0% found this document useful (0 votes)
171 views

CommVault Questions

The document discusses various topics related to CommVault including manual and auto failover, default QNI time, deduplication process, threatvisor, multitenancy, configuring CommVault proxy, use of proxy servers, backup copy activities in proxy servers, regular backup failures, Intellisnap, difference between snapshot and clone, how VMware backup works, defining IRM, how IRM works, types of backups available, configuring cluster backup, transport nodes in VMware backup, transport mode SAN, local area mode, hotadd mode, how Intellisnap backup copy works, events triggered during DDB backup.

Uploaded by

Robin Srivastava
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
171 views

CommVault Questions

The document discusses various topics related to CommVault including manual and auto failover, default QNI time, deduplication process, threatvisor, multitenancy, configuring CommVault proxy, use of proxy servers, backup copy activities in proxy servers, regular backup failures, Intellisnap, difference between snapshot and clone, how VMware backup works, defining IRM, how IRM works, types of backups available, configuring cluster backup, transport nodes in VMware backup, transport mode SAN, local area mode, hotadd mode, how Intellisnap backup copy works, events triggered during DDB backup.

Uploaded by

Robin Srivastava
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 15

1. What is manual failover? How do we do failover? And Auto failover.

2. Default QNI time?


3. Deduplication is triggered then what process is triggered.
4. Threatvisor
5. Multitenancy

Q9) Explain how to configure the CommVault Proxy?

Ans: Following are the steps to configure the CommVault proxy:

Step1: Right-click on the customer PC to be utilized as a Commvault proxy from the


Commvault browser and select the properties.

Step2: From the properties dialog box, click on the Network button and select the configure
firewall settings checkbox.

Step3: Click on the choices tab and pick "this PC is in DMZ and will function as a proxy
checkbox."

Step4: Click on the incoming connection tab and select add.

Step5: Select the CommServe_client_name from the list.

Step6: From the State list, select RESTRICTED and click OK.

Q14) Explain the use of proxy servers in CommVault?

Ans: The utilization of the proxy server is primarily to decrease the load on the production
server. The proxy servers utilize the reinforcement activities to pass the snapshot of the data
to reinforcement media.

 The storage exhibit is commonly accessed to develop a snapshot of the data


 The snapshot that we can catch is utilized to mount the ESX servers assigned for the
snap mount.
 The snapshot is then unmounted for additional usage.
 The mounted snapshot is used as a file system and the necessary content will be
perused.
 The file reinforcement is essential to copy the storage strategy
 At the point when the reinforcement task is done, the snapshot is unmounted.

Q15) What happened in the backup copy activities in the proxy server?

Ans: During the backup copy tasks the accompanying operations are executed:

1.The snapshot of the data is mounted to the ESX server which is exclusively assigned for the
snap mount.
2. When the snap is mounted then it is treated as a file framework and the necessary elements
are prepared and read.

3. The reinforcement of the file framework is performed to the Primary duplicate of the
storage strategy.

4. When the reinforcement duplicate occupation is done, at that point the snapshot will be
unmounted.

Q16) List out the regular backup failures that most of the clients experienced in
CommVault?

Ans: Following are the most frequent backup failures that are reported by the clients:

 Client Services might be shut down for maintenance.


 Data path Offline
 Media agent Offline
 Network communication issues
 VSS snapshot backup issues
 Destination disk libraries full

Q23) Tell us about Intellisnap?

Ans: Intellisnap reinforcement is utilized to develop a point-in-time snapshot of the


information. It is primarily used for taking backup of live information and afterward
proceeding with the live activities.

Q24) Differentiate between Snapshot and clone in CommVault?

Ans: Cloning is only duplicating something while a snapshot creates an underlying copy and
afterward rolls out, resulting in improvements. Both cloning and snapshot are granted as
acceptable methodologies for disaster recovery.

Q25) Explain how a VMware backup works?

Ans: The VMware reinforcements are prepared in an accompanying way:

1. Typically, VMware snapshot reinforcements are performed utilizing the intermediary


servers.

2. Inside the intermediary servers, we will establish a software called Virtual server agent, for
example (VSA)

3. So commvault conveyed through Vcenter.

4. Where a snapshot of VM is performed, and it is mounted in an intermediary server as it


were.
5. From the intermediary server, the snapshot picture is sponsored up with the reinforcement
cycle usage and will take care of the media agent.

Q26) Define IRM in CommVault?

Ans: IntelliSnap recovery manager (IRM) is utilized to implement hardware storage operations
snapshot into a recuperation procedure with no impact on the production server. It likewise
gives a unified setup wizard through which you can configure policies, storage media and etc.

Q27) How IRM works in Commvault?

Ans:

 Snapshot task begins through an on-demand Intellisnap task or schedule from the
Commcell console.
 The array is approached through a snapshot task when it is established to develop a
snapshot of the content.
 The snapshot is mounted for post-snap activities on the source PC.
 The snapshot is unmounted.
 Presently snapshot gives restore operations/revert/ high-speed mount.

Q28) List out various types of backups that are available in CommVault?

Ans: CommVault replenishes productive backup and restores functionalities to any firm.
Following are various types of backups that are available in CommVault:

 Full Backup
 Incremental Backup
 Differential Backup
 Synthetic Full Backup
 Selective Online Full Backup
 Block-Level Backup

Q29) Explain the process of configuring a cluster backup?

Ans: The accompanying procedure will assist a person in configuring the cluster backup in
CommVault:

 First, build a new cluster group


 Add all the customer machines into the cluster group so that it will execute sync
action.
 It assists in the establishment of the passive nodes for the framework of the window.
 Complete the establishment
 Then perform a reinforcement procedure for the same cluster backup.

Q30) Explain various transport nodes that are available in the Vmware backup?

Ans: Three types of transport nodes are available in VMware backup:


 Transport Mode SAN
 HotAdd
 Local area Network

Q31) Describe Transport Mode San in VMware backup?

Ans:

 SAN model is associated with a storage framework, and it is maintained.


 The virtual server agent will come into the image, which will acquire the storage
framework
 Once the information is perused from the storage, it will stay in Vmware's.
 The ESX host is associated or synchronized to acquire the LUN.

Q32) Describe Local Area Mode in VMware Backup?

Ans:

 NBD represents a Network block device


 NBDSSL represents an Encrypted Network block device.

The information is transmitted through a protected TCP/IP association between the ESX
server and the proxy PC. This is a procedure where the information is passed within the NBD
mode.

The above procedure is the same and the information is transmitted through a protected
TCP/IP association between the ESX server and the proxy PC. Still, the information will be
encrypted for NBDSSL.

Q33) Describe Hotadd mode in VMware backup?

Ans:

 The Virtual server agent is established on the VM, which resides on the ESX server.
 The information is mounted onto a server automatically
 The information that is mounted on the proxy will acquire a disk.

Q36) How does the backup copy work for Intellisnap Backup?

Ans: The reinforcement copy activity permits you to duplicate a snapshot of the information
to any media. The essential snapshot stores the metadata data related to the snap
reinforcements and when the reinforcement duplicate activity is running, the essential
depiction information is replicated to the media related to the essential duplicate.

The reinforcement duplicate can be designed in two ways:

Inline Backup Copy- Run during IntelliSnap reinforcement work.


Offline backup Copy- Run freely of the IntelliSnap reinforcement work.

4. What do you know about the Deduplication Database in the


context of Commvault?

In Commvault, whenever a storage policy with deduplication is implemented,


signatures are generated for data blocks during backups, compared, and then
stored in the deduplication database (DDB). The DDB backup subclient
automatically protects DDBs. All active DDBs controlled by the MediaAgent that
hosts the DDB are backed up by this subclient. You can set up a reconstruction task
for an automatic or on-demand restore of the DDB from the DDB backup in the
event of DDB failure. The storage metadata can then be used to rebuild missing
records.

12. How can you know if a job has been encrypted, and if so, how?

For jobs that have been software or hardware encrypted, a superscript E or a HE will
appear next to the job ID in the Jobs in Storage Policy report.

13. How much of a performance hit can you expect as a result of


encryption?

Software encryption is a CPU-intensive activity that can slow down your backup or
supplemental copy by 40 per cent to 50 percent. This projected performance hit
does not apply to deduplicated data because the deduplication process removes all
duplicate data and only encrypts data blocks that are unique throughout the whole
deduplication database. As a result, the performance impact of deduplicated data
will be minimal.

17. What events are triggered during a Deduplication Database (DDB)


backup process?

The following events occur when the DDB backup job starts:

 For a few seconds, all communication with the active DDB is halted. To ensure
that the DDB is in a dormant stage, the information in memory is committed
to memory.
 The DDB process uses VSS (Windows) or LVM (Linux) snapshots to make a
snapshot of the volume.
 The file systems Extended 3 File System (ext3) and VERITAS Volume Manager
(VxVM) are also supported on the Linux platform.
 All communication with the DDB is resumed when the snapshot is created,
and the DDB is automatically backed up from that snapshot.
 If a VSS (Windows) or LVM (Linux) snapshot fails, the DDB backup falls back on
a live volume backup.
 The snapshot is erased after a successful DDB backup. The Job Controller
displays the DDB Backup job in a running condition at this point.
 If the DDB MediaAgent restarts during a DDB backup job, the job is marked as
Pending. The DDB backup job resumes from the beginning after the restart.
 The DDB backup jobs for the auxiliary copy operation are disabled by default,
and these jobs appear as unavailable when viewed from the primary copy.
 Allowing DDB Backup Tasks from Being Copied to Secondary Copy describes
how to enable or prohibit DDB backup jobs from being copied to secondary
copy during the auxiliary copy procedure.

21. When writing to the media, can encryption have an effect on


compression?

Yes, data is effectively randomised when backup procedures are performed using
encryption. This means that while compressing encrypted data, compression
methods will be less effective. As a result, there will be a visible difference in the
compression ratio when this data is written to the media.

22. Is the data encrypted twice if you enable encryption during


backup and offline/auxiliary copy?

No, the data is not double-encrypted. Data that has been encrypted by HDPS
Monitor software is flagged. The flag is checked during an auxiliary copy operation,
and if the data has already been encrypted, no additional software encryption is
used. During the auxiliary copy procedure, only data that has not been encrypted
by HDPS will be encrypted.

1. Question 2. What Are Commserve Dr Procedures?


Answer :
Hardware Fresh: Copy DR Set to Stand by commserve and perform Restore the
CS DR set to satand by CS.
DR set can be restored in 2 ways.
o Install Commserve software and perform restore using commserve
Disaster Recovery tool GUI. And later perform Name change or
o During Commserve Installtion, Perform Dr Restore from Existing
backup.
2. Question 7. How To Move The Ddb To The New Media Agent?
Answer :
Right-click the mount path, and then click Share Mount Path. point to new Media
Agent. Set it to dafault mount Path. If it is a Tape Library configure tape lib and
change datapath.

1. Question 11. Can You Tell Me About Your Infrastructure ?


Answer :
You need to briefly describe about your backup infrastructure and daily activities,
for example

We have n(1) Prod commserve m(1) DR/Standy Commserve and n(10-20) pair of
Media Aegents and we backup around n(2000) servers which includes Regular file
system, Databases like (SQL, Oracle, Exchnage, SAP Oracle, DB2, SAP DB2
etc...). This also includes VMWare snapshot backups (VADP/VCB) / intelli snap.
Include all the backups which you perform on daily basis. For Storage we have
HUS 150 or HNAS with a total capacity of N(TB)

Q26. Can you describe Scalability in Commvault?

Ans

Applications grow over time, and a Data Management solution needs to adapt with
the change rate to protect the dataset quickly and efficiently, while maintaining an
economy of scale that continues to generate business value out of that system.

Q27. What is Automation in Commvault?

Ans

The cloud encourages automation, not just because the infrastructure is


programmable, but the benefits of having repeatable actions reduce operational
overheads, bolster resilience through known good configurations and allows for
greater levels of scale.

Q68. What are the entities that get backed up with VMWare backups?

Ans:

We can perform backup on VMWare from a subclient. The entities that get backed up are,
 Windows and Linux virtual machines
 VM templates
 VMDK files
 Virtual RDMs
 GPT or dynamic disk volumes
 vSphere tags
 Fault-tolerant VMs

Q70. Explain the difference between a clone and a snapshot

Ans:

 A clone is like a duplicate of the database. It contains the exact copy of data as that
of the database
 A snapshot is a copy of a database at a particular timestamp. We should take a
subsequent snapshot if there are any changes made to the database. When we want
to restore data, we will have a restore point to get the data from a certain point in
time

Q75. How is data protected using Commvault?

Ans:

Data is protected by installing agent software on the physical or virtual hosts, which use
operating system or application native APIs to protect data in a consistent state.Production
data is processed by the agent software on client computers and backed up through a data
manager, the MediaAgent, to disk, tape, or cloud storage.All data management activity in
the environment is tracked by a centralized server, the CommServe, and can be managed by
administrators through a central user interface.End users can access protected data using
web browsers and mobile devices.

Q76. What are the different Enterprise Data Mangement Solutions of Commvault?

Ans:

Commvault has different Enterprise Data Management Solutions, they are:

 CLOUD DATA MANAGEMENT – Move, manage and use data effectively across
multiple clouds and on-premises.
 DATA VIRTUALIZATION – Manage virtual infrastructures as they grow and diversify,
with scalable protection, rapid recovery, and self-service.
 ENDPOINT PROTECTION – Secure and protect data at the network’s edge. Regain
control and effectively manage the data that lives outside the datacenter.
 APPLICATIONS – Drive availability and rapid recovery of applications, innovate faster,
and automate the migration to the cloud.
 COMMVAULT HYPERSCALE – Deliver the agility and business benefits of the cloud to
your on-premises applications and data on a scale-out infrastructure.

Q77. What areas of data management does this this system support?

Ans:

Commvault supports Data backup, Data recovery, Single view of on-premises and cloud
data, Setting automated data policies, eDiscovery, Disaster recovery, GDPR readiness,
Ransomware recovery options.

Q78. What is the breadth and depth of cloud support?

Ans:

Commvault supports various cloud platforms including Microsfot Azure, Amaxon AWS,
Oracle Cloud, Google Cloud and Private Clouds.

Microsoft Azure:

 Azure Virtual Machines


 Azure SQL Database
 Azure Blob Storage (Hot and Cool and Archive)
 Azure Data Box

Amazon AWS:

 Elastic Compute Cloud (Amazon EC2)


 Relational Database Service (Amazon RDS)
 Simple Storage Service (Amazon S3 & S3-IA)
 Glacier
 Snowball

Oracle Cloud:

 Oracle Cloud Infrastructure Object Storage (OCI)


 Oracle Cloud Infrastructure Object Storage (S3 Compatible)
 Oracle Cloud Infrastructure Archive
 Storage Classic (OCIC)

Google Cloud:
 Nearline
 Coldline
 Regional
 Multi-Regional

Private clouds:

 IBM
 HPE
 Rackspace
 VMware

Q85. How do you use Workflow to Automate DR?

Ans:

The Commvault Workflow engine provides a framework in which the DR runbook process,
covering the deployment of new instances, recovery of data and applications, and validation
aspects of a DR operation can be automated to deliver a simplified, end-to-end GUI-driven
DR process.

Q86.What is Native Cloud Connectivity?

Ans:

The Cloud Connector is the native integration within the Media Agent module that directly
communicates with Azure’s Object Storage layer, without requiring translation devices,
gateways, hardware appliances or VTLs.

Q87. What does the Native Cloud Connector do?

Ans:

This Connector works by communicating directly with Object Storage’s REST API interface
over HTTPS, allowing for Media Agent deployments on both Virtual and Physical compute
layers to perform read/write operations against Cloud Storage targets, reducing the Data
Management solution’s TCO.

Q88. Can you describe Scalability in Commvault?

Ans:
Applications grow over time, and a Data Management solution needs to adapt with the
change rate to protect the dataset quickly and efficiently, while maintaining an economy of
scale that continues to generate business value out of that system.

Q89. What are De-duplication Building Blocks?

Ans:

Commvault software maintains a Building Block approach for protecting datasets,


regardless of the origin or type of data. These blocks are sized based on the Front-End TB
(FET), or the size of data they will ingest, pre-compression/de-duplication. This provides clear
scale out and up guidelines for the capabilities and requirements for each Media Agent.De-
duplication Building Blocks can also be grouped together in a grid, providing further
deduplication scale, load balancing and redundancy across all nodes within the grid.

Q90. What is Client-side De-Duplication?

Ans:

As is the nature of de-duplication operations, each block must be hashed to determine if it


is a duplicate block, or unique and then must be captured. While this is seen as a way to
improve the ingest performance of the data mover (Media Agent), it has the secondary
effect of reducing the network traffic stemming from each Client communicating through to
the data mover.

Q91. Can you describe Crash Consistency vs. Application Consistency?

Ans:

While Crash-consistency within a recovery point may be sufficient for a file-based dataset or
Azure VM, it may not be appropriate for an Application such as Microsoft SQL, where the
database instance needs to be quiesced to ensure the database is valid at time of backup.
Commvault software supports both Crash and Application consistent backups, providing
flexibility in your design.

Q92. Explain about Storage-level Replication vs. Discrete Copies?

Ans:

Many cloud providers support replication at the Object Storage layer from one region to
another, however, in the circumstance that bad or corrupted blocks are replicated to the
secondary region, your recovery points are invalid.
Q93. How do you Decide What to Protect in Cloud?

Ans:

Not all workloads within the Cloud need protection – for example, with microservices
architectures, or any architecture that involve worker nodes that write out the valued data
to an alternate source, mean that there is no value in protecting the worker nodes. Instead,
the protection of the gold images and the output of those nodes provides the best value for
the business.

Q94.What is Automation in Commvault?

Ans:

The cloud encourages automation, not just because the infrastructure is programmable, but
the benefits of having repeatable actions reduce operational overheads, bolster resilience
through known good configurations and allows for greater levels of scale.

Q95.What is Programmatic Data Management?

Ans:

Commvault software provides a robust Application Programming Interface that allows for
automated control over Deployment, Configuration, Backup and Restore activities within the
solution.

Q96.What is Azure Virtual Network?

Ans:

Azure has the capability to establish an isolated logical network, referred to as an Azure
Virtual Network (AVN).Virtual Machines deployed within a AVN by default have no access to
Public Internet, and utilize a subnet of the Customer’s choice.Typically AVN’s are used when
creating a backbone between Virtual Machines, and also when establishing a dedicated
network route from a Customer’s existing on-premise network directly into Azure via Azure
ExpressRoute.

You might also like