CommVault SnapProtect Field Guide For HP 3PAR Storage PDF

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 52

SnapProtect Field Guide for

HP 3PAR Storage System

August 2012 – v1.2

Frank Yoo
Product Specialist
Document History
Revision History
Rev. Date Summary of Changes
v1.0 December 19,  Initial Release
2011
v1.1 December 21,  D. Foster Review & Edits
2011
v1.2 August, 2012  [FY]: Revised the area to define the Array S/N – matched
what’s in BOL

CommVault Products - Confidential August 2012 – v1.2 2


Document History ............................................................................................................... 2
Revision History ................................................................................................................................... 2
SnapProtect Field Guide Objective & Overview ............................................................... 5
HP 3PAR Storage System Overview .................................................................................. 6
Architecture of HP 3PAR ..................................................................................................................... 6
ASIC-based thin storage .................................................................................................................. 7
Virtual Volumes ................................................................................................................................ 7
Virtual Volume LUN exports and LUN masking ............................................................................... 8
HP 3PAR Storage-Systems................................................................................................................. 8
CommVault Integration Requirements for SnapProtect ................................................... 9
Array Software Licenses ...................................................................................................................... 9
Simpana Software ............................................................................................................................... 9
Basic File System Environments ..................................................................................................... 9
Application Environments .............................................................................................................. 10
Virtual Environments ...................................................................................................................... 10
Supported Applications and Operating Environments ...................................................................... 10
SnapProtect Array Configuration Details with HP 3PAR ................................................ 11
HP 3PAR Array Configuration for Clone/Snap .................................................................................. 11
Steps to Configure the HP 3PAR Array............................................................................................. 14
How to define an HP 3PAR Array: ................................................................................................. 14
SnapProtect Storage Policy Configuration ........................................................................................ 15
Create and configure a Storage Policy with a Snapshot Copy: ..................................................... 15
The SnapProtect Process ................................................................................................. 18
SnapProtect Backup Operation ......................................................................................................... 18
Backup Copy Operation .................................................................................................................... 18
Production Host Configuration .......................................................................................................... 19
Application Configurations ............................................................................................................. 19
VMware Configurations.................................................................................................................. 23
Proxy Configuration ........................................................................................................................... 24
Exchange Configuration ................................................................................................................ 24
Oracle Configuration ...................................................................................................................... 25
Verification of Configuration Using SnapTest (for iSCSI / FC) .......................................................... 26
Security & Storage Policy Best Practices ....................................................................... 30
Security Roles ................................................................................................................................... 30
Storage Policies ................................................................................................................................. 31
Manipulating Snapshots ................................................................................................... 33
Mount/Dismount Snaps for Manual Browse ...................................................................................... 34
Reverting a Snapshot ........................................................................................................................ 37

CommVault Products - Confidential August 2012 – v1.2 3


Application Aware Revert .............................................................................................................. 37
Non Application Aware Revert ....................................................................................................... 39
Out of Place Restore Capabilities – (VMware Example) ................................................................... 40
Appendix ........................................................................................................................... 42
Determine the HP 3PAR Array ID ..................................................................................................... 42
There are two ways that you can determine the HP 3PAR Array ID: ............................................ 42
Alternatively, you can obtain the HP 3PAR Array ID using the following formulae: ...................... 43
How to assign a new CPG / Virtual Volume / VLUN to a specific Host ............................................. 44
SnapProtect with HP 3PAR Clone .................................................................................................... 49
SnapProtect with HP 3PAR Snap ..................................................................................................... 51
Snap Reconciliation Registry Key ..................................................................................................... 52

CommVault Products - Confidential August 2012 – v1.2 4


SnapProtect Field Guide Objective & Overview

The SnapProtect Field Guide provides detailed descriptions for configuring hardware-based snapshot
mechanisms with the CommVault Simpana Platform. This guide is an introductory overview of the HP
3PAR storage array with its built in technology and feature sets, along with the licenses and
configuration requirements to integrate these controls with CommVault Simpana Platform. This
document covers multiple storage environments and use cases in detail with best practices for
scheduling and storage policies to achieve consistent results both for recovery and protection needs.

Simpana SnapProtect enables a modernized approach to data protection merging hardware storage
systems snapshots directly into the protection/backup process. By automatically integrating
application intelligence with the array snapshot abilities, Simpana is able to reach through the
application and file systems into the storage array and discover volume/disk configurations for the
snapshot operations and coordinate these operations with proper application quiesce – minimizing
administrative configuration and eliminating the any scripting requirements.

When a scheduled protection job for the defined application runs, the source system quiesces the
selected applications and automatically creates a set of persistent snapshots within the production
storage system. With a confirmation of the successful snapshot creation by the host, the workload in
the protection job shifts to a secondary proxy server to offload backup operations. This shift releases
the production host and it returns to full production side operations. This allows a consistent data
image to be created in minutes with RPOs aligning with the frequency of schedule.

The Proxy completes the second half of the protection job by reaching into the SAN, mounting the
snapshot and automatically indexing and cataloging the file-level contents of the snapshots relative to
the production host and the selected contents. Unlike hardware-based snap approaches Simpana
extends beyond simply creating or deleting snapshots. SnapProtect blends the speed and efficiency
of array snapshots directly into the backup /recovery process – offering full system recovery or single
file/search and restore. Once the content aware indexing completes, the snapshot is retained in the
array as a persistent recovery copy to provide the rapid recovery option to revert or restore the data
volumes.

The Proxy serves a secondary role after the snapshot executes. The same snapshots will mount and
copy the relevant file contents from the snapshot and apply the Simpana data deduplication process
to the data during transport to the backup copy destination. The backup copy employs a separate
retention than the snapshot allowing aggressive snapshot retention to conserve tier1 space to meet
the RTO/RPO needs. As data moves into the backup copy the original indices are preserved and
stored along with the data to ensure access from any location. More importantly the backup copy
leverages Simpana’s data deduplication to move and store less. In light of many of today’s new
privacy regulations – data encryption is a critical feature to apply to data to keep it highly secured from
unwanted eyes. A modernized data management system ensures you can take advantage of both
benefits at the same time; deduplicating data for reduction while also encrypting it for security without
impacting Production Processes.

SnapProtect supports the leading SAN/NAS storage solutions from Dell, EMC, NetApp, LSI, HP,
SUN, IBM and HDS – and this list continues to expand. Please refer to www.commvault.com for the
most up to date revision of the supported hardware and software configurations.

CommVault Products - Confidential August 2012 – v1.2 5


HP 3PAR Storage System Overview

HP 3PAR Inc., originally a manufacturer of system and software for data storage and information
management headquartered in California, USA has been wholly owned by Hewlett-Packard since
2010. HP 3PAR led to develop InServ storage server with “Utility Storage” being one of the major
development of storage category in mind, giving a multi-tenant platform on which service providers
can deliver both virtualized and scalable enterprise IT as a utility service. HP 3PAR’s T-series array
competes directly with the high-end storage arrays such as the EMC DMX and HDS USP, as well as
the F-series to cover the EMC Clariion (CX) and HP EVA ranges.

HP 3PAR employs one of the first differentiating Thin Provisioning mechanisms, whereby a fat-to-thin
volume conversion is achieved without disrupting any of the operations on the storage system itself.
Thin Provisioning allows HP 3PAR customers to use storage on demand and allow for greater storage
efficiencies by consuming space as required, limiting wasted capacity.

This is NOT a HP 3PAR Administrator/Maintenance Training Guide. Please visit www.hp.com/3par for
further training material. (Login Required)

Architecture of HP 3PAR
Each HP 3PAR storage system features a high-speed, full mesh, passive system backplane that joins
multiple controller nodes to form a cache-coherent, mesh-active cluster. Within this architecture
comes tight coordination among clustered controller nodes paired through custom ASIC, then fiber
channel connections from each node in the pair with dual-ported drive chassis owned by the pair.
Controller nodes then provide the host connectivity either via iSCSI or SAN:

CommVault Products - Confidential August 2012 – v1.2 6


ASIC-based thin storage
The HP P10k Controllers nodes feature Thin Provisioning built-In technology unique to HP 3PAR,
also available in the T-Class and F-Class arrays. The HP’s 3PAR Gen4 ASIC feature a fat-to-thin
volume conversion algorithm built into the silicon. The capability works with the HP 3PAR software to
enable users to take a “thick” provisioned volume on legacy storage and convert them to “thin”
provisioned volumes on the system on-the-fly. During this process, allocated-but-unused capacity
within each data volume is initialized with zeros. The Gen3 and 4 ASICs use built-in zero detection
capability to recognize and virtualized blocks of zeros to drive these conversions while maintaining
high-level performance.

Virtual Volumes
There are two types of Virtual Volumes:

 Base Volume: Considered the original Virtual Volume where it directly maps all the user-
visible data.
 Snapshot Volume: is mapped indirectly to the parent’s data. When a block is written to the
parent, the original block is copied from the parent to the snapshot data space as a Copy-On-
Write model. Once the data has been copied, the snapshot now points to the snapshot
reserve area.

Virtual Volumes have three types of spaces:

 The User Space representing the user-visible space


 The Snapshot data space used to store modified data associated with snapshots in 16KB
pages
 The Snapshot

Showing below is an example of the Virtual Volume Usage in order and how to define the Copy
Space for the clone/snap:

CommVault Products - Confidential August 2012 – v1.2 7


Virtual Volume LUN exports and LUN masking
Virtual Volumes are only visible to a host if they are exported as Virtual LUNs (VLUNs). Virtual
Volumes can be exported in three different ways:

 To specific hosts: The Virtual Volume would be visible to the specified WWNs, irrespective
of which port those WWNs appear on. This is a convenient way to export Virtual Volumes to
known hosts
 To any host on a specific port: This is useful when the hosts are not known prior, or in a
situations where the WWN of the host cannot be trusted
 To specific hosts on a specified port: On the system, Virtual Volumes themselves do not
consume LUN numbers as they do on some systems. Only VLUNs will consume LUN
numbers.

HP 3PAR Storage-Systems
Three different offerings are available for the HP 3PAR storage systems, F-Class being the entry level
model, and the P10000 model being the high-end model:

Model Max #Disks Max RAW Cap. Connectivity


F-Class
12 x 4 GB/sec or 8 x
F200 192 128 TB
iSCSI
24 x 4GB/sec or 16 x
F400 384 384 TB
iSCSI
T-Class
64 x 4GB/sec or 16 x
T400 640 400 TB
iSCSI
128 x 4GB/sec or 32 x
T800 1280 800 TB
iSCSI
P10k
V400 960 800 TB 96 x 8GB/sec
V800 1920 1.6 PB 192 x 8GB/sec

CommVault Products - Confidential August 2012 – v1.2 8


CommVault Integration Requirements for SnapProtect
Array Software Licenses
CommVault recommends (depending on the application environment) enabling the following Array
Software Licenses on the HP 3PAR storage system to integrate with CommVault Software:

 By default all functionality in the HP 3PAR storage system layer should be enabled (Snapshot
capabilities come standard with the current HP 3PAR models). There are no other Array
Licenses required. If in doubt, please engage an HP Representative to ensure all of
appropriate functionality has been configured properly.

 HP requires HP 3PAR storage system to have run thru the Storage-System Initialization Utility
to have run correctly prior to running any functionality thru the HP 3PAR InForm Management
Console. This step is REQUIRED to ensure that the storage system have their designated IP
addresses for the array to work correctly. Please engage an HP Representative to ensure HP
3PAR storage system is fully up and functional.

Simpana Software
SnapProtect solutions will require the appropriate data agents as defined by the customer
configuration. Below we will define a few terms in use going forward in this document:

 Production Host – Server hosting the actual production LUN for snapshot or clone
operations
 Proxy Host – Server mounting the snapshot or clone for backup purposes off of the
Production Host
 Array – Hardware Storage Array executing the snapshots
 File System iDataAgent – iDataAgent for protecting the file system of a host and is also a
base requirement for most Application iDataAgents.
 MediaAgent – Agent for creating and managing snapshots as well as for writing data to
backup targets
 Application iDataAgent – iDataAgents to protect applications such as SQL, Exchange, DB2,
SAP and Oracle. Enables Application Aware snapshots to be created when backups are
scheduled
 Virtual Server Agent (VSA) – iDataAgent providing protection of Virtualization Environments
without installing backup iDataAgents internal to the guests
 CommVault VSS Software Provider – CommVault VSS Software Provider for Windows
Guests to allow for programmatic controls of the Windows VSS components

Basic File System Environments


As with all configurations, a CommServe, necessary storage capacity, and MediaAgents must exist to
enable a completely functional solution. On top of the basic infrastructure components, the
SnapProtect base configuration requires the following agents on the Production Host:

 File System iDataAgent (for the appropriate Operating System)


 MediaAgent
 CommVault VSS Software Provider (Windows Only)

For a configuration where snapshots mount off host to a Proxy server, implement the following agents
on the Proxy server:

 File System iDataAgent (Must be similar to Production Host Operating System)


 MediaAgent

CommVault Products - Confidential August 2012 – v1.2 9


Application Environments
When implementing for Application Environments simply add the appropriate snap supported
Application iDataAgent to the SnapProtect base configuration as follows on the Production Host:

 File System iDataAgent (for the appropriate Operating System)


 MediaAgent
 CommVault VSS Provider Software Provider (Windows Only)
 Application iDataAgent for selected Application
o Exchange – use the Exchange Database iDataAgent
o DB2 – use the DB2 iDataAgent
o Microsoft SQL – use the MSSQL iDataAgent
o Oracle – use the Oracle iDataAgent
o SAP – use the SAP iDataAgent

For a configuration where snapshots mount off host to a Proxy server, implement the following agents
on the Proxy server:

 File System iDataAgent (Must be similar to Production Host Operating System)


 MediaAgent
 Application specific iDataAgent (Must be the same to Production Host) to enable Proxy
 Application API (i.e. – Exchange Management Pack, Oracle for RMAN integration, etc.)

Virtual Environments
The SnapProtect with the Virtual Server Agent enables point-in-time snapshots with hardware
snapshot engines to provide snapshot functionality for data protection operations of virtual guests.
Using a dedicated ESX server for selective copy to Tier 2 storage completely removes any utilization
on the Production ESX farm. The copy operation to Tier 2 storage enables Granular Recovery for
individual file and folder recovery. To enable SnapProtect for the Virtual Environment ensure the
following:

 File System iDataAgent (for the appropriate Operating System)


 MediaAgent
 Virtual Server Agent (VSA) iDataAgent

The virtual server Agent may be running as a Hot Add mode guest external to the production farm to
eliminate processing. The Virtual Server Agent leverages Proxy capabilities by default with no agents
installed on the ESX server.

Supported Applications and Operating Environments


Please visit Books On-Line (http://documentation.commvault.com) for a complete listing of supported
SnapProtect Applications and Operating Environments and any potential solution caveats.

CommVault Products - Confidential August 2012 – v1.2 10


SnapProtect Array Configuration Details with HP 3PAR
HP 3PAR Array Configuration for Clone/Snap
To successfully provision storage for SnapProtect using Snap/Clone for HP 3PAR, you require the
following steps to successfully create, assign and map logical devices for Production Host use:

1. Create / Register Host that is connected to the HP 3PAR Array


2. Create a Common Provisioning Group (CPG) if required
3. Create / Export a Virtual Volume
4. Create a Virtual Volume LUN for use

Example below, and on the page that follows, shows a HP 3PAR Array ID of “1302965” (3par-
2.commvault.com) has a “CommVault” Common Provisioning Group, with a Virtual Volume
“augpcs01” exported to host augpcs01 and has a provisioned Virtual LUN with “LUN ID #13”
created:

CommVault Products - Confidential August 2012 – v1.2 11


Also to note that the host augpcs01 has the following information for the iSCSI connectivity to the
specified Virtual Volume:

For Snap and Clone to successfully work, we must also provide a CPG that will act as the reserve
space for the operations to work correctly from the Virtual Volume properties:

CommVault Products - Confidential August 2012 – v1.2 12


For SnapProtect to function appropriately, Host with visibility to LUNs MUST has been presented
appropriately.

Further information on whether the LUN has been properly configured for SnapProtect use, please
refer to Appendix – How to map a new LUN to a Host section to map a LUN appropriately.

CommVault Products - Confidential August 2012 – v1.2 13


Steps to Configure the HP 3PAR Array
Defining configuration properties for arrays leveraged for SnapProtect occurs in the Array
Management area of the Simpana Control Panel. Defining the HP 3PAR array can be achieved in two
ways and allows execution of snapshot operations during the appropriate backup jobs using the
credentials provided.

How to define an HP 3PAR Array:


1. Click on the Array Management in the Control Panel:

2. Select Add on the Array Management Dialog Box:

3. Select HP 3PAR from the Snap Vendor list

4. Specify the HP 3PAR ID of the array in the Name. Refer to


the Appendix section on how to define a HP 3PAR ID

5. Specify the HP 3PAR InForm Management server IP


address for the Control Host

6. Enter the access information for the HP 3PAR


Management Server in the Username and
Password fields

7. The Device Group is the CPG that you wish to use to


store the snapshot information

CommVault Products - Confidential August 2012 – v1.2 14


SnapProtect Storage Policy Configuration
SnapProtect operations require a “Primary Snap Copy” to house the indexing information for the data
retained internal to the snapshots. Any currently defined or newly created storage policy supports the
addition of an additional “Primary Snap Copy”. For detailed information on storage policy creation and
the options available for configuration see the online documentation at:

http://documentation.commvault.com/commvault/release_9_0_0/books_online_1/english_us/index/index.html

Create and configure a Storage Policy with a Snapshot Copy:


1. Select a Storage Policy and right click; select “All Tasks”; select “Create New Snapshot Copy”

2. Define a unique Copy Name of the newly created Snapshot Copy and define the Library and
MediaAgent where the Snapshot Copy Indexing information will be stored:

CommVault Products - Confidential August 2012 – v1.2 15


3. Select the Retention tab and define the retention for the number of days or cycles the
snapshot will live internal to the Array and click OK to create the Snapshot Copy within the
Storage Policy:

4. The configured Storage Policy will now show both the previously defined Primary Copy and
the new Snapshot Copy as seen below:

5. To protect Snapshot data in the Primary Snap Copy to the Primary Storage Policy Copy
initiate a Backup Copy to back up the selected jobs. To define which snapshots are marked
for inclusion of the backup copy operation, select the previously configured storage policy,
right click and go to properties.

6. Select the “Snapshot” tab. Under the Snapshot tab are the options to define which snapshots
generate backup copies. The selective rules allow all snapshot operations to drive a
synchronous backup copy or selectively choose snapshots based upon timing or manual
select. Any job meeting the rules for backup copy will be mounted on the defined proxy upon
executing the backup copy operation.

CommVault Products - Confidential August 2012 – v1.2 16


7. To execute the Storage Policy Backup Copy operation, simply right click on the Storage
Policy, select All Tasks, and Run Backup Copy. The Backup Copy dialog box allows for
backup copy creation on demand or through a schedule:

CommVault Products - Confidential August 2012 – v1.2 17


The SnapProtect Process
SnapProtect Backup Operation
SnapProtect backups consist of the following operations:
1. The backup job initiates from the CommCell Console via schedule or an on-demand job
2. When the backup job starts, the file system, associated applications, or Virtual Machines
properly acquiesce (VSS calls in Windows or through application interfaces such as
RMAN to put the DB in a Hot Backup mode). In VMware configurations, vStorage APIs
are called to create software snapshots and enable delta file creation for each of the
guests targeted as contents of the snapshot.
3. Array API is called to:
a. Verify the backup job contents (validating the underlying disk structure for file
systems, databases, VM Data stores, etc.. and the required log files)
i. Clone: Create and link a temporary Clone Volume to the Production volume,
wait for synchronization, mark the linked temporary cloned volume as a
separate unexported volume
ii. Snap: Create a Snap session for the Production volume
b. If not done already, assign the Clone/Snap to the appropriate host in question (either
the production or the proxy host) and make a linked copy of the Clone/Snap
c. Mount up the linked copy Clone/Snap on the source or the selected proxy host for
post snapshot operations (E.g. Scan & Catalog for File System, Integrity checks for
Exchange Database & Backup to media if selected). For VMware and RMAN proxy
configurations, the Virtual Machines and database files are registered by the proxy
application software.
4. Unmount the linked copy Clone/Snap and delete the linked copy, preserving the original
Clone/Snap from any modifications

This snapshot now provides availability for backup copy operations and high speed restore / mount /
revert operations.

Backup Copy Operation


A backup copy operation provides the capability to copy the snapshots of the data to media. You have
the ability to enable/disable backup copy operations for a snapshot copy, i.e., once a backup copy is
enabled, the snapshots will be copied to media during a Backup Copy operation. Additionally, the
snapshots will be copied to media based on the backup copy rules specified for the snapshot copy.

A backup copy execution occurs during the SnapProtect backup or at a later time. The backup copy
operations can be useful for creating additional standby copies of data. When selecting/deselecting a
job for backup copy operations, ensure that all the dependent jobs (for example, incremental,
differential, etc.) in the complete backup cycle are selected/deselected as the snapshots are copied to
media in a sequential order. If a previously selected snapshot has not been copied to media, a
request inline SnapProtect backup job will complete without creating the backup copy due to
sequential order in which these copies must be made. An on demand offline backup copy operations
must be scheduled for the current backup and the previously non copied job to get the data to backup
media. Backup Copy operations mount the selected snapshots in sequential fashion to execute a file
system level backup of the snapshots. For Oracle and VMware, the backup copy operations will
leverage RMAN and VADP to provide complete object integration (table level restore, single file
access, etc.) in to the backup copy store.

CommVault Products - Confidential August 2012 – v1.2 18


During the Backup Copy operation:
1. The snapshot is mounted to the source or proxy host. The mounted snapshot receives
commands to scan and backups like a normal file system and the required contents are
read.
2. The file system backup is performed to Primary Copy of the storage policy of all defined
files. The data is indexed and linked back to the original production host.
3. When the backup copy job is finished, the snapshot is unmounted and retained based
upon Snapshot Copy retention settings.

Production Host Configuration


Application Configurations
Protecting Application Databases and log volumes through an Array snapshot provide fast access for
recovery and many flexible options for data protection. SnapProtect integrates key Application
awareness together with the Array and our Platform to deliver all of the benefits of traditional
streaming backups with all of the performance and Proxy capabilities of a snapshot. This application
awareness allows true log-consistent “hot” backups with appropriate log management operations
based off the contents of the data in the snapshot. SnapProtect aligns all of the log and data base
volumes and snapshots using them in concert to provide fast low impact recovery points through the
Array without scripts.

Before stepping through any configuration steps, deploy the proper agents on the Production Host
requiring snapshot integration with the Array. Application environments require:

 File System iDataAgent (for the appropriate Operating System) – The Base agent that
manages and protects the file system data from the
Production Host. File System contents are supported
for SnapProtect operations as well, but it is
recommended to define application data sets with the
application iDataAgent.

If no supported Application iDA’s are available, end-user


written Pre and Post Snap scripts can be used to acquiesce
the unsupported application successfully for SnapProtect
integration.

 MediaAgent – Provides media management


capabilities to execute Array functions and provide
LAN free access to snapshots for recovery

 CommVault VSS Provider – Provide VSS interaction


with the Array and the Simpana Platform to ensure Microsoft Applications are properly
acquiesced and protected during the snapshot process

 Application iDataAgent for selected Application – Provides low level application


integration for Oracle, SQL, Exchange, VMware, Hyper-V, DB2, SAP, etc. ensuring the
appropriate APIs are called when acquiescing and releasing the application during the
snapshot operations. This iDataAgent will also align the volumes for snap based off the
logical databases or contents defined in the subclient including logs. If five databases all have
separate LUNS, and Log Volumes, the application agent will defined the contents
appropriately for all ten volumes to be snapshotted together.

CommVault Products - Confidential August 2012 – v1.2 19


The following steps will configure the implemented Virtualization Environment for SnapProtect
operations:
1. Enable SnapProtect on the Application Server acting as the Production Host in the CommCell
GUI. Right Click on the server name, select “All Tasks”, and then select “Properties.”
2. Navigate to the Advanced Tab and check the box marked “Enable SnapProtect.” This will
consume a SnapProtect license from the license key:

3. Browse to the Production Host Application iDA (in this case we are using Exchange Database
iDA) and select the desired subclient to enable SnapProtect Operations:

4. Browse to the SnapProtect Operations tab; check the “SnapProtect” box. Select 3PAR
Snap/Clone as the “Available Snap Engines”:

CommVault Products - Confidential August 2012 – v1.2 20


5. To define Proxy configurations on the “SnapProtect Operations” tab click on the drop down
box next to “Use Proxy.” This provides available servers to use as the Proxy during the index
and backup copy operations. The selected server mounts the Array snapshot when a backup
copy operation executes.

If the “Use source if proxy is unreachable” is selected the snapshot will default to the Product
Host if the defined proxy server is unreachable for any reason:

6. Ensure the Storage Device tab has a storage policy with a Snap Copy defined and click OK to
close the Subclient properties.
7. To execute a Snap Operation for the Application agent, simply schedule or generate a backup
request of the previously configured Subclient.

CommVault Products - Confidential August 2012 – v1.2 21


For Exchange Database SnapProtect operations, an ESE consistency check run on the snapshot
copy to validate the consistency of the database files. This is enabled by default and can be found
and modified under the “advanced” job options on the scheduled backup operation. It is highly
recommended to leave this enabled to provide integrity checks to Exchange messaging
environments.

CommVault Products - Confidential August 2012 – v1.2 22


VMware Configurations
SnapProtect enables fast protection of large or volatile VMware environments without placing load on
the production Virtualization Farm. SnapProtect technology integration with the Virtual Server Agent
(VSA) enables the Array to perform backups in minutes even with large numbers of virtual machines
and sizable data stores. A dedicated ESX server for Proxy data movement completely removes any
utilization on the ESX farm with granular access providing individual file and folder recovery from the
secondary tier of storage.

Prior to configuring the virtualization environment, deploy the proper


agents requiring snapshot integration with the Array. VMware
specifically requires more security rights beyond the typical VADP
use case. See the Appendix for security details in creating proper
security environment for SnapProtect. Virtualization environments
require the following agents:

 Virtual Server Agent (VSA) on the physical server(s) or


virtual hot-add guest(s)
 File System iDataAgent on the physical server(s) or virtual
hot-add guest(s)
 MediaAgent on the physical server(s) or virtual hot-add
guest(s)

The following steps will configure the implemented Virtualization Environment for SnapProtect
operations:
1. First, enable SnapProtect on the physical or virtual server with the VSA Agent by selecting the
server in the CommCell GUI. Right Click on the server name, select “All Tasks”, and then
select “Properties.”
2. Navigate to the Advanced Tab and check the box marked “Enable SnapProtect.” This will
consume a SnapProtect license from the license key:

3. Browse to the VSA iDataAgent and select the desired backup set and then access the
properties on the desired Subclient to enable SnapProtect Operations:

CommVault Products - Confidential August 2012 – v1.2 23


4. Browse to the SnapProtect Operations tab, check the “SnapProtect” box. Select 3PAR
Clone/Snap as the “Available Snap Engines”.
5. To define Proxy configurations on the “SnapProtect Operations” tab, below the “Proxy ESX
Server”, click on “Select ESX server for snap mount”. This opens a dialogue box with the
available ESX servers in the environment. Select the desired ESX server to perform the Proxy
operations for generating granular backups to disk/tape/cloud. The selected ESX server
mounts the Array snapshot when a backup copy operation executes.
6. Ensure the Storage Device tab has a storage policy with a Snap Copy defined and click OK to
close the Subclient properties.
7. To execute a Snap Operation for the VSA agent, simply schedule or generate a backup
request of the previously configured Subclient.

Proxy Configuration
SnapProtect provides a modernized architecture for handling data protection operations within the
datacenter. Proxy capabilities enable an array-based snapshot to mount off-host eliminating backup
processes on the production servers and linking indexing information to the original location. Allowing
for multiple snapshots from differing servers across high-speed FC and IP networks eliminates any
compression, deduplication, and encryption load and centralizes this execution to a dedicated tier of
services. Each OS with a SnapProtect client requires a similar OS for proxy (i.e. Windows to
Windows, Linux to Linux, etc.) execution. Simpana will automatically link indexing information back to
the original host enabling full application protection for recovery purposes. Execution of application
integrity checks may also occur on the Proxy servers to validate the data prior to backup creation.

For a configuration where snapshots mount off host to a Proxy server, implement the following agents
on the Proxy server.

 File System iDataAgent (Must be similar to Production Host Operating System)


 MediaAgent
 Application Specific Binaries for Proxy (i.e. – Exchange Management Pack, Oracle for RMAN
integration, etc.)

Exchange Configuration
Any Proxy configuration interacting with Exchange Databases provides the capability to execute an
ESE Integrity check against the Exchange Database. In order to enable the Proxy to validate the
Microsoft Exchange database files, install the proper version of the Microsoft Exchange Management
Tools from the Exchange installation media on to the Proxy:

CommVault Products - Confidential August 2012 – v1.2 24


Upon implementation of the management tools, verify the implementation of the necessary
MediaAgent and File System as well. This enables the Proxy for selection as the Proxy Host in the
application Subclient contents. When scheduling the Microsoft Exchange SnapProtect backup
operation, click the advanced button. This will bring you to the General Options to enable the integrity
check for the Exchange Backup job upon Snapshot Index completion:

Oracle Configuration
SnapProtect supports ASM (Automatic Storage Management) and RMAN backups with Array based
snapshots. With this support SnapProtect enables RMAN based movement to disk/tape allowing
Recovery Manager (RMAN) for the movement to media operation. This however, requires the
installation and configuration of the Oracle binaries and the configuration of an Oracle instance on the
Proxy server. In order to perform a proxy based SnapProtect backup or restore operation; configure
the following on the proxy computer:
 The Oracle database instance on the proxy machine should be the same version as the
source. For example if Oracle 10.2.0.4 is installed on source then the proxy should be
10.2.0.4
 ASM instances require configuration for both ASM and the RDBMS instances on the Proxy.
 The catalog user and the catalog database must be the accessible by the source and the
proxy Oracle instances.
 Best Practice is to mount the snapshots on the same mount point as the source.
 Best Practice is to ensure that the data and log mount points do not overlap.
 Before executing any ASM based Snapshot or Movement to media jobs, run the following
commands:
o cd $ORACLE_HOME/rdbms/lib
o gmake -f ins_rdbms.mk ikfed; ensure that KFED utility is specified in the path.

After putting the above configurations and considerations in place, the configured server may enable
RMAN for tape movement and properly manage ASM databases in a proxy configuration.
 Table Level restores of SnapProtect data is now supported.

Note: It is highly recommended to work with Professional Services to ensure successful


implementation of SnapProtect with Oracle databases, especially in Proxy Configuration.

CommVault Products - Confidential August 2012 – v1.2 25


Verification of Configuration Using SnapTest (for iSCSI / FC)
Validation of the SnapProtect configuration prior to running production jobs occurs through the
SnapTest utility. This tool is located in the Base folder of the Simpana installation, allows one to check
array connectivity and exercise the hardware snap engine to create and remove snapshots. Running
this prior to productions routines will validate the configuration is properly defined on the Production
Host side.

1. Locate the SnapTest executable in the base directory (..\Simpana\Base\SnapTest.exe) and


run it from the Command Line:

2. To prevent automatic reverts / or to prevent automated tests, select Advanced Operation


option - 2:

CommVault Products - Confidential August 2012 – v1.2 26


3. Select option 2 for Miscellaneous Task

4. Check if we can send a SCSI inquiry to the storage device by selecting Option 3:

5. Enter the Mount Point for SCSI inquiry. Windows you must enter a drive letter or a mount path
(junction point). In a Unix/Linux environment, enter the mount path location – not the device
name, e.g. /dev/sda. You will now get a result similar to the following:

CommVault Products - Confidential August 2012 – v1.2 27


6. From the Main Menu, choose option 1 - “Performance Individual Snap Operations”.
7. Select 3PAR Clone or Snap by selecting Option 23 or 24:

CommVault Products - Confidential August 2012 – v1.2 28


8. Exercise the selected Snapshot Engine by selecting Option “1”:

This will create a new Snapshot based on the Engine you have selected and will give you the
necessary information to confirm all works.

CommVault Products - Confidential August 2012 – v1.2 29


Security & Storage Policy Best Practices
Security Roles
The power of a Storage Array in providing fast full volume recovery changes data architectures and
SLA alignment. Any technology providing fast sweeping recovery directly linked to production data
can be potentially dangerous without proper controls. Revert operations are perfect for massive data
corruptions on productions volumes that require fast recoveries, assuming the proper controls are in
place to allow only those who understand what the defined action will do for/to the business. Typical
script based tools lack these controls and expose environments to high risk side effects with very little
oversight or reporting. A single miss-aligned scripted argument could bring an entire production
database environment down and cause catastrophic data loss. Further, restoring data through array
based reverts when a single file/database is all that is necessary can destroy entire collections of data
resetting the environment back hours or days if done incorrectly. Recent mail, revenue transactions,
business data, etc. would all be lost due to a simple mistake in operation

Rather than risking the business to make or beat the backup window with scripts or standalone tool
sets, an integrated data management platform should provide proper safety controls to allow critical
actions to entrust the right users at the right time while ensuring a reporting and audit system to
overlay the full end-to-end view. In most medium
to large environments, application operational
responsibilities, backup, DR, compliance and
audit may be distributed functions that need to be
coordinated into a single policy. The embedded
role based security system native to Simpana
automates this function.

For Example, a customer may have three specific


roles within an operations environment:

 Backup Admins
 Application owners (DBAs)
 Audit & Business Compliance

Each of these roles “owns” specific


responsibilities for managing and protecting the
enterprise. Backup Admins are the typical day to
day operators with access to perform standard
backup and recoveries, manage media, issue
reports, etc. However, the Backup Admin Role
may not be the right team to execute application -
level recoveries or have the capabilities to issue array-based reverts for recoveries due to knowledge
and awareness of the application architecture. The Application Owner Role is not so concerned about
the general day to day backup environment, but is laser focused on the application space they own.
They need to know what tools are available to them and who has the capabilities to execute on those
toolsets at any time as they manage the applications running the business. Any recovery operations
involving their applications, especially powerful techniques such as Array reverts and snapshots must
be managed from their group to mitigate any risk to the business. The Audit Role simply needs to
eliminate red flag events and provide security, operational, and process proof of who can perform
what and how.

CommVault Products - Confidential August 2012 – v1.2 30


To meet this requirement specific roles should be defined solely for the SnapProtect and Application
iDA’s within the CommCell. An example of this basic security structure as defined in Simpana Security
Roles as noted here:

Storage Policies
Managing proper retention on the snapshot copies becomes another critical requirement. Improper
retention either increases the amount of tier 1 storage that is holding recovery points, or it causes the
snapshots to fall short of fully meeting SLA requirements for the business. Simpana’s Storage Policies
are broken down into copies for managing retention on the proper tier of storage. In the typical
Storage Policy for SnapProtect, three copies will be available, the Primary SnapCopy, the Primary
backup to disk copy, and the Offsite disk/tape copy. Properly meeting SLA requirements for the
business requires proper alignment for the retention characteristics of each of the storage tiers.

For example, SLAs for Sub 24hr RPO/RTO drastically lower the returns on leveraging snapshot
technology on copies beyond 48 hours. The typical Best Practice for Storage Policy configuration will
change from environment to environment, with the standard retention aligning to the primary recovery
time for the SnapCopy with the primary backup to disk and tape copies providing SLA coverage for
complete Site based disasters. For Example, with the previous description retention may be set in the
following way:

 Primary SnapCopy – 2days & 0 Cycles


 Primary Disk Copy – 28days & 1 Cycle
 Offsite Disk/Tape Copy – 60days & 1 Cycle

CommVault Products - Confidential August 2012 – v1.2 31


This definition allows snapshot retention on a 48 hour rotation providing multiple high-speed recovery
points available on the array to meet the SLA requirement. This configuration requires storage space
allocation to maintain two persistent days of change for the associated clients. By setting “cycles” to 0,
the removal of old snapshots occurs regardless of success, so proper alerting and monitoring is
required.

The other recommended option for SnapCopy retention sets the “days” variable to 0 and focuses
solely on the Number of cycles. In this configuration full backups must occur frequently to allow for
proper snap management. With this setup, the # of snapshots retained will be determined on the
number of cycles configured. The scheduled frequency becomes very important to defining the
environment conditions. If eight snapshots execute over a week timeframe, then 7 days of delta
change must be available in the Array configuration. If eight Snapshots execute in a 48 hour period,
only 48 hours of delta change must be available in the Array configuration. Fully understanding the
schedule and process configurations enable making the proper retention setting when keying off of
“cycles.” Improperly setting retention and effects of days and cycles can adversely affect the available
recovery scenarios for the business applications.

This definition will then enable the Primary and Secondary backup to disk and tape copies. Backup
Copies should follow that standard backup schedule for the production (i.e. – daily backups should
equate into at least one Snap Copy Point in time to drive local and offsite backups). Remember,
backup copies will execute synchronously, and the failure to “backup” Snap Copies to disk/tape will
extend the storage requirement on the Array, as the snapshots will not prune until the selected
recovery points execute in a Backup Copy to disk/tape copies. Application data will always be
consistent on this data movement. Backup Copy operations will always use File System mechanisms
to protect the properly acquiesced applications except in the instance of RMAN Proxy’s in an Oracle
configuration. The rest of the data aging follows the standard days and cycles rules for purging off
data sets.

Snapshots may be deleted from the array due to factors like low disk space on the array, number of
snapshots exceeds the threshold etc. and the jobs corresponding to these deleted snapshots can no
longer be used for any data recovery or backup copy operations. Use the nRunSnapRecon registry
key to start snap reconciliation to check for missing snapshots once in every 24 hours and marks jobs
corresponding to the missing snapshots as invalid. See Appendix for detailed information.

CommVault Products - Confidential August 2012 – v1.2 32


Manipulating Snapshots
Part of the value of creating and leveraging snapshot is the flexible options it provides IT in achieve
typical tasks by leaning on the high speed storage infrastructure to efficient results. Out of place
refresh, single file recoveries, mount and browse capabilities, etc. provide flexibility to executing daily
IT operations. The following sections describe how to perform these operations for hosts protected
with SnapProtect.

1. Snapshot access is always achieved via right clicking on your defined object and selecting the
“All Tasks” options and selecting “List Snaps”

2. The snapshot list for the client application is displayed when the List Snaps item is selected.
From the dialog several snapshot operations are available.

CommVault Products - Confidential August 2012 – v1.2 33


Mount/Dismount Snaps for Manual Browse
1. After accessing the available snapshots for the selected client, mount the desired snapshot by
a right click on the snapshot shown in the menu. Select the mount operation to continue

2. The following dialog appears. Click Yes to continue. On HP 3PAR arrays the mount time
rarely will exceed 1 – 2 minutes.

3. Define the host you wish to mount the snapshot to (this must be a MediaAgent). Ensure the
host has the appropriate Storage Zoning to mount this snapshot. If this is an iSCSI volume
log in the initiator for this host if not already done, otherwise the mount will fail. For
Destination Path, select a mount point. This must be a folder, and is recommended to be a
empty folder.

4. Once the snapshot is mounted the following dialog will appear. Click OK.

5. The Snapshot list updates with the current information on the snap which will include the
mount path and the updated time of the mount operation.

CommVault Products - Confidential August 2012 – v1.2 34


6. The mounted snapshot can now be accessed from the mount host.

7. Dismount of the snapshot is a simple process. Select the mounted snapshot and use the right
click menu to select the Unmount option.

8. The following dialog will appear. Click OK to continue.

CommVault Products - Confidential August 2012 – v1.2 35


9. Once completed the following dialog will appear.

It is important to remember to dismount the snapshot once finished. If a snapshot has been manually
mounted it will not be pruned until it no longer is being accessed. Mounted snaps that haven’t been
copied for backup copy will fail on the backup copy operation until they are unmounted.

CommVault Products - Confidential August 2012 – v1.2 36


Reverting a Snapshot
There are two ways to revert a snapshot. One is application aware and one is not. Generally the
application aware revert is the mechanism to use.
Application Aware Revert
1. An application aware revert is done in the context of a standard recovery. This starts with
browsing for the application data to be restored. Click the Browse Backup Data menu item.

2. The backup selection dialogue appears to select the time frame from which the restore will
take place. Here the latest backup will be used. Click OK.

3. The browse window will appear from which the appropriate application data can be selected
for restore. The entire information store for Exchange is selected. Click the Recover All
Selected button.

CommVault Products - Confidential August 2012 – v1.2 37


4. The Recovery dialog box appears. Select the Advanced Button.

5. In the Advanced Dialog check the Use hardware revert … option and click OK to the warning
dialog to proceed with the revert operation.

This will execute a LUN revert from the Latest Snapshot back to the production Server

Some Applications require an overwrite option for any restore to occur including LUN based Reverts.
Ensure applications like Exchange and others have the appropriate “overwrite” settings defined for
this to execute properly. ALL FILES and DATABASES will be rolled back to the point in time of the
last snapshot. DO NOT REVERT IF NOT ALL DATA REQUIRES TO BE ROLLED BACK TO THE
PREVIOUS POINT IN TIME!

CommVault Products - Confidential August 2012 – v1.2 38


Non Application Aware Revert

A hardware revert can be done which is not application aware as well. This is done directly from the
snapshot list. This process initiates a rollback for the selected volumes instantly to the desired point
in time without communicating with applications for graceful restore. This option may be leveraged
for file systems and shut down application environments.
1. The process begins by selecting the List Snaps menu item to bring up the list of snapshots
dialog.

2. When the dialog appears, select the desired snap and use the right click menu to select the
“Use hardware revert …” option to revert the snap. The following confirmation dialog will
appear.

3. Validate this operation is correct and type “Confirm” in the dialog box and click OK to perform
the operation.

Caution should be taken when using the non-application aware revert functionality as you can corrupt
a running application because of this operation. You should be sure that you will not cause any data
corruption issues before using this option.

CommVault Products - Confidential August 2012 – v1.2 39


Out of Place Restore Capabilities – (VMware Example)
Within the restore process snapshots can be used just like any other media based backup.
MediaAgent software and access to the storage array for access to the snap directly is a requirement.
Also, the corresponding application agent must be installed on the target for it to be an eligible
candidate (if necessary).
1. To restore out of place select the Browse Backup Data option for the desired data set. Select
the appropriate time or the latest backup.

2. Depending on the application different options are available for out of place restore. The
selected VM will be restored to a different data store with a new name. Browse into the
subclient contents and select the data to be recovered out of place. In this case the selection
is a Virtual Machine.

CommVault Products - Confidential August 2012 – v1.2 40


3. When the Recover All Selected button is clicked the following dialog appears to direct the
restore activity. Note the VM Name. The ability to automatically enable the VM can be done
through the “Power ON Virtual Machine After Restore” box.

4. The “Browse Virtual Center / ESX Server for Destination” provides out of place selections.
Here DataStore_3 is the location for the VM recovery. Select OK, and then OK again on the
Restore Options windows to execute the recovery, out of place.

CommVault Products - Confidential August 2012 – v1.2 41


Appendix
Determine the HP 3PAR Array ID
To understand where the HP 3PAR Array identification is brought it, we must first understand how the
Storage Management Initiative Specification (SMI-S) is committed to be implemented according to the
IEEE OUI (Organizational Unique Identifier).

All WWN’s have a 24-bit OUI that is purchased from the IEEE (Institute of Electrical and Electronics
Engineers) registration authority. Formats of each WWN will have:

 First 2 bytes are either 10:00 or 2x:xx where X are vendor specific bits,
 Followed by the 3-byte identifier,
 And the rest of vendor specific bytes.

There are two ways that you can determine the HP 3PAR Array ID:
 2F:F7 is the identifier for target for HP 3PAR.
 00:02:AC is the identifier for HP 3PAR arrays as per the OUI from the IEEE
 The rest of the bytes are identified as per the Serial Number of the system:

From the Serial Number #1302965, we can get the last 4 digits - 2965, in hex this is B95.

Adding all the values, you can deduce a HP 3PAR Array ID of 2FF70002AC000B95.

CommVault Products - Confidential August 2012 – v1.2 42


Alternatively, you can obtain the HP 3PAR Array ID using the following formulae:

3PAR Array ID = 2FF7000 + DevID.substr(4,3) + 000 + DevID.substr(12,4)

DevID can be found by using the SnapTest.exe tool:

The function substr is for substring, where from (x,y):


 X: offset of where the entire char* / string starts (starting from 0)
 Y: length of the substring

DevID.substr(4,3) would mean:


2AC here since 2 is the 5th position (0 itself is position 1) within the string highlighted above, and 3
is the length of characters

DevID.substr(12,4) would mean:


th
0B95 here since the 0 is the 13 position within the string highlighted above and 4 is the length of
characters

In this example you can deduce the HP 3PAR Array ID of:

2FF7000 + 2AC + 00 + 0B95 = 2FF70002AC000B95

CommVault Products - Confidential August 2012 – v1.2 43


How to assign a new CPG / Virtual Volume / VLUN to a specific Host
This assumes that proper hardware zoning / network configuration has been done for HBA or the
Ethernet NIC of server to give visibility to a HP 3PAR array. This example also assumes that you have
installed the relevant HP 3PAR Inform Management Console as well.

We first start off by creating a new CPG to store the Virtual Volume and possibly allocate the Copy
Space for clone/snap operations:

Once created, you can now create a new Virtual Volume under the CPG, either fully / thin provisioned
Virtual Volume:

CommVault Products - Confidential August 2012 – v1.2 44


Once added and applied for specific hosts to see the Virtual Volume, we can now create a VLUN that
will become a visible LUN to the specific host(s) that will become visible to the exported Virtual
Volume:

CommVault Products - Confidential August 2012 – v1.2 45


CommVault Products - Confidential August 2012 – v1.2 46
We have now successfully provisioned a CPG, Virtual Volume and have assigned a specific VLUN to
the host augpcs01 with LUN ID of #13:

CommVault Products - Confidential August 2012 – v1.2 47


We can now continue to configuring SnapProtect.

CommVault Products - Confidential August 2012 – v1.2 48


SnapProtect with HP 3PAR Clone
CommVault will always run a “Synchronization” process to the Clone target volumes. Below shows
the original VLUN presented to the augpcs01 host:

In a HP 3PAR system, there is no need for a reserved LUN to be created for the Cloning feature.
Instead a Cloned VLUN device will separately be created on the fly:

HP 3PAR Inform Management console shows under the Unexported Virtual Volumes:

CommVault Products - Confidential August 2012 – v1.2 49


When the SnapProtect Job is running, you will notice that with Clone operation requires a
synchronisation and is required before the Clone can become a separate Virtual Volume. You MUST
also have enough space left in the CPG otherwise the SnapProtect Job will give an error message
stating a failure to create a Clone pair.

This completes a full HP 3PAR Clone SnapProtect job analysis.

CommVault Products - Confidential August 2012 – v1.2 50


SnapProtect with HP 3PAR Snap
Snapshot does not require an initial synchronisation unlike Clones, as it will only copy if the source
volumes blocks are modified based on the Copy-On-Write model. Once a Snapshot has been taken,
you will notice in HP 3PAR Inform that we see a new Snapshot created with the CommVault naming
convention:

CommVault will utilize the following naming contention for the SnapProtect Jobs for the Snapshot
LUN Name:

SP_<commcell id as per the CSDB>_<Job ID>_XXX

You will also notice that there is a child session that ties in with the Snapshot created – CV_CHILD.

Snapshot child(s) are created based on the snapshot to allow:


 To effectively allow a “duplicate” copy of the Snap so that in the event of a separate
mount and the information has been modified, there is no hard changes made to the
original snapshot
 Allowing effectively the duplicate to be “mounted/unmounted” to the source / proxy host
doing the cataloging, protecting the original snapshot from any anomalies

Once snapshots cataloged, the child session will be destroyed and only the primary snapshot copy
itself will remain.

This completes a full HP 3PAR Snap SnapProtect job analysis.

CommVault Products - Confidential August 2012 – v1.2 51


Snap Reconciliation Registry Key
This key validates Simpana created snapshots have not been altered externally to the software
invalidating recovery options.

Location

HKEY_LOCAL_MACHINE\SOFTWARE\CommVault
Windows
Systems\Galaxy\Instance<xxx>\MediaManager

Unix Not Applicable

NetWare Not Applicable

Key nRunSnapRecon (optional)

Value Not Applicable

Value Type DWORD

Valid Range 1 or x, where ‘x’ is any other value than 1

Default Value None

Created in Client Computer

To enable Snap Reconciliation from the Media Manager. When this


registry key is set to 1, the snap reconciliation is enabled and the MM
will run the snap reconciliation every 24 hours. When this registry key
Description
is set to 0, the snap reconciliation is disabled. Also, the absence of
this registry key is considered as if the value is set to 0 and hence the
snap reconciliation will not be started.

Additional Information N/A

Applies To SnapProtect Backup

CommVault Products - Confidential August 2012 – v1.2 52

You might also like