Data Protection and Management Lab Guide
Total Page:16
File Type:pdf, Size:1020Kb
Data Protection and Management Lab Guide <Month > 2016 EMC2 PROVEN PROFESSIONAL Copyright Copyright ©2016 EMC Corporation. All Rights Reserved. Published in the USA. EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS IS.” EMC CORPORATION MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. The trademarks, logos, and service marks (collectively "Trademarks") appearing in this publication are the property of EMC Corporation and other parties. Nothing contained in this publication should be construed as granting any license or right to use any Trademark without the prior written permission of the party that owns the Trademark. EMC, EMC², the EMC logo, AccessAnywhere Access Logix, AdvantEdge, AlphaStor, AppSync ApplicationXtender, ArchiveXtender, Atmos, Authentica, Authentic Problems, Automated Resource Manager, AutoStart, AutoSwap, AVALONidm, Avamar, Aveksa, Bus- Tech, Captiva, Catalog Solution, C-Clip, Celerra, Celerra Replicator, Centera, CenterStage, CentraStar, EMC CertTracker. CIO Connect, ClaimPack, ClaimsEditor, Claralert ,CLARiiON, ClientPak, CloudArray, Codebook Correlation Technology, Common Information Model, Compuset, Compute Anywhere, Configuration Intelligence, Configuresoft, Connectrix, Constellation Computing, CoprHD, EMC ControlCenter, CopyCross, CopyPoint, CX, DataBridge , Data Protection Suite. Data Protection Advisor, DBClassify, DD Boost, Dantz, DatabaseXtender, Data Domain, Direct Matrix Architecture, DiskXtender, DiskXtender 2000, DLS ECO, Document Sciences, Documentum, DR Anywhere, DSSD, ECS, elnput, E-Lab, Elastic Cloud Storage, EmailXaminer, EmailXtender , EMC Centera, EMC ControlCenter, EMC LifeLine, EMCTV, Enginuity, EPFM. eRoom, Event Explorer, FAST, FarPoint, FirstPass, FLARE, FormWare, Geosynchrony, Global File Virtualization, Graphic Visualization, Greenplum, HighRoad, HomeBase, Illuminator , InfoArchive, InfoMover, Infoscape, Infra, InputAccel, InputAccel Express, Invista, Ionix, Isilon, ISIS,Kazeon, EMC LifeLine, Mainframe Appliance for Storage, Mainframe Data Library, Max Retriever, MCx, MediaStor , Metro, MetroPoint, MirrorView, Mozy, Multi-Band Deduplication,Navisphere, Netstorage, NetWitness, NetWorker, EMC OnCourse, OnRack, OpenScale, Petrocloud, PixTools, Powerlink, PowerPath, PowerSnap, ProSphere, ProtectEverywhere, ProtectPoint, EMC Proven, EMC Proven Professional, QuickScan, RAPIDPath, EMC RecoverPoint, Rainfinity, RepliCare, RepliStor, ResourcePak, Retrospect, RSA, the RSA logo, SafeLine, SAN Advisor, SAN Copy, SAN Manager, ScaleIO Smarts, Silver Trail, EMC Snap, SnapImage, SnapSure, SnapView, SourceOne, SRDF, EMC Storage Administrator, StorageScope, SupportMate, SymmAPI, SymmEnabler, Symmetrix, Symmetrix DMX, Symmetrix VMAX, TimeFinder, TwinStrata, UltraFlex, UltraPoint, UltraScale, Unisphere, Universal Data Consistency, Vblock, VCE. Velocity, Viewlets, ViPR, Virtual Matrix, Virtual Matrix Architecture, Virtual Provisioning, Virtualize Everything, Compromise Nothing, Virtuent, VMAX, VMAXe, VNX, VNXe, Voyence, VPLEX, VSAM-Assist, VSAM I/O PLUS, VSET, VSPEX, Watch4net, WebXtender, xPression, xPresso, Xtrem, XtremCache, XtremSF, XtremSW, XtremIO, YottaYotta, Zero-Friction Enterprise Storage. Revision Date: June 2016 Course Number: MR-1TP-DPM-1310 EMC2 PROVEN PROFFESSIONAL 2 Table of Contents COPYRIGHT ...................................................................................................................................................................... 2 LAB EXERCISE 1: DATA AVAILABILITY ................................................................................................................................ 4 LAB EXERCISE 2: DATA PROTECTION ARCHITECTURE ........................................................................................................ 5 LAB EXERCISE 3: FAULT TOLERANCE TECHNIQUES ............................................................................................................ 7 LAB EXERCISE 4: DATA BACKUP ........................................................................................................................................ 8 LAB EXERCISE 5: DATA DEDUPLICATION ......................................................................................................................... 10 LAB EXERCISE 6: REPLICATION ........................................................................................................................................ 12 LAB EXERCISE 8: DATA MIGRATION ................................................................................................................................ 16 LAB EXERCISE 9: DATA PROTECTION IN SDDC ................................................................................................................. 18 LAB EXERCISE 10: CLOUD-BASED DATA PROTECTION ..................................................................................................... 20 LAB EXERCISE 11: DATA PROTECTION IN BIG DATA AND MOBILE DEVICE ENVIRONMENT .............................................. 23 LAB EXERCISE 12: SECURING THE DATA PROTECTION ENVIRONMENT ............................................................................ 25 LAB EXERCISE 13: MANAGING DATA PROTECTION ......................................................................................................... 27 EMC2 PROVEN PROFESSIONAL 3 Lab Exercise 1: Data Availability Purpose: To reinforce the concepts presented in the lecture portion of the module, Introduction to Data Protection Tasks: Participants are required to provide a solution for the deliverables based on the given scenario and requirements. References: Module 1: Introduction to Data Protection Scenario In an enterprise data center, a single storage system is used to provide a data archiving service to the customers. The scheduled operating time of the data archiving service is 24×365 hours, so that the customers can archive and retrieve data anytime. The MTBF and MTTR of the storage system are 10000 hours and 12 hours respectively. Last year the storage system failed twice which resulted in a total service downtime of three days. Deliverables: What is the expected availability of the storage system? What are the expected annual uptime and downtime of the storage system? What is the achieved availability of the data archiving service in the last year? End of Lab Exercise EMC2 PROVEN PROFESSIONAL 4 Lab Exercise 2: Data Protection Architecture Purpose: To reinforce the concepts presented in the lecture portion of the module, Data Protection Architecture Tasks: Participants are required to provide a solution for the deliverables based on the given scenario and requirements. References: Module 2: Data Protection Architecture Scenario The IT infrastructure of an organization includes 20 physical computing systems. These compute systems consist of both Microsoft Windows and UNIX platforms. They host financial, email, and backup applications, and the organization’s website. Each compute system runs a single application to avoid resource conflict. The utilization of these compute systems is mostly around 20 percent. These compute systems are connected to six file servers with direct-attached storage (DAS). Three file servers are used for file sharing among Windows compute systems and the remaining three enable file sharing among UNIX compute systems. The email application uses a SAN-attached (block-based) storage system as the primary storage and an aging object-based storage device (OSD) to archive old emails. A SAN-attached tape library is also used to store all backup data. The backup application is purpose-built for backup-to-tape operations. Challenges and Requirements The tape library is aging and is a performance bottleneck during backup operations. Managing different types of storage systems using multiple management tools creates complexity and delays storage provisioning decisions and troubleshooting. Management tools can not provide real-time, end-to-end visibility and reporting on the IT infrastructure, and backup and archiving operations. The SAN-attached storage system has only 10 percent of its storage capacity available for storing new EMC2 PROVEN PROFESSIONAL 5 data. The UNIX users and Microsoft Windows users are unable to share files. Moreover, some of the file servers are overly utilized and therefore new file servers must be deployed to distribute the workload. The organization needs to deploy a set of new applications on social networking, eCommerce, and big data analytics as part of its expanded business objectives. They need to purchase 30 new compute systems to deploy the new applications. Deliverables Propose a solution that will optimize utilization of compute resources and eliminate the performance bottleneck caused by the tape library without changing the existing backup application. The solution should also reduce management complexity, provide real-time, end-to-end visibility of the infrastructure and operations. It should also allow UNIX and Windows users to share files, reduce proliferation of file servers, and improve file serving performance. End of Lab Exercise EMC2 PROVEN PROFESSIONAL 6 Lab Exercise 3: Fault Tolerance