Price, complexity, features and compatibility, all paths to overcome the difficulties related to the protection of virtual data.
Today, IT departments rapidly set up Virtualization technologies. But in this situation, customers face the challenge of integrating data protection and archiving methodologies for their virtual data.
Price, complexity, features and compatibility, all paths to overcome the difficulties related to the protection of virtual data.
Today, IT departments rapidly set up Virtualization technologies. But in this situation, customers face the challenge of integrating data protection and archiving methodologies for their virtual data.
Several reports from market research companies suggest that the resolution of problems for the protection of virtual data was one of the main priorities of 60% of users of Virtualization technology in 2013, this is quite amazing figure. The options available to protect traditional data are numerous, but it is quite different in case of data in the virtual environment.
Some reports also suggest that more than a third of organizations will change their solution provider for backup, due to the major factors such as price, complexity or functionality. This statement is based on what we have heard from customers; I would include a fourth factor, compatibility. In this post we will examine these four areas to find ways to overcome the difficulties related specifically to the protection of virtual data.
Price Control
Many market analysts admitted that they were amazed that basic and routine IT tasks such as data protection still cause major problems for customers. And the addition of Virtualization setting is not necessarily likely to make things easier.
When they start to think about protecting their virtual data, customers can have the first instinct to use an application of existing traditional backup, but should be approached with carefulness to this move toward. Indeed, traditional backup software can quickly become too much expensive to manage virtual data.
Most of the traditional applications apply based on the billing agent per host or sometimes by the virtual machine (VM); resulting in license fees and unnecessary maintenance and increases the time spent on managing additional required licenses. Furthermore, in case of the agent’s absence for these hosts, valuable data may not be taken into account when the next backup required. Although, including a default backup agent on each virtual machine can certainly simplify deployment tasks, but this can quickly become expensive and unnecessarily increase the consumption of resources (CPU, Network, etc…).
While protecting applications such Microsoft Exchange, SQL and SharePoint, or other tasks such as tape backup or remote application for data protection, most of the backup software requires additional plug-ins and license. Even some traditional backup software today use license based on capacity, they may well suit for some large organizations, but also lead to an explosion of costs and provide features that users do not necessarily need.
Applications simple backup
We must think about backup applications which adopt a simpler approach to licensing and do not use agents or plug-ins, or do not charge for unnecessary features. Indeed, applications of this type are generally less expensive and process methodology also reduces overhead and avoids the need to track licenses. Most importantly, these applications ensure that all data of customer are saved, not like some software which always planning to sell their licenses.
Also keep in mind that saving more data than necessary will increase costs and therefore increase the amount of data adding virtual machines to a backup plan which can also lead to an exponential increase in spending. Virtual machines generate a lot of unnecessary data tools (useless for restoration), but hypervisors data can be put in place to deal with this problem in a controlled manner which would be remarkable.
It is therefore essential to focus on the dedicated virtual machines that take advantage of these features of the hypervisor and help to eliminate these needless data tools. In addition, duplication can reduce the space of storage needed for backups on the site, and volume of data can be sent and reside in the cloud for disaster recovery and off-site backup.
As a final point, the additional costs associated with virtual data backup can be linked to the increase in the number of physical (or backup servers) servers than the number of storage facilities for these data and additional support to edit the data ensure the maintenance of virtual data.
Server side physical backup applications are specifically designed to run as virtual machines and take full advantage not only for the existing infrastructure but also for all the technologies associated with a virtual machine. For example, vMotion and vStorage Motion in VMware environments.
Now we are going to see complexity, functionality and compatibility of data protection in virtual environments.
Managing complexity
Virtual machines are logically dynamic structures that initiate various types of disturbances in the creation of relatively controlled data protection. Many factors are at the root of this complexity, particularly in the creation of virtual machines. It is so easy to set up these virtual machines; even employees who know nothing about data protection or do not care can create them, which lead to unnecessary side effects and even sometimes IT managers also find them difficult to control.
Concerns
Major concerns related to several key issues: how the application of safeguard integrates the hypervisor? Some application may work directly with the tools to make inventory and automatically detect new hosts or created virtual machines or added since the last backup. This ensures that data will be protected, regardless of how the creation of virtual machines.
It should also take into account the serious performance problems that many adverse effects on the environment. Backup applications run on a schedule, regardless of other events that occur in the environment, and tasks require resources (network, disk I / O, processing power) and more focused on applications in virtual environments. These applications can typically be deployed as virtual machine and use fewer resource model, but vMotion feature can also be disabled when their work come to an end in order to free resources for the hosts needs to other virtual machines that perform more strategic functions.
It is also important to understand how simple it is to make restoration with an application. If it uses a proprietary format (like the vast majority of applications), it only has access to data, which significantly reduce the possibility of restoration and creates unnecessary conflicts over resources. It will deploy a virtual assistant to restore the data so that the hypervisor or the database can understand what he or she receives. Backup applications that can protect data in their native format are naturally more flexible and do not require starting the virtual machines before the exploration, research or restoring individual files.
Features: which are necessary?
The scalability of a solution of virtual data protection is an important aspect to consider. The rate of adoption of virtualization technologies is not diminishing, most of the environments that are likely to benefit need a scalable solution for data protection, not only from the point of view of the support but also on the fly, to measure the increasing virtual data volume. The proliferation of virtual machines and superfluous data drive up the costs of backup, but if it is not able to support the growing data of virtual machines, it is legitimate to question on its usefulness.
IT managers need a system that can evolve easily, so all data is always protected. Traditional applications are designed to protect the physical data and those who succeeded with them do not necessarily offer the functionality, interoperability with data from Virtualization hypervisors or needed to meet today’s needs.
The solutions offering direct links with the hypervisor undeniably provide a strategic interest for the protection of virtual data. Some hypervisors implement unique methods to reduce the additional data associated with their virtual machines, but it is important that the data protection solution can also automatically detect new virtual machines so that all data are protected. When moving the virtual machines or data store associated with it, the backup application does still protect the data?
Protection system should not only protect virtual data but also the physical data that will continue to exist, even if the volume does not necessarily increase. The combination of application dedicated to virtual data and software for traditional physical data is the best approach. However, a dedicated Virtualization implementation might work in conjunction with a traditional application, presenting virtual data, so that the investment represents the backup media, backup application, the existing policies and procedures is not lost.
The last question to ask is this: a solution it offers flexibility in terms of backup media? Can it for to save the data on tape, or in the cloud using the best method to come? Protection solutions for the most desired data will be those that can take advantage of any backup media not only for backup but also for archiving virtual machines and associated data. Therefore, you must ensure that any application or solution in place can support the disc, the cloud, cut the bandwidth also. The latter remains the medium of choice for backup and archiving up to 80% organizations.
Compatibility
The term “compatibility” can have several meanings. In the context of ours, we are talking specifically the type of format in which the backup application “protects” the data to the target destination. Most applications use a proprietary format that allows only the application that made the backup to access the data, which virtually eliminates any flexibility in the choice of backup and disaster recovery.
But that’s not all. Imagine using a backup application that can protect data in their native format on the virtual as well as data associated machine, which eliminates vendor lock-in and data is a real resource not only for end users but also for the IT department. Keeping the data in a proprietary format limit the use of IaaS technologies, backup application can quickly become a single brake as it can access and read the data.
With applications that use the native format, it is possible to verify that the data are not infected by viruses, monitor security and compliance, and use the indexing engine in conjunction with the data. More importantly, applications that store data in their native format preserve the freedom of choice of backup media and other applications that may require two data, five or ten years after their initial storage. Although this choice is never exercised, it is good to know it is possible.
Conclusion
Data from Virtualization continue to impose and customers will continue to enjoy the benefits of Virtualization. But they will also learn how to best protect the new data structure that the technology introduced. While traditional applications may suffice today to protect virtual data, what will happen tomorrow? Will they become an ally or an enemy of the virtual infrastructure?
Customers should know why the virtual data are different from the physical data but should not be afraid to analyze the options available to protect them. Some applications built using traditional methods of data protection have been adapted to protect virtual data but others were created to Virtualization technologies and their environments, and are able to take advantage of features and flexibilities of virtual infrastructure. Each other have strengths and weaknesses, and the good news is that you have a choice.