CommVault Questions
CommVault Questions
Step2: From the properties dialog box, click on the Network button and select the configure
firewall settings checkbox.
Step3: Click on the choices tab and pick "this PC is in DMZ and will function as a proxy
checkbox."
Step6: From the State list, select RESTRICTED and click OK.
Ans: The utilization of the proxy server is primarily to decrease the load on the production
server. The proxy servers utilize the reinforcement activities to pass the snapshot of the data
to reinforcement media.
Q15) What happened in the backup copy activities in the proxy server?
Ans: During the backup copy tasks the accompanying operations are executed:
1.The snapshot of the data is mounted to the ESX server which is exclusively assigned for the
snap mount.
2. When the snap is mounted then it is treated as a file framework and the necessary elements
are prepared and read.
3. The reinforcement of the file framework is performed to the Primary duplicate of the
storage strategy.
4. When the reinforcement duplicate occupation is done, at that point the snapshot will be
unmounted.
Q16) List out the regular backup failures that most of the clients experienced in
CommVault?
Ans: Following are the most frequent backup failures that are reported by the clients:
Ans: Cloning is only duplicating something while a snapshot creates an underlying copy and
afterward rolls out, resulting in improvements. Both cloning and snapshot are granted as
acceptable methodologies for disaster recovery.
2. Inside the intermediary servers, we will establish a software called Virtual server agent, for
example (VSA)
Ans: IntelliSnap recovery manager (IRM) is utilized to implement hardware storage operations
snapshot into a recuperation procedure with no impact on the production server. It likewise
gives a unified setup wizard through which you can configure policies, storage media and etc.
Ans:
Snapshot task begins through an on-demand Intellisnap task or schedule from the
Commcell console.
The array is approached through a snapshot task when it is established to develop a
snapshot of the content.
The snapshot is mounted for post-snap activities on the source PC.
The snapshot is unmounted.
Presently snapshot gives restore operations/revert/ high-speed mount.
Q28) List out various types of backups that are available in CommVault?
Ans: CommVault replenishes productive backup and restores functionalities to any firm.
Following are various types of backups that are available in CommVault:
Full Backup
Incremental Backup
Differential Backup
Synthetic Full Backup
Selective Online Full Backup
Block-Level Backup
Ans: The accompanying procedure will assist a person in configuring the cluster backup in
CommVault:
Q30) Explain various transport nodes that are available in the Vmware backup?
Ans:
Ans:
The information is transmitted through a protected TCP/IP association between the ESX
server and the proxy PC. This is a procedure where the information is passed within the NBD
mode.
The above procedure is the same and the information is transmitted through a protected
TCP/IP association between the ESX server and the proxy PC. Still, the information will be
encrypted for NBDSSL.
Ans:
The Virtual server agent is established on the VM, which resides on the ESX server.
The information is mounted onto a server automatically
The information that is mounted on the proxy will acquire a disk.
Q36) How does the backup copy work for Intellisnap Backup?
Ans: The reinforcement copy activity permits you to duplicate a snapshot of the information
to any media. The essential snapshot stores the metadata data related to the snap
reinforcements and when the reinforcement duplicate activity is running, the essential
depiction information is replicated to the media related to the essential duplicate.
12. How can you know if a job has been encrypted, and if so, how?
For jobs that have been software or hardware encrypted, a superscript E or a HE will
appear next to the job ID in the Jobs in Storage Policy report.
Software encryption is a CPU-intensive activity that can slow down your backup or
supplemental copy by 40 per cent to 50 percent. This projected performance hit
does not apply to deduplicated data because the deduplication process removes all
duplicate data and only encrypts data blocks that are unique throughout the whole
deduplication database. As a result, the performance impact of deduplicated data
will be minimal.
The following events occur when the DDB backup job starts:
For a few seconds, all communication with the active DDB is halted. To ensure
that the DDB is in a dormant stage, the information in memory is committed
to memory.
The DDB process uses VSS (Windows) or LVM (Linux) snapshots to make a
snapshot of the volume.
The file systems Extended 3 File System (ext3) and VERITAS Volume Manager
(VxVM) are also supported on the Linux platform.
All communication with the DDB is resumed when the snapshot is created,
and the DDB is automatically backed up from that snapshot.
If a VSS (Windows) or LVM (Linux) snapshot fails, the DDB backup falls back on
a live volume backup.
The snapshot is erased after a successful DDB backup. The Job Controller
displays the DDB Backup job in a running condition at this point.
If the DDB MediaAgent restarts during a DDB backup job, the job is marked as
Pending. The DDB backup job resumes from the beginning after the restart.
The DDB backup jobs for the auxiliary copy operation are disabled by default,
and these jobs appear as unavailable when viewed from the primary copy.
Allowing DDB Backup Tasks from Being Copied to Secondary Copy describes
how to enable or prohibit DDB backup jobs from being copied to secondary
copy during the auxiliary copy procedure.
Yes, data is effectively randomised when backup procedures are performed using
encryption. This means that while compressing encrypted data, compression
methods will be less effective. As a result, there will be a visible difference in the
compression ratio when this data is written to the media.
No, the data is not double-encrypted. Data that has been encrypted by HDPS
Monitor software is flagged. The flag is checked during an auxiliary copy operation,
and if the data has already been encrypted, no additional software encryption is
used. During the auxiliary copy procedure, only data that has not been encrypted
by HDPS will be encrypted.
We have n(1) Prod commserve m(1) DR/Standy Commserve and n(10-20) pair of
Media Aegents and we backup around n(2000) servers which includes Regular file
system, Databases like (SQL, Oracle, Exchnage, SAP Oracle, DB2, SAP DB2
etc...). This also includes VMWare snapshot backups (VADP/VCB) / intelli snap.
Include all the backups which you perform on daily basis. For Storage we have
HUS 150 or HNAS with a total capacity of N(TB)
Ans
Applications grow over time, and a Data Management solution needs to adapt with
the change rate to protect the dataset quickly and efficiently, while maintaining an
economy of scale that continues to generate business value out of that system.
Ans
Q68. What are the entities that get backed up with VMWare backups?
Ans:
We can perform backup on VMWare from a subclient. The entities that get backed up are,
Windows and Linux virtual machines
VM templates
VMDK files
Virtual RDMs
GPT or dynamic disk volumes
vSphere tags
Fault-tolerant VMs
Ans:
A clone is like a duplicate of the database. It contains the exact copy of data as that
of the database
A snapshot is a copy of a database at a particular timestamp. We should take a
subsequent snapshot if there are any changes made to the database. When we want
to restore data, we will have a restore point to get the data from a certain point in
time
Ans:
Data is protected by installing agent software on the physical or virtual hosts, which use
operating system or application native APIs to protect data in a consistent state.Production
data is processed by the agent software on client computers and backed up through a data
manager, the MediaAgent, to disk, tape, or cloud storage.All data management activity in
the environment is tracked by a centralized server, the CommServe, and can be managed by
administrators through a central user interface.End users can access protected data using
web browsers and mobile devices.
Q76. What are the different Enterprise Data Mangement Solutions of Commvault?
Ans:
CLOUD DATA MANAGEMENT – Move, manage and use data effectively across
multiple clouds and on-premises.
DATA VIRTUALIZATION – Manage virtual infrastructures as they grow and diversify,
with scalable protection, rapid recovery, and self-service.
ENDPOINT PROTECTION – Secure and protect data at the network’s edge. Regain
control and effectively manage the data that lives outside the datacenter.
APPLICATIONS – Drive availability and rapid recovery of applications, innovate faster,
and automate the migration to the cloud.
COMMVAULT HYPERSCALE – Deliver the agility and business benefits of the cloud to
your on-premises applications and data on a scale-out infrastructure.
Q77. What areas of data management does this this system support?
Ans:
Commvault supports Data backup, Data recovery, Single view of on-premises and cloud
data, Setting automated data policies, eDiscovery, Disaster recovery, GDPR readiness,
Ransomware recovery options.
Ans:
Commvault supports various cloud platforms including Microsfot Azure, Amaxon AWS,
Oracle Cloud, Google Cloud and Private Clouds.
Microsoft Azure:
Amazon AWS:
Oracle Cloud:
Google Cloud:
Nearline
Coldline
Regional
Multi-Regional
Private clouds:
IBM
HPE
Rackspace
VMware
Ans:
The Commvault Workflow engine provides a framework in which the DR runbook process,
covering the deployment of new instances, recovery of data and applications, and validation
aspects of a DR operation can be automated to deliver a simplified, end-to-end GUI-driven
DR process.
Ans:
The Cloud Connector is the native integration within the Media Agent module that directly
communicates with Azure’s Object Storage layer, without requiring translation devices,
gateways, hardware appliances or VTLs.
Ans:
This Connector works by communicating directly with Object Storage’s REST API interface
over HTTPS, allowing for Media Agent deployments on both Virtual and Physical compute
layers to perform read/write operations against Cloud Storage targets, reducing the Data
Management solution’s TCO.
Ans:
Applications grow over time, and a Data Management solution needs to adapt with the
change rate to protect the dataset quickly and efficiently, while maintaining an economy of
scale that continues to generate business value out of that system.
Ans:
Ans:
Ans:
While Crash-consistency within a recovery point may be sufficient for a file-based dataset or
Azure VM, it may not be appropriate for an Application such as Microsoft SQL, where the
database instance needs to be quiesced to ensure the database is valid at time of backup.
Commvault software supports both Crash and Application consistent backups, providing
flexibility in your design.
Ans:
Many cloud providers support replication at the Object Storage layer from one region to
another, however, in the circumstance that bad or corrupted blocks are replicated to the
secondary region, your recovery points are invalid.
Q93. How do you Decide What to Protect in Cloud?
Ans:
Not all workloads within the Cloud need protection – for example, with microservices
architectures, or any architecture that involve worker nodes that write out the valued data
to an alternate source, mean that there is no value in protecting the worker nodes. Instead,
the protection of the gold images and the output of those nodes provides the best value for
the business.
Ans:
The cloud encourages automation, not just because the infrastructure is programmable, but
the benefits of having repeatable actions reduce operational overheads, bolster resilience
through known good configurations and allows for greater levels of scale.
Ans:
Commvault software provides a robust Application Programming Interface that allows for
automated control over Deployment, Configuration, Backup and Restore activities within the
solution.
Ans:
Azure has the capability to establish an isolated logical network, referred to as an Azure
Virtual Network (AVN).Virtual Machines deployed within a AVN by default have no access to
Public Internet, and utilize a subnet of the Customer’s choice.Typically AVN’s are used when
creating a backbone between Virtual Machines, and also when establishing a dedicated
network route from a Customer’s existing on-premise network directly into Azure via Azure
ExpressRoute.