CVTSP24 - Module 05 - Commvault Auto Recovery
CVTSP24 - Module 05 - Commvault Auto Recovery
commvault.com | 888.746.3849
© 2023 Commvault. See here for information about our trademarks and patents.
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
Commvault, Commvault and logo, the "C hexagon” logo, Commvault Systems, Metallic, Metallic and logo,
the “Wave” logo, Commvault HyperScale X, HyperScale X, Recovery Reserve, and ThreatWise are
trademarks or registered trademarks of Commvault Systems, Inc. (“Commvault) The unauthorized use of
any Commvault trademark is strictly prohibited.
Other company and product names mentioned herein may be trademarks of their respective owners.
References to any third-party products, services, or websites should not be considered an endorsement
by Commvault. Some examples are for illustration only and are fictitious.
All right, title, and interest, including all intellectual property rights in and to this document and to any
related subject matter (collectively “Ownership Rights”) are owned and expressly reserved by Commvault.
No Ownership Rights are granted to you.
This document is intended for distribution to and personal reference use solely by Commvault customers;
all use of Commvault Solutions, including this document, is governed by Commvault’s Master Terms &
Conditions (currently available at https://www.commvault.com/legal/master-terms-and-conditions) which
are incorporated herein in their entirety.
This document is provided “as is.” Information in this document, including any specifications, URLs, or
other references, is subject to change without notice.
See www.commvault.com/IP for more information about our trademarks, patents, and other IP rights.
Confidentiality
This document contains information that is confidential and proprietary to Commvault. Without limiting
rights under copyright or otherwise, this information is provided with the express understanding that it will
be held in strict confidence and that no part of this document will be disclosed, used, reproduced, stored,
or transmitted, in whole or in part, for any purpose other than as expressly approved or provided by
Commvault in writing.
©1999-2023 Commvault
2
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
Table of Contents
Commvault® Auto Recovery .......................................................................................................................... 4
Replication ......................................................................................................................................................... 18
Replication ......................................................................................................................................................... 19
Application Recovery......................................................................................................................................21
3
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
Commvault
Commvault roprietary and Confidential Information Internal and artner Under Use Only
o ot istribute.
Notes:
4
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
Learning Objectives
Learning Objectives
1 2
© Commvault 2023
Commvault Proprietary and Confidential Information Internal and Partner Under NDA Use Only - Do Not Distribute.
Notes:
After Completing this module, you will gain an understanding of how Commvault® Auto Recovery helps
organizations to securely recover Virtual Machine Applications, Databases, Array volumes and files at scale
from cyberattacks and disasters.
This will enable you to successfully position the Commvault® Auto Recovery product in the context of the
Commvault® software portfolio.
5
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
s n
Typical isaster Recovery solutions dont address the business need, and leave a lot to be desired
s s N ds
Commvault
Commvault roprietary and Confidential Information Internal and artner Under Use Only
o ot istribute.
Notes:
Every customer we work with shares a common challenge. Data is everywhere. There is no future where data
is in fewer places than it is today. All companies we work with have hybrid, multi-cloud strategies managing
workloads across clouds, regions, accounts, datacenters, SaaS applications, and more.
Typical Recovery solutions don’t address the business need, and leave a lot to be desired.
• Complicated management. If it’s not easy to use, you can bet that R won’t be properly planned,
configured, or tested with any regularity.
• Not having a usable backup. Business continuity hinges on being able to quickly restore your VMs,
data, and applications… without breaking the bank.
• Cost. Needing multiple-point products to protect and recover your on-prem and cloud data and
workloads restricts your ability to achieve cost-effective coverage.
• Emerging threats. The threat landscape is constantly changing. How prepared are you to face it?
• Recovery Uncertainty. How do you know that you’ll actually be ready to recover when disaster
strikes?
nd h f n d n’ h N ds f s s, wh w n :
• Ease of use. Easy-to-deploy DR orchestration to simplify recovery and ongoing management of your
data and workloads, wherever they reside.
• Reliable copies. Fast, flexible replication to help ensure that you always have current copies of your
data and workloads.
• Data mobility. Application portability and cloud data mobility for flexibility and cost management, with
the ability to align coverage to the business value of your data.
• Threat management. With resilient protection against ransomware and emerging cyber threats.
• Verifiable recoverability. Knowing that you’ll always be ready to recover, regardless of the
circumstances.
6
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
n ns n ss
n d
n
rotect and replicate pplication irtual atabases iles olders Storage hysical Integrate with forensic tools
Machines Servers
modern applications with rrays
to determine the nature
sub minute R Os and type scope of attack to
near zero RTOs prevent future incidents
n n
d n
ublic Cloud rivate Cloud On prem dge
nables organizations to uickly and securely recover workloads at scale from ransomware attacks and disasters with
ata
minimal
loss and
d downtime
Commvault
Commvault roprietary and Confidential Information Internal and artner Under Use Only
o ot istribute.
Notes:
Scalability, flexibility, ease of use, and customizable RPOs are all important selling points but one key
differentiator that really sets Commvault® Auto Recovery apart from the competition is the capability to
replicate Application and Virtual Machine workloads both individually or by grouping them together.
Today, potential customers are looking for more than just simple M replication. Commvault’s advanced
replication capabilities allow customers to easily configure replication using a policy-driven approach,
designed to meet the most aggressive SLAs. Additionally, Commvault® Auto Recover provides customers with
the flexibility to control when to perform VM failover and failback operations. As is standard with Commvault®
software, detailed reporting and auditing capabilities are provided to help meet business compliance.
Commvault® Auto Recovery provides an easy-to-use, standalone replication and recovery solution along
with workload migration functionality that helps ensure business continuity across on-prem and cloud
environments. It delivers replication, cyberattack recovery, disaster recovery, and compliance reporting 24/7
and at any scale, all from a single, extensible platform with an easy-to-use, highly-customizable user interface,
the Commvault Command Center™. It provides orchestration and automated compliance reporting, flexible
replication, cost-optimized cloud data mobility, and verifiable recoverability via copy data management.
Smart protection of modern workloads with flexible RPOs and RTOs: Any workload, anywhere, any time, and
at any scale
• For VMs, databases, applications, files, containers, and storage snapshots, and more
• Includes one-to-many replication for simultaneously targeting both local and remote storage
• Allows you to align protection and recovery to the mission criticality of your data and workloads, for efficiency
and cost-effectiveness
• Periodic replication with VMware, Hyper-V, Azure, Azure Stack, AWS, Google Cloud)
7
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
• Allows customers to integrate with first and 3rd party validation and threat analysis tools to periodically
validate recovery points to make sure they are healthy and can be used for recovery
• Customers can make sure they are recovery ready, by periodically testing their recovery process in a
separate test network without impacting the production workloads.
• Customers can easily view the validation reports to understand and analyze any anomalies in the recovery
points right from the intuitive user interface of the Commvault Command Center™.
Forensic analysis: Enable integration with security tools to allow forensic analysis of infected recovery points
• Integrate with security tools post-recovery to automatically run and analyze the infected data
• Extensive API library allows integration with SEAM and SOAR tools to automate ransomware forensic
analysis
8
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
s n ds n
alidation methods Scan recovery points with Test failover orchestration supports custom actions
integrated tools like efender or extend to third party through pre and post scripts to extend malware scans
bring your own tools and support integration with through third party tools
other rd party tools
alidation can be executed at various stages of
alidation fre uency alidate all recovery points , recovery process , after replication or ondemand
perform spot checks or validate specific recovery during recovery
point on demand
Supports validating recovery readiness and recovery
Test recovery readiness of applications Test SL s by recovering workloads to an standby site,
recovery of workloads and conduct fire drills to without affecting production servers , and test validate
ensure applications are compliant with recovery SL s sanity of application
Commvault
Commvault roprietary and Confidential Information Internal and artner Under Use Only
o ot istribute.
Notes:
Over the next few slides, we will look at some customer use cases, highlighting the needs and requirements
and how the Commvault® Auto Recovery solution addresses these needs.
The first use case is the Validation of recovery points to detect threats and increase readiness.
Users need Validation methods to Scan recovery points with integrated tools like Defender or extend to third
party bring-your-own tools and support integration with other 3rd party tools.
They need to be able to Validate all recovery points, perform spot checks or validate specific recovery points
on-demand and they need to Test recovery of workloads and conduct fire drills to ensure applications are
compliant with recovery SLAs.
The Commvault® Auto recovery solution Test failover orchestration supports custom actions through pre and
post-scripts to extend malware scans through third-party tools
Validation can be executed at various stages of the recovery process, after replication or on-demand during
recovery.
Auto Recovery Supports validating recovery readiness and recovery SLAs by recovering workloads to a
standby site, without affecting production servers, and test/ validate the sanity of the application.
9
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
s n ds n
nalyse infected recovery points to identify the attack Test failover capability to mount infected copy of a
vector and the nature of Ransomware attack workload into an isolated test network without
affecting production systems
erform above analysis securely without causing
further infections re and postscript functionality for test
recovery failover operations allowing custom
ccess recovery functionality through Is to forensics tool integrations into the recovery process
automate operations and integrate into SO R
systems I access for all recovery orchestration operations
Commvault
Commvault roprietary and Confidential Information Internal and artner Under Use Only
o ot istribute.
Notes:
The next use case is the use of Forensics and threat analysis to identify the source/ scope of attacks.
Users need to Analyse infected recovery points to identify the attack vector and the nature of Ransomware
attacks.
They want to Perform this analysis securely without causing further infections and Access recovery
functionality through APIs to automate operations and integrate into SOAR systems.
The Commvault® Auto recovery solution provides Test failover capabilities to mount an infected copy of a
workload into an isolated/test network without affecting production systems.
It offers pre and post-script functionality for test recovery/failover operations allowing custom forensics tool
integrations into the recovery process
And Commvault® provides API access for all recovery orchestration operations.
10
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
s n ds n
Secure Recovery Real world production recovery of Supports recovery orchestration to restore workloads
workloads to a clean recovery pointeasily, uickly to production with ease using sanitized recovery
and securely minimizing downtime points
Scalable Recovery erform mass recoveries to nterprise application that is capable of mass
recover enterprise workloads at scale without recoveries through a parallel recovery of workloads
compromising RTO within recovery time objectives defined
Commvault
Commvault roprietary and Confidential Information Internal and artner Under Use Only
o ot istribute.
Notes:
Our platform includes industry-leading services around resiliency and backup & recovery, AI-driven
automation, real-time visibility across your entire data protection estate, governance, and controls to help
ensure compliance to legislation and internal policies, and powerful APIs and ecosystem integrations.
The 3rd use case is Restoring clean copies of workloads securely and at scale.
Users need Secure Recovery: Real-world production recovery of workloads to a clean recovery point - easily,
quickly, and securely - minimizing downtime.
They want Scalable Recovery, able to Perform mass recoveries to recover enterprise workloads at scale
without compromising RTO.
The Commvault® Auto recovery solution Supports recovery orchestration to restore workloads to production
with ease using sanitized recovery points.
It is an Enterprise application that is capable of mass recoveries through a parallel recovery of workloads
within recovery time objectives defined.
Auto Recovery Supports quick scaling of infrastructure to meet mass recovery needs of enterprises,
automating the deployment of Access points can be used to rapidly scale up working recoveries.
11
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
s nd s
Having the flexibility to choose the R Os and RTOs for your
workloads is crucial
s s
Commvault
Commvault roprietary and Confidential Information Internal and artner Under Use Only
o ot istribute.
Notes:
• The Recovery Point Objective or R O refers to how fre uently backups are being run. It’s basically defined
as the maximum amount of data – as measured by time – that can afford to be lost after a recovery from a
disaster, failure, or comparable event before data loss exceeds that which is considered to be acceptable to
an organization. It refers to the last point when the organization’s data was preserved in a usable format. or
example, an RPO of 60 minutes requires a system backup every 60 minutes.
• The Recovery Time Objective or RTO comes into play after a loss event and is basically how quickly an
organization needs to restore normal operation.
• RPOs and RTOs work together in a time sequence, with the RPO designed to help ensure that a business
has the right data backup policies in place, while the RTO helps ensure that it can quickly recover data from
the backup copies.
• Sub-minute RPOs and near-zero RTOs allow you to align recovery to the business value of your data.
• Longer RTOs and RPOs for less critical and archival content
• Given that shorter RPOs and RTOs typically mean greater cost, having the flexibility to choose the right RPOs
and RTOs for your workloads is crucial. This allows you to specify shorter RPOs and RTOs for mission-critical
data and workloads, while less-critical and archival data can fall under longer RPOs and RTOs, aligning
recovery – and related costs – to the business value of your data and workloads.
• Commvault® Auto Recovery provides various options for protecting and recovering your data and workloads
based on their mission criticality. For VMware workloads, you can choose from periodic (warm), periodic (hot),
or continuous replication to achieve different levels of recovery point objective (RPO) and recovery time
objective (RTO). Continuous replication using VMware VAIO is recommended for an RPO of less than 15
minutes. For other workloads, periodic replication with different platforms such as VMware, Hyper-V, Azure,
AWS, and GCP can achieve an RPO of hourly granularity. The choice between hot and warm site solutions
depends on your RTO requirements. Commvault® Auto Recovery offers flexibility and customization to help
you protect your data and workloads efficiently and cost-effectively.
12
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
13
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
14
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
Notes:
ext, we’ll explain how features specific to Commvault ® Auto Recovery map to recovery objectives but first,
we will discuss the methods associated with Commvault Backup & Recovery.
The first option is a backup or auxiliary copy to removable media such as tape. This provides a cost-effective
and portable way of storing recovery points in an offsite location. However, performing DR from tape is
unlikely to provide an acceptable RTO for most customers and is more likely suitable as a long-term retention
option for compliance purposes.
The next option is to utilize a DASH copy at a remote location and recover the required components and
workloads manually. This utilizes the secondary copy of data on disk and remote MediaAgents and therefore
does not require any additional hardware up until the point of restore. This might be a good option for Cloud
workloads or rented DR premises.
ow we’ll take a look at the three replication modes offered by Commvault ® Auto Recovery.
The first mode uses backup data from source VMs to create VMs at one or more destination sites. VM
Replication is typically deployed using DASH copy, whereby the destination is created from a full backup and
then updates from incremental backups are applied to keep the destination VMs in sync. In cases where
corruption on the source VM is replicated to the destination VM, users can still recover a point-in-time version
of the source VM from older backups. In addition, VM Replication can be initiated automatically after backups
have completed or on a scheduled basis (for example, daily or weekly). VM Replication includes orchestration
features to perform test boots, failovers, failbacks, and other operations that enable you to test the DR site or
move operations between the primary site and a destination site. VM Replication using backup data is
supported several source and destination Hypervisors and its targeted where the RPO is greater than 4 hours.
The second VM Replication mode uses IntelliSnap®, which mounts either a hardware-based storage snapshot
from a supported hardware vendor storage array, or a VMware software snapshot, and then reads data from
the mount directly to the destination VM. Using snapshots eliminates the need to create a backup copy for
replication, which provides faster replication and minimizes the impact on the production environment.
Snapshot based VM Replication does not write data to backup media and should therefore not replace a
regular backup. This replication mode also requires the source to be VMware but shares other orchestration
features with the backup based VM Replication mode, such as test-boot, failover, and failback. The target
RPO for snapshot based VM Replication is between 15 minutes and 4 hours, although this will vary
depending on the environment.
The final replication mode is array assisted remote replication, which improves data availability through
mirroring of volumes between two sites. This mode offers continuous replication for workloads with near-zero
RPO requirements.
Requirements and options for VM replication depend on both the data replication mode and on hypervisor
type. For Commvault® Auto Recovery and hypervisor-specific requirements (for both source and destination
VMs) please consult the Commvault documentation website.
15
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
h
On prem On
Cloud prem
Cloud
M S
roup roup roup
Recovered
Replicas
Cloud Storage
R Store Long term Retention
rimary Storage
Commvault
Commvault roprietary and Confidential Information Internal and artner Under Use Only
o ot istribute.
Notes:
The Commvault® Auto Recovery solution employs hypervisor and Commvault components on both the
primary and secondary (destination) sites. The deployment can be standalone or co-located with the primary
site's infrastructure. Configure CommCell Auto Recovery if the Commvault deployment is co-located with the
primary site to ensure that the Commvault deployment remains accessible if the primary site is inaccessible.
You can use the Commvault® Auto Recovery solution to replicate virtual computers on a regular basis to a
warm disaster recovery location.
16
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
n nn d ower of f
ower on
ower off the source, suspends the active replication and ower On destination. the Suspend
the target
source Replication
Ignores the failure conditions M
M
s ower of f
ower on
Recover test Ms without impacting production the Suspend
the target
source Replication
ower on the test M and execute post failover scripts M
M
Clean up test Ms automatically based on expiration time
elete
ower on
Smart sync back to source the
Stop the original
Start the ower of f
Start the the
f ailov er smart the target
ower off the destination pair
sy nch M
original pair source
roll back
Start the original pair and power on source M M
snap
Commvault
Commvault roprietary and Confidential Information Internal and artner Under Use Only
o ot istribute.
Notes:
lanned and unplanned failovers follow a straightforward workflow to perform what’s needed.
With visual confirmations available in the Commvault Command Center™ to know the progress of each of
these steps and all automated with just a few clicks, it’s a foolproof process that is simple enough for anyone
to complete.
A noticeable difference with planned failovers is that they have the benefit of being able to create a snapshot
prior to failing over. Once failover conditions are resolved, failback is also an automated process that’s
available with just a series of clicks.
Test failover operations can also be performed allowing users to Recover test VMs without impacting
production. Power on the test VM and execute post failover scripts and then Clean up test VMs automatically
based on expiration time.
And Failback options allow you to fail back to production as quickly and easily as the initial failover.
17
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
Replication
ws ns f
n
s
f ds w
n wh uto scaling & highly available Minimize operational costs with
asily protect, recover, and infrastructure ensures optimal recovery strategies for
move data and workloads with performance during mass hot and warm site recoveries
maximum workload portability recoveries
Commvault
Commvault roprietary and Confidential Information Internal and artner Under Use Only
o ot istribute.
Notes:
Now when it comes to replication, virtual machines are one of the most common and easily replicated entities
within a data center. They are designed with the ability to migrate across hosts and storage. Also, due to
being abstracted from the hardware layer are well-suited to replication technologies. With that, it's important
to highlight the overall picture of the multiple tiers involved within the Commvault ® Auto Recovery replication
solution for virtual machines.
Commvault Auto Recovery utilizes several different technologies under-the-hood. For customers running
VMware, the solution provides two configurations, one is for Recovery Point Objectives of under 5 minutes
and the other is for Recovery Point Objectives of under 15 minutes. Both configurations require more
advanced back-end design and hardware requirements due to the extremely aggressive RPOs. The first
configuration utilizes VMware VAIO technology to continuously replicate VM-level changes to the destination.
The second VM Replication mode uses IntelliSnap®, which mounts either a hardware-based storage snapshot
from a supported hardware vendor storage array, or a VMware software snapshot, and then reads data from
the mount directly to the destination VM.
Now outside of the more resource-intensive options, we also offer our customers with the ability to configure a
more traditional VM Replication mode, which leverages the backed-up virtual machine information to create a
standby version of the VM. We then automatically replicate only the incremental change after a backup
completes for the source VM. This method offers RPOs of approximately 1 hour or less.
And lastly, when RPOs of more than 1 hour are acceptable, it is recommended to seed the protected virtual
machine data into a Cloud Library before performing the VM replication into the Cloud. This methodology has
the added benefit of providing a protection copy of the virtual machine data into a secondary copy into the
cloud, as well as providing better VM replication performance compared to direct replication from on-prem.
18
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
Replication
n h n s
nw h
w
Commvault
Commvault roprietary and Confidential Information Internal and artner Under Use Only
o ot istribute.
Notes:
Now with continuous replication for VMware, Commvault brings its replication capabilities to a completely
different level by replicating VM changes in near real-time. This feature competes and will replace DR
competitors like Zerto, Veeam, and even VMware's feature of SRM at a point.
Its use case is to capture potential customers that are looking for aggressive RPO, especially for mission-
critical apps. It leverages the VMware VAIO framework where Commvault inserts its certified filter plugin
within the ESXi host. This provides the ability to fork VM block-level changes where we can replicate them
over to a destination location before they are even written to media on the source side, without interrupting or
impacting performance.
The best part is that it offers the same advanced DR replication group and failover/failback operations that
other Commvault replication types do, with advanced controls to orchestrate the activity of their VMs all from
within a single pane of glass. With this, we should be fully ready to kick out the DR competitors from POCs
and prospects.
19
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
Application Integrity
n
n This is supported for
n h n s
nw h
w
Commvault
Commvault roprietary and Confidential Information Internal and artner Under Use Only
o ot istribute.
Notes:
The value of virtual machine replication without application-level consistency is questionable. With so-called
“crash-consistent” copies, there is always a risk that an application is unrecoverable due to inconsistencies or
corruption. So, are customers really prepared to take that risk?
Commvault’s pplication-Aware extension capability supplements the basic virtual machine protection
methodologies for VMs hosting applications. Commvault automatically inserts an application agent inside the
guest VMs, to manage and quiesce the application or database activity, temporarily redirecting writes. This
means that the application itself is in a consistent state of readiness for the virtual machine-level backup
operation.
At the time of writing this training, this advanced application awareness and consistency are supported for the
applications or databases of Active Directory, Exchange, SQL Server, SharePoint, Oracle DB, and MySQL.
Please refer to documentation.commvault.com for the latest supportability.
20
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
Application Recovery
n
Recover Ms on demand
ss
Recover entire application group
s s s
datacenter
Schedule automatic
Recovery testing
Save on hot standby Recover from long term retention
replica costs recovery point
Commvault
Commvault roprietary and Confidential Information Internal and artner Under Use Only
o ot istribute.
Notes:
We’ve talked about the various ways of configuring, replicating and R testing. ow, when we look at the
recovery options, it can be done in a single click on-demand for a specific entity or an entire application group
or data center with multiple VMs. Commvault can spinoff infrastructure to support SLAs based on business
needs, saving cost and recovering application groups automatically, not just VMs and cloud.
With the various options available, we can address the frequency of DR testing. Users can configure and
schedule it to run as often as desired. They can also run point in time recovery. For example, if the latest data
cannot be recovered due to a ransomware attack, customers can recover data from the last data backup
taken, even during a specific point in time. Recovery can be completed from data older than a few months or
even years, as needed.
Unlike competitors, Commvault does not charge the customer per R test and don’t re uire specific
infrastructure running 24/7 for DR recovery.
21
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
One click mass recovery of clean applications from validated recovery points
d n
s
s, s s, , n s d
M OS S pplication recovery groups for instant
roup roup roup
s w N recovery (Hot) or on demand recovery (Warm)
n s
Commvault
Commvault roprietary and Confidential Information Internal and artner Under Use Only
o ot istribute.
Notes:
One of the use cases is how do you automate the cyber recovery process at a massive scale.
You don't need a DR site to use our recovery orchestration capabilities, you can use test failover, you can use
failover, and you can use undo failover, all within the same site.
You might want to recover your workloads from a different network into a different zone or within the same
network and the same zone.
You can also automate the boot order sequencing, if there are any dependencies between your servers and
your applications, you can specify the priority across these VMS which will help automate the boot order
Customers also have the flexibility to overwrite certain information like host or network or IP definitions, at a
granular VM level. For example, you want certain VMS to have a specific static IP address, or you want
certain VMS to be part of a different network within a recovery group.
Recovery groups are a logical grouping of related servers that need to be replicated and/or recovered
together. You can create recovery groups either using the intuitive user interface, the Commvault Command
Center™, or APIs. With the help of these recovery groups, you can mass recover and failover an application
or group applications together in an uncomplicated way. Additionally, you can set the priority of each server to
determines the order the servers should be recovered.
22
COMMVAULT PROPRIETARY AND CONFIDENTIAL INFORMATION - INTERNAL AND PARTNER UNDER NDA USE ONLY- DO NOT DISTRIBUTE
d n
s d nd
s, s s, , n ns
M OS S s w N M OS S
roup roup roup roup roup roup
n s s n s
ns n
d
w
s, s, s, s d s d s
s w N
d n n
s , hs , s d
d n
h d wn n n s w N n
h n s n
d n
Commvault
Commvault roprietary and Confidential Information Internal and artner Under Use Only
o ot istribute.
Notes:
The second use case is the actual site recovery use case.
You have your production site, and you want to recover your entire site to a DR site when something
happens.
This could be a network failure or could be a natural disaster which has brought down your entire data centre
or so on.
• test failover,
• fail-over and
• failback to recover your entire site into a different region or a different or a different location.
23
COMMVAULT PROPRIETARY/CONFIDENTIAL – FOR COMMVAULT PARTNERS UNDER NDA USE – NOT TO BE FURTHER DISTRIBUTED
Thank You
© Commvault 2023
Commvault Proprietary and Confidential Information Internal and Partner Under NDA Use Only - Do Not Distribute
commvault.com | 888.746.3849
© 2023 Commvault. See here for information about our trademarks and patents.