Data Center: Backup Strategies For Virtual Servers
Data Center: Backup Strategies For Virtual Servers
Data Center: Backup Strategies For Virtual Servers
DATA CENTER
v
Volume 23
T
EDITOR’S
LETTER
7
BACKUP
HE OVERALL NEED for backing workflows and remove human tasks
STRATEGIES up data is about the same like configuring routers or setting up
FOR VIRTUAL
SERVERS
for virtualized servers as it firewall rules. The downside is that
7 is with traditional nonvirtu- you may have to pull together your
alized servers. But there are own slate of management tools
BUILDING A
some big differences: One is that vir- because vendors still don’t have a lot
PRIVATE CLOUD tual infrastructures often have more of products available. Bill Claybrook
7 data to deal with. More applications helps you to weigh your options in
are producing larger data files today, “Building a Private Cloud.”
HOW TO and each virtual machine (VM) is also Now that many organizations
GAUGE SERVER
RESOURCES
a large file that needs to be protected. embrace some form of virtualization,
FOR ENDPOINT Another difference is that server a few are ready for endpoint virtual-
VIRTUALIZATION
virtualization places more demands ization, known as EPV. Although EPV
7 on storage and networks. A majority is not a new idea, the push to improve
of virtual data centers store data cen- endpoint management, enhance secu-
trally in a shared storage resource like rity and support the needs of mobile
a SAN, which has to transfer data to users has placed a renewed emphasis
and from a multitude of VMs. To keep on this technology.
up with all these storage demands, Get some insight on why moving
organizations need to adapt their away from a physical PC per employ-
existing backup strategies to meet ee is a solid value proposition in “How
the unique demands of virtualization. to Gauge Server Resources for End-
Smart backup planning should con- point Virtualization” by Danielle Ruest
sider a variety of storage needs over and Nelson Ruest.
time. Stephen J. Bigelow offers some How’s your move into cloud com-
tips on the best ways to mix and puting? Send an email to ccasatelli@
match backup technologies in “Back- techtarget.com and let me know. ■
up Strategies for Virtual Servers.”
Looking to move into cloud comput- CHRISTINE CASATELLI
ing? A private cloud can automate Editor, Virtual Data Center
EDITOR’S
LETTER
7
V
BACKUP
STRATEGIES
FOR VIRTUAL
SERVERS
7 IRTUALIZATION HAS brought hardware failures, application or oper-
a new focus on manage- ating system failures and human error.
BUILDING A
ment efficiency and the But there are some important differ-
PRIVATE CLOUD effective use of valuable ences in a virtual environment that
7 computing resources. But as will influence an organization’s back-
fewer physical servers host increasing up choices.
HOW TO numbers of virtual machines (VMs), First, virtual infrastructures often
GAUGE SERVER
RESOURCES
IT administrators face a new series of have to contend with more data. More
FOR ENDPOINT data protection and backup chal- applications are certainly producing
VIRTUALIZATION
lenges. Today it’s more than just mak- larger and more plentiful files, but each
7 ing a copy of important data files. VM is itself a large file—such as VM-
Each VM state must also be protected ware .VMDK files—that must also be
and kept readily accessible. protected. Because a VM file is essen-
Each organization must reevaluate tially an image of server memory that
its backup needs within the context of reflects the complete operating state
its virtual infrastructure and then select of a VM at some point in time, VM
the most appropriate technologies to backups usually occur frequently
provide the best data protection. That throughout the course of each day.
may mean adapting traditional back- Backup demands translate to server
up approaches to a virtual environ- computing performance. In traditional
ment, while other cases may warrant nonvirtualized servers, a backup
a shift to other backup paradigms. process normally consumes up to
The need for server backups is fun- 100% of the server’s processing and
damentally the same in a virtualized I/O resources—nothing else was run-
server as it is for traditional nonvirtu- ning on that server anyway. With vir-
alized servers. Backups guard against tual servers, there may be 10, 20 or
data loss caused by factors such as even more VMs all sharing a portion
HOW TO
GAUGE SERVER TAPE AND VIRTUAL SERVER BACKUPS
RESOURCES
FOR ENDPOINT
VIRTUALIZATION
THERE IS NO question that disk-based data protection schemes have largely dis-
7 placed tape-based systems for many backup tasks. But the move to server virtual-
ization raises the issue of its affect on the use of tape technology.
There is a general consensus that tape technology does not provide the speed
and reliability that disk-based storage can offer, but experts agree that tape has a
potential role in virtual data centers. Tape can still serve in long-term data protec-
tion tasks in areas like compliance and archival storage.
In actual practice, tape storage can provide a viable and economical alternative
to disk storage in both traditional and virtualized data centers. Consider an enter-
prise that must archive its long-term data but rarely needs to access that data.
Disk storage can certainly serve those needs, but the cost of disk space, along with
the cost of powering, cooling and maintaining those storage resources could be
prohibitive.
By comparison, disk-based backups—often used in concert with data reduction
technologies—can serve day-to-day backup needs and even short-term archival
storage, but data that “ages out” of disk storage can easily be passed to tape—
lowering costs and freeing that disk space for reuse. ■
HOW TO
GAUGE SERVER CAPACITY PLANNING AND BACKUPS
RESOURCES
FOR ENDPOINT
VIRTUALIZATION
CAPACITY PLANNING CAN become a factor in backups, though the actual importance
7 of backup capacity planning is a matter of debate. A virtual data center still has to
back up data generated by applications—that hasn’t changed. But what has
changed is the uncertainty caused by a convergence of virtualization and new
backup approaches.
For example, some experts say that each virtual machine and host platform
need backups as well, and it’s easy to see how storage needs can swell with snap-
shots, continuous data protection journals, virtual tape library records and other
backup data that is often copied multiple times across different physical locations.
But other experts note that technologies like data deduplication and incremental
snapshots mitigate storage demands. Most organizations keep only a limited num-
ber of snapshots, and older snapshots that “age out” of storage are typically delet-
ed, and the space is reused.
Ultimately, coherent backup planning should involve some consideration of stor-
age needs over time. Once an administrator knows what storage is available for
backups, how it’s used, how it’s performing and how storage demands are chang-
ing, it’s possible to make informed decisions moving forward. ■
EDITOR’S
LETTER
C
7
BACKUP
STRATEGIES REATING AN internal ist, a load-balancing expert, a storage
FOR VIRTUAL
SERVERS
or private cloud that expert, someone who is responsible
7 gives IT managers the for the operating systems and more.
benefits of a cloud Cloud computing goes well beyond
BUILDING A
running inside the server virtualization because it gives
PRIVATE CLOUD data center isn't easy. IT pros will customers more options for increas-
7 have to glue it together themselves ing data center flexibility and reducing
because no single vendor currently costs. There is a big difference be-
HOW TO provides all of the pieces that are tween setting up VMware ESX clusters
GAUGE SERVER
RESOURCES
needed. Some packaged software is
FOR ENDPOINT beginning to appear to help create pri-
VIRTUALIZATION
7
vate clouds, such as Ubuntu Enter- A typical private cloud
prise Cloud, but the software is limit-
ed to Linux-based clouds. relies on the security
What is a private cloud anyway? It measures available
resides on the premises, inside your within the cloud and
data center giving IT managers com-
plete control over the available the data center.
resources. A typical private cloud
relies on the security measures avail-
able within the cloud and the data
center. It automates workflows and
removes human tasks like configuring in a data center for server virtualization
routers and load balancers or setting and implementing an internal cloud.
up firewall rules. For private clouds to be useful and
These are steps that many enter- continue in the direction set by public
prises with virtualized servers are clouds, IT pros need to automate as
doing by hand. Enterprises often have many manual tasks as possible to
a firewall specialist, a router special- bring up capacity on the fly and put it
EDITOR’S
LETTER
7
BACKUP
N
STRATEGIES
FOR VIRTUAL
SERVERS
7
most organi-
OW THAT cially when organizations realize that
BUILDING A
zations are using their move to Windows 7 may well be
PRIVATE CLOUD some form of server their last. With the increased reliance
7 virtualization, many on new platforms—slate PCs such as
are moving to the the iPad, netbooks, even iPhones—
HOW TO next level in virtualization: endpoint and the increased mobility of task
GAUGE SERVER
RESOURCES
virtualization (EPV)—or more pre-
FOR ENDPOINT cisely, the virtualization of end user
VIRTUALIZATION
7
desktops in central repositories. EPV EPV is making more
is similar to server virtualization in
that it relies on central hardware that
sense, especially when
runs virtualized instances of each end organizations realize
user desktop. In this regard, EPV that their move to
reuses several components that were
implemented during an organization’s Windows 7 may
move to server virtualization. well be their last.
EPV also relies on physical host
servers, usually running in some form
of cluster to provide highly available
virtual machines (VMs), storage fab-
rics to host VM disk files and virtual- forces and employees as well as the
ization management software to increase in home-based employment,
orchestrate the launching and closing moving away from a physical PC per
of the VMs that make up each user’s employee is a solid value proposition.
productivity environment. If you can get rid of a complex phys-
EPV is making more sense, espe- ical endpoint device such as a full-
BACKUP
■ A remote access protocol. This
STRATEGIES ESTABLISHING EPV protocol, often Microsoft’s Remote
FOR VIRTUAL
SERVERS
SERVER REQUIREMENTS Desktop Protocol (RDP), is responsi-
7 There are, however, some key differ- ble for linking the user’s physical end-
ences in the way you implement EPV point device to the endpoint VM.
BUILDING A
compared to server virtualization. Note that both Citrix and VMware
PRIVATE CLOUD After all, the VMs required for EPV have their own remote access proto-
7 will be productivity machines running cols and do not necessarily rely on
end-user applications, not VMs run- Microsoft’s RDP.
HOW TO ning server-based workloads.
GAUGE SERVER
RESOURCES
No one interacts directly with a ■ Other server components, such
FOR ENDPOINT server VM. Instead, they interact with as file servers and application reposi-
VIRTUALIZATION
the remote service the server VM tories. The inclusion of these compo-
7 runs—directory services, file shares, nents in your EPV architecture will
printer shares, email systems and so depend on your EPV model of choice.
on. With an EPV VM, the end users
are working directly with the machine, Another major difference between
interacting with various applications EPV and server virtualization is the
and controlling the machine’s environ- nature of the VM. Server VMs are
ment to suit their tastes. Because of composed of a server operating sys-
this, EPV requires additional compo- tem and then, usually, one single serv-
nents to run. er application. Desktop VMs, on the
These components include: other hand, are composed of a desk-
top OS, end-user applications that
■A directory server such as can vary from desktop to desktop and
Microsoft Active Directory. Although the user’s machine state or data and
a directory service is useful for a serv- machine configuration.
er virtualization environment because In fact, end-user VM construction
it helps centralize all administrative can be viewed as a bull’s eye with the
access to the server virtualization (Continued on page 16)
MICROSOFT HAS RELEASED its own virtual desktop infrastructure (VDI) or endpoint
virtualization (EVP) product. This offering runs desktop virtual machines (VMs)
on top of Microsoft Hyper-V and relies on Remote Desktop Services, or RDS, to
connect end users with their centralized VM. It requires System Center Virtual
Machine Manager as the VM management tool, and EPV implementation
requires a full deployment of all Remote Desktop Services (see Figure A-1).
EDITOR’S
In Windows Server
LETTER
7 2008 R2, Hyper-V runs
in clusters of 16-nodes
BACKUP
with each cluster mem-
STRATEGIES ber able to support up
FOR VIRTUAL
to 64 VMs for a total of
SERVERS
7 1,000 VMs per cluster.
But there are a few
BUILDING A
caveats for this con-
PRIVATE CLOUD figuration to work:
7 Each VM must
■
be a low requirement
HOW TO Figure A-1: Required server roles for a
GAUGE SERVER
machine and must have
Microsoft Hyper-V EPV deployment
RESOURCES a small amount of RAM
FOR ENDPOINT
VIRTUALIZATION
assigned to it. For ex-
7 ample, if your server includes 64 GB of RAM, you will not be able to run 64
VMs with 1 GB of RAM each because of required Hyper-V overhead. You must
assign more RAM to the server to run the 64 VMs.
■ Hyper-V supports volatile EPV machines through the use of the Hyper-V
Snapshot feature. Snapshots divide virtual disk files into a set of parent and
child files. The parent file includes the source VM and the child files include
any changes. Child files are discarded once the VM is closed. Parent files, how-
ever, usually require at least 10 GB of storage for each running desktop VM.
The Remote Desktop Virtualization host servers will, therefore, require ade-
quate storage to run your required number of VMs.
■ Running EPV on Hyper-V requires the use of the Virtual Enterprise Central-
ized Desktop license, which lets each end user run up to four desktops per OS
license.
■ Remote Desktop Services also now include Microsoft’s Application Virtu-
alization tools in support of the volatile EPV model. ■
HOW TO
GAUGE SERVER Figure 1
RESOURCES
FOR ENDPOINT
VIRTUALIZATION
The bull’s eye desktop construction model is ideal
7
for endpoint virtualization.
WITH THE RELEASE of View, VMware is now offering its most mature iteration of a
virtual desktop infrastructure. It relies on VMware’s Virtual Infrastructure 3 (VI3),
running the VMs on top of ESX Server hosts. It also relies on VMware ThinApp
for application virtualization (see Figure B-1). However, VMware EPV has several
advantages over other endpoint virtualization solutions now on the market:
EDITOR’S
■ VI3 offers special memory management features that can vastly reduce the
LETTER required amount of physical RAM to support multiple VMs running the same OS.
7 Transparent Memory Sharing will automatically deduplicate similar in-memory
contents from multiple VMs. Memory Ballooning will also automatically recover
BACKUP memory that was
STRATEGIES
FOR VIRTUAL
allocated to other
SERVERS VMs once they
7 no longer need it.
These two features
BUILDING A help reduce phy-
PRIVATE CLOUD
sical host server
7 requirements for
multiple VM
HOW TO
GAUGE SERVER
operation.
RESOURCES
FOR ENDPOINT VMware View
■
About Trend Micro: Trend Micro is both a market leader in Internet content security
and a security innovator. Always proactive, Trend Micro is leading the security
industry by recognising the unique challenges of virtualisation and developing dedi-
cated security solutions for virtual environments. While virtualisation offers many
benefits to our customers, it also poses several unique security challenges. Trend
Micro addresses these challenges with dedicated security for virtual infrastructure
and is working with virtualisation innovators like VMware to protect virtual machine
environments. Trend Micro helps organisations benefit from virtual computing by
deploying security that’s designed to meet these specific challenges, allowing our
customers to fully realise the cost and productivity advantages of virtualisation
without compromising the security of their data centre.