Se ha denunciado esta presentación.
Utilizamos tu perfil de LinkedIn y tus datos de actividad para personalizar los anuncios y mostrarte publicidad más relevante. Puedes cambiar tus preferencias de publicidad en cualquier momento.

Emc recoverpoint technical

Emc recoverpoint technical

  • Sé el primero en comentar

Emc recoverpoint technical

  1. 1. 1© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. EMC RecoverPoint for Virtual Machines Protects VMs with Continuous Data Protection for Any PiT Recovery Date: August 14, 2014 Presenter: Sharon Yen, RecoverPoint Product Marketing
  2. 2. 2© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. Student Guide & Workshop & Internal Training & Confidential Update Daily https://goo.gl/VVmVZ0 recoverpoint_family_for_vnx http://ouo.io/8c90D recoverpoint_continuous_data_protectio n http://ouo.io/T0AvN5 recoverpoint-vm-customer-presentation http://ouo.io/O53Vc recoverpoint-4-1-whats-new http://ouo.io/MM7MP
  3. 3. 3© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. RecoverPoint for Virtual Machines VM Protection and Recovery to Any Point With Built-in DR Orchestration • Fully virtualized, hypervisor-based, software only data protection solution • Protect VMs in VMware environments with VM level granularity • Support all storage types: SAN/vSAN/NAS/DAS • Disaster Recovery offering with built-in orchestration and automation accessible via VMware vCenter Key Benefits: • Optimize RPO & RTO to meet Service Level Agreements (SLAs) • Streamline recovery workflows, eliminate complexity and save time • Lower TCO by improving resource utilization and efficiency for Operational Recovery (OR) & Disaster Recovery (DR) • SW only solution that reduces floor space and port consumption
  4. 4. 4© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. Data Protection Challenges in Virtualized Environments Pain points that vAdministrators and IT Managers Face • Lack of VM protection granularity • Growing RPO & RTO Gap • Unable to meet stringent data protection SLAs • Lack of visibility and control • Too many disparate management GUIs • Disjointed workflows • Lack of automated recovery processes • Suboptimal utilization of resources • Data protection infrastructure silos • Rising Disaster Recovery TCO Limited IT Budget and Rising TCO Increasing Management Complexity Proliferation of VMs
  5. 5. 5© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. RecoverPoint for Virtual Machines • Protect VMware VMs with VM level granularity • Perform automated discovery, provisioning and orchestrated DR test, failover, failback to any PiT • Provide local or remote data replication over any distance sync or async • Ensure app-consistent recovery of inter-dependent apps that span across ESXi clusters • Integrated with VMware vCenter • Storage agnostic, supporting SAN/vSAN/NAS/DAS Data protection for DR & OR
  6. 6. 6© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. RecoverPoint for Virtual Machines RecoverPoint EMC Unisphere Management VMware vCenter Plug-in RecoverPoint Virtual Edition Embedded Array Splitter Embedded Hypervisor Splitter VNX Storage Agnostic SAN/vSAN/NAS/DAS Protects Storage Array LUNs Protects VMs RecoverPoint Product Family Continuous Data Protection for Physical & VMware Virtual Environments RecoverPoint Appliance For Storage Admins For VMware vAdmins
  7. 7. 8© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. VMware ESXi New York New York London Production Journal VMware vCenter Plug-in RecoverPoint for VMs: How it works New Jersey RDM WAN Journal Replica VMware ESXi VMware vCenter Plug-in RDM
  8. 8. 9© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. RecoverPoint for VMs Managed Through vSphere Access vCenter Plug-in
  9. 9. 10© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. Wizard Driven Workflows… Select VM Protection Specify Consistency Group Create Target VM Define Replication Policy Specify Target VM’s Datastore
  10. 10. 11© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. Set Data Protection Policies Optimizing RPO/RTO To Meet Protection SLAs • Enable Zero or near zero RPO • Can be configured to meet specific protection, performance and cost goals • Eliminate Or minimize data loss • Dynamically switch between sync & async based on available bandwidth
  11. 11. 12© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. Streamline Data Protection for VMs Automated Provisioning • Discovering VMs (VMDK & RDM) configurations • Provisioning VMs and Journals • Creating replica VMs Orchestration: Protect, Test and Recover • Single VM or Multiple VMs in a single Consistency Group (CG) • CG or CG group set can span across multiple ESX clusters • Deliver consist recovery of Interdependent Apps Eliminate Complexity and Increase Operational Efficiency
  12. 12. 13© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. Empower vAdmins to Manage VM protection Make changes on the fly • Make changes to the underlying ESXi infrastructure • Add & remove VMDKs from protected VMs • Auto-provision VMDKs on the target • Perform Any vMotion for protected VMs or storage vMotion
  13. 13. 14© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. Simplify Recovery Process for vAdmins Scenario: One of the VM’s virtual disk was deleted accidentally RecoverPoint for VMs 1. Using vSphere Web Client, vAdmin locates the affected VM and tests the point-in-time copies 2. vAdmin locates the best PiT and recovers that VM enabled by the automated recovery process, including shutting down and reconfiguring VM 3. vAdmin resumes the VM replication Array based replication 1. vAdmin contacts Storage admin in order to correlate VM to storage array LUN 2. vAdmin identifies other VMs running on the affected datastore 3. vAdmin shuts down all VMs: VM with the failure and other VMs in the datastore 4. Storage admin performs replication recovery 5. vAdmin reconfigures the affected VM and starts up all VMs 6. Storage admin resumes the LUN replication
  14. 14. 15© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. EMC RecoverPoint for VMs Benefits Meet Stringent Protection SLAs Eliminate VM Recovery Complexity and Lower TCO Leverage RecoverPoint Technology Simple • Protect and replicate VMs with Continuous Data Protection for any PiT recovery • Ensure app-consistent recovery of interdependent apps that span across ESXi clusters • Optimize RPO and RTO Efficient • Empower vAdmins and App owners to specify VM protection at creation • Streamline recovery workflows • Enable non-disruptive data migration • Lower communication costs through WAN efficiency Proven • Built on EMC RecoverPoint engine with 250+ million run hours • Over 20,000 units deployed • Protecting over 1 EB of data Simple, Efficient and Proven Data Protection for VMware
  15. 15. 16© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. RecoverPoint for VMs Use Cases Overview Protect, Replicate and Recover Disaster Recovery Protect customers against outages caused by • Natural disasters • Accidents • Utility outages • Technical malfunctions Operational Recovery Protect customers against outages caused by • Human errors • Data corruptions • Virus attacks Tech Refresh Data Migration Replicate data for • Tech refresh, system upgrade • Data center move or expansion
  16. 16. 17© Copyright 2014 EMC Corporation. All rights reserved.© Copyright 2014 EMC Corporation. All rights reserved. Data Protection Continuum Availability, Replication, Backup And Archive Applications Have Different Data Protection Requirements You Need Complementary Protection Levels To Meet All Service Levels SnapshotReplicationAvailability Backup Archive

×