Storage Software - Virtualization

Storage Software - Virtualization

Dell Storage

Storage Software Overview
Device Management
Storage Software Virtualization

Software Partner

Dell Storage Virtualization Software
Dell delivers best practices for protecting virtualized environments
Dell delivers a complete and validated solution for protecting VMware environments. As many customers consider migrating to virtual environments to optimize server and storage resources, data protection plays an important role. While data protection in a VMware environment uses similar methodologies as a physical server environment, there are important differences that require a new approach to protecting customer data. In addition, customer SLAs may require both file and application data protection and disaster recovery methods to keep their businesses running.
Protect both Virtual and Actual Machines
Protecting VMware environments requires two-steps for complete data protection and disaster recovery:
  • Protecting application and file-level data within a virtual machine.
    Customers still need to recover individual files or application data (such as an Exchange mailbox) in the event of data corruption or a virus. Best practices with VMware protection means protecting the virtual machine data in the same manner as you protect a physical machine – install application and file agents specific to a virtual machine (e.g., an Exchange agent for your virtual Exchange server and a file system agent for your virtual file server). Virtual machine data is usually backed up several times a day or a continuous protection solution is used to ensure a maximum RPO (recovery point objective). The actual backup schedules depend on (1) the business criticality of the application or file server and (2) the impact of the backup on server resources (e.g., processor load). A common scheme is to schedule backups around heavy use times (e.g., Exchange server backups occur during lunchtime and periodically throughout the day when traffic is lowest). In addition, customers can stagger backups within an virtual environment to ensure the same physical sever is not backing up each virtual machine at the same time (e.g., virtual machine #1 backups at 11:30 AM, virtual machine #2 backups at 12:30 PM, etc.).
  • Protecting the VMware files (VMDKs) for disaster recovery.
    Customers should also protect the VMDK files In the event of hardware failure or corruption of the actual VMware file. This ensure rapid recovery for an entire virtual machine without the need to reinstall a new image on the virtual machine. When disaster strikes the actual VMware files, you can quickly recover the entire virtual machine (i.e. VMDK file) and have your virtual server back up and running quickly. VMware backups usually just require a Linux file agent to protect the VMDK files. However, again customers should ensure that their VMDK backup jobs do not overlap with the backups of the virtual machine (e.g., virtual machine #1 backup occurs at 10 PM and VMDK #1 – which is the VMDK where virtual machine #1 lies – backup starts at 11:30 PM, ensuring virtual machine backup #1 finishes first).
  • Dell incorporates new VMware technology – With ESX 3.0, a new option for protecting your file server-based data is VMware Consolidated Backup (VCB). With VCB you can backup data from a SAN without using resources on your VMware server. For Windows 2003 Server file shares, you can use your backup server (or proxy host) to move the data directly from the SAN to your backup disk or tape. This ensures you are getting the most out of your virtual servers.


Protecting VMware Environments with CommVault Software and Dell Hardware
Using VMware infrastructure For Backup and Restore
Using Symantec Backup ExecTM 11d for Windows®  Servers with VMware
Veritas NetBackupTM  6.5 for VMware 3.x

**Dell's Terms and Conditions: apply to all sales available on request or at "Terms and Conditions of Sale" located at the bottom of our homepage at: www.dell.com.sg

Prices and specifications are correct at date of publication but subject to availability or change without notice. Promotional deals apply to maximum order size of 3 desktop or laptop systems. Dell cannot guarantee that promotions and prices listed online will be available to purchase by telephone.

RETURNS POLICY: Dell’s “Returns Policy” found at http://www.dell.com.sg applies to all sales. Choose carefully, as order cancellation rights are limited and additional costs may apply.

MISTAKES: While all efforts are made to check pricing and other errors, inadvertent errors do occur from time to time and Dell reserves the right to decline orders arising from such errors.

ONSITE SERVICE : Technician, replacement part or unit (depending on service contract) will be dispatched if necessary following phone-based troubleshooting. Subject to parts availability, geographical restrictions (on site and/or next business day service not available in some locations) and terms of service contract. Service timing dependent upon time of day call placed to Dell. Defective unit must be returned or paid for. Replacements may be refurbished .

COMPLETECOVER: CompleteCover service is available for personal computers, Axim PDAs, Dell branded projectors and LCD TV. CompleteCover excludes theft, loss, and damage due to fire, intentional damage, acts of God or natural disasters, animals, pets or pests. Customer may be required to return unit to Dell. For complete details refer to CompleteCover service agreement found at www.dell.com/ap/services . This service is only available in selected countries.

TRADEMARKS: Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation in the U.S. and/or other countries.

©2010 Advanced Micro Devices, Inc. All rights reserved. AMD, the AMD Arrow logo, ATI, the ATI logo, AMD Athlon, AMD Turion, Radeon and combinations thereof are trademarks of Advanced Micro Devices, Inc. Other trademarks are for informational purposes only and may be trademarks of their respective owners.

COPYRIGHT: © 2015 Dell Inc. All rights reserved.