0% found this document useful (0 votes)
34 views

CVTSP24 - Module 05 - Commvault Auto Recovery

Uploaded by

Emanuel Tavares
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views

CVTSP24 - Module 05 - Commvault Auto Recovery

Uploaded by

Emanuel Tavares
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 24

COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE

CVTSP24 – Commvault® Auto


Recovery
Module - 05
August, 2023

commvault.com | 888.746.3849
© 2023 Commvault. See here for information about our trademarks and patents.
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE

Notices and Disclaimers

Commvault, Commvault and logo, the "C hexagon” logo, Commvault Systems, Metallic, Metallic and logo,
the “Wave” logo, Commvault HyperScale X, HyperScale X, Recovery Reserve, and ThreatWise are
trademarks or registered trademarks of Commvault Systems, Inc. (“Commvault) The unauthorized use of
any Commvault trademark is strictly prohibited.

Other company and product names mentioned herein may be trademarks of their respective owners.
References to any third-party products, services, or websites should not be considered an endorsement
by Commvault. Some examples are for illustration only and are fictitious.

All right, title, and interest, including all intellectual property rights in and to this document and to any
related subject matter (collectively “Ownership Rights”) are owned and expressly reserved by Commvault.
No Ownership Rights are granted to you.

This document is intended for distribution to and personal reference use solely by Commvault customers;
all use of Commvault Solutions, including this document, is governed by Commvault’s Master Terms &
Conditions (currently available at https://www.commvault.com/legal/master-terms-and-conditions) which
are incorporated herein in their entirety.

This document is provided “as is.” Information in this document, including any specifications, URLs, or
other references, is subject to change without notice.
See www.commvault.com/IP for more information about our trademarks, patents, and other IP rights.

Confidentiality

This document contains information that is confidential and proprietary to Commvault. Without limiting
rights under copyright or otherwise, this information is provided with the express understanding that it will
be held in strict confidence and that no part of this document will be disclosed, used, reproduced, stored,
or transmitted, in whole or in part, for any purpose other than as expressly approved or provided by
Commvault in writing.

©1999-2023 Commvault

2
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE

Table of Contents
Commvault® Auto Recovery .......................................................................................................................... 4

Learning Objectives .......................................................................................................................................... 5

Auto Recovery Problem Statement ............................................................................................................ 6

Commvault Auto Recovery ............................................................................................................................ 7

Commvault Auto Recovery ............................................................................................................................ 9

Commvault® Auto Recovery ........................................................................................................................ 10

Commvault® Auto Recovery...........................................................................................................................11

Flexible RPOs and RTOs ..................................................................................................................................12

Auto Recovery features and recovery objectives ...............................................................................13

Auto Recovery Architecture ....................................................................................................................... 16

Auto Recovery Failover & Failback ............................................................................................................ 17

Replication ......................................................................................................................................................... 18

Replication ......................................................................................................................................................... 19

Application Integrity ..................................................................................................................................... 20

Application Recovery......................................................................................................................................21

Commvault® Auto Recovery......................................................................................................................... 22

Commvault® Auto Recovery.........................................................................................................................23

3
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE

Commvault® Auto Recovery

Commvault Technical Sales rofessional


Module

Commvault

Commvault roprietary and Confidential Information Internal and artner Under Use Only
o ot istribute.

Notes:

Welcome to module 5 of the Commvault® Technical Sales professional course.

Looking at Commvault® Auto Recovery.

4
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE

Learning Objectives

Learning Objectives

1 2

After completing this


module, you will: Gain an understanding Be able to convey technical
of how Commvault® requirements, architecture
Backup and Recovery and core components
functionality addresses required for Commvault®
customers’ challenges. Data Backup and
Recovery.

© Commvault 2023

Commvault Proprietary and Confidential Information Internal and Partner Under NDA Use Only - Do Not Distribute.

Notes:

After Completing this module, you will gain an understanding of how Commvault® Auto Recovery helps
organizations to securely recover Virtual Machine Applications, Databases, Array volumes and files at scale
from cyberattacks and disasters.

This will enable you to successfully position the Commvault® Auto Recovery product in the context of the
Commvault® software portfolio.

5
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE

Auto Recovery Problem Statement

s n
Typical isaster Recovery solutions dont address the business need, and leave a lot to be desired

s s N ds

Complicated management ase of use

Unusable backups Reliable copies

High costs Cost optimized data mobility

merging threats roactive threat management

Recovery uncertainty erifiable recoverability

Commvault
Commvault roprietary and Confidential Information Internal and artner Under Use Only
o ot istribute.

Notes:

Every customer we work with shares a common challenge. Data is everywhere. There is no future where data
is in fewer places than it is today. All companies we work with have hybrid, multi-cloud strategies managing
workloads across clouds, regions, accounts, datacenters, SaaS applications, and more.

Typical Recovery solutions don’t address the business need, and leave a lot to be desired.

There are Risks associated with other solutions like:

• Complicated management. If it’s not easy to use, you can bet that R won’t be properly planned,
configured, or tested with any regularity.

• Not having a usable backup. Business continuity hinges on being able to quickly restore your VMs,
data, and applications… without breaking the bank.

• Cost. Needing multiple-point products to protect and recover your on-prem and cloud data and
workloads restricts your ability to achieve cost-effective coverage.

• Emerging threats. The threat landscape is constantly changing. How prepared are you to face it?

• Recovery Uncertainty. How do you know that you’ll actually be ready to recover when disaster
strikes?

nd h f n d n’ h N ds f s s, wh w n :

• Ease of use. Easy-to-deploy DR orchestration to simplify recovery and ongoing management of your
data and workloads, wherever they reside.

• Reliable copies. Fast, flexible replication to help ensure that you always have current copies of your
data and workloads.

• Data mobility. Application portability and cloud data mobility for flexibility and cost management, with
the ability to align coverage to the business value of your data.

• Threat management. With resilient protection against ransomware and emerging cyber threats.

• Verifiable recoverability. Knowing that you’ll always be ready to recover, regardless of the
circumstances.

6
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE

Commvault® Auto Recovery

n ns n ss
n d
n

rotect and replicate pplication irtual atabases iles olders Storage hysical Integrate with forensic tools
Machines Servers
modern applications with rrays
to determine the nature
sub minute R Os and type scope of attack to
near zero RTOs prevent future incidents
n n

d n
ublic Cloud rivate Cloud On prem dge

alidate recovery points n Securely recover workloads


through threat analysis from validated and sanitized
tools and test recovery recovery points at scale
readiness periodically
Continuous Scheduled eriodic

nables organizations to uickly and securely recover workloads at scale from ransomware attacks and disasters with
ata
minimal
loss and
d downtime

Commvault
Commvault roprietary and Confidential Information Internal and artner Under Use Only
o ot istribute.

Notes:

Scalability, flexibility, ease of use, and customizable RPOs are all important selling points but one key
differentiator that really sets Commvault® Auto Recovery apart from the competition is the capability to
replicate Application and Virtual Machine workloads both individually or by grouping them together.

Today, potential customers are looking for more than just simple M replication. Commvault’s advanced
replication capabilities allow customers to easily configure replication using a policy-driven approach,
designed to meet the most aggressive SLAs. Additionally, Commvault® Auto Recover provides customers with
the flexibility to control when to perform VM failover and failback operations. As is standard with Commvault®
software, detailed reporting and auditing capabilities are provided to help meet business compliance.

Commvault® Auto Recovery provides an easy-to-use, standalone replication and recovery solution along
with workload migration functionality that helps ensure business continuity across on-prem and cloud
environments. It delivers replication, cyberattack recovery, disaster recovery, and compliance reporting 24/7
and at any scale, all from a single, extensible platform with an easy-to-use, highly-customizable user interface,
the Commvault Command Center™. It provides orchestration and automated compliance reporting, flexible
replication, cost-optimized cloud data mobility, and verifiable recoverability via copy data management.

Smart protection of modern workloads with flexible RPOs and RTOs: Any workload, anywhere, any time, and
at any scale

• For VMs, databases, applications, files, containers, and storage snapshots, and more

• Includes one-to-many replication for simultaneously targeting both local and remote storage

• Allows you to align protection and recovery to the mission criticality of your data and workloads, for efficiency
and cost-effectiveness

• Continuous replication using VMware

• Periodic replication with VMware, Hyper-V, Azure, Azure Stack, AWS, Google Cloud)

• Support for Virtual Machines, Databases, Files, etc.

• Keeps your data safe without impacting production

7
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE

Recovery validation: Validate recovery points and recovery readiness periodically

• Allows customers to integrate with first and 3rd party validation and threat analysis tools to periodically
validate recovery points to make sure they are healthy and can be used for recovery

• Customers can make sure they are recovery ready, by periodically testing their recovery process in a
separate test network without impacting the production workloads.

• Customers can easily view the validation reports to understand and analyze any anomalies in the recovery
points right from the intuitive user interface of the Commvault Command Center™.

Forensic analysis: Enable integration with security tools to allow forensic analysis of infected recovery points

• Recover infected apps into an isolated network with limited access

• Integrate with security tools post-recovery to automatically run and analyze the infected data

• Extensive API library allows integration with SEAM and SOAR tools to automate ransomware forensic
analysis

Secure recovery: Securely recover workloads at a massive scale

• To identify, assess and mitigate risks

• To lock-down data, and harden against changes

• Built-in anomaly detection and reporting

• End-to-end encryption of data at-rest and in-flight

• Recovery apps from backups without the need of replicating to a DR site

• Recovery apps from validated recovery points with one click

8
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE

Commvault® Auto Recovery

s n ds n
alidation methods Scan recovery points with Test failover orchestration supports custom actions
integrated tools like efender or extend to third party through pre and post scripts to extend malware scans
bring your own tools and support integration with through third party tools
other rd party tools
alidation can be executed at various stages of
alidation fre uency alidate all recovery points , recovery process , after replication or ondemand
perform spot checks or validate specific recovery during recovery
point on demand
Supports validating recovery readiness and recovery
Test recovery readiness of applications Test SL s by recovering workloads to an standby site,
recovery of workloads and conduct fire drills to without affecting production servers , and test validate
ensure applications are compliant with recovery SL s sanity of application

alidate recovery points to detect threats and increase readiness

Commvault
Commvault roprietary and Confidential Information Internal and artner Under Use Only
o ot istribute.

Notes:

Over the next few slides, we will look at some customer use cases, highlighting the needs and requirements
and how the Commvault® Auto Recovery solution addresses these needs.

The first use case is the Validation of recovery points to detect threats and increase readiness.

Users need Validation methods to Scan recovery points with integrated tools like Defender or extend to third
party bring-your-own tools and support integration with other 3rd party tools.

They need to be able to Validate all recovery points, perform spot checks or validate specific recovery points
on-demand and they need to Test recovery of workloads and conduct fire drills to ensure applications are
compliant with recovery SLAs.

The Commvault® Auto recovery solution Test failover orchestration supports custom actions through pre and
post-scripts to extend malware scans through third-party tools

Validation can be executed at various stages of the recovery process, after replication or on-demand during
recovery.

Auto Recovery Supports validating recovery readiness and recovery SLAs by recovering workloads to a
standby site, without affecting production servers, and test/ validate the sanity of the application.

9
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE

Commvault® Auto Recovery

s n ds n
nalyse infected recovery points to identify the attack Test failover capability to mount infected copy of a
vector and the nature of Ransomware attack workload into an isolated test network without
affecting production systems
erform above analysis securely without causing
further infections re and postscript functionality for test
recovery failover operations allowing custom
ccess recovery functionality through Is to forensics tool integrations into the recovery process
automate operations and integrate into SO R
systems I access for all recovery orchestration operations

orensics and threat analysis to identify the source scope of attacks

Commvault
Commvault roprietary and Confidential Information Internal and artner Under Use Only
o ot istribute.

Notes:

The next use case is the use of Forensics and threat analysis to identify the source/ scope of attacks.

Users need to Analyse infected recovery points to identify the attack vector and the nature of Ransomware
attacks.

They want to Perform this analysis securely without causing further infections and Access recovery
functionality through APIs to automate operations and integrate into SOAR systems.

The Commvault® Auto recovery solution provides Test failover capabilities to mount an infected copy of a
workload into an isolated/test network without affecting production systems.

It offers pre and post-script functionality for test recovery/failover operations allowing custom forensics tool
integrations into the recovery process

And Commvault® provides API access for all recovery orchestration operations.

10
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE

Commvault® Auto Recovery

s n ds n
Secure Recovery Real world production recovery of Supports recovery orchestration to restore workloads
workloads to a clean recovery pointeasily, uickly to production with ease using sanitized recovery
and securely minimizing downtime points

Scalable Recovery erform mass recoveries to nterprise application that is capable of mass
recover enterprise workloads at scale without recoveries through a parallel recovery of workloads
compromising RTO within recovery time objectives defined

Supports uick scaling of infrastructure to meet mass


recovery needs of enterprises

Restore clean copy of workloads securely and at scale

Commvault
Commvault roprietary and Confidential Information Internal and artner Under Use Only
o ot istribute.

Notes:

Our platform includes industry-leading services around resiliency and backup & recovery, AI-driven
automation, real-time visibility across your entire data protection estate, governance, and controls to help
ensure compliance to legislation and internal policies, and powerful APIs and ecosystem integrations.

The 3rd use case is Restoring clean copies of workloads securely and at scale.

Users need Secure Recovery: Real-world production recovery of workloads to a clean recovery point - easily,
quickly, and securely - minimizing downtime.

They want Scalable Recovery, able to Perform mass recoveries to recover enterprise workloads at scale
without compromising RTO.

The Commvault® Auto recovery solution Supports recovery orchestration to restore workloads to production
with ease using sanitized recovery points.

It is an Enterprise application that is capable of mass recoveries through a parallel recovery of workloads
within recovery time objectives defined.

Auto Recovery Supports quick scaling of infrastructure to meet mass recovery needs of enterprises,
automating the deployment of Access points can be used to rapidly scale up working recoveries.

11
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE

Flexible RPOs and RTOs

s nd s
Having the flexibility to choose the R Os and RTOs for your
workloads is crucial

s s

lexible R Os allow you lexible RTOs allow you


to align protection to the to balance recovery
business value of your objectives and costs
data
Hot site option offers
Continuous near zero RTOs for
replication enables critical applications
sub minute R Os that need instant
enable for mission recovery.
critical workloads .
Warm site option
eriodic replication enables ondemand
with longer R Os for spinning of R
less critical but more infrastructure
diverse workloads . optimizing costs .

Commvault
Commvault roprietary and Confidential Information Internal and artner Under Use Only
o ot istribute.

Notes:

Flexible RPOs and RTOs

• The Recovery Point Objective or R O refers to how fre uently backups are being run. It’s basically defined
as the maximum amount of data – as measured by time – that can afford to be lost after a recovery from a
disaster, failure, or comparable event before data loss exceeds that which is considered to be acceptable to
an organization. It refers to the last point when the organization’s data was preserved in a usable format. or
example, an RPO of 60 minutes requires a system backup every 60 minutes.

• The Recovery Time Objective or RTO comes into play after a loss event and is basically how quickly an
organization needs to restore normal operation.

• RPOs and RTOs work together in a time sequence, with the RPO designed to help ensure that a business
has the right data backup policies in place, while the RTO helps ensure that it can quickly recover data from
the backup copies.

• Sub-minute RPOs and near-zero RTOs allow you to align recovery to the business value of your data.

• Continuous replication for mission-critical workloads and applications

• Longer RTOs and RPOs for less critical and archival content

• Given that shorter RPOs and RTOs typically mean greater cost, having the flexibility to choose the right RPOs
and RTOs for your workloads is crucial. This allows you to specify shorter RPOs and RTOs for mission-critical
data and workloads, while less-critical and archival data can fall under longer RPOs and RTOs, aligning
recovery – and related costs – to the business value of your data and workloads.

• Commvault® Auto Recovery provides various options for protecting and recovering your data and workloads
based on their mission criticality. For VMware workloads, you can choose from periodic (warm), periodic (hot),
or continuous replication to achieve different levels of recovery point objective (RPO) and recovery time
objective (RTO). Continuous replication using VMware VAIO is recommended for an RPO of less than 15
minutes. For other workloads, periodic replication with different platforms such as VMware, Hyper-V, Azure,
AWS, and GCP can achieve an RPO of hourly granularity. The choice between hot and warm site solutions
depends on your RTO requirements. Commvault® Auto Recovery offers flexibility and customization to help
you protect your data and workloads efficiently and cost-effectively.

12
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE

Auto Recovery features and recovery objectives

13
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE

14
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE

Notes:

ext, we’ll explain how features specific to Commvault ® Auto Recovery map to recovery objectives but first,
we will discuss the methods associated with Commvault Backup & Recovery.

The first option is a backup or auxiliary copy to removable media such as tape. This provides a cost-effective
and portable way of storing recovery points in an offsite location. However, performing DR from tape is
unlikely to provide an acceptable RTO for most customers and is more likely suitable as a long-term retention
option for compliance purposes.

The next option is to utilize a DASH copy at a remote location and recover the required components and
workloads manually. This utilizes the secondary copy of data on disk and remote MediaAgents and therefore
does not require any additional hardware up until the point of restore. This might be a good option for Cloud
workloads or rented DR premises.

ow we’ll take a look at the three replication modes offered by Commvault ® Auto Recovery.

The first mode uses backup data from source VMs to create VMs at one or more destination sites. VM
Replication is typically deployed using DASH copy, whereby the destination is created from a full backup and
then updates from incremental backups are applied to keep the destination VMs in sync. In cases where
corruption on the source VM is replicated to the destination VM, users can still recover a point-in-time version
of the source VM from older backups. In addition, VM Replication can be initiated automatically after backups
have completed or on a scheduled basis (for example, daily or weekly). VM Replication includes orchestration
features to perform test boots, failovers, failbacks, and other operations that enable you to test the DR site or
move operations between the primary site and a destination site. VM Replication using backup data is
supported several source and destination Hypervisors and its targeted where the RPO is greater than 4 hours.

The second VM Replication mode uses IntelliSnap®, which mounts either a hardware-based storage snapshot
from a supported hardware vendor storage array, or a VMware software snapshot, and then reads data from
the mount directly to the destination VM. Using snapshots eliminates the need to create a backup copy for
replication, which provides faster replication and minimizes the impact on the production environment.
Snapshot based VM Replication does not write data to backup media and should therefore not replace a
regular backup. This replication mode also requires the source to be VMware but shares other orchestration
features with the backup based VM Replication mode, such as test-boot, failover, and failback. The target
RPO for snapshot based VM Replication is between 15 minutes and 4 hours, although this will vary
depending on the environment.

The final replication mode is array assisted remote replication, which improves data availability through
mirroring of volumes between two sites. This mode offers continuous replication for workloads with near-zero
RPO requirements.

Requirements and options for VM replication depend on both the data replication mode and on hypervisor
type. For Commvault® Auto Recovery and hypervisor-specific requirements (for both source and destination
VMs) please consult the Commvault documentation website.

15
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE

Auto Recovery Architecture

h
On prem On
Cloud prem
Cloud

olicies Users SL R utomation rimary CS Standby CS


pplications

M S
roup roup roup

Replication roups uto created &


auto powered
M S M S
pp roups on
roup roup roup
Recovery Site

Ms olumes iles olders

Recovered
Replicas

Hypervisor hysical Server rray

Cloud Storage
R Store Long term Retention
rimary Storage

Commvault
Commvault roprietary and Confidential Information Internal and artner Under Use Only
o ot istribute.

Notes:

The Commvault® Auto Recovery solution employs hypervisor and Commvault components on both the
primary and secondary (destination) sites. The deployment can be standalone or co-located with the primary
site's infrastructure. Configure CommCell Auto Recovery if the Commvault deployment is co-located with the
primary site to ensure that the Commvault deployment remains accessible if the primary site is inaccessible.

This is how the architecture appears.

You can use the Commvault® Auto Recovery solution to replicate virtual computers on a regular basis to a
warm disaster recovery location.

16
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE

Auto Recovery Failover & Failback

nn d ower of f Inject the f ailov er


Create ower on
the marker and wait Suspend pply I
Capture the latest change just before the failover rollback the target
source f or it to reach the Replication Customization
snapshot M
Creates snapshot and suspend active replication M destination

n nn d ower of f
ower on
ower off the source, suspends the active replication and ower On destination. the Suspend
the target
source Replication
Ignores the failure conditions M
M

s ower of f
ower on
Recover test Ms without impacting production the Suspend
the target
source Replication
ower on the test M and execute post failover scripts M
M
Clean up test Ms automatically based on expiration time

elete
ower on
Smart sync back to source the
Stop the original
Start the ower of f
Start the the
f ailov er smart the target
ower off the destination pair
sy nch M
original pair source
roll back
Start the original pair and power on source M M
snap

Commvault
Commvault roprietary and Confidential Information Internal and artner Under Use Only
o ot istribute.

Notes:

lanned and unplanned failovers follow a straightforward workflow to perform what’s needed.

With visual confirmations available in the Commvault Command Center™ to know the progress of each of
these steps and all automated with just a few clicks, it’s a foolproof process that is simple enough for anyone
to complete.

A noticeable difference with planned failovers is that they have the benefit of being able to create a snapshot
prior to failing over. Once failover conditions are resolved, failback is also an automated process that’s
available with just a series of clicks.

Test failover operations can also be performed allowing users to Recover test VMs without impacting
production. Power on the test VM and execute post failover scripts and then Clean up test VMs automatically
based on expiration time.

And Failback options allow you to fail back to production as quickly and easily as the initial failover.

17
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE

Replication

ws ns f
n
s

f ds w
n wh uto scaling & highly available Minimize operational costs with
asily protect, recover, and infrastructure ensures optimal recovery strategies for
move data and workloads with performance during mass hot and warm site recoveries
maximum workload portability recoveries

Commvault
Commvault roprietary and Confidential Information Internal and artner Under Use Only
o ot istribute.

Notes:

Now when it comes to replication, virtual machines are one of the most common and easily replicated entities
within a data center. They are designed with the ability to migrate across hosts and storage. Also, due to
being abstracted from the hardware layer are well-suited to replication technologies. With that, it's important
to highlight the overall picture of the multiple tiers involved within the Commvault ® Auto Recovery replication
solution for virtual machines.

Commvault Auto Recovery utilizes several different technologies under-the-hood. For customers running
VMware, the solution provides two configurations, one is for Recovery Point Objectives of under 5 minutes
and the other is for Recovery Point Objectives of under 15 minutes. Both configurations require more
advanced back-end design and hardware requirements due to the extremely aggressive RPOs. The first
configuration utilizes VMware VAIO technology to continuously replicate VM-level changes to the destination.
The second VM Replication mode uses IntelliSnap®, which mounts either a hardware-based storage snapshot
from a supported hardware vendor storage array, or a VMware software snapshot, and then reads data from
the mount directly to the destination VM.

Now outside of the more resource-intensive options, we also offer our customers with the ability to configure a
more traditional VM Replication mode, which leverages the backed-up virtual machine information to create a
standby version of the VM. We then automatically replicate only the incremental change after a backup
completes for the source VM. This method offers RPOs of approximately 1 hour or less.

And lastly, when RPOs of more than 1 hour are acceptable, it is recommended to seed the protected virtual
machine data into a Cloud Library before performing the VM replication into the Cloud. This methodology has
the added benefit of providing a protection copy of the virtual machine data into a secondary copy into the
cloud, as well as providing better VM replication performance compared to direct replication from on-prem.

18
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE

Replication

n h n s
nw h
w

Commvault IO plug in drives policy & filter re uests


Monitor and obtain changes to M disks from IO filter
Cache and forward IO to destination over L W per protection
policy

Commvault
Commvault roprietary and Confidential Information Internal and artner Under Use Only
o ot istribute.

Notes:

Now with continuous replication for VMware, Commvault brings its replication capabilities to a completely
different level by replicating VM changes in near real-time. This feature competes and will replace DR
competitors like Zerto, Veeam, and even VMware's feature of SRM at a point.

Its use case is to capture potential customers that are looking for aggressive RPO, especially for mission-
critical apps. It leverages the VMware VAIO framework where Commvault inserts its certified filter plugin
within the ESXi host. This provides the ability to fork VM block-level changes where we can replicate them
over to a destination location before they are even written to media on the source side, without interrupting or
impacting performance.

The best part is that it offers the same advanced DR replication group and failover/failback operations that
other Commvault replication types do, with advanced controls to orchestrate the activity of their VMs all from
within a single pane of glass. With this, we should be fully ready to kick out the DR competitors from POCs
and prospects.

19
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE

Application Integrity

n
n This is supported for

n h n s
nw h
w

The integrity of the application data running inside Ms is vital.


f d s f s d Commvault can be configured to capture the state of application
ns d s s, s data at the time of the backup
d n n

Commvault
Commvault roprietary and Confidential Information Internal and artner Under Use Only
o ot istribute.

Notes:

The value of virtual machine replication without application-level consistency is questionable. With so-called
“crash-consistent” copies, there is always a risk that an application is unrecoverable due to inconsistencies or
corruption. So, are customers really prepared to take that risk?

Commvault’s pplication-Aware extension capability supplements the basic virtual machine protection
methodologies for VMs hosting applications. Commvault automatically inserts an application agent inside the
guest VMs, to manage and quiesce the application or database activity, temporarily redirecting writes. This
means that the application itself is in a consistent state of readiness for the virtual machine-level backup
operation.

At the time of writing this training, this advanced application awareness and consistency are supported for the
applications or databases of Active Directory, Exchange, SQL Server, SharePoint, Oracle DB, and MySQL.
Please refer to documentation.commvault.com for the latest supportability.

20
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE

Application Recovery

n
Recover Ms on demand

ss
Recover entire application group
s s s
datacenter
Schedule automatic
Recovery testing
Save on hot standby Recover from long term retention
replica costs recovery point

The integrity of the application data running inside Ms is vital.


Commvault can be configured to capture the state of application
data at the time of the backup

Commvault
Commvault roprietary and Confidential Information Internal and artner Under Use Only
o ot istribute.

Notes:

We’ve talked about the various ways of configuring, replicating and R testing. ow, when we look at the
recovery options, it can be done in a single click on-demand for a specific entity or an entire application group
or data center with multiple VMs. Commvault can spinoff infrastructure to support SLAs based on business
needs, saving cost and recovering application groups automatically, not just VMs and cloud.

With the various options available, we can address the frequency of DR testing. Users can configure and
schedule it to run as often as desired. They can also run point in time recovery. For example, if the latest data
cannot be recovered due to a ransomware attack, customers can recover data from the last data backup
taken, even during a specific point in time. Recovery can be completed from data older than a few months or
even years, as needed.

Unlike competitors, Commvault does not charge the customer per R test and don’t re uire specific
infrastructure running 24/7 for DR recovery.

21
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE

Commvault® Auto Recovery

One click mass recovery of clean applications from validated recovery points

d n

s
s, s s, , n s d
M OS S pplication recovery groups for instant
roup roup roup
s w N recovery (Hot) or on demand recovery (Warm)
n s

ns n utomate boot order se uencing for granular


control within a Recovery group
s, s, s, s d s s w N Override host network I definitions
d n n
dynamically at M level
nd Customize and enhance orchestration
s , hs , s
capabilities by integrating with custom tools
h d wn nd
n Is simplify connecting to your existing
s d
infrastructure and automating operations

Commvault
Commvault roprietary and Confidential Information Internal and artner Under Use Only
o ot istribute.

Notes:

Let’s talk about a couple of use cases.

One of the use cases is how do you automate the cyber recovery process at a massive scale.

You don't need a DR site to use our recovery orchestration capabilities, you can use test failover, you can use
failover, and you can use undo failover, all within the same site.

You might want to recover your workloads from a different network into a different zone or within the same
network and the same zone.

In fact, you can extend this further.

You can also automate the boot order sequencing, if there are any dependencies between your servers and
your applications, you can specify the priority across these VMS which will help automate the boot order

Customers also have the flexibility to overwrite certain information like host or network or IP definitions, at a
granular VM level. For example, you want certain VMS to have a specific static IP address, or you want
certain VMS to be part of a different network within a recovery group.

Recovery groups are a logical grouping of related servers that need to be replicated and/or recovered
together. You can create recovery groups either using the intuitive user interface, the Commvault Command
Center™, or APIs. With the help of these recovery groups, you can mass recover and failover an application
or group applications together in an uncomplicated way. Additionally, you can set the priority of each server to
determines the order the servers should be recovered.

22
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE

Commvault® Auto Recovery

Replicate and recover to a R site

d n

s d nd
s, s s, , n ns

M OS S s w N M OS S
roup roup roup roup roup roup

n s s n s
ns n
d
w
s, s, s, s d s d s
s w N
d n n

s , hs , s d
d n

h d wn n n s w N n
h n s n
d n

Commvault
Commvault roprietary and Confidential Information Internal and artner Under Use Only
o ot istribute.

Notes:

The second use case is the actual site recovery use case.

You have your production site, and you want to recover your entire site to a DR site when something
happens.

This could be a network failure or could be a natural disaster which has brought down your entire data centre
or so on.

You can use the recovery orchestration capabilities of

• test failover,
• fail-over and
• failback to recover your entire site into a different region or a different or a different location.

23
COMMVAULT PROPRIETARY/CONFIDENTIAL – FOR COMMVAULT PARTNERS UNDER NDA USE – NOT TO BE FURTHER DISTRIBUTED

Thank You

© Commvault 2023
Commvault Proprietary and Confidential Information Internal and Partner Under NDA Use Only - Do Not Distribute

commvault.com | 888.746.3849
© 2023 Commvault. See here for information about our trademarks and patents.

You might also like