eCDMFUN - SRG
eCDMFUN - SRG
Copyright ©2016 EMC Corporation. All Rights Reserved. Published in the USA. EMC believes the information in this publication is accurate as of its
publication date. The information is subject to change without notice.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS IS.” EMC CORPORATION MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND
WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS
FOR A PARTICULAR PURPOSE.
Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. The trademarks, logos, and
service marks (collectively "Trademarks") appearing in this publication are the property of EMC Corporation and other parties. Nothing contained in this
publication should be construed as granting any license or right to use any Trademark without the prior written permission of the party that owns the
Trademark.
EMC, EMC², the EMC logo, AccessAnywhere Access Logix, AdvantEdge, AlphaStor, AppSync ApplicationXtender, ArchiveXtender, Atmos, Authentica,
Authentic Problems, Automated Resource Manager, AutoStart, AutoSwap, AVALONidm, Avamar, Aveksa, Bus-Tech, Captiva, Catalog Solution, C-Clip,
Celerra, Celerra Replicator, Centera, CenterStage, CentraStar, EMC CertTracker. CIO Connect, ClaimPack, ClaimsEditor, Claralert ,cLARiiON, ClientPak,
CloudArray, Codebook Correlation Technology, Common Information Model, Compuset, Compute Anywhere, Configuration Intelligence, Configuresoft,
Connectrix, Constellation Computing, CoprHD, EMC ControlCenter, CopyCross, CopyPoint, CX, DataBridge , Data Protection Suite. Data Protection Advisor,
DBClassify, DD Boost, Dantz, DatabaseXtender, Data Domain, Direct Matrix Architecture, DiskXtender, DiskXtender 2000, DLS ECO, Document Sciences,
Documentum, DR Anywhere, DSSD, ECS, elnput, E-Lab, Elastic Cloud Storage, EmailXaminer, EmailXtender , EMC Centera, EMC ControlCenter, EMC
LifeLine, EMCTV, Enginuity, EPFM. eRoom, Event Explorer, FAST, FarPoint, FirstPass, FLARE, FormWare, Geosynchrony, Global File Virtualization, Graphic
Visualization, Greenplum, HighRoad, HomeBase, Illuminator , InfoArchive, InfoMover, Infoscape, Infra, InputAccel, InputAccel Express, Invista, Ionix,
Isilon, ISIS,Kazeon, EMC LifeLine, Mainframe Appliance for Storage, Mainframe Data Library, Max Retriever, MCx, MediaStor , Metro, MetroPoint,
MirrorView, Mozy, Multi-Band Deduplication,Navisphere, Netstorage, NetWitness, NetWorker, EMC OnCourse, OnRack, OpenScale, Petrocloud, PixTools,
Powerlink, PowerPath, PowerSnap, ProSphere, ProtectEverywhere, ProtectPoint, EMC Proven, EMC Proven Professional, QuickScan, RAPIDPath, EMC
RecoverPoint, Rainfinity, RepliCare, RepliStor, ResourcePak, Retrospect, RSA, the RSA logo, SafeLine, SAN Advisor, SAN Copy, SAN Manager, ScaleIO
Smarts, Silver Trail, EMC Snap, SnapImage, SnapSure, SnapView, SourceOne, SRDF, EMC Storage Administrator, StorageScope, SupportMate, SymmAPI,
SymmEnabler, Symmetrix, Symmetrix DMX, Symmetrix VMAX, TimeFinder, TwinStrata, UltraFlex, UltraPoint, UltraScale, Unisphere, Universal Data
Consistency, Vblock, VCE. Velocity, Viewlets, ViPR, Virtual Matrix, Virtual Matrix Architecture, Virtual Provisioning, Virtualize Everything, Compromise
Nothing, Virtuent, VMAX, VMAXe, VNX, VNXe, Voyence, VPLEX, VSAM-Assist, VSAM I/O PLUS, VSET, VSPEX, Watch4net, WebXtender, xPression, xPresso,
Xtrem, XtremCache, XtremSF, XtremSW, XtremIO, YottaYotta, Zero-Friction Enterprise Storage.
For these users, it eliminates the need to wait for the backup admin to perform specific
backup-related jobs. One issue that arises from that is oversight. There is no one tool to
manage these users and define specific service levels to satisfy these users’ needs. As a
result, a user ends up having more copies than needed, or copy data growth. This creates a
$51 billion dollar problem, according to IDC. Thus having the multitude of silos in the data
center presents two opportunities:
• A risk: where there is no one overseeing the environment to make sure everyone
complies – including occurrences where only one user has the right to delete primary and
protection copy.
• A cost: it may be cheaper to organize in silos, but no one has awareness on the exact
amount of copies there are and how long they should exist.
Modern data management is designed for self service to empower application owners,
storage admins to backup directly from the data source (an application, storage array, etc.)
to protection storage. This model is becoming increasingly popular because it puts control
directly in the hands of the data owners – rather than relying on a centralized backup team.
However, the new self-service model requires intelligent oversight on copies and service
levels across the business to ensure that data is protected and you maintain consistent
service levels across the business.
A layer is required within modern data management that provides copy oversight and
enforces the rules of the business by discovering and tracking of copies regardless of who
created them.
Finally – to tie it all together, you need intelligent analytics and search that can cross both
the traditional and modern approaches ensuring that you optimize operations across all
data centers globally.
• In three easy to follow steps, eCDM builds out a catalog by discovering “protectable”
assets on a VMAX or XtremIO and “protect to” assets on a Data Domain. It counts and
relates the copies back to primary data sources by displaying the relationship between
the two - regardless of how the copy was created.
• It automates copy management based on the Service Level Agreement (SLA). It focuses
on what the user wants to achieve, and provides the end-user with an easy to read list of
SLO that can be assigned to data.
• It makes sure the copies are being efficiently used. This is basically making sure that the
environment achieve compliance, and this is done either by eCDM or by eCDM
discovering copies created by a 3rd party application like Unisphere or Application Agent.
ProtectPoint, XtremIO Virtual Copies (XVC) and SnapVX are strongly leveraged for
delivery this feature.
Some of the key benefits that eCDM offers include: (1) it can discover data anywhere; (2)
its intelligence enables self-service and (3) it’s efficient where it’s creating or storing copies.
Copies typically have four potential use cases: text/dev, operations, protection and
analytics.
eCDM is designed to enable self-service while still providing global oversight and address
the $50 billion copy data problem by significantly reduce storage and data protection costs.
Let’s take a look into each of these two aspects of eCDM in respective use cases.
In order to properly function, eCDM must be able to communicate with and manage the
storage systems and protectable assets within the environment. This means that in order to
interface with any VMAX, XtremIO, RecoverPoint, and Data Domain systems, it must have
IP connectivity and credentials to the those systems’ programmatic interfaces.
For example, to monitor and manage a Data Domain, eCDM needs access to the Data
Domain Management Center. To interface with VMAX, eCDM utilizes SMI-S Provider.
Because these programmatic interfaces are used to provide a source for eCDM’s inventory
of storage systems, they are all called Inventory Sources. eCDM can query these
inventory sources to discover any storage systems, protectable assets, and any other
information needed.
The core system of eCDM provides the main services. This includes creating and managing
various eCDM assets, inventory sources that are necessary in using eCDM. It also provides
a REST API server, license manager, and user interface.
eCDM also stores metadata within its internal catalog and media manager. These catalogs
are used to keep track of the various storage devices storage groups and consistency
groups. They also store the location and relationships between the copies of data.
The Protection components of the eCDM appliance interact between the eCDM appliance
and the other storage systems within the environment. This includes components, such as
the storage manager, workflow manager, and discovery service. These components are
used to discover information about each storage system, interface with them, and run
workflows to run actions on them.
When eCDM is first installed, a free 90 day trial license is automatically applied. This license
allows full use of the product for an unlimited amount of capacity. This license allows you to
be able to try the eCDM product and also to discover how much capacity you are likely to
use. If needed, you may extend the trial period an additional 30 days by applying an
emergency license. However, a permanent FETB or Appliance Key license must be applied
before the trial expires.
The Front-end Protected Capacity by Terabyte, or FETB license is a permanent license based
on the actual capacity that you need to protect. It allows full use of the product up to the
licensed capacity. Capacity is measured based only on the amount of front-end capacity
being protected. The FETB license is not dependent on the size of the LUN so it is not
impacted by thin provisioning of a LUN. Also, the capacity used by any copies are not
counted toward the front-end capacity. For example, if an Oracle database uses 5 TB of
capacity on a 15 TB thin provisioned LUN, and backups and other replicated copies use a
total of 100 TBs, the license only needs to be for 5 TBs - the actual capacity used by the
database. If needed, the amount of licensed capacity can be expanded.
The Appliance Key license is a permanent license that provides unlimited, full access to
eCDM with no capacity restrictions. Once an Appliance Key license is applied, eCDM can
function indefinitely.
eCDM runs the discovery process by interrogating the inventory sources, such as Data
Domain Management Console, SMI-S Provider, XMS, or the RecoverPoint Cluster Manager.
This allows it to determine what storage systems exist and what resources exist on them
that can be protected. This includes copies of LUNs, VMAX Storage Groups, and XtremIO
Consistency Groups. Data about these systems and storage devices populates the metadata
components in the eCDM appliance so that it can keep track of these assets.
When a new inventory source is added to eCDM, it will automatically run a basic discovery
process on that inventory source to discover its storage arrays. A deeper level of discovery
can also be run on demand to discover storage within the array and to discover if any new
storage arrays have been added.
VMAX, VMAX All Flash, and XtremIO systems are categorized as Storage Assets since they
are used as primary storage for the servers and applications in the environment. eCDM will
discover information about these storage systems, and also the storage and consistency
groups stored on them.
Data Domain systems are typically used to store copies of data for protection, so they are
categorized as Protection Storage Assets. A Protection Storage Asset can either be an entire
Data Domain system, a Data Domain MTree that is a vDisk pool, or a RecoverPoint Cluster.
eCDM discovers information about the Data Domain systems, along with any copied data
residing on them.
Both storage and consistency groups can also be combined into user definable Custom
Groups to provide further efficiency in management.
eCDM does this through the use of protection plans. Protection plans define sets of
objectives that will apply to protectable assets for their configured periods of time. For
example, you could define a protection plan that will ensure there are always at least 6
point in time copies of an asset available from the last three days, and that they are spaced
no more than 12 hours apart. The protection plan could also specify what type of storage
the copies must reside on.
A Recovery Point objective will set the maximum amount of time that is allowed to elapse
between protection copies. For example, setting a Recovery Point of 6 hours will ensure
that a point in time copy is made at least every 6 hours.
A Storage Class objective will ensure that protection copies are stored on the proper type
of storage. The Storage Class can either be set to Primary, meaning a top level storage
array such as VMAX or XtremIO, or Protection, meaning a Data Domain.
The Data Consistency objective specifies whether the copies are Application consistent or
Crash consistent. An application consistent copy will first ensure that the application data is
in a consistent state, while a crash consistent backup does not. An application consistent
copy can only be created using DD Boost for Enterprise Applications software in order to
interface with the application.
A Retention objective will ensure that protection copies have a minimum specified
retention period. For example, setting a retention objective to 2 months will ensure that
copies will not expire until 2 months from when they were created.
The Maximum Copies and Minimum Copies objectives will ensure that the total number
of protection copies for a protectable asset fall within the specified range. These objectives
are useful for ensuring that enough copies are made, but not so much that they use up
valuable storage space.
A protection plan will have one or more stages in order to define a time period for the
service level objectives to be applied. The time period of a stage always refers to a time
relative to the current date. For example, a stage could be created to apply service level
objectives for the past 5 days. This would create a 5 day rolling time window so that the
objectives must be satisfied for the past 5 days. Note that the stage does not expire after 5
days - it remains active for the lifetime of the protection plan, but always refers to the 5
days before the present day.
Multiple stages can be added to a protection plan so that different service level objectives
can be applied to different time periods. This is very helpful in creating protection plans that
offer stringent service levels for more recent data, and more relaxed service levels of older
data. Multiple stages can also apply to the same time period to allow service level
agreements to be applied more flexibly. For example, two stages could apply to the same
time period - one to check how many copies reside on primary storage, and another to
check how many reside on protection storage.
Imagine that we want to ensure the protection of an Oracle database that has a high initial
RPO. It requires copies to be available for the last 2 days which are each taken 12 hours
apart. However, after those 2 days, the businesses recovery point objective drops and only
one daily copy is needed. No copies are required after a total of 6 days.
A protection plan for these requirements would have two stages: one for the high RPO
period, and one for the low RPO period. The first stage would be set to go from 1 to 2 days
ago, and be configured with a recovery point objective of 12 hours. The second stage would
be set to apply from 3 to 6 days ago, and be configured with a recovery point objective of 1
day.
As time goes on, this protection plan would ensure that, during the first stage, copies exist
no more than 12 hours apart. Once those copies enter the second stage time period, some
of them would become candidates for removal. But the protection plan will ensure that the
maximum time between two copies is not more than the recovery point objective of one
day. Eventually, copies that no longer fall within any of the stage’s time periods no not need
to be retained.
Each eCDM has one System Tenant. This tenant is the root tenant of all others, which are
sub-tenants. The System Tenant can manage all the sub-tenants.
Users can be assigned within the System Tenant and granted various roles. These Roles
allow the users various levels of access to eCDM.
By selecting the upper menu icon, the operator simply selects the desired section they
would like to navigate to. Each of these selections will be shown in more detail.
An inactive plan is not available to tenants and can still be edited. Once a plan is activated,
it is available to tenants and may be assigned to protect assets. When a plan has tenants
assigned to it, it cannot be deactivated until those tenants are removed, since the purpose
of an inactive plan is for it to be unavailable to tenants. However, the plan can be
suspended which will suspend its activity, validation, and protection actions.
In addition to specifying a time period, a stage will define a set of objectives. There are six
options for setting objectives. These options were covered earlier in the course. By
combining the different objectives, various service level objectives can be created.
This is done by selecting a point-in-time copy from the assets section and starting the
recovery wizard. You will have the option of exporting the copy to a target destination,
recovering it to an alternate location, or rolling back to the original production location.
Exporting for reuse and recovering to an alternate location are useful for testing use cases,
while the rollback option is commonly used for disaster recovery. Performing a rollback to
the production will cause the original data to be overwritten, so this option should be used
with care.