the rest of the heterogeneous enterprise (see Figure 6).5

FIGURE 6. Overview of Veritas NetBackup 7.7 Backup Mechanisms Utilizing VMware VADP

Source: Veritas, 2016

4 Source: ESG Research Report, Trends in Protecting Virtualized Environments, August 2015. 5 ibid.

18%

20%

22%

23%

28%

0% 5% 10% 15% 20% 25% 30%

Reduce data protection software costs

Improve long-term retention (using tape, disk or cloud)

Increase speed or frequency of backups

Increase speed/agility of recoveries

Increase reliability of backups or recoveries

What are the top data protection mandates from your organization’s IT leadership? (Percent of respondents, N=375, three responses accepted)

Solution Showcase: Data Protection Considerations for Converged and Hyperconverged Systems 7

© 2016 by The Enterprise Strategy Group, Inc. All Rights Reserved.

The Veritas NetBackup platform is designed to leverage the same VADP mechanisms that some VM-only solutions utilize,

while still providing the same NetBackup policy/management framework, diverse media options, and enterprise-scale

catalog, deduplication, and monitoring benefits that NetBackup users are accustomed to. That being said, NetBackup 7.7

does boast several VM-specific capabilities, including:

Live protection of both Windows VMs (utilizing VSS) and Linux VMs (using SYMCquiesce).

Granular recovery of data from within VMware VM virtual disks.

Deduplication at both the backup host and within the NetBackup Media Server to significantly reduce storage

requirements when protecting numerous, yet similar, virtual machines.

Integrated use of VMware Change Block Tracking to significantly reduce backup times, while still ensuring flexible

recovery via synthetic full backups, utilizing NetBackup Accelerator.

Rapid resumption of functionality by using Veritas’ Instant Recovery for VMware (IRV) to mount VMs from within

the NetBackup storage and then utilize VMware Storage vMotion to relocate the running, restored VM to a

production host after the users have resumed productivity.

Additional benefits of the Veritas NetBackup platform are its Appliance offerings, which enable a turnkey solution for

efficient, storage-optimized data protection for the data center, remote offices, and virtual environments. The NetBackup

Platform and Appliances ensure that organizations have modern data protection for their converged infrastructure or

hyperconverged environment.

The Bigger Truth

Improving data protection continues to be one of the most commonly cited IT spending priorities among IT decision

makers, year after year—it is a priority often spurred by the deployment of new IT workloads that demand modern

protection and recovery approaches. One of the key drivers for a “new” level of data protection is server virtualization.

Virtualization (storage, compute, and networking) is often best achieved through converged or hyperconverged platforms

because of their pre-integration, ease and consistency of deployment, and their ability to increase the VM density,

resulting in more efficiency and agility.

Virtualization’s transformative impact on IT cannot be overstated. But the same virtualization mechanisms that boost the

agility of production IT environments can create unreliability or hinder backup and recovery endeavors. The answer to this

problem is to proactively plan on modernizing protection mechanisms and strategies as part of the larger planning and

implementation effort to create a modern production infrastructure.

All trademark names are property of their respective companies. Information contained in this publication has been obtained by sources The Enterprise Strategy Group

(ESG) considers to be reliable but is not warranted by ESG. This publication may contain opinions of ESG, which are subject to change. This publication is copyrighted by

The Enterprise Strategy Group, Inc. Any reproduction or redistribution of this publication, in whole or in part, whether in hard-copy format, electronically, or otherwise to

persons not authorized to receive it, without the express consent of The Enterprise Strategy Group, Inc., is in violation of U.S. copyright law and will be subject to an

action for civil damages and, if applicable, criminal prosecution. Should you have any questions, please contact ESG Client Relations at 508.482.0188.

www.esg-global.com [email protected] P. 508.482.0188

Enterprise Strategy Group is an IT analyst, research, validation, and strategy firm that provides market intelligence and actionable insight to the global IT community.

© 2016 by The Enterprise Strategy Group, Inc. All Rights Reserved.


Recommended