table of contentsibm tivoli storage manager for virtual environments is demonstrated as a modern ......
TRANSCRIPT
Table of ContentsLab Overview .................................................................................................................... 2
HOL-PRT-1302 - Simplified data protection for virtual machines with Tivoli StorageManager for Virtual Environments........................................................................... 3
Tivoli Storage Manager for Virtual Environments Overview .............................................. 5Evolution of TSM for Virtual Environments .............................................................. 6
Exploring the Virtual Environment .................................................................................. 11Explore the lab environment................................................................................. 12
Performing the Initial Configuration ............................................................................... 19Using the Configuration Wizard to complete the initial configuration ...................20
Scheduling Backups ........................................................................................................ 31Performing an Incremental Backup operation ....................................................... 32
Backing up changed data ............................................................................................... 41Simulating data changes in the production environment......................................42
Recovering Critical Data ................................................................................................. 60Using the Recovery Agent to restore critical data ................................................. 61
Simulating the Loss of a VM............................................................................................ 83Simulating the loss of an entire virtual machine................................................... 84
Recovering an Entire VM................................................................................................. 89Restoring an entire virtual machine from a backup .............................................. 90
Conclusion ...................................................................................................................... 97Conclusion............................................................................................................. 98
HOL-PRT-1302
Page 1VMware Beta Program CONFIDENTIAL
Lab Overview
HOL-PRT-1302
Page 2VMware Beta Program CONFIDENTIAL
HOL-PRT-1302 - Simplified dataprotection for virtual machines withTivoli Storage Manager for VirtualEnvironments
IBM Tivoli Storage Manager for Virtual Environments is demonstrated as a modernbackup technology that makes more efficient use of hardware and network resourcesand is easier to administer than traditional in-guest backup methods for protecting andrecovering data in VMware environments.
This lab puts the participant in the role of a VMware administrator who is confrontedwith the dual challenges of 1) satisfying the demands from internal customers for morerobust data protection, and 2) simplifying the task of managing a profusion of dataprotection service level agreements.
Participants will learn how to configure IBM Tivoli Storage Manager for VirtualEnvironments to leverage their existing Tivoli Storage Manager environment to providescheduled protection and simplified recovery of mission-critical virtual machine data.
Lab Scenario
Umbrella Corporation, as part of a cost-containment initiative, has directed its ITdepartment to consolidate and virtualize the physical machines used by internaldepartments for daily business operations. The IT department has been tasked withimplementing a new charge-back model for providing data protection that allows eachinternal department to customize a service level agreement with specific recovery pointand recovery time objectives.
The IT team has made good progress and about 80 percent of the servers have beenvirtualized, but the data is still being protected using traditional in-guest backupmethods. The Tivoli Storage Manager administrator and the VMware administrator arenow ready to deploy TSM for Virtual Environments and implement a more efficient dataprotection model that is easier to administer. This will also consolidate the full-machinerecovery procedure which currently requires multiple steps into a greatly simplifiedsingle-step restore operation.
Lab Environment
This lab is appropriate for VMware administrators and IT managers who want totransition to a more modern backup technology that makes more efficient use of
HOL-PRT-1302
Page 3VMware Beta Program CONFIDENTIAL
hardware and network resources and is easier to administer than traditional in-guestbackup methods.
The lab environment consists of three virtual machines:
• A Tivoli Storage Manager server that serves as the repository for protecteddata.
• A vCenter Server machine that is used to configure and manage IBM TivoliStorage Manager for Virtual Environments.
• An ESXi host that supports an additional three nested virtual machines. Thesenested VMs will be backed up and restored by the participant.
It will take about 60 minutes to complete this lab.
HOL-PRT-1302
Page 4VMware Beta Program CONFIDENTIAL
Tivoli Storage Managerfor Virtual Environments
Overview
HOL-PRT-1302
Page 5VMware Beta Program CONFIDENTIAL
Evolution of TSM for VirtualEnvironmentsBrief Review
Tivoli Storage Manager (TSM) has protected data in virtual environments for some time,and has continued to evolve new methodologies and functionality as new technologiesemerge and new challenges arise. A brief review of this evolution will aid yourunderstanding of the lab environment and learning objectives for this session.
HOL-PRT-1302
Page 6VMware Beta Program CONFIDENTIAL
Agent in each guest
The original and most basic method for protecting a virtual machine data is to installthe Tivoli Storage Manager agent directly into the guest environment.
Many users are still following this approach, as Tivoli Storage Manager supports manyhypervisors (such as KVM, Hyper-V, VMware, LPARs and others) and many guestoperating systems (such as Windows, Linux, zLinux, z/OS, Solaris among others).
The advantage of this approach is that backup operations are progressive-incremental.You can install TSM for Mail, TSM for Databases, or TSM for ERP directly in the guest OS,providing application awareness.
The disadvantages are that this approach requires an individual agent in each guest,and there is no integration with VMware, making management a challenge.
HOL-PRT-1302
Page 7VMware Beta Program CONFIDENTIAL
Agent on proxy server
The next stage in the evolution of TSM for Virtual Environments removed the agent fromthe guest and placed it instead on a proxy server. Both VMware and Hyper-V supportedthis ability.
Although this approach provided a more robust backup solution, it required the data tobe transferred to the proxy server before it could be backed up or restored. This extra"data hop" was less than ideal.
HOL-PRT-1302
Page 8VMware Beta Program CONFIDENTIAL
vStorage API
VMware introduced the vStorage API, also referred to as vSphere or vStorage API forData Protection (VADP), in 2009. This new technology allowed the proxy server toaccess the data directly on the ESX host storage, eliminating the need for the extra"data hop" thus streamlining backup and recovery operations.
TSM for Virtual Environments support file level backup operations using the vStorageAPIs. You will explore this functionality as you perform the lab exercises for this session.
Recent enhancements
The most recent enhancements to TSM for Virtual Environments leverage the vStorageAPI Change Block Tracking (CBT) mechanism to provide an incremental forever backupmethodolgy.
Supported virtual machine backup operations include:
• CBT with incremental forever backup and periodic full backups
HOL-PRT-1302
Page 9VMware Beta Program CONFIDENTIAL
Supported virtual machine recovery operations include:
• File level• Volume level• Disk level• Full VM
HOL-PRT-1302
Page 10VMware Beta Program CONFIDENTIAL
Exploring the VirtualEnvironment
HOL-PRT-1302
Page 11VMware Beta Program CONFIDENTIAL
Explore the lab environmentObjectives
In this exercise you will use the VMware vSphere Web Client to explore the trainingenvironment and become familiar with the resources that have been provided for thislab.
Becoming acquainted with the training environment and how it differs from a productionenvironment will aid your understanding of the concepts and procedures that you willexplore as you complete the lab exercises.
Launch Internet Explorer
From the desktop of the controlcenter virtual machine, launch Internet Explorer.
HOL-PRT-1302
Page 12VMware Beta Program CONFIDENTIAL
Login to the VMware vSphere Web Client
Login to the VMware vSphere Web Client using these credentials:
User name: AdministratorPassword: VMware1!
Unpin the Recent Tasks panel
Click the push pin icon in the upper-right corner to unpin the Recent Tasks panel.This will allow you to see more of the main panel.
HOL-PRT-1302
Page 13VMware Beta Program CONFIDENTIAL
Select vCenter in the navigation panel
Using the navigation panel on the left, you will expand several items in order to view thedatacenter that has been configured for the lab exercises.
Start by clicking the vCenter item.
Select Hosts and Clusters
Click the Hosts and Clusters item.
HOL-PRT-1302
Page 14VMware Beta Program CONFIDENTIAL
Expand the navigation tree
In the navigation tree, expand VCENTER.corp.local > Datacenter > Cluster toreveal the esx-01a.corp.local host and the two virtual machines (billxp andTEDwin8) that it supports.
Launch the console
Right-click billxp and click Open Console.
HOL-PRT-1302
Page 15VMware Beta Program CONFIDENTIAL
Open Windows Explorer
Using the desktop of billxp, right-click Start and select Explore to open WindowsExplorer.
HOL-PRT-1302
Page 16VMware Beta Program CONFIDENTIAL
Locate the DemoData folder
Navigate to the C:\DemoData folder.
HOL-PRT-1302
Page 17VMware Beta Program CONFIDENTIAL
Review the sample data files
Review the files in the DemoData folder, then close Windows Explorer.
In later exercises, you will manipulate these sample files to explore the backup andrecovery features of Data Protection for Virtual Environments.
Return to the vSphere Web Client
Click the vSphere Web Client tab in Internet Explorer to return to the web client.
Do not close the billxp console. You will use it in a later exercise to add more files tothe DemoData folder.
HOL-PRT-1302
Page 18VMware Beta Program CONFIDENTIAL
Performing the InitialConfiguration
HOL-PRT-1302
Page 19VMware Beta Program CONFIDENTIAL
Using the Configuration Wizard tocomplete the initial configurationObjectives
The initial configuration is performed using the VSphere Client Plug-in Wizard. After thewizard guides you through the configuration steps, the environment is operational andbackup operations can be performed.
Open a new Internet Explorer tab
In Internet Explorer, click the New Tab button to open another tab.
HOL-PRT-1302
Page 20VMware Beta Program CONFIDENTIAL
Launch another vSphere Web Client instance
Click the vSphere Web Client bookmark in Internet Explorer to open another instanceof the web client in the new tab.
This will make it easier for you to switch between the different GUIs as you perform thelab exercises.
Select the Home tab
Using the vSphere Web Client, select the Home tab.
HOL-PRT-1302
Page 21VMware Beta Program CONFIDENTIAL
Launch the Tivoli Data Protection for VMware interface
Scroll down if necessary and launch the Tivoli Data Protection for VMware plug-ininterface.
HOL-PRT-1302
Page 22VMware Beta Program CONFIDENTIAL
Display all content
If a message is displayed about secure content, click Show all content.
Unpin panels
Click the pushpin icons to unpin the panels on the left and right side of the window. Thiswill reveal more of the main panel.
Remember that you can do this as needed as you progress through the lab exercises.
HOL-PRT-1302
Page 23VMware Beta Program CONFIDENTIAL
About the Configuration Wizard
In a production environment, the first time you start the interface you will be promptedto launch the Configuration Wizard.
This has already been done in the lab environment, so you will not see thiswindow.
Select the Configuration tab
Review the information presented on the Getting Started tab, then click theConfiguration tab.
Run the Configuration Wizard
Remember that the initial configuration has already been performed in this labenvironment.
HOL-PRT-1302
Page 24VMware Beta Program CONFIDENTIAL
Review the status of the configuration, then click Run Configuration Wizard toexplore the steps that you would perform in a production environment.
Welcome
The configuration wizard is used to configure the settings required to communicate withthe Tivoli Storage Manager server and establish proxy node relationships.
Review the information on the Welcome panel, then click Next.
HOL-PRT-1302
Page 25VMware Beta Program CONFIDENTIAL
Server Credentials
In a production environment, you will use the Server Credentials panel to supply thecredentials needed for the Tivoli Storage Manager Server.
For this lab exercise, review the required fields, then select the Save this ID check boxand click Next.
Node Definition Options
Review the Node Definition Options, then click Next.
HOL-PRT-1302
Page 26VMware Beta Program CONFIDENTIAL
vCenter Node
In a production environment, you will use the vCenter Node panel to supply thecredentials to register your vCenter to the Tivoli Storage Manager Server.
For the lab environment, clear the Register Node check box, then click Next.
HOL-PRT-1302
Page 27VMware Beta Program CONFIDENTIAL
VMCLI Node
In a production environment, you will use the VMCLI Node panel to supply thecredentials needed to register the command line interface with the Tivoli StorageManager Server.
For this lab exercise, clear the Register Node check box, then click Next.
Plug-in Domain
On the Plug-in Domain panel, click Next.
HOL-PRT-1302
Page 28VMware Beta Program CONFIDENTIAL
Data Mover Nodes
In a production environment, you will use the Data Mover Nodes panel to createpasswords for the data center node and data mover node.
For this lab exercise, because the nodes are already registered, just click Next.
Summary
Review the configuration summary, then click Finish.
HOL-PRT-1302
Page 29VMware Beta Program CONFIDENTIAL
Wizard Tasks
Observe the progress as the wizard completes the configuration tasks.Click Close when the tasks are completed.
HOL-PRT-1302
Page 30VMware Beta Program CONFIDENTIAL
Scheduling Backups
HOL-PRT-1302
Page 31VMware Beta Program CONFIDENTIAL
Performing an Incremental BackupoperationObjectives
In this section you will use the Tivoli Data Protection for VMware interface to perform anincremental backup operation.
First you will verify that a full backup of the billxp virtual machine has already beenperformed.
Next you will use the scheduling wizard to define and run an incremental backup task.
Then you will monitor the task and verify that it completes successfully.
Select the Backup tab
In the Tivoli Data Protection for VMware plug-in interface, click the Backup tab.
HOL-PRT-1302
Page 32VMware Beta Program CONFIDENTIAL
Review existing backup snapshots
Click the Full_prelab schedule to select it, then scroll down to review the scheduledetails.
HOL-PRT-1302
Page 33VMware Beta Program CONFIDENTIAL
Review existing snapshot details
Review the details of the Full_prelab snapshot, then click the Getting Started tab.
In order to minimize the impact on the lab resources, this backup was performed whenthe lab environment was created.
Please do not initiate any additional full backup operations while performingthese lab exercises.
HOL-PRT-1302
Page 34VMware Beta Program CONFIDENTIAL
Start the Schedule a Backup wizard
Click Define a backup task to launch the Schedule a Backup wizard.
Welcome panel
On the Welcome panel, click Next.
HOL-PRT-1302
Page 35VMware Beta Program CONFIDENTIAL
General panel
On the General panel, enter the backup schedule name billxp_backup and click Next.
Source panel
On the Source panel, clear the checkbox Newly added virtual machines areincluded...
Expand the navigation tree as necessary, select billxp, then click Next.
HOL-PRT-1302
Page 36VMware Beta Program CONFIDENTIAL
Destination panel
Verify that the DATACENTER_DM node is selected as the destination for the backupoperation, then click Next.
Schedule panel
On the Schedule panel, select or verify these options:
• Run the backup now• Backup strategy is Incremental forever (default)• Backup type is Incremental
Click Next.
HOL-PRT-1302
Page 37VMware Beta Program CONFIDENTIAL
Ready to Complete panel
On the Ready to Complete panel, review the backup specifications, then click Finish.
Confirm
Click Yes to confirm that you want to monitor the task.
HOL-PRT-1302
Page 38VMware Beta Program CONFIDENTIAL
Table of Operations
Monitor the backup task until the progress indicates Success, then click the task toselect it and scroll down to review the status details.
Status details
Review the status details and verify that the backup operation was successful.
HOL-PRT-1302
Page 39VMware Beta Program CONFIDENTIAL
Backup tab
Click the Backup tab to return to the list of backup schedules.
Backup schedules
Review the backup schedules and verify that Full_prelab and billxp_backup are listed,and that their status indicates Success.
HOL-PRT-1302
Page 40VMware Beta Program CONFIDENTIAL
Backing up changed data
HOL-PRT-1302
Page 41VMware Beta Program CONFIDENTIAL
Simulating data changes in theproduction environmentObjectives
In order for you to explore the incremental backup functionality, the sample data needsto be altered to simulate the changes that occur in a production environment.
In an earlier section, you examined the C:\DemoData folder on the billxp virtualmachine. Now you will access the billxp console again and use the command prompt tocreate three new data folders, taking new incremental backups after each folder iscreated.
Note that you will be switching between the Internet Explorer tabs for billxp and theData Protection for VMware plug-in running in the vSphere Web Client as you workyour way through these steps.
Return to the billxp console
In Internet Explorer, click the billxp tab to return to the virtual machine console.
HOL-PRT-1302
Page 42VMware Beta Program CONFIDENTIAL
Open the Command Prompt
Use the icon on the desktop of the billxp virtual machine to launch the CommandPrompt interface.
Navigate to the DemoData folder
Enter this command to navigate to the DemoData folder:
cd c:\DemoData
Enter this command to verify the existing files:
dir
HOL-PRT-1302
Page 43VMware Beta Program CONFIDENTIAL
Create January data
Enter these commands to create additional sample files:
md 1-Jan
FOR /L %X IN (1,1,5) DO copy bigfile.txt 1-Jan\jan_data%X.txt
HOL-PRT-1302
Page 44VMware Beta Program CONFIDENTIAL
Verify new file creation
Enter this command to verify that the new files were created as expected:
dir 1-Jan
Return to the vSphere Web Client
Click the vSphere Web Client tab in Internet Explorer to return to the vSphereinterface.
You will use the billxp tab in a later step to further manipulate the sample files, so donot close the tab.
HOL-PRT-1302
Page 45VMware Beta Program CONFIDENTIAL
Go to the Backup tab
Click the Backup tab to display the table of operations.
HOL-PRT-1302
Page 46VMware Beta Program CONFIDENTIAL
Start the backup task
In the table of backup schedules, right-click billxp_backup and select Run now to startthe task.
HOL-PRT-1302
Page 47VMware Beta Program CONFIDENTIAL
Confirmation
Click OK to monitor the task.
Monitor the progress of the backup task
In the table of operations, click the Refresh icon repeatedly to monitor the progress ofthe backup task and verify that it completes sucessfully.
HOL-PRT-1302
Page 48VMware Beta Program CONFIDENTIAL
Return to the billxp console
In Internet Explorer, click the billxp tab to return to the virtual machine console.
Create February data
Enter these commands to create additional sample files:
md 2-Feb
FOR /L %X IN (1,1,5) DO copy bigfile.txt 2-Feb\feb_data%X.txt
HOL-PRT-1302
Page 49VMware Beta Program CONFIDENTIAL
Verify new file creation
Enter this command to verify that the new files were created as expected:
dir 2-Feb
Return to the vSphere Web Client
Click the vSphere Web Client tab in Internet Explorer to return to the vSphereinterface.
You will use the billxp tab in a later step to further manipulate the sample files, so donot close the tab.
HOL-PRT-1302
Page 50VMware Beta Program CONFIDENTIAL
Go to the Backup tab
Click the Backup tab to display the table of operations.
Start the backup task
In the table of backup schedules, right-click billxp_backup and select Run now to startthe task.
HOL-PRT-1302
Page 51VMware Beta Program CONFIDENTIAL
Confirmation
Click OK to monitor the task.
Monitor the progress of the backup task
In the table of operations, click the Refresh icon repeatedly to monitor the progress ofthe backup task and verify that it completes sucessfully.
HOL-PRT-1302
Page 52VMware Beta Program CONFIDENTIAL
Return to the billxp console
In Internet Explorer, click the billxp tab to return to the virtual machine console.
HOL-PRT-1302
Page 53VMware Beta Program CONFIDENTIAL
Create March data
Enter these commands to create additional sample files:
md 3-Mar
FOR /L %X IN (1,1,5) DO copy bigfile.txt 3-Mar\mar_data%X.txt
Verify new file creation
Enter this command to verify that the new files were created as expected:
dir 3-Mar
HOL-PRT-1302
Page 54VMware Beta Program CONFIDENTIAL
Review sample files
Enter this command to review the example folders that you have created:
dir
Simulate loss of data
To simulate the loss of data in a production environment, enter and confirm thiscommand:
rmdir /s 2-Feb
In a later exercise, you will use the Recovery Agent to restore this lost data.
HOL-PRT-1302
Page 55VMware Beta Program CONFIDENTIAL
Return to the vSphere Web Client
Close the Command Prompt window, then click the vSphere Web Client tab in InternetExplorer to return to the vSphere interface.
HOL-PRT-1302
Page 56VMware Beta Program CONFIDENTIAL
Go to the Backup tab
Click the Backup tab to display the table of operations.
HOL-PRT-1302
Page 57VMware Beta Program CONFIDENTIAL
Start the backup task
In the table of backup schedules, right-click billxp_backup and select Run now to startthe task.
Confirmation
Click OK to monitor the task.
HOL-PRT-1302
Page 58VMware Beta Program CONFIDENTIAL
Monitor the progress of the backup task
In the table of operations, click the Refresh icon repeatedly to monitor the progress ofthe backup task and verify that it completes sucessfully.
HOL-PRT-1302
Page 59VMware Beta Program CONFIDENTIAL
Recovering Critical Data
HOL-PRT-1302
Page 60VMware Beta Program CONFIDENTIAL
Using the Recovery Agent to restorecritical dataObjectives
In the previous section, you used the Data Protection for VMware Plug-in to perform aseries of incremental backup operations of sample data folders. Those backups arestored in the Tivoli Storage Manager storage pools as point-in-time snapshots of theprotected volumes.
In this section, you will use the Data Protection for VMware Recovery Agent interface toview the available point-in-time snapshots, select specific snapshots, and mount themas virtual volumes that you will examine using Windows Explorer.
Launch the Recovery Agent
Launch the Recovery agent by selecting Start > All Programs > Tivoli StorageManager > Data Protection for VMware > Data Protection for VMwareRecovery Agent.
HOL-PRT-1302
Page 61VMware Beta Program CONFIDENTIAL
Select the TSM server
Using the pull-down menu, select New Tivoli Storage Manager server...
HOL-PRT-1302
Page 62VMware Beta Program CONFIDENTIAL
Supply Credentials
On the TSM Server information window, select or verify these values:
Server address: tsm.corp.localServer port: 1500
Select Direct as the node access method.
Authentication node: DATACENTERPassword: VMware1Target node: DATACENTER
Click OK.
HOL-PRT-1302
Page 63VMware Beta Program CONFIDENTIAL
Select the virtual machine
Use the pull-down menu to select the billxp virtual machine.
Review the available snapshots
Use the pull-down menu to reveal the list of available snapshots.
The oldest snapshot, dated 7/3/2013, is the full snapshot that was taken when the labenvironment was built.
The other four snapshots were created when you performed the backup tasks inprevious sections.
(The date stamps for the snapshots you created are of course different from the imagebelow.)
HOL-PRT-1302
Page 64VMware Beta Program CONFIDENTIAL
Select the oldest snapshot
Using the pull-down menu, select the snapshot dated 7/3/2013.
Select the hard disk
Using the pull-down menu, select Hard Disk 1.
If the protected virtual machine had multiple volumes, you would see them listed here.
HOL-PRT-1302
Page 65VMware Beta Program CONFIDENTIAL
Open Windows Explorer
Click the icon on the task bar to open Windows Explorer.
Navigate to Computer
In the navigation tree, select Computer.
HOL-PRT-1302
Page 66VMware Beta Program CONFIDENTIAL
Mount the volume
Resize and arrange the windows as necessary so that:
• Windows Explorer is in the background with the Hard Disk Drives region visible• Data Protection for VMware is in the foreground
This will allow you to see the result of the mount operation.
Click Mount.
HOL-PRT-1302
Page 67VMware Beta Program CONFIDENTIAL
Assign the drive letter
Complete the mount operation by making or confirming these selections:
• Create virtual volume from selected partition• Select partition number 0• Use the pull-down to Assign the following drive letter: V:\
Click OK.
HOL-PRT-1302
Page 68VMware Beta Program CONFIDENTIAL
Observe the mount operation
Observe the Windows Explorer window. After a brief wait, you will see Local Disk (V:)displayed in the Hard Disk Drives panel.
HOL-PRT-1302
Page 69VMware Beta Program CONFIDENTIAL
Review the virtual volume
In Windows Explorer, open the Local Disk (V:) volume and navigate to the DemoDatafolder.
The data that you see on the V: drive is from the point-in-time snapshot that wascreated when the first backup operation of the C:\ drive on the billxp virtual machinewas performed.
The Recovery Agent has identified the blocks of data in the Tivoli Storage Managerstorage pool that are needed to recreate the point-in-time state of the billxp C:\ drive,has mounted that set of data blocks as a virtual volume, and has assigned it the driveletter V:\.
Note that the Windows operating system is not aware that this is a virtual volume. Youcannot alter the data on this virtual volume. However, you can restore individual filesand folders -- either to the original location or a new location -- using Copy & Paste (orDrag & Drop), expose the volume to an FTP server, or share the volume usingconventional Windows methods.
HOL-PRT-1302
Page 70VMware Beta Program CONFIDENTIAL
Dismount the virtual volume
In the Recovery Agent interface, click Dismount All to dismount the virtual volume.
Confirmation
Windows Explorer is still accessing the volume. Click Yes to force the dismount.
HOL-PRT-1302
Page 71VMware Beta Program CONFIDENTIAL
Verify dismount
Observe Windows Explorer and the Recovery Agent interface and note that the virtualvolume is no longer displayed.
HOL-PRT-1302
Page 72VMware Beta Program CONFIDENTIAL
Select a snapshot
In the next part of this section, you will select three different snapshots and mount themsimultaneously on three virtual drives, X:, Y:, and Z:\.
Begin by selecting the third most recent snapshot from the pull-down list.
This represents the backup operation you performed after creating the 1-Jan folder.
Mount the snapshot
Select Hard Disk 1 and click Mount.
HOL-PRT-1302
Page 73VMware Beta Program CONFIDENTIAL
Assign drive letter X:\
Make the appropriate selections on this panel, assigning X:\ as the drive letter for thevirtual volume. Click OK.
HOL-PRT-1302
Page 74VMware Beta Program CONFIDENTIAL
Select a snapshot
Now select the second most recent snapshot from the pull-down list.
This represents the backup operation you performed after creating the 2-Feb folder.
Mount the snapshot
Select Hard Disk 1 and click Mount.
HOL-PRT-1302
Page 75VMware Beta Program CONFIDENTIAL
Assign drive letter Y:\
Make the appropriate selections on this panel, assigning Y:\ as the drive letter for thevirtual volume. Click OK.
HOL-PRT-1302
Page 76VMware Beta Program CONFIDENTIAL
Mount the snapshot
Now select the most recent snapshot from the pull-down list.
This represents the backup operation you performed after creating the 3-Mar folder anddeleting the 2-Feb folder.
Select Hard Disk 1 and click Mount.
HOL-PRT-1302
Page 77VMware Beta Program CONFIDENTIAL
Assign drive letter Z:\
Make the appropriate selections on this panel, assigning Z:\ as the drive letter for thevirtual volume. Click OK.
HOL-PRT-1302
Page 78VMware Beta Program CONFIDENTIAL
Compare virtual volumes
Open three instances of Windows Explorer and resize and arrange the windows asshown below.
Compare the contents of the three point-in-time snapshots mounted as virtual drives. Ifnecessary, review the backup operations that you performed in the previous section toconfirm your understanding of the cause-and-effect relationship between performingbackup operations and mounting point-in-time snapshots as virtual volumes.
Note that this method of simultaneously mounting different snapshots of the samevolume might be useful in a situation where an administrator needs to recover data, butisn't certain which version needs to be restored. Mounting multiple snapshots in thisfashion makes it easy to compare different versions of files and select the correctversions for recovery.
HOL-PRT-1302
Page 79VMware Beta Program CONFIDENTIAL
Change Block Tracking
Data Protection for VMware is using Change Block Tracking (CBT) technology to performincremental backup operations. By utilizing CBT, only the blocks of data that havechanged since the previous backup operation are transferred to the storage pool,minimizing the impact on network and storage resources.
For example, when you explore the snapshot mounted on Y:\, you will observe that boththe 1-Jan and 2-Feb folders (along with all the other data from the original volume) areavailable for recovery operations.
In reality, when the snapshot was taken, only the blocks of data making up the 2-Febfolder were copied to the storage pool. When the snapshot is mounted, the RecoveryAgent "borrows" data blocks from earlier snapshots as needed (for example, the blocksfrom 1-Jan) to construct an entire virtual volume.
HOL-PRT-1302
Page 80VMware Beta Program CONFIDENTIAL
Dismount the virtual volumes
In the Recovery Agent interface, click Dismount All.
Confirmation
Click Yes to close the warning message about open files.
HOL-PRT-1302
Page 81VMware Beta Program CONFIDENTIAL
Close the Recovery Agent interface
Close the Recovery Agent interface.
HOL-PRT-1302
Page 82VMware Beta Program CONFIDENTIAL
Simulating the Loss of aVM
HOL-PRT-1302
Page 83VMware Beta Program CONFIDENTIAL
Simulating the loss of an entire virtualmachineObjectives
In this section, you will review the available restore points to ensure that a backup existsfor the target virtual machine.
Then you will simulate the loss of a virtual machine by using the vSphere Web Clientinterface to delete the target machine from the datastore.
Access the Restore tab
Click the Restore tab to review the available restore points.
HOL-PRT-1302
Page 84VMware Beta Program CONFIDENTIAL
Expand the Datacenter tree
Expand the Datacenter tree as necessary to reveal the virtual machines, then selectTEDwin8.
Select the restore point
Select the restore point, the scroll down to review the restore point details.
HOL-PRT-1302
Page 85VMware Beta Program CONFIDENTIAL
Return to the web client
In Internet Explorer, click the appropriate tab to return to the vSphere Web Clientinterface.
Delete the virtual machine
In the Datacenter navigation tree, right-click TEDwin8, then select All vCenterActions and Delete from Disk.
HOL-PRT-1302
Page 86VMware Beta Program CONFIDENTIAL
Confirm delete
Click Yes to confirm deletion of the target virtual machine.
HOL-PRT-1302
Page 87VMware Beta Program CONFIDENTIAL
Verification
In the Datacenter navigation tree, verify that the TEDwin8 virtual machine is no longerlisted.
HOL-PRT-1302
Page 88VMware Beta Program CONFIDENTIAL
Recovering an Entire VM
HOL-PRT-1302
Page 89VMware Beta Program CONFIDENTIAL
Restoring an entire virtual machinefrom a backupObjectives
In this section, you will launch the Restore wizard and perform the steps to recover thethe deleted virtual machine to an alternate location.
Return to the Tivoli Data Protection for VirtualEnvironments interface
In Internet Explorer, click the appropriate tab to switch to the plug-in interface.
HOL-PRT-1302
Page 90VMware Beta Program CONFIDENTIAL
Launch the Restore wizard
On the Restore tab, click the Restore link to launch the wizard.
Welcome panel
On the Welcome panel, click Next.
HOL-PRT-1302
Page 91VMware Beta Program CONFIDENTIAL
Restore settings panel
Review the settings for the restore operation, then click Next.
HOL-PRT-1302
Page 92VMware Beta Program CONFIDENTIAL
Destination panel
Verify that Restore to alternate location is selected.
For the virtual machine name, enter TED_recovered.
Review the remaining default selections, then click Next.
HOL-PRT-1302
Page 93VMware Beta Program CONFIDENTIAL
Ready to complete panel
On the Ready to complete panel, click Finish.
Monitor the task
Observe the progress of the restore operation and verify that it completes successfully.
HOL-PRT-1302
Page 94VMware Beta Program CONFIDENTIAL
Return to the vSphere Web Client interface
In Internet Explorer, click the appropriate tab to switch to the web client interface.
Refresh the view
Click the icon to refresh the view of the navigation tree for the datacenter.
HOL-PRT-1302
Page 95VMware Beta Program CONFIDENTIAL
Verify the recovery
Verify that the TED_recovered virtual machine is listed under the ESX host.
HOL-PRT-1302
Page 96VMware Beta Program CONFIDENTIAL
Conclusion
HOL-PRT-1302
Page 97VMware Beta Program CONFIDENTIAL
ConclusionConclusion
As you have seen demonstrated in this lab, Tivoli Storage Manager for VirtualEnvironments enables the VMware administrator to implement an efficient dataprotection model that is easy to administer.
Using the familiar VMware vSphere Web Client interface along with the Tivoli DataProtection for VMware Plug-in GUI, the VMware administrator can configure scheduledand ad hoc backup operations to protect critical data on virtual machines, leveragingexisting Tivoli Storage Manager implementations. As you have seen, this isaccomplished with nominal knowledge of Tivoli Storage Manager and requires minimalcollaboration with the TSM administrator.
You have also seen how the Data Protection for VMware Recovery Agent provides asimple and intuitive interface that is used to restore individual files from a point-in-timebackup of a virtual machine, and how the full-machine recovery procedure is a simplesingle-step restore operation.
HOL-PRT-1302
Page 98VMware Beta Program CONFIDENTIAL
ConclusionThank you for participating in the VMware 2013 Hands-on Labs. Be sure to visithttp://hol.vmware.com/ to continue your lab experience online.
Lab SKU: HOL-PRT-1302
Version: 20140213-184025
HOL-PRT-1302
Page 99VMware Beta Program CONFIDENTIAL