Upload
ashish-verma
View
246
Download
2
Embed Size (px)
Citation preview
8/11/2019 Dd Guide Emc
1/288
Backup Recovery Systems DivisionEMC Data Domain2421 Mission College BoulevardSanta Clara, CA 95054
866-WE-DEDUPE408-980-4800www.datadomain.com
EMC Data Domain System Administration
Course
April 2011
MR 1CN DDSAADMIN 50G1
8/11/2019 Dd Guide Emc
2/288
EMC believes the information in this publication is accurate as of its publication date. The information is subject tochange without notice. THE INFORMATION IN THIS PUBLICATION IS PROVIDED AS IS. EMC CORPORATION MAKES NOREPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, ANDSPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.Using, copying, and distributing EMC software described in this publication requires an applicable software license.EMC2, EMC, Data Domain, Global Compression , SISL, the EMC logo, and where information lives are registeredtrademarks or trademarks of EMC Corporation in the United States and other countries. All other trademarks used
herein are the property of their respective owners. Copyright 2009-2011EMC Corporation. All rights reserved.Published in the USA.
8/11/2019 Dd Guide Emc
3/288
Contents 1
nts
Module 0: Course Introduction 9Module Objectives 10Lesson 1: Course Introduction 11
Covered Skills 12Course Objectives 13Course Objectives (Continued) 14Course Content 15Course Content (Continued) 17Daily Agenda 18Guides, Introductions, and Orientation 19
Lesson 2: VDC 20VDC Introduction 21Access VDC 22Lab 0.1: Access the VDC 23
Module 1: Deduplication 25Module Introduction 25Module Objectives 26Deduplication Simplified Definition 27Inline Vs. Post-Process Deduplication 28
Inline Deduplication 28Inline Deduplication Process 29Post Processing Deduplication 29Post-Process Deduplication Process 29
File Based Deduplication 30Fixed Segment Deduplication 31Variable Segment Size Deduplication 32Module Review 33
Module 2: Data Domain Operating Environment 35Module Introduction 35Lesson 1: Data Domain Deduplication 36
How Deduplication Works 37Lesson 2: SISL 39
SISL Definition 40Deduplication 41Deduplication (Continued) 42
Lesson 3: DIA 43Definition 44DIA End-to-End Verification 45DIA Fault Avoidance and Containment 46DIA Continuous Fault Detection and Healing 47DIA File System Recovery 48
http://-/?-http://-/?-http://-/?-http://-/?-8/11/2019 Dd Guide Emc
4/288
EMC Data Domain System Administration Course Student Guide
Lesson 4: File Systems 49Administration File System 50Storage File System 51Storage File System (Continued) 52Storage File System (Continued) 53
Lesson 5: Data Domain Data Paths 54Data Domain System in Typical Backup Environments 55Data Path over Ethernet 56Data Path over Fibre Channel VTL 57
Lesson 6: Administration Interfaces 58Access Enterprise Manager 59Enterprise Manager Main Screen 60Enterprise Manager Tabs 61CLI 62CLI (Continued) 63
Module Review 64Module Review (Continued) 65Module Review (Continued) 66
Module 3: Initial Configuration and Backup 67Module Introduction 67Module Objectives 68Lesson 1: Verify Initial Configuration 69
Launch Enterprise Manager 70Launch Configuration Wizard 71Lab 3.1: Initial Configuration 72
Lesson 2: Manage System Access 73User Classes 74Manage Administration Access Protocols 76
Create a User 77Lesson 3: Configure CIFS/NFS 79
Configure a CIFS share 80Configure an NFS Export 81
Lesson 4: Verify Hardware 83Model Number, System Uptime, Serial Number 84Storage (Disk) Status 85Disk Overview 86Active Tier 87Locate a Disk 88View Usable Disks 89View Failed, Foreign, or Absent Disks 90View Chassis Status 91Lab 3.2: Copy Data to a Data Domain System 93
Module Review 94
Module 4: Manage Network Interfaces 95Module Introduction and Objectives 95
http://-/?-http://-/?-8/11/2019 Dd Guide Emc
5/288
Contents 3
Lesson 1: Interfaces, Settings, & Routes 96Manage Network Routes 97Create Static Routes 99
Lesson 2: Link Aggregation 101Definition 101Requirements 102Create a Virtual Interface for Link Aggregation 103
Lesson 3: Link Failover 106Specifications 106Manage Link Failover 108Manage Link Failover (Continued) 109
Lesson 4: Manage VLAN and IP Alias Network Interfaces 110Introduction and Objectives 110Define VLAN and IP Alias Network Interfaces 111Create VLAN and IP Aliases 112Create VLAN and IP Aliases (Continued) 113Create VLAN and IP Aliases (Continued) 115
Module Review 117Module Review (Continued) 118Module Review (Continued) 119
Module 5: Manage a VTL 121Module Introduction and Objectives 121VTL Overview 122Configuration Terms 124VTL Planning 125Capacity Planning 126Create Tapes 127VTL Barcode Definition 128
Configure VTL Barcode 129Configure VTL Barcode (Continued) 130Configure VTL Barcode (Continued) 131Module Review 132
Module 6: Manage Data 133Module Introduction and Objectives 133Lesson 1: Snapshots 134
Manage Snapshots 136Lab 6.1 Configure Snapshot 137
Lesson 2: Fastcopy 138
Perform Fastcopy 139Lab 6.2: Perform Fastcopy 140Lesson 3: Retention Lock 141
Retention Lock (Continued) 142Retention Lock (Continued) 143Configure Retention Lock 144
Lesson 3: Sanitization 145
8/11/2019 Dd Guide Emc
6/288
EMC Data Domain System Administration Course Student Guide
Lab 6.3: Configure Sanitization 147Lesson 4: Encryption of Data at Rest 148
Passphrase and Encryption Key 148File System Locking 149Encryption Flow 150Configure Encryption 151Apply Encryption Changes 152Deactivate Encryption 153Lab 6.4 Configure Encryption 154
Lesson 5: File System Cleaning 155Cleaning 156Lab 6.5: Configure File-System Cleaning 158
Lesson 6: Monitor File-System Space Usage 159File System Summary Tab 160Space Usage 161
Space Usage Terms 161Space Consumption Tab 163
Space Consumption Terms 163Daily Written Tab 164
Daily Written Tab Terms 164Module Review 165Module Review (Continued) 166
Module 7: Manage Data Replication and Recovery 167Module Introduction and Objectives 167Lesson 1: Data Replication 168
Lesson Objectives 169Data Replication Overview 170Data Domain Replication Types 171
Collection Replication 172Directory Replication 173Pool Replication 174Replication Context 175Replication Context Streams 176Replication Topologies 177Configure General Replication 179Configured Advanced Replication 180Replication Seeding 181Low Bandwidth Optimization Benefits 183Low Bandwidth Optimization Using Delta Compression 184Encryption Over Wire 186Lab 7.1: Replication 187
Lesson 2: Recover Data 188Recover Replication-Pair Data 189Why Resynchronize Recovered Data? 190Resynchronization Process 191
8/11/2019 Dd Guide Emc
7/288
Contents 5
Manage Throttle Settings 192Module Review 194Module Review (Continued) 195
Module 8: Manage DD Boost 197Module Introduction and Objectives 197DD Boost Overview 198
DD Boost Overview (Continued) 199DD Boost Flow 200Replica Awareness Flow 202DD Boost Replication Awareness Advantages 203Deduplication With Distributed Segment Processing 205NetWorker Data Zone Architecture 207NetWorker Server Architecture 209Networker Work Flow 210Interface Groups 211Firewall Ports 212Download DD Boost Plug-In Software 213
Configure DD Boost 214Configure DD Boost (Continued) 215Lab 8.1: DD Boost 216Module Review 217
Module 9: Plan Capacity and Throughput, Monitor Throughput 219Module Introduction and Objective 219Lesson 1: Plan Capacity 220
Collect Information 221Collect Information (Continued) 222Determine Capacity Needs 223
Compression Requirements with Variables 224Compression Requirements with Variables (Continued) 225Calculate Required Capacity 226Capacity Requirements Calculation (Page 1 of 2) 227Capacity Requirements Calculation (Page 2 of 2) 228Calculate Required Throughput 229System Model Capacity and Performance 230Select Model 231Calculate Capacity Buffer for Selected Models 232Match Required Capacity to Model Specifications 233Calculate Performance Buffer for Selected Models 234
Match Required Capacity to Model Specifications 235Lesson 2: Throughput Tuning 236Throughput Bottlenecks 237Performance Metrics 238Tuning Solutions 239Monitor Throughput 240
Module Review 241
http://08.boost.pdf/http://08.boost.pdf/http://08.boost.pdf/http://08.boost.pdf/http://08.boost.pdf/http://08.boost.pdf/http://08.boost.pdf/http://08.boost.pdf/http://08.boost.pdf/http://08.boost.pdf/http://08.boost.pdf/http://08.boost.pdf/http://08.boost.pdf/http://08.boost.pdf/http://08.boost.pdf/http://08.boost.pdf/http://08.boost.pdf/http://08.boost.pdf/http://08.boost.pdf/http://08.boost.pdf/http://08.boost.pdf/http://08.boost.pdf/http://08.boost.pdf/http://08.boost.pdf/http://08.boost.pdf/http://08.boost.pdf/http://08.boost.pdf/http://08.boost.pdf/http://08.boost.pdf/http://08.boost.pdf/http://08.boost.pdf/http://08.boost.pdf/http://08.boost.pdf/http://08.boost.pdf/http://08.boost.pdf/http://08.boost.pdf/8/11/2019 Dd Guide Emc
8/288
EMC Data Domain System Administration Course Student Guide
Module 10: Monitor a Data Domain System 243Module Introduction 243Module Objectives 244Lesson 1: Monitor a Data Domain System Using SNMP 245
SNMP Flow 246Download and Configure MIB File 247Lab 10.1: Monitor Using SNMP 248
Lesson 2: Syslog (Remote Logging) 249Configure Remote Logging 250Lab 10.2: Monitor Using Syslog 251
Lesson 3: Log Files 252ddvar log files 253Log File Types 254Lab 10.3: Manage Log Files 255
Lesson 4: Support Bundles 256Generate Support Bundles 257
Lesson 5: Autosupport 258Autosupport System 259Autosupport Types 260Autosupport Via Enterprise Manager 261Autosupport Reports 262Autosupport Reports (Continued) 263Autosupport Reports (Continued) 264Detailed Autosupport Report Contents 265Daily Summary Autosupport 266Alerts 267Alerts (Continued) 268Alerts (Continued) 269Alert Message Types 270Alerts Notification 271Find Autosupport Information 272Find System Autosupports 273Autosupport Device Symbols and Display Options 274View Space Plot, Autosupports, and Support Cases 275Lab 10.4: Autosupport 276
Module Review 277Module Review (Continued) 278
Module 11: Upgrade a Data Domain System 279Module Introduction and Objective 279
Download Software 280System Upgrade 281
Appendix A: Licenses 283
Appendix B: Further Reading 285Access System Documentation 285
8/11/2019 Dd Guide Emc
9/288
Contents 7
Access Integration Documentation 285Access Part Replacement Documentation 286
8/11/2019 Dd Guide Emc
10/288
EMC Data Domain System Administration Course Student Guide
8/11/2019 Dd Guide Emc
11/288
EMC Data Domain System Administration Course Student Guide 9
Module 0: Course Introduction
The Data Domain System Administration course provides you with the knowledge and skills you needto maintain Data Domain systems. This course includes:
Lecture
Demonstrations
Hands-on lab exercises (see lab guide)
Reviews
Pointers to Data Domain system documentation
8/11/2019 Dd Guide Emc
12/288
10 Module 00: Course Introduction
Module Objectives
After completing this module, you should be able to:
Describe this course
Access the EMC Virtual Data Center (VDC)
8/11/2019 Dd Guide Emc
13/288
EMC Data Domain System Administration Course Student Guide 11
Lesson 1: Course Introduction
After completing lesson 1, you should be able to:
Describe the objectives for this course
Describe the course content
Describe the daily agenda
Identify the other students
Identify your course materials
8/11/2019 Dd Guide Emc
14/288
12 Module 00: Course Introduction
Covered Skills
This course focuses on Data Domain system:
Concepts
Basic configuration
System monitoring
Other courses in the Data Domain curriculum cover:
Design
Installation
3rd-party application integration
Troubleshooting
Parts replacement
8/11/2019 Dd Guide Emc
15/288
EMC Data Domain System Administration Course Student Guide 13
Course Objectives
8/11/2019 Dd Guide Emc
16/288
14 Module 00: Course Introduction
Course Objectives (Continued)
8/11/2019 Dd Guide Emc
17/288
EMC Data Domain System Administration Course Student Guide 15
Course Content
This course contains 11 modules. Each module contains lecture and review. Some modules contain labs.
Module 0 (this module) is the course introduction. It:
Gives a course overview.
Introduces course materials
Provides instructions to access the VDC.
Module 1 covers deduplication (not Data Domain specific)
Module 2 gives a product overview. It includes an overview of:
The Data Domain operating system
The Data Domain file system
Data Domain data paths
Module 3 covers how to perform the initial setup of a Data Domain system and how to do a file-systembased backup.
8/11/2019 Dd Guide Emc
18/288
16 Module 00: Course Introduction
Module 4 covers how to manage a Data Domain system network.
Module 5 covers how to configure a VTL.
Module 6 covers how to manage data.
8/11/2019 Dd Guide Emc
19/288
EMC Data Domain System Administration Course Student Guide 17
Course Content (Continued)
Module 7 covers how to perform data replication and recovery.
Module 8 covers DD Boost
Module 9 covers planning for capacity
Module 10 covers monitoring a Data Domain system
Module 11 covers upgrading the Data Domain operating system
Appendix A lists Data Domain software licenses
Appendix B tells you how to find Data Domain documentation
8/11/2019 Dd Guide Emc
20/288
18 Module 00: Course Introduction
Daily Agenda
This is a typical agenda. Your instructor may speak with you about variances.
8/11/2019 Dd Guide Emc
21/288
EMC Data Domain System Administration Course Student Guide 19
Guides, Introductions, and Orientation
Use your student guide to follow the lecture and take notes.
Use your lab guide for step-by-step instructions on the labs.
8/11/2019 Dd Guide Emc
22/288
20 Module 00: Course Introduction
Lesson 2: VDC
EMC2 Education Services provides a virtual data center (VDC) for you to use during labs. The VDC gives youaccess to Data Domain systems.
8/11/2019 Dd Guide Emc
23/288
EMC Data Domain System Administration Course Student Guide 21
VDC Introduction
The VDC provides Microsoft Windows and Linux virtual machines (VMs).
8/11/2019 Dd Guide Emc
24/288
22 Module 00: Course Introduction
Access VDC
Your instructor will give you a user name and password to access the VDC.
8/11/2019 Dd Guide Emc
25/288
EMC Data Domain System Administration Course Student Guide 23
Lab 0.1: Access the VDC
Once your instructor gives you your user name, password and lab introduction, locate your lab guide andfollow the step-by-step instructions to complete this lab.
8/11/2019 Dd Guide Emc
26/288
24 Module 00: Course Introduction
8/11/2019 Dd Guide Emc
27/288
8/11/2019 Dd Guide Emc
28/288
8/11/2019 Dd Guide Emc
29/288
EMC Data Domain System Administration Course Student Guide 27
Deduplication Simplified Definition
Deduplication eliminates redundant data because it stores only one instance of data. For example andonly an example, this isnt a precise definition the sentence Mary had a little lamb gets stored asMary hd lite mb. No second instances of letters get stored.
Deduplication recognizes and deletes common elements in data. It stores only one copy of the duplicateddata. It looks at each segment of an incoming data stream to determine if it needs to be stored or if it canbe replaced by a smaller reference to a segment that is already on the disk.
8/11/2019 Dd Guide Emc
30/288
28 Module 1: Deduplication
Inline Vs. Post-Process Deduplication
Inline DeduplicationIt is simpler to use inline deduplication. Data is filtered before its stored to disk, so its like a regular stor-age system (it just writes and reads data). Theres no separate administration involved (managing multiplepools some with deduplication, some with regular storage or managing the conditions betweenthem).
Incoming data is examined as soon as it arrives to determine if the segment is new or unique or a dupli-cate of a segment previously stored.
Inline deduplication occurs in RAM before the data is written to disk. Around ninety-nine percent of datasegments are analyzed in RAM without disk access. A very small amount of data is not identified immedi-ately as either unique or redundant. That data is stored to disk and examined again later against thealready stored data.
Because deduplication is done with limited disk access, the speed of inline deduplication is not limited bydisk seek times. Stream speed is as fast as other virtual tape library products that do not have deduplica-tion.
8/11/2019 Dd Guide Emc
31/288
EMC Data Domain System Administration Course Student Guide 29
Inline Deduplication Process
1. Inbound segments are analyzed in RAM.
2. If a segment is redundant, a reference to the stored duplicate segment is created.
3. If a segment is unique, it is compressed and stored.
4. If a segment cannot be identified as unique or redundant, the segment is stored and re-examinedlater.
Post Processing Deduplication
Requires disk space to initially capture the data.
Requires more disk space to store multiple pools of data.
Requires more disks for speed when the deduplication approach is spindle bound.
Post-Process Deduplication Process
1. Data is first buffered to a large cache.
2. Deduplication is then run as a separate processing task this could lengthen the time needed to fullycomplete the backup.
3. After the data is stored, its read back internally, deduplicated, and written again to a different area.
8/11/2019 Dd Guide Emc
32/288
30 Module 1: Deduplication
File Based Deduplication
With file-based deduplication, if 2 files are exactly alike, 1 file is stored and future interations of the file arepointed to the original file.
File-based deduplication doesnt segment data like a Data Domain system, nor does it chunk data like anAvamar system. It certain situations it can be efficient. However, it often doesnt result in as large a datareduction as other deuplication methods.
8/11/2019 Dd Guide Emc
33/288
EMC Data Domain System Administration Course Student Guide 31
Fixed Segment Deduplication
With fixed-segment deduplication, if you add a segment, the entire data stream moves.
8/11/2019 Dd Guide Emc
34/288
32 Module 1: Deduplication
Variable Segment Size Deduplication
Sub-file (segment) deduplication:
Analyses data backup streams
Breaks file into smaller fixed or variable sized segments. Smaller segments make it easier for DataDomain systems to find duplicates.
Is good for backup data stores
Compares backup data against existing data segments
Is commonly used as a quick fix for backup problems
Is more efficient than file based deduplication
Variable segment sized deduplication if better than fixed-segment size deduplication because you canadd data to a variable segment and it doesnt move a data stream.
If you add data to a fixed segment, the entire data stream moves.
8/11/2019 Dd Guide Emc
35/288
EMC Data Domain System Administration Course Student Guide 33
Module Review
8/11/2019 Dd Guide Emc
36/288
34 Module 1: Deduplication
8/11/2019 Dd Guide Emc
37/288
EMC Data Domain System Administration Course Student Guide 35
Module 2: Data Domain Operating Environment
Module Introduction
This module introduces you to the Data Domain system. It reviews concepts that you learned about in theEMC Data Domain Systems and Technology Introduction (eLearning) course.
This module includes 6 lessons:
1. Data Domain Deduplication
2. SISL
3. DIA
4. File Systems
5. Data Domain Data Paths
6. Administration Interfaces
8/11/2019 Dd Guide Emc
38/288
36 Module 2: Data Domain Operating Environment
Lesson 1: Data Domain Deduplication
Data Domain systems are disk-based deduplication appliances. In this lesson you will learn more aboutdeduplication.
8/11/2019 Dd Guide Emc
39/288
EMC Data Domain System Administration Course Student Guide 37
How Deduplication Works
The end result of identifying unique data segments and compressing the unique data before storage is asignificant reduction in the size of the data stored on disk. Because of the size reductions, data can beretained on disk on site. The reduced data size also makes WAN vaulting possible because of up to 99%bandwidth reduction.
Data Domain global compression technology reduces the data footprint by applying a combination ofdeduplication and local compression.
Deduplication works by breaking the data into segments and then identifying the unique segments. Localcompression is performed on the unique segments using standard compression algorithms before the
unique data is written to disk.For example, in the illustration of the first full backup, two segments labeled B are the same, so segmentsA, B, C, and D are stored with a reference to B instead of storing a second copy.
The compression factor at this point is the ratio of the size of the original 5 segments received (A+B+C+Bagain+D) to the size of the 4 segments (A+B+C+D) stored on disk. Usual data reduction for a first full backupis 3-4x.
8/11/2019 Dd Guide Emc
40/288
38 Module 2: Data Domain Operating Environment
The next backup in the illustration is incremental. The backup includes copies of A and B as well as a newsegment E. Only the new segment E is stored. A and B are stored as references to the previously storedsegments. The compression factor of this backup is quite good since it is the ratio of the 3 receivedsegments (A+B+E) to the single stored segment E. Usual data reduction for a file level incremental is 6-7x.
The second full backup is when the reductions start to become very large. A,B,C,D and E are recognized asduplicates from the previous two backups, and only the new segment F gets stored. The compression factorof this second full backup is very high, with 6 segments coming in but only the one new segment gettingstored. Usual data reduction for the second full backup is 50-60x.
The compression factor over all three backups is the ratio of all 14 segments coming from the backupsoftware to be stored to the 6 segments that get stored to represent all the data received over time.
Deduplication is the process of recognizing common elements in the many versions and copies of data andeliminating the redundant copies of those common elements.
With deduplication only one copy of duplicated data is stored.
Because deduplication is performed with limited disk access, the speed of in line deduplication is notlimited by disk seek times. Stream speed of Data Domain systems is as fast as other virtual tape libraryproducts that do not have deduplication. The process is shown as follows:
Inbound data is analyzed in RAM.
If data is redundant, a reference to the stored duplicate data is created.
If data is unique, it is compressed and stored.
If data cannot be identified as unique or redundant, the data is stored and re-examined later.
For IT administrators, deduplication means there are fewer and smaller storage systems to manage, smallerdata centers to run, fewer tapes to handle, fewer tape pickups, smaller network pipes, and cheaper WANlinks.
8/11/2019 Dd Guide Emc
41/288
EMC Data Domain System Administration Course Student Guide 39
Lesson 2: SISL
8/11/2019 Dd Guide Emc
42/288
40 Module 2: Data Domain Operating Environment
SISL Definition
8/11/2019 Dd Guide Emc
43/288
EMC Data Domain System Administration Course Student Guide 41
Deduplication
The Data Domain system:
1. Segments
2. Fingerprints
3. Filters
4. Compresses
5. Writes data to containers, containers written to disk
8/11/2019 Dd Guide Emc
44/288
42 Module 2: Data Domain Operating Environment
Deduplication (Continued)
The Data Domain system:
1. Segments
2. Fingerprints
3. Filters
4. Compresses
5. Writes data to container, container written to disk
8/11/2019 Dd Guide Emc
45/288
EMC Data Domain System Administration Course Student Guide 43
Lesson 3: DIA
8/11/2019 Dd Guide Emc
46/288
44 Module 2: Data Domain Operating Environment
Definition
8/11/2019 Dd Guide Emc
47/288
EMC Data Domain System Administration Course Student Guide 45
DIA End-to-End Verification
The flow for continuous fault detection and healing is:
1. The Data Domain system periodically rechecks the integrity of the RAID stripes and container logs.
2. The Data Domain system uses the redundancy of the RAID system to heal any faults.
3. During every read, data integrity is re-verified.
4. Errors are healed as they are encountered.
8/11/2019 Dd Guide Emc
48/288
46 Module 2: Data Domain Operating Environment
DIA Fault Avoidance and Containment
The following is true for fault avoidance and containment:
New data never puts old data at risk
Container log never overwrites or updates existing data
New data written in new containers
The old containers and references remain in place and safe even in the face of software bugs or hard-ware faults that may occur when storing new backups
New data never overrides good data
Fewer complex data structures
NVRAM for fast restarts
No partial stripe writes
8/11/2019 Dd Guide Emc
49/288
EMC Data Domain System Administration Course Student Guide 47
DIA Continuous Fault Detection and Healing
Here is the flow for continuous fault detection and healing:
1. The Data Domain system periodically rechecks the integrity of the RAID stripes and container logs
2. Uses the redundancy of RAID system to heal any faults
3. During every read, data integrity is re-verified
4. Any errors are healed as they are encountered
8/11/2019 Dd Guide Emc
50/288
48 Module 2: Data Domain Operating Environment
DIA File System Recovery
Here is the flow for file system recoverability:
1. Data is written in a self describing format
2. The file system can be recreated by scanning the logs and rebuilding it from meta data stored with thedata
8/11/2019 Dd Guide Emc
51/288
EMC Data Domain System Administration Course Student Guide 49
Lesson 4: File Systems
8/11/2019 Dd Guide Emc
52/288
50 Module 2: Data Domain Operating Environment
Administration File System
The Data Domain system administrative file system is called ddvar:
The NFS directory is /ddvar
The CIFS directory is \ddvar
This file system stores system core and log files.
You cannot rename or delete this file system. Nor can you access all of its sub-directories, for example,the core sub-directory.
Data streams for this file system change according to the Data Domain OS version and hardware model.Check the Data Domain support portal for more information on data streams for each OS and hardwaremodel.
8/11/2019 Dd Guide Emc
53/288
EMC Data Domain System Administration Course Student Guide 51
Storage File System
/data/col1/ is the parent directory path under which all user data is retained.
MTrees provide granular data management so that you can manage and report on different data types ordata from different sources separately.
For example, you can configure compression separately on different types of data in separate Mtrees.
Note: You cant replicate under Mtrees.
8/11/2019 Dd Guide Emc
54/288
52 Module 2: Data Domain Operating Environment
Storage File System (Continued)
8/11/2019 Dd Guide Emc
55/288
EMC Data Domain System Administration Course Student Guide 53
Storage File System (Continued)
You can add up to 14 MTrees /data/col1 to keep data separate. You can add subdirectories to MTreedirectories.
You cannot add anything to the /data directory. You can only change to the col1 subdirectory.
Subdirectories can be added under /data/col1/backup.
The backup MTree (/data/col1/backup) cannot be deleted or renamed.
If MTrees are added, they can be renamed and deleted.
You can replicate under /backup
Note: This slide shows the Data Domain system view, not the client view. The client view would not show/data/col1.
8/11/2019 Dd Guide Emc
56/288
54 Module 2: Data Domain Operating Environment
Lesson 5: Data Domain Data Paths
8/11/2019 Dd Guide Emc
57/288
EMC Data Domain System Administration Course Student Guide 55
Data Domain System in Typical Backup Environments
Data Domain systems connect to backup servers as storage capacity to hold large collections of backupdata.
A Data Domain system integrates into typical backup environments non-intrusively.
Often the Data Domain system is connected directly to the backup server.
The backup data flow is redirected from the clients to the Data Domain device instead of to tape.
If tape needs to be made for long term archival retention, data flows from the Data Domain device back tothe server and then to tape, completing the same flow that the backup server was doing initially.
Tapes come out in the same standard backup software formats as before and can go off site for long termretention.
If a tape must be retrieved, it goes back into the tape library and the data flows back through the backupsoftware to the client that needs it.
8/11/2019 Dd Guide Emc
58/288
56 Module 2: Data Domain Operating Environment
Data Path over Ethernet
Backup and archive media servers send data from clients to Data Domain systems on the network. A directconnection between a dedicated port on the backup or archive server, and you can also use a dedicatedport on the Data Domain system.
The connection between the backup or archive server and the Data Domain system can be Ethernet orFibre Channel, or both if needed. This slide shows the Ethernet connection.
Data is written to the backup file system on a Data Domain system.
When Data Domain replicator is licensed on two Data Domain systems, replication is enabled between thetwo systems. The Data Domain systems can be either local for local retention or remote, for disaster recov-
ery. Data in flight over the WAN can be secured using VPN.
Physical separation of the replication traffic from backup traffic can be achieved by using two separateEthernet interfaces on the Data Domain system. This allows backups and replication to run simultaneouslywithout network conflicts.
Since the Data Domain OS is based on Linux, it needs additional software to work with CIFS. Samba soft-ware enables CIFS to work with the Data Domain OS.
8/11/2019 Dd Guide Emc
59/288
8/11/2019 Dd Guide Emc
60/288
58 Module 2: Data Domain Operating Environment
Lesson 6: Administration Interfaces
8/11/2019 Dd Guide Emc
61/288
EMC Data Domain System Administration Course Student Guide 59
Access Enterprise Manager
With the Enterprise Manager, you can manage 1 or more Data Domain systems.
You can access the Enterprise Manager with many browsers, for example:
Internet Explorer
Chrome
Firefox
To login:
1. In a browser enter the address
2. Enter your user name and password
3. Enter your system IP address
8/11/2019 Dd Guide Emc
62/288
60 Module 2: Data Domain Operating Environment
Enterprise Manager Main Screen
8/11/2019 Dd Guide Emc
63/288
EMC Data Domain System Administration Course Student Guide 61
Enterprise Manager Tabs
8/11/2019 Dd Guide Emc
64/288
62 Module 2: Data Domain Operating Environment
CLI
There are 4 ways to log into the CLI:
1. SSH (PuTTY)
2. Serial console
3. Telnet (default is not enabled)
4. Keyboard and monitor (KVM)
Initial login information:
login: sysadminpassword: serial number on Data Domain model (box).
8/11/2019 Dd Guide Emc
65/288
EMC Data Domain System Administration Course Student Guide 63
CLI (Continued)
You can do everything in the CLI that you can do from the Enterprise Manager.
You enter commands with options, for example:
#command argument options
#filesys show space
#user show list
#user add Bob
#help admin access#help show
8/11/2019 Dd Guide Emc
66/288
64 Module 2: Data Domain Operating Environment
Module Review
8/11/2019 Dd Guide Emc
67/288
8/11/2019 Dd Guide Emc
68/288
66 Module 2: Data Domain Operating Environment
Module Review (Continued)
8/11/2019 Dd Guide Emc
69/288
EMC Data Domain System Administration Course Student Guide 67
Module 3: Initial Configuration and Backup
Module Introduction
8/11/2019 Dd Guide Emc
70/288
68 Module 3: Configuration and Backup
Module Objectives
After completing after completing this module, you should be able to:
Verify and perform an initial configuration
Manage system access
Configure CIFS/NFS
Verify hardware
Copy data to a Data Domain system
8/11/2019 Dd Guide Emc
71/288
EMC Data Domain System Administration Course Student Guide 69
Lesson 1: Verify Initial Configuration
Your environment for this course assumes that your hardware installation is complete and your networkconnections are established. In this lesson you will learn how to verify or configure:
Licenses
Network settings
System settings
Protocols
After you complete this lesson, you should be able to use the Enterprise Manager to perform an initial
setup of the following:
Licenses
Network and system settings
Protocols: CIFS, NFS, DD Boost (to be expanded in the DD Boost module). Currently, you cannot com-plete the configuration for the VTL protocol in the VDC.
8/11/2019 Dd Guide Emc
72/288
70 Module 3: Configuration and Backup
Launch Enterprise Manager
To perform an initial configuration from the Enterprise Manager, do the following:
1. Open the Enterprise Manager from an Internet Explorer browser, for example:
http://dddev-01/ddem
2. Enter your assigned Username and Password.
1. Double-click on Login.
8/11/2019 Dd Guide Emc
73/288
EMC Data Domain System Administration Course Student Guide 71
Launch Configuration Wizard
To launch the Configuration Wizard:
1. From the Enterprise Manager, Click on Maintenance.
2. Click on the More Tasks pull-down menu.
3. Double-Click on Launch Configuration Wizard...
4. Follow the Configuration Wizard prompts.
You must follow the configuration prompts. You cant select an item to configure from the left-hand naviga-tion pane. You will be prompted to submit your configuration changes as you move through the wizard.
You can also quit the wizard during your configuration.
The CLI command is config setup.
8/11/2019 Dd Guide Emc
74/288
72 Module 3: Configuration and Backup
Lab 3.1: Initial Configuration
8/11/2019 Dd Guide Emc
75/288
EMC Data Domain System Administration Course Student Guide 73
Lesson 2: Manage System Access
In a Data Domain system there are 2 user privilege types: admin and user. In this lesson, youll learn howto manage both.
8/11/2019 Dd Guide Emc
76/288
74 Module 3: Configuration and Backup
User Classes
You may have to mange access for administrators and users on a Data Domain system. A Data Domain sys-tem supports 3 classes of access:
1. Sysadmin (default account) :
Default administrative account.
Cant be deleted.
Creates1st security officer
Has access to all GUI and CLI configuration, management, and monitoring commands.
Can view all users. Can change the sysadmin password, but cant delete the account.
Can enable/disable users with admin or user privileges, except sysadmin user.
sysadmin is domain admin by defaul when you integrate with Active Directory
2. Local user (user) :
Has access to GUI and CLI monitoring commands.
8/11/2019 Dd Guide Emc
77/288
EMC Data Domain System Administration Course Student Guide 75
Can view only their own account.
Cant disable sysadmin.
Cant make changes to the configuration.
3. Security officer (user) :
Can enable, disable, modify, and delete other security officers.
Can view all users.
8/11/2019 Dd Guide Emc
78/288
76 Module 3: Configuration and Backup
Manage Administration Access Protocols
Use the Access Management page to configure and manage access protocols:
Telnet access
FTP access
HTTP/HTTPS access
SSH access
8/11/2019 Dd Guide Emc
79/288
EMC Data Domain System Administration Course Student Guide 77
Create a User
To create new users, follow these steps:
1. In the Navigational pane, expand the DD Network and select a system.
2. Click the System Settings > Access Management> Local Users tabs. The Local Users view appears.
3. Click the Create button to create a new user. The Create User dialog box appears.
4. Enter the following information in the General Tab:
Item Description
User The user ID or name
Password The user password. Set a default password, and the user can change it later.
Verify Password The user password, again
Privilege The privilege of the user: admin, security, or user
8/11/2019 Dd Guide Emc
80/288
78 Module 3: Configuration and Backup
The default value for the minimum length of a password or minimum number of characterclasses required for a user password is 1. Allowable character classes include:
Lowercase letters (a-z)
Uppercase letters (A-Z)
Numbers (0-9) Special Characters ($, %, #, +, and so on)
The available privileges display based on users privilege. Only the Sysadmin user can create the firstsecurity officer. After the first security officer is created, only security officers can create or modify othersecurity officers. Sysadmin is the default admin user and cannot be deleted or modified.
5. Enter the following information in the Advanced Tab:
6. Click OK.
The default password policy can change if the admin user changes them from the Modify Password Policytask. The default values are the initial default password policy values.
Item Description
Minimum Days Between Change The minimum number of days between password changes thatyou allow a user. Default is 0.
Maximum Days Between Change The maximum number of days between password changes thatyou allow a user. Default is 99999.
Warn Days Before Expire The number of days to warn the users before their passwordexpires. Default is 7.
Disable Days After Expire The number of days after a password expires todisable the user account. Default is Never.
Disable account on the followingdate
Check this box and enter a date ( mm/ dd/ yyyy) on which you wantto disable this account. Also, you can click on the calendar to select
a date.
8/11/2019 Dd Guide Emc
81/288
EMC Data Domain System Administration Course Student Guide 79
Lesson 3: Configure CIFS/NFS
8/11/2019 Dd Guide Emc
82/288
80 Module 3: Configuration and Backup
Configure a CIFS share
To configure a CIFS share, you must:
1. Configure the workgroup mode
2. Configure the Active Directory mode
3. Give a descriptive name for the share
4. Enter the path to the target directory (for example, /data/col1/mtree1)
8/11/2019 Dd Guide Emc
83/288
EMC Data Domain System Administration Course Student Guide 81
Configure an NFS Export
To configure an NFS export, do the following:
1. Enter a path name for the export
2. In the Clients area, select an existing client or click the + icon to create a client
The Clients dialog box appears.
a. Enter a server name in the text box.
Enter fully qualified domain names, host names, or IP addresses. A single asterisk (*) as a wild cardindicates that all backup servers are to be used as clients.
Clients given access to the /data/col1/backup directory have access to the entire directory. A clientgiven access to a subdirectory of /data/col1/backup has access only to that subdirectory.
A client can be a fully-qualified domain host name, class-C IP addresses, IP addresses with eithernetmasks or length, an NIS netgroup name with the prefix @, or an asterisk (*) wildcard with adomain name, such as *.yourcompany.com .
A client added to a subdirectory under /data/col/backup has access only to that subdirectory.
Enter an asterisk (*) as the client list to give access to all clients on the network.
8/11/2019 Dd Guide Emc
84/288
82 Module 3: Configuration and Backup
b. Select the check boxes of the NFS options for the client.
- Read-only permission.
- (Default) Requires that requests originate on a port that is less than IPPORT_RESERVED (1024).
- Map requests from UID or GID 0 to the anonymous UID or GID.
- Map all user requests to the anonymous uid or gid.- Use default anonymous UID or GID.
8/11/2019 Dd Guide Emc
85/288
EMC Data Domain System Administration Course Student Guide 83
Lesson 4: Verify Hardware
As part of your Data Domain initial setup, you should verify that your hardware is correctly installed andrunning. This lesson teaches you how to do that.
The CLI command is system show status.
8/11/2019 Dd Guide Emc
86/288
84 Module 3: Configuration and Backup
Model Number, System Uptime, Serial Number
To verify your model number, system uptime, and serial number in the Enterprise Manager:
1. Select a system from the left-hand navigation pane.
2. Click the Maintenance tab.
3. Verify the information.
The CLI commands are:
1. system show status
2. system show config
3. system disk show
8/11/2019 Dd Guide Emc
87/288
EMC Data Domain System Administration Course Student Guide 85
Storage (Disk) Status
To verify your storage status in the Enterprise Manager:
1. Click the Hardware tab
2. View the Storage Status
If the Status indicator Storage operational is green, all disks are good. If the Status indicator Stor-age operational is yellow, the system is working, but there is a problem. I the Status indicator Stor-age operational is red, the system isnt operational.
8/11/2019 Dd Guide Emc
88/288
86 Module 3: Configuration and Backup
Disk Overview
To get an overview of your storage (disk) status in the Enterprise Manager:
1. Select a system from the left-had navigation pane.
2. Click the Hardware tab.
3. Click Storage.
From here you can view the Active Tier, Usable Disks, and Failed\Foreign\Absent Disks.
8/11/2019 Dd Guide Emc
89/288
EMC Data Domain System Administration Course Student Guide 87
Active Tier
Disks in the Active Tier are currently marked as usable by the Data Domain file system. Sections are orga-nized by Disks in Use and Disks Not in Use. If the optional archive feature is installed From the Storage Sta-tus Overview pane, you can expand your view of the disk use in the Active Tier. You can view for both DisksIn Use and Disks Not In Use:
Disk Group: here it is dg0
Status. Here it is 1 Normal.
Disk Reconstructing
Total Disks Disks
You can also expand the Disks In Use view to view individual disks. Once you View Details, you can Beaconindividual disks.
The CLI command is storage show
8/11/2019 Dd Guide Emc
90/288
88 Module 3: Configuration and Backup
Locate a Disk
To locate a disk (for example, when a failed disk needs to be replaced):
1. Select the Data Domain system in the Navigational pane.
2. Click the Hardware > Storage > Disks tabs.
The Disks view appears.
3. Select a disk from the Disks table and click Beacon.
The Beaconing Disk dialog window appears, and the LED light on the disk begins flashing.
4. Click Stop to stop the LED beaconing.
8/11/2019 Dd Guide Emc
91/288
EMC Data Domain System Administration Course Student Guide 89
View Usable Disks
Usable disks are those that arent incorporated into the file system yet. To view details about usable disksfrom the Enterprise Manager:
1. Select a system from the left-hand navigation pane.
2. Click the Hardware tab.
3. View the status, which includes the disk:
Name
Status
Size
Manufacturer/Model
Firmware
Serial Number
You can also view the details of individual disks. The CLI command is disk show status.
8/11/2019 Dd Guide Emc
92/288
90 Module 3: Configuration and Backup
View Failed, Foreign, or Absent Disks
To get the status on Failed/Foreign/Absent Disks in the Enterprise Manager:
1. Select a system from the left-hand navigation pane.
2. Open the Failed/Foreign/Absent Disks panel.
3. View the following disk information:
Name
Status
Size
Manufacturer/Model
Firmware
Serial Number
4. You can also view the details of individual disks.
8/11/2019 Dd Guide Emc
93/288
EMC Data Domain System Administration Course Student Guide 91
View Chassis Status
To view your chassis status in the Enterprise Manager:
1. From the left-hand navigation pane, select a system.
2. Click the Hardware tab.
3. Click Chassis.
From here you can view the following by hovering your mouse over them:
NVRAM
PCI Slots
SAS
Power Supply
PS FAN
Riser Expansion
Temperature
8/11/2019 Dd Guide Emc
94/288
92 Module 3: Configuration and Backup
FANs
FRONT and BACK chassis views
The CLI command is system show status.
8/11/2019 Dd Guide Emc
95/288
EMC Data Domain System Administration Course Student Guide 93
Lab 3.2: Copy Data to a Data Domain System
8/11/2019 Dd Guide Emc
96/288
94 Module 3: Configuration and Backup
Module Review
8/11/2019 Dd Guide Emc
97/288
EMC Data Domain System Administration Course Student Guide 95
Module 4: Manage Network Interfaces
Module Introduction and Objectives
After completing this module, you should be able to:
Manage network interfaces, settings, and routes
Describe and use link aggregation.
Describe and use link failover.
Describe and use VLAN tagging.
Describe and use IP aliases.
8/11/2019 Dd Guide Emc
98/288
8/11/2019 Dd Guide Emc
99/288
8/11/2019 Dd Guide Emc
100/288
98 Module 4: Manage Network Interfaces
5. Click OK.
The system processes the information and returns you to the Routes tab.
8/11/2019 Dd Guide Emc
101/288
EMC Data Domain System Administration Course Student Guide 99
Create Static Routes
1. From the Navigational pane, select the Data Domain system to configure.
2. Click the Hardware > Network > Routes tabs.
3. Click Create in the Static Routes area
The Create Routes dialog box appears.
4. Select an interface to configure for the static route.
a. Click the check boxes for the interface(s) whose route you are configuring.
b. Click Next.
5. Specify the Destination. Select either of the following.
The Network Address and Netmask.
a. Click the Network radio button.
b. Enter destination information, by providing destination network address and netmask.
8/11/2019 Dd Guide Emc
102/288
100 Module 4: Manage Network Interfaces
Note: This is not the IP of any interface. The interface is selected in the initial dialog and it is usedfor routing traffic.
The Host Name or IP address of host destination.
a. Click the Host radio button.
b. Enter the Host Name or IP address of the destination host to use for the route.
6. Optionally, change the gateway for this route.
a. Click the check box, Specify different gateway for this route.
b. Enter a gateway address in the Gateway field.
7. Review changes, click Next.
The Create Routes > Summary page appears. The values listed reflect the new configuration.
8. Complete the action, click Finish.
Progress messages display. When changes are applied, the message indicates Completed. Click OK toclose the dialog.
The new route specification is listed in the Route Spec list.
8/11/2019 Dd Guide Emc
103/288
EMC Data Domain System Administration Course Student Guide 101
Lesson 2: Link Aggregation
DefinitionUsing multiple Ethernet network cables, ports, interfaces (links) in parallel, link aggregation increases net-work throughput, across a LAN or LANs until the maximum computer speed is reached. Data processingbecomes faster than when data is sent over individual links. For example, you can enable link aggregationon a virtual interface (veth1) to a physical interfaces (eth0a and eth0b) in the link aggregation control pro-tocol (LACP) mode and hash XOR-L2.
Link aggregation evenly splits network traffic across all links or ports in an aggregation group. It doesthis minimum with impact to the splitting, assembling, and reordering of out-of-order packets.
Aggregation is between 2 directly attached systems (point-to-point and physical or virtual). Normallythe aggregation is between the local system and the network device or system that is connected. Nor-mally a Data Domain system is connected to a switch or router.
Aggregation is handled between the IP layer (L3 and L4) and the mac layer (L2) network driver.
Link aggregation performance is impacted by the following:
8/11/2019 Dd Guide Emc
104/288
102 Module 4: Manage Network Interfaces
Switch speed: normally the switch can handle the speed of each link that is connected to it, but itmay lose some packets if all of the packets are coming from several ports that are concentrated onone uplink running at maximum speed. In most cases, this means that you can use only 1 switch forport aggregation coming out of a Data Domain system. Some network topologies allow for linkaggregation across multiple switches.
How much the Data Domain system can process
Out-of-order packets: a network program must put out-of-order packets back to the original order. Ifthe link aggregation mode allows the packets to be sent out-of-order, and the protocol requires thatthey be put back to the original order, the added overhead may impact the throughput speedenough so that the link aggregation mode that caused the out-of-order packets shouldnt be used.
Number of clients: in most cases, either the physical of OS resources cant drive data at multipleGbps. Also, due to hashing limits, youd need multiple clients to push data at multiple Gbps.
n Number of streams (connections) per client can significantly impact link utilization depending onthe hashing that you use.
A Data Domain system supports 2 aggregation methods:
1. Round robin
2. Balanced-xor (you set up manually on both sides)
Requirements
Links can only be part of 1 group.
Aggregation is between 2 systems.
All links in a group have the same speed.
All links in a group are half-duplex or full-duplex.
No changes to the network headers are allowed.
You must have a unique address across aggregation groups.
Frame distribution must be predictable and consistent.
8/11/2019 Dd Guide Emc
105/288
EMC Data Domain System Administration Course Student Guide 103
Create a Virtual Interface for Link Aggregation
To create a link aggregation virtual interface:
1. From the navigation pane, select a Data Domain system.
2. Click Hardware > Network > Interfaces.
3. Under the Interfaces tab, disable the physical interface where you want to add the virtual interface.
Select No from the Enabled pull-down menu.
4. From the Interface Type pull-down menu, select Virtual Interface.
The Create Virtual Interface dialog box appears.
5. Specify a virtual interface name in the veth text box.
Enter a virtual interface name in the form vethx, where x is a unique ID (typically 1 or 2 digits). A typicalfull virtual interface name with VLAN and IP alias in veth56.3999.199. The maximum length of the fullname is 15 characters. Special characters are not allowed. Numbers must be between 0 and 9999.
6. Select Aggregate from the bonding Type drop-down list.
8/11/2019 Dd Guide Emc
106/288
104 Module 4: Manage Network Interfaces
Registry setting can be different from the bonding configuration. When you add interfaces to the vir-tual interface, the information isnt sent to the bonding module until the virtual interface is broughtup. Until that time the registry and the bonding driver configuration are different.
7. From the General tab, specify the Bonding Mode.
Specify a bonding mode thats compatible with the system requirements to which the interfaces are
directly attached. The available modes are: Round robin: transmits packets in sequential order from the 1st available link through the last in the
aggregated group.
Balanced: Data sent over interfaces as determined by the hash method yo select. Associated inter-faces on the switch must be grouped into an Ether channel (trunk).
LACP: Similar to Balanced except it has a control protocol that communicates with the other end andcoordinates what links, within the bond, are available. It provides heartbeat failover.
8. Specify the bonding hash.
In the General tab, from the Bonding Hash pull-down menu select either Layer 2 (L2) or Layer 3/Layer 4(L3L4).
9. Select an interface to add to the aggregate configuration by click in the check ox corresponding to theinterface.
10. Click Next.
The Create virtual interface veth_name dialog box appears.
11. Enter an IP address.
12. Enter a Netmask address.
The Netmask is the subnet portion of the IP address that is assigned to the interface.
The format is usually 255.255.255.XXX, where XXX is the value that identifies the interface. If youdont specify a netmask, the Data Domain system uses the netmask format as determined by the TCP/IP address class (A, B, C) that you are using.
13. Specify speed and duplex options.
Note: Aggregation isnt available for NICs.
The combination of speed and duplex settings define the rate of data transfer through the interface.
Layer 2 (XOR-L2) Transmit based on static balanced and LACP mode aggregation withan XOR hash or layer 2 (inbound and outbound MAC addresses).
Layer 2/Layer 3(XOR-L2L3)
Transmit based on static balanced and LACP mode aggregation withan XOR has of layer 2 (inbound and outbound IP address) and layer3 (inbound and outbound interface numbers).
Layer 3/Layer 4(XOR-L3L4)
Transmit based on static balanced and LACP mode aggregation withan XOR hash of Layer 3 (inbound and outbound IP address) andLayer 4 (inbound and outbound interface numbers).
8/11/2019 Dd Guide Emc
107/288
EMC Data Domain System Administration Course Student Guide 105
Autonegotiate Speed/Duplex: select this option to allow the NIC to autonegotiate the line speedand duplex setting for an interface.
Manually configure Speed/Duplex: select this option to manually set an interface data transfer rate.
Duplex options are half-duplex or full-duplex.
Speed options are limited to the capabilities of the hardware. The option are 10 Base-T, 100Base-T, 1000 Base-T (Gb), and 10,000 (10 Gb).
Half-duplex is only available in 10 base-T and 100 Base-T speeds.
1000 and 10,000 line speeds require full-duplex.
Optical interfaces require the Autonegotiate option.
The copper interface default is 10 Gb. If a copper interface is set to 1000 or 10,000 line speed,duplex must be full-duplex.
14. Specify maximum transfer unit (MTU) settings.
This sets the size for the physical (Ethernet) interface. Supported values are from 350 to 9014. For 100
base-T gigabit networks, 1500 is the default.15. Click the Default button to return the setting to the default value.
16. Ensure that all of your network components support the size set with this options.
17. Select Dynamic Registration (optional).
The dynamic DNS (DDNS) protocol enable machines on a network to communicate with and register IPaddresses on a Data Domain system DNS server.
The DDNS must be registered to enable this option.
18. Click Next.
The Configure Interface Settings summary page appears.19. Ensure that the values listed are correct.
20. Click Finish
21. Click OK.
8/11/2019 Dd Guide Emc
108/288
106 Module 4: Manage Network Interfaces
Lesson 3: Link Failover
Link failover increases network throughput by keeping backups operational during network glitches.
Link failover is supported by a bonding driver on a Data Domain system. The bonding driver checks the car-rier signal on the active interface every 9 seconds. If the carrier signal is lost, the active interface ischanged to another standby interface. An ARP is sent to indicate that the data must flow to the new inter-face. The interface can be:
On the same switch
On a different switch
Directly connected
Specifications
Only 1 interface in a group can be active at a time.
Data flows over the active interface. Non-active interfaces can receive data.
You can specify a primary interface. If you do specify a primary interface, it will be the active interfaceif its available.
8/11/2019 Dd Guide Emc
109/288
EMC Data Domain System Administration Course Student Guide 107
Bonded interfaces can go to the same or different switches.
You do not have to configure a switch to make link failover work.
1 GbE interface
You can put 2, or more, interfaces in a link failover bonding group.
The bonding interfaces can be:
On the same card
Across cards
Between a card and a motherboard
Link failover is independent of the interface type. For example, copper and optical can be failoverlinks if the switches support the connections.
10 GbE interface
You can put only 2 interfaces in a failover bonding group.
The bonding interfaces can only be on the same card.
8/11/2019 Dd Guide Emc
110/288
108 Module 4: Manage Network Interfaces
Manage Link Failover
8/11/2019 Dd Guide Emc
111/288
EMC Data Domain System Administration Course Student Guide 109
Manage Link Failover (Continued)
8/11/2019 Dd Guide Emc
112/288
110 Module 4: Manage Network Interfaces
Lesson 4: Manage VLAN and IP Alias Network Interfaces
Introduction and Objectives
In this lesson youll learn about VLAN and IP alias network interfaces and how to manage it through theEnterprise Manager.
8/11/2019 Dd Guide Emc
113/288
EMC Data Domain System Administration Course Student Guide 111
Define VLAN and IP Alias Network Interfaces
Virtual local area networks (VLANs) manage subnets on a network. VLANs enable a LAN to transcend phys-ical boundaries. They enable you to segregate network broadcasting. They are used to:
Provide security
Speed up network traffic
Organize network LANs.
If youre not using VLANs, you can use IP aliases. Ip aliases are easy to implement and are less expensivethan VLAN, but they are not a true VLAN. For example, you must use 1 IP address for management and
another IP address to backup or archive data. You can combine VLANs and IP aliases.
8/11/2019 Dd Guide Emc
114/288
112 Module 4: Manage Network Interfaces
Create VLAN and IP Aliases
VLAN tag insertion (VLAN tagging) enables you to create multiple VLAN segments. (You get the tagsfrom the network administrator.)
In a Data Domain system, you can have up to 4096 VLAN tags.
Create a new VLAN interface from either a physical interface or a virtual interface.
The recommended total number that can be created is 80, though it is possible to create up to 100 inter-faces before the system is affected.
8/11/2019 Dd Guide Emc
115/288
EMC Data Domain System Administration Course Student Guide 113
Create VLAN and IP Aliases (Continued)
To create a VLAN tag from the Enterprise Manager:
1. From the Navigational pane, select the Data Domain system to configure.2. Click the Hardware > Network > Interfaces tabs.
3. Click Create and select the VLAN option.
The Create VLAN dialog box appears.
4. Specify a VLAN ID by entering a number in the ID field.
The range of a VLAN ID is between 1 and 4095.
5. Enter an IP Address.
The Internet Protocol (IP) Address is the numerical label assigned to the interface. For example,192.168.10.23
6. Enter a Netmask address.
The Netmask is the subnet portion of the IP address that is assigned to the interface. The format is typ-ically 255.255.255.###, where the ### are the values that identify the interface. If you do not specifya netmask, the Data Domain system uses the netmask format is determined by the TCP/IP addressclass (A,B,C) you are using.
7. Specify MTU Settings.
8/11/2019 Dd Guide Emc
116/288
114 Module 4: Manage Network Interfaces
This sets the maximum transfer unit (MTU) size for the physical (Ethernet) interface. Supported valuesare from 350 to 9014. For 100 Base-T and gigabit networks, 1500 is the standard default.
Notes:
Click the Default button to return the setting to the default value.
Ensure that all of your network components support the size set with this option.
8. Specify Dynamic DNS Registration option.
Dynamic DNS (DDNS) is the protocol that allows machines on a network to communicate with, and reg-ister their IP address on, a domain name system (DNS) server. The DDNS must be registered to enablethis option. Refer to Registering a DDNS for additional information.
9. Click Next.
The Configure Interface Settings summary page appears. The values listed reflect the new system andinterface state.
10. Click Finish and OK.
8/11/2019 Dd Guide Emc
117/288
EMC Data Domain System Administration Course Student Guide 115
Create VLAN and IP Aliases (Continued)
Create a new IP Alias interface from either a physical interface or a virtual interface.
The recommended total number of IP Aliases and virtual interfaces that can be created is 80 though itis possible to create up to 100 interfaces.
1. From the Navigational pane, select the Data Domain system to configure.
2. Click the Hardware > Network > Interfaces tabs.
3. Click Create and select the IP Alias option.
The Create IP Alias dialog box appears.
4. Specify a IP Alias ID by entering a number in the eth0a field.
Requirements are: 1 to 4096
5. Enter an IP Address. The Internet Protocol (IP) Address is the numerical label assigned to the inter-face. For example, 192.168.10.23
6. Enter a Netmask address.
The Netmask is the subnet portion of the IP address that is assigned to the interface.
Format is typically 255.255.255.###, where the ### are the values that identify the interface. If you donot specify a netmask, the Data Domain system uses the netmask format is determined by the TCP/IPaddress class (A,B,C) you are using.
8/11/2019 Dd Guide Emc
118/288
116 Module 4: Manage Network Interfaces
7. Specify Dynamic DNS Registration option.
Dynamic DNS (DDNS) is the protocol that allows machines on a network to communicate with,and register their IP address on, a Domain Name System (DNS) server.
The DDNS must be registered to enable this option. Refer to Registering a DDNS for additional infor-mation.
Click Next. The Configure Interface Settings summary page appears. The values listed reflect thenew system and interface state.
Click Finish and OK.
8/11/2019 Dd Guide Emc
119/288
EMC Data Domain System Administration Course Student Guide 117
Module Review
8/11/2019 Dd Guide Emc
120/288
118 Module 4: Manage Network Interfaces
Module Review (Continued)
8/11/2019 Dd Guide Emc
121/288
EMC Data Domain System Administration Course Student Guide 119
Module Review (Continued)
8/11/2019 Dd Guide Emc
122/288
120 Module 4: Manage Network Interfaces
8/11/2019 Dd Guide Emc
123/288
EMC Data Domain System Administration Course Student Guide 121
Module 5: Manage a VTL
Module Introduction and Objectives
8/11/2019 Dd Guide Emc
124/288
122 Module 5: Manage a VTL
VTL Overview
In some environments the Data Domain system must be configured as a Virtual Tape Library. This practicemay be motivated by the need to leverage existing backup policies that were built around using physicaltape libraries. Using a VTL can also be a step in a longer range migration to disk based media for backup,or it may be driven by the need to minimize the effort to recertify a system to meet compliance needs.
Virtual tape libraries emulate the physical tape equipment and function. Different tape library productsmay package some things in different ways and the names of some elements may differ between productsbut the fundamentals are basically the same. Data Domain systems are configured using the concepts oflibraries, tapes, Cartridge Access Ports, and barcodes.
The Data Domain VTL software option requires installation of a Data Domain VTL HBA to connect to a FibreChannel storage network. Activating the VTL configuration also requires the installation of a VTL licensekey.
The Data Domain VTL software option requires installation of a Data Domain VTL HBA to connect to a FibreChannel storage network. Activating the VTL configuration also requires the installation of a VTL licensekey.
8/11/2019 Dd Guide Emc
125/288
EMC Data Domain System Administration Course Student Guide 123
The goal of configuring a Data Domain system as a VTL is to provide an interface that the backup softwarecan work with as if it were working with the physical tape library. Some Parameters must be configured inthe VTL environment to structure the libraries and the number and size of elements within each. Many ofthese parameters are dictated by the tape technology and library model that is being emulated. Consultthe product documentation and best practice guides for more information about the definitions and
ranges for each parameter.
8/11/2019 Dd Guide Emc
126/288
124 Module 5: Manage a VTL
Configuration Terms
8/11/2019 Dd Guide Emc
127/288
EMC Data Domain System Administration Course Student Guide 125
VTL Planning
You must configure parameters in the VTL environment to structure the number and size of elementswithin each library. Parameters are dictated by the tape technology and library you are emulating. Consultthe product documentation and best practices guides for information about the definitions and ranges foreach parameter.
8/11/2019 Dd Guide Emc
128/288
126 Module 5: Manage a VTL
Capacity Planning
See the best practices documentation for planning a virtual library configuration.
Capacity calculations are a function of the backup set size and the compression ratios.
Consider how space gets allocated and recovered in events like tape creation and expiration.
With deduplication the amount of disk space you need for a tape depends on the compression ratio.When virtual tapes are created space isnt pre-allocated, so the logical setup to emulate a large libraryof tape incurs a small disk space. You monitor disk space use and compression using the same tech-niques you use for monitoring data backed up over NFS and CIFS
You must clean a Data Domain system to reclaim data storage space from an expired tape image. DIArequirements to not use space until cleaning runs also means that large amounts of space maybecome unavailable for use. In some environments, you must manage disk use closely. You may needto run system cleaning frequently.
8/11/2019 Dd Guide Emc
129/288
EMC Data Domain System Administration Course Student Guide 127
Create Tapes
8/11/2019 Dd Guide Emc
130/288
128 Module 5: Manage a VTL
VTL Barcode Definition
When a tape is created, a bar code is assigned that is a unique identifier of a tape. The eight-characterbarcode must start with six numeric or upper-case alphabetic characters (from the set {0-9, A-Z}) and endin a two-character tag for the supported LT0-1, LT0-2, and LT0-3 tape type.
8/11/2019 Dd Guide Emc
131/288
EMC Data Domain System Administration Course Student Guide 129
Configure VTL Barcode
Data Domain recommends creating tapes with unique barcodes only. Duplicate bar codes in the same tapepool create an error. Although no error is created for duplicate barcodes in different pools, duplicate barcodes may cause unpredictable behavior in backup applications.
8/11/2019 Dd Guide Emc
132/288
130 Module 5: Manage a VTL
Configure VTL Barcode (Continued)
8/11/2019 Dd Guide Emc
133/288
EMC Data Domain System Administration Course Student Guide 131
Configure VTL Barcode (Continued)
8/11/2019 Dd Guide Emc
134/288
132 Module 5: Manage a VTL
Module Review
8/11/2019 Dd Guide Emc
135/288
EMC Data Domain System Administration Course Student Guide 133
Module 6: Manage Data
Module Introduction and Objectives
8/11/2019 Dd Guide Emc
136/288
134 Module 6: Manage Data
Lesson 1: Snapshots
Use a snapshot to save a backup directory copy at a specific point in time. You can use it later torestore files from a specific point in time, for example, before a Data Domain OS upgrade.
Snapshot benefits:
Snapshots do not use many system resources
Snapshots are free (do not require a license)
A snapshot is a read-only copy of the entire backup directory.
You can schedule multiple snapshot schedules at the same time or create them when you choose, for
example, before you upgrade or configure your system. Snapshots are created in the /backup/.snapshot directory.
The maximum number of snapshots allowed to be stored on a Data Domain system is 750. You willreceive warning when the number of snapshots reaches 90% of the allowed number (675-749). Analert is generated when the maximum number is reached. To clear the warning:
1. Expire snapshots
8/11/2019 Dd Guide Emc
137/288
EMC Data Domain System Administration Course Student Guide 135
2. Run file system cleaning
If the Data Domain system is a source for collection, snapshots are replicated. If the Data Domain systemis a source for directory replication, snapshots are not replicated. You must create and replicate snapshotsseparately.
Note: Use snapshots judiciously to avoid having segments in snapshots that remain after files are deleted.
8/11/2019 Dd Guide Emc
138/288
136 Module 6: Manage Data
Manage Snapshots
To create a snapshot:
1. Data Management > Snapshots
2. Click Create to create snapshot
3. Click Modify Expiration Date to choose
Never Expire
In: snapshot expires in number of days, weeks, months, or years you select
On: snapshot expires at the first minute of the day you select
4. Select Schedule tab to schedule snapshots
8/11/2019 Dd Guide Emc
139/288
EMC Data Domain System Administration Course Student Guide 137
Lab 6.1 Configure Snapshot
8/11/2019 Dd Guide Emc
140/288
138 Module 6: Manage Data
Lesson 2: Fastcopy
Use fastcopy to retrieve data stored in snapshots. Fastcopy copies files and directory trees of a coursedirectory to a target directory on a Data Domain system. The fastcopy force option allows the destinationdirectory to be overwritten if it exists. Fastcopy makes a destination equal to the source, but not at aparticular point in time. The source and destination may not be equal if you change either during the copyoperation. Fastcopy takes space (its like a clone).
8/11/2019 Dd Guide Emc
141/288
EMC Data Domain System Administration Course Student Guide 139
Perform Fastcopy
1. Data Management > File System > More Tasks >
2. Enter source and destination
3. Click box to overwrite exiting destination (if it exists)
8/11/2019 Dd Guide Emc
142/288
140 Module 6: Manage Data
Lab 6.2: Perform Fastcopy
8/11/2019 Dd Guide Emc
143/288
EMC Data Domain System Administration Course Student Guide 141
Lesson 3: Retention Lock
The EMC Data Domain Retention lock licensed software feature enables organizations to protect records innon-writeable and non-erasable formats for a specified length of time, up to 70 years. Retention lock pro-tects against:
Accidents and user errors
Malicious activity
Licensed feature
8/11/2019 Dd Guide Emc
144/288
142 Module 6: Manage Data
Retention Lock (Continued)
Minimum and maximum retention periods are set globally
Within the global parameters, retention parameters can be set on a file-by-file basis
Retention Lock is designed to respond to commands from the user, archive software, or some backupapplications, which trigger the lock on stored data.
Assumes administrators are trustworthy
Allows administrative users to do the following
Override global retention settings
Update permissions of locked files
Rename empty directories
Fully integrated with Data Domain replication
File locking is initiated by the user or by backup or archive software
8/11/2019 Dd Guide Emc
145/288
EMC Data Domain System Administration Course Student Guide 143
Retention Lock (Continued)
The user or the storage software needs to set the access time (atime) for the file to a date in the future thatmust be beyond the minimum retention period that is configured on the Data Domain system. The actionof setting the atime is the signal to lock the file. As soon as this value is set, the file is locked and cannotbe deleted or modified before that date.
Retention Lock extends the utility of Data Domain systems into environments that require granular con-trols over the protection of individual files stored on the system.
8/11/2019 Dd Guide Emc
146/288
144 Module 6: Manage Data
Configure Retention Lock
8/11/2019 Dd Guide Emc
147/288
EMC Data Domain System Administration Course Student Guide 145
Lesson 3: Sanitization
With the sanitize function, deleted files can be overwritten using a DoD/NIST compliant algorithm and pro-cedures. No complex setup or disruption is needed. Clean data is available during the sanitization pro-cess, with limited disruption to daily operations. Sanitizing is the electronic equivalent of data shredding.It removes any trace of deleted files.
Sanitization supports organizations that:
Are required to remove and destroy confidential data that is accidentally written to unapproved sys-tems
Are required to delete data that is no longer needed.
Need to resolve classified message incidents (CMIs).
The system sanitize command erases the following:
Segments of deleted files that are not used by other files
Contaminated metadata
All unused capacity in the file system
8/11/2019 Dd Guide Emc
148/288
146 Module 6: Manage Data
All segments used by deleted file cannot be globally erased, because some segments may be used byother files
CLI command: system sanitize, system sanitize start
8/11/2019 Dd Guide Emc
149/288
EMC Data Domain System Administration Course Student Guide 147
Lab 6.3: Configure Sanitization
8/11/2019 Dd Guide Emc
150/288
148 Module 6: Manage Data
Lesson 4: Encryption of Data at Rest
With encryption software option licensed and enabled, all incoming data is encrypted inline before it iswritten to disk. This is a software-based approach, and it requires no additional hardware. It includes:
Configurable 128-bit or 256-bit Advanced Encryption Standard (AES) algorithm with either:
Confidentiality with Cipher Block Chaining (CBC mode)
Or
Both confidentiality and message authenticity with Galios/Counter Mode (GCM mode)
Encryption and decryption to and from disk is transparent to all access protocols: DD Boost, NFS, CIFS, andVTL (no administrative action is required for decryption)
Passphrase and Encryption KeyWhen you enable encryption, you are prompted for a passphrase. The system generates an encryption keyand uses the passphrase to encrypt the key. One key is used to encrypt all data written to the system. Afterencryption is enabled, the passphrase is needed by administrative users only:
8/11/2019 Dd Guide Emc
151/288
EMC Data Domain System Administration Course Student Guide 149
If locking or unlocking the file system
If disabling encryption
One key is used for all data in a system.
The encryption key is passphrase protected.
The administrative user specifies the passphrase when enabling encryption.
The passphrase is needed by administrative users only:
If locking or unlocking the file system
If disabling encryption
Take great care not to lose the passphrase or data can be irrevocably lost. If, for example, the passphraseis lost after a file system is locked, the file system cannot be unlocked. The passphrase is not stored on disk(so the passphrase cant be recovered). The two administrative users use the passphrase to lock the DataDomain system and its external storage devices. They enter a new passphrase during the lockingprocedure. A thief who steals a system cant unlock the file system without the passphrase.
File System Locking
After encryption is enabled, the file system can be locked by two administrative users who worktogether.
To unlock the file system, one administrative user enters the new passphrase.
Useful before a system is transported or a disk is replaced
Without encryption, user data could possibly be recovered by a thief with a forensic tool (particularly iflocal compression is turned off)
If a file system is locked before a disk is shipped, the disk is protected from forensic analysis because: The encryption key (which is stored on disk encrypted by the passphrase) cant be recovered
Any user data is encrypted (and the data cant be decrypted without the key)
Only an administrative user who has the new passphrase created during the locking procedure canunlock a file system
8/11/2019 Dd Guide Emc
152/288
150 Module 6: Manage Data
Encryption Flow
8/11/2019 Dd Guide Emc
153/288
EMC Data Domain System Administration Course Student Guide 151
Configure Encryption
1. In the CLI, ensure the Data Domain Encryption license is enabled.
(See Appendix A for Data Domain software licenses.)
Disable the file system
# filesys disable
Enable encryption
# filesys encryption enable
2. Enter a passphrase when promptedSelect an alternative cryptographic algorithm (optional)
# filesys encryption algorithm set algorithm
Default algorithm is aes_256_cbc. Other options are: aes_128_cbc, aes_128_gcm, or aes_256_gcm
8/11/2019 Dd Guide Emc
154/288
152 Module 6: Manage Data
Apply Encryption Changes
8/11/2019 Dd Guide Emc
155/288
EMC Data Domain System Administration Course Student Guide 153
Deactivate Encryption
8/11/2019 Dd Guide Emc
156/288
154 Module 6: Manage Data
Lab 6.4 Configure Encryption
8/11/2019 Dd Guide Emc
157/288
EMC Data Domain System Administration Course Student Guide 155
Lesson 5: File System Cleaning
Cleaning reclaims physical storage occupied by deleted objects. For example, as retention periods expire,old backups are deleted. Space from deleted backups becomes available only after cleaning reclaims thedisk space.
When application software expires backup or archive images, they are deleted in the sense that they areno longer accessible or available for recovery from the application. The images still occupy physical stor-age. The clean operation reclaims the segments used by files that are deleted and are not longer refer-enced.
Cleaning may require a lot of system resources. Mechanisms (self-throttling) are in place to automatically
adjust the priority assigned to cleaning tasks in favor of more time critical processing tasks. Cleaningschedules are adjustable. By default, cleaning is scheduled to start every Tuesday at 6:00 am. You shouldschedule cleaning for times when system traffic is lowest.
A Data Domain system is available for write and read operations during cleaning.
8/11/2019 Dd Guide Emc
158/288
156 Module 6: Manage Data
Cleaning
Cleaning enables you to reorganize data to improve the speed and efficiency of deduplication.
Data invulnerability requires that data is only written into new containers. This requirement also applies tocleaning. Copy forward segments are segments that, for deduplication efficiency, should be stored adja-cent to each other. So they are copied forward together into a single container.
Dead segments are dead because the files that referred to them were all deleted, and the pointers wereremoved. Dead segments are not allowed to be rewritten with new data since this could put valid data atrisk of corruption. Instead, valid segments are copied forward into free containers to group the remainingvalid segments together. When the data is safe and reorganized, the original containers are appended
back onto the available disk space.
Since DDS is a log structure file system, space that was deleted (see types below) must be reclaimed. Thisis called cleaning.
Cleaning is done for 2 main reasons:
1. House keeping: periodically, segments are considered dead if the reference file for it was deleted.
8/11/2019 Dd Guide Emc
159/288
EMC Data Domain System Administration Course Student Guide 157
2. Performance tuning: approximately 10% of the duplicate data is rewritten on the disk. This is done forperformance reasons. For example, rewriting duplicate segments (copy forward segment) into thesame location (segmentation locality) can be more advantageous than having the segments acrossdifferent locations.
The default time schedule for file system cleaning is every Tuesday at 6 am. The default CPU throttle is50%. You can change these options using the Enterprise Manager or the CLI.
8/11/2019 Dd Guide Emc
160/288
158 Module 6: Manage Data
Lab 6.5: Configure File-System Cleaning
8/11/2019 Dd Guide Emc
161/288
EMC Data Domain System Administration Course Student Guide 159
Lesson 6: Monitor File-System Space Usage
8/11/2019 Dd Guide Emc
162/288
160 Module 6: Manage Data
File System Summary Tab
8/11/2019 Dd Guide Emc
163/288
EMC Data Domain System Administration Course Student Guide 161
Space Usage
Monitor space use to determine if you have enough space (through extrapolation). If you dont haveenough space you can do the following:
Increase capacity
Reduce retention periods
Reduce amount of data
Space Usage Terms
Term GUI Term Definition
pre-compression Pre Compression Written Data sent to Data Domain system beforededuplication, local compression, or both
post compression used Post-Comp Used Space used after compression
8/11/2019 Dd Guide Emc
164/288
162 Module 6: Manage Data
compression factor Comp Factor The compression factor (global ratio, cumula-tive ratio) is amount of data footprint