OST Virtual Synthetics 1. Synthetics Overvier Definitions – Catalog – Image – Extent Process Overview (today) – Extent map derivation – Read agenda –

Slides:



Advertisements
Similar presentations
Symantec Education Skills Assessment SESA 3.0 Feature Showcase
Advertisements

IT Analytics for Symantec Endpoint Protection
‘Changing environment – changing security’ - Cyber-threat challenges today – Budapest, September 17-18, Industry and the fight against cybercrime.
Attacks on Virtual Machine Emulators Peter Ferrie, Senior Principal Researcher 12 April, 2007.
Threat Intelligence Use in Information Security: History, Theory and Practice Tim Gallo Cyber Security Field Engineering 1.
Click to add presenter’s name Symantec Backup Exec™ 2010: Protect More, Store Less, Save More 1 Deduplication Everywhere, Unified Archiving. Virtualize.
Translation in the Community LRC Localisation in the Cloud Jason Rickard Principal Product Manager, Community.
1 Getting Beyond Standalone Antivirus to Advanced Threat Protection Eric Schwake Sr. Product Marketing
Symantec Tech Symposium Randy Cochran, Vice Present Channel Sales – Americas August 17, 2009.
Backup Modernization with NetBackup Appliances
The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore.
Symantec De-Duplication Solutions Complete Protection for your Information Driven Enterprise Richard Hobkirk Sr. Pre-Sales Consultant.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
1 When Cloud Networking meets Cloud Computing: Software-Defined Networking (SDN) Customer Application Faan DeSwardt Infrastructure Architecture Manager.
Chapter 5 Configuring the RMAN Environment. Objectives Show command to see existing settings Configure command to change settings Backing up the controlfile.
Understanding Active Directory
President’s Forum and WSML 2012 INDSTRAT 02 Mobile Market Dynamics Brian Duckering, Deborah Clark, Evan Quinn “A Day in the Life of Mobile” 1.
5 Copyright © 2008, Oracle. All rights reserved. Using RMAN to Create Backups.
Symantec Managed Security Services The Power To Protect Duncan Evans Director, Cyber Security Services 1.
1 Safely Using Shared Computers Amanda Grady December 2013.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
End User License Agreement Permission to use and redistribute this Document is granted, provided that (1) the below copyright notice appears in all copies.
Type presentation name here in slide master © 2007 SDL. Company Confidential. Forward-looking information is based upon multiple assumptions and uncertainties.
GPS 2011 Slide - 1 MS CERT KIT Microworld Nova. GPS 2011 Slide - 2 Presentation of Microworld Nova The MS Cert Kit MS Cert Kit presentation The backend.
Quick Thoughts on PGP Use Cases for KMIP 1 Michael Allen Sr. Technical Director.
The current state of Cybersecurity Targeted and In Your Pocket Dale “Dr. Z” Zabriskie CISSP CCSK Symantec Evangelist.
President’s Forum and WSML 2012 SYMSTRAT 03: Enterprise Sales Conversations for Virtualization Todd Zambrovitz with guest appearance by Kevin Fiedler 1.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 11: File System Implementation.
WLAN Auditing Tools and Techniques Todd Kendall, Principal Security Consultant September 2007.
Innovation From the Ground Up Fred Hollowood, Martin Roche.
Type presentation name here in slide master © 2007 SDL. Company Confidential. Forward-looking information is based upon multiple assumptions and uncertainties.
Installation of Storage Foundation for Windows High Availability 5.1 SP2 1 Daniel Schnack Principle Technical Support Engineer.
1 APJ Curriculum Paths for Partners Specialization Accelerates Shirley Hoon APJ Partner Enablement Partner Enablement Oct
Symantec NetBackup OpenStorage Logs and Troubleshooting Short Course
Copy to Tape TOI. 2 Copy to Tape TOI Agenda Overview1 Technical Feature Implementation2 Q&A3.
Shared Engineering Services APJ Ghostdetect ver 1.0 for SPC Donghyun Seo Dec 12, 2008.
Upstate NY Storage & High Availability User Group October 23, 2009.
How to transfer 85x prediction patterns from ADM library to HOL library Presenter: Yoel Kortick.
1 Symantec NetBackup OpenStorage Troubleshooting Short Course Symantec NetBackup OpenStorage.
1 Central Publish to External Catalog from the Alma Network Zone.
OpenStorage Training Introduction to NetBackup
1 Administration User Management Updating Users Fundamentals.
Optimized Synthetics 1 OpenStorage Optimized Synthetics.
Type presentation name here in slide master © 2007 SDL. Company Confidential. Forward-looking information is based upon multiple assumptions and uncertainties.
Partner Proctored Assessment Registration Process Ajit Jha 1 Partner Assessment.
1 Certification Program User Management 01 - Roles.
Cyber Security in the Post-AV Era Amit Mital Chief Technology Officer General Manager, Emerging Endpoints Business Unit.
How to control bracket and parentheses appearance in right to left display of web Presenter: Yoel Kortick.
10 Copyright © 2007, Oracle. All rights reserved. Using RMAN Enhancements.
© 2013 IBM Corporation IBM UrbanCode Deploy v6.0.1 Support Enablement Training Source Configuration and Database Upgrades Michael Malinowski
Editing Tons of Text? RegEx to the Rescue! Eric Cressey Senior UX Content Writer Symantec Corporation.
APIs related to NBU AIR Feature 1 OST APIs Related to NBU AIR Feature.
1 Introduction to Remote Storage Yoel Kortick Senior Librarian.
Maximize Profits Through Stronger Security Brook Chelmo Product Marketing
1 Export E-Inventory Job. 2 Copyright Statement All of the information and material inclusive of text, images, logos, product names is either the property.
1 Patron Blocks - Librarian assigned and system assigned Senior Librarian Yoel Kortick.
1 RDA in Aleph 500 Version 21 Yoel Kortick. Aleph support manager Nov
An Introduction to the Bibliographic Metadata Profile in Alma
How to send to the vendor an analytics report of items which have or have not arrived (Legal Deposit) Yoel Kortick Senior Librarian.
New service, p-ret-adm-03 (Advanced General Retrieval Form) Version 21 rep_ver # Yoel Kortick Alma Global Support Manager
OpenStorage MetaData OST MetaData.
Presenter: Yoel Kortick
Defining and using an external search profile with multiple targets for copy cataloging Yoel Kortick Senior Librarian Alma Product Management.
Patron Driven Acquisition (PDA) Demand Driven Acquisition (DDA)
Presenter: Yoel Kortick
How to configure and use the Holdings record Accession Number
OpenStorage API part II
Appendix D: Network Model
Presentation transcript:

OST Virtual Synthetics 1

Synthetics Overvier Definitions – Catalog – Image – Extent Process Overview (today) – Extent map derivation – Read agenda – Data movement – Validate completed image Virtual Synthetics – Implementation OST Virtual Synthetics 2

Definitions (For Synth Puproses) Catalog – Database of backup metadata – Backups known to Netbackup, location on media – Files within a backup, including location and size Image – Container for backup data – Whole backup or part; one or more fragments Extent – Representation of data chunk within a backup – Block offset into backup and number of blocks in length – Blocks are 512 bytes OST Virtual Synthetics 3

Extent Map Derivation This is a catalog operation – Looks back through recent history of backups for a given policy. – Develops a combination of full + incrementals necessary to synthesize a new backup. – Uses file metadata of incremental backups to determine files added, replaced, or deleted after the full backup. – Extent mapping is derived by choosing most recent instance of a file. Results in: – A set of extents mapped to backup id. – Extent set for most recent backup is first, oldest is last – Extent list is in block ascending order for each backup. – Overall extent list is ordered by how the extents should appear in the resulting backup OST Virtual Synthetics 4

Read Agenda Synthetics today allows read from any backup on any media server and write to any media server. – Heterogeneous capability provides value with costs – Tape read/write strategy results in sequential extent reading and writing. Synth reprocesses the extent mapping – Chooses source copy and maps source media – Extents may be divided to reflect fragmentation. Read agenda is based on extent sets for each media – One reader for each backup on each media OST Virtual Synthetics 5

Data movement and Validation Writer is launched, targeting new media with a new backup id Readers are launched synchronously: – Each reader will read large contiguous extents of the source image. – The reader filters the data read according to the extent mapping for the backup. – Passes data to the writer via a socket. When all readers and the writer is done, new image is marked complete. – This signals to the rest of Netbackup that the image is ready for restores, duplication, and future synthetics. Presentation Identifier Goes Here 6

Virtual Synthetics Goals – Produce synthetic backups with little or no copying involving a NBU data mover – A fully virtual image would involve linking data in existing images into a new image. Uses stsp_include_in_image(). – Make synthetics a metadata operation rather than a data movement. – Cheapen “synthetics forever” Realizations – On-disk organization is driven by capability of the storage server. Allows storage servers to bring their value to the Netbackup equation. – Inferred relationship given by stsp_include_in_image() could be used to perform better SIS. – Virtual images can be used to re-organize existing images (alternative views) OST Virtual Synthetics 7

Virtual Synthetics Realizations (con’t) – Synth to 2nd storage server could be a local synth plus optimized duplication – Extents in new image can be ordered based on need rather than data movement. Implementation – Source images and target LSU must be on the same storage server. – Storage server advertises “include in image” support. – Netbackup detects this capability and uses it to dynamically choose whether to use a virtual synthetic operations or default to the traditional non-virtual synthetic backup. – Extent mapping and read agenda are constructed similarly to the non- traditional synthetic backup method. OST Virtual Synthetics 8

Virtual Synthetics Implementation (con’t) – Target image is constructed sequentially. – Source images are opened as needed. – The “include in image” operations are performed by one Netbackup media server. – Resulting image should be identical and indistinguishable from an image constructed using the non-virtual method. OST Virtual Synthetics 9

Thank you! Copyright © 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. OST Virtual Synthetics 10