Protecting the VMware Environment with IBM Spectrum Protect

An IBM Redpaper publication

thumbnail 

Published on 25 December 2017, updated 08 January 2018

  1. .EPUB (4.1 MB)
  2. .PDF (8.2 MB)

Share this page:   

ISBN-10: 0738456411
ISBN-13: 9780738456416
IBM Form #: REDP-5252-00


Authors: Mikael Lindstrom, Julien Sauvanet, Pol Vander Eyken, Sean Sperry, Nathan Best and Rennad Murugan

    menu icon

    Abstract

    While backup is a topic of much discussion, development, and strategy, the name of the game is rapid recovery. Given the explosive growth of data in our Client environments, there is a need to provide solutions to our Clients that meet their recovery time objective and recovery point objective needs.

    Traditional backups of files, databases, and similar objects sent across networks (LAN or SAN) to backup servers provide a degree of recoverability, but the speed of backup and recovery is constrained by resource capacity (server, network, storage, and so on). This results in longer backup and recovery times. Data growth is steadily making the problem worse. A new approach to rapid recovery is required to meet requirements of single file recoveries and recoveries of large data sets.

    The new approach is snapshot technology. The ability to make point-in-time snapshots with limited impact to the application while rapidly recovering large data sets by reverting to a snapshot greatly reduces the recovery time for these data sets.

    This IBM® Redbooks® publication has been written to identify the IBM software that enhances the ability to deliver rapid recovery and gives directions and procedures to design, install, configure, and use IBM Spectrum™ Protect for Virtual Environments and IBM Spectrum Protect™ Snapshot for VMware. While the two products work hand in hand to provide a comprehensive protection to VMware environments, the two products are separate and are installed and configured separately.

    Table of Contents

    Chapter 1. Architecture corner

    Chapter 2. Product introduction

    Chapter 3. Installation roadmap

    Chapter 4. Installation and configuration

    Chapter 5. Virtual machine backup

    Chapter 6. Backup scheduling

    Chapter 7. Virtual environment recovery

    Chapter 8. Reporting

    Chapter 9. Disaster recovery

    Chapter 10. Problem determination and FAQs

    Appendix A. Install and setup

     

    Others who read this also read